source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/UniFLEX
UniFLEX is a Unix-like operating system developed by Technical Systems Consultants (TSC) for the Motorola 6809 family which allowed multitasking and multiprocessing. It was released for DMA-capable 8" floppy, extended memory addressing hardware (software controlled 4KiB paging of up to 768 KiB RAM), Motorola 6809 based computers. Examples included machines from SWTPC, Gimix and Goupil (France). On SWTPC machines, UniFLEX also supported a 20 MB, 14" hard drive (OEM'd from Century Data Systems) in 1979. Later on, it also supported larger 14" drives (up to 80 MB), 8" hard drives, and 5-1/4" floppies. In 1982 other machines also supported the first widely available 5-1/4" hard disks using the ST506 interface such as the 5 MB BASF 6182 and the removable SyQuest SQ306RD of the same capacity. Due to the limited address space of the 6809 (64 kB) and hardware limitations, the main memory space for the UniFLEX kernel as well as for any running process had to be smaller than 56 kB (code + data)(processes could be up to 64K minus 512 bytes). This was achieved by writing the kernel and most user space code entirely in assembly language, and by removing a few classic Unix features, such as group permissions for files. Otherwise, UniFLEX was very similar to Unix Version 7, though some command names were slightly different. There was no technical reason for the renaming apart from achieving some level of command-level compatibility with its single-user sibling FLEX. By simply restoring the Unix style names, a considerable degree of "Unix Look & Feel" could be established, though due to memory limitations the command line interpreter (shell) was less capable than the Bourne Shell known from Unix Version 7. Memory management included swapping to a dedicated portion of the system disk (even on floppies) but only whole processes could be swapped in and out, not individual pages. This caused swapping to be a very big hit on system responsiveness, so memory had to be sized appropriately. However UniFLEX was an extremely memory-efficient operating system. Machines with less than a megabyte of RAM serving a dozen asynchronous terminals were not uncommon and worked surprisingly well. TSC never bundled a C compiler with UniFLEX for the 6809, though they produced one. But in the early 1980s a C language implementation became available as a 3rd party products (the "McCosh" and "Introl" compilers). Using such a C compiler could establish source-level compatibility with Unix Version 7, i.e., a number of Unix tools and applications could be ported to UniFLEX - if size allowed: Unix on a PDP-11 limited executables to 64 kB of code and another 64 kB of data, while the UniFLEX limitation was approximately 56 kB for both, code and data together. Not much application software was available for UniFLEX. Ports of the Dynacalc spreadsheet and the Stylograph word processor from the FLEX operating system existed but only very few copies were sold. In the mid 1980s a successor vers
https://en.wikipedia.org/wiki/Fox%20%28British%20and%20Irish%20TV%20channel%29
Fox (stylised as FOX) was a British pay television channel serving the United Kingdom and Ireland, owned by Fox Networks Group, a unit of Disney International Operations. It launched on 12 January 2004 as FX289, then changed its name to FX in April 2005 (similar to the American FX), and rebranded to FOX in January 2013. Featuring a mix of comedies and drama series, the channel's programming targeted adults from 18 to 35 years old. It was announced on 17 May 2021 that Fox would cease broadcasting in the UK and Ireland on 1 July 2021. Most of its content was moved to Star on Disney+. The channel ceased broadcasting as planned on that day. History FX289 (2004–05) The channel launched on 12 January 2004 branded as FX289, in reference to its Sky EPG number. In its early years, it mainly broadcast films from the 20th Century Studios library. FX (2005–2013) The channel was rebranded as FX as it moved in the Sky EPG on 21 April 2005. As FX, the channel targeted a demographic of mainly males. Unlike its American counterpart, it promoted and aired both Fox-produced and non-Fox-produced shows. It had a similar format to its American sister channel, with a schedule consisting largely of Fox-produced shows, including comedies such as Arrested Development, Family Guy, American Dad! and King of the Hill, and dramas such as Millennium, The Shield, The X-Files, and NYPD Blue. Non-Fox-produced shows rerun or receiving their UK premiere on the channel include The Walking Dead, Falling Skies, Babylon 5, Carnivàle, Highlander, JAG, NCIS, Sleeper Cell, E-Ring and Huff, Nip/Tuck, Generation Kill, True Blood, Mob City and Dexter. The channel also produced original content such as the sketch show No Signal! Fox (2013–2021) FX was rebranded as Fox at GMT on 11 January 2013 with the beginning of the tenth season of NCIS. With this change, the target demographic switched to both men and women aged between 18 and 35 years old. New programmes added to the schedule included Louie, The Ricki Lake Show, Men at Work, Da Vinci's Demons and the second season of The Increasingly Poor Decisions of Todd Margaret, while many of the programmes that featured on FX continued to broadcast such as The Walking Dead, Dexter, True Blood, Falling Skies, Family Guy, and NCIS. Fox also planned to commission up to 50 hours of original UK content by the end of the year, expecting to spend between £5m and £10m. Fox was removed from the BT YouView platform on 1 March 2016. BT stated in an e-mail to customers that Fox had "changed the way they offer their TV channels to TV providers." Following Disney's acquisition of 21st Century Fox, including Fox Networks Group International, the channel falls under ultimate ownership of Walt Disney Direct-to-Consumer and International. In February 2019, the channel rebranded for the first time in more than four years. The rebrand included a new on-air identity which is more modern compared to earlier logos and idents. Closure On 17 May 2021, Disney anno
https://en.wikipedia.org/wiki/Sculpt%203D
Sculpt 3D is a raytrace application released in 1987 for Amiga computers programmed by Eric Graham. Sculpt 3D was one of the first ray tracing applications released for the Amiga computers. It proved that raytracing could be done on home computers as well as on mainframes. Years later, the company Byte by Byte released a port for the Apple Macintosh. The Amiga Juggler The first demo that showed the raytracing capabilities was an animation of a juggler juggling three chrome balls. Even though the juggler was constructed out of spheres, the balls' reflections and movement made it look realistic. The juggler demo was generated on an experimental version of Sculpt 3D. The animation, released in January 1986, generated so much interest that the full 3D application was programmed. Sculpt 4D Sculpt 3D created still images, and a tool compiled an animation from these still images. Sculpt 4D (Sculpt-Animate 4D) added animation capabilities to Sculpt 3D. It allowed movement of objects by setting keyframes. See also TurboSilver Imagine References 3D graphics software Amiga raytracers 1987 software
https://en.wikipedia.org/wiki/Air%20Cess
Air Cess was a cargo airline based in Sharjah, United Arab Emirates. It was founded by Russian arms dealer Viktor Bout. Code data ICAO Code: ACS (not current) Fleet The Air Cess fleet included the following aircraft in August 2006: 1 Antonov An-12 2 Antonov An-24 1 Antonov An-26 1 Antonov An-72 References Defunct airlines of the United Arab Emirates Defunct cargo airlines Cargo airlines of the United Arab Emirates
https://en.wikipedia.org/wiki/Function%20prologue%20and%20epilogue
In assembly language programming, the function prologue is a few lines of code at the beginning of a function, which prepare the stack and registers for use within the function. Similarly, the function epilogue appears at the end of the function, and restores the stack and registers to the state they were in before the function was called. The prologue and epilogue are not a part of the assembly language itself; they represent a convention used by assembly language programmers, and compilers of many higher-level languages. They are fairly rigid, having the same form in each function. Function prologue and epilogue also sometimes contain code for buffer overflow protection. Prologue A function prologue typically does the following actions if the architecture has a base pointer (also known as frame pointer) and a stack pointer: Pushes current base pointer onto the stack, so it can be restored later. Value of base pointer is set to the address of stack pointer (which is pointed to the top of the stack) so that the base pointer will point to the top of the stack. Moves the stack pointer further by decreasing or increasing its value, depending on whether the stack grows down or up. On x86, the stack pointer is decreased to make room for the function's local variables. Several possible prologues can be written, resulting in slightly different stack configuration. These differences are acceptable, as long as the programmer or compiler uses the stack in the correct way inside the function. As an example, here is a typical x86 assembly language function prologue as produced by the GCC push ebp mov ebp, esp sub esp, N The N immediate value is the number of bytes reserved on the stack for local use. The same result may be achieved by using the enter instruction: enter N, 0 More complex prologues can be obtained using different values (other than 0) for the second operand of the enter instruction. These prologues push several base/frame pointers to allow for nested functions, as required by languages such as Pascal. However, modern versions of these languages don′t use these instructions because they limit the nesting depth in some cases. Epilogue Function epilogue reverses the actions of the function prologue and returns control to the calling function. It typically does the following actions (this procedure may differ from one architecture to another): Drop the stack pointer to the current base pointer, so room reserved in the prologue for local variables is freed. Pops the base pointer off the stack, so it is restored to its value before the prologue. Returns to the calling function, by popping the previous frame's program counter off the stack and jumping to it. The given epilogue will reverse the effects of either of the above prologues (either the full one, or the one which uses enter). Under certain calling conventions it is the callee's responsibility to clean the arguments off the stack, so the epilogue can also include the step of mov
https://en.wikipedia.org/wiki/More4
More4 is a British free-to-air television channel, owned by Channel Four Television Corporation. The channel launched on 10 October 2005. Its programming mainly focuses on lifestyle and documentaries, as well as foreign dramas. Content The idea of a sister channel aimed at an older demographic than the youth oriented E4 with the More4 branding was first planned by Channel 4 back in 2003, although it in fact had grown out of an earlier idea which had been known as G4 (of no relation to the American network of the same name.) Channel 4 had previously been planning a free-to-air youth channel before deciding on the More4 concept, as E4 was still a subscription channel at the time. More4 eventually launched on 10 October 2005. Its initial lineup included More4 News, repeats of Channel 4 programmes such as Grand Designs, Countdown and Deal or No Deal and American drama series such as ER, The West Wing and The Sopranos, which had previously been seen on E4, alongside Channel 4. More4 also broadcast the American satire programme The Daily Show from its launch in 2005, and a late evening chat show, The Last Word. Having shown all five weekday editions of The Daily Show since More4's launch, in January 2011 the channel scaled back its commitment to one episode per week in order to increase investment in its arts programming. More4 broadcast a major season of programmes in 2007 celebrating the 25th anniversary of Channel 4, repeating the debut episodes of two of Channel 4's original programmes, Brookside and Countdown. On 23 January 2012, More4 was relaunched, shifting towards a more lifestyle-based schedule. Documentaries which previously aired on the channel moved to Channel 4. More4's schedule runs every day from 08:55 to 04:00. More4 shows programmes from TJC during downtime. Branding 2005–2012 In September 2005, Channel 4 began running teaser trailers for the new station (although the name was neither mentioned nor seen in the adverts). Showing neon lettering, the teasers hinted at "adult entertainment". Some people may have been confused by the deliberate double-meaning of these trailers and mistakenly presumed the new channel would be of a pornographic nature. Advertisements starting at the end of September made it much clearer that the "adult entertainment" being offered was the 'intelligent and insightful' programming. Viewing figures for the launch date gave More4 an average figure of 269,000 viewers, compared to E4's 296,000. The original More4 branding was designed by Spin and animated by DBLG. 2012–present On 23 January 2012, More4 adopted a new logo and on-air branding. The logo and channel idents were designed by London-based design and motion company ManvsMachine and Channel 4's in-house agency, 4Creative. The repositioning of the brand coincided with the channel's move towards more lifestyle content and a move away from documentaries and arts. The idents focus on moving mechanical "scrapbooks" which also refers to the Digital Sc
https://en.wikipedia.org/wiki/TCK
TCK has several meanings: Third Culture Kid, a term in sociology describing children who grow up in cultures other than those of their parents. Technology Compatibility Kit, for Java programming language Tecktonik, a form of dance Teck Resources, NYSE stock symbol is TCK General Directorate of Highways (Turkey) abbreviation A type of thermocouple
https://en.wikipedia.org/wiki/Valentin%20Turchin
Valentin Fyodorovich Turchin (, 14 February 1931 in Podolsk – 7 April 2010 in Oakland, New Jersey) was a Soviet and American physicist, cybernetician, and computer scientist. He developed the Refal programming language, the theory of metasystem transitions and the notion of supercompilation. He was as a pioneer in artificial intelligence and a proponent of the global brain hypothesis. Biography Turchin was born in 1931 in Podolsk, Soviet Union. In 1952, he graduated from Moscow University in Theoretical Physics, and got his Ph.D. in 1957. After working on neutron and solid-state physics at the Institute for Physics of Energy in Obninsk, in 1964 he accepted a position at the Keldysh Institute of Applied Mathematics in Moscow. There he worked in statistical regularization methods and authored REFAL, one of the first AI languages and the AI language of choice in the Soviet Union. In the 1960s, Turchin became politically active. In Fall 1968, he wrote the pamphlet The Inertia of Fear, which was quite widely circulated in samizdat, the writing began to be circulated under the title The Inertia of Fear: Socialism and Totalitarianism in Moscow from 1976. Following its publication in the underground press, he lost his research laboratory. In 1970 he authored "The Phenomenon of Science", a grand cybernetic meta-theory of universal evolution, which broadened and deepened the earlier book. By 1973, Turchin had founded the Moscow chapter of Amnesty International with Andrey Tverdokhlebov and was working closely with the well-known physicist and Soviet dissident Andrei Sakharov. In 1974 he lost his position at the Institute, and was persecuted by the KGB. Facing almost certain imprisonment, he and his family were forced to emigrate from the Soviet Union in 1977. He went to New York, where he joined the faculty of the City University of New York in 1979. In 1990, together with Cliff Joslyn and Francis Heylighen, he founded the Principia Cybernetica Project, a worldwide organization devoted to the collaborative development of an evolutionary-cybernetic philosophy. In 1998, he co-founded the software start-up SuperCompilers, LLC. He retired from his post of Professor of Computer Science at City College in 1999. A resident of Oakland, New Jersey, he died there on 7 April 2010. He has two sons named Peter Turchin and Dimitri Turchin. Peter Turchin is a specialist in population dynamics and mathematical modeling of historical dynamics. Work The philosophical core of Turchin's scientific work is the concept of the metasystem transition, which denotes the evolutionary process through which higher levels of control emerge in system structure and function. Turchin uses this concept to provide a global theory of evolution and a coherent social systems theory, to develop a complete cybernetics philosophical and ethical system, and to build a constructivist foundation for mathematics. Using the REFAL language he has implemented a Supercompiler, a unified method for
https://en.wikipedia.org/wiki/Valentino%20Braitenberg
Valentino Braitenberg (or Valentin von Braitenberg; 18 June 1926 – 9 September 2011) was an Italian neuroscientist and cyberneticist. He was former director at the Max Planck Institute for Biological Cybernetics in Tübingen, Germany. His book Vehicles: Experiments in Synthetic Psychology became famous in Robotics and among Psychologists, in which he described how hypothetical analog vehicles (a combination of sensors, actuators and their interconnections), though simple in design, can exhibit behaviors akin to aggression, love, foresight, and optimism. These have come to be known as Braitenberg vehicles. His pioneering scientific work was concerned with the relation between structures and functions of the brain. Life Valentino Braitenberg grew up in the province of South Tyrol. Braitenberg's father was Senator , a member of the South Tyrolean nobility. Since the age of 6, Braitenberg grew up bilingual in the two languages Italian and German. German was spoken at home and all schooling was Italian, conform to the historic context. The humanistic Lyceum-Gymnasium (High school) in Bolzano gave him an excellent classic education including Italian literature. The German literary education was based on the classical writers he found in the extensive home library. In addition, he trained as a violinist at the in Bolzano and became a talented violinist and violist. Braitenberg studied Medicine and Psychiatry at the University of Innsbruck and University of Rome between 1945 and 1954. He accompanied his studies with chamber music performances with his viola and violin, where he developed a repertoire of violin-piano duos with a colleague. He completed his medical training with an internship at the psychiatric clinic in Rome, where he decided to prefer a scientific career dedicated to the understanding of brain functions. He spent a few years at Yale University in New Haven (USA) when he was invited by Prof. Eduardo Caianiello in 1958 to set up a biocybernetics research group at the Physics Institute of the University of Naples Federico II, the “Laboratorio di Cibernetica”, as part of the National Research Council in Italy (CNR). Between 1958 and 1968 he was adjunct Professor of Cybernetics at the Physics Institute of the University of Naples. In 1963 Braitenberg earned the Libera docenza in Cybernetics and Information Theory, the title that used to grant access to Professorship at Italian Universities. From 1968 until his retirement in 1994 he was co-founder and co-director of the Max Planck Institute for Biological Cybernetics in Tübingen and Honorary Professor at the University of Tübingen and University of Freiburg. After 1994 he was appointed Professor at the Specialization School in Scienze Motorie (Motoric Sciences) at the Rovereto branch of the University of Trento. From 1998 to 2001 he was president of the Laboratorio di Scienze Cognitive at the University of Trento in Rovereto. Braitenberg received an honorary doctorate from the University
https://en.wikipedia.org/wiki/Windows%20Server%202008
Windows Server 2008, codenamed "Longhorn Server", is the fourth release of the Windows Server operating system produced by Microsoft as part of the Windows NT family of the operating systems. It was released to manufacturing on February 4, 2008, and generally to retail on February 27, 2008. Derived from Windows Vista, Windows Server 2008 is the successor of Windows Server 2003 and the predecessor to Windows Server 2008 R2. Windows Server 2008 removed support for processors without ACPI. It is the first version of Windows Server that includes Hyper-V and is also the final version of Windows Server that supports IA-32-based processors (also known as 32-bit processors). Its successor, Windows Server 2008 R2, requires a 64-bit processor in any supported architecture (x86-64 for x86 and Itanium). As of July 2019, 60% of Windows servers were running Windows Server 2008. History Microsoft had released Windows Vista to mixed reception, and their last Windows Server release was based on Windows XP. The operating system's working title was Windows Server Codename "Longhorn", but was later changed to Windows Server 2008 when Microsoft chairman Bill Gates announced it during his keynote address at WinHEC on May 16, 2007. Beta 1 was released on July 27, 2005; Beta 2 was announced and released on May 23, 2006, at WinHEC 2006 and Beta 3 was released publicly on April 25, 2007. Release Candidate 0 was released to the general public on September 24, 2007 and Release Candidate 1 was released to the general public on December 5, 2007. Windows Server 2008 was released to manufacturing on February 4, 2008, and officially launched on the 27th of that month. Features Windows Server 2008 is built from the same codebase as Windows Vista and thus it shares much of the same architecture and functionality. Since the codebase is common, Windows Server 2008 inherits most of the technical, security, management and administrative features new to Windows Vista such as the rewritten networking stack (native IPv6, native wireless, speed and security improvements); improved image-based installation, deployment and recovery; improved diagnostics, monitoring, event logging and reporting tools; new security features such as BitLocker and address space layout randomization (ASLR); the improved Windows Firewall with secure default configuration; .NET Framework 3.0 technologies, specifically Windows Communication Foundation, Microsoft Message Queuing and Windows Workflow Foundation; and the core kernel, memory and file system improvements. Processors and memory devices are modeled as Plug and Play devices to allow hot-plugging of these devices. This allows the system resources to be partitioned dynamically using dynamic hardware partitioning - each partition has its own memory, processor and I/O host bridge devices independent of other partitions. Server Core Windows Server 2008 includes a variation of installation called Server Core. Server Core is a significantly scaled-back
https://en.wikipedia.org/wiki/ThreadX
Azure RTOS ThreadX is a highly deterministic, embedded real-time operating system (RTOS) programmed mostly in the language C. Overview ThreadX was originally developed and marketed by Express Logic of San Diego, California, United States. The author of ThreadX is William Lamie, who was also the original author of the Nucleus RTOS in 1990. William Lamie was President and CEO of Express Logic. Express Logic was purchased for an undisclosed sum by Microsoft on April 18, 2019. The name ThreadX is derived from the threads that are used as the executable elements, and the letter X represents context switching, i.e., it switches threads. ThreadX provides priority-based, preemptive scheduling, fast interrupt response, memory management, interthread communication, mutual exclusion, event notification, and thread synchronization features. Major distinguishing technology characteristics of ThreadX include preemption-threshold, priority inheritance, efficient timer management, fast software timers, picokernel design, event-chaining, and small size: minimal size on an ARM architecture processor is about 2 KB. ThreadX supports multi-core processor environments via either asymmetric multiprocessing (AMP) or symmetric multiprocessing (SMP). Application thread isolation with memory management unit (MMU) or memory protection unit (MPU) memory protection is available with ThreadX Modules. ThreadX has extensive safety certifications from Technischer Überwachungsverein (TÜV, English: Technical Inspection Association) and UL (formerly Underwriters Laboratories) and is Motor Industry Software Reliability Association MISRA C compliant. ThreadX is the foundation of Express Logic's X-Ware Internet of things (IoT) platform, which also includes embedded file system support (FileX), embedded UI support (GUIX), embedded Internet protocol suite (TCP/IP) and cloud connectivity (NetX/NetX Duo), and Universal Serial Bus (USB) support (USBX). ThreadX has won high appraisal from developers and is a very popular RTOS. , according to marketing research firm VDC Research, the ThreadX RTOS has become one of the most popular RTOSes in the world, having been deployed in over 6.2 billion devices, including consumer electronics, medical devices, data networking applications, and SoCs. ThreadX is distributed using a marketing model in which source code is provided and licenses are royalty-free. Supported platforms Analog Devices Blackfin CM4xx Precision Microcontrollers SHARC ULP Microcontrollers Andes RISC-V ARM ARM7 ARM9 ARM Cortex-A ARM Cortex-R ARM Cortex-M ARM Cortex-A 64-bit ARMv8M TrustZone Cadence Xtensa CEVA TeakLite-III eSi-RISC eSi-16x0 eSi-32x0 Infineon XMC1000 XMC4000 Intel Nios II Cyclone Arria 10 x86 Microchip AVR32 PIC24 dsPIC33 PIC32 SAM C-V SAM7 SAM9 SAMA5 MIPS MIPS32 4Kx MIPS32 14Kx MIPS32 24Kx MIPS32 34Kx MIPS32 74Kx MIPS32 1004Kx interAptiv microAptiv proAptiv M-Class NXP ColdFire+/ColdFire i.MX K
https://en.wikipedia.org/wiki/Spreadsheet%202000
Spreadsheet 2000 is a discontinued spreadsheet program for Apple Macintosh computers, published by Casady & Greene, a distributor of many "smaller" Mac releases. It appears to have seen little in terms of sales, and was withdrawn from the market after only a short time. First released in 1993 as Let's Keep It Simple Spreadsheet, officially abbreviated Let's KISS, the product was renamed Spreadsheet 2000 for its 2.0 release in 1997. Spreadsheet 2000, S2K for short, featured a unique way of building complex spreadsheets from a number of simpler ones containing only input or output data. This contrasts with the traditional spreadsheet model, where inputs, calculations and outputs are all placed into a single sheet and cannot be easily differentiated. For instance, if one wants to add two columns of three numbers, under a normal spreadsheet one would type the two sets of values into columns, say and , and then into type the formula =A1+B1, which would appear on-screen as the results. The formula is then copied into the other cells in C. A user looking at the sheet would simply see three columns of numbers, and has no way to differentiate which values are the inputs and which the outputs. Under S2K the same task is separated out to make it easier to understand. The user first creates two separate "sheetlettes" containing one column each, types the input numbers into them, and then connects the two together with the addition function, represented by an icon. The addition icon also has an output connector, and when this is connected to a third sheetlette, the results of the addition appear there automatically. The user could also connect the output to a sheetlette containing a single cell, in which case the addition function would sum all of the cells and display the single result. Since every step of a calculation was represented by input and output sheetlettes as well as the operator icons, S2K worksheets could become cluttered. In order to address this, whole groups of sheets and icons could be selected and collapsed into a compound operator. From that point on, the operator worked just like one of S2K's built-in functions, allowing the user to connect inputs and outputs to it as normal. The whole idea of S2K was to simplify the construction of simple spreadsheets. While it met that goal, the same features made more complex spreadsheets difficult to work with. For instance, trying to debug a complex formula in Excel simply requires the user to click on the cell and read the formula. The same task in S2K may be difficult, with the formula filling several pages or alternately being built several layers deep (compounds of compounds) so that there is no single view of the formula. Additionally S2K's own set of built-in functions was rather limited. S2K was written entirely in Prograph. See also Lotus Improv References Is there life beyond Excel? MacTech article by L.K.I.S.S. 2.0 designer Spreadsheet software Spreadsheet software for macO
https://en.wikipedia.org/wiki/IDEF0
IDEF0, a compound acronym ("Icam DEFinition for Function Modeling", where ICAM is an acronym for "Integrated Computer Aided Manufacturing"), is a function modeling methodology for describing manufacturing functions, which offers a functional modeling language for the analysis, development, reengineering and integration of information systems, business processes or software engineering analysis. IDEF0 is part of the IDEF family of modeling languages in the field of software engineering, and is built on the functional modeling language Structured Analysis and Design Technique (SADT). Overview The IDEF0 Functional Modeling method is designed to model the decisions, actions, and activities of an organization or system.<ref name = "VG00">Varun Grover, William J. Kettinger (2000). Process Think: Winning Perspectives for Business Change in the Information Age. p.168.</ref> It was derived from the established graphic modeling language Structured Analysis and Design Technique (SADT) developed by Douglas T. Ross and SofTech, Inc. In its original form, IDEF0 includes both a definition of a graphical modeling language (syntax and semantics) and a description of a comprehensive methodology for developing models. The US Air Force commissioned the SADT developers "to develop a function model method for analyzing and communicating the functional perspective of a system. IDEF0 should assist in organizing system analysis and promote effective communication between the analyst and the customer through simplified graphical devices". Where the Functional flow block diagram is used to show the functional flow of a product, IDEF0 is used to show data flow, system control, and the functional flow of lifecycle processes. IDEF0 is capable of graphically representing a wide variety of business, manufacturing and other types of enterprise operations to any level of detail. It provides rigorous and precise description, and promotes consistency of usage and interpretation. It is well-tested and proven through many years of use by government and private industry. It can be generated by a variety of computer graphics tools. Numerous commercial products specifically support development and analysis of IDEF0 diagrams and models. An associated technique, Integration Definition for Information Modeling (IDEF1x), is used to supplement IDEF0 for data-intensive systems. The IDEF0 standard, Federal Information Processing Standards Publication 183 (FIPS 183), and the IDEF1x standard (FIPS 184) are maintained by the National Institute of Standards and Technology (NIST). FIPS PUB 183 "Integration Definition for Function Modeling (IDEF0)," was withdrawn as a Federal Standard (in favor of OPEN Specifications and Standards) September 2, 2008, as cited in "The Federal Register", Volume 73, page 51276 (73FR/51276). History During the 1970s, the U.S. Air Force Program for Integrated Computer Aided Manufacturing (ICAM) sought to increase manufacturing productivity through systematic
https://en.wikipedia.org/wiki/A-10%20Attack%21
A-10 Attack! is a combat flight simulation video game for the Apple Macintosh computer released by Parsoft Interactive in 1995. The game features an A-10 Thunderbolt II aircraft that takes part in a variety of missions in West Germany during a hypothetical limited conventional attack by the Warsaw Pact. A-10 boasted one of the most detailed flight models of any game of its era, a physics model that extended to solid-body interactions with the ground and complete aerodynamics for every object in the game, including ordnance. Macworld rated it "Best Flight Simulator" in a review of Mac simulations. The game was followed by a sequel named A-10 Cuba!, originally as a stand-alone game on the Mac and Windows-based PC's, but later re-released on the Mac as a plug-in module for the original game. The Mac OS versions were produced by Parsoft, while the PC version of Cuba was a joint production with Activision. This partnership was renewed for Parsoft's final release, Fighter Squadron: The Screamin' Demons Over Europe. History Development of what would evolve into A-10 Attack! started after the release of Hellcats: Missions at Leyte Gulf, an expansion pack for Hellcats Over the Pacific that was released in 1992. Although Hellcats managed to do a lot with limited capabilities of the hardware, the game had a number of obvious drawbacks. For one, the missions were written in computer code as part of the game engine, which meant the user could not add new missions or modify the existing ones. Another problem was that the vehicles and other objects in the game were hard-coded with various behaviors, which likewise made them difficult to customize. Even the game map itself existed only in the code. Parsoft started experimenting with a plug-in system to replace the hard-coded objects in Hellcats. Known as the Virtual Battlefield Environment (VBE), the system still required programming tools to build out the objects, but once they were completed they could be loaded into the game engine from individual files. Adding these into a game simply required the files to be placed in the appropriate directories in the user's file system. VBE allowed anything to be added in this fashion; aircraft, vehicles, missions, and maps. Another problem with Hellcats was its very basic physics, which simulated only the most basic flight dynamics and resulted in flight that was unrealistic in a number of ways. There were no structural limits either, allowing a number of unrealistic extremely high-g maneuvers. A completely new flight engine was created for the VBE system that simulated subsonic aerodynamics with a fair degree of realism, with effects like dutch roll and adverse yaw "falling out" of the engine without being deliberately coded in. Additionally, the system included a new physics engine that featured simple finite element analysis that allowed damage to be realistically simulated, including its effects on the flight dynamics of the aircraft. The resulting simulation wa
https://en.wikipedia.org/wiki/Caml
Caml (originally an acronym for Categorical Abstract Machine Language) is a multi-paradigm, general-purpose programming language which is a dialect of the ML programming language family. Caml was developed in France at INRIA and ENS. Caml is statically typed, strictly evaluated, and uses automatic memory management. OCaml, the main descendant of Caml, adds many features to the language, including an object layer. Examples In the following, represents the Caml prompt. Hello World print_endline "Hello, world!";; Factorial function (recursion and purely functional programming) Many mathematical functions, such as factorial, are most naturally represented in a purely functional form. The following recursive, purely functional Caml function implements factorial: let rec fact n = if n=0 then 1 else n * fact(n - 1);; The function can be written equivalently using pattern matching: let rec fact = function | 0 -> 1 | n -> n * fact(n - 1);; This latter form is the mathematical definition of factorial as a recurrence relation. Note that the compiler inferred the type of this function to be , meaning that this function maps ints onto ints. For example, 12! is: # fact 12;; - : int = 479001600 Numerical derivative (higher-order functions) Since Caml is a functional programming language, it is easy to create and pass around functions in Caml programs. This capability has an enormous number of applications. Calculating the numerical derivative of a function is one such application. The following Caml function computes the numerical derivative of a given function at a given point : let d delta f x = (f (x +. delta) -. f (x -. delta)) /. (2. *. delta);; This function requires a small value . A good choice for delta is the cube root of the machine epsilon. The type of the function indicates that it maps a onto another function with the type . This allows us to partially apply arguments. This functional style is known as currying. In this case, it is useful to partially apply the first argument to , to obtain a more specialised function: # let d = d (sqrt epsilon_float);; val d : (float -> float) -> float -> float = <fun> Note that the inferred type indicates that the replacement is expecting a function with the type as its first argument. We can compute a numerical approximation to the derivative of at with: # d (fun x -> x *. x *. x -. x -. 1.) 3.;; - : float = 26. The correct answer is . The function is called a "higher-order function" because it accepts another function () as an argument. We can go further and create the (approximate) derivative of f, by applying while omitting the argument: # let f' = d (fun x -> x *. x *. x -. x -. 1.) ;; val f' : float -> float = <fun> The concepts of curried and higher-order functions are clearly useful in mathematical programs. In fact, these concepts are equally applicable to most other forms of programming and can be used to factor code much more aggressively, resulting in shorter programs a
https://en.wikipedia.org/wiki/Hermeskeil
Hermeskeil () is a city in the Trier-Saarburg district, in Rhineland-Palatinate, Germany. It is situated in the Hunsrück, approx. 25 km southeast of Trier. Its population is about 5,900. Data Hermeskeil is the seat of the Verbandsgemeinde ("collective municipality") Hermeskeil. The old locomotive depot, Bahnbetriebswerk Hermeskeil is now a museum housing German steam engines. The Flugausstellung aircraft museum displays more than 100 aircraft and is the largest private museum of that kind in Europe. A Gaulish burial of the 1st century AD was discovered in a field near Hermeskeil in 2009. A Roman castrum has been identified in 2015: it is the only castrum created by Julius Caesar inside Magna Germania, when he crossed the Rhine river in 53 BC Wikipedia links Link to German page Hermeskeil Link to information page about Flugausstellung aircraft museum :de:Römerlager Hermeskeil References External links www.hermeskeil.de Websites in Hermeskeil Homepage of Flugausstellung aircraft museum Towns in Rhineland-Palatinate Trier-Saarburg
https://en.wikipedia.org/wiki/Ottawa%20Women%27s%20Training%20and%20Employment%20Network
Ottawa Women's Training and Employment Network (OWTEN) is a long-standing group that has provided information, advice and advocacy on training, education and employment programs for women in Ottawa (Ontario, Canada) for over 11 years. The profile of their members is diverse, although there are mostly women involved in the program management and front line delivery and administration of career/employment counseling, language, employment preparation, and job skills training programs. Workplace origins of the members include the city of Ottawa, Ontario Ministry of Apprenticeship, Algonquin College, La Cite Collegial, Bradson's Health Care, Vanier Community Centre, The Career Station, Nortel Networks, Tecsult, Algonquin Management Centre, Rainbow Training Centre, Status of Women Canada, Malkam, and several members from the community at large. Mission The mission of OWTEN is External links Women's Training and Employment Network Employment agencies of Canada Women's organizations based in Canada Women in Ontario Women and employment
https://en.wikipedia.org/wiki/Zebra%20Technologies
Zebra Technologies Corporation is an American mobile computing company specializing in technology used to sense, analyze, and act in real time, sometimes known as smart data capture. The company manufactures and sells marking, tracking, and computer printing technologies. Its products include mobile computers and tablets, software, thermal barcode label and receipt printers, RFID smart label printers/encoders/fixed & handheld readers/antennas, autonomous mobile robots (AMR’s) & machine vision (MV), and fixed industrial scanning hardware & software. History Zebra was incorporated in 1969 as Data Specialties Incorporated, a manufacturer of high-speed electromechanical products. The company changed its focus to specialty on-demand labeling and ticketing systems in 1982 and became Zebra Technologies Corporation in 1986. Zebra became a publicly traded company in 1991. In 1998, Zebra Technologies merged with Eltron International, Inc. In 2000, Comtec Information Systems was acquired by Zebra Technologies, followed in 2003 by the acquisition of Atlantek, Inc., which was a manufacturer of photo ID printers. In 2004, the company expanded into RFID smart label manufacturing. In the following years, Zebra also acquired Swecoin, WhereNet Corp, Proveo AG, and Navis Holdings (later divested in 2011). The company bought the Enterprise Solutions Group (ESG) in 2008 and renamed the group Zebra Enterprise Solutions in 2009. In the same year, Multispectral Solutions, Inc. was acquired. In 2012, the companies LaserBand, and StepOne Systems were purchased with a cash price of $1.5 million. In 2013, the company acquired Hart Systems for $94 million in cash from the private equity firm Topspin Partners LBO. In 2014, Zebra acquired Motorola Solutions' Enterprise Division in a $3.45 billion transaction, providing mobile computing and advanced data capture communications technologies and services. Zebra's acquisition of the Enterprise Division included the Symbol Technologies and Psion product lines. Also in 2014, Zebra provided its real-time location system (RTLS) in NFL stadiums to track players and officials and provide location-based data for the NFL's Next Gen Stats program. Zebra’s partnership with the NFL extends through the 2025 football season. In 2018, the company acquired Xplore Technologies, a maker of ruggedized tablets and other hard-wearing hardware. In 2019, Zebra acquired Temptime Corporation, a provider of temperature monitoring devices to the healthcare industry. That same year, Zebra also acquired Profitect, a retail software company that developed a product line used for tracking and identifying inventory losses. In 2020, Zebra acquired Reflexis Systems, a provider of workforce scheduling and task management software to the retail, food service, hospitality, and banking industries for $575 Million. In 2021, Zebra acquired Adaptive Vision (provider of graphical MV software), Fetch Robotics (manufacturer of autonomous mobile robots) and Antuit
https://en.wikipedia.org/wiki/Camisares
Camisares (died 385 BC) was an Iranian, father of Datames, who was high in favour with the Persian Great King Artaxerxes II (404–358 BC), by whom he was made satrap of a part of Cilicia bordering on Cappadocia. He fell in Artaxerxes' war against the Cadusii in 385 BC, and was succeeded in his satrapy by Datames, his son by a Paphlagonian mother. References Sources 4th-century BC Iranian people 385 BC deaths Achaemenid satraps of Cilicia Year of birth unknown
https://en.wikipedia.org/wiki/Reynold%20B.%20Johnson
Reynold B. Johnson (July 16, 1906September 15, 1998) was an American inventor and computer pioneer. A long-time employee of IBM, Johnson is said to be the "father" of the hard disk drive. Other inventions include automatic test scoring equipment and the videocassette tape. Biography A native of Minnesota, born to Swedish immigrants, Johnson graduated from Minnehaha Academy (1925) and went on to graduate from the University of Minnesota (BS in Educational Administration, 1929). In the early 1930s, Johnson, then a high school science teacher in Michigan, invented an electronic test scoring machine that sensed pencil marks on a standardized form. IBM bought the rights to Reynold's invention and hired him as an engineer to work in their Endicott, New York laboratory. The test scoring machine was sold as the IBM 805 Test Scoring Machine beginning in 1937. One of Reynold's early assignments was to develop technology that allowed cards marked with pencil marks to be converted into punched cards. That allowed punched card data to be recorded by people using only a pencil. That "mark sense" technology was widely used by businesses in the 1940s, 50s, and 60s. For example, the Bell System used mark sense technology to record long-distance calls, and utility companies used it to record meter readings. The Federal Government used it under the name "electrographic" technology. In 1952, IBM sent Johnson to San Jose, California, to set up and manage its West Coast Laboratory. In 1956, a research team led by Johnson developed disk data storage technology, which IBM released as the IBM 305 RAMAC. Although the first disk drive was crude by modern standards, it launched a multibillion-dollar industry. Johnson was working with Sony on another project when he developed the prototype for a half-inch videocassette tape. Lou Stevens noted that "Sony was using wider tape on reels. He cut the tape to a half an inch, and put it in a cartridge. The larger tapes weren't easy enough for kids to use, and his interest was in education and building a video textbook for kids." Johnson retired from IBM in 1971. He obtained more than 90 patents. After his retirement, he developed the microphonograph technology used in the Fisher-Price "Talk to Me Books". The Talk to Me Books won a Toy of the Year award. This technology was also used by the National Audubon Society to aid bird watchers with songbird identification. He received the National Medal of Technology and Innovation from President Ronald Reagan in 1986. The IEEE Reynold B. Johnson Information Storage Systems Award was established in 1991, and is each year presented to a small team or an individual that has made outstanding contributions to information storage systems. Johnson was awarded the Franklin Institute's Certificate of Merit in 1996. Johnson died in 1998, at the age of 92, of melanoma at Palo Alto, California. References Further reading Memorial Tributes: National Academy of Engineering, Volume 9 (20
https://en.wikipedia.org/wiki/Treehouse%20of%20Horror%20XVI
"Treehouse of Horror XVI" is the fourth episode of the seventeenth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on November 6, 2005. In the sixteenth annual Treehouse of Horror, the Simpsons replace Bart with a robot son after Bart falls into a coma, Homer and various other male characters find themselves on a reality show where Mr. Burns hunts humans for sport, and costumed Springfieldians become whatever they are wearing, thanks to a witch who was disqualified from a Halloween costume contest. This was the first Treehouse of Horror episode since Treehouse of Horror X not to also serve as the season premiere. It was written by Marc Wilmore and directed by David Silverman. Terry Bradshaw and Dennis Rodman guest star as themselves. Around 11.63 million Americans tuned in to watch the episode during its original broadcast. Plot In the opening, Kang hopes to speed up an exceedingly slow and boring baseball game, despite Kodos' protests, but ends up destroying the universe when the baseball players go so fast, they turn into a killer vortex which sucks up the universe, even God. When Kodos berates Kang off-camera for destroying the universe, Kang responds by leaving a post-it note on the white void, revealing the title of the episode. B.I. Bartificial Intelligence In this spoof of A.I. Artificial Intelligence, Bart winds up in a deep coma after attempting to jump out of a window into a swimming pool. The family takes in a robotic boy, named David, who quickly proves to be a better son. Bart soon wakes up from his coma and competes against David for the affection of the rest of his family. However, Bart is dumped on a road by Homer, who decides to keep David instead. When Bart finds a group of old rusty robots, he steals their parts at night to become a cyborg. Angry that Homer abandoned him, he then returns home and cuts through both David and Homer with a chainsaw after the robot tries to use Homer as a shield. Although the family is now together again, Homer is angry that he has to be fused with David's lower half, which soon collapses due to Homer's weight. Suddenly, the whole scenario is revealed to be a dream conjured by Homer's demonically possessed mind as he is being exorcised by a priest. Marge reluctantly says she will call work and tell them Homer cannot make it in, much to his delight. Survival of the Fattest In a parody of the 1924 Richard Connell short story "The Most Dangerous Game", men from Springfield arrive at Mr. Burns' mansion to go hunting. Unbeknownst to them, they themselves are the prey to be hunted, with Burns pledging that if they survive by noon the following day, they will be free to go home. The hunt is broadcast on live television as The World Series of Manslaughter, with Terry Bradshaw as a guest analyst. Homer manages to survive the night while the others are killed left and right, but Burns closes in on him in the morning. Just as he is abo
https://en.wikipedia.org/wiki/EXperimental%20Computing%20Facility
Founded in 1986, the eXperimental Computing Facility (XCF) is an undergraduate computing-interest organization at University of California, Berkeley. The "Experimental" description was given in contrast to the Open Computing Facility and the Computer Science Undergraduate Association, which support most of the general-interest computing desires of the campus. As such, the XCF stands as a focus for a small group of computer-scientists uniquely interested in computer science. Members of the organization have been involved in projects such as NNTP, GTK+, GIMP, Gnutella, and Viola. Members of the XCF were instrumental in defending against the Morris Internet worm. Notable alumni Notable alumni of the organization include: Jonathan Blow, Gene Kan, Spencer Kimball, Peter Mattis, Pei-Yuan Wei, and Phil Lapsley. References External links University of California, Berkeley
https://en.wikipedia.org/wiki/GPRS%20Tunnelling%20Protocol
GPRS Tunnelling Protocol (GTP) is a group of IP-based communications protocols used to carry general packet radio service (GPRS) within GSM, UMTS, LTE and 5G NR radio networks. In 3GPP architectures, GTP and Proxy Mobile IPv6 based interfaces are specified on various interface points. GTP can be decomposed into separate protocols, GTP-C, GTP-U and GTP'. GTP-C is used within the GPRS core network for signaling between gateway GPRS support nodes (GGSN) and serving GPRS support nodes (SGSN). This allows the SGSN to activate a session on a user's behalf (PDP context activation), to deactivate the same session, to adjust quality of service parameters, or to update a session for a subscriber who has just arrived from another SGSN. GTP-U is used for carrying user data within the GPRS core network and between the radio access network and the core network. The user data transported can be packets in any of IPv4, IPv6, or PPP formats. GTP' (GTP prime) uses the same message structure as GTP-C and GTP-U, but has an independent function. It can be used for carrying charging data from the charging data function (CDF) of the GSM or UMTS network to the charging gateway function (CGF). In most cases, this should mean from many individual network elements such as the GGSNs to a centralized computer that delivers the charging data more conveniently to the network operator's billing center. Different GTP variants are implemented by RNCs, SGSNs, GGSNs and CGFs within 3GPP networks. GPRS mobile stations (MSs) are connected to a SGSN without being aware of GTP. GTP can be used with UDP or TCP. UDP is either recommended or mandatory, except for tunnelling X.25 in version 0. GTP version 1 is used only on UDP. General features All variants of GTP have certain features in common. The structure of the messages is the same, with a GTP header following the UDP/TCP header. Header GTP version 1 GTPv1 headers contain the following fields: Version It is a 3-bit field. For GTPv1, this has a value of 1. Protocol Type (PT) a 1-bit value that differentiates GTP (value 1) from GTP' (value 0). Reserved a 1-bit reserved field (must be 0). Extension header flag (E) a 1-bit value that states whether there is an extension header optional field. Sequence number flag (S) a 1-bit value that states whether there is a Sequence Number optional field. N-PDU number flag (PN) a 1-bit value that states whether there is a N-PDU number optional field. Message Type an 8-bit field that indicates the type of GTP message. Different types of messages are defined in 3GPP TS 29.060 section 7.1 Message Length a 16-bit field that indicates the length of the payload in bytes (rest of the packet following the mandatory 8-byte GTP header). Includes the optional fields. Tunnel endpoint identifier (TEID) A 32-bit(4-octet) field used to multiplex different connections in the same GTP tunnel. Sequence number an (optional) 16-bit field. This field exists if any of the E, S, or PN bits are on.
https://en.wikipedia.org/wiki/KRCW-TV
KRCW-TV (channel 32) is a television station licensed to Salem, Oregon, United States, serving as the CW outlet for the Portland area. It is owned and operated by network majority owner Nexstar Media Group alongside CBS affiliate KOIN (channel 6). Both stations share studios in the basement of the KOIN Center skyscraper on Southwest Columbia Street in downtown Portland, while KRCW-TV's transmitter is located in the Sylvan-Highlands neighborhood of the city. Previously, KRCW-TV maintained separate studios on Southwest Arctic Drive in Beaverton, while KOIN's facilities only housed KRCW-TV's master control and some internal operations. Despite Salem being KRCW-TV's city of license, the station maintains no physical presence there. History Early history The station was launched on May 8, 1989, under the call sign KUTF (standing for "Keep Up the Faith"), its original transmitter was located outside Molalla. The station's original programming format almost entirely consisted of religious programs. It was originally operated by Dove Broadcasting, owner of Christian television station WGGS-TV in Greenville, South Carolina; local productions included a version of WGGS's popular Nite Line talk program. Despite its long legacy in Christian television (its flagship has been on the air since 1972), Dove struggled to build a support base for KUTF. In May 1990, the station went dark. According to station insiders, the Jim Bakker and Jimmy Swaggart scandals gave potential supporters pause. It did not help matters that the station had received competition a few months after signing on from KNMT, with wealthier ownership (Trinity Broadcasting Network, through subsidiary National Minority Television) and a stronger signal. KUTF resumed broadcasting a month later. Dove sold KUTF to Eagle Broadcasting on July 17, 1991. The call sign was changed to KEBN on February 11, 1992; the new owners then proceeded to relaunch the station as "Oregon's New Eagle 32", becoming a general entertainment independent. On October 12, KEBN went dark again, citing the need to concentrate on moving its operation from Salem to Beaverton. While initially planned as a four-week silent period, it would be nearly two years before the station returned. By late 1993, a receiver had been appointed for the licensee, Willamette Valley Broadcasting, Ltd. The receiver filed to sell KEBN to Channel 32, Inc., at the end of 1993. Under the leadership of Victor Ives, Channel 32, Inc. moved all operations to Portland and secured an affiliation with The WB. The station resumed broadcasting in the summer of 1994, airing a number of infomercials, public domain movies, and brokered shows for eight hours a day; the station expanded to 24-hour broadcasting on Labor Day, and on October 2, 1995, it took the call letters KWBP, reflecting its new affiliation. By the fall of 1995, bartered syndicated programming (including cartoons, and some older sitcoms and dramas) were added to the station's schedule. It al
https://en.wikipedia.org/wiki/WPXL-TV
WPXL-TV (channel 49) is a television station in New Orleans, Louisiana, United States, broadcasting the Ion Television network. It is owned and operated by the Ion Media subsidiary of the E. W. Scripps Company, and maintains offices on Veterans Memorial Boulevard and Cleary Avenue in Metairie; its transmitter is located off Paris Road (LA 47) near the Orleans–St. Bernard parish line. History Early history After a string of delays, channel 49 first signed on the air on March 19, 1989, as WCCL; it originally operated as an independent station with a general entertainment format, along with numerous CBS programs preempted by WWL-TV (channel 4), including CBS This Morning. Owned by Black woman Barbara Lamont, WCCL failed to show in the ratings with poor programming and a lack of cable carriage. By the end of 1989, it had filed bankruptcy due to a hostile creditor that sought to evict it from its tower at Algiers. The station had begun work on its own tower at Bywater which would prevent blockage of channel 49's signal by passing ships on the Mississippi River, but a battle with neighbors who wanted its height reduced left the site unfinished and unusable by the station. The hostile creditor—Lodestar Towers—was successful in obtaining an order to repossess WCCL's equipment, forcing the station off the air on May 23, 1990. While Lamont spent two years trying to rebuild the station's transmitter facility elsewhere, she gave up in May 1992, when her Chapter 11 bankruptcy reorganization case was converted to Chapter 7 liquidation. Flinn Broadcasting Corporation purchased the station's license out of bankruptcy and returned channel 49 to the air on May 25, 1994, carrying programming from the Home Shopping Network. The station changed its call letters to WPXL-TV on August 31, 1998; that same day, the station became a charter affiliate of the family-oriented network Pax TV (now Ion Television). As part of the affiliation deal with Pax TV, Flinn Broadcasting entered into a time brokerage agreement with Pax TV owner Paxson Communications to operate the station. On July 30, 2001. Paxson entered into a joint sales agreement with Hearst-Argyle Television (now Hearst Television), owner of NBC affiliate WDSU (channel 6), to provide advertising and marketing services for WPXL. Hurricane Katrina In early September 2005, shortly after Hurricane Katrina made landfall in southern Louisiana, WPXL partnered with WDSU, whose transmitter building in Chalmette was damaged due to flooding caused by the storm, to simulcast channel 6's programming. The station also added programming from The Worship Network and the signals of the Tribune Broadcasting-owned duopoly of ABC affiliate WGNO (channel 26) and CW affiliate WNOL-TV (channel 38) as subchannels on its digital signal for New Orleans area residents that had television sets with built-in digital tuners. On March 29, 2008, almost a month after WGNO and WNOL resumed digital transmissions over WNOL's digital allocation on
https://en.wikipedia.org/wiki/WHNO
WHNO (channel 20) is a religious television station in New Orleans, Louisiana, United States, owned and operated by the Christian Television Network (CTN). The station's studios are located on St. Charles Avenue in downtown New Orleans, and its transmitter is located off Behrman Highway in the city's Algiers neighborhood. Prior history of UHF channel 20 in New Orleans The UHF channel 20 allocation in the New Orleans market was originally occupied by WJMR-TV (now Fox affiliate WVUE), a primary CBS and secondary ABC affiliate which moved to that channel from UHF channel 61 on July 20, 1955. That station changed its channel allocation two more times—first to VHF channel 13 on January 13, 1959 (less than one month before it adopted the WVUE call letters) and then to channel 12 on September 6, 1962 (due to interference with Biloxi, Mississippi station WLOX on channel 13)—before settling on channel 8 on June 8, 1970. History The construction permit for UHF channel 20 that bore WHNO dates to 1988 and was filed by Tucker Broadcasting Company, Limited Partnership. Tucker was not the original winner in comparative hearing. An FCC law judge found in favor of Delta Broadcasting Company, a competing applicant headed by market veteran John G. Curren, in 1990; the FCC review board proposed granting the station to another aspiring owner, Swan Broadcasting. In 1991, LeSEA Broadcasting (now Family Broadcasting Corporation) purchased the construction permit with the intent to sign on a station in the market on channel 20. The station first signed on the air on October 20, 1994; the station carried a mix of Christian-targeted programs, family-oriented syndicated programs and movies. As in other markets where LeSEA owned stations, WHNO opted against taking an affiliation with the United Paramount Network (UPN) prior to the network's January 16, 1995 launch as the programming planned for the network conflicted with the company's core programming values; the affiliation instead went to upstart station WUPL (channel 54), which launched in June 1995. In September 1995, channel 20 began carrying the (first incarnation of the) CBS morning program CBS This Morning; the station then carried its successor morning show, The Early Show, from that program's debut in 1999 until 2002, when the program moved to WUPL. Much like with WUPL today, WHNO carried the programs as WWL-TV (channel 4) had long carried a weekday morning newscast that runs into the 7:00 to 9:00 a.m. timeslot occupied by the network's morning programs in most other markets. In 2000, WHNO began to air Christian-targeted paid programming in some off-peak hours. When Hurricane Katrina struck the New Orleans area on August 29, 2005, the storm's flooding and damaging winds caused extensive damage to WHNO's Behrman Highway studios. The station ceased over-the-air broadcasts due to transmitter problems related to the storm. LeSEA provided a direct feed of its national World Harvest Television service to New Orlea
https://en.wikipedia.org/wiki/Splatterhouse
is a beat 'em up arcade game developed and published by Namco in 1988. It was the first in a series of games released in home console and personal computer formats. This game would later spawn the parody Splatterhouse: Wanpaku Graffiti, the sequels Splatterhouse 2, Splatterhouse 3, and the 2010 remake Splatterhouse, with the classic games being added to Namco Museum since 2017. Marketing for the game heavily emphasized its violent nature; for example, the TurboGrafx-16 port of Splatterhouse had a faux parental advisory warning printed on the front of the box that read, "The horrifying theme of this game may be inappropriate for young children... and cowards." Gameplay Splatterhouse is an arcade-style sidescrolling beat 'em up with platform elements in which the player controls Rick, a parapsychology college major who is trapped inside West Mansion. After his resurrection by the Terror Mask, Rick makes his way through the mansion, fighting off hordes of creatures in a vain attempt to save his girlfriend Jennifer from a grisly fate. The game is influenced by western horror films, such as Friday the 13th, Evil Dead II, Poltergeist, Rejuvenatrix, and Parasite, as well as imagery inspired by the works of horror writer H. P. Lovecraft such as Herbert West–Reanimator. Similar to many sidescrolling beat 'em up games, Rick can only move in a two-dimensional environment. He has the ability to jump and can punch and kick. Rick also has a Special Attack, where he will perform a dropkick that sends him skidding along the ground, damaging any enemies he hits. Rick can also perform a low kick, low punch, and jumping attacks, as well as pick up and use various weapons placed in the levels. All of the levels consist of walking left to right, with occasional auto-scrolling segments. However, alternative pathways through sections of the house are possible by falling down through holes or jumping up onto ladders. In this way, branching gameplay is possible, if only prevalent in the middle levels. Levels culminate in boss fights that take place in a single room. Unlike traditional sidescrolling fighters, boss fights have varying objectives and styles. Unlike most arcade games in the genre, Splatterhouse sends players back to checkpoints after losing lives or receiving a game over, discouraging "credit feeding" as a method of overcoming the various challenges. Plot Two students at the local university, Rick Taylor and Jennifer Willis, take refuge from a storm in West Mansion, a local landmark known as "Splatterhouse", for the rumors of hideous experiments purportedly conducted there by Dr. West, a renowned and missing parapsychologist. As they enter the mansion and the door shuts behind them, Jennifer screams. Rick awakens in a dungeon under the mansion having been resurrected thanks to the influence of the "Terror Mask", or in some versions, the "Hell Mask", a Mayan sacrificial artifact from West's house which is capable of sentient thought. The mask attaches
https://en.wikipedia.org/wiki/Access%20key
In a web browser, an access key or accesskey allows a computer user to immediately jump to a specific web page via the keyboard. They were introduced in 1999 and quickly achieved near-universal browser support. In the summer of 2002, a Canadian Web Accessibility consultancy did an informal survey to see if implementing accesskeys caused issues for users of adaptive technology, especially screen reading technology used by blind and low vision users. These users require numerous keyboard shortcuts to access web pages, as “pointing and clicking” a mouse is not an option for them. Their research showed that most key stroke combinations did in fact present a conflict for one or more of these technologies, and their final recommendation was to avoid using accesskeys altogether. In XHTML 2, a revised web authoring language, the HTML Working Group of the World Wide Web Consortium deprecated the accesskey attribute in favor of the XHTML Role Access Module. However, XHTML 2 has been retired in favor of HTML5, which (as of August 2009) continues to permit accesskeys. Access in different browsers For a more complete list of which browsers support the HTML Access keys, please see how they are compared in the comparison of web browsers. Conflicting access keys If multiple identical accesskeys are assigned within the same document, IE will tab through them on each keypress (IE will tab backwards if is pressed as well). This way, elements can be logically grouped in various accesskey rings for easier navigation. IE 4.0 only supported letters of the English alphabet as accesskeys. Firefox 2.0 will activate the last of a group of elements assigned the same accesskey. Specifying access keys Access keys are specified in HTML using the accesskey attribute. The value of an element’s accesskey attribute is the key the user will press (typically in combination with one or more other keys, as defined by the browser) in order to activate or focus that element. Though the accesskey attribute sets the key that can be pressed, it does not automatically notify the user of the bound access key. One convention is for the page author to show the access key value by using the <u> tag to underline the letter in the link’s text corresponding to the accesskey assigned. For the link below, a user would press + on Internet Explorer, + on a Mac (the command key can give undesired results) and ++ on Opera to be directed to index.html. <a href="index.html" accesskey="h">Home</a> or to emphasize ‹H›: <a href="index.html" accesskey="h"><em>H</em>ome</a> alternatively, the following CSS can be used to indicate the character: *[accesskey]:after {content:' [' attr(accesskey) ']'} Emphasize <em> isn’t necessary, but can be useful to the user. It helps them identify which key to press to navigate to where they want to. Another possible way of displaying which accesskeys do what is to create a page with all the accesskeys displayed. Or the webmaster could do both. Another option f
https://en.wikipedia.org/wiki/Theos
Theos may refer to: THEOS, a computer operating system THEOS (satellite), a satellite launched in 2008 by Thailand Theos (think tank), a UK public theology think tank Theos (θεός) means deity in Ancient Greek People with the name Theos Casimir Bernard (1908–1947), American explorer and author See also Thea (disambiguation) Theion (disambiguation)
https://en.wikipedia.org/wiki/Cracking%20Up%20%28TV%20series%29
Cracking Up is an American television sitcom created by Mike White, who also served as the series' head writer. It aired on the Fox Network on Monday nights from March 9 to May 12, 2004. Premise In the pilot episode, a psychiatrist (Henry Gibson) is sent to examine Tanner Shackleton (Bret Loehr), a child of a Beverly Hills family, only to discover that Tanner doesn't have any problems — his family does. After the pilot episode, the story was about Ben Baxter (Jason Schwartzman), a student who moves into the Shackletons' guest house, interacting with Tanner (Bret Loehr) and his crazy family. Cast Molly Shannon as Lesley Shackleton Christopher McDonald as Ted Shackleton Caitlin Wachs as Chloe Shackleton Jake Sandvig as Preston Shackleton Bret Loehr as Tanner Shackleton David Walton as Liam Connor Jason Schwartzman as Ben Baxter Episodes References External links 2004 American television series debuts 2004 American television series endings 2000s American single-camera sitcoms English-language television shows Fox Broadcasting Company original programming Television series by 20th Century Fox Television Television series created by Mike White (filmmaker)
https://en.wikipedia.org/wiki/Fighter%27s%20History
is a series of fighting games that were produced by Data East during the 1990s. The original Fighter's History was first released for the arcades in 1993 and ported to the Super Nintendo Entertainment System in 1994. Two different sequels were produced: Fighter's History Dynamite (aka Karnov's Revenge outside of Japan) for the Neo Geo in 1994, followed by , released in Japan for the Super Famicom in 1995. The main unique feature of the Fighter's History series is its "weak point system". By repeatedly hitting an opponent's weak point, the player can temporarily stun them once per round, leaving the opponent open for an attack. The location of an opponent's weak spot varies with each character and is usually represented by a specific article of clothing (e.g. a headband, a vest, a mask). Fighter’s History was made available through Nintendo Switch Online in 2022. Games Fighter's History The original Fighter's History was released as an arcade game in March 1993. The game uses a six-button control configuration similar to Street Fighter II and its iterations, as well as an alternate version of the first Street Fighter, with three punch buttons and three kick buttons, each for different strength levels (light, medium, and heavy). There are a total of nine playable characters, as well as two non-playable boss characters at the end of the single-player tournament. The final boss and sponsor of the tournament is revealed to be Karnov, the protagonist of the Data East action game of the same name. In this installment hitting an opponent's weak point will not only stun the opponent, it will also cause the opponent to sustain greater damage when the weak point is repeatedly struck afterward. Karnov's Revenge Karnov's Revenge, also titled Fighter's History Dynamite in Japan and in the USA arcade version, was released for the arcades March 17, 1994. Due to change of hardware to SNK's MVS platform, the control configuration was reduced from six attack buttons to just four (only light and heavy attacks are available this time). Likewise, the game was released for the Neo Geo home console, as well as the Neo Geo CD, on April 28. A new gameplay feature is introduced in the form of "one-two attacks". When the player presses a heavy attack button while performing a light attack or blocking, the interval between light attacks is reduced, making combos easier to perform. All eleven fighters from the previous game return (including the bosses Clown and Karnov, who are now playable) and are joined by two new characters: Yungmie, a female taekwondo exponent from Korea, and Zazie, a karate practitioner from Kenya, for a total of 13 characters. Karnov is the only returning character who was given entirely new sprites. Most of the returning characters were given new special techniques (with a few exceptions), including hidden techniques which are not listed on the instruction card (the manual for the home version hints of their inclusion). Fighter's History: Miz
https://en.wikipedia.org/wiki/WinDbg
WinDbg is a multipurpose debugger for the Microsoft Windows computer operating system, distributed by Microsoft. Debugging is the process of finding and resolving errors in a system; in computing it also includes exploring the internal operation of software as a help to development. It can be used to debug user mode applications, device drivers, and the operating system itself in kernel mode. Overview Like the better-known Visual Studio Debugger WinDbg has a graphical user interface (GUI), but is more powerful and has little else in common. WinDbg can automatically load debugging symbol files (e.g., PDB files) from a server by matching various criteria (e.g., timestamp, CRC, single or multiprocessor version) via SymSrv (SymSrv.dll), instead of the more time-consuming task of creating a symbol tree for a debugging target environment. If a private symbol server is configured, the symbols can be correlated with the source code for the binary. This eases the burden of debugging problems that have various versions of binaries installed on the debugging target by eliminating the need for finding and installing specific symbols version on the debug host. Microsoft has a public symbol server that has most of the public symbols for Windows 2000 and later versions of Windows (including service packs). WinDbg can also be used for debugging kernel-mode memory dumps, created after what is commonly called the Blue Screen of Death which occurs when a bug check is issued. It can also be used to debug user-mode crash dumps. This is known as post-mortem debugging. Recent versions of WinDbg have been and are being distributed as part of the free Debugging Tools for Windows suite, which shares a common debugging back-end between WinDbg and command line debugger front-ends like KD, CDB, and NTSD. Most commands can be used as is with all the included debugger front-ends. In 2017 Microsoft announced new version of WinDbg called WinDbg Preview (aka WinDbgX). One of the most notable features of WinDbg Preview is so called Time-Travel-Debugging (TTD). The main idea here is that the user can record an actual live process (at a performance penalty) to later debug going back and forth in time. This feature is especially useful during reverse-engineering process. It also allows writing scripts in JavaScript language. Extensions WinDbg allows the loading of extension DLLs that can augment the debugger's supported commands and allow for help in debugging specific scenarios: for example, displaying an MSXML document given an IXMLDOMDocument, or debugging the Common Language Runtime (CLR). These extensions are a large part of what makes WinDbg such a powerful debugger. WinDbg is used by the Microsoft Windows product team to build Windows, and everything needed to debug Windows is included in these extension DLLs. Extension commands are always prefixed with !. While some extensions are used only inside Microsoft, most of them are part of the public Debugging Tools for
https://en.wikipedia.org/wiki/WYTV
WYTV (channel 33) is a television station in Youngstown, Ohio, United States, affiliated with ABC and MyNetworkTV. It is owned by Vaughan Media, which maintains joint sales and shared services agreements (JSA/SSA) with Nexstar Media Group, owner of CBS affiliate WKBN-TV (channel 27) and low-power Fox affiliate WYFX-LD (channel 62), for the provision of certain services. The three stations share studios on Sunset Boulevard in Youngstown's Pleasant Grove neighborhood, where WYTV's transmitter is also located. History The station originated as WKST-TV (UHF analog channel 45) as the television partner to WKST radio, and was licensed to New Castle, Pennsylvania, on April 4, 1953. Besides serving New Castle, it was the default ABC affiliate in Youngstown, making Youngstown at the time one of the smallest markets to have full-time affiliates of all three networks (following the demise of the DuMont Television Network), as ABC would be relegated to secondary status in many markets until the 1970s. It also served the northern and western portions of the Pittsburgh market with poor signals from WENS (frequency now occupied by WINP-TV). After WENS signed off due to financial problems (some assets would be used to launch what eventually became WPNT), WKST-TV was the only full-time ABC affiliate in Western Pennsylvania until September 1958 when WTAE-TV went live; future sister station WJET-TV would sign on in Erie, Pennsylvania, in 1966. After being dark for a period of time, WKST-TV moved to the stronger channel 33 in 1959, improving its over-the-air signal in the process. After moving channels, WYTV was replaced on channel 45 by independent station WXTV, which signed on in November 1960; WXTV would be forced off the air on February 28, 1962, and never resumed broadcasting, the FCC denied their license application in April 1964 after an extensive investigation into it and co-owned WWIZ in Lorain, Ohio. In 1973, channel 45 was re-allocated to nearby Alliance, Ohio, as an educational channel and became WNEO. In September 1963, WKST-TV moved its city of license and most of its operations to Youngstown under its current call letters, WYTV (it carried the suffix from 1983 to 1998). Along with WTAE-TV and to a lesser extent WTVN/WSYX in Columbus, WYTV at times has also served as the default ABC affiliate to the Wheeling, West Virginia–Steubenville, Ohio, market, which has only two commercial stations, WTOV-TV and WTRF-TV (the latter being a sister station to WYTV during the 1990s and again since 2017). Although the area finally got a full-time ABC affiliate in 2008 when WTRF-TV launched one on its third digital subchannel, WYTV remains on cable in parts of the market. The station was Youngstown's first Fox network affiliate from 1994 to 1998. Youngstown did not have a full-time Fox affiliate for the network's first decade, so WYTV joined the network as a secondary affiliate in part due to the network's acquisition of the rights to NFL football. As Fox had r
https://en.wikipedia.org/wiki/WYFX-LD
WYFX-LD (channel 62) is a low-power television station in Youngstown, Ohio, United States, affiliated with the Fox network. It is owned by Nexstar Media Group alongside CBS affiliate WKBN-TV (channel 27); Nexstar also provides certain services to ABC affiliate WYTV (channel 33) through joint sales and shared services agreements (JSA/SSA) with Vaughan Media, LLC. The three stations share studios on Sunset Boulevard in Youngstown's Pleasant Grove neighborhood, where WYFX-LD's transmitter is also located. Even though WYFX broadcasts a digital signal of its own, its low-power broadcasting radius only covers the immediate Youngstown area. Therefore, it is simulcast in high definition on WKBN-TV's second digital subchannel (27.2) in order to reach the entire market. History WYFX-LP, along with repeater W31BW (channel 31) in Masury, Ohio, were launched on September 6, 1998, as the area's first full-time Fox affiliates. Previously, WYTV showed some Fox Sports events from 1994 until 1998, while Fox's prime time programming was seen on cable via WPGH-TV in Pittsburgh, or from the network's Cleveland affiliates, first WOIO-TV, then from WJW-TV after WOIO switched to CBS. Between 1998 and 2000, W31BW's call letters were changed to WFXI-LP. (WFXI-LP shared its call letters with the Fox affiliate in Morehead City, North Carolina; both stations were owned by Piedmont Television until 2007, but were otherwise unrelated.) With digital television in its infancy at the time, WYFX and WFXI were started with their own signals as opposed to future stations WFMJ-DT2 and WYTV-DT2, which were both launched on new second digital subchannels of WFMJ-TV and WYTV respectively. This resulted in WYFX and WFXI having their own licenses with the Federal Communications Commission (FCC). Because of duopoly rules at the time, which would be partially repealed only two years later, both stations were launched as low-power stations (though WFXI converted to a class A license on channel 17, licensed to Mercer, Pennsylvania, in 2002). The two were originally branded "Fox 40/62", followed by "Fox 31/62" and finally "Fox 17/62" for most of their first ten years. In 2008, the stations started slowly re-branding themselves as "Fox Youngstown" in some advertisements, despite still using the "Fox 17/62" logo. This was done because the on-air branding of "Fox 17/62" would be rendered useless once they would be forced to sign off their analog signals in 2012. Low-power and class A analog signals have a later deadline for sign-off than the June 12, 2009 sign-off for full-powered analog signals like WKBN. Additionally, WYFX and WFXI are carried on different channel positions on cable. A new logo was introduced for the start of the 2008–2009 fall season, similar to the old logo except that the "17/62" designation, as well as the WYFX calls, are removed. Some advertisements still used the "Fox 17/62" branding for some time afterward, but as of October 2008, the stations had all but fully rena
https://en.wikipedia.org/wiki/Optical%20jukebox
An optical jukebox is a robotic data storage device that can automatically load and unload optical discs, such as Compact Disc, DVD, Ultra Density Optical or Blu-ray and can provide terabytes (TB) or petabytes (PB) of tertiary storage. The devices are often called optical disk libraries, "optical storage archives", robotic drives, or autochangers. Jukebox devices may have up to 2,000 slots for disks, and usually have a picking device that traverses the slots and drives. Zerras Inc. provides a removeable capsule that holds up to 200 discs per library which can be scaled-out to manage 1600 discs per 42U rack unit. The arrangement of the slots and picking devices affects performance and maintenance costs, depending on the robotics design, the space between a disk and the picking device. Seek times and transfer rates vary depending upon the optical technology used. History and function One of the first examples of an optical jukebox was the unit designed and built at the Royal Aerospace Establishment at Farnborough, England. The unit had twin read/write heads, 12" WORM disks and the carousels were pneumatically driven. It was produced to replace the 1/2 inch magnetic tape devices that were being used to store satellite data. Jukeboxes are used in high-capacity archive storage environments such data centers and on-premise server rooms to store long-term data such as imaging, medical, compliance records, video and other high-value data assets, objects, and files. Hierarchical storage management is a strategy that moves little-used or unused files from fast magnetic storage to optical jukebox devices in a process called migration. If the files are needed, they are migrated back to magnetic disk. Optical disc libraries are also useful for making backups and in disaster recovery situations. Today one of the most important uses for jukeboxes is to archive data. Archiving data is different from backups in that the data is stored on media designed to last up to 100 years. The data is usually permanently written on Write Once Read Many (WORM)-type discs so it cannot be erased or changed. Jukeboxes typically contain internal SCSI- or SATA-based recordable drives (CD-ROM, CD-R, DVD-ROM, DVD-R, DVD-RAM, UDO or Blu-ray) that connect directly to a file server and are managed by a third-party jukebox management software. This software controls the movement of media within the jukebox, and the pre-mastering of data prior to the recording process. Before the advent of the modern SAN and much cheaper hard disks, high-volume storage on DVD was more cost-effective than magnetic media. Jukebox capacities have greatly increased with the release of the 128 gigabyte (GB) quad layer Blu-ray (BD) format, with a road-map to increase to eight layers and 200 GB per disc. The current format, used in the DISC ArXtor7000 library, allows 89 TB of storage from a single 700-disc jukebox. Optical disc libraries like the TeraStack Solution can store up to 142 TB of onli
https://en.wikipedia.org/wiki/Patni
Patni may refer to: Patni (surname), a Digambara Jain family name from India Patni caste, a Rajput & Brahman caste in Uttrakhand Patni Computer Systems, an Indian information technology company Patni (film), a 1970 Indian Hindi-language film featuring Ramesh Deo
https://en.wikipedia.org/wiki/Debian%20configuration%20system
is a software utility for performing system-wide configuration tasks on Unix-like operating systems. It is developed for the Debian Linux distribution, and is closely integrated with Debian's package management system, dpkg. When packages are being installed, asks the user questions which determine the contents of the system-wide configuration files associated with that package. After package installation, it is possible to go back and change the configuration of a package by using the dpkg-reconfigure program, or another program such as Synaptic. The design of allows for front-ends for answering configuration questions to be added in a modular way, and there exist several, such as one for dialog, one for readline, one that uses a text editor, one for KDE, one for GNOME, a Python front-end API, etc. The original implementation of is in Perl. During the development of Debian-Installer, a new implementation in C was developed, which is named . The new implementation is currently only used in the installer, but is intended to eventually replace the original entirely. Both implementations make use of the same protocol for communication between the front-end and the client code (""); this is a simple line-based protocol similar to common Internet protocols. does not physically configure any packages, but asks the user certain configuration questions stored in the file, under the direction of the package's maintainer scripts (, , etc.). Typically, the script uses to ask questions, while applies configuration changes to the unpacked package in reaction to the answers; however, this can vary due to technical requirements. The user's answers to the configuration questions asked by are cached in 's database. References External links Maintainer's web site Man Page The Debconf Programmer's Tutorial The Debconf specification Dpkg Debian Unix configuration utilities Ubuntu
https://en.wikipedia.org/wiki/Connectionist%20expert%20system
Connectionist expert systems are artificial neural network (ANN) based expert systems where the ANN generates inferencing rules e.g., fuzzy-multi layer perceptron where linguistic and natural form of inputs are used. Apart from that, rough set theory may be used for encoding knowledge in the weights better and also genetic algorithms may be used to optimize the search solutions better. Symbolic reasoning methods may also be incorporated (see hybrid intelligent system). (Also see expert system, neural network, clinical decision support system.) References External links resource page: http://www.cogsci.rpi.edu/~rsun/reason.html Artificial intelligence Information systems
https://en.wikipedia.org/wiki/EcoWin
EcoWin was a provider of worldwide economic and financial market data until it was taken over by Reuters Group in 2005. It was based in Gothenburg, Sweden, where it was founded in 1994. It had offices in London, Paris, New York City and Gdańsk. In November 2005, EcoWin AB was acquired by Reuters Group, later Thomson Reuters. The company's main product — time series analysis and charting toolset EcoWin Pro — was marketed until 2013. As of September 2015 EcoWin Pro is being phased out. Thomson Reuters encouraged users to migrate to the Datastream and Eikon platforms. References External links Official site Thomson Reuters Research and analysis firms of Sweden Defunct research and analysis firms
https://en.wikipedia.org/wiki/Pune%20Institute%20of%20Computer%20Technology
Pune Institute of Computer Technology, (or PICT) is a private unaided engineering college located in Dhankawadi, Pune, India. It was established by the Society for Computer Technology and Research, SCTR in 1983. It offers degrees in Information Technology, Computer Engineering and Electronics and Telecommunication Engineering. Accreditation PICT was accredited by India's two major accreditation agencies - National Assessment and Accreditation Council [NAAC] and National Board of Accreditation [NBA]. Specializations and departments Computer Engineering Head of Department: Dr. Geetanjali. V. Kale Undergraduate intake per year: 240 Postgraduate intake per year: 52 The Bachelor of Engineering Program in Computer Engineering commenced from the academic year 1983–84. The Department is known for its excellent results and student placements. There are 10 well-equipped laboratories in the department. The Department has been pioneered as the first Post Graduate Department in Computer Engineering in the unaided Engineering Colleges in University of Pune; with first batch commencing in year 2000. There are two shifts in this program, first consisting of 180 students and the other 60 students. Electronics and Telecommunication Engineering Head of Department: Dr. Mousami. V. Munot Undergraduate intake per year: 240 This program also consists of two shifts, consisting of 180 students in first shift and 60 students in second shift. Established in 1995, this department has a lab with around 25 Texas and Motorola experimental kits. The E&TC department has won the "Best Department Award" in 2003 and 2004. In 2009–2010, the E&TC department had the highest MHT-CET cut-off in University of Pune of 178/200. Information Technology Engineering Head of Department: Dr. Archana. S. Ghotkar Undergraduate intake per year: 180 PICT's Bachelor of Engineering Program in Information Technology began in 2001 with an intake capacity of 60 students. The current intake capacity is 180 students. It has a multimedia laboratory, operating system Laboratory and network laboratory along with the programming and project laboratories. Degrees awarded The Bachelor of Engineering(B.E) degree is offered in all the aforementioned departments. ME degree is also offered by all departments. As PICT is affiliated with the University of Pune, the degrees are offered by the university. Admissions The institute considers the MHT-CET and JEE-Main scores of students for admissions. Also students successfully completing Diploma from polytechnic institutes are eligible for admissions to direct second year. It is considered one of the most selective institutes to get into. There are also programs for students of non-residential Indians ([Non-resident Indian and person of Indian origin|NRIs]) in the college. Campus and buildings The campus is located in Dhankawadi, a suburb of southern Pune. It is a totally urban campus. The hallmark of the 4 acre campus is the central sprawling lawn i
https://en.wikipedia.org/wiki/Microsoft%20Forefront%20Threat%20Management%20Gateway
Microsoft Forefront Threat Management Gateway (Forefront TMG), formerly known as Microsoft Internet Security and Acceleration Server (ISA Server), is a discontinued network router, firewall, antivirus program, VPN server and web cache from Microsoft Corporation. It ran on Windows Server and works by inspecting all network traffic that passes through it. Features Microsoft Forefront TMG offers a set of features which include: Routing and remote access features: Microsoft Forefront TMG can act as a router, an Internet gateway, a virtual private network (VPN) server, a network address translation (NAT) server and a proxy server. Security features: Microsoft Forefront TMG is a firewall which can inspect network traffic (including web content, secure web content and emails) and filter out malware, attempts to exploit security vulnerabilities and content that does not match a predefined security policy. In technical sense, Microsoft Forefront TMG offers application layer protection, stateful filtering, content filtering and anti-malware protection. Network performance features: Microsoft Forefront TMG can also improve network performance: It can compress web traffic to improve communication speed. It also offers web caching: It can cache frequently-accessed web content so that users can access them faster from the local network cache. Microsoft Forefront TMG 2010 can also cache data received through Background Intelligent Transfer Service, such as updates of software published on Microsoft Update website. History Microsoft Proxy Server The Microsoft Forefront Threat Management Gateway product line originated with Microsoft Proxy Server. Developed under the code-name "Catapult", Microsoft Proxy Server v1.0 was first launched in January 1997, and was designed to run on Windows NT 4.0. Microsoft Proxy Server v1.0 was a basic product designed to provide Internet Access for clients in a LAN Environment via TCP/IP. Support was also provided for IPX/SPX networks (primarily used in legacy Novell NetWare environments), through a WinSock translation/tunnelling client which allowed TCP/IP applications, such as web browsers, to operate transparently without any TCP/IP on the wire. Although well-integrated into Windows NT4, Microsoft Proxy Server v1.0 only had basic functionality, and came in only one edition. Extended support for Microsoft Proxy Server v1.0 ended on 31 March 2002. Microsoft Proxy Server v2.0 was launched in December 1997, and included better NT Account Integration, improved packet filtering support, and support for a wider range of network protocols. Microsoft Proxy Server v2.0 exited the extended support phase and reached end of life on 31 December 2004. ISA Server 2000 On 18 March 2001, Microsoft launched Microsoft Internet Security and Acceleration Server 2000 (ISA Server 2000). ISA Server 2000 introduced the Standard and Enterprise editions, with Enterprise-grade functionality such as High-Availability Clustering not included in the St
https://en.wikipedia.org/wiki/Glendalough%20railway%20station
Glendalough railway station is a railway station on the Transperth network in Perth, Western Australia. It is located on the Joondalup line, five kilometres from Perth station serving the suburb of Glendalough. History Glendalough station opened on 28 February 1993 in the median strip of the Mitchell Freeway where it crosses over Scarborough Beach Road via a bridge. In 2003, the contract for extending the platforms on seven Joondalup line stations, including Glendalough station, was awarded to Lakis Constructions. The platforms on these stations had to be extended by to accommodate long six car trains, which were planned to enter service. Along with the extensions, the platform edges were upgraded to bring them into line with tactile paving standards. Work on this station was done in mid-2004. In the mid-2000s, there was a push to rename the station to Scarborough Beach Road station, to better emphasize the buses that run along Scarborough Beach Road. The government requested public opinion on the possible name change, but eventually ruled it out in 2004, with acting Planning and Infrastructure Minister Tom Stephens saying "including Scarborough in the name of a station eight kilometres from the beach could also have caused confusion". Services Glendalough station is connected to Transperth Joondalup line services. Glendalough station saw 1,081,767 passengers in the 2013–14 financial year. In March 2018, Glendalough station had approximately 2,800 boardings on an average weekday. Platforms Platforms currently in use are as follows: Bus routes References External links Joondalup line Transperth railway stations Railway stations in Australia opened in 1993 Transperth railway stations in highway medians Transperth bus stations
https://en.wikipedia.org/wiki/Panel%20analysis
Panel (data) analysis is a statistical method, widely used in social science, epidemiology, and econometrics to analyze two-dimensional (typically cross sectional and longitudinal) panel data. The data are usually collected over time and over the same individuals and then a regression is run over these two dimensions. Multidimensional analysis is an econometric method in which data are collected over more than two dimensions (typically, time, individuals, and some third dimension). A common panel data regression model looks like , where is the dependent variable, is the independent variable, and are coefficients, and are indices for individuals and time. The error is very important in this analysis. Assumptions about the error term determine whether we speak of fixed effects or random effects. In a fixed effects model, is assumed to vary non-stochastically over or making the fixed effects model analogous to a dummy variable model in one dimension. In a random effects model, is assumed to vary stochastically over or requiring special treatment of the error variance matrix. Panel data analysis has three more-or-less independent approaches: independently pooled panels; random effects models; fixed effects models or first differenced models. The selection between these methods depends upon the objective of the analysis, and the problems concerning the exogeneity of the explanatory variables. Independently pooled panels Key assumption: There are no unique attributes of individuals within the measurement set, and no universal effects across time. Fixed effect models Key assumption: There are unique attributes of individuals that do not vary over time. That is, the unique attributes for a given individual are time invariant. These attributes may or may not be correlated with the individual dependent variables yi. To test whether fixed effects, rather than random effects, is needed, the Durbin–Wu–Hausman test can be used. Random effect models Key assumption: There are unique, time constant attributes of individuals that are not correlated with the individual regressors. Pooled OLS can be used to derive unbiased and consistent estimates of parameters even when time constant attributes are present, but random effects will be more efficient. Fixed effects is a feasible generalised least squares technique which is asymptotically more efficient than Pooled OLS when time constant attributes are present. Random effects adjusts for the serial correlation which is induced by unobserved time constant attributes. Models with instrumental variables In the standard random effects (RE) and fixed effects (FE) models, independent variables are assumed to be uncorrelated with error terms. Provided the availability of valid instruments, RE and FE methods extend to the case where some of the explanatory variables are allowed to be endogenous. As in the exogenous setting, RE model with Instrumental Variables (REIV) requires more stringent assum
https://en.wikipedia.org/wiki/Accessibility%20Toolkit
Accessibility Toolkit (ATK) is an open source software library, part of the GNOME project, which provides application programming interfaces (APIs) for implementing accessibility support in software. One common nomenclature to explain an accessibility framework is a usual client-server architecture. In that way, assistive technologies (ATs) such as screen readers, would be the clients of that framework, and computer applications would be the server. In this architecture the client and server need to communicate with each other, usually using the IPC technology of the platform. Ideally the accessibility framework expose this to the client and server in a transparent way. Usually the API for both client-side and server-side applications are the same, and the accessibility framework provides a client-side and a server-side implementation of that API. In the case of GNOME, there are two different APIs, one for the client-side (Assistive Technology Service Provider Interface (AT-SPI)) and a different one for the server-side (ATK) due to historical reasons related to the underlying technologies. Implementations The ATK abstract headers files are freely available to help developers who want to make their GUI toolkit accessible. Developers who use stock widgets of GUI toolkits that implements the ATK headers can more easily make their applications accessible. However, if they develop their own widgets, they will have to ensure that they are exposing all the accessible information. GAIL (GNOME Accessibility Implementation Library) was the name of the accessibility interfaces implementation defined by ATK for GTK+, the widget library of GNOME. Initially, GAIL was an independent module mapped to GTK+ but since GNOME 3.2, GAIL was merged into GTK+, so the ATK implementation is integrated into GTK+ and GAIL is deprecated. Apart from GTK+, other GUI toolkits and applications have implemented ATK in order to be accessible, such as OpenOffice/LibreOffice, Mozilla's Gecko, Clutter and WebKitGTK+. Development ATK is part of the GNOME Accessibility Framework that was released in 2001. The main development force behind ATK was the Accessibility Program Office (APO) of Sun Microsystems, Inc. (now Oracle) with contributions from many community members. When Oracle acquired Sun in 2010 they cut developer jobs of full-time developers working on GNOME accessibility components such as the Accessibility Toolkit ATK and the Orca screen reader. Since then, ATK is mainly maintained by the GNOME community. Successor During GUADEC 2020 Emanuelle Bassi announced to have been working for about 6 months on a successor to ATK. Accessibility will no longer be maintained out-of-tree but be part of GTK. Available since GTK 3.99.0 The new approach will implement WAI-ARIA (World Wide Web Consortium (W3C) Accessibility Initiative – Accessible Rich Internet Applications). Maintainers ATK development has been led by their maintainers with the help of its community. The maint
https://en.wikipedia.org/wiki/MPS%20%28format%29
MPS (Mathematical Programming System) is a file format for presenting and archiving linear programming (LP) and mixed integer programming problems. Overview The format was named after an early IBM LP product and has emerged as a de facto standard ASCII medium among most of the commercial LP solvers. Essentially all commercial LP solvers accept this format, and it is also accepted by the open-source COIN-OR system. Other software may require a customized reader routine in order to read MPS files. However, with the acceptance of algebraic modeling languages MPS usage has declined. For example, according to the NEOS server statistics in January 2011 less than 1% of submissions were in MPS form compared to 59.4% of AMPL and 29.7% of GAMS submissions. MPS is column-oriented (as opposed to entering the model as equations), and all model components (variables, rows, etc.) receive names. MPS is an old format, so it is set up for punch cards: Fields start in column 2, 5, 15, 25, 40 and 50. Sections of an MPS file are marked by so-called header cards, which are distinguished by their starting in column 1. Although it is typical to use upper-case throughout the file for historical reasons, many MPS-readers will accept mixed-case for anything except the header cards, and some allow mixed-case anywhere. The names that you choose for the individual entities (constraints or variables) are not important to the solver; one should pick meaningful names, or easy names for a post-processing code to read. MPS format Here is a little sample model written in MPS format (explained in more detail below): NAME TESTPROB ROWS N COST L LIM1 G LIM2 E MYEQN COLUMNS XONE COST 1 LIM1 1 XONE LIM2 1 YTWO COST 4 LIM1 1 YTWO MYEQN -1 ZTHREE COST 9 LIM2 1 ZTHREE MYEQN 1 RHS RHS1 LIM1 5 LIM2 10 RHS1 MYEQN 7 BOUNDS UP BND1 XONE 4 LO BND1 YTWO -1 UP BND1 YTWO 1 ENDATA For comparison, here is the same model written out in an equation-oriented format: Optimize COST: XONE + 4*YTWO + 9*ZTHREE Subject To LIM1: XONE + YTWO <= 5 LIM2: XONE + ZTHREE >= 10 MYEQN: - YTWO + ZTHREE = 7 Bounds XONE <= 4 -1 <= YTWO <= 1 End As mentioned below, the lower bound on XONE is either zero or -infinity, depending upon implementation, because it is not specified. Strangely, nothing in MPS format specifies the direction of optimization, and there is no standard "default" direction; some LP solvers will maximize if not instructed otherwise, others will minimize, and still others put safety first and have no default and require a selection somewhere in a control program or by a calling p
https://en.wikipedia.org/wiki/DBC
DBC may refer to: Database connection libraries, e.g., JDBC IATA code for Baicheng Chang'an Airport dBc, decibels relative to carrier, a measurement in RF engineering dB(C), C-weighted decibels, a loudness measurement in acoustics DBC News, a Bangladeshi news channel DBC Pierre (born 1961), Australian-born author Dead Brain Cells, a Canadian thrash metal band Design by contract, a methodology for designing computer software Detroit Boat Club, a historic rowing club Digital Broadcasting Corporation (Hong Kong), a radio broadcasting corporation Dread Broadcasting Corporation, the UKs first black music radio station The Devastating Beat Creator, stage name of Martin Nemley, a member of the American hip hop band Stetsasonic Direct Bonded Copper, a power electronic substrate Direct-buried cable, a kind of electrical cable See also DBC 1012, a computer produced by Teradata Corporation in the early 1980s DBC1, a human protein Deleted in Breast Cancer 1, a human protein DBCS (disambiguation)
https://en.wikipedia.org/wiki/Lotus%20Marketplace
Lotus Marketplace was a database program developed jointly by Lotus Development Corporation (as the software developer) and Equifax (as the information provider), announced on April 10, 1990, but cancelled shortly after on January 23, 1991, mainly due to massive protests and lawsuit threats, citing invasion of privacy. This program was rather large (even by today's standards), as it was supposed to be released on several CD-ROMs. Lotus Marketplace was to be released in two editions, Lotus Marketplace: Business (containing information about businesses) and Lotus Marketplace: Households (containing information about peoples and households). The Business edition of this program contained information about 7 million businesses in the United States, just like Yellow Pages, but could quickly and flexibly be searched. Unlike the Households edition, this edition was not so controversial and was released in October 1990, but was cancelled along with the Households edition; concerns about profitability were cited. The Households edition of this program became infamous and the object of considerable opprobrium because it was supposed to contain private information about 120 million people and 80 million households in the United States. Information such as names, addresses, telephone numbers, demographic information, and prior purchasing behavior were contained in the program and could be searched quickly and flexibly. This program was strongly protested by many, who cited customer privacy issues (because by using this program telemarketers could get hundreds of names and addresses, and mass mail those addresses without addressees' consent). The backlash online was particularly intense, with a new Usenet newsgroup formed to discuss it. Information was circulated online about how to contact Lotus and request the removal of one's information from the database; more than 30,000 people would eventually do so. The decision to not release it was seen as a victory for online activism. See also Privacy Customer privacy Data privacy Computer ethics Telemarketing Further reading "A Victory for Computer Populism", Langdon Winner. Technology Review, May–June 1991, page 66. Persuasion and Privacy in Cyberspace: The Online Protests over Lotus MarketPlace and the Clipper Chip, by Laura J. Gurak New Haven: Yale University Press, 1997. References External links The Lessons of the Lotus MarketPlace: Implications for Consumer Privacy in the 1990s by Mary J. Culnan (Computer Professionals for Social Responsibility) Computer Privacy Threats and Remedies by Lance Hoffman (Computer Professionals for Social Responsibility) Privacy controversies and disputes Business software
https://en.wikipedia.org/wiki/Computer%20Assisted%20Passenger%20Prescreening%20System%20II
The Computer Assisted Passenger Prescreening System II (CAPPS II) was a program of the United States Department of Homeland Security (DHS) instituted to increase security at airports by assessing the risk level of passengers before they're allowed to board. CAPPS II searched through information stored in government and commercial databases and assigned a color-coded level of risk to each passenger. Amid controversy from such organizations as the American Civil Liberties Union (ACLU), the Electronic Privacy Information Center (EPIC), and the Electronic Frontier Foundation (EFF), the program was terminated by President Bush in August 2004. The program was then replaced by a similar program called Secure Flight in early 2005 generating the same concerns over privacy and civil liberties. However, due to public concerns, Secure Flight did not become operational until 2010. CAPPS II grounded innocent Americans due to false positives. One notable example is the grounding of Senator Ted Kennedy in 2004. See also Computer Assisted Passenger Prescreening System (CAPPS I) References External links ACLU's page on CAPPS II EPIC's Page on Passenger Prescreening Programs EFF's Page on CAPPS II Senator Kennedy's grounding by CNN.com United States Department of Homeland Security Legal issues related to the September 11 attacks Counterterrorism in the United States Mass surveillance Privacy in the United States Surveillance
https://en.wikipedia.org/wiki/Ambient%20intelligence
Ambient intelligence (AmI) is a term used in computing to refer to electronic environments that are sensitive and responsive to the presence of people. The term is generally applied to consumer electronics, telecommunications, and computing. Ambient intelligence is intended to enable devices to work in concert with people in carrying out their everyday life activities in an intuitive way by using information and intelligence hidden in the network connecting these devices. An example of ambient intelligence is the Internet of Things. A typical context of the ambient intelligence environment is home, but it may also be used in workspaces (offices, co-working), public spaces (based on technologies such as smart streetlights), and hospital environments. The concept of ambient intelligence was originally developed in the late 1990s by Eli Zelkha and his team at Palo Alto Ventures for the time frame 2010–2020. Developers theorize that as devices grow smaller, more connected, and more integrated into our environment, the technological framework behind them will disappear into our surroundings until only the user interface remains perceivable by people. Overview The ambient intelligence concept builds upon pervasive computing, ubiquitous computing, profiling, context awareness, and human-centric computer interaction design. It is characterized by systems and technologies that are: Embedded: Many networked devices are integrated into the environment. Context aware: These devices can recognize you and your situational context. Personalized: They can be tailored to your needs. Adaptive: They can change in response to you. Anticipatory: They can anticipate your desires without conscious mediation. Successful implementation of ambient intelligence requires several vital technologies to exist. These include hidden, user-friendly hardware such as miniaturization, nanotechnology, and smart devices, as well as human-centric computer interfaces (intelligent agents, multimodal interaction, context awareness, etc.). These systems and devices operate through a seamless mobile/fixed communication and computing infrastructure characterized by interoperability, wired and wireless networks, and service-oriented architecture. Systems and devices must also be dependable and secure, which may be achieved through self-testing and self-repairing software and privacy-ensuring technology. Ambient intelligence has relationship with - and depends on advances in - sensor technology and sensor networks. User experience became more important to developers in the late 1990s as a result of the many digital products and services that were difficult to understand or use. In response, the user experience design emerged to create new technologies and media around the user's personal experience. Ambient intelligence is influenced by user-centered design, where the user is placed in the center of the design activity and gives feedback to the designer. History and invention I
https://en.wikipedia.org/wiki/LAN%20gaming%20center
A LAN Gaming Center is a business where one can use a computer connected over a LAN to other computers, primarily for the purpose of playing multiplayer computer games. Use of these computers or game consoles costs a fee, usually per hour or minute; sometimes one can have unmetered access with a pass for a day or month, etc. It may or may not serve as a regular café as well, with food and drinks being served. Many game centers have evolved in recent years to also include console gaming Other centers offer computer repair and consulting, custom built computers, web design, programming classes or summer camps, and other technology related services. LAN gaming centers can come in various sizes and styles, from the very small (6-8 computers) to the very large (400+ computers). Most have computer systems with higher-end hardware built specifically for computer gaming. Customers can play games with (or against) in-house opponents and most also include a high-speed Internet connection to allow customers to play games with online opponents as well (usually at the same time). Most also host a number of special events such as tournaments and LAN parties, some lasting throughout the night. Another typical feature is the ability to browse the Web and use instant messaging clients. Often these gaming centers allow customers the option of renting out the whole or part of the store for private LAN parties. LAN centers are typically decorated in such a way as to enhance the already present gaming atmosphere, such as adding black-light lightbulbs and gaming paraphernalia and posters around the center. A standard LAN gaming center will have rows of computers next to each other with highback leather computer chairs. There are over 650 LAN centers in the US, while 90% of the LAN Centers in the world are in China, the largest having over 1777 seats. It is common for a LAN gaming centers to sell the games that they had already installed for their in-house computers, most notably MMORPGs and many FPS games. Campus gaming centers The first LAN Gaming center located on a college campus was Savage Geckos which was opened by Bruce McCulloch Jones as a tenant of Eastern Michigan University's Student Center, both opening on November 6, 2006. The combination retail/gaming center included 21 networked Xboxs, other consoles: PS2s, PS3s, Wiis, 10 networked gaming PCs and theatre seating (with cup holders) for game play, LCD screens, video projectors and a retail/arcade/hang out area. This center hosted some of the first on-campus intercollegiate play with a Halo 3 tournament between students from Eastern Michigan University, University of Michigan, Michigan State University and Oakland University. The operation lasted until Spring of 2008 when it was purchased by the university. Mr. Jones made a series of presentations to the Association of College Unions International promoting the use of video games for positive social inte
https://en.wikipedia.org/wiki/Chillingham
Chillingham can refer to: Chillingham (game), a computer game designed for the visually impaired Chillingham, New South Wales, a village in New South Wales, Australia Chillingham, Northumberland, a village in Northumberland in the north of England Chillingham Castle, an ancient castle in Northumberland, England, near Chillingham Chillingham cattle, a herd of rare cattle which have lived for centuries in the grounds of Chillingham Castle, in Northumberland, England Chillingham Road Metro station, a metro station in Newcastle upon Tyne, England , a minesweeper of the British Royal Navy
https://en.wikipedia.org/wiki/HAL%20%28robot%29
The Hybrid Assistive Limb (also known as HAL) is a powered exoskeleton suit developed by Japan's Tsukuba University and the robotics company Cyberdyne. It is designed to support and expand the physical capabilities of its users, particularly people with physical disabilities. There are two primary versions of the system: HAL 3, which only provides leg function, and HAL 5, which is a full-body exoskeleton for the arms, legs, and torso. In 2011, Cyberdyne and Tsukuba University jointly announced that hospital trials of the full HAL suit would begin in 2012, with tests to continue until 2014 or 2015. By October 2012, HAL suits were in use by 130 different medical institutions across Japan. In February 2013, the HAL system became the first powered exoskeleton to receive global safety certification. In August 2013, HAL received EC certification for clinical use in Europe as the world's first non-surgical medical treatment robot. In addition to its medical applications, the HAL exoskeleton has been used in construction and disaster response work. History The first HAL prototype was proposed by Yoshiyuki Sankai, a professor at Tsukuba University. Fascinated with robots since he was in the third grade, Sankai had striven to make a robotic suit in order "to support humans". In 1989, after receiving his PhD in robotics, he began the development of HAL. Sankai spent three years, from 1990 to 1993, mapping out the neurons that govern leg movement. It took him and his team an additional four years to make a prototype of the hardware. The third HAL prototype, developed in the early 2000s, was attached to a computer. Its battery alone weighed nearly and required two helpers to put on, making it very impractical. By contrast, later HAL-5 model weighs only and has its battery and control computer strapped around the waist of the wearer. Cyberdyne began renting the HAL suit out for medical purposes in 2008. By October 2012, over 300 HAL suits were in use by 130 medical facilities and nursing homes across Japan. The suit is available for institutional rental, in Japan only, for a monthly fee of US$2,000. In December 2012, Cyberdyne was certified ISO 13485 – an international quality standard for design and manufacture of medical devices – by Underwriters Laboratories. In late February 2013, the HAL suit received a global safety certificate, becoming the first powered exoskeleton to do so. In August 2013, the suit received an EC certificate, permitting its use for medical purposes in Europe as the first medical treatment robot of its kind. Design and mechanics When a person attempts to move their body, nerve signals are sent from the brain to the muscles through the motor neurons, moving the musculoskeletal system. When this happens, small biosignals can be detected on the surface of the skin. The HAL suit registers these signals through a sensor attached to the skin of the wearer. Based on the signals obtained, the power unit moves the joint to support and am
https://en.wikipedia.org/wiki/Star%20Wars%20Databank
The Star Wars Databank is the official Star Wars website's reference guide to elements such as characters, locations and technology included in the franchise's canon films and television series. Before the canon restructuring in 2014, each article progressed by describing the subject's incarnation in the movies if applicable, and moving on to Expanded Universe material; finally, there was often a "Behind the Scenes" section which described the subject's real-world history, inspiration, and production. References External links Official website Science fiction websites Works based on Star Wars
https://en.wikipedia.org/wiki/Sonic%20Boom
A sonic boom is a shockwave caused by an aircraft or other object travelling faster than sound. Sonic Boom may also refer to: Sonic the Hedgehog Sonic Boom (TV series), a 2014 computer-animated TV series based on the Sonic the Hedgehog video game franchise Sonic Boom: Rise of Lyric, a 2014 video game for the Wii U Sonic Boom: Shattered Crystal, a 2014 video game for the Nintendo 3DS Sonic Boom: Fire & Ice, a 2016 sequel to Shattered Crystal for the 3DS Sonic the Hedgehog Boom: The Music from Sonic CD and Sonic Spinball, a 1994 video game soundtrack album "Sonic Boom", the theme tune in the American release of the 1993 video game Sonic the Hedgehog CD Music Sonic Boom (Kiss album), a 2009 album by hard rock-band Kiss Sonic Boom (Lee Morgan album), a 1979 album by jazz trumpeter Lee Morgan "Sonic Boom" (song), a 2021 single by Lead "Sonic Boom", a song by Roy Woods, from the album Waking at Dawn "Sonic Boom", a song by the rock band Gear Daddies from their 1990 album Billy's Live Bait Sonic Boom Six, a UK rock band Peter Kember, a British musician more commonly known as Sonic Boom Sonic Boom, a 2012 album by pianist Uri Caine Sonic Boom Records, an independent record store in Seattle, Washington Other Sonic Boom (1987 video game), a scrolling shooter released for various platforms Sonic Boom, an attack move by Guile from the Street Fighter franchise Sonic Boom, a music store and frequent meeting place for characters of the TV series Austin & Ally
https://en.wikipedia.org/wiki/C0%20and%20C1%20control%20codes
The C0 and C1 control code or control character sets define control codes for use in text by computer systems that use ASCII and derivatives of ASCII. The codes represent additional information about the text, such as the position of a cursor, an instruction to start a new line, or a message that the text has been received. C0 codes are the range 00HEX–1FHEX and the default C0 set was originally defined in ISO 646 (ASCII). C1 codes are the range 80HEX–9FHEX and the default C1 set was originally defined in ECMA-48 (harmonized later with ISO 6429). The ISO/IEC 2022 system of specifying control and graphic characters allows other C0 and C1 sets to be available for specialized applications, but they are rarely used. C0 controls ASCII defined 32 control characters, plus a necessary extra character for the DEL character, 7FHEX or 01111111BIN (needed to punch out all the holes on a paper tape and erase it). This large number of codes was desirable at the time, as multi-byte controls would require implementation of a state machine in the terminal, which was very difficult with contemporary electronics and mechanical terminals. Since then, only a few of the original controls have maintained their use: the "whitespace" range of BS, TAB, LF, VT, FF, and CR; the BEL code; and ESC (but almost always as part of an ESC,'[' representation starting an ANSI escape sequence). Others are unused or have acquired different meanings such as NUL being the C string terminator. Some serial transmission protocols such as ANPA-1312, Kermit, and XMODEM do make extensive use of control characters SOH, STX, ETX, EOT, ACK, NAK and SYN for purposes approximating their original definitions. Basic ASCII control codes These are the standard ASCII control codes, originally defined in ANSI X3.4. If using the ISO/IEC 2022 extension mechanism, they are designated as the active C0 control character set with the octet sequence 0x1B 0x21 0x40 (ESC ! @). Category-Number names Several of the basic ASCII control codes are classified into a few categories, and sometimes given alternative abbreviated names consisting of that category and a number: Transmission controls: TC1 (SOH), TC2 (STX), TC3 (ETX), TC4 (EOT), TC5 (ENQ), TC6 (ACK), TC7 (DLE), TC8 (NAK), TC9 (SYN), TC10 (ETB). Format effectors: FE0 (BS), FE1 (HT), FE2 (LF), FE3 (VT), FE4 (FF), FE5 (CR). Device controls: DC1, DC2, DC3, DC4. Information separators: IS1 (US), IS2 (RS), IS3 (GS), IS4 (FS). Locking shifts: LS0 (SI), LS1 (SO). Others: NUL, BEL, CAN, EM, SUB, ESC. ISO/IEC 2022 (ECMA-35) refers to the C0 locking shifts as LS0 and LS1 in 8-bit environments, and as SI and SO in 7-bit environments. The first, 1963 edition of ASCII classified as a device control, rather than a transmission control, and gave it the abbreviation DC0 ("device control reserved for data link escape"). Format (FE) codes define and actuate formatting (such as line breaks) which affects how graphical characters are laid out and rendered, as
https://en.wikipedia.org/wiki/Repair%20permissions
Repairing disk permissions is a troubleshooting activity commonly associated with the macOS operating system by Apple. The efficacy of repairing permissions to troubleshoot application errors has been debated. Overview The BSD layer in macOS is responsible for file-system security, including the management of the Unix (POSIX) permissions model. Applications depend on the correct assignment and interpretation of permissions in order to function properly. Repairing permissions involves checking the permissions of a set of files and folders on a volume with macOS installed against a list of correct POSIX permissions and correcting any discrepancies. The list of correct permissions is compiled by consulting the various bill-of-materials (.bom) files. Typically, these files are stored within reduced-size Installer package (.pkg) files in the Receipts folder in the local Library directory () on the volume being checked. Whenever a user installs software that uses the macOS Installer package format, a bill-of-materials file is created which can be consulted for future permission repair. Files whose permissions have been incorrectly altered by an administrator, an administrator operating with root privileges, or a poorly designed installer package (installed with similar privileges) can cause a wide array of problems ranging from application errors to the inability to boot macOS. Repairing permissions can become necessary, but has become increasingly less so for versions after Panther (10.3). In OS X El Capitan, Apple introduced a security feature called System Integrity Protection. With it enabled, root privileges are no longer able to change system files and folders, including their permissions. Permissions repairs are instead performed automatically upon system installs and updates. To that end, Disk Utility as well as the corresponding command-line utility lost the ability to repair permissions. Usage In systems prior to OS X El Capitan, a permissions repair can be performed by selecting a startup volume and clicking the "Repair Disk Permissions" button in the "First Aid" section of Disk Utility. The operation can also be performed by using the command-line utility. In El Capitan, the user can instead use two command-line utilities: to repair particular packages or to repair a standard set of system packages. In both cases, the user has to disable System Integrity Protection to change permissions of system files and directories. In macOS Sierra, is not available. Permissions can also be repaired using third-party utilities such as The Apotek's AppleJack or Prosoft Engineering's Drive Genius. References Apple Inc. software MacOS
https://en.wikipedia.org/wiki/Metadata%20registry
A metadata registry is a central location in an organization where metadata definitions are stored and maintained in a controlled method. A metadata repository is the database where metadata is stored. The registry also adds relationships with related metadata types. A metadata engine collects, stores and analyzes information about data and metadata (data about data) in use within a domain. Use of metadata registries Metadata registries are used whenever data must be used consistently within an organization or group of organizations. Examples of these situations include: Organizations that transmit data using structures such as XML, Web Services or EDI Organizations that need consistent definitions of data across time, between databases, between organizations or between processes, for example when an organization builds a data warehouse Organizations that are attempting to break down "silos" of information captured within applications or proprietary file formats Central to the charter of any metadata management programme is the process of creating trusting relationships with stakeholders and that definitions and structures have been reviewed and approved by appropriate parties. Common characteristics of a metadata registry A metadata registry typically has the following characteristics: Protected environment where only authorized individuals may make changes Stores data elements that include both semantics and representations Semantic areas of a metadata registry contain the meaning of a data element with precise definitions Representational areas of a metadata registry define how the data is represented in a specific format, such as in a database or a structured file format (e.g., XML) Clear separation of semantics and system-specific constraints Because metadata registries are used to store both semantics (the meaning of a data element) and systems-specific constraints (for example the maximum length of a string) it is important to identify what systems impose these constraints and to document them. For example the maximum length of a string should not change the meaning of a data element. The International Organization for Standardization (ISO) has published standards for a metadata registry called ISO/IEC 11179 and also ISO15000-3 and ISO15000-4 ebXML registry and repository (regrep) EbXML RegRep International standards There are two international standards which are commonly referred to as metadata registry standards: ISO/IEC 11179 and ISO 15000-3. There are some who believe that ISO/IEC 11179 and ISO 15000-3 are interchangeable or at least in some way similar. e.g. "Of interest is that the ISO 11179 model was one of the inputs to the ebXML RIM (registry information model) and so has much functional equivalence to the "registry" region of the ISO 11179 conceptual model." This is however incorrect. Although the specification ebRIM v2.0 (5 December 2001) says at the beginning in its Design Objectives: "Leverage as much as pos
https://en.wikipedia.org/wiki/Open%20Diary
Open Diary (often abbreviated as "OD") is an online diary community, an early example of social networking software. It was founded on October 20, 1998. Open Diary went offline on February 7, 2014, but was re-launched on January 26, 2018. The site was owned and operated by Bruce Ableson and Susan Ableson, known on the Open Diary website by the title of their diaries, The DiaryMaster and The DiaryMistress. Ableson has described Open Diary as "the first web site that brought online diary writers together into a community." Open Diary has hosted more than five million diaries since it was founded, and was home to over half a million diaries. As of October 2008, there were over 561,000 diaries on OpenDiary.com, including diaries from 77 different countries and all 7 continents. The site innovated some key features that later became central to the architecture of other social networking and blogging sites, including reader comments and friends-only privacy. History Open Diary went online on October 20, 1998. Shortly afterwards, the site added the ability for readers to post comments on others' diary entries – an innovation that was the forerunner of the interactive nature of today's blogs and blog comments. Early features of the site included public or private diary entries, indexes of diaries by age and geographic location, and a "Favorites" page for the diary owner. The Favorites page was used to aggregate information about the latest posts of the user's friends, and was a predecessor of the friends lists and "friends-only" privacy options used by many blogging and social networking sites today. In late 1998, the site was featured as a Yahoo! Pick of the Week and membership increased rapidly, growing to more than 10,000 diaries in the first six months. In 2000, Ableson created two related websites: Teen Open Diary (in January), and Quit Smoking Diary (in April). A September 7, 2000 feature article in USA Today described Open Diary as "the Internet home of more than 130,000 personal online journals," in addition to the more than 25,000 diaries hosted on Teen Open Diary and the more than 1,700 hosted on Quit Smoking Diary. The article describes the demographics of the site as 75% female, with more than half of all diarists being 21 years old or younger. On November 2, 2000, the Diary Circles feature was added to the site. Diary Circles provided a common space where members could cross-post entries from their diaries related to specific topics. The most popular circles include "Depression", "Relationships", "Poetry", "Love & Passion", and "Advice Wanted". Two diarists posted entries while on assignment at McMurdo Station, Antarctica during 2001 – possibly making Open Diary the first online community to have people writing from all seven continents. Open Diary introduced the premium service Open Diary Plus in 2001, a paid version of the original Open Diary. In addition to freedom from advertisements, Open Diary Plus offered several new featu
https://en.wikipedia.org/wiki/ISO/IEC%2011179
The ISO/IEC 11179 Metadata Registry (MDR) standard is an international ISO/IEC standard for representing metadata for an organization in a metadata registry. It documents the standardization and registration of metadata to make data understandable and shareable. Intended purpose Organizations exchange data between computer systems precisely using enterprise application integration technologies. Completed transactions are often transferred to separate data warehouse and business rules systems with structures designed to support data for analysis. A de facto standard model for data integration platforms is the Common Warehouse Metamodel (CWM). Data integration is often also solved as a problem of data, rather than metadata, with the use of so-called master data. ISO/IEC 11179 claims that it is a standard for metadata-driven exchange of data in an heterogeneous environment, based on exact definitions of data. Structure of an ISO/IEC 11179 metadata registry The ISO/IEC 11179 model is a result of two principles of semantic theory, combined with basic principles of data modelling. The first principle from semantic theory is the thesaurus type relation between wider and more narrow (or specific) concepts, e.g. the wide concept "income" has a relation to the more narrow concept "net income". The second principle from semantic theory is the relation between a concept and its representation, e.g., "buy" and "purchase" are the same concept although different terms are used. A basic principle of data modelling is the combination of an object class and a characteristic. For example, "Person - hair color". When applied to data modelling, ISO/IEC 11179 combines a wide "concept" with an "object class" to form a more specific "data element concept". For example, the high-level concept "income" is combined with the object class "person" to form the data element concept "net income of person". Note that "net income" is more specific than "income". The different possible representations of a data element concept are then described with the use of one or more data elements. Differences in representation may be a result of the use of synonyms or different value domains in different data sets in a data holding. A value domain is the permitted range of values for a characteristic of an object class. An example of a value domain for "sex of person" is "M = Male, F = Female, U = Unknown". The letters M, F and U are then the permitted values of sex of person in a particular data set. The data element concept "monthly net income of person" may thus have one data element called "monthly net income of individual by 100 dollar groupings" and one called "monthly net income of person range 0-1000 dollars", etc., depending on the heterogeneity of representation that exists within the data holdings covered by one ISO/IEC 11179 registry. Note that these two examples have different terms for the object class (person/individual) and different value sets (a 0-1000 dollar ran
https://en.wikipedia.org/wiki/Representation%20term
A representation term is a word, or a combination of words, that semantically represent the data type (value domain) of a data element. A representation term is commonly referred to as a class word by those familiar with data dictionaries. ISO/IEC 11179-5:2005 defines representation term as a designation of an instance of a representation class As used in ISO/IEC 11179, the representation term is that part of a data element name that provides a semantic pointer to the underlying data type. A Representation class is a class of representations. This representation class provides a way to classify or group data elements. A Representation Term may be thought of as an attribute of a data element in a metadata registry that classifies the data element according to the type of data stored in the data element. Representation terms are typically "approved" by the organization or standards body using them. For example, the UN publishes its approved list as part of the UN/CEFACT Core Components Technical Specification. The Universal Data Element Framework uses a subset of CCTS representation terms and assigns numeric codes to those used. Use cases for representation term Managing value domains A value domain expresses the set of allowed values for a data element. The representation term (and typically the corresponding data type term) comprise a taxonomy for the value domains within a data set. This taxonomy is the representation class. Thus the representation term can be used to control proliferation of value domains by ensuring equivalent value domains use the same representation term. Finding equivalent properties When a person or software agent is analyzing two separate metadata registries to find property equivalence, the Representation Term can be used as a guide. For example, if system A has a Data Element such as PersonGenderCode and system B has a data element such as PersonSexCode the code suffix might assist the two systems to only match data elements that have the suffix "Code". However, a taxonomy of property terms (i.e. "Sex" or "Gender") is much more efficient in this respect. Inference The Representation Term can be used in many ways to do inferences on data sets. Representation Terms tells the observer of any data stream about the data types and gives an indication of how the Data Element can be used. This is critical when mapping metadata registries to external Data Elements. For example, if you are sent a record about a person you may look for any "ID" suffix to understand how the remote system may differentiate two distinct records. Required fields Representation Terms are also used to make inferences about the requirements of a property. For example, if a data stream had Data Element PersonBirthDateAndTime you would know that BOTH the date AND time are available and relevant, not just the date. If the birth time was optional, a separate data elements should be used such as PersonBirthDate and PersonBirthTime. F
https://en.wikipedia.org/wiki/Semantic%20spectrum
The semantic spectrum (sometimes referred to as the ontology spectrum or the smart data continuum or semantic precision) is a series of increasingly precise or rather semantically expressive definitions for data elements in knowledge representations, especially for machine use. At the low end of the spectrum is a simple binding of a single word or phrase and its definition. At the high end is a full ontology that specifies relationships between data elements using precise URIs for relationships and properties. With increased specificity comes increased precision and the ability to use tools to automatically integrate systems but also increased cost to build and maintain a metadata registry. Some steps in the semantic spectrum include the following: glossary: A simple list of terms and their definitions. A glossary focuses on creating a complete list of the terminology of domain-specific terms and acronyms. It is useful for creating clear and unambiguous definitions for terms and because it can be created with simple word processing tools, few technical tools are necessary. controlled vocabulary: A simple list of terms, definitions and naming conventions. A controlled vocabulary frequently has some type of oversight process associated with adding or removing data element definitions to ensure consistency. Terms are often defined in relationship to each other. data dictionary: Terms, definitions, naming conventions and one or more representations of the data elements in a computer system. Data dictionaries often define data types, validation checks such as enumerated values and the formal definitions of each of the enumerated values. data model: Terms, definitions, naming conventions, representations and one or more representations of the data elements as well as the beginning of specification of the relationships between data elements including abstractions and containers. taxonomy: A complete data model in an inheritance hierarchy where all data elements inherit their behaviors from a single "super data element". The difference between a data model and a formal taxonomy is the arrangement of data elements into a formal tree structure where each element in the tree is a formally defined concept with associated properties. ontology: A complete, machine-readable specification of a conceptualization using URIs (and then IRIs) for all data elements, properties and relationship types. The W3C standard language for representing ontologies is the Web Ontology Language (OWL). Ontologies frequently contain formal business rules formed in discrete logic statements that relate data elements to each another. Typical questions for determining semantic precision The following is a list of questions that may arise in determining semantic precision. correctness How can correct syntax and semantics be enforced? Are tools (such as XML Schema) readily available to validate syntax of data exchanges? adequacy/expressivity/scope Does the system r
https://en.wikipedia.org/wiki/Mid-season%20replacement
In American network television scheduling, a mid-season replacement is a television show that premieres in the second half of the traditional television season, usually between December and May. Mid-season replacements usually take place after a show that was in the fall schedule was canceled or put on hiatus, outside factors such as an actor's family emergency or personal illness led to a delay in the program's debut, a program was deliberately scheduled for mid-season (for example, shows NBC airs on Sunday nights after the NFL season ends, as it only takes up the first half of the television season), or a program had a shortened season for some other reason which resulted in a time slot that needed filling. A few shows in American television history have been perennial mid-season replacements. For example, American Idol aired from January to May each year from its second season onward, to great ratings success. CBS put reruns of the first season of Land of the Lost (1974) on its Saturday morning schedule in June 1985 (running to the end of December) and June 1987 (running until the new season began in September). An older and related concept is the summer replacement, which debuts between May and August, when a network's fall schedule is on hiatus. Summer replacements tend to be lower-profile shows with either low budgets or minimal prospects for renewal. Notable mid-season replacement shows Notes References Television terminology
https://en.wikipedia.org/wiki/Fall%20schedule
The fall schedule is the broadcast programming television lineup for the five major American commercial broadcast networks. It usually consists of new television shows paired with returning favorites and runs from September to December, since an altered lineup usually runs from January to May when more new shows (midseason replacement) premiere. Historically, the fall television schedule was created to help auto advertisers promote their new car models. Recently, several television networks have staggered new and returning shows without necessarily following a fall and spring schedule. NBC announced in February 2008 that it would follow a "52-week television season," likely with fewer television episodes per season than the current standard 22. References External links Fall TV Schedule from epguides.com Fall TV Schedule from TV Guide Television terminology
https://en.wikipedia.org/wiki/Cold%20Case%20Files
Cold Case Files is a reality legal show/documentary on the cable channel A&E Network and the rebooted series on Netflix. It is hosted by Bill Kurtis and the original series produced by Tom Golden. The show documents the investigation of many long-unsolved murders (referred to as "cold cases" in detectives' parlance) through the use of modern forensic science (especially recent advances in DNA techniques), and criminal psychology, in addition to recent breakthroughs in the case(s) involving previously silent witnesses. On January 19, 2017, Blumhouse Television, AMPLE Entertainment and A&E revived the series for a ten-episode run. The well received reboot features highly cinematic recreations and music. The new episodes first began airing on February 27, 2017. Actor Danny Glover took over for Kurtis as narrator for this new 10-episode series. Kurtis later returned. On August 20, 2021, after a four-year hiatus, the series returned with a new season on A&E, again with Kurtis as the host. Overview According to A&E, the show has been widely praised by law enforcement agencies, and its investigative reports are commonly used in the training of detectives. Cold Case Files first aired as a sub-series of another A&E crime documentary program, Investigative Reports, also hosted by Bill Kurtis, which ran from 1991 to 2011. Reruns of the original 1997 series currently air on broadcast syndication in the United States, usually in lower-profile time slots, and on many RTV stations. The Blumhouse Television, AMPLE Entertainment reboot has quickly gained popularity on Netflix. Some episodes of the series have now been adapted into a podcast of the same name, "Cold Case Files," hosted by Brooke Gittings and featuring the voice of the original Cold Case files host, Bill Kurtis. The podcast is part of the PodcastOne podcast network in conjunction with A&E. Episode list Season 1 (1999) Season 2 (2000) Season 3 (2001) Season 4 (2002) Season 5 (2005–06) Season 6 (2017) Season 7 (2021) Season 8 (2022) Awards and nominations Emmy Award: Outstanding Nonfiction Series (2005) nomination: Michael Harvey (executive producer), Laura Fleury (executive producer), Tania Lindsay (supervising producer), Michael West (supervising producer), Mary Frances O'Conner (producer), Bill Kurtis (host) Outstanding Nonfiction Series (2004) nomination: Laura Fleury (executive producer), Michael Harvey (supervising producer), Mike West (producer), Bill Kurtis (host) Online Film & Television Association Awards: Best Informational Program (2007) - nomination See also Solved, USA / ID, 2008 (true cases) Cold Justice, USA / TNT, 2013 (true cases) To Catch a Killer, CAN / OWN, 2014 (true cases) References External links 1999 American television series debuts 1990s American crime television series 2000s American crime television series 2010s American crime television series 2020s American crime television series 1990s American documentary television series 2000s American do
https://en.wikipedia.org/wiki/Real%20Country
Real Country is a 24-hour radio format produced by Westwood One. Real Country is marketed at the demographic of men aged 35 to 64. Its programming consists of a fairly broad playlist of "Today's Stars and the Legends." Classic country is the station's primary core, with frequent airplay of artists such as George Jones and Johnny Cash, while the station also plays newer hits, particularly by established neotraditional country artists such as George Strait and Alan Jackson. More contemporary artists can be heard on Westwood One's other country format, Best Country Today. Its direct competitor was "True Country" by Dial Global. "Real Country" was established in 1988 as a partnership between Satellite Music Network and radio station owner and country music legend Buck Owens, with operations based at Owens-owned KCWW (now KQFN) in Tempe, Arizona. SMN and Owens sold the station and network to The Walt Disney Company in 1998, who operated the network as part of the ABC Radio Networks until 2007. The network is currently owned and operated by Cumulus Media. Schedule Although stations that program "Real Country" use it for a majority of their programming, affiliates—like most others who use satellite programming—will often replace the network feed at certain points of the day for local programming, most often news, sports and markets (depending on the station). Up to six minutes are given to affiliates at the top of every hour for news or commercials. In addition, at least one block of one to three minutes is provided for local commercials every ten minutes. After each commercial block and 14 seconds before the top of the hour, time is provided for affiliate station identification. Hosts currently heard on the network include 24 year Real Country veteran Kris Wilson, Jim Casey and Jacy Shepherd. Former hosts Darlene Dixon- Hosted middays for a period in the early 1990s, later at WLWI-FM in Montgomery, Alabama. Mike Farell- Hosted the overnight show seven days a week until 2007. He referred to himself on the air as "The Friend of the Friendless". Steve Lewis- Hosted the evening show Monday-Friday and Real Country Saturday Night until 2009. Jerry Walker- Replaced Steve Lewis on the Monday-Friday show until November 12, 2009. Richard Lee- Hosted the afternoon show for over a decade and was also program director until November 12, 2009. John Calhoun- Morning show host from 2007 until November 12, 2009. Sage- Occasional overnight and fill-in DJ, referred to herself on the air as "Sage, your real spice of life". Bobby Sherman- worked evenings from 1989- Mark Bateman- worked the all-nighter from 1989- 1995 then joined KIIM FM in Tucson till 2005 Then started his own business and got out of radio Dick Ellingson- did weekends and filled in from 1989-1993. Hosted the Saturday Night All Request Show. Terry Jones- did middays from 1989- Bob Jackson- first morning man on the network Chris Daniels (Eicher) - Did weekends and vacation fill-in from 1997 - 2001
https://en.wikipedia.org/wiki/Waterbed%20theory
Waterbed theory is the observation, ascribed to Larry Wall, that some systems, such as human and computer languages, contain a minimum amount of complexity, and that attempting to "push down" the complexity of such a system in one place will invariably cause complexity to "pop up" elsewhere. This behavior is likened to a waterbed mattress which contains a certain amount of water; it is possible to push down the mattress in one place, but the displaced water will always cause the mattress to rise elsewhere, because water does not compress. It is impossible to push down the waterbed everywhere at once, because the volume of the water remains a constant. Waterbed theory has been cited as a significant part of the design philosophy of Raku. See also Variety (cybernetics) References Programming language design Perl
https://en.wikipedia.org/wiki/VoodooPC
Voodoo Computers Inc. or VoodooPC was a luxury personal computer brand and company. Voodoo was originally started as a niche PC maker in Calgary, Alberta, Canada. It was founded in 1991, and acquired by Hewlett-Packard in 2006. Voodoo specialized in desktop high performance computing. By 2013 the Voodoo name was no longer used, and was replaced by the brand name Omen, which used the same logo until 2020. Desktop offering Voodoo PC was most well known for its desktops. They experimented with liquid cooling partnering with CoolIT Systems at one point. On June 10, 2008, the Omen computer's complete redesign was revealed, showing a new brushed metal case and mounted 7" auxiliary screen. History The company was founded in 1991 by Rahul Sood, and in 1999 Ravi Sood (brother to Rahul) joined the board of operations. Prior to the acquisition Voodoo employed roughly 40 people between their Canadian headquarters and their web development office in Bangalore. Acquisition by HP On September 28, 2006, Rahul Sood announced on his blog that HP would be acquiring VoodooPC for an undisclosed amount. Rahul Sood will be assuming the position of Chief Technology Officer for HP's Global Voodoo Business Unit. In August 2007, HP announced the HP Blackbird 002 gaming PC with the label VoodooDNA inside the case, and was released on September 15, 2007. New direction Since the acquisition of Voodoo in 2006, the business has been re-developing the brand of Voodoo. This was culminated on the 10th June 2008 with the revelation that Voodoo will focus on high-end, top spec computers rather than gaming machines. Voodoo will also continue with Voodoo DNA machines with HP. For the launch of their new brand direction they used the tag line of 'Blending Art, Innovation and Performance;' confirming the businesses future as a HP brand. In 2009, HP used the Envy line as a high-performance computer without the Voodoo branding or Voodoo DNA. In 2014, HP relaunch the Omen brand and used the Voodoo Tribal mask logo as the official logo until May 2020. Products Discontinued Rage (gaming desktop) Aria (media center) Hexx (gaming desktop, small form factor) Vibe (media center/Xbox combination) Eden (fanless/silent gaming desktop) Omega (canceled) HP Blackbird 002 (high end gaming desktop with VoodooDNA) HP Firebird (lower end compact gaming desktop with VoodooDNA) HP Firefly (dual screen laptop/cancelled) Envy 133 (premium ultraportable notebook) with Splashtop instant-on OS. F Class Fury EGAD DOLL Idol Epic See also HP Omen Maingear (VoodooPC url redirect) List of computer system manufacturers Hewlett-Packard Alienware References External links Rahul Sood's Weblog Voodoo PC Hewlett-Packard acquisitions Computer companies established in 1991 1991 establishments in Alberta Gaming computers Defunct computer hardware companies 2006 mergers and acquisitions Computer companies disestablished in 2006 2006 disestablishments in Alberta
https://en.wikipedia.org/wiki/Par%20%28command%29
The computer program par is a text formatting utility for Unix and Unix-like operating systems, written by Adam M. Costello as a replacement for the fmt command. Par reformats paragraphs of text to fit into a given line length optimally, keeping prefixes and suffixes intact, which is useful for formatting source code comments. It also understands the conventions commonly used for quoting in email replies, and is capable of intelligently reformatting these several levels deep while rewrapping the text they quote. Par can be invoked from text editors such as Vim or Emacs. To support Unicode par needs to be compiled with a patch that adds multi-byte character support, typically, UTF-8 encoding. Unlike fmt, par also supports text justification. References Costello, Adam M. (2001). "par.doc". Accessed August 4, 2005. External links Add multi-byte character support to par (Patch author's website). Archived November 24, 2021. Vimcasts.org: formatting text with par Vim wikia: Par text reformatter Unix text processing utilities
https://en.wikipedia.org/wiki/CalWIN
CalWIN is an online, real-time computer program that supports the administration of welfare in California. These include CalWORKs (TANF), CalFresh (food stamps), Medi-Cal (Medicaid), General Assistance/General Relief, Foster Care, and case management functions for employment services. It facilitates accounting and management reports, interfaces with the California state government, and satisfies the US federal mandate for the Statewide Automated Welfare System (SAWS). CalWin stands for either California Work Opportunity and Responsibility to Kids Information Network or California Welfare Information Network. Management It is managed by the Welfare Client Data System Consortium joint powers authority (WCDS). History CalWIN has been used in 18 California counties since 2005. It replaced a legacy system, CDS, which lacked sufficient automation to support tracking of time-on-aid federal requirements. CalWIN, like CDS, was purchased from the IT architecture company Electronic Data Systems (EDS) and was originally developed by Deloitte Consulting. CalWIN's design was driven by federal requirements and regulations, largely as directed by the WCDS Consortium. Functionality CalWIN runs eligibility and benefit determinations, case maintenance, application registration, and statistical reporting functions. New client data is entered by the clerical and eligibility staff of county social service agencies. Certain other data is entered by CalWIN Project staff. Despite the goal of automation, CalWIN requires manual interventions to prevent certain erroneous determinations and actions. Notes External links CalWIN Welfare in California Government software
https://en.wikipedia.org/wiki/KASY-TV
KASY-TV (channel 50) is a television station in Albuquerque, New Mexico, United States, affiliated with MyNetworkTV. It is owned by Mission Broadcasting alongside Santa Fe–licensed CW affiliate KWBQ (channel 19) and its Roswell-based satellite, KRWB-TV (channel 21). The two stations share studios with dual CBS/Fox affiliate KRQE (channel 13) on Broadcast Plaza in Albuquerque; KASY-TV's transmitter is located atop Sandia Crest. Nexstar Media Group, which owns KRQE and holds a majority stake in The CW, provides master control, technical, engineering and accounting services for KASY-TV and KWBQ through a shared services agreement (SSA), though the two stations are otherwise operated separately from KRQE as Mission handles programming, advertising sales and retransmission consent negotiations. History KASY-TV first signed on the air on October 6, 1995, owned by Ramar Communications and managed by Lee Enterprises (then-owners of CBS affiliate KRQE) under a local marketing agreement (LMA). The station was primarily a UPN affiliate, but had a secondary affiliation with The WB; this was easy to do as neither network had more than a couple nights a week of programming at that time. Initially, KASY ran cartoons, old movies, talk shows, and classic and recent off-network sitcoms. In fall 1997, KASY dropped WB programming and became an exclusive UPN affiliate; The WB would return to the market when upstart KWBQ signed on in March 1999 with a similar general entertainment format. In the interim, WB programming was brought in out-of-market from KTLA in Los Angeles or Chicago-based superstation WGN on Albuquerque area cable providers. In June 1999, ACME Communications, KWBQ's owner, bought KASY from Ramar and terminated the local marketing agreement with Lee Enterprises, resulting in the creation of the first major television duopoly in the Albuquerque market. Most of the programming inventory airing on KASY was also acquired by ACME, while some of the shows that aired on KASY under the LMA remained with Lee to be broadcast on KRQE. After the sale to ACME was completed, KASY stopped rebroadcasting certain local newscasts from KRQE. That fall, KASY dropped its UPN affiliation due to contract disputes between the network and ACME Communications (which was closely associated with UPN's rival The WB) and became an independent station. In the interim, UPN programming was brought in out-of-market from KCOP in Los Angeles on Albuquerque area cable providers, while over-the-air viewers were unable to view UPN programming. While the station was an independent (during which it was branded as "Superstation 50"), KASY broadcast movies and syndicated programming during prime time hours to replace UPN programs. By February 2000, the UPN affiliation was returned to KASY, rebranding as "UPN 50;" KCOP was then pulled from area cable systems at KASY's request. On January 24, 2006, Time Warner and CBS Corporation announced that The WB and UPN would merge to create The CW Tel
https://en.wikipedia.org/wiki/IBM%20Global%20Mirror
Global Mirror is an IBM technology that provides data replication over extended distances between two sites for business continuity and disaster recovery. If adequate bandwidth exists, Global Mirror provides a recovery point objective (RPO) of as low as 3–5 seconds between the two sites at extended distances with no performance impact on the application at the primary site. It replicates the data asynchronously and also forms a consistency group at a regular interval allowing a clean recovery of the application. The two sites can be on separate continents or simply on different utility grids. IBM also provides a synchronous data replication called Metro Mirror, which is designed to support replication at "Metropolitan" distances of (normally) less than 300 km. Global Mirror is based on IBM Copy Services functions: Global Copy and FlashCopy. Global mirror periodically pauses updates of the primary volumes and swaps change recording bitmaps. It then uses the previous bitmap to drain updates from the primary volumes to the secondaries. After all primary updates have been drained, the secondary volumes are used as the source for a FlashCopy to tertiary volumes at the recovery site. This ensures that the tertiary copy of the volumes has point-in-time consistency. By grouping many volumes into one Global Mirror session multiple volumes may be copied to the recovery site simultaneously while maintaining point-in-time consistency across those volumes. Global Mirror can be combined with a wide area network clustering product like Geographically Dispersed Parallel Sysplex (GDPS), HACMP/XD, or IBM TotalStorage Continuous Availability for Windows to provide for automated failover between sites. This combined solution provides lower recovery time objective (RTO), because it allows most applications to automatically resume productive operation in 30–600 seconds. The Global Mirror function is available on IBM Storage devices including the DS8000 series (DS8100, DS8300, DS8700, DS8800, DS8870), the DS6800, the Enterprise Storage Server Models 800 and 750, midrange storage servers V7000, DS4000 family, and the IBM SAN Volume Controller. References Storage software IBM storage software
https://en.wikipedia.org/wiki/Minimalism%20%28computing%29
In computing, minimalism refers to the application of minimalist philosophies and principles in the design and use of hardware and software. Minimalism, in this sense, means designing systems that use the least hardware and software resources possible. History In the late 1970s and early 1980s, programmers worked within the confines of relatively expensive and limited resources of common platforms. Eight or sixteen kilobytes of RAM was common; 64 kilobytes was considered a vast amount and was the entire address space accessible to the 8-bit CPUs predominant during the earliest generations of personal computers. The most common storage medium was the 5.25 inch floppy disk holding from 88 to 170 kilobytes. Hard drives with capacities from five to ten megabytes cost thousands of dollars. Over time, personal-computer memory capacities expanded by orders of magnitude and mainstream programmers took advantage of the added storage to increase their software's capabilities and to make development easier by using higher-level languages. By contrast, system requirements for legacy software remained the same. As a result, even the most elaborate, feature-rich programs of yesteryear seem minimalist in comparison with current software. One example of a program whose system requirements once gave it a heavyweight reputation is the GNU Emacs text editor, which gained the backronym "Eight Megabytes And Constantly Swapping" in an era when 8 megabytes was a lot of RAM. Today, Emacs' mainly textual buffer-based paradigm uses far fewer resources than desktop metaphor GUI IDEs with comparable features such as Eclipse or Netbeans. In a speech at the 2002 International Lisp Conference, Richard Stallman indicated that minimalism was a concern in his development of GNU and Emacs, based on his experiences with Lisp and system specifications of low-end minicomputers at the time. As the capabilities and system requirements of common desktop software and operating systems grew throughout the 1980s and 1990s, and as software development became dominated by teams espousing conflicting, faddish software development methodologies, some developers adopted minimalism as a philosophy and chose to limit their programs to a predetermined size or scope. A focus on software optimization can result in minimalist software, as programmers reduce the number of operations their program carries out in order to speed execution. In the early 21st century, new developments in computing have brought minimalism to the forefront. In what has been termed the post-PC era it is no longer necessary to buy a high-end personal computer merely to perform common computing tasks. Mobile computing devices, such as smartphones, tablet computers, netbooks and plug computers, often have smaller memory capacities, less-capable graphics subsystems, and slower processors when compared to the personal computer they are expected to replace. In addition, heavy use of graphics effects like alpha blending drains
https://en.wikipedia.org/wiki/The%20Passionate%20Eye
The Passionate Eye is a Canadian documentary television series—and online playlist—that showcases documentary programming from around the world focusing on topics of news, current affairs, politics, and social issues. Airing on CBC News Network, it has been on-air since 1992, and has had a website since 2002. The program was originally hosted by Michaëlle Jean, who left the position when she was appointed the new Governor General of Canada effective September 27, 2005. Jean was not immediately replaced by a permanent host; the series continued under a hostless format until 2015, when Wendy Mesley finally took the reins as a permanent host. The series initially aired on Sunday and Monday nights. Debuting documentaries, the Sunday programme was titled The Passionate Eye Sunday Showcase (or, The Passionate Eye - Sunday); whereas the Monday-night feature was titled The Passionate Eye - Monday. The series eventually dropped the "Sunday" and "Monday" from its heading when it began to air episodes more regularly into its third decade. The show formerly also aired on CBC Television's main network, but was replaced by Doc Zone and later Firsthand. The Passionate Eye continues to air on CBC News Network several times a week. Going into 2021, CBC made various changes to its documentary commissioning operations; moving forward, the corporation will now commission and acquire one-hour documentaries under its The Passionate Eye banner. Also under this new strategy, documentaries that were previously commissioned under CBC Docs POV will be commissioned for CBC Television and CBC Gem under the Passionate Eye brand. Similar documentary services of CBC's include: The Nature of Things, which commissions one-hour science and nature documentaries; documentary Channel, which commissions feature-length documentaries; and CBC Short Docs, which greenlights shorter-form documentaries and digital shorts. Select episodes Foreign-produced documentaries International documentaries showcased on The Passionate Eye include: Crumb — a profile of the satirical cartoonist Robert Crumb The Celluloid Closet — an investigation of Hollywood's treatment of homosexuals The Dying Rooms — an expose of the Chinese orphanages Russian Striptease — a stylistic look at sex and corruption in post-Perestroika Russia The Battle Over Citizen Kane — the impact of Citizen Kane between Orson Welles and William Randolph Hearst. Calling the Ghosts: A Story about Rape, War and Women — the personal journey of two Bosnian women, a lawyer and a judge, who were imprisoned during the civil war. In the Shadow of the Stars — behind-the-scenes look at the San Francisco Opera Company. For Better or For Worse (1993) — intimate portraits of five culturally-diverse couples who have been together for 50 years or longer. Fourteen Days in May — the last two weeks on death row with a man many believe to be innocent. Project Nim — the story of Nim Chimpsky, a chimpanzee who was the focus of a controvers
https://en.wikipedia.org/wiki/All%20About%20Eve%20%28South%20Korean%20TV%20series%29
All About Eve () is a 2000 South Korean television series starring Chae Rim and Kim So-yeon. The series focuses on two beautiful, young TV news reporters competing for the top position at the network they work for. It aired on MBC from April 26 to July 6, 2000, on Wednesdays and Thursdays at 21:55 (KST) for 20 episodes. Besides sharing a title and the premise of female rivalry, this drama has nothing to do with the 1950 film of the same name starring Bette Davis. Plot Jin Sun-mi (Chae Rim) is a lovely college student who lives with her upper-middle-class widowed father. She has a happy childhood with her best friend Kim Woo-jin (Han Jae-suk). Life changes radically for Sun-mi when her father decides to support Heo Young-mi (Kim So-yeon), a beautiful girl the same age as Sun-mi. Young-mi became an orphan when her father, an alcoholic who frequently abused her, dies in an accident while working for Mr. Jin's (Sun-mi's father) construction company. Young-mi has grown up in poverty, but she is not a humble person. She's arrogant, greedy and full of resentment. She initially becomes friends with Sun-mi, but eventually envies her for all she is and has, even Woo-jin's love. Young-mi becomes Sun-mi's rival in every aspect of her life. First, Young-mi steals Woo-jin from Sun-mi, then tries to take over her job at a very important TV network as they both dream to be famous news anchorwomen. She finally turns her eyes on Sun-mi's new boyfriend, Hyung-chul (Jang Dong-gun), one of the network's top executives, whom Sun-mi met during a trip to London. However, Hyung-chul's love for Sun-mi is stronger than Young-mi's estimation. Meanwhile, Woo-jin suffers of a broken heart as Young-mi makes his life miserable and finally dumps him so she can chase Hyung-chul, even though it hurts her just as much since she does not love him and is only after him for her career's sake. The climax of the plot comes when a former lover of Young-mi appears and threatens to reveal her deepest secret should she not return to him: a dark past as a prostitute. Since the gangster did not succeed in his attempts, he decides to kill Young-mi. Woo-jin dies while saving her life. However, all of Young-mi's treachery is exposed. Losing everything and heartbroken because of Woo-jin's death, she attempts to commit suicide, but her efforts are frustrated when she is found unconscious by a group of nuns on the shore of the Han River. When Young-mi wakes up, she suffers from amnesia and has lost almost all memories of her past. The drama ends with a happy reconciliation between Young-mi and Sun-mi, who cries beside Young-mi, forgiving her for the misunderstandings between them since they met. Finally, Hyung-chul swears eternal love and proposes to Sun-mi right in the middle of a street, asking her not to move to London. Cast Chae Rim as Jin Sun-mi Kim So-yeon as Heo Young-mi Jang Dong-gun as Yoon Hyung-chul Han Jae-suk as Kim Woo-jin Hyun Seok as Mr. Jin, Sun-mi's father Park Won-s
https://en.wikipedia.org/wiki/KSAS-TV
KSAS-TV (channel 24) is a television station in Wichita, Kansas, United States, affiliated with Fox and MyNetworkTV. It is owned by Sinclair Broadcast Group, which provides certain services to Hutchinson-licensed Dabl affiliate KMTW (channel 36) under a local marketing agreement (LMA) with Mercury Broadcasting Company. Both stations share studios on West Street in northwestern Wichita, while KSAS-TV's transmitter is located in rural northwestern Sedgwick County (east of Colwich). History The station first signed on the air on August 24, 1985; it was founded by a limited partnership known as Columbia-Kansas TV Ltd., which was restructured into Channel 24 Ltd. before it signed on. Originally operating as an independent station, channel 24 was the first such station licensed to Kansas as well as the first commercial television station to sign on in the Wichita market since KARD-TV (channel 3, now KSNW) debuted 30 years earlier in September 1955. The station became a charter affiliate of Fox when the network launched on October 9, 1986. However, like most Fox stations early on, it continued to program as a de facto independent for Fox's first eight years of existence. On April 3, 1988, KAAS-TV (channel 18) signed on in Salina as a full-time satellite of KSAS. The station later added repeaters in Western Kansas in 1995, with the launches of low-power stations KSAS-LP (channel 29) in Dodge City and KAAS-LP (channel 31) in Garden City. Channel 24 Ltd. filed for bankruptcy in the late 1980s, and was eventually bought out by Clear Channel Communications in August 1990. On June 27, 1997, Clear Channel Communications entered into a local marketing agreement with Goddard-based Three Feathers Communications, Inc. to form a new television station in Hutchinson, Kansas. Initially bearing the name KAWJ, the construction permit of the station took the KSCC ("Kansas Clear Channel", channel 36, now known as KMTW) call letters on October 9, 1998. An application was filled by Three Feathers on July 30, 1999 to sell the license of KSCC to Viacom's Paramount Stations Group, which was granted by the FCC on October 1 the same year. The station officially signed on January 5, 2001, with the station first launching on Cox Cable in August 2000, as a UPN owned-and-operated station. KSCC's license assets would later be sold to San Antonio-based Mercury Broadcasting Company prior to the station's official sign-on. In 1998, per the suggestion of then-program director Michael Hochman, KSAS changed its branding from "Fox 24" to "Fox Kansas," in order to help position KSAS and its satellites as a regional "network" along the lines of the other major stations in the market (such as the Kansas State Network, the Kansas Broadcasting System, and the KAKEland Television Network). Two years later, KBDK (channel 14, now KOCW) in Hoisington was added as another full-power satellite to serve Great Bend and Hays. The Wichita-Hutchinson market's four major network stations all require a
https://en.wikipedia.org/wiki/KMTW
KMTW (channel 36) is a television station licensed to Hutchinson, Kansas, United States, serving the Wichita area as an affiliate of the digital multicast network Dabl. It is owned by the Mercury Broadcasting Company, which maintains a local marketing agreement (LMA) with Sinclair Broadcast Group, owner of dual Fox/MyNetworkTV affiliate KSAS-TV (channel 24), for the provision of certain services. Both stations share studios on North West Street in northwestern Wichita, while KMTW's transmitter is located in rural southwestern Harvey County (on the town limits of Halstead). History On June 27, 1997, Clear Channel Communications (owner of Fox affiliate KSAS-TV (channel 24)) entered into a local marketing agreement with Goddard-based Three Feathers Communications, Inc. to form a new television station in Hutchinson, Kansas. Initially bearing the name KAWJ, the construction permit took the KSCC ("Kansas Clear Channel") call letters on October 9, 1998. On July 30, 1999, Three Feathers filed an application to sell the license of KSCC to Viacom's Paramount Stations Group, with the application being granted by the Federal Communications Commission (FCC) on October 1 the same year. The station first signed on the air on January 5, 2001 (the station first appeared on Cox Cable starting in August 2000) affiliating with UPN as an owned-and-operated station, a rarity for a market of Wichita's size. However, just prior to the station's sign-on, its license assets were sold to San Antonio–based Mercury Broadcasting Company. In June 2001, Mercury Broadcasting would take over ownership of KSCC. Prior to the station's sign-on, UPN programming was seen on a secondary basis on sister station KSAS-TV. In 2003, Clear Channel attempted to buy the station outright, but was denied a "failing station" waiver by the FCC. This special approval for the sale was necessary because the Wichita–Hutchinson designated market area has only seven "unique" full-power television stations. The full-power stations operating outside the immediate metropolitan area all operate as satellites of each of Wichita's four major network affiliates (KSNW (channel 3), KAKE (channel 10), KWCH-TV (channel 12) and KSAS-TV), and the FCC considers the parent and all of its satellites together as one station. That number of unique full-power stations is normally not enough to legally support a duopoly and Clear Channel did not attempt to find a buyer for KSCC that did not need a "failing station" waiver. On January 24, 2006, the Warner Bros. unit of Time Warner and CBS Corporation announced that the two companies would shut down The WB and UPN and combine the networks' respective programming to create a new network called The CW. On February 22, 2006, News Corporation announced the launch of a programming service called MyNetworkTV, which would be operated by Fox Television Stations and its syndication division Twentieth Television. MyNetworkTV was created to compete against The CW as well as to gi
https://en.wikipedia.org/wiki/Leederville%20railway%20station
Leederville railway station is a railway station on the Transperth network in Western Australia. It is located on the Joondalup line, 3.2 kilometres from Perth station serving the suburb of Leederville. History Leederville station opened on 20 December 1992 in the median strip of the Mitchell Freeway. In 2003, the contract for extending the platforms on seven Joondalup line stations, including Leederville station, was awarded to Lakis Constructions. The platforms on these stations had to be extended by to accommodate long six car trains, which were planned to enter service. Along with the extensions, the platform edges were upgraded to bring them into line with tactile paving standards. Leederville was the first station to begin being extended. Work at this station was completed by April 2004. In 2012 a double-ended turnback siding was opened between the tracks at the city side of the station, constructed as part of a $19.8m program to improve the resilience of the Transperth network during disruptions. Services Leederville station is served by Transperth Joondalup line services. Leederville station saw 937,581 passengers in the 2013–14 financial year. In March 2018, Leederville station had approximately 2,700 boardings on an average weekday, making it the fourth least used station on the Joondalup line. Platforms Platforms currently in use are as follows: Bus routes References External links Joondalup line Leederville, Western Australia Transperth railway stations Railway stations in Australia opened in 1992 Transperth railway stations in highway medians
https://en.wikipedia.org/wiki/Edgewater%20railway%20station
Edgewater railway station is a railway station on the Transperth network. It is located on the Joondalup line, 23 kilometres from Perth station serving the suburb of Edgewater. History Edgewater station opened on 20 December 1992 in the median strip of the Mitchell Freeway. In 2003, the contract for extending the platforms on seven Joondalup line stations, including Edgewater station, was awarded to Lakis Constructions. The platforms on these stations had to be extended by to accommodate long six car trains, which were planned to enter service. Along with the extensions, the platform edges were upgraded to bring them into line with tactile paving standards. Edgewater was the second station to begin being extended, with work commencing in December 2003. Work at this station was completed by April 2004. In 2010, a new canopy replaced the original. In 2015, construction commenced on a $26 million multi-level car park. The car park consists of three levels, with 75 CCTV cameras, 445 lights, 3 duress buttons, as well a facade screening covering half the building. The car park opened on 22 January 2017, increasing the station's total parking capacity to more than 1450 bays. Services Edgewater station is served by Transperth Joondalup line services. Edgewater station saw 530,906 passengers in the 2013–14 financial year. In March 2018, Edgewater station had approximately 2,100 boardings per weekday, making it the joint least busiest station on the Joondalup line, alongside Currambine. Platforms Platforms currently in use are as follows: References External links Joondalup line Transperth railway stations Railway stations in Australia opened in 1992 Transperth railway stations in highway medians
https://en.wikipedia.org/wiki/Joondalup%20railway%20station
Joondalup railway station is a railway station on the Transperth network. It is located on the Joondalup line, 26 kilometres from Perth station serving the regional metropolitan city of Joondalup. History Joondalup station opened on 20 December 1992 as the interim terminus of the Joondalup line. The line was extended to Currambine a year later in 1993. In 2003, the contract for extending the platforms on seven Joondalup line stations, including Joondalup station, was awarded to Lakis Constructions. The platforms on these stations had to be extended by to accommodate long six car trains, which were planned to enter service. Along with the extensions, the platform edges were upgraded to bring them into line with tactile paving standards. Work on this station was done in mid-2004. Services Joondalup station is served by Transperth Joondalup line services. Platforms Bus routes Joondalup station is served by the following Transperth bus routes, including the Central Area Transit (CAT) services which operate a free shuttle around the suburb on weekdays and selected public holidays. These routes are primarily operated by two electric buses in a special red livery, which entered service in February 2022 as the first fully electric buses for Transperth. In mid-2022, two more electric buses entered service in a normal green livery, operating fare-paying routes around the area. These buses are charged nightly at the Joondalup Bus Depot. Joondalup is also served by Transwa road coach services to Perth Coach Terminal and Geraldton. References External links Joondalup Joondalup line Transperth railway stations Railway stations in Australia opened in 1992 Transperth bus stations
https://en.wikipedia.org/wiki/New%20Hampshire%20PBS
New Hampshire PBS (NHPBS), known as New Hampshire Public Television (NHPTV) prior to October 1, 2017, is a Public Broadcasting Service (PBS) member network serving the U.S. state of New Hampshire. It is operated by New Hampshire Public Broadcasting (NHPB), a community-based organization which holds the licenses to all of the PBS member stations licensed in the state. Its studios are located just outside the University of New Hampshire campus in Durham. History On July 6, 1959, UNH signed on WENH-TV (VHF channel 11) as the first educational television station in New Hampshire and one of the first educational stations in New England outside Boston. In the late 1960s, several UHF satellite stations and translators signed-on in northern and western New Hampshire (see below). The operation was named the New Hampshire Network (NHN), adopting the New Hampshire Public Television name in 1976. In later years, NHPTV occasionally used its flagship station's channel number as its branding. Initially broadcasting in black-and-white, NHPTV converted its Durham studio to color in 1972, with an increase in the number of locally produced programs taking effect at that time. Among local shows launched in the early 1970s were The State We're In, a nightly newscast focusing on state issues; A Time for Music, live performances by New England–based musicians; live coverage of most University of New Hampshire men's hockey home games; and Your Time, where representatives of non-profit groups were given a half-hour of airtime to showcase their organizations. A Time for Music and Your Time (the latter later eventually renamed Public Access 11) stayed on the air for several years. The State We're In, later renamed Channel 11 News, went off the air in July 1981 as a result of steep budget cuts, which also forced NHPTV to shut down its satellite transmitters in Hanover and Berlin. After Channel 11 News was canceled, New Hampshire Journal, a lower-budget weekly news review was launched; that same year, a feature magazine series titled New Hampshire Crossroads premiered; its original host was Tom Bergeron. The latter series was allowed to go ahead despite the 1981 budget cuts because it had received funding from outside sources. Since the hockey telecasts were also funded by outside underwriters, they too were allowed to continue. UNH men's hockey remained on NHPTV until 2008. The winter of 1984 saw the premiere of NHPTV's long-running academic quiz show Granite State Challenge. Originally hosted by Bergeron, it is now hosted by Jim Jeanotte, who also did many years of play-by-play for NHPTV's UNH hockey coverage. On October 1, 2017, NHPTV rebranded as New Hampshire PBS (NHPBS). Programming Because New Hampshire is split between the Boston, Portland, Maine and Burlington, Vermont–Plattsburgh, New York viewing areas, nearly all NHPBS viewers also receive another PBS station on cable or satellite (in some cases more than one). For much of its history, NHPTV/NHPBS elected
https://en.wikipedia.org/wiki/Currambine%20railway%20station
Currambine railway station is a commuter rail station on the border of Currambine and Joondalup, north of Perth, Western Australia. It is on the Joondalup line, which is part of the Transperth network. Located in the median of the Mitchell Freeway, the station consists of an island platform connected to the east and west by an underpass. Constructed by Doubikin Constructions Pty Ltd at a cost of $2.8 million, Currambine station opened on 8 August 1993 as the final station from the original plan for the Joondalup line. The station was originally built on the western side of the Mitchell Freeway reserve to limit the distance between the car park and platform. It was decided to relocate the station to the east during the extension of the Joondalup line to Clarkson, so that the station would be in the median of the Mitchell Freeway. This was done to reduce the noise and vibration impact on houses near the railway line and for consistency with the rest of the Joondalup line and Mandurah line. Constructed by John Holland at a cost of $3.2 million, the relocated station opened on 4 October 2004. Currambine station is from Perth Underground station, with train journeys there taking 29 minutes. Train headways reach as low as five minutes during peak hour, with off peak services at 15 minute headways. Description Currambine railway station is in the median of the Mitchell Freeway along the Joondalup line. It is owned by the Public Transport Authority (PTA), a state government agency, and is part of the Transperth system. The station is on the border of Currambine and Joondalup, north of Perth, Western Australia. It is , or a 29-minute train journey, to Perth Underground station, placing the station in fare zone four. The next station to the north is Clarkson station and the next station to the south is Joondalup station. The station consists of two platform faces on a single island platform. The platform is long, or long enough for a Transperth six-car train – the longest trains used on the network. Stairs and a lift link the platform to a pedestrian underpass, which goes east and west of the station. On the western side is a 1,002-bay car park, a bike shelter, a motorbike shelter, and some toilets. Currambine is listed as an independent access station on the Transperth website as the platform can be accessed using lifts, the platform gap is small, and tactile paving is in place. Public art Along the top part of the walls of the stairwell is 10 Stations, 10 Weeks, 5.24pm, by Lyn Merrington. It consists of vertical strips of painted images of landscapes near each station from Perth to Clarkson along the Joondalup line. History Currambine station was part of the 1989 Northern Suburbs Transit System Master Plan. It called for a station at Burns Beach Road to be completed by the end of 1993, a year later than the rest of the line. The station was to be on the western side of the future Mitchell Freeway alignment, the only station on the line to be s
https://en.wikipedia.org/wiki/First%20International%20Telecom
First International Telecom (FITEL; ) was a mobile phone operator in Taiwan. Launched in April 1997 as a paging company, FITEL expanded in May 2001 by launching a PHS network. It declared bankruptcy in 2014. See also List of companies of Taiwan References Mobile phone companies of Taiwan Bankrupt mobile phone companies Telecommunications companies established in 1997 Defunct companies of Taiwan 1997 establishments in Taiwan 2014 disestablishments in Taiwan
https://en.wikipedia.org/wiki/MySQL%20Connector/ODBC
MySQL Connector/ODBC, once known as MyODBC, is computer software from Oracle Corporation. It is an ODBC interface and allows programming languages that support the ODBC interface to communicate with a MySQL database. MySQL Connector/ODBC was originally created by MySQL AB. History 3.51 - ANSI version only. 5.1 - Unicode version only. Suitable for use with any MySQL server version since MySQL 4.1, including MySQL 5.0, 5.1, and 6.0. 5.2 - ANSI and Unicode versions available at install time. 5.3 - ANSI and Unicode versions available at install time. Conforms to the ODBC 3.8 specification. External links Download Connector/ODBC 'MySQL Connector/ODBC Developer Guide' – main manual Data access technologies Application programming interfaces
https://en.wikipedia.org/wiki/Functional%20requirement
In software engineering and systems engineering, a functional requirement defines a function of a system or its component, where a function is described as a summary (or specification or statement) of behavior between inputs and outputs. Functional requirements may involve calculations, technical details, data manipulation and processing, and other specific functionality that define what a system is supposed to accomplish. Behavioral requirements describe all the cases where the system uses the functional requirements, these are captured in use cases. Functional requirements are supported by non-functional requirements (also known as "quality requirements"), which impose constraints on the design or implementation (such as performance requirements, security, or reliability). Generally, functional requirements are expressed in the form "system must do <requirement>," while non-functional requirements take the form "system shall be <requirement>." The plan for implementing functional requirements is detailed in the system design, whereas non-functional requirements are detailed in the system architecture. As defined in requirements engineering, functional requirements specify particular results of a system. This should be contrasted with non-functional requirements, which specify overall characteristics such as cost and reliability. Functional requirements drive the application architecture of a system, while non-functional requirements drive the technical architecture of a system. In some cases a requirements analyst generates use cases after gathering and validating a set of functional requirements. The hierarchy of functional requirements collection and change, broadly speaking, is: user/stakeholder request → analyze → use case → incorporate. Stakeholders make a request; systems engineers attempt to discuss, observe, and understand the aspects of the requirement; use cases, entity relationship diagrams, and other models are built to validate the requirement; and, if documented and approved, the requirement is implemented/incorporated. Each use case illustrates behavioral scenarios through one or more functional requirements. Often, though, an analyst will begin by eliciting a set of use cases, from which the analyst can derive the functional requirements that must be implemented to allow a user to perform each use case. Process A typical functional requirement will contain a unique name and number, a brief summary, and a rationale. This information is used to help the reader understand why the requirement is needed, and to track the requirement through the development of the system. The crux of the requirement is the description of the required behavior, which must be clear and readable. The described behavior may come from organizational or business rules, or it may be discovered through elicitation sessions with users, stakeholders, and other experts within the organization. Many requirements may be uncovered during the use case develo
https://en.wikipedia.org/wiki/Source%20document
A source document is a document in which data collected for a clinical trial is first recorded. This data is usually later entered in the case report form. The International Conference on Harmonisation of Technical Requirements for Registration of Pharmaceuticals for Human Use (ICH-GCP) guidelines define source documents as "original documents, data, and records." Source documents contain source data, which is defined as "all information in original records and certified copies of original records of clinical findings, observations, or other activities in a clinical trial necessary for the reconstruction and evaluation of the trial." The Food and Drug Administration (FDA) does not define the term "source document". Examples of source documents Hospital records Clinical and office charts Laboratory notes Memorandum Cash memo Debit note, Credit note Pay in slip Subjects' diaries or evaluation checklists Pharmacy dispensing records Recorded data from automated instruments Copies or transcriptions certified after verification as being accurate copies Microfiches Photographic negatives, microfilm or magnetic media X-rays Subject files Records kept at the pharmacy, at the laboratories and at medico-technical departments involved in the clinical trial References Clinical research Pharmaceutical industry Clinical data management
https://en.wikipedia.org/wiki/Aquila%2C%20Inc.
Aquila, Inc. was an electricity and natural gas distribution network headquartered in Kansas City, Missouri in the United States. The company also owned and operated power generation assets. It previously operated under the name UtiliCorp United, Inc. The company at one time ranked #33 on the Fortune 500 list. On February 6, 2007, the company announced plans for a merger valued at $1.7 billion to become a wholly owned subsidiary of Great Plains Energy. In conjunction with the merger Black Hills Corporation is to acquire its Colorado electric utility and the Colorado, Iowa, Kansas, and Nebraska gas utilities for $940 million. The merger closed on July 14, 2008, and Aquila now operates under the name Black Hills Energy. History Solomon Valley Milling Company Aquila has its roots in the Solomon Valley Milling Company founded in 1902 by Lemuel K. Green in Osborne, Kansas. The steam mill used to process flour and Green discovered he could sell electricity. In 1908 sold the mill and bought the H. M. Spalding Electric Light Plant in Concordia, Kansas. Prior to Green's purchase the plant generated power only dawn to midnight and was closed on Sundays. Green bought power from another flour mill and began selling power to neighboring towns. Green Power & Light Company In 1916 he sold the plant to the A.E. Fitkin & Company in New York City for $550,000. He then bought the Reeder Light, Ice & Fuel Company in Pleasant Hill, Missouri and renamed the company Green Power & Light Company. He then built Baldwin Lake which was used for hydroelectric power as well as provide water for the community. West Missouri Power Company In 1922 looking to expand with a generating plant at Clinton, Missouri he took the company public under the name West Missouri Power Company. Its chief rival in the Kansas City metropolitan area was Kansas City Power & Light. The company continued to expand through southwest Missouri. Missouri Public Service Company In 1926 he sold it to the Fitkin Group again which merged with the Missouri Public Service Company. Green retired to Escondido, California where bought a orange grove. He died in 1930. The Public Utilities Act of 1935 broke up utilities. Green's son Ralph Green bought controlling interest in Missouri Public Service. Green was to bring in Middle West Corporation, Missouri Gas & Electric Service Company and City Light and Traction Company of Sedalia, Missouri. UtiliCorp United Inc. Ralph Green died in 1962 and his son Richard Green took the helm. Richard Green, Jr. took over in 1982. The latest Green looked to expand it beyond its Missouri base and it was renamed UtiliCorp United Inc. in 1985. It bought People's Natural Gas, Northern Minnesota Utilities, West Virginia Power, West Kootenay Power and Light in British Columbia, and Michigan Gas Utilities. In 1989 it assigned its unregulated gas operations to a newly created subsidiary, Aquila Energy Corp. The acquisitions were done by issuing stock and reducing G
https://en.wikipedia.org/wiki/Gunparade%20March
is a Japanese video game. The video game, , was released on 28 September 2000, for the PlayStation. It was developed by Alfa System and published by Sony Computer Entertainment. A manga adaptation by Hiroyuki Sanadura was serialized in the magazine Dengeki Daioh. The three volumes published by MediaWorks between 2001 and 2003 were translated by ADV Manga between 2004 and 2005. An anime television series adaptation titled was animated by J.C.Staff and aired on MBS from 6 February 2003 to 23 April 2003. It is licensed for distribution in the United States by Media Blasters as simply "Gunparade March". A spin-off, , was animated by Brain's Base and aired from 5 October 2005 to 29 March 2006. A trilogy of games, the Gunparade Orchestra Trilogy, were released for PlayStation 2 in 2006. Plot In 1945, World War II was abruptly ended when an alien race appeared on Earth and began to slaughter the human population. This alien force, known as the "Phantom Beasts" (or Genjyu in Japanese) had effectively taken over more than half of the Earth. The year is 1999 – 54 years later, mankind is still fighting to survive against the alien forces. Earth forces now use advanced mecha called Humanoid Walking Tanks (HWTs) to combat the invaders, but throughout the ordeal, far too many pilots have been killed in action. To ensure the future of the human race, the Japanese government enforced a student draft which recruited high school students to become HWT pilots. Gunparade March follows the lives of the 5121st Platoon, which consists mainly of drafted high school students and their struggle to defeat the Phantom Beasts and at the same time, lead a normal social life. Characters Atsushi is the main protagonists of the story and an HWT pilot. Hayami is probably one of the most shy and naive characters in Gunparade March. His personality renders him to be dubbed a "goof" among his colleagues and become somewhat an interest for several of the female characters. When he meets Mai, he develops an interest for her and gradually becomes infatuated with her. However, his timidity prevents him from admitting his true feelings and publicly, he considers her as a "good partner on the job". As an HWT pilot, his attributes are quite balanced and this caused him to be teamed with Mai for piloting the two-seater "Tandem" HWT. However, Hayami tends to be nervous during battles and has the habit of messing up. He also seems to be well aware of the concept that the Genjyu feed upon Human's fear and hatred for them which causes them to attack. This is shown when he elaborates a fairy tale (it is speculated that a fairy tale can bring one's childhood innocence back which eliminates most of one's hatred and fear) aloud while carrying Mai to a safe area when they were stranded in a forest full of Genjyu and the Genjyu were rendered motionless. Later on, the whole platoon tried to pair Mai and Hayami up by setting false tasks and trying to trap them into admitting each others true
https://en.wikipedia.org/wiki/Geneva%20%28typeface%29
Geneva is a neo-grotesque or "industrial" sans-serif typeface designed by Susan Kare for Apple Computer. It is one of the oldest fonts shipped with Macintosh operating systems. The original version was a bitmap font, but later versions were converted to TrueType when that technology became available on the Macintosh platform. Because this Macintosh font is not commonly available on other platforms, many users find Verdana, Microsoft Sans Serif or Arial to be an acceptable substitute. Geneva was originally a redesigned version of the famous Linotype typeface Helvetica; the TrueType version of the font is somewhat different. Helvetica is named after the Latin name for Switzerland, home country of its original designer Max Miedinger; Geneva is Switzerland's second-largest city. The bitmap version varied by appearance in different sizes; in smaller sizes, the lowercase i, j and l had serifs on the top, the lowercase y was parallel, the centre vertex of the uppercase M was much higher, and the 3 had a flat top. Larger sizes of the font depicted said characters as they appear in the TrueType version. From Mac OS 8.5 onwards, the bitmap version removed said serifs from the lowercase i, j and l and the lowercase y became angled like in the TrueType version, but the 3 kept the flat top. The bitmap designs are still available on newer versions of the Terminal app. Unusually for neo-grotesque faces, later versions of Geneva include a basic set of ligatures and the archaic long s and R rotunda as alternates. A slightly modified version of Geneva, called Simple, was included in the Apple Newton operating system. Osaka, a default Japanese gothic typeface for Mac OS, also derived from Geneva typeface. References Notes on 4 Apple Fonts – a description of the design of the TrueType versions of Chicago, New York, Geneva and Monaco. Apple Inc. typefaces Grotesque sans-serif typefaces Typefaces and fonts introduced in 1984 Neo-grotesque sans-serif typefaces Typefaces designed by Susan Kare
https://en.wikipedia.org/wiki/ReGenesis
ReGenesis is a Canadian science-fiction television series produced by The Movie Network and Movie Central in conjunction with Shaftesbury Films. The series, which run for four seasons from 2004 to 2008, revolves around the scientists of NorBAC (North American Biotechnology Advisory Commission), a fictional organization with a lab based in the city of Toronto. The organization investigates problems of a scientific nature, such as bioterrorism, mysterious diseases, or radical changes in the environment throughout Canada, the United States, and Mexico. NorBAC is headed by David Sandström (played by Peter Outerbridge), the chief scientist, and molecular biologist. Through this character, the show often addresses topical social, political, and ethical issues related to the science at hand. The series was originally broadcast on The Movie Network and Movie Central, with rebroadcasts on Global and Showcase in Canada. Internationally it can be seen on FX in the United Kingdom, The Science Channel, Halogen TV and in syndication at CW Plus in the United States, and FX Latin America in Mexico; as well as numerous broadcasters in Europe and Asia. International distribution is handled by Oasis International. , the show can also be seen on Hulu. , ReGenesis is available on The Roku Channel. Aled Edwards, the scientific consultant for the series, is a noted Canadian molecular biologist, and the director of the Structural Genomics Consortium. Interactive and other media ReGenesis has been an international pioneer in integrating interactive media elements into the series. The first successfully deployed alternate reality game paired with a major television broadcast is called the ReGenesis Extended Reality and was created by Xenophile Media in association with Shaftesbury Films. It won the Canadian New Media Award for Best Cross-Platform project of 2004 and an FITC Design & Technology Award for Excellence in Convergence. In 2006 the alternate reality game won the Banff World Television Festival Award for Interactive Television, a Gemini Award for Best Cross-Platform, and in 2007, an International Emmy for Outstanding Interactive Program. An exploratory game, the ReGenesis Extended Reality draws viewers into a conspiracy and mystery that weaves in and out of the TV series, using the internet, email and other media to immerse the viewer, blurring the line between fiction and reality. ReGenesis Extended Reality harnesses the power of enthusiastic fans that seed the site with discussion content and collaborative investigations. Extensive knowledge of various chemistry and biotechnology issues is required to find out why the plot in many episodes can't be true (if it can't). Other interactive elements include ReGenesis:ReMixed, a 14-episode series of podcasts hosted by series Music Supervisor Andrea Higgins and produced by Arpix Media, featuring the music of ReGenesis, as well as exclusive interviews with some of the people involved in putting the show together.
https://en.wikipedia.org/wiki/Gas%20flow%20computer
Originally the gas flow computer was a mechanical (1920s technology) or later a pneumatic or hydraulic computing module (1940s technology used to the early 1990s but still available from a number of suppliers), subsequently superseded in most applications by an electronic module, as the primary elements switched from transmitting the measured variables from pneumatic or hydraulic pressure signals to electric current as explosion-proof (1960s technology to present)) and then intrinsically safe (1970s to present) transmitters (with low-power transistor circuitry) became available, that simply provided a dedicated gas flow computer function. Today "gas flow computers" as such have become uncommon, since gas flow computing is a subfunction of a data acquisition and control program implemented with programmable logic controller (PLCs) and remote terminal unit (RTUs); with the rise of smart transmitters in the early 1980s, these functions have also been incorporated within the field transmitters themselves. The "gas flow computer" senses a mixed "dry" gas stream flow rate plus gas temperature and pressure. The most common method of measuring gas flow is via differential pressure across an orifice plate inserted into a flow metering pipe. As the differential pressure is not directly proportional to the gas flow rate, a flow computer algorithm is required to convert the differential pressure reading into a flow rate (may include square root extraction to linearize the input). Since gas is compressible and affected by temperature, the gas temperature and pressure must also be monitored and compared to a specified standard temperature and pressure within the algorithm. This is referred to as volumetric flow measurement. Next we need to calculate mass flow AGA3 based upon the specific gravity of the gas. Since a natural gas stream contains a mix of various hydrocarbon gases of different specific gravities, mole percentages must be determined via a gas sample analysis. The mixed gas stream will also contain some inert gases such as nitrogen and carbon dioxide. Therefore the gas flow computer also requires the entry of mole percentages for each gas component. Based on accurate mass flow calculations it becomes possible, based upon the energy content of each gas component, to calculate energy flow, i.e., API 14.5 (GPA 2172) since each gas component contains different energy content. These values in joules (or calories or Btus) are typically built into the gas flow computer algorithm. Therefore energy flow metering is our ultimate goal since this is where the true value is for the client. Also these mineral reserves are taxed based upon energy content. The inert gases such as nitrogen have no value. (Some inert gases actually have negative value, most notably carbon dioxide and hydrogen sulphide, as they require extra equipment to remove from the natural gas, and costs are incurred in their disposal.) Other input parameters include contract hour as well
https://en.wikipedia.org/wiki/Mobile%20Magazine
Mobile Magazine is an online publication which started in December 2000. The magazine covers mobile technology, including notebook computers, mobile phones, personal digital assistants, MP3 players, digital cameras, mobile gaming, and other portable electronics and computing devices as well as automotive technology. Information Mobile Magazine is a registered trademark with the USPTO and CIPO, in the USA and Canada respectively, and owned by Navneet Narula. In June 2005, "Mobile PC" published by Future Network USA changed their name to "Mobile". A cease and desist order on the use of the confusingly similar magazine name and website domain MobileMagazine.com was sent to Future Network USA. The print publication "Mobile" ceased publication as of November 2005 due to undetermined reasons and the domain name MobileMagazine.com was transferred to Pilato Private Consulting. Outstanding subscriptions to Mobile PC were fulfilled by subscriptions to Maximum PC, a sister technical magazine. References External links Official Website Mobile Phone Repair Technology blogs Magazines established in 2000 Magazines disestablished in 2005 Online magazines with defunct print editions Online magazines published in the United States Science and technology magazines published in the United States Defunct magazines published in the United States
https://en.wikipedia.org/wiki/Texas%20state%20highway%20system
Texas state highways are a network of highways owned and maintained by the U.S. state of Texas. The Texas Department of Transportation (TxDOT) is the state agency responsible for the day-to-day operations and maintenance of the system. Texas has the largest state highway system, followed closely by North Carolina's state highway system. In addition to the nationally numbered Interstate Highways and U.S. Highways, the highway system consists of a main network of state highways, loops, spurs, and beltways that provide local access to the other highways. The system also includes a large network of farm to market roads that connect rural areas of the state with urban areas and the rest of the state highway system. The state also owns and maintains some park and recreational roads located near and within state and national parks, as well as recreational areas. All state highways, regardless of classification, are paved roads. The Old San Antonio Road, also known as the El Camino Real, is the oldest highway in the United States, first being blazed in 1691. The length of the highways varies from US 83's inside the state borders to Spur 200 at just long. History The Texas State Highway System can trace its roots to the establishment of the Texas Highway Department on April 4, 1917. Administrative control of the department was given to a three-member commission appointed by the governor for two-year terms. On June 21, 1917, the commission conducted its first public hearing to solicit input on potential highway routes. The committee also divided the state into six divisions to be headquartered in Amarillo, Dallas, Fort Worth, Houston, San Angelo, and San Antonio. Later that year, the commission designated 26 state highways covering which were to be readily accessible to 89% of the state's population. In 1921, Congress amended the Federal Aid to Roads Act of 1916 to require the states to take control of road design, construction, and maintenance of state highways by 1925. As a result, on January 1, 1924, the Texas Highway Department took full control of maintaining the state highways from the counties within which they resided. In 1925, the state legislature granted the highway department the responsibility of surveying, planning, and building highways, and the authorization to acquire new highway rights-of-way by purchasing, or condemning through eminent domain, land required for highway construction. By 1927, the highway system covered , of which were concrete, were asphalt, were gravel, shell or stone, and were clay or soil. In 1951, a section of the Gulf Freeway (now I-45) opened, becoming Texas' first urban freeway. In 1957, the state began receiving federal funding for the construction of the Interstate Highway System. The first section of Interstate Highway from county line to county line to open in the state was a section of I-35 in Bexar County. By 1967, the highway system controlled of highway. In 1984, US 66 was replaced by I-40 a
https://en.wikipedia.org/wiki/MacTech
MacTech is a monthly magazine for consultants, IT Pros, system administrators, software developers, and other technical users of the Apple Macintosh line of computers. The magazine was called "MacTech" for its first two issues, starting in 1984, after which its name was changed to MacTutor. At the time the magazine defined itself as "a technical publication devoted to advancing programming knowledge of the Macintosh for both hacker and professional alike". In the spring of 1989 a new and separate magazine called MacTech was launched by TechAlliance, a global Apple users group headquartered in Renton, WA that hosted the Apple Programmers and Developers Association (APDA). The founding editor of MacTech was Andrew Himes, and Himes described the magazine as "The journal designed by people who program and develop for the Apple Macintosh. You hold in your hands what is designed to be a legendary publication for a legendary computer. In these wee, early hours of the computer revolution, just a scant half decade after the introduction of Apple's flagship computer, the world needs a magazine that focuses on the needs of the Mac developer community with the intensity, vision, and utility of no other existing publication. Nuts-and-bolts programming solutions and tutorials. In-depth looks at future technologies and present opportunities. An emphasis on both object-oriented and proceduarl languages, on database programming and spreadsheet macros, on HyperTalking and multimedia applications. Feature articles, tutorials, reviews, and commentary by some of the most important, creative, and eloquent programmers in the Macintosh universe. MacTech will be preeminently useful and intellectually provocative. An essential desktop reference for today's serious programmers, as well as a tool that will help pave your way to the future of programming." In 1993, MacTutor Magazine purchased MacTech, and the name of the consolidated publication became MacTech. In 2010, MacTech launched its event series -- first with MacTech Conference, then MacTech Boot Camp and then MacTech InDepth. 2010 had a single event, 2011 had seven events, and 2012 has fifteen events. MacTech.com also provides a news aggregator service. The magazine is privately owned, held by Xplain Corporation. On June 5, 2008, MacTech announced it would act as caretaker to the archives of MacMinute News and Forums. At these forums, Stan's Lounge is crowded with MacMinute and MacCentral faithful in honor of Stan Flack's contributions to the Macintosh community. On November 6, 2009, MacTech announced that it was acquiring MacMod, a community site dedicated to modding Apple hardware and software. As part of the acquisition, the MacMod forums have been integrated into MacTech's, and MacTech now has a podcast dedicated to Mac technical topics as well as industry news, event coverage, and interviews. References External links MacTech Live podcast Xplain Corporation Archived MacTech magazines on the Inte
https://en.wikipedia.org/wiki/Idaho%20Public%20Television
Idaho Public Television (also known as IdahoPTV and Idaho Public TV) is a Public Broadcasting Service (PBS) member network serving the U.S. state of Idaho. Consisting of five television stations, it is operated and funded by the Idaho State Board of Education, an agency of the Idaho state government that holds the licenses to all PBS member stations in the state. The network is headquartered in Boise, with satellite studios at the University of Idaho in Moscow and Idaho State University in Pocatello. Funding for Idaho Public Television comes from three major sources. Approximately 65% of funding comes from private contributions and an annual grant from the Corporation for Public Broadcasting. 31% is provided by the State of Idaho. 4% is provided by the Federal Government. Broadcast and online programs produced by Idaho Public Television include Outdoor Idaho, Idaho Reports, Idaho Experience, Dialogue, Idaho in Session, Science Trek and The 180 with Marcia Franklin. History The network's first station, KUID-TV, signed on from the University of Idaho campus in September 1965. KBGL-TV signed on in July 1971 from Idaho State University in Pocatello, followed that December by KAID-TV in Boise, licensed to Boise State University. After a decade, KBGL changed its call letters to KISU-TV in 1981. The three stations shared many programs, but were largely operated independently at first. However, in 1981, two KUID-produced documentaries—one about logging practices, another about lead exposure—caused such an outcry that the state legislature yanked nearly all funding for public television. Citing budget restrictions in early 1981, the state legislature cut 90% of the state funding for public television, and the stations relied on federal funding and private donations. A year later, the legislature ordered the merger of the three stations into a single network. The licenses for all three stations were transferred to the state board of education. Two other stations were added in 1992 at Coeur d'Alene and Twin Falls, the respective cities of North Idaho College and the College of Southern Idaho. In 2001, Idaho PTV began broadcasting its HD channel, KAID HD, using the default PBS HD schedule. Once the digital switchover had occurred in July 2009 and after a two-year acclimation process, the main HD channel became the home of the regular IdahoPTV schedule in August 2011, and the second standard definition channel was converted from the regular IdahoPTV schedule into a "Plus" subchannel, featuring an alternate schedule of programming. Stations Combined, the five stations and their extensive translator network reach almost all of Idaho, as well as parts of Washington, Montana, and Oregon. The north Idaho stations of Coeur d'Alene and Moscow are in the Pacific Time Zone, while the south Idaho stations of Boise, Twin Falls, and Pocatello are in the Mountain Time Zone. Notes: 1. Aside from their transmitters, KCDT and KIPT do not maintain any physical presence
https://en.wikipedia.org/wiki/Graybar
Graybar Electric Company, Inc. is an American wholesale electrical, communications and data networking products distribution business, which also supplies related supply-chain management and logistics services. Based in Clayton, Missouri, the employee-owned corporation is included on the Fortune 500 list of the largest United States corporations. Graybar was incorporated on December 11, 1925, as the successor company of the general electric supply business of the Western Electric Company, which was founded in 1869 in Cleveland, Ohio, by Elisha Gray and Enos M. Barton. The separation of product lines was intended to provide a separate identity from the telephone supply function of Western Electric to the Bell System, given its importance as the largest merchandiser of electrical apparatus and related equipment in the world in the 1920s. History Early history During the post-Civil War Reconstruction Era, entrepreneur Enos M. Barton (who had served as a telegrapher during the war) worked for Western Union in Rochester, New York. During this period, Barton met George Shawk, the foreman of the company's Cleveland, Ohio shop. When that shop was closed down, Shawk bought some of the equipment and went into business for himself, making various kinds of electrical and other apparatus, including inventor's models. While on a trip to Rochester, he and Barton, who was then 26, agreed to go into partnership. To raise the $400 her son needed for his share of the business venture, Barton's widowed mother mortgaged her home. The new firm, located at 93 St. Clair Street in Cleveland, grew. In May 1869, Elisha Gray, an Oberlin College professor and inventor of telegraphic equipment, bought out Shawk's interest. Up until then, Gray had been one of the firm's top customers. He had invented a needle annunciator for hotels and elevators, a telautograph (a machine for the electrical transmission of writing), and the telegraph answer-back call box. Gray and Barton joined forces with an investment of $2,500 each, with Gray as the senior partner. The success of the new company attracted the attention of General Anson Stager, general superintendent of the Western Union Telegraph Company. He offered to enter the business as an equal partner with Gray and Barton, providing the company's headquarters was moved from Cleveland to Chicago, Illinois. In December 1869, the company moved to 162 S. Water Street, Chicago. The great Great Chicago Fire in 1871 came within two blocks of its small plant. The destruction caused by the fire resulted in greater growth for Gray & Barton, as the company sold fire alarms and helped rebuild the Western Union infrastructure in the city. Incorporation as Western Electric After several relocations, all in Chicago, the business was incorporated as the Western Electric Manufacturing Company in 1872 to meet the capital requirements of the telegraph supply business. The new company so closely allied with the elder Western that three of its f
https://en.wikipedia.org/wiki/Hacking%3A%20The%20Art%20of%20Exploitation
Hacking: The Art of Exploitation () is a book by Jon "Smibbs" Erickson about computer security and network security. It was published by No Starch Press in 2003, with a second edition in 2008. All of the examples in the book were developed, compiled, and tested on Gentoo Linux. The book also comes with a CD that contains a Linux environment with all the tools and examples used in the book. Author and background information Jon Erickson worked in the field of computer security with a background in computer science. As of 2011, he worked as a vulnerability researcher and computer security specialist in California. A bootable CD is included with the book which provides a Linux-based programming and debugging environment for the users. Content of 1st edition The content of Exploiting moves between programming, networking, and cryptography. The book does not use any notable measure of real-world examples; discussions rarely bring up specific worms and exploits. Programming The computer programming portion of Hacking takes up over half of the book. This section goes into the development, design, construction, and testing of exploit code, and thus involves some basic assembly programming. The demonstrated attacks range from simple buffer overflows on the stack to complex techniques involving overwriting the Global Offset Table. While Erickson discusses countermeasures such as a non-executable stack and how to evade them with return-to-libc attacks, he does not dive into deeper matters without known guaranteed exploits such as address space layout randomization. The book also does not cover the Openwall, GrSecurity, and PaX projects, or kernel exploits. Networking The networking segment of Hacking explains the basics of the OSI model and basic networking concepts, including packet sniffing, connection hijacking, denial of service, and port scanning.The networking segment of Hacking explains the basics of the OSI model and basic networking concepts, including packet sniffing, connection hijacking, denial of service, and port scanning.The networking segment of Hacking explains the basics of the OSI model and basic networking concepts, including packet sniffing, connection hijacking, denial of service, and port scanning.The networking segment of Hacking explains the basics of the OSI model and basic networking concepts, including packet sniffing, connection hijacking, denial of service, and port scanning.The networking segment of Hacking explains the basics of the OSI model and basic networking concepts, including packet sniffing, connection hijacking, denial of service, and port scanning.The networking segment of Hacking explains the basics of the OSI model and basic networking concepts, including packet sniffing, connection hijacking, denial of service, and port scanning.The networking segment of Hacking explains the basics of the OSI model and basic networking concepts, including packet sniffing, connection hijacking, denial of service, and port
https://en.wikipedia.org/wiki/Frederick%20Noronha
Frederick Noronha (born 23 December 1963) is a journalist based in Saligão, Goa. He is active in cyberspace and involved with e-ventures related to Goa, developmental concerns, and free software. Noronha primarily writes about free software/open-source issues, technology, and computing in India. He is the co-founder of BytesForAll and the founder of Goa 1556, an alternate publishing house. Education Frederick Noronha received a B.Com. degree from Dempo College of Commerce and Economics, Panjim, and M.A. (English Literature) degrees from Goa University and University of Bombay. In 2021 he took a Ph.D. in English, focusing on publishing in twentieth-century Goa, via Goa University's Department of English (under Prof. Andre Rafael Fernandes). Noronha is also an alumnus of the Internationales Institut für Journalismus (G57 course, 1990). He received a scholarship from the Institute for Further Education of Journalists (Fojo), Sweden (1998) and was a Sarai Print Media Fellow (2001). He was a Panos Fellow in 2001 (focusing on reproductive health and gender issues). Journalism He has been a full-time journalist since 1983. From November 1987 to December 1994, Noronha was staff correspondent for Deccan Herald. From 1994 onwards, he turned a freelancer, and has written for India Abroad News Service (now Indo-Asian News Service), on news related to Goa and, more recently, Information Technology. He also worked as an editorial consultant with Herald (Goa) from October 2003 to April 2004. He has written articles on Goa, Goan books, media, environment, development, and information technology. From 1996 to 2006, he has been part of the Admin Team of Goanet, a volunteer and not-for-profit network that links the Goan diaspora community. Publications that have featured Noronha's works include The Economic Times, The Financial Express, Spider Internet Magazine (Pakistan), Associated Press (photographs), Dawn, the BBC website and Outlook. Noronha is a Wikipedia editor, particularly active on Konkani Wikipedia, and was named English Wikipedia's Editor of the Week in March 2020. Online ventures Together with Partha Pratim Sarkar of Bangladesh, Noronha co-founded BytesForAll. He is a supporter of copyleft-based models for sharing digital information and resources, with some 6000+ photographs, mainly related to Goa, available on his Flickr page. Involvement with FOSS movement Noronha is a supporter of free software, and is actively involved in chronicling its growth in India and other Asian countries. His articles on Free Software have been published in Linux Journal and Free Software Magazine. He has also participated in a study on FLOSS in the 'developing' countries (2003–04) in Finland. He has been a member of the panel deciding on the FSF Award for the Advancement of Free Software and The Manthan-AIF Award 2006. He has also spoken at many FOSS conferences, including FOSS.IN in 2006. Goa 1556 On 20 June 2007, Noronha founded the alternate publishing hous
https://en.wikipedia.org/wiki/Richard%20Lewis
Richard, Rich, Richie, Rick, Ricky or Dick Lewis may refer to: Arts and entertainment Richard Field Lewis Jr. (1907–1957), American radio network owner Dick "Rocko" Lewis (Richard Henry Lewis III, 1908–1966), American entertainer Richard Lewis (tenor) (1914–1990), Welsh singer R. W. B. Lewis (Richard Warrington Baldwin Lewis, 1917–2002), American literary scholar and critic Richard Lewis (comedian) (born 1947), American comedian and actor Richard B. Lewis (born 1953), American film producer Rick Lewis (radio personality) (1960–2001), American radio announcer Richard Lewis (journalist) (born 1984), British esports journalist and commentator Richard J. Lewis (fl. 21st century), Canadian film director Law and politics Richard Lewis (English MP) (1627–1706), English landowner and politician Richard Lewis (Canadian politician) (1824–1875), mayor of Victoria, British Columbia Dick Lewis (politician) (1900–1966), Welsh politician active in England Richard Lewis (Australian politician) (1939-2019), Australian politician Richard Lewis (New Zealand politician) (born 1969), New Zealand politician Rick Lewis (politician), American politician; member of the Oregon House of Representatives Religion Richard Lewis (bishop of Llandaff) (1821–1905), British religious leader Richard Lewis (priest) (1935–2022), English priest; Dean of Wells Richard Lewis (bishop of St Edmundsbury and Ipswich) (1943–2020), British religious leader Sports Richard Lewis (Middlesex cricketer) (1874–1917), English cricketer Richard Lewis (cricketer, born 1947), English cricketer Richard Lewis (tennis and rugby league) (born 1954), British tennis player and sports administrator Richie Lewis (born 1966), American baseball player Ricky Lewis (born 1982), American soccer player Others Dic Penderyn (born Richard Lewis, 1808–1831), Welsh criminal defendant Richard Lewis (Royal Lifeboat) (born c.1822), Welsh secretary of the Royal National Lifeboat Institution Richard D. Lewis (born 1930), British linguist Rick Lewis (journalist) (fl. 1990s), British journalist Richard Lewis (police officer) (fl. 21st century), British chief constable See also Richard Louis (born 1964), sprinter
https://en.wikipedia.org/wiki/Giant%20component
In network theory, a giant component is a connected component of a given random graph that contains a significant fraction of the entire graph's vertices. More precisely, in graphs drawn randomly from a probability distribution over arbitrarily large graphs, a giant component is a connected component whose fraction of the overall number of vertices is bounded away from zero. In sufficiently dense graphs distributed according to the Erdős–Rényi model, a giant component exists with high probability. Giant component in Erdős–Rényi model Giant components are a prominent feature of the Erdős–Rényi model (ER) of random graphs, in which each possible edge connecting pairs of a given set of vertices is present, independently of the other edges, with probability . In this model, if for any constant , then with high probability (in the limit as goes to infinity) all connected components of the graph have size , and there is no giant component. However, for there is with high probability a single giant component, with all other components having size . For , intermediate between these two possibilities, the number of vertices in the largest component of the graph, is with high probability proportional to . Giant component is also important in percolation theory. When a fraction of nodes, , is removed randomly from an ER network of degree , there exists a critical threshold, . Above there exists a giant component (largest cluster) of size, . fulfills, . For the solution of this equation is , i.e., there is no giant component. At , the distribution of cluster sizes behaves as a power law, ~ which is a feature of phase transition. Alternatively, if one adds randomly selected edges one at a time, starting with an empty graph, then it is not until approximately edges have been added that the graph contains a large component, and soon after that the component becomes giant. More precisely, when edges have been added, for values of close to but larger than , the size of the giant component is approximately . However, according to the coupon collector's problem, edges are needed in order to have high probability that the whole random graph is connected. Graphs with arbitrary degree distributions A similar sharp threshold between parameters that lead to graphs with all components small and parameters that lead to a giant component also occurs in random graphs with non-uniform degree distributions. The degree distribution does not define a graph uniquely. However under assumption that in all respects other than their degree distribution, the graphs are treated as entirely random, many results on finite/infinite-component sizes are known. In this model, the existence of the giant component depends only on the first two (mixed) moments of the degree distribution. Let a randomly chosen vertex has degree , then the giant component exists if and only if which is also written in the form of is the mean degree of the network. Similar expressions are
https://en.wikipedia.org/wiki/World%20Multiconference%20on%20Systemics%2C%20Cybernetics%20and%20Informatics
WMSCI, the World Multi-conference on Systemics, Cybernetics and Informatics, is a conference that has occurred annually since 1995, which emphasizes the systemic relationships that exist or might exist among different disciplines in the fields of Systemics, Cybernetics, and Informatics. Organizers stress interdisciplinary communication, describing the conference as both wide in scope as a general international scientific meeting, and specifically focused in the manner of a subject-area conference. History WMSCI is organized by the International Institute of Informatics and Systemics: IIIS (www.iiis.org). Its General Chair has usually been retired Professor Nagib Callaos. The conference is often held in Orlando, Florida. The annual WMSCI Conference started in Baden-Baden, Germany in 1995 as ISAS (Information Systems Analysis and Synthesis). About 50 papers were presented. In 1997, after earning the non-financial sponsorship of the World Organization of Systems and Cybernetics (WOSC), the conference name was changed to World Conference on Systemics, Cybernetics, and Informatics: SCI. In 2005 the acronym was changed to WMSCI because SCI coincided with the acronym of the Scientific Citation Index, and colocated conferences had been added since then. The multi-conference has grown to have about 900 registered participants, as of 2004; the majority of attendees present papers. Since its inception in 1995, more than 10,000 papers have been presented in WMSCI and its collocated conferences. Until 2005, WMSCI allowed about 15% of non-reviewed submissions, based on the importance of the topic or the potential presenter's curriculum vitae. In a workshop founded by the National Science Foundation, the general chair of the conference explained that they accepted non-reviewed papers because the conference is multi-disciplinary and scholarly associations of several conferences accept almost all submissions on a non-reviewed basis. The most prestigious and largest conferences of OR/MS (IFORS and INFORMS), for example, explicitly state on their web sites that "Contributed abstracts are not reviewed and virtually all abstracts are accepted." Consequently, WMSCI 2005 general chair, Dr. Nagib Callaos, stated that since the conference is multi-disciplinary, he saw no problem with accepting for presentation (not necessarily publication) 15% of non-reviewed submissions, in order to follow the standards of other disciplines like those represented by the International Federation of Operations Research Societies (IFORS), Institute for Operations Research and the Management Sciences (INFORMS, the International Federation of Operations Research Societies (IFORS), the American Mathematical Society, etc. Since 2006 just-reviewed papers are accepted, authors of accepted papers have access to the reviews of the reviewers who recommended the acceptance of their paper, and the reviewing process is based on double-blind and non-blind reviewing. Mission WMSCI is a multi-discip