source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/ECI%20Telecom
|
ECI Telecom Ltd is an Israel-based manufacturer of telecommunications equipment that provides packet optical transport products, software-defined networking applications, cybersecurity and professional services.
History
The Electronics Corporation of Israel (ECI) was founded in 1961. It specialized in telephone transmission products that manipulated the signals carried on telephone lines. The Electronics Corporation of Israel became ECI Telecom in 1981, and had its first trading on NASDAQ in 1982. Since that time, ECI has undergone a number of mergers and acquisitions. An acquisition in 2007 by the Swarth Group and the Ashmore Group, private equity firms, making ECI a private company once again.
In November 2019, Ribbon Communications announced agreed to acquire ECI Telecom, through a merger, for $486 million.
ECI serves carriers and service providers in various sectors: cable/multiple system operators, wireless/cellular service providers, utilities, carrier of carriers, data centers, government and defense entities..
It markets multi-play services, business services, voice services, cellular backhaul, utelco and network security.
Facebook in its phase five has given transport core network deployment to Ciena and worldwide metro packet network deployment to ECI telecom which will be completed by 2022.
ECI has over 3,000 employees with offices in over 20 countries and development centers in India, China, and Israel.
Former holdings and spin-offs
ECtel - provider of revenue assurance software sold to cVidya in 2010.
Veraz Networks - provider of Softswitch technology merged with NexVerse Networks to form a new company called Veraz Networks in 2002.
InnoWave ECI Wireless Systems Ltd - sold to Alvarion in 2003
Celtro communication Ltd - provider of cellular network Backhaul (telecommunications) optimization and compression technology, worked as an independent business unit within the NGTS division was spun off to a private investor group led by the Momentum Venture Management fund in 2003.
See also
Economy of Israel
References
External links
Company website
Acquisition of the company in 2007
ECI Telecom history
Technology companies established in 1961
Manufacturing companies of Israel
Telecommunications equipment vendors
Telecommunications companies of Israel
Companies based in Petah Tikva
2007 mergers and acquisitions
|
https://en.wikipedia.org/wiki/Data%20buffer
|
In computer science, a data buffer (or just buffer) is a region of a memory used to store data temporarily while it is being moved from one place to another. Typically, the data is stored in a buffer as it is retrieved from an input device (such as a microphone) or just before it is sent to an output device (such as speakers). However, a buffer may be used when data is moved between processes within a computer. That is comparable to buffers in telecommunication. Buffers can be implemented in a fixed memory location in hardware or by using a virtual data buffer in software that points at a location in the physical memory.
In all cases, the data stored in a data buffer are stored on a physical storage medium. A majority of buffers are implemented in software, which typically use the faster RAM to store temporary data because of the much faster access time compared with hard disk drives. Buffers are typically used when there is a difference between the rate at which data is received and the rate at which it can be processed, or in the case that these rates are variable, for example in a printer spooler or in online video streaming. In the distributed computing environment, data buffer is often implemented in the form of burst buffer, which provides distributed buffering service.
A buffer often adjusts timing by implementing a queue (or FIFO) algorithm in memory, simultaneously writing data into the queue at one rate and reading it at another rate.
Applications
Buffers are often used in conjunction with I/O to hardware, such as disk drives, sending or receiving data to or from a network, or playing sound on a speaker. A line to a rollercoaster in an amusement park shares many similarities. People who ride the coaster come in at an unknown and often variable pace, but the roller coaster will be able to load people in bursts (as a coaster arrives and is loaded). The queue area acts as a buffer—a temporary space where those wishing to ride wait until the ride is available. Buffers are usually used in a FIFO (first in, first out) method, outputting data in the order it arrived.
Buffers can increase application performance by allowing synchronous operations such as file reads or writes to complete quickly instead of blocking while waiting for hardware interrupts to access a physical disk subsystem; instead, an operating system can immediately return a successful result from an API call, allowing an application to continue processing while the kernel completes the disk operation in the background. Further benefits can be achieved if the application is reading or writing small blocks of data that do not correspond to the block size of the disk subsystem, which allows a buffer to be used to aggregate many smaller read or write operations into block sizes that are more efficient for the disk subsystem, or in the case of a read, sometimes to completely avoid having to physically access a disk.
Telecommunication buffer
A buffer routine or storage medium u
|
https://en.wikipedia.org/wiki/Tokyo%20Metro%20Fukutoshin%20Line
|
The , formally the , is a subway line operated by Tokyo Metro in west-central Tokyo and Wako, Saitama, Japan. The newest line in the Tokyo subway network, it opened in stages between 1994 and 2008. On average, the Fukutoshin Line carried 362,654 passengers daily in 2017, the lowest of all Tokyo Metro lines and roughly one third of its sister Tokyo Metro Yūrakuchō Line (1,124,478).
Overview
The Fukutoshin Line is the deepest metro line in Tokyo, with an average depth of . At Shinjuku-sanchōme Station, the line passes under the Marunouchi and above the Shinjuku lines at a depth of , with a gap of only to the Shinjuku Line tunnel. The deepest section is at the immediately adjacent Higashi-Shinjuku Station, where the line goes down to , partly due to an underground space reservation for a possible future extension of the Jōetsu Shinkansen to Shinjuku.
It is the second Tokyo Metro line to feature express services, after the Tōzai Line; however, unlike the Tōzai Line (where rapid services are only offered on the – section), the Fukutoshin Line offers express services throughout the line, a first for Tokyo Metro. Express trains pass local trains at Higashi-Shinjuku, where additional tracks are installed for this purpose. Local trains stop at all stations.
When first opened, the line operated through services to Kawagoeshi Station on the Tobu Tojo Line and Hannō Station on the Seibu Ikebukuro Line. From 16 March 2013, the Tōkyū Tōyoko Line moved to share the line's Shibuya terminus, and since then through services have operated onto the Minatomirai Line via the Tōyoko Line, terminating at Motomachi-Chūkagai Station in Yokohama. This is a rare instance of a Tokyo Metro train operating on four companies' tracks.
Since the opening of the section between Ikebukuro and Shibuya station, the Fukutoshin Line operates as a one-man operation subway line between Kotake-Mukaihara Station and Shibuya Station where chest-high platform edge doors are installed on the station platforms to aid the drivers. From 28 March 2015, the one-man operation had extended from Kotake-Mukaihara to Wakōshi station, making this as the third Tokyo Metro line to fully operate as one-man operation other than Namboku Line and Maruonuchi Line.
Like most Tokyo Metro lines, the first carriage of the Fukutoshin Line is designated a "women-only car" before and during the morning rush hour. During these hours only women, children of elementary school age or younger and physically disabled passengers (and their carers) may board the first carriage.
Station list
Express and commuter express trains stop at stations marked "●" and pass those marked "|".
Local trains stop at all stations.
Rolling stock
Tokyo Metro
7000 series trains (until April 2022)
10000 series 10-car (and occasionally 8-car) trains
17000 series 8-car and 10-car trains (since 21 February 2021)
Other operators
Seibu 6000 series 10-car trains
Seibu 6050 series 10-car trains
Seibu 40000 series 10-car trains (sin
|
https://en.wikipedia.org/wiki/Hairy-legged%20vampire%20bat
|
The hairy-legged vampire bat (Diphylla ecaudata) is one of three extant species of vampire bats. It mainly feeds on the blood of wild birds, but can also feed both on domestic birds and humans. This vampire bat lives mainly in tropical and subtropical forestlands of South America, Central America, and southern Mexico. It is the sole member of the genus Diphylla.
Taxonomy and etymology
It was described by German biologist Johann Baptist von Spix in 1823.
Spix first encountered the species in Brazil.
Spix coined the genus name Diphylla () and the species name ecaudata ().
The two recognized subspecies are:
Diphylla ecaudata centralis is found from western Panama to Mexico. A single specimen was taken in an abandoned railroad tunnel near Comstock, Val Verde County, Texas, in 1967, well outside the taxon's recognized range.
Diphylla ecaudata ecaudata is found from Brazil and eastern Peru to eastern Panama.
Description
It is similar in appearance to the common vampire bat.
It differs, however, in its broad, short ears; padless, short thumb; and large, shiny eyes.
It also has more teeth than the common vampire bat (26 compared to 18), with a dental formula of .
Additionally, its brain is smaller than that of the common vampire bat, at two-thirds the size by mass.
Its uropatagium is narrow and very furry; as its species name indicates, it lacks a tail.
The fur on its back is dark brown, while the fur on its ventral surface is lighter in color.
Its fur is soft and long.
Its nose-leaf is greatly reduced in size relative to other leaf-nosed bats.
It weighs .
Its head and body combined are long.
Its forearm is long.
There are no lingual grooves under the tongue as in Desmodus and Diaemus (the white-winged vampire bat), but it does have a groove along the roof of the mouth which may serve as a "blood gutter".
Biology and behavior
It is thought to be polyestrous, with individuals capable of becoming pregnant throughout the year and no clearly defined breeding season.
Females are capable of becoming pregnant at approximately one year of age.
Pregnancy lasts a relatively long time considering the small body size of the species, at gestation length of approximately 5.5 months.
Females give birth to usually only one young, called a pup.
Pups are born with their eyes open and a set of deciduous teeth.
There are fewer deciduous teeth than permanent teeth (20 compared to 26), with a deciduous dental formula of
Females who have lost their pups will continue to lactate, and females have been observed nursing the young of unrelated females.
Pups will fledge at approximately 57 days old, though they will continue to nurse and seek regurgitated blood from their mothers long after that, up until approximately 223 days of age.
It is nocturnal, and roosts in sheltered areas during the day.
Caves and mines are preferred roosts, though hollow trees may also be used.
It is generally solitary, but may be found roosting in small groups of twelve or fewer individuals.
G
|
https://en.wikipedia.org/wiki/Flash%20Film%20Works
|
Flash Film Works is a computer graphics company that provides visual effects for films, television shows and commercials. It is owned by director William Mesa and is located in Los Angeles, California.
History
In 1993, Visual Effects Supervisor William Mesa left Introvision International to direct the low budget science fiction film Galaxis. To create the effects work for the film, Mesa formed his own effects company, which he dubbed Flash Film Works.
As an independent visual effects company, they were hired by New Line Cinema to work on Wes Craven's New Nightmare. This work led to them getting work on other films.
John Dykstra hired Flash Film Works for work on the Warner Brothers motion picture Batman and Robin, creating a digital matte painting of an ice-laden Gotham City, as well as performing some rig and wire removal work on the film.
For Tale of the Mummy, Flash Film works created 3-D mummy wrappings which unraveled and reformed into the mummy. Flash Film works also worked on the Adam Sandler comedy The Waterboy during this time as well as the Renny Harlin killer shark flick, Deep Blue Sea.
For the science fiction film, Red Planet, Flash Film works created various monitor display screens and interactive holographic monitors along with over 150 other shots for the film, including many wire removal shots to create the illusion of the actors floating in space.
In the year 2001, Flash Film works worked on the Eddie Murphy science fiction film The Adventures of Pluto Nash, creating computer generated Moonscapes for the actors to walk through.
For the Arnold Schwarzenegger action film Collateral Damage, Flash Film works was responsible for over 200 visual effects shots including creating CG Helicopters and debris, multiple rig and wire removal shots and several other types of shots as well.
For the Andy Davis directed film, Holes, based on the book by Louis Sachar, William Mesa was the visual effects supervisor as well as the Second Unit Director. For the film Flash Film works created and animated 3D lizards, designed and composited the "God's Thumb" mountain range and added desert and holes to many shots as well as considerable additional work.
Flash Film works big project for 2003 was the Edward Zwick directed film, The Last Samurai, starring Tom Cruise. Flash Film works performed around 200 effects shots on this film, including CG arrows, matte painting, compositing armies and face replacements.
Flash Film works created a CG Storm for several sequences in The Guardian and creating backgrounds for Blood Diamond. They later worked on Clash of the Titans and The Pacific.
Flash Film Works also acquired the rights to several video games originally produced by Digital Pictures and spearheaded having them remastered for newer game systems such as PlayStation 4 and Nintendo Switch.
Selected visual effects filmography
Wes Craven's New Nightmare (1994)
Cutthroat Island (1995)
Batman & Robin (1997)
Tale of the Mummy (1998)
Very Bad
|
https://en.wikipedia.org/wiki/KIPP
|
The Knowledge is Power Program, commonly known as KIPP, is a network of free open-enrollment college-preparatory public charter schools in low income communities throughout the United States. , KIPP is America's largest network of public charter schools. The head offices are in San Francisco, Chicago, New York City, and Washington, D.C.
KIPP was founded in 1994 by Mike Feinberg and Dave Levin, two Teach For America corps members, influenced by educator Harriett Ball. KIPP was one of the charter school organizations to help produce the Relay Graduate School of Education for teacher training.
History
KIPP began in 1994 after co-founders Dave Levin and Mike Feinberg completed their two-year commitment to Teach For America. A year later, they launched a program for fifth graders in a public school in inner-city Houston, Texas. Feinberg developed KIPP Academy Houston into a charter school, while Levin went on to establish KIPP Academy New York in the South Bronx.
KIPP Foundation
Doris and Donald Fisher, co-founders of Gap Inc., formed a partnership with Feinberg and Levin to replicate KIPP's operations nationwide.
Operations
Application process
If there are more applicants than seats available, KIPP students are admitted through a lottery system. After a student is selected from the lottery and the student decides that he or she would like to attend a KIPP school, a home visit is set up with a teacher or the principal of the school, who meets with the family and students to discuss expectations of all students, teachers and the parents in KIPP. Students, parents, and teachers are then all required to sign a KIPP commitment of excellence, agreeing to fulfill specific responsibilities, promising that they will do everything in their power to help the student succeed and go to college.
School structure
KIPP has extended school days to offer extra-curricular activities, and some schools add three extra weeks of school in July. Most KIPP schools run from 7:30 a.m. to 4:00 p.m. Students spend that time in the classroom—up to 50 percent more time than in traditional public schools, depending on the region—and doing activities like sports, performing arts, and visual arts. Many of the activities KIPP offers might otherwise be inaccessible to students because of cost or scheduling issues. Because of this, the extended day offers students and families opportunities they might not get elsewhere.
Controversy
In February 2018, Feinberg was removed from his position at KIPP due to sexual misconduct allegations involving a KIPP middle school student in the late 1990s and two KIPP employees in the early 2000s. Feinberg denied the accusation by the middle school student, and reached a financial settlement with one of the two KIPP employees.
In 2022, it was revealed the KIPP's director of technology had embezzled $2.2 million which he spent on cars and sports memorabilia which was intended for laptops and other equipment. The official killed himself as the i
|
https://en.wikipedia.org/wiki/Bob%20Bates
|
Robert Bates (born December 11, 1953) is an American computer game designer. One of the early designers of interactive fiction games, he was co-founder of Challenge, Inc., which created games in the 1980s for the pioneering company Infocom. After Infocom's dissolution in 1989, Bates co-founded Legend Entertainment to continue publishing games in the Infocom tradition, but with added graphics. Notable games that he has designed, written, or produced include Unreal II (2003), Spider-Man 3 (2007), and Eric the Unready (1993), listed as Adventure Game of the Year by Computer Gaming World magazine and also included on the 1996 list of "150 best games of all time". In 1998 he wrote the award-winning game Quandaries for the U.S. Department of Justice. He has twice been the chairperson of the International Game Developers Association, which honored him with a Lifetime Achievement Award in 2010. Bates has written extensively about game design and development in works such as the 2001 book Game Design: The Art and Business of Creating Games, which is commonly used as a game design textbook in college courses. From 2011–2014, Bates was Chief Creative Officer for External Studios at Zynga. He continues to work as an independent consultant with various publishers in the games industry.
Career
Bates was born in 1953 in Greenbelt, Maryland, the fourth of eight children to Frances and James Bates. His father was a mathematician, who from 1963–1967 moved the family to Cheltenham, England. Upon returning to the United States, Bob attended DeMatha High School in Hyattsville, Maryland, graduating in 1971, and then went on to Georgetown University, where he pursued a double major in philosophy and psychology, receiving his Bachelor of Arts degree in philosophy in 1975. His first job after college was as tour guide for Washington Group Tours, a job he took since it allowed him free time between tours to pursue his writing efforts. In 1977 he met his future wife, Peggy Oriani, whom he married in January 1978, and then founded his own tour company, Potomac Tours. In 1982, with the approach of his 30th birthday, he sold the company to spend two years writing a novel, though did not finish. It was around this time that Bates' father gave his old TRS-80 computer to his son, to help with the novel-writing. With the computer, Bates received a copy of the interactive fiction game Zork, and immediately fell in love with the genre, seeing it as a way that he could pursue a writing career, making games.
In 1986, Bates and a friend, David Wilt, who he knew because they sang in the same choir, the Alexandria Harmonizers, started the company Challenge, Inc. to explore the possibilities of creating interactive fiction games. Needing an engine for these games, Bates reached out to the Zork publisher, Infocom, to see about licensing their fiction engine Z-machine. Several weeks later, Infocom and Challenge had worked out a development deal, with Bates doing the design/writing, the co
|
https://en.wikipedia.org/wiki/Embedded%20C%2B%2B
|
Embedded C++ (EC++) is a dialect of the C++ programming language for embedded systems. It was defined by an industry group led by major Japanese central processing unit (CPU) manufacturers, including NEC, Hitachi, Fujitsu, and Toshiba, to address the shortcomings of C++ for embedded applications. The goal of the effort is to preserve the most useful object-oriented features of the C++ language yet minimize code size while maximizing execution efficiency and making compiler construction simpler. The official website states the goal as "to provide embedded systems programmers with a subset of C++ that is easy for the average C programmer to understand and use".
Differences from C++
Embedded C++ excludes some features of C++.
Some compilers, such as those from Green Hills and IAR Systems, allow certain features of ISO/ANSI C++ to be enabled in Embedded C++. IAR Systems calls this "Extended Embedded C++".
Compilation
An EC++ program can be compiled with any C++ compiler. But, a compiler specific to EC++ may have an easier time doing optimization.
Compilers specific to EC++ are provided by companies such as:
IAR Systems
Freescale Semiconductor, (spin-off from Motorola in 2004 who had acquired Metrowerks in 1999)
Tasking Software, part of Altium Limited
Green Hills Software
Criticism
The language has had a poor reception with many expert C++ programmers. In particular, Bjarne Stroustrup says, "To the best of my knowledge EC++ is dead (2004), and if it isn't it ought to be." In fact, the official English EC++ website has not been updated since 2002. Nevertheless, a restricted subset of C++ (based on Embedded C++) has been adopted by Apple Inc. as the exclusive programming language to create all I/O Kit device drivers for Apple's macOS, iPadOS and iOS operating systems of the popular Macintosh, iPhone, and iPad products. Apple engineers felt the exceptions, multiple inheritance, templates, and runtime type information features of standard C++ were either insufficient or not efficient enough for use in a high-performance, multithreaded kernel.
References
External links
Background and Objectives of the Embedded C++ Specification Development
Embedded C++ Yields Faster Smaller Code, John Carbone (Embedded.com), June 19, 1998
Building Bare-Metal ARM Systems with GNU: Part 1 - Getting Started, Miro Samek, Quantum Leaps, June 26, 2007
Technical Report on C++ Performance, by WG 21 of ISO Subcommittee SC 22
C++ programming language family
C++
Hardware description languages
Embedded systems
|
https://en.wikipedia.org/wiki/Bart%20the%20Murderer
|
"Bart the Murderer" is the fourth episode of the third season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on October 10, 1991. In the episode, Bart stumbles upon a Mafia bar after having bad luck at school. The owner of the bar, mobster Fat Tony, hires Bart as a bartender. When Principal Skinner goes missing after punishing him at school, Bart is put on trial for his murder.
The episode was written by John Swartzwelder and directed by Rich Moore. This episode marks the first appearances of Fat Tony (voiced by Joe Mantegna) and his henchmen, Legs and Louie. The episode features cultural references to songs such as "Witchcraft" and "One Fine Day", and the American television series MacGyver.
Since airing, the episode has received mostly positive reviews from television critics. It acquired a Nielsen rating of 13.4 and was the highest-rated show on Fox the week it aired.
Plot
After having an unlucky day, which causes Bart to miss out on an all school field trip to the chocolate factory and spend the day with Principal Skinner, he loses control of his skateboard during a downpour. He crashes down the stairwell of the Legitimate Businessman's Social Club, a Mob bar owned by the Springfield Mafia.
At the club, mob boss Fat Tony and his henchmen, Legs and Louie, are inhospitable towards Bart at first. They are soon impressed by his ability to pick winning horses and make excellent Manhattans. After Fat Tony hires him as the club's bartender and errand boy, Bart starts wearing Rat Pack suits and allows the Mob to store a truckload of stolen cigarettes in his bedroom until they can be fenced.
After Bart is given detention for trying to bribe Principal Skinner, resulting in him being late to serve Manhattan cocktails to a rival gang, the mobsters confront Skinner and the next day, he is announced as missing. As it becomes apparent that Skinner has been murdered, Bart rushes to confront Fat Tony at the bar after a nightmare about Skinner's ghost and his own execution. While Bart is there, the police raid the bar and arrest the mobsters. Bart is subsequently placed on trial for Skinner's murder.
At the trial, Fat Tony, Legs and Louie lie to the court, saying Bart killed Skinner and claim that he is the ringleader of the mafia, even Homer falls for their lies when he is called to testify. Bart is found guilty and Judge Snyder is about to give Bart a certain death sentence when Skinner, unshaven and disheveled, bursts in the courtroom, and he explains to everyone what happened to him. Fat Tony and his henchmen visited Skinner's office and left sheepishly after Skinner scolded them for interfering in student discipline. When he returned home that day, Skinner became trapped beneath stacks of old newspapers in his garage and lay stuck there for a week before finally realising he had to get out himself when nobody came to his aid.
Bart is cleared of all charges, despite the prosecutio
|
https://en.wikipedia.org/wiki/Home%20Sweet%20Homediddly-Dum-Doodily
|
"Home Sweet Homediddly-Dum-Doodily" is the third episode of the seventh season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on October 1, 1995. In the episode, the Simpson children are put in foster care at Ned and Maude Flanders' house. Homer and Marge are forced to attend a parenting class to get their children back.
The episode was written by Jon Vitti and directed by Susie Dietter. The story was pitched by another writer on the show, George Meyer. It was the first episode in which writers Bill Oakley and Josh Weinstein served as show runners. The episode features cultural references to the 1965 film Faster, Pussycat! Kill! Kill! and Sonny & Cher's song "I Got You Babe".
Since airing, the episode has received positive reviews from television critics. It acquired a Nielsen rating of 9.0, and was the fourth highest-rated show on the Fox network the week it aired.
Plot
During a school day, Bart is found to have head lice due to letting a monkey crawl on his head and Lisa is forced to walk barefoot after her shoes are stolen by bullies. Believing that Homer and Marge are negligent parents, the school staff alert Social Services. Meanwhile, Homer and Marge are spending their day at a spa, having left their house a mess. Despite having promised themselves to clean up after returning home, two Child Protective Services agents arrive at their house at the worst possible time, finding it under the negligent and incompetent care of Abe Simpson. They take Bart, Lisa, and Maggie to a foster home, which turns out to be their four next-door neighbors Ned, Maude, Rod, and Todd Flanders. Bart and Lisa hate living with the Flanders due to all activities being strictly religious, being served unusual food, and having to go to bed at only 7 o'clock. However, Maggie enjoys it since she gets more attention from Ned than she ever did from Homer. Meanwhile, Marge and Homer are forced to attend a parenting class to regain custody of their children.
During a quiz game of Bible questions, Ned becomes concerned when he learns the Simpson children know nothing of Christian history; something which the Flanders family believes one should start learning at baptism. When Lisa reveals that they have never been baptized, Ned becomes so distraught that he drives them to the Springfield River. When Homer and Marge are declared fit parents, they quickly head for the river to stop Ned from baptizing their children. Just as Ned is about to pour holy water on Bart, Homer pushes Bart away and the water falls on him instead, inadvertently making him a baptized member of the Flanders family. The Simpsons are reunited and head home together.
Production
"Home Sweet Homediddly-Dum-Doodily" was the first episode to be made after Bill Oakley and Josh Weinstein became show runners of The Simpsons. They wanted to start the season with an episode centering on the Simpson family. The story was pitched by writer Georg
|
https://en.wikipedia.org/wiki/Micro%20ribbon%20connector
|
The micro ribbon or miniature ribbon connector is a common type of electrical connector for a variety of applications, such as in computer and telecommunications equipment having many contacts.
The connector contains two parallel rows of contacts within a shielded case having a characteristic D-shape similar to that used in D-subminiature connectors. The contacts are not pins, but small flat bands of metal, called ribbon contacts. The connectors are manufactured in many capacities, including 14-, 24-, 36-, 50-, 64-, and 100- pin varieties. They may be mounted on boards, panels, or may terminate cables. Wires are attached by means of solder, crimping or insulation displacement. Female connectors have bail locks for a sturdy connection to the male connector. Screws may also be employed to secure connections.
This connector type is also known as telco, 25-pair, miniature delta ribbon, mini D ribbon, delta ribbon, MDR, Amphenol, or CHAMP miniature ribbon connector. Although it was invented by Amphenol, many companies now produce it, such as 3M, TE Connectivity (formerly Tyco Electronics, formerly AMP), and Hirose Electric Group.
Two major sizes are available. The larger size has 0.085 inch (2.16 mm) contact pitch. This size, with 36 pins and bail locks, is also known as a Centronics connector because of its introduction by Centronics for use with the parallel port of printers, and is standardized as IEEE 1284 type B. Other connectors of this size are also called Centronics connectors. The smaller size has 0.050 inch (1.27 mm) pitch. This size, with 36 pins, is also known as a mini-Centronics connector, and is standardized as IEEE 1284 type C.
Applications
14-pin connector: printer port used on MSX home computers and on various other Japanese computers such as the NEC PC-6000, PC-8800 and PC-9800 series
20-pin connector: VESA Digital Flat Panel digital video interface
24-pin connector: IEEE 488 (GPIB, HP-IB) interface
36-pin connector: IEEE 1284 parallel interface
50-pin connector: SCSI-1 interface (SCSI connector)
50-pin connector: RJ21X "telco connector" (telephone systems)
See also
Ribbon cable
25-pair color code
References
Electrical signal connectors
Signal cables
|
https://en.wikipedia.org/wiki/Kaczmarz%20method
|
The Kaczmarz method or Kaczmarz's algorithm is an iterative algorithm for solving linear equation systems . It was first discovered by the Polish mathematician Stefan Kaczmarz, and was rediscovered in the field of image reconstruction from projections by Richard Gordon, Robert Bender, and Gabor Herman in 1970, where it is called the Algebraic Reconstruction Technique (ART). ART includes the positivity constraint, making it nonlinear.
The Kaczmarz method is applicable to any linear system of equations, but its computational advantage relative to other methods depends on the system being sparse. It has been demonstrated to be superior, in some biomedical imaging applications, to other methods such as the filtered backprojection method.
It has many applications ranging from computed tomography (CT) to signal processing. It can be obtained also by applying to the hyperplanes, described by the linear system, the method of successive projections onto convex sets (POCS).
Algorithm 1: Kaczmarz algorithm
Let be a system of linear equations, let be the number of rows of A, be the th row of complex-valued matrix , and let be arbitrary complex-valued initial approximation to the solution of . For compute:
where and denotes complex conjugation of .
If the system is consistent, converges to the minimum-norm solution, provided that the iterations start with the zero vector.
A more general algorithm can be defined using a relaxation parameter
There are versions of the method that converge to a regularized weighted least squares solution when applied to a system of inconsistent equations and, at least as far as initial behavior is concerned, at a lesser cost than other iterative methods, such as the conjugate gradient method.
Algorithm 2: Randomized Kaczmarz algorithm
In 2009, a randomized version of the Kaczmarz method for overdetermined linear systems was introduced by Thomas Strohmer and Roman Vershynin in which the i-th equation is selected randomly with probability proportional to
This method can be seen as a particular case of stochastic gradient descent.
Under such circumstances converges exponentially fast to the solution of and the rate of convergence depends only on the scaled condition number .
Theorem. Let be the solution of Then Algorithm 2 converges to in expectation, with the average error:
Proof
We have
Using
we can write () as
The main point of the proof is to view the left hand side in () as an expectation of some random variable. Namely, recall that the solution space of the equation of is the hyperplane
whose normal is Define a random vector Z whose values are the normals to all the equations of , with probabilities as in our algorithm:
with probability
Then () says that
The orthogonal projection onto the solution space of a random equation of is given by
Now we are ready to analyze our algorithm. We want to show that the error reduces at each step in average (conditioned on the previous steps) by
|
https://en.wikipedia.org/wiki/Digital%20asset
|
A digital asset is anything that exists only in digital form and comes with a distinct usage right, or distinct permission for use. Data that do not possess that right are not considered assets.
Digital assets include but are not exclusive to: digital documents, audible content, motion picture, and other relevant digital data that are currently in circulation or are, or will be stored on digital appliances such as: personal computers, laptops, portable media players, tablets, data storage devices, telecommunication devices, and any apparatuses which are, or will be in existence once technology progresses to accommodate for the conception of new modalities which would be able to carry digital assets; notwithstanding the proprietorship of the physical device onto which the digital asset is located.
Types
Types of digital assets include, but are not exclusive to: software, photography, logos, illustrations, animations, audiovisual media, presentations, spreadsheets, digital paintings, word documents, electronic mails, websites, and a multitude of other digital formats and their respective metadata. The number of different types of digital assets is exponentially increasing due to the rising number of devices that leverages these assets, such as smartphones, which are conduits for digital media. New digital assets, including certain types of cryptocurrency and Non-fungible tokens, are created everyday.
In Intel's presentation at the company's "Intel Developer Forum 2013", they named several new types of digital assets related to medicine, education, voting, friendships, conversations and reputation amongst others.
Digital asset management system
A digital asset management (DAM) system represents an intertwined structure incorporating both software and hardware and/or other services in order to manage, store, ingest, organise and retrieve digital assets. Digital asset management systems allow users to find and use content when they need it.
Digital asset metadata
Metadata is data about other data. Any structured information that defines a specification of any form of data is referred to as metadata. Metadata is also a claimed relationship between two entities.
Librarian Lorcan Dempsey says to "Think of metadata as data which removes from a user (human or machine) the need to have full advance knowledge of the existence or characteristics of things of potential interest in the environment".
At first the term metadata was used for digital data exclusively, but nowadays metadata can apply to both physical and digital data.
Catalogues, inventories, registers and other similar standardized forms of organizing, managing and retrieving resources contain metadata.
Metadata can be stored and contained directly within the file it refers to or independently from it with the help of other forms of data management such as a DAM system.
The more metadata is assigned to an asset the easier it gets to categorize it, especially as the amount of information g
|
https://en.wikipedia.org/wiki/Allan%20McFee
|
Allan McFee (June 4, 1913 – December 12, 2000) was an often irreverent announcer for the Canadian Broadcasting Corporation's radio and television networks. Born in Belleville, Ontario, he joined the CBC in 1937, and remained with the network until his retirement in 1989. Even after his retirement, he continued to be the announcer for Max Ferguson's Sunday morning CBC radio show up to the beginning of 1998.
McFee was the announcer on such programmes as The Royal Canadian Air Farce, Sunday Morning and The Max Ferguson Show. He also hosted his own program, Eclectic Circus for almost twenty years running five nights a week until 1985 and then as a weekly program until 1989. In the show, McFee would converse with an imaginary mouse, a "small grey presence" which lived in his pocket, and play an eclectic array of obscure musical selections. Other sounds included imaginary chickens. Referring to himself as "your delightful host" and "the old musicologist," he would address his audience as "all those out there in vacuumland". He would often refer to the CBC as the "Canadian Radio Broadcasting Commission", the name of the precursor to the CBC that only existed for about four years in the 1930s.
He took pride in his status as an employee without a contract, and, aware of his popularity, made his feelings about CBC's management known. CBC staffers passed on a legend that when a particularly pompous management memo was posted on the bulletin board, he used the opportunity to ostentatiously read it aloud, word for word, and then set it on fire.
He was married to Oonah McFee, a writer who won the Books in Canada First Novel Award for her sole published novel, Sandbars.
References
1913 births
2000 deaths
Canadian television personalities
People from Belleville, Ontario
CBC Radio hosts
|
https://en.wikipedia.org/wiki/Metapuzzle
|
A metapuzzle, also known as a meta-puzzle or meta, is a puzzle that uses the solutions to a set of puzzles to create or provide data for a final puzzle.
Overview
Game designer Cliff Johnson defines a meta-puzzle as "a collection of puzzles that, when solved, each give a piece of a master puzzle." A metapuzzle is a puzzle that unites several puzzles that feed into it. For example, five puzzles that had the answers BLACK, HAMMER, FROST, KNIFE, and UNION would lead to the metapuzzle answer JACK, which combines with all of those words to make new words and phrases.
A "meta-meta" can exist in larger sets of puzzles, uniting several metapuzzles. So if that metapuzzle answer JACK was alongside three metapuzzles with the answers TEN, QUEEN, and ACE, the meta-meta answer would be KING, the remaining card in an ace high straight.
Metapuzzles are frequently found in puzzle hunts.
The structure of a metapuzzle often makes it possible to guess, with a greater or lesser degree of certainty, the solutions to the puzzles that feed into it without solving them. This technique is called backsolving. For instance, in the above example, after solving the puzzles whose answers were BLACK, HAMMER, FROST, and KNIFE, and the metapuzzle answer JACK, a backsolver might, instead of solving the fifth puzzle, correctly guess UNION as its answer simply based on the knowledge that it must form a word or phrase with JACK. Backsolving is not infallible; the same backsolver might incorrectly guess SPRING-HEELED as the answer just as easily as correctly guessing UNION.
Types
Rally
In a rally metapuzzle, individual puzzles are checkpoints in a race or maze; solving the puzzle unlocks the location of the next puzzle.
Compilation
In a compilation metapuzzle, the answers to puzzles unite as components used to solve a final puzzle. This form of puzzle is particularly inclined towards backsolving, where some of the component puzzle answers are used to solve the final metapuzzle, and the metapuzzle's solution is used to solve the remaining component puzzles.
Cascade
A cascade is a metapuzzle where the solution to one puzzle becomes the basis for the next puzzle. For instance, a cryptogram might produce clues for a crossword puzzle, and the crossword's solution might form a word search.
Crossword
Crossword metapuzzles are crosswords that, when correctly solved, provide the basis for a second puzzle. Crosswords with metapuzzle components started to grow in popularity in the 2010s, after Matt Gaffney began making crossword metapuzzles in 2008.
See also
Puzzle hunts that have metapuzzles
MIT Mystery Hunt
Microsoft Puzzle Hunt
Microsoft Puzzle Safari
College Puzzle Challenge
PEA Puzzle Hunt
Puzzle games that have metapuzzles
The Fool's Errand
3 in Three
System's Twilight
The Fool and His Money
Baba Is You
Puzzle books that have metapuzzles
The Librarian's Almanaq
The Maze of Games
The Year of Puzzles
Websites that have metapuzzles
Some Puzzles by Mark Halpin
Planetarium
Ref
|
https://en.wikipedia.org/wiki/Rural%20Land%20Register
|
The Rural Land Register (RLR) is a database of maps showing the ownership of all agricultural land in the England, along with woodland and marginal land on which grants or subsidies are to be claimed.
The database is used by the Rural Payments Agency to pay subsidies and grants under schemes including the Environmental Stewardship Scheme, Farm Woodland Scheme and the Single Payment Scheme.
In January 2003 the Government estimated that the costs of the scheme would be 5.5 million pounds. The system has suffered from delays and problems in registering land.
See also
Land registry
HM Land Registry
References
External links
Rural Land Register
Government databases in the United Kingdom
Agriculture in the United Kingdom
Property law of the United Kingdom
Geographical databases in the United Kingdom
|
https://en.wikipedia.org/wiki/Kirby%2064%3A%20The%20Crystal%20Shards
|
Kirby 64: The Crystal Shards is a 2000 platform game developed by HAL Laboratory and published by Nintendo for the Nintendo 64 (N64). It is the first Kirby game to feature 3D computer graphics and follows Kirby as he attempts to reassemble a sacred crystal shattered by Dark Matter. Gameplay is viewed from a 2.5D perspective and is similar to previous Kirby titles; the player traverses levels and obtains powers by eating enemies. Kirby 64 introduces Power Combos, the ability to mix powers to create more powerful ones. In a multiplayer mode, up to four players can compete in three minigames.
Development began in September 1997. The game was intended for the N64's 64DD add-on, but became a standard N64 title after the add-on failed. HAL initially planned to use the N64 controller's analog stick for Kirby 64, but switched to the D-pad about a year before release.
The game received mainly positive reviews, with praise directed at its colorful visuals and classic style of gameplay, but criticism towards its underwhelming low difficulty and short length. The game was rereleased for the Virtual Console on the Wii in 2008, Wii U in 2015, and the Nintendo Switch Online + Expansion Pack in 2022. The game was also included in the Wii compilation Kirby's Dream Collection (2012). Kirby 64: The Crystal Shards was the last traditional Kirby game for home consoles until Kirby's Return to Dream Land (2011).
Gameplay
Kirby 64: The Crystal Shards is a side-scrolling platformer similar to previous games in the Kirby series. Its story begins when Dark Matter invades Ripple Star, a planet populated by fairies. The fairy Ribbon flees with a sacred crystal, but Dark Matter shatters it and spreads it across the galaxy. Ribbon lands on Pop Star and meets Kirby, who agrees to help retrieve the shards and defeat Dark Matter. Along the way, they enlist the help of artist Adeleine, King Dedede, and Dedede's minion Waddle Dee, after each of them stumble upon a crystal shard and end up being possessed by Dark Matter, forcing Kirby to battle each of them in order to free them from the Dark Matter's influence.
Similar to contemporary platformers such as Pandemonium! (1996) and Klonoa: Door to Phantomile (1997), Kirby 64 is a 2.5D platformer; although environments and characters are rendered in 3D computer graphics, gameplay is restricted to a 2D plane. Players control Kirby using the Nintendo 64 controller's D-pad. Like earlier Kirby games, Kirby can walk or run, crouch, jump, and inhale enemies or objects to spit them out as bullets. He can fly for a limited time by inflating himself; while flying, Kirby cannot attack or use his other abilities, though he can release a weak puff of air. By eating certain enemies, Kirby can gain one of seven copy abilities, power-ups allowing him to take on the properties the enemy possessed. In certain levels, Kirby will ride on King Dedede's back, allowing him to clear certain obstacles with Dedede's hammer; in other levels, Kirby rides a m
|
https://en.wikipedia.org/wiki/CBS%20Block%20Party
|
CBS Block Party (referred to on-air as the CBS Friday Night Block Party) was a programming block that aired on the CBS television network during the 1997–1998 television season. The block was similar to, and was intended as direct competition to, ABC's TGIF lineup and aired on Friday nights from 8:00p.m. to 10:00p.m. ET, and included two former stalwarts of the TGIF lineup. Although the block was canceled after one year, the resulting audience fracture caused what turned out to be irreparable harm to the previously dominant TGIF, eventually clearing the way for CBS to dominate the Friday night lineup beginning in the next decade.
Background
When ABC (a network that was in the midst of an overhaul as The Walt Disney Company took over) canceled the long-running shows Family Matters and Step by Step, CBS picked them up, paying a $40 million sum to earn the rights to the shows, and made them the cornerstones of the new "Block Party." Two new family comedies were added. The first was a new production from Miller-Boyett Productions (the production company behind Family Matters and Step By Step among other TGIF series), Meego. Meego, in addition to being produced by TGIF alumni, also starred a TGIF alumnus: Bronson Pinchot, who previously starred as Balki Bartokomous in Perfect Strangers and as Jean-Luc Rieupeyroux in the sixth season of Step by Step (Pinchot even used a similar accent to the one he used for the Balki character); Meego also featured well-known contemporary child stars Michelle Trachtenberg and Jonathan Lipnicki. The second new series was The Gregory Hines Show, an eponymous sitcom featuring entertainer Gregory Hines; CBS head Leslie Moonves described the Hines show as being more mature and edgy than the other shows in the block, but still family-friendly enough that children could watch comfortably.
Jaleel White, who played Family Matters star character Steve Urkel, stated that the producers jumped at the opportunity to jump to CBS because ABC was already shifting the TGIF block toward a much more child- and teen-oriented image, moving away from the whole-family approach it had taken at the beginning of its run (White believed being paired with the likes of The Gregory Hines Show was a far better fit than shows such as Muppets Tonight and Aliens in the Family that had been appearing on TGIF at the time), and that they did not believe Disney would give Miller-Boyett as prominent of a role as they had held with ABC before Disney had bought it. CBS, still experiencing aftereffects from the loss of NFL rights and multiple key affiliates to Fox in 1994, saw the purchase as a golden opportunity to draw a younger demographic than it was drawing at the time.
The CBS Block Party was CBS's second and final attempt to compete with TGIF; in 1992, the network attempted a similar block, albeit targeting an older demographic than either TGIF or the Block Party, that featured The Golden Palace (the continuation of the long-running NBC sitcom The Go
|
https://en.wikipedia.org/wiki/Wix
|
Wix may refer to:
Computing
WiX (Windows Installer XML Toolset), a software toolset
Wix.com, an Israeli software company offering cloud-based web development tools and services
Places
Wix, Essex, United Kingdom
Vicques, Switzerland, formerly
Other uses
Wix (name), a given name and surname
Wix Wickens or Wix (Paul Wickens, born 1956), keyboardist
See also
Wicks (disambiguation)
Wickes (disambiguation)
Wicks (surname)
|
https://en.wikipedia.org/wiki/Sabotage%20%28video%20game%29
|
Sabotage is a fixed shooter video game for the Apple II series of computers, written by Mark Allen and published by On-Line Systems in 1981.
Gameplay
The player controls a gun turret at the bottom of the screen by either keyboard, paddle control, or a single axis of a joystick. The turret can swivel to cover a large area of the screen, but cannot move from its base. Helicopters fly across the screen at varying heights, progressively lower over time, dropping paratroopers. Waves consist of helicopters coming at progressively lower altitudes, a brief rest, then a wave of jets.
The player earns points by shooting helicopters (5 points), paratroopers (2 points), jets (5 points), and bombs (25 points). Firing a shell costs the player one point, so if one is playing for score, there is an incentive to conserve ammo. The score never drops below zero.
The game ends when the player's turret is hit by a bomb, when a single paratrooper lands directly on the turret base, when three paratroopers safely land atop each other immediately adjacent to the turret base (allowing the third to jump onto the base), or when four paratroopers safely land on either the left or right of the turret (that is four on one side, not four total). If four land on a side, they are able to build a human pyramid and climb up to the turret and blow it up once the sky is clear.
Legacy
The Sabotage concept has been cloned a number of times:
Commando Raid (Atari 2600, 1982)
M.A.D. (Atari 2600, 1982) "Missile Attack and Defense"
Paratrooper (IBM PC, 1982)
Incoming! (Atari 8-bit, 1986) by Conrad Tatge in ANALOG Computing magazine
ParaShooter! (Apple IIGS, 1989) by Lane Roathe
Parachute, (preloaded on the third-generation) iPod and later models.
References
Apple II games
Apple II-only games
Fixed shooters
1981 video games
Video games developed in the United States
Single-player video games
|
https://en.wikipedia.org/wiki/DEF%20II
|
DEF II was a programming strand on BBC2, which aired at 6 pm on Mondays and Wednesdays from 9 May 1988 to 23 May 1994, to serve the teenage market. It was produced by Janet Street-Porter, and followed on from her influential youth TV show Network 7 on Channel 4.
Many of the presenters and staff on DEF II started their careers on Network 7 and had followed Street-Porter when she was "poached" by the BBC. It had an ident featuring a barcode which differed from the usual idents used on BBC2.
DEF II shows
Programmes shown as part of DEF II included both original content, such as Reportage, as well as those from other sources, such as American sitcoms and programmes from Europe (as seen in Jovanotti's Gimme 5.). These included:
See also
BBC Switch, BBC Two's second programming block aimed at teenagers
References
External links
Les Lives at BBC Online Comedy Guide (Internet Archive)
DEF II Revisited on Off The Telly
BBC Television shows
1988 British television series debuts
1994 British television series endings
Television programming blocks in Europe
1980s British teen television series
1990s British teen television series
British music television shows
BBC television programming blocks
|
https://en.wikipedia.org/wiki/Tattoo%20Assassins
|
Tattoo Assassins is an unreleased 1994 fighting game developed by the pinball division of Data East for release in arcades. A few prototypes were test-marketed, but the game was never officially released. Spearheaded by Bob Gale (screenwriter for Back to the Future) and Joe Kaminkow (leader of Data East Pinball, now known as Stern Pinball), Tattoo Assassins was designed to be Data East's answer to Mortal Kombat.
The game was essentially completed before it was cancelled, though it has some minor gameplay and sound glitches, and prototype cabinets were released to test markets in 1994.
Reception
Tattoo Assassins was reviewed in Next Generation; the reviewer panned the game for poor synchronization between controls and characters, sometimes choppy animation, and most especially the game's "extraordinary lack of any real innovation."
References
External links
Dan's Tattoo Assassins page
System 16 arcade database (Data East ARM6 hardware roundup)
Unseen64 feature (September 14, 2020. Article by Nolan Snoap.)
Cancelled arcade video games
Arcade-only video games
Arcade video games
Data East video games
Mortal Kombat clones
Obscenity controversies in video games
Video games with digitized sprites
Video games developed in the United States
Data East arcade games
|
https://en.wikipedia.org/wiki/Richard%20Woolsey
|
Richard P. Woolsey is a fictional character in the Stargate television franchise about military teams exploring the Milky Way and Pegasus galaxies via a network of alien transportation devices. Played by actor Robert Picardo, Woolsey made his first appearance as a member of the NID in "Heroes Part 2", an episode of season 7 of Stargate SG-1, and recurred in several SG-1 episodes until season 10. He was also a recurring character in seasons 3 and 4 of Stargate Atlantis before becoming a main character in season 5 of Atlantis.
Role in Stargate
Character arc in Stargate SG-1
Following the death of Dr. Janet Fraiser late in season 7 of Stargate SG-1, Woolsey is brought into Stargate Command in the episode "Heroes" to examine the command decisions and threatens SGC personnel with court-martial if they do not cooperate. When Woolsey brings his report to President Hayes in "Inauguration", he comes to realize Vice President Kinsey's ambitions and presents incriminating evidence against him, indirectly forcing Kinsey into resigning. Woolsey returns in the season 9 episode "Prototype" and encourages the SGC to take great risks with the captured Goa'uld-human-Ancient hybrid Khalek to learn more about the Ascension process. When the studies cause injury and death among SGC personnel, Woolsey acknowledges his own error and pleads for forgiveness from the SG-1 team. Being the US's representative on the newly formed International Oversight Advisory Committee (IOA), Woolsey and some colleagues are rescued by SG-1 and the crew of the Odyssey after a catastrophe at the Gamma Site in "The Scourge", which he later considers an "eye-opening experience." Woolsey makes two more appearances in "Flesh and Blood" and "Morpheus" and last appears on SG-1 in season 10's "The Shroud". Woolsey remembers the Khalek incident and decides that Daniel, who transformed into a Prior, is too dangerous and must be placed indefinitely into stasis. However, Daniel frees himself before Woolsey's plans can be enacted.
Character arc in Stargate Atlantis
Faced with the threat of the Wraith, Woolsey tells Dr. Weir that the IOA is considering bringing the Atlantis ZPM to Earth to power the Ancient defense platform in Antarctica. He is also part of an IOA panel that recalled Dr. Weir to Earth to explain her failed alliance with the Wraith. He genuinely respects Weir and attempts to defend her actions, but must defer to his IOA colleagues. The IOA dispatched him to Atlantis to evaluate Weir's ability to command. While evaluating Weir's abilities, he made a rather poor impression on the expedition members (Lt. Col Sheppard expressed a strong desire to knock Woolsey on the head). However, he ultimately sides with Weir by sending the IOA a report modified to favor Weir and keep her in command of Atlantis. When live Ancients were found and reclaimed control of Atlantis, Woolsey and General O'Neill were sent to negotiate with them. Woolsey and O'Neill were allowed to stay as liaisons with the Anc
|
https://en.wikipedia.org/wiki/Namma%20Metro
|
Namma Metro (meaning Our Metro in Kannada), also known as Bengaluru Metro, is a rapid transit system serving the city of Bengaluru, India. It is the second longest operational metro network in India with an operational length of 73.75 kilometers just after Delhi Metro. Upon its inauguration, it became the first underground metro system in South India. Namma Metro has a mix of underground, at grade, and elevated stations. Out of the operational 66 metro stations of Namma Metro as of October 2023, there are 57 elevated stations, 8 underground stations and 1 at-grade station. The system runs on standard-gauge tracks.
Bengaluru Metro Rail Corporation Limited (BMRCL), a joint venture of Government of India and the State Government of Karnataka, is the agency for building, operating and expanding the Namma Metro network. Services operate daily between 05:00 and 24:00 running with a headway varying between 5–15 minutes. The trains initially began with three coaches but were later converted to six coaches as ridership grew. Power is supplied by 750V direct current through third rail. As of October 2023, the metro system has an average daily ridership of about 710,000 passengers.
Network
Namma Metro lines
Purple Line
Purple Line is aligned east to west and connects Whitefield (Kadugodi) in the east with Challaghatta in the southwest. The line is long and has 37 stations. It is elevated on both the east and west sides and has a underground section in the middle. The Line passes through prime activity centers of the city (Whitefield, ITPL, Krishnarajapura, MG Road, Majestic, Railway Station, Vidhana Soudha, Mysuru Road, Kengeri).
The first , 6-station stretch (Reach 1) of the Purple Line between Baiyappanahalli in the east and Mahatma Gandhi Road opened on 20 October 2011. This was the first and inaugural section of Namma Metro. The second , 6-station stretch (Reach 2) between Mysore Road and Magadi Road opened on 16 November 2015. The underground section, a stretch from Cubbon Park to Bengaluru City (KSR) Railway Station opened on 29 April 2016, thus linking east and west sections that were already opened. Opening the underground section completed the entire Purple Line in Phase-1.
Under Phase-2, Southwest extension of opened on 30 August 2021. The eastern extension of to Whitefield was under construction. of the eastern extension was opened for service on 26 March 2023 but remained disconnected from the network as a small section was not yet ready (Baiyyappanhalli-KR Puram). On 9 October 2023, Baiyyappanhalli-KR Pura and Kengeri-Challaghatta were also open to the public making the whole line operational from Whitefield to Challaghatta. It connects the industrial and suburban areas of south-west with the CBD (MG Road, Trinity) and the IT areas of the east (Baiyappanahalli, Whitefield).
37 new feeder routes of BMTC were introduced in October 2023 from KR Puram station to ensure last mile connectivity.
Green Line
The Green Line is aligned
|
https://en.wikipedia.org/wiki/DesktopBSD
|
DesktopBSD is a Unix-derived, desktop-oriented operating system based on FreeBSD. Its goal was to combine the stability of FreeBSD with the ease-of-use of K Desktop Environment 3, which is the default graphical user interface.
History and development
DesktopBSD is essentially a customized installation of FreeBSD and is not a fork of it. DesktopBSD was always based on FreeBSD's latest stable branch but incorporated certain customized, pre-installed software such as KDE and DesktopBSD utilities and configuration files.
A common misconception about DesktopBSD was that it was intended as a rival to TrueOS as a BSD-based desktop distribution, since they were similar in structure and goals. However, DesktopBSD was started approximately one year before the PC-BSD project, despite the fact that the first PC-BSD release came out before DesktopBSD's. Neither project intended to rival the other and they were completely independent with distinctive features and intended outcomes: for example, DesktopBSD uses ports and packages for additional software installation, whereas PC-BSD introduced PBIs.
The final release was 1.7 which was made available on 7 September 2009. The release announcement stated "This is the last and final release of the DesktopBSD project" because the lead developer could no longer contribute the time required to maintain it.
In May 2010 DesktopBSD was restarted under new leadership
though development and announcements stopped soon afterwards. On 10 March 2013, a forum post appeared announcing that the project was "in the process of being revived." The roadmap for DesktopBSD 2.0 was announced in September 2015 on the DesktopBSD site, along with posted screenshots of a GNOME3-based desktop.
Graphical features
Installer allowing to partition disks and create users
Tool for managing, installing and updating software using FreeBSD ports system
Management of network interfaces and mounting/unmounting drives
1.7 release
The 1.7 release includes
FreeBSD 7.2 as base system
OpenOffice.org 3.1.1 as feature-rich office suite
Pre-installed Java SE 6 environment
X.Org release 7.4 with extensive graphics support
Large number of enhancements, fixes and minor software updates
Supports GRUB bootloader on i386 and includes a graphical configuration tool
On 7 September 2009 DesktopBSD 1.7 was made available on the project site.
See also
Comparison of BSD operating systems
FreeBSD
MidnightBSD
PC-BSD
GhostBSD
References
External links
BSDTalk Interview with Peter Hofer (DesktopBSD developer/mp3)
DesktopBSD flyer Info from AllBSD.de (pdf/English)
FreeBSD
KDE
Discontinued operating systems
|
https://en.wikipedia.org/wiki/Los%20Reyes%20%28TV%20series%29
|
Los Reyes (The Kings) is a telenovela filmed in Colombia and produced by the Colombian network, RCN (Radio Cadena Nacional - "National Radio Network"). It debuted in 2005 and is available via RCN cable TV in the United States.
Plot
Los Reyes is about a working-class family and Edilberto "Beto" Reyes, the head of the family, who suddenly gets hired as president of a multinational company. This happens when he stops the former president of the company, a middle-aged woman with a terminal disease, from committing suicide. Beto shows the woman his daily life and his people, helping her get back on her feet. The president is grateful, and goes to France to get a treatment for her disease. When she leaves, she thanks Beto by giving him the presidency of the company.
The vice president, Emilio Iriarte (wrongly called "Urinarte"), who sought the company's presidency after the former president disappeared, and his family swear to take revenge. They focus on making the Reyes family go back "where they belong", but problems arise when Emilio falls in love with Laisa, Beto's 'sister'. Laisa conducts a television show on which famous real-life celebrities appear. 354 chapters.
Other information
This comedy parodies high society and its treatment of the lower classes. There has been controversy about one character, Laisa Reyes, who is in the series and in real-life a transsexual. Reyes is well received by Colombian audiences.
Cast and crew
Cast
Enrique Carriazo as Edilberto "Beto" Reyes
Jacqueline Arenal as Mayoli "Yoli" Gonzalez
Geraldine Zivic as Natalia Bernal
Diego Trujillo as Emilio Iriarte De Las Casas
Endry Cardeño as Laisa Reyes
Julián Román as Leonardo Giovanny "Leo" Reyes
Margarita Muñoz as Maria del Pilar "Pilarica" Valenzuela
Daniel Arenas as Santiago "Santi" Iriarte
Constanza Camelo as Hilda Edilberta Reyes
Janeth Wallman as Katty Vanegas de Iriarte
Ricardo Vélez as Armando Valenzuela
Rosita Alonso as Mercedes Rubio
Jery Sandoval as Maria del Carmen Reyes
Henry Montealegre as Andres "Totoy" Reyes
Tiberio Cruz as Edgar Galindo
Jenny Vargas as Alegrina
Diego Vélez as Eliseo "Cheo" Varona
Catherine Mira as Maritza Galindo
Alberto León Jaramillo as Hernán Cifuentes
Nataly Umaña as Mónica
Juan Camilo Hernández as Mateo Santos
Jairo Camargo as Psychologist Simón Rodríguez
Katty Rangel as Lolita
Orlando Valenzuela as Martín Castro Novo
William Marquez as Ernesto 'Chiqui' Peralta
Bianca Arango as herself
Teresa Gutiérrez as Doña Flor
Marisela González as Maria Eugenia Reyes
Carmenza Gonzalez as Dulcinea
Óscar Dueñas as Jorge
Chela Del Río as Doña Rosita
Sebastián Caicedo as Francisco Guerrero
Alfonso Ortíz as Eduardo Pinzón
Beatríz Roldan as Maria Fernanda "Mafe"
Valentina Cabrera Lemaitre as Annie
Vicky Rueda as Adriana Malaber
Thana Carvajal as Luz Dary
David Ramírez López as Henrry
Lucas Velázquez as hinself
Guest stars
Raúl Santi as himself
Lucas Arnau as himself
Maia as herself
Jose Gaviria as himself
Gali Galeano as himself
Pirry as himself
|
https://en.wikipedia.org/wiki/JAL%20%28compiler%29
|
JAL (Just Another Language) is a Pascal-like programming language and compiler that generates executable code for PIC microcontrollers. It is a free-format language with a compiler that runs on Linux, MS-Windows and MS-DOS (OSX support). It is configurable and extendable through the use of libraries and can even be combined with PIC assembly language.
History
JAL was originally created by Wouter van Ooijen and released as free software under the GNU General Public License in 2003. In 2006, Stef Mientki initiated the development of a new version, JALV2, which was programmed by Kyle York and beta tested by an international user group.
Sample code
-- JAL 2.3
include 16f877_bert--define the variables
var byte resist--define the pins
pin_a0_direction = input--variable resistor
pin_d7_direction = input--switch
pin_c2_direction = output--pwm led--enable pulse width modulation
PWM_init_frequency (true, true)
forever loop--convert analog on a0 to digital
resist = ADC_read_low_res(0)
-- run measurement through flash memory
program_eeprom_write(2000,resist)
program_eeprom_read(2000,resist)
-- run measurement through data memory
data_eeprom_write(10,resist)
data_eeprom_read(10,resist)
-- if the switch is pressed return random value
if pin_d7 == high then
resist = random_byte
end if--send resistance to PC
serial_sw_write(resist)
delay_100ms(1)
-- set actual PWM duty cycle
PWM_Set_DutyCycle (resist, resist)
end loop
References
External links
JALv2 Compiler home page
Open Source JAL Libraries
JAL Homepage
Procedural programming languages
Programming languages created in 2003
|
https://en.wikipedia.org/wiki/ADX
|
ADX, AdX, Adx, etc. may refer to:
Business and technology
Abu Dhabi Securities Exchange
Adams Express Company, stock symbol
ADX (file format), a streamed audio format
Authenticated Data Experiment, an early release of Bluesky's decentralized social network protocol
Average directional movement index, a technical indicator of trend strength in prices of a financial instrument such as a stock or bond
DoubleClick Ad Exchange (AdX), an ad exchange platform merged into Google Ad Manager
Intel ADX, add-carry instruction extensions in the x86 microprocessor architecture
Medicine
Adrenal ferredoxin, a small iron-sulfur protein in animals including humans
Adrenalectomy, the surgical removal of one or both adrenal glands or the state of having had one or both removed
Music
ADX, alternative spelling of British punk band The Adicts
ADX, a French heavy-metal band.
Other
Administrative maximum or "supermax" prisons in the United States
United States Penitentiary, Florence ADX, the federal supermax prison in Florence, Colorado
Alpha Delta Chi, an American nation-wide Christian sorority
Amdo Tibetan language, from its SIL language code
Leuchars Station, United Kingdom, formerly RAF Leuchars, a British army installation in eastern Scotland (from its IATA airport code)
|
https://en.wikipedia.org/wiki/Inter-Language%20Unification
|
Inter-Language Unification or ILU is a method for computer systems to exchange data, bridging differences in the way systems represent the various kinds of data. Even if two systems run on the same computer, or on identical computer hardware, many differences arise from the use of different computer languages to build the systems.
The object interfaces provided by ILU hide implementation distinctions between different languages, between different address spaces, and between operating system types. ILU can be used to build multi-lingual object-oriented libraries ("class libraries") with well-specified language-independent interfaces. It can also be used to implement distributed systems. It can also be used to define and document interfaces between the modules of non-distributed programs. ILU interfaces can be specified in either the Object Management Group's CORBA Interface Definition Language (OMG IDL), or ILU's Interface Specification Language (ISL).
History
ILU was developed as an Open Source project at the Xerox Palo Alto Research Center (Xerox PARC) from 1991 until 2000. The last release was 2.0beta1.
From 1997 to 2000, ILU was used as the foundation for experimental work on a "next generation" HTTP protocol by the World Wide Web Consortium's HTTP-NG activity. As a result of this work, a particularly efficient experimental RPC protocol called "w3ng" was developed, along with a way of efficiently multiplexing a single TCP connection into multiple channels in both directions, called "w3mux". The results of the HTTP-NG experiment were presented at the 2000 World Wide Web Conference.
Features
The last release supported the programming languages C++ (Corba2 mapping), ANSI C, Python, Java, and Common Lisp. Contributed support was also available for Modula-3, Guile Scheme, and Perl 5. ILU has been installed on most flavors of UNIX (SunOS, Solaris, HP-UX, AIX, OSF, IRIX, FreeBSD, Linux, LynxOS, SCO Unix, etc.) and MS-Windows (3.1, 95, NT). It supported both threaded (POSIX, Solaris, NT, Franz ACL, PPCR, Modula-3) and event-loop (Xt, Tk, XView) operation.
One of the implementation goals was to maximize compatibility with existing open standards. As a result, ILU provided support for use of the OMG CORBA IDL interface description language, and can be thought of as a CORBA ORB system (though with omissions from and extensions to the CORBA spec). ILU also included a self-contained implementation of ONC RPC, and it was possible to describe and use existing RPC services as ILU objects. ILU also included a self-contained implementation of the World Wide Web's Hypertext Transfer Protocol (HTTP), and could thus be used to implement object-oriented web browsers and servers. Communication security was provided by GSS-based context negotiation and on-the-wire encryption.
See also
Web Components
Enterprise JavaBeans (EJB)
Distributed object middleware (DOM)
Component Object Model (COM)
Common Object Request Broker Architecture (CORBA)
External links
|
https://en.wikipedia.org/wiki/KHME
|
KHME (channel 23) is a television station in Rapid City, South Dakota, United States, affiliated with the classic television network MeTV. It is owned by Gray Television alongside ABC affiliate KOTA-TV (channel 3) and low-power Fox affiliate KEVN-LD (channel 7). The stations share studios on Skyline Drive in Rapid City, where KHME's transmitter is also located.
KHME also operates a full-power satellite in Lead, South Dakota, KQME (channel 10), which can also be seen over-the-air in Rapid City. KQME's transmitter is located atop Terry Peak.
History
KHME debuted on the air as KOTA-TV, with test operations on June 1, 1955, with regular programming beginning one month later on July 1. It was the second television station in South Dakota, and the first in the western part of the state. The station was owned by Rapid City businesswoman Helen Duhamel, and was a sister station to CBS Radio Network affiliate KOTA (1380 AM). Duhamel bought a minority stake in the radio station in 1943 and gradually expanded her holdings until she bought full control in 1954. Channel 3 originally carried programming from all three networks, though it was a primary CBS television affiliate. Helen's son William (Bill) Duhamel would become KOTA-TV's president and general manager in 1976.
When KRSD-TV, the original channel 7 in Rapid City, signed on in 1958, it took the NBC affiliation, sharing ABC with KOTA-TV. In 1965, channel 3 took on an unusual "joint primary" affiliation with CBS and ABC, slightly favoring CBS. It was certainly quite a struggle to fit as many network shows as possible onto the schedule, especially in the daytime, so KRSD-TV had to take up some of the slack. But channel 7 always had a painfully weak signal which, by 1966, had deteriorated to the point of unacceptability. For this reason, and at NBC's insistence, the two stations switched affiliations on September 13, 1970, making KOTA-TV a joint-primary affiliate of ABC and NBC. A year later, the Federal Communications Commission (FCC) would yank KRSD-TV's license due to its inadequate technical quality; that station's owner would fight the decision, but finally gave up and ceased operations on February 29, 1976.
For the next several months, KOTA-TV had only PBS station KBHE-TV (channel 9) as a competitor. But when the new channel 7, KEVN-TV, opened on July 11, 1976, it took all ABC programming; KOTA-TV kept its NBC primary affiliation and added a secondary affiliation with CBS. Meanwhile, in Scottsbluff, Nebraska, KSTF, along with its parent station KYCU-TV (now KGWN-TV) in Cheyenne, Wyoming, both had to switch their primary affiliations to ABC to make up for the loss of ABC programming on KDUH.
Channel 3 lost CBS in 1981, after the FCC authorized K15AC (channel 15), a translator of KPLO-TV from Reliance (itself a satellite of KELO-TV, the CBS affiliate in Sioux Falls), over the objections of KOTA-TV (K15AC was supplanted in 1988 by KCLO-TV, a semi-satellite of KELO). KOTA-TV continued to carry NBC p
|
https://en.wikipedia.org/wiki/Joint%20Entrance%20Examination%20%E2%80%93%20Main
|
Joint Entrance Examination – Main (JEE-Main), formerly All India Engineering Entrance Examination (AIEEE), is an Indian standardised computer-based test for admission to various technical undergraduate programs in engineering, architecture, and planning across colleges in India. The exam is conducted by the National Testing Agency for admission to B.Tech, B.Arch, etc. programs in premier technical institutes such as the National Institutes of Technology (NIT) and Indian Institutes of Information Technology (IIIT), which are based on the rank secured in the JEE-Main. It is usually conducted twice every year. Since mid of 2019, the JEE has been conducted fully online as a computerised test.
History
The AIEEE was introduced in 2002, since the newly established NIT and IIIT universities wanted an entrance examination paper of a higher standard than the Common Engineering Test (CET), which was formerly used for admission to all non-IIT engineering universities, including even RECs and IIITs, owing mostly to the rising competition and the goal of maintaining the exclusiveness of such institutes of national importance. It was renamed to JEE-Main in 2013.
Until 2018, the exam was held both in pen and paper and CBT modes, as well as was held in the first week of April by the Central Board of Secondary Education (CBSE). It is conducted by National Testing Agency in CBT mode only from 2018 onwards.
The 2020 and 2021 exams were postponed and conducted later in the same years, due to the coronavirus pandemic. 2021 was the only year throughout JEE-Main history, when a maximum of 4 attempts were given to students. In general, for the rest of the years, most students took the JEE-Main exam in either 1 or 2 attempts, even though a maximum of 3 attempts is allowed during two consecutive years.
Structure
The examination consists of only two papers: Paper 1 for B.E./B.Tech courses and Paper 2 for B.Arch and B.Planning courses. A candidate can opt for any or both the papers. Paper 1 is mandatorily a computer based test (called online mode) from 2018 onwards. Until 2018, there was an option between offline pen and paper mode and online computer mode. The examination was conducted only in offline pen and paper mode till 2010. In 2011, as per the orders of the Ministry of Human Resource Development, CBSE conducted Paper 1 in Computer Based Test (CBT) mode for the first one lakh candidates who opted for the same, while the remaining students took the examination in the conventional pen and paper mode.
The number of attempts which a candidate can avail at the examination is limited to three in consecutive years. , the top 2,24,000 rankers of JEE-Main will qualify to take the second and final level of examination: JEE-Advanced.
In 2010, the Ministry of Human Resource Development announced plans to replace JEE with a common entrance test for all government engineering colleges which will be called Indian Science Engineering Eligibility Test (ISEET), by 2013. Accordin
|
https://en.wikipedia.org/wiki/South%20Dakota%20Public%20Broadcasting
|
South Dakota Public Broadcasting (SDPB) is a state network of non-commercial educational television and radio stations serving the U.S. state of South Dakota. The stations are operated by the South Dakota Bureau of Information and Telecommunication, an agency of the state government which holds the licenses for all of the PBS and NPR member stations licensed in South Dakota except KRSD in Sioux Falls, which is owned and run by Minnesota Public Radio, and KAUR in Sioux Falls, which is owned by Augustana University and operated by MPR. SDPB's studios and offices are located in the Al Neuharth Media Center on the campus of the University of South Dakota in Vermillion.
History
Educational broadcasting in South Dakota began in 1919 with experimental broadcasts at USD's College of Engineering. USD was granted a full license in 1922, and went on the air that May 29 as WEAJ. It became KUSD in 1925. By 1952, the station settled at 690 AM at 1,000 watts, operating only during daylight hours to protect CBF in Montreal. In 1967, it acquired an FM sister station, KUSD-FM at 89.7. Also in 1967, South Dakota State University in Brookings signed on KESD-FM. The three stations merged in 1982 as South Dakota Public Radio.
On July 5, 1961, KUSD-TV signed on the air as the state's first educational television station. Seven more stations signed on from 1967 to 1975, extending its reach to parts of Minnesota and Iowa.
South Dakota Public Radio merged with the State Board of Directors for Educational Television, which operated the television network, in 1985 to form South Dakota Public Broadcasting under the ownership of the Bureau of Information and Telecommunication. Between 1985 and 1991, five other stations joined the radio network. One of them was KCSD, which signed on in 1985 as part of a partnership between Sioux Falls College (now the University of Sioux Falls) and the ETV Board in an effort to improve the network's reception in South Dakota's largest city. Until 2013, KCSD's license was held by the University of Sioux Falls and operated by the state network under a management agreement. The network bought KCSD outright in 2013.
In 1992, a Chevrolet Suburban was taken on a joyride through the Vermillion Golf Course, where KUSD (AM)'s towers were located. The Suburban crashed into one of the AM station's towers and knocked it down. While a judge ordered the suspect to pay $48,000, the insurance settlement was not large enough to restore full operations, and KUSD (AM) went off the air for good in 1994.
KUSD-TV's signal had long been spotty in parts of Sioux Falls, even though the channel 2 analog signal traveled a very long distance under normal conditions. Some parts of the area didn't get a clear signal from KUSD-TV until cable gained more penetration in the 1980s. To solve this problem, KCSD-TV signed on in 1995, significantly improving coverage in the state's largest city.
As of February 2017, SDPR now broadcasts the main network over the fifth digital
|
https://en.wikipedia.org/wiki/KNBN
|
KNBN (channel 21) is a television station in Rapid City, South Dakota, United States, affiliated with NBC, MyNetworkTV and YTA TV. Owned by Jim Simpson's Rapid Broadcasting, the station maintains studios on South Plaza Drive in Rapid City, and its transmitter is located on Cowboy Hill west of downtown.
History
In March 1996, KEVN-TV's owner, Blackstar, announced plans to affiliate the longtime NBC outlet for the Rapid City area with the Fox network; Fox held an equity stake in Blackstar. This presented the possibility that Rapid City would be left without an NBC affiliate. Locally based Rapid Broadcasting, whose president Gilbert Moyle had been a part-owner of KEVN from 1973 to 1985, bought low-power TV station K24AM, a primarily Christian outlet which had broadcast since the mid-1980s, and increased its transmitter power. It also obtained the NBC affiliation for Rapid City for the low-power outlet, all with a month to go. KNBN-LP (channel 24, later KKRA-LP) officially launched July 15, the date that KEVN switched to Fox, and immediately appeared on local cable systems (including channel 10 in Rapid City).
KNBN launched without a local news presence. In December 1996, it began producing news cut-ins during Today. A full news service debuted September 22, 1997, as NewsCenter1, airing at 6 and 10 p.m. nightly; the early evening time slot contrasted with KOTA and KEVN, who presented their main news at 5:30. By the time that newscast had debuted, KNBN-LP—call sign and programming—had moved from the channel 24 station to channel 27 in Rapid City with a translator on channel 31 in Lead; the next year, KKRA became an affiliate of Pax TV. The channel 27 and 31 construction permits had been held by the Plaza Boulevard Wesleyan Church.
Rapid Broadcasting had been one of 11 applicants seeking to obtain a full-power license on channel 21. The passage of the Telecommunications Act of 1996 and Balanced Budget Act of 1997 forced the Federal Communications Commission (FCC) to scrap the comparative hearing process and led to the auction of the assignment in September 1999. Rapid made the winning bid, holding off four other hopefuls, notably including Sunbelt Communications Company. KNBN began broadcasting at full power on channel 21 on May 14, 2000.
News operation
KNBN presently broadcasts 16 hours of locally produced newscasts each week (with three hours each weekday and a half-hour each on Saturdays and Sundays).
Technical information
Subchannels
The signals of KNBN and KWBH-LD are multiplexed:
Translators
Gillette, WY
Lead
25 Rapid City
27 Rapid City
Analog-to-digital conversion
KNBN shut down its analog signal, over UHF channel 21, on February 1, 2009, and "flash-cut" its digital signal into operation on channel 21. The "flash-cut" was necessary as the station had its original construction permit granted after the FCC finalized the DTV allotment plan on April 27, 1997; as a result, the station did not have a companion channel for a digital signa
|
https://en.wikipedia.org/wiki/KWBH-LD
|
KWBH-LD (channel 27) is a low-power television station in Rapid City, South Dakota, United States. It is a translator of dual NBC/MyNetworkTV affiliate KNBN (channel 21) which is owned by Jim Simpson's Rapid Broadcasting. KWBH-LD's transmitter is located on Cowboy Hill west of downtown; its parent station maintains studios on South Plaza Drive in Rapid City.
History
The station signed on for the first time on April 2, 1998, as an NBC affiliate on analog channel 27 with the call letters KNBN-LP. In 2000, Rapid Broadcasting began airing NBC programming on full-power KNBN (channel 21). At the same time, channel 27 became a WB affiliate and carried programming from The CW Plus' predecessor, The WB 100+ Station Group. In September 2006, UPN and The WB merged to become The CW. KWBH-LP joined the new network upon its launch. In 2017, KWBH-LP switched to MyNetworkTV after losing The CW to a subchannel of CBS affiliate KCLO-TV (channel 15).
KWBH-LP went silent in March 2021, ahead of the FCC-mandated shutdown of analog LPTV stations on July 13. Its programming was carried in high definition on KNBN's second digital subchannel. KWBH-LP filed a digital license to cover application on December 16, 2021, indicating that it would rebroadcast KNBN. The station was licensed for digital operation effective February 4, 2022, changing its call sign to KWBH-LD.
Subchannels
References
External links
NewsCenter1
WBH-LD
NBC network affiliates
MyNetworkTV affiliates
Television channels and stations established in 1997
1997 establishments in South Dakota
WBH
|
https://en.wikipedia.org/wiki/HoneyMonkey
|
HoneyMonkey, short for Strider HoneyMonkey Exploit Detection System, is a Microsoft Research honeypot. The implementation uses a network of computers to crawl the World Wide Web searching for websites that use browser exploits to install malware on the HoneyMonkey computer. A snapshot of the memory, executables and registry of the honeypot computer is recorded before crawling a site. After visiting the site, the state of memory, executables, and registry is recorded and compared to the previous snapshot. The changes are analyzed to determine if the visited site installed any malware onto the client honeypot computer.
HoneyMonkey is based on the honeypot concept, with the difference that it actively seeks websites that try to exploit it. The term was coined by Microsoft Research in 2005. With honeymonkeys it is possible to find open security holes that are not yet publicly known but are being exploited by attackers.
Technology
A single HoneyMonkey is an automated program that tries to mimic the action of a user surfing the net. A series of HoneyMonkeys are run on virtual machines running Windows XP, at various levels of patching — some are fully patched, some fully vulnerable, and others in between these two extremes. The HoneyMonkey program records every read or write of the file system and registry, thus keeping a log of what data was collected by the web-site and what software was installed by it. Once the program leaves a site, this log is analyzed to determine if any malware has been loaded. In such cases, the log of actions is sent for further manual analysis to an external controller program, which logs the exploit data and restarts the virtual machine to allow it to crawl other sites starting in a known uninfected state.
Initiating crawling
Out of the 10 billion plus web pages, there are many legitimate sites that do not use exploit browser vulnerabilities, and to start crawling from most of these sites would be a waste of resources. An initial list was therefore manually created that listed sites known to use browser vulnerabilities to compromise visiting systems with malware. The HoneyMonkey system then follows links from exploit sites, as they had higher probability of leading to other exploit sites. The HoneyMonkey system also records how many links point to an exploit site thereby giving a statistical indication of how easily an exploit site is reached.
Exploit detection
HoneyMonkey uses a black box system to detect exploits, i.e., it does not use a signature of browser exploits to detect exploits. A Monkey Program, a single instance of the HoneyMonkey project, launches Internet Explorer to visit a site. It also records all registry and file read or write operations. The monkey does not allow pop-ups, nor does it allow installation of software. Any read or write that happens out of Internet Explorer's temporary folder therefore must have used browser exploits. These are then analyzed by malware detection programs and then manually
|
https://en.wikipedia.org/wiki/SmartFTP
|
SmartFTP is a network file transfer program for Microsoft Windows that supports file transfer via FTP, FTPS, SFTP, WebDAV, Amazon S3, Google Drive, Microsoft OneDrive, Box, Google Cloud Storage and Backblaze B2 protocols. It supports SSL/TLS, IPv6 and FXP, and features a transfer queue, proxy and firewall support, multiple connections, chmod features and drag-and-drop. The software uses the Windows API for its interface. It is available for both IA-32 and x64 editions of Windows.
Prior to July 2008, the program was free to home or non-profit users.
Editions
SmartFTP is available in three editions:
Professional
FTP, FTPS
SFTP over SSH
WebDAV
Text Editor
Ultimate
All features of the Professional Edition
Google Drive
OneDrive support
Terminal client
Enterprise
All features of the Ultimate Edition
Amazon S3
Google Cloud Storage
Backblaze B2
Box
Task scheduler
See also
Comparison of FTP client software
References
External links
Official website
SmartFTP UI discussed in "The semiotic engineering of human-computer interaction, Clarisse Sieckenius De Souza, MIT Press"
Introduction to SmartFTP 4.0 with Texteditor and Terminal (German)
FTP clients
Windows Internet software
Windows-only trialware
|
https://en.wikipedia.org/wiki/CTV%20National%20News
|
CTV National News is the flagship newscast of CTV News, the news division of the CTV Television Network, which airs at 11:00 pm local time on the CTV stations across Canada, and is produced from CTV's facilities at 9 Channel Nine Court in Scarborough, Toronto, Ontario. It also airs on CTV News Channel, CTV's 24-hour cable news television channel, live at 10:00 pm Eastern—or 11:00 Atlantic, when the newscast begins its nightly run across the network—with hourly repeats until 2:00 am Eastern (11:00 pm Pacific). The previous day's newscast can be seen on the Internet.
The newscast is presented by Omar Sachedina since September 5, 2022 who succeeded longtime anchor Lisa LaFlamme while Sandie Rinaldo anchors the program's weekend broadcasts.
The program is also broadcast in High-Definition.
LaFlamme succeeded veteran anchor Lloyd Robertson during the second half of 2011, following Robertson's retirement. Substitute anchors include Rinaldo (for weekday broadcasts), Anne-Marie Mediwake, Todd van der Heyden, Joy Malbon, Vassy Kapelos, John Vennavally-Rao, Heather Butts, Heather Wright, Merella Fernandez and Jon Erlichman.
The title CTV National News was rarely used in the 1990s and early 2000s; weeknights, the program was called CTV News with Lloyd Robertson and on the weekends, CTV News with Sandie Rinaldo. The title CTV National News was reintroduced in 2008, because CTV News had become the name of both the national and local news on CTV owned-and-operated (O&O) stations, although the banner continues to bear the title CTV News.
The newscast ran for 20 minutes until it was expanded to a half-hour on September 5, 1988. Prior to 1992, the newscast ran a perennial second in national news ratings to CBC Television's The National. In that year, its ratings jumped significantly after the CBC's unsuccessful renaming of its newscast as Prime Time News. CTV National News became the top-rated newscast for the first time in its history.
Local newscasts are never broadcast nationally. Stories from local stations that have national importance are taken from the local O&O, and a 'national reporter' re-does the story, often from a location hundreds or even thousands of miles from the location of the story. The national reporter always mentions their name and location where they are based at the end of the story, even though that location is often different from the location of the story.
Until September 1998, CTV National News aired at midnight in the Maritime provinces. This was because CTV National News only produced one edition for the entire network, which aired live at 11:00 pm EST. When CTV Atlantic was purchased by Baton Broadcasting in 1997, one of the improvements was for CTV News to produce a second edition of the national newscast that would air in the Atlantic time zone at 11:00 pm. CTV National News moved to its new time in September 1998.
CTV National News is not the same as CTV Evening News, a title that appears in some national ratings report
|
https://en.wikipedia.org/wiki/Conservatoire%20de%20musique%20du%20Qu%C3%A9bec%20%C3%A0%20Saguenay
|
The Conservatoire de musique du Québec à Saguenay is a music conservatory located in Saguenay, Quebec, Canada. The conservatory was opened in 1967 and is part of a network of 9 conservatories in Quebec, the Conservatoire de musique et d'art dramatique du Québec (CMADQ), and was the seventh school in the CMADQ network to be established. Approximately 85 pupils are enrolled at the conservatory. Pierre Bourque served as the school's director in 1972–1973.
External links
Conservatoire de Musique de Saguenay Website
Conservatoire de musique et d'art dramatique du Québec
Government colleges in Quebec
Music schools in Canada
Educational institutions established in 1967
Education in Saguenay, Quebec
|
https://en.wikipedia.org/wiki/Transmission%20Time%20Interval
|
TTI, Transmission Time Interval, is a parameter in UMTS (and other digital telecommunication networks) related to encapsulation of data from higher layers into frames for transmission on the radio link layer. TTI refers to the duration of a transmission on the radio link. The TTI is related to the size of the data blocks passed from the higher network layers to the radio link layer.
To combat errors due to fading and interference on the radio link, data is divided at the transmitter into blocks and then the bits within a block are encoded and interleaved. The length of time required to transmit one such block determines the TTI. At the receiver all bits from a given block must be received before they can be deinterleaved and decoded. Having decoded the bits the receiver can estimate the bit error rate (BER). And because the shortest decodable transmission is one TTI the shortest period over which BER can be estimated is also one TTI. Thus in networks with link adaptation techniques based on the estimated BER the shortest interval between reports of the estimated performance, which are used to adapt to the conditions on the link, is at least one TTI. In order to be able to adapt quickly to the changing conditions in the radio link a communications system must have shorter TTIs. In order to benefit more from the effect of interleaving and to increase the efficiency of error-correction and compression techniques a system must, in general, have longer TTIs. These two contradicting requirements determine the choice of the TTI.
In UMTS Release '99 the shortest TTI is 10 ms and can be 20 ms, 40 ms, or 80 ms. In UMTS Release-5 the TTI for HSDPA is reduced to 2ms. This provides the advantage of faster response to link conditions and allows the system to quickly schedule transmissions to mobiles which temporarily enjoy better than usual link conditions. As a result the system most of the time transmits data over links which are better than the average conditions, because of this the bit rates in the system most of the time are higher than what the average conditions would allow. This leads to increase in system capacity.
In 1xEV-DO technology, a slot, which is not quite the same thing as the TTI, but which still fulfills a somewhat similar function, is 1.667 ms. In 1xEV-DV it has a variable length of 1.25 ms, 2.5 ms, 5 ms, and 10 ms.
Mobile telecommunications standards
|
https://en.wikipedia.org/wiki/Chuck%20Sannipoli
|
Charles Joseph Sannipoli (1945-2015) was an executive in the computer networking industry, having served for more than 3 decades in many roles.
Life
He held a Bachelor of Electrical Engineering degree from the Georgia Institute of Technology and was a Senior Member of the IEEE. He was a resident of North Carolina.
Sannipoli completed a long career at IBM during which he held key senior management positions in the networking business area, spanning hardware and software research and development, as well as product and program management. He was involved in IBM's Rainier network processor development effort. He holds several patents and has patents pending in IBM's portfolio based on network processing technology.
Sannipoli served as the vice president and general manager of the Network Processor Group at IP Infusion Inc. This is a firm which specialized in delivering software to the communications and networking marketplace. It was sold to the Japanese company Access in 2006.
Sannipoli was instrumental in the creation of, and was the initial chairman of the Network Processing Forum (NPF), a position he held until his departure from IBM. The NPF is the standards body dedicated to creating a standards-oriented marketplace around the emerging technology of Network Processing. He was reelected to the NPF board of directors in June 2002 on behalf of IP Infusion and was elected to serve as chairman again in 2005. The NPF merged with the Optical Internetworking Forum (OIF) in June 2006, and Sannipoli was elected to the OIF board of directors in October 2006.
He died on December 8, 2015.
References
1945 births
2015 deaths
People with Parkinson's disease
IBM employees
Georgia Tech alumni
Senior Members of the IEEE
|
https://en.wikipedia.org/wiki/Hope%20and%20Fear
|
"Hope and Fear" is the 26th and final episode of the fourth season of the American science fiction television series Star Trek: Voyager. The episode first aired on the UPN network on May 20, 1998. Directed by Winrich Kolbe, it was developed from a story by Rick Berman, Brannon Braga and Joe Menosky into a teleplay by Menosky and Braga. "Hope and Fear" was the final episode of the Star Trek franchise to be worked on by executive producer Jeri Taylor.
Set in the 24th century, the series follows the adventures of the Starfleet and Maquis crew of the starship USS Voyager after they were stranded in the Delta Quadrant far from the rest of the Federation. In this episode, the Voyager crew discover a ship sent from Starfleet that could take them back to the Alpha Quadrant in just 3 months, but it will mean abandoning their vessel. However, it is all revealed to be an elaborate trap as the alien Arturis (Ray Wise) attempts to gain his revenge on the crew for preventing the destruction of the Borg.
A variety of ideas were proposed for the season finale, with focus given to those plots relating to "slipstream" technology. The alien, named Arturis, was referred to as Yoda prior to being properly named. The sets for the fake Starfleet vessel, the USS Dauntless, were created by production designer Richard James. He sought to enable a quick change from the Starfleet appearance into something more alien. Rick Sternbach created the exterior of the vessel. Wise was cast as Arturis without auditioning, and the character's makeup was re-purposed by Michael Westmore from a design created for another television series. The episode was shot between February 28 and March 11. The final cut of "Hope and Fear" with special effects was delivered by April 30, with the score by Dennis McCarthy recorded on May 5. The episode received Nielsen ratings of 4.1/7 percent. One critic complained of continuance of the status quo in the series. However, it was warmly received by others and has been featured in best of lists, both of the season and of the series.
Plot
Captain Kathryn Janeway (Kate Mulgrew) continues to struggle in deciphering an encrypted Starfleet message that they previously obtained through the Hirogen relay system ("Hunters"). Neelix (Ethan Phillips) returns to Voyager with a guest, Arturis (Ray Wise), who helped him obtain supplies. Arturis learns of the encoded message and helps decrypt it. The message is from Starfleet Command, with a nearby set of coordinates where their means of getting back home can be found. Though the rest of the crew is elated at this news, Seven of Nine (Jeri Ryan) remains cautious, given that the Borg have never been able to assimilate Arturis' species. Voyager arrives at the provided coordinates to find an unmanned Starfleet vessel, the Dauntless, of unknown design. Aboard, they find the ship uses quantum slipstream technology, which will allow them to reach the Alpha Quadrant within a few months.
Janeway begins to share Seven's su
|
https://en.wikipedia.org/wiki/List%20of%20Alaska%20Airlines%20destinations
|
Alaska Airlines is a major airline in the United States, headquartered in the Seattle metropolitan area, Washington. , its combined network offers 1,200 flights to more than 115 destinations in the United States, Canada, Mexico, Costa Rica, and Belize under the Alaska Airlines and Horizon Air brands. Its primary hubs are Seattle–Tacoma International Airport, Portland International Airport, Ted Stevens Anchorage International Airport, and Los Angeles International Airport.
The airline was founded in 1932 and, during the period of regulation, connected numerous airstrips in Alaska to major cities, and the state of Alaska to Seattle. As late as at least 1979, Alaska only served Seattle in the lower 48, though they did offer connecting service to Texas on Braniff International Airlines. Alaska also flew to Portland starting in 1951, but later discontinued the route.
After deregulation in 1978, Alaska began connecting California cities to Seattle. In 1985, the airline first served a state that didn't border the Pacific Ocean, starting service to Boise, Idaho, Phoenix, Arizona, and Tucson, Arizona.
Alaska expanded to Mexico in 1988 and began adding destinations in the Midwestern and Eastern United States in the early 2000s. Alaska's first transcontinental route was to Washington, D.C. in 2001. Competition between Alaska Airlines and Delta Air Lines for control of Seattle resulted in a larger expansion in the 2010s. The acquisition of Virgin America by the Alaska Air Group added service to Dallas Love Field when the brands merged in early 2018.
Alaska started service to the state of Hawaii in 2007. After six years of service they flew 11% of all passenger traffic to the state.
In May 2017, Alaska announced that it would begin flying from Paine Field in Everett, Washington, the first airline to announce scheduled flights from this airport.
Historical destinations
Alaska was the only airline to fly from the west coast of the United States to Havana, Cuba, with a flight from Los Angeles, which operated from 2017 to 2018. After a seasonal drop in demand, and travel restrictions placed by the Trump administration, the route was discontinued a year after launch.
Beginning in 1991, Alaska Airlines operated weekly service to cities in Eastern Russia from Anchorage, Alaska. The service was canceled in 1998 after the Russian financial crisis.
List
The following is a list of destinations that are served or have been served by Alaska Airlines. These do not include destinations flown only by Horizon Air. Previous cities flown solely by Horizon Air include: Arcata-Eureka, Astoria, Butte, Flagstaff, Klamath Falls, Lewiston, Mammoth Lakes, North Bend-Coos Bay, Pendleton, Port Angeles, Prescott, Prince George, Salem, and Twin Falls.
Key
References
Lists of airline destinations
Alaska Air Group
Oneworld destinations
Alaska transportation-related lists
|
https://en.wikipedia.org/wiki/Fairchild%20TV%20News
|
Fairchild TV News is the news division of Fairchild TV, a Cantonese cable television network in Canada. It competes against the Cantonese Omni News broadcasts aired by Rogers' Omni Television stations. Since 2017, Fairchild has produced the Chinese-language newscasts aired by Omni.
Operations
Fairchild TV produces one hour-long newscast every day. It airs at 19:00 local time in both Vancouver and Toronto.
From 19:00 to 19:30, the newscast is produced separately from newsrooms in Vancouver and Toronto, and the audience in each market receives its own appropriate edition. Domestic and international news items are covered (with the items often shared between the two editions). Local news items are tailored specifically for each edition so the coverage is relevant to its local audience (i.e. local news items from Toronto will seldom appear on the Vancouver edition, and vice versa). The two editions are also presented by different anchors, with each newsroom supplying two of its own on-air personnel.
Due to Toronto being 3 hours ahead of Vancouver and such, their newscast being broadcast first, from 19:30 to 20:00, the non-local newscast segments are produced at the Toronto newsroom and repeated in Vancouver. This section of the newscast covers news items from the Greater China region (China, Hong Kong and Taiwan), lifestyle and feature reports, business news, sports and weather. A separate Toronto-based sports anchor presents the sports segment, and the two Toronto news anchors handle the business report and weather forecast.
Fairchild TV does have several reporters based in both cities to cover local news. However, most local and national/international news footages are usually sourced from the mainstream networks (in general Global TV for the former, and Canadian Broadcasting Corporation for the latter), with footages from the Greater China region provided by China Central Television (CCTV) in mainland China, TVB in Hong Kong, and various sources in Taiwan.
The nightly newscast is lived at 11:30 pm local time.
News production is completely handled in Toronto on weekends. The newscast goes from 7:00pm to 7:40pm on Saturdays, and 7:00pm to 7:30pm on Sundays.
Fairchild TV does not have designated anchors for its newscast. Instead, its anchor lineup varies from night to night, as was the usual practice at television stations in Hong Kong. (Hong Kong’s TVB currently assigns shifts to its anchors on an approximately monthly basis).
In 2017, Rogers Communications subcontracted Fairchild to produce the relaunched Cantonese and Mandarin-language Omni News programs for Omni Television; the newscasts are produced under the direction and editorial control of Rogers.
History
Until 2001
Prior to 2001, Fairchild’s Vancouver and Toronto operations were separate. The station operated as two separate feeds, one for each city, and the two feeds often had slightly different schedules from each other.
Each feed also had its own completely separate newscast
|
https://en.wikipedia.org/wiki/Microsoft%20BackOffice%20Server
|
Microsoft BackOffice Server is a discontinued computer software package featuring Windows NT Server and other Microsoft server products that ran on NT Server. It was marketed during the 1990s and early 2000s for use in branch operations and for small businesses to run their back office operations.
The small business edition of BackOffice Server was released for versions 4.0 and 4.5. In 2000 it was spun off from the "BackOffice" brand, becoming a variant of Windows Server branded as Windows Small Business Server. BackOffice Server itself was discontinued on October 1, 2001.
Software included
Besides Windows NT Server, versions of BackOffice Server suite also included Microsoft SQL Server, Microsoft SNA Server, Microsoft Systems Management Server (SMS), Microsoft Mail Server or Microsoft Exchange Server, Microsoft Proxy Server or Microsoft Internet Security and Acceleration (ISA) Server, and Internet Information Services (IIS). The "Small Business" editions omitted SNA Server and SMS.
Versions
late 1994 — BackOffice 1.0 – includes Windows NT Server 3.5, Microsoft SQL Server 4.21a, Microsoft SNA Server 2.1, Microsoft SMS 1.0, and Microsoft Mail Server 3.2.
late 1995 — BackOffice 1.5 – includes Windows NT Server 3.51, Microsoft SQL Server 6.0, Microsoft SNA Server 2.11, Microsoft SMS 1.1, and Microsoft Mail Server 3.5.
April 25, 1996 — BackOffice 2.0 – includes Windows NT Server 3.51, Microsoft Internet Information Services 1.0, Microsoft SQL Server 6.0 or 6.5, Microsoft SNA Server 2.11, Microsoft SMS 1.1, and Microsoft Exchange Server 4.0.
December 1996 — BackOffice 2.5 – includes Windows NT Server 4.0, Internet Information Services 2.0, Microsoft SQL Server 6.5, Microsoft SNA Server 3.0, Microsoft SMS 1.2, Microsoft Exchange Server 4.0, Microsoft Proxy Server 1.0, Microsoft Index Server 1.1, Internet Explorer 3.01, and FrontPage 1.1
December 9, 1997 — BackOffice Server 4.0 – includes Windows NT Server 4.0 SP3, Internet Information Services 3.0, Microsoft SQL Server 6.5, Microsoft SNA Server 4.0, Microsoft SMS 1.2, Microsoft Exchange Server 5.5, Microsoft Proxy Server 2.0, Microsoft Index Server 2.0, Microsoft Transaction Server 2.0, Microsoft Site Server 3.0, Microsoft FrontPage 98, and Visual InterDev 1.0.
January 12, 1999 — BackOffice Server 4.5 – includes Windows NT Server 4.0 SP4, Internet Information Services 4.0, Microsoft SQL Server 7.0, Microsoft SNA Server 4.0 SP2, Microsoft SMS 2.0, Microsoft Exchange Server 5.5 SP2, Microsoft Proxy Server 2.0, Microsoft Index Server 2.0, Microsoft Transaction Server 2.0, Internet Explorer 5.0, Microsoft FrontPage 2000, and Microsoft Visual InterDev 6.0.
February 28, 2001 — BackOffice Server 2000 – includes Windows 2000 Server, Microsoft SQL Server 2000, Microsoft SMS 2.0, Microsoft Exchange Server 2000, Microsoft ISA Server 2000, and Microsoft Host Integration Server 2000.
Requirements
BackOffice Server 4.5 with 1 server license and 5 clients access licenses (CAL) was marketed for US$675. It
|
https://en.wikipedia.org/wiki/Netroots
|
Netroots is a term coined in 2002 by Jerome Armstrong to describe political activism organized through blogs and other online media, including wikis and social network services. The word is a portmanteau of Internet and grassroots, reflecting the technological innovations that set netroots techniques apart from other forms of political participation. In the United States, the term is used mainly in left-leaning circles.
The term necessarily overlaps with the related ideas of e-democracy, open politics, and participatory democracy—all of which are somewhat more specific, better defined, and more widely accepted. Netroots outreach is a campaign-oriented activity that uses the web for complementing more traditional campaign activities, such as collaborating with grassroots activism that involves get out the vote and organizing through interconnecting local and regional efforts, such as Meetup, and the netroots-grassroots coalition that propelled the election of Howard Dean to the DNC Chair in January, 2005.
At times, the term netroots is used interchangeably with the term blogosphere, though the blogosphere is considered a subset of netroots in that blogosphere describes just the online community of blogs, where netroots includes that plus a number of larger (mainly liberal) on-line outposts such as MoveOn, Media Matters for America and Think Progress.
Advocates claim that the essential quality of the netroots is its flatness and inter-linked web connectiveness—that it constitutes communication points that reach out to influence traditional media, but is not directed outward from any one point. Through events like a blogswarm, the netroots displays non-hierarchical and decentralized features.
American origins of term
The first popular use of the term in its modern definition is Netroots for Howard Dean, by Jerome Armstrong in December 2002 on MyDD. Democratic political consultant Joe Trippi credits the short lived success of his then-client Howard Dean to their listening and taking the lead from netroots activity.
The netroots also played a key role in drafting General Wesley Clark into the 2004 Presidential campaign. The growing power of the netroots was seen most recently during the 2006 midterm elections. In one such instance, a volunteer for the senate campaign of Democrat James Webb of Virginia filmed remarks by then-Senator George Allen. The remarks in question, in which Senator Allen referred to the volunteer as a "macaca" (the volunteer was of South Asian ethnicity), were viewed by many as being racially insensitive. The video was posted on the popular video-sharing website YouTube. The resulting netroots attention to the video triggered a series of events that resulted in the defeat of the incumbent senator. James Webb had, in fact, been the subject of a successful netroots draft, which resulted in his entry into the Virginia senate race. Netroots activists also supported Ned Lamont in his 2006 primary victory over Democratic Se
|
https://en.wikipedia.org/wiki/QuesTec
|
QuesTec was a digital media company that pioneered virtual replay from real-time measurement data for baseball and tennis. Years before competitors introduced similar products, QuesTec had established a reputation for accuracy and reliability. Although originally based on internally developed technology, in 1998 QuesTec moved to tracking technology provided by engineers at the Atlantic Aerospace Electronics Corporation (now a division of L-3 Communications). QuesTec is best known for its Umpire Information System (UIS), used by Major League Baseball for the purpose of providing feedback and evaluation of Major League umpires.
The QuesTec company, based out of Deer Park, New York, was mostly involved in television replay and graphics throughout its history. In 2001, however, the company signed a 5-year contract with Major League Baseball to use its pitch tracking technology as a means to review the performance of home plate umpires during baseball games. The contract continued through the 2008 season through annual extensions.
The Umpire Information System
The UIS consists of four cameras placed around a ballpark that feed into a computer network and record the locations of pitches throughout the course of a game. Two of the cameras are located high in the stands above the 1st and 3rd base lines to track the trajectory of each pitch. The other two are located at field level and record the stance of the batter so the top and bottom of the strike zone can be set. Computer software then generates CDs that umpires and MLB executives can review and learn from. These CDs include video of the pitches as well as graphic representations of their locations plus feedback on the umpires' accuracy. The UIS was featured in a 2002 segment of PBS's Scientific American Frontiers called "Baseball Tech".
When first introduced, controversy over the Umpire Information System quickly developed as umpires and players alike voiced concern over the system's accuracy and the fact that limited deployment (6 parks in the first year) might not guarantee uniform umpiring in the remaining parks. In its early trial period, baseball analysts questioned whether QuesTec was producing the consistency in umpiring that was supposed to occur. A report by a QuesTec operator a year later suggested that the system still needed to be tweaked. The controversy was fueled, in part, by several attempts by the World Umpires Association (WUA) to have the system removed through legal action, culminating in a dispute filed with the National Labor Relations Board (NLRB). Meanwhile, a more hands-on approach was taken by former Arizona Diamondbacks pitcher Curt Schilling; Schilling used a bat to smash one of QuesTec's field cameras after being told by an umpire that he wanted to call some of his pitches strikes, but QuesTec made him call them balls, an act that led to a fine for the pitcher. The NLRB grievance was dropped by the WUA as part of the contract negotiations with MLB after the 2005
|
https://en.wikipedia.org/wiki/Final%20%28Java%29
|
In the Java programming language, the final keyword is used in several contexts to define an entity that can only be assigned once.
Once a final variable has been assigned, it always contains the same value. If a final variable holds a reference to an object, then the state of the object may be changed by operations on the object, but the variable will always refer to the same object (this property of final is called non-transitivity). This applies also to arrays, because arrays are objects; if a final variable holds a reference to an array, then the components of the array may be changed by operations on the array, but the variable will always refer to the same array.
Final classes
A final class cannot be subclassed. As doing this can confer security and efficiency benefits, many of the Java standard library classes are final, such as and .
Example:
public final class MyFinalClass {...}
public class ThisIsWrong extends MyFinalClass {...} // forbidden
Final methods
A final method cannot be overridden or hidden by subclasses. This is used to prevent unexpected behavior from a subclass altering a method that may be crucial to the function or consistency of the class.
Example:
public class Base
{
public void m1() {...}
public final void m2() {...}
public static void m3() {...}
public static final void m4() {...}
}
public class Derived extends Base
{
public void m1() {...} // OK, overriding Base#m1()
public void m2() {...} // forbidden
public static void m3() {...} // OK, hiding Base#m3()
public static void m4() {...} // forbidden
}
A common misconception is that declaring a method as final improves efficiency by allowing the compiler to directly insert the method wherever it is called (see inline expansion). Because the method is loaded at runtime, compilers are unable to do this. Only the runtime environment and JIT compiler know exactly which classes have been loaded, and so only they are able to make decisions about when to inline, whether or not the method is final.
Machine code compilers that generate directly executable, platform-specific machine code, are an exception. When using static linking, the compiler can safely assume that methods and variables computable at compile-time may be inlined.
Final variables
A final variable can only be initialized once, either via an initializer or an assignment statement. It does not need to be initialized at the point of declaration: this is called a "blank final" variable. A blank final instance variable of a class must be definitely assigned in every constructor of the class in which it is declared; similarly, a blank final static variable must be definitely assigned in a static initializer of the class in which it is declared; otherwise, a compile-time error occurs in both cases. (Note: If the variable is a reference, this means that the variable cannot be re-bound to reference another object. But the object that it references is still muta
|
https://en.wikipedia.org/wiki/Steven%20Anson%20Coons
|
Steven Anson Coons (March 7, 1912 – August 1979) was an early pioneer in the field of computer graphical methods. He was a professor at the Massachusetts Institute of Technology in the Mechanical Engineering Department. He was also a professor at Syracuse University after leaving MIT. Steven Coons had a vision of interactive computer graphics as a design tool to aid the engineer.
Work
While a student at MIT, Steven Anson Coons was employed by the Chance Vought Aircraft Company, in the Master Dimensions Department. He developed a new conic curve based on the unit square. He published a report entitled An Analytic Method for Calculations of the Contours of Double Curved Surfaces. The surface was controlled by one through seventh order polynomials and each curve was express as being one unit long and the element plane in a unit square. The polynomials are written:
and
This concept allows for the approximate matching of any curve, conic or not. The surface element plane normally a conic curve was expressed as:
By selecting proper values for Φ (similar to K in the conic family) in this equation:
the curve will be fixed. By arbitrarily choosing values of Φ, u and w could be solved for:
During World War II, he worked on the design of aircraft surfaces, developing the mathematics to describe generalized "surface patches." At MIT's Electronic Systems Laboratory he investigated the mathematical formulation for these patches, and published one of the most significant contributions to the area of geometric design, a treatise which has become known as "The Little Red Book" in 1967. His "Coons patch" was a formulation that presented the notation, mathematical foundation, and intuitive interpretation of an idea that would ultimately become the foundation for surface descriptions that are commonly used today, such as b-spline surfaces, NURB surfaces, etc. His technique for describing a surface was to construct it out of collections of adjacent patches, which had continuity constraints that would allow surfaces to have curvature which was expected by the designer. Each patch was defined by four boundary curves, and a set of "blending functions" that defined how the interior was constructed out of interpolated values of the boundaries.
Coons's students included Ivan Sutherland and Lawrence Roberts, both of whom went on to make numerous contributions to computer graphics and (in Roberts' case) to computer networks. Coons also advised Nicholas Negroponte.
Coons co-authored, with John Thomas Rule, a book on mechanical drawing and graphic methods entitled Graphics c. 1961.
Steven A. Coons Award
The Association for Computing Machinery SIGGRAPH has an award named for Coons. The Steven Anson Coons Award for Outstanding Creative Contributions to Computer Graphics is given in odd-numbered years to an individual to honor that person's lifetime contribution to computer graphics and interactive techniques. It is considered the field's mos
|
https://en.wikipedia.org/wiki/SES%20S.A.
|
SES S.A. is a Luxembourgish satellite telecommunications network provider supplying video and data connectivity worldwide to broadcasters, content and internet service providers, mobile and fixed network operators, governments and institutions.
SES is one of the world's leading satellite owners and operators with over 70 satellites in two different orbits, geostationary orbit (GEO) and medium Earth orbit (MEO). These include the well-known European Astra TV satellites, the O3b and O3b mPOWER data satellites and others with names including AMC, Ciel, NSS, Quetzsat, YahSat and SES.
Based in Betzdorf, Luxembourg and founded in 1985 as Société Européenne des Satellites, the company was renamed SES Global in 2001 and has been simply "SES" since 2006. The company's stock is listed on the Luxembourg Stock Exchange and Euronext Paris with ticker symbol SESG and is a component of the LuxX, CAC Next 20 and Euronext 100 stock market indexes.
A book, High Above, telling the story of the founding of SES and the development of its first Astra satellites was published in 2010 to mark the company's 25th Anniversary, and was followed by Even Higher in 2012 and Beyond Frontiers in 2016.
Business and services
SES has customers across the World, with revenue by country in 2022 (according to clients' billing addresses) as follows:
SES provides services through two business units, SES Video and SES Networks, for video-centric and data-centric markets, respectively.
SES Video
(52% of revenue)SES Video's business comprises video distribution and video services. Video distribution delivers video content via Direct-to-Home, Direct-to-Cable and Internet Protocol television (IPTV) platforms, and includes wholly owned subsidiary HD+, the direct-to-consumer high-definition digital satellite TV platform in Germany. Video services encompasses technical ground services, such as content management, playout, encryption, satellite uplinks and interactive services, to broadcasters worldwide.
SES has been a major player in the development of the direct-to-home market in Europe and the cable TV and Direct-broadcast satellite (DBS) markets in the United States. SES satellites transmit a variety of digital formats from radio to Ultra High Definition TV (UHDTV) and the company has been instrumental in defining technical standards for broadcast and interactive media.
At the end of 2022, SES satellites carried over 8000 TV channels, including more than 3000 HD and UHD channels, to more than 1 billion people in 369 million homes globally, or regionally as follows:
In March 2022, SES reported that the breakdown of revenue to SES Video by different sectors was as follows:
SES Networks
(48% of revenue)SES Networks provides managed connectivity services to customers in markets including telecommunications, Cloud computing, commercial air and shipping, holiday cruises, energy, mining, and government and institutional areas, with end users of the technology including internet users i
|
https://en.wikipedia.org/wiki/Cyveillance
|
Cyveillance is an American cybersecurity company founded in 1997, based in Reston, Virginia. The company provides cybersecurity services including brand protection, social media monitoring and threat investigation, analysis, and response services. Its Cyveillance Intelligence Center subscription-based product monitors for information leaks; phishing and malware attacks and other online fraud schemes; sale of stolen credit and debit card numbers; threats to executives and events; counterfeiting; and trademark and brand abuse.
History
Cyveillance was founded in 1997 by Brandy Thomas, Christopher Young, Mark Bildner, and Jason Thomas. It was originally called Online Monitoring Services but was renamed in 1998 to Cyveillance.
From 1997 to 2009, Cyveillance was privately held. QinetiQ North America, a provider of information technology and engineering solutions to the U.S. government, acquired Cyveillance in May 2009. In 2013 QinetiQ North America expanded the Cyveillance management team by the appointment of technical and marketing executives. The acquisition was made for an initial cash consideration of $40 million. Current management was also entitled to an additional $40 million at the anniversary of the closing dependent on hitting certain performance numbers.
LookingGlass Cyber Solutions purchased Cyveillance in 2015 and re-launched the brand in May 2020.
In October 2020, the Baltimore-based digital risk protection company ZeroFOX acquired Cyveillance.
The company's clients include the United States Secret Service, which contracts Cyveillance to search available information related to the Secret Service and its missions. Information obtained through Cyveillance is incorporated into the Protective Research Information Management System (PRISM), an existing Secret Service system. The company's other clients are in the financial services, energy, technology, retail, and pharmaceutical industries, and it provides open source internet intelligence to over 400 clients, including half of the Fortune 100.
Criticisms
Criticisms of Cyveillance traffic have included the following:
Their robots send many fake HTTP attacks which are a cover channel for deadly (accept, read, write) timeout attacks that easily disrupt Apache and IIS servers.
They use a falsified user-agent string, usually pretending to be some version of Microsoft Internet Explorer on some version of Windows, which can throw off log analysis.
Because they falsify their string agent and otherwise obscure their identity, (they may also appear in weblogs as PSINet), individuals may not be aware of the existence of Cyveillance and the data its collects and reports to the Secret Service.
On 2 July 2014 Cyveillance sent a DMCA takedown notice to GitHub on behalf of Qualcomm which caused 116 files (and the repositories they were in) to be blocked on GitHub. Some of the blocked repositories were owned by CyanogenMod, Sony Mobile and even one of Qualcomm's own repositories leading to speculat
|
https://en.wikipedia.org/wiki/ABC%20Sports%20Indy%20Racing
|
ABC Sports Indy Racing is a racing computer game made in 1997. It was officially licensed by the Indy Racing League.
Gameplay
The game is based on 1996–97 Indy Racing League season and features the drivers and the tracks from that season. The game also features the USAC Silver Crown Series, USAC Sprint Cars, and USAC Midgets that can race at Indianapolis Raceway Park, Phoenix Raceway, Eldora Speedway, Winchester Speedway, and Terre Haute Action Track.
Notably, alcohol car sponsors appear in the game despite often being censored in other video games based on real-life racing series.
The game also featured online multiplayer that supported up to four players.
Reception
References
1997 video games
IndyCar Series video games
Windows games
Indy Racing
Multiplayer and single-player video games
Video games developed in the United States
|
https://en.wikipedia.org/wiki/CTV%20News
|
CTV News is the news division of the CTV Television Network in Canada. The name CTV News is also applied as the title of local and regional newscasts on the network's owned-and-operated stations (O&Os), which are closely tied to the national news division. Local newscasts on CTV 2 are also branded as CTV News, although in most cases they are managed separately from the newscasts on the main CTV network.
National programs
CTV's national news division produces the following programs which air on the main CTV network:
CTV National News, the nightly newscast anchored by Omar Sachedina (weekdays) and Sandie Rinaldo (weekends);
W5, a weekly newsmagazine series; and
Question Period, a weekly news and interview series.
CTV News also operates the national 24-hour news channel CTV News Channel and the 24-hour national business news channel BNN Bloomberg, both of which are available across Canada on cable and satellite.
The news division produced the weekday morning news and entertainment program Canada AM from 1972 to October 2015, when responsibility for the program was transferred to Bell Media In-House Productions, the division responsible for CTV's other daytime lifestyle programming, until the program's cancellation in June 2016. Canada AM'''s replacement Your Morning is produced by Bell Media In-House Productions (now Bell Media Studios), with news content provided by CTV News.
Local programs
In most markets, local CTV News programs air at noon, 6 p.m., and 11:00 p.m. (CTV 2) or 11:30 p.m. (CTV) on weekdays, and at 6 p.m. and 11:00 p.m. / 11:30 p.m. on weekends. In selected markets, 5:00 and/or 5:30 p.m. newscasts are also produced, and several CTV stations in western Canada (and some CTV Two stations in eastern Canada) produce local morning newscasts under the title CTV Morning Live.
In 1998, shortly following the merger of the CTV network with Baton Broadcasting, local news branding on the CTV O&Os was unified with network news presentation, with newscast titles standardized under the format "(call sign) News", e.g. CFTO News for the Toronto station. Prior to this, the local O&Os used various titles, though one used in the late 1970s by a number of stations was World Beat News (for late-afternoon broadcasts) and Night Beat News (for late-night broadcasts). By late 2005 the O&Os' local newscasts had been renamed CTV News.
Beginning in February 2014, local programs were rebranded using region-specific on-air titles such as CTV News Toronto. At the same time, the CTV and CTV 2 O&O stations received a new graphics package, which is in a blue and white color scheme, a revised logo (similar to those already used on CTV News Channel and CTV National News), and new theme music. Starting in 2019, a red color scheme was added to the graphics package.
National aggregate ratings published by BBM Canada refer to the local broadcasts collectively as CTV Evening News, CTV Late News, CTV Noon News, etc., although these titles are not used on-air. Sinc
|
https://en.wikipedia.org/wiki/The%20Morning%20Show
|
The Morning Show may refer to:
Australia
The Morning Show (TV program), an Australian talk show hosted by Larry Emdur and Kylie Gillies that airs on the Seven Network
The Morning Show (1992 TV program), the original title for the 1992–2005 Australian morning television variety program, Good Morning Australia, that aired on Network Ten
Canada
The Morning Show (Canadian TV program), a morning show on Global Toronto
Ireland
The Morning Show with Sybil & Martin, an Irish television show produced by TV3
Philippines
The Morning Show, a morning show formerly broadcast by the National Broadcasting Network and its successor, People's Television Network from 2010 to 2013 (no relation to below)
The Morning Show, a regional morning show currently broadcast by ABS-CBN Bacolod (TV-4) (no relation to above)
United States
The Morning Show, the original title of the talk show Live
The Morning Show (American TV series), an Apple TV+ drama series starring Reese Witherspoon, Jennifer Aniston, and Steve Carell
The Morning Show with Mike and Juliet, a television morning talk show produced by Fox
The Morning Show (Minnesota Public Radio), an American morning drive-time radio program
The DVE Morning Show, an American morning drive-time radio program broadcast on WDVE in Pittsburgh, Pennsylvania
The Early Show, a morning news talk show broadcast by CBS from 1999 to 2012
See also
Breakfast television
Morning zoo
|
https://en.wikipedia.org/wiki/No%20Surprises
|
"No Surprises" is a song by the English rock band Radiohead, released as the fourth and final single from their third studio album, OK Computer (1997), on 12 January 1998. It was also released as an EP with B-sides, No Surprises / Running from Demons. It features glockenspiel and a "childlike" sound inspired by the 1966 Beach Boys album Pet Sounds.
The music video, directed by Grant Gee, features the singer, Thom Yorke, wearing a helmet as it fills with water. Gee was inspired by the 1968 science fiction film 2001: A Space Odyssey, underwater escape acts and the television series UFO. He fixated on the lyric "a job that slowly kills you", and conceived a real-time video that would convey the feeling of "murderous seconds".
"No Surprises" reached number four on the UK Singles Chart. In 2011, NME named "No Surprises" the 107th-best track of the previous 15 years.
Recording
Thom Yorke wrote "No Surprises" while Radiohead was touring with R.E.M. in 1995. Yorke introduced the song to the rest of the band in their dressing room in Oslo, Norway on August 3, 1995. Later, the lyrics were rewritten and a glockenspiel melody was added. It was the first song recorded in the sessions for OK Computer. Yorke said the "childlike guitar sound set the mood for the whole album" and that the band was aiming for a mood similar to the 1966 Beach Boys album Pet Sounds. He also said Radiohead wanted to recreate the atmosphere of a song by Marvin Gaye or the Louis Armstrong song "What a Wonderful World". "No Surprises" is in the key of F major.
The version on the album is the first take recorded; the band recorded many further versions, but felt they could not improve on the first. Hoping to achieve a slower tempo than could be played well on their instruments, the producer, Nigel Godrich, had the band record the song at a faster tempo, then slowed the playback for Yorke to overdub his vocals onto, creating an "ethereal" effect.
The bassist, Colin Greenwood, said that "No Surprises" was Radiohead's "'stadium-friendly'" song. He said the concept was to frighten OK Computer listeners with "Climbing Up the Walls", then comfort them "with a pop song with a chorus that sounds like a lullaby". Yorke told Q: "If you play it right, it is fucking dark. But it's like acting. It's on the edge of totally hamming it up but you're not. It's just the words are so dark. When we play it, we have to play it so slow. It only sounds good if it's really fragile."
Release
"No Surprises" was released as the fourth single from OK Computer on 12 January 1998. It reached number four on the UK Singles Chart. In 2008, it was included in Radiohead: The Best Of. An early version with different lyrics was included in the 2017 OK Computer reissue OKNOTOK 1997 2017. In October 2011, NME named "No Surprises" the 107th-best track of the previous 15 years.
Music video
The music video for "No Surprises" consists of a single close-up shot of Yorke inside a helmet. The lyrics slowly scroll upwards, re
|
https://en.wikipedia.org/wiki/Virtual%20instrument%20software%20architecture
|
Virtual instrument software architecture (VISA) is a widely used application programming interface (API) in the test and measurement (T&M) industry for communicating with instruments from a computer. VISA is an industry standard implemented by several T&M companies, such as, Anritsu, Bustec, Keysight Technologies, Kikusui, National Instruments, Rohde & Schwarz, and Tektronix.
The VISA standard includes specifications for communication with resources (usually, but not always, instruments) over T&M-specific I/O interfaces such as GPIB and VXI. There are also some specifications for T&M-specific protocols over PC-standard I/O, such as HiSLIP or VXI-11 (over TCP/IP) and USBTMC (over USB).
The VISA library has standardized the presentation of its operations over several software reuse mechanisms, including through a C API exposed from Windows DLL, visa32.dll, over the Microsoft COM technology, and through a .NET API. Although there are several VISA vendors and implementations, applications written against VISA are (nominally) vendor-interchangeable thanks to the standardization of VISA's presentation and operations/capabilities. Implementations from specific vendors are also available for less common programming languages and software reuse technologies.
History
VISA was originally standardized through the VXIplug&play Alliance, a now-defunct T&M standards body. The current standard, "VISA Specification 5.0", is maintained by the IVI Foundation.
See also
Standard Commands for Programmable Instruments (SCPI)
High Speed LAN Instrument Protocol (HiSLIP)
Instrument driver
References
External links
Fast Remote Instrument Control with HiSLIP - Application Note
IVI Foundation Specifications
Input/output
Electronic test equipment
|
https://en.wikipedia.org/wiki/Louis%20Pouzin
|
Louis Pouzin (April 20, 1931 in Chantenay-Saint-Imbert, Nièvre, France) is a French computer scientist. He designed a pioneering packet communications network, CYCLADES that was the first to implement the end-to-end principle, which became fundamental to the design of the Internet.
This network was the first actual implementation of the pure datagram model, initially conceived and described by Donald Davies, subsequently named by Halvor Bothner-By, and seen by Louis Pouzin as his personal invention. His work, and that of his colleagues Hubert Zimmerman and Gérard Le Lann, were acknowledged by Vinton Cerf as substantial contributions to the design of TCP/IP, the protocol suite used by the Internet.
Biography
He studied at the École Polytechnique from 1950 to 1952.
Having participated in the design of the Compatible Time-Sharing System (CTSS) at MIT, Pouzin wrote a program for it called RUNCOM around 1963–64. RUNCOM permitted the execution of commands contained within a folder and can be considered the ancestor of the command-line interface and shell scripts. Pouzin was the one who coined the term shell for a command language interpreter separate from the kernel in 1964 or 1965. Pouzin's concepts were later implemented in Multics by Glenda Schroeder at MIT. Schroeder developed the first Multics shell with the assistance of an unnamed man from General Electric. Schroeder's Multics shell was the predecessor to the Unix shell, which is still in use today.
Working with Glenda Schroeder and Pat Crisman, he also described an early e-mail system called "MAIL" to allow users on the CTSS to send notifications to others about backups of files. Each user's messages would be added to a local file called "MAIL BOX", which would have a “private” mode so that only the owner could read or delete messages. The proposed uses of the proto-email system were for communication from CTSS to notify users that files had been backed up, discussion between authors of CTSS commands, and communication from command authors to the CTSS manual editor. The service only made it possible to leave messages for the other users on the same computer. The idea to allow users to send messages between computers was developed later by Ray Tomlinson in 1971.
From 1967 to 1969 Pouzin developed one operating system for Météo-France, the French national meteorological service, using CDC 6400 as hardware. This system was created for weather forecast and statistics and was used for 15 years.
Pouzin directed the pioneering CYCLADES networking project from 1971 to 1976 at IRIA. Building on Donald Davies’s simulation of datagram networks, Pouzin built the CIGALE packet switching network. CYCLADES used a layered architecture, as did the Internet later, to research internetworking concepts.
He participated in the International Networking Working Group from 1972, initially chaired by Vint Cerf. He was acknowledged by Bob Kahn and Cerf in their seminal 1974 paper on internetworking protocols, "A
|
https://en.wikipedia.org/wiki/Graybird
|
Graybird is a Trojan horse that hides its presence on compromised computers and downloads files from remote Web sites.
There are many variations of this virus such as Backdoor.Graybird.P (the most recently discovered variation).
It was discovered on September 3, 2003 and affects Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP, and Windows Vista.
References
Graybird information provided by Symantec
Graybird.P information provided by Symantec
Trojan horses
|
https://en.wikipedia.org/wiki/RSA%20Secret-Key%20Challenge
|
The RSA Secret-Key Challenge was a series of cryptographic contests organised by RSA Laboratories with the intent of helping to demonstrate the relative security of different encryption algorithms. The challenge ran from 28 January 1997 until May 2007.
Contest details
For each contest, RSA had posted on its website a block of ciphertext and the random initialization vector used for encryption. To win, a contestant would have had to break the code by finding the original plaintext and the cryptographic key that will generate the posted ciphertext from the plaintext. The challenge consisted of one DES contest and twelve contests based around the block cipher RC5.
Each of the RC5 contests is named after the variant of the RC5 cipher used. The name RC5-w/r/b indicates that the cipher used w-bit words, r rounds, and a key made up of b bytes. The contests are often referred to by the names of the corresponding distributed.net projects, for example RC5-32/12/9 is often known as RC5-72 due to the 72-bit key size.
The first contest was DES Challenge III (and was also part of the DES Challenges) and was completed in 22 hours 15 minutes by distributed.net and the EFF's Deep Crack machine.
In May 2007 RSA Laboratories announced the termination of the challenge, stating that they would not disclose the solutions to the remaining contents, and nor would they confirm or reward prize money for future solutions. On 8 September 2008 distributed.net announced that they would fund a prize of $4000 for the RC5-32/12/9 contest.
Distributed.net
The contests are associated with the distributed.net group, which had actively participated in the challenge by making use of distributed computing to perform a brute force attack.
RC5-32/12/7 was completed on 19 October 1997, with distributed.net finding the winning key in 250 days and winning the US$10,000 prize. The recovered plaintext was: The unknown message is: It's time to move to a longer key length.
RC5-32/12/8 also carried a US$10,000 prize and was completed by distributed.net on 14 July 2002. It took the group 1,757 days to locate the key, revealing the plaintext: The unknown message is: Some things are better left unread.
There were eight contests that had not yet been solved, RC5/32/12/9 through RC5/32/12/16, each of which was a US$10,000 prize. Distributed.net is working on RC5-32/12/9 and were at 7.559% as of March 22 2021 (6.700% as of 20 June 2020, 5.329% as of 18 September 2018, 4.356% as of 7 January 2017).
See also
RSA Factoring Challenge
References
External links
Official contest page on the RSA website
Current status of all contests within the challenge
Encrypted messages from contest
Unofficial status page on Distributed.net
Distributed.net's RC5-72 Project Statistics
Cryptography contests
Recurring events established in 1997
Recurring events disestablished in 2007
|
https://en.wikipedia.org/wiki/Madness%20and%20the%20Minotaur
|
Madness and the Minotaur is a text adventure game, published in 1981 for the TRS-80 Color Computer by Radio Shack in North America and by Microdeal in the United Kingdom. It was developed by Spectral Associates founder, Thomas Rosenbaum.
A Dragon 32 version was published in 1982 by Dragon Data.
Gameplay
The goal of the game is to retrieve a number of treasures. In the course of doing this, the player will encounter other objects that may or may not be useful. Often, the player needs one object to act as a "key" for another. There is no rhyme or reason to this. The player doesn't use the key object to obtain the other; he just needs to be carrying it. For example, the player may see a shield. Perhaps the player needs to be carrying the dagger to get the shield. If the player has the dagger, the shield is reachable; if he does not, it is not. With the exception of a randomly appearing "oracle", the game gives no indication of what objects are needed to reach a treasure. There are various magic spells that can be learned throughout the game that have various effects.
References
External links
1980s interactive fiction
1981 video games
Adventure games
Dragon 32 games
Microdeal games
Single-player video games
TRS-80 Color Computer games
Video games based on Greek mythology
Video games developed in the United States
|
https://en.wikipedia.org/wiki/Self-documenting%20code
|
In computer programming, self-documenting (or self-describing) source code and user interfaces follow naming conventions and structured programming conventions that enable use of the system without prior specific knowledge. In web development, self-documenting refers to a website that exposes the entire process of its creation through public documentation, and whose public documentation is part of the development process.
Objectives
Commonly stated objectives for self-documenting systems include:
Make source code easier to read and understand
Minimize the effort required to maintain or extend legacy systems
Reduce the need for users and developers of a system to consult secondary documentation sources such as code comments or software manuals
Facilitate automation through self-contained knowledge representation
Conventions
Self-documenting code is ostensibly written using human-readable names, typically consisting of a phrase in a human language which reflects the symbol's meaning, such as article.numberOfWords or TryOpen. The code must also have a clear and clean structure so that a human reader can easily understand the algorithm used.
Practical considerations
There are certain practical considerations that influence whether and how well the objectives for a self-documenting system can be realized.
uniformity of naming conventions
consistency
scope of the application and system requirements
Examples
Below is a very simple example of self-documenting code, using naming conventions in place of explicit comments to make the logic of the code more obvious to human readers.
size_t count_alphabetic_chars(const char *text)
{
if (text == NULL)
return 0;
size_t count = 0;
while (*text != '\0')
{
if (is_alphabetic(*text))
count++;
text++;
}
return count;
}
Criticism
Jef Raskin criticized the belief in "self-documenting" code by saying that code cannot explain the rationale behind why the program is being written or why it is implemented in such a way.
See also
Autological word
Code readability
Comment (computer programming)
Controlled natural language
Literate programming
Natural language programming
References
Further reading
Computer programming
Software documentation
|
https://en.wikipedia.org/wiki/Imaginet
|
Imaginet LLC was founded in 1991, as a NeXT Computer and Apple Computer publishing Value Added Reseller.
Its initial focus on digital printing was retooled by 1994 to become an early provider of web services, a move that attracted some big-name companies, including 3M, Target Corp, Pillsbury, and General Mills.
In 1997, Imaginet was sold to the 3M spinoff, Imation, but the formal corporate culture and Imaginet's decidedly casual one were not a good fit. Within 18 months, the company turned private again. To become a private company, Founders Scott Litman and Dan Mallin partnered with Skip Gage to acquire the company from Imation and spin it out as a private entity. Along the way, Imaginet acquired the assets of the Gage Interactive Marketing Group.
As a private company, Imaginet, LLC flourished in 1999 and 2000, rapidly growing into a regional leader in eServices. The focus of the business was the delivery of web applications that provided personalized and relevant communication to their audiences. Customers included the St. Paul Companies, RBC Dain Rauscher, Cargill, Goodyear, Medtronic, United Health, Lawson Software, Express-Scripts, and Thomson West.
The business was sold once again in the final days of 2000 to WPP Group, where it became a part of J. Walter Thompson (JWT), one of the world's oldest and largest traditional ad agencies. Post sale, Imagnet, took over the JWT owned entity Cool Fire Interactive and in a move that saved many jobs as the dot com bubble burst that year, replaced Cool Fire's staff with Imaginet employees. Imaginet was rebranded into the RMG Connect international network under JWT.
In January 2010, RMG Connect was dissolved and merged with JWT. The office is now known as JWT Minneapolis.
References
1991 establishments in California
2010 disestablishments in California
American companies established in 1991
American companies disestablished in 2010
Computer companies disestablished in 2010
Business services companies disestablished in 2010
Computer companies established in 1991
Defunct computer companies based in California
Defunct computer companies of the United States
Marketing companies established in 1991
|
https://en.wikipedia.org/wiki/Relief%20map
|
Relief map or mapping may refer to:
Raised-relief map, a 3D physical representation of terrain
Relief mapping (computer graphics), the 3D digital rendering of texture, which may simulate shadows
Topographic map, a 2D depiction of terrestrial relief, using terrain cartography
See also
Relief (disambiguation)
|
https://en.wikipedia.org/wiki/TclX
|
TclX, an abbreviation for extended Tcl, was one of the first freely available Tcl extensions to the Tcl programming language, providing new operating system interface commands, extended file controls, time and date manipulation, scanning and status commands and many others. While many features of TclX have been incorporated into Tcl, TclX continued to be updated, providing Tcl interfaces to many Unix/Linux system calls and library routines, expanded list functions, and so forth. No new releases have been issued since November 2012, with 8.4.1 being the latest; however, version 8.6 is in preparation.
TclX is shipped by Debian and as part of Mac OS X. It is also available as an RPM for Red Hat Enterprise Linux, Fedora, openSUSE, and the Mandriva versions of Linux, and as a port for FreeBSD, among others.
TclX was developed by Karl Lehenbauer and Mark Diekhans.
References
External links
Extended Tcl (TclX) GitHub site
Extended Tcl (TclX) SourceForge site (inactive)
TclX Manual
Tcl programming language family
|
https://en.wikipedia.org/wiki/Finger%20Lakes%20Trail
|
The Finger Lakes Trail consists of a network of trails in New York. The trail system is administered by the Finger Lakes Trail Conference (FLTC), a non-profit 501(c)(3) organization composed primarily of volunteers.
Description
The FLT is primarily designated as a footpath only trail. The main trail (FLT) is long and extends from the New York-Pennsylvania border from Allegany State Park in southwestern New York to the Catskill Forest Preserve in eastern New York. There is an additional 400+ miles (643+ km) of branch and loop segments that branch off the main FLT—six branch trails and several loop and side trails. The FLT is part of the 4,600 mile North Country National Scenic Trail (NCNST) and affiliates with the North Country Trail Association as a partner organization. The NCNST uses approximately 424 miles of the FLT as it crosses New York from Allegany State Park and into Madison County.
The Trail System passes over a mixture of public and private land, and also public roads where there is no public or private land available. The main FLT crosses through many New York state parks, state forests and wildlife management areas. The FLT also crosses through the only national forest in New York State and over an additional 400 private landowners property.
It is maintained by volunteers from 15 organizations and approximately 60 individual and family trail sponsors, except for personnel of the NYSDEC Operations Crew who maintain the trail in the Catskills. The US Forest Service maintains the Interloken Trail in the Finger Lakes National Forest.
The highest elevation on the entire FLT is ~4,200 feet, at the summit of Slide Mountain (Ulster County, New York) in the Catskills. The lowest elevation is 430' where the FLT crosses the Cayuga Inlet near Ithaca, NY. There are also five fire towers located along or near the trail. The first is the abandoned Mt. Tuscarora Fire Tower in Allegany State Park. The second is the Sugar Hill Fire Tower outside Watkins Glen State Park. The Berry Hill Fire Tower is located outside Bowman Lake State Park. The fourth is the Balsam Lake Mountain Fire Tower and the fifth is the Rock Rift Fire Tower.
As of January 1, 2022 the Finger Lakes Trail main trail has been completed 535 times (including continuous and section hikes). Joe Dabes ("Java Joe") has hiked the entire trail ten times. Frank Bianco's second of four hikes was completed in a continuous 24 days on June 26, 1997, when the trail was shorter than its current length. The six branch trails have all been completed 134 times as of Jan 1, 2022. On August 3, 2015, Heather Housekeeper ("Botanical Hiker") completed the first continuous hike of the main trail and all branch trails, in 62 days.
When using the trail, it is important to know whether the portion you are using is on private or public land and the rules applicable to that particular portion.
Those portions of the trail that pass over private lands are subject to rules established by the Finger Lake
|
https://en.wikipedia.org/wiki/Bob%20Miner
|
Robert Nimrod Miner (December 23, 1941 – November 11, 1994) was an American businessman. He was the co-founder of Oracle Corporation and the producer of Oracle's relational database management system.
From 1977 until 1992, Bob Miner led product design and development for the Oracle relational database management system. In Dec., 1992, he left that role and spun off a small, advanced technology group within Oracle. He was an Oracle board member until Oct., 1993.
Early life
Bob Miner was born on Dec 23, 1941 in Cicero, Illinois, to an Assyrian family. Both of his parents came from Ada, a village in West Azerbaijan Province, northwest Iran, and had migrated to the US in the 1920s. He was their fifth child of five. Bob Miner graduated in 1963 with a degree in mathematics from the University of Illinois at Urbana-Champaign.
Career
In 1977 Bob Miner met Larry Ellison at Ampex, where he was Larry's supervisor. Bob Miner left Ampex soon thereafter to found a company called Software Development Laboratories with Ed Oates and Bruce Scott, with Larry Ellison joining the company several months later. It was at this time that Ed Oates introduced Miner and Ellison to a paper by E. F. Codd on the relational model for database management. IBM was slow to see the commercial value of Codd's relational database management system (RDBMS), allowing Miner and Ellison to beat them to the market.
In the start-up days of Oracle Bob Miner was the lead engineer, programming the majority of Oracle Version 3 by himself. As head of engineering Bob Miner's management style was in stark contrast to Larry Ellison, who cultivated Oracle's hard-driving sales culture. Although he expected his engineers to produce, he did not agree with the demands laid upon them by Ellison. He thought it was wrong for people to work extremely late hours and that they should have the chance to see their families. According to Ellison, Miner was "loyal to the people before the company."
Personal life
Bob Miner was diagnosed in 1993 with pleural mesothelioma, a rare form of lung cancer typically caused by exposure to asbestos. He died on November 11, 1994, a month before his 53rd birthday, surrounded by his wife Mary and their three children, Nicola, Justine, and Luke. His wife Mary is the founder and owner of Oakville Ranch Vineyards, a Napa winery. His daughter Nicola Miner is married to author Robert Mailer Anderson.
Miner family's charitable foundation has donated to various San Francisco arts and education institutions. The SFJAZZ Center's auditorium is named after Miner.
References
Further reading
Symonds, Matthew, 2003. Softwar: An Intimate Portrait of Larry Ellison and Oracle. Simon & Schuster. With commentary by Ellison.
The Difference Between God and Larry Ellison: Inside Oracle Corporation and Symonds (2003).
Larry Ellison: Database Genius of Oracle. Craig Peters
Everyone Else Must Fail. Karen Southwick
The Oracle of Oracle. Florence M. Stone
Larry Ellison, Sheer Nerve.
|
https://en.wikipedia.org/wiki/Newbear%2077-68
|
The Newbear 77-68 was a kit of parts from which a purchaser could construct a first generation home computer based around a Motorola 6800 microprocessor. Because it was designed to be assembled by its owner at home, it was also a homebuilt computer. The 77-68 was designed by Tim Moore and was offered for sale by Bear Microcomputer Systems of Newbury, Berkshire, England from June 1977. It was among the first, if not the first, of British home computers and was featured in the launch edition of Personal Computer World magazine in February 1978.
The Newbear 77-68 was both a home computer and a homebuilt computer, since it was designed to not only be used at home (hence a home computer), but also be assembled at home by its owner (hence a homebuilt computer).
Description
The basic 77-68 comprised an 8-inch square printed circuit board accommodating the microprocessor, Static RAM of 256 8 bit words and the bare essentials in terms of input/output and timing logic to make a working computer. The processor ran with an instruction cycle time of around 1.25 microseconds with most instructions executing in 3 to 7 microseconds.
In the short time for which the 77-68 represented an economic and reasonably current technology for home computing, an active user group distributed designs for additional components such as memory cards, video display cards and teletype interfaces which enthusiasts could, and did, construct themselves. It was even possible to run BASIC. All the components to build the basic machine could be bought for around £50 with additional elements added later. This was a sensible approach at a time when, for example, 16K x 1 bit dynamic memory chips cost £7 each and 8 chips plus a significant amount of support logic were required to build a memory card.
Operation
The 77-68 was programmed in its most basic form with toggle switches and LEDs. With the microprocessor's operation suspended in "HALT" mode, memory words could be accessed and their contents observed in binary. The word could then be modified directly using an additional 8 binary toggle switches to specify the data required. Once a complete program had been "toggled in" using this method, the "HALT" condition could be removed using another switch and the microprocessor would look for an address at which to start executing the program in the last two words of the address space.
This technique, called Direct Memory Access was typical for many early computers using volatile memory that did not retain its contents when the power was switched off. Even early mainframe computers required their operators to "toggle" or "dial" in a bootstrap program by hand to get things going on power-up.
Capability
Although 256 words of memory seems extraordinarily small by contemporary standards, when "toggling in" programs by hand it seemed quite adequate. There was ample space to create programs that played music, sent and received morse code, operated data storage to media such as a cassette pl
|
https://en.wikipedia.org/wiki/Supreme%20Intelligence
|
The Supreme Intelligence is a fictional character appearing in American comic books published by Marvel Comics. The Supreme Intelligence is an artificial intelligence that rules the alien race known as the Kree.
The Supreme Intelligence made its film debut in Captain Marvel (2019), set in the Marvel Cinematic Universe (MCU), portrayed by Annette Bening.
Publication history
The Supreme Intelligence, also known as The Supremor, first appears in Fantastic Four #65 (Aug 1967) and was created by Stan Lee and Jack Kirby. It was introduced as a supercomputer that consists of the greatest minds of the Kree people for the last million years and it figures as their leader. The Kree build the Supremor, after the Skrulls built their own superweapon, the Cosmic Cube. Its main purpose is to further the development of the Kree at any cost.
The Supreme Intelligence was initially a supporting character in first run of Captain Marvel featuring the original Mar-Vell.
The Supremor first major role was in the Kree–Skrull War, it aided Mar-Vell and Rick Jones to unlock Jones' superpower called the Destiny Force.
It made appearances as a supporting character and antagonist in the third volume of Silver Surfer and the first run of Ms. Marvel.
It returned as the main antagonist for the 19-part crossover event called Operation: Galactic Storm, also known as the Kree/Shi'ar War. Which features the Kree, Shi'ar, Avengers and Quasar, in which the Avengers intervened in an intergalactic war between the alien Kree and Shi'ar empires. The event introduced the Starforce team, who was created by The Supremor.
After presumed killed in Operation: Galactic Storm, The Supreme Intelligence reemerged in the Imperial Guard mini and later fully reformed on the blue side of the moon in the Live Kree or Die! story arc. Supremor had transmitted itself to a satellite, which was recovered by its Skrull agents. It was taken in custody by the Avengers and S.H.I.E.L.D. It next appeared in the limited series Avengers Forever, where it assisted the Avengers, who were caught up in a battle across time between Kang the Conqueror and Immortus.
It was later also involved as one of the major players in the Maximum Security crossover, in it the Intergalactic Council want to turn Earth in a prison planet.
The Supreme Intelligence next appeared in the crossover storyline Annihilation and Annihilation: Conquest, it was supplanted by House Fiyero and who drove his greatest supporter Ronan into exile. Only the Kree were hit by the Annihilation Wave. Ronan lead a coup against the merchant house, slaughtering them and taking control of the empire. The Supremor was lobotomized however and put out of it misery.
In the FF and Fantastic Four ongoing, Ronan realized the Kree need a superior leader than him. He decided to resurrect The Supreme Intelligence by using two alternate reality Reed Richards, they were absorbed in the new Supreme Intelligence. It immediately set about trying to destroy the Earth an
|
https://en.wikipedia.org/wiki/Sword%20of%20Gideon
|
Sword of Gideon is a 1986 Canadian television film about Mossad agents hunting down terrorists associated with the 1972 Munich massacre. It was first shown on the CTV Television Network in Canada as a four-hour miniseries and later on HBO in the United States. Directed by Michael Anderson and written by Chris Bryant, the film stars Steven Bauer and Michael York. The film is based on the book Vengeance by George Jonas, an account of the incident which has been criticized by some intelligence personnel as fictional, though because of its covert nature is difficult to prove or disprove. In some countries the book was titled Vengeance: Sword of Gideon, from which the movie title is drawn. The story was retold in the 2005 film Munich by Steven Spielberg.
Plot
Avner, an adept Israeli military officer, is interrupted from his service in the IDF by a special request from Israeli Prime Minister Golda Meir to join Mossad, Israel's intelligence agency. Despite warnings from his father, he agrees to join, and becomes the leader of an elite five-man group assigned to assassinate all of the Black September terrorists involved in the Munich massacre. Shortly before embarking, however, his wife reveals to him that she is pregnant, to Avner's surprise.
The undercover unit is dispatched to Europe, where most of the terrorists are located, and begin assassinating them via firearms and bombs. Initially, they are very successful, but after Avner witnesses one of their targets' wife and daughter crying in the hospital upon learning of his death, he soon begins to question the morality of his mission.
Eventually, the unit becomes wanted internationally for the assassinations, and spies dispatched by Black September are successful in killing most of Avner's team over the course of several months. After a botched assassination attempt of two targets results in the team almost being wiped out, Avner asks the case officer in charge of the mission to abort, and his request is granted, ending the mission with only two survivors.
Upon returning to Israel, Avner's case officer reveals that his Mossad contract length is three years, prompting him to angrily attempt to quit his job and move to New York with his wife and infant son. There, he is the target of harassment by his case officer, who attempts to convince him to return to Israel and go on another mission for Mossad. Avner refuses, stating that he only wants to join the IDF and become an officer again. His boss flatly rejects the offer, and withdraws all of Avner's money from his bank account as punishment for violating his contract with Mossad, leaving the family completely broke. However, he purchases and repairs an old apartment, and is able to make a modest living as a taxi cab driver.
As the movie ends, Avner can be seen commanding an IDF armored column through the desert, and a paragraph of text explains that he returned to Israel to command his tank unit during the Yom Kippur War.
Cast
Steven Bauer as Avner
|
https://en.wikipedia.org/wiki/All-or-nothing%20transform
|
In cryptography, an all-or-nothing transform (AONT), also known as an all-or-nothing protocol, is an encryption mode which allows the data to be understood only if all of it is known. AONTs are not encryption, but frequently make use of symmetric ciphers and may be applied before encryption. In exact terms, "an AONT is an unkeyed, invertible, randomized transformation, with the property that it is hard to invert unless all of the output is known."
Algorithms
The original AONT, the package transform, was described by Ronald L. Rivest in his 1997 paper "All-Or-Nothing Encryption and The Package Transform". The transform that Rivest proposed involved preprocessing the plaintext by XORing each plaintext block with that block's index encrypted by a randomly chosen key, then appending one extra block computed by XORing that random key and the hashes of all the preprocessed blocks. The result of this preprocessing is called the pseudomessage, and it serves as the input to the encryption algorithm. Undoing the package transform requires hashing every block of the pseudomessage except the last, XORing all the hashes with the last block to recover the random key, and then using the random key to convert each preprocessed block back into its original plaintext block. In this way, it's impossible to recover the original plaintext without first having access to every single block of the pseudomessage.
Although Rivest's paper only gave a detailed description of the package transform as it applies to CBC mode, it can be implemented using a cipher in any mode. Therefore, there are multiple variants: the package ECB transform, package CBC transform, etc.
In 1999 Victor Boyko proposed another AONT, provably secure under the random oracle model.
Apparently at about the same time, D. R. Stinson proposed a different implementation of AONT, without any cryptographic assumptions. This implementation is a linear transform, perhaps highlighting some security weakness of the original definition.
Applications
AONTs can be used to increase the strength of encryption without increasing the key size. This may be useful to, for example, secure secrets while complying with government cryptography export regulations. AONTs help prevent several attacks.
One of the ways AONTs improve the strength of encryption is by preventing attacks which reveal only part of the information from revealing anything, as the partial information is not enough to recover any of the original message.
Another application, suggested in the original papers is to reduce the cost of security: for example, a file can be processed by AONT, and then only a small portion of it can be encrypted (e.g., on a smart-card). AONT will assure that as a result the whole file is protected. It is important to use the stronger version of the transform (such as the one by Boyko above).
AONT may be combined with forward error correction to yield a computationally secure secret sharing scheme.
Other uses of AONT ca
|
https://en.wikipedia.org/wiki/Equinix
|
Equinix, Inc. is an American multinational company headquartered in Redwood City, California, that specializes in Internet connection and data centers. The company is a leader in global colocation data center market share, with 248 data centers
in 31 countries on five continents.
It is listed on the NASDAQ stock exchange under the ticker symbol EQIX, and , it had approximately 12,000 employees globally. The company converted to a real estate investment trust (REIT) in January 2015.
History
Equinix was founded in 1998 by Al Avery and Jay Adelson, two facilities managers at Digital Equipment Corporation. The firm promoted its data center platform as a neutral place where competing networks could connect and share data traffic. The firm capitalized on the "network effect," through which each new customer would broaden the appeal of its platform. It expanded to Asia-Pacific in 2002 and Europe in 2007, followed by Latin America in 2011, and the Middle East in 2012.
In 2018, according to data collected by the online publication Sludge, Equinix signed three contracts with the U.S. Customs and Border Protection to provide "information technology support equipment" totalling over $5 million. In September 2020, the company shifted its branding to describe itself as a "digital infrastructure company".
Acquisitions and expansion
In 2002, Equinix merged with i-STT, the Internet infrastructure service subsidiary of Singapore Technologies Telemedia, and Pihana Pacific. This established the company's presence in China, Singapore, Australia and Japan. In 2007, the firm announced a $2 billion international expansion plan and entered the European market by acquiring data center operator IXEurope and its facilities. In 2010, Equinix opened its 50th data center, in London. Over the next seven years, the company nearly tripled its data center portfolio, growth the company attributed to increased demand caused by the emergence of cloud computing, the Internet of Things and big data.
In 2010, the company purchased Switch and Data Facilities Company, Inc., a U.S. internet exchange and colocation services provider. The company extended its operations to the Middle East and in Southeast Asia in 2012. Also in 2012, it acquired Hong Kong-based data center provider Asia-Tone. In 2014, Equinix increased its Latin American presence when it acquired ALOG Datacenters of Brazil S.A., the country's leading provider of carrier-neutral data centers.
In 2015, Equinix converted to a real estate investment trust (REIT) to gain tax advantages and add shareholder value. That same year, it acquired the professional services company Nimbo.
In May 2015, Equinix said it would purchase the British company TelecityGroup, the largest acquisition in company history. The offer was cleared by the European Commission in November after Equinix agreed to sell eight of its data centers around Europe to Digital Realty, but it still retained Telecity Harbour Exchange data center in London D
|
https://en.wikipedia.org/wiki/TVRi
|
TVR Internațional (, abbreviated as TVRi, is the international channel of Televiziunea Română, Romania's government-funded television network. TVR International provides free-to-air 24-hour broadcast throughout Europe, Canada and the US. In July 2005, it introduced broadcasts to Australia and New Zealand.
The channel provides content mainly in Romanian, for Romanians throughout the world, but also in Romania's minority languages, especially Hungarian, Romany and German. Some content is also provided in English. The channel is broadcast live on the internet.
Its most watched programming during the year is the Eurovision Song Contest.
In 2020, TVR launched an HD feed of TVR i on TVR+. It broadcasts in 720p format.
References
External links
Official Site
Watch TVRi live
International broadcasters
International
Television channels and stations established in 1995
Television stations in Romania
|
https://en.wikipedia.org/wiki/Medoid
|
Medoids are representative objects of a data set or a cluster within a data set whose sum of dissimilarities to all the objects in the cluster is minimal. Medoids are similar in concept to means or centroids, but medoids are always restricted to be members of the data set. Medoids are most commonly used on data when a mean or centroid cannot be defined, such as graphs. They are also used in contexts where the centroid is not representative of the dataset like in images, 3-D trajectories and gene expression (where while the data is sparse the medoid need not be). These are also of interest while wanting to find a representative using some distance other than squared euclidean distance (for instance in movie-ratings).
For some data sets there may be more than one medoid, as with medians.
A common application of the medoid is the k-medoids clustering algorithm, which is similar to the k-means algorithm but works when a mean or centroid is not definable. This algorithm basically works as follows. First, a set of medoids is chosen at random. Second, the distances to the other points are computed. Third, data are clustered according to the medoid they are most similar to. Fourth, the medoid set is optimized via an iterative process.
Note that a medoid is not equivalent to a median, a geometric median, or centroid. A median is only defined on 1-dimensional data, and it only minimizes dissimilarity to other points for metrics induced by a norm (such as the Manhattan distance or Euclidean distance). A geometric median is defined in any dimension, but unlike a medoid, it is not necessarily a point from within the original dataset.
Definition
Let be a set of points in a space with a distance function d. Medoid is defined as
Clustering with medoids
Medoids are a popular replacement for the cluster mean when the distance function is not (squared) Euclidean distance, or not even a metric (as the medoid does not require the triangle inequality). When partitioning the data set into clusters, the medoid of each cluster can be used as a representative of each cluster.
Clustering algorithms based on the idea of medoids include:
Partitioning Around Medoids (PAM), the standard k-medoids algorithm
Hierarchical Clustering Around Medoids (HACAM), which uses medoids in hierarchical clustering
Algorithms to compute the medoid of a set
From the definition above, it is clear that the medoid of a set can be computed after computing all pairwise distances between points in the ensemble. This would take distance evaluations (with ). In the worst case, one can not compute the medoid with fewer distance evaluations. However, there are many approaches that allow us to compute medoids either exactly or approximately in sub-quadratic time under different statistical models.
If the points lie on the real line, computing the medoid reduces to computing the median which can be done in by Quick-select algorithm of Hoare. However, in higher dimensional real spaces,
|
https://en.wikipedia.org/wiki/Z%20Channel
|
The Z Channel was one of the early pay television stations in the United States (1974-1989) best known for its devotion to the art of cinema due to the eclectic choice of films by the programming chief Jerry Harvey.
History
Z Channel was launched in 1974 by Theta Cable (a division of TelePrompTer Corporation and Hughes Aircraft Co.) which was acquired by Group W (Westinghouse) in 1981. Operations were located in Santa Monica, California. Jerry Harvey was hired as program director in 1980. As program director, Harvey was given permission to program the network the way he saw fit. As such, the network featured a wide variety of films not typically shown on other pay television services at the time.
These included many B movies, silent films, foreign films, and original unedited versions of films. On Christmas Eve 1982, Harvey made the decision to show the original (previously unreleased in two years) version of Heaven's Gate, a movie that had been considered a disaster by all accounts. His decision was a success as the movie became the most watched feature ever shown on Z Channel. Other networks soon followed and aired Heaven's Gate.
By the mid-1980s, Z Channel had 90,000 subscribers. In 1987, Group W sold Z Channel to Seattle-based Rock Associates for $5 million. Both increased competition and lack of interest by Group W leading up to the sale led to a decrease in subscribers. In January 1988, Rock Associates merged with American Spectacor.
Demise
In April 1988, there were two major changes to the network: the death of Jerry Harvey and the addition of sports to regular programming. (It had broadcast a UCLA–USC basketball game around 1978.) Deals were made to show games from the Los Angeles Angels, Clippers and Dodgers. This increased the numbers of subscribers to 110,000. The sports deals were funded by selling advertising during the games. However, a lawsuit ensued with a court ruling that contracts with the movie studios stipulated that the service be commercial-free.
Out of options, the channel was sold to Cablevision and NBC on March 16, 1989, who were partners in the joint-venture SportsChannel and set to launch Consumer News and Business Channel (now CNBC). On June 29, 1989, Z Channel faded to black and was replaced by SportsChannel Los Angeles. The last film shown on Z Channel was John Ford's My Darling Clementine.
Legacy
Z Channel popularized the use of letterboxing on television, as well as showing "director's cut" versions of films (which is a term popularized after Z Channel's showing of Heaven's Gate). Z Channel's devotion to cinema and choice of rare and important films had an influence on such directors as Robert Altman, Quentin Tarantino, Alexander Payne and Jim Jarmusch.
The channel was the subject of the 2004 documentary Z Channel: A Magnificent Obsession, which was directed by Alexandra Cassavetes, daughter of John Cassavetes.
Selected films that aired on Z Channel
1900
48 Hrs.
A Clockwork Orange
A Touch of Class
Airpl
|
https://en.wikipedia.org/wiki/Path-vector%20routing%20protocol
|
A path-vector routing protocol is a network routing protocol which maintains the path information that gets updated dynamically. Updates that have looped through the network and returned to the same node are easily detected and discarded. This algorithm is sometimes used in Bellman–Ford routing algorithms to avoid "Count to Infinity" problems.
It is different from the distance vector routing and link state routing. Each entry in the routing table contains the destination network, the next router and the path to reach the destination.
Border Gateway Protocol (BGP) is an example of a path vector protocol. In BGP, the autonomous system boundary routers (ASBR) send path-vector messages to advertise the reachability of networks. Each router that receives a path vector message must verify the advertised path according to its policy. If the message complies with its policy, the router modifies its routing table and the message before sending the message to the next neighbor. It modifies the routing table to maintain the autonomous systems that are traversed in order to reach the destination system. It modifies the message to add its AS number and to replace the next router entry with its identification.
Exterior Gateway Protocol (EGP) does not use path vectors.
It has three phases:
Initiation
Sharing
Updating
Of note, BGP is commonly referred to as an External Gateway Protocol (EGP) given its role in connecting Autonomous Systems (AS).
Communication protocols within AS are therefore referred to as Internal Gateway Protocols (IGP) which contain OSPF and IS-IS among others.
This being said, BGP can be used within an AS, which typically occurs within very large organizations such as Facebook or Microsoft.
See also
Link-state routing protocol
Routing protocols
|
https://en.wikipedia.org/wiki/Mastertronic
|
Mastertronic was originally a publisher and distributor of low-cost computer game software founded in 1983. Their first games were launched on April 2, 1984. At its peak the label was one of the largest software publishers in the UK, achieved by selling cassette-based software at £1.99. As well as supplying leading retailers such as Woolworth's and Toys "R" Us, Mastertronic sold software in outlets such as newsagents which had not been previously associated with the software market.
Their range of budget games were incredibly successful during the 1980s, with titles such as Kikstart, Action Biker, Finders Keepers, Chiller and Flash Gordon (released under the M.A.D. Label).
Later diversification included the setting up of US operations to source and distribute their software, as well as an unsuccessful arcade games division (Arcadia Systems). However, it was their decision to market the Master System in the UK that ultimately proved most successful. It resulted in the Master System selling much better than its rival, the NES than in many other territories and was cited by some as Virgin Group's reason for investing in the company (and later buying it outright).
As the budget software market declined, the Sega hardware distribution became the dominant part of the business, and the company was eventually merged into Sega itself. Although the original company no longer exists, the rights to the name were acquired by another company, Mastertronic Group, formed in 2006 as a result of a merger of The Producers and Sold Out Sales & Marketing with Frank Herman, one of the founders of the original company, as its chairman.
History
In 1983 Martin Alper, Frank Herman, Terry Medway and Alan Sharam founded the computer game publishing company Mastertronic. The four had some financial backing from a small group of outside investors and previous experience in video distribution. Their initial venture involved bundling packages of 100 tapes ("dealer packs") and sending them to newsagents, toy shops, motorway service stations, or just about anyone who would take them. Another key figure at the time was ex-Notts Cricket batsman Richard Bielby, who ran a distribution network servicing a large number of small retailers.
New labels, expansion and diversification
In late 1985 Mastertronic launched their Mastertronic Added Dimension (M.A.D.) label to sell games at a slightly higher price (£2.99). The first game was The Last V8 and many more were soon to follow including Knight Tyme and 180.
Martin Alper, who had the most marketing flair, went to the United States in 1986 to set up Mastertronic Inc. The UK company was managed by Frank Herman, whilst Alan Sharam increasingly specialised in sales and logistics (warehousing, packaging, controlling production schedules). As the business continued to grow Mastertronic created another label in 1986 , Entertainment USA, when it began working closely with several American writers including Sculptured Software and Randal
|
https://en.wikipedia.org/wiki/Fuzzy%20clustering
|
Fuzzy clustering (also referred to as soft clustering or soft k-means) is a form of clustering in which each data point can belong to more than one cluster.
Clustering or cluster analysis involves assigning data points to clusters such that items in the same cluster are as similar as possible, while items belonging to different clusters are as dissimilar as possible. Clusters are identified via similarity measures. These similarity measures include distance, connectivity, and intensity. Different similarity measures may be chosen based on the data or the application.
Comparison to hard clustering
In non-fuzzy clustering (also known as hard clustering), data are divided into distinct clusters, where each data point can only belong to exactly one cluster. In fuzzy clustering, data points can potentially belong to multiple clusters. For example, an apple can be red or green (hard clustering), but an apple can also be red AND green (fuzzy clustering). Here, the apple can be red to a certain degree as well as green to a certain degree. Instead of the apple belonging to green [green = 1] and not red [red = 0], the apple can belong to green [green = 0.5] and red [red = 0.5]. These value are normalized between 0 and 1; however, they do not represent probabilities, so the two values do not need to add up to 1.
Membership
Membership grades are assigned to each of the data points (tags). These membership grades indicate the degree to which data points belong to each cluster. Thus, points on the edge of a cluster, with lower membership grades, may be in the cluster to a lesser degree than points in the center of cluster.
Fuzzy C-means clustering
One of the most widely used fuzzy clustering algorithms is the Fuzzy C-means clustering (FCM) algorithm.
History
Fuzzy c-means (FCM) clustering was developed by J.C. Dunn in 1973, and improved by J.C. Bezdek in 1981.
General description
The fuzzy c-means algorithm is very similar to the k-means algorithm:
Choose a number of clusters.
Assign coefficients randomly to each data point for being in the clusters.
Repeat until the algorithm has converged (that is, the coefficients' change between two iterations is no more than , the given sensitivity threshold) :
Compute the centroid for each cluster (shown below).
For each data point, compute its coefficients of being in the clusters.
Centroid
Any point x has a set of coefficients giving the degree of being in the kth cluster wk(x). With fuzzy c-means, the centroid of a cluster is the mean of all points, weighted by their degree of belonging to the cluster, or, mathematically,
where m is the hyper- parameter that controls how fuzzy the cluster will be. The higher it is, the fuzzier the cluster will be in the end.
Algorithm
The FCM algorithm attempts to partition a finite collection of elements
into a collection of c fuzzy clusters with respect to some given criterion.
Given a finite set of data, the algorithm returns a list of cluster centre
|
https://en.wikipedia.org/wiki/Todo
|
Todo may refer to:
Todo Bichig, Kalmyk ‘Clear Script’
To-do list, a time management implementation
TODO (tag), a computer programming comment tag
Todo (album)
Tōdō may refer to:
Tōkyūjutsu () or Tōdō (), a Japanese divination (fortune telling) method
Tōdōza () or Tōdō (), a Japanese guild for blind male musicians
Tōdō Heisuke (, 1844–1867), samurai
Tōdō Takatora (, 1556–1630), daimyō
Tōdō Takayuki (, 1813–1895), daimyō
Izumi Todo (), pseudonym for the staff at Toei Animation
See also
To do
Toto (disambiguation)
|
https://en.wikipedia.org/wiki/Tab-separated%20values
|
Tab-separated values (TSV) is a simple, text-based file format for storing tabular data. Records are separated by newlines, and values within a record are separated by tab characters. The TSV format is thus a delimiter-separated values format, similar to comma-separated values.
TSV is a simple file format that is widely supported, so it is often used in data exchange to move tabular data between different computer programs that support the format. For example, a TSV file might be used to transfer information from a database to a spreadsheet.
Example
The head of the Iris flower data set can be stored as a TSV using the following plain text (note that the HTML rendering may convert tabs to spaces):
Sepal length	Sepal width	Petal length	Petal width	Species
5.1	3.5	1.4	0.2	I. setosa
4.9	3.0	1.4	0.2	I. setosa
4.7	3.2	1.3	0.2	I. setosa
4.6	3.1	1.5	0.2	I. setosa
5.0	3.6	1.4	0.2	I. setosa
The TSV plain text above corresponds to the following tabular data:
Character escaping
The IANA media type standard for TSV achieves simplicity by simply disallowing tabs within fields.
Since the values in the TSV format cannot contain literal tabs or newline characters, a convention is necessary for lossless conversion of text values with these characters. A common convention is to perform the following escapes:
Another common convention is to use the CSV convention from and enclose values containing tabs or newlines in double quotes. This can lead to ambiguities.
Another ambiguity is whether records are separated by a line feed, as is typical for Unix platforms, or a carriage return and line feeds, as is typical for Microsoft platforms. Many programs such as LibreOffice expect a carriage return followed by a newline.
See also
Comma-separated values
Delimiter collision
References
Sources
Further reading
Spreadsheet file formats
Delimiter-separated format
|
https://en.wikipedia.org/wiki/Galearieae
|
Galearieae is a no-longer-recognized tribe of plant of the family Euphorbiaceae. It comprised 3 genera, Galearia, Microdesmis, and Panda. Molecular data show that although these three genera are related to each other, they do not belong in the subfamily Acalyphoideae of the Euphorbiaceae, and therefore they are generally now classified as the family Pandaceae.
See also
Taxonomy of the Euphorbiaceae
References
Acalyphoideae
Historically recognized angiosperm taxa
Euphorbiaceae tribes
|
https://en.wikipedia.org/wiki/JLA/Cyberforce
|
JLA/Cyberforce, was a one-shot comic book published in 2005 by DC Comics and Top Cow Comics.
JLA/Cyberforce was written by Joe Kelly. Internal art was by Doug Mahnke and Norm Rapmund. The cover was done by Marc Silvestri. Despite being a one-shot, the crossover is a continuation of the story that begins in volume 3 of Cyberforce, taking place between issues #0 and #1 of that title.
Plot summary
The story of JLA/Cyberforce revolves around the Cyberforce fighting a hoard of Cyber-Zombies that have invaded Budapest. The zombies invasion soon prompts the attention of the Justice League who arrive to assist and to some extent awe, the Cyberforce. The two teams immediately gel and start working together to prevent the now-evil Ripclaw, a resurrected former member of the Cyberforce, and his Cyber-Zombies from obtaining Godtech. Godtech is a material that could make the Cyberforce immortal but it can also be abused to raise the dead. During the battle with Ripclaw, Martian Manhunter is mortally wounded during a moment of distraction. Godtech can revive him, however when the JLA attempt to do just that they must contend with the Cyberforce who want to use the Godtech to save their lost friend Ripclaw. Battle ensues and the Cyberforce find that they are unable to defeat the JLA. All except Velocity who is able to use the Godtech to outrun the Flash and enter the lands of the dead to bring Martian Manhunter back to life. The teams part company amicably after this turn of events.
Characters
JLA:
Superman
Batman
Wonder Woman
Martian Manhunter
The Flash
Cyberforce:
Stryker
Velocity
Cyblade
Ballistic
Opponents
Ripclaw - ex-Cyberforce
References
2005 comics debuts
Comics by Joe Kelly (comics writer)
Intercompany crossovers
Top Cow titles
Characters created by Marc Silvestri
Batman characters
Characters created by Gardner Fox
DC Comics superhero teams
DC Comics titles
Superman characters
|
https://en.wikipedia.org/wiki/New%20York%20Undercover
|
New York Undercover is an American police drama that aired on the Fox television network from September 8, 1994, to February 11, 1999. The series starred Malik Yoba as Detective J.C. Williams and Michael DeLorenzo as Detective Eddie Torres, two undercover detectives in New York City's Fourth Precinct who were assigned to investigate various crimes and gang-related cases. The cast also included Patti D'Arbanville-Quinn as their superior, Lt. Virginia Cooper, and Lauren Vélez, who joined the cast in the second season as Nina Moreno, fellow detective and love interest to Torres. New York Undercover was co-created and produced by Dick Wolf, and its storyline takes place in the same fictional universe as Wolf's NBC series Law & Order, its spin-offs, the Chicago and FBI series, and Homicide: Life on the Street.
New York Undercover (whose working title during development was Uptown Undercover, named after the record label, Uptown Records, whose founder and CEO, Andre Harrell, was also the executive producer of the series) is notable for being the first police drama on American television to feature two people of color in the starring roles. In contrast to the popularity of NBC's "Must See TV" on Thursday nights in the 1990s, many African-American viewers flocked to Fox's Thursday-night line-up of Martin, Living Single, and New York Undercover.
Synopsis
In addition to the main storylines in each episode, subplots explored the private lives of the show's characters. For example, Det. Williams struggled to raise his young son, Gregory (George O. Gore II), while Torres was shown to be fighting family and other related problems, including having to cope with his father (Mike Torres, played by Jose Perez), whose drug addiction and HIV-positive status causes recurring issues, and a childhood-friend turned organized-crime boss.
At the beginning of the third season, a new detective, Tommy McNamara (Jonathan LaPaglia), was introduced as a principal character. In the third-season finale in May 1997, Torres and Moreno are married. However, in that same episode, Torres and McNamara are both killed by a gang of bank robbers.
The series returned with a new cast for its fourth and final season in January 1998. Williams and Moreno were assigned to a new unit, resulting in Cooper being dropped from the cast. Joining the detectives were Lt. Malcolm Barker (played by Tommy Ford), Det. Nell Delaney (Marisa Ryan), and Det. Alec Stone (Josh Hopkins). The new unit eventually captured the last bank robber responsible for the deaths of Torres and McNamara.
Controversies
On July 23, 1996, the day shooting was supposed to begin on the third season, lead actors Malik Yoba and Michael DeLorenzo didn't show up, having joined together and presenting a list of demands to creator/producer Dick Wolf. Both actors wanted their pay increased, DeLorenzo stated that the duo were making $40,000 each per episode and they wanted $100,000 each per episode. They also wanted more creative inpu
|
https://en.wikipedia.org/wiki/Quantitative%20Invisibility
|
In computer-aided design (CAD)/CAM, quantitative invisibility (QI) is the number of solid bodies that obscure a point in space as projected onto a plane. Often, CAD engineers project a model into a plane (a 2D drawing) in order to denote edges that are visible with a solid line, and those that are hidden with dashed or dimmed lines.
Algorithm
Tracking the number of obscuring bodies gave rise to an algorithm that propagates the quantitative invisibility throughout the model. This technique uses edge coherence to speed calculations in the algorithm. However, QI really only works well when bodies are larger solids, non-interpenetrating, and not transparent.
A technique like this falls apart when applied to soft organic tissue as found in the human body, because there is not always a clear delineation of structures. Also, when images become too cluttered and intertwined, the contribution of this algorithm is marginal. Arthur Appel of the graphics group at IBM Watson Research coined the term quantitative invisibility and used it in several of his papers.
External links
Vector Hidden Line Removal and Fractional Quantitative Invisibility
References
Appel, A., "The Notion of Quantitative Invisibility and the Machine Rendering of Solids," Proceedings ACM National Conference, Thompson Books, Washington, DC, 1967, pp. 387–393, pp. 214–220.
3D computer graphics
|
https://en.wikipedia.org/wiki/Clique%20%28disambiguation%29
|
A clique is a close social group.
Clique or The Clique may also refer to:
Math and computing
Clique (graph theory)
Clique problem in computer science
Business and brands
Clique (vodka), a Latvian vodka sold in the United States
Entertainment and the arts
Clique (TV series), an online serial on BBC Three
The Clique (art group), a group of Victorian artists
St John's Wood Clique a later group of Victorian artists
The Clique (series) by Lisi Harrison
The Clique (novel), a novel in the series
The Clique (film), based on the series
Music groups
The Clique (American band), a late 1960s U.S. sunshine pop band from Houston
The Clique (British band), a 1990s mod band
Skeleton Clique, or the Clique, the fan base of American musical duo Twenty One Pilots
The Clique (duo), an Australian pop duo
Cliques, the piccolo and marching drum bands at the Carnival of Basel
Destinee & Paris, a girl group formerly known as Clique Girlz
HaClique, a 1980s Israeli rock band from Tel-Aviv
The Wrecking Crew was sometimes referred to as "The Clique"
The Cliques, a 1950s American R&B vocal duo of Jesse Belvin and Eugene Church
Songs
"Clique", a 1974 single by Con Funk Shun
"Clique" (song), a 2012 song by rappers Kanye West, Jay-Z and Big Sean
Other
Clique (professional wrestling), a famous 1990s group of professional wrestlers
Château Clique, a group of wealthy families in Lower Canada in the early 19th century
Ruling clique in politics (especially in the history of China)
Fujian clique, a group of Chinese politicians with close ties to Xi Jinping's time in Fujian
See also
Claque
Click (disambiguation)
|
https://en.wikipedia.org/wiki/Networked%20book
|
A networked book is an open book designed to be written, edited, and read in a networked environment. It is also a platform for social exchange, and is potentially linked to other books and other discussions. Wikipedia can be considered a networked book. LetsAuthor is a publishing company that exclusively publishes networked books created on its platform.
Characteristics
The networked book has four primary characteristics:
The Networked Book is an Open Book
The Networked Book is Structurally Granular or Disaggregated
The Networked Book is Social
The Networked Book is Processed
Open book
The networked book maintains an open structure during all or part of its creation. For example, Lawrence Lessig's, Code: Version 2.0 used a wiki to open the editing process for the second edition of Code and Other Laws of Cyberspace, in order to "draw upon the creativity and knowledge of the community. This is an online, collaborative book update; a first of its kind. Once the project nears completion, Professor Lessig will take the contents of this wiki and ready it for publication." In other words, at some point the book was declared finished, and closed to further input and adjustment by the community. Another example of an open book structure is the popular Wikipedia. This online wiki encyclopedia is entirely and indefinitely open.
Another example of a networked book is Turbulence.org's 2009 commissioned anthology, Networked: a (networked book) about (networked art). The website explores writing, art, and culture in networked society, and explores the subject on multiple levels. In addition to the thematic matter, the initial commissioned authors were invited to submit chapters using a blog or wiki format. While seven of the authors chose the blog format (with the CommentPress plugin), artist/theorist Patrick Lichty created a wiki-formatted chapter, "Art in the Age of Dataflow", which discusses literary theories of spatial narrative from its inception in the 1940s to the age of big data. Like Lawrence Lessig's text, Dataflow was intended as a propositional text from which the online community expand on the original chapter. The chapter as it existed in 2012 was captured and included in Lichty's Institute for Networked Culture book, "Variant Analyses, Interrogations of New Media Art and Culture".
Structurally granular or disaggregated
The networked book manifests a certain "disarticulation of the body of text" and "disaggregated/reaggregated" structure as described by Raffaele Simone in his essay, The Body of the Text. "Disarticulation of the body of the text occurs when the text generated by an author is not perceived as closed to external interventions, an entity to which the author can have access only to read (or, to use an information science image, in the manner of ROM, that is "read only"), but as an open entity to which one has access—for purposes of both reading and writing. When the text is disarticulated it is perceived as an entity which
|
https://en.wikipedia.org/wiki/One%20Man%20and%20His%20Droid
|
One Man and His Droid is a game published by Mastertronic in 1985 for use on the Amstrad CPC, Atari 8-bit family, Commodore 16, Commodore 64, and ZX Spectrum home computer systems. The name of the game is a play on the title of the BBC television show One Man and His Dog. The object of the game is to use a doglike droid to collect Ramboids, the male form of alien sheep. The player must move these Ramboids into teleporters to win the game.
Gameplay
Before the game begins, the player is given the option of inputting a password in order to resume a game they were playing earlier, otherwise starting at the beginning. There are passwords for each of the twenty different ramboid-filled caverns, and as the player progresses through each cavern, the computer releases the corresponding password.
At the start of a game, the screen is split up into several different windows. Largest and centrally placed is the main window that looks into a cavern, displaying a view of the droid placed centrally amongst the scenery. The first task is to guide the droid to the start position.
Ramboids are dim. They move very predictably, and always reverse their direction of movement if their way is blocked. They are also delicate creatures that only live for about twenty minutes. The player is working against the clock all the time. Should the player fail to get at least four Ramboids in the teleport in the right order within the time, play is returned to the first screen.
Music
The music for the Commodore 64 version was composed by Rob Hubbard. Commodore 64 enthusiasts and former owners frequently list Hubbard's composition as being one of the finest to feature in any game released for that machine. Hubbard himself states that he took inspiration from Jean-Michel Jarres' album Magnetic Fields for this song.
The Atari 8-bit and Amstrad versions had a different theme, which was shorter.
Reception
Zzap!64'''s reviewers thought that, although the game had basic graphics, it was enjoyable to play, with the bonus of a good soundtrack. It was given an overall rating of 81%.
Legacy
A follow-up, One Man and his Droid II'', was written for the ZX Spectrum in 1991 but wasn't commercially published. It was eventually released on the internet in 2001 by its programmer, Clive Brooker.
References
External links
Crash magazine review
Clive Brooker's website for One Man and His Droid II
One Man and His Droid at Plus/4 World.
1985 video games
Commodore 16 and Plus/4 games
Commodore 64 games
ZX Spectrum games
Mastertronic games
Amstrad CPC games
Atari 8-bit family games
Video games scored by Rob Hubbard
Video games developed in the United Kingdom
Single-player video games
Action games
Puzzle video games
Video games about robots
|
https://en.wikipedia.org/wiki/Tron%3A%20Deadly%20Discs
|
Tron: Deadly Discs is a video game for the Intellivision console published by Mattel in 1982. The initial game design was done by Don Daglow, with further design and programming by Steven Sents. It is the first of three Intellivision games based on the Disney motion picture Tron.
Mattel released an Atari 2600 version under its M Network label. It was also ported to the Mattel Aquarius.
In Tron: Deadly Discs, the player takes the role of Tron, fighting successive waves of enemy Disc-throwers and Recognizers in a never-ending quest to achieve the highest score.
Gameplay
As Tron, the player controls a red man with a yellow Disc. He is pitted in a square arena with black walls. Enemies will appear through doorways and throw their Discs at him. The player has to eliminate all the enemies with his own Disc, as well as surviving bonus rounds against the Recognizer.
The player can throw the Disc in eight directions. When thrown, the Disc first appears as a thin horizontal line and can only move in a straight line. While in this mode, Tron's Disc (and any other Disc thrown in the game) can inflict damage, and can also "lock" doors. When it reaches the wall (or when the player calls the Disc back by hitting any directional throw button), it automatically floats back to the player and appears as a square. It is harmless in this mode.
Unlike enemy Disc-throwers, Tron can block enemy Discs with his own. When an enemy Disc is blocked, it is destroyed and the enemy is temporarily disarmed until a replacement Disc floats in ten seconds later.
The doorways enemies appear in can be jammed so that they remain open between waves. Doorways appear blue when they first open, but will turn green if Tron either hits them with his Disc or runs into them. Blue doors close at the end of the current wave of enemies, but green ones remain open. If two doors directly across from each other are jammed open, Tron can run into one and immediately reappear at the other, allowing for easier dodging and Disc retrieval. Enemies cannot use the doors in this manner.
If Tron warps through a pair of doors, a Recognizer will appear on the field after the wave is over and begin closing all jammed doors. The player can score bonus points by hitting the Recognizer's eye in a vulnerable spot; doing so forces it off the field and leaves any jammed doors open.
The game ends if Tron touches a Recognizer, takes too many hits from enemy Discs without enough time to recover from them, or is hit by a paralyzing baton that enemies carry in advanced waves.
Enemies
The player should note that Tron, unlike many of the enemies in the game, can withstand multiple Disc-hits. As the game progresses, Tron's threshold of damage rises. The player can tell how many hits he can take by how fast he moves. The faster he is, the stronger he is. Also, Tron regains strength automatically. Tron can only be damaged by an enemy's weapon, so simply running into an enemy does nothing (unless they're a Guard).
All
|
https://en.wikipedia.org/wiki/Spacey%20Awards
|
The Spacey Awards (also referred to as The Spaceys) was an annual award presented by the Canadian cable network Space from 2003 to 2007. Awards were presented in the areas of sci-fi, fantasy and horror films, television series and video games. The awards included both audience-voted categories and juried categories, whose winner was selected by a committee of employees of the channel. The award statue was an alien with large, insectoid eyes.
The awards were known for their use of humor, often with skits built around both the presenting and the receiving of awards. Rather than hosting a formal ceremony, SPACE instead took the awards to the winners, often visiting them on the set of their latest production, or in some other setting. Richard Dean Anderson of Stargate SG-1 was noted for his comedic acceptance speeches (one of which during the 2nd Spacey Awards ran so long it was run in installments throughout the broadcast). Anderson was not nominated for the 4th annual awards as he was no longer a cast member of Stargate; instead, he presented an award to the actor who replaced him on Stargate via an extended art film parody of My Dinner with Andre. The Spacey Awards were produced by Michelle Dudas and Simon Evans.
The awards were hosted by Natasha Eloi and Jonathan Llyr, with Kim Poirier becoming co-host with the 2005 awards. The Best of the Spaceys, a special showing clips from past awards, aired on May 18, 2007.
The awards were discontinued after Space's owner, CHUM Limited, was acquired by CTVglobemedia.
1st Spacey Awards (2003)
The 1st Spacey Awards were presented on June 26, 2003. Awards included a lifetime achievement award to William Shatner, and a special achievement award to the town of Vulcan, Alberta, for its municipal tourism campaign embracing and celebrating the Star Trek associations of its name.
Favourite TV Series: Buffy the Vampire Slayer
Favourite Canadian TV Series: Stargate SG-1
Favourite Movie Hero: Aragorn from The Lord of the Rings: The Two Towers
Favourite Movie Villain: Dr. Evil from Austin Powers in Goldmember
Favourite TV Hottie: T'Pol from Star Trek: Enterprise
Favourite Creature Character: Gollum from The Lord of the Rings: The Two Towers
Science Fiction/Fantasy Movie: The Lord of the Rings: The Two Towers
Best Horror/Suspense Movie: The Ring
Best Animated Movie: Spirited Away
Best Visual SFX: Star Wars: Episode II – Attack of the Clones
Best Action Sequence: The Lord of the Rings: The Two Towers – Battle of Helm's Deep
Lifetime Achievement Award: William Shatner
Special Achievement Award: Vulcan, Alberta
2nd Spacey Awards (2004)
The 2nd Spacey Awards were presented on April 18, 2004.
Favourite TV Character, Male: Spike, Angel
Favorite TV Character, Female: T'Pol, Star Trek: Enterprise
Favourite Movie Villain (Sci-Fi/Fantasy): Agent Smith, The Matrix Reloaded and The Matrix Revolutions
Favourite Movie Villain (Horror): Death, Final Destination 2
Favourite Canadian TV Series: Stargate SG-1
Favourite TV Series:
|
https://en.wikipedia.org/wiki/Penultimate%20hop%20popping
|
Penultimate hop popping (PHP) is a function performed by certain routers in an MPLS enabled network. It refers to the process whereby the outermost label of an MPLS tagged packet is removed by a label switch router (LSR) before the packet is passed to an adjacent label edge router (LER). The benefit is that the LSR has to do a label lookup anyway and it doesn't make a difference whether this results in a label swap or pop. However, for the LER this saves one cycle of label lookup.
The process is important in a Layer 3 MPLS VPN () environment as it reduces the load on the LER. If this process didn't happen, the LER would have to perform at least 2 label lookups:
The outer label, identifying that the packet was destined to have its label stripped on this router.
The inner label, to identify which Virtual Routing and Forwarding (VRF) instance to use for the subsequent IP routing lookup.
In large, loaded networks the additional time required for second label lookup can make a difference in the overall forwarding performance and reduce buffering.
PHP functionality is achieved by the LER advertising a label with a value of 3 to its neighbours. This label is defined as "implicit-null" and informs the neighbouring LSR(s) to perform PHP.
External links
What Is PHP (Penultimate Hop Popping)
MPLS - Penultimate Hop Popping
MPLS PHP Lab
MPLS networking
|
https://en.wikipedia.org/wiki/Richard%20Vander%20Wende
|
Richard Vander Wende is an American visual designer and video game designer best known for his work on the 1992 Disney film Aladdin and the Cyan Worlds computer game Riven.
Career
Vander Wende's career began at Industrial Light & Magic (ILM), working on projects such as the films Willow and Innerspace as a concept designer. Because of a fondness for the old Disney films, Vander Wende took a position at Walt Disney Feature Animation. His early visual development for Aladdin led directors Ron Clements and John Musker to choose that story as the subject for their next film. Vander Wende eventually became production designer for the film.
Following his stint at Disney, Vander Wende became interested in the potential of computer games as a medium for telling a different kind of story. After a chance meeting with Robyn Miller, he began working at Cyan (currently, Cyan Worlds) and eventually became co-director and co-designer of the computer game Riven; the sequel to Myst. His more cinematic visual influence is clearly seen throughout the Riven world. His wife Kate had a cameo appearance in the game as Leira/Keta. After the successful launch of Riven, Vander Wende left Cyan to pursue other work before returning to Cyan in 2023 as Director of their upcoming remake of Riven.
External links
Richard Vander Wende's personal website
WIRED magazine - Riven cover story
Feature Creatures, a newspaper interview
Northwest Museum of Arts and Culture - Richard Vander Wende gives a talk.
American production designers
American video game designers
Living people
Year of birth missing (living people)
Art Center College of Design alumni
|
https://en.wikipedia.org/wiki/University%20of%20Aizu
|
The University of Aizu () in Aizuwakamatsu, Japan, is the first university dedicated to computer science engineering in Japan.
UoA was ranked 18th (2nd among public universities) and was ranked 7th in the field of computer science in "THE World University Rankings Japan 2022" by Times Higher Education (THE), a British education magazine, released on March 25, 2021. This ranking evaluates universities based on 16 indicators in four areas: educational resources, educational enrichment, educational outcomes, and internationalization, and the University of Aizu was ranked second among public universities.
It was ranked 1st in Fostering Entrepreneurship Number of university-launched ventures(Public universities in Japan). The UoA is recognized by many companies and has maintained nearly a 100% of employment rate since its foundation.
Description
The University of Aizu is in Aizuwakamatsu city in Fukushima prefecture, Japan.
The university specializes in computer science education, both hardware and software, at the undergraduate and postgraduate levels. It is known for its open access to computers; there is a 1:1 ratio of computers to students, and students have access to a computer 24 hours a day. Additionally, the computers are replaced every three years, so the available computer equipment is always recent technology.
In addition to computer science, English language education is an important aspect of the University of Aizu. The university is officially bilingual and all official meetings and correspondence are interpreted and translated. Approximately 40% of professors come from overseas, including countries such as Vietnam, India, South Korea, Canada, United States, Russia and China. Not only do students enroll in English courses throughout their undergraduate programs, many of their computer science courses are taught in English. Students are required to write a graduation thesis in English. The university has international students at the masters and doctoral levels.
In 2005, the University of Aizu was chosen by the Japanese government, along with 20 other universities, to be a national center responsible for the improvement of international education. In this role, the University of Aizu carries out computer science research in collaboration with foreign universities such as Shanghai University, China and Saint Petersburg State University, Russia. The University of Aizu has research ties with many universities overseas, has international staff, and accepts students from abroad.
The president is MIYAZAKI Toshiaki.
Top Global University
In September 2014, the Ministry of Education, Culture, Sports, Science and Technology (MEXT) selected the University of Aizu as one among 37 universities for the Top Global University Project.
Campus
The university is located on a 20 hectare campus in Aizu-Wakamatsu, Fukushima. The university has a student dormitory, sports and swimming facilities, and numerous playing fields.
Faculties and gradua
|
https://en.wikipedia.org/wiki/Arkansas%20PBS
|
Arkansas PBS (sometimes shortened to AR PBS) is a state network of PBS member television stations serving the U.S. state of Arkansas. It is operated by the Arkansas Educational Television Commission, a statutory non-cabinet agency of the Arkansas government operated through the Arkansas Department of Elementary and Secondary Education, which holds the licenses for all of the public television stations based in the state. The commission is managed by an independent board of university and education officials, and gubernatorial appointees representing each of Arkansas's four congressional districts. Along with offering television programs supplied by PBS and various independent distributors, the network produces public affairs, cultural and documentary programming as well as sports events sanctioned by the Arkansas Activities Association (AAA).
The broadcast signals of the six full-power and five low-power translator stations that make up the Arkansas PBS network cover almost the entire state, as well as portions of the neighboring states of Mississippi, Tennessee, Missouri, Oklahoma, Texas, and Louisiana that have overlapping access to PBS programming through locally based public television stations; its programming is distributed via a thirteen-site microwave interconnection relay system around the state, which covers most of Arkansas, as well as parts of surrounding states.
Arkansas PBS also provides online education programs for classroom use and teacher professional development through ArkansasIDEAS (in collaboration with the Arkansas Department of Education), livestreams of state government and board proceedings and other government activities through the Arkansas Citizens Access Network (AR-CAN), and audio reading services for the blind and visually impaired through the Arkansas Information Reading Service for the Blind (AIRS); it also maintains the state's Warning, Alert and Response Network (WARN) infrastructure to disseminate emergency alerts to Arkansas residents. The main offices, production facilities and network operations of Arkansas PBS are based out of the R. Lee Reaves Center for Educational Telecommunications, located adjacent to the University of Central Arkansas in Conway.
History
Incorporation and development
Arkansas PBS traces its history to June 4, 1954, when the Arkansas Educational Television Association (AETA) was created as a voluntary committee representing 90 organizations lobbying the Arkansas General Assembly to fund and develop a non-commercial educational television service and to file applications with the Federal Communications Commission (FCC) to reserve broadcast television frequencies in selected cities throughout Arkansas for non-commercial use. Following a two-year legislative study to assess the need for educational television programming in Arkansas, on March 8, 1961, the Arkansas General Assembly approved Act of Arkansas, Acts 1961, No. 198 (as amended under Arkansas Code § 6-3-101 to 6-3-113), whic
|
https://en.wikipedia.org/wiki/Eduware
|
Eduware may refer to:
Edu-Ware, a defunct educational software publisher, 1979–1985
Educational software, computer software created for the purpose of teaching or self-learning.
Educational games, games explicitly designed with educational purposes.
Educational technology, the study and practice of using technological processes to facilitate learning.
|
https://en.wikipedia.org/wiki/KARK-TV
|
KARK-TV (channel 4) is a television station in Little Rock, Arkansas, United States, affiliated with NBC. It is owned by Nexstar Media Group alongside MyNetworkTV affiliate KARZ-TV (channel 42); Nexstar also provides certain services to Fox affiliate KLRT-TV (channel 16) and Pine Bluff–licensed CW affiliate KASN (channel 38) under a local marketing agreement (LMA) with Mission Broadcasting. The stations share studios at the Victory Building on West Capitol Avenue and South Victory Street (near the Arkansas State Capitol) in downtown Little Rock, while KARK-TV's transmitter is located on Shinall Mountain.
KARK-TV serves as a master hub for Nexstar and Mission stations in Little Rock and Fayetteville, Arkansas, and Monroe and Shreveport, Louisiana.
History
The station first signed on the air on April 15, 1954; KARK is Little Rock's second-oldest continuously operating television station, after KATV (channel 7), which beat KARK to the air by almost five months. It was owned by oil magnate Thomas Harry Barton, and was first operated from studios located on Spring Street in Little Rock.
Barton died in 1960 and in 1966 his family sold the station to Mullins Broadcasting, then-owner of KBTV (now KUSA) in Denver in 1966. After the company's owner John C. Mullins died in 1969, the Mullins estate sold both KBTV and KARK to Combined Communications in 1972. In 1976, the station moved to a new facility located on West 3rd Street in downtown Little Rock. Combined's television station properties would eventually be acquired by the Gannett Company seven years later in 1979, in what was the largest media merger in United States history at the time. In 1983, Gannett sold KARK to Southwest Media, a subsidiary of United Broadcasting, a one-time owner of WMUR-TV in Manchester, New Hampshire, and also the owner of KDBC-TV in El Paso, Texas, and WTOK-TV in Meridian, Mississippi; Gannett would re-enter the Little Rock-Pine Bluff market when it acquired rival CBS affiliate KTHV (channel 11) from the Arkansas Television Company in December 1994.
United Broadcasting sold off its television station properties in 1988, KARK was then sold to Morris Multimedia. In April 2002, KARK relocated its operations from its longtime studios on 3rd Street to its current location on West Capitol Avenue. In 2003, Morris Multimedia sold KARK as well as WDHN in Dothan, Alabama, to the Nexstar Broadcasting Group, which eventually consolidated most of KARK's sports operations with those of its sister stations in Northwest Arkansas, NBC affiliate KNWA-TV and Fox affiliate KFTA-TV.
In October 2008, Nexstar Broadcasting announced that it would purchase MyNetworkTV affiliate KWBF (channel 42) from Equity Media Holdings for $4 million. The Federal Communications Commission (FCC) approved the purchase on December 23 of that year. However, although the purchase was slated to be finalized at the end of January 2009, its consummation was ultimately delayed nearly a month and a half until March 12
|
https://en.wikipedia.org/wiki/Pathfinding
|
Pathfinding or pathing is the plotting, by a computer application, of the shortest route between two points. It is a more practical variant on solving mazes. This field of research is based heavily on Dijkstra's algorithm for finding the shortest path on a weighted graph.
Pathfinding is closely related to the shortest path problem, within graph theory, which examines how to identify the path that best meets some criteria (shortest, cheapest, fastest, etc) between two points in a large network.
Algorithms
At its core, a pathfinding method searches a graph by starting at one vertex and exploring adjacent nodes until the destination node is reached, generally with the intent of finding the cheapest route. Although graph searching methods such as a breadth-first search would find a route if given enough time, other methods, which "explore" the graph, would tend to reach the destination sooner. An analogy would be a person walking across a room; rather than examining every possible route in advance, the person would generally walk in the direction of the destination and only deviate from the path to avoid an obstruction, and make deviations as minor as possible.
Two primary problems of pathfinding are (1) to find a path between two nodes in a graph; and (2) the shortest path problem—to find the optimal shortest path. Basic algorithms such as breadth-first and depth-first search address the first problem by exhausting all possibilities; starting from the given node, they iterate over all potential paths until they reach the destination node. These algorithms run in , or linear time, where V is the number of vertices, and E is the number of edges between vertices.
The more complicated problem is finding the optimal path. The exhaustive approach in this case is known as the Bellman–Ford algorithm, which yields a time complexity of , or quadratic time. However, it is not necessary to examine all possible paths to find the optimal one. Algorithms such as A* and Dijkstra's algorithm strategically eliminate paths, either through heuristics or through dynamic programming. By eliminating impossible paths, these algorithms can achieve time complexities as low as .
The above algorithms are among the best general algorithms which operate on a graph without preprocessing. However, in practical travel-routing systems, even better time complexities can be attained by algorithms which can pre-process the graph to attain better performance. One such algorithm is contraction hierarchies.
Dijkstra's algorithm
A common example of a graph-based pathfinding algorithm is Dijkstra's algorithm. This algorithm begins with a start node and an "open set" of candidate nodes. At each step, the node in the open set with the lowest distance from the start is examined. The node is marked "closed", and all nodes adjacent to it are added to the open set if they have not already been examined. This process repeats until a path to the destination has been found. Since the lowest
|
https://en.wikipedia.org/wiki/KLRT-TV
|
KLRT-TV (channel 16) is a television station in Little Rock, Arkansas, United States, affiliated with the Fox network. It is owned by Mission Broadcasting alongside Pine Bluff–licensed CW affiliate KASN (channel 38); Mission maintains a local marketing agreement (LMA) with Nexstar Media Group, owner of NBC affiliate KARK-TV (channel 4) and MyNetworkTV affiliate KARZ-TV (channel 42), for the provision of certain services. All four stations share studios at the Victory Building on West Capitol Avenue and South Victory Street, near the Arkansas State Capitol, in downtown Little Rock; KLRT-TV's transmitter is located at the Shinall Mountain antenna farm, near the city's Chenal Valley neighborhood.
KLRT-TV began broadcasting in June 1983 as the first independent station in the market and the first UHF station in central Arkansas in nearly 30 years. It was owned by a consortium dominated by MMT Sales, a national advertising sales representative for TV stations, and featuring six other partners who had been its competing applicants. After briefly becoming a Fox affiliate in September 1989 in connection with a planned acquisition of KASN assets that fell through, the network moved its affiliation for good to KLRT-TV in 1990. The next year, Clear Channel Television acquired KLRT-TV, followed by the assets of KASN, which Clear Channel then began controlling under a local marketing agreement. A local news program debuted in 2004. Clear Channel spun out its television stations to Newport Television, controlled by Providence Equity Partners, in 2007.
In 2012, Nexstar purchased some of the stations of Newport; it then assigned the purchase of KLRT-TV and KASN to Mission Broadcasting, which then contracted with Nexstar for services. As a result, most of KLRT-TV's management and news staffers were dismissed as functions were consolidated with KARK-TV. The combined newsroom airs weekday morning, early evening, and late evening newscasts on channel 16.
History
The first proposal for a channel 16 station in Little Rock reached the construction permit stage with a grant by the Federal Communications Commission (FCC) in March 1966. The station would have been owned by the Victor Broadcasting Company, controlled by Connecticut industrialist Victor Muscat alongside Little Rock radio station KMYO. Originally planned to launch in 1967, its backers opted to wait until the FCC granted them an increase in their effective radiated power. The construction permit remained on the books until being deleted by the start of 1974.
As an independent station
Interest in building channel 16 was rekindled in the late 1970s by groups seeking different uses. One, Arkansas Christian Television, sought to build a Christian television station; others proposed subscription television programming. The final field of applicants for channel 16 numbered eight. Other notable bidders included Milton Grant's Grant Broadcasting Corporation; a group led by former KARK-TV news anchor Deborah Mat
|
https://en.wikipedia.org/wiki/Victory%20Television%20Network
|
The Victory Television Network (VTN) is a religious independent television network serving the U.S. state of Arkansas. It serves as the broadcasting arm of the Little Rock–based Agape Church, and is operated by a namesake parent subsidiary that holds the licenses for the three stations that comprise the network: flagship station KVTN-DT (channel 25) in Pine Bluff, and satellites KVTH-DT (channel 26) in Hot Springs and KVTJ-DT (channel 48) in Jonesboro. Although all three stations have commercial licenses, VTN—which is the only Christian-oriented television network headquartered in Arkansas and is among the few religious independent stations located outside of a major U.S. television market—operates as a non-profit entity reliant on monetary contributions from its viewers to fund its operations.
In addition to its broadcast stations, VTN's programming is available on more than 225 cable systems across Arkansas. Through their over-the-air, cable and satellite distribution, the VTN stations reach 1.2 million homes across the state of Arkansas, western Tennessee, the bootheel of Missouri and portions of northwestern Mississippi. The main offices, production facilities and network operations of the Victory Television Network are located at the Agape Church campus on Napa Valley Drive (west of Interstate 430) in western Little Rock.
History
The network was founded by husband-and-wife Howard "Happy" Caldwell II and Jeanne Caldwell, who co-founded the Agape Church in 1979; the Caldwells served as pastors of the church until their semi-retirement in December 2013. In 1987, the Caldwells began developing a television ministry that would utilize the church's production facilities to distribute its weekly services and other ministerial programs, including programs leased to other local ministries, along with acquiring brokered daily and weekly religious programs from non-Arkansas-based ministries that were available in syndication.
On April 28, 1987, KIXK Inc., owned by the El Dorado radio station of the same name, donated the construction permit for KZRQ (channel 25), an unbuilt commercial television station licensed to Pine Bluff, to the Agape Church for $40,611. The transaction was granted by the Federal Communications Commission (FCC) on June 30. The station, which was assigned the call letters KVTN, signed on the air on December 1, 1988, broadcasting from a transmitter near Arkansas Highway 161 in western Jefferson County (located west of England).
By the early 1990s, the Caldwells made plans to expand their television ministry—which they branded as the "Victory Television Network"—into other sections of Arkansas. On February 17, 1993, PPD&G, Inc., sold the license assets of KRZB-TV (channel 26) in Hot Springs to the Agape Church for $75,000. KRZB-TV had operated from 1986 to 1988 as an independent station but succumbed to mounting financial problems and a signal that did not reach Little Rock. The sale received FCC approval on November 16, 1993, a
|
https://en.wikipedia.org/wiki/Remote%20collision
|
A remote collision, in CSMA/CD computer networks, is a collision that occurs when a frame having length less than minimum length and with an incorrect frame check sequence, is transmitted. This frame causes a collision at the remote end which will not be detected by the transmitter.
Ethernet
|
https://en.wikipedia.org/wiki/Christopher%20Ward%20%28songwriter%29
|
Christopher William Ward (born 28 July 1949) is a Canadian songwriter and broadcaster, known as a former long-standing on-air personality at MuchMusic, Canada's music video network, where he and J. D. Roberts were among the first video jockeys in 1984. Ward was a judge on The Next Star which was a Canadian reality television show on YTV.
Early career
Born in Toronto, Ontario, Ward began his music career in the early 1970s while attending Trent University in Peterborough, Ontario where he was a member of the school's campus radio station.
Broadcasting
Some of Ward's early television appearances began in 1978 on the CBC children's series Catch Up, as leader of the show's band. He also played a minor role as a musician in an episode of The Kids of Degrassi Street alongside Alannah Myles in 1984.
Before MuchMusic launched, Ward hosted a weekend, all-night video program called City Limits on CITY-TV in Toronto. On Friday and Saturdays, from midnight to 6 a.m., Ward broke ground as Canada's first "veejay". The show was broadcast from CITY-TV's old Queen Street East studios and apart from playing the latest music videos, hosted guests. Bands such as Bon Jovi and actors like Mike Myers—playing his Wayne's World character long before Saturday Night Live made it famous—added to the prototype of what MuchMusic would become. The show also had "video clip" contest segments which gave winners prizes to special events like movie debuts. Broadcast only in the Toronto region, it was a major way music videos were introduced to the Southern Ontario public. (MTV, the American television network, was not broadcast in Canada due to regulatory laws protecting Canadian content until 2006.) When the Canadian Radio-television and Telecommunications Commission (CRTC) granted a broadcast licence for an all-music channel to begin in 1984, CHUM-CITY won the lucrative rights. The application process to the Commission included Ward's current show as evidence of experience in broadcasting music video entertainment.
During five years on MuchMusic, Ward interviewed artists like Paul McCartney, Tina Turner, Peter Gabriel, Leonard Cohen, and Kate Bush. While with the network, he hosted another show titled City Limits that spotlighted alternative music. Even after his departure from MuchMusic in the late 1980s, he was still involved in the channel off-and-on, most notably as Charles de Camembert, host of the annual Fromage specials.
In 2008, Ward became a judge on YTV's The Next Star for its first four seasons until 2011.
Songwriting
Ward has written many songs for artists such as Hilary Duff, Diana Ross, Backstreet Boys, Wynonna Judd, Amanda Marshall, Tina Arena, Peter Cetera, Anne Murray and Meredith Brooks. His best-known song is the Billboard number one single "Black Velvet", recorded by Alannah Myles. "Black Velvet" was named the No. 49 song in Bob Mersereau's book The Top 100 Canadian Singles. Ward has released several of his own recordings, including the singles "Once
|
https://en.wikipedia.org/wiki/Bhutan%20Time
|
Bhutan Time (BTT) is the time zone of Bhutan. It is six hours ahead of UTC (UTC+06:00). Bhutan does not observe Daylight saving time.
IANA time zone database
The IANA time zone database contains one zone for Bhutan in the file zone.tab, which is named Asia/Thimphu.
See also
Bangladesh Standard Time
References
Geography of Bhutan
Time zones
|
https://en.wikipedia.org/wiki/False%20nearest%20neighbor%20algorithm
|
Within abstract algebra, the false nearest neighbor algorithm is an algorithm for estimating the embedding dimension. The concept was proposed by Kennel et al. (1992). The main idea is to examine how the number of neighbors of a point along a signal trajectory change with increasing embedding dimension. In too low an embedding dimension, many of the neighbors will be false, but in an appropriate embedding dimension or higher, the neighbors are real. With increasing dimension, the false neighbors will no longer be neighbors. Therefore, by examining how the number of neighbors change as a function of dimension, an appropriate embedding can be determined.
See also
Commutative ring
Local ring
Nearest neighbor
Time series
References
Statistical algorithms
Dynamical systems
Nonlinear time series analysis
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.