source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Closed-loop%20authentication
Closed-loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of another party by requiring them to supply a copy of a token transmitted to the canonical or trusted point of contact for that identity. It is also sometimes used to refer to a system of mutual authentication whereby two parties authenticate one another by signing and passing back and forth a cryptographically signed nonce, each party demonstrating to the other that they control the secret key used to certify their identity. E-mail Authentication Closed-loop email authentication is useful for simple i another, as a weak form of identity verification. It is not a strong form of authentication in the face of host- or network-based attacks (where an imposter, Chuck, is able to intercept Bob's email, intercepting the nonce and thus masquerading as Bob.) A use of closed-loop email authentication is used by parties with a shared secret relationship (for example, a website and someone with a password to an account on that website), where one party has lost or forgotten the secret and needs to be reminded. The party still holding the secret sends it to the other party at a trusted point of contact. The most common instance of this usage is the "lost password" feature of many websites, where an untrusted party may request that a copy of an account's password be sent by email, but only to the email address already associated with that account. A problem associated with this variation is the tendency of a naïve or inexperienced user to click on a URL if an email encourages them to do so. Most website authentication systems mitigate this by permitting unauthenticated password reminders or resets only by email to the account holder, but never allowing a user who does not possess a password to log in or specify a new one. In some instances in web authentication, closed-loop authentication is employed before any access is granted to an identified user that would not be granted to an anonymous user. This may be because the nature of the relationship between the user and the website is one that holds some long-term value for one or both parties (enough to justify the increased effort and decreased reliability of the registration process.) It is also used in some cases by websites attempting to impede programmatic registration as a prelude to spamming or other abusive activities. Closed-loop authentication (like other types) is an attempt to establish identity. It is not, however, incompatible with anonymity, if combined with a pseudonymity system in which the authenticated party has adequate confidence. See also See :Category:Computer security for a list of all computing and information-security related articles. Information Security Authentication Cryptography Computer access control
https://en.wikipedia.org/wiki/Sampled%20data%20system
In systems science, a sampled-data system is a control system in which a continuous-time plant is controlled with a digital device. Under periodic sampling, the sampled-data system is time-varying but also periodic; thus, it may be modeled by a simplified discrete-time system obtained by discretizing the plant. However, this discrete model does not capture the inter-sample behavior of the real system, which may be critical in a number of applications. The analysis of sampled-data systems incorporating full-time information leads to challenging control problems with a rich mathematical structure. Many of these problems have only been solved recently. References External links Digital control Sampling (signal processing) Discretization Control theory Control engineering Systems engineering Systems theory
https://en.wikipedia.org/wiki/Microsoft%20Active%20Protection%20Service
Microsoft Active Protection Service (abbreviated MAPS and formerly known as Microsoft SpyNet) is the network of Windows Defender and Microsoft Security Essentials users that help determine which programs are classified as spyware. The signatures created for any submitted programs by the users of the product are available to all users, displayed as a bar graph that shows the percentage of people who have allowed, blocked, or removed an item. This method of spyware classification allows rare, unknown, or new spyware to be categorized as most people choose to send their data. Basic membership The basic MAPS membership choice in Windows Defender or Microsoft Security Essentials does not alert the user of software, and changes made by software that has not been analyzed for risks. Computer information is sent (such as IP address, operating system, and Web browser), and personal information might be sent (such as search terms or data entered into forms), but will not be used to identify you or contact you. Advanced membership The advanced MAPS membership choice in Windows Defender or Microsoft Security Essentials results in sending more information about software files, usage, and how it affects your computer. Computer information is sent (such as IP address, operating system, and Web browser), and personal information might be sent (such as search terms, data entered into forms, file paths, or partial memory dumps), but will not be used to identify you or contact you. Opt out Users of Microsoft Security Essentials can opt out by left clicking on the task bar icon, choose settings, spynet and then choose opt-out. Included in the v2.0 there is the ability to completely opt out of this program. References External links Joining Windows Defender voting network Microsoft Client Security Privacy Policy Active Protection Service
https://en.wikipedia.org/wiki/Lustre%20%28programming%20language%29
Lustre is a formally defined, declarative, and synchronous dataflow programming language for programming reactive systems. It began as a research project in the early 1980s. A formal presentation of the language can be found in the 1991 Proceedings of the IEEE. In 1993 it progressed to practical, industrial use in a commercial product as the core language of the industrial environment SCADE, developed by Esterel Technologies. It is now used for critical control software in aircraft, helicopters, and nuclear power plants. Structure of Lustre programs A Lustre program is a series of node definitions, written as: node foo(a : bool) returns (b : bool); let b = not a; tel Where foo is the name of the node, a is the name of the single input of this node and b is the name of the single output. In this example the node foo returns the negation of its input a, which is the expected result. Inner variables Additional internal variables can be declared as follows: node Nand(X,Y: bool) returns (Z: bool); var U: bool; let U = X and Y; Z = not U; tel Note: The equations order doesn't matter, the order of lines U = X and Y; and Z = not U; doesn't change the result. Special operators Examples Edge detection node Edge (X : bool) returns (E : bool); let E = false -> X and not pre X; tel See also Esterel SIGNAL (another dataflow-oriented synchronous language) Synchronous programming language Dataflow programming References External links Synchrone Lab Official website SCADE product page Declarative programming languages Synchronous programming languages Hardware description languages Formal methods Software modeling language
https://en.wikipedia.org/wiki/Ida%20Rhodes
Ida Rhodes (born Hadassah Itzkowitz; May 15, 1900 – February 1, 1986) was an American mathematician who became a member of the clique of influential women at the heart of early computer development in the United States. Childhood Hadassah Itzkowitz was born in a Jewish village Kamianets-Podilskyi between Nemyriv and Tulchyn in Ukraine on May 15, 1900. She was 13 years old in 1913 when her parents, David and Bessie () Itzkowitz, brought her to the United States. Her name was changed upon entering the country to Ida Itzkowitz. Career Rhodes was awarded the New York State Cash Scholarship and a Cornell University Tuition Scholarship and began studying mathematics at Cornell University only six years after coming to the United States, from 1919–1923. During her time at Cornell University she worked as a nurse's aid at Ithaca City Hospital. She was elected to the honorary organizations Phi Beta Kappa (1922) and Phi Kappa Phi (1923). She received her BA in mathematics in February, 1923 and her MA in September of the same year, graduating Phi Beta Kappa. Ida Itzkowitz married Solomon Alhadef Rhodes on 20 September 1922 in Bronx, New York City, and became known as Ida Rhodes. The couple made a Declaration of Intention to become a citizen of the United States on 17 June 1924 but were divorced by 1940. Rhodes had her first encounter with Albert Einstein in 1922 and encountered him again in 1936 at Princeton, where a group of mathematicians traveled to spend the weekend in informal seminars. She later studied at Columbia University in 1930–31. She held numerous positions involving mathematical computations before she joined the Mathematical Tables Project in 1940, where she worked under Gertrude Blanch, whom she would later credit as her mentor. Ida Rhodes was a pioneer in the analysis of systems of programming, and with Betty Holberton designed the C-10 programming language in the early 1950s for the UNIVAC I. She also designed the original computer used for the Social Security Administration. In 1949, the Department of Commerce awarded her a Gold Medal for "significant pioneering leadership and outstanding contributions to the scientific progress of the Nation in the functional design and the application of electronic digital computing equipment". Though she retired in 1964, Rhodes continued to consult for the Applied Mathematics Division of the National Bureau of Standards until 1971. Her work became much more widely known after her retirement, as she took the occasion to travel around the globe, lecturing and maintaining international correspondence. In 1976, the Department of Commerce presented her with a further Certificate of Appreciation on the 25th Anniversary of UNIVAC I, and then at the 1981 Computer Conference cited her a third time as a "UNIVAC I pioneer." She died in 1986. In an unusual case of an old specialized algorithm still in use, and still credited to the original developer, in 1977 Rhodes was responsible for the "Jewish Holi
https://en.wikipedia.org/wiki/Averest
Averest is a synchronous programming language and set of tools to specify, verify, and implement reactive systems. It includes a compiler for synchronous programs, a symbolic model checker, and a tool for hardware/software synthesis. It can be used to model and verify finite and infinite state systems, at varied abstraction levels. It is useful for hardware design, modeling communication protocols, concurrent programs, software in embedded systems, and more. Components: compiler to translate synchronous programs to transition systems, symbolic model checker, tool for hardware/software synthesis. These cover large parts of the design flow of reactive systems, from specifying to implementing. Though the tools are part of a common framework, they are mostly independent of each other, and can be used with 3rd-party tools. See also Synchronous programming language Esterel External links Averest Toolbox Official home site Embedded Systems Group Research group that develops the Averest Toolbox Synchronous programming languages Hardware description languages
https://en.wikipedia.org/wiki/List%20of%20unit%20testing%20frameworks
Code-driven unit testing frameworks for various programming languages are as follows. Some, but not all, are based on xUnit. Columns (classification) Name: This column contains the name of the framework and will usually link to it. xUnit: This column indicates whether a framework should be considered of xUnit type. TAP: This column indicates whether a framework can emit TAP output for TAP-compliant testing harnesses. SubUnit: This column indicates whether a framework can emit SubUnit output. Generators: Indicates whether a framework supports data generators. Data generators generate input data for a test and the test is run for each input data that the generator produces. Fixtures: Indicates whether a framework supports test-local fixtures. Test-local fixtures ensure a specified environment for a single test. Group fixtures: Indicates whether a framework supports group fixtures. Group fixtures ensure a specified environment for a whole group of Tests MPI: Indicates whether a framework supports message passing via MPI - commonly used for high-performance scientific computing. Other columns: These columns indicate whether a specific language / tool feature is available / used by a framework. Remarks: Any remarks. Languages ABAP ActionScript / Adobe Flex Ada AppleScript ASCET ASP Bash BPEL C C# See .NET programming languages below. C++ Cg CFML (ColdFusion) Clojure Cobol Common Lisp Crystal Curl DataFlex Delphi Emacs Lisp Erlang Fortran F# Go Groovy All entries under Java may also be used in Groovy. Haskell Haxe HLSL Igor Pro ITT IDL Internet Java JavaScript Lasso LaTeX LabVIEW LISP Logtalk Lua MATLAB .NET programming languages Objective-C OCaml Object Pascal (Free Pascal) PegaRULES Process Commander Perl PHP PowerBuilder PowerShell Progress 4GL Prolog Puppet Python R programming language Racket REALbasic Rebol RPG Ruby SAS Scala Scilab Scheme Shell Simulink Smalltalk SQL and Database Procedural Languages SQL MySQL PL/SQL IBM DB2 SQL-PL PostgreSQL Transact-SQL Swift SystemVerilog TargetLink Tcl TinyOS/nesC TypeScript VHDL Visual FoxPro Visual Basic (VB6.0) For unit testing frameworks for VB.NET, see the .NET programming languages section. Visual Lisp Xojo XML XSLT Other See also List of GUI testing tools Unit testing in general: Unit testing Software testing Mock object Extreme programming approach to unit testing: xUnit Test-driven development (TDD) Behavior-driven development (BDD) Extreme programming References
https://en.wikipedia.org/wiki/WTJR
WTJR (channel 16) is a religious television station in Quincy, Illinois, United States, owned and operated by the Christian Television Network (CTN). The station's studios are located on North Sixth Street in downtown Quincy, and its transmitter is located on Cannonball Road northeast of the city. WTJR offers 24-hour religious programming, much of which is produced either locally or at the CTN home base in Clearwater, Florida. CTN acquired WLCF from another religious broadcaster, locally based Believers Broadcasting Corporation, in May 2006. Technical information Subchannels The station's digital signal is multiplexed: Analog-to-digital conversion WTJR shut down its analog signal, over UHF channel 16, on January 20, 2009. The station's digital signal remained on its pre-transition UHF channel 32. Through the use of PSIP, digital television receivers display the station's virtual channel as its former UHF analog channel 16. References External links WTJR Television stations in the Quincy–Hannibal area Television channels and stations established in 1986 1986 establishments in Illinois Christian Television Network affiliates
https://en.wikipedia.org/wiki/DVM
DVM may refer to: Dalvik virtual machine, formerly used in the Android operating system Diel vertical migration, a pattern of movement used by some organisms Digital voltmeter, a type of voltmeter used for measuring electrical potential difference Doctor of Veterinary Medicine, a degree received by veterinary physicians as part of their education
https://en.wikipedia.org/wiki/JSON-RPC
JSON-RPC is a remote procedure call protocol encoded in JSON. It is similar to the XML-RPC protocol, defining only a few data types and commands. JSON-RPC allows for notifications (data sent to the server that does not require a response) and for multiple calls to be sent to the server which may be answered asynchronously. History Usage JSON-RPC works by sending a request to a server implementing this protocol. The client in that case is typically software intending to call a single method of a remote system. Multiple input parameters can be passed to the remote method as an array or object, whereas the method itself can return multiple output data as well. (This depends on the implemented version.) All transfer types are single objects, serialized using JSON. A request is a call to a specific method provided by a remote system. It can contain three members: method - A String with the name of the method to be invoked. Method names that begin with "rpc." are reserved for rpc-internal methods. params - An Object or Array of values to be passed as parameters to the defined method. This member may be omitted. id - A string or non-fractional number used to match the response with the request that it is replying to. This member may be omitted if no response should be returned. The receiver of the request must reply with a valid response to all received requests. A response can contain the members mentioned below. result - The data returned by the invoked method. If an error occurred while invoking the method, this member must not exist. error - An error object if there was an error invoking the method, otherwise this member must not exist. The object must contain members code (integer) and message (string). An optional data member can contain further server-specific data. There are pre-defined error codes which follow those defined for XML-RPC. id - The id of the request it is responding to. Since there are situations where no response is needed or even desired, notifications were introduced. A notification is similar to a request except for the id, which is not needed because no response will be returned. In this case the id property should be omitted (Version 2.0) or be null (Version 1.0). Examples In these examples, --> denotes data sent to a service (request), while <-- denotes data coming from a service. Although <-- is often called a response in client–server computing, depending on the JSON-RPC version it does not necessarily imply an answer to a request. Version 2.0 Request and response: --> {"jsonrpc": "2.0", "method": "subtract", "params": {"minuend": 42, "subtrahend": 23}, "id": 3} <-- {"jsonrpc": "2.0", "result": 19, "id": 3} Notification (no response): --> {"jsonrpc": "2.0", "method": "update", "params": [1,2,3,4,5]} Version 1.1 (Working Draft) Request and response: --> {"version": "1.1", "method": "confirmFruitPurchase", "params": [["apple", "orange", "mangoes"], 1.123], "id": "194521489"} <-- {"version": "1.1", "resul
https://en.wikipedia.org/wiki/Linux%20kernel%20interfaces
The Linux kernel provides multiple interfaces to user-space applications that are used for varying purposes and that have varying properties by design. There are two types of application programming interface (API) in the Linux kernel the "kernel–user space" API; and the "kernel internal" API. Linux API The Linux API is the kernel–user space API, which allows programs in user space to access system resources and services of the Linux kernel. It is composed out of the System Call Interface of the Linux kernel and the subroutines in the GNU C Library (glibc). The focus of the development of the Linux API has been to provide the usable features of the specifications defined in POSIX in a way which is reasonably compatible, robust and performant, and to provide additional useful features not defined in POSIX, just as the kernel–user space APIs of other systems implementing the POSIX API also provide additional features not defined in POSIX. The Linux API, by choice, has been kept stable over the decades through a policy of not introducing breaking changes; this stability guarantees the portability of source code. At the same time, Linux kernel developers have historically been conservative and meticulous about introducing new system calls. Much available free and open-source software is written for the POSIX API. Since so much more development flows into the Linux kernel as compared to the other POSIX-compliant combinations of kernel and C standard library, the Linux kernel and its API have been augmented with additional features. As far as these additional features provide a technical advantage, programming for the Linux API is preferred over the POSIX-API. Well-known current examples are udev, systemd and Weston. People such as Lennart Poettering openly advocate to prefer the Linux API over the POSIX API, where this offers advantages. At FOSDEM 2016, Michael Kerrisk explained some of the perceived issues with the Linux kernel's user-space API, describing that it contains multiple design errors by being non-extensible, unmaintainable, overly complex, of limited purpose, in violation of standards, and inconsistent. Most of those mistakes cannot be fixed because doing so would break the ABI that the kernel presents to the user space. System Call Interface of the Linux kernel System Call Interface is the denomination for the entirety of all implemented and available system calls in a kernel. Various subsystems, such as the Direct Rendering Manager (DRM), define their own system calls and the entirety is called System Call Interface. Various issues with the organization of the Linux kernel system calls are being publicly discussed. Issues have been pointed out by Andy Lutomirski, Michael Kerrisk and others. The C standard library A C standard library is a wrapper around the system calls of the Linux kernel; the combination of the Linux kernel System Call Interface and a C standard library is what builds the Linux API. Some popular impleme
https://en.wikipedia.org/wiki/Global%20Ideas%20Bank
The Global Ideas Bank's origins lie in the Institute for Social Inventions, which was set up in 1985 by Nicholas Albery, social inventor and visionary. From small beginnings (a network of inventors, a quarterly newsletter), the Institute grew into a full-fledged organisation under his leadership: producing an annual compendium, running social inventions workshops and promoting creative solutions around the world. It was part of the first European Social Innovations Exchange. In 2001, the institute was awarded a Margaret Mead Special Recognition Award for "community creativity for a new century" In 1995, the Global Ideas Bank (originally suggested by an American correspondent, Gregory Wright) was first established online, and has since become the name for the entire project's work. Through the work of several volunteer programmers and technical wizards (especially Flemming Funch of the New Civilization Network), new features were added: online submission, voting systems, categorisation, a message board, and so on. See also Ideas bank List of UK think tanks External links The Global Ideas Bank Ideas banks Science and technology think tanks based in the United Kingdom
https://en.wikipedia.org/wiki/PC%20Answers
PC Answers was a computer magazine published in the United Kingdom by Future plc. It was notable for its focus on the technical side of computing. It ran several series of articles on overclocking, a "Danger! Don't Try This At Home!" section which reviewed hardware projects such as the Stone Soupercomputer and Tomohiro Kawada's dual Celeron PC. Its "Extreme Customisation" series reviewed alternate shells for Microsoft Windows such as Litestep and desktop enhancements such as Stardock's WindowBlinds. PC Answers was reported to cease publication in September 2010. The title's last issue appeared in October 2010. References External links Official UK site 1994 establishments in the United Kingdom 2010 disestablishments in the United Kingdom Defunct computer magazines published in the United Kingdom Magazines established in 1994 Magazines disestablished in 2010
https://en.wikipedia.org/wiki/Derek%20Burney%20Jr.
Derek Burney is the former president of Corel Corporation. In 1988, at the age of 26, Burney entered the Computer Science program at Carleton University, spending co-op terms at Nortel and Atomic Energy of Canada Limited (AECL). He began his career with Corel as a developer and, with the help of his mentor Michael Cowpland, rose quickly through the ranks, eventually heading the engineering department and becoming President and Chief executive officer following Cowpland's resignation in 2000. After taking the company private with Vector Capital, Burney held the position of Chairman until he resigned to join Microsoft in 2004. Burney is currently corporate vice president of Customer Technical Engagement in Microsoft's Worldwide Commercial Business. Burney's father, Derek Burney Sr., is a noted Canadian businessperson and diplomat. References External links Carleton University alumni profile from 2001 Canadian businesspeople Carleton University alumni Year of birth missing (living people) Living people Corel Nortel people
https://en.wikipedia.org/wiki/Memorex
Memorex Corp. began as a computer tape producer and expanded to become both a consumer media supplier and a major IBM plug compatible peripheral supplier. It was broken up and ceased to exist after 1996 other than as a consumer electronics brand specializing in disk recordable media for CD and DVD drives, flash memory, computer accessories and other electronics. History and evolution Established in 1961 in Silicon Valley, Memorex started by selling computer tapes, then added other media such as disk packs. The company then expanded into disk drives and other peripheral equipment for IBM mainframes. During the 1970s and into the early 1980s, Memorex was worldwide one of the largest independent suppliers of disk drives and communications controllers to users of IBM-compatible mainframes, as well as media for computer uses and consumers. The company's name is a portmanteau of "memory excellence". Memorex entered the consumer media business in 1971 and started the ad campaign, first with its "shattering glass" advertisements and then with a series of legendary television commercials featuring Ella Fitzgerald. In the commercials, she would sing a note that shattered a glass while being recorded to a Memorex audio cassette. The tape was played back and the recording also broke the glass, asking "Is it live, or is it Memorex?" This would become the company slogan which was used in a series of advertisements released through 1970s and 1980s. In 1982, Memorex was bought by Burroughs for its enterprise businesses; the company’s consumer business, a small segment of the company’s revenue at that time was sold to Tandy. Over the next six years, Burroughs and its successor Unisys shut down, sold off or spun out the various remaining parts of Memorex. The computer media, communications and IBM end user sales and service organization were spun out as Memorex International. In 1988, Memorex International acquired the Telex Corporation becoming Memorex Telex NV, a corporation based in the Netherlands, which survived as an entity until the middle 1990s. The company evolved into a provider of information technology solutions including the distribution and integration of data network and storage products and the provision of related services in 18 countries worldwide. As late as 2006, several pieces existed as subsidiaries of other companies, see e.g., Memorex Telex Japan Ltd a subsidiary of Kanematsu or Memorex Telex (UK) Ltd. a subsidiary of EDS Global Field Services. Over time the Memorex consumer brand has been owned by Tandy, Handy Holdings and Imation. As of 2016, the Memorex brand is owned by Digital Products International (DPI). Timeline 1961 – Memorex is founded by Laurence L. Spitters, Arnold T. Challman, Donald F. Eldridge and W Lawrence Noon with Spitters as president. 1962 – Memorex is one of the early independent companies to ship computer tape. May 1965 – Memorex IPO's at $25 and closes at $32. 1966 – Memorex is first independent company to
https://en.wikipedia.org/wiki/John%20Landgraf
John Phillip Landgraf (born May 20, 1962) is the Chairman of FX Networks. He is also a member of the Peabody Awards board of directors, which is presented by the University of Georgia's Henry W. Grady College of Journalism and Mass Communication. Previously he was President and General Manager of FX Network, a position he held since 2005. TV critic Alan Sepinwall jokingly refers to Landgraf as "the Mayor of TV". Early life Landgraf was born in California to father John R. Landgraf, Ph.D., a pastor, and Barbara Landgraf (née Joslin). When he was very young, his parents traveled constantly, performing as backup singers for the gospel evangelist Rev. Mel Dibble, who was part of Billy Graham Crusades. When he was 5 years old, his mother completed an M.A. in social work and his father completed his PhD in family counseling. In 1969, when he was seven years old, his parents divorced. After spending much of his childhood moving, Landgraf spent his high school years in Oakland, California, and graduated from Skyline High in 1980. In 1984, Landgraf received a B.A. in Anthropology from Pitzer College, one of the Claremont Colleges. Career Early career During and after college, Landgraf did an internship, worked in sales and eventually worked on the production side of the video production company J-Nex Media, a Los Angeles company that made commercial and industrial video. In 1988, Landgraf was Director of Development at Sarabande Productions, where he eventually became Senior Vice President. From 1994 to 1999, Landgraf was Vice President of Primetime at NBC where he oversaw the development of The West Wing, and other popular TV shows that included Friends and JAG. Producing Landgraf founded the production company Jersey Television with Danny DeVito, Michael Shamberg and Stacey Sher. Jersey Television was responsible for producing shows like Comedy Central's Reno 911! and Karen Sisco. FX Network In 2004, Landgraf was President of Entertainment of FX Network, responsible for original TV shows that included critically acclaimed shows like The Shield and the Denis Leary-starring show, Rescue Me. In 2005, Landgraf was promoted to President and General Manager of FX Network, a position that oversees the management FX, FX HD, the Fox Movie Channel and FX Prods. In this position Landgraf is responsible for the operations, programming, development, scheduling, and marketing of the TV channels he oversees. In 2013, Landgraf launched FXX. During the 2015 Television Critics Association presentations, Landgraf expressed concern that while television is undergoing a golden age, there is simply too much television. In 2023, Landgraf was put in charge of National Geographic and Onyx Collective programming. Personal life In 1997, Landgraf married actress Ally Walker. They have three sons and live in Santa Monica, California. Landgraf plays the flute. He also sang in a barbershop quartet during his time at Pitzer College. Filmography 1990: Rising Son
https://en.wikipedia.org/wiki/C%20data%20types
In the C programming language, data types constitute the semantics and characteristics of storage of data elements. They are expressed in the language syntax in form of declarations for memory locations or variables. Data types also determine the types of operations or methods of processing of data elements. The C language provides basic arithmetic types, such as integer and real number types, and syntax to build array and compound types. Headers for the C standard library, to be used via include directives, contain definitions of support types, that have additional properties, such as providing storage with an exact size, independent of the language implementation on specific hardware platforms. Basic types Main types The C language provides the four basic arithmetic type specifiers char, int, float and double, and the modifiers signed, unsigned, short, and long. The following table lists the permissible combinations in specifying a large set of storage size-specific declarations. The actual size of the integer types varies by implementation. The standard requires only size relations between the data types and minimum sizes for each data type: The relation requirements are that the long long is not smaller than long, which is not smaller than int, which is not smaller than short. As char's size is always the minimum supported data type, no other data types (except bit-fields) can be smaller. The minimum size for char is 8 bits, the minimum size for short and int is 16 bits, for long it is 32 bits and long long must contain at least 64 bits. The type int should be the integer type that the target processor is most efficiently working with. This allows great flexibility: for example, all types can be 64-bit. However, several different integer width schemes (data models) are popular. Because the data model defines how different programs communicate, a uniform data model is used within a given operating system application interface. In practice, char is usually 8 bits in size and short is usually 16 bits in size (as are their unsigned counterparts). This holds true for platforms as diverse as 1990s SunOS 4 Unix, Microsoft MS-DOS, modern Linux, and Microchip MCC18 for embedded 8-bit PIC microcontrollers. POSIX requires char to be exactly 8 bits in size. Various rules in the C standard make unsigned char the basic type used for arrays suitable to store arbitrary non-bit-field objects: its lack of padding bits and trap representations, the definition of object representation, and the possibility of aliasing. The actual size and behavior of floating-point types also vary by implementation. The only requirement is that long double is not smaller than double, which is not smaller than float. Usually, the 32-bit and 64-bit IEEE 754 binary floating-point formats are used for float and double respectively. The C99 standard includes new real floating-point types float_t and double_t, defined in <math.h>. They correspond to the types used for t
https://en.wikipedia.org/wiki/Temporal%20logic%20of%20actions
Temporal logic of actions (TLA) is a logic developed by Leslie Lamport, which combines temporal logic with a logic of actions. It is used to describe behaviours of concurrent and distributed systems. It is the logic underlying the specification language TLA+. Details Statements in the temporal logic of actions are of the form , where A is an action and t contains a subset of the variables appearing in A. An action is an expression containing primed and non-primed variables, such as . The meaning of the non-primed variables is the variable's value in this state. The meaning of primed variables is the variable's value in the next state. The above expression means the value of x today, plus the value of x tomorrow times the value of y today, equals the value of y tomorrow. The meaning of is that either A is valid now, or the variables appearing in t do not change. This allows for stuttering steps, in which none of the program variables change their values. See also Temporal logic PlusCal TLA+ References External links Temporal logic Concurrency (computer science)
https://en.wikipedia.org/wiki/DATATRIEVE
DATATRIEVE is a database query and report writer tool originally from Digital Equipment Corporation. It runs on the OpenVMS operating system, as well as several PDP-11 operating systems. DATATRIEVE's command structure is nearly plain English, and it is an early example of a Fourth Generation Language (4GL). Overview DATATRIEVE works against flat files, indexed files, and databases. Such data files are delimited using record definitions stored in the Common Data Dictionary (CDD), or in RMS files. DATATRIEVE is used at many OpenVMS installations. History DATATRIEVE was developed in the late 1970s and early 1980s by a team of software engineers at DEC's Central Commercial Engineering facilities in Merrimack and Nashua, New Hampshire, under database architect Jim Starkey. Many of the project's engineers went on to highly visible careers in database management and other software disciplines. Version 1 for the PDP-11 was released in 1977; VAX DATATRIEVE was released in 1981 as part of the VAX Information Architecture. DATATRIEVE adopted the wombat as its notional mascot; the program's help file responded to “HELP WOMBAT” with factual information about real world wombats. Examples of DATATRIEVE usage DATATRIEVE queries and commands approach plain English sentence structure, though would not be considered natural language, since a precise sentence structure must be used: DTR> FOR FAMILIES WITH NUMBER_KIDS = 2 CON> PRINT KID_NAME, AGE OF KIDS WITH AGE GT 20 DATATRIEVE can also be used to modify data: DTR> FOR FAMILIES MODIFY EACH_KID OF FIRST 1 KIDS Enter KID_NAME: DATATRIEVE can also cross multiple datasets, creating joined data views: DTR> PRINT NAME, TYPE, PRICE OF CON> YACHTS CROSS OWNERS OVER TYPE References External links Proprietary database management systems OpenVMS software
https://en.wikipedia.org/wiki/Geometry%20processing
Geometry processing, or mesh processing, is an area of research that uses concepts from applied mathematics, computer science and engineering to design efficient algorithms for the acquisition, reconstruction, analysis, manipulation, simulation and transmission of complex 3D models. As the name implies, many of the concepts, data structures, and algorithms are directly analogous to signal processing and image processing. For example, where image smoothing might convolve an intensity signal with a blur kernel formed using the Laplace operator, geometric smoothing might be achieved by convolving a surface geometry with a blur kernel formed using the Laplace-Beltrami operator. Applications of geometry processing algorithms already cover a wide range of areas from multimedia, entertainment and classical computer-aided design, to biomedical computing, reverse engineering, and scientific computing. Geometry processing is a common research topic at SIGGRAPH, the premier computer graphics academic conference, and the main topic of the annual Symposium on Geometry Processing. Geometry processing as a life cycle Geometry processing involves working with a shape, usually in 2D or 3D, although the shape can live in a space of arbitrary dimensions. The processing of a shape involves three stages, which is known as its life cycle. At its "birth," a shape can be instantiated through one of three methods: a model, a mathematical representation, or a scan. After a shape is born, it can be analyzed and edited repeatedly in a cycle. This usually involves acquiring different measurements, such as the distances between the points of the shape, the smoothness of the shape, or its Euler characteristic. Editing may involve denoising, deforming, or performing rigid transformations. At the final stage of the shape's "life," it is consumed. This can mean it is consumed by a viewer as a rendered asset in a game or movie, for instance. The end of a shape's life can also be defined by a decision about the shape, like whether or not it satisfies some criteria. Or it can even be fabricated in the real world, through a method such as 3D printing or laser cutting. Discrete Representation of a Shape Like any other shape, the shapes used in geometry processing have properties pertaining to their geometry and topology. The geometry of a shape concerns the position of the shape's points in space, tangents, normals, and curvature. It also includes the dimension in which the shape lives (ex. or ). The topology of a shape is a collection of properties that do not change even after smooth transformations have been applied to the shape. It concerns dimensions such as the number of holes and boundaries, as well as the orientability of the shape. One example of a non-orientable shape is the Mobius strip. In computers, everything must be discretized. Shapes in geometry processing are usually represented as triangle meshes, which can be seen as a graph. Each node in the graph is a v
https://en.wikipedia.org/wiki/Storage%20Technology%20Corporation
Storage Technology Corporation (StorageTek or STK, earlier STC) was a data storage technology company headquartered in Louisville, Colorado. New products include data retention systems, which it calls "information lifecycle management" (ILM). Its remaining product line is now part of Oracle Corporation, and marketed as Oracle StorageTek, with a focus on tape backup equipment and software to manage storage systems. History In 1969 four former IBM engineers—Jesse Aweida, Juan Rodriguez, Thomas S. Kavanagh, and Zoltan Herger—founded the Storage Technology Corporation. The headquarters was in Louisville, Boulder County, Colorado. In the 1970s, StorageTek launched its Disk Products division. After a failed attempt to develop an IBM-compatible mainframe, and an optical disk product line, the company filed for Chapter 11 bankruptcy protection in 1984. Starting in 1987, new management invested in an automated tape library product line that "picked" tapes from a silo-like contraption with a robot arm. StorageTek emerged as a dominant player in that market. StorageTek acquired Documation (1980), Aspen Peripherals Corporation (1989), Network Systems Corporation (1995), and Storability (2005). Storage Technology Corporation was officially renamed "StorageTek" in 1983. Sun Microsystems In June 2005, Sun Microsystems, Inc. announced it would purchase StorageTek for US$4.1 billion in cash, or $37.00 per share. In August 2005, the acquisition was completed. Oracle On January 27, 2010, Sun was acquired by Oracle Corporation for US$7.4 billion. The StorageTek product line was renamed "Oracle StorageTek". Products Disk array: ST9990, ST9985, ST6540, ST6140, Iceberg, IBM RVA, SVA, BradeStor, FLX380, FLX280, FLX240, FLX210, D178, 9176, 9153, 9140, 9130 Disk drives: STK 8000 SuperDisk, STK8350, STK8650, STK N2700 Fibre Channel, SAS, RAID and SCSI HBAs. Tape drives: STC 2450, STC 2470, STC 3400, STC 3600, StorageTek 4670, StorageTek 4480, 4490, 9490, SD-3, 9840, T9840B, T9840C, T9840D, T9940, T9940B, T10000A, T10000B, T10000C, T10000D Tape drives (rebranded): LTO, SDLT, DLT Tape libraries: 4400, 9310, 9360, 9710, 9714, 9730, 9740, 9738, L20, L40, L80, L180, L700, L700e, L5500, SL500, SL3000, SL8500, SL150, SL4000 Virtual tape libraries: VSM1, VSM2, VSM3, VSM4, VSM5, VSM6 Printer : StorageTek (Documation) 5000 Product timeline 1970 - StorageTek releases its first product, the 2450/2470 tape drive. 1971 - StorageTek introduces the 3400 tape storage device. 1973 - StorageTek's disk division is founded. 1974 - StorageTek's first 3600 tape drive ships. 1975 - StorageTek ships the first 8000 Super Disk and announces the 8350 disk subsystem. 1978 - StorageTek develops the first solid-state disk. 1984 - StorageTek develops the first intelligent disk. 1986 - StorageTek develops the first cached disk. 1987 - StorageTek develops tape automation and emerges from Chapter 11. 1994 - StorageTek introduces virtual disk, Iceberg. 1998 - StorageTek introduc
https://en.wikipedia.org/wiki/The%20Sex%20Files
The Sex Files is a television program broadcasting on Discovery Channel Canada and was broadcast on CTV network stations after the watershed, due to its highly explicit discussion of the nature of sexuality issues and behavior, from genetics, reproduction, sexual orientation, puberty, etc. As one would expect of a show of its nature, it frequently featured nudity, but portrayed in a scientific manner for visually aid in learning, highly beneficial information on sexuality and the biology behind it. In Europe the show was called Sex Sense and featured a male narrator. The number of episodes and their titles were the same, but the episodes themselves were slightly different as the more explicit scenes were replaced. It aired on Discovery Channel Europe. Starting with episode 41 (season 4), it is broadcast in high-definition. The Sex Files episode list Season 1 The Erection Breasts Orgasm The Birds and the Bees Aphrodisiacs Fantasy The Affair Fetish Gender Hair What is Sexy? Girl Power Birth Control Season 2 Sex Drive The Act The Vagina Sexual Signals Sexual Senses Sex for One Puberty Homosexuality The Rear End Sexual Cycle Love Juices Circumcision Intersexed People Myths Season 3 Testicles Celibacy Behavioral addiction Better Sex Sexual Reconstruction Menopause Future Sex Sex & Culture Sex & Disabilities Sex vs. Love Healing Sex Pregnancy Sexpertise Season 4 Sex Toys Kinky Sex Rated X Beyond Monogamy Pleasure and Pain The Kiss The Strip The Bi Way Baring it All No Sex Please Dirty Jokes Makin' it Work More Kinky Sex Season 5 First Date Sun, Sand and Sex The Boob Tube Top Ten Sexiest Clothes The Love Glove Top Ten Sexy Things Sexercise Top Ten Sexual Fantasies Erotic Origins His Sexy Makeover Her Sexy Makeover The Wedding Making of the Sex Files Season 6 Virginity Marriage Makeover The Brothel Breasts Sex and Beauty Girls on Top Sex and Aging Top Ten Myths Touch Sex and Rock n' Roll Satisfaction Top Ten Archetypes Sextracurricular Activities Sexual Secrets Sexual Secrets uses footage from The Sex Files, with contents rearranged to 1-hour episodes. Sexual Secrets was premiered on Life Network and Discovery Health. Episodes 1-18 use footage from first three seasons of The Sex Files. High-definition episodes are available starting with episode 19, which corresponds to the fourth and later seasons of The Sex Files. Sexual Secrets episode list Pleasure Zones (09/27/2002) Love Potions (10/04/2002) Sex Appeal (09/20/2002)to Sex Drive (09/27/2002) Forbidden Fruit (10/04/2002) The Mating Game (11/21/2003) Love Juices (10/18/2002) Doing It Right (11/01/2002) Love Triangles (11/08/2002) The Body Beautiful (11/08/2002) Sex 101 (04/25/2003) Cheeky Secrets (04/25/2003) Ultimate Sex (04/11/2003) Sex, Lies and Abstinence Constant Cravings (05/02/2003) Designer Sex (05/16/2003) Sexpecting (05/23/2003) Prescription: Sex (05/30/2003) Bi Now, Tri Later Dating
https://en.wikipedia.org/wiki/Fa%C3%A7ade%20%28video%20game%29
Façade is an artificial intelligence-based interactive story created in 2005 by Michael Mateas and Andrew Stern. Upon release, the game received attention from mainstream news publications for its innovative design, and prompted speculation about the potential use of artificial intelligence in video games. Following release, Façade has received a generally positive reception, with praise directed at its technical innovation and wide cultural appeal, particularly in online streaming, and mixed views directed to the verisimilitude of its representation of interpersonal interaction. Gameplay Façade puts the player in the role of a close friend of Trip and Grace, a couple who recently invited the player to their New York City apartment for cocktails. This pleasant gathering, however, is somewhat damaged by the domestic confrontation between Grace and Trip upon the player's entry. Using incorporated language processing software, Façade allows the player to type sentences to "speak" with the couple, either supporting them through their troubles, driving them farther apart, or being thrown out of the apartment. Incorporating elements of both interactivity and drama, Façade uses voice acting and a 3D environment, as well as natural language processing and other artificial intelligence routines, to provide a robust interactive fiction experience. The player can take an active role in the conversation, pushing the topic one way or another, as in an interactive stage-play. These stage-plays are stored as script text files which can be read after the player has finished. Most playthroughs end with either Trip and Grace managing an initial reconciliation and telling the player they need to be alone, or being so offended by the player that Trip forcibly removes them from the apartment. However, with active intervention, it is possible to inspire the two to rediscover their love for one another, or to push one to leave the other – sometimes admitting a past affair, one of many events decided at random when play begins. Because much of it is designed to simulate 'on-the-fly' reactions to the player's or other characters' actions, and because the scenario features a random series of events (such as what conversational topics are brought up, what drinks Trip wants to serve, etc.) it possesses a certain amount of replay value. The parser through which the player communicates to the actors is also notable for its ability to recognize and accept a large number of complex commands and respond to them adequately. Many questions can be fully parsed by the engine and the actors can respond in a variety of ways dependent on their mood, random fluctuations, and the player's past actions. For example, in one scenario, Grace may respond favorably to the statement 'I love your decorations.', while in another context she may believe the player is being condescending to her. Although not every statement made by the player will be successfully parsed, often the engine will
https://en.wikipedia.org/wiki/Procedural%20generation
In computing, procedural generation (sometimes shortened as proc-gen) is a method of creating data algorithmically as opposed to manually, typically through a combination of human-generated content and algorithms coupled with computer-generated randomness and processing power. In computer graphics, it is commonly used to create textures and 3D models. In video games, it is used to automatically create large amounts of content in a game. Depending on the implementation, advantages of procedural generation can include smaller file sizes, larger amounts of content, and randomness for less predictable gameplay. Procedural generation is a branch of media synthesis. Overview The term procedural refers to the process that computes a particular function. Fractals are geometric patterns which can often be generated procedurally. Commonplace procedural content includes textures and meshes. Sound is often also procedurally generated, and has applications in both speech synthesis as well as music. It has been used to create compositions in various genres of electronic music by artists such as Brian Eno who popularized the term "generative music". While software developers have applied procedural generation techniques for years, few products have employed this approach extensively. Procedurally generated elements have appeared in earlier video games: The Elder Scrolls II: Daggerfall takes place in a mostly procedurally generated world, giving a world roughly two thirds the actual size of the British Isles. Soldier of Fortune from Raven Software uses simple routines to detail enemy models, while its sequel featured a randomly generated level mode. Avalanche Studios employed procedural generation to create a large and varied group of detailed tropical islands for Just Cause. No Man's Sky, a game developed by games studio Hello Games, is all based upon procedurally generated elements. The modern demoscene uses procedural generation to package a great deal of audiovisual content into relatively small programs. New methods and applications are presented annually in conferences such as the IEEE Conference on Computational Intelligence and Games and the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment. Particularly in the application of procedural generation with video games, which are intended to be highly replayable, there are concerns that procedural systems can generate infinite numbers of worlds to explore, but without sufficient human guidance and rules to guide these. The result has been called "procedural oatmeal", a term coined by writer Kate Compton, in that while it is possible to mathematically generate thousands of bowls of oatmeal with procedural generation, they will be perceived to be the same by the user, and lack the notion of perceived uniqueness that a procedural system should aim for. Contemporary application Tabletop role-playing games Using procedural generation in games had origins in the tabletop role
https://en.wikipedia.org/wiki/Mark%20Zbikowski
Mark "Zibo" Joseph Zbikowski (born March 21, 1956) is a former Microsoft Architect and an early computer hacker. He started working at the company only a few years after its inception, leading efforts in MS-DOS, OS/2, Cairo and Windows NT. In 2006, he was honored for 25 years of service with the company, the third employee to reach this milestone, after Bill Gates and Steve Ballmer. He retired the same year from Microsoft. He was the designer of the MS-DOS executable file format, and the headers of that file format start with his initials: the ASCII characters 'MZ' (0x4D, 0x5A). Early years Zbikowski was born in Detroit, Michigan, in 1956. While attending The Roeper School (then known as Roeper City And Country School) from 1961 to 1974, he developed an interest in mathematics and computers. His 8th-grade performance in the Michigan Mathematics Prize Competition led to an invitation in an NSF-funded summer program at Oakland University where he became friends with Microsoft's Steve Ballmer and Jeff Sachs. He later finished second in the MMPC twice in 1972-73 and 1973-74. Zbikowski pursued computer science at Harvard (A.B. 1978) and at Yale (S.M. 1979). He was active in both universities' Gilbert and Sullivan performing groups. Career Microsoft Ballmer recruited Zbikowski, who joined Microsoft in 1981. In March 1982, he replaced Tim Paterson as development lead and manager for Microsoft's MS-DOS 2.0, a position he held through DOS 4.0. His first major contributions were the addition of hierarchical directory structure to DOS 2.0 and installable device drivers which later led to Plug and Play in Windows. From March 1985 until 1991, he was on the architecture team for OS/2, development manager for file systems and device drivers, and technical advisor to Paul Maritz. The breakthrough concept of Installable File System in OS/2 is attributed to him. Microsoft and IBM Following the demise of the Microsoft/IBM joint development agreement, he was an architect, development manager and key contributor to Cairo, working for Jim Allchin and, later, Anthony Short. This led to Cairo's Object File System and content index efforts. In 1996, as Cairo migrated from being a standalone product to a technology source, Zbikowski worked under Lou Perazzoli on the Windows NT kernel, focusing on performance and size, before becoming architect and development manager for NT file systems in 1998. Others In 2001, Zbikowski was a candidate for director of the Harvard Alumni Association. Zbikowski retired from Microsoft in June 2006. Due to his interest in education, he became affiliated, in 2007, with the University of Washington as a lecturer in the Computer Science and Engineering department in the College of Engineering. Zbikowski returned to work at Ivy Softworks and Atlas Informatics (2014-2017) as CTO and then at Valve Corporation (2017-2019), retiring again in December 2019. He presently is Technology Advisor to Polyverse. Mark Zbikowski is or has been
https://en.wikipedia.org/wiki/Z2%20%28computer%29
The Z2 was an electromechanical (mechanical and relay-based) digital computer that was completed by Konrad Zuse in 1940. It was an improvement on the Z1 Zuse built in his parents' home, which used the same mechanical memory. In the Z2, he replaced the arithmetic and control logic with 600 electrical relay circuits, weighing over 600 pounds. The Z2 could read 64 words from punch cards. Photographs and plans for the Z2 were destroyed by the Allied bombing during World War II. In contrast to the Z1, the Z2 used 16-bit fixed-point arithmetic instead of 22-bit floating point. Zuse presented the Z2 in 1940 to members of the DVL (today DLR) and member , whose support helped fund the successor model Z3. Specifications See also Z1 Z3 Z4 References Further reading External links Z2 via Horst Zuse (son) web page Electro-mechanical computers Z02 Mechanical computers Computer-related introductions in 1940 Konrad Zuse German inventions of the Nazi period 1940s computers Computers designed in Germany
https://en.wikipedia.org/wiki/Seattle%20Underground
The Seattle Underground is a network of underground passageways and basements in the Pioneer Square neighborhood of Seattle, Washington, United States. They were located at ground level when the city was built in the mid-19th century but fell into disuse after the streets were elevated. In recent decades, they have become a tourist attraction, with guided tours taking place around the area. History After the Great Seattle Fire of June 6, 1889, new construction was required to be of masonry, and the town's streets were regraded one to two stories higher. Pioneer Square had originally been built mostly on filled-in tidelands and often flooded. The new street level also kept sewers draining into Elliott Bay from backing up at high tide. For the regrade, the streets were lined with concrete walls that formed narrow alleyways between the walls and the buildings on both sides of the street, with a wide "alley" where the street was. The naturally steep hillsides were used and, through a series of sluices, material was washed into the wide "alleys", by raising the streets to the desired new level, generally higher than before, in some places nearly . At first, pedestrians climbed ladders to go between street level and the sidewalks in front of the building entrances. Brick archways were constructed next to the road surface, above the submerged sidewalks. Vault lights (a form of walk-on skylight with small panes of clear glass which later became amethyst-colored) were installed over the gap from the raised street and the building, creating the area now called the Seattle Underground. When they reconstructed their buildings, merchants and landlords knew that the ground floor would eventually be underground and the next floor up would be the new ground floor, so there is very little decoration on the doors and windows of the original ground floor, but extensive decoration on the new ground floor. Once the new sidewalks were complete, building owners moved their businesses to the new ground floor, although merchants carried on business in the lowest floors of buildings that survived the fire, and pedestrians continued to use the underground sidewalks lit by the vault lights (still seen on some streets) embedded in the grade-level sidewalk above. In 1907, the city condemned the Underground for fear of bubonic plague, two years before the 1909 World Fair in Seattle (Alaska-Yukon-Pacific Exposition). The basements were left to deteriorate or were used as storage. Some became illegal flophouses for the homeless, gambling halls, speakeasies, and opium dens. Tours Only a small portion of the Seattle Underground has been restored and made safe and accessible to the public on guided tours. In 1965, local citizen Bill Speidel formally created "Bill Speidel's Underground Tour", which continues to operate from the Pioneer Building and adjacent buildings. The tour route passes disused storefronts, artifacts, and multiple tunnel entrances. A second tour, Benea
https://en.wikipedia.org/wiki/Labyrinth%3A%20The%20Computer%20Game
Labyrinth: The Computer Game is a 1986 graphic adventure game developed by Lucasfilm Games and published by Activision. Based on the fantasy film Labyrinth, it tasks the player with navigating a maze while solving puzzles and evading dangers. The player's goal is to find and defeat the main antagonist, Jareth, within 13 real-time hours. Unlike other adventure games of the period, Labyrinth does not feature a command-line interface. Instead, the player uses two scrolling "word wheel" menus on the screen to construct basic sentences. Labyrinth was the first adventure game created by Lucasfilm. The project was led by designer David Fox, who invented its word wheels to avoid the text parsers and syntax guessing typical of text-based adventure games. Early in development, the team collaborated with author Douglas Adams in a week-long series of brainstorming sessions, which inspired much of the final product. Labyrinth received positive reviews and, in the United States, was a bigger commercial success than the film upon which it was based. Its design influenced Lucasfilm's subsequent adventure title, the critically acclaimed Maniac Mansion. This game is entirely different from another game based on the same movie entitled "Labyrinth: Maō no Meikyū" ("Maze of the Goblin King"), released exclusively in Japan for the Famicom and MSX in 1987, developed by Atlus and published by Tokuma Shoten. Overview Labyrinth: The Computer Game is a graphic adventure game in which the player maneuvers a character through a maze while solving puzzles and evading dangers. It is an adaptation of the 1986 film Labyrinth, many of whose events and characters are reproduced in the game. However, it does not follow the plot of the film. At the beginning, the player enters their name, sex and favorite color: the last two fields determine the appearance of the player character. Afterward, a short text-based adventure sequence unfolds, wherein the player enters a movie theater to watch the film Labyrinth. The game then changes to a graphic adventure format. Jareth, the main antagonist, appears on the projection screen and transports the protagonist to a labyrinthine prison. The player's goal is to locate and destroy Jareth within 13 real-time hours; otherwise, the protagonist will be trapped in the maze forever. While traveling the maze, the player passes through a series of scrolling hallways that contain doors, enemies and other things. A "radar" bar on the screen allows the player to see each hallway in miniature form: the locations of all doorways, items and characters in a given hallway are displayed. Unlike other adventure games of the period, Labyrinth does not feature a command-line interface. Instead of typing commands, the player selects them from two scrolling "word wheels", one for verbs and one for nouns. For example, the verb "congratulate" may be selected in one wheel, and the noun "Jareth" in the other: this inputs the command "congratulate Jareth". Based on t
https://en.wikipedia.org/wiki/SRM%20firmware
The SRM firmware (also called the SRM console) is the boot firmware written by Digital Equipment Corporation (DEC) for computer systems based on the DEC Alpha microprocessor. SRM are the initials of (Alpha) System Reference Manual, the publication detailing the Alpha AXP architecture and which specified various features of the SRM firmware. The SRM console was initially designed to boot DEC's OSF/1 AXP (later called Digital UNIX and finally Tru64 UNIX) and OpenVMS operating systems, although various other operating systems (such as Linux, NetBSD, OpenBSD, and FreeBSD, for example) were also written to boot from the SRM console. The third proprietary operating system published for the Alpha AXP architecture – Microsoft Windows NT – did not boot from SRM; instead, Windows booted from the ARC (multi platform "Advanced RISC Computing") boot firmware. (ARC is also known as AlphaBIOS.) On many Alpha computer systems – for example, the Digital Personal Workstation – both SRM and ARC could be loaded onto the EEPROM which held the boot firmware. However, on some smaller systems (or large systems which were never intended to boot Windows), only one of the two boot firmware variants could fit onto the EEPROM at one time. For example, the flash EEPROM of certain models of the DEC Multia, which was a small, personal Alpha AXP workstation designed to run Windows NT, was only large enough to hold a single firmware. The SRM console is capable of display on either a graphical adapter (such as a PCI VGA card) or, if no graphical console and/or local keyboard is detected, on a serial connection to a VT100-compatible terminal. In this way the SRM console is similar to the Open Firmware used in SPARC and Apple PowerMac computers, for example. Upon system initialization, an Alpha AXP computer set to boot from the SRM console displays a short report of the software version of the firmware, and presents the "three chevron prompt" consisting of three greater-than signs: Digital Personal WorkStation 433au Console V7.2-1 Mar 6 2000 14:47:02 >>> Several commands are available by typing them at the prompt, and a list of possible commands is available by entering the command help or man at the prompt. Various system variables for establishing automatic boot settings, parameter strings to be passed to an operating system and the like may also be set from the SRM prompt. The SRM firmware contains drivers for booting from boot media including SCSI hard disks and CD-ROM drives attached to a supported SCSI adapter, various IDE ATA and ATAPI devices, and network booting via BOOTP or DHCP is possible with supported network adapters. When an appropriate disk boot device is available, the SRM console locates and loads the target primary bootstrap image using information written in the target disk boot block; in logical block zero. The boot block contains the disk location and block size of the target primary bootstrap image file, and SRM will load that into memory
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20871
U 871 is a 12th-century runestone in the Rundata catalog, originally from Ölsta, a village in the county of Uppland in Sweden. It is now on display at Skansen, near Stockholm. Description It is believed that this stone remained in its original place until 1896. The spot was close to the Eriksgata, the road that the Swedish king travelled after having been elected at the Stone of Mora, in order to be accepted by his subjects. The stone was sold for 50 Swedish kronor in 1896 to the founder of Skansen, Artur Hazelius, where it was moved. It remains at Skansen to this day. The inscription is classified as being carved in runestone style Pr4, which is also known as the Urnes style. This runestone style is characterized by slim and stylized lindworms that are interwoven into tight patterns. The animal heads are typically seen in profile with slender, almond-shaped eyes and upwardly curled appendages on the noses and the necks. The inscription is signed by the runemaster Åsmund Kåresson, who was active during the first half of the 11th century in Uppland. Over twenty other inscriptions are listed in Rundata as being signed by Åsmund including U 301 in Skånela, the now-lost U 346 in Frösunda, U 356 in Ängby, the now-lost U 368 in Helgåby, U 824 in Holm, U 847 in Västeråker, U 859 in Måsta, U 884 in Ingla, U 932 at Uppsala Cathedral, U 956 in Vedyxa, U 969 in Bolsta, the now-lost U 986 in Kungsgården, U 998 in Skällerö, U 1142 in Åbyggeby, U 1144 in Tierp, U 1149 in Fleräng, U Fv1986;84 in Bo gård, U Fv1988;241 in Rosersberg, Gs 11 in Järvsta, Gs 12 in Lund, and Gs 13 in Söderby. Åsmund signed with the statement en Asmundr hio or "and Ásmundr cut", words that he also used on U 969. In 1991, the Swedish Rune Authority had the stone colorized as an experiment to see how well it would protect the stone from moss and the weather. It is believed that the colorization will protect this stone for at least 50 years to come. Transliteration of runic text into Latin letters binrn ' auþulfr ' (k)unor ' hulmtis ' ---u ri-o stin þino ' iftiʀ ' ulf ' kinlauhaʀ buanta ' in osmuntr hiu Transliteration into runic Swedish Biorn, Auðulfʀ, Gunnarr, Holmdis [let]u re[tt]a stæin þenna æftiʀ Ulf, Ginnlaugaʀ boanda. En Asmundr hio. Translation into English Björn, Ödulv, Gunnar, Holmdis had this stone erected after Ulv, Ginnlög's husband. And Åsmund cut. Gallery References External links Photograph of U 871 in 1991 - Swedish National Heritage Board Uppland Runic Inscription 0871
https://en.wikipedia.org/wiki/Scalable%20Linear%20Recording
Scalable Linear Recording is the name used by Tandberg Data for its line of QIC based tape drives. The earliest SLR drive, the SLR1, has a capacity of 250 MB, while the latest drive, the SLR140, has a capacity of 70 GB. The term SLR is often used to refer to QIC tapes, as for many years they were the only drives that used them before Tandberg discontinued production around 2015. Generations Quarter inch formats NOTE: MLR stands for Multi-channel Linear Recording. Eight millimeter formats External links SLR5 specsheet SLR7 specsheet SLR24 specsheet SLR32 specsheet SLR40 specsheet SLR50 specsheet SLR60 specsheet SLR75 specsheet SLR100 specsheet SLR140 specsheet Tandberg
https://en.wikipedia.org/wiki/Cube%20mapping
In computer graphics, cube mapping is a method of environment mapping that uses the six faces of a cube as the map shape. The environment is projected onto the sides of a cube and stored as six square textures, or unfolded into six regions of a single texture. The cube map is generated by first rendering the scene six times from a viewpoint, with the views defined by a 90 degree view frustum representing each cube face. Or if the environment is first considered to be projected onto a sphere, then each face of the cube is its gnomonic projection. In the majority of cases, cube mapping is preferred over the older method of sphere mapping because it eliminates many of the problems that are inherent in sphere mapping such as image distortion, viewpoint dependency, and computational inefficiency. Also, cube mapping provides a much larger capacity to support real-time rendering of reflections relative to sphere mapping because the combination of inefficiency and viewpoint dependency severely limits the ability of sphere mapping to be applied when there is a consistently changing viewpoint. Variants of cube mapping are also commonly used in 360 video projection. History Cube mapping was first proposed in 1986 by Ned Greene in his paper “Environment Mapping and Other Applications of World Projections”, ten years after environment mapping was first put forward by Jim Blinn and Martin Newell. However, hardware limitations on the ability to access six texture images simultaneously made it infeasible to implement cube mapping without further technological developments. This problem was remedied in 1999 with the release of the Nvidia GeForce 256. Nvidia touted cube mapping in hardware as “a breakthrough image quality feature of GeForce 256 that ... will allow developers to create accurate, real-time reflections. Accelerated in hardware, cube environment mapping will free up the creativity of developers to use reflections and specular lighting effects to create interesting, immersive environments.” Today, cube mapping is still used in a variety of graphical applications as a favored method of environment mapping. Advantages Cube mapping is preferred over other methods of environment mapping because of its relative simplicity. Also, cube mapping produces results that are similar to those obtained by ray tracing, but is much more computationally efficient – the moderate reduction in quality is compensated for by large gains in efficiency. Predating cube mapping, sphere mapping has many inherent flaws that made it impractical for most applications. Sphere mapping is view-dependent, meaning that a different texture is necessary for each viewpoint. Therefore, in applications where the viewpoint is mobile, it would be necessary to dynamically generate a new sphere mapping for each new viewpoint (or, to pre-generate a mapping for every viewpoint). Also, a texture mapped onto a sphere's surface must be stretched and compressed, and warping and distortion (parti
https://en.wikipedia.org/wiki/Native%20capacity
In computing, Native capacity refers to the uncompressed storage capacity of any medium that is usually spoken of in compressed sizes. For example, tape cartridges are rated in compressed capacity, which usually assumes 2:1 compression ratio over the native capacity. References Computer storage media
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%2035
This memorial runestone, listed as U 35 under Rundata, is located in Svartsjö, Uppland, Sweden, and dates from the Viking Age. Description The inscription on this granite runestone, which is three meters in height, has two fanged beasts surrounded by a runic serpent text band. The name of the runemaster is unknown, and the stone is classified as being in runestone style Pr2, which is also known as the Ringerike style. The name Adils or Aðísl from the runic text appears to have been a rather rare name, during both the Viking Age and the Middle Ages. It does not appear in any other Swedish runic inscription. The name does appear in Ynglingatal, Norse sagas, and Beowulf as belonging to a Swedish king during the sixth century named Eadgils. It also appears on one of the Manx Runestones, Kirk Michael MM 130. The runic text states that the stone is a memorial by three sons to their father Vigisl, who is described as being the husband of Ärnfrids. By referring to her in this manner, the text is probably indicating that she was also deceased when the stone was raised. Inscription A transliteration of the runic text into Latin letters is: aþisl : auk : ays- : auk : ---fr : þaiʀ : litu : raisa : stain : þinsa : at : uikisl : faþur : sin : boanta : irfriþaʀ Photographs References Uppland Runic Inscription 0035
https://en.wikipedia.org/wiki/Class%20browser
A class browser is a feature of an integrated development environment (IDE) that allows the programmer to browse, navigate, or visualize the structure of object-oriented programming code. History Most modern class browsers owe their origins to Smalltalk, one of the earliest object-oriented languages and development environments. The typical Smalltalk "five-pane" browser is a series of horizontally-abutting selection panes positioned above an editing pane, the selection panes allow the user to specify first a category and then a class, and further to refine the selection to indicate a specific class- or instance-method the implementation of which is presented in the editing pane for inspection or modification. Most succeeding object-oriented languages differed from Smalltalk in that they were compiled and executed in a discrete runtime environment, rather than being dynamically integrated into a monolithic system like the early Smalltalk environments. Nevertheless, the concept of a table-like or graphic browser to navigate a class hierarchy caught on. With the popularity of C++ starting in the late-1980s, modern IDEs added class browsers, at first to simply navigate class hierarchies, and later to aid in the creation of new classes. With the introduction of Java in the mid-1990s class browsers became an expected part of any graphic development environment. In modern IDEs All major development environments supply some manner of class browser, including Apple Xcode for macOS Cincom Smalltalk CodeWarrior for Microsoft Windows, classic Mac OS, and embedded systems Dolphin Smalltalk Eclipse Embarcadero Delphi Embarcadero JBuilder IBM WebSphere IntelliJ IDEA KDevelop Microsoft Visual Studio NetBeans Pharo Smalltalk Red Gate .NET Reflector Smalltalk MT Squeak Smalltalk Step Ahead Javelin Strongtalk Visual Prolog Visual Smalltalk Enterprise Zeus for Windows IDE Modern class browsers fall into three general categories: the columnar browsers, the outline browsers, and the diagram browsers. Columnar browsers Continuing the Smalltalk tradition, columnar browsers display the class hierarchy from left to right in a series of columns. Often the rightmost column is reserved for the instance methods or variables of the leaf class. Outline browsers Systems with roots in Microsoft Windows tend to use an outline-form browser, often with colorful (if cryptic) icons to denote classes and their attributes. Diagram browsers In the early years of the 21st century class browsers began to morph into modeling tools, where programmers could not only visualize their class hierarchy as a diagram, but also add classes to their code by adding them to the diagram. Most of these visualization systems have been based on some form of the Unified Modeling Language (UML). Refactoring class browsers As development environments add refactoring features, many of these features have been implemented in the class browser as well as in text editors.
https://en.wikipedia.org/wiki/ABC%20Radio%20Brisbane
ABC Radio Brisbane (callsign: 4QR) is an ABC Local Radio station in Brisbane, Queensland. It is one of the largest stations in the network, serving as a base for Queensland programming – many programs are broadcast across the ABC Local Radio network in regional and rural areas of Queensland when those stations are not carrying local programming. General history Radio broadcasting began in Brisbane in 1925 when the Government of Queensland commenced its own broadcasting operations with the callsign 4QG – 4 denoted the state of Queensland; QG stood for Queensland Government. 4QG became a part of the ABC's radio network at its inception in 1932. The ABC started a second Brisbane station on 7 January 1938, using the callsign 4QR. The new station carried national programming—the forerunner of Radio National—while 4QG aired mainly local content. On 28 July 1963, the two stations quietly switched schedules, with 4QR becoming the local outlet for Brisbane while 4QG picked up the national schedule. ABC officials wanted to minimise interruptions of regular programming by parliamentary sessions. 4QG now operates under the callsign 4RN, in common with all other Radio National services in Queensland. Until December 2006, ABC Radio Brisbane's studios were located on Coronation Drive in the Brisbane inner-city suburb of Toowong. A number of breast cancer cases at the ABC's Toowong studios led to the permanent evacuation of the entire site in December 2006 with 350 staff, from ABC television, radio and online relocated. For the next five years, the station broadcast from an office building in Lissner Street, Toowong. In January 2012, ABC Radio Brisbane moved to a newly built facility in South Bank. The old site is set to eventually become a three tower residential complex. In September 2006, ABC Radio Brisbane was "host radio broadcaster" for naturalist Steve Irwin's memorial service at Australia Zoo, Beerwah. Breakfast announcers Spencer Howson (from ABC Radio Brisbane) and John Stokes (from the ABC Sunshine Coast station) were chosen to host the broadcast, made available to radio stations around the world. The ABC Brisbane Centre, which was designed by Richard Kirk and built by Leighton Contractors, opened in 2012. Technical history Radio 4QR commenced operation on 7 January 1938. At commencement the station was owned by the Commonwealth of Australia and under the legislation of the day required no licence. The Postmaster-General's Department maintained the transmission system and the station's studios, while the Australian Broadcasting Commission (subsequently Australian Broadcasting Corporation from 1 July 1983) created the programme content to be transmitted. A licence was issued for the first time in 1992 in accordance with the newly legislated Broadcasting Services Act. Initially it operated on a frequency of 940 kHz within the then current 10 kHz channel spacing plan. On 1 September 1948 the station changed frequency to 590 kHz to accord with a
https://en.wikipedia.org/wiki/KCSG
KCSG (channel 8) is a television station licensed to Cedar City, Utah, United States, airing programming from the classic television network MeTV. Owned and operated by network parent Weigel Broadcasting, the station maintains studios on West 1600 South Street in St. George, and its transmitter is located on Cedar Mountain, southeast of Cedar City. KCSG has a network of 11 broadcast translators that extend its over-the-air coverage throughout the state. It is also available on DirecTV, Dish Network, Galaxy 19, and cable systems throughout the geographically large Salt Lake City media market. History KCSG began as KCCZ, with a construction permit issued on June 11, 1984, to Michael Glenn Golden. After several extensions and replacements of expired permits, and transfer of the permit to Liberty Broadcasting Company, the station first signed on the air on April 23, 1990, operating as an independent station; it was licensed by the Federal Communications Commission on June 21, 1990. However, financial difficulties doomed KCCZ and it shut down in November 1992. Liberty Broadcasting filed for Chapter 11 bankruptcy on December 17, 1992, but the filing had to be converted to Chapter 7 bankruptcy on June 22, 1993. On October 20, Seagull Communications Company, whose principals owned KSGI radio (1450 AM, now KSGO, and 99.9 FM, now KONY) in St. George, filed an application to acquire the station out of bankruptcy and on November 12, changed its call letters to KSGI-TV to match the radio stations. The acquisition was approved by the FCC and consummated on February 1, 1994. Seagull Communications returned the station to air the same day, again as an independent station. Almost immediately, the new owners applied to the FCC to build booster stations serving St. George, Utah, and Beaver Dam, Arizona–Mesquite, Nevada, communities cut off from the signal due to the mountainous terrain of those areas. The FCC granted the construction permit for the St. George booster, KSGI1 (later KCSG1), on February 28, 1995, but did not grant a permit for the Beaver Dam booster, KSGI2 (later KCSG2), until January 1998. That station was never built, but the construction permit remained in the FCC database until 2009. In 1997, Seagull Communications sold KSGI-TV to Bonneville Holding Company, a broadcasting company wholly owned by the Church of Jesus Christ of Latter-day Saints. The sale was approved by the FCC on December 10, 1997, and was consummated on April 27, 1998. On February 16, 1998, the station changed its call letters to KXIV, in anticipation of its DTV channel assignment on UHF channel 14, but the FCC adopted the virtual channel standard, whereby digital stations would continue to identify by their analog channel assignment, and on May 15, 1998, the station again changed call letters, this time to KCSG. On August 31, 1998, the station became a charter affiliate of the family-oriented network Pax TV (now Ion Television). In August 2002, KCSG was sold to Broadcast Wes
https://en.wikipedia.org/wiki/Bad%20News%20Baseball
Bad News Baseball, originally released as in Japan, is a baseball game released by Tecmo for the Japanese Family Computer in 1989, and North America in 1990 for the NES. The goal for players is to defeat every other team in the game. Gameplay can continue indefinitely until this occurs. Gameplay The game lacks a season mode. Instead, in the one-player mode the player's goal was to defeat every other team featured in the game in the order of their choosing in a round robin style. Wins and losses were not recorded, and the player could continue playing indefinitely until all other teams were defeated. While this meant that there was no set schedule of games, pitchers did have a stamina rating that once depleted would take several games' worth of rest to recover from. In this way, the game simulated the idea of a pitching rotation. On the initial screen, players can choose to play 1 or 2 player games, as well as spectator mode (CPU vs. CPU), a 1 or 2 player All-Star game, or enter a password. Passwords are given out after every game and record what teams the player has beat, as well as the pitcher's stamina levels. Functionally, the game plays similarly to R.B.I. Baseball, but with a few notable fun exceptions. For example, the umpires are anthropomorphic rabbits, players become unconscious when they are forced out or knocked out by the ball, and there are different, more kid-friendly animations for events such as home runs and close plays at the plate. Similar to the Japanese League, the game will end in a tie after 12 innings. Like in real baseball, typical gameplay includes pinch hitters and pinch runners, stolen bases, four types of pitches and players with different attributes. The game features two leagues, the Ultra (corresponding to National League cities) and the Super (American League cities). Neither the Ultra nor the Super league use the DH rule. At the end of the game each team's game statistics are tracked and the score by innings is displayed. Bad News Baseball has 12 teams, each with imaginary rosters. Each team's roster consisted of 14 batters (8 starters and 6 reserves) as well as 6 pitchers (4 starters and 2 relievers though starters could be used in a relief role and vice versa). The player is able to customize the lineup order and fielding positions as well as choose their desired pitcher. Each player has different abilities based on their ratings which are related but not directly tied to their presented statistics and the teams have different strengths and weaknesses. The teams themselves correspond loosely to actual Major League Baseball teams. For example, the Oakland team has green and yellow uniforms, much like the real-life Oakland Athletics. However, no actual team nicknames are used, and rosters have no resemblance to their MLB counterparts. The game also boasted all-star teams for each of the two leagues, which the player could modify. The game also features the ability to play as girls. In girls mode, the team
https://en.wikipedia.org/wiki/KELO-TV
KELO-TV (channel 11) is a television station in Sioux Falls, South Dakota, United States, affiliated with CBS and MyNetworkTV. The station is owned by Nexstar Media Group, and maintains studios on Phillips Avenue in downtown Sioux Falls; its transmitter is located near Rowena, South Dakota. KELO-TV is broadcast by three high-power semi-satellites—KDLO-TV in Florence (channel 3, serving Watertown), KPLO-TV in Reliance (channel 6, serving Pierre), and KCLO-TV in Rapid City (channel 15). These transmitters and others, together branded as the KELOLAND Media Group, broadcast KELO programs to all of South Dakota, southwestern Minnesota, and northwestern Iowa, an area the station calls "KELOLAND". In the Sioux Falls media market—including central and eastern South Dakota—KELO-TV has long been the dominant television station in ratings and local news coverage. It was the first in South Dakota, beginning broadcasting in May 1953, and was built by Midcontinent Broadcasting, owner of KELO (1320 AM); originally an affiliate of NBC, it switched to CBS in 1957. KDLO-TV and KPLO-TV were built in the mid-1950s, expanding the station's geographic reach, while an expansion to Rapid City took place in the early 1980s. Young Broadcasting acquired the KELO television stations in 1996. Mergers and acquisitions in the 2010s resulted in ownership passing from Young to Media General to Nexstar. History Midcontinent ownership In May 1950, Midcontinent Broadcasting, owner of KELO (1320 AM), filed the first application to the Federal Communications Commission (FCC) for a television station in South Dakota. The application would not be considered for several years, as the FCC was in the midst of a four-year freeze on the grant of new TV station applications, but no opposition was received when the freeze was lifted in April 1952, and KELO-TV received a construction permit on November 20, 1952. Construction proceeded quickly, though a change in the antenna specified required a different type of tower than was originally specified. Renovations were made to the existing KELO radio studios at 8th Street and Phillips Avenue, which had been planned for future television use. KELO-TV began broadcasting on May 20, 1953, after putting on a test pattern the day before; it was a primary affiliate of NBC, matching KELO radio, though it also carried programs from CBS, ABC, and DuMont. There were no television cameras or local studio programs because they were too expensive; it was two years before the station had its own cameras. Power was increased in 1954, extending service to many rural areas outside of Sioux Falls, and the station also became interconnected with network coaxial cable to make live broadcasts possible. Midcontinent partner Joe L. Floyd became nationally recognized for his advertising in trade publications, designed to help KELO radio and television court sponsors and their programs: the ads featured Floyd smoking a cigar with the tagline, "I'm Joe Floyd. I consider
https://en.wikipedia.org/wiki/North%20Luzon%20Expressway
The North Luzon Expressway (NLEX), signed as E1 of the Philippine expressway network, partially as N160 of the Philippine highway network, and R-8 of the Metro Manila arterial road network, is a limited-access toll expressway that connects Metro Manila to the provinces of the Central Luzon region in the Philippines. The expressway, which includes the main segment and its various spurs, has a total length of and travels from its northern terminus at Sta. Ines Interchange to its southern terminus in Balintawak Interchange, which is adjacent to its connection to Skyway, an elevated toll road that connects the NLEX to its counterpart in the south, the South Luzon Expressway. The segment of the expressway between Santa Rita Exit in Guiguinto and the Balintawak Interchange in Quezon City is part of Asian Highway 26 of the Asian highway network. The expressway also serves as a major utility corridor, carrying various high voltage overhead power lines through densely populated areas where acquisition and designation of right of way or power line alignment and lands for their associated structures is impractical. A notable power line using the expressway's right of way for most or part of the route is the Hermosa–Duhat–Balintawak transmission line where it utilizes the alignment or right of way of North Luzon Tollway (NLT) or NLEX Main from San Fernando Exit in San Fernando, Pampanga to Harbor Link Interchange in Valenzuela, Metro Manila, with the power line also represents how close a motorist does to Metro Manila. The North Luzon Expressway was built in the 1960s as part of the government's program to develop areas adjacent to Metro Manila, with NLEX serving the north. The expressway was originally controlled by the Philippine National Construction Corporation (PNCC), until the expressway's operations and maintenance was transferred in February 10, 2005, to the NLEX Corporation, a subsidiary of Metro Pacific Investments Corporation (a former subsidiary of the Lopez Group of Companies until 2008). The expressway was expanded and rehabilitated from 2003 to February 2005, modernizing the road and its facilities. Route description NLEX Main The North Luzon Expressway's main segment, called the North Luzon Tollway (NLT) or NLEX Main, cuts northwards from Quezon City to the provinces in Central Luzon. The expressway begins in Quezon City as a four lane road at the Balintawak Interchange with EDSA as a continuation of A. Bonifacio Avenue. The main segment spans , passing through Caloocan and Valenzuela in Metro Manila and the provinces of Bulacan and Pampanga in Central Luzon. It currently ends in Mabalacat. The NLEX runs parallel to the MacArthur Highway, which is officially known as the Manila North Road. From Balintawak, the NLEX follows a straight north route, with sections lined by billboards. Two service roads run on either sides of the expressway from Balintawak to Barangay Lias, Marilao, albeit discontinuously and one service road on the west
https://en.wikipedia.org/wiki/Reverse%20video
Reverse video (or invert video or inverse video or reverse screen) is a computer display technique whereby the background and text color values are inverted. On older computers, displays were usually designed to display text on a black background by default. For emphasis, the color scheme was swapped to bright background with dark text. Nowadays the two tend to be switched, since most computers today default to white as a background color. The opposite of reverse video is known as true video. Video is usually reversed by inverting the brightness values of the pixels of the involved region of the display. If there are 256 levels of brightness, encoded as 0 to 255, the 255 value becomes 0 and vice versa. A value of 1 becomes 254, 2 of 253, and so on: n is swapped for r - n, for r levels of brightness. This is occasionally called a ones' complement. If the source image is of middle brightness, reverse video can be difficult to see, 127 becomes 128 for example, which is only one level of brightness different. The computer displays where it was most commonly used were monochrome and only displayed two values so this issue seldom arose. Reverse video is commonly used in software programs as a visual aid to highlight a selection that has been made as an aid in preventing description errors, where an intended action is performed on an object that is not the one intended. It is more common in modern desktop environments to change the background to other colors such as blue, or to use a semi-transparent background to "highlight" the selected text. On a terminal understanding ANSI escape sequences, the reverse video function is activated using the escape sequence CSI 7 m (which equals SGR 7). Accessibility Reverse video is also sometimes used for accessibility reasons. When most computer displays were light-on-dark, it was found that users looking back and forth between a white paper and dark screen would experience eyestrain due to their pupils constantly dilating and contracting. Flicker was also an issue with early white-background displays. Today, people with visual impairments such as ocular toxocariasis may find it less tiring to the eyes to work with a predominantly black screen, since modern operating systems usually display a lot of white in a normal use. For the same, white-dominant reason, reverse video is an efficient way to read or write text in a dark environment, since the darkness of the screen may blend into the darkness of the environment. A number of operating systems, graphical programs, and websites offer dark modes, which serves a similar purpose as what was originally true video and is now reverse video in modern systems. References Display technology
https://en.wikipedia.org/wiki/Gecos%20field
The gecos field, or GECOS field is a field in each record in the /etc/passwd file on Unix and similar operating systems. On UNIX, it is the 5th of 7 fields in a record. It is typically used to record general information about the account or its user(s) such as their real name and phone number. Format The typical format for the GECOS field is a comma-delimited list with this order: User's full name (or application name, if the account is for a program) Building and room number or contact person Office telephone number Home telephone number Any other contact information (pager number, fax, external e-mail address, etc.) In most UNIX systems non-root users can change their own information using the chfn or chsh command. History Some early Unix systems at Bell Labs used GECOS machines for print spooling and various other services, so this field was added to carry information on a user's GECOS identity. Other uses On Internet Relay Chat (IRC), the real name field is sometimes referred to as the gecos field. IRC clients are able to supply this field when connecting. Hexchat, an X-Chat fork, defaults to 'realname', TalkSoup.app on GNUstep defaults to 'John Doe', and irssi reads the operating system user's full name, replacing it with 'unknown' if not defined. Some IRC clients use this field for advertising; for example, ZNC defaulted to "Got ZNC?", but changed it to "RealName = " to match its configuration syntax in 2015. See also General Comprehensive Operating System References Unix
https://en.wikipedia.org/wiki/SDD
SDD may refer to: Computing Software Design Description (IEEE 1016–2009), a standard that specifies the form of the document used to specify system architecture and application design in a software-related project Software Design Document, a written outline of the development of a course or a description of a software product Solution Deployment Descriptor, a proposed OASIS standard for software deployment, configuration and maintenance Software Design and Development, an HSC subject in NSW that details the basics of designing and developing software applications Syntax-Directed Definition - a context-free grammar with attributes and rules Finances SDD, for SEPA Direct Debit, a payment system in the Single Euro Payments Area in Europe SDD, ISO code for the Sudanese dinar, the currency of Sudan 1992–2007, now replaced by the Sudanese pound Science Sulfadimidine, an antibiotic whose abbreviations include SDD Silicon drift detector, a p-n junction-based detector for ionizing radiation, such as for X-rays Seasonal deficit disorder, another name for seasonal affective disorder Symmetric diagonally dominant matrix systems in mathematics Selective decontamination of the digestive tract in medicine
https://en.wikipedia.org/wiki/Bishop%20Stopford%27s%20School
Bishop Stopford's School, commonly known as Bishop Stopford's, or (simply) just Bishop's, is a voluntary aided co-educational secondary school specialising in mathematics, computing and engineering, with a sixth form. It is a London Diocesan Church of England school with worship in a relatively High Church Anglo-Catholic tradition. It is in Brick Lane, Enfield, near Enfield Highway, Greater London, England. Overview Bishop Stopford's has about 920 pupils aged 11 to 19. In 2004 the school received an award for mathematics and computing and in 2008 engineering specialist status. Key Stage 3 At Key Stage 3 pupils follow the same subjects for years 7–9. All pupils start to take French in Year 7. GCSE In Year 9 pupils can choose what subjects they wish to take for their GCSEs. All pupils take maths, science, English language, English literature, religious education, and physical education. Sixth form Entry to the Sixth Form is subject to a satisfactory report from the Year 11 Head of House and an interview with the Head of the Sixth Form or other relevant teacher. In the sixth form, pupils again choose what they wish to study. There are two routes which they may take. Pupils may take a 1-year BTEC course in either OCR business studies or BTEC art and design, or AS/A2 levels. The conditions for taking AS/A2 Levels are: a minimum of 5 A* to C grades at GCSE level in a suitable combination of subjects, and C grades or better in English Language, Literature, and Maths. a recommendation from the appropriate head of department. History After almost a century of attempts by the Church to found a church secondary school in Enfield, Bishop Stopford's was founded on St. Polycarp's Day 1967 and opened its doors to its first pupils on 7 September 1967. Its founder was the then Bishop of London, the Right Reverend Robert Wright Stopford. The school was founded to provide an Anglican church school for the children of Enfield, who at that time had several Church primary schools but no Church secondary school. The school was established in the buildings of the old Suffolk's Secondary Modern School. The school hit the headlines in February 1990 when three rottweiler dogs escaped from a nearby property and entered the school premises and attacked and injured several pupils. The incident became known as the 'St. Valentine's Day Massacre' among pupils at the time, and was a contributing factor in the introduction of the Dangerous Dogs Act (1991). Former pupil, comedian Russell Kane described the experience in his 2019 memoir, Son of a Silverback. The former Heads of Bishop Stopford's have been Dr Geoffrey Roberts B.A. PhD F.R.S.A, JP from 1967 to 1988 d. 2005, Brian Robin Pickard M.A. from 1988 to 2001 d. 2015, Mrs Bridget Sarah Evans from 2001 to 2008, ( Mrs E. Kohler was acting Head from May 2008 - July 2009) and Jim Owen from 2009 to 2012. Mrs Tammy Day (Current Deputy Head /Senior Mistress) was appointed as Acting Head for a term until Mr Paul Woods ass
https://en.wikipedia.org/wiki/The%20One%20with%20Unagi
"The One with Unagi" is the seventeenth episode of Friends sixth season. It first aired on the NBC network in the United States on February 24, 2000. Plot When Joey is struggling to make ends meet by working at Central Perk, Ross suggests some alternative form of employment, and Joey looks into medical studies at the local hospital. He finds one that pays $2,000 for identical twins, and hires a fake twin, Carl, at an audition. Carl is even dumber than Joey, and the ruse fails miserably. Chandler panics when he remembers that he and Monica have agreed to hand-craft Valentine's Day gifts for each other this year, two weeks later than planned because Monica was working on Valentine's Day. After Phoebe offers him a bunny rabbit composed of Rachel's socks, Chandler fails miserably at making his own gifts. He ends up grabbing a cassette tape to stand in for a homemade mix tape. Monica, who also forgot, gives him Phoebe's sock-bunny and then launches into a furious campaign of please-forgive-me sex and homemade meals. Chandler, happy with the attention, does not correct her misconception, but his deception becomes clear when Monica actually plays the cassette tape—a homemade mix tape from Chandler's ex-girlfriend Janice for his birthday. Although she is angry, he pleads for another chance. She tries to get past it with another slow dance, but a few more seconds of Janice's voice is enough for her to storm into their bedroom alone. Rachel and Phoebe take a women's self-defense class together; Rachel feels confident about her mastery of the topic, which Ross scoffs at. Ross claims to have years of karate lessons to master the true essence of self-defense: "unagi", which Ross claims is "a state of total awareness", but Rachel, Chandler, and even the vegetarian Phoebe correctly point out that "unagi" is actually a form of sushi. Ross sets up a number of "scary" ambushes on Rachel and Phoebe to prove they have not reached an "unagi"-infused state of mind, only for them to undermine his efforts with much stronger ambushes. Ross goes to their instructor to ask how to fight them off, but he explains it out of context, making him look like a psychopath who enjoys assaulting women, especially his ex-wife. Later, Ross sees the backs of two blonde-haired women near Central Perk, thinking they are Rachel and Phoebe and attacks them from behind, only to be attacked back. As he is running away from them, he pauses for a second to see Rachel and Phoebe staring at him from a window in Central Perk, and flees in fear from the unknown women. Reception "The One with the Unagi" received critical acclaim and is regarded as one of the series' best episodes. Purple Clover chose the episode as one of the 20 funniest episodes of Friends. Radio Times chose "The One with the Unagi" as the best Friends episode. They called it one of the show's funniest moments. GamesRadar+ ranked it the show's 19th best episode. Cosmopolitan included "The One with Unagi" on their list of "The 1
https://en.wikipedia.org/wiki/Sun%20TV%20Network
Sun TV Network is an Indian mass media company headquartered in Chennai, Tamil Nadu, India. It is a part of Sun Group and is one of Asia's largest TV networks. Established on 14 April 1992 by Kalanithi Maran, it owns a variety of television channels in multiple languages and radio stations in multiple languages. Its flagship channel is Sun TV. Owned channels On air channels Defunct channels Film production Sun Pictures is a film production and distribution company established in 2000. It is a part of Sun TV Network. It has produced the TV film Siragugal and Rajnikanth starrer Endhiran. It has distributed more than 20 Tamil films starting from Kadhalil Vizhunthen, and now Producing many big budget movies. Television production company Sun Entertainment is a television production company, which produces small budget movies for Sun TV Direct TV Premier, after movie released in TV it will available only on Sun NXT OTT App, also will be co-producing upcoming webseries for the Sun NXT OTT Platform and this dept also co-produced the daily soaps which are to be telecasted in their channels. OTT Platform Sun NXT is a global online audio/video streaming (over-the-top) platform owned and operated by Sun TV Network. Has more than 4000 movie titles and more than 450 TV shows. Sun TV network usually takes the movies digital rights of the ones which are telecasted in its TV channels. See also Sun Group Sun Pictures Sun Kudumbam Awards Sunrisers Hyderabad Sun Direct Red FM, Suryan FM References External Links Sun Group 1993 establishments in Tamil Nadu Television networks in India Television stations in Chennai Television channels and stations established in 1993 Indian Premier League franchise owners Companies listed on the National Stock Exchange of India Companies listed on the Bombay Stock Exchange Television broadcasting companies of India Mass media companies of India Broadcasting
https://en.wikipedia.org/wiki/Routing%20and%20wavelength%20assignment
The routing and wavelength assignment (RWA) problem is an optical networking problem with the goal of maximizing the number of optical connections. Definition The general objective of the RWA problem is to maximize the number of established connections. Each connection request must be given a route and wavelength. The wavelength must be consistent for the entire path, unless the usage of wavelength converters is assumed. Two connections requests can share the same optical link, provided a different wavelength is used. The RWA problem can be formally defined in an integer linear program (ILP). The ILP formulation given here is taken from. Maximize: subject to is the number of source-destination pairs, while is the number of connections established for each source-destination pair. is the number of links and is the number of wavelengths. is the set of paths to route connections. is a matrix which shows which source-destination pairs are active, is a matrix which shows which links are active, and is a route and wavelength assignment matrix. Note that the above formulation assumes that the traffic demands are known a priori. This type of problem is known as Static Lightpath Establishment (SLE). The above formulation also does not consider the signal quality. It has been shown that the SLE RWA problem is NP-complete in. The proof involves a reduction to the -graph colorability problem. In other words, solving the SLE RWA problem is as complex as finding the chromatic number of a general graph. Given that dynamic RWA is more complex than static RWA, it must be the case that dynamic RWA is also NP-complete. Another NP-complete proof is given in. This proof involves a reduction to the Multi-commodity Flow Problem. The RWA problem is further complicated by the need to consider signal quality. Many of the optical impairments are nonlinear, so a standard shortest path algorithm can't be used to solve them optimally even if we know the exact state of the network. This is usually not a safe assumption, so solutions need to be efficient using only limited network information. Methodology Given the complexity of RWA, there are two general methodologies for solving the problem: The first method is solving the routing portion first, and then assigning a wavelength second. Three types of route selection are Fixed Path Routing, Fixed Alternate Routing, and Adaptive Routing. The second approach is to consider both route selection and wavelength assignment jointly. First routing, then wavelength assignment Routing algorithms Fixed path routing Fixed path routing is the simplest approach to finding a lightpath. The same fixed route for a given source and destination pair is always used. Typically this path is computed ahead of time using a shortest path algorithm, such as Dijkstra's Algorithm. While this approach is very simple, the performance is usually not sufficient. If resources along the fixed path are in use, future connection reques
https://en.wikipedia.org/wiki/Richard%20Starkings
Richard Starkings (born 27 January 1962) is a British font designer and comic book letterer, editor and writer. He was one of the early pioneers of computer-based comic-book lettering, and is one of the most prolific creators in that industry. Career Starkings' lettering style was originally inspired by British comic strip letterers Bill Nuttall and Tom Frame. Starkings' UK career began with lettering jobs in 2000 ADs Future Shocks and various strips in Warrior. From there he moved to Marvel UK where he lettered Zoids in Spider-Man Weekly and Transformers before becoming an editor for the company in the late 1980s. Titles he edited included Death's Head and Dragon's Claws. However, by the beginning of the 1990s he devoted himself exclusively to lettering, finding work in the much larger comic-book industry in the United States. His work in the Whoniverse has been mostly confined to two periods. He was variously a writer, editor and letterer during the Sixth and early Seventh Doctors' eras in the pages of Doctor Who Magazine. At this time, he also served in the staff position of "picture consultant" for a number of issues. Two decades later, he returned to the newly-created American centre of Whoniverse publishing at IDW Publishing, working on several issues involving the Tenth Doctor. In the 20th century Starkings edited Redemption!, Culture Shock!, Nemesis of the Daleks and Follow That TARDIS!. Usually under his pseudonym of "Richard Alan" or Zed, he wrote or co-wrote Time and Tide, the aforementioned Nemesis of the Daleks and Up Above the Gods. He lettered or co-lettered Frobisher's Story, The Gift, The World Shapers and Up Above the Gods. In the 21st century For the BBC Wales era of the Whoniverse, Starkings co-wrote Cold-Blooded War under his own name. It was also a story he lettered, along with The Whispering Gallery and most issues of The Forgotten. He was also one of the letterers on Rift War! Beginning in 2014, he and Comicraft's Jimmy Betancourt lettered all of Titan Comics' Doctor Who comic book series. In 1992 Starkings founded Comicraft, a studio which trains and employs letterers and designers and provides "Unique Design and Fine Lettering" services for comic books from many different publishers. In the mid-1990s Comicraft, online as comicbookfonts.com began to sell their Font designs as software applications through their Active Images publishing company. Hip Flask Originally Starkings had intended that the advertisements for these fonts would feature Marvel and DC Comics' characters, however when he failed to receive the authorisation to do that, Starkings created his own character to illustrate the ads – Hip Flask an anthropomorphic hippopotamus "Information Agent". Hip Flask has since graduated to his own series of one-shot comic books, published by Active Images. Starkings plotted the first two issues with artist Ladrönn and enlisted the assistance of Joe Casey to co-script. Mystery City and all subsequent issues ar
https://en.wikipedia.org/wiki/Perl%20Object%20Environment
For the Mach variant, see Mach (kernel) The Perl Object Environment or POE is a library of Perl modules written in the Perl programming language by Rocco Caputo et al. From CPAN: "POE originally was developed as the core of a persistent object server and runtime environment. It has evolved into a general purpose multitasking and networking framework, encompassing and providing a consistent interface to other event loops such as Event and the Tk and Gtk toolkits." POE Architecture: Layers of Abstraction POE, The Perl Object Environment can be thought of as a tiny modular operating system. One or more POE programs or instances can be run concurrently and are generally well suited for cooperative multitasking. The POE package consists of namespaces and abstractions that guide future development of POE in an open-ended CPAN-style convention. The event layer The informal architecture consists of a set of layers with a kernel on the bottom. This tiny kernel represents the events layer which operates as the main loop of each running POE instance. The first call is to the "event dispatcher" - POE::Kernel. The POE::Kernel namespace contains a suite of functions which are plugged into the kernel itself. These loop abstractions are designed after POE's standardized event loop bridge interface - POE::Loop. These can be mixed and matched as needed to provide runtime services and a lean facility for interprocess communication. The basic functions are POE::Loop::Event, POE::Loop::Poll and POE::Loop::Select. Also available are POE::Loop::Tk and POE::Loop::Gtk which offer hooks into other loop bridges in the external environment. If that isn't enough, the POE::Loop kernel abstraction provides reusable signal callbacks, time or alarm callbacks, and filehandle activity callbacks as well as administrative functions such as initializing, executing, and finalizing event loops. There is also a higher level packaging framework - POE::Macro and a debugging utility for testing them called POE::Preprocessor. This framework has yielded POE::Macro::UseBytes. NOTE: As the Perl tradition mandates, POE is also a moving target. Always check CPAN to see what new goodies the community has placed in the archive. (...and remember Perl's Motto: "There's more than one way to do it" per Larry) The Running Kernel operates through primordial finite-state machines constructed from another set of abstractions ruled by the POE::Session architecture. A POE::Session is almost trivially defined as a map of events to the functions, class methods, and/or object methods that handle them. POE::Session objects also contain a storage space shared by all its event handlers, called a heap. Any way you slice them the states are solidly identified and clearly defined. A more featureful event handler is a POE::Session subclass called POE::NFA - an event-driven Nondeterministic finite automaton (a smarter finite state machine). This event handler moves from one strictly defined state to a
https://en.wikipedia.org/wiki/Check%20Point
Check Point is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management. , the company has approximately 6,000 employees worldwide. Headquartered in Tel Aviv, Israel and San Carlos, California, the company has development centers in Israel and Belarus and previously held in the United States (ZoneAlarm), Sweden (former Protect Data development centre) following acquisitions of companies who owned these centers. The company has offices in over 70 locations worldwide including main offices in North America, 10 in the United States (including in San Carlos, California and Dallas, Texas), 4 in Canada (including Ottawa, Ontario) as well as in Europe (London, Paris, Munich, Madrid) and in Asia Pacific (Singapore, Japan, Bengaluru, Sydney). History Check Point was established in Ramat Gan, Israel in 1993, by Gil Shwed (CEO ), Marius Nacht (Chairman ) and Shlomo Kramer (who left Check Point in 2003). Shwed had the initial idea for the company's core technology known as stateful inspection, which became the foundation for the company's first product, FireWall-1; soon afterwards they also developed one of the world's first VPN products, VPN-1. Shwed developed the idea while serving in the Unit 8200 of the Israel Defense Forces, where he worked on securing classified networks. Initial funding of US$250,000 was provided by venture capital fund BRM Group. In 1994 Check Point signed an OEM agreement with Sun Microsystems, followed by a distribution agreement with HP in 1995. The same year, the U.S. head office was established in Redwood City, California. By February 1996, the company was named worldwide firewall market leader by IDC, with a market share of 40 percent. In June 1996 Check Point raised $67 million from its initial public offering on NASDAQ. In 1998, Check Point established a partnership with Nokia, which bundled Check Point's Software with Nokia's computer Network Security Appliances. In 2003, a class-action lawsuit was filed against Check Point over violation of the Securities Exchange Act by failing to disclose major financial information. On 14 August 2003 Check Point opened its branch in India's capital, Delhi (with the legal name Check Point Software Technologies India Pvt. Ltd.). Eyal Desheh was the first director appointed in India. During the first decade of the 21st century Check Point started acquiring other IT security companies, including Nokia's network security business unit in 2009. In 2019, researchers at Check Point found a security breach in Xiaomi phone apps. The security flaw was reported preinstalled. Check Point is presently focused on what it calls "fifth generation cyber security," or “Gen V.” It identifies the fifth generation as focused on large-scale and fast-moving attacks across mobile, cloud and on-premise networks that easily bypas
https://en.wikipedia.org/wiki/Ice%20%28disambiguation%29
Ice is the solid form of water. Ice or ICE may also refer to: Computing and technology ICE (scanning) (Image Correction and Enhancement), for removing surface defects from a scanned photo/image In Case of Emergency, emergency numbers stored on a mobile or cellular phone ICE (cipher), a block cipher in cryptography iCE (FPGA), a programmable logic device family by Lattice Semiconductor ICE validation, internal consistency evaluators, a set of tools for validating Windows Installer packages IceWM, The Ice Window Manager In-circuit emulation, a computer debugging hardware device Information and Content Exchange, an XML protocol for content syndication Integrated collaboration environment, a platform for virtual teams Inter-Client Exchange, an X Window System protocol framework Interactive Connectivity Establishment, a mechanism for NAT traversal Interactive Creative Environment, a visual programming platform for Autodesk Softimage Interactive customer evaluation, form technologies for collecting software user feedback Interference cancellation equipment, in radio equipment such as cellular repeaters Internal compiler error, a type of compilation error International Cometary Explorer, a spacecraft for studying interaction between the Earth's magnetic field and solar wind Internet Communications Engine, a computer software middleware platform developed by ZeroC Microsoft Research Image Composite Editor, a panorama stitching program Information, Communication, Entertainment, an in-flight entertainment system operated by Emirates Science Internal combustion engine, a fuel engine ICE (chemotherapy), a cancer treatment Ice giant, a planet composed mostly of gases and liquids other than hydrogen and helium Caspase 1 or Interleukin-1 beta Converting Enzyme ICE table (initial, change, equilibrium), a table for tracking chemical reactions Ice-ice, a disease condition of seaweed Integrative and conjugative element, a mobile genetic element Methamphetamine, colloquially referred to as "ice" 4-Methylaminorex, a stimulant drug known as "ice" Transportation Intercity Express, a German high-speed train Ice (yacht), built in Germany in 2005 In-car entertainment InterCity Express (Queensland Rail), a train in Brisbane, Australia Iowa, Chicago and Eastern Railroad, US Organizations United Kingdom Institution of Civil Engineers Institute for Creative Enterprise, an institute at Edge Hill University Institute for Creative Enterprises, a part of Coventry School of Art and Design The Ice Organisation or MyIce, a sustainable rewards programme United States Information Council for the Environment Institute for Credentialing Excellence Institute of Culinary Education, an institute in New York City, New York Intercontinental Exchange (ICE), Fortune 500 company that operates global exchanges, clearing houses and provides mortgage technology, data and listing services Iron Crown Enterprises, a game company, Virginia U.S. Immigration a
https://en.wikipedia.org/wiki/Rudder%20ratio
Rudder ratio refers to a value that is monitored by the computerized flight control systems in modern aircraft. The ratio relates the aircraft airspeed to the rudder deflection setting that is in effect at the time. As an aircraft accelerates, the deflection of the rudder needs to be reduced proportionately within the range of the rudder pedal depression by the pilot. This automatic reduction process is needed because if the rudder is fully deflected when the aircraft is in high-speed flight, it will cause the plane to sharply and violently yaw, or swing from side to side, leading to loss of control and rudder, tail and other damages, even causing the aircraft to crash. See also American Airlines Flight 587 Aerospace engineering Engineering ratios
https://en.wikipedia.org/wiki/Berners-Lee
Berners-Lee may refer to: Conway Berners-Lee (1921–2019), British mathematician and computer scientist, father of Mike and Tim Berners-Lee Mike Berners-Lee (born 1964), English researcher and writer on greenhouse gases Tim Berners-Lee (born 1955), British engineer and computer scientist, known for his creation of the World Wide Web See also 13926 Berners-Lee, main-belt asteroid Compound surnames
https://en.wikipedia.org/wiki/Teleogenesis
In the theory of cybernetics, teleogenesis (from the Greek teleos = 'purpose' and genesis = 'creation') is the creation of goal-creating processes. According to Peter Corning: "A cybernetic system is by definition a dynamic purposive system; it is 'designed' to pursue or maintain one or more goals or end-states". Teleogenesis refers from an extension of classical cybernetics, as proposed by Norbert Wiener, Ashby and others in late 1950s. See also Homeostasis Homeorhesis References Corning, Peter A. "Thermoeconomics: Beyond the second law" from: www.complexsystems.org Cybernetics
https://en.wikipedia.org/wiki/The%20Canine%20Mutiny
"The Canine Mutiny" is the twentieth episode of the eighth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on April 13, 1997. It was written by Ron Hauge and directed by Dominic Polcino. Bart fraudulently applies for a credit card and uses it to buy an expensive trained dog called Laddie. It guest stars voice actor Frank Welker as Laddie, a parody of Lassie. The episode's title references the novel The Caine Mutiny. Plot When Bart complains he never gets any mail, Marge gives him the family's junk mail. He completes a credit card application under the name of the family dog, Santa's Little Helper. Bart receives a credit card issued to "Santos L. Halper" after the company misreads his application. He goes on a spending spree, buying the family expensive gifts from a mail-order catalog: smoked salmon and a radio-frying pan for Marge, a golf shirt for Homer, pep pills for Lisa and several things for himself. Undeterred by its US$1,200 price, Bart orders a purebred collie. When the dog arrives, Bart learns his name is Laddie and he is trained to perform several tasks. The Simpsons fall in love with the new dog and neglect Santa's Little Helper. When he fails to pay his credit card bill, Bart gets a call from a debt collection agency demanding payment. When the calls and collection letters persist, he enlists Laddie's help to bury the ill-gotten card. Soon, repo men arrive to confiscate his purchases. When a repossessor asks for the $1,200 dog to be returned, Bart identifies Santa's Little Helper as the dog. The greyhound is herded into the truck, and he watches sadly as it drives away. Realizing Santa's Little Helper is gone, the family bonds with Laddie, except for Bart, who fears for Santa's Little Helper's fate. When an exhausted Bart takes Laddie on one of his frequent walks, the collie saves the life of Baby Gerald. At the ceremony honoring Laddie's heroism, Chief Wiggum decides that he would make the perfect police dog. Bart gives him to the Springfield police force and breaks down crying while explaining to his family why they no longer have any dog at all. Homer instructs him to find Santa's Little Helper. Bart eventually learns from Reverend Lovejoy that the dog was given to a parishioner, Mr. Mitchell. Bart visits Mitchell to beg for his dog back, but he sees that the man is blind because he fails to notice his parrot has died. When Bart hears how the man and Santa's Little Helper have bonded, he grows heartsick and leaves. Later, Bart makes a late-night visit to the man's home and retrieves Santa's Little Helper. While trying to escape, he traps himself in a closet after mistaking it for an outside door. Thinking Bart is a burglar, Mitchell gloats that he has called the police. Bart explains that he is just a child and the dog was originally his. Bart and Mitchell call to Santa's Little Helper, so he can decide which owner he prefers. After briefly get
https://en.wikipedia.org/wiki/Digital%20artifact
Digital artifact in information science, is any undesired or unintended alteration in data introduced in a digital process by an involved technique and/or technology. Digital artifact can be of any content types including text, audio, video, image, animation or a combination. Information science In information science, digital artifacts result from: Hardware malfunction: In computer graphics, visual artifacts may be generated whenever a hardware component such as the processor, memory chip, cabling malfunctions, etc., corrupts data. Examples of malfunctions include physical damage, overheating, insufficient voltage and GPU overclocking. Common types of hardware artifacts are texture corruption and T-vertices in 3D graphics, and pixelization in MPEG compressed video. Software malfunction: Artifacts may be caused by algorithm flaws such as decoding/encoding audio or video, or a poor pseudo-random number generator that would introduce artifacts distinguishable from the desired noise into statistical models. Compression: Controlled amounts of unwanted information may be generated as a result of the use of lossy compression techniques. One example is the artifacts seen in JPEG and MPEG compression algorithms that produce compression artifacts. Quantization: Digital imprecision generated in the process of converting analog information into digital space, is due to the limited granularity of digital numbering space. In computer graphics, quantization is seen as pixelation. Aliasing: As a consequence of sampling or sample-rate conversion, energy from frequencies outside of the signal frequency band of interest are folded across multiples of the Nyquist frequency. This is typically mitigated by using an anti-aliasing filter. Filtering: The process of filtering a signal, such as using an anti-aliasing filter, causes undesired alterations to the signal due to imperfections in the frequency response magnitude and phase, and due to the time domain impulse response. Rolling shutter, the line scanning of an object that is moving too fast for the image sensor to capture a unitary image. Error diffusion: poorly-weighted kernel coefficients result in undesirable visual artifacts. References External links DPReview: Glossary: Artifacts Anthropology Archaeology Information science Error Computer graphic artifacts Digital photography
https://en.wikipedia.org/wiki/Stanis%C5%82aw%20Radziszowski
Stanisław P. Radziszowski (born June 7, 1953) is a Polish-American mathematician and computer scientist, best known for his work in Ramsey theory. Radziszowski was born in Gdańsk, Poland, and received his PhD from the Institute of Informatics of the University of Warsaw in 1980. His thesis topic was "Logic and Complexity of Synchronous Parallel Computations". From 1976 to 1980 he worked as a visiting professor in various universities in Mexico City. In 1984, he moved to the United States, where he took up a position in the Department of Computer Science at the Rochester Institute of Technology. Radziszowski has published many papers in graph theory, Ramsey theory, block designs, number theory and computational complexity. In a 1995 paper with Brendan McKay he determined the Ramsey number R(4,5)=25. His survey of Ramsey numbers, last updated in March 2017, is a standard reference on the subject and published at the Electronic Journal of Combinatorics. References External links Radziszowski's survey of small Ramsey numbers Home Page Sound file of Radziszowski speaking his own name (au format) 1953 births Living people Polish academics Polish mathematicians Polish computer scientists Rochester Institute of Technology faculty Combinatorialists University of Warsaw alumni
https://en.wikipedia.org/wiki/Plantronics%20Colorplus
The Plantronics Colorplus is a graphics card for IBM PC computers, first sold in 1982. It is a superset of the then-current CGA standard, using the same monitor standard (4-bit digital TTL RGBI monitor) and providing the same pixel resolutions. It was produced by Frederick Electronics (of Frederick, Maryland), a subsidiary of Plantronics since 1968, and sold by Plantronics' Enhanced Graphics Products division. The Colorplus has twice the memory of a standard CGA board (32k, compared to 16k). The additional memory can be used in graphics modes to double the color depth, giving two additional graphics modes—16 colors at resolution, or 4 colors at resolution. It uses the same Motorola MC6845 display controller as the previous MDA and CGA adapters. The original card also includes a parallel printer port. Output capabilities CGA compatible modes: 16 color mode (actual a text mode using , ▌, ▐ and █) in 4 colors from a 16 color hardware palette. Pixel aspect ratio of 1:1.2. in 2 colors. Pixel aspect ratio of 1:2.4 with pixel font text mode (effective resolution of ) with pixel font text mode (effective resolution of ) In addition to the CGA modes, it offers: with 16 colors with 4 colors "New high-resolution" text font, selectable by hardware jumper The "new" font was actually the unused "thin" font already present in the IBM CGA ROMs, with 1-pixel wide vertical strokes. This offered greater clarity on RGB monitors, versus the default "thick" / 2-pixel font more suitable for output to composite monitors and over RF to televisions but, contrary to Plantronics' advertising claims, was drawn at the same pixel resolution. Software support Few software made use of the enhanced Plantronics modes, for which there was no BIOS support. A 1984 advertisement listed the following software as compatible: Color-It UCSD P-system Peachtree Graphics Language Business Graphics System Graph Power The Draftsman Videogram Stock View GSX CompuShow ( mode) Some contemporary software has added support for Plantronics modes: Planet X3, released by American YouTuber David "The 8-Bit Guy" Murray in 2019, was the first video game known to have Colorplus support ( with 16 colors). This support was added by Planet X3 enthusiast Benedikt Freisen. Attack of the Petscii Robots by American YouTuber David "The 8-Bit Guy" in 2020, ported to MS-DOS computers with a graphics mode providing support for Plantronics Plus. Benedikt Freisen produced updated drivers in 2021 that add Colorplus support to Sierra's adventure games that ran on Sierra's Creative Interpreter. FastDoom, a port of Doom (1993 video game) developed by Victor Nieto, added support for ColorPlus with 16 colors mode in 2021. Hardware clones Some third-party CGA and EGA clones, such as the ATI Graphics Solution and the Paradise AutoSwitch EGA 480, could emulate the extra modes (usually describing them simply as 'Plantronics mode'). The Thomson TO16 (a PC-XT compatible) and the Olivetti M19 suppo
https://en.wikipedia.org/wiki/Ical
Ical may refer to: Calendar (Apple), Apple's personal calendar application, formerly called iCal ical (Unix), a Tcl/tk calendar package iCalendar, a standardised calendar data exchange standard Aburizal Bakrie, a politician ICaL an ionic current through the L-type calcium channel
https://en.wikipedia.org/wiki/KXAN-TV
KXAN-TV (channel 36) is a television station in Austin, Texas, United States, affiliated with NBC. It is owned by Nexstar Media Group alongside Llano-licensed MyNetworkTV affiliate KBVO (channel 14); Nexstar also provides certain services to KNVA (channel 54), a de facto owned-and-operated station of The CW, under a local marketing agreement (LMA) with Vaughan Media. The stations share studios on West Martin Luther King Jr. Boulevard in the Old West Austin section, just west of the University of Texas at Austin campus and just north of downtown; the studios and offices consist of a setup which includes the main studio and newsroom, and an unconnected auxiliary office building across the street. KXAN-TV's transmitter is located at the West Austin Antenna Farm north of West Lake Hills. History The station first signed on the air on February 12, 1965, as KHFI-TV, broadcasting on UHF channel 42. It was owned by the Kingsbury family, along with KHFI radio (970 AM, now KJFK at 1490; and 98.3 FM, now KVET-FM at 98.1). KHFI was the second television station in Austin, signing on a little more than twelve years after KTBC-TV (channel 7). Although Austin was big enough to support three television stations as early as the 1950s, KTBC was the only VHF license in the area. Until 1964, UHF stations could only be seen with an expensive converter, and even then picture quality left much to be desired. Additionally, UHF signals usually do not travel very far over long distances or over rugged terrain. This made several potential owners skittish about the prospects for UHF in a market that stretched from Mason in the west to La Grange in the east, and also included much of the Hill Country. KHFI-TV logically should have signed on as Austin's NBC station, since up to that time all three networks had been shoehorned on KTBC, then a primary CBS affiliate. However, due to contractual obligations, it spent more than a year-and-a-half as an independent station before joining NBC in 1966. Unlike most affiliates with the network in then two-station markets, KHFI did not take on a secondary ABC affiliation (KTBC instead took on the secondary ABC affiliation, until a third station, KVUE signed on in 1971, taking on the ABC affiliation). The Kingsburys would later bring in Henry Tippie as a partner and on January 15, 1973, were granted permission from the Federal Communications Commission (FCC) to move KHFI-TV to channel 36. With the channel change came a new set of call letters, KTVV. The station also boosted its transmitter power to five million watts, which more than doubled its coverage area, and for a time billed itself as the most powerful TV station in the Southwest with these changes. What was then known as LIN Broadcasting purchased the station in 1979. The call letters were changed to the current KXAN-TV on October 15, 1987, in reference to then-sister station and fellow NBC affiliate (now owned-and-operated station) KXAS-TV in Fort Worth. Even with the increase
https://en.wikipedia.org/wiki/The%20Real%20Adventures%20of%20Jonny%20Quest
The Real Adventures of Jonny Quest (also known as Jonny Quest: The Real Adventures) is an American animated television series produced by Hanna-Barbera and broadcast on Cartoon Network from August 26, 1996, to April 16, 1997. A continuation of the Jonny Quest (1964) series and The New Adventures of Jonny Quest (1986) series, it features teenage adventurers Jonny Quest, Hadji Singh, and Jessie Bannon as they accompany Dr. Benton Quest and bodyguard Race Bannon to investigate strange phenomena, legends, and mysteries in exotic locales. Action also takes place in the virtual realm of QuestWorld, a three-dimensional cyberspace domain rendered with computer animation. Conceived in the early 1990s, Real Adventures suffered a long and troubled development. Hanna-Barbera dismissed creator Peter Lawrence in 1996 and hired new producers to finish the show. John Eng and Cosmo Anzilotti completed Lawrence's work; David Lipman, Davis Doi, and Larry Houston wrote new episodes with reworked character designs akin to those of classic Quest. Each team produced half of the show's fifty-two episodes. While Lawrence's team crafted stories of real-world mystery and exploration, later writers used science fiction and paranormal plots. Turner supported the show through a massive marketing campaign with thirty-three licensees. Real Adventures debuted with an unprecedented wide release on Cartoon Network, TBS, and TNT, airing twenty-one times per week. Critics have debated the merits of the show's animation, writing, and spirit compared to classic Quest, but it has also received praise in those categories. Real Adventures failed to gain high ratings with its targeted demographics and its merchandise performed poorly, leading to cancellation after fifty-two episodes. Turner Home Entertainment and Warner Home Video have released eight VHS tapes and two laserdiscs; reruns have appeared on Toonami, CNX, and other Turner networks. All 52 episodes are available on DVD and for digital purchase on the iTunes Store. Development and history Hanna-Barbera created The Real Adventures of Jonny Quest in the early 1990s after being acquired by Turner Entertainment Co. Turner planned a series of year-long "Turner-wide initiatives" to capitalize on old characters and create new franchises. Turner received copious fan mail and phone inquiries about Quest, and observed "incredibly high" marketing Q Scores. The show was also Hanna-Barbera's most popular venture in the action-adventure genre; no other contemporary series featured realistic children enjoying lifelike adventures. With William Hanna and Joseph Barbera's blessings, the company planned a new series, live action film, and two telefilms—Jonny's Golden Quest and Jonny Quest vs. The Cyber Insects. Combined with a substantial marketing campaign, the project would be their largest initiative since Turner acquired H-B. Turner Home Entertainment President Philip Kent claimed Quest would be a "consumer-products bonanza", and the compa
https://en.wikipedia.org/wiki/SPARCstation
The SPARCstation, SPARCserver and SPARCcenter product lines are a series of SPARC-based computer workstations and servers in desktop, desk side (pedestal) and rack-based form factor configurations, that were developed and sold by Sun Microsystems. The first SPARCstation was the SPARCstation 1 (also known as the Sun 4/60), introduced in 1989. The series was very popular and introduced the Sun-4c architecture, a variant of the Sun-4 architecture previously introduced in the Sun 4/260. Thanks in part to the delay in the development of more modern processors from Motorola, the SPARCstation series was very successful across the entire industry. The last model bearing the SPARCstation name was the SPARCstation 4. The workstation series was replaced by the Sun Ultra series in 1995; the next Sun server generation was the Sun Enterprise line introduced in 1996. Models Desktop and deskside SPARCstations and SPARCservers of the same model number were essentially identical systems, the only difference being that systems designated as servers were usually "headless" (that is, configured without a graphics card and monitor), and were sold with a "server" rather than a "desktop" OS license. For example, the SPARCstation 20 and SPARCserver 20 were almost identical in motherboard, CPU, case design and most other hardware specifications. Most desktop SPARCstations and SPARCservers shipped in either "pizzabox" or "lunchbox" enclosures, a significant departure from earlier Sun and competing systems of the time. The SPARCstation 1, 2, 4, 5, 10 and 20 were "pizzabox" machines. The SPARCstation SLC and ELC were integrated into Sun monochrome monitor enclosures, and the SPARCstation IPC, IPX, SPARCclassic, SPARCclassic X and SPARCstation LX were "lunchbox" machines. SPARCserver models ending in "30" or "70" were housed in deskside pedestal enclosures (respectively 5-slot and 12-slot VMEbus chassis); models ending in "90" and the SPARCcenter 2000 came in rackmount cabinet enclosures. The SPARCserver 1000's design was a large rack-mountable desktop unit. Later versions of the SPARCstation series, such as the SPARCstation 10 and 20, could be configured as multiprocessor systems as they were based on the MBus high-speed bus. These systems could accept one or two single or dual central processing units packaged in MBus modules. Until the launch of the SPARCserver 600MP series, all SPARCstation/server models were also assigned Sun 4-series model numbers. Later models received S-prefix model numbers. Models are listed within their category in approximately chronological order. "Pizzabox" systems "Lunchbox" systems Integrated monitor/portable systems Server systems Note that the above configurations were those supported by Sun Microsystems. Various third-party processor upgrades were available for SPARCstation/server systems, for instance the 80 MHz Weitek POWER μP for the SPARCstation 2 or IPX, or the Ross hyperSPARC MBus modules rated at clock speeds up to 200 M
https://en.wikipedia.org/wiki/TVQ%20%28disambiguation%29
TVQ is the Brisbane television station of Network Ten in Australia. TVQ may also refer to: Television TVQ Kyushu Broadcasting, a television station in Fukuoka, Japan Télé-Québec, a French-language TV network Television Quarterly, a magazine published by NATAS KTVQ, station TVQ in region K; a TV station in Billings, Montana, USA KTVQ (Oklahoma City), former station TVQ in region K; a defunct TV station in Oklahoma City, Oklahoma, USA WTVQ, station TVQ in region W; a TV station in Lexington, Kentucky, USA Other uses Taxe de vente du Québec, the French name for Quebec Sales Tax, the provincial tax on goods and services in Quebec, Canada; and marked on bills and receipts Smartwings Slovakia (ICAO airline code TVQ) See also
https://en.wikipedia.org/wiki/Strong%20cryptography
Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very high (usually unsurmountable) level of protection against any eavesdropper, including the government agencies. There is no precise definition of the boundary line between the strong cryptography and (breakable) weak cryptography, as this border constantly shifts due to improvements in hardware and cryptanalysis techniques. These improvements eventually place the capabilities once available only to the NSA within the reach of a skilled individual, so in practice there are only two levels of cryptographic security, "cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files" (Bruce Schneier). The strong cryptography algorithms have high security strength, for practical purposes usually defined as a number of bits in the key. For example, the United States government, when dealing with export control of encryption, considers any implementation of the symmetric encryption algorithm with the key length above 56 bits or its public key equivalent to be strong and thus potentially a subject to the export licensing. To be strong, an algorithm needs to have a sufficiently long key and be free of known mathematical weaknesses, as exploitation of these effectively reduces the key size. At the beginning of the 21st century, the typical security strength of the strong symmetrical encryption algorithms is 128 bits (slightly lower values still can be strong, but usually there is little technical gain in using smaller key sizes). Demonstrating the resistance of any cryptographic scheme to attack is a complex matter, requiring extensive testing and reviews, preferably in a public forum. Good algorithms and protocols are required, and good system design and implementation is needed as well. For instance, the operating system on which the cryptographic software runs should be as carefully secured as possible. Users may handle passwords insecurely, or trust 'service' personnel overly much, or simply misuse the software. (See social engineering.) Background The level of expense required for strong cryptography originally restricted its use to the government and military agencies, until the middle of the 20th century the process of encryption required a lot of human labor and errors (preventing the decryption) were very common, so only a small share of written information could have been encrypted. US government, in particular, was able to keep a monopoly on the development and use of cryptography in the US into the 1960s. In the 1970, the increased availability of powerful computers and unclassified research breakthroughs (Data Encryption Standard, the Diffie-Hellman and RSA algorithms) made strong cryptography available for civilian use. Mid-1990s saw the worldwide proliferation of knowledge and tools for strong cryptography. By
https://en.wikipedia.org/wiki/Steps%20to%20an%20Ecology%20of%20Mind
Steps to an Ecology of Mind is a collection of Gregory Bateson's short works over his long and varied career. Subject matter includes essays on anthropology, cybernetics, psychiatry, and epistemology. It was originally published by Chandler Publishing Company in 1972 (republished 2000 with foreword by Mary Catherine Bateson). The book begins with a series of metalogues, which take the form of conversations with his daughter Mary Catherine Bateson. The metalogues are mostly thought exercises with titles such as "What is an Instinct" and "How Much Do You Know." In the metalogues, the playful dialectic structure itself is closely related to the subject matter of the piece. Part I: Metalogues DEFINITION: A metalogue is a conversation about some problematic subject. This conversation should be such that not only do the participants discuss the problem but the structure of the conversation as a whole is also relevant to the same subject. Only some of the conversations here presented achieve this double format. Notably, the history of evolutionary theory is inevitably a metalogue between man and nature, in which the creation and interaction of ideas must necessarily exemplify evolutionary process. Why Do Things Get in a Muddle? (01948, previously unpublished) Why Do Frenchmen? (01951, Impulse ; 01953, ETC.: A Review of General Semantics, Vol. X) About Games and Being Serious (01953, ETC.: A Review of General Semantics, Vol. X) How Much Do You Know? (01953, ETC.: A Review of General Semantics, Vol. X) Why Do Things Have Outlines? (01953, ETC.: A Review of General Semantics, Vol. XI) Why a Swan? (01954, Impulse) What Is an Instinct? (01969, Sebeok, Approaches to Animal Communication) Part II: Form and Pattern in Anthropology Part II is a collection of anthropological writings, many of which were written while he was married to Margaret Mead. Culture Contact and Schismogenesis (01935, Man, Article 199, Vol. XXXV) Experiments in Thinking About Observed Ethnological Material (01940, Seventh Conference on Methods in Philosophy and the Sciences ; 01941, Philosophy of Science, Vol. 8, No. 1) Morale and National Character (01942, Civilian Morale, Watson) Bali: The Value System of a Steady State (01949, Social Structure: Studies Presented to A.R. Radcliffe-Brown, Fortes) Style, Grace, and Information in Primitive Art (01967, A Study of Primitive Art, Forge) Part III: Form and Pathology in Relationship Part III is devoted to the theme of "Form and Pathology in Relationships." His essay on alcoholism examines the alcoholic state of mind, and the methodology of Alcoholics Anonymous within the framework of the then-nascent field of cybernetics. Social Planning and the Concept of Deutero-Learning was a "comment on Margaret Mead's article "The Comparative Study of Culture and the Purposive Cultivation of Democratic Values," 01942, Science, Philosophy and Religion, Second Symposium) A Theory of Play and Fantasy (01954, A.P.A. Regional Research Conference in M
https://en.wikipedia.org/wiki/Spatial%20capacity
Spatial capacity is an indicator of "data intensity" in a transmission medium. It is usually used in conjunction with wireless transport mechanisms. This is analogous to the way that lumens per square meter determine illumination intensity. Spatial capacity focuses not only on bit rates for data transfer but on bit rates available in confined spaces defined by short transmission ranges. It is measured in bits per second per square meter. Among those leading research in spatial capacity are Jan Rabaey at the University of California, Berkeley. Some have suggested the term "spatial efficiency" as more descriptive. Marc Weiser, former chief technologist of Xerox PARC, was another contributor to the field who commented on the importance of spatial capacity. The System spectral efficiency is the spatial capacity divided by the bandwidth in hertz of the available frequency band. Relative spatial capacities Engineers at Intel and elsewhere have reported the relative spatial capacities of various wireless technologies as follows: IEEE 802.11b 1,000 (bit/s)/m² Bluetooth 30,000 (bit/s)/m² IEEE 802.11a 83,000 (bit/s)/m² Ultra-wideband 1,000,000 (bit/s)/m² IEEE 802.11g N/A See also System spectral efficiency References Wireless networking Network performance Radio resource management
https://en.wikipedia.org/wiki/Particle%20Systems
Argonaut Sheffield (formerly Particle Systems Ltd.) was a British computer game developer based in Sheffield, England. The company was founded as Particle Systems by Glyn Williams and Michael Powell. Games developed by Particle Systems include I-War and its sequel Independence War 2: Edge of Chaos. The company was working on tactical combat game EXO, when it was acquired by Argonaut Games in January 2002 and became Argonaut Sheffield. Under this new guise the company released Bionicle, Power Drome and submitted a number of demos for Star Wars, Charlie and the Chocolate Factory and Zorro. Argonaut Sheffield was closed in late October 2004 when Argonaut games was put into administration. Games developed References External links The official Particle Systems' homepage archived by Wayback Machine Company profile at MobyGames Defunct companies based in Sheffield Video game companies established in 1993 Video game companies disestablished in 2004 Defunct video game companies of the United Kingdom Video game development companies
https://en.wikipedia.org/wiki/Interface%20Builder
Interface Builder is a software development application for Apple's macOS operating system. It is part of Xcode (formerly Project Builder), the Apple Developer developer's toolset. Interface Builder allows Cocoa and Carbon developers to create interfaces for applications using a graphical user interface. The resulting interface is stored as a .nib file, short for NeXT Interface Builder, or more recently, as an XML-based .xib file. Interface Builder is descended from the NeXTSTEP development software of the same name. A version of Interface Builder is also used in the development of OpenStep software, and a very similar tool called Gorm exists for GNUstep. On March 27, 2008, a specialized iPhone version of Interface Builder allowing interface construction for iPhone applications was released with the iPhone SDK Beta 2. Interface Builder was intentionally developed as a separate application, to allow interaction designers to design interfaces without having to use a code-oriented IDE, but as of Xcode 4, Apple has integrated its functionality directly into Xcode. History Originally the software was called SOS Interface, and was created by Jean-Marie Hullot whilst he was a researcher at Inria at Rocquencourt near Paris. He was allowed to retain ownership of the software upon resigning from Inria, and spent a year working it into a fully-featured product, now named Interface Builder and distributed for Macintosh by ExperTelligence in the USA in 1986. It was written in Lisp (for the ExperLisp product by ExperTelligence). It was invented and developed by Jean-Marie Hullot using the object-oriented features in ExperLisp, and deeply integrated with the Macintosh Toolbox. Interface Builder was presented at MacWorld Expo in San Francisco in January 1987. Denison Bollay took Jean-Marie Hullot to NeXT after MacWorld Expo to demonstrate it to Steve Jobs. Jobs recognized its value, and started incorporating it into NeXTSTEP, and by 1988 it was part of NeXTSTEP 0.8. It was the first commercial application that allowed interface objects, such as buttons, menus, and windows, to be placed in an interface using a mouse. One notable early use of Interface Builder was the development of the first WorldWideWeb web browser by Tim Berners-Lee at CERN, made using a NeXT workstation. Design Interface Builder provides palettes, or collections, of user interface objects to an Objective-C or Swift developer. These user interface objects contain items like text fields, data tables, sliders, and pop-up menus. Interface Builder's palettes are completely extensible, meaning any developer can develop new objects and add palettes to Interface Builder. To build an interface, a developer simply drags interface objects from the palette onto a window or menu. Actions (messages) which the objects can emit are connected to targets in the application's code and outlets (pointers) declared in the application's code are connected to specific objects. In this way all initializati
https://en.wikipedia.org/wiki/MonoUML
MonoUML is a CASE tool based on the Mono framework. Designed for allowing Unix/Linux developers to design computer systems faster using a friendly GUI application. Not only a diagramming tool but rather a complete CASE tool based on the OMG standards and fully compatible with proprietary tools. MonoUML supports reverse engineering of executables (.exe) or .NET assemblies. See also List of UML tools References External links MonoUML website MonoUML old documentation MonoUML on Novell (Also where source downloads are available from) UML tools
https://en.wikipedia.org/wiki/GMA%20Pinoy%20TV
GMA Pinoy TV is a Philippine pay television channel that was launched in March 2005, by GMA Network. Operated by its subsidiaries, GMA International and GMA Worldwide Inc, it is targeted towards the Philippine diaspora. Programming The programming of GMA Pinoy TV consists mostly of shows from the Philippines from GMA Network as well as previously aired shows, documentaries, films, and sports events from the Philippines. Most weekend shows are up to date, with the exception of some shows that air on a one-episode delay basis. History GMA Pinoy TV was first launched in Japan in March 2005. It was later launched in several parts of the United States in the same year, such as San Francisco, Los Angeles, and the states of the East Coast. The channel was launched in San Francisco on July 23, 2005. A second channel, GMA Life TV, was successfully launched in March 2008 and soon grew to 109,000 subscribers. GMA Pinoy TV had 225,000 subscribers as of September 2009. The percent of subscribers has gone up 34% according to GMA New Media, Inc. In December 2010, both GMA Pinoy TV and GMA Life TV has expanded its coverage area in the US to Chicago, Illinois, New York, Washington, D.C., Maryland, Alabama and Virginia, and internationally to Canada, Italy, the United Kingdom and Europe. In 2011, the channels were launched in Australia and Papua New Guinea. On October 5, 2011, GMA Pinoy TV accepted two awards from the National Association for Multi-Ethnicity in Communications (NAMIC) in New York for 2011 Excellence in Multicultural Marketing Awards. On April 26, 2023, ABS-CBN and GMA Network announced that GMA Pinoy TV will be available on ABS-CBN's iWantTFC for viewers outside of the Philippines on May 1 alongside GMA News TV and GMA Life TV. See also GMA Network GMA Life TV GMA News TV International The Filipino Channel Kapatid TV5 Channel References International broadcasters Television networks in the United States Direct broadcast satellite services GMA International Filipino diaspora Cable television in the United States International broadcasting Television channels and stations established in 2005 Filipino-language television stations 2005 establishments in the Philippines GMA Network (company) channels Television networks in the United Kingdom
https://en.wikipedia.org/wiki/Radio%20Amateurs%20Emergency%20Network
The Radio Amateurs' Emergency Network, also known as RAYNET, is a British national voluntary communications service provided by amateur radio operators. It was formed in 1953 and exists to supplement national communication channels in the event of an emergency. The capitalised word RAYNET is now a registered trademark of the RAYNET-UK organisation. History The idea of RAYNET came into being in the aftermath of the North Sea flood of 1953, a natural disaster that damaged the communication cables along the east coast of England on the night of 31 January 1953. With communication lines crippled, the police authorities, in desperation, sought help from the few amateur radio operators then licensed, and, although illegal at that time, the Home Office permitted the use of amateur radios to direct and co-ordinate the rescue teams. The following year, an infant network first known as RAEN was formed. The Home Office conceded the desirability of an organisation which, in times of emergency, could effect the passing of messages facilitating the rescue operations of the professional services, who themselves lacked the 'instant communications' of radio at the time. While RAEN began on a minor scale with only a few operators involved, the network had grown into a nationwide movement now known as "RAYNET". Nowadays however, they mainly just do fun runs and have not been involved in any real emergency responses for a number of years. See also Amateur radio emergency communications Similar organizations in the US, Amateur Radio Emergency Service, Radio Amateur Civil Emergency Service References External links RAYNET official web site Emergency management in the United Kingdom Amateur radio emergency communications organizations Emergency communication Organizations established in 1953 1953 establishments in the United Kingdom Radio organisations in the United Kingdom Amateur radio in the United Kingdom
https://en.wikipedia.org/wiki/Brender
Brender may refer to: Nikolaus Brender (born 1949), German journalist BRender, a development toolkit and graphics engine for computer software
https://en.wikipedia.org/wiki/Join%20Java
Join Java is a programming language based on the join-pattern that extends the standard Java programming language with the join semantics of the join-calculus. It was written at the University of South Australia within the Reconfigurable Computing Lab by Dr. Von Itzstein. Language characteristics The Join Java extension introduces three new language constructs: Join methods Asynchronous methods Order class modifiers for determining the order that patterns are matched Concurrency in most popular programming languages is implemented using constructs such as semaphores and monitors. Libraries are emerging (such as the Java concurrency library JSR-166) that provide higher-level concurrency semantics. communicating sequential processes (CSP), Calculus of Communicating Systems (CCS) and Pi have higher-level synchronization behaviours defined implicitly through the composition of events at the interfaces of concurrent processes. Join calculus, in contrast, has explicit synchronization based on a localized conjunction of events defined as reduction rules. Join semantics try to provide explicit expressions of synchronization without breaching the object-oriented idea of modularization, including dynamic creation and destruction of processes and channels. The Join Java language can express virtually all published concurrency patterns without explicit recourse to low-level monitor calls. In general, Join Java programs are more concise than their Java equivalents. The overhead introduced in Join Java by the higher-level expressions derived from the Join calculus is manageable. The synchronization expressions associated with monitors (wait and notify) which are normally located in the body of methods can be replaced by Join Java expressions (the Join methods) which form part of the method signature. Join methods A Join method is defined by two or more Join fragments. A Join method will execute once all the fragments of the Join pattern have been called. If the return type is a standard Java type then the leading fragment will block the caller until the Join pattern is complete and the method has executed. If the return type is of type signal then the leading fragment will return immediately. All trailing fragments are asynchronous so will not block the caller. Example: class JoinExample { int fragment1() & fragment2(int x) { //will return value of x //to caller of fragment1 return x; } } Ordering modifiers Join fragments can be repeated in multiple Join patterns so there can be a case when multiple Join patterns are completed when a fragment is called. Such a case could occur in the example below if B(), C() and D() then A() are called. The final A() fragment completes three of the patterns so there are three possible methods that may be called. The ordered class modifier is used here to determine which Join method will be called. The default and when using the unordered class modifier is to pick one of the m
https://en.wikipedia.org/wiki/Functional%20block%20diagram
A functional block diagram, in systems engineering and software engineering, is a block diagram that describes the functions and interrelationships of a system. The functional block diagram can picture: Functions of a system pictured by blocks input and output elements of a block pictured with lines the relationships between the functions, and the functional sequences and paths for matter and or signals The block diagram can use additional schematic symbols to show particular properties. Functional block diagrams have been used in a wide range applications, from systems engineering to software engineering, since the late 1950s. They became a necessity in complex systems design to "understand thoroughly from exterior design the operation of the present system and the relationship of each of the parts to the whole." Many specific types of functional block diagrams have emerged. For example, the functional flow block diagram is a combination of the functional block diagram and the flowchart. Many software development methodologies are built with specific functional block diagram techniques. An example from the field of industrial computing is the Function Block Diagram (FBD), a graphical language for the development of software applications for programmable logic controllers. See also Function model Functional flow block diagram References Diagrams Systems engineering Management cybernetics
https://en.wikipedia.org/wiki/C%20Traps%20and%20Pitfalls
C Traps and Pitfalls is a slim computer programming book by former AT&T Corporation researcher and programmer Andrew Koenig, its first edition still in print in 2017, which outlines the many ways in which beginners and even sometimes quite experienced C programmers can write poor, malfunctioning and dangerous source code. It evolved from an earlier technical report, by the same name, published internally at Bell Labs. This, in turn was inspired by a prior paper given by Koenig on "PL/I Traps and Pitfalls" at a SHARE conference in 1977. Koenig wrote that this title was inspired by a 1968 science fiction anthology by Robert Sheckley, "The People Trap and other Pitfalls, Snares, Devices and Delusions, as Well as Two Sniggles and a Contrivance". References 1989 non-fiction books Computer programming books Software bugs C (programming language) Software anomalies Addison-Wesley books
https://en.wikipedia.org/wiki/Free%20and%20open-source%20graphics%20device%20driver
A free and open-source graphics device driver is a software stack which controls computer-graphics hardware and supports graphics-rendering application programming interfaces (APIs) and is released under a free and open-source software license. Graphics device drivers are written for specific hardware to work within a specific operating system kernel and to support a range of APIs used by applications to access the graphics hardware. They may also control output to the display if the display driver is part of the graphics hardware. Most free and open-source graphics device drivers are developed by the Mesa project. The driver is made up of a compiler, a rendering API, and software which manages access to the graphics hardware. Drivers without freely (and legally) -available source code are commonly known as binary drivers. Binary drivers used in the context of operating systems that are prone to ongoing development and change (such as Linux) create problems for end users and package maintainers. These problems, which affect system stability, security and performance, are the main reason for the independent development of free and open-source drivers. When no technical documentation is available, an understanding of the underlying hardware is often gained by clean-room reverse engineering. Based on this understanding, device drivers may be written and legally published under any software license. In rare cases, a manufacturer's driver source code is available on the Internet without a free license. This means that the code can be studied and altered for personal use, but the altered (and usually the original) source code cannot be freely distributed. Solutions to bugs in the driver cannot be easily shared in the form of modified versions of the driver. Therefore, the utility of such drivers is significantly reduced in comparison to free and open-source drivers. Problems with proprietary drivers Software developer's view There are objections to binary-only drivers based on copyright, security, reliability and development concerns. As part of a wider campaign against binary blobs, OpenBSD lead developer Theo de Raadt said that with a binary driver there is "no way to fix it when it breaks (and it will break)"; when a product which relies on binary drivers is declared to be end-of-life by the manufacturer, it is effectively "broken forever." The project has also stated that binary drivers "hide bugs and workarounds for bugs", an observation which has been somewhat vindicated by flaws found in binary drivers (including an exploitable bug in Nvidia's 3D drivers discovered in October 2006 by Rapid7). It is speculated that the bug has existed since 2004; Nvidia has denied this, asserting that the issue was only communicated to them in July 2006 and the 2004 bug was a bug in X.Org (not in Nvidia's driver). Binary drivers often do not work with current versions of open-source software, and rarely support development snapshots of open-source software
https://en.wikipedia.org/wiki/Laminin
Laminins are a family of glycoproteins of the extracellular matrix of all animals. They are major constituents of the basement membrane, namely the basal lamina (the protein network foundation for most cells and organs). Laminins are vital to biological activity, influencing cell differentiation, migration, and adhesion. Laminins are heterotrimeric proteins with a high molecular mass (~400 to ~900 kDa) and possess three different chains (α, β and γ) encoded by five, four, and three paralogous genes in humans, respectively. The laminin molecules are named according to their chain composition, e.g. laminin-511 contains α5, β1, and γ1 chains. Fourteen other chain combinations have been identified in vivo. The trimeric proteins intersect, composing a cruciform structure that is able to bind to other molecules of the extracellular matrix and cell membrane. The three short arms have an affinity for binding to other laminin molecules, conducing sheet formation. The long arm is capable of binding to cells and helps anchor organized tissue cells to the basement membrane. Laminins are integral to the structural scaffolding of almost every tissue of an organism—secreted and incorporated into cell-associated extracellular matrices. These glycoproteins are imperative to the maintenance and vitality of tissues; defective laminins can cause muscles to form improperly, leading to a form of muscular dystrophy, lethal skin blistering disease (junctional epidermolysis bullosa), and/or defects of the kidney filter (nephrotic syndrome). Types In humans, fifteen laminin trimers have been identified. The laminins are combinations of different alpha-, beta-, and gamma-chains. Five alpha-chain isoforms: LAMA1, LAMA2, LAMA3 (which has three splice forms), LAMA4, LAMA5 Four beta-chain isoforms: LAMB1, LAMB2, LAMB3, LAMB4 (note that no known laminin trimer incorporates LAMB4 and its function remains poorly understood) Three gamma-chain isoforms: LAMC1, LAMC2, LAMC3 Laminins were previously numbered as they were discovered, i.e. laminin-1, laminin-2, laminin-3, etc., but the nomenclature was changed to describe which chains are present in each isoform (laminin-111, laminin-211, etc.). In addition, many laminins had common names before either laminin nomenclature was in place. Function Laminins form independent networks and are associated with type IV collagen networks via entactin, fibronectin, and perlecan. The proteins also bind to cell membranes through integrins and other plasma membrane molecules, such as the dystroglycan glycoprotein complex and Lutheran blood group glycoprotein. Through these interactions, laminins critically contribute to cell attachment and differentiation, cell shape and movement, maintenance of tissue phenotype, and promotion of tissue survival. Some of these biological functions of laminin have been associated with specific amino-acid sequences or fragments of laminin. For example, the peptide sequence [GTFALRGDNGDNGQ], which is located on
https://en.wikipedia.org/wiki/SonicStage
SonicStage is a discontinued software product from Sony that is used for managing portable devices when they are plugged into a computer running Microsoft Windows. It comprises a music player and library manager, similar to iTunes, Windows Media Player and RealPlayer. It is used to manage the library of ATRAC (.omg and .oma) and MP3 recordings on a PC. SonicStage was a requirement to transfer and manage music on all Network Walkman, NetMD and Hi-MD players, and the Clie handheld, before the product was dropped entirely outside of Japan in 2007. History SonicStage was first used in Vaio PCs put on the Japanese market in October 2001, and superseded OpenMG Jukebox. Version 2 was found on 2004 model products, and Version 3 on 2005 model products (Sony introduced native MP3 support on its music players in 2005). The Sony Connect service was used to purchase recordings online, and could be accessed from within the SonicStage program. However, Sony announced that on 31 March 2008, its CONNECT download site would be going offline, affecting SonicStage users. In late 2008, Sony launched a new online music store called "bandit.fm" on a trial basis for a small number of markets. It was expected that Sony would launch bandit.fm globally, however Sony never did this and closed the store in 2016. Japan exclusively uses the mora service, and SonicStage continued to be released for Japanese customers until it was superseded by x-APPLICATION in 2013. Features Copying and usage restriction SonicStage is closely tied to a requirement that the program guard against copyright infractions. Sony music players have a write-only design. Somewhat similar to an Apple iPod, it is not generally possible to move tracks from the music player to the PC hard drive, and thereby from one music player to another. Some earlier models (such as some of the Net-MD line) could not even transfer voice recordings made by the user (with the player's microphone input) to their PC. Copy restriction is provided by a group of design features and software limitations. The main features being: The software strictly enforces digital rights management through its use of OpenMG. SonicStage ties the DRM license of each track to the hardware of the computer from which it has been transferred. SonicStage will not allow transfer of tracks from the player to another computer. It is possible, however, to backup "My Library" and import it into another installation of SonicStage on a different computer. Music files have to be "wrapped" by Sony software in order to be played on a Sony music player. Sony has not introduced drag and drop support for music files. Although it is possible to load files directly onto a Sony player without using SonicStage, it is not possible to play music files loaded this way. Neither is it possible in most cases to transfer music files back to a PC. (all versions prior to 3.4) The program does not generally convert OMG/OMA files to MP3 or WAV. The program only su
https://en.wikipedia.org/wiki/Brocade%20Communications%20Systems
Brocade was an American technology company specializing in storage networking products, now a subsidiary of Broadcom Inc. The company is known for its Fibre Channel storage networking products and technology. Prior to the acquisition, the company expanded into adjacent markets including a wide range of IP/Ethernet hardware and software products. Offerings included routers and network switches for data center, campus and carrier environments, IP storage network fabrics; Network Functions Virtualization (NFV) and software-defined networking (SDN) markets such as a commercial edition of the OpenDaylight Project controller; and network management software that spans physical and virtual devices. On November 2, 2016, Singapore-based chip maker Broadcom Limited announced it was buying Brocade for about $5.5 billion. As part of the acquisition, Broadcom divested all of the IP networking hardware and software-defined networking assets. Broadcom has since re-domesticated to the United States and is now known as Broadcom Inc. History Brocade was founded in August 1995, by Seth Neiman (a venture capitalist, a former executive from Sun Microsystems and a professional auto racer), Kumar Malavalli (a co-author of the Fibre Channel specification) and Paul R. Bonderson (a former executive from Intel Corporation and Sun). Neiman became the first CEO of the company. Brocade was incorporated on May 14, 1998, in Delaware. The company's first product, SilkWorm, which was a Fibre Channel switch, was released in early 1997. On May 25, 1999, the company went public at a split-adjusted price of $4.75. On initial public offering (IPO), the company offered 3,250,000 shares, with an additional 487,500 shares offered to the underwriters to cover over-allotments. The top three underwriters (based on number of shares) for Brocade's IPO were, in order, Morgan Stanley Dean Witter, BT Alex.Brown, and Dain Rauscher Wessels. Brocade stock is traded in the National Market System of the NASDAQ GS stock market under the ticker symbol BRCD. The second generation of switches was announced in 1999. On January 14, 2013, Brocade named Lloyd Carney as new chief executive. On November 2, 2016, Singapore-based chip maker Broadcom Limited announced they were buying Brocade for $5.5 billion. As part of the announcement, Broadcom said they would sell Brocade's networking business to avoid competing with its top customers such as Cisco Systems. On August 8, 2017, Brocade announced that its SDN technology had been spun off as a new company called Lumina Networks. This follows the sales of other divisions designed to allow the Broadcom acquisition to proceed, including Ruckus Wireless, Connectem (), Virtual ADC, Vyatta & , and Brocade's data center networking business. Broadcom announced the acquisition of Brocade in Nov 2016, and it completed the acquisition in Nov 2017 for $5.5 billion. Products Brocade focuses on Fibre Channel and FICON storage area network (SAN) directors and swit
https://en.wikipedia.org/wiki/Strada%20Education%20Foundation
Strada Education Network is a non-profit corporation which assists students into post-secondary education by providing financial support and other help. USA Funds links colleges, universities, proprietary schools, private lenders, students and parents to promote financial access to higher learning. The organization is formerly known as United Student Aid Funds or USA Funds. Strada's headquarters is in Indianapolis, Indiana. History Established by Richard Cornuelle in Indianapolis in 1960 to help families finance rising college costs, USA Funds has grown to become the nation's largest guarantor of loans made under the Federal Family Education Loan Program (FFELP), the main federal source of financial aid for higher education. During the past 44 years, the USA Funds guarantee has covered just under $115.5 billion in financial aid for higher education, for 13.6 million students. The corporation is affiliated with regional non-profit student loan guarantors, including SMS Hawaii (for Hawaii) and the Northwest Education Loan Association (NELA) (for Idaho and Washington). USA Funds guarantees education loans nationwide, and is also the designated guarantor of federal education loans in eight states: Arizona, Hawaii and the Pacific Islands, Indiana, Kansas, Maryland, Mississippi, Nevada and Wyoming. The Thurgood Marshall College Fund, aiding public historically black colleges and universities is an affiliate of the Strada Education Network. In 2017, USA Funds was rebranded as Strada Education Network. In 2023, Strada Education Network was rebranded as Strada Education Foundation. Affiliation with Sallie Mae USA Funds contracts with affiliates of Sallie Mae, the largest guarantor-servicing organization, to deliver some of the services necessary to support USA Funds' guarantee. Before July 31, 2000, USA Funds was an affiliate of USA Group. USA Funds contracted with other USA Group affiliates to these lenders contract with Sallie Mae for servicing and loan acquisition; others have no contractual relationships with Sallie Mae. Post-secondary institutions and their students are free to choose the lenders with which they wish to work while using the USA Funds guarantee. References External links Strada Education Network website Student financial aid in the United States Education finance in the United States 1960 establishments in Indiana Financial services companies established in 1960
https://en.wikipedia.org/wiki/Organizational%20unit%20%28computing%29
In computing, an organizational unit (OU) provides a way of classifying objects located in directories, or names in a digital certificate hierarchy, typically used either to differentiate between objects with the same name (John Doe in OU "marketing" versus John Doe in OU "customer service"), or to parcel out authority to create and manage objects (for example: to give rights for user-creation to local technicians instead of having to manage all accounts from a single central group). Organizational units most commonly appear in X.500 directories, X.509 certificates, Lightweight Directory Access Protocol (LDAP) directories, Active Directory (AD), and Lotus Notes directories and certificate trees, but they may feature in almost any modern directory or digital certificate container grouping system. In most systems, organizational units appear within a top-level organization grouping or organization certificate, called a domain. In many systems one OU can also exist within another OU. When OUs are nested, as one OU contains another OU, this creates a relationship where the contained OU is called the child and the container is called the parent. Thus, OUs are used to create a hierarchy of containers within a domain. Only OUs within the same domain can have relationships. OUs of the same name in different domains are independent. Specific uses The name organizational unit appears to represent a single organization with multiple units (departments) within that organization. However, OUs do not always follow this model. They might represent geographical regions, job-functions, associations with other (external) groups, or the technology used in relation to the objects. Examples would include: Department (e.g. human resources) within a corporation Division (e.g. LifeScan, Inc.) that is owned by but separate from a parent corporation (Johnson & Johnson), although this would commonly be placed in a separate domain Association (e.g. contractors) that is external to the organization. To identify geographically distinct regions (e.g. Kansas City) the X.521 standard recommends a "locality" entry instead. Job types or functions (e.g. managers, storage servers) that runs across all divisions of a company should be represented by an "organizational role" entry. Sun Enterprise Directory Server and Active Directory In Sun Java System Directory Server and Microsoft Active Directory (AD), an organizational unit (OU) can contain any other unit, including other OUs, users, groups, and computers. Organizational units in separate domains may have identical names but are independent of each other. OUs let an administrator group computers and users so as to apply a common policy to them. Organizational Units give a hierarchical structure, and when properly designed can ease administration. Origins with X.500, Novell, and Lotus software Novell and Lotus supplied the two largest software directory systems. Each of these companies started with flat accoun
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%2011
U 11 is the Rundata designation for a runestone that is located near the ruins of the old king's dwelling at Alsnö hus near Hovgården on the island of Adelsö in Sweden. Description This runestone has an intricate design with the runic text within serpents. The inscription is unsigned and is classified as being carved in runestone style Pr4, which is also known as Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks. Tolir is described as being a "bryte," which is an old Swedish word for a thrall who worked as the thralls' foreman. The word "bryte" comes from "to break," in the meaning of breaking bread, so "bryte" can be interpreted as the person who serves out food. Gylla was Tolir's wife. Håkon is believed to be the reigning king Håkan the Red, who is generally accepted as ruling during the 1070s. This would be consistent with the runic text, which using the word kunungi or kunungr, Old Norse for "king." Because of this, the stone is known as Håkansstenen. Tranlisteration of runic text into Latin letters raþ| |þu : runaʀ : ret : lit : rista : toliʀ : bry[t]i : i roþ : kunuki : toliʀ : a(u)k : gyla : litu : ris... ...- : þaun : hion : eftiʀ ...k : merki srni... haku(n) * (b)aþ : rista Additional images See also Alsnö hus References External links U 11, Hovgården, Adelsö Uppland Runic Inscription 0011
https://en.wikipedia.org/wiki/TPON
TPON might refer to: Telephony over Passive Optical Network, kind of telephone network The Power of Nightmares, 2004 documentary series The Philippine Order of Narnians, Filipino community of CS Lewis enthusiasts Two Parties One Nation, an Instagram-based mock government community
https://en.wikipedia.org/wiki/Recursive%20data%20type
In computer programming languages, a recursive data type (also known as a recursively-defined, inductively-defined or inductive data type) is a data type for values that may contain other values of the same type. Data of recursive types are usually viewed as directed graphs. An important application of recursion in computer science is in defining dynamic data structures such as Lists and Trees. Recursive data structures can dynamically grow to an arbitrarily large size in response to runtime requirements; in contrast, a static array's size requirements must be set at compile time. Sometimes the term "inductive data type" is used for algebraic data types which are not necessarily recursive. Example An example is the list type, in Haskell: data List a = Nil | Cons a (List a) This indicates that a list of a's is either an empty list or a cons cell containing an 'a' (the "head" of the list) and another list (the "tail"). Another example is a similar singly linked type in Java: class List<E> { E value; List<E> next; } This indicates that non-empty list of type E contains a data member of type E, and a reference to another List object for the rest of the list (or a null reference to indicate that this is the end of the list). Mutually recursive data types Data types can also be defined by mutual recursion. The most important basic example of this is a tree, which can be defined mutually recursively in terms of a forest (a list of trees). Symbolically: f: [t[1], ..., t[k]] t: v f A forest f consists of a list of trees, while a tree t consists of a pair of a value v and a forest f (its children). This definition is elegant and easy to work with abstractly (such as when proving theorems about properties of trees), as it expresses a tree in simple terms: a list of one type, and a pair of two types. This mutually recursive definition can be converted to a singly recursive definition by inlining the definition of a forest: t: v [t[1], ..., t[k]] A tree t consists of a pair of a value v and a list of trees (its children). This definition is more compact, but somewhat messier: a tree consists of a pair of one type and a list another, which require disentangling to prove results about. In Standard ML, the tree and forest data types can be mutually recursively defined as follows, allowing empty trees: datatype 'a tree = Empty | Node of 'a * 'a forest and 'a forest = Nil | Cons of 'a tree * 'a forestIn Haskell, the tree and forest data types can be defined similarly:data Tree a = Empty | Node (a, Forest a) data Forest a = Nil | Cons (Tree a) (Forest a) Theory In type theory, a recursive type has the general form μα.T where the type variable α may appear in the type T and stands for the entire type itself. For example, the natural numbers (see Peano arithmetic) may be defined by the Haskell datatype: data Nat = Zero | Succ Nat In type theory, we would say: where the two arms of the sum type represent th
https://en.wikipedia.org/wiki/Network%20redirector
In DOS and Windows, a network redirector, or redirector, is an operating system driver that sends data to and receives data from a remote device. A network redirector provides mechanisms to locate, open, read, write, and delete files and submit print jobs. It provides application services such as named pipes and MailSlots. When an application needs to send or receive data from a remote device, it sends a call to the redirector. The redirector provides the functionality of the presentation layer of the OSI model. Networks Hosts communicate through use of this client software: Shells, Redirectors and Requesters. In Microsoft Networking, the network redirectors are implemented as Installable File System (IFS) drivers. See also Universal Naming Convention (UNC) References External links Network Redirector Drivers at Microsoft Docs Device drivers Operating system technology
https://en.wikipedia.org/wiki/Crud
Crud or CRUD may refer to: Waste, dirt, feces, or something of poor quality Create, read, update, and delete (CRUD), basic functions of a computer database Crud (game), a game played on a billiard table CRUD (radio station), a former radio station of Rochdale College in Toronto, Canada "Crud", a song by British rapper Ghetts from his 2021 album Conflict of Interest See also Crud Puppy, a fictional character
https://en.wikipedia.org/wiki/Raid%20over%20Moscow
Raid Over Moscow (Raid in some countries and on reissue) is a computer game by Access Software published in Europe by U.S. Gold for the Commodore 64 in 1984 and other microcomputers in 1985-1986. Released during the Cold War era, Raid Over Moscow is an action game in which the player (an American space pilot) has to stop three Soviet nuclear attacks on North America, then fight his way into and destroy a nuclear facility located in Moscow's Kremlin. According to the game's storyline, the United States is unable to respond to the attack directly due to the dismantlement of its nuclear arsenal. The game is famous in Finland due to the political effect of its content. A leftist member of the Finnish parliament went as far as to make a parliamentary question about whether it was acceptable to sell the game. The resulting debate and publicity made the game a top seller in the country. Gameplay First stage The game opens with an alert that a nuclear missile has been launched from a Soviet city towards a North American city. The game begins in the hangar where the American spaceplanes are stored. The player has to safely fly the craft out. The view switches to the earth as seen from low Earth orbit, and the player guides the spaceplane to the city launching the attack. Alternatively, the player may decide to maneuver more of the available spaceplanes out of the space station before attacking the launch site; the surplus planes are docked outside the space station. Meanwhile, the clock is ticking, and the time before impact is continually displayed. The player has then to fly through the defense perimeter around the launch site missile silo, dodging obstacles, heat-seeking missiles, and Soviet tanks and planes. If successful, the player proceeds to the next screen; otherwise, the player has to start the next life back at the hangar, with the clock still ticking. However, should the player have spare spaceplanes parked outside the space station, the game continues with a new life at the current screen, skipping the flight from space station to the launch site. The decision to launch more than a single spaceplane first may therefore save time if the player later loses a life. The final part of this stage involves destroying the missile silo while avoiding Soviet planes trying to shoot down the player. Destroying the primary missile silo in the center before the missile lands will thwart the attack. Destroying the secondary silos on either side of the primary earns extra lives and points. The Soviets launch a total of four missile attacks, from Leningrad, Kiev, Minsk, and Saratov, all of which must be stopped in the same manner as the first. After the fourth launch, the player progresses to the second stage of the game. Second stage The pilots become foot soldiers and are placed outside the front facade of the "Defence Centre", depicted as the State Historical Museum. Using a mortar they must blast open the correct door to the facility, randomly
https://en.wikipedia.org/wiki/ITV%20Nightscreen
ITV Nightscreen is a scheduled programme on the ITV television network, consisting of a sequence of animated pages of information about ITV's upcoming programmes, features and special events, with easy listening music in the background. The programme was used to fill the station's overnight downtime, where a closedown would have once been used at the end of programmes. The programme was generally shown seven days a week with the typical weekday show airing from 4:05am to 5:05am daily. However, on ITV's digital channels, the amount of Teleshopping affects how much Nightscreen is broadcast. The programme was also broadcast on all of ITV's +1 channels. At Christmas and weekends, an additional 55minutes was broadcast from 5:00am – 6:00am as no other programmes were shown. Very occasionally was is not broadcast due to live events and other programming filling its hour. It was first broadcast on 14 January 1998, and consisted of teletext pages taken from the ITV regional teletext services, with interstitial teletext-based animations in a similar style to the former 4-Tel On View. Since 2003 the screens have been produced using Scala InfoChannel3. In early 2009, updated systems were installed with the latest version of Scala5, with a dual redundant system to counter any issues of service. In April 2012, the system was upgraded again to a newer version of Scala5. This, amongst other minor presentational changes, allowed compatibility of the service to be transmitted in 16:9 widescreen for the first time, as opposed to 4:3. As well as providing focus on upcoming programmes, films and TV listings, it also used to offers some news from the world of entertainment. In the past it also offered sports news and even on some occasions cooking tips, recipes and also fact files of characters from famous ITV shows such as Emmerdale and Coronation Street. The Scala system was provided by Beaver Group, and the programme was produced by Gower Creative Communications with soundtracks provided by KPM Music and BMG Production Music. In October 2021, the programme was replaced by Unwind with ITV (branded as Unwind with STV on STV in Central Scotland and North of Scotland). Origins Teletext screens had been employed by the BBC since 1980 and by Channel 4 since 1983 to fill airtime cheaply. In-vision teletext was only ever occasionally used on the ITV network. From April 1986, certain regions, firstly Central Independent Television, followed in January 1987 by Yorkshire Television, started showing overnight teletext sequences containing details of local job vacancies under the title Jobfinder. Initially the pages were broadcast for an hour after the end of regular programming but from April 1987 Central broadcast Jobfinder throughout their overnight downtime. When 24-hour television began in 1988, the majority of ITV regions broadcast a Jobfinder programme in the hour preceding the ITV Morning News. Also, for a short while in 1987, an Oracle-provided service preceding
https://en.wikipedia.org/wiki/BBC%20Learning%20Zone
The BBC Learning Zone (previously The Learning Zone) was an educational strand run by the BBC as an overnight service on BBC Two. It broadcast programming aimed at students in Primary, Secondary and Higher Education as well as to adult learners. Viewers are encouraged to watch programmes after the original broadcast via the use of, originally VHS, then later DVD. In 2015, the BBC confirmed that due to budget cuts, the service would no longer be running. History The BBC Learning Zone was launched as The Learning Zone on 9 October 1995, as an extension service of BBC2, to free up more of their schedule. Previously, these educational programmes had been based on the channel in mornings and often until the early afternoon on weekdays. However, following the channel's rebranding to the "2" idents and the increased viewer perception that resulted from it, the channel was anxious to use more of their daytime for different programming. The Learning Zone was the solution to this problem. The idea had been around for a while: by 1995, ITV was operating as a 24-hour channel, freeing up their prime time and daytime schedules. The BBC attempted producing specialist television overnight by launching BBC Select. This service played out encrypted programming for professions such as medicine and law overnight between 1992 and 1995. Also, from the start of 1993, some BBC Schools programmes were shown (as subject blocks or a series block) overnight as part of a new experiment called Nightschool TV. When BBC Two's regular programmes concluded for the night, the channel would transfer to Pages from Ceefax, until the service began at 12.30am (2am on Monday mornings). It would continue through the night, ending at 7am. Programming was also broadcast at the weekend, but only for two hours, between 3am and 5am for DynaMo, were shown on Fridays and Saturdays. In 2004, the service started at 2am every day and continuing until 6am when programming on BBC Two would begin, however this was not always the case. The service then ran between 4am and 6am, and usually did not operate when schools were not open (Summer, Easter Holidays etc.). In 1997, when the BBC rebranded, The Learning Zone was renamed BBC Learning Zone, became a separate strand of programming in its own right and became independent of BBC Two. In 2015, the BBC confirmed that 'due to budget cuts', the service would be no longer be running on BBC Two. Instead, it was said to be moving online on the BBC Education and BBC Teach websites. The final BBC Learning Zone aired in the early hours of 24 July 2015. Programming The service, upon launch, was used for the transfer of programming, including the bulk of Open University programming, secondary school programming previously from the BBC Schools strand as well as other programming. Programming was divided up into segments, as seen below: Open University and General Interest - Programming from the open university for Degree students and other programmes that m
https://en.wikipedia.org/wiki/Larry%20Ewing
Larry Ewing is an American computer programmer who is known as the creator of the Linux mascot, Tux. The artwork was created in 1996, while Ewing was a student at Texas A&M University, originally as a submission to a contest to create the Linux logo. Though Ewing's submission didn't win, his artwork was adopted as the Linux "brand character". Ewing also created the Ximian and Mono monkey logos and is involved in: F-Spot: a project aiming to "manage all your digital photography needs." GtkHTML: a fast and dirty HTML renderer and editor used in several free software projects. Novell Evolution: a mailer, a calendar and a contact manager, all in one. GIMP: an image manipulation program. Moonlight: an open source implementation of Silverlight for Unix systems. Mimekit: A C# MIME creation and parser library with support for S/MIME, PGP, TNEF and Unix mbox spools. .NET Foundation: an independent organization, incorporated to improve open-source software development and collaboration around the .NET Framework. He lives in Austin with his wife Kristy and his daughters Eva and Hazel. References External links Larry Ewing's Home Page Larry Ewing's Tux Page Article discussing the creation of Tux Larry Ewing's Github Page Living people Year of birth missing (living people) Free software programmers
https://en.wikipedia.org/wiki/Tenspeed%20and%20Brown%20Shoe
Tenspeed and Brown Shoe is an American detective comedy series originally broadcast by the ABC network between January and June 1980. The series was created by executive producer Stephen J. Cannell and a joint production of Stephen J. Cannell Productions in association with Paramount Television. Most of the show's creative staff (Cannell, Juanita Bartlett, Gordon T. Dawson) were veterans of the private detective series The Rockford Files, which concluded its run about two weeks before Tenspeed and Brown Shoe debuted. Plot The one-hour program revolved around two private detectives who had their own detective agency in Los Angeles. E. L. (Early Leroy) "Tenspeed" Turner (Ben Vereen) is a hustler who worked as a private detective to satisfy his parole requirements. His partner Lionel "Brownshoe" Whitney (Jeff Goldblum) is an archetypal accountant, complete with button-down collars and a nagging fiancee (in the pilot episode), who had always wanted to be a 1940s-style Bogart private investigator. A running joke was his penchant for reading a series of hard-boiled crime novels, subtitled "A Mark Savage Mystery", written by Stephen J. Cannell (in-universe; Cannell wrote the quoted bits but not a real-life series of actual novels), with Goldblum reading some passages in voice-over. But Brownshoe was sharper than he seemed (albeit a little naïve) and more reasonable than his career path demanded; he had even received a black belt in karate. Cast Ben Vereen as E.L. Turner Jeff Goldblum as Lionel Whitney Richard Romanus as Tedesco Larry Manetti as Chip Vincent Production This was the first series to come from Stephen J. Cannell Productions as an independent company (it was distributed through Paramount Television, one of only two such collaborations; the other was Riptide). It is also the only one not to carry the famed Cannell logo on any episodes, having "A Stephen J. Cannell Production" appearing in-credit (the logo was not introduced until 1981, when The Greatest American Hero began airing). The show had broad similarities to the later television series Simon & Simon and Moonlighting, in that it was a lightly dramatic program with many comic moments about two dissimilar detectives who attempt to solve cases together. Cannell later recycled the basic idea of Tenspeed and Brown Shoe (a crime-solver on the right side of the law working with and taking responsibility for the rehabilitation of an ex-criminal) as the successful Hardcastle and McCormick. Episodes Reception The show was heavily promoted by ABC at the time it premiered in late January 1980. The series attracted a substantial audience for its first few episodes (the series was the 29th-most watched program of the 1979–80 U.S. television season, according to Nielsen ratings), but viewership dropped off substantially after that, and the series was not renewed for the 1980–81 season. Home media On March 9, 2010, Mill Creek Entertainment released Tenspeed and Brown Shoe on DVD in Region
https://en.wikipedia.org/wiki/Hillersj%C3%B6%20stone
The Hillersjö stone, listed in the Rundata catalog as U 29 and located at Hillersjö, which is about four kilometers north of Stenhamra on Färingsö, is a runic Younger Futhark inscription that tells, in Old Norse, the tragic real life family saga of Gerlög and her daughter Inga. It is the longest runic inscription in Uppland and the second longest one in Sweden after the Rök runestone. Description The inscription on the Hillersjö stone, which is 2.8 by 1.0 meters, consists of runic text in the younger futhark that is carved on an intertwined serpent. The main text is written on the serpent with extraneous information, such as the fact that "Þorbjôrn Skald carved the runes," carved outside of the serpent. The inscription is classified as being carved in runestone style Pr4, which is also known as Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks. The runic text indicates that Gerlög married with Germund when she was very young, and they had a son who is not named. Germund drowned and the son died. Then Gerlög remarried with Gudrik and they had several children, but only one survived, who was named Inga. Inga married Ragnfast of Snottsta and they had a son who is not named. Both Ragnfast and the son died and so Inga inherited the estate Snottsta. Inga then married Eric, but both soon died without leaving any children. This meant that Gerlög inherited her daughter's property. It has been noted that the chain of inheritance documented on the Hillersjö stone, including how property passed to women through their children, is consistent with the inheritance rules later codified in the 1296 Uppland Law. This text is completed with information from runestone U 20/U 21, where it is said that both Gudrik (Gerlög's second husband and Inga's father) and Eric (Inga's second husband) had died. The estate Snottsta (also spelled Snåttsta) still exists. At Snottsta and the neighboring Vreta there are several other runestones that complete the saga of Inga that are called the Snottsta and Vreta stones. The runic text begins with the imperative Rað þu! which is translated as "Interpret!" Other runestones with similar imperitive exclamations in their runic texts include U 328 in Stora Lundby and Sö 158 in Österberga. On the Hillersjö stone, Rað þu! is carved on the eye of the serpent, perhaps indicating that the stone as a record of inheritance was intended for the public. The inscription is signed by the runemaster Þorbjôrn Skald, who also signed the runestone U 532 at Roslags-Bro. Other inscriptions have been attributed to him, including several stones signed only with "Þorbjôrn." He was likely selected as the runemaster for his composition of the Hillersjö stone's text in alliterative verse known as höjningar, a traditional style which uses half-lines cha
https://en.wikipedia.org/wiki/European%20Foundation%20for%20Management%20Development
The European Foundation for Management Development (EFMD) is an international not-for-profit association based in Brussels. Europe's largest network association in the field of management development, it has over 890 member organizations from academia, business, public service and consultancy in 88 countries (as of September 2017). EFMD provides a forum for networking in management development. EFMD operates the EFMD Quality Improvement System (EQUIS), which is one of the leading international systems of quality assessment, improvement, and accreditation of higher education institutions in management and business administration. It is comparable to its American equivalent Association to Advance Collegiate Schools of Business and provides a forum for information, research, networking and debate on innovation and best practice in management development. The foundation also runs the EFMD Programme Accreditation System (EPAS) for programmes as well as the EFMD Deans Across Frontiers development programme (EDAF) and the Business School Impact System (BSIS). Types of accreditation While the EQUIS accreditation process, which is valid for an entire school (or faculty), is the main type of accreditation EFMD offers, there are a variety of other accreditations available. With EPAS it is possible for business schools to have certain degree programs accredited rather than the entire school. This variant somewhat resembles the AMBA (Association of MBAs) accreditation, as the London-based Association accredits the school's entire portfolio of MBA programs, but does not accredit the entire business school. EFMD also offers an accreditation for online courses (EOCCS) and for corporate learning (CLIP). EFMD activities EFMD is the European partner in the China Europe International Business School (CEIBS), a joint venture with Shanghai Jiaotong University established as the first international business school in China with autonomous status in 1994, under an agreement between the European Commission and the Chinese Ministry of Foreign Trade and Economic Cooperation. EFMD is also founding partner of the Global Foundation for Management Education (GFME), which is a joint venture with the US-based Association to Advance Collegiate Schools of Business (AACSB International). EFMD organizes conferences and seminars around the world for management development industry and published the Global Focus magazine. In 2009, EFMD received an EU grant worth €2.2m for a project that aims to improve the efficiency of Cuban companies by providing training to senior managers. This project, called Consolidating and Strengthening Cuban Managerial Capabilities, is to be implemented under the leadership of EFMD together with ESADE, a business school in Barcelona, and the Cuban Ministry of Higher Education. References External links official website Educational organisations based in Belgium Educational organizations based in Europe 1972 establishments in Belgium Educational
https://en.wikipedia.org/wiki/XBAND
XBAND (stylized as XBⱯND) was one of the first competitive online console gaming networks and was available for the Genesis and Super NES. It was produced by Catapult Entertainment in Cupertino, California. It is the only modem released in America to have been officially licensed by Nintendo. It debuted in various areas of the United States in late 1994 and 1995 and was later released nationwide between October 2 and 8, 1995. History The Genesis version of the XBAND was released in November 1994, with the Super NES version following in June 1995, and the Super Famicom version in April 1996. The Genesis version also works with the Genesis Nomad. In Brazil the Mega Drive service was released as the Mega Net 2, named after the Sega Meganet. In 1995, Catapult Entertainment signed a deal with General Instrument, producers of the Sega Channel, which stipulated that the XBAND modem would henceforth be built into new Sega Channel adapters, and that the top 5 to 10 games offered by Sega Channel each month would be playable over XBAND. Initially, Catapult Entertainment had a limited staff and virtually no advertising. By January 1997, XBAND network playability had reached practically every metropolitan area and several rural areas in the U.S. The actual XBAND modems were carried by a few software and video rental chains across the United States. Internationally, the XBAND had some limited growth in the Japanese market, and Catapult was working on PC and Sega Saturn support, though it merged with Mpath Interactive. The focus shifted to the online PC gaming service Mplayer.com which was taken offline and integrated into GameSpy Arcade in 2001, after being acquired by GameSpy on December 2000. Service The concept of playing online was fairly new at the time. Arcades were still quite popular, and online gaming was not yet a household idea. The XBAND modem was widely available at Blockbuster Video for , with additional charges based on usage. Two pricing plans were available. One had a monthly fee of $4.95 and allowed the user to connect to the service up to 50 times a month with each additional connection costing 15 cents. The other had a monthly fee of $9.95 with unlimited connections. Activities that consumed a player's monthly allowance of connections included dialing into the XBAND service for matchmaking, downloading mail (called "XMAIL"), and downloading the daily edition of the two XBAND newsletters, one containing generic news and the other containing platform-specific information such as leaderboards and contest announcements. Players were assessed a fee of $3.95/hour for connecting to opponents outside their local calling area; player-to-player connections inside their local calling area were free. The modem features built-in storage for up to four user codenames. It stores user friend lists, which can contain the codenames of up to ten of the user's friends; the users' XMAIL boxes, storing up to ten incoming and ten outgoing messages for each
https://en.wikipedia.org/wiki/Fileset
In computing, a fileset is a set of computer files linked by defining property or common characteristic. There are different types of fileset though the context will usually give the defining characteristic. Sometimes it is necessary to explicitly state the fileset type to avoid ambiguity, an example is the emacs editor which explicitly mentions its Version Control (VC) fileset type to distinguish from its "named files" fileset type. Fileset types While there is probably no classification of fileset types some common usage cases do emerge: A fileset type where the set of files in the fileset are simply enumerated or selected, as an example in the way named filesets are constructed in emacs. The set of files included in an software installation package is used in both the AIX operating system installation packaging system, and the HP-UX packaging system. For fileset types relating to filesystems there may be a relationship to directories. In terms of Namespace Database (NSDB) Protocol for Federated File Systems: In coding forms some libraries may define a fileset object type, typically as a case specific name Fileset, or FileSet which is used to hold an object which references a set of files. Specific examples Fileset has several meanings and usages, depending on the context. Some examples are: In the AIX operating system installation packaging system it is the smallest individually installable unit (a collection of files that provides a specific function). DCE/DFS uses the term fileset to define a tree containing directories, files, and mount points (links to other DFS filesets). A DFS fileset is also a unit of administrative control. Properties such as data location, storage quota, and replication are controlled at this level of granularity. The concept of a fileset in DFS is essentially identical to the concept of a volume in AFS. The glamor filesystem uses the same concept of filesets. Filesets are lightweight components compared to file systems, so management of a file set is easier. In IBM GPFS represents a set of files within a file system which have an independent inode space. References Computing terminology
https://en.wikipedia.org/wiki/Jizzy%20Pearl
Jizzy Pearl (born James Wilkinson, March 17, 1958) is an American hard rock and heavy metal singer. He first fronted the band Data Clan, which eventually became Love/Hate. Pearl has also sung for L.A. Guns, Ratt, Adler's Appetite, Quiet Riot and other, lesser known acts. Pearl is known for, in the words of KNAC.com, his "gritty-sounding blues-influenced" vocals. Biography In the late 1980s, Pearl sang for Love/Hate, which achieved notoriety for performances as the house band at the Whisky a Go Go in Hollywood. The group subsequently signed to Columbia Records. In early 2007, Pearl announced he would reunite with Love/Hate after ten years, on February 24, 2007, at Club Vodka in Hollywood, California, to perform their classic record Blackout in the Red Room in its entirety. In 2013, Pearl joined Quiet Riot, replacing then vocalist Scott Vokoun. The band decided to record a new album with Pearl that they set for release in early 2014. That effort became Quiet Riot 10 (also alternatively known as just 10), which was the twelfth studio album by the heavy metal band and featured a mix of songs with Pearl as well as live tracks with founder vocalist Kevin DuBrow. The album came out on June 27, 2014. It has received mixed to positive reviews from publications such as KNAC.com and Music Enthusiast Magazine. Pearl quit Quiet Riot at the end of 2016 to focus on his solo work, and was replaced by Seann Nichols, who was subsequently replaced by James Durbin in March 2017. Durbin quit in September 2019, and Pearl re-joined. He continues to front Quiet Riot as of 2023. Discography References External links Jizzy Pearl – Official website 1958 births Living people American rock singers Glam metal musicians L.A. Guns members Ratt members Adler's Appetite members Quiet Riot members Sin City Sinners members
https://en.wikipedia.org/wiki/Stack%20search
Stack search (also known as Stack decoding algorithm) is a search algorithm similar to beam search. It can be used to explore tree-structured search spaces and is often employed in Natural language processing applications, such as parsing of natural languages, or for decoding of error correcting codes where the technique goes under the name of sequential decoding. Stack search keeps a list of the best n candidates seen so far. These candidates are incomplete solutions to the search problems, e.g. partial parse trees. It then iteratively expands the best partial solution, putting all resulting partial solutions onto the stack and then trimming the resulting list of partial solutions to the top n candidates, until a real solution (i.e. complete parse tree) has been found. Stack search is not guaranteed to find the optimal solution to the search problem. The quality of the result depends on the quality of the search heuristic. References Example applications of the stack search algorithm can be found in the literature: Frederick Jelinek. Fast sequential decoding algorithm using a stack. IBM Journal of Research and Development, pp. 675-685, 1969. Ye-Yi Wang and Alex Waibel. Decoding algorithm in statistical machine translation. Proceedings of the 8th conference on European chapter of the Association for Computational Linguistics, pp. 366-372. Madrid, Spain, 1997. Search algorithms
https://en.wikipedia.org/wiki/Lewis%20Shiner
Lewis Shiner (born December 30, 1950 in Eugene, Oregon) is an American writer. Shiner began his career as a science fiction writer, and then identified with cyberpunk. He later wrote more mainstream novels, albeit often with magical realism and fantasy elements. He was formerly a resident of Texas (and a member of the Turkey City Writer's Workshop), and now lives in North Carolina. Life and career Shiner graduated from Southern Methodist University in 1973. Several of his novels have rock music as a theme or main focus, especially the musicians of the late 1960s; for example, Shiner's 1993 novel Glimpses considers the great never-recorded albums of The Doors, Brian Wilson, The Beatles and Jimi Hendrix. Say Goodbye: The Laurie Moss Story (1999) focuses on a fictional up-and-coming female musician and her subsequent fall back down. Slam (1990) is immersed in skate punk and anarchist culture. Perhaps because novels with music as a major theme are not generally considered mainstream genre material, his work has frequently been overlooked. He is a contributing author to the George R. R. Martin-edited anthology Wild Cards, notably creating that universe's most powerful character, the tantric sex magic wielding pimp, Fortunato. In July 2007 Shiner created the web site Fiction Liberation Front (FLF) as a venue for his short stories. The stories are released under the Creative Commons license and are available in HTML and PDF formats. Since 2006, Shiner has been a card-carrying member of the Industrial Workers of the World. On July 22, 2007, The News & Observer began publishing a weekly column by Shiner, titled "Graphic Scenes", about comics. Bibliography Novels Frontera. Riverdale, NY, USA: Baen, 1984 (paper). Deserted Cities of the Heart. New York, NY, USA: Doubleday, 1988. Slam. New York, NY, USA: Doubleday, 1990. Glimpses. New York, NY, USA: William Morrow & Co., 1993. (World Fantasy Award winner) Say Goodbye. New York, NY, USA: St Martin's, 1999. Black & White. Burton, MI, USA: Subterranean Press, 2008. Dark Tangos. Burton, MI, USA: Subterranean Press, 2011. Outside the Gates of Eden. Burton, MI, USA: Subterranean Press, 2019. Collections Nine Hard Questions about the Nature of the Universe. Eugene, OR, USA: Pulphouse Publishing, 1991. No ISBN (Author's Choice Monthly #4) The Edges of Things. Baltimore, WA, USA: Washington Science Fiction Association, 1991. Twilight Time. Eugene, OR, USA: Pulphouse Publishing, 1991. No ISBN Private Eye Action As You Like It with Joe R. Lansdale. Holyoke, MA, USA: Crossroads Press, 1998. Love in Vain. Burton, MI, USA: Subterranean Press, 2001. Shades of Gray (chapbook available with the signed, numbered limited edition of Black and White). Burton, MI, USA: Subterranean Press, 2008. Love in Vain (Australian edition, includes previously uncollected novellas "Perfidia" and "Primes"). Greenwood, WA, Australia: Ticonderoga Publications, 2009. Collected Stories. Burton, MI, USA: Subterranean Press, 2
https://en.wikipedia.org/wiki/NAA
NAA or Naa may refer to: People Naa Ashorkor (born 1988), Ghanaian actress and radio/ TV broadcaster Naa Govindasamy (1946–1999), Singaporean Tamil-language writer and computer font developer Naa Someswara, Indian science writer and TV presenter Businesses and organizations Airports and aviation Narita International Airport Corporation, Japan Narrabri Airport (IATA code NAA), New South Wales, Australia National Aeronautic Association, US National Aviation Academy, training school in the US National aviation authority or civil aviation authority, in each country North American Airlines, founded 1989, ceased operations 2014 North American Aviation, major US aerospace manufacturer from 1928 to 1967 Norwegian Air Argentina, an Argentinian airline In other fields National Academy of Arbitrators, US and Canada National Academy of Arts, Bulgaria National Anthropological Archives of the Smithsonian Institution, US National Archives of Australia National Assessment Agency, in the UK Department for Education and Skills National Association of Actors, a Mexican television and motion picture performers union National Auctioneers Association, US Negro American Association, US baseball minor Negro league Newspaper Association of America, a trade association Nigerian Accounting Association North American Arms, an arms company In science and technology 1-Naphthaleneacetic acid, a synthetic auxin (organic compound and plant hormone) N-Acetylaspartic acid, a neurochemical often imaged in magnetic resonance spectroscopy Neutron activation analysis, a nuclear process used for determining the concentrations of elements in materials Nicotinamide, also called niacinamide, the amide of nicotinic acid No abstract available bias, an academic tendency to preferentially cite journal articles that have an abstract available online Nucleic acid amplification, a molecular biology technique for replicating segments of DNA Network Address Authority, iSCSI terminology Other uses National Arabic Alphabets, in the Unicode standard VLF Transmitter Cutler (call-sign NAA), a radio station in Cutler, Maine, operated by the United States Navy NAA (Arlington, Virginia) a Navy radio facility located in Arlington, Virginia from 1913 to 1941
https://en.wikipedia.org/wiki/List%20of%20radio%20stations%20in%20Maine
The following is a list of FCC-licensed radio stations in the U.S. state of Maine, which can be sorted by their call signs, frequencies, cities of license, licensees, and programming formats. List of radio stations Defunct WALZ WHGS WKZX WLVC WMNE WNSW WQDY WSJR WVOM References Maine Radio