source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/New%20Wave%20Theatre
|
New Wave Theatre is a television program broadcast locally in the Los Angeles area on UHF channel 18 and eventually on the USA Network as part of the late night variety show Night Flight during the early 1980s. The show was created and produced by David Jove, who also wrote the program with Billboard magazine editor Ed Ochs. It was noted for showcasing rising punk and new wave acts, including Bad Religion, Fear, the Dead Kennedys, 45 Grave, The Angry Samoans and The Circle Jerks.
Format
Peter Ivers, a Harvard-educated musician with a gregarious personality and a flair for theatrics was the host for the entire run of the show. The format was extremely loose, owing partly to the desire to maintain the raw energy of the live performances and partly to the limited production budget. The program was presented in a format dubbed "live taped", in which the action was shot live and the video was then spliced with video clips, photos and graphics of everything from an exploding atomic bomb to a woman wringing a chicken's neck.
The show started with a montage of clips from punk and new wave acts while the title appeared and the theme song, an abrupt mixture of Fear's "Camarillo" and The Blasters' "American Music", played. Ivers would appear at the beginning and end of each show wearing dark glasses, spouting a stream of consciousness spiel about life, art and music. Besides the top-billed music acts, short skits were shown, including Sri Maharooni, a chain-smoking Indian fakir speaking about the meaning of life, and Chris Genkel (played by actor Robert Roll), a pitchman hawking bizarre products for "gherkins" from his company, Genkel Wax Works, in Adonai, Illinois. Celebrities, including Debra Winger and Beverly D'Angelo, were known to show up at NWT'''s tapings. Elvira, Mistress of the Dark, who'd just begun hosting Elvira's Movie Macabre on KHJ-TV, appeared on Episode #2 and delivered one of the Genkel Wax Works commercials that week.New Wave Theatre came to an end in March 1983 when Ivers was found bludgeoned to death in his LA apartment.
Rhino Video released two volumes of the best of New Wave Theatre in 1991 (Rhino Video numbers RNVD 2903 and RNVD 2904). Both are out of print but used copies are not hard to find.
The Top
Ivers' friend, movie producer/director/writer Harold Ramis, offered Jove help and the result was a pilot show for local TV (KTLA) called The Top directed by Jove, produced by the then prolific music video producer Paul Flattery (he and Jove first collaborated on "Stop In The Name Of Love", a video for The Hollies, which incorporated many of Jove's signature public domain footage montages) and executive produced by Ramis. Ramis basically lent his name (as well as industry clout, contacts and credibility) to the show which was conceived partially to continue the spirit of New Wave Theatre but also to take advantage of the then-emerging music video scene. (Flattery's music video resume was a who's who of the 80s). Chevy Chase was
|
https://en.wikipedia.org/wiki/Basic%20programming
|
Basic programming may refer to:
Basic television programming, the set of channels included in basic subscription to satellite or cable television.
Programming in one of the BASIC programming languages.
BASIC Programming, cartridge for the Atari 2600 console, released in 1979.
|
https://en.wikipedia.org/wiki/Santa%20vs.%20the%20Snowman%203D
|
Santa vs. the Snowman is a 1997 American computer-animated Christmas comedy television special created by Steve Oedekerk and produced by O Entertainment. It originally aired on ABC on December 12, 1997, following The Online Adventures of Ozzie the Elf.
The special was voiced by Jonathan Winters, Ben Stein, Victoria Jackson, Mark DeCarlo and David Floyd, and narrated by Don LaFontaine.
Relations to other films, like a scene of ice-made AT-ST's, mostly resembling the ones from The Empire Strikes Back appear throughout.
In 2002, the special was released in IMAX 3D as Santa vs. the Snowman 3D, with new scenes at the beginning and end of the film.
Plot
A lonely Snowman has no friends and never learned to speak because nobody was around. Instead, he plays his flute for the stars every night. But one particular night, the stars answer back, a flash of light zooms past the Snowman and shatters his flute. Consumed with curiosity, the Snowman sets off to find out what created the mysterious light. Eventually, the Snowman finds himself at Santa's Village. The Snowman enters a toy workshop, where elves are making toys. Another elf comes into the workshop with its owner, Santa Claus. While Santa is chatting with his elves, who praise him highly, the Snowman finds a red and gold flute in the workshop. After grabbing the flute, an alarm goes off. The Snowman retreats, but Santa sends some of his elves to retrieve the flute. While being chased, the Snowman drops the flute, and hides from the elves by jumping off a cliff. He grabs an icicle stalactite, waiting for them to leave. After the elves retrieve the flute and return to the village, the Snowman heads home.
The Snowman cannot stop thinking about Santa and his wonderful workshop. It seems that Santa has a marvelous home, many friends, plenty of toys, and is loved by everybody, but he wouldn't let the Snowman have the flute. The Snowman imagines himself as Santa, giving out toys, loved by everyone. At that moment, the Snowman thinks, "Why should Santa keep all that love, good tidings, and friendship for himself? That didn't seem fair. Maybe, it's time someone else got to be Santa?" With that, the Snowman forms a plan to take Santa's spot. The Snowman sneaks onto a guided village train tour, where he takes pictures with a camera disguised as an ice cream cone. The Snowman gets off the train and admires Santa's sleigh, where he is noticed and kicked out. The Snowman then makes various equipment for invading the workshop, and snowman minions to help him, becoming a much more devious Snowman.
The Snowman and his minions invade Santa's Village, but Santa sends his elves to fight back, in a chaotic battle. The elves attempt to melt and blow up the snowmen while the snowmen spew snowballs at the elves. Since Christmas is only hours away, Santa decides to help his elves end the conflict, and enters the battle in a large Nutcracker mech. The Snowman unleashes a snow monster, but Santa's mech defeats the monster
|
https://en.wikipedia.org/wiki/Christmas%20with%20the%20Joker
|
"Christmas with the Joker" is the second episode of Batman: The Animated Series. It originally aired on the Fox network in the United States on November 13, 1992. It was written by Eddie Gorodetsky and directed by Kent Butterworth.
The episode marks the series' first appearance of The Joker, as well as the first time the character would be voiced by Mark Hamill; he would go on to voice the character for many years in various animation works and video games.
Plot
On Christmas Eve, The Joker escapes from Arkham Asylum using a rocket hidden inside a Christmas tree. Batman and Robin begin patrolling Gotham City to search for him, with Robin being skeptical of this particular patrol being worthwhile, opting to relax and get into the holiday spirit at Wayne Manor. After finding Gotham to be uncharacteristically peaceful, the Dynamic Duo return to Wayne Manor to watch It's a Wonderful Life when they discover that Joker has hijacked Gotham's television signals. He announces that he is going to broadcast his assault on Gotham City as a Christmas special. Joker is speaking to a "live" studio audience consisting of cardboard cutouts of Gotham's various public servants, including Batman and Robin. Joker tells the camera that because he does not have a family to spend the holidays with, he has kidnapped Commissioner Gordon, Summer Gleeson, and Harvey Bullock to serve as one. Joker tells the camera that if Batman isn't able to track him down by midnight, he will kill the three hostages.
Using the Batcomputer, Batman accesses Gotham's electrical mainframe and pinpoints the location of Joker's signal by tracking power surges. Joker's hired thugs, Donner and Blitzen, blow up one of Gotham's bridges, just as the 11:30 train is about to cross. Gleeson reveals that her mother is on the train, prompting a taunt from Joker. Batman and Robin hurry to intercept the train. Robin uncouples the passenger cars, while Batman rescues the engineer just in time for the train to careen off the blown-up tracks and into the valley below. Batman determines that Joker's signal is coming from the observatory at the top of Mt. Gotham. The Caped Crusaders head to the top of the mountain, and discover a radio transmitter left by the Joker. Joker reveals that he has replaced the observatory's telescope with a cannon, which he fires upon Batman and Robin.
As Batman draws the cannon's fire, which starts to shoot randomly at the city, Robin breaks into the observatory to disable the cannon. Upon entering, Robin discovers a number of Joker robots with gun fingers, who start firing upon him. Robin is quickly able to destroy the robots, allowing him to neutralize the cannon with a detonator.
Joker then gives the Dynamic Duo a clue to his hideout by broadcasting footage of Summer Gleeson opening a "Betty Blooper" doll. Batman recalls that these dolls are no longer sold, as Laffco, the toy company that produced them, has been out of business for the last fourteen years, and deduces that the
|
https://en.wikipedia.org/wiki/Sink%20%28computing%29
|
In computing, a sink, or data sink generally refers to the destination of data flow.
The word sink has multiple uses in computing. In software engineering, an event sink is a class or function that receives events from another object or function, while a sink can also refer to a node of a directed acyclic graph with no additional nodes leading out from it, among other uses.
In software engineering
An event sink is a class or function designed to receive incoming events from another object or function. This is commonly implemented in C++ as callbacks. Other object-oriented languages, such as Java and C#, have built-in support for sinks by allowing events to be fired to delegate functions.
Due to lack of formal definition, a sink is often misconstrued with a gateway, which is a similar construct but the latter is usually either an end-point or allows bi-direction communication between dissimilar systems, as opposed to just an event input point . This is often seen in C++ and hardware-related programming , thus the choice of nomenclature by a developer usually depends on whether the agent acting on a sink is a producer or consumer of the sink content.
In graph theory
In a Directed acyclic graph, a source node is a node (also known as a vertex) with no incoming connections from other nodes, while a sink node is a node without outgoing connections.
Directed acyclic graphs are used in instruction scheduling, neural networks and data compression.
In stream processing
In several computer programs employing streams, such as GStreamer, PulseAudio, or PipeWire, a source is the starting point of a pipeline which produces a stream but does not consume any, while a sink is the end point which accepts a stream without producing any.
An example is an audio pipeline in the PulseAudio sound system. An input device such as a microphone is a type of audio source, while an output device like a speaker is the audio sink.
Other uses
The word sink has been used for both input and output in the industry. Mobile sink is proposed to save sensor energy for multihop communication in transferring data to a base station (sink) in wireless sensor networks.
See also
Flow network
Event-driven architecture
References
Object-oriented programming
Network theory
Networks
|
https://en.wikipedia.org/wiki/Fast%20ForWord
|
Fast ForWord is a computer-based reading program with limited evidence of effectiveness, created by Scientific Learning Corporation. It is based on a theory about the cognitive abilities of children with language and literacy learning difficulties.
Research
A systematic review which focused on high quality randomised controlled trials did not find any positive benefit of the intervention. A more general review of "Brain Training" programs noted:
The research literature on Fast ForWord was reviewed by What Works Clearinghouse, an initiative of the U.S. Department of Education’s Institute of Education Sciences. Positive effectiveness ratings and improvement indices were found for alphabetics, reading fluency, comprehension, and English language development. However, the quality of evidence included in these reviews has come under criticism, as it included reports that had not undergone peer review and that were produced by the company marketing the intervention.
History
The Fast ForWord products evolved from the theory of a number of scientists, including Michael Merzenich, Bill Jenkins, Paula Tallal, and Steven Miller. This team started the Scientific Learning Corporation in 1996. The company created Fast ForWord. The theory was that some children who have language and literacy learning difficulties may have problems rapidly processing sounds, a following theory that cognitive training can improve auditory processing, and a final theory that this training will generalize to improve learning skills beyond those in the training tasks. Despite this, the program has not demonstrated an ability to improve learning skills.
References
External links
Software for children
Learning to read
Brain training programs
|
https://en.wikipedia.org/wiki/Adam%20Bly
|
Adam Bly (born 1981 in Montreal, Quebec) is a Canadian scientist and entrepreneur. He is the creator of Seed and used to lead data at Spotify until he left in 2017. Bly joined Spotify in 2015 when Spotify acquired his company, Seed Scientific. He was a Visiting Senior Fellow in Science, Technology, and Society at Harvard Kennedy School. In 2007, he was named a Young Global Leader by the World Economic Forum. He is a recipient of the Queen Elizabeth II Golden Jubilee Medal.
Life and work
He began his career at the age of 16 as the youngest researcher at the National Research Council of Canada, where he spent three years studying the biochemistry of cancer, specifically the role of cell adhesion in metastasis. Out of the lab, without completing a university education, he founded Seed – tag-lined "Science is Culture™" – and served as its Editor-in-Chief. "The best comparison for Seed," wrote a media critic at the time of the magazine's launch in 2001, "is the early years of Rolling Stone, when music was less a subject than a lens for viewing culture." Under his leadership, the magazine earned critical acclaim for modernizing scientific publishing and for bridging long-standing divides between science and society – from art and design to politics and religion. Together with Paola Antonelli he co-founded a monthly gathering of scientists, architects, and designers that laid the foundation for Design and the Elastic Mind, an exhibition about science and design at The Museum of Modern Art.
He is the editor of Science is Culture: Conversations at the New Intersection of Science + Society (published by HarperCollins) and the creator of the data visualization platform Visualizing.org.
He has lectured around the world on the future of science and its role in society, including at the World Economic Forum, the National Academies of Science, the Royal Society, the National Institutes of Health, the State Department, NASA, the Chinese Ministry of Science and Technology, The Museum of Modern Art, and The Academy of Sciences for the Developing World, before the National Science Board and the U.S. House of Representatives, and at universities including Harvard, MIT, and Beijing. He has served on the nominating committees and juries of the Buckminster Fuller Challenge, the Earth Award, and the TED Prize, and sits on the Science Advisory Committee of the World Economic Forum, the External Advisory Board of the University of Michigan's Risk Science Center, the American Committee of the Weizmann Institute of Science, the Communications Advisory Board of the National Academy of Sciences, and as an advisor to OECD's Global Project on Measuring the Progress of Societies.
He was named Vice Chair of the World Economic Forum's Global Agenda Council on Design Innovation and Partner to the Executive Coordination Office for the Rio+20 United Nations Conference on Sustainable Development.
His achievements were highlighted by then-Canadian Prime Minister Jean Chrétien, "fo
|
https://en.wikipedia.org/wiki/NETS%20%28company%29
|
Network for Electronic Transfers, colloquially known as NETS, is a Singaporean electronic payment service provider. Founded in 1986 by a consortium of local banks, it aims to establish the debit network and drive the adoption of electronic payments in Singapore. It is owned by DBS Bank, OCBC Bank and United Overseas Bank (UOB).
The NETS Group (comprising NETS, BCS and BCSIS) provides a full suite of payments and financial processing services including direct debit and credit payments at point-of-sale (NETS) and online (eNETS), mobile payments (NETSPay), card services (CashCard, FlashPay card), electronic funds transfer (FAST, Paynow, GIRO) and payment and clearing solutions (Real-Time Gross Settlement, Cheque Truncation System). NETS is also a member of the Asian Payment Network (APN) and a council member of UnionPay International.
History
NETS was first introduced to the public on 27 June 1985 as a 2-month pilot project involving 10,000 ATM card holders from the five local banks, namely DBS Bank, OCBC Bank, UOB, POSB Bank and OUB through 64 terminals installed at participating government offices, supermarkets, department stores and petrol kiosks. The service was officially launched on 18 January 1986, allowing 1.3 million ATM card holders to make transactions through the initial NETS network of 195 terminals located in various retail outlets and by 1993, consumer spending through NETS reached S$1.14 billion.
In 2020, NETS Group signed a long-term lease to two full floors and a ground-floor unit, at Boustead Projects’ development, 351 on Braddell.
Acceptance
NETS operates Singapore's national debit scheme enabling customers of DBS Bank, POSB, HSBC, Maybank, OCBC Bank, Standard Chartered Bank and UOB to make payments using their physical/contactless ATM cards or mobile devices at more than 120,000 acceptance points in Singapore including major retailers, food courts, hawker centres, convenience stores and supermarkets.
The nationwide acceptance infrastructure is the largest in Singapore and includes 54,000 Unified Point-of-Sale (Unified POS) terminals (which accept NETS, NETS FlashPay, debit and credit cards such as VISA, Mastercard, American Express, UnionPay, RuPay and JCB) and 94,000 QR acceptance points (for payments via NETSPay, PayLah!, Pay Anyone and Mighty). In 2011, NETS’ debit system was designated as national payment system by the Monetary Authority of Singapore (MAS).
In November 2018, it was announced that NETS can be used at 4,500 acceptance points in Malaysia, allowing users of NETS enabled cards issued by DBS, POSB, OCBC Bank and United Overseas Bank.
Card services
CashCard
NETS introduced the 1st generation chip-based CashCard in 1995. The CashCard is a stored value card that is predominantly used as a payment mode for Singapore's Electronic Road Pricing (ERP) and car park charges since the introduction of the in-vehicle unit in 1997. The CashCard can also be used for retail purchases.
vCashCard
In May 2015, NETS launche
|
https://en.wikipedia.org/wiki/NLTSS
|
The Network Livermore Timesharing System (NLTSS, also sometimes the New Livermore Time Sharing System) is an operating system that was actively developed at Lawrence Livermore Laboratory (now Lawrence Livermore National Laboratory) from 1979 until about 1988, though it continued to run production applications until 1995. An earlier system, the Livermore Time Sharing System had been developed over a decade earlier.
NLTSS ran initially on a CDC 7600 computer, but only ran production from about 1985 until 1994 on Cray computers including the Cray-1, Cray X-MP, and Cray Y-MP models.
Characteristics
The NLTSS operating system was unusual in many respects and unique in some.
Low-level architecture
NLTSS was a microkernel message passing system. It was unique in that only one system call was supported by the kernel of the system. That system call, which might be called "communicate" (it didn't have a name because it didn't need to be distinguished from other system calls) accepted a list of "buffer tables" (e.g., see The NLTSS Message System Interface) that contained control information for message communication – either sends or receives. Such communication, both locally within the system and across a network was all the kernel of the system supported directly for user processes. The "message system" (supporting the one call and the network protocols) and drivers for the disks and processor composed the entire kernel of the system.
Mid-level architecture
NLTSS is a capability-based security client–server system. The two primary servers are the file server and the process server. The file server was a process privileged to be trusted by the drivers for local storage (disk storage,) and the process server was a process privileged to be trusted by the processor driver (software that switched time sharing control between processes in the "alternator", handled interrupts for processes besides the "communicate" call, provided access to memory and process state for the process server, etc.).
NLTSS was a true network operating system in that its resource requests could come from local processes or remote processes anywhere on the network and the servers didn't distinguish them. A server's only means to make such distinctions would be by network address and they had no reason to make such distinctions. All requests to the servers appeared as network requests.
Communication between processes in NLTSS by convention used the Livermore Interactive Network Communication System (LINCS) protocol suite, which defined a protocol stack along the lines of that defined by the OSI reference model. The transport level protocol for NLTSS and LINCS was named Delta-T. At the presentation level, LINCS defined standards for communicating numbered parameters as tokens (e.g., integers, capabilities, etc.) that were stored in a session level record for processing in a remote procedure call sort of mechanism.
The notion of a "user" was only rather peripherally defined in NLTSS
|
https://en.wikipedia.org/wiki/Hobankyo
|
The , commonly abbreviated as , and known in English as the Council for Protection of Copyright of Television Program of Japan is an organization representing Japan-based television networks, motion picture producers, Japanese anime manufacturers, screenwriters and record companies. Hōbankyō enforces intellectual property laws in areas both within and outside Japan for their clients. In cooperation with other domestic and international law enforcement agencies around the world, Hōbankyō cracks down on organizations that illegally distribute Japanese entertainment content protected by Hōbankyō.
For-sale and rental items outside Japan come under Hōbankyō. To legally sell items protected by Hōbankyō, stores must obtain licenses from Hōbankyō. For video rental items, Hōbankyō issues a holographic decal that is placed on the item.
Other names referencing Hōbankyō include Hōsō Bangumi Kyōkai.
Legal proceedings
F-Shrine (2005)
According to Article 30 of Japan's Copyright Act, a person is allowed to record and distribute television content for personal use, as long as the content is used domestically (i.e. within Japan). It is referred to as or "private duplication" (equivalent to the fair use doctrine in the U.S.). The recordings can then be sent to family and friends for their personal use. However, F-Shrine tried to create a business model based on shiteki-fukusei, and the practice was eventually deemed illegal in Tokyo District Court.
F-Shrine claimed that their activities fell under shiteki-fukusei, in that the user owned the equipment, he paid for the TV feeds, and he did all the programming himself. F-Shrine just provided the facilities. Even though a "hand and foot" transaction (the user physically walking over to the facility and obtaining the video) wasn't done in this scenario, the process should still be deemed legal. And, the actual video content was not sold or rented. Hōbankyō, however, claimed that these users must also be physically living in Japan in order for shiteki-fukusei to take effect.
J Network (2009)
Two employees of Bangkok-based company J Network Service were arrested on charges of violating Japan's copyright law. Both defendants live in Japan, and used servers in several dozen locations throughout Japan to transmit broadcast TV out to customers via the Internet for a fee. Fuji Television notified the authorities in June 2008 about the subscription business, and later reported two violations of copyright to the authorities in February 2009 for transmitting the day-time talk show Gokigenyo through J Network.
Members
Below is an incomplete list of members.
TBS
NHK
TV Asahi
Fuji Television (Fuji TV)
TV Tokyo
See also
Japanese copyright law
References
External links
Japan Writers' Guild (Japanese)
Law of Japan
Copyright law organizations
|
https://en.wikipedia.org/wiki/Chain%20of%20trust
|
In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificate. It is intended to ensure that only trusted software and hardware can be used while still retaining flexibility.
Introduction
A chain of trust is designed to allow multiple users to create and use the software on the system, which would be more difficult if all the keys were stored directly in hardware. It starts with hardware that will only boot from software that is digitally signed. The signing authority will only sign boot programs that enforce security, such as only running programs that are themselves signed, or only allowing signed code to have access to certain features of the machine. This process may continue for several layers.
This process results in a chain of trust. The final software can be trusted to have certain properties because if it had been illegally modified its signature would be invalid, and the previous software would not have executed it. The previous software can be trusted, because it, in turn, would not have been loaded if its signature had been invalid. The trustworthiness of each layer is guaranteed by the one before, back to the trust anchor.
It would be possible to have the hardware check the suitability (signature) for every single piece of software. However, this would not produce the flexibility that a "chain" provides. In a chain, any given link can be replaced with a different version to provide different properties, without having to go all the way back to the trust anchor. This use of multiple layers is an application of a general technique to improve scalability and is analogous to the use of multiple certificates in a certificate chain.
Computer security
In computer security, digital certificates are verified using a chain of trust. The trust anchor for the digital certificate is the root certificate authority (CA).
The certificate hierarchy is a structure of certificates that allows individuals to verify the validity of a certificate's issuer. Certificates are issued and signed by certificates that reside higher in the certificate hierarchy, so the validity and trustworthiness of a given certificate is determined by the corresponding validity of the certificate that signed it.
The chain of trust of a certificate chain is an ordered list of certificates, containing an end-user subscriber certificate and intermediate certificates (that represents the intermediate CA), that enables the receiver to verify that the sender and all intermediate certificates are trustworthy. This process is best described in the page Intermediate certificate authority. See also X.509 certificate chains for a description of these concepts in a widely used standard for digital certificates.
See also
Root of trust
Web of trust
Data security
Trusted computing
Public-key cryptography
|
https://en.wikipedia.org/wiki/TV4%20%28Swedish%20TV%20channel%29
|
TV4 (TV fyra) is a Swedish free-to-air television network owned by TV4 AB, a subsidiary of the TV4 Media AB. It started broadcasting by satellite in 1990 and, since 1992, on terrestrial television. In 1994, TV4 became the largest channel and remained so for a number of years. The two channels of Sveriges Television (SVT) lost more and more viewers for a couple of years. After making schedule changes in 2001, SVT1 had practically the same numbers of viewers as TV4. From 2004 to 2019, the TV4 Group was a fully active member of the European Broadcasting Union.
History
In the spring of 1984, Ingemar Leijonborg and Gunnar Bergvall worked out a business plan for a Swedish commercial TV channel. The plan included a financing calculation for such a channel. It turned out that the project was financially justifiable and they resigned from their jobs, Leijonborg from SVT and Bergvall from Bonnier. In the fall of 1985, the investment company Proventus put up SEK 2.5 million as initial project financing. They acquired an office for their newly started company called Nordisk Television AB on Birger Jarlsgatan and a secretary. But a year later, Proventus' interest had cooled and Leijonborg/Bergvall had to find new financiers. In 1987 they brought in new investors, Providentia (the Wallenberg sphere), formerly Föreningsbanken, SPP and the book publisher Natur & Kultur were prepared to invest ten million kroner. A TV school was started to be able to train TV producers and scriptors . People were recruited, mainly from SVT, for example Lars Weiss, Jan Scherman, Bengt Magnusson and Jan Zachrisson.
The goal was to make an innovative and hipper version of SVT with a heavy newsroom and self-produced series and which would simultaneously become Sweden's largest TV channel. When all the plans were to begin to be realized, a property was rented in Storängsbotten , which was converted into a TV station.
On September 15, 1990, broadcasts began over the then Tele-X satellite. The premiere broadcast had technical problems. The first edition of Nyheterna lured viewers away from the channel. The next day Expressen wrote in its front cover "Lägg ned TV4 – om det inte blir bättre!" (Shut down TV4 - if it doesn't get better!) on its promissory note. That slip sat in many employees' rooms in the early days as a spur to improve. The self-produced drama series Destination Nordsjön and Rosenholm received merciless criticism.
In 1991, two of the channel's oldest entertainment programmes premiered: the Swedish version of Jeopardy! and the Saturday night bingo show Bingolotto. Bingolotto in particular became highly popular.
In the fall of 1991, the government was to award a license to an advertising-financed TV channel to broadcast terrestrially. 30 applications were received, of which 20 were filled in on a form that Expressen had published. The two main competitors were TV4 (Nordisk Television) and Rix TV/M3 (Kinnevik). In order to obtain the concession, there were requirements
|
https://en.wikipedia.org/wiki/Sharp%20PC-5000
|
The Sharp PC-5000 was a pioneering laptop computer, announced by Sharp Corporation of Japan in November 1983. It employed a clamshell design in which the display closes over the keyboard, like the earlier GRiD Compass and contemporary Gavilan SC.
The PC-5000 was largely IBM PC-compatible, with the same 4.77-MHz Intel 8088 processor as the IBM PC, and ran MS-DOS 2.0 (in ROM). It had 128 kilobytes of internal memory (it was one of the few computers to use bubble memory), which could be expanded by the use of plug-in cartridges. The cartridge slots also accepted ROM cartridges containing software, such as the Extended BASIC programming language and the EasyPac software suite, which contained the EasyWrite II word processor, EasyReport reports program, and EasyComm terminal software for use with the internal modem. It featured a 640×80-pixel (80-character by 8-line) LCD display, a full-travel keyboard, and an external dual 5.25-inch floppy disk drive. A notable feature of the computer was its built-in thermal printer, which could also be purchased separately and attached to the machine. It is perhaps due to this attachment that the case design of the PC-5000 owes much to that of electronic typewriters of its time.
While far more portable than the popular Compaq Portable or Osborne 1 computers, the machine weighed 5 kg (11 lb).
Sharp succeeded the PC-5000 with the fully IBM-compatible PC-7000 in late 1985.
Reception
Your Computer magazine selected the PC-5000 as one of the best personal computers of 1983. Creative Computing chose the PC-5000 as the best notebook portable between $1,000 and $2,500 for 1984, although criticizing the difficulty of finding the computer in stores and questionable support from Sharp and third-party vendors.
References
External links
Article about the PC-5000
Review of the PC-5000 from 1984
Vintage-computer page about the PC-5000
Old-computers page about the PC-5000
PC-5000
Computer-related introductions in 1983
Japanese inventions
|
https://en.wikipedia.org/wiki/Epson%20HX-20
|
The Epson HX-20 (also known as the HC-20) was the first "true" laptop computer. It was invented in July 1980 by Yukio Yokozawa, who worked for Suwa Seikosha, a branch of Japanese company Seiko (now Seiko Epson), receiving a patent for the invention. It was announced in 1981 as the HC-20 in Japan, and was introduced by Epson in North America as the HX-20 at the 1981 COMDEX computer show in Las Vegas, where it drew significant attention for its portability. It had a mass-market release in July 1982, as the HC-20 in Japan and as the Epson HX-20 in North America. The size of an A4 notebook and weighing 1.6 kg, it was hailed by BusinessWeek magazine as the "fourth revolution in personal computing".
Features
Epson advertised the HX-20 with a photograph and photo editing of the computer on two facing magazine pages with the headline "Actual size". With about the footprint of an A4 size page, the Epson HX-20 features a full-transit keyboard, rechargeable nickel-cadmium batteries, a built-in 120 × 32-pixel LCD which allowed 4 lines of 20 characters, a calculator-size dot-matrix printer, the EPSON BASIC programming language, two CPUs at which is essentially an enhanced Motorola 6801, RAM expandable to , two RS-232 ports at a maximum of for the first 8-pin DIN connector intended for modem or serial printer with the second port capable of using a 5-pin DIN connector which was mainly for use with external floppy drive and video display an early concept of docking station, a acoustic coupler was available, built-in microcassette drive, barcode reader connector. Uses a proprietary operating system, which consists of the EPSON BASIC interpreter and a monitor program, and weighs approximately . Known colours of the machine are silver and cream, while some prototypes were dark grey. The HX-20 was supplied with a grey or brown carry case. An external acoustic coupler, the CX-20, was available for the HX-20, as was an external floppy disk drive, the TF-20, and an external speech synthesis Augmentative Communication Device (ACD), 'RealVoice'. Another extension was the serially connected character video. It used a special protocol, EPSP, which was also used by the external floppy disk drive.
The battery life of the HX-20 was approximately running BASIC and less using the microcassette, printer or RS-232. Data integrity could be preserved in the range. The power supply was rated for . Operating and charging it would tolerate . Data integrity could be preserved at . The HX-20 could be stored between .
The later, more popular TRS-80 Model 100 line, designed by Kyocera, owed much to the design of the HX-20.
Reception
BYTE in September 1983 wrote that the HX-20, available in the United States for about a year, had been unsuccessful because of the lack of software or accessories. The review noted that Epson had included the formerly microcassette drive in the standard configuration, as well as bundling a simple word processor. BYTE praised the printer as "no
|
https://en.wikipedia.org/wiki/MUTV
|
MUTV may refer to:
Marquette University Television, an American student channel featuring student programming
MUTV (Manchester United F.C.), a British subscription based television channel, operated by Manchester United F.C.
|
https://en.wikipedia.org/wiki/Stabilizer%20code
|
The theory of quantum error correction plays a prominent role in the practical realization and engineering of
quantum computing and quantum communication devices. The first quantum
error-correcting codes are strikingly similar to classical block codes in their
operation and performance. Quantum error-correcting codes restore a noisy,
decohered quantum state to a pure quantum state. A
stabilizer quantum error-correcting code appends ancilla qubits
to qubits that we want to protect. A unitary encoding circuit rotates the
global state into a subspace of a larger Hilbert space. This highly entangled,
encoded state corrects for local noisy errors. A quantum error-correcting code makes quantum computation
and quantum communication practical by providing a way for a sender and
receiver to simulate a noiseless qubit channel given a noisy qubit channel
whose noise conforms to a particular error model.
The stabilizer theory of quantum error correction allows one to import some
classical binary or quaternary codes for use as a quantum code. However, when importing the
classical code, it must satisfy the dual-containing (or self-orthogonality)
constraint. Researchers have found many examples of classical codes satisfying
this constraint, but most classical codes do not. Nevertheless, it is still useful to import classical codes in this way (though, see how the entanglement-assisted stabilizer formalism overcomes this difficulty).
Mathematical background
The stabilizer formalism exploits elements of
the Pauli group in formulating quantum error-correcting codes. The set
consists of the Pauli operators:
The above operators act on a single qubit – a state represented by a vector in a two-dimensional
Hilbert space. Operators in have eigenvalues and either commute
or anti-commute. The set consists of -fold tensor products of
Pauli operators:
Elements of act on a quantum register of qubits. We
occasionally omit tensor product symbols in what follows so that
The -fold Pauli group
plays an important role for both the encoding circuit and the
error-correction procedure of a quantum stabilizer code over qubits.
Definition
Let us define an stabilizer quantum error-correcting
code to encode logical qubits into physical qubits. The rate of such a
code is . Its stabilizer is an abelian subgroup of the
-fold Pauli group .
does not contain the operator . The simultaneous
-eigenspace of the operators constitutes the codespace. The
codespace has dimension so that we can encode qubits into it. The
stabilizer has a minimal representation in terms of
independent generators
The generators are
independent in the sense that none of them is a product of any other two (up
to a global phase). The operators function in the same
way as a parity check matrix does for a classical linear block code.
Stabilizer error-correction conditions
One of the fundamental notions in quantum error correction theory is that it
suffices to correct a discrete error set wi
|
https://en.wikipedia.org/wiki/Live%20Clipboard
|
Live Clipboard is an extensible data format and set of UI technologies used to support copy/paste operations between web applications in browsers, and between web and desktop applications. Unlike the typical copy/paste experience in browsers, the Live Clipboard mechanism never needs to display a security dialog to the end user, thus delivering a more streamlined user experience.
Live Clipboard is licensed under the Creative Commons Attribution-ShareAlike License (version 2.5). As of late 2009, the updated specification, Javascript files and sample code can be found here:
DHTML technical introduction
The Live Clipboard DHTML provides copy/paste functionality for data associated with a web page using the Live Clipboard XML data format. It consists of the following components:
UI elements for displaying the Live Clipboard icon
Javascript objects representing the Live Clipboard object model
Javascript that handles serialization and de-serialization of the Live Clipboard XML data
Javascript callback function registration for retrieving data for copy and pushing data for paste.
It is designed to use standard Javascript and CSS techniques to “bring the clipboard to the web” and to work in as many browsers as possible. Currently, it is verified to work in IE 8 and in Mozilla Firefox 3.5.2. The control does not depend on installation of any client-side applications or browser plug-ins, and it never gains access to the contents of the clipboard without explicit user action.
How it works
The control positions a transparent (opacity = 0) input element in a containing div element with a background .png image of the clipboard icon. When the user gives focus to the input by left- or right-clicking it, tabbing etc. the control script gets the data that should be copied by calling the OnGetLiveClipboardData function. This callback function is implemented by the page developer and returns an instance of LiveClipboardClass containing the data that should be copied to the clipboard. Next, the control script serializes this data to the Live Clipboard XML format, which it sets as the value of the input element and selects.
At this point, if the user issues a "copy" command via the context menu, browser edit menu, command etc., the selected contents of the input are put on the clipboard. Alternately, if the user issues a "paste" command, the value of the input is replaced with the current data on the clipboard. In this case, the control script detects that the input value has changed, de-serializes the value from Live Clipboard XML format to an instance of LiveClipboardClass, and passes the object to the OnHandleLiveClipboardData function.
The paste callback function is implemented by the page developer and responds to the pasted data as desired. Specifically, it might iterate through the present data formats, apply data in any recognized format(s) to the page, make an asynchronous call to the web server to persist state, set up a new feed subscription, e
|
https://en.wikipedia.org/wiki/Lightweight%20software%20test%20automation
|
Lightweight software test automation is the process of creating and using relatively short and simple computer programs, called lightweight test harnesses, designed to test a software system. Lightweight test automation harnesses are not tied to a particular programming language but are most often implemented with the Java, Perl, Visual Basic .NET, and C# programming languages. Lightweight test automation harnesses are generally four pages of source code or less, and are generally written in four hours or less. Lightweight test automation is often associated with Agile software development methodology.
The three major alternatives to the use of lightweight software test automation are commercial test automation frameworks, Open Source test automation frameworks, and heavyweight test automation. The primary disadvantage of lightweight test automation is manageability. Because lightweight automation is relatively quick and easy to implement, a test effort can be overwhelmed with harness programs, test case data files, test result files, and so on. However, lightweight test automation has significant advantages. Compared with commercial frameworks, lightweight automation is less expensive in initial cost and is more flexible. Compared with Open Source frameworks, lightweight automation is more stable because there are fewer updates and external dependencies. Compared with heavyweight test automation, lightweight automation is quicker to implement and modify. Lightweight test automation is generally used to complement, not replace these alternative approaches.
Lightweight test automation is most useful for regression testing, where the intention is to verify that new source code added to the system under test has not created any new software failures. Lightweight test automation may be used for other areas of software testing such as performance testing, stress testing, load testing, security testing, code coverage analysis, mutation testing, and so on. The most widely published proponent of the use of lightweight software test automation is Dr. James D. McCaffrey.
References
Definition and characteristics of lightweight software test automation in: McCaffrey, James D., ".NET Test Automation Recipes", Apress Publishing, 2006. .
Discussion of lightweight test automation versus manual testing in: Patton, Ron, "Software Testing, 2nd ed.", Sams Publishing, 2006. .
An example of lightweight software test automation for .NET applications: "Lightweight UI Test Automation with .NET", MSDN Magazine, January 2005 (Vol. 20, No. 1). See http://msdn2.microsoft.com/en-us/magazine/cc163864.aspx.
A demonstration of lightweight software test automation applied to stress testing: "Stress Testing", MSDN Magazine, May 2006 (Vol. 21, No. 6). See http://msdn2.microsoft.com/en-us/magazine/cc163613.aspx.
A discussion of lightweight software test automation for performance testing: "Web App Diagnostics: Lightweight Automated Performance Analysis", asp.netPRO Magazine,
|
https://en.wikipedia.org/wiki/MIT-SHM
|
The MIT Shared Memory Extension or MIT-SHM or XShm is an X Window System extension for exchange of image data between client and server using shared memory (usually ). The mechanism only works when both pieces are on the same computer.
The basic capability provided is that of shared memory XImages. This is essentially a version of the ximage interface where the actual image data is stored in a SysV shared memory segment, and thus need not be transferred across the socket to the X server. For large images, use of this facility can result in some real performance increases.
Additionally, some implementations provide shared memory pixmaps. These are two-dimensional arrays of pixels in a format specified by the X server, where the image data is stored in the shared memory segment. Through use of shared memory pixmaps, it is possible to change the contents of these pixmaps without using any Xlib routines at all. Shared memory pixmaps can only be supported when the X server can use regular virtual memory for pixmap data; if the pixmaps are stored in the on-board memory of graphics hardware, an application will not be able to share them with the server.
In the 1.15 release of the X.org server the MIT-SHM extension gains two additional requests: 'X_ShmAttachFd' and 'X_ShmCreateSegment', to be able to pass shared memory through file descriptors from client to server and from server to client, reducing the number of copy operations further.
References
External links
MIT-SHM(The MIT Shared Memory Extension)
shm.xml - the XCB protocol specification for the MIT-SHM extension
X Window extensions
|
https://en.wikipedia.org/wiki/Be%20Together%20%28TM%20Network%20song%29
|
"Be Together" is a song from Japanese band TM Network released in 11 November 1987. It was written by Mitsuko Komuro and composed by Tetsuya Komuro, it was included in their fifth album Humansystem. Despite the fact that it wasn't released as a single and was not popular at its initial release, the 1999 cover made by Ami Suzuki the song became very popular in Japan, and it has since been covered by several artists.
Scandinavian artist Ni-Ni created a cover of "Be Together", which was included in the video game Dance Dance Revolution 5th Mix, and is also featured on her album Mermaid among her most popular songs. In 2010 it was also covered by voice actor and singer Minori Chihara for the anime series Occult Academy.
Ami Suzuki version
"Be Together" was released as the seventh single by J-pop singer Ami Suzuki, on July 14, 1999. It was produced by Tetsuya Komuro (formerly of TM Network, who had originally released the song). The song was used in TV commercials of Mos Burger, and it became one of the most popular songs of 1999 in Japan.
Information
This is Suzuki's first cover recording, curiously of her mentor Tetsuya Komuro's group of the 80's TM Network. The single was released in two formats: maxi single and vinyl. The maxi included original and instrumental version the song, a live-like version, and also a b-side titled "Night Sky". It became her first number one single on the Oricon charts and became the 17th best selling single of 1999.
Following her blacklisting from the music industry in September 2000, production and distribution of the single stopped in its entirety.
In 2008 the song was re-arranged by Yasutaka Nakata, and since then when Suzuki performs live this version is used, though it hasn't been officially released.
Track listing
Personnel
Ami Suzuki – vocals
Production
Producer – Tetsuya Komuro
Charts
Oricon Sales Chart (Japan)
References
1999 singles
1999 songs
Ami Suzuki songs
Oricon Weekly number-one singles
Songs written by Tetsuya Komuro
Sony Music Entertainment Japan singles
|
https://en.wikipedia.org/wiki/A10%20%E2%80%93%20new%20European%20architecture
|
A10 new European architecture was an architectural magazine published in Amsterdam that relied on a network of correspondents throughout Europe. The magazine ran from 2004 to 2016. It often highlighted young practices and emphasized the establishment of connections between the various European nations.
History and profile
A10 – new European architecture was founded in 2004 by architecture critic Hans Ibelings and graphic designer Arjan Groot. The first issue appeared in November 2004. The magazine was published by Boom publishers Amsterdam BV on a bimonthly basis. It had its headquarters in Amsterdam. One of the editors-in-chief was Indira van 't Klooster.
References
External links
2004 establishments in the Netherlands
2016 disestablishments in the Netherlands
Architecture magazines
Bi-monthly magazines published in the Netherlands
Defunct magazines published in the Netherlands
Dutch-language magazines
Magazines established in 2004
Magazines disestablished in 2016
Magazines published in Amsterdam
|
https://en.wikipedia.org/wiki/Banner%20%28Unix%29
|
The banner program on Unix and Unix-like operating systems outputs a large ASCII art version of the text that is supplied to it as its program arguments. One use of the command is to create highly visible separator pages for print jobs.
Operation
Each argument is truncated at 10 characters and printed on a "line" of its own. To print multiple words on a single line, they must therefore be passed as a single argument, which is done from the shell by escaping or quoting the words as appropriate.
A related and more flexible program is FIGlet, which can display text in different fonts and orientations.
Implementation
The way that the program is implemented internally is antiquated. The character fonts used are hardwired into the program code itself, as statically initialized data structures. Two data structures are used. The first is a data table comprising a sequence of printing instructions that encode the bitmap for each character (in an encoding specific to the banner program). The second is an index into that table that indicates, for each character code, where the printing instructions for that character begin and end.
Both data structures were hand-written. Spinellis observes that it is "difficult to come up with a more error-prone and unmaintainable data format". He observes a stark contrast between the source code of the banner program and automatically generated source code for encoding computer fonts into program data (using the 6-by-10 font data in the source code of the mac68k port of NetBSD for comparison). The automatically generated data are commented, documenting with ASCII art how the bit patterns were derived. The automatically generated data were generated from a bitmap file, itself generated using a bitmap creation/editing program with a graphical user interface. And the automatically generated data are organized in a straightforward and obvious manner — a fixed-length sequence of unencoded bytes for each glyph.
Spinellis further observes that in modern computer systems it is seldom sensible to embed such data into the program executable image itself, the performance gains of doing so being negligible. Doing so makes it difficult to adapt the program to different locales, or to maintain the program. The more preferred approach in modern systems is to store such data in a separate data file, distinct from the program executable image file, or in a resource fork of the program, that the program reads at run-time.
Versions
A partial list of versions:
By AT&T, in UNIX System V.
By Cedar Solutions. Runs on modern Linux systems as of 2008. Prints horizontally only with a fixed size.
By Mary Ann Horton at the University of California Berkeley, distributed as part of the bsdmainutils package, under the name . Runs on modern Linux, GNU Hurd, and Mac OS X systems as of 2008. Prints vertically with variable size font.
Example output
From the terminal-oriented banner program:
$ banner 'Hello!'
# #
|
https://en.wikipedia.org/wiki/Daniel%20J.%20Sandin
|
Daniel J. Sandin (born 1942) is an American video and computer graphics artist, designer and researcher. He is a Professor Emeritus of the School of Art & Design at University of Illinois at Chicago, and co-director of the Electronic Visualization Laboratory (EVL) at the University of Illinois at Chicago. He is an internationally recognized pioneer in computer graphics, electronic art and visualization.
Biography
Dan Sandin received his B.A. in Natural Sciences from Shimer College in 1964 and his M.S. in Physics from the University of Wisconsin–Madison in 1967. He became interested in video in 1967, while helping to organize student demonstrations at the University of Illinois. In 1969, he joined as a teacher at the University of Illinois at Chicago (UIC), in order to bring technology into the arts program. This was shortly after his presentation of "Glowflow", a computer controlled light and sound system, created with Myron Krueger, Jerry Erdman, and Richard Venezky. By 1972, Thomas A. DeFanti joined UIC and together with Sandin they founded the Circle Graphics Habitat, now known as the Electronic Visualization Laboratory (EVL).
In 2018 Sandin's work, the Sandin Image Processor and the Sayre Glove, was included in the Chicago New Media 1973-1992 exhibition, curated by jonCates. He also gave a demonstration of Particle Dreams in Spherical Harmonics in the CAVE 2 system, and was part of the symposium both of which were connected to the exhibition as a series of events.
His major achievements were working on a series of projects including: Glowflow (1969), Sandin Image Processor (IP) (1971–1973), Sayre Glove (1977), PHSColograms (1988), CAVE (1992) and ImmersaDesk and Infinity Wall.
Awards
Dan Sandin received several awards including: the Guggenheim Fellowships awarded for video and sound in 1978, the National Endowment for the Arts (NEA) for video art (with Stevenson Palfi) in 1981, the Rockefeller Foundation's Video Fellowship in 1981, the Inventor of the Year award from the University of Illinois in 2000, and the Rockefeller Foundation's Film, Video and Multimedia Fellowship in 2002 for "Looking for Water 2," a virtual-reality, 3-D installation.
Work
Dan Sandin has said that his career has three main objectives:
the design of electronic instruments and computer programs for visual performance and personal growth;
the development of educational facilities and programs related to the use of electronic screens; and
the production and exhibition of computer processed visual works for personal expressive reasons.
Sandin Image Processor
From 1971 to 1973, he designed the Sandin Image Processor, a patch programmable analog computer for real-time manipulation of video inputs through the control of the grey level information. His friend and neighbor Phil Morton helped with the early schematic plans diagram which they shared in a manual called the Distribution Religion. Sandin demoed his Image Processor in a recorded live video “5 Minute Romp
|
https://en.wikipedia.org/wiki/IPSA
|
IPSA or Ipsa may refer to:
Organizations
I. P. Sharp Associates, a Canadian company, creator of the IPSANET computer network
Independent Parliamentary Standards Authority, a public body in the United Kingdom
Institut polytechnique des sciences avancées, a French private aerospace engineering grande école
International Political Science Association, a UNESCO scholarly association
International Professional Surrogates Association, a non-profit organization dedicated to advancing sexual surrogate therapy
Publications
International Political Science Abstracts, an academic journal, published on behalf of the International Political Science Association
People
Kristijan Ipša (born 1986), Croatian footballer of Slovenian heritage
Other uses
Ipsa, a genus of sea snails
Índice de Precio Selectivo de Acciones, a Chilean Stock Index
Intimate partner sexual assault, a variant term for spousal rape
See also
International Public Sector Accounting Standards (IPSAS), a set of accounting standards
|
https://en.wikipedia.org/wiki/Barton%20H.%20Watson
|
Barton Harry Watson (October 18, 1960 – November 24, 2004) was the founder of CyberNET Engineering. He committed suicide after the company was raided by the FBI for mail fraud, unveiling nearly US$100 million in debt.
Biography
Watson was the son of Geraldine Watson (née Johnson) and Gerald Watson, a well-respected local merchant. Bart, as he was known as a schoolboy, grew up in Belding, Michigan, a suburb of Grand Rapids. Barton attended Belding High School, graduating as valedictorian in 1978. He enrolled at the University of Michigan in Ann Arbor in the fall of 1978. While in Ann Arbor, Watson also volunteered at an ambulance company. He dropped out after only one semester and returned to Belding to help his mother run a local automobile service station.
Washington, D.C.
Following the divorce of his parents and as a result of financial pressures, Watson and his mother Geraldine moved to the Washington, D.C. area in 1981, residing for a short time in an apartment in Alexandria, Virginia, and later moving to another apartment in Washington near Glover-Archbold Park. Through the use of a fraudulent résumé, Watson obtained employment as a junior account executive at the I Street branch of E. F. Hutton. Watson's boss and mentor was the notorious Perry Bacon, who figured prominently in the E. F. Hutton check-kiting scandal of the early 1980s.
Watson soon managed accounts worth over a million dollars. However, once it emerged that he had embezzled more than $700,000 in funds from nine clients, E. F. Hutton fired him in January 1985. The National Association of Securities Dealers subsequently banned him from the securities industry for life. He went on the lam, but was caught and arrested in San Francisco five months later. In May, 1987 Watson pleaded guilty to mail fraud and was sentenced by Judge Gerhard A. Gesell to one to three years in federal prison.
CyberNET Engineering
Upon his release from prison after more than two years, Watson returned to Belding and lived with his father for six months, working as a server at a Red Lobster restaurant in Grand Rapids.
Afterward, he moved to Grand Rapids where he worked as a sales clerk at a large computer store. By 1990 he had met John Straayer, and together they founded a company called WS Services, a "value added reseller" of computer systems. The business took off, and they changed the company's name to CyberNET Engineering.
After meeting his future wife, Krista Kotlarz, in 1991, Watson's relationship with John Straayer deteriorated. It bottomed out in 1992 when Straayer discovered Watson was keeping two sets of books. By his estimate, Watson had embezzled over $300,000 from company accounts for personal use. He sued Watson, and subsequently found out that Watson had hidden his 1987 fraud case. Watson responded with a countersuit, saying that Straayer had been the one embezzling funds. Finally. in 1993, Watson and Straayer agreed to dissolve the partnership in a settlement. However, Watson kept t
|
https://en.wikipedia.org/wiki/DECO%20Cassette%20System
|
The DECO Cassette System is an arcade system that was introduced by Data East in October 1980. It was the first standardised arcade system that allowed arcade owners to change games. Developed in 1979, it was released in Japan in 1980 and then North America in 1981.
The arcade owner would buy a base cabinet, while the games were stored on standard audio cassette tapes. The arcade owner would insert the cassette and a key module into the cabinet. When the machine was powered on, the program from the tape would be copied into the cabinet's RAM chips; this process took about two to three minutes. Afterwards, the game could be played freely until the machine was powered off.
Game list
In bold characters are the video games that were also released in dedicated arcade cabinets.
01: Highway Chase (also known as Mad Alien)
02: Sengoku Ninja Tai (also known as Ninja)
03: Manhattan
04: Terranean
05: Missile Sprinter
06: Nebula
07: Astro Fantasia
08: The Tower
09: Super Astro Fighter
10: Ocean to Ocean
11: Lock 'n' Chase
12: The DECO Kid (also known as Flash Boy)
13: Tournament Pro Golf (also known as Pro Golf or 18 Hole Pro Golf)
14: DS Telejan
15: Lucky Poker
16: Treasure Island
17: Bobitto
18: Explorer
19: Disco No. 1 (also known as Sweet Heart)
20: Tornado
21: Mission-X
22: Pro Tennis
23: 18 Challenge Pro Golf
24: Tsumego Kaisyou
25: Angler Dangler (also known as Fishing)
26: BurgerTime (also known as Hamburger)
27: Bump 'n' Jump (also known as Burnin' Rubber)
28: Cluster Buster (also known as Graplop)
29: Rootin' Tootin' (also known as La-Pa-Pa)
30: Skater
31: Pro Bowling
32: Night Star
33: Pro Soccer
34: Super Doubles Tennis
35: Bumpoline (also known as Flying Ball)
36: Genesis (also known as Boomer Rang'r)
37: Zeroize
38: Scrum Try
39: Peter Pepper's Ice Cream Factory
40: Fighting Ice Hockey
41: Oozumou - The Grand Sumo
42: Hellow Gateball
43: Kamikaze Cabbie (also known as Yellow Cab)
44: Boulder Dash
UX-7: Tokyo MIE Shinryoujo (Tokyo MIE Clinic)
UX-8: Tokyo MIE Shinryoujo 2 (Tokyo MIE Clinic 2)
UX-9: Geinoujin Shikaku Shiken
??: Burmazon
Reception
In Japan, the Game Machine list of highest-grossing arcade video games of 1981 listed Pro Golf at number three and Tele-Jan at number thirteen. On the list of highest-grossing arcade video games of 1982, Burnin' Rubber (Bump 'n' Jump) was number nine, BurgerTime (Hamburger) was number eleven, and Pro Tennis was number fifteen. Game Machine later listed Pro Soccer as the top-grossing new table arcade cabinet in September 1983, and Scrum Try topped the table arcade game chart in April 1984.
Legacy
It was the first interchangeable arcade system board, developed in 1979 before it was released in 1980. It inspired Sega's Convert-a-Game system, which released in 1981. Later interchangeable arcade systems followed from other companies, such as the Nintendo VS. System in 1984.
The DECO Cassette System was revolutionary for its time; but Data East discontinued
|
https://en.wikipedia.org/wiki/Ski%20Amad%C3%A9
|
The Ski Amadé region of Austria is a network of 28 ski areas and towns that combined, make up the second largest ski area in Europe. It is named after the composer Wolfgang Amadeus Mozart who was born in the city of Salzburg.
Background
The resorts are linked by buses. There are 860 km of downhill slopes and 278 modern ski lifts, the highest lift being at the Dachstein Glacier with an altitude of 2,700 m. There are over 700 km of marked cross country Nordic skiing tracks.
Five Regions
The resorts are made up of 28 villages across five principal regions that make up the alliance. The five regions are Salzburger Sportwelt, Dachstein Tauern, Gastein Valley, Hochkönig Ski Area, and Grossarl Valley.
Geography
The ski region stretches from the south-east of Salzburg to the upper Styrian Ennstal, including the impressive mountain ranges of Steinernes Meer, Hochkönig, Dachstein and Tauernkamm.
Being in the Eastern Alps, thus being colder than the Western Alps the region has a good record of snowfall during the winter months.
Interesting facts
The resorts of Schladming/Planai, Reiteralm, Flachau and Zauchensee all have runs which are used for the annual Alpine Skiing World Cup circuit.
Hermann Maier who has won four overall World Cup titles, two Olympic gold medals, three World Championship titles and 53 races in the Alpine Skiing World Cup circuit is from the Austrian Three Valleys area of Alpendorf, Wagrain and Flachau. With 53 champion races he is only second in place to being defined as the world's greatest skier; in front of him is Ingemar Stenmark from Sweden who has 86 victories.
Scenes from the classic film The Sound of Music were filmed around the Salzburger Sportwelt region of the alliance. One scene in particular, where Julie Andrews is singing as she walks along a grassy verge was filmed near the resort of Alpendorf.
The Gastein Valley resorts of Bad Gastein and Bad Hofgastein are highly renowned for their thermal baths as well as for their extensive skiing areas, and are supplemented by the mountains of Graukogel and Sportgastein offering more opportunities for intermediate and advanced skiers and freeriders. The ski lifts of the third town in the valley - Dorfgastein - are linked to the Grossarl Valley.
References
External links
Salzburger Sportwelt region
Ski areas in Austria
|
https://en.wikipedia.org/wiki/Transport%20in%20Tianjin
|
Transport in Tianjin consists of an extensive network of roads and railways and a major airport. Bicycle is a major means of transport in daily use of the city.
Rail
There are several railway stations in the city, Tianjin railway station being the principal one. It was built in 1888, initially, the station was located at Wangdaozhuang (). The station was later moved to Laolongtou () on the banks of the Hai He River in 1892, so the station was renamed Laolongtou Railway Station. The station was rebuilt from scratch in 1988. The rebuilding work began on April 15, 1987 and was finished on October 1, 1988. The Tianjin Railway Station is also locally called the 'East Station', due to its geographical position.
Tianjin West railway station and Tianjin North railway station are also major railway stations in Tianjin. There is also Tanggu railway station is located in the important port area of Tanggu District, and TEDA railway station located in TEDA, to the north of Tanggu. There are several other railway stations in the city.
Construction on a Beijing-Tianjin high-speed rail began on July 4, 2005, and was scheduled to be completed in 2007.
The following rail lines go through Tianjin:
Jinghu Railway, from Beijing to Shanghai
Jingha Railway, from Beijing to Harbin
Jingqin Railway, from Beijing to Qinhuangdao, Hebei
Jinpu Railway, from Tianjin to Pukou District, Nanjing
Jinji Railway, from Tianjin urban area to Ji County, Tianjin
Jinba Railway, from Tianjin to Bazhou, Hebei
Roads and expressways
Some spots in Tianjin, including roads and bridges, have names from Dr. Sun Yat-Sen's Three Principles of the People (for example, Minquan Gate on Zhonghuan Road). Names harkening back to the era of the Republic of China on the mainland also appear (e.g. Beiyang Road). Many roads in Tianjin are named after a Chinese province or city. Also, Tianjin is unlike Beijing, in that very few roads run parallel to the major four compass directions.
Tianjin has three ring roads. Unlike Beijing, the Inner and Middle Ring Roads are not closed, traffic-controlled roadways and some often have traffic light intersections. The Outer Ring Road is the closest thing to a highway-level ring road, although traffic is often chaotic and sometimes more than chaotic.
Inner Ring Road (neihuan)
Middle Ring Road (zhonghuan)
Outer Ring Road (waihuan)
Tianjin's roads often finish in dao (道 avenue), xian (S: 线 / T: 線 line, more used for highways and through routes) and lu (路 road). Jie (街 street) is rare. As Tianjin's roads are rarely in a cardinal compass direction, jing (S: 经 / T: 經) roads and wei (S: 纬 / T: 緯) roads often appear, which attempt to run more directly north-south and east-west, respectively.
The following seven expressways of China run in or through Tianjin:
Jingjintang Expressway, from Beijing, through Tianjin's urban area, to Tanggu District / TEDA
Jinghu Expressway, from Jinjing Gonglu Bridge to Shanghai (together with Jingjintang Expressway, this is th
|
https://en.wikipedia.org/wiki/Xenic%20acid
|
Xenic acid is a proposed noble gas compound with the chemical formula H2XeO4 or XeO2(OH)2. It has not been isolated, and the published characterization data are ambiguous.
Salts of xenic acid are called xenates, containing the anion, such as monosodium xenate. They tend to disproportionate into xenon gas and perxenates:
2 + 2 → + Xe + + 2
The energy given off is sufficient to form ozone from diatomic oxygen:
3 (g) → 2 (g)
Salts containing the deprotonated anion are presently unknown.
References
Further reading
Xenon(VI) compounds
Mineral acids
Oxoacids
|
https://en.wikipedia.org/wiki/The%20Game%20%282006%20TV%20series%29
|
The Game is an American television series created by Mara Brock Akil. A spin-off of UPN's Girlfriends, the series premiered on its successor network The CW on October 1, 2006.
The series was canceled in May 2009 after three seasons. Viacom's BET Networks would strike a deal with CBS Corporation to develop new episodes of the series, relocating taping of the show from Los Angeles to Atlanta, and announcing its renewal at the April 2010 upfronts. New seasons began airing on BET starting January 11, 2011, with the fourth season premiere drawing 7.7 million viewers, making it the most watched sitcom premiere in cable television history. The show would air for six seasons on BET, being renewed for its final two in 2014, and concluding its run on August 5, 2015.
In May 2021, a revival of the series was ordered by Paramount+ with Robinson and Chanchez returning. The revival series premiered on November 11, 2021, and was renewed for a second season in February 2022. On June 23, 2023, it was announced that the series was canceled after two seasons.<ref>{{cite web|last=Swift|first=Andy|url=https://tvline.com/lists/paramount-cancels-4-series-including-grease-the-game-and-star-trek-prodigy/|title=Paramount+ Cancels 4 Series, Including Grease, The Game and Star Trek: Prodigy|website=TVLine|date=June 23, 2023|access-date=June 23, 2023}}</ref> On June 26, 2023, The Game was removed from Paramount+.
Premise
For the first five seasons, The Game was centered around Joan Clayton's first cousin, Melanie Barnett (Tia Mowry), who was first introduced in the 2006 Girlfriends episode of the same name. Melanie is a first-year medical school student who has given up an offer of admission to Johns Hopkins University School of Medicine in Baltimore to follow her boyfriend, Derwin Davis (Pooch Hall), to San Diego, against the advice of her parents. Derwin is a first-year rookie American football player with a fictional "San Diego Sabers" team. As Melanie settles into her new life, she meets Tasha Mack (Wendy Raquel Robinson), the mother of Sabers' starting quarterback Malik Wright (Hosea Chanchez), and Kelly Pitts (Brittany Daniel), the then-wife of Sabers' captain Jason Pitts (Coby Bell), who warn her to keep a close eye on her boyfriend because of the numerous "gold diggers" who approach the professional American football players. As Melanie learns to balance her new roles as both med student and the partner of a professional American football player, the series focuses on the evolving relationships between the players and their significant others.
Episodes
Cast
Main cast
Hosea Chanchez as Malik Wright – Malik Wright is the San Diego Sabers superstar quarterback and the son of Tasha Mack. Arrogant and cocky, Malik initially begins the series as an immature womanizer. He falls in love with actress Robin Givens and convinces her to marry him as a publicity stunt. In the beginning, he lived with his mom but eventually gets his own place for the purpose of being able to
|
https://en.wikipedia.org/wiki/Telecommunications%20in%20Transnistria
|
Despite many economic and social difficulties, Communications in Transnistria is well developed, including a CDMA2000 1xRTT network for mobile phones.
Numbers
Telephones - main lines in use:
150,000 land lines (est., 2006) (Two operators: JSC Interdnestrcom, Trans-Tele-Com)
Telephones - mobile cellular:
140,000 (est., 2006) (About 71% belong to JSC Interdnestrcom, a CDMA operator. The rest are GSM)
Telephone system:
Digital infrastructure, privatization of all services
Radio broadcast stations:
AM 5, FM 6, shortwave N/A (2006)
Television broadcast stations:
3 (2 covering all of Transnistria, 1 municipal for Tiraspol and Bender)
Internet Service Providers (ISPs):
2 (2005)
See also
Media in Transnistria
References
Transnistria
Mass media in Transnistria
Transnistria
|
https://en.wikipedia.org/wiki/Life%27s%20Little%20Miracles
|
Life's Little Miracles (or Little Miracles) follows the stories of children at Toronto's Hospital for Sick Children. It originally aired on Canadian broadcasters Slice Network and CBC Television.
References
External links
Life's Little Miracles on Slice Network's website
Little Miracles on CBC's website
Little Miracles on co-producer Breakthrough Entertainment's website
Little Miracles on IMDb
1990s Canadian reality television series
CBC Television original programming
Slice (TV channel) original programming
Television series by Alliance Atlantis
|
https://en.wikipedia.org/wiki/1958%E2%80%9359%20United%20States%20network%20television%20schedule
|
The following is the 1958–59 network television schedule for the four major English language commercial broadcast networks in the United States. The schedule covers primetime hours from September 1958 through March 1959. The schedule is followed by a list per network of returning series, new series, and series cancelled after the 1957–58 season.
According to television historians Castleman and Podrazik (1982), the networks' schedules were thrown "into complete chaos" by the quiz show scandals that erupted during fall 1958. At first only one series, Dotto, was implicated in the game-fixing charges. Ed Hilgemeier, a contestant on the program, filed a complaint with the show's sponsor, Colgate-Palmolive. Colgate withdrew its sponsorship of the Tuesday evening (on NBC) and daytime (on CBS) versions of Dotto, and the show did not appear on either network's fall 1958 schedule.
The $64,000 Challenge (on CBS) similarly did not appear that fall, and by November, The $64,000 Question (CBS) and Twenty-One (NBC) were also removed from the network schedules, amidst accusations of game rigging. NBC's primetime Tic-Tac-Dough lasted through December. According to Castleman and Podrazik, "NBC and CBS were adamant in their own statements of innocence" since they only aired, and did not produce, the rigged series. They also claimed the cancellations were due to low ratings, not because of game-fixing accusations. ABC had few game shows on its 1958–59 schedule, and "eagerly pointed out" its innocence in the quiz show mess. The network affirmed its commitment to Westerns, which could not be rigged.
Western TV series continued to be very popular with audiences, and for the first time, the three highest-rated programs on television, CBS's Gunsmoke and, Have Gun – Will Travel alongside NBC's Wagon Train were all Westerns. ABC's new series, The Rifleman even hit #4, quite a feat for a network which had had no series in the top 30 five years earlier.
Although ABC, CBS, and NBC remained the largest television networks in the United States, they were not the only companies operating television networks during this era. In May 1958, Ely Landau, president of the NTA Film Network, announced an NTA Film Network schedule for the 1958–59 season. The schedule consisted of three and a half hours of programs on Friday nights: Man Without a Gun at 7:30, followed by This is Alice at 8:00, then How to Marry a Millionaire at 8:30, and Premiere Performance, a package of films from the network's minority shareholder 20th Century Fox, from 9:00 to 11:00. Although the NTA Film Network had over 100 affiliate stations, only 17 agreed to air the Friday night schedule "in pattern" (during the scheduled time). Other NTA Network affiliates carried the network's programs whenever they had available slots, and outside of Gun, Alice, Millionaire and Performance, NTA's programs were aired whenever the local stations preferred. National Educational Television (NET), the predecessor to PBS founded
|
https://en.wikipedia.org/wiki/The%20Last%20Word%20%28game%20show%29
|
The Last Word is a game show seen in syndication in the United States and on the Global Television Network in Canada that was produced by Merrill Heatter Productions and ran for 65 episodes from September 18 to December 15, 1989, with reruns continuing until January 5, 1990. The host was Wink Martindale, and the co-host/announcer was Jennifer Lyall. It was taped in Vancouver, British Columbia. In the Los Angeles-produced pilot, Burton Richardson was the announcer, and Jana White operated the computer and acted as co-host. The show was distributed by Turner Program Services.
Gameplay
Two teams consisting of a celebrity and a civilian contestant competed to guess group words that had something in common in order to win cash and prizes. The civilians received all winnings credited to their teams. Among the celebrities who appeared include Jill Whelan, Ted Lange, Susan Ruttan, and Gordon Jump.
Main game
A puzzle consisting of three rows of blanks was displayed, representing three related words, and one letter of each word was filled in at the outset. The player in control pressed a button to stop a randomizer that flashed around the board. If it stopped on an empty space, that letter was filled in and the player could either try to guess the word or pass control to the opponent. When a player guessed, the remaining letters were revealed one at a time, starting from the leftmost, until either they had all been revealed (indicating a correct guess) or a letter came up that differed from the guess. However, the final letter of any word remained hidden on an incorrect guess.
A correct guess awarded the option to either guess another word or pass, while an incorrect guess gave control to the opponent. If the randomizer stopped on a letter that had already been filled in, the player had to choose one unrevealed letter in any word to be filled in and the opponent took control.
The player who solved the last word won the puzzle, regardless of who solved the first two, and received prizes for the team based on the number of words he/she had solved in that puzzle. The first team to win two puzzles won the match and advanced to the bonus round. Only one person played for each team at any given moment; the first two puzzles were played by one celebrity and the opposing civilian, and the third (if necessary) was played by both civilians.
If time ran out in the middle of a puzzle, all the words were revealed and a new puzzle was played at the start of the next episode.
Bonus round: The 60 Second Challenge
The winning team had 60 seconds to solve 10 puzzles. For each puzzle, two one-word clues were given and the letters of a third word were revealed one at a time until only one letter remained. Multiple guesses were allowed from either member. The team won a $100 gift certificate for each correct answer, and solving all 10 won a prize package which had a new prize added to it for each attempt in which it was not won; the largest jackpot awarded during the sho
|
https://en.wikipedia.org/wiki/School%20of%20Electrical%20Engineering%20and%20Computer%20Science%20%28University%20of%20Ottawa%29
|
The School of Electrical Engineering and Computer Science, is an academic unit within The Faculty of Engineering, at the University of Ottawa. Until 2011 it was called the School of Information Technology and Engineering (SITE), which remains the name of a building on the southern edge of campus.
It was formed in 1997 by the merger of the Department of Computer Science and of the Department of Electrical and Computer Engineering.
It teaches undergraduate programs in Electrical Engineering, Software Engineering, Computer Engineering and Computer Science, and offers education up to the PhD level.
External links
EECS website in English and French
University of Ottawa
Electrical engineering departments
Electrical and computer engineering departments
1997 establishments in Ontario
Educational institutions established in 1997
Computer science departments in Canada
|
https://en.wikipedia.org/wiki/The%20Journeyman%20Project%203%3A%20Legacy%20of%20Time
|
The Journeyman Project 3: Legacy of Time is a computer game developed by Presto Studios and is a sequel to The Journeyman Project and The Journeyman Project 2: Buried in Time.
This final installment uses a 360° pre-rendered 3D CGI interaction system, similar to QuickTime VR. It featured impressive production values common for the series. It was also one of the first games to also be released on DVD-ROM. It was re-released in 1999 with the Windows versions of The Journeyman Project—Turbo! and Buried in Time as part of a "Trilogy" box set.
Story
Despite Agent 5's success in the previous games, time travel technology is deemed unsafe and the TSA is forced to close down. However, Agent 3, the culprit from Buried in Time causes a temporal rip and Gage Blackwood must travel back in time to find her, and discovers that aliens had destroyed three ancient Earth civilizations. After finding Agent 3, he learns that a mysterious alien fleet has appeared in Symbiotry space and is heading towards Earth, looking for an ancient alien relic known as the Legacy of Time. Joining once again with his AI buddy Arthur, he must track down the pieces of the Legacy in the mythical cities of Atlantis, Shangri La, and El Dorado.
Development
The Journeyman Project 3 was developed by a team of 25 people.
The live action characters were all cast from the Screen Actors Guild. Nearly a month was spent on rehearsing and filming the live action footage and voice acting.
Release
Unlike the other games of the Journeyman Project franchise (which were previously published by Sanctuary Woods), Legacy of Time was published by Red Orb Entertainment in 1998.
The game was released on February 12, 1998 at an estimated price of $49.
Demo
In October 1997, the Legacy of Time demo for Mac and Windows was released with Riven, also published by Red Orb Entertainment. It featured the Potter and Olive Oil Vendor's shop in Atlantis, with the objective to create a Golden Medallion which will help the player enter an Atlantean temple in the full game. Once the objective is reached the demo ends. The trailer is also included and states the game would be released in December 1997, but the game was not released until February 1998.
Versions
In February 1998, Legacy of Time shipped on four CD-ROMs for both Mac and Windows, but later was released on one DVD-ROM which had separate Mac and Windows versions. The Macintosh DVD version was released in May 1998, being one of the first DVD-ROM games for the Mac platform (in fact, it was bundled with Macintosh PowerBooks that had a DVD drive, the disc could be seen during the introduction of the PowerBook G3 Wallstreet). The Mac version used the same graphics as the CD-ROM version due to the enhanced graphics intended for the DVD version being not ready in time. Later that year on September 2, the Windows DVD version was released and included the enhanced graphics and movies, as well as MPEG-2 trailers of both Legacy of Time and Riven. Solutions exist
|
https://en.wikipedia.org/wiki/Aircrack-ng
|
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. Packages are released for Linux and Windows.
Aircrack-ng is a fork of the original Aircrack project. It can be found as a preinstalled tool in many security-focused Linux distributions such as Kali Linux or Parrot Security OS, which share common attributes as they are developed under the same project (Debian).
Development
Aircrack was originally developed by French security researcher Christophe Devine, its main goal was to recover 802.11 wireless networks WEP keys using an implementation of the Fluhrer, Mantin and Shamir (FMS) attack alongside the ones shared by a hacker named KoreK.
Aircrack was forked by Thomas D'Otreppe in February 2006 and released as Aircrack-ng (Aircrack Next Generation).
Wi-Fi security history
WEP
Wired Equivalent Privacy was the first security algorithm to be released, with the intention of providing data confidentiality comparable to that of a traditional wired network. It was introduced in 1997 as part of the IEEE 802.11 technical standard and based on the RC4 cipher and the CRC-32 checksum algorithm for integrity.
Due to U.S. restrictions on the export of cryptographic algorithms, WEP was effectively limited to 64-bit encryption. Of this, 40 bits were allocated to the key and 24 bits to the initialization vector (IV), to form the RC4 key. After the restrictions were lifted, versions of WEP with a stronger encryption were released with 128 bits: 104 bits for the key size and 24 bits for the initialization vector, known as WEP2.
The initialization vector works as a seed, which is prepended to the key. Via the key-scheduling algorithm (KSA), the seed is used to initialize the RC4 cipher's state. The output of RC4's pseudo random generation algorithm (PRGA) follows a XOR operation in combination with the plaintext, and produces the ciphertext.
The IV is constrained to 24 bits, which means that its maximum values are 16,777,216 (224), regardless of the key size. Since the IV values will eventually be reused and collide (given enough packets and time), WEP is vulnerable to statistical attacks. William Arbaugh notes that a 50% chance of a collision exists after 4823 packets.
In 2003, the Wi-Fi Alliance announced that WEP had been superseded by Wi-Fi Protected Access (WPA). In 2004, with the ratification of the full 802.11i standard (i.e. WPA2), the IEEE declared that both WEP and WEP2 have been deprecated.
WPA
Wi-Fi Protected Access (WPA) was designed to be implemented through firmware updates rather than requiring dedicated hardware. While still using RC4 at its core, it introduced significant improvements over its predecessor. WPA included two modes: WPA-PSK (WPA Personal) and WPA Enterprise.
WPA-PSK (Wi-Fi P
|
https://en.wikipedia.org/wiki/Non-interference%20%28security%29
|
Noninterference is a strict multilevel security policy model, first described by Goguen and Meseguer in 1982, and amplified further in 1984.
Introduction
In simple terms, a computer is modeled as a machine with inputs and outputs. Inputs and outputs are classified as either low (low sensitivity, not highly classified) or high (sensitive, not to be viewed by uncleared individuals). A computer has the noninterference property if and only if any sequence of low inputs will produce the same low outputs, regardless of what the high level inputs are.
That is, if a low (uncleared) user is working on the machine, it will respond in exactly the same manner (on the low outputs) whether or not a high (cleared) user is working with sensitive data. The low user will not be able to acquire any information about the activities (if any) of the high user.
Formal expression
Let be a memory configuration, and let and be the projection of the memory to the low and high parts, respectively. Let be the function that compares the low parts of the memory configurations, i.e., iff . Let be the execution of the program starting with memory configuration and terminating with the memory configuration .
The definition of noninterference for a deterministic program is the following:
Limitations
Strictness
This is a very strict policy, in that a computer system with covert channels may comply with, say, the Bell–LaPadula model, but will not comply with noninterference. The reverse could be true (under reasonable conditions, being that the system should have labelled files, etc.) except for the "No classified information at startup" exceptions noted below. However, noninterference has been shown to be stronger than nondeducibility.
This strictness comes with a price. It is very difficult to make a computer system with this property. There may be only one or two commercially available products that have been verified to comply with this policy, and these would essentially be as simple as switches and one-way information filters (although these could be arranged to provide useful behaviour).
No classified information at startup
If the computer has (at time = 0) any high (i.e., classified) information within it, or low users create high information subsequent to time=0 (so-called "write-up", which is allowed by many computer security policies), then the computer can legally leak all that high information to the low user, and can still be said to comply with the noninterference policy. The low user will not be able to learn anything about high user activities, but can learn about any high information that was created through means other than the actions of high users. (von Oheimb 2004)
Computer systems that comply with the Bell–LaPadula Model do not suffer from this problem since they explicitly forbid "read-up". Consequently, a computer system that complies with noninterference will not necessarily comply with the Bell–LaPadula Model. Thus, the Bell–LaPadu
|
https://en.wikipedia.org/wiki/Jellabies
|
Jellabies (also known as Jellikins or The Jellies) is a British children's animated television series that first aired on the UK television network (GMTV). from 18 May 1998 until 2003. It was also shown in Germany, (Super RTL), U.S. (Fox Family Channel, now Freeform), The Netherlands (Kindernet), France (TF! Jeunesse), and Australia ABC Kids The target audience is for children ages two to six.
It was one of the first fully CGI-animated series in the world.
Format
The program was conceived and developed in Worcestershire, UK by Jonny Lewis, a 3d artist/animator and Optical Image Ltd, a small TV/video editing house, using CGI animation. The show was narrated by Rik Mayall. The Jellabies are jelly-made children that live in the Jolly Jelly World, which is the magical land at the end of the rainbow, where their first job is to make rainbows. (for which they have a machine called the Jelliscope, a computer/teleporter/rainbow generator that is constantly monitoring weather conditions around the world) Although each Jellaby has its own vehicle to drive around in, their main use of travelling long distances around Jelly Land is on the "Jelly Train", a train that only consists of a cab (without any actual locomotive) and one passenger car. The show premiered in 1998 and ended in 2003.
Jellabies are also known as Jellikins in certain parts of the world, including the United Kingdom. This version is exactly the same as the Jellabies in every way, except the characters' heads were changed to look like gummy bears. However, Duffy the dragon remained the same. This version aired on GMTV in the United Kingdom until 2004.
History
Jonny Lewis designed and created the characters and developed the pilot episode with his brother Mikel Lewis, using 3D Studio Max software. It was loosely based on Jelly Babies candies. In the early months, before funding, Jonny Lewis lived in a dusty basement in Malvern so he could afford to develop the show on his home PC. The pilot led to the series being commissioned by GMTV and then in many other countries around the world. It was the first British fully 3D computer-animated series to make it on to television.
Optical Image sealed sponsorship from Basset's. Other animators who made significant input were Meena Kamurai Pai, Andrew Lindsay, Richard Smart, Andy Day, Ian Friend, Harjit Birdi, making each episode with only five days to complete each one in order to meet the schedule.
Music written and composed by Dave Lowe and Vo Fletcher.
Characters and voice cast
Each of the six Jellabies represent the colours of the rainbow.
Main
Narrator (Rik Mayall)
Strum: Lives at the train station, is purple, is the first Jellaby, and is the musical Jellaby who plays the saxophone.
Bouncey: The second Jellaby who lives in a bumper car, and is yellow, the same colour as lemons and the sun.
Denny: The third Jellaby who lives in a boat on the Jelly Lake, and is blue, the same colour as the sky and the world's oceans.
Pepper: The four
|
https://en.wikipedia.org/wiki/Bloomberg%20Radio
|
Bloomberg Radio is a radio service of Bloomberg L.P. that provides global business news programming 24 hours a day. The format is general and financial news, offering local, national and international news reports along with financial market updates and interviews with corporate executives, economists and industry analysts. On off hours, local stations may preempt with local sports play-by-play coverage such as college basketball, tennis and other sports coverage.
Bloomberg Radio is broadcast on radio stations around the United States, and directly operates five radio stations:
WBBR 1130 AM in New York City.
WRCA 1330 AM in Watertown-Boston and WNBP 1450 AM Newburyport-Boston along with two FM translators at 106.1 MHz.
KNEW 960 AM in Oakland-San Francisco, along with the HD Radio digital subchannel on 103.7 KOSF-HD2.
WDCH-FM 99.1 FM in Bowie, Maryland, serving Washington, D.C., and Baltimore.
In 1992, Bloomberg purchased the first of these, WBBR 1130 AM in New York (at the time using the call sign WNEW), for $13.5 million. Bloomberg took over the operation of WXKS (1200 AM) in Newton, Massachusetts, (serving Boston) on March 1, 2013. The following year, Bloomberg began programming KNEW on September 29, 2014. Both stations are owned and operated by iHeartMedia, Inc., but are programmed by Bloomberg Radio under a local marketing agreement (LMA). On December 21, 2015, Bloomberg Radio launched a similar arrangement on CBS Radio-owned WNEW-FM, its first FM radio station. The call letters of WNEW-FM were later changed to WDCH-FM and the station is now owned by Entercom. On July 4, 2017, Bloomberg moved its programming in Boston to WRCA, owned by Beasley Media Group. Later that year, it fully acquired WNBP 1450 AM in Newburyport to serve as a simulcast of WRCA. Both WRCA and WNBP operate translator stations on 106.1 FM. Its LMA with WXKS expired on March 1, 2018. Bloomberg Radio is also heard nationally on Sirius XM satellite radio channel 119. Select programming is also broadcast in London UK on DAB digital radio via the London 3 multiplex (VHF block 11B), with simulcasts of the Bloomberg TV audio at other times.
Programming
The original Bloomberg Radio news format divided each hour of the day into three 20-minute segments, each of which contained stock market updates, business headlines, traffic, weather, local news/sports, a human interest piece or a general update about cultural happenings. However, by 2010, Bloomberg Radio had shifted from a headline service to a discussion-based format in order to offer more in-depth market and economic analysis. Bloomberg Radio is the world's only global business radio service. Bloomberg Daybreak Asia broadcasts live from New York and Hong Kong, Sunday through Thursday 6:00 p.m. to 10:00 p.m. ET (morning drive time in Asian time zones.) It is then followed by Bloomberg Daybreak Europe, originating from London, on Monday to Friday 1:00 a.m. to 5:00 a.m. ET (morning drive time GMT). Finally, Bloomberg Daybr
|
https://en.wikipedia.org/wiki/Recursive%20grammar
|
In computer science, a grammar is informally called a recursive grammar if it contains production rules that are recursive, meaning that expanding a non-terminal according to these rules can eventually lead to a string that includes the same non-terminal again. Otherwise it is called a non-recursive grammar.
For example, a grammar for a context-free language is left recursive if there exists a non-terminal symbol A that can be put through the production rules to produce a string with A (as the leftmost symbol).
All types of grammars in the Chomsky hierarchy can be recursive and it is recursion that allows the production of infinite sets of words.
Properties
A non-recursive grammar can produce only a finite language; and each finite language can be produced by a non-recursive grammar.
For example, a straight-line grammar produces just a single word.
A recursive context-free grammar that contains no useless rules necessarily produces an infinite language. This property forms the basis for an algorithm that can test efficiently whether a context-free grammar produces a finite or infinite language.
References
Formal languages
|
https://en.wikipedia.org/wiki/CKST
|
CKST (1040 AM) was a radio station in Vancouver, British Columbia, Canada. Owned by Bell Media, it last broadcast comedy-oriented programming, including stand-up comedy routines.
CKST's studios were located on Robson and Burrard Street in Downtown Vancouver, while its transmitters were located in Delta.
History
CKST went on the air for the first time on January 19, 1963, in Langley as CJJC, broadcasting on its original frequency of 850 AM with 1000 watts of power and offering a country format. The station's original owner was City & Country Radio Ltd., headed by former CJAV and CKNW personality Joe Chesney.
CJJC was given approval by the CRTC on December 15, 1970, to change its frequency and transmission power from 850 AM and 1000 watts to 800 AM and 10,000 watts, but the station waited until June 1975 to put the change into effect. In 1977, CJJC (which had been dealing with financial trouble for some time) rehired 23 of 32 staff members who were given 30 days notice on New Year's Eve. Parent company City & Country Radio was authorized to transfer all of the station's shares to a company run by Joe Chesney and Ernie Mykyte; Mykyte would become sole owner of CJJC in 1978 when he bought out Chesney's half-interest in the station.
CJJC and parent City & Country Radio were purchased on June 26, 1985 (following CRTC approval) by an ownership consortium of Saskatoon Telecable Ltd. (72%), Sam Folstad (18%) and L.M. McDonald (10%); later in the year, CJJC changed its call letters to CJUP and dropped its country format for Top 40 with Up Radio, AM 800 as its on-air name. In 1987, CJUP majority shareholder Saskatoon Telecable was purchased by Clint Forster and his family, and the station changed call letters again to the present CKST in 1988. On July 7, 1989, CKST increased its power to 25,000 watts and began broadcasting in stereo.
CKST switched formats to modern rock and adopted the on-air name Coast 800 on November 9, 1990. The station underwent major changes during the early part of 1992; on January 30, the CRTC authorized station owner Western World Communications (the former Saskatoon Telecable) to buy Vancouver station CIMA (which had begun operations on September 12, 1986, as CIOF, then CKXY, then CIMA) from Monarch Broadcasting Ltd., also granting permission to CKST to switch frequencies (from 800 to 1040), increase transmission power (from 25,000 watts to 50,000), relocate its transmitter from Aldergrove to Delta and move its operations from Langley to Vancouver. CIMA 1040 signed off for the final time on February 4, and CKST moved into CIMA's facilities and became Coast 1040 on March 9.
Plans were made to move CKST to the FM band (at 94.5 FM with 38,000 watts of power) in 1993, but were denied by the CRTC. CKST ended its modern rock format at midnight on September 30, relaunching with an adult standards format under the new on-air name Q104 (which was later dropped in favour of using the CKST calls). The station was purchased by Ronald Dix
|
https://en.wikipedia.org/wiki/GTAP
|
GTAP (the Global Trade Analysis Project) is a global network of researchers (mostly from universities, international organizations, and economic and climate/resource ministries of governments) who conduct quantitative analysis of international economic policy issues, including trade policy, climate policy, and globalization linkages to inequality and employment. The consortium produces a consistent global economic database (the GTAP Data Base) which is widely used in the research community to study prospective international economic policy around these issues.
While the consortium includes a large number of international organizations, GTAP itself is coordinated by the Center for Global Trade Analysis, located at Purdue University.
GTAP consortium and data base
Founded by Thomas Hertel in 1992, the project grew out of the Australian IMPACT and SALTER modelling projects, and was heavily influenced by Alan Powell. It is currently directed by Dominique van der Mensbrugghe. A central element of GTAP is a large-scale database that is updated periodically by the consortium members, under coordination of the Center for Global Trade Analysis. The data are important, core structural inputs to a broad range of global economic policy models and related applications: studies of climate change and resource use (including studies feeding into the IPCC process); regional economic integration; and the effects of globalization. For this reason, the consortium membership (those contributing to the database) includes prominent global governance and policy research institutions like the World Bank, European Commission, World Trade Organization, International Monetary Fund, the Massachusetts Institute of Technology Joint Program on the Science and Policy of Global Change, United Nations Conference on Trade and Development, and the Organisation for Economic Co-operation and Development. There are currently three "Consortium Members At Large" – Joseph Francois, Mark Horridge, and Brian O'Neill, who represent the broader scientific community. The primary database is essentially a multi-year form of a multi-region input output (MRIO) database supplemented by national macroeconomic data, though extensive satellite datasets cover other measures that are linked to the economic flows in the core database, including trade policies, greenhouse gas emissions, energy use, migration flows, and land use patterns. While from its inception the database was closely tied to the computable general equilibrium (CGE) research community, in recent years the database has also been at the center of greenhouse gas emissions accounting exercises, and related assessments of resource use.
Other activities
In addition to the multinational effort needed to update and expand the project database, the Center for Global Trade Analysis also offers courses on practical, model-based economic policy analysis. This includes courses on basic computational modelling and dynamic general equilibrium mo
|
https://en.wikipedia.org/wiki/C%20Bear%20and%20Jamal
|
C Bear and Jamal is an animated musical comedy children's television series that originally aired on the Fox Kids programming block from 1996 to 1997. It centers on an elementary school-aged boy named Jamal and his companion "C Bear", an orange hip-hop teddy bear who raps. Film Roman co-produced the show.
Characters
Jamal Harrison Wingo (Arthur Reggie III) - Jamal is a cheerful, imaginative 9-year-old (later 10-year-old) African-American boy. He always keeps C Bear by his side.
C Bear (Tone Loc) - C Bear is a wise rapping teddy bear with a hip-hop style. He comes to life whenever Jamal is around and is always ready to give him advice. He has the power to take Jamal on magical adventures at the snap of his finger. C Bear sometimes breaks the fourth wall with sarcastic remarks to the audience.
Hawthorne Wingo (George L. Wallace) - Hawthorne is Jamal’s father. He sometimes wonders why Jamal still keeps C Bear. Hawthorne's wife passed away before the events of the series.
Bernice Wingo (Dawnn Lewis) - Bernice is Jamal's grandmother. She is kind hearted and gentle, and is most often seen cooking meals for her family.
Willis Wingo (Darryl Sivad) - Willis is Jamal's grandfather and the husband of Bernice. He is bald and rarely leaves his chair by the television.
Maya (Kim Fields) - Maya is Jamal’s classmate and love interest. She is bold and outspoken, and has a loud voice. She is the smartest of Jamal’s friends, often getting the highest test scores in class.
Big Chill (Aries Spears) - Big Chill is Jamal’s fat friend, who is always hungry and speaks like he has a cold. Upon entering a room, he'll say "the b-i-g c-h-i-double-l is in the hizzouse". Big Chill has been held back in school a few times. Though his exact age is unknown, he is old enough to drive a car and, in one episode, mentions filling out tax forms.
Kwame (Aries Spears) Kwame is Jamal's best friend. He is dressed in African clothes and believes in "power to the people". He has a tendency to label anything and everything as a "conspiracy by 'The Man'”. He is the second smartest of Jamal’s friends.
Chipster (Jeannie Elias) - Chipster is Jamal's Caucasian friend. He is silly and likes to make his friends laugh.
Kim (Margaret Cho) - Kim is Jamal's Asian friend and Maya’s best friend. She is feisty and quick to stand up to anyone who bullies her friends.
Javier (Paul Rodríguez) - Javier is Jamal's Latino friend. He has a wide vocabulary, often using big words that Jamal and his friends barely understand. He is the third smartest in class, achieving the second highest grades after Maya.
Miss Fine - Miss Fine is Jamal’s teacher. She is kind but firm, always pushing her students to do their best.
Sooner - Sooner is the Wingos’ basset hound and C Bear’s rival. Sooner and C Bear often engage in cartoonish chases and fights, which are usually won by C Bear.
Episodes
Series overview
Season 1 (1996)
Season 2 (1996–97)
Credits
Executive Producers: Tone Loc, Phil Roman, Margaret Lo
|
https://en.wikipedia.org/wiki/Man%20vs.%20Beast
|
Man vs. Beast is a series of sensationalistic television specials aired in the United States by the Fox television network in 2003. The shows were produced by Brian Richardson and directed by Bob Levy. They involve a variety of challenges in which people and animals compete against each other. Although the initial special, Man vs. Beast, was panned by critics and animal rights groups, Fox commissioned a sequel, Man vs. Beast 2, which aired on February 20, 2004.
In 2003, ITV commissioned Granada Productions to re-create the American special for British audiences. A six-part series was filmed, hosted by John Fashanu. However, owing to heavy lobbying by animal rights groups, transmission of the series was postponed indefinitely.
Competitions
The competitions included the following matchups:
Professional eater Takeru Kobayashi lost a hot dog eating contest against a Kodiak bear that did not know it was in an eating competition.
Scott Helvenston, a US Navy SEAL, won a race against a chimpanzee through an obstacle course.
A group of 44 dwarfs lost a race against an Asian elephant to see which could pull a McDonnell Douglas DC-10 jet a certain distance first.
Shawn Crawford, a world-class sprinter, won a 100-metre race against a giraffe but lost against a zebra.
A Sumo wrestler lost a tug-of-war against a large, female orangutan.
References
External links
Man vs. Beast, synopsis and scheduled listings at FoxReality.com
2000s American television specials
Fox Broadcasting Company original programming
Sports entertainment
2003 television specials
2003 in American television
|
https://en.wikipedia.org/wiki/Bordeaux%20tramway
|
The Bordeaux tramway network () consists of four lines serving the city of Bordeaux in Nouvelle-Aquitaine in southwestern France. The system has a route length of , serving a total of 133 tram stops.
The first line of Bordeaux's modern tramway opened on 21 December 2003. The system is notable for using the Alstom APS ground-level power supply system in the city centre. It has been operated by Keolis Bordeaux since 1 May 2009.
History
Original tramway
The first public transport service in Bordeaux was a horse-drawn omnibus, introduced in 1830. In 1880, the first horse-drawn tramway was introduced, and eventually 752 horses were used to pull 71 cars. The horse-drawn tramway was limited to the city of Bordeaux and, as a consequence, the first electric tramway was introduced in the neighbouring suburbs in 1890. The city's horse-drawn trams were replaced by electric trams in 1900.
In 1920 the various tramways were unified, allowing expansion of the system. By 1946, the public transportation system in Bordeaux had 38 tram lines with a total length of , carrying 160,000 passengers per day. A rudimentary system of ground-level power supply was used on some stretches with mixed success.
As in other French cities at the time the mayor, Jacques Chaban-Delmas (first elected in 1947), embraced anti-tram arguments and decided to terminate the operation of the tramway. He found the tramway to be old-fashioned compared to the bus and its attachment to set tracks on the ground hindered the increasing flow of cars. In 1958 the last line of tramway was closed.
Without a tramway
By the 1970s the failure of the "all car" transport policy had become obvious, but Chaban was not prepared to backtrack. A grandiose automated underground railway scheme using the Véhicule Automatique Léger (VAL) system was promoted; it even received the backing of a majority of the city's councillors, but fell victim in the end not just to the fierce opposition of the local transport users' association TRANSCUB but to the hard reality of the fine sandy nature of the city's soil. The VAL idea was dropped. Chaban remained.
Bordeaux had to wait until 1995 and the election of Alain Juppé as mayor – as well as the total strangulation of the city by its transport problems – before the situation was tackled. Following two years of studies, the Bordeaux Urban Community adopted the tramway plan in 1997. Recognized by the central government in 2000 as a Public Interest Project, the scheme got under way.
The new tramway - phase 1
Construction of the new tramway started in February 2000, with preliminary works for the tramway. In May 2000 a contract was signed with Alstom for the supply of the tram fleet, and in October the first track was laid. Construction and testing continued through 2001 to 2003, and the first section of the tramway opened on 21 December 2003 in the presence of President Jacques Chirac, and the mayor of Bordeaux, Alain Juppé. The newly open section, known as line A, ra
|
https://en.wikipedia.org/wiki/Johannes%20Kretz
|
Johannes Kretz (born 8 May 1968 in Vienna) is an Austrian composer and teacher for computer music and music theory. He lives and works in Vienna and created various compositions in the fields of new music, among those: music theatre, orchestra works, chamber music, sacred music and works with electronics. He won an Austrian State Prize for music in 2004.
Prizes
Prize of Delz foundation, Switzerland 2001
Theodor Körner Prize 2003
Austrian State Prize 2004
References
External links
Music Information Center Austria
Personal Website of Johannes Kretz
International Cultural Platform
Austrian classical composers
20th-century classical composers
21st-century classical composers
Living people
1968 births
Musicians from Vienna
University of Vienna alumni
Austrian male classical composers
Theodor Körner Prize recipients
20th-century male musicians
21st-century male musicians
|
https://en.wikipedia.org/wiki/Computable%20general%20equilibrium
|
Computable general equilibrium (CGE) models are a class of economic models that use actual economic data to estimate how an economy might react to changes in policy, technology or other external factors. CGE models are also referred to as AGE (applied general equilibrium) models.
Overview
A CGE model consists of equations describing model variables and a database (usually very detailed) consistent with these model equations. The equations tend to be neoclassical in spirit, often assuming cost-minimizing behaviour by producers, average-cost pricing, and household demands based on optimizing behaviour. However, most CGE models conform only loosely to the theoretical general equilibrium paradigm. For example, they may allow for:
non-market clearing, especially for labour (unemployment) or for commodities (inventories)
imperfect competition (e.g., monopoly pricing)
demands not influenced by price (e.g., government demands)
A CGE model database consists of:
tables of transaction values, showing, for example, the value of coal used by the iron industry. Usually the database is presented as an input-output table or as a social accounting matrix (SAM). In either case, it covers the whole economy of a country (or even the whole world), and distinguishes a number of sectors, commodities, primary factors and perhaps types of households. Sectoral coverage ranges from relatively simple representations of capital, labor and intermediates to highly detailed representations of specific sub-sectors (e.g., the electricity sector in GTAP-Power.)
elasticities: dimensionless parameters that capture behavioural response. For example, export demand elasticities specify by how much export volumes might fall if export prices went up. Other elasticities may belong to the constant elasticity of substitution class. Amongst these are Armington elasticities, which show whether products of different countries are close substitutes, and elasticities measuring how easily inputs to production may be substituted for one another. Income elasticity of demand shows how household demands respond to income changes.
CGE models are descended from the input-output models pioneered by Wassily Leontief, but assign a more important role to prices. Thus, where Leontief assumed that, say, a fixed amount of labour was required to produce a ton of iron, a CGE model would normally allow wage levels to (negatively) affect labour demands.
CGE models derive too from the models for planning the economies of poorer countries constructed (usually by a foreign expert) from 1960 onwards. Compared to the Leontief model, development planning models focused more on constraints or shortages—of skilled labour, capital, or foreign exchange.
CGE modelling of richer economies descends from Leif Johansen's 1960 MSG model of Norway, and the static model developed by the Cambridge Growth Project in the UK. Both models were pragmatic in flavour, and traced variables through time. The Australian MONASH mod
|
https://en.wikipedia.org/wiki/RoboCop%20%28American%20TV%20series%29
|
RoboCop is a 1988 superhero animated series based on the 1987 movie RoboCop. The cartoon aired as part of the Marvel Action Universe programming block. The series was animated by AKOM Productions.
The show made a number of changes to the RoboCop universe to make it more appropriate for younger viewers, including replacing bullets with laser weapons and shifting the series to a more science fiction setting. In this series, RoboCop had a red light in the middle of his visor (which occasionally panned the whole visor). It is set in an alternate continuity where events similar to those shown in the movie happened, excluding Clarence Boddicker's death, who shows up in the last episode.
Ownership of the series passed to Disney in 2001 when Disney acquired Fox Kids Worldwide, which also includes Marvel Productions, while Amazon's Metro-Goldwyn-Mayer (under Orion Pictures label) remains as current rights holder of the RoboCop franchise.
Plot
Based on the original movie, the series features cyborg cop Alex Murphy (RoboCop), who fights to save the city of Old Detroit from assorted rogue elements, and on occasion, fighting to reclaim aspects of his humanity and maintain his usefulness in the eyes of the "Old Man", Chairman of Omni Consumer Products. Many episodes see RoboCop's reputation put to the test or soured by interventions from Dr. McNamara, the creator of ED-260, the upgradable version of the Enforcement Droid Series 209 and the top competitor for the financial backing of OCP. He continually develops other mechanical menaces that threaten RoboCop.
In the police force, RoboCop is befriended by Officer Anne Lewis, who is depicted to have romantic inclinations towards him, but is also picked on and lambasted by the prejudiced Lieutenant Roger Hedgecock (who appeared as a minor character in the original film), who is determined to be rid of him and his kind, who he sees as ticking time bomb. Their rivalry comes to a fever pitch during the episode "The Man in the Iron Suit", in which Hedgecock comes close to finally beating Murphy with the aid of a new weapons system developed by McNamara. He almost kills Lewis when she interferes, enraging Murphy into tearing Hedgecock's iron suit apart and nearly crushing his skull before Lewis comes to his aid. RoboCop is maintained by RoboCop Project director Dr. Tyler.
The title sequence features a brief animated variation on Murphy being gunned down by Clarence Boddicker and his gang. Throughout the series, RoboCop struggles to deal with the pain of losing his humanity. Other themes include racism ("The Brotherhood"), prejudice at work ("Man in the Iron Suit"), environmental espionage ("Into the Wilderness"), terrorism, and the Middle East peace process ("A Robot's Revenge").
While this series is based on the original film, there are significant changes to RoboCop and his environment. RoboCop is faster and has a greater range of movement than in the films. The Old Detroit of the series is also considerably m
|
https://en.wikipedia.org/wiki/Joe%20Celko
|
Joe Celko is an American relational database expert from Austin, Texas. He has participated on the ANSI X3H2 Database Standards Committee, and helped write the SQL-89 and SQL-92 standards. He is the author of a Morgan-Kaufmann series of books on SQL, and over 1200 published articles on SQL and other database topics. He had been a full-time statistician for several years.
He is credited with coining the term lasagna code and popularizing Michael J. Kamfonas' nested set model for trees in SQL, a taxonomy of data encoding schemes, and several other design patterns in SQL DDL and DML.
Early life and education
Celko achieved his undergraduate and first master's degrees in math at Georgia State University. He also has a second master's degree in computer science from Georgia Tech.
Career
Celko has a very wide range of industries and applications starting in 1965 with a National Science Fair prize job at the Pittman-Dunn Research labs at the Frankford Arsenal. His public sector consulting work has been for prison systems, medical organizations, NASA and defense contractors. He helped set up programming and Software Engineering standards for the US Army at AIRMICS and wrote regular columns on it in the trade press on Software Engineering.
His commercial consulting work has been varied—auto loans, entertainment, aerospace, education, shipping (freight lines and ocean shipping), petro-chemical, software companies, and odd start-ups.
He has taught training classes in South Africa, Turkey, the UK, Norway, Sweden, Finland, The Netherlands, Brazil, Belgium and Switzerland. He has also created and taught on-line classes for MySQL and SQLUniversity.org. He was part of the founding faculty of Neumont University in Salt Lake City, a for-profit university for software developers.
Bibliography
Joe Celko's Analytics and OLAP in SQL (Morgan-Kaufmann, 2006)
Joe Celko's Data and Databases (Morgan Kaufmann, 1999)
Joe Celko's SQL for Smarties (5th Edition, Morgan-Kaufmann, 2014)
Joe Celko's SQL Programming Style (Morgan-Kaufmann, 2005)
Joe Celko's SQL Puzzles and Answers (2nd edition, Morgan-Kaufmann 2006)
Joe Celko's Trees and Hierarchies in SQL for Smarties, 2nd Edition (Morgan-Kaufmann, 2012)
Joe Celko’s Thinking in Sets: Auxiliary, Temporal, and Virtual Tables in SQL. (Morgan-Kaufmann, 2008)
Joe Celko’s Data, Measurements and Standards in SQL (Morgan-Kaufmann, 2010)
Joe Celko's Complete Guide to NoSQL (Morgan-Kaufmann, 2014)
References
External links
Personal Bio
Technical writers
American software engineers
Living people
Georgia State University alumni
Georgia Tech alumni
Year of birth missing (living people)
|
https://en.wikipedia.org/wiki/Misha%20Glenny
|
Michael V. E. "Misha" Glenny (born 25 April 1958) is a British journalist and broadcaster, specialising in southeast Europe, global organised crime, and cybersecurity. He is multilingual. He is also the writer and producer of the BBC Radio 4 series, How to Invent a Country.
Early life
Glenny was born in Kensington, London, the son of Juliet Mary Crum and Michael Glenny, a Russian studies academic. Glenny described his ancestry as "three-quarters Anglo-Celtic and a quarter Jewish".
Education
He was educated at Magdalen College School in Oxford and studied at the University of Bristol and Prague's Charles University before becoming Central Europe correspondent for The Guardian and later the BBC. He specialised in reporting on the Yugoslav Wars in the early 1990s that followed the breakup of Yugoslavia. While at the BBC, Glenny won Sony special award in 1993's Radio Academy Awards for his "outstanding contribution to broadcasting". He has published three books about Central and Eastern Europe.
Career
In McMafia (2008), he wrote that international organised crime could account for 15% of the world's GDP. Glenny advised the US and some European governments on policy issues and for three years ran an NGO helping with the reconstruction of Serbia, Macedonia and Kosovo. Glenny appeared in the documentary film, Raw Opium: Pain, Pleasure, Profits (2011).
Glenny's later books continue an interest in international crime. DarkMarket (2011) concerns cybercrime and the activities of hackers involved in phishing and other activities. Nemesis: One Man and the Battle for Rio (2015) about the leading Brazilian drug trafficker Antônio Francisco Bonfim Lopes (known as "Nem") in Rocinha ("Little farm"), a favela (slum).
From January 2012, Glenny was visiting professor at Columbia University's Harriman Institute, teaching a course on "crime in transition". In an interview in October 2011, he also spoke about his new book, DarkMarket; assessing cybercriminals with Simon Baron-Cohen at Cambridge; the Stuxnet cyberattack which resulted in "gloves off" attention from governments; and other more recent cyberattacks.
Glenny was an executive producer of the BBC One eight-part drama series, McMafia, inspired by his non-fiction book of the same name (2008).
Glenny is a producer and the writer of the BBC Radio 4 series, How to Invent a Country, also made available as a podcast. An audio book of the same name was published by Penguin Random House in January 2021, consisting of the series' first 28 episodes broadcast October 2011–March 2019.
In 2019, Glenny presented a podcast on the life of Vladimir Putin titled Putin: Prisoner of Power.
In 2022, Glenny presented a five-part series, The Scramble for Rare Earths, on BBC Radio 4. In the programmes he says, “In this series I’m finding out why the battle for a small group of metals and critical raw materials is central to rising geopolitical tensions around the world.”
Personal life
Glenny is married to British journalis
|
https://en.wikipedia.org/wiki/Google%20Health
|
Google Health was a project by Google designed as an attempt to create a repository of health records and data (personal health record services) in order to connect doctors, hospitals and pharmacies directly. The project was introduced in 2008 and discontinued in 2012. Google Health was restarted in 2018 but appeared to be discontinued in 2021 and was officially called an "effort" rather than a separate division as of 2022.
History
Google Health (2008–2012)
Google Health was the name given to a 2008–2012 version of a service, which allowed Google users to volunteer their health records—either manually or by logging into their accounts at partnered health services providers—into the Google Health system, thereby merging potentially separate health records into one centralized Google Health profile. Volunteered information could include "health conditions, medications, allergies, and lab results". Once entered, Google Health used the information to provide the user with a merged health record, information on conditions, and possible interactions between drugs, conditions, and allergies. Google Health's API was based on a subset of the Continuity of Care Record.
The original Google Health was under development from mid-2006, under ex-chief health strategist Roni Zeiger. In 2008, the service underwent a two-month pilot test with 1,600 patients of The Cleveland Clinic. Starting on May 20, 2008, Google Health was released to the general public as a service in beta test stage. On September 15, 2010, Google updated Google Health with a new look and feel.
On June 24, 2011, Google announced it was retiring Google Health on January 1, 2012; data was available for download through January 1, 2013. The reason Google gave for abandoning the project was the lack of widespread adoption. In 2012, Roni Zeiger left Google.
Google Health (2018–2021)
Google Health in 2018 was the name given to a team working within Google, rather than a service or application, following a similarly named web service in 2008–2012.
In 2018, during a process codenamed "Tuscany," teams across the company combined into the new Google Health group. This included artificial-intelligence research teams Google Brain and DeepMind, as well as health teams from Nest Labs, the connected-home company Google bought in 2014.
Starting in November 2018, David Feinberg was appointed lead. In 2019, it was announced they wanted more searchable medical records and to "improve the quality of health-focused search results across Google and YouTube". Google Health also appeared to focus on health-related artificial intelligence research, clinical tools, and partnerships for other healthcare tools and services.
Later in 2018, Google reorganized their healthcare efforts, and as a result DeepMind Health became part of Google Health. They began a non disclosed project called Project Nightingale, a partnership with Ascension, a large Catholic health care system in the United States. The project was head
|
https://en.wikipedia.org/wiki/Dynabook%20Satellite
|
The Satellite (including Satellite Pro) is a line of laptop computers designed and manufactured by Dynabook Inc. of Japan, which was formerly until 2016 Toshiba's computer subsidiary. The Satellite Pro is currently positioned between their consumer E series and their business Tecra series of products.
The earliest models in the series, introduced in the early 1990s, were one of the first to directly compete against IBM's ThinkPad line. Models in the Satellite family varied greatly—from entry-level models sold to consumers at major retailers to full-fledged business laptops, with the "Pro" suffix, sold through enterprise channels. In 2016, the Satellite line came to an end when Toshiba existed the personal computer market; Sharp Corporation purchased the subsidiary in 2020 as Dynabook and relaunched the series in 2020.
History
The early models did not come with an internal CD-ROM drive, but these soon appeared as mobile technology progressed. Such models can link up with an external CD-ROM drive through the parallel port on the rear (since USB ports came later as well). Some Satellites also lacked an internal floppy disk drive, but a port on the side allowed the use of a proprietary external module for such. These machines tended to be smaller in physical size than their contemporaries.
A Toshiba Satellite personal computer was used to send the first email ever sent by President Bill Clinton during his presidency. The email was sent using the personal computer of White House Medical Unit Emergency Physician Dr. Robert G. Darling, and was sent to astronaut John Glenn as he was aboard the Space Shuttle Discovery.
Notable models included the Satellite 5005-S507 which was the first to ship with NVIDIA GeForce 4 440 Go GPU and cost . The Satellite 5105-S607 was the first laptop with cPad technology and cost . The Satellite 5205-S703 was the first laptop with built-in DVD-R/RW drive and cost .
Sharp Corporation obtained 80.1% of Toshiba's computer subsidiary in October 2018. In April 2019, Sharp renamed the subsidiary Dynabook Inc. In 2020, Toshiba sold their remaining shares to Sharp. Sharp resurrected the Satellite Pro series that year.
Satellite models
Numeric
The Satellite line was introduced in 1992 with the T1800 and T1850 models, the T1800C and T1850C variants of which were one of the first notebooks with passive-matrix color LCDs. Succeeding entries in the line followed this naming scheme, such as the Satellite T1900, T2110CS and T2130CS. Beginning with the barebones 100CS and 100CT in February 1996, Toshiba began using only numbers to name their Satellites, a convention which continued until 2003 with the introduction of the Satellite A series.
Lettered
Toshiba began using letter prefixes to differentiate its concurrent series of Satellite laptops. These included the A series; the C series; the E series; the L series; the M series; the P series; the R series; the S series; the T series; the U series; and the W series. CNET wrote in 2
|
https://en.wikipedia.org/wiki/European%20route%20E11
|
European route E11 is a road, part of the International E-road network. It begins in Orléans and ends in Béziers, France. It is long, its whole length being in France.
It takes up the entire French autoroutes A71 and A75.
The road uses the highest major road bridge in Europe, and the second highest in the world, the Millau Viaduct, long and high from ground to road. The route also passes (but does not cross) the Viaduc de Garabit, which was built in the 1880s by Gustave Eiffel.
External links
UN Economic Commission for Europe: Overall Map of E-road Network (2007)
11
E011
|
https://en.wikipedia.org/wiki/FITS%20Liberator
|
The ESA/ESO/NASA FITS (Flexible Image Transport System) Liberator is a free software program for processing and editing astronomical science data in the FITS format to reproduce images of the universe. Version 3 and later are standalone programs; earlier versions were plugins for Adobe Photoshop. FITS Liberator is free software released under the BSD-3 license. The engine behind the FITS Liberator is NASA's CFITSIO library.
FITS has been a standard since 1982 and is recognized by the International Astronomical Union (IAU). While not limited solely to image data, archives in the FITS file format include images of stars, nebulae and galaxies produced by space-based and ground-based telescopes from around the world.
Although the first version of the software was a tool used mainly by professional astronomers, efforts have been made to bring high quality astronomical images to the homes of amateur astronomers, educators and students. The FITS Liberator has become the industry standard for professional imaging scientists at the European Space Agency (ESA), the European Southern Observatory (ESO), and NASA. It uses images from the Hubble Space Telescope (HST) and the Very Large Telescope (VLT), among others, to craft beautiful colour astronomical images.
The first and second versions of the FITS Liberator were released in July 2004 and August 2005 respectively, the version, v3.0.1, was released in February 2012.
Version 1
Version 1 of the ESA/ESO/NASA Photoshop FITS Liberator was completed in July 2004 by imaging scientists at the European Space Agency (ESA), the European Southern Observatory (ESO), and NASA. Version 1 allowed all types of FITS images to be opened and also some limited interaction with the images.
Version 2
The preview window
Histogram
Tools
Statistics
Advanced tools for scaling and stretch
The basic workflow is to open a FITS image, study it in the Preview window, adjust the black-and-white levels (6) to give a reasonable contrast and then set the input range for the scaling of the image by clicking the Auto Scaling Button (7). Now, different values of the Scaled Peak level can be tested to scale the image to better fit with one of the possible Stretch functions (8).
Version 2 of the ESA/ESO/NASA Photoshop FITS Liberator image processing software made it both easier and faster to create colour images from raw observations. Updates included:
FITS images with up to 4 billion grey scales can be processed (32 bit support).
FITS images with up to 500 million pixels or more can be processed (100 times larger than standard images from a digital camera).
Re-designed workflow and user interface. The plug-in remembers previous settings.
New options for advanced scaling and stretching.
An entire section of v2.0 was dedicated to metadata input and the user also had access to a text version of the original FITS header.
With the advent of the FITS Liberator v2.0, it became possible for people at home to create spectacular pic
|
https://en.wikipedia.org/wiki/Indianapolis%20500%3A%20The%20Simulation
|
Indianapolis 500: The Simulation is a 1989 computer game for MS-DOS. It was hailed as the first step of differentiating racing games from the arcade realm and into racing simulation. It was developed by the Papyrus Design Group, and distributed by Electronic Arts. An Amiga port was released in 1990.
Indianapolis 500: The Simulation attempts to be a full simulation of the Indianapolis 500 race, with 33 cars and appropriate Indy car "feel". While racing, it only offers a first-person perspective, but the game offers a replay mode as well. Indy 500 offers the ability to realistically set up the car, and any changes made to the car directly affect how it handles.
The field is represented as realistic and the qualifying order stays true to the 1989 Indianapolis 500 starting grid, with one exception: the player's car, numbered 17, replaces Car #29 of Rich Vogler, who qualified in 33rd and last place.
Gameplay
The game offers four race settings:
10-lap race (no damage, no yellow flags)
30-lap race (no damage)
60-lap race
200-lap race
There are also practice and qualifying settings. Practice enables car setups to be altered and tested in real time. Choosing not to participate in the qualifying session results in one starting at the back of the field. The qualifying session requires four laps to be completed, with the mean value of the four lap times determining the qualifying position. No car damage can occur during a Practice session, although other cars may be present on the track and their wreckage remains on the track if the player's car collides with them at any point. Car damage can occur during qualifying sessions.
The cars one can drive are a yellow Penske-Chevrolet, a red Lola-Buick, or a blue March-Cosworth, with the Penske having the fastest default setup (but if one sets the car up well, any of the above racecars can compete effectively). Various settings can be changed during Practice from menus associated with Function keys F3–F10. One's own car is always numbered 17.
Indy 500's theme music was produced by Rob Hubbard, who at the time was new to Electronic Arts as a music director.
Car setup
A wide and realistic variety of car settings can be altered during Practice in order to change car performance. In Practice mode, changes take immediate effect, making comparisons between even the slightest changes straightforward, and any number of "testing" laps can be driven (all of which are timed, again helping comparisons to be made). During Qualifying and Race sessions, all settings except Turboboost and the anti-roll bars can only be altered during a pit stop, and some settings are unchangeable even then.
Replay mode
Six camera angles are available: In-Car, Behind, Track, TV, Sky and Leader/Crash. The replay mode offers the chance to review the previous 20 seconds of racing. If accident occurs, the Leader/Crash camera shows the crashed car. Leader/Crash camera is not available during practice and qualifying.
Crashes and retiremen
|
https://en.wikipedia.org/wiki/Association%20of%20Religion%20Data%20Archives
|
The Association of Religion Data Archives (ARDA) is a free source of online information related to American and international religion. One of the primary goals of the archive is to democratize access to academic information on religion by making this information as widely accessible as possible. Over 900 surveys, membership reports, and other data collections are currently available for online preview, and most can be downloaded free of charge. Other features include national profiles, GIS maps, church membership overviews, denominational heritage trees, historical timelines, tables, charts, and other summary reports.
Founded as the American Religion Data Archive in 1997, and online since 1998, the archive was initially targeted at researchers interested in American religion. In February 2006, the American Religion Data Archive became the Association of Religion Data Archives when an international data archive was added. The archive now includes both American and international collections as well as features for educators, journalists, religious congregations, and researchers.
Data included in the ARDA are submitted by the foremost religion scholars and research centers in the world. Currently housed in the Social Science Research Institute at Pennsylvania State University, the ARDA is funded by Lilly Endowment, the John Templeton Foundation, Chapman University, and Pennsylvania State University.
History
Roger Finke, then professor of sociology at Purdue University, founded the American Religion Data Archive in 1996 on a grant from Lilly Endowment. Data file collection and processing began in 1997. The online archive launched in the fall of 1998 under the domain name www.thearda.com, and originally contained thirty-three surveys regarding American religion. Within ten years, the archive had expanded to include more than 400 data files. , more than 900 data files were available for download on the ARDA website.
Starting in 2005, the ARDA began to host surveys dealing with religion outside the United States. In 2006, the archive therefore changed its name from the American Religion Data Archive to the Association of Religion Data Archives to more properly reflect the scope of information available. The new name preserved both the acronym and the domain name from the American Religion Data Archive.
Since its founding, the ARDA has moved from Purdue to the Population Research Institute at Pennsylvania State University, where is still run under the direction of Roger Finke, with the assistance of Christopher Bader of Chapman University. The staff has, since 1997, expanded to include a research team of religion experts and graduate students, a marketing and web development team, a team of editors for guiding papers and working papers, a learning center editor, and a press room editor.
Overview
The primary component of the ARDA, the data archive, contains around 775 quantitative data files . ARDA staff do not themselves collect the data encompass
|
https://en.wikipedia.org/wiki/God%27s%20algorithm
|
God's algorithm is a notion originating in discussions of ways to solve the Rubik's Cube puzzle, but which can also be applied to other combinatorial puzzles and mathematical games. It refers to any algorithm which produces a solution having the fewest possible moves. The allusion to the deity is based on the notion that an omniscient being would know an optimal step from any given configuration.
Scope
Definition
The notion applies to puzzles that can assume a finite number of "configurations", with a relatively small, well-defined arsenal of "moves" that may be applicable to configurations and then lead to a new configuration. Solving the puzzle means to reach a designated "final configuration", a singular configuration, or one of a collection of configurations. To solve the puzzle a sequence of moves is applied, starting from some arbitrary initial configuration.
Solution
An algorithm can be considered to solve such a puzzle if it takes as input an arbitrary initial configuration and produces as output a sequence of moves leading to a final configuration (if the puzzle is solvable from that initial configuration, otherwise it signals the impossibility of a solution). A solution is optimal if the sequence of moves is as short as possible. The highest value of this, among all initial configurations, is known as God's number, or, more formally, the minimax value. God's algorithm, then, for a given puzzle, is an algorithm that solves the puzzle and produces only optimal solutions.
Some writers, such as David Joyner, consider that for an algorithm to be properly referred to as "God's algorithm", it should also be practical, meaning that the algorithm does not require extraordinary amounts of memory or time. For example, using a giant lookup table indexed by initial configurations would allow solutions to be found very quickly, but would require an extraordinary amount of memory.
Instead of asking for a full solution, one can equivalently ask for a single move from an initial but not final configuration, where the move is the first of some optimal solution. An algorithm for the single-move version of the problem can be turned into an algorithm for the original problem by invoking it repeatedly while applying each move reported to the present configuration, until a final one is reached; conversely, any algorithm for the original problem can be turned into an algorithm for the single-move version by truncating its output to its first move.
Examples
Well-known puzzles fitting this description are mechanical puzzles such as Rubik's Cube, the Towers of Hanoi, and the 15 puzzle. The one-person game of peg solitaire is also covered, as well as many logic puzzles, such as the missionaries and cannibals problem. These have in common that they can be modeled mathematically as a directed graph, in which the configurations are the vertices, and the moves the arcs.
Mechanical puzzles
n-Puzzles
The Fifteen puzzle can be solved in 80 single-tile moves
|
https://en.wikipedia.org/wiki/HTTP%20cookie
|
HTTP cookies (also called web cookies, Internet cookies, browser cookies, or simply cookies) are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser. Cookies are placed on the device used to access a website, and more than one cookie may be placed on a user's device during a session.
Cookies serve useful and sometimes essential functions on the web. They enable web servers to store stateful information (such as items added in the shopping cart in an online store) on the user's device or to track the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited in the past). They can also be used to save for subsequent use information that the user previously entered into form fields, such as names, addresses, passwords, and payment card numbers.
Authentication cookies are commonly used by web servers to authenticate that a user is logged in, and with which account they are logged in. Without the cookie, users would need to authenticate themselves by logging in on each page containing sensitive information that they wish to access. The security of an authentication cookie generally depends on the security of the issuing website and the user's web browser, and on whether the cookie data is encrypted. Security vulnerabilities may allow a cookie's data to be read by an attacker, used to gain access to user data, or used to gain access (with the user's credentials) to the website to which the cookie belongs (see cross-site scripting and cross-site request forgery for examples).
Tracking cookies, and especially third-party tracking cookies, are commonly used as ways to compile long-term records of individuals' browsing histories a potential privacy concern that prompted European and U.S. lawmakers to take action in 2011. European law requires that all websites targeting European Union member states gain "informed consent" from users before storing non-essential cookies on their device.
Background
Origin of the name
The term cookie was coined by web-browser programmer Lou Montulli. It was derived from the term magic cookie, which is a packet of data a program receives and sends back unchanged, used by Unix programmers.
History
Magic cookies were already used in computing when computer programmer Lou Montulli had the idea of using them in web communications in June 1994. At the time, he was an employee of Netscape Communications, which was developing an e-commerce application for MCI. Vint Cerf and John Klensin represented MCI in technical discussions with Netscape Communications. MCI did not want its servers to have to retain partial transaction states, which led them to ask Netscape to find a way to store that state in each user's computer instead. Cookies provided a solution to the problem of reliably implementing a virtual shopping cart.
Together with John Giannandrea, Montulli wrote the
|
https://en.wikipedia.org/wiki/Total%20Axxess
|
Total Axxess was a contemporary Christian music radio program. The afternoon show was broadcast nationwide on WAY-FM Network and other affiliated Contemporary Christian music radio stations. The program was based out of Nashville, Tennessee. The show was produced by CHRSN. The show began in January 2004, and ended in September 2011.
Cliff era
Cliff Tredway was the original host of Total Axxess.
Jayar era
Jayar Reeves hosted the show for two years.
Features
Total Axxess Hotlist - daily Top 5 songs countdown
Bowling for Plugs - an artist was shot down a "bowling alley", to determine the length of time that they would get to "plug" whatever they want
Cellphone Superstar - a radio version of American Idol where contestants sang via cell phone
Five Seconds of Fame - callers had five seconds to give a shout out to whomever
On Tour with - Jayar joined an artist for a portion of their tour
The Golden Duckie Awards
The show hosted its second annual Duckie Awards in April 2007. Listeners voted for their favorite artists in ten categories such as Best Chica (female artist), Best Dude, Best Accent, and Favorite Moment.
Wally era
Wally became the new host for the show on April 30, 2007. According to the program's official website, there were radio stations in 25 states in over 100 markets when he took over.
Wally was the last host of Total Axxess. In 2011 he became the host of the WAY-FM morning show, The Wally Show.
Past Show Members
Wally - Host and DJ
Zach - Producer and co-host
Stacey - Assistant Producer
Betty Rock - Full-timer
Bekah - Full-timer
Rebie - Part-timer
Richard - Intern
Erika - Intern
Heather - Intern
Fluffy - Intern
Ryan - Intern
Jerry - Intern
O'fer - Intern. Also known as Katie Rose from the morning show.
Show Segments
Wally's Island - each day, a listener created short story about their time on a deserted island is read, with the titles of 3 songs being worked in.
Who in the Band... - band members answer Wally's questions about the band
Journal Song - Artists in studio sing songs from Wally's 6th Grade Journal set to the tune of one of their popular songs
Paper or Plastic - Wally gives artists a choice between two things, and the artist picks one. An ice-breaking game.
Walter Picks The Hits - Hosted by a guy named Walter who lives in Montgomery, Alabama, and picks songs from new releases that he thinks will become a hit.
Newsbomb - A short news segment on current events.
Are You Smarter Than a Rock - Caller goes against Betty Rock in a trivia contest. If Betty wins 10 of these contests this year, she will receive a full-ride scholarship to Grand Canyon University.
Yesterday's News - A caller goes against Betty Rock in a current events quiz.
Is Stacy Crazy? - Stacy gives three statements, and a caller must determine if each one is true or false.
Zach's Blog Report - Producer Zach gives a report on bands based on information from their blogs.
You Twit - A report from band's Twitter accounts.
Seemingly Impossible Trivia that Apparen
|
https://en.wikipedia.org/wiki/Healthy%2C%20Wealthy%20and%20Wise
|
Healthy, Wealthy and Wise was a lifestyle television program shown in Australia. It was shown on Network Ten and was aired from 1992 until 1998.
The show was created and produced by Michael Dickinson. Gavan Disney, once the producer of the Nine Network's long-running variety show Hey Hey it's Saturday, served as executive producer and the show was packaged by Disney Entertainment P/L for the Ten Network and its affiliates throughout the world.
Title
The title takes its name from the proverb, "Early to bed and early to rise, makes a man healthy, wealthy, and wise." This quote is often attributed to Benjamin Franklin since it appeared in his Poor Richard's Almanack; however, it was first used in print by John Clarke in a 1639 book of English and Latin proverbs.
Cast
Notable people associated with the programme included Felicity Kennett, wife of the then-Premier of Victoria Jeff Kennett, and Jim Brown, a former Ten eyewitness news journalist. Jacki MacDonald, who formerly appeared on Disney's previous programme Hey Hey it's Saturday, was a presenter during the first season.
Others used the opportunity to develop ongoing TV careers with the show as a starting point, including chef Iain Hewitson and crafts presenter Tonia Todman. The show's finance guru Ross Greenwood enjoyed particular success and became network finance editor on the Nine Network.
List of contributors
Some featured reporters and presenters on the show included:
Jacki MacDonald – Presenter (season 1)
Ronnie Burns – Host/presenter
Felicity Kennett – Presenter (seasons 6 & 7)
Jim Brown – Travel
Ross Greenwood – Finance
Cherie de Haas – Naturopath
Iain Hewitson – Chef
Lyn Talbot – General reporter
Tonia Todman – Crafts
Peter Wherrett – Motoring (seasons 3–7)
International broadcasts
The series was also broadcast on television in the United Arab Emirates on Channel 33, on Bahrain TV Channel 55 in Bahrain and on the Australia Television network in various countries including Thailand, the Philippines, Hong Kong, Singapore, Malaysia, India, Sri Lanka, Taiwan, Maldives, Macau, Fiji, Indonesia, Papua New Guinea and Korea.
References
External links
Australian non-fiction television series
Network 10 original programming
1992 Australian television series debuts
1998 Australian television series endings
English-language television shows
|
https://en.wikipedia.org/wiki/Eric%20Traut
|
Eric Traut is an American software engineer and software emulation pioneer. Traut graduated from Stanford University in 1992. From 1993 to 1995 he worked for Apple Computer, creating a Mac 68K emulator to be used in PowerPC-based Macintoshes. His work on this project led to a patent on a form of dynamic recompilation.
Traut went on to join Connectix, where he developed successful commercial emulators such as Virtual PC and Virtual Game Station. He became Connectix's Chief Technical Officer in 2001.
Traut became a Microsoft employee after the company purchased Connectix in 2003. Traut left Microsoft in late 2012. Traut rejoined Microsoft in May 2014 and is now a Technical Fellow.
References
External links
Eric Traut on Microsoft PressPass
Eric Traut talks about Windows 7 and MinWin
Living people
Microsoft employees
Microsoft technical fellows
American software engineers
Year of birth missing (living people)
|
https://en.wikipedia.org/wiki/Folklore%20%28video%20game%29
|
Folklore is a 2007 action role-playing video game developed by Game Republic and published by Sony Computer Entertainment. The game is set in Ireland and the Celtic Otherworld of Irish mythology, centering on a young woman named Ellen, and a journalist named Keats, both playable characters who together unravel the mystery that the quaint village of Doolin hides, the mystery that can only be solved by seeking the memories of the dead in the dangerous, Folk-ridden Netherworld.
Gameplay
Folklore is an action role-playing game, where players control characters in a third-person view to both explore their surroundings and engage in combat. From the start, players have a choice to play the game as either of the two lead protagonists, the young woman Ellen or the journalist Keats, both having different yet intertwining plots and play styles. The game is split into two worlds, the real world set in the small sea-side Irish village of Doolin and the more fantastical Netherworld inhabited by folk creatures and spirits.
In Doolin, players lead their chosen character throughout the village and surrounding area. When in this state, characters are unable to engage in combat or utilize their abilities and instead will be limited to exploring the village's locations and interacting with its inhabitants, containing multiple search and slight puzzle-esque quests that progress the main story and eventually lead them to and from the Netherworld, acting as a hub between worlds and subsequent quests.
When characters pass into the Netherworld, the gameplay shifts entirely towards the action-adventure side of its genre. Basic attack techniques are performed by utilizing "folk", various creatures and spirits that upon defeat can be absorbed for the player's use. When a folk is nearly defeated, its spirit will glow red, allowing players to absorb it by locking onto it and performing shaking and yanking motions with the Sixaxis motion control (rather than a conventional button interface) to reel in its energy for use. While the player can choose from nearly all folk encountered and absorbed, only four at a time can be mapped to the controller's main four interface/action buttons and used in quick succession for combat with different kinds of folk being better suited for certain situations and techniques such as close-combat, projectile attacks or magic. The two playable characters themselves also differ between play styles. While Ellen uses a variety of folk as basic strategy and favors a defensive stance with the ability to cloak herself with folk powers, Keats uses more straight up brute force attacks with usually all-round stronger folk along with the ability to release built-up energy to become invincible and perform stronger attacks for a period of time.
Plot
In the present day, two people are drawn to the Irish seaside village of Doolin. Ellen, a university student with no memory of her childhood, is summoned to the village by a letter written by dead her mother
|
https://en.wikipedia.org/wiki/Australia%27s%20Most%20Wanted
|
Australia's Most Wanted is a television program based on the format made popular by America's Most Wanted. It screened on the Seven Network from 1989 until 1999.
The show was often in the headlines due to its graphic crime scene re-enactments which many deemed too distressing for the show's 7:30pm Monday timeslot.
After the Seven Network cancelled the series, the Nine Network created their own version of the format. It was unsuccessful and cancelled after six weeks.
Presenters
Featured presenters on the various incarnations of the show included:
Bryan Marshall – 1989
Ann Sanders – 1993
Sarah Henderson – 1994
Roger Climpson – 1997–99
Alastair Duncan – Voiceover (Seven Network)
Hugh Riminton – Host (Nine Network)
During 1993, the regular New South Wales Police representative was Senior Constable Denise Behringer.
Wanted
In 2013, Channel Ten Australia re-booted the series calling it WANTED. The hosts were Sandra Sully and Matt Doran. The show was not a success and was cancelled two months later.
References
Australian television news shows
1990s Australian reality television series
Australian factual television series
Seven Network original programming
Nine Network original programming
1989 Australian television series debuts
1999 Australian television series endings
Television series by Reg Grundy Productions
|
https://en.wikipedia.org/wiki/GOVA
|
GOVA, formerly known as Greater Sudbury Transit, is a public transport authority that is responsible for serving bus routes in Greater Sudbury, Ontario, Canada and area. The network is the largest in Northern Ontario, comprising 41 routes operating between the hours of 5:00am to 10:00pm for regular service and from 10:00pm to 2:00am for night service. Due to the increase in ridership the service has been approved for articulating buses primarily used for the largest routes and during rush-hour times. The annual ridership for the year of 2014 was recorded at 5 million passengers at an estimate of 16,000 daily.
The service rebranded as GOVA in August 2019. The new name was selected to work bilingually, by pairing the English verb "go" with its French equivalent "va".
Overview
Greater Sudbury Transit features over 90 buses on 41 routes servicing the city centre and outlying neighbourhoods such as Capreol, Chelmsford, Lively and Falconbridge. Greater Sudbury Transit also provides door-to-door services for persons with physical disabilities known as Handi-Transit.
The bus fleet consists of 40' low floor buses from Orion with the Orion VI, NovaBus LFS and New Flyer D40LF buses that are in active service.
As of August 2010, the Greater Sudbury Transit bus fleet is compromised entirely of low floor "wheelchair accessible" buses - making Greater Sudbury Transit the first transit authority in all of Ontario to have an "Easier Access" bus fleet.
In 2006, Greater Sudbury Transit introduced five 40' coach-style buses from Nova Bus into its fleet. These buses service the city's longest routes, such as routes 701-Lively, 702-Azilda/Chelmsford, and 703-Val Caron/Hanmer/Capreol, providing increased comfort for those riders travelling long distances. These buses, which are described as having a "suburban-style interior", luggage racks, LED reading lights above each seat, and comfortable bucket seats with added cushioning.
Most routes meet at the Transit Centre in downtown Sudbury (the 103-Coniston and 303-Garson/Falconbridge depart from the New Sudbury Centre Monday to Saturday), and service is provided from 6:15 am to 12:30 am 7 days a week, 363 days a year. Bus service is limited to 6:15 pm on Christmas Eve. There is no bus service on Christmas Day. Private charters can also be arranged.
Greater Sudbury Transit also operates a trans-cab service for any outlying area which does not receive bus service (including Long Lake, Richard Lake, Radar Base, Skead, Wahnapitae, Whitefish and Dowling) which provides a taxi from the individual's home to a transit bus stop.
As of December 1, 2009, Greater Sudbury Transit buses feature a fully operational audio/visual stop announcement system for passengers who are hearing and/or visually impaired. The stop announcement system also helps non-disabled passengers who are not familiar with a bus route of the transit system if they are not sure where it is they need to get off at to reach their destination.
As of April 1
|
https://en.wikipedia.org/wiki/Vehicular%20automation
|
Vehicular automation involves the use of mechatronics, artificial intelligence, and multi-agent systems to assist the operator of a vehicle such as a car, lorries, aircraft, or watercraft. A vehicle using automation for tasks such as navigation to ease but not replace human control, qualify as semi-autonomous, whereas a fully self-operated vehicle is termed autonomous.
Automated vehicles include self-driving cars, unmanned surface vehicles, autonomous trains, advanced airliner autopilots, drone aircraft, and planetary rovers, as well as guided rockets and missiles.
The technology involved in implementing autonomous vehicles ranges from changes to the vehicle to providing support in the driving environment.
Automated vehicles present safety concerns, especially in land transport, given the complexity of driving, geographical/cultural differences, and road conditions. Various technological challenges need to be overcome to make autonomous vehicles robust and scalable.
Vehicular automation topic is notable for road traffic due to the number of vehicles and drivers but present specific concerns in an environement subject to traffic collisions due to the need to share the road with other road users.
Autonomy implies that the vehicle is responsible for all perceptual, monitoring and control functions. Automated systems may not be capable of operating under all conditions, leaving the rest for a human operator. A further subtlety is that while a vehicle may attempt to operate under all circumstances, the vehicle may require a human to assume control in unanticipated circumstance arises or when the vehicle misbehaves.
Autonomy levels
Autonomy in motor vehicles is often categorized in six levels: The level system was developed by the Society of Automotive Engineers (SAE).
Level 0: No automation.
Level 1: Driver assistance - The vehicle can control either steering or speed autonomously in specific circumstances to assist the driver.
Level 2: Partial automation - The vehicle can control both steering and speed autonomously in specific circumstances to assist the driver.
Level 3: Conditional automation - The vehicle can control both steering and speed autonomously under normal environmental conditions, but requires driver oversight.
Level 4: High automation - The vehicle can complete travel autonomously under normal environmental conditions, not requiring driver oversight.
Level 5: Full autonomy - The vehicle can complete travel autonomously in any environmental conditions.
Level 0 refers, for instance, to vehicles which do not have adaptive cruise control.
Level 1 and 2 refer to vehicles where one part of the driving task is performed by the vehicle advanced driver-assistance systems (ADAS) under the responsibility/accountability/liability of the driver.
From level 3, the driver can conditionally transfer the driving task to the vehicle, but the driver must take back control when the conditional automation is no longer available. For inst
|
https://en.wikipedia.org/wiki/The%20Clubhouse%20Network
|
The Clubhouse Network, often shortened to "The Clubhouse," is an American nonprofit organization that provides a free out-of-school learning program where children (ages 10–19) from lower income communities can work with adult mentors to explore their own ideas, develop new skills, and build confidence in themselves through the use of technology. Its motto is "Where Technology Meets Imagination."
Initially founded in 1993 as the Computer Clubhouse, The Clubhouse is the brainchild of Mitchel Resnick and Natalie Rusk of the MIT Media Lab in Cambridge, Massachusetts, and Stina Cooke of Boston's Computer Museum.
From 2000 - 2015, with an investment of over $50 million from Intel, The Clubhouse Network grew to support nearly 100 community-based Clubhouses in 18 countries: Argentina, Australia, Brazil, Colombia, Costa Rica, Denmark, Ireland, Israel, Jordan, Mexico, New Zealand, Palestine, Panama, Philippines, Russia, Taiwan, South Africa, and the United States.
In 2012, Best Buy partnered with The Clubhouse Network to launch multiple learning sites throughout the U.S., operating under the name "Best Buy Teen Tech Centers." The Clubhouse Network provides access to resources, skills, and experience to 25,000 youth per year.
From 2000 to 2017, led by longtime Executive Director Gail Breslow, The Clubhouse Network was part of the Museum of Science, Boston. In 2018, it was separated from the Museum and relocated to Dudley Square in the heart of Roxbury.
In 1997, The Clubhouse won the Peter F. Drucker Award for Non-Profit Innovation.
In 2016, The Clubhouse partnered with the MIT Media Lab and Maker Media to publish Start Making! A Guide To Engaging Young People in Maker Activities.
Clubhouses have been utilized as the proving ground for a number of projects of the MIT Media Lab's "Lifelong Kindergarten" research group. Notable examples include:
Lego Mindstorms programmable bricks, a late 20th-century robotic construction toy.
PICO programmable Crickets, early 21st-century programmable toys for art construction projects
Scratch, a 21st-century multimedia programming language for young people.
References
External links
The Clubhouse Village
Global RE@CH Media Festival
Youth development organizations
After school programs
International educational charities
United States educational programs
Project-based learning
Educational charities based in the United States
Youth organizations based in Massachusetts
|
https://en.wikipedia.org/wiki/Fibre%20Channel%20network%20protocols
|
Communication between devices in a fibre channel network uses different elements of Fibre Channel standards.
Transmission words and ordered sets
All Fibre Channel communication is done in units of four 10-bit codes. This group of 4 codes is called a transmission word.
An ordered set is a transmission word that includes some combination of control (K) codes and data (D) codes.
AL_PAs
Each device has an Arbitrated Loop Physical Address (AL_PA). These addresses are defined by an 8-bit field but must have neutral disparity as defined in the 8b/10b coding scheme. That reduces the number of possible values from 256 to 134. The 134 possible values have been divided between the fabric, FC_AL ports, and other special purposes as follows:
Meta-data
In addition to the transfer of data, it is necessary for Fibre Channel communication to include some metadata. This allows for the setting up of links, sequence management, and other control functions. The meta-data falls into two types, primitives which consist of a 4 character transmission word and non-data frames which are more complex structures.
Primitives
All primitives are four characters in length. They begin with the control character K28.5, followed by three data characters. In some primitives the three data characters are fixed, in others they can be varied to change the meaning or to act as parameters for the primitive. In some cases the last two parameter characters are identical.
Parameters are shown in the table below in the form of their hexadecimal 8-bit values. This is clearer than their full 10-bit (Dxx.x) form as shown in the Fibre Channel standards:
Note 1: The first parameter byte of the EOF primitive can have one of four different values (8A, 95, AA, or B5). This is done so that the EOF primitive can rebalance the disparity of the whole frame. The remaining two parameter bytes define whether the frame is ending normally, terminating the transfer, or is to be aborted due to an error.
Note 2: The Open selective replicate variant can be repeated a number of times in order to communicate with more than one destination port simultaneously. The Open broadcast replicate variant will allow communication with all ports simultaneously.
Note 3: The SOF primitive contains a pair of control bytes (shown as cccc in the table) to designate the type of frame.
Frames
The Fibre Channel protocol transmits data in frames each of which can contain up to 2112 bytes of payload data. The structure of a frame is shown in this table:
In addition to data frames, there are non-data frames that are used for setup and messaging purposes. These fall into three categories: link control frames, link service frames, and extended link service frames. The following table lists the most common ones:
Fibre Channel
Computing-related lists
|
https://en.wikipedia.org/wiki/Gerchberg%E2%80%93Saxton%20algorithm
|
The Gerchberg–Saxton (GS) algorithm is an iterative phase retrieval algorithm for retrieving the phase of a complex-valued wavefront from two intensity measurements acquired in two different planes. Typically, the two planes are the image plane and the far field (diffraction) plane, and the wavefront propagation between these two planes is given by the Fourier transform. The original paper by Gerchberg and Saxton considered image and diffraction pattern of a sample acquired in an electron microscope.
It is often necessary to know only the phase distribution from one of the planes, since the phase distribution on the other plane can be obtained by performing a Fourier transform on the plane whose phase is known. Although often used for two-dimensional signals, the GS algorithm is also valid for one-dimensional signals.
The pseudocode below performs the GS algorithm to obtain a phase distribution for the plane "Source", such that its Fourier transform would have the amplitude distribution of the plane "Target".
Pseudocode algorithm
Let:
FT – forward Fourier transform
IFT – inverse Fourier transform
i – the imaginary unit, √−1 (square root of −1)
exp – exponential function (exp(x) = ex)
Target and Source be the Target and Source Amplitude planes respectively
A, B, C & D be complex planes with the same dimension as Target and Source
Amplitude – Amplitude-extracting function:
e.g. for complex z = x + iy, amplitude(z) = sqrt(x·x + y·y)
for real x, amplitude(x) = |x|
Phase – Phase extracting function:
e.g. Phase(z) = arctan(y / x)
end Let
algorithm Gerchberg–Saxton(Source, Target, Retrieved_Phase) is
A := IFT(Target)
while error criterion is not satisfied
B := Amplitude(Source) × exp(i × Phase(A))
C := FT(B)
D := Amplitude(Target) × exp(i × Phase(C))
A := IFT(D)
end while
Retrieved_Phase = Phase(A)
This is just one of the many ways to implement the GS algorithm. Aside from optimizations, others may start by performing a forward Fourier transform to the source distribution.
See also
Phase retrieval
Fourier optics
Holography
Computer-generated holography
Adaptive-additive algorithm
References
External links
Dr W. Owen Saxton's pages ,
Applications and publications on phase retrieval from the University of Rochester, Institute of Optics
A Python-Script of the GS by Dominik Doellerer
MATLAB GS algorithms ,
Digital signal processing
Physical optics
Articles with example pseudocode
|
https://en.wikipedia.org/wiki/Interface%20control%20document
|
An interface control document (ICD) in systems engineering
and software engineering, provides a record of all interface information (such as drawings, diagrams, tables, and textual information) generated for a project. The underlying interface documents provide the details and describe the interface or interfaces between subsystems or to a system or subsystem.
Overview
An ICD is the umbrella document over the system interfaces; examples of what these interface specifications should describe include:
The inputs and outputs of a single system, documented in individual SIRS (Software Interface Requirements Specifications) and HIRS (Hardware Interface Requirements Specifications) documents, would fall under "The Wikipedia Interface Control Document".
The interface between two systems or subsystems, e.g. "The Doghouse to Outhouse Interface" would also have a parent ICD.
The complete interface protocol from the lowest physical elements (e.g., the mating plugs, the electrical signal voltage levels) to the highest logical levels (e.g., the level 7 application layer of the OSI model) would each be documented in the appropriate interface requirements spec and fall under a single ICD for the "system".
The purpose of the ICD is to control and maintain a record of system interface information for a given project. This includes all possible inputs to and all potential outputs from a system for some potential or actual user of the system. The internal interfaces of a system or subsystem are documented in their respective interface requirements specifications, while human-machine interfaces might be in a system design document (such as a software design document).
Interface control documents are a key element of systems engineering as they control the documented interface(s) of a system, as well as specify a set of interface versions that work together, and thereby bound the requirements.
Characteristics
An application programming interface is a form of interface for a software system, in that it describes how to access the functions and services provided by a system via an interface. If a system producer wants others to be able to use the system, an ICD and interface specs (or their equivalent) is a worthwhile investment.
An ICD should only describe the detailed interface documentation itself, and not the characteristics of the systems which use it to connect. The function and logic of those systems should be described in their own requirements and design documents as needed. In this way, independent teams can develop the connecting systems which use the interface specified, without regard to how other systems will react to data and signals which are sent over the interface. For example, the ICD and associated interface documentation must include information about the size, format, and what is measured by the data, but not any ultimate meaning of the data in its intended use by any user.
An adequately defined interface will allow one team to test
|
https://en.wikipedia.org/wiki/Paul%20Romero
|
Paul Anthony Romero is an American computer and video game music composer and classical pianist who has won awards for his work.
Early life and classical piano
Romero taught himself to play the piano at the age of three. He began his formal piano and composition training at the age of 9 and made his concert debut when he was 11, playing a Mozart piano concerto with the Santa Monica Symphony Orchestra. He composed his first original piano concerto at the age of 13. This concerto was premiered by the United States National Symphony Orchestra of Washington, D.C., under Mstislav Rostropovich, with Romero as the piano soloist. The premiere took place at the Kennedy Center and was followed by an encore performance at the United Nations General Assembly Hall in New York City. The concert was televised around the world and brought him international attention as a young composing prodigy. The Yamaha music label recorded the concerts, a CD which is still available in Japan.
At the age of 15 Romero composed and performed his Piano Concerto in C major for piano, Electone, and timpani at the 9th Yamaha International Junior Original Concert at Togo no Sato Interior Hall in Japan in 1980. He was also selected to represent the United States at the 10th Yamaha International Junior Original Concert in 1981 with the performance of his solo piano piece "3 Preludes."
At the age of 16 he received a full college scholarship to the Curtis Institute of Music in Philadelphia, Pennsylvania, where he studied composing under Pulitzer Prize winner, Ned Rorem. He also studied piano under Vladimir Sokoloff, Jorge Bolet, and Chamber music with members of the Guanari String quartet. He finished his musical training at the Conservatoire de Paris in France and the Guildhall School of Music and Drama in London England.
In 2002, he became the winner of the International Piano Competition for Outstanding Amateurs in Paris, which is widely considered to be one of the top-level competitions for amateur musicians in the world.
He has performed in Tokyo, London, Paris, New York, Poznań, and Washington, D.C. He has performed at the Walt Disney Concert Hall in Los Angeles, California, the Mexican Embassy in Washington, D.C., the Palace of the France-Americique Institute in Paris, Carnegie Hall in New York, and two performances at the Gemäldegalerie in Berlin, Germany, as well as one performance at the Berliner Philharmonie. His latest CD, "An American In Paris", features his live performance in Paris of George Gershwin's Rhapsody in Blue.
He is a contributor along with Rob King to the Heroes of Might and Magic series of computer games and numerous other games. He has won a number of international piano competitions including the Paris and the Van Cliburn international amateur piano competitions.
Films and game music
Romero has composed over 70 original soundtrack film and computer game scores, including the orchestral/operatic/choral scores for the New World Computing/Ubisoft compute
|
https://en.wikipedia.org/wiki/Calma%20%28disambiguation%29
|
Calma may refer to one of the following
Calma, a former vendor of digitizers and minicomputer-based graphics systems
Calma (Afghanistan), place in Afghanistan
Čalma, a village in Serbia
Calma (beverage), a brand of instant decaf coffee-like beverage formerly sold in Europe
Calma, a genus of sea slugs.
Costa Calma, a resort town on the Canarian island of Fuerteventura, Spain
"Calma" (song) by Pedro Capó
|
https://en.wikipedia.org/wiki/Chip%20PC%20Technologies
|
Chip PC Technologies is a developer and manufacturer of thin client solutions and management software for server-based computing; where in a network architecture applications are deployed, managed and can be fully executed on the server.
History
Chip PC was founded in 2000 by Aviv Soffer and Ora Meir Soffer and raised its first round of financing from R.H. Technologies Ltd. (), an electronics contract manufacturing group.
In 2005 Elbit Systems acquired 20% of the company.
Later, the company established partnerships with Dell, which distributes its products, and Microsoft. In June 2007, it raised NIS 26 million in stocks, bonds, and warrants in an IPO on the Tel Aviv Stock Exchange.
In November 2007, the company won Europe's largest Thin client tender thus far, to supply 20,000 Thin client PC's and management software to RZF, the tax authority of the State of North Rhine-Westphalia in Germany.
Overview
Chip PC supplies thin clients to Multinational & Public sector organizations, recently winning 1st place in an independent Thin-Clients Evaluation among 26 thin clients from 9 vendors worldwide. Among Chip PC customers are top organizations from various verticals, such as Healthcare, Finance, Defense (Israeli Navy), Government (US Police), and Education.
Although the company's main target markets are enterprises and large organizations, it modifies and customizes models to fit other markets; such as the Networked home, SOHO (Small-Office-Home-Office), Point of sale and others.
See also
Thin client
Mini PC
Jack PC
References
External links
Computer hardware companies
Electronics companies of Israel
Computer terminals
Thin clients
Rehovot
|
https://en.wikipedia.org/wiki/Jack%20PC
|
Jack PC is a thin client device that is approximately the size of a network wall port. Its design allows for one's monitor, keyboard & mouse to plug straight into the wall-mounted unit. Jack PC operates in an SBC (Server Based Computing) environment.
The Jack PC thin client computers are connected at the back side through Ethernet cables to the building's LAN and receive Power over Ethernet (or 802.3af) through the existing enterprise infrastructure.
Jack PC is also notable in that it consumes very little power. Some tests have found it to consume as little as 5 W, not counting monitor and other external peripherals.
See also
Thin clients
Chip PC
External links
Chip PC Technologies' Website
Chip PC Thin Clients
The Jack PC Thin Client
HD PC+ Thin Client
Remote desktop
Thin clients
|
https://en.wikipedia.org/wiki/FMN
|
FMN may refer to:
Federated Mission Networking
Facial motor nucleus
Flavin mononucleotide
Flour Mills of Nigeria, a Nigerian agribusiness company
FMN (TV channel), Indonesia
Formins
The FAA LID/IATA code for Four Corners Regional Airport in Farmington, New Mexico, United States
Ministry of Defence (Denmark) (Danish: )
Narrowband FM, or frequency modulation narrow
|
https://en.wikipedia.org/wiki/Asia%20Commercial%20Co.%20Ltd.
|
Asia Commercial Co. Ltd. (ACC) was a Hong Kong-based computer company which manufactured the ACC 8000, a MOS 6502-based personal computer compatible with the Apple IIe. It could run Apple DOS 3.3, CP/M or FLEX. The ACC 8000 was built for business and professional use, and used a mechanical keyboard. It was not successful, and is today quite rare.
See also
Other Asian computer makers include:
Acer (company)
Lenovo
External links and references
Old-Computers.com — ACC 8000 PC
Defunct computer hardware companies
Electronics companies of Hong Kong
Companies with year of establishment missing
Apple II clones
|
https://en.wikipedia.org/wiki/Ziggy%20Lorenc
|
Isabelle Anna "Ziggy" Lorenc (pronounced like "Lawrence", ) is a Canadian television and radio personality as well as occasional actress in film and television, best known for hosting programming on the CHUM Limited-owned television stations Citytv, MuchMusic, and Bravo!, having previously worked for CHUM/City as a receptionist.
Career
Having done modelling work since the age of thirteen, Lorenc began pursuing acting jobs during her late teens. Hanging around Toronto in the late 1970s among a group of aspiring performers including Michael Wincott, Kim Cattrall, Jim Carrey, and Tonya Lee Williams, Lorenc was accepted at the Neighborhood Playhouse School of the Theatre in New York City via an "audition" that consisted of the school's director Sanford Meisner just speaking to the applicants. The New York stay turned out to be short, however, as the budding actress returned to Toronto due to being unable to support herself financially in New York.
While unsuccessfully looking for acting work in Toronto, young Lorenc supplemented her income via Toronto night club gigs, performing live as a "disco bunny", which led to an appearance on Boogie, Citytv's Canadian disco counterpart to the U.S. music-performance and dance television programs American Bandstand and Soul Train. She would soon meet Citytv producer and creative director Moses Znaimer, a connection that by 1980 resulted in a job at the station as a switchboard operator.
Citytv
While working the switchboard at Citytv's 99 Queen Street East headquarters, Lorenc became part of the Switchettes—a group of young female office staffers the station sent around the city of Toronto for promotional activities and even human interest reporting.
She continued going to acting auditions and soon got a part on the Canadian sketch comedy series Bizarre being shot in Toronto. Asking for time off from her Citytv duties in order to do Bizarre, she got rejected eventually and left Citytv. Her time on Bizarre was short, however, as she got fired after a couple of episodes.
Without both jobs, Lorenc began waitressing at night at Bemelmans, a popular Toronto eatery, while going to acting auditions during the day. She soon got cast as one of the romantic leads in Copper Mountain, a 1983 comedy that was never completed though still got a limited video release, starring Alan Thicke and young impressionist comedian Jim Carrey.
By 1984 she was back in the Citytv fold and was on hand during the launch of Much Music.
Lorenc was also the star/host of the series Life on Venus Ave. She is currently heard on CFZM, hosting a late night program devoted to romantic music.
She also had roles in movies White Room and Love, Sex and Eating the Bones.
References
External links
Canadian people of Polish descent
Living people
Much (TV channel) personalities
Canadian radio personalities
Canadian sketch comedians
Canadian women comedians
Canadian women television personalities
Canadian women radio hosts
Canadian VJs (media perso
|
https://en.wikipedia.org/wiki/Applied%20Digital%20Data%20Systems
|
Applied Digital Data Systems (ADDS) was a supplier of video display computer terminals, founded in 1969 by Leeam Lowin and William J. Catacosinos. Lowin simultaneously founded Solid State Data Sciences (SSDS). SSDS was one of the first developers of the MOS/LSI integrated circuits that were key to ADDS's product line.
It became a subsidiary of NCR Corporation in 1980, which sold the Mentor 2000 professional computer in the United States in 1986.
The Mentor 2000 ran at 5 MHz using a Zilog processor, 640 KB RAM, and included one 60MB hard disk. It used the Pick operating system and database management system. It was able to manage 16 or 32 video terminals at once.
ADDS (along with NCR) was later part of AT&T,
then independent briefly before being acquired by SunRiver Data Systems.
However, their version of the Pick operating system was acquired by Pick Systems Inc, now called TigerLogic. That version is now called mvBase. MvBase was sold to Rocket Software in 2013.
See also
Tandy 10 Business Computer System
References
External links
Old-computers.com — ADDS Mentor 2000
ADDS Viewpoint News
1969 establishments in New York (state)
1980 disestablishments in New York (state)
1980 mergers and acquisitions
American companies established in 1969
American companies disestablished in 1980
Computer companies established in 1969
Computer companies disestablished in 1980
Computer terminals
Defunct computer companies of the United States
Defunct computer companies based in New York (state)
Defunct computer hardware companies
Early microcomputers
|
https://en.wikipedia.org/wiki/Black%20hole%20%28networking%29
|
In networking, a black hole, also known as a block hole, refers to a place in the network where incoming or outgoing traffic is silently discarded (or "dropped"), without informing the source that the data did not reach its intended recipient.
When examining the topology of the network, the black holes themselves are invisible, and can only be detected by monitoring the lost traffic; hence the name as astronomical black holes cannot be directly observed.
Dead addresses
The most common form of black hole is simply an IP address that specifies a host machine that is not running or an address to which no host has been assigned.
Even though TCP/IP provides a means of communicating the delivery failure back to the sender via ICMP, traffic destined for such addresses is often just dropped.
Note that a dead address will be undetectable only to protocols that are both connectionless and unreliable (e.g., UDP). Connection-oriented or reliable protocols (TCP, RUDP) will either fail to connect to a dead address or will fail to receive expected acknowledgements.
For IPv6, the black hole prefix is described by .
For IPv4, no black hole address is explicitly defined, however the reserved IP addresses can help achieve a similar effect. For example, is reserved for use in documentation and examples by ; while the RFC advises that the addresses in this range are not routed, this is not a requirement.
Firewalls and "stealth" ports
Most firewalls (and routers for household use) can be configured to silently discard packets addressed to forbidden hosts or ports, resulting in small or large "black holes" in the network.
Personal firewalls that do not respond to ICMP echo requests ("ping") have been designated by some vendors as being in "stealth mode".
Despite this, in most networks the IP addresses of hosts with firewalls configured in this way are easily distinguished from invalid or otherwise unreachable IP addresses: On encountering the latter, a router will generally respond with an ICMP network rsp. host unreachable error. Network address translation (NAT), as used in home and office routers, is generally a more effective way of obscuring the layout of an internal network.
Black hole filtering
A null route or black hole route is a network route (routing table entry) that goes nowhere. Matching packets are dropped (ignored) rather than forwarded, acting as a kind of very limited firewall. The act of using null routes is often called blackhole filtering. The rest of this article deals with null routing in the Internet Protocol (IP).
Black hole filtering refers specifically to dropping packets at the routing level, usually using a routing protocol to implement the filtering on several routers at once, often dynamically to respond quickly to distributed denial-of-service attacks.
Remote Triggered Black Hole Filtering (RTBH) is a technique that provides the ability to drop undesirable traffic before it enters a protected network. The Internet Exc
|
https://en.wikipedia.org/wiki/Regular%20tree%20grammar
|
In theoretical computer science and formal language theory, a regular tree grammar is a formal grammar that describes a set of directed trees, or terms. A regular word grammar can be seen as a special kind of regular tree grammar, describing a set of single-path trees.
Definition
A regular tree grammar G is defined by the tuple
G = (N, Σ, Z, P),
where
N is a finite set of nonterminals,
Σ is a ranked alphabet (i.e., an alphabet whose symbols have an associated arity) disjoint from N,
Z is the starting nonterminal, with , and
P is a finite set of productions of the form A → t, with , and , where TΣ(N) is the associated term algebra, i.e. the set of all trees composed from symbols in according to their arities, where nonterminals are considered nullary.
Derivation of trees
The grammar G implicitly defines a set of trees: any tree that can be derived from Z using the rule set P is said to be described by G.
This set of trees is known as the language of G.
More formally, the relation ⇒G on the set TΣ(N) is defined as follows:
A tree can be derived in a single step into a tree
(in short: t1 ⇒G t2), if there is a context S and a production such that:
t1 = S[A], and
t2 = S[t].
Here, a context means a tree with exactly one hole in it; if S is such a context, S[t] denotes the result of filling the tree t into the hole of S.
The tree language generated by G is the language .
Here, TΣ denotes the set of all trees composed from symbols of Σ, while ⇒G* denotes successive applications of ⇒G.
A language generated by some regular tree grammar is called a regular tree language.
Examples
Let G1 = (N1,Σ1,Z1,P1), where
N1 = {Bool, BList } is our set of nonterminals,
Σ1 = { true, false, nil, cons(.,.) } is our ranked alphabet, arities indicated by dummy arguments (i.e. the symbol cons has arity 2),
Z1 = BList is our starting nonterminal, and
the set P1 consists of the following productions:
Bool → false
Bool → true
BList → nil
BList → cons(Bool,BList)
An example derivation from the grammar G1 is
BList
⇒ cons(Bool,BList)
⇒ cons(false,cons(Bool,BList))
⇒ cons(false,cons(true,nil)).
The image shows the corresponding derivation tree; it is a tree of trees (main picture), whereas a derivation tree in word grammars is a tree of strings (upper left table).
The tree language generated by G1 is the set of all finite lists of boolean values, that is, L(G1) happens to equal TΣ1.
The grammar G1 corresponds to the algebraic data type declarations (in the Standard ML programming language):
datatype Bool
= false
| true
datatype BList
= nil
| cons of Bool * BList
Every member of L(G1) corresponds to a Standard-ML value of type BList.
For another example, let , using the nonterminal set and the alphabet from above, but extending the production set by P2, consisting of the following productions:
BList → cons(true,BList)
BList → cons(false,BList)
The language L(G2) is the set of all finite lists of boolean values that contain
|
https://en.wikipedia.org/wiki/Apple%20Corps%20v%20Apple%20Computer
|
Between 1978 and 2006 there were a number of legal disputes between Apple Corps (owned by The Beatles) and the computer manufacturer Apple Computer (now Apple Inc.) over competing trademark rights.
History of trademark disputes
1978–1981
In 1978, Apple Corps, the Beatles-founded holding company and owner of their record label, Apple Records, filed a lawsuit against Apple Computer for trademark infringement. The suit was settled in 1981 with an undisclosed amount being paid to Apple Corps. This amount was later revealed to be (). As a condition of the settlement, Apple Computer agreed not to enter the music business, and Apple Corps agreed not to enter the computer business.
1986–1991
In 1986, Apple Computer added MIDI and audio-recording capabilities to its computers, which included putting the advanced Ensoniq 5503 DOC sound chip from synthesizer maker Ensoniq into the Apple IIGS computer. In 1989, this led Apple Corps to sue again, claiming violation of the 1981 settlement agreement.
In 1991, a settlement involving payment of around million (equivalent to $million in ) to Apple Corps was reached. Outlined in the settlement was each company's respective trademark rights to the term "Apple". Apple Corps held the right to use Apple on any "creative works whose principal content is music", while Apple Computer held the right to use Apple on "goods or services ... used to reproduce, run, play or otherwise deliver such content", but not on content distributed on physical media. In other words, Apple Computer agreed that it would not package, sell or distribute physical music materials.
Sosumi
In 1989, when the lawsuit was filed, Apple Computer employee Jim Reekes was part of the team working on the company's operating system update, System 7. He had added a sampled system sound called Chimes, which the company legal department worried would further exacerbate the legal challenge. Reekes successfully resubmitted the name as sosumi, not pointing out to the company lawyers that this would be read phonetically as "so sue me". By coincidence, Mac OS 7 was released to the public in 1991, the same year the settlement of the lawsuit was reached.
2003–2006
In September 2003, Apple Corps sued Apple Computer again, this time for breach of contract, in using the Apple logo in the creation and operation of Apple Computer's iTunes Music Store, which Apple Corps contended was a violation of the previous agreement. Some observers believed the wording of the previous settlement favoured Apple Computer in this case. Other observers speculated that if Apple Corps was successful, Apple Computer would be forced to offer a much larger settlement, perhaps resulting in Apple Corps becoming a major shareholder in Apple Computer, or perhaps in Apple Computer splitting the iPod and related business into a separate entity.
Following Apple Computer's unsuccessful efforts, in 2003 and 2004, to have the lawsuit dismissed by a California court, or have the jurisdiction cha
|
https://en.wikipedia.org/wiki/Axial%20coding
|
Axial coding is the breaking down of core themes during qualitative data analysis. Axial coding in grounded theory is the process of relating codes (categories and concepts) to each other, via a combination of inductive and deductive thinking. The basic framework of generic relationships is understood, according to Strauss and Corbin (1990, 1998) who propose the use of a "coding paradigm", to include categories related to (1) the phenomenon under study, (2) the conditions related to that phenomenon (context conditions, intervening structural conditions or causal conditions), (3) the actions and interactional strategies directed at managing or handling the phenomenon and (4) the consequences of the actions/interactions related to the phenomenon. As Kelle underlines, the implicit or explicit theoretical framework necessary to identify categories in empirical data is derived, in the procedures explicated by Strauss and Corbin (1990), from a "general model of action rooted in pragmatist and interactionist social theory" (Kelle, 2005, para. 16). This model or theoretical framework underlines the importance of "analysing and modelling action and interaction strategies of the actors" (para. 16). Axial coding is a cornerstone of Strauss and Corbin's (1990, 1998) approach but is regarded by Charmaz (2006) as highly structured and optional.
References
Qualitative research
|
https://en.wikipedia.org/wiki/Hardwire
|
Hardwire or hardwired may refer to:
Electrical wiring
Hardwired control unit, a part of a computer's central processing unit
In computer programming, a kludge to temporarily or quickly fix a problem
Wired communication
In arts and entertainment:
Hardwire (comics), a Malibu Comics villain
"Hardwire", a song by Metric, from the 2007 album Grow Up and Blow Away
Hard Wired, a 1995 album by the band Front Line Assembly
Hardwired, a book series by Walter Jon Williams, including the 1986 science fiction novel Hardwired
Hardwired, a web series by AOL
Hardwired, a pre-release version of the 1994 video game Red Zone
Hardwired (film), a 2009 action film
Hardwired... to Self-Destruct, an album by Metallica, often referred to simply as Hardwired
Hardwired (song), a song by Metallica on the aforementioned album
See also
Hard coding, embedding software input or configuration data into source code
|
https://en.wikipedia.org/wiki/ECAD%20%28disambiguation%29
|
Electronic computer-aided design is a category of software tools for designing electronic systems.
ECAD may also refer to:
ECAD, Inc., an electronic design automation company that became part of Cadence Design Systems
ECAD (Brazil), the Brazilian music licensing organisation
|
https://en.wikipedia.org/wiki/WNPX-TV
|
WNPX-TV (channel 28) is a television station licensed to Franklin, Tennessee, United States, broadcasting the Ion Television network to the Nashville area. It is owned and operated by the Ion Media subsidiary of the E. W. Scripps Company alongside CBS affiliate WTVF (channel 5). WNPX-TV's transmitter is located near Cross Plains, Tennessee.
WNPX also serves as the de facto Ion outlet for the Bowling Green, Kentucky, media market, as that area does not have an Ion station of its own.
History
As an independent station
The station was signed on by Dove Broadcasting on January 23, 1989, as WMTT, an independent station serving Cookeville. On March 17, 1989, it was sold to Steven J. Sweeney. The station would sign on with a general-entertainment format featuring cartoons, sitcoms, movies, religious programming, and infomercials. InaVision Broadcasting purchased WMTT in 1993, and changed its call sign to WKZX that year.
As a WB affiliate
WKZX became a charter affiliate of The WB in 1995, and would later share the WB affiliation with WNAB (channel 58), which also served Nashville and was signed on two months later. The network also aired on cable via the superstation feed of Chicago-based WGN-TV, later branded WGN America. In 1995, WKZX launched a nightly newscast at 6:30 pm (and repeated at 10:00 p.m.) branded as News 28. In 1997, InaVision Broadcasting sold the station to Roberts Broadcasting, a company based in St. Louis.
As a Pax/Ion O&O
In 1998, Roberts Broadcasting sold WKZX to Paxson Communications, who shut down the station's news operation. Paxson also moved and upgraded WKZX's transmitter to begin focusing the channel on the Nashville market. The station's call sign was changed to WNPX-TV. On August 31, the station ended its affiliation with The WB and began airing programming from the then-new upstart television network Pax TV, the forerunner of Ion Television.
The WB would continue airing on WNAB along with the cable superstation feed of WGN. However, a year later, on January 27, 1999, network co-owners Time Warner and Tribune mutually agreed that as of September, they would cease the stopgap WB programming relay over the WGN superstation feed. As a result, WNAB became the sole WB affiliate in the Nashville market.
Sometime in 2019, WNPX's city of license was changed from Cookeville to Franklin.
Sale to Scripps
On September 24, 2020, the Cincinnati-based E. W. Scripps Company announced that it would purchase Ion Media for $2.65 billion with financing from Berkshire Hathaway. With this purchase, Scripps divested 23 Ion-owned stations, but no announcement was made at the time as to which stations would be divested as part of the move. The proposed divestitures allowed the merged company to fully comply with the FCC local and national ownership regulations. Scripps agreed to a transaction with an unnamed buyer, who has agreed to maintain Ion affiliations for the stations. (The buyer was revealed in an October 2020 FCC filing to be Inyo B
|
https://en.wikipedia.org/wiki/WJFB
|
WJFB (channel 44) is a television station licensed to Lebanon, Tennessee, United States, broadcasting the classic television network MeTV to the Nashville area. Owned and operated by Weigel Broadcasting, the station maintains transmitter facilities in Whites Creek, Tennessee, just off I-24 and Old Hickory Boulevard.
History
The station signed on the air before July 1987, broadcasting on UHF channel 66. Prior to the digital television transition, WJFB aired programming from different networks over the years, including The Weather Channel, American Independent Network, America One, The Military Channel, Shop at Home Network, ShopNBC, Jewelry Television, Youtoo TV and Pursuit Channel. The station also broadcast several local sports events and regional sports through America One. These included local auto racing, local high school football, University of Tennessee at Martin (UT Martin) football and basketball, Cincinnati Reds baseball (by way of SportsChannel Cincinnati) and Showtime All-Star Wrestling. The station also broadcast the Lebanon Christmas Parade for several years before it moved to local public access channels. The station once aired a morning news program, TV 66 Morning Report Live, hosted by the station's then-owner Joe F. Bryant, which aired weekdays from 7:00 a.m. to 7:30 a.m. It featured news headlines as well as weather forecasts, traffic reports, local sports, and telephone calls from viewers. Bryant's terminal illness led to the cancellation of the program; he died on October 10, 2011. WJFB continued to be operated by his surviving family members. Local church services, the main locally originated programming, were also aired on Sunday mornings on the main channel until August 31, 2014, when they also moved to the cable-only access channels.
On February 4, 2013, WJFB reduced Jewelry Television programming on its main subchannel to an hour per day from 10:00 a.m. to 11:00 a.m., since the network was available 24 hours a day on Nashville/Lebanon area cable providers and was considered a secondary affiliation. The station then relied on America One for all of its programming. (Jewelry Television was still listed in the internet and electronic programming guides as broadcasting 24 hours a day until about mid-April 2013, when the information was updated to feature only America One programming on WJFB.)
On September 1, 2014, WJFB became an affiliate of the Pursuit Channel. WJFB broadcast its programming around the clock except on Saturday mornings when it aired educational and informational (E/I) programming through America One (and later Youtoo TV as of January 2015) to help meet Federal Communications Commission (FCC) requirements. America One programming was still carried full-time on WJFB's second digital subchannel until it merged with Youtoo TV in September 2014. Programming from Youtoo TV was also broadcast on WJFB's second digital subchannel until April 1, 2015, when the affiliation was discontinued and replaced with an Stan
|
https://en.wikipedia.org/wiki/Digital%20radiography
|
Digital radiography is a form of radiography that uses x-ray–sensitive plates to directly capture data during the patient examination, immediately transferring it to a computer system without the use of an intermediate cassette. Advantages include time efficiency through bypassing chemical processing and the ability to digitally transfer and enhance images. Also, less radiation can be used to produce an image of similar contrast to conventional radiography.
Instead of X-ray film, digital radiography uses a digital image capture device. This gives advantages of immediate image preview and availability; elimination of costly film processing steps; a wider dynamic range, which makes it more forgiving for over- and under-exposure; as well as the ability to apply special image processing techniques that enhance overall display quality of the image.
Detectors
Flat panel detectors
Flat panel detectors (FPDs) are the most common kind of direct digital detectors. They are classified in two main categories:
1. Indirect FPDs Amorphous silicon (a-Si) is the most common material of commercial FPDs. Combining a-Si detectors with a scintillator in the detector’s outer layer, which is made from caesium iodide (CsI) or gadolinium oxysulfide (Gd2O2S), converts X-rays to light. Because of this conversion the a-Si detector is considered an indirect imaging device. The light is channeled through the a-Si photodiode layer where it is converted to a digital output signal. The digital signal is then read out by thin film transistors (TFTs) or fiber-coupled CCDs.
2. Direct FPDs. Amorphous selenium (a-Se) FPDs are known as “direct” detectors because X-ray photons are converted directly into charge. The outer layer of the flat panel in this design is typically a high-voltage bias electrode. X-ray photons create electron-hole pairs in a-Se, and the transit of these electrons and holes depends on the potential of the bias voltage charge. As the holes are replaced with electrons, the resultant charge pattern in the selenium layer is read out by a TFT array, active matrix array, electrometer probes or microplasma line addressing.
Other direct digital detectors
Detectors based on CMOS and charge coupled device (CCD) have also been developed, but despite lower costs compared to FPDs of some systems, bulky designs and worse image quality have precluded widespread adoption.
A high-density line-scan solid state detector is composed of a photostimulable barium fluorobromide doped with europium (BaFBr:Eu) or caesium bromide (CsBr) phosphor. The phosphor detector records the X-ray energy during exposure and is scanned by a laser diode to excite the stored energy which is released and read out by a digital image capture array of a CCD.
Phosphor plate radiography
Phosphor plate radiography resembles the old analogue system of a light sensitive film sandwiched between two x-ray sensitive screens, the difference being the analogue film has been replaced by an imaging plate with
|
https://en.wikipedia.org/wiki/Windstream%20Holdings
|
Windstream Holdings, Inc., also doing business as Windstream Communications or Windstream, is a provider of voice and data network communications (broadband, VoIP, MPLS), and managed services (virtual servers, managed firewall, data storage, cloud-based voice, etc.), to businesses in the United States. The company also offers residential broadband, phone and digital streaming TV services to consumers within its coverage area. It is the ninth largest residential telephone provider in the country with service covering more than 8.1 million people in 21 states.
The company was formed in 2006, when Alltel's local telephone service merged with Valor Communications Group out of part of GTE (now part of Verizon's) local telephone business in the Southwestern United States.
Windstream is a partner with DirecTV, offering satellite service to its customers.
History
Valor Telecom was formed in 2000 to take over GTE Southwest assets that Verizon was selling following its acquisition of GTE.
The company went public in 2005, under the name Valor Communications Group, Inc.
Change to Windstream
In 2006, Windstream Corporation formed through the spinoff of Alltel's landline business and merger with VALOR Communications Group.
Local Insight Yellow Pages
Local Insight Yellow Pages, Inc. was founded in 1984 as Alltel Publishing Corporation, and subsequently became Windstream's official directory publishing agent.
Windstream Yellow Pages published directories for former Alltel wireline, as well as directories for TDS Telecom and KLM Telephone customers, as well numerous smaller independent telephone companies. In 99% of the markets, the telephone directory published by Windstream Yellow Pages is for the Incumbent Local Exchange Carrier (ILEC) and is not a competing overlay directory.
Upon completion of the sale to Windstream Regatta Holdings, Inc., Windstream Yellow Pages was renamed Local Insight Yellow Pages. In 2007, LIR Holdings acquired CBD Media, the former advertising & publishing division of Cincinnati Bell.
In July 2009, Local Insight Regatta Holdings merged Local Insight Yellow Pages into The Berry Company, which it had acquired from AT&T.
Bond default and bankruptcy
On February 15, 2019, the U.S. District Court of the Southern District of New York ruled that Windstream had defaulted on some of its bonds. Consequent to the ruling, Windstream stock lost about 60% of its value.
On February 25, 2019, Windstream filed for Chapter 11 bankruptcy.
Launch of Kinetic
In February 2019, Windstream launched Kinetic.
Kinetic TV requires a Kinetic Internet subscription with speeds of 10 Mbps or greater and runs atop MobiTV’s Connect platform. The app will be available for connected devices, smart TVs, PCs, tablets and smartphones. Kinetic TV packages include Kinetic TV Viewing, Kinetic TV Replay, Kinetic Cloud DVR, and Kinetic Video On-Demand, placing it in direct competition with DirecTV Now, Sling TV, Hulu with Live TV, YouTube TV, Philo, and others.
|
https://en.wikipedia.org/wiki/Nuclear%20magnetic%20resonance%20quantum%20computer
|
Nuclear magnetic resonance quantum computing (NMRQC) is one of the several proposed approaches for constructing a quantum computer, that uses the spin states of nuclei within molecules as qubits. The quantum states are probed through the nuclear magnetic resonances, allowing the system to be implemented as a variation of nuclear magnetic resonance spectroscopy. NMR differs from other implementations of quantum computers in that it uses an ensemble of systems, in this case molecules, rather than a single pure state.
Initially the approach was to use the spin properties of atoms of particular molecules in a liquid sample as qubits - this is known as liquid state NMR (LSNMR). This approach has since been superseded by solid state NMR (SSNMR) as a means of quantum computation.
Liquid state NMR
The ideal picture of liquid state NMR (LSNMR) quantum information processing (QIP) is based on a molecule in which some of its atom's nuclei behave as spin-½ systems. Depending on which nuclei we are considering they will have different energy levels and different interaction with its neighbours and so we can treat them as distinguishable qubits. In this system we tend to consider the inter-atomic bonds as the source of interactions between qubits and exploit these spin-spin interactions to perform 2-qubit gates such as CNOTs that are necessary for universal quantum computation. In addition to the spin-spin interactions native to the molecule an external magnetic field can be applied (in NMR laboratories) and these impose single qubit gates. By exploiting the fact that different spins will experience different local fields we have control over the individual spins.
The picture described above is far from realistic since we are treating a single molecule. NMR is performed on an ensemble of molecules, usually with as many as 10^15 molecules. This introduces complications to the model, one of which is introduction of decoherence. In particular we have the problem of an open quantum system interacting with a macroscopic number of particles near thermal equilibrium (~mK to ~300 K). This has led the development of decoherence suppression techniques that have spread to other disciplines such as trapped ions. The other significant issue with regards to working close to thermal equilibrium is the mixedness of the state. This required the introduction of ensemble quantum processing, whose principal limitation is that as we introduce more logical qubits into our system we require larger samples in order to attain discernable signals during measurement.
Solid state NMR
Solid state NMR (SSNMR), unlike LSNMR uses a solid state sample, for example a nitrogen vacancy diamond lattice rather than a liquid sample. This has many advantages such as lack of molecular diffusion decoherence, lower temperatures can be achieved to the point of suppressing phonon decoherence and a greater variety of control operations that allow us to overcome one of the major problems of LSNMR tha
|
https://en.wikipedia.org/wiki/PLANC
|
PLANC (Programming LAnguage for Nd Computers, pronounced as plank) is a high-level programming language.
Compilers were developed by Norsk Data for several architectures, including the Motorola 68000, 88000, Intel x86, and the Norsk Data Nord-10 minicomputers and ND-500 superminicomputer.
The language was designed to be cross-platform software. It was mainly used internally at Norsk Data for writing high level systems software such as the upper parts of operating systems and compilers.
Basic structure
PLANC programs are structured into modules and routines.
A very simple example of a PLANC program is as follows:
MODULE mod
INTEGER ARRAY : stack (0:100)
PROGRAM : mprog
INTEGER : i, j,k, m
INISTACK stack
1 =: i
2 =: j
i+j =: k =: m
ENDROUTINE
ENDMODULE
A difference from popular programming languages is that the assignment operator evaluates from left to right: First it computes the value, and then stores it. Compile-time initialization of variables, in contrast, evaluates from right to left.
The assignment operator returns the stored value, so it can be stored multiple times: 5 =: a =: b would store 5 into both the A and B variables. It shares this direction with Plankalkül, ALGOL 60, Mary (another little known language developed in Norway), and the popular language C.
A related distinct syntactic feature is that a function can be defined to take as input the computed value of the expression on its left side. Also, a single additional argument does not require surrounding parentheses. The resulting infix notation blurs the syntactic difference between functions and operators. Such expressions seem conceptually as having a computed value flowing from left to the right.
Data types
As with all high level languages, PLANC uses variables as can be seen in the prior sample, here are the allowed data types within PLANC:
Simple types
INTEGER, REAL, BOOLEAN, LABEL, VOID, ENUMERATION, POINTER
Composite types
ARRAY, RECORD, SET, ROUTINE
User defined types: declared by TYPE T = .....;
An enumeration was declared thus:
ENUMERATION (Winter, Spring, Summer, Autumn) : Seasons := Summer
This defines an enumeration of the seasons and sets the default value to Summer.
LABEL is a little different from a normal data type. This is used to predefine a label within code and is used together with a GO statement; very much like GOTO in BASIC.
Access modifiers can be applied to make them READ or WRITE only.
For string data several predefined datatypes are used, they are:
BYTE – Contains one character
BYTES – Contains character strings
BITS – Contains BIT strings
Array pointers were 3-word constructs that included both the base address, the lower bound, and the higher bound of the array; this made it possible to do reliable run-time checking of array boundaries, and made the kind of pointer arithmetic that makes C a more challenging language in which to write.
Some statements
PLANC is a language in
|
https://en.wikipedia.org/wiki/WTOK-TV
|
WTOK-TV (channel 11) is a television station in Meridian, Mississippi, United States, affiliated with ABC, MyNetworkTV and The CW Plus. The station is owned by Gray Television, and maintains studios on 23rd Avenue in Meridian's Mid-Town section; its transmitter is located on Crestview Circle (along MS 145/Roebuck Drive) in unincorporated Lauderdale County, south of the city.
History
WTOK-TV began broadcasting on September 25, 1953, as the second television station in Mississippi and the first on the VHF band. WTOK was originally owned by Southern Television Corporation founded by Robert F. Wright, and its first program was a football game between Dartmouth and Holy Cross. WJTV in Jackson had started broadcasting in January of that year on a UHF frequency. WTOK started as a primary CBS affiliate but carried programming from ABC, NBC, and DuMont as well. DuMont folded in 1955 and NBC went to WHTV (channel 24, now WMDN) when that station resumed broadcasting in 1972 (via its status as a satellite of Tupelo's WTWV, now WTVA). It became an exclusive ABC affiliate on April 1, 1980, sending CBS to WHTV when WTVA's owners decided to convert it into a separate station. ABC had become the highest-rated network in the nation by this time and wanted a station that would clear all of its programming. Wright also owned The Meridian Star, and was forced to sell channel 11 to the Hobby family of Houston in 1981 as a result of FCC action six years earlier prohibiting cross-ownership between a town's only newspaper and TV station. In 1983, the Hobbys reorganized their broadcast holdings as H&C Communications after they sold off the Houston Post. H&C then sold WTOK to United Broadcasting, who also owned KARK-TV in Little Rock, Arkansas, in 1984.
Although most media markets were allocated two VHF commercial channels and one VHF noncommercial channel, what would become of the Meridian media market was sandwiched between Columbus–Tupelo (channels 2, 4, and 9) to the north, Jackson (channel 3 and later channel 12) to the west, Hattiesburg–Laurel (channel 9, later 7) and Mobile (channels 3, 5, and 10) to the south, and Birmingham (channels 6, 10, and 13) and Montgomery (channels 8 and 12) to the east. This created a "doughnut" in East Central Mississippi where there was only one VHF license available. WTOK-TV was fortunate enough to gain that license, and consequently became the only station to serve the Meridian area until WHTV started in 1968 (however, that station went off the air in 1970, for a year and a half); WMAW (a Mississippi Public Broadcasting station) would not sign on until 1972.
WTOK also served as a partial Fox affiliate in the mid-1990s, carrying NFL broadcasts as well as selected Fox programming in late night time-slots, after ABC programming had ended for the day. In 1988, then-owner United Broadcasting was taken over by investment firm Merrill Lynch, who then sold its three stations off to separate buyers. That year, Benedek Broadcasting bought WT
|
https://en.wikipedia.org/wiki/Prelink
|
In computing, prebinding, also called prelinking, is a method for optimizing application load times by resolving library symbols prior to launch.
Background
Most computer programs consist of code that requires external shared libraries to execute. These libraries are normally integrated with the program at run time by a loader, in a process called dynamic linking.
While dynamic linking has advantages in code size and management, there are drawbacks as well. Every time a program is run, the loader needs to resolve (find) the relevant libraries. Since libraries move around in memory, there is a performance penalty for resolution. This penalty increases for each additional library needing resolution.
Prelinking reduces this penalty by resolving libraries in advance. Afterward, resolution only occurs if the libraries have changed since being prelinked, such as following perhaps an upgrade.
Mac OS
Mac OS stores executables in the Mach-O file format.
Mac OS X
Mac OS X performs prebinding in the "Optimizing" stage of installing system software or certain applications.
Prebinding has changed a few times within the Mac OS X series. Before 10.2, prebinding only happened during the installation procedure (the aforementioned "Optimizing" stage). From 10.2 through 10.3 the OS checked for prebinding at launch time for applications, and the first time an application ran it would be prebound, making subsequent launches faster. This could also be manually run, which some OS-level installs did. In 10.4, only OS libraries were prebound. In 10.5 and later, Apple replaced prebinding with a dyld shared cache mechanism, which provided better OS performance.
Linux
On Linux, prelinking is accomplished via the prelink program, a free program written by Jakub Jelínek of Red Hat for ELF binaries.
Performance results have been mixed, but it seems to aid systems with a large number of libraries, such as KDE.
prelink randomization
When run with the "-R" option, prelink will randomly select the address base where libraries are loaded. This selection makes a return-to-libc attack harder to perform because the addresses are unique to that system. The reason prelink does this is because kernel facilities supplying address space layout randomization (ASLR) for libraries cannot be used in conjunction with prelink without defeating the purpose of prelink and forcing the dynamic linker to perform relocations at program load time.
As stated, prelink and per-process library address randomization cannot be used in conjunction. In order to avoid completely removing this security enhancement, prelink supplies its own randomization; however, this does not help a general information leak caused by prelink. Attackers with the ability to read certain arbitrary files on the target system can discover where libraries are loaded in privileged daemons; often libc is enough as it is the most common library used in return-to-libc attacks.
By reading a shared library file such as l
|
https://en.wikipedia.org/wiki/Sora%2C%20Barcelona
|
Sora is a small village and municipality in the comarca of Osona, Catalonia autonomous community, Spain.
Population History
References
External links
Pàgina web de l'Ajuntament
Government data pages
Municipalities in Osona
|
https://en.wikipedia.org/wiki/Remote%20error%20indication
|
Remote error indication (REI) or formerly far end block error (FEBE) is an alarm signal used in synchronous optical networking (SONET). It indicates to the transmitting node that the receiver has detected a block error.
Overview
REI or FEBE errors are mostly seen on DS3 circuits, however they are known to be present on other types (SONET/T1s etc.).
Each terminating device (router or otherwise) monitors the incoming signal for CP-bit path errors. If an error is detected on the incoming DS3, the terminating elements transmit a FEBE bit on the outgoing direction of the DS3. Network monitoring equipment located anywhere along the path then measures these FEBEs in each direction to gauge the quality of the circuit while in service.
If you have a DS3 running from New York to Atlanta, and there's a problem within one of the central offices in Virginia. The errors are being generated by a device in the central office, and being detected by the terminating device (a NID, M13 Mux or router). The terminating device then sends the 'FEBE' error signal outbound to alert further devices there were problems.
So, errors are generated on the incoming side of the loop, the device terminating that end picks up the errors, and transmits a 'FEBE errors' message on the outgoing side. This specific setup of error reporting is what causes the confusion between many technicians trying to perform repairs.
Technical jargon:
An error detected by extracting the 4-bit FEBE field from the path status byte (G1). The legal range for the 4-bit field is between 0000 and 1000, representing zero to eight errors. Any other value is interpreted as zero errors.
The DS-3 M-frame uses P bits to check the line parity. The M-subframe uses C bits in a format called C-bit parity, which copies the result of the P bits at the source and checks the result at the destination. An ATM interface reports detected C-bit parity errors back to the source via a far-end block error (FEBE). ( Cisco.com all rights reserved)
An indication sent to a transmitting node that a flawed block has been detected at the receiving node. (DS3) A FEBE in C-bit parity is a parity violation detected at the far-end terminal and transmitted back to the near-end terminal.
A maintenance cell indicates that an error occurred with a data block at the far end of the link. This cell then sends a message back to the near end.
References
Error detection and correction
Synchronous optical networking
|
https://en.wikipedia.org/wiki/701%20%28disambiguation%29
|
701 may refer to:
701, the year
701 series, a Japanese train type
IBM 701, IBM's first commercial computer
IBM ThinkPad 701, a subnotebook series by IBM
701, a common name for the Yamaha Superjet
Seven-O-One, or 701, a Canadian information television series (1960–1963)
Area code 701 for North Dakota, United States
El Chapo who placed number 701 on the Forbes list of billionaires 2009
Class 701 train, a British train type
|
https://en.wikipedia.org/wiki/So%20%28kana%29
|
そ, in hiragana, or ソ, in katakana, is one of the Japanese kana, each of which represents one mora. Both represent . The version of this character used by computer fonts does not match the handwritten form that most native Japanese writers use. The native way is shown here as the alternative form.
Stroke order
Alternative form
Other communicative representations
Full Braille representation
Computer encodings
References
The Compact Nelson Japanese-English Character Dictionary (Andrew Nelson, John H Haig) Tuttle Publishing 1999
Specific kana
|
https://en.wikipedia.org/wiki/List%20of%20Canadians%20of%20Polish%20descent
|
This is a partial list of notable Canadians of full or partial Polish ancestral or national descent.
Business
Moses Znaimer, broadcasting executive
Mik Kersten, computer engineer
Piotr Szulczewski, founder of Wish
Science and engineering
Casimir Gzowski – engineer who worked on Welland Canal, New York & Erie Railway (first Commissioner of the Niagara Parks Commission)
Leon Katz, FRSC (1909–2004) – Officer of the Order of Canada, Professor University of Saskatchewan, physicist
Karol Józef Krótki, FRSC – demography professor, statistician
Witold Rybczynski – architect, professor and writer
Lucas Skoczkowski – founder and CEO of Redknee
Adam Skorek – professor of electrical and computer engineering
Nicole Tomczak-Jaegermann, FRSC – mathematics professor
Janusz Żurakowski – Battle of Britain fighter pilot
Education
Isaac Hellmuth – from Warsaw, via England; one of the founders of the University of Western Ontario
Conrad Swan – descended from Polish noble family, Swiecicki; first Canadian appointed to the College of Arms in London
Politics
Leon David Crestohl – former Liberal MP, Cartier, (1950–1963)
Bonnie Crombie – former Liberal MP, Mississauga—Streetsville (2008–2011), Mayor of Mississauga, Ontario (2014–present)
Jan Dukszta – former Ontario NDP MPP, Parkdale (1971–1981)
Gary Filmon – former Premier of Manitoba (1988–1999), Manitoba PC MLA, River Heights (1979–1981) and Tuxedo (1981–2000)
Jesse Flis – former Liberal MP Parkdale—High Park (1979–1984; 1988–1997)
Casimir Gzowski – Acting Lieutenant Governor of Ontario (1896–1897)
Stanley Haidasz – former Liberal MP for Trinity (1957–1958) and Parkdale (1962–1978); Minister of State for Multiculturalism (1972–1974); Senator (1978–1998)
Andrew Kania – former Liberal Member of Parliament for Brampton West (2008–2011)
Irek Kusmierczyk – Liberal Member of Parliament for Windsor-Tecumseh (2019 - )
Stan Kazmierczak Keyes – former national chair of Liberal Party of Canada (2002–2004); Liberal MP Hamilton West (1988–2004); Minister of National Revenue, Minister of State (Sport), Minister Responsible for the Canada Post Corporation and Minister Responsible for the Royal Canadian Mint (2003–2004)
Alexandre-Édouard Kierzkowski – former Liberal MP St. Hyacinthe (1867–1870), First MP of Polish Descent
Tom Kmiec – Conservative MP, Calgary Shepard (2015–present)
Chris Korwin-Kuczynski – former Toronto city councillor (1981–2003)
Ken Kowalski – former Deputy Premier of Alberta (1992–1994), former Alberta Government Minister, Speaker of the Legislative Assembly of Alberta (1997–2012), Alberta PC MLA (1979–2012)
Wladyslaw Lizon – former Conservative MP for Mississauga East-Cooksville (2011–2015) and former president of the Canadian Polish Congress (2005–2010)
Thomas Lukaszuk – former Deputy Premier of Alberta (2012–2013), former Alberta Government Minister (2010–2014), and PC MLA for Edmonton-Castle Downs (2001–2015)
Gary Malkowski – former Ontario NDP MPP, York East (1990–1995), Canada
|
https://en.wikipedia.org/wiki/UGO%20Networks
|
UGO Entertainment, Inc. was a website that provided coverage of online media in entertainment, targeting males aged 18–34. The company was based in New York, New York, United States.
History
The company started in 1997 as Unified Gamers Online, billed in directories as a "hand-picked network of professionally managed gaming sites and services." In 1997, founder Chris Sherman hired Ken Margolis Associates to manage sales and marketing to the Game Industry. Chris sold UGO to Actionworld, Inc., a subsidiary of InterWorld, which incorporated the company in the state of Delaware in April, 1997. That same year, InterWorld spun off the company "in order to permit UGO Networks to build a separate management team…and to position UGO Networks to seek private parts equity financing."
In 1998, UGO—then described as "the largest independent gaming community on the Internet"—created the prestigious UGO E3 Awards, now the Game Critics Awards, to recognize high quality video game entertainment. In 1999, UGO changed its name to UnderGround Online as part of its efforts to expand its target audience. The company streamed various forms of media entertainment on its website as well as offering articles on topics of interest to its target audience. Topics included comics, television, music and film. Its main competitors included CNET Networks, IGN, and Yahoo!. On July 24, 2007 it was announced that Hearst Corporation would acquire UGO Entertainment to expand its interactive media division. On January 6, 2009, UGO Entertainment acquired 1UP.com and its associated sites from publisher Ziff Davis.
In May 2011, IGN Entertainment announced that it would acquire UGO from Hearst in a cash and stock. At the same time, its parent company News Corporation also announced that the profitable IGN division would be spun off into a new company. In March 2012, UGO ceased to exist as a staffed website and was dormant for a short period. Later in 2012, UGO.com relaunched as a self-described "pop culture comedy site", which focused on producing original videos about movies, comics and videogames with a humorous tone. On February 4, 2013, UGO.com was purchased as part of the IGN network of websites acquired by Ziff Davis, and was shut down on February 21, 2013.
The network
The UGO Networks featured websites such as Hero Machine, a Flash-based website allowing to create one's own superhero and share it; Studio UGO, featuring exclusive live music performances; Actress Archives, a website focusing on actress and female entertainer related news, photo galleries, and videos; and Caster's Realm, a blog that featured news and information on MMORPGs.
References
External links
Entertainment Internet forums
American gaming websites
Internet properties disestablished in 2013
Internet properties established in 1997
Video game websites
2007 mergers and acquisitions
2011 mergers and acquisitions
|
https://en.wikipedia.org/wiki/USA%20Network%20Thursday%20Night%20Baseball
|
USA Network Thursday Night Baseball aired Major League Baseball (MLB) games on the USA Network from 1979 to 1983.
Background
In 1979, 22 teams (all but the Atlanta Braves, Houston Astros, New York Mets, and St. Louis Cardinals) participated in a one-year cable deal with United Artists Television and Columbia Pictures Television, then-owners of the USA Network. The deal involved the airing of a Thursday night Game of the Week in markets at least 50 miles (80 km) from a major league park. The deal earned Major League Baseball less than $500,000, but led to a new two-year contract for 40–45 games per season. The program ran through the 1983 season.
With USA's Thursday night coverage, it ended ABC's Monday night broadcast's position as the exclusive national, prime time television franchise for Major League Baseball.
Coverage history
The series began April 26, 1979 with a doubleheader: Cleveland at Kansas City (Jim Woods and Bud Harrelson announcing) followed by Baltimore at California (Monte Moore and Maury Wills announcing). The second game of the night was typically broadcast from the West Coast. The games were usually blacked-out in the competing teams' cities. Once in a while, when USA aired a repeat of the telecast late at night, local cities were allowed to show the rerun.
From 1980 to 1981, Jim Woods and Nelson Briles (replacing Bud Harrelson) broadcast the early games, while Monte Moore and Wes Parker (replacing Maury Wills) called the late game.
In 1982, doubleheaders did not start until June 17. Prior to the doubleheaders starting, Monte Moore and Wes Parker did the individual game until then. When the doubleheaders finally began, Moore and Parker moved over to the late game for the rest of the year. Meanwhile, Eddie Doucette (replacing Jim Woods) and Nelson Briles were assigned to call the early game.
USA continued with the plan of not starting doubleheaders until June in the final year of the package in 1983. Steve Zabriskie and Al Albert filled in for Eddie Doucette in September 1982 (Steve Grad also occasionally substituted) while Albert replaced Doucette for a game or more in 1983.
USA's coverage became a casualty of the new $1.2 billion TV contract between Major League Baseball, ABC and NBC beginning in 1984 and lasting through 1989. One of the provisions to the new deal was that local telecasts opposite network games had to be eliminated.
Memorable moments
One particular game of note was a Los Angeles Dodgers–St. Louis Cardinals game in 1981 (the last game before the strike). The game in question featured Fernando Valenzuela picking up his eighth consecutive win to start the season. Valenzuela gave up a home run in the ninth to tie the game 1–1, but Pedro Guerrero hit one himself in the bottom of the ninth for the win.
One year later, during a September 16 game between the San Diego Padres and the San Francisco Giants, Darrell Evans went 3-for-5 with four RBI in Giants' 9–3 victory.
Announcers
Al Albert (1982–1983)
Nelson
|
https://en.wikipedia.org/wiki/McAfee%20VirusScan
|
McAfee VirusScan is an antivirus software created and maintained by McAfee (formerly known as Intel Security, and Network Associates prior to that). Originally marketed as a standalone product, it has been bundled with McAfee LiveSafe, McAfee AntiVirus Plus, McAfee Total Protection and McAfee Gamer Security since 2010. McAfee LiveSafe integrates antivirus, firewall and anti-spyware/anti-ransomware capabilities.
In 2006, British telecom company BSkyB started offering Sky Broadband customers a branded version of VirusScan for free upon broadband modem installation.
VirusScan Enterprise
McAfee also produces an enterprise-level product named VirusScan Enterprise: McAfee has designed this for use on larger networks designed to make management of antivirus software on multiple computers easier. Unlike the home-user edition, the Enterprise edition consists of a client application for networked computers, and a server application, which the system installs updates and configures settings for all client programs. Clients can be controlled using the included ePolicy Orchestrator (ePO), which is a unified console that can control VirusScan and other McAfee products. Support for VirusScan Enterprise ended on December 31, 2021.
VirusScan for Mac
In November 2008 McAfee announced VirusScan for Mac OS. (Earlier versions used the name Virex, developed by HJC Software.) Key changes in VirusScan 8.6 included Leopard Compatibility (a universal binary package that ran on both Intel and PowerPC-based Macs), On-Access scanning, and Apple Mail support.
Controversies
Poor independent test results
In tests by Virus Bulletin and additional independent consumer-organizations, McAfee VirusScan has not fared well, frequently failing to detect some common viruses.
A review of VirusScan 2006 by CNET criticized the product due to "pronounced performance hits in two of our three real-world performance tests" and some users reviewing the same product reported encountering technical problems.
Some older versions of the VirusScan engine use all available CPU cycles.
, McAfee virus-scanning products did not handle false positives well, repeatedly removing or quarantining known clean files, even after user restoration of these files.
Customer support criticisms
Reviewers have described customer support for McAfee products as lacking, with support staff slow to respond and unable to answer many questions.
2010 reboot problem
On April 21, 2010, beginning approximately at 2 PM GMT, an erroneous virus definition file update from McAfee affected millions of computers worldwide running Windows XP Service Pack 3. The update resulted in the removal of a Windows system file (svchost.exe) on those machines, causing machines to lose network access and, in some cases, to enter a reboot loop. McAfee rectified this by removing and replacing the faulty DAT file, version 5958, with an emergency DAT file (version 5959) and has posted a fix for the affected machines in its consumer "Knowled
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.