source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/Web%20analytics
|
Web analytics is the measurement, collection, analysis, and reporting of web data to understand and optimize web usage. Web analytics is not just a process for measuring web traffic but can be used as a tool for business and market research and assess and improve website effectiveness. Web analytics applications can also help companies measure the results of traditional print or broadcast advertising campaigns. It can be used to estimate how traffic to a website changes after launching a new advertising campaign. Web analytics provides information about the number of visitors to a website and the number of page views, or create user behavior profiles. It helps gauge traffic and popularity trends, which is useful for market research.
Basic steps of the web analytics process
Most web analytics processes come down to four essential stages or steps, which are:
Collection of data: This stage is the collection of the basic, elementary data. Usually, these data are counts of things. The objective of this stage is to gather the data.
Processing of data into metrics: This stage usually takes counts and makes them ratios, although there still may be some counts. The objective of this stage is to take the data and conform it into information, specifically metrics.
Developing KPI: This stage focuses on using the ratios (and counts) and infusing them with business strategies, referred to as key performance indicators (KPI). Many times, KPIs deal with conversion aspects, but not always. It depends on the organization.
Formulating online strategy: This stage is concerned with the online goals, objectives, and standards for the organization or business. These strategies are usually related to making profit, saving money, or increasing market share.
Another essential function developed by the analysts for the optimization of the websites are the experiments:
Experiments and testing: A/B testing is a controlled experiment with two variants, in online settings, such as web development.
The goal of A/B testing is to identify and suggest changes to web pages that increase or maximize the effect of a statistically tested result of interest.
Each stage impacts or can impact (i.e., drives) the stage preceding or following it. So, sometimes the data that is available for collection impacts the online strategy. Other times, the online strategy affects the data collected.
Web analytics technologies
There are at least two categories of web analytics, off-site and on-site web analytics.
Off-site web analytics refers to web measurement and analysis regardless of whether a person owns or maintains a website. It includes the measurement of a website's potential audience (opportunity), share of voice (visibility), and buzz (comments) that is happening on the Internet as a whole.
On-site web analytics, the more common of the two, measure a visitor's behavior once on a specific website. This includes its drivers and conversions; for example, the degree to which differen
|
https://en.wikipedia.org/wiki/WPRI-TV
|
WPRI-TV (channel 12) is a television station in Providence, Rhode Island, United States, affiliated with CBS and MyNetworkTV. It is owned by Nexstar Media Group, which provides certain services to dual Fox/CW affiliate WNAC-TV (channel 64) under a local marketing agreement (LMA) with Mission Broadcasting. Both stations share studios on Catamore Boulevard in East Providence, Rhode Island, while WPRI-TV's transmitter is located on Pine Street in Rehoboth, Massachusetts.
History
WPRO-TV (1955–1967)
The station debuted on March 27, 1955, known as WPRO-TV (for Providence). It was Rhode Island's third television station and was owned and operated, along with WPRO radio (630 AM and 92.3 FM), by retailer Cherry & Webb. WPRO-TV was originally supposed to go on the air in 1953, but the station ran into several delays. It had originally planned to build a transmitter in Rehoboth, but legal disputes with town officials forced Cherry & Webb to find a site in Johnston, Rhode Island.
The station then planned to sign on in 1954, but Hurricane Carol destroyed the Johnston transmitter. The legal disputes in Rehoboth were finally settled in late 1954, and WPRO got the go-ahead to begin construction there. The channel was due to join CBS because of WPRO radio's long affiliation with CBS Radio. Even when it became apparent that WPRO-TV would miss its target air date, CBS opted to continue its secondary affiliation with NBC station WJAR-TV (channel 10) rather than move its programming to ABC affiliate WNET-TV (channel 16, now the present-day WNAC).
When WPRO-TV finally came on the air, ABC gave it right of first refusal for its more popular shows. Within less than a year, WNET had gone dark. This station continued to share ABC with WJAR until WTEV-TV (channel 6, now WLNE-TV) signed-on in 1963.
Channel 12's studios were originally located on the top floor of 24 Mason Street in Downtown Providence with its sister radio stations. The three stations' news facilities were completely integrated. On-air personalities from radio and TV created newscasts together. In fact, some reporters recorded conservative-sounding FM news broadcasts prior to pulling a switch to deliver live, punchy on-air news for the AM station on the hour, with headlines on the half-hour. And some radio news reporters headed into the field with photographers to cover stories simultaneously for radio and TV.
Legendary Providence radio personality Salty Brine had a daily children's show on WPRO-TV. News personalities included Mort Blender and Walter Cryan while the beloved Hank Bouchard did a multitude of on-air duties. That included announcing, hosting programs, and giving the weather report. Cherry & Webb sold WPRO-AM-FM-TV to Albany, New York-based Capital Cities Television Corporation, the predecessor of Capital Cities Communications, in 1959, earning a handsome return on its purchase of WPRO radio in 1931.
WPRI (1967–present)
WPRO-TV was then sold to Poole Broadcasting (owners of WJRT-TV in Fli
|
https://en.wikipedia.org/wiki/Lead%28II%29%20chloride%20%28data%20page%29
|
This page provides supplementary chemical data on lead(II) chloride.
Structure and properties
Thermodynamic properties
Spectral data
Regulatory data
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. It is highly recommend that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source such as SIRI, and follow its directions.
References
Chemical data pages
Chemical data pages cleanup
|
https://en.wikipedia.org/wiki/Cannonball%20Blitz
|
Cannonball Blitz is a game programmed by Olaf Lubeck for the Apple II and published by On-Line Systems in 1982. It was ported to the VIC-20 and TI-99/4A computers. An historic military spin on Donkey Kong, rolling cannonballs replace barrels, a soldier stands in for the large ape, and the objective of the first level is a flag rather than a kidnapped girl.
Gameplay
There are three different screens, the third of which is particularly challenging. After completing the third level, the player views a small celebration scene and then restarts at the first level. Repeated levels only differ from those of the first round in the harsher timing patterns of the game.
Development
Cannonball Blitz achieved some notoriety in the Apple hacking community as being difficult to crack. Track 17, sector D of the game contains the message "YOU'LL NEVER CRACK IT".
Reception
Ron Brinkmann reviewed the game for Computer Gaming World, and stated that "In the final analysis, Cannonball Blitz is a game every bit as challenging and fun as the arcade original. It will give you hours (days, months, years) of enjoyment."
Ahoy! wrote that "Cannonball Blitz [for the VIC-20], make no mistake about it, is Donkey Kong in dress blues. Not a bloody thing new here. However, you're going to find it a barrel of fun". The magazine favorably reviewed the animation and the "unbelievable" sound effects, and concluded that it was "a very good version of a fine game".
References
1982 video games
Apple II games
VIC-20 games
Platformers
Sierra Entertainment games
TI-99/4A games
Video game clones
Video games developed in the United States
Single-player video games
|
https://en.wikipedia.org/wiki/Dying%20to%20Win
|
Dying to Win: The Strategic Logic of Suicide Terrorism is Robert Pape's analysis of suicide terrorism from a strategic, social, and psychological point of view. It is based on a database he has compiled at the University of Chicago, where he directs the Chicago Project on Security and Threats (CPOST). The book's conclusions are based on data from 315 suicide terrorism attacks around the world from 1980 through 2003. Of these, 301 were classified into 18 different campaigns by 11 different militant groups; the remaining 14 appear to have been isolated. Published in May 2005, Pape's volume has been widely noticed by the press, the public, and policymakers alike, and has earned praise from the likes of Peter Bergen, Congressman Ron Paul (R-Texas), and Michael Scheuer.
Dying to Win is divided into three parts, analyzing the strategic, social, and psychological dimension of suicide terrorism.
Detailed synopsis
Introduction
Chapter 1: The Growing Threat
Pape claims to have compiled the world's first "database of every suicide bombing and attack around the globe from 1980 through 2003—315 attacks in all" (3). "The data show that there is little connection between suicide terrorism and Islamic fundamentalism, or any one of the world's religions. ... Rather, what nearly all suicide terrorist attacks have in common is a specific secular and strategic goal: to compel modern democracies to withdraw military forces from territory that the terrorists consider to be their homeland" (4). It is important that Americans understand this growing phenomenon (4–7).
Chapter 2: Explaining Suicide Terrorism
Caveat: the book's conclusions do not hold for terrorism in general (8–9). Pape distinguishes among demonstrative terrorism, which seeks publicity, destructive terrorism, which seeks to exert coercion through the threat of injury and death as well as to mobilize support, and suicide terrorism, which involves an attacker's actually killing himself or herself along with others, generally as part of a campaign (9–11). Three historical episodes are introduced for purposes of comparison: the ancient Jewish Zealots (11–12; see also 33–34), the 11th-12th-century Ismaili Assassins (12–13; see also 34–35), and the Japanese kamikazes (13; see also 35–37).
Pape had graduate students fluent in many languages scour the international press for incidents of suicide terrorism. There was no suicide terrorism from 1945 to 1980 (13–14). They found 315 incidents, beginning with the 1983 Beirut barracks bombing (14). They were able to classify all but 14 of the incidents into 18 different campaigns by 10 different organizations of predominantly Muslim, Hindu or Sikh religious persuasion. These included the Tamil Tigers (July 1990), the Israeli occupation of Palestine (1994), Persian Gulf (1995), Turkey (1996), Chechnya (2000), Kashmir (2000), and the U.S. (2001) (14–15). Five campaigns were still ongoing in early 2004, when Dying to Win was being written (15–16).
Traditional explan
|
https://en.wikipedia.org/wiki/You%20FM%20%28Germany%29
|
YOU FM is one of the radio networks owned and operated by Hessischer Rundfunk, the public broadcaster for the German state of Hesse. Originally operating under the name hr XXL, the network featured the popular show XXL Clubnights which highlighted the night club scene in Hesse. In January 2004, the network was renamed YOU FM ("Young Fresh Music"), partially in an attempt to divest itself of its old "techno station" image.
YOU FM now offers a more traditional mix of mainstream music and niche talk shows, similar to its sister station hr3, but with a more youthful flavor. It operates a 24-hour format, but from 1:00 to 5:30 am it broadcasts a computerized music feed.
Reception
YOU FM can be received in much of north and east Hesse on the following frequencies:
Bensheim 90,2
Darmstadt 98,2
Eschwege 106,6
Frankfurt 90,4
Fulda 93,6
Gießen 97,7
Gelnhausen 99,4
Hanau 90,4
Kassel 100,1
Limburg 90,7
Marburg 93,9
Michelstadt 91,0
Offenbach 90,4
Rüdesheim 92,3
Schlüchtern 88,2
Wetzlar 105,5
Wiesbaden 99,7
Witzenhausen 91,1
References
Radio stations in Germany
Radio stations established in 2004
2004 establishments in Germany
Mass media in Frankfurt
Hessischer Rundfunk
|
https://en.wikipedia.org/wiki/Musipedia
|
Musipedia is a search engine for identifying pieces of music. This can be done by whistling a theme, playing it on a virtual piano keyboard, tapping the rhythm on the computer keyboard, or entering the Parsons code. Anybody can modify the collection of melodies and enter MIDI files, bitmaps with sheet music (possibly generated by the Musipedia server after entering LilyPond or abc source code), lyrics or some text about the piece, or the melodic contours as Parsons Code. Certain features on the site may no longer work due to reliance on flash which became defunct in 2020.
Search principles
Musipedia offers three ways of searching: Based on the melodic contour, based on pitches and onset times, or based on the rhythm alone. For the first two, users can draw notes, play them on a keyboard, or type out an ASCII version of a melody.
Melody
The melodic contour search uses an editing distance. Because of this, the search engine finds not only entries with exactly the contour that is entered as a query, but also the most similar ones among the contours that are not identical. The similarity is measured by determining the editing steps (inserting, deleting, or replacing a character) that are needed for converting the query contour into that of the search result. Since only the melodic contour is relevant, one can find melodies even if the key, rhythm, or the exact intervals are unknown.
Pitch and rhythm
The pitch and onset time-based search takes more properties of the melody into account. This search method, which is used by default, is still transposition-invariant and tempo-invariant, but it takes rhythm and intervals into account. The melody can be entered in various ways, for example by clicking on a virtual keyboard on the screen. The search engine then segments the query, converts each segment into a set of points in the two-dimensional space of onset time and pitch, and, by using the Earth Mover's Distance, compares each point set to pre-computed point sets representing segments of melodies from the database. As with the contour search, little alterations of the query will lead to correspondingly small changes in the results, which makes the search method somewhat error-tolerant.
Tapping a rhythm
The "query by tapping" method that only takes the rhythm into account uses the same algorithm as the pitch and onset time method, but assumes all pitches to be the same. As a result, the algorithm can be used for tapped queries that only contain onset times.
This search method is also very easy to do for those with limited accessibility options or using very small input devices.
Indexing
Both search algorithms are made faster with indices that are based on vantage objects. Instead of calculating the distance between the query and every single database entry, Musipedia just calculates the distance between the query and each of a few vantage objects. For every vantage object, the distance to each database entry is known. Since the triangle inequ
|
https://en.wikipedia.org/wiki/Owned-and-operated%20station
|
In the broadcasting industry, an owned-and-operated station (frequently abbreviated as an O&O) usually refers to a television or radio station owned by the network with which it is associated. This distinguishes such a station from an affiliate, which is independently owned and carries network programming by contract.
The concept of an O&O is clearly defined in the United States and Canada (and to some extent, several other countries such as the United Kingdom, Australia, Brazil, Argentina, Chile and Japan), where network-owned stations had historically been the exception rather than the rule. In such places, broadcasting licenses are generally issued on a local (rather than national) basis, and there is (or was) some sort of regulatory mechanism in place to prevent any company (including a broadcasting network) from owning stations in every market in the country. In other parts of the world, many television networks were given national broadcasting licenses at launch; as such, they have traditionally been mostly (or entirely) composed of owned-and-operated stations, rendering a separate notion for such a concept redundant.
Usage of the term in the United States
In the broadcasting industry, the term "owned-and-operated station" refers exclusively to stations that are owned by television and radio networks. On the other hand, the term "affiliate" only applies to stations that are not owned by networks, but instead are contracted to air programming from one of the major networks. While in fact there may be an affiliation agreement between a network and an owned-and-operated station, this is not necessarily required, and may simply be a legal technicality formalizing the relationship of separate entities under the same parent company. In any event, this does not prevent a network from effectively dictating an owned-and-operated station's practices outside the scope of a normal affiliation agreement; for instance, network programming is very rarely preempted by O&Os except in cases of major breaking news of interest to the O&O's viewing area, despite individual affiliates' rights to do so.
The term "station" correctly applies to the ownership of the station. For example, a station that is owned and operated by the American Broadcasting Company (ABC) is referred to as an "ABC station" or an "ABC O&O," but normally should not be referred to as an affiliate. Likewise, a station not owned by ABC but contracted to air the network's programming is correctly referred to as an "ABC affiliate"; that is, the station is affiliated with ABC.
However, informally or for promotional purposes, affiliated stations (or non-O&Os) are sometimes referred to as a network station, as in "WFAA is an ABC station" even though that ABC affiliate, in the Dallas–Fort Worth market, is owned by Tegna, Inc. A correct formal phrasing could be, "ABC affiliate WFAA is a Tegna station." Similarly, one may informally refer to "ABC affiliates" in regards to all stations (including
|
https://en.wikipedia.org/wiki/Time%20Bomb%20%28Angel%29
|
"Time Bomb" is episode 19 of season 5 in the television show Angel. Written by Ben Edlund and directed by Vern Gillum, it was originally broadcast on April 28, 2004 on the WB network.
In "Time Bomb", Illyria rescues Gunn from the hell dimension he entered in penance for his role in Fred's death. While Angel negotiates a contract between a group of demons and a pregnant woman whose unborn child the demons believe to be their Messiah, Illyria begins uncontrollably looping through time, until Wesley shunts her excess power into another dimension.
This is a crucial episode in the Illyria arc, because Team Angel are able to diminish her powers until she can only help them and can no longer destroy the Earth.
Plot
The episode opens with Gunn still being tortured by a demon in a hell dimension, when he is suddenly rescued by Illyria, who uses her ability to shift between dimensions to return them both to Wolfram & Hart.
Gunn enters Wesley's office, and both have so much emotional baggage, they are uncertain how to behave. Wesley acknowledges that he should apologize for stabbing him earlier but is unsure how as he feels it would just be awkward. Gunn replies he is not looking for an apology and he probably wouldn't accept one anyway, adding that his torture in the hell dimension was much worse.
Meanwhile, Angel grows suspicious of Illyria's continued presence at the Firm, and concludes that she is staying not out of loyalty, but because of an attraction to the Firm's power. He orders Lorne to shadow her, and then turns his attention to a legal case involving a ceremonial demon pact. A pregnant woman named Amanda has agreed to allow a demonic cult called "the Fell Brethren" to adopt her baby, and Angel and Gunn start to advise her until they learn, to their outrage, that their client is not the innocent woman, but rather the seemingly benevolent demons who are secretly taking advantage of her and planning to sacrifice the child on the eve of its 13th birthday.
Meanwhile, Illyria enjoys sparring with Spike in the training room, perhaps because he does not kowtow to her, and is even learning to adapt to her fighting techniques, but she begins to act oddly even by her standards, and Wesley theorizes that she is growing emotionally and molecularly unstable as a result of her interdimensional travels. He realizes that if her energy excess continues to go unchecked, it will result in a catastrophic explosion.
As Angel, Gunn, and Hamilton argue over how to handle the Fell Brethren case, Illyria grows increasingly disoriented and paranoid, culminating in a confrontation in which she effortlessly kills Angel, Lorne, Spike, and Wesley in a matter of seconds. At this point, the narrative switches to her point of view, and it is revealed that Illyria's disorientation has been caused by the fact that her excessive mystical energy has been sending her uncontrollably back and forth in time.
Illyria again goes back in time to a point before she had killed the ot
|
https://en.wikipedia.org/wiki/Commodore%2064%20%28band%29
|
Commodore 64 (named after the 1980s computer of the same name) is an American hip hop band that was one of the pioneers of the hip hop music subgenre known as geeksta rap or nerdcore. Formed by four members of a math club and breakdancing troupe in 1992 at a concert in New Jersey, Commodore 64 was the first group to release a single produced entirely using an Apple Macintosh computer, "Horton Hears A Ho" in 1999.
Three of the four members of Commodore 64, Smart Money "Bass-I.Q." Teddy Ruxpin, HMO and The Professa MC Squared are well-respected as intellectuals in their jobs, as a mathematics professor, an economics writer and a deconstructionist philosopher respectively. DJ Goodbeats, the "fourth member", is a computer.
Commodore 64 released one album, K-Minus Initiative, in December 1999. As the first full-length nerdcore/geeksta rap record to be commercially released, it sold over 130,000 copies in its first three months of release. Their sound and beats have been likened to that of the early Beastie Boys.
The band is currently on their self-released, DIY, independently based label, Phantium Records. They're currently not signed to any major label.
Albums
K-Minus Initiative (1999)
References
IUMA page
"Mac-Recorded Rap Band Releases MP3" (article in The Mac Observer)
Nerdcore artists
American hip hop groups
|
https://en.wikipedia.org/wiki/Parsec%20%28disambiguation%29
|
A parsec is a unit of distance.
Parsec may also refer to:
Computing
PARSEC, a software package designed to perform electronic structure calculations of solids and molecules
Parsec (parser), a Parser combinator library for Haskell
Parsec (software), a desktop capturing application
Princeton Application Repository for Shared-Memory Computers
Convex Computer, originally named Parsec
A parallel simulation language used in GloMoSim
A rack extension from Propellerhead Software
Other uses
Parsec (magazine), an Argentine sci-fi magazine
Parsec (video game), a 1982 video game for the TI-99/4A
Parsec Awards, a set of awards for science fiction podcasts
"Parsec", a song by Stereolab from Dots and Loops
Parsecs, some levels in the video game Gaplus
See also
PARSEC47, a scrolling shooter video game
|
https://en.wikipedia.org/wiki/Seccomp
|
seccomp (short for secure computing mode) is a computer security facility in the Linux kernel. seccomp allows a process to make a one-way transition into a "secure" state where it cannot make any system calls except exit(), sigreturn(), read() and write() to already-open file descriptors. Should it attempt any other system calls, the kernel will either just log the event or terminate the process with SIGKILL or SIGSYS. In this sense, it does not virtualize the system's resources but isolates the process from them entirely.
seccomp mode is enabled via the system call using the PR_SET_SECCOMP argument, or (since Linux kernel 3.17) via the system call. seccomp mode used to be enabled by writing to a file, /proc/self/seccomp, but this method was removed in favor of prctl(). In some kernel versions, seccomp disables the RDTSC x86 instruction, which returns the number of elapsed processor cycles since power-on, used for high-precision timing.
seccomp-bpf is an extension to seccomp that allows filtering of system calls using a configurable policy implemented using Berkeley Packet Filter rules. It is used by OpenSSH and vsftpd as well as the Google Chrome/Chromium web browsers on ChromeOS and Linux. (In this regard seccomp-bpf achieves similar functionality, but with more flexibility and higher performance, to the older systrace—which seems to be no longer supported for Linux.)
Some consider seccomp comparable to OpenBSD pledge(2) and FreeBSD capsicum(4).
History
seccomp was first devised by Andrea Arcangeli in January 2005 for use in public grid computing and was originally intended as a means of safely running untrusted compute-bound programs. It was merged into the Linux kernel mainline in kernel version 2.6.12, which was released on March 8, 2005.
Software using seccomp or seccomp-bpf
Android uses a seccomp-bpf filter in the zygote since Android 8.0 Oreo.
systemd's sandboxing options are based on seccomp.
QEMU, the Quick Emulator, the core component to the modern virtualization together with KVM uses seccomp on the parameter --sandbox
Docker – software that allows applications to run inside of isolated containers. Docker can associate a seccomp profile with the container using the --security-opt parameter.
Arcangeli's CPUShare was the only known user of seccomp for a while. Writing in February 2009, Linus Torvalds expresses doubt whether seccomp is actually used by anyone. However, a Google engineer replied that Google is exploring using seccomp for sandboxing its Chrome web browser.
Firejail is an open source Linux sandbox program that utilizes Linux namespaces, Seccomp, and other kernel-level security features to sandbox Linux and Wine applications.
As of Chrome version 20, seccomp-bpf is used to sandbox Adobe Flash Player.
As of Chrome version 23, seccomp-bpf is used to sandbox the renderers.
Snap specify the shape of their application sandbox using "interfaces" which snapd translates to seccomp, AppArmor and other security con
|
https://en.wikipedia.org/wiki/Tina%20Wood
|
Tina Wood (born March 16, 1974) is an on-air television personality, writer and producer. She is currently the Executive Producer of the new programming for Xbox.
Early life and career
Wood was born in Blackpool, England, one of five children to Anthony and Catherine Wood. Her father was British and her mother Canadian. Her family moved to Montreal when she was young. After a few years in Canada her parents and siblings moved to the United States, settling in Miami. They later moved to Orlando, where Wood began school. She attended six different schools and graduated from Edgewater High School, where she was Senior Class President and Athlete of the Year.
Wood attended Florida State University, where she studied broadcasting and played softball for the Seminoles. She had ambitions to become a sports broadcaster and worked for ABC Sports throughout her college career.
However, the day after she graduated, she drove across the country to Los Angeles to work as an intern on Spike Jonze's first feature film, Harold and The Purple Crayon. The film was eventually cancelled and her first paying job was as a casting assistant on the Mark Medoff film Santa Fe. Here, she turned her inspirations towards writing.
After Santa Fe wrapped she became an assistant to actor Jere Burns during his days on Something So Right. Here, Wood was absorbed in the world of television. She worked on the Universal Studios backlot every day, where the show filmed alongside Just Shoot Me.
She began writing television specs and acquired a literary agent. She worked in development at Fox Studios doing script coverage for Harold Ramis' production company Ocean Pictures. She also worked for Jim Cameron's Lightstorm Entertainment.
In 2000, Wood was hired as a staff writer to help launch the first ever television network for gamers, G4. She was the head writer of the network, lending her craft to multiple shows including Icons, Sweat, Cheat, and multiple specials. She also served as a host and producer of the interactive gaming show G4tv.com. She served in this role alongside Laura Foy, Geoff Keighley, and previously Scot Rubin. On the show, Wood's gamertag was T-Dub.
On December 12, 2005, Wood announced on her personal blog that G4tv.com had been cancelled by G4, and that the series' last episode of the series would be filmed on December 17, 2005. Wood, along with Laura Foy, moved on to become part of a new Microsoft Internet show named Channel 10, which spotlights the latest in gaming and technology and the people who use it. Wood later appeared in G4's Attack of the Show, occasionally filling in as a guest correspondent and game news commentator.
Wood continued working with Xbox as on-air talent, and in 2011 became full-time Executive Producer of New Programming. She was the Show Production Executive Producer for Microsoft's nightly "Xbox @ E3 Live" 2013 streaming coverage on Xbox Live, which reunited her with G4 personalities Kevin Pereira and former X-Play host Morgan
|
https://en.wikipedia.org/wiki/Veriexec
|
Veriexec is a file-signing scheme for the NetBSD operating system.
It introduces a special device node () through which a signature list can be loaded into the kernel. The list contains file paths, together with hashes and an expected file type ("DIRECT" for executables, "INDIRECT" for scripts and "FILE" for shared libraries and regular files). The kernel then verifies the contents of the signed files against their hashes just before they are opened in an exec() or open() system call.
When Veriexec is enabled at level 0, the kernel will simply warn about signature mismatches. At level 1, it will prevent access to mismatched files. At level 2, it prevents signed files from being overwritten or deleted. At the highest, level 3, the kernel will not allow unsigned files to be accessed at all.
References
Lymn, Brett (2003). "NetBSD Verified Executables." Retrieved August 18, 2005.
"The NetBSD Veriexec subsystem." The NetBSD Guide. Retrieved August 16, 2005.
NetBSD
|
https://en.wikipedia.org/wiki/WUPW
|
WUPW (channel 36) is a television station in Toledo, Ohio, United States, affiliated with the Fox network. It is owned by American Spirit Media, which maintains a joint sales agreement (JSA) with Tegna Inc., owner of CBS affiliate WTOL (channel 11), for the provision of certain services. Both stations share studios on North Summit Street in downtown Toledo, while WUPW's transmitter is located on Corduroy Road in Oregon, Ohio.
History
The station went on-air September 22, 1985 as an independent with an analog signal on UHF channel 36. It originally had the call sign WDMA-TV but was changed to its present-day calls before its first sign-on. Originally, WUPW was owned by a consortium of local investors and private companies. The station's original studios were located at Four SeaGate on North Summit Street in Downtown Toledo. It became a charter Fox affiliate on October 6, 1986. It was sold to Atlanta-based Ellis Communications in 1993. Three years later, that company was sold to a group led by the Retirement Systems of Alabama who merged with AFLAC's broadcasting group to form Raycom Media.
In 1998, Raycom announced that it would acquire Malrite Communications Group, the owner of NBC affiliate WNWO-TV (channel 24). In order to complete Raycom's acquisition of Malrite (which would be finalized in 1999), WUPW was spun off to Sunrise Television due to Federal Communications Commission (FCC) rules at the time prohibiting common ownership of two stations in the same market. WNWO was longer-established and Raycom opted to keep that station over WUPW. Sunrise Television was absorbed into LIN TV in May 2002. Raycom sold WNWO to Barrington Broadcasting in 2006 after its merger with the Liberty Corporation gave it ownership of CBS affiliate WTOL.
Until 2001, WUPW was the only over-the-air television station in the area to air cartoons weekday afternoons as the local WB affiliate, WT05, was cable exclusive. In early-June 2007, WUPW, along with three other LIN TV-owned Fox affiliates switched their websites over to Fox Interactive Media's "MyFox" platform, becoming the first Fox stations not owned and operated by the network to adopt the site. WUPW later dropped MyFox in favor of a new site platform co-developed by LIN and Fox, spun off as the independent company EndPlay.
The station's broadcast tower is high that has a seven-foot face on each of its three sides. The tower was built by Stainless Steel Tower of Pennsylvania. The top section has a aerial mast with a side mount dipole antenna for the transmission of analog television programs. The digital antenna is a side mount made by Dielectric and is mounted at . It was completed in 1985 and is the property of LIN TV.
On January 11, 2012, it was reported that LIN Media would sell WUPW to Charlotte-based American Spirit Media (owned by Thomas B. Henson) for $22 million. As part of the acquisition, WUPW entered into a joint sales agreement (SSA) with Raycom Media's WTOL; three other American Spirit Medi
|
https://en.wikipedia.org/wiki/Sufra%20%28charity%29
|
Sufra NW London is a community food and support hub based in Stonebridge ward in the London Borough of Brent. Their network of Food Banks and Community Kitchens across the London Borough of Brent act as gateway services that enable their beneficiaries to access a wider programme of activities designed to address the root causes of poverty and homelessness in the local area. Their wrap around support includes Welfare Advice, a Refugee Support Programme, an award-winning community food growing project - St. Raphael’s Edible Garden, and a range of AQA accredited training and employability courses.
Sufra was founded by Mohammed Mamdani; its name comes from an Arabic term, sufra, associated with communal eating. It was officially founded in April, 2013 when the London Borough of Brent's council funded the charity in Raphael's Estate, one of the poorest estates in that area.
History
2011–2013: Initial Idea and Start up
In 2011, Sufra was proposed by Mohammed Mamdani, a social entrepreneur, who founded Muslim Youth Helpline and Ansar Youth Project and Al-Mizan Charitable Trust, Mamdani used his connections in Al-Mizan to initially fund and launch the Sufra project in 2012, until eventually it was officially founded in April, 2013. Sufra (pronounced Sof-rah) is an Arabic word for a tablecloth that is laid on the ground when serving a meal in various Middle Eastern and North African countries. The aim of the charity was to provide local people with food, basic necessities and toiletries.
In April 2013, Sufra relocated to St Raphael's Estate to alleviate the need for support, as this was one of the poorest estates in the local area. Since start of operations, Sufra has distributed food parcels to thousands of people in need. These beneficiaries have been referred to Sufra by over 150 local referral agencies. Food collections had been successful with regular donations from key supermarkets and schools.
2014–2015: Food Academies and Welfare Surgeries
In June 2014, Sufra began to run Food Academies, teaching people to cook. The main aim was to train young people between the ages of 16–25 years in basic cookery skills. Over 5 weeks and 10 intensive sessions it taught people to cook 10 home-cooked meals, understand nutrition and how to maintain a healthy diet. In addition to this, they ran a master-chef competition and learned to manage weekly budgets with an accredited qualification, which can be used to apply for an apprenticeship or employment in the catering industry. Unfortunately, this course had to be put on hold due to COVID-19.
In January 2015, Sufra joined a partnership with Aston Business School. It launched a recruitment drive for their first Business Enterprise Project which was sponsored by Segro. The project was aimed at young people between the ages of 16 and 25 with got a business idea to help them get it off the ground. The Business Enterprise Project included a free 5-day residential at Aston University’s Business School where candid
|
https://en.wikipedia.org/wiki/List%20of%20places%20in%20California
|
References
USGS Fips55 database
See also
List of cities in California
List of counties in California
|
https://en.wikipedia.org/wiki/List%20of%20places%20in%20Florida
|
See also
Florida
List of municipalities in Florida
List of counties in Florida
References
USGS Fips55 database
Lists of places in Florida
Places
|
https://en.wikipedia.org/wiki/Containment%20%28disambiguation%29
|
Containment is a geopolitical strategy to stop the expansion of an enemy.
Containment may also refer to:
Containment (computer programming), a form of object composition
Containment (film), a 2015 British film
Containment (TV series), a 2016 American series
Containment building, a structure enclosing a nuclear reactor
Containment (set theory), another term for a subset
See also
Biocontainment
Container (disambiguation)
Isolation (disambiguation)
Contentment (disambiguation)
|
https://en.wikipedia.org/wiki/TupiTube
|
TupiTube (also known as Tupi 2D) is a free and open-source 2D animation software for amateur artists, children and teenagers. It is available for Windows, Mac OS X, Unix-like operating systems, and Android. This project is developed and maintained by the Colombian startup, MaeFloresta. This project is covered under the terms of GPL-2.0-or-later.
History
Background and first versions
TupiTube is the product of two young Colombian entrepreneurs from the city of Santiago de Cali who, in 2002, led the Ktoon initiative together with the companies Toonka Films and Soluciones Kazak. The software aims to be a tool to encourage young people throughout Latin America interested in the development of the animation industry. The incentive to build Tupi Tube was due to the founders goals to create a community of digital artists.
Ktoon set the foundations to seek the first investments in the project, where entities such as Colciencias, the Sena, and others pushed the initiative during its first years of development. This financing model sustained the project in its early development stage. By 2010, the Ktoon developer team met and retook the project, now with the name of Tupi 2D Magic, and later configured MaeFloresta as the developer who maintains the vision of its predecessors, without abandoning the intention to remain as a free, accessible, and comfortable software for all the public interested in getting started to use. Tupi 2D Magic focuses its efforts on presenting itself as an experience where its users can animate, illustrate and design in different spaces, even becoming a tool in classrooms, reaching 400,000 students in India, where 3,000 schools used it as their software of preference.
News and trajectory
MaeFloresta needed to continue its brand projection and Tupi 2D Magic was transformed with the intention of becoming institutionalized as the free 2D animation software preferred by children, young people, and digital artists in training. This is so they were able to grow to reach new audiences and stay in the market.
It exists to pursue the goal of being a tool for artistic education in digital environments, addressing the academic possibilities that animation training can offer, and actively participates in events where ICTs and educational projects converge for the creation of a culture where technological education is also a priority.
Now, TupiTube's development team's efforts have begun to materialize. They have received different awards for their efforts, for hosting TupiTube and for being an example of entrepreneurship in the digital commerce boom.
Features
The software includes many features:
Support for basic tools for vector illustration that includes rectangles, ellipses, lines, and polygons. Paths can also be created using the pen or pencil tool. The paint bucket tool can be used to fill bounded areas of vector objects.
Raster images (sometimes called Bitmap) can be imported and used as either static backgrounds or animated a
|
https://en.wikipedia.org/wiki/Neighbourhood%20Cable
|
Neighbourhood Cable was a telecommunications provider based in regional Victoria, Australia. The company owned and operated hybrid fibre coaxial (HFC) cable networks in three Victorian regional cities of Mildura, Ballarat and Geelong before being acquired by TransACT in 2007 and the brand ceased to be used in 2011.
The company delivered cable television, broadband internet and telephony services via these cable networks. It also offered internet services via Telstra's copper network and wireless equipment. It was one of the few companies in Australia selling non-Telstra local-loop services, and also one of only very few with active HFC networks.
History
Neighbourhood Cable commenced the rollout of its hybrid fiber Optic/Coaxial network in Mildura on 1 March 1996, with the rollout to two thirds of homes and 90% of businesses in Mildura completed in two years.
By 2001, the company had run 900 kilometres worth of hybrid fibre coaxial cable past 38,000 homes in Mildura and Ballarat, with 1500 customers, and with planned rollouts in Bendigo, Geelong, Shepparton and Albury-Wodonga.
A number of subscription TV channels have solely or were first seen in Australia on their network. It was the only place in Australia where the US ESPN2 could be viewed, and was the first place some Discovery Channel variants and CNN Headline News were available.
The company was delisted from the ASX in July 2005, after a string of events starting with a request for a further $5 million to continue operation. The company's venture capitalist, TVG, subsequently acquired all shares in the company.
In 2007, rival telecommunications company TransACT acquired Neighbourhood Cable, effective 1 January 2008. The operations of Neighbourhood Cable were rebranded as and merged with TransACT from June 2011.
See also
Subscription television in Australia
References
External links
Australian subscription television services
Ballarat
Companies based in Victoria (state)
Defunct mass media companies of Australia
Defunct technology companies of Australia
Defunct telecommunications companies of Australia
Mass media in Geelong
Mildura
History of Ballarat
|
https://en.wikipedia.org/wiki/Reliability%2C%20availability%20and%20serviceability
|
Reliability, availability and serviceability (RAS), also known as reliability, availability, and maintainability (RAM), is a computer hardware engineering term involving reliability engineering, high availability, and serviceability design. The phrase was originally used by International Business Machines (IBM) as a term to describe the robustness of their mainframe computers.
Computers designed with higher levels of RAS have many features that protect data integrity and help them stay available for long periods of time without failure This data integrity and uptime is a particular selling point for mainframes and fault-tolerant systems.
Definitions
While RAS originated as a hardware-oriented term, systems thinking has extended the concept of reliability-availability-serviceability to systems in general, including software.
Reliability can be defined as the probability that a system will produce correct outputs up to some given time t. Reliability is enhanced by features that help to avoid, detect and repair hardware faults. A reliable system does not silently continue and deliver results that include uncorrected corrupted data. Instead, it detects and, if possible, corrects the corruption, for example: by retrying an operation for transient (soft) or intermittent errors, or else, for uncorrectable errors, isolating the fault and reporting it to higher-level recovery mechanisms (which may failover to redundant replacement hardware, etc.), or else by halting the affected program or the entire system and reporting the corruption. Reliability can be characterized in terms of mean time between failures (MTBF), with reliability = exp(-t/MTBF).
Availability means the probability that a system is operational at a given time, i.e. the amount of time a device is actually operating as the percentage of total time it should be operating. High-availability systems may report availability in terms of minutes or hours of downtime per year. Availability features allow the system to stay operational even when faults do occur. A highly available system would disable the malfunctioning portion and continue operating at a reduced capacity. In contrast, a less capable system might crash and become totally nonoperational. Availability is typically given as a percentage of the time a system is expected to be available, e.g., 99.999 percent ("five nines").
Serviceability or maintainability is the simplicity and speed with which a system can be repaired or maintained; if the time to repair a failed system increases, then availability will decrease. Serviceability includes various methods of easily diagnosing the system when problems arise. Early detection of faults can decrease or avoid system downtime. For example, some enterprise systems can automatically call a service center (without human intervention) when the system experiences a system fault. The traditional focus has been on making the correct repairs with as little disruption to normal operations as p
|
https://en.wikipedia.org/wiki/Space%20Generation%20Advisory%20Council
|
The Space Generation Advisory Council (SGAC), in support of the United Nations Programme on Space Applications, is a non-governmental organization and professional network that "aims to bring the views of students and young space professionals to the United Nations (UN), space industry, and other organizations." SGAC purpose is to connect, inspire, engage, and advocate; it works to raise awareness among the next generation of space professionals globally. The SGAC network currently represents over 25,000 members across 165 countries – the world's largest network of students, young professionals, and alumni in the space industry. SGAC operates in the six official languages of the United Nations, though the official working language is English.
SGAC's core purpose is to be the voice of the "Space Generation" to the United Nations Office for Outer Space Affairs (UNOOSA) and other international organizations through its Observer Status with the United Nations Committee on the Peaceful Uses of Outer Space (UNCOPUOS). Since 2018, SGAC has also been an official Partner of the International Astronautical Federation (IAF). In these roles, the SGAC ensures the involvement and engagement of its membership in developing a progressive space policy that supports advancing humanity through the peaceful uses of space. The SGAC maintains that "the voice of students and young professionals should be heard in creating international space policy. As those who will be becoming the key policymakers, providers, and users of space, their opinion must be considered." To ensure inclusivity, membership with SGAC is free of charge. The SGAC promises member benefits, including:
Being a part of the voice of the next generation of space leaders to high-level leaders at the United Nations, national governments, space agencies, industry, and academia
Access to high-energy and high-impact globally oriented conferences, outreach events, and gatherings worldwide, including networking events with strategic space industry partners
Opportunity to contribute to multidisciplinary research groups / think tanks with topics such as Space and Cyber Security, Space Law and Policy, Space Exploration, Space Safety and Sustainability, and Space Medicine
Exclusive access to scholarships, competitions, and travel award
Access to curated space news, including recent events, targeted job postings, and career development opportunities
As a non-profit organization, SGAC relies on the sponsorship and support of governmental, non-governmental, and industry organizations and support via donations from individuals. SGAC is continuously looking for general sponsors and project-based partners, striving to ensure that they reflect the diversity displayed by the SGAC organization.
History
In December 1997, the UN Office of Outer Space Affairs Secretariat invited the International Space University (ISU) to organize a young adult forum as part of the UNISPACE III Conference in July 1999 in Vienna. Th
|
https://en.wikipedia.org/wiki/MTM
|
MTM may refer to:
Computing
Microsoft Test Manager, a diagnostic software tool
Science, technology, medicine and engineering
Mark-to-market accounting, or fair value accounting
Massive Thirring Model, in quantum field theory
Medication Therapy Management, pharmaceutical care by pharmacists
Methods-time measurement, a motion time system
Methyltrimethoxysilane, an organosilicon compound
Midwoofer-tweeter-midwoofer, a loudspeaker configuration
Model–test–model, in military combat modelling
Modified Transverse Mercator coordinate system, used in Eastern Canada
Motoren Technik Mayer, Wettstetten, Germany, a car tuner
Mountaintop removal mining
Methylthiomethyl ether, chemical compound
X-linked myotubular myopathy, form of centronuclear myopathy
Entertainment
MTM Enterprises, Mary Tyler Moore's production company
MTM Records, a MTM Enterprises record label
MTM (band), a Portuguese band
Other
MaineToday Media, media company
Media Technology Monitor, a Canadian survey
Momentum, a financial indicator
Monster Truck Madness, a racing video game
Ibanez MTM, a guitars brand
Made to measure clothing
Mark-to-market accounting in economics
Minnesota Transportation Museum, US
MT explosive motorboat, Italian, WWII
Max the Mutt College of Animation, Art & Design, Canada
Metro Trains Melbourne, operator of Melbourne’s suburban train network, Australia since 2009
The Swedish Agency for Accessible Media, abbreviated as MTM for
See also
M2M (disambiguation)
|
https://en.wikipedia.org/wiki/Adam%20Crozier
|
Adam Alexander Crozier (born 26 January 1964) is a Scottish businessman, and was formerly the chief executive officer of media company ITV plc, operator of the ITV television network covering most of the United Kingdom.
After a career at Saatchi & Saatchi culminating in the post of joint chief executive in 1995, he came to wide public prominence as the new chief executive of The Football Association in 2000 at the age of 35, before in 2003 becoming the chief executive of the Royal Mail Group, the United Kingdom's mail delivery service, where he oversaw a controversial modernisation and redundancy programme.
In January 2010 he was announced as the new chief executive of ITV plc, where he arrived on 26 April 2010. Crozier announced he was leaving this post in June 2017.
Crozier became the chairman of BT Group plc on 1 December 2021.
Early life and education
Crozier was born and raised on the Isle of Bute on the west coast of Scotland in 1964. His father was a manager for Lord Bute, and his mother was secretary to the managing director of The Scotsman. Crozier went to a school in Ayr, before moving to Graeme High School, a comprehensive school in Falkirk. He graduated with a Bachelor of Arts degree (BA) in business organisation from Edinburgh's Heriot-Watt University. While at school, Crozier had trials with both Hibernian and Stirling Albion football clubs.
Crozier received an honorary doctorate from Heriot-Watt University in 2005.
Career
Early career
Crozier joined Pedigree Petfoods as a graduate trainee in 1984. In 1986, he moved to The Daily Telegraph to work in media sales.
Saatchi & Saatchi
From 1988 to 1999 Crozier worked for advertising agency Saatchi and Saatchi, becoming media director in 1990, and then being appointed as joint chief executive from 1995 alongside Tamara Ingram. This occurred in the wake of the departure of the founding Saatchi brothers to form M&C Saatchi.
The Football Association
Crozier came to public attention as the surprise appointment to the role of chief executive of The Football Association, the governing body of England's national game, football, aged just 35 and having had no experience of business in football. He replaced Graham Kelly. In his short tenure from 2000 to 2002, the FA relocated headquarters from Lancaster Gate to Soho Square, appointed the first ever foreign England national team manager, Swede Sven-Göran Eriksson, and became a more commercial organisation, maximising its revenues. He also reduced the average age of the FA's staff from 55 to 32, progressed the Wembley Stadium redevelopment, and reduced the FA's ruling body from a 91-member FA Board to a committee of 12. His moves were not without criticism, with complaints from some about lack of consultation and of acting beyond his powers. He was replaced by Mark Palios.
While at the FA, Crozier reportedly identified some members of the England national team as the Golden Generation. It was a term later criticised towards the end of the
|
https://en.wikipedia.org/wiki/Legions%20of%20Death
|
Legions of Death is a one or two-player strategy video game published for the Commodore 64, Amstrad CPC and ZX Spectrum personal computers. It requires players to control the navies of ancient Rome and Carthage during the Punic Wars, in order to conquer the Mediterranean Sea.
Gameplay
Legions of Death is a one or two-player strategy game set during the Punic Wars between ancient Rome and Carthage. In single-player mode the player controls the fleet of Carthage, in two-player mode one player controls the Roman navy while the other controls the Carthaginian fleet. Each player must try to destroy their opponent's fleet and gain control of the Mediterranean.
At the start of play each player receives a number of points to construct their navy using a combination of faster biremes and triremes, along with various heavier combat ships, up to Heptares class. Additional points may be spent to upgrade individual ships, such as adding marine detachments, archer platforms, and boarding hooks. Lighter ships can be used to collect funds from outlying ports and transport it back to the player's home port, while heavier ships are needed to counter the other player's attacking fleet, as they can more effectively ram and sink enemy vessels.
Gameplay is turn-based, with movement resolved simultaneously, and plays out on a square grid. Ships may accelerate or decelerate each turn by one speed point, up to a speed limit which depends on the class of ship. Ships may turn up to 45 degrees maximum per unit of movement (so no right-angle turns). This movement system adds a unique tactical element in which the player must carefully plan out routes and speeds several turns ahead in order to intercept enemy ships, and bring ships into harbours without crashing.
Development
Reception
Legions of Death received generally positive reviews.
References
External links
1987 video games
Amstrad CPC games
Commodore 64 games
Video games set in ancient Rome
Turn-based strategy video games
Video games developed in the United Kingdom
Video games with historical settings
Video games set in the Roman Empire
ZX Spectrum games
|
https://en.wikipedia.org/wiki/Interactive%20EasyFlow
|
Easyflow was one of the first diagramming and flow charting software packages available for personal computers. It was produced by HavenTree Software Limited of Kingston, Ontario Canada. HavenTree's mark on history for its product, which was subsequently renamed Interactive Easyflow, is its notable plain-English license.
History
HavenTree was formed in 1981. Easyflow, a DOS-based software package, was the initial name of the company's
flagship offering, which was non-interactive and introduced in 1983. "EasyFlow-Plus" was announced in 1984. Interactive EasyFlow - so named to distinguish it from the preceding products - was offered from 1985 until the early 1990s, when the company dropped the "Interactive" adjective in favour of simply "HavenTree EasyFlow". It offered the software for sale until it filed for protection under Canada's Bankruptcy and Insolvency Act in April 1996. The assets of the company were purchased by SPSS Inc. in 1998.
Historical significance
HavenTree and EasyFlow is mostly remembered today for its counter-cultural disclaimer and end-user license agreement. Both were written in plain English and not in legalese, enabling end users to understand better the terms of these legal agreements, and emphasizing the problems with modern software licensing. Excerpts from the license and disclaimer are included into the fortune databases of many Linux and BSD distributions.
Text of software license
Text of disclaimer
Patenting
Patent entries are dated in the 1990s.
References
External links
http://www.geocities.com/Heartland/Plains/4188/sw_doc.html
Diagramming software
Computer humor
|
https://en.wikipedia.org/wiki/Internet%20radio%20device
|
An Internet radio device, also called network music player is a hardware device that is capable of receiving and playing streamed media from either Internet radio stations or a home network.
Background
Streaming media became mainstream with the advent of portable music players / MP3 player and the convenience of converting and compressing CD music into music file by the computer or the acquisition of products in such formats using on-line music stores like Amazon, iTunes, and 7digital.
The network music player is connected to a home router. For convenience a wireless router is often used. The router is connected to the internet and thus enables access to Internet streaming resources. Alternatively, the home network can access the user's collection of music on a computer or on a network-attached storage (NAS) device dedicated to store a user's music files.
Audio streaming
Audio streaming is one way of transmitting audio files on a continuous feed to a network music player. A common way today is to stream the audio from the computer to a network music player over the more convenient wireless technologies such as Wi-Fi in a networked environment.
The computer, which is typically used for storing the music file, acts as a music server by means of server software, often compliant to DLNA (Digital Living Network Alliance) standard. And the network music player is a typical receiver which starts playing an audio file as soon as some of the data has been received so that one does not have to wait for the entire audio file to finish downloading.
The MP3 music file is streamed to the network music player in digital format, commonly in the original MP3 format. Therefore, the audio details of the MP3 music are sent wirelessly in the home to the network music player as it is stored on the computer and without loss.
The MP3 music files are then converted back into audio signal by the network music player and played. As the MP3 music files are organized by the music server on the computer, the information is also sent to the network music player where the user can see all of the music track information.
Many companies working actively in bringing Internet radio into devices are organized in the Internet Media Device Alliance IMDA. In addition to the home networking standards of DLNA, IMDA compatibility standards dedicated to all aspects of Internet radio distribution.
Internet radio
Internet reaches many areas in the world, and thus does Internet radio. It has expanded enormously with an estimated 19,000 stations currently available, including many traditional FM /AM simulcasting their content over the Internet.
Online music services
Online music services usually offer millions of songs and thousands of artists for users to choose from. Network music players that support online music services let users access this vast selection of music tracks.
Station directory services keep a current list of active Internet radio stations, their URI and streaming fo
|
https://en.wikipedia.org/wiki/WTXR
|
WTXR is a radio station on 89.7 FM in Toccoa Falls, Georgia, United States. The station is owned by Radio Training Network of Greenville, South Carolina, and is part of its His Radio Praise network carrying a contemporary worship music format. Prior to being owned by RTN, WTXR was the student-run campus radio station of Toccoa Falls College.
History
Toccoa Falls College filed for a construction permit for a new FM radio station on July 13, 1995; the Federal Communications Commission approved the application on April 9, 1996. WTXR was licensed, initially as WDPA, on September 16, 1997, before changing call letters in November. The radio station played predominantly Christian rock and Contemporary Christian music but also featured various specialty shows. It was a companion to sister WRAF, which was also run by the college.
As time went on, students moved the station in a Christian rock direction as "The Eagle", helping give it a distinct identity from WRAF.
WTXR, along with sister stations WEPC, WPFJ, WRAF, and translators W221AZ and W265AZ, were purchased by Radio Training Network, Inc. effective July 25, 2016 for $2.1 million.
References
External links
TXR
Contemporary Christian radio stations in the United States
Radio stations established in 1997
1997 establishments in Georgia (U.S. state)
TXR
|
https://en.wikipedia.org/wiki/Typedef
|
typedef is a reserved keyword in the programming languages C, C++, and Objective-C. It is used to create an additional name (alias) for another data type, but does not create a new type, except in the obscure case of a qualified typedef of an array type where the typedef qualifiers are transferred to the array element type. As such, it is often used to simplify the syntax of declaring complex data structures consisting of struct and union types, although it is also commonly used to provide specific descriptive type names for integer data types of varying sizes.
Syntax
A typedef declaration follows the same syntax as declaring any other C identifier. The keyword typedef itself is a specifier which means that while it typically appears at the start of the declaration, it can also appear after the type specifiers or between two of them.
In the C standard library and in POSIX specifications, the identifier for the typedef definition is often suffixed with , such as in size_t and time_t. This is practiced in other coding systems, although POSIX explicitly reserves this practice for POSIX data types.
Examples
This creates the type as a synonym of the type :typedef int length;
Documentation use
A typedef declaration may be used as documentation by indicating the meaning of a variable within the programming context, e.g., it may include the expression of a unit of measurement or counts. The generic declarations,
int current_speed;
int high_score;
void congratulate(int your_score) {
if (your_score > high_score) {
// ...
}
}
may be expressed by declaring context specific types:
typedef int km_per_hour;
typedef int points;
// `km_per_hour` is synonymous with `int` here, and thus, the compiler treats
// our new variables as integers.
km_per_hour current_speed;
points high_score;
void congratulate(points your_score) {
if (your_score > high_score) {
// ...
}
}
Both sections of code execute identically. However, the use of typedef declarations in the second code block makes it clear that the two variables, while representing the same data type , store different or incompatible data. The definition in of indicates to the programmer that (or any other variable not declared as a ) should not be passed as an argument. This would not be as apparent if both were declared as variables of datatype. However, the indication is for the programmer only; the C/C++ compiler considers both variables to be of type and does not flag type mismatch warnings or errors for "wrong" argument types for in the code snippet below:
void foo() {
km_per_hour km100 = 100;
congratulate(km100);
}
Type simplification
A typedef may be used to simplify the declaration of a compound type (struct, union) or pointer type. For example,
struct MyStruct {
int data1;
char data2;
};
This defines the data type . A variable declaration of this type in C also requires the keyword , but it may be omitted in C++:
struct MyStruct a;
A typ
|
https://en.wikipedia.org/wiki/SBS6
|
SBS6 is a Dutch free-to-cable commercial TV channel and is a part of Talpa TV, formerly known as SBS Broadcasting B.V. and now owned by Talpa Network. Other channels of the group in the Netherlands are Net5, Veronica, and SBS9.
History
SBS stands for Scandinavian Broadcasting System. When the SBS Broadcasting Group started expanding outside of Scandinavia in 1995, one of the first countries where they set up a channel was the Netherlands with SBS6. SBS6 was the third Dutch commercial TV station after RTL 4 and RTL 5, both being launched in 1989 and 1993 respectively. SBS6 launched on 28 August 1995.
When SBS6 was launched, they were in a tough competition with the channel Veronica, which started as a commercial station at the same time. Both SBS6 and Veronica wanted to be on channel 6 of the viewer's television.
The SBS Broadcasting Group expanded their Dutch channel lineup with Net5 on 1 March 1999. In 2003, Veronica was added to the lineup.
The German ProSiebenSat.1 Media took over the parent company, SBS Broadcasting Group, on 27 June 2007. In 2011, all of SBS's activities in the Netherlands (through SBS Broadcasting B.V.), including the three TV stations (SBS6, Net5, and Veronica), the two TV guides (Veronica Magazine and Totaal TV), production, design, and teletext activities were sold to a joint venture between Sanoma Media Netherlands (67%) and Talpa Holding (33%).
On 10 April 2017, Talpa Holding acquired a 67% stake from Sanoma Media Netherlands.
Programming
Imported
According to Jim
Castle
Close to Home
Columbo
Coronation Street
Diagnosis: Murder
Flashpoint
Friends
Heartbeat
House
Little House on the Prairie
Martin
Medical Emergency
Monk
My Wife and Kids
NCIS
NCIS: Los Angeles
Space: Above and Beyond
The Fresh Prince of Bel-Air
The Mentalist
The Sing-Off
Under the Dome
Who's the Boss?
Local
BankGiro Loterij The Wall
Bouw Je Droom
Celblok H (an adaptation of the Australian drama Wentworth)
Domino Day
Hart van Nederland
Postcodeloterij Miljoenenjacht
Reportage
Shownieuws
Trauma Centrum
Sports
BDO World Darts Championship
Marathon Speedskating
PDC World Darts Championship – Summaries only (live on the website)
Red Bull Air Race
UEFA Champions League, since the 2015/16 season
FIFA World Cup qualification and UEFA European Championship qualifying matches of the Netherlands national football team (all home and friendly matches)
References
External links
1995 establishments in the Netherlands
Television channels in the Netherlands
Television channels and stations established in 1995
Mass media in Amsterdam
Talpa Network
|
https://en.wikipedia.org/wiki/Ready%20Steady%20Cook%20%28Australian%20TV%20series%29
|
Ready Steady Cook is a four-time Logie Award-nominated Australian cookery competition show that aired on Network Ten from 2005 until 2013. Repeats continued to air daily until early 2014. It is based on the original Ready Steady Cook series broadcast by the BBC. The format is owned by Endemol.
The show debuted in 2005, where it was hosted by former chef Nick Stratford. It aired weekdays at 1:00pm. Former Nine Network personality Peter Everett took over the hosting job in January 2006 to coincide with Ten's new daytime lineup. From 2006, it has aired at 2:00pm.
In March 2011, it was announced that Colin Lane replaced Everett from June 2011.
In October 2023, it was announced Network 10 would be reviving the series in 2024, with new host Miguel Maestre, which are intended to air on Friday nights.
Overview
Two teams (Capsicum and Tomato), consisting each of a professional chef and an audience member compete against each other, both trying to create the best entrée, meal and dessert in a 20-minute time limit. The final segment sees both opposing chefs teaming up to prepare a dish in a strict time limit.
New challenges were introduced in 2009. As well as the regular gourmet and classic bags, the chefs are given surprise new challenges that push their cooking skills to the limit.
Chefs featured on the show
Andy Ball
Janelle Bloom
Chris Cranswick-Smith
Shane Delia
Manu Feildel
Matt Golinski
Jacqui Gowan
Damian Heads
Mark Jensen
Tom Kime
Miguel Maestre
Alastair McLeod
Nicholas Owen
Brett Panter
Tobie Puttock
George Calombaris
Adrian Richardson
Dominique Rizzo
Jason Roberts
Carol Selva Rajah
Darren Simpson
Adam Swanson
Anthony Telford
Yuey Then
Celebrity guests
A celebrity version of Ready Steady Cook Australia aired separate to the daytime series during prime time for a brief period in 2005. The following celebrities have appeared at least once, though others have also been seen on the show, both during the regular series and prime time celebrity shows.
2005
Natalie Bassingthwaighte
Tim Brunero
Anthony Callea
Ryan 'Fitzy' Fitzgerald
John Foreman
Andrew G
Mike Goldman
Marcia Hines
Craig Lowndes
Ryan Moloney
James Mathison
Leah McLeod
Monique Mueller
Steven Richards
Kyle Sandilands
2008
In 2008, there were a number of 'celebrity cook-offs' on the daytime show. The celebrity cook-offs were randomly put into the schedule throughout 2008. Some of the celebrities that appeared in 2008 are:
Faustina 'Fuzzy' Agolley (host from Video Hits)
Christine Anu
Natarsha Belling
Billy Bentley (Big Brother 2007 housemate)
Tahir Bilgic
Aleisha Cowcher (Big Brother 2007 winner)
John Dee (Planet Ark Founder)
Wes Dening
Anh Do
Bianca Dye (first 'celebrity cook-off')
Peter Everitt
Bobby Flynn
Nic Fosdike
Adam Harvey
Vijay Khurana
Jade MacRae
Brad McEwan
Erin McNaught
Nathan Sapsford (host from Video Hits)
Sandra Sully
Peter Timbs (Big Brother 2001 housemate)
Zoran Vidinovski (Big Brother 2007 housemate)
K
|
https://en.wikipedia.org/wiki/Paul%20Dobson%20%28actor%29
|
Paul Dobson is a British-born Canadian voice actor who works for various studios in Vancouver, British Columbia, Canada, best known for voicing Sensei Wu in Cartoon Network series Lego Ninjago: Masters of Spinjitzu and the Netflix series Ninjago: Dragons Rising.
He performed Naraku and Myoga from Inuyasha, Doctor Doom from Fantastic Four: World's Greatest Heroes, Juggernaut from X-Men: Evolution, Happosai from Ranma ½, Enzo Matrix from ReBoot, Folken Fanel from the Ocean dub of Escaflowne, Zarbon from the Ocean dub of Dragon Ball Z, Graveheart from Shadow Raiders, various characters from several Transformers series (Beast Machines, Armada, Energon and Cybertron), Moo from Monster Rancher, Graham Aker from Mobile Suit Gundam 00 series, Sensei Wu from Lego Ninjago: Masters of Spinjitzu and various voices in Warhammer 40,000: Dawn of War video game series.
Personal life
Paul Dobson is the second of the three Dobson brothers. His older brother Michael Dobson and younger brother Brian Dobson are also voice actors.
Filmography
Animation
Anime
Films
Live-action
Video games
References
External links
20th-century Canadian male actors
21st-century Canadian male actors
Living people
Canadian male video game actors
Canadian male voice actors
Male actors from Vancouver
Year of birth missing (living people)
|
https://en.wikipedia.org/wiki/David%20Abrahams%20%28computer%20programmer%29
|
David Abrahams is a computer programmer and admin. He is the son of physicist Elihu Abrahams and choreographer Geulah Abrahams. He is most well known for his activities related to the C++ programming language. In particular his contributions to the language include the delineating of a theory of exceptions, sitting on the C++ Standards Committee, being a founding member of Boost and co-authoring a book on the subject of template metaprogramming.
Abrahams became a member of the C++ Standards Committee in 1996 and served until 2012. During the standardization process that resulted in the first ANSI standard C++ – in 1998 – Abrahams was a principal driving force behind detailing the exception safety of the C++ Standard Library. Many of the functions and methods of the standard are specified with one of three guarantees. Together these have become known as the Abrahams guarantees.
Following the standardization, Abrahams became one of the founding members of Boost.org, a community group founded to provide reusable C++ libraries. Abrahams has written several of the libraries and assisted in the development of others. Abrahams was also the founder and principal member of Boost Consulting (later BoostPro Computing), a company that offered software development and training courses for 12 years (2001–2013) with a heavy bias to use the Boost libraries, and founder of BoostCon, now C++ Now, the annual conference in Aspen, CO.
In 2013 Abrahams became an employee at Apple Inc, where he worked on the development of the Swift programming language and became the lead of the Swift standard library. In 2017 he joined the SwiftUI project. In January 2020 Abrahams joined Google Brain to work on the Swift for TensorFlow project. In June 2021 Sean Parent announced that Abrahams had joined Adobe Inc. and together they were relaunching the Software Technology Lab.
Publications
In 2003 his paper from the 1998 International Seminar on Generic Programming at Dagstuhl "Exception-Safety in Generic Components" was published in Lecture Notes in Computer Science.
In 2004, Abrahams co-authored C++ Template Metaprogramming: Concepts, Tools, and Techniques from Boost and Beyond with Aleksey Gurtovoy. Together with Boost's Metaprogramming Library, the book broke new ground in the practical use of template metaprogramming, including re-implementing much of the Standard Template Library in a compile-time world, with all operations on types.
Significant Presentations
In 2003, Abrahams presented Binding C++ to Python with the Boost Python Library at the ACCU Conference.
In 2005, Abrahams presented C++ Template Metaprogramming and Rvalue References, Move Semantics, and Argument Forwarding at the ACCU Conference.
Protocol-Oriented Programming in Swift from Apple's WWDC 2015.
Embracing Algorithms from Apple's WWDC 2018.
Building Custom Views in SwiftUI from Apple's WWDC 2019.
References
Notes
, a reprint of Appendix E of Bjarne Stroustrup's The C++ Programming Language, Special
|
https://en.wikipedia.org/wiki/Multiple%20Spanning%20Tree%20Protocol
|
The Multiple Spanning Tree Protocol (MSTP) and algorithm, provides both simple and full connectivity assigned to any given virtual LAN (VLAN) throughout a bridged local area network. MSTP uses bridge protocol data unit (BPDUs) to exchange information between spanning-tree compatible devices, to prevent loops in each Multiple Spanning Tree instance (MSTI) and in the common and internal spanning tree (CIST), by selecting active and blocked paths. This is done as well as in Spanning Tree Protocol (STP) without the need of manually enabling backup links and getting rid of switching loop danger.
Moreover, MSTP allows frames/packets assigned to different VLANs to follow separate paths, each based on an independent MSTI, within MST regions composed of local area networks (LANs) and MST bridges. These regions and the other bridges and LANs are connected into a single common spanning tree (CST).
History and motivation
It was originally defined in IEEE 802.1s as an amendment to 802.1Q, 1998 edition and later merged into IEEE 802.1Q-2005 Standard, clearly defines an extension or an evolution of Radia Perlman's Spanning Tree Protocol (STP) and the Rapid Spanning Tree Protocol (RSTP). It has some similarities with Cisco Systems' Multiple Instances Spanning Tree Protocol (MISTP), but there are some differences.
The original STP and RSTP work on the physical link level, preventing bridge loops when redundant paths are present. However, when a LAN is virtualized using VLAN trunking, each physical link represents multiple logical connections. Blocking a physical link blocks all its logical links and forces all traffic through the remaining physical links within the spanning tree. Redundant links cannot be utilized at all. Moreover, without careful network design, seemingly redundant links on the physical level may be used to connect different VLANs and blocking any of them may disconnect one or more VLANs, causing bad paths.
Instead, MSTP provides a potentially better utilization of alternate paths by enabling the use of alternate spanning trees for different VLANs or groups of VLANs.
Main Entities
Multiple Spanning Tree Instances (MSTI)
As MSTP enables grouping and mapping VLANs into different spanning tree instances, there's an urge of determining a group or set of VLANs, which are all using the same spanning tree, this is what we come to know as a MSTI.
Each instance defines a single forwarding topology for an exclusive set of VLANs, by contrast, STP or RSTP networks contains only a single spanning tree instance for the entire network, which contains all the VLANs. A region can include:
Internal Spanning-Tree Instance (IST): Default spanning tree instance in any MST region. All VLANs in this IST instance conform a single spanning tree topology, allowing only one forwarding path between any two nodes. It also provides the root switch for any VLAN configured switches which are not specifically assigned to a MSTI.
Multiple Spanning Tree Instance (M
|
https://en.wikipedia.org/wiki/Hydrogen%20iodide%20%28data%20page%29
|
This page provides supplementary chemical data on hydrogen iodide.
Structure and properties
Thermodynamic properties
Spectral data
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. It is highly recommend that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source such as SIRI, and follow its directions.
hydrogen iodide MSDS
References
Chemical data pages
Chemical data pages cleanup
|
https://en.wikipedia.org/wiki/Reliable%20User%20Datagram%20Protocol
|
In computer networking, the Reliable User Datagram Protocol (RUDP) is a transport layer protocol designed at Bell Labs for the Plan 9 operating system. It aims to provide a solution where UDP is too primitive because guaranteed-order packet delivery is desirable, but TCP adds too much complexity/overhead. In order for RUDP to gain higher quality of service, RUDP implements features that are similar to TCP with less overhead.
Implementations
In order to ensure quality, it extends UDP by means of adding the following features:
Acknowledgment of received packets
Windowing and flow control
Retransmission of lost packets
Over buffering (Faster than real-time streaming)
RUDP is not currently a formal standard, however it was described in an IETF Internet Draft in 1999. It has not been proposed for standardization.
Cisco RUDP
Cisco in its Signalling Link Terminals (either standalone or integrated in another gateway) uses RUDP for backhauling of SS7 MTP3 or ISDN signaling.
RUDP v0 (no checksums) is used for SS7 MTP3 backhaul.
RUDP v1 (with checksum) is used for ISDN PRI backhaul.
The versions are mutually incompatible and differ slightly from the IETF draft. The structure of the Cisco Session Manager used on top of RUDP is also different.
Microsoft R-UDP
Microsoft introduced another protocol which it named R-UDP and used it in its MediaRoom product (now owned by Ericsson) for IPTV service delivery over multicast networks. This is a proprietary protocol and very little is known about its operation. It is not thought to be based on the above referenced IETF draft.
See also
Stream Control Transmission Protocol
Datagram Transport Layer Security
References
External links
Plan 9 implementation of RUDP
https://datatracker.ietf.org/doc/html/draft-ietf-sigtran-reliable-udp-00/
Cisco Signaling Link Terminal
Transport layer protocols
Internet protocols
|
https://en.wikipedia.org/wiki/Commonwealth%20Business%20Council
|
The Commonwealth Business Council (CBC) was an institution of the Commonwealth Family that aimed to use the global network of the Commonwealth of Nations more effectively for the promotion of global trade and investment for shared prosperity. It was formed at the Commonwealth Heads of Government Meeting 1997 (CHOGM) in Edinburgh, United Kingdom, and replaced in July 2014 by the Commonwealth Enterprise and Investment Council (CWEIC).
The CBC acted as a bridge for cooperation between business and government, concentrating efforts on these specific areas:
Enhancing Trade
Mobilising Investment
Promoting Corporate Citizenship
Facilitating ICT for Development
Public Private Partnerships
Commonwealth countries are major stakeholders in the process and success of the Doha Development Agenda. Together the Commonwealth's 53 member countries account for 30 per cent of the world's population and about 25 per cent of its international trade and investment. Commonwealth countries account for 40 per cent of WTO membership. CBC's trade development objectives include encouraging
trade facilitation and further liberalisation of services; encouraging developing countries to play an active role in the World Trade Organization, and in new trade rounds, by maximising their negotiating strength through cooperative action.
The CBC helps to mobilise investment into Commonwealth countries through measures including ensuring access to international capital markets; strengthening 26 domestic capital markets; encouraging regional integration; committing the private sector to work together with governments to help achieve a successful market economy for generating investment.
A key feature of CBC was its global membership, comprising corporate members from both developed and developing countries. This gave CBC the capacity to make a special contribution to the debate on corporate citizenship, dominated by developed countries.
The CBC worked to involve private sector engagement in facilitating the implementation of an Information Communications Technologies for Development programme. The CBC programme enhanced collaborative partnerships between the various stakeholders including governments, private sector, donor agencies and civil society. Major goals included:
Bridge the digital divide for both social and economic development.
Promote ICT for Development in Commonwealth countries.
Promote an experience exchange among stakeholders in Commonwealth countries.
Promote business and government cooperation for development.
Create awareness and enhance the knowledge of policy makers regarding economic, technical and legal aspects of implementation of ICT for development.
Provide and facilitate training and capacity building.
CBC believed that there was a significant gap for independent support to emerging market governments in the structuring and transacting of ICT infrastructure opportunities. The key CBC objectives were:
Examine how support from highly experienced individ
|
https://en.wikipedia.org/wiki/MBCS
|
MBCS may refer to:
Member of the Chartered Institute for I.T., denoting membership at a professional level
Multi Byte Character Set, a class of character encodings in computing
Marine Biology Case Study, a discontinued case study in the AP Computer Science program
|
https://en.wikipedia.org/wiki/Tee%20%28command%29
|
In computing, tee is a command in command-line interpreters (shells) using standard streams which reads standard input and writes it to both standard output and one or more files, effectively duplicating its input. It is primarily used in conjunction with pipes and filters. The command is named after the T-splitter used in plumbing.
Overview
The tee command is normally used to split the output of a program so that it can be both displayed and saved in a file. The command can be used to capture intermediate output before the data is altered by another command or program.
The tee command reads standard input, then writes its content to standard output. It simultaneously copies the data into the specified file(s) or variables.
The syntax differs depending on the command's implementation.
Implementations
The command is available for Unix and Unix-like operating systems, Microware OS-9, DOS (e.g. 4DOS, FreeDOS), Microsoft Windows (e.g. 4NT, Windows PowerShell), and ReactOS. The Linux tee command was written by Mike Parker, Richard Stallman, and David MacKenzie. The command is available as a separate package for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities. The FreeDOS version was developed by Jim Hall and is licensed under the GPL.
The command has also been ported to the IBM i operating system.
Additionally the sponge command offers similar capabilities.
Unix and Unix-like
tee [ -a ] [ -i ] [ File ... ]
Arguments:
File ... A list of files, each of which receives the output.
Flags:
-a Appends the output to each file, rather than overwriting it.
-i Ignores interrupts.
The command returns the following exit values (exit status):
0 The standard input was successfully copied to all output files.
>0 An error occurred.
Using process substitution lets more than one process read the standard output of the originating process.
Read this example from GNU Coreutils, tee invocation.
Note: If a write to any successfully opened File operand is not successful, writes to other successfully opened File operands and standard output will continue, but the exit value will be >0.
4DOS and 4NT
TEE [/A] file...
Arguments:
file One or more files that will receive the "tee'd" output.
Flags:
/A Append the pipeline content to the output file(s) rather than overwriting them.
Note: When tee is used with a pipe, the output of the previous command is written to a temporary file. When that command finishes, tee reads the temporary file, displays the output, and writes it to the file(s) given as command-line argument.
Windows PowerShell
tee [-FilePath] <String> [-InputObject <PSObject>]
tee -Variable <String> [-InputObject <PSObject>]
Arguments:
-InputObject <PSObject> Specifies the object input to the cmdlet. The parameter accepts variables that contain the objects and commands or expression that return the objects.
-FilePath <String> Specifies the file where the cmdlet stores the object. The parameter
|
https://en.wikipedia.org/wiki/Pivot%20table
|
A pivot table is a table of values which are aggregations of groups of individual values of a more extensive table (such as from a database, spreadsheet, or business intelligence program) within one or more discrete categories. The aggregations or summaries on the groups of the individual terms might include sums, averages, counts, or other statistics. A pivot table is an outcome of statistically processing on a tabularized raw data and can be used for decision making.
Although pivot table is a generic term, Microsoft held a trademark on the term in the United States from 1994 to 2020.
History
In their book Pivot Table Data Crunching, Bill Jelen and Mike Alexander refer to Pito Salas as the "father of pivot tables". While working on a concept for a new program that would eventually become Lotus Improv, Salas noted that spreadsheets have patterns of data. A tool that could help the user recognize these patterns would help to build advanced data models quickly. With Improv, users could define and store sets of categories, then change views by dragging category names with the mouse. This core functionality would provide the model for pivot tables.
Lotus Development released Improv in 1991 on the NeXT platform. A few months after the release of Improv, Brio Technology published a standalone Macintosh implementation, called DataPivot (with technology eventually patented in 1999). Borland purchased the DataPivot technology in 1992 and implemented it in their own spreadsheet application, Quattro Pro.
In 1993 the Microsoft Windows version of Improv appeared. Early in 1994 Microsoft Excel 5 brought a new functionality called a "PivotTable" to market. Microsoft further improved this feature in later versions of Excel:
Excel 97 included a new and improved PivotTable Wizard, the ability to create calculated fields, and new pivot cache objects that allow developers to write Visual Basic for Applications macros to create and modify pivot tables
Excel 2000 introduced "Pivot Charts" to represent pivot-table data graphically
In 2007 Oracle Corporation made PIVOT and UNPIVOT operators available in Oracle Database 11g.
Mechanics
For typical data entry and storage, data usually appear in flat tables, meaning that they consist of only columns and rows, as in the following portion of a sample spreadsheet showing data on shirt types:
While tables such as these can contain many data items, it can be difficult to get summarized information from them. A pivot table can help quickly summarize the data and highlight the desired information. The usage of a pivot table is extremely broad and depends on the situation. The first question to ask is, "What am I seeking?" In the example here, let us ask, "How many Units did we sell in each Region for every Ship Date?":
A pivot table usually consists of row, column and data (or fact) fields. In this case, the column is ship date, the row is region and the data we would like to see is (sum of) units. These fields allow seve
|
https://en.wikipedia.org/wiki/Yes%20%28Unix%29
|
yes is a command on Unix and Unix-like operating systems, which outputs an affirmative response, or a user-defined string of text, continuously until killed.
Overview
By itself, the yes command outputs 'y' or whatever is specified as an argument, followed by a newline repeatedly until stopped by the user or otherwise killed; when piped into a command, it will continue until the pipe breaks (i.e., the program completes its execution). However, if the user enters a string after 'yes,' yes will output the string the same as it would 'y,' similar to echo.
The version of yes bundled in GNU coreutils was written by David MacKenzie.
The command is available as a separate package for Microsoft Windows as part of the GnuWin32 project and the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities.
Uses
yes can be used to send an affirmative (or negative; e.g. yes n) response to any command that would otherwise request one, thereby causing the command to run non-interactively.
Piping yes to a command with many user-confirmation prompts will automatically answer all of those prompts with "yes" (typing 'y' and pressing return).
The following commands
$ yes | sudo apt install foobar
will answer the prompts for confirmation with y, effectively installing foobar with sudo apt without any prompts.
This usage may be obsolete today, as most commands that would request response from the user have either a 'force' option (e.g., rm -f) or an 'assume-yes' option (for example,apt -y).
As an example, the following:
$ rm -f *.txt
is functionally equivalent to
$ yes | rm *.txt
The yes command in conjunction with the head command can be used to generate large volume files for means of testing. For example, executing
$ yes 1234567 | head -n1000 > file
results in a file consisting of 1000 lines each consisting of eight characters (1, 2, 3, 4, 5, 6, 7 and newline).
yes can be used as an easy way of generating CPU load. In 2006, for example, the yes command received publicity for being a means to test whether or not a user's MacBook is affected by the "Intermittent Shutdown Syndrome" bug, where a MacBook would randomly shut off without any user input. By running the yes command indefinitely twice via Terminal under Mac OS X, users were able to max out their computer's CPU, and thus see if the failure was heat related.
Implementation and performance
The implementation of yes on different Unix and Unix-likes was consistently implemented with a simple while-loop. The GNU Project's implementation of yes was much faster than any other implementation, achieved by buffering its output, leading to more output per system call. GNU's implementation may have been different to avoid infringing on the Unix copyright. The FreeBSD Project changed their implementation in 2017 to match GNU's implementation.
References
Further reading
External links
Manpage for yes (GNU version)
GNU coreutils yes.c implementation
FreeBSD yes.c implementation
NetBSD ye
|
https://en.wikipedia.org/wiki/DataCAD
|
DataCAD is a computer-aided design and drafting (CADD) software for 2D and 3D architectural design and drafting, developed and sold by DATACAD LLC.
Usage
DataCAD runs exclusively on Microsoft Windows-based operating systems, and was one of the first PC-based CADD programs developed specifically for architects. DataCAD is the only CADD software ever to be endorsed by the American Institute of Architects (ca. 1987) for direct distribution to its members. By 1988, DataCAD was in use by more than 12,000 firms in the United States and Canada. Currently, there are estimated to be more than 250,000 installations of DataCAD worldwide.
According to The 1989 AIA Firm Survey Report, DataCAD is used by 10% of AIA member firms, second only to AutoCAD with a 45% market share.
According to The 1997 AIA Firm Survey Report, DataCAD is used by 12% of AIA member firms, second only to AutoCAD with a 61% market share.
History
In the Spring of 1981, a student, Eric V. Smith, began developing a program he called Apple Draw on an Apple II at University of Virginia. After he graduated in 1984, Mr. Smith was hired by an architectural firm, Stuart Griffin Burgh and Associates, in Charlottesville, Virginia. At this firm he began porting the Apple Draw program to the Corvus Concept platform as DataCAD. In 1984, only one license of DataCAD was sold before it was ported to the IBM PC platform. DataCAD was developed exclusively for the MS-DOS operating system until May 1998.
The DataCAD Boston Users' Group (DBUG) was formed in December 1987 by two architects, the late Evan Shu, FAIA (1953 - 2020) and Rick Gleason, AIA. In November 2020, DBUG reached a 33-year milestone and stands as one of the longest, continuously-running, CAD software users' groups in the United States. DBUG is a permanent committee of the Boston Society of Architects.
In June 1989, Cadkey, Inc. (the original developer of CADKEY), purchased the rights to DataCAD from Microtecture Inc.
In September 1992, Dr. Malcolm Davies was elected President/CEO of Cadkey, Inc. Dr. Davies joined Cadkey from Autodesk where from 1988 to 1992 he was V.P. Marketing and Sales.
In November 1993, the price of DataCAD was drastically reduced from $2,995 to $150 coincident with a major shift from dealer-based sales to direct mail-based sales.
In October 1994, the first online forum (also known as The DBUG Forum) dedicated to DataCAD users was established by the late Evan Shu, FAIA (1953 - 2020). The DBUG Forum is a listserv supported by subscribers worldwide. A searchable archive of more than 70,000 messages is available (see External Links).
On October 2, 1996, a newly formed company, DATACAD LLC, co-founded by Mark F. Madura, the late David A. Giesselman (1957 - 2020), and H. William Mirbach, purchased the rights to DataCAD from Micro Control Systems, Inc. (formerly Cadkey, Inc.).
In February 1998, DATACAD, along with 14 other companies, joined the newly formed, OpenDWG Alliance (now Open Design Alliance) as a founding
|
https://en.wikipedia.org/wiki/Algorithmic%20trading
|
Algorithmic trading is a method of executing orders using automated pre-programmed trading instructions accounting for variables such as time, price, and volume. This type of trading attempts to leverage the speed and computational resources of computers relative to human traders. In the twenty-first century, algorithmic trading has been gaining traction with both retail and institutional traders. A study in 2019 showed that around 92% of trading in the Forex market was performed by trading algorithms rather than humans.
It is widely used by investment banks, pension funds, mutual funds, and hedge funds that may need to spread out the execution of a larger order or perform trades too fast for human traders to react to. However, it is also available to private traders using simple retail tools.
The term algorithmic trading is often used synonymously with automated trading system. These encompass a variety of trading strategies, some of which are based on formulas and results from mathematical finance, and often rely on specialized software.
Examples of strategies used in algorithmic trading include systematic trading, market making, inter-market spreading, arbitrage, or pure speculation, such as trend following. Many fall into the category of high-frequency trading (HFT), which is characterized by high turnover and high order-to-trade ratios. HFT strategies utilize computers that make elaborate decisions to initiate orders based on information that is received electronically, before human traders are capable of processing the information they observe. As a result, in February 2012, the Commodity Futures Trading Commission (CFTC) formed a special working group that included academics and industry experts to advise the CFTC on how best to define HFT. Algorithmic trading and HFT have resulted in a dramatic change of the market microstructure and in the complexity and uncertainty of the market macrodynamic, particularly in the way liquidity is provided.
History
Early developments
Computerization of the order flow in financial markets began in the early 1970s, when the New York Stock Exchange introduced the "designated order turnaround" system (DOT). SuperDOT was introduced in 1984 as an upgraded version of DOT. Both systems allowed for the routing of orders electronically to the proper trading post. The "opening automated reporting system" (OARS) aided the specialist in determining the market clearing opening price (SOR; Smart Order Routing).
With the rise of fully electronic markets came the introduction of program trading, which is defined by the New York Stock Exchange as an order to buy or sell 15 or more stocks valued at over US$1 million total. In practice, program trades were pre-programmed to automatically enter or exit trades based on various factors. In the 1980s, program trading became widely used in trading between the S&P 500 equity and futures markets in a strategy known as index arbitrage.
At about the same time, portfolio i
|
https://en.wikipedia.org/wiki/List%20of%20Foster%27s%20Home%20for%20Imaginary%20Friends%20episodes
|
Foster's Home for Imaginary Friends is an American animated television series created by Craig McCracken for Cartoon Network Studios. The series centers on a boy named Mac, who is pressured by his mother to abandon his imaginary friend Bloo, who moves into an orphanage for imaginary friends, and is kept from adoption so that Mac can visit him daily. The episodes center on the day-to-day adventures and predicaments in which Mac, Bloo and other characters get involved.
The series premiered on August 13, 2004, with the 90-minute pilot episode "House of Bloo's", and concluded on May 3, 2009, with the episode "Goodbye to Bloo". The series ran for 6 seasons consisting of 13 episodes apiece. Animated shorts aired from 2006–2007.
Series overview
Episodes
Note: All episodes were directed by series creator Craig McCracken, with the only co-direction of Rob Renzetti in "Destination: Imagination".
Season 1 (2004)
Season 2 (2005)
Even though this season aired from early-mid 2005, the closing credits for the first 5 episodes suggest that this season started production in late October/early November 2004.
Season 3 (2005–06)
Season 4 (2006)
Shorts (2006–07)
Season 5 (2007–08)
Season 6 (2008–09)
Home media releases
Notes
References
External links
List of
List of
Lists of American children's animated television series episodes
Lists of Cartoon Network television series episodes
Episodes
|
https://en.wikipedia.org/wiki/Java%20Card%20OpenPlatform
|
Java Card OpenPlatform (JCOP) is a smart card operating system for the Java Card platform developed by IBM Zürich Research Laboratory.
On 31 January 2006 the development and support responsibilities transferred to the IBM Smart Card Technology team in Böblingen, Germany.
Since July 2007 support and development activities for the JCOP operating system on NXP / Philips silicon are serviced by NXP Semiconductors.
The title originates from the standards it complies with:
Java Card specifications
GlobalPlatform (formerly known as Visa Inc OpenPlatform) specifications
A Java Card JCOP has a Java Card Virtual Machine (JCVM) which allows it to run applications written in Java programming language.
History
First JC/OP Masks
Mask 0 : 1998 (spring)
First prototype on Atmel 8-bit uC – Flash memory, slow
Mask 1 : 1998
Siemens/Infineon SLE66 IC – Public key cryptography
Mask 2 and 3 : 1999
Gemplus International (now Gemalto) licensed JC/OP
Base mask for GemXpresso product line
Public key generation
Visa OpenPlatform
Mask 4 : 1999
Contactless JC/OP on Philips MifarePro chip
256 bytes RAM, 20 KB ROM and 8 KB EEPROM
Dual interface
JCOP01 and Cooperation with Philips
Mask 5 : 2000
Philips P8WE smartcard microcontroller
‘JCOP01’ is the foundation for all later versions
JCOP licensed by IBM
JCOP Tools for development
Visa breakthrough program
To counter MasterCard’s MULTOS
Cooperation between IBM (OS), Visa (OpenPlatform) and Philips (IC)
JCOP v1 owned by Visa
JCOP v2
Owned by IBM, sold by Philips
Philips SmartMX controller (SMX)
JCOP v2.2
GlobalPlatform 2.1.1
Java Card 2.2.1
Elliptic Curve Cryptography (ECC) F2M support
JCOP Tools Eclipse based
JCOP Transfer
JCOP v2.2.1 – JCOP v2.3.1
Owned by IBM, sold by Philips/NXP
Development transferred to IBM in Böblingen, Germany
USB interface
JCOP v2.3.2
JCOP technology owned by IBM
Policy change at IBM
Source code license acquired by NXP Semiconductors
To serve customer requests and projects
JCOP by NXP
JCOP v2.4
first NXP developed JCOP version
ECC GF(p) support
Java Card 2.2.2
JCOP v2.4.1
ECC primitive calculation support (point addition and multiplication)
Common Criteria 5+ certification (CC)
EMV, Visa and MasterCard approved
NFC integration into PN65N combo chip: NFC and Secure Element
JCOP v2.4.2
additional algorithms to support eGovernment use cases, i.e. AES CMAC
CC 5+
NFC integration into PN65O
JCOP 3
mobile
Smartcard controller SmartMX2, P61, flash based persistent memory
JCOP 3.0
NFC integration into PN65T
Java Card 3.0.1 classic edition
GlobalPlatform 2.2.1
EMV platform certification
JCOP 3.1
NFC integration into PN66T
card
SMX2, P60, EEPROM based persistent memory
JCOP 3.x
(not released as of Dec 26, 2014)
Technical Overview
JCOP is an operating system for a security sensitive embedded system environment, smartcard or secure element controllers in particular. The functional architecture can be partitioned into three parts:
Java Card, for d
|
https://en.wikipedia.org/wiki/Systems%20Management%20Architecture%20for%20Server%20Hardware
|
The Systems Management Architecture for Server Hardware (SMASH) is a suite of specifications that deliver industry standard protocols to increase productivity of the management of a data center.
Distributed Management Task Force developed SMASH Standard- which includes the Server Management Command Line Protocol specification - is a suite of specifications that deliver architectural semantics, industry standard protocols and profiles to unify the management of the data center. Through the development of conformance testing programs, the SMASH Forum will extend these capabilities by helping deliver additional compatibility in cross-platform servers.
External links
DMTF SMASH initiative
DMTF standards
Networking standards
System administration
Out-of-band management
|
https://en.wikipedia.org/wiki/MELCOR
|
MELCOR is a fully integrated, engineering-level computer code developed by Sandia National Laboratories for the U.S. Nuclear Regulatory Commission to model the progression of severe accidents in nuclear power plants. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. MELCOR applications include estimation of severe accident source terms, and their sensitivities and uncertainties in a variety of applications.
See also
Nuclear engineering
Monte Carlo method
Nuclear reactor
MCNP
External links
SNL MELCOR website
NRC "Obtaining MELCOR" site
Wikiversity: Nuclear Engineering
Nuclear safety and security
Physics software
|
https://en.wikipedia.org/wiki/RFactor
|
rFactor is a computer racing simulator designed with the ability to run any type of four-wheeled vehicle from street cars to open wheel cars of any era. rFactor aimed to be the most accurate race simulator of its time. Released in November 2005, rFactor did not have much competition in this market, but it featured many technical advances in tire modeling, complex aerodynamics and a 15 degrees of freedom physics engine.
rFactor was developed by Image Space Incorporated (ISI), which has been developing simulators since the early 1990s for both commercial and military purposes. The isiMotor2 on which the game is based is a direct successor to the engine used in previous titles developed by ISI, most notably F1 Challenge '99–'02, released through EA Sports. The isiMotor2 engine was also used in many other simulation games, and in rFpro.
Gameplay
rFactor has a detailed interface during offline race sessions or online games, allowing players to control the mechanical setup of their cars, chat to other players and enter the racing arena in their vehicle. The player's car can be driven from multiple viewpoints, but the two most popular are termed the cockpit view (from the driver's eye) and swingman view (above and behind the vehicle).
General consensus dictates that a steering wheel will provide the best performance gameplay wise, though a joystick or even keyboard can be used. The keyboard is also used for some actions, like requesting pit service and adjusting brake bias. This is analogous to buttons on modern racing car steering wheels and most computer wheels have buttons that can be mapped to keystrokes. The player can jump directly from the racetrack to the control interface by pressing the escape key (ESC), or entering their pit box. Most, if not all, inputs are able to be mapped to the players choosing.
Modding
In addition to the stock vehicles and circuits available in rFactor, a steady stream of unofficial mods has become available. A large number of modifications were released, including ones that recreated seasons from Formula One, NASCAR, IndyCar and V8 Supercars. Cars from the racing games Forza Motorsport, Need for Speed: Shift, Shift 2 Unleashed, Simulador Turismo Carretera, Top race 2009 Simulator, TC2000 Racing and Test Drive Unlimited were also converted into rFactor with the mod Shift Street. With the release of the SDK, many new venues were created and released as unofficial addons to the game. Many of the circuits for rFactor were converted from other games, including GTR, GT Legends, TOCA Race Driver, Grand Prix 4 and Grand Prix Legends.
Development
rFactor is an evolution of F1 Challenge '99–'02, but without the licensing of Formula One circuits and teams. As such, rFactor'''s initial release only included four fictitious circuits (seven as of v1.087), with about a dozen layouts within these facilities and there were about six vehicle classes, including two open wheel and four sedan classes. Among its most notable featur
|
https://en.wikipedia.org/wiki/Desktop%20Management%20Interface
|
The Desktop Management Interface (DMI) generates a standard framework for managing and tracking components in a desktop, notebook or server computer, by abstracting these components from the software that manages them. The development of DMI, 2.0 version June 24, 1998, marked the first move by the Distributed Management Task Force (DMTF) into desktop-management standards.
Before the introduction of DMI, no standardized source of information could provide details about components in a personal computer.
Due to the rapid development of DMTF technologies, such as Common Information Model (CIM), the DMTF defined an "End of Life" process for DMI, which ended on March 31, 2005.
From 1999, Microsoft required OEMs and BIOS vendors to support the DMI interface/data-set in order to have Microsoft certification.
DMI and SMBIOS
DMI exposes system data (including the System Management BIOS (SMBIOS) data) to management software, but the two specifications function independently.
DMI is commonly confused with SMBIOS, which was actually called DMIBIOS in its first revisions.
Optional additional services: MIF data and MIF routines
When software queries a memory-resident agent that resides in the background, it responds by sending data in MIFs (Management Information Format) or activating MIF routines. Static data in a MIF would contain items such as model ID, serial number, memory- and port-addresses. A MIF routine could read memory and report its contents.
DMI and SNMP
DMI can co-exist with SNMP and other management protocols. For example, when an SNMP query arrives, DMI can fill out the SNMP MIB with data from its MIF. A single workstation or server can serve as a proxy agent that would contain the SNMP module and service an entire LAN segment of DMI-capable machines.
See also
dmidecode
Desktop management
lspci
System Management BIOS
Web-Based Enterprise Management (WBEM)
WS-Management
References
Further reading
External links
The DMI home page links to repositories of DMI-related information including specifications, support-tools, and the Product Registry of DMI-certified products.
Linux man page for dmidecode
Large collection of decoded DMI tables for various computer models
DMTF standards
Network management
BIOS
|
https://en.wikipedia.org/wiki/Christopher%20Titus
|
Christopher Todd Titus (born October 1, 1964) is an American comedian, podcaster and actor. He grew up in Newark, California. Titus came to network audiences with the eponymous FOX series Titus, of which he was the star, executive producer and co-creator. He is also a stand-up comedian whose act revolves around his dysfunctional family and shocking life experiences.
Career
Stand-up comedy
Norman Rockwell is Bleeding
Titus' first special, this monologue about his dysfunctional family was the basis for his TV show. This special premiered in 2000 at the Montreal Just for Laughs festival, and a filmed version was aired on Comedy Central in 2004.
5th Annual End of the World Tour
This special was filmed in Miami January 7, 2007, for Comedy Central.
Love is Evol
Love is Evol deals with his divorce from Erin (renamed "Kate" in the special for legal reasons) whom he stated was turned into "a demon slithering from the fiery depths of Satan's anus" during the divorce proceedings, and the toll that abusive relationships take on people, among other things. In it, he talks about how his marriage to Erin fell apart, the ensuing divorce, his analysis of why people stay in bad relationships, his crisis of faith because of the divorce, meeting his new girlfriend's family, and dating again for the first time in two decades. It was recorded in October 2008 for Comedy Central and aired on February 14, 2009.
Neverlution
Titus' fourth stand-up act, filmed in San Diego, was Neverlution In it, Titus talked about bringing the country back to its former glory, the new generation, and politics. Comedy Central Records released a double CD of Neverlution.
Voice in My Head
Titus' fifth stand-up act is called Voice in My Head. This act deals with the different levels of failure and success Titus has encountered throughout his life, including his first job as a low-rent Darth Vader look-alike, up to why his TV show was cancelled. It was filmed on January 26, 2013, at the Fresno Tower Theatre.
Angry Pursuit of Happiness
Titus' sixth act was called Angry Pursuit of Happiness which was filmed on September 27, 2014 in Santa Barbara.
Born with a Defect
This is his seventh special and was filmed in Center Theater in Escondido, California, and was released in 2016. "If you have kids, it's therapy. If you don't have kids, it's 90 minutes of birth control."
Amerigeddon
Titus' eighth act was released in 2018 and dealt with America under the Trump administration.
Zero Side Effects
Released in April 2023, and filmed at the historic El Portal Theater in North Hollywood, CA, Titus performed his tenth special, “Zero Side Effects," to a sold out crowd, where he took on topics like White Supremacy, he apologizes to Millenials and Gen Z, and he recounts in painful detail, his life-altering near-death dental experience, in the way only Titus can.
Carrying Monsters
Titus' eleventh act is currently on tour in the USA, through at least March 30, 2024.
Podcast
Since January 28,
|
https://en.wikipedia.org/wiki/Twisted%20Metal%3A%20Black
|
Twisted Metal: Black is a vehicular combat video game developed by Incognito Entertainment and published by Sony Computer Entertainment for the PlayStation 2 video game console. It is the first game developed by Incognito Entertainment. Santa Monica Studio assisted on development. It is a reboot of the Twisted Metal series and was released on June 18, 2001. An online enabled multiplayer-only variant, Twisted Metal: Black Online, was released later as a free send-away.
Both Twisted Metal: Black and Twisted Metal: Black Online were reissued as part of Sony Greatest Hits program. A standard downloadable version of Twisted Metal: Black is included in the first batch of copies of Twisted Metal for PlayStation 3, discernible by the "Limited Edition" tab near the top of the cover art. In December 2015, the game was made available for the PlayStation 4 through the PlayStation Network.
Overview
In concept, Twisted Metal: Black is a demolition derby that permits the usage of ballistic projectiles. Players choose a vehicle and an arena—or a series of arenas in the story mode—to engage in battle with opposing drivers. A variety of weapons and upgrades are obtainable by pick-ups scattered throughout the stage. The objective of the game is to be the last one standing.
The basis of the plot follows the same structure as in all the previous games: Calypso runs a car-based contest called Twisted Metal (though in the game the contest is never called that), in which the various characters compete risking their lives to claim the tournament's prize - any single wish they desire, no matter the difficulty, rarity or even reality of such wish. Although Calypso is indeed malevolent, characters who have malevolent wishes (which make most of the cast) have their wishes granted without him tricking them on the wishes, while those seeking more noble ends (such as Outlaw's driver Agent Stone) find that Calypso usually has the last laugh.
In a somewhat different take from previous games, each character has their own story, which they narrate from their own point of view. Each of them starts with them being visited by Calypso, who knows what they desire and offers them in his contest. More of the characters' background is revealed in their midpoint cutscene, presented as a dream experienced when they briefly pass out after the sub-boss Minion is defeated. The characters' ending movie showing their wish being granted is presented after defeating the final boss Warhawk.
The game instead takes place within a single city known as "Midtown", with most competitors coming from the city's mental asylum, "Blackfield".
Twisted Metal: Black has a diverse cast made up from both new and returning characters, some of which have changed drastically from their previous appearances. There are a total of fifteen selectable characters, in which ten of them are selectable from the very beginning and the other five must be found and unlocked.
Reception
By July 2006, Twisted Metal: Black ha
|
https://en.wikipedia.org/wiki/Mongrel%20Mob
|
The Mongrel Mob (sometimes self-labelled as the Mighty Mongrel Mob or colloquially known as the Mob) is an organised street gang and prison gang based in New Zealand. With a network of more than thirty chapters throughout the country and additional operations in Australia and Canada, the Mob is the largest gang in New Zealand. They are especially active in the King Country, Kawerau, Ōpōtiki, Waikato and Hastings. The Mongrel Mob's main rival is the Black Power gang; there have been several very public and violent clashes between the two gangs over the years.
History
The gang began with a group of mainly New Zealand European youths from Wellington and Hawke's Bay in the 1960s. Legend within the gang holds that the name originated from the comments of a judge in the Hastings District Court, who referred to a group of men before him as mongrels. Whatever the origin, the group embraced the term. By the late 1960s loose groups of rebellious young men in Wellington and Hawke's Bay were calling themselves Mongrels. By 1966 they were wearing patches bearing the name 'Mongrel Mob'.
By about 1970 the Mongrels were also known as the Mongrel Mob, and the gang had expanded to include numerous Māori. Members consider Hastings in Hawke's Bay to be the gang's "Fatherland" or birthplace, and the gang first became known for its violence in Hawke's Bay. Later, similarly named groups sprang up around the country, forming their own independent chapters.
In the 2000s and 2010s, the Mongrel Mob began expanding into parts of Australia. In 2018 they also expanded into Canada.
Chapters
According to Te Ara, in 2010 there were over 30 recognised chapters of the Mongrel Mob; including,
Mongrel Mob Hastings – 1962
Mongrel Mob Wellington – 1962
Mongrel Mob Auckland Maximum Security Prison – 1979
Notorious Mongrel Mob – 1981
Mongrel Mob Perth – 1989-1989 (defunct)
Mongrel Mob Melbourne – 2013
Mongrel Mob Darwin – 2016
Mongrel Mob Gold Coast – 2016
Mongrel Mob Fatherland – 2018
Mongrel Mob Te Puke
Insignia
Mongrel Mob colours are predominantly red and black. The patches usually feature a British Bulldog wearing a German Stahlhelm, which supposedly is an image intended to offend as it is a British Bulldog wearing the helmet. The patch is worn on the back of "patched members": those considered loyal and trustworthy enough to be in the gang. The patch will also be tattooed on the member's body. Mob members are known for their tattooed faces and red bandannas.
Membership
The gang claims it offers a surrogate family for young men, most of whom are often alienated from their family via joining. A majority of members are Māori, European or other Polynesian ethnic groups, with Māori predominating.
A "prospect" is a person who is loyal to the gang but is not a "patched member" yet and must normally do errands or "missions" to show his loyalty to his gang. A prospect normally has a patched member to report or "clock in" to. This patched member normally decides when it is time for
|
https://en.wikipedia.org/wiki/CBK%20%28AM%29
|
CBK (540 kHz) is a Canadian public radio station licensed to Watrous, Saskatchewan. It broadcasts the CBC Radio One network as a Class A clear-channel AM station powered at 50,000 watts around the clock from a non-directional antenna near Watrous.
Its studios are located at the CBC's broadcast centre at 2440 Broad Street in Regina, with an additional bureau in the Saskatoon Co-op building on 4th Avenue South in Saskatoon. The Regina facility also houses CBK-FM and CBKT-DT. In Regina, a nested rebroadcaster, CBKR-FM 102.5 MHz, simulcasts CBK for listeners who may have trouble receiving the 540 AM signal amid downtown office and apartment buildings.
CBK 540 operates on a low frequency and with high power in a region with excellent ground conductivity. That helps CBK's daytime signal to reach most of the southern two-thirds of Saskatchewan, including Regina, Saskatoon, Yorkton, Swift Current, Lloydminster, Moose Jaw and Prince Albert. It also provides grade B coverage as far west as Calgary and as far east as Winnipeg, and reaches across the border into North Dakota and Montana.
History
CBK officially opened during an evening ceremony in Watrous on July 29, 1939. The K in the station's call sign honours Henry Kelsey, an English fur trader, explorer, and sailor who was the first recorded European to have visited what is now Saskatchewan.
CBC engineers deliberately chose to place the station's transmission facilities near Watrous in order to provide the best possible broadcast signal to the densely populated portion of Saskatchewan, including the cities of Regina and Saskatoon. Watrous is located about northwest of Regina and about southeast of Saskatoon in an area where potash-rich soil provides especially good ground conductivity, an important component in determining the strength and reach of an AM radio station's daytime ground wave signal. Additionally, Watrous, in particular, was an advantageous location due to being on the main line of the Canadian National Railway, whose telecommunications infrastructure was used to deliver content to CBC radio stations before the creation of the Trans Canada Microwave system.
Because of the factors making the CBK signal particularly strong, the station was originally intended as the CBC's clear-channel station for the Prairies, broadcasting the full CBC radio schedule together with privately-owned affiliates in the region broadcasting portions of the schedule (clear-channel CKY in Winnipeg—now CBW—was one such affiliate at the time). The strong daytime signal also spills into the United States and was initially the only radio station receivable during the daytime in parts of North Dakota and Montana.
For most of World War II, CBK aired programming in both English and French. The French programming was prepared at CBK by a two-person crew and included newscasts, musical programs, and transcriptions of CBC programming produced in Montreal.
At the start, CBK had no physical presence in Saskatchewan
|
https://en.wikipedia.org/wiki/CBR%20%28AM%29
|
CBR is a Canadian clear-channel radio station broadcasting at 1010 kHz in Calgary, Alberta. It broadcasts the programming of the CBC Radio One network. CBR's studios are located in the Parkdale neighbourhood of northwest Calgary, while its transmission facilities are located east of Calgary in Rocky View County.
CBR's daytime signal covers most of the southern two-thirds of Alberta. It can be heard at city-grade strength from Red Deer to Lethbridge, and provides secondary coverage as far as Edmonton to the north and several counties on the Montana-Alberta border to the south. At night, it covers most of western North America.
As of Winter 2020, CBR was the 2nd-most-listened-to radio station in the Calgary market according to Numeris.
History
The origin of CBR began on September 8, 1948 when CBX, with studios in Edmonton, started broadcasting on 1010 kHz from a site near Lacombe, roughly halfway between Calgary and Edmonton, in an attempt to serve both cities from a single 50,000-watt transmitter.
From early on, however, reception of CBX in Calgary was poor. To rectify this ongoing issue, on October 1, 1964, the original CBX transmitter was decommissioned and the single station was split into two distinct 50,000-watt stations with their own studios: one transmitting near Edmonton and one transmitting near Calgary.
The Edmonton station kept the CBX call sign but moved to a frequency of 740 kHz, while the Calgary station obtained the CBR call sign but kept CBX's former frequency of 1010 kHz and clear-channel designation.
Prior to CBR's sign-on, private station CFAC had aired CBC radio programming.
On March 16, 2006, the Canadian Radio-television and Telecommunications Commission (CRTC) approved an application by the station to implement a new, nested FM transmitter in Calgary itself to simulcast the AM programming, due to the AM signal's poor reception in some parts of the city. This new FM signal, CBR-1-FM 99.1 was launched on November 28, 2006. In recent years, the CBC has branded 99.1 as the main transmitter, even though 1010 is technically the main station.
Various other AM and FM rebroadcasters have been installed throughout southern Alberta.
On December 19, 2008, the licensee proposes to use a Subsidiary communications authority (SCA) channel to broadcast multi-cultural programs.
On July 7, 2011, the CRTC approved an application by the CBC to relocate CBR's transmitter and antenna array from their original site in southeast Calgary to a site to the northeast in Rocky View County. All other technical parameters would remain unchanged. The move was completed in 2013.
Local programming
CBR's local programs are Calgary Eyeopener in the morning, and The Homestretch in the afternoon.
Transmitters
In 1993, the CRTC approved the CBC's application to operate new FM transmitters at Medicine Hat 98.3 MHz and Etzikom 92.1 MHz. The new FM transmitter at Medicine Hat would replace CJMH the existing AM transmitter 1460 kHz owned by Monarch Br
|
https://en.wikipedia.org/wiki/CBR-FM
|
CBR-FM is a Canadian radio station, broadcasting on 102.1 FM in Calgary, Alberta. It broadcasts the programming of the CBC Music network. CBR-FM's studios are located on Westmount Boulevard Northwest just west of downtown Calgary, while its transmitter is located at 85th Street Southwest and Old Banff Coach Road in western Calgary. CBR-FM was launched on September 29, 1975.
The jazz program Tonic, hosted by Tim Tamashiro, originated from CBR-FM. It previously hosted only the weekend version until the retirement of Montreal-based weekday host Katie Malloch in 2012.
As of Winter 2020, CBR-FM is the 14th-most-listened-to radio station in the Calgary market according to a PPM data report released by Numeris.
Rebroadcasters
References
External links
BR-FM
BR-FM
Radio stations established in 1975
1975 establishments in Alberta
|
https://en.wikipedia.org/wiki/John%20Saul%27s%20Blackstone%20Chronicles
|
John Saul's Blackstone Chronicles: An Adventure in Terror is a 1998 computer adventure game developed by Legend Entertainment and published by Red Orb Entertainment, a Mindscape subsidiary.
The game is based on serial novels that were written by John Saul, titled Blackstone Chronicles.
A sequel to the novels, the game takes place several years after the sixth book, and continues the story of Oliver Metcalf, his family, and the town of Blackstone.
Plot
The game starts with Oliver arriving at the Blackstone Asylum, which has been purchased and is being turned into a Museum of Psychiatric History. That doesn't sit well with Malcolm Metcalf, Oliver's father and last superintendent of the Asylum, who died some forty years before. All of the activity involved in transforming the Asylum has awakened its residents. For reasons not yet known to Oliver or the player, his father's spirit has taken his son, Joshua, and hidden him somewhere in the Asylum, apparently to coerce Oliver there.
Exploring the mansion, Oliver encounters several spirits of patients who are bound to the asylum by their possessions, including a teenage girl with hysterical pregnancy, a schizophrenic who believes she's English royalty, and a depressed woman who was treated with steam baths and hydrotherapy. Oliver discovers that his father psychologically tortured to suicide or allowed several of his patients to be killed under the guise of accidents during treatment. This is counterpointed by the sterile and rose-tinted explanations from the museum equipment for the same procedures or implements (lancets are described as an attempt to bring the bodies humours into balance, where the spirit of a patient with Alzheimer's disease declares they were used liberally so patients could not defend themselves). Disheartened by the failure of traditional medicine, Oliver's father gradually turned to more and more extreme methods, including totally dismembering and vivisecting an 8-year-old boy to cure his illness. Eventually his treatments turned to outright torture, as a punishment of undesirable behaviors to eventually remove them.
Over the course of the game, Oliver collects several personal items that influence him, causing him to nearly kill himself in several psychiatric methods (ECT, self-injecting neuro-toxins, locking himself in a steam box). His father Malcolm implies this is caused by the inherent evil contained within the items, although its heavily implied that Oliver developed these traps himself while under Malcolm's control, through a long, complicated sequence of post-hypnotic suggestions.
Oliver's father eventually reveals his plan. While Oliver has been trapped in the asylum and continued to refuse Malcolm's demands that Oliver take vengeance on Malcolm's enemies, Malcolm returned Joshua home, and instructs him to murder his mother with a straight razor, as a punishment of Oliver for his disobedience to his father and to make Joshua a monster with Malcolm's similar outlo
|
https://en.wikipedia.org/wiki/Words%20Worth
|
is a Japanese adult role-playing video game originally released for NEC PC-98 computer systems, and remade for Microsoft Windows. The game's story is linear, with only one story decision near the end, leading to one of five different endings.
A five-part animated erotic direct-to-video series was adapted from the game's story. It also has a side story series, (known as Words Worth Outer Stories in the English release). The anime has the same general story, but the anime cuts out several characters and changes the plot mostly to create more sex scenes. The English dub is notable for featuring real life porn actresses Jenna Jameson and Nikki Dial. The rest of the English cast remained uncredited.
Gameplay
The Gameplay of Words Worth is similar to other fantasy games of the era such as The Elder Scrolls II: Daggerfall but with a tongue and cheek sexual undertone. it is a remake of the 1993 game of the same name and while the plot in near identical, the graphics, gameplay, and visuals have been greatly improved.
Words Worth is primarily a first-person dungeon crawler. Even though there are a few "friendly" areas, such as the hero Astro's bedroom and a town where the hero can rest and buy supplies, most of the game is spent in dungeon-like, maze-like areas (with an auto-map feature). There is no party in the game: Astro has to face the enemies alone. The enemies appear randomly. The 1999 remake has you click on the enemies to slash them where as the combat in the 1993 original is turn-based. The game has scenes with nudity and sexual situations.
Like most fantasy role playing games Words Worth has lots of focus on story and narrative plot points but unlike many contemporaries in the fantasy genre Words Worth is entirely voice acted. As you play as a young hero trying to prove himself worthy while surrounded by vixens. The game falls very well into the style of many Japanese anime plots a young awkward protagonist surrounded by sexpot girls.
Plot
The skill of sword-fighting is known to two tribes, the Tribes of Light (which consists of humans living on the world's surface) and Shadow (largely part-human-part-animal creatures and monsters living in an underground city, who enjoy a lifespan five times as long as the Tribe of Light and age one-fifth as quickly). The two tribes lived in peace and harmony, their domains separated by the "Words Worth" tablet—a huge monolith slab erected by an almighty creator. Although the tablet has writing on it, neither Tribe can read the text. One day, Words Worth was mysteriously destroyed by an unknown entity; its fragments were scattered among the domain of the Tribes of Shadow. The two Tribes blamed each other for the tablet's destruction, and started a war that has continued for 150 years (100 in the anime). Astral, prince of the Tribe of Shadow, desires to become a Swordsman of Shadow. However, his father, King Wortoshika, forbids him to do so. He is engaged to Sharon, a beautiful swordswoman and Astral's ch
|
https://en.wikipedia.org/wiki/Media%20in%20Omaha%2C%20Nebraska
|
This is a list of media serving the Omaha metropolitan area in Omaha, Nebraska and Council Bluffs, Iowa.
Radio
Start dates are for the frequency/station license, not for callsign or programming that may have moved from license to license.
Omaha radio stations gets 25 Analog FM stations, 10 Digital HD Radio FM stations including 9 subchannels Like HD-2 and HD-3, 11 Analog AM stations, and 1 Digital HD Radio AM Station affiliated KFAB.
AM
FM
Television
Omaha TV stations gets 8 full-powered Digital channels including 29 subchannels and 1 low-powered Digital channel including 2 subchannels.
Print
The Omaha World-Herald, the Omaha Bee, and by 1900 the Omaha Daily News had developed into the city's most influential journals.
The African American community in Omaha has had several newspapers serve it. The first was the Progress, established in 1889 by Ferdinand L. Barnett. Cyrus D. Bell, an ex-slave, established the Afro-American Sentinel in 1892. In 1893 George F. Franklin started publishing the Enterprise, later published by Thomas P. Mahammitt. It was the longest lived of any of the early African American newspapers published in Omaha. The best known and most widely read of all African American newspapers in the city was the Omaha Monitor, established in 1915, edited and published by Reverend John Albert Williams. It stopped being published in 1929. In 1906, Lucille Skaggs Edwards published, The Women's Aurora, making her the first black woman to publish a magazine in Nebraska.George Wells Parker, co-founder of the Hamitic League of the World, founded the New Era in Omaha from 1920 through until 1926. The Omaha Guide was established by B.V. and C.C. Galloway in 1927. The Guide, with a circulation of over twenty-five thousand and an advertisers' list including business firms from coast to coast, was the largest African American newspaper west of the Missouri River. The Omaha Star, founded by Mildred Brown, began publication in 1938, and continues today as the only African American newspaper in Omaha.
Current
Historic
References
External links
Silicon Prairie News
Omaha.net - Local News and Stories
- Local Commercial Printing and Digital Media in Omaha, Nebraska
Omaha
Mass media in Nebraska
Media
|
https://en.wikipedia.org/wiki/Castanopsis%20cuspidata
|
Castanopsis cuspidata (Japanese chinquapin; Japanese tsuburajii, 円椎) is a species of Castanopsis native to southern Japan and southern Korea.
It is a medium-sized evergreen tree growing to 20–30 m tall, related to beech and oak. The leaves are 5–9 cm long and 2–4 cm broad, leathery in texture, with an entire or irregularly toothed margin. It grows in woods and ravines, especially near the sea.
The cotyledon of the nut is eaten boiled or roasted.
Its dead wood serves as host to many mushroom types, including the shiitake, which literally means Castanopsis mushroom.
Gallery
References
External links
(enter "Castanopsis cuspidata" in search box).
cuspidata
Edible nuts and seeds
Trees of Asia
Trees of Japan
Trees of South Korea
|
https://en.wikipedia.org/wiki/Ntpd
|
The Network Time Protocol daemon (ntpd) is an operating system program that maintains the system time in synchronization with time servers using the Network Time Protocol (NTP).
Description
The ntpd program is an operating-system daemon that sets and maintains a computer system's system time in synchronization with Internet-standard time servers. It is a complete implementation of the Network Time Protocol (NTP) version 4, but retains compatibility with versions 1, 2, and 3 as defined by RFC 1059, RFC 1119, and RFC 1305, respectively. ntpd performs most computations in 64-bit floating point arithmetic and uses 64-bit fixed point operations only when necessary to preserve the ultimate precision, about 232 picoseconds. While ordinary workstations and networks cannot achieve the ultimate precision , future processors and networks may require it.
xntpd is the Network Time Protocol version three (1992) daemon software. The "x" was added to the name because the branch of code that eventually became NTPv3 was "experimental". The name of the software changed back to "ntpd" for version four because the inventor of NTP, Dave Mills, decided that something probably should not remain "experimental" for about twenty years in the absence of dramatic change.
ntpd uses a single configuration-file to run the daemon in server and/or client modes. The configuration file, usually named ntp.conf, is located in the /etc directory. Other important files include the drift file, which ntpd uses to correct for hardware-clock skew in the absence of a connection to a more accurate upstream time-server.
Implementations
NTP implementations
NTP (RFC 5905):
The NTP Reference Implementation from The NTP Project at the University of Delaware.
Windows Port of NTPD – Free Windows port of The NTP Reference Implementation from http://www.ntp.org with an easy-to-use installer
NTPsec a hardened implementation derived from NTP Classic, Dave Mills's original.
chrony – chronyd implements the NTP protocol and can act as either a client or a server.
OpenNTPD – A portable Simple NTPD implementation by the OpenBSD group
Simple NTP (SNTP) implementations
SNTP (RFC 4330):
clockspeed – A simplest available and secure suite of NTP/SNTP client, clock skew eliminator, and precise time synchronization server and client
dntpd – A simple client ntpd in DragonFly BSD
ConnMan – ConnMan contains an NTP implementation.
BusyBox, since version 1.16.2, has included an SNTP client and server based on OpenNTP.
systemd-timesyncd – A Linux and systemd specific client implementation of SNTP.
See also
rdate
timed
References
ntpd - Network Time Protocol (NTP) daemon Mills, D. L. The University of Delaware, USA. 2005. (Date Accessed: 19 August 2005)
External links
Official NTP Documentation for the current development release
NTP Community Support Information
NTP Development Collaboration
NTP Mailing Lists
NTP Software and Documentation Archive
NTP Documentation Archive for current develo
|
https://en.wikipedia.org/wiki/Sepik%20Coast%20exchange
|
Sepik Coast exchange is the method of social networking and alliance in the Sepik Coast area of Papua New Guinea.
Families living along the Sepik Coast in northern Papua New Guinea form alliances with families in other communities. Depending on the importance and status of the family, it can have anywhere between 5 and 75 contacts in its social network. In each surrounding town, the family knows another. When they travel to another town, they bring gifts to their contact family, and that family will house and care for them. Gifts are reciprocated when given or later when families return the visit. Common gifts are sago, tobacco, baskets, wooden bowls, and other similar items. The recipient does not specify which type of gift they would like to receive, but as a result of the vast quantity of exchanges taking place, the needs of participants are generally met.
A social field is one in which all the members have similar expectations of each other. In the social networks of the Sepik Coast, the significant expectations are hospitality, gift giving and reciprocation from friends in different villages. Alliances are passed along and preserved through many generations, because fathers bring their sons on their trips and families honor an association, no matter how long it has been since the last gift exchange.
See also
Kula ring
Koha
Moka
Potlatch
Gift Economy
Sepik
References
Welsch, Robert and John Terrell.
1998. "Material Culture, Social Fields, and Social Boundaries on the Sepik Coast of New Guinea". In The Archaeology of Social Boundaries. Miriam Stark, ed. pp. 50–77. Washington, D.C.: Smithsonian Institution Press.
External links
Information on New Guinea
Sepic Area
Papua New Guinean culture
|
https://en.wikipedia.org/wiki/Rail%20transport%20in%20Sweden
|
Rail transport in Sweden uses a network of , the 24th largest in the world. Construction of the first railway line in Sweden began in 1855. The major operator of passenger trains has traditionally been the state-owned SJ AB, though today around 70% of all rail traffic consists of subsidised local and regional trains for which the regional public transport authorities bear responsibility. Passenger traffic has increased significantly since the turn of the millennium, and in 2019 Sweden ranked number five in the world (as measured in passenger kilometres per capita) and number three in the European union, as well as number sixth in the world when measured by passenger share.
In 1988, prompted by SJ's large deficits, the Swedish parliament privatized the network by separating the ownership of rail infrastructure from the ownership of train operations, and by opening the system to private train operators through introducing competitive bidding for local rail service contracts.
Unlike the roads, railways in Sweden use left-handed traffic for trains (the same as the metro) because Sweden drove on the left until 1967. Railways did not switch because the engines of the time had the driver's seat on the left side and the signals are normally located to the left and hence are easier to see. Only railways in Malmö and further south have planned right-hand traffic due to their connection with Denmark. However, as signals are placed in both directions on all tracks, it is possible to drive both left- and right-sided at the traffic controller's discretion.
Sweden is a member of the International Union of Railways (UIC). The UIC Country Code for Sweden is 74.
Operators
Passenger traffic on Swedish railways consists of commercial long-distance lines as well as regional and local trains, which are always subsidised by the regional public transport authorities. As measured by train kilometres, the commercial lines correspond to 28% of the traffic (in 2016), the rest being subsidised local and regional rail traffic.
The major national commercial passenger train operator is state-owned SJ AB, which has a comprehensive network of commercially operated routes between the major cities with few, if any, stops in smaller towns. Between the major cities in southern Sweden, SJ operates the high-speed train X 2000 (200 km/h) on an hourly basis. MTRX operates high-speed trains (200 km/h) between Stockholm and Gothenburg, around every second hour. FlixTrain operates the same route with around three trains a day. Snälltåget operates the route Stockholm-Malmö-Copenhagen (Høje Taastrup)-Hamburg-Berlin. Tågab operates services Gothenburg-Skövde-Karlstad, Gothenburg-Trollhättan-Karlstad-Stockholm, Gothenburg-Falun and Karlstad-Alvesta. Fares in the commercial traffic can be complex and usually vary depending on demand.
The subsidised traffic covering most Swedish railway routes are handled and marketed by the different regional transport authorities, such as Skånetrafiken,
|
https://en.wikipedia.org/wiki/Computer%20Peripherals
|
Computer Peripherals, Inc. (CPI) was an American manufacturer of computer printers, based in Rochester, Michigan.
CPI's precursor, Holley Computer Products, was formed as a joint venture between Control Data Corporation (CDC) and the Holley Carburetor Company in April 1962. Holley developed and produced a series of drum printers. In June 1964, CDC bought out Holley and partnered with NCR and ICL to form CPI in Rochester.
In the early 1970s CPI also had a branch in Valley Forge, Pennsylvania. This division made punched card readers and 9-track magnetic tape drives for both parent companies (CDC and NCR).
In 1978 CDC bought controlling interest of CPI. CPI produced several train printers under the CDC and Fastrain brands, including the CDC Model 512 (1967), the Fastrain A 1200 LPM (1969) and the Fastrain 9372-III 2000 LPM (1976).
In 1977, CPI began manufacturing printers at a factory in Stevenage, Herts, UK that was originally used for the manufacture of ICL1900 computers. By 1979, the factory also made 9-track tape drives which were used in ICL and CDC computers, and were sold with industry-standard interfaces for use with other manufacturer's computers.
In 1982, CDC acquired a controlling interest in Centronics in exchange for CPI and $25 million in cash. CPI was merged into Centronics and eventually the Rochester facility was closed.
References
1964 establishments in Michigan
1982 disestablishments in Michigan
American companies established in 1964
American companies disestablished in 1982
Companies based in Oakland County, Michigan
Computer companies established in 1964
Computer companies disestablished in 1982
Computer printer companies
Control Data Corporation
Defunct companies based in Michigan
Defunct computer companies of the United States
Electronics companies established in 1964
Electronics companies disestablished in 1982
|
https://en.wikipedia.org/wiki/Arc%20Infrastructure
|
Arc Infrastructure (previously known as Brookfield Rail and WestNet Rail) is a transport infrastructure owner and access provider in Western Australia with a long-term lease on the network from the Government of Western Australia. It operates approximately 5,500 km of standard, narrow and dual gauge rail infrastructure in the southern half of the state.
History
In December 2000, the State Government privatised Westrail, with the Australian Railroad Group, a 50/50 joint venture between United States rail operator Genesee & Wyoming and Australian rural services company Wesfarmers, the successful bidder. Included in the sale was a 49-year lease on the below rail infrastructure network. This part of the business was rebranded as WestNet Rail.
On 1 June 2006, Australian Railroad Group was sold with the above rail rolling stock and terminal assets passing to QR National, and the below rail infrastructure business to Babcock & Brown Infrastructure. Initially Babcock & Brown held a 51% shareholding, the remaining 49% being held by minority shareholders with Babcock & Brown having an option to increase its holding. In March 2008 Babcock & Brown increased its shareholding to 76%. It later took full ownership.
In late 2009, Babcock & Brown Infrastructure was renamed Prime Infrastructure and again by December 2010 to Brookfield Infrastructure Partners following Brookfield Asset Management's purchase of the business. In August 2011, WestNet Rail was rebranded as Brookfield Rail.
In 2017, Brookfield Rail relocated its headquarters from Welshpool to Perth Airport. In July 2017, the company was again rebranded as Arc Infrastructure.
Current operations
Arc Infrastructure has a lease until 2049 on of rail infrastructure throughout the southern half of Western Australia, from Geraldton in the north, to Leonora and Kalgoorlie in the east, and south to Esperance, Albany and Bunbury.
It is responsible for maintaining the network and granting access to operators.
See also
Wheatbelt railway lines of Western Australia
References
External links
Companies based in Perth, Western Australia
Railway infrastructure companies of Australia
Australian companies established in 2006
Railway companies established in 2006
|
https://en.wikipedia.org/wiki/Premio%20Lo%20Nuestro%202004
|
Premio Lo Nuestro 2004 was the 16th anniversary of a popular Latin Music Award show in U.S. The award show took place In Miami, Florida, and aired live on the Univision Network on Thursday, February 26, from 8-11 pm ET / PT (7-10 pm Central and Mountain). The show was hosted by Adal Ramones. The artists who performed in the show were:Ricky Martin, Thalía, Ricardo Arjona, Marco Antonio Solís, Sin Bandera, La Oreja de Van Gogh, Montez de Durango, El General and many more. There was total of 180 nominations in 32 categories. The nominees list includes Ricky Martin and Ricardo Arjona, with four nominations each; La India, Marc Anthony, Marco Antonio Solís, Conjunto Primavera, Olga Tañón and Joan Sebastian with three nominations each; Shakira and Thalía with two nominations; and Juanes, Alexandre Pires, Maná, Pepe Aguilar, Vicente Fernández, and many more.
Presenters
A.B. Quintanilla
Rosalyn Sanchez
Julio Iglesias Jr.
Conjunto Primavera
Banda el Recodo
Jennifer Peña
Ninel Conde
Graciela Beltrán
Millie Corretjer
Giselle Blondet
Mariana Seoane
Niurka Marcos
Aracely Arámbula
Patricia Velásquez
Marlene Favela
Ricardo Alamo
Eugenio Derbez
Performers
Ricky Martin
La India
Thalía
Ricardo Arjona
Marco Antonio Solís
Sin Bandera
La Oreja de Van Gogh
Montez de Durango
El General
Víctor Manuelle
Akwid
Intocable
List of nominees and winners
Award for Excellence
Ricky Martin
Pop Category
Rock Category
Tropical Category
Regional Mexican Category
Urban Category
Video of the Year
References
Lo Nuestro Awards by year
2004 music awards
2004 in Florida
2004 in Latin music
2000s in Miami
|
https://en.wikipedia.org/wiki/Flight%20management%20system
|
A flight management system (FMS) is a fundamental component of a modern airliner's avionics. An FMS is a specialized computer system that automates a wide variety of in-flight tasks, reducing the workload on the flight crew to the point that modern civilian aircraft no longer carry flight engineers or navigators. A primary function is in-flight management of the flight plan. Using various sensors (such as GPS and INS often backed up by radio navigation) to determine the aircraft's position, the FMS can guide the aircraft along the flight plan. From the cockpit, the FMS is normally controlled through a Control Display Unit (CDU) which incorporates a small screen and keyboard or touchscreen. The FMS sends the flight plan for display to the Electronic Flight Instrument System (EFIS), Navigation Display (ND), or Multifunction Display (MFD). The FMS can be summarised as being a dual system consisting of the Flight Management Computer (FMC), CDU and a cross talk bus.
The modern FMS was introduced on the Boeing 767, though earlier navigation computers did exist. Now, systems similar to FMS exist on aircraft as small as the Cessna 182. In its evolution an FMS has had many different sizes, capabilities and controls. However certain characteristics are common to all FMSs.
Navigation database
All FMSs contain a navigation database. The navigation database contains the elements from which the flight plan is constructed. These are defined via the ARINC 424 standard. The navigation database (NDB) is normally updated every 28 days, in order to ensure that its contents are current. Each FMS contains only a subset of the ARINC / AIRAC data, relevant to the capabilities of the FMS.
The NDB contains all of the information required for building a flight plan, consisting of:
Waypoints/Intersection
Airways
Radio navigation aids including distance measuring equipment (DME), VHF omnidirectional range (VOR), non-directional beacons (NDBs) and instrument landing systems (ILSs).
Airports
Runways
Standard instrument departure (SID)
Standard terminal arrival (STAR)
Holding patterns (only as part of IAPs-although can be entered by command of ATC or at pilot's discretion)
Instrument approach procedure (IAP)
Waypoints can also be defined by the pilot(s) along the route or by reference to other waypoints with entry of a place in the form of a waypoint (e.g. a VOR, NDB, ILS, airport or waypoint/intersection).
Flight plan
The flight plan is generally determined on the ground, before departure either by the pilot for smaller aircraft or a professional dispatcher for airliners. It is entered into the FMS either by typing it in, selecting it from a saved library of common routes (Company Routes) or via an ACARS datalink with the airline dispatch center.
During preflight, other information relevant to managing the flight plan is entered. This can include performance information such as gross weight, fuel weight and center of gravity. It will include altitudes includin
|
https://en.wikipedia.org/wiki/Nomad%20software
|
NOMAD is a relational database and fourth-generation language (4GL), originally developed in the 1970s by time-sharing vendor National CSS. While it is still in use today, its widest use was in the 1970s and 1980s. NOMAD supports both the relational and hierarchical database models.
NOMAD provides both interactive and batch environments for data management and application development, including commands for database definition, data manipulation, and reporting. All components are accessible by and integrated through a database-oriented programming language. Unlike many tools for managing mainframe data, which are geared to the needs of professional programmers in MIS departments, NOMAD is particularly designed for (and sold to) application end-users in large corporations. End-users employ Nomad in batch production cycles and in Web-enabled applications, as well as for reporting and distribution via the web or PC desktop.
Capabilities
NOMAD is distinguished by five characteristics:
An intuitive database-oriented fourth-generation programming language (4GL) for creating databases, managing data, and writing applications
An interactive environment in which any 4GL statement may be typed and immediately processed (comparable to interactive tools like PHP or Perl)
Relational database features, supporting lookup tables and the other elements of a normalized relational database
Powerful set-at-a-time operations under the control of simple imperative commands
Accesses data from many sources, such as VSAM, IMS, IDMS, DB2, Oracle, and SQL Server.
NOMAD's language was designed to simplify the application development process, especially for reporting applications. Where possible, common requirements were addressed by intuitive nonprocedural syntax elements, to avoid traditional programming. The heart of the system was the LIST command, which created report output.
LIST BY STATE BY CUST_ID NAME PHONE ACROSS STATUS BALANCE WHERE STATE AMONG('CT','NY')
State Customer ID Name Phone Active Inactive New
----- ----------- ----------------- ------------ -------- -------- ---------
CT 1001 ABC Co. 203-555-1212 1200 0 0
1012 DEF Co. 203-555-1313 0 50 900
NY 1305 GHI Co. 212-555-1414 2650 0 0
In this example, database fields STATE, CUST_ID, NAME, PHONE, STATUS, and BALANCE are laid out on a grid, with two sort breaks (via BY), generated columns based on data values (via ACROSS), and data selection (via WHERE). Additional keywords could control subtotals, titles, footers, table lookup, and myriad reporting details.
The LIST command is somewhat analogous to the SQL SELECT statement, but incorporates formatting, totaling, and other elements helpful for tailoring output to a business requirement. The SELECT statement, in contrast, is essentially a data query tool: its results would be processed or
|
https://en.wikipedia.org/wiki/RAMIS%20%28software%29
|
RAMIS ("Random Access Management Information System") is a fourth-generation programming language (4GL) capable of creating and maintaining databases consisting of named files containing both numeric and alphabetic fields and subsequently producing detailed simple or complex reports using a very simple English like language. As such it is easily mastered by non-programmers. A typical program - either to create or maintain a database or to create quite complex reports - would normally consist of a handful of lines of code which could be written or understood by non-professional programmers. "End users" as they became known. Such end users could be trained to use RAMIS in a matter of days and so large companies would often have several hundred such users scattered throughout the company.
History
RAMIS was initially developed in the mid 1960s by the company Mathematica on a consulting contract for a marketing study by a team headed by Gerald Cohen and subsequently further developed and marketed as a general purpose data management and analysis tool. In the late 1960s Cohen fell out with the management of Mathematica and left to form his own company. Shortly thereafter his new company released a new product called FOCUS which was very similar to RAMIS: "the same bugs and the same misspelled error messages."
National CSS (NCSS), a Time-sharing vendor, licensed rights to make RAMIS available on its VP/CSS system.
At some point Mathematica changed its licensing price.
The interested parties were:
NCSS, which was marketing RAMIS (and other products) for use on their time-sharing system
Mathematica, owner of RAMIS
Key developers/programmers of RAMIS
some stayed with Mathematica
others left to form the company that became Information Builders, known for their FOCUS product
Most of the programming team remained with Mathematica as did almost all the sales force. By this time RAMIS had double digits of client companies in both the US and a European division headquartered in London and so Mathematica decided to create a new division called Mathematica Products Group and rename the product RAMIS II. At the same time, the company decided to recall Frank Fish - originally a Mathematica consultant who had been assigned to lead a European consulting team and had subsequently formed the European RAMIS group - to head up the RAMIS II design team and International Sales.
Sales of both RAMIS II and FOCUS continued to grow through the 1980s throughout the western world with RAMIS II generally outselling FOCUS on mainframes though no detailed figures are available. RAMIS II was eventually installed in some 40 countries worldwide.
Purchased by Martin Marietta
Mathematica itself eventually grew to more than 500 staff with roughly 200 involved with RAMIS II. The company was largely owned by a group of professors in Mathematics and Economics at Princeton University and, as this group aged, they opted to cash out by selling to Martin Marietta Corporation (su
|
https://en.wikipedia.org/wiki/Distribution%20Media%20Format
|
Distribution Media Format (DMF) is a format for floppy disks that Microsoft used to distribute software. It allowed the disk to contain 1680 KiB of data on a 3-inch disk, instead of the standard 1440 KiB. As a side effect, utilities had to specially support the format in order to read and write the disks, which made copying of products distributed on this medium more difficult. An Apple Macintosh computer running Disk Copy 6.3.3 on the Mac OS 7.6 or later operating system can copy and make DMF disks. The first Microsoft software product that uses DMF for distribution were the "c" revisions of Office 4.x. It also was the first software product to use CAB files, then called "Diamond".
Comparison of DMF and standard 1440 KiB 3-inch diskettes:
DMF in the form of a 1680 KiB Virtual Floppy Disk (VFD) image and IBM Extended Density Format (XDF) images are supported by Windows Virtual PC.
See also
2M, a program that allows the formatting of high-capacity floppy disks
fdformat, a DOS program that allows the formatting of high-capacity floppy disks
HDCopy, a DOS program that can read and write floppy disk and disk images in multiple formats, including DMF
IBM Extended Density Format (XDF), a high-density diskette format used by IBM
References
External links
About DMF
Floppy disk computer storage
Microsoft
|
https://en.wikipedia.org/wiki/Memory-disk%20synchronization
|
Memory-disk synchronisation is a process used in computers that immediately writes to disk any data queued for writing in volatile memory. Data is often held in this way for efficiency's sake, since writing to disk is a much slower process than writing to RAM. Disk synchronization is needed when the computer is going to be shut down, or occasionally if a particularly important bit of data has just been written.
In Unix-like systems, a disk synchronization may be requested by any user with the sync command.
See also
mmap, a POSIX-compliant Unix system call that maps files or devices into memory
msync, a POSIX-compliant Unix system call that forcefully flush memory to disk and synchronize
Computer memory
|
https://en.wikipedia.org/wiki/Test%20%28Unix%29
|
test is a command-line utility found in Unix, Plan 9, and Unix-like operating systems that evaluates conditional expressions. test was turned into a shell builtin command in 1981 with UNIX System III and at the same time made available under the alternate name [.
Overview
The test command in Unix evaluates the expression parameter. In most recent shell implementations, it is a shell builtin, even though the external version still exists. In the second form of the command, the [ ] (brackets) must be surrounded by blank spaces (this is because [ is a program and POSIX compatible shells require a space between the program name and its arguments). One must test explicitly for file names in the C shell. File-name substitution (globbing) causes the shell script to exit.
The test command is not to be confused with the [[ reserved word that was introduced with ksh88. The latter is not a command but part of the ksh88 syntax and does not apply file-name substitution to glob expressions.
The version of test bundled in GNU coreutils was written by Kevin Braunsdorf and Matthew Bradburn. The command is available as a separate package for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities. The command has also been ported to the IBM i operating system.
Syntax
test expression
or
[ expression ]
Arguments
The following arguments are used to construct this parameter:
-e FileName - FileName exists
All remaining arguments return true if the object (file or string) exists, and the condition specified is true.
-b Filename - Returns a True exit value if the specified FileName exists and is a block special file
-c FileName - FileName is a character special file
-d FileName - FileName is a directory
-f FileName - FileName is a regular file
-g FileName - FileName's Set Group ID bit is set
-h FileName - FileName is a symbolic link
-k FileName - FileName's sticky bit is set
-L FileName - FileName is a symbolic link
-p FileName - FileName is a named pipe (FIFO)
-r FileName - FileName is readable by the current process
-s FileName - FileName has a size greater than 0
-t FileDescriptor - FileDescriptor is open and associated with a terminal
-u FileName - FileName's Set User ID bit is set
-w FileName - FileName's write flag is on. However, the FileName will not be writable on a read-only file system even if test indicates true
-x FileName - FileName's execute flag is on
If the specified file exists and is a directory, the True exit value indicates that the current process has permission to change cd into the directory.
Non standard Korn Shell extensions:
file1 -nt file2 - file1 is newer than file2
file1 -ot file2 - file1 is older than file2
file1 -ef file2 - file1 is another name for file2 - (symbolic link or hard link)
String arguments
In Perl, these sections are reversed: eq is a string operator and == is a numerical operator, and so on for the others.
-n String1 - the length of th
|
https://en.wikipedia.org/wiki/Dofus
|
Dofus is a tactical turn-based massively multiplayer online role-playing game (MMORPG) developed and published by Ankama Games, a French computer game manufacturer. Originally released solely in French, it has since been translated into many other languages. The game includes both pay-to-play accounts offering the full experience and free-to-play accounts offering a more limited amount of content. Its success has led to the marketing of spin-off products, such as books, art, comics and a movie released in 2016. It has also led to the development of two continuations: Dofus Arena, released at the beginning of 2006, which is an alternative "tournament" version of Dofus; and Wakfu, a sequel to Dofus. The game has attracted over 40 million players worldwide and is especially well known in France.
Plot
Context
Dofus takes place in the World of Twelve, a High fantasy universe. Players must find the six primordial Dofus, dragon eggs that confer great power on their bearer, which are scattered across the world. The game features an open world that allows for a high level of player autonomy. Players can choose to engage in Player versus player combat, Player versus environment combat, or participate in the game's economy by obtaining and/or trading in-game items.
Universe
Dofus is the first Ankama product to take place in the transmedia world of the Krosmoz. From this first success will appear many derivative products, including two other video games, Arena in 2011 then Wakfu the following year, a television show (Wakfu, Dofus: Aux trésors de Kerubim) and a movie (Dofus, book 1: Julith).
The first derivative work is the manfra Dofus, the first volume of which was released on October 10, 2005. It is written by Tot, co-creator of the game, and drawn by Ancestral Z.
Gameplay
Dofus takes place in "The World of Twelve", named for the 12 gods that inhabit it. Players control a 2D avatar belonging to one of 19 character classes in a third-person view. Each class has a unique set of spells that other classes can not obtain. As with most other massively multiplayer online role-playing games, players gain levels by obtaining experience. Experience can be gained by defeating monsters and completing quests. With each level, players gain points that can be used to improve their avatar's characteristics and spells. Players can access new spells and equipment by advancing in level. Players receive a special 'aura' when they reach level 100, and gain a different aura at 200, the maximum level. Players may also decide to take up professions and frequently band together to undertake dungeons. Many also become part of guilds, to more easily coordinate with others. Players complete quests to gain experience and other rewards.
While the game takes place in real-time, combat in Dofus is conducted more like a turn based strategy game – where each player takes it in turns to make a series of moves and attacks within a time limit. As such, when a player attacks monsters – t
|
https://en.wikipedia.org/wiki/Retrogaming
|
Retrogaming, also known as classic gaming and old school gaming, is the playing and collection of obsolete personal computers, consoles, and video games. Usually, retrogaming is based upon systems that are outmoded or discontinued, although ported retrogaming allows games to be played on modern hardware via ports or compilations. It is typically for nostalgia, preservation, or authenticity. A new game could be retro styled, such as an RPG with turn-based combat and pixel art in isometric camera perspective.
Retrogaming has existed since the early years of the video game industry, and was popularized with the Internet and emulation technology. It is argued that the main reasons players are drawn to retrogames are nostalgia for different eras, the idea that older games are more innovative and original, and the simplicity of the games.
Retrogaming and retrocomputing have been described as preservation activity and as aspects of the remix culture.
Games
The distinction between retro and modern is heavily debated, but it usually coincides with either the shift from 2D to 3D games (making the fourth the last retro generation, and the fifth the first modern), the turn of the millennium and the increase in online gaming (making the fifth the last retro generation, and the sixth the first modern), or the switch from analog to digital for audiovisual output and from 4:3 to 16:9 aspect ratio (making the sixth the last retro generation, and the seventh the first modern). They can be played on original hardware or in modern emulation.
Retrogaming methods
With increasing nostalgia and success of retro compilations in the fifth, sixth, and seventh generations of consoles, retrogaming has become a motif in modern games. Modern retrogames impose limitations on color palette, resolution, and memory well below the actual limits of the hardware, to mimic the look of old hardware. These may be based on a general concept of retro, as with Cave Story, or an attempt to imitate a specific piece of hardware, as with MSX color palette of La Mulana.
This concept, known as deliberate retro and NosCon, gained popularity due part to the independent gaming scene, where the short development time was attractive and commercial viability was not a concern. Major publishers have embraced modern retrogaming with releases such as Mega Man 9 which mimics NES hardware; Retro Game Challenge, a compilation of new games on faux-NES hardware; and Sega's Fantasy Zone II remake, which uses emulated System 16 hardware running on PlayStation 2 to create a 16-bit reimagining of the 8-bit original.
Vintage retrogaming
Vintage retrogaming can involve collecting original cartridge and disc media and arcade and console hardware, which can be expensive and rare. Most are priced lower than their original retail prices. The popularity of vintage retrogaming has led to counterfeit media, which generally lack collectible value. During the 2020 COVID-19 pandemic, prices for vintage hardware beg
|
https://en.wikipedia.org/wiki/Radio%20Rennes%20Bretagne
|
Radio Rennes Bretagne (in Breton: Radio Roazon-Breiz) was a radio station based in Rennes, and the first station to have regular Breton language programming. However, it was not powerful enough to broadcast to the Breton-speaking western parts of the peninsular. From November 1940 to June 1944 the station broadcast bilingual programming by switching over to Radio Paris for one hour each week.
Established under German patronage during World War II, the station was placed under the care of professor Leo Weisgerber, a linguist from Marburg and Sonderführer of the occupying German army. Acquired under the guise of the Breton cause, it became a vehicle for collaborationist ideas.
Roparz Hemon ran the station as Director of Programming. Hemon focused on cultural and intellectual themes, rather than explicitly political issues. Contributors were typically associated with the pre-war journal Gwalarn, which had been set up to promote a literary high culture in Breton. Unlike Radio Paris, Radio Rennes Bretagne never broadcast outright Nazi propaganda. However, racist ideas were subtly inserted into programmes which had high cultural content.
Staff
Management team: Leo Weisgerber (Director); Roparz Hemon (Programming Director); Abeozen, Jean Trécan (Studio Management)
Presenters : Florian Le Roy (French speaker), Abeozen (Breton speaker), André Guellec, Guillaume Berthou, Youenn Drezen, Georges Lemée, Juliette Nizan, Job Jaffré, Yves Levot-Becot, Baillarge, Esnault.
References
External links
100 ans de radio: Radio Rennes Bretagne
Breton nationalism
Mass media in Rennes
Radio stations in France
Radio stations established in 1940
Radio stations disestablished in 1944
Defunct radio stations
Defunct mass media in France
|
https://en.wikipedia.org/wiki/A%20Hero%20Sits%20Next%20Door
|
"A Hero Sits Next Door" is the fifth episode in the first season of the American animated television series Family Guy. It originally aired on the Fox network in the United States on May 2, 1999. The episode features the introduction of Joe Swanson, who would become a main character in the series. Peter Griffin must find a replacement player for an upcoming softball game. Peter eventually convinces Joe to play for the team after learning that he played baseball in college. When Joe shows up the following morning, Peter realizes that Joe is in a wheelchair. Joe turns out to be a great player, and the team wins the game. Peter becomes jealous of Joe and tries to become a hero. In a subplot, Meg Griffin tries to get Joe's son Kevin to notice her.
"A Hero Sits Next Door" was directed by Monte Young and written by the writing team of Mike Barker and Matt Weitzman. It featured guest performances from actress Suzie Plakson, figure skater Michelle Kwan, as well as actors Wally Wingert and Carlos Alazraqui. Much of the episode features a cutaway style of humor that is typically used in Family Guy, many of which feature cultural references and include Super Friends, Pez, Teletubbies, and the assassinations of John F. Kennedy and Robert F. Kennedy.
The episode received positive praise from television critics, who considered it to be a memorable introduction for the character of Joe Swanson; certain critics praised the fight sequence between Joe and The Grinch, while others criticized the episode's cutaway gags as well as its plot twists, which they regarded as "odd" and "counter-intuitive".
Plot summary
At the Happy-Go-Lucky Toy Factory, safety inspector Peter Griffin is working when his boss Mr. Weed introduces Guillermo, a ringer who will attempt to assist the company in winning the annual softball game. At home, Peter's wife Lois informs him of their new neighbors, the Swanson family, and wishes for him to make friends with them; however, Peter is not interested and leaves with Brian for softball practice. The regular pitcher is absent, so Peter fills in. He injures Guillermo with a wild pitch during practice and must find a new player to replace him or else he will be fired.
Meanwhile, Lois goes with her youngest son, Stewie, to meet the new neighbors. She is greeted by Bonnie Swanson and soon after meets her husband, Joe, while Meg falls in love with Joe and Bonnie's son, Kevin. When Peter comes home he is rude to the Swansons. Later that night, Peter thinks about who can replace Guillermo, and Lois, hearing her husband's dilemma, reveals that Bonnie told her that Joe played baseball in college. Hearing this, Peter goes to Joe and apologizes for his earlier behavior towards him, and convinces him to play on his company softball team. However, while Peter and Mr. Weed are waiting for Joe at the ballpark, they're horrified when Joe shows up in a wheelchair, as Peter did not notice that Joe is paraplegic. Despite this, Joe proves to be an excellent ba
|
https://en.wikipedia.org/wiki/John%20Bischoff%20%28musician%29
|
John Lee Bischoff (born December 7, 1949) is an American composer, musical performer, teacher and grassroots activist best known as an early pioneer of live computer music. He also gained fame for his solo constructions in real-time synthesis as well as his ground-breaking work in computer network bands.
Early life
A native of San Francisco, John Bischoff is the son of painter Elmer Bischoff. After earning his Bachelor of Fine Arts degree from California Institute of the Arts in 1971 and his Master of Fine Arts from Oakland's Mills College in 1973, he studied composition with Robert Moran, James Tenney and Robert Ashley.
Career
He became active in the San Francisco Bay Area experimental music scene where he spent over 25 years performing, composing and teaching. He has participated in San Francisco's New Music America festival in 1981 and New York City's in 1989, where he also performed at Experimental Intermedia and Roulette Intermedium as well as at Los Angeles' Beyond Music Festival.
Bischoff's performance venues in Europe have included the Festival d'Automne in Paris, Akademie der Kunst in Berlin, Fylkingen in Stockholm, and TUBE in Munich. In 1978 he was a founding member of the League of Automatic Music Composers, considered to be the world's first Computer Network Band, and he co-authored an article on the League's music that appears in Foundations of Computer Music (MIT Press, 1985). He was also a founding member of the network band The Hub with which he performed and recorded from 1985 to 1996. Bischoff received a 1999 Foundation for Contemporary Arts Grants to Artists Award.
John Bischoff has continued as a visiting professor and composer at Mills College and is associated with its Center for Contemporary Music.
Recordings
Recordings of John Bischoff's work are available on:
Lovely Music
Frog Peak
Artifact Recordings
A solo album, APERTURE is available on:
23FIVE INC
References
External links
Mills College Faculty & Staff page for John Bischoff
Golden, Barbara. “Conversation with John Bischoff.” eContact! 12.2 — Interviews (2) (April 2010). Montréal: CEC.
1949 births
Composers from San Francisco
Living people
Pupils of James Tenney
Mills College faculty
|
https://en.wikipedia.org/wiki/Tim%20Perkis
|
Tim Perkis is an experimental musician and writer who works with live electronic and computer sound.
Discography
"Boundary Layer" 2008 The Hub with John Bischoff, Chris Brown, Tim Perkis, Scot Gresham-Lancaster, Phil Stone. Tzadik Records (New York). CD.
"Grosse Abfahrt: Luftschiffe zum Kalifornien" 2007 Serge Baghdassarians - electronics; Boris Baltschun - electronics; Chris Brown - piano; Tom Djll - trumpet; Matt Ingalls - clarinet; Tim Perkis - electronics; Gino Robair - electronics; John Shiurba - guitar. Creative Sources (Lisbon, Portugal). CD.
"SUPERMODEL SUPERMODEL" 2006 GAIL BRAND trombone; TIM PERKIS electronics; GINO ROBAIR percussion, faux dax, horns, Styrofoam, ebow snare; JOHN SHIURBA electric guitar; MATTHEW SPERRY double bass and preparations. On EMANEM (UK). CD.
"Thousand Oaks" 2005 Philip Gelb (shakuhachi), Shoko Hikage (koto), Tim Perkis (electronics), Chris Brown (piano). On 482 Music. CD
"Six Fuchs" 2004 Wolfgang Fuchs (reeds), Tom Dill(tpt), Gino Robair(perc), John Shiurba(gtr), Matthew Sperry(bass), and Perkis(electronics). On Rastascan (San Francisco). CD
"Headlands" 2003 extended improvisations with Philip Gelb, shakuhachi; Shoko Hikage, koto; and Chris Brown (electronic music), on 482 Music(Chicago),
"Praeface" 2003 Compilation of artists on Praemedia label, (San Francisco). CD.
"Motive" 2002 Solo. Praemedia (San Francisco). CD.
"Tim Perkis Live on the Artship" 2002 The Artship Recordings are a series of live solo improvisations each by a different artist, and each performed in "The Artship", a decommissioned US Navy troop transport which was docked in Oakland and served as a floating arts center for several years. (3.5-in CD).
"Luminous Axis" 2002 Wadada Leo Smith with John Bischoff, Chris Brown, Ikue Mori, Tim Perkis, Mark Trayle and William Winant. Tzadik (New York). CD.
"Apollo and Marsyas" 2002 An anthology of New Music Concerts at Het Apollohuis, Eindhoven, The Netherlands, from 1980 to 1997, including performances by The Hub and 37 other new music luminaries. Het Apollohuis (Eindhoven, The Netherlands.). CD.
"Fuzzybunny" 2000 Electronic improvisations with Scot Gresham-Lancaster and Chris Brown. Sonore(Bordeaux & Tokyo). CD.
"International Live Electronic Music Incorporated" 2000 Recorded at the Korzo Theater, Den Haag on 9 April 1998. John Bischoff, Tim Perkis, Gert-Jan Prins, Luc Houtkamp, Kaffe Matthews and Anne LaBerge. On Xor (Den Haag). CD
"What Would This Record Have Sounded Like of John Cale had had Some Setback and Cinzia La Fauci and Alberto Scotti had Taken His Place?" 2000
Compilation of Iggy Pop covers by various artists including: Perkis, Etoile Filante, Solex, Taniguchi Masaaki, Ectogram, Steven Bryant, Jonathan LaMaster/Roger Miller, Frank Chickens, Crowded Air, Oxbox, Allun, God is my Co-pilot, Dean Roberst, Massey Fergusson Ensemble, The Pornography, Culo Negro and Mutable. A co-production of Snowdonia (Messina, Italy) and Club Lunatica (Tokyo). CD
"Diatoms" 1999 Duo im
|
https://en.wikipedia.org/wiki/The%20Boondocks%20%282005%20TV%20series%29
|
The Boondocks is an American adult animated sitcom created by Aaron McGruder for Cartoon Network's late-night programming block, Adult Swim. It is based upon his comic strip of the same name. The series premiered on November 6, 2005. The show focuses on a dysfunctional black American family, the Freemans, settling into the fictional, friendly and predominantly white suburb of Woodcrest. The perspective offered by this mixture of cultures, lifestyles, social classes, stereotypes, viewpoints and racialized identities provides for much of the series' satire, comedy, and conflict.
The series ended its run on June 23, 2014, with a total of 55 episodes over the course of the show's four seasons, the last of which was produced without any involvement from McGruder. The series also has aired in syndication outside the United States and has been released on various DVD sets and other forms of home media.
Widely regarded as one of the greatest animated series of all time, The Boondocks has received several accolades including an NAACP Image Award for Outstanding Writing in a Comedy Series and a Peabody Award. On June 12, 2019, it was announced that Sony Pictures Animation would be producing a reboot of the television series that was set to premiere in 2022 with McGruder's involvement; John Witherspoon was also attached to the project to reprise his role as Robert Freeman before his passing on October 29, 2019. On September 18, 2019, it was announced that HBO Max had picked up the reboot with a two-season order. The two seasons were set to consist of twelve episodes each. On February 2, 2022, it was revealed that development had been canceled and that the project was shelved.
Development and production
The Boondocks began as a comic strip on Hitlist.com, one of the first music websites. The strip later found its way into The Source magazine. Following these runs, McGruder began simultaneously pitching The Boondocks as both a syndicated comic strip and an animated television series. The former goal was met first, and The Boondocks debuted in newspapers in April 1999.
In the meantime, the development of the TV series continued. McGruder and film producer/director Reginald Hudlin (President of Entertainment for BET from 2005 to 2008) created a Boondocks pilot for the Fox network, but found great difficulty in making the series acceptable for network television. Hudlin left the project after the Fox deal fell through, though McGruder and Sony Pictures Television were contractually obligated to credit him as an executive producer for the first two seasons. Mike Lazzo, president of Adult Swim and executive producer for Aqua Teen Hunger Force and Space Ghost Coast to Coast, stumbled across the pilot and declared it "too networky". He then ordered a 15-episode season and told McGruder to "just tell stories".
The series has a loose connection with the continuity of the comic strip, though during the final year of the strip McGruder made a point to try to sync
|
https://en.wikipedia.org/wiki/Codec%20%28disambiguation%29
|
Codec may mean:
An audio codec converts between analog and digital representations or performs data compression.
Codec, a hardware device or computer software used for coding and decoding transformations of data or signal media streams
Codec, a fictional radio device used in the Metal Gear games
A video codec is a device or software that enables video compression and/or decompression for digital video.
See also
Kodak
|
https://en.wikipedia.org/wiki/Character%20large%20object
|
A Character Large OBject (or CLOB) is part of the SQL:1999 standard data types. It is a collection of character data in a database management system, usually stored in a separate location that is referenced in the table itself. Oracle and IBM Db2 provide a construct explicitly named CLOB, and the majority of other database systems support some form of the concept, often labeled as text, memo or long character fields.
CLOBs usually have very high size-limits, of the order of gigabytes. The tradeoff for the capacity is usually limited access methods. In particular, some database systems limit certain SQL clauses and/or functions, such as LIKE or SUBSTRING from being used on CLOBs. Those that permit such operations may perform them very slowly.
Alternative methods of accessing the data are often provided, including means of extracting or inserting ranges of data from the CLOB.
Database systems exhibit variations in their storage patterns for CLOBs. Certain systems consistently store CLOBs as references to external data, residing outside the table. In contrast, some systems initially store small CLOBs within the table itself, but switch their storage approach when the data size surpasses a specific threshold. Additionally, certain systems offer configurable options to adapt their behavior.
Implementations
PostgreSQL 15.0: unsupported but it can be easily defined as a synonym to the text type with: create domain CLOB as TEXT;
MariaDB 10.8: supported
MySQL 8.0: support unknown. There used to be a CLOB mentioned in the manual but the data type is no longer mentioned in later manuals.
Mimer SQL 11.0: supported.
See also
Binary large object
Binary blob
References
Data types
|
https://en.wikipedia.org/wiki/Varchar
|
A VARCHAR or variable character field is a set of character data of indeterminate length. The term varchar refers to a data type of a field (or column) in a database which can hold letters and numbers. Varchar fields can be of any size up to a limit, which varies by databases: an Oracle 11g database has a limit of 4000 bytes, a MySQL 5.7 database has a limit of 65,535 bytes (for the entire row) and Microsoft SQL Server 2008 has a limit of 8000 bytes (unless varchar(max) is used, which has a maximum storage capacity of 2 gigabytes).
nvarchar is a variation of varchar, and which is more suitable depends on the use case.
See also
SQL data types
References
SQL
Data types
|
https://en.wikipedia.org/wiki/Chris%20Brown%20%28composer%29
|
Chris Brown (born 1953) is an American composer, pianist and electronic musician, who creates music for acoustic instruments with interactive electronics, for computer networks, and for improvising ensembles. He was active early in his career as an inventor and builder of electroacoustic instruments; he has also performed widely as an improviser and pianist with groups as "Room" and the "Glenn Spearman Double Trio." In 1986 he co-founded the pioneering computer network music ensemble "The Hub". He is also known for his recorded performances of music by Henry Cowell, Luc Ferrari, and John Zorn. He has received commissions from the Berkeley Symphony, the Rova Saxophone Quartet, the Abel-Steinberg-Winant Trio, the Gerbode Foundation, the Phonos Foundation and the Creative Work Fund. His recent music includes the poly-rhythm installation "Talking Drum", the "Inventions" series for computers and interactive performers, and the radio performance "Transmissions" series, with composer Guillermo Galindo.
His 1992 electroacoustic work "Lava", for brass, percussion, and electronics is produced by Tzadik Records. He teaches Composition and Electronic Music at Mills College in Oakland, where he is co-director of the Center for Contemporary Music (CCM).
Discography
1980 "Earwig" with instrument builder Tom Nunn, cassette released by Essential Recordings, 16mm film by Eric Marin.
1985 Wayne Horvitz: Dinner at Eight (Dossier)
1989 "Snakecharmer" Live Electroacoustic Music by Chris Brown, Artifact Recordings, CD.
1989 "Room", Sound Aspects, CD.
1989 "The Hub: Computer Network Music" Artifact Recordings, CD.
1991 "The Virtuoso in the Computer Age -- I: CDCM Computer Music Series, vol. 10", piano performance, Centaur Records, CD
1992 Room: "Hall of Mirrors", Music and Arts. CD.
1993 Glenn Spearman Double Trio: "Mystery Project", piano and electronics performance, Black Saint, CD.
1994 "Music from the CCM at Mills College: CDCM Computer Music Series, vol. 17", Centaur Records, CD.
1994 Glenn Spearman Double Trio: "Smokehouse", piano performance, Black Saint, CD.
1994 The Hub: "Wreckin' Ball", Computer Network Music, Artifact Recordings, CD.
1995 "Conductions #11" by Butch Morris, original instruments performance, New World, CD.
1995 "In C" by Terry Riley The 25th Anniversary Performance, keyboard performance, New Albion Records, CD.
1995 "Lava" by Chris Brown, for brass, percussion and live electronics, Tzadik, CD.
1996 "Duets", by Chris Brown, with Tom Nunn, William Winant, Ikue Mori, and Tom Djll, Artifact Recordings, CD.
1996 Larry Ochs "The Secret Magritte", piano performance in ensemble including the Rova Saxophone Quartet, Marilyn Crispell, Barry Guy, Lisle Ellis, and William Winant, Black Saint, CD.
1996 Glenn Spearman The Fields, Black Saint
1997 Rova's 1995 Live Recording of John Coltrane's "Ascension", piano performance in large ensemble including the Rova Saxophone Quartet, Black Saint, CD.
1998 "Cellule 75", piano performance with
|
https://en.wikipedia.org/wiki/Ghost%20in%20the%20Machine%20%28film%29
|
Ghost in the Machine is a 1993 American science fiction horror film directed by Rachel Talalay and released by 20th Century Fox about a deceased serial killer with artificial computer intelligence.
Plot
While working at a computer store in Cleveland, Ohio, serial killer Karl Hochman, known as "The Address Book Killer" due to habitually stealing address books and choosing his victims from them, obtains Terry Munroe's address book, due to the store manager, who is demonstrating a scanner, copying a page of her address book into a computer, allowing Karl access to it. On a rainy night while heading home, Karl hurriedly drives into an oncoming lane and swerves to miss a truck. This causes his car to go off the road into a cemetery, all while he laughs like a maniac.
In the emergency room, he is put into an MRI machine. A surge from an electrical storm manages to transfer his soul into a computer. Now, as a network-based entity, Karl continues to plot his killing spree using various objects connected to the electrical grid and computer networks.
Karl opens the scanned page from Terry's address book and begins to kill everyone listed on the page. Her boss, Frank Mallory, becomes the first victim when his microwave oven begins radiating the entire kitchen. Another friend, Elliot Miller, gets burned to death when a hand dryer turns into a flamethrower. Later on, babysitter Carol Maibaum is hired to look after Terry's son Josh and his best friend Frazer. However, Carol becomes the third victim; she is electrocuted from an exposed electrical cord on the kitchen floor when the dishwasher explodes and floods the kitchen.
The police do not believe the theory that Karl is on a killing spree after his death, but Josh realizes the order of the killings parallels a list of contacts from Terry's address book. Terry, along with noted computer hacker Bram Walker, unplugs everything in her house.
The police then receive anonymous reports of an armed robbery, a hostage situation, domestic violence, and a murder in progress, all at Terry's house. The police open fire on the home after mistaking an exploding pole transformer for gunfire. After realizing their mistake, they cease fire. Terry's mother goes into shock during the siege and is transported to the hospital for recovery. Aided by Bram and Josh, Bram manages to defeat Karl by introducing a computer virus that traps him in a physics laboratory. They activate an atom smasher located in the lab, which draws Karl in and destroys him because of the extremely powerful magnetic field produced by the machine.
As the film ends, Bram tells Terry to turn off a heart rate monitor in an ambulance, causing the screen to fade to black.
Cast
Karen Allen as Terry Munroe
Chris Mulkey as Bram Walker
Ted Marcoux as Karl Hochman
Wil Horneff as Josh Munroe
Jessica Walter as Elaine Spencer
Brandon Adams as Frazer
Rick Ducommun as Phil Stewart
Jack Laufer as Elliott Miller
Shevonne Durkin as Carol Maibaum
Richard McKen
|
https://en.wikipedia.org/wiki/Data%20mile
|
In radar-related subjects and in JTIDS, a data mile is a unit of distance equal to 6000 feet (1.8288 kilometres or 0.987 nautical miles). An international mile is exactly 0.88 of a data mile.
The speed of light is 983571056 ft/s, or about one foot per nanosecond. If it were exactly one foot per nanosecond, and a target was one data mile away, then the radar return from that target would arrive 12 microseconds after the transmission. (Recall that radar was developed during World War II in America and England, while both were using English units. It was convenient for them to relate 1 data mile to 12 microseconds, whereas the modern tendency would be to approximate the speed of light as 300,000 km/s.)
References
http://scienceworld.wolfram.com/physics/DataMile.html
Radar
|
https://en.wikipedia.org/wiki/God%27s%20Learning%20Channel
|
God's Learning Channel (GLC) is a religious satellite network based in West Texas which teaches a biblical point of view of Messianic Judaism. The network was founded in 1982 by Al and Tommie Cooper, who had the vision to share the teachings of Jesus Christ with Southeastern New Mexico. The network later grew to five television transmitters located in New Mexico and West Texas. While the focus of programming has been to teach believers their ties to the Bible and the spiritual world, it has continued to expand to cover a wide range of themes related to the Land of Israel and the Jewish people, presenting Jesus, in Hebrew pronounced Yeshua, as the Jewish Messiah.
GLC provides 24-hour streaming media of its broadcast (accessible through the GLC website), as well as internet platforms, such as Roku.
Stations
Abilene, Texas – KPCB-DT 17
Amarillo, Texas – KPTF-DT 18
Lubbock, Texas – KPTB-DT 16
Midland-Odessa, Texas – KMLM-DT 42
Roswell, New Mexico – KRPV-DT 27
Satellites
Galaxy 25 Ku-Band
External links
Official Site
1982 establishments in Texas
Christianity in Texas
Christian Zionism in the United States
Evangelical television networks
Religious television stations in the United States
Television channels and stations established in 1982
|
https://en.wikipedia.org/wiki/Printspying
|
Printspying, a deviation from warspying, is when you connect to an insecure wireless printing network (instead of an insecure wireless internet connection or video feed), and proceed to print pornography and/or pictures from shock websites to the printer. Printspying is best when done when connected to a personal print network (home) but can also be done on business networks.
Espionage
References
|
https://en.wikipedia.org/wiki/Robert%20Stein%20%28computer%20pioneer%29
|
Robert Stein (born April 20, 1946) is an American businessman. He is a co-founder of The Voyager Company in 1985, the first commercial multimedia CD-ROM publisher, and The Criterion Collection in 1984, a collection of definitive films on digital media with in-depth background information (including the first films with recorded audio commentary).
Born and raised in New York City, Stein attended Columbia University, majoring in psychology. Later, he earned a master's degree in education from Harvard University.
Stein then worked with Alan Kay at the Atari Research Group on various electronic publishing projects.
After Voyager, Stein founded Night Kitchen to develop authoring tools for experimental electronic publishing, primarily TK3.
Stein is the director of the Institute for the Future of the Book. According to Stein: "The Institute has two principal activities. One is building high-end tools for making complex electronic documents (part of the Mellon Foundation's higher-ed digital infrastructure initiative). The other is exploring and hopefully influencing the evolution of new forms of intellectual expression and discourse." This new scholarly direction is being explored under the umbrella of MediaCommons.
In 2019 Stein donated his archival papers and hard drives to Stanford University.
External links
Bob Stein on the unrecorded history of online publishing, Triple Canopy, July 2010
Robert Stein by John Brockman
Bob Stein interviewed on This Spartan Life, August 2005
"The Teachings of Bob Stein", Wired Magazine, July 1996
The Institute for the Future of the Book
if:book, the Institute for the Future of the Book weblog
"Becoming Book-Like: Bob Stein and the Future of the Book" (Interview)
MediaCommons
References
1946 births
Living people
Columbia University alumni
Harvard Graduate School of Education alumni
American company founders
|
https://en.wikipedia.org/wiki/John%20Asher
|
John Mallory Asher (born John Mallory, January 13, 1971) is an American actor, film director and screenwriter. He is perhaps best known for his performance as Gary on the USA Network's series spinoff of the movie Weird Science.
Early life
Asher was born John Mallory to actor Edward Mallory and actress Joyce Bulifant. He was adopted by Bulifant's third husband, producer/director William Asher.
Personal life
Asher married actress Jenny McCarthy on September 11, 1999. Their son Evan Joseph Asher was born on May 18, 2002, and was diagnosed with autism. They divorced in September 2005.
Filmography
Actor
Ghost Whisperer as Charlie Hammond
October Road
"Revenge of the Cupcake Kid" (2008), TV episode, as Ronald Buckwild
CSI: Crime Scene Investigation
"The Chick Chop Flick Shop" (2007), TV episode, as Zack Putrid
NCIS
"The Ex-File" (2007), TV episode, as Fred Rinnert
Las Vegas
"You Can't Take It with You" (2004), TV episode, as Calvin 'Doc' Haynes
Fastlane
"Dogtown" (2003), TV episode, as Shane
Rubbing Charlie (2003), TV, as Dean
Going to California (2001), TV series, as Insect Bob
Space Cowboys (2000) as Young Jerry (as John Mallory Asher)
The New Swiss Family Robinson (1998) as Shane Robinson
Gun
"The Shot" (1997), TV episode, as The Video Rat
Time Well Spent (1996) (TV) (as John Mallory Asher)
Weird Science, TV series, as Gary Wallace (as John Mallory Asher)
Double Dragon (1994) as Smartass Mohawk
Showdown (1993/I) as Mike
Step by Step
"The Making of the President" (1992), TV episode, as Student
Frozen Assets (1992) as Bobby Murdock
Who's the Boss?
"Field of Screams" (1991), TV episode, as Usher
Designing Women
"Julia and Rusty, Sittin' in a Tree" (1991), TV episode, as Dennis
The Hunted (1991) (TV) as Joe
Married... with Children"
"You Better Shop Around: Part 1" (1991), TV episode, as Bob
Beverly Hills, 90210
"Class of Beverly Hills" (1990), TV episode, as Guy in Hall
Director
A Boy Called Po (2016)
Tooken (2015)
Somebody Marry Me (2013)
One Tree Hill (as John Asher)
"Who Will Survive, and What Will Be Left of Them" (2006) TV Episode
"Brave New World" (2006) TV Episode
"The Worst Day Since Yesterday" (2005) TV Episode
"The Trick Is to Keep Breathing" (2004) TV Episode
Thank Heaven (2006)
Dirty Love (2005) (as John Asher)
The Policy (2003/II) (as John Asher)
Going to California (2001) TV Series
Diamonds (1999)
Chick Flick (1998)
Kounterfeit (1996) (as John Mallory Asher)
Producer
Dirty Love (2005) (as John Mallory Asher)
Cinematographer
Mating Rituals 101 (2004)
Writer
Tooken (2015)
Chick Flick (1998)
References
External links
1971 births
American male film actors
American male television actors
American television directors
Living people
McCarthy family
|
https://en.wikipedia.org/wiki/Secure%20Web%20SmartFilter%20EDU
|
Secure Web SmartFilter EDU, formerly known as Bess, is a brand of content-control software made by Secure Computing Corporation, which acquired maker N2H2 in 2003; it is usually used in libraries and schools. The main purpose of the system is as an Internet filter, blocking minors using the public computers from accessing web content deemed inappropriate by the local administrators of the system based on the Acceptable Use Policy of the organization. The system is not installed locally (on each individual computer workstation), but installs on the server between the users and the open Internet. This feature makes it harder to bypass, though it is not uncommon for students with more extensive computer knowledge to attempt to bypass the system. The system allows for teachers or administrators to temporarily bypass the system if they need to access blocked sites for educational purposes.
The system is compliant with the Children's Internet Protection Act. Like other similar filters, Secure Web SmartFilter EDU has come under attack for unnecessarily impeding school research (false positives), being too aggressive in its filtering procedures or not being aggressive enough in its filtering procedures. Other critics believe that the imposition of Internet filtering software without the consent of the user constitutes a violation of the First Amendment.
See also
Censorship
Content-control software
Internet censorship
List of parental control software
References
External links
Official Secure Web SmartFilter EDU homepage
Content-control software
|
https://en.wikipedia.org/wiki/Village%20Area%20Network
|
The concept of the Village Area Network or (VAN) was coined to demonstrate the importance of a networked community of technology users in small villages throughout the Yukon–Kuskokwim Delta in southwest Alaska.
The term was originally used by key members of the Distance Delivery Consortium (DDC) in 1997: H.A.'Red' Boucher; Rebecca Grandusky; Martin Leonard III; Curt Madison, and Robert Medinger.
Computer networks by scale
|
https://en.wikipedia.org/wiki/Program%20analysis%20%28disambiguation%29
|
Program analysis is the process of automatically analysing the behavior of computer programs.
Program analysis may also refer to:
Program evaluation, a disciplined way of assessing the merit, value, and worth of projects and programs
Software performance analysis, the gathering of computer program performance characteristics at run time
|
https://en.wikipedia.org/wiki/DG/UX
|
DG/UX is a discontinued Unix operating system developed by Data General for its Eclipse MV minicomputer line, and later the AViiON workstation and server line (both Motorola 88000 and Intel IA-32-based variants).
Overview
DG/UX 1.00, released in March, 1985, was based on UNIX System V Release 2 with additions from 4.1BSD. By 1987, DG/UX 3.10 had been released, with 4.2BSD TCP/IP networking, NFS and the X Window System included. DG/UX 4.00, in 1988, was a comprehensive re-design of the system, based on System V Release 3, and supporting symmetric multiprocessing on the Eclipse MV. The 4.00 filesystem was based on the AOS/VS II filesystem and, using the logical disk facility, could span multiple disks. DG/UX 5.4, released around 1991, replaced the legacy Unix file buffer cache with unified, demand paged virtual memory management. Later versions were based on System V Release 4.
On the AViiON, DG/UX supported multiprocessor machines at a time when most variants of Unix did not. The operating system was also more complete than some other Unix variants; for example, the operating system included a full C compiler (gcc) and also a logical volume manager. The OS was small and compact, but rich in features. It was simple and easy to install and did not require vast resources of memory or processing power. For example, a six-way Pentium Pro-based AViiON would support several hundred users using text terminals.
The volume manager built into the OS was simple, but very powerful. All disk administration could be performed online, without taking any file system offline. This included extending, relocating, mirroring or shrinking. The same functions could be performed on the swap area, allowing in-place migrations of disk storage without downtime. DG/UX 5.4 supported filesystem shrinking, "split mirror" online backup, filesystems up to 2 TB, and filesystem journaling in 1991. Few vendors offered similar features at that time.
DG/UX had a high-performance and stable clustered filesystem. The Clariion storage nas was connected by high-voltage scsi controllers, and scsi-hubs. Each server had double scsi-controllers for failover reasons. Both controllers where master on the same bus, at the same time these filesystems where NFS-mounted form the cluster-master's floating ip. The data was written from each cluster node directly by the scsi bus, but the orchestration, the i-node tables, where written by the NFS-mount from each cluster members.
Later versions added support for processor and memory affinity to support their high-end multiprocessor NUMA AViiON system.
References
Data General
UNIX System V
1985 software
Discontinued operating systems
|
https://en.wikipedia.org/wiki/Software%20architect
|
A software architect is a software engineer responsible for high-level design choices related to overall system structure and behavior.
See also
Software architecture
Software engineering
References
External links
International Association of Software Architects (IASA)
|
https://en.wikipedia.org/wiki/Hash%20list
|
In computer science, a hash list is typically a list of hashes of the data blocks in a file or set of files. Lists of hashes are used for many different purposes, such as fast table lookup (hash tables) and distributed databases (distributed hash tables).
A hash list is an extension of the concept of hashing an item (for instance, a file). A hash list is a subtree of a Merkle tree.
Root hash
Often, an additional hash of the hash list itself (a top hash, also called root hash or master hash) is used. Before downloading a file on a p2p network, in most cases the top hash is acquired from a trusted source, for instance a friend or a web site that is known to have good recommendations of files to download. When the top hash is available, the hash list can be received from any non-trusted source, like any peer in the p2p network. Then the received hash list is checked against the trusted top hash, and if the hash list is damaged or fake, another hash list from another source will be tried until the program finds one that matches the top hash.
In some systems (for example, BitTorrent), instead of a top hash the whole hash list is available on a web site in a small file. Such a "torrent file" contains a description, file names, a hash list and some additional data.
Applications
Hash lists can be used to protect any kind of data stored, handled and transferred in and between computers. An important use of hash lists is to make sure that data blocks received from other peers in a peer-to-peer network are received undamaged and unaltered, and to check that the other peers do not "lie" and send fake blocks.
Usually a cryptographic hash function such as SHA-256 is used for the hashing. If the hash list only needs to protect against unintentional damage unsecured checksums such as CRCs can be used.
Hash lists are better than a simple hash of the entire file since, in the case of a data block being damaged, this is noticed, and only the damaged block needs to be redownloaded. With only a hash of the file, many undamaged blocks would have to be redownloaded, and the file reconstructed and tested until the correct hash of the entire file is obtained. Hash lists also protect against nodes that try to sabotage by sending fake blocks, since in such a case the damaged block can be acquired from some other source.
Protocols using hash lists
Rsync
Zsync
Bittorrent
See also
Hash tree
Hash table
Hash chain
Ed2k: URI scheme, which uses an MD4 top hash of an MD4 hash list to uniquely identify a file
Cryptographic hash function
List
Error detection and correction
Cryptographic hash functions
Hashing
|
https://en.wikipedia.org/wiki/Systems%20architect
|
The systems architect is an information and communications technology professional. Systems architects define the architecture of a computerized system (i.e., a system composed of software and hardware) in order to fulfill certain requirements. Such definitions include: a breakdown of the system into components, the component interactions and interfaces (including with the environment, especially the user), and the technologies and resources to be used in its design and implementation.
The systems architect's work should seek to avoid implementation issues and readily permit unanticipated extensions/modifications in future stages. Because of the extensive experience required for this, the systems architect is typically a very senior technologist with substantial, but general, knowledge of hardware, software, and similar (user) systems. Above all, the systems architect must be reasonably knowledgeable of the users' domain of experience. For example, the architect of an air traffic system needs to be more than superficially familiar with all of the tasks of an air traffic system, including those of all levels of users.
The title of systems architect connotes higher-level design responsibilities than a software engineer or programmer, though day-to-day activities may overlap.
Overview
Systems architects interface with multiple stakeholders in an organization in order to understand the various levels of requirements, the domain, the viable technologies, and anticipated development process. Their work includes determining multiple design and implementation alternatives, assessing such alternatives based on all identified constraints (such as cost, schedule, space, power, safety, usability, reliability, maintainability, availability, and other "ilities"), and selecting the most suitable options for further design. The output of such work sets the core properties of the system and those that are hardest to change later.
In small systems the architecture is typically defined directly by the developers. However, in larger systems, a systems architect should be appointed to outline the overall system, and to interface between the users, sponsors, and other stakeholders on one side and the engineers on the other. Very large, highly complex systems may include multiple architects, in which case the architects work together to integrate their subsystems or aspects, and respond to a chief architect responsible for the entire system. In general, the role of the architect is to act as a mediator between the users and the engineers, reconciling the users' needs and requirements with what the engineers have determined to be doable within the given (engineering) constraints.
In systems design, the architects (and engineers) are responsible for:
Interfacing with the user(s) and sponsor(s) and all other stakeholders in order to determine their (evolving) needs.
Generating the highest level of system requirements, based on the users' needs and other constrai
|
https://en.wikipedia.org/wiki/Merkle%20tree
|
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" (node) is labelled with the cryptographic hash of a data block, and every node that is not a leaf (called a branch, inner node, or inode) is labelled with the cryptographic hash of the labels of its child nodes. A hash tree allows efficient and secure verification of the contents of a large data structure. A hash tree is a generalization of a hash list and a hash chain.
Demonstrating that a leaf node is a part of a given binary hash tree requires computing a number of hashes proportional to the logarithm of the number of leaf nodes in the tree. Conversely, in a hash list, the number is proportional to the number of leaf nodes itself. A Merkle tree is therefore an efficient example of a cryptographic commitment scheme, in which the root of the tree is seen as a commitment and leaf nodes may be revealed and proven to be part of the original commitment.
The concept of a hash tree is named after Ralph Merkle, who patented it in 1979.
Uses
Hash trees can be used to verify any kind of data stored, handled and transferred in and between computers. They can help ensure that data blocks received from other peers in a peer-to-peer network are received undamaged and unaltered, and even to check that the other peers do not lie and send fake blocks.
Hash trees are used in hash-based cryptography. Hash trees are also used in the InterPlanetary File System (IPFS), Btrfs and ZFS file systems (to counter data degradation); Dat protocol; Apache Wave protocol; Git and Mercurial distributed revision control systems; the Tahoe-LAFS backup system; Zeronet; the Bitcoin and Ethereum peer-to-peer networks; the Certificate Transparency framework; the Nix package manager and descendants like GNU Guix; and a number of NoSQL systems such as Apache Cassandra, Riak, and Dynamo.
Suggestions have been made to use hash trees in trusted computing systems.
The initial Bitcoin implementation of Merkle trees by Satoshi Nakamoto applies the compression step of the hash function to an excessive degree, which is mitigated by using Fast Merkle Trees.
Overview
A hash tree is a tree of hashes in which the leaves (i.e., leaf nodes, sometimes also called "leafs") are hashes of data blocks in, for instance, a file or set of files. Nodes farther up in the tree are the hashes of their respective children. For example, in the above picture hash 0 is the result of hashing the concatenation of hash 0-0 and hash 0-1. That is, hash 0 = hash( hash 0-0 + hash 0-1 ) where "+" denotes concatenation.
Most hash tree implementations are binary (two child nodes under each node) but they can just as well use many more child nodes under each node.
Usually, a cryptographic hash function such as SHA-2 is used for the hashing. If the hash tree only needs to protect against unintentional damage, unsecured checksums such as CRCs can be used.
In the top of a hash tree there is a top hash (or root hash or maste
|
https://en.wikipedia.org/wiki/School%20of%20Electrotechnics%20Zagreb
|
School of Electrotechnics Zagreb () is a school specialised for electro-technicians, computer technicians and technicians for electro-engineering. It was founded in 1959 as Center for educating "Rade Končar". In 1991 the school changed its name to School of Electrotechnics which is still its name. Director of school is Ivan Vrabac.
External links
Electrotehnic school site
Schools in Croatia
Education in Zagreb
Educational institutions established in 1959
Buildings and structures in Zagreb
1959 establishments in Yugoslavia
|
https://en.wikipedia.org/wiki/Spatial%20network%20analysis%20software
|
Spatial network analysis software packages are analytic software used to prepare graph-based analysis of spatial networks. They stem from research fields in transportation, architecture, and urban planning. The earliest examples of such software include the work of Garrison (1962), Kansky (1963), Levin (1964), Harary (1969), Rittel (1967), Tabor (1970) and others in the 1960s and 70s. Specific packages address their domain-specific needs, including TransCAD for transportation, GIS for planning and geography, and Axman for Space syntax researchers.
Packages
Many packages are available. Many were developed in academia and are freely available or freely available for academic research.
In historical order:
Axman – The (near) original developed by Nick Sheep Dalton of UCL to perform axial line analysis on computers running Mac OS, currently used in more than 50 countries. This spawned offshoots such as Pesh (for the analysis of convex space networks) and SpaceBox (for the analysis of 'all-line' axial maps).
Spatialist – Developed at Georgia Institute of Technology to implement theoretical innovations principally introduced by John Peponis. This software plugs into the MicroStation CAD package to analyse networks of automatically generated 'e-spaces' and 's-spaces'.
Axwoman 1 – Written by Bin Jiang while at UCL. It is a tool to perform axial analysis as a plug-in to ESRI products.
Axwoman 6.2+ – Evolved from Axwoman 1.0 and research by Bin Jiang and his team. Axwoman 6.2 is a free plug-in to ArcMap 10, combined with AxialGen in one installer. Featured functionality includes automatically generating natural streets and axial lines from OpenStreetMap data. The website also contains tutorials.
Depthmap – Developed by Alasdair Turner of UCL. This software initially generated isovists and performed visibility graph analysis of building systems on computers running Windows. It evolved to include automatic generation of axial line networks and analysis of axial line networks and road segment line networks at anything up to the level of the US or Europe.
OmniVista – Developed by Nick Sheep Dalton and Ruth Conroy Dalton. It performs a range of isovist measures on Mac OS computers.
Fathom – Commercial implementation of visibility graph analysis written by Intelligent Space Partnership.
Mindwalk – Developed by Lucas Figueiredo, This software performs spatial analysis over standard axial maps and new continuity maps. It is written in Java and runs on several platforms. It is also known as xSpace. Mindwalk has been used as a research and teaching tool since 2002. It is distributed worldwide for academic and non-commercial purposes.
Isovist Analyst – Written by Sanjay Rana while at UCL. This program creates isovists from building plans as a plug-in to ESRI products.
Ajanachara – Open source software developed by Gerald Franz at the Max Planck Institute for Biological Cybernetics. It performs visibility graph analysis of 3D Studio Max and VRML models.
|
https://en.wikipedia.org/wiki/26-bit%20computing
|
In computer architecture, 26-bit integers, memory addresses, or other data units are those that are 26 bits wide, and thus can represent unsigned values up to 67,108,863. Two examples of computer processors that featured 26-bit memory addressing are certain second generation IBM System/370 mainframe computer models introduced in 1981 (and several subsequent models), which had 26-bit physical addresses but had only the same 24-bit virtual addresses as earlier models, and the first generations of ARM processors.
History
IBM System/370
As data processing needs continued to grow, IBM and their customers faced challenges directly addressing larger memory sizes. In what ended up being a short-term "emergency" solution, a pair of IBM's second wave of System/370 models, the 3033 and 3081, introduced 26-bit real memory addressing, increasing the System/370's amount of physical memory that could be attached by a factor of 4 from the previous 24-bit limit of 16 MB. IBM referred to 26-bit addressing as "extended real addressing," and some subsequent models also included 26-bit support. However, only 2 years later, IBM introduced 31-bit memory addressing, expanding both physical and virtual addresses to 31 bits, with its System/370-XA models, and even the popular 3081 was upgradeable to XA standard.
Given 26-bit's brief history as the state-of-the-art in memory addressing available in IBM's model range, and given that virtual addresses were still limited to 24 bits, software exploitation of 26-bit mode was limited. The few customers that exploited 26-bit mode eventually adjusted their applications to support 31-bit addressing, and IBM dropped support for 26-bit mode after several years producing models supporting 24-bit, 26-bit, and 31-bit modes. The 26-bit mode is the only addressing mode that IBM removed from its line of mainframe computers descended from the System/360. All the other addressing modes, including now 64-bit mode, are supported in current model mainframes.
Early ARM processors
In the ARM processor architecture, 26-bit refers to the design used in the original ARM processors where the Program Counter (PC) and Processor Status Register (PSR) were combined into one 32-bit register (R15), the status flags filling the high 6 bits and the Program Counter taking up the lower 26 bits.
In fact, because the program counter is always word-aligned the lowest two bits are always zero which allowed the designers to reuse these two bits to hold the processor's mode bits too. The four modes allowed were USR26, SVC26, IRQ26, FIQ26; contrast this with the 32 possible modes available when the program status was separated from the program counter in more recent ARM architectures.
This design enabled more efficient program execution, as the Program Counter and status flags could be saved and restored with a single operation. This resulted in faster subroutine calls and interrupt response than traditional designs, which would have to do two register loads
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.