source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/FORMAC
|
FORMAC, the FORmula MAnipulation Compiler, was the first computer algebra system to have significant use. It was developed by Jean E. Sammet and her team, as an extension of FORTRAN IV. The compiler was implemented as a preprocessor taking the FORMAC program and converting it to a FORTRAN IV program which was in turn compiled without further user intervention.
Initial development started in 1962 and was complete by April 1964. In November it was released to IBM customers.
FORMAC supported computation, manipulation, and use of symbolic expressions. In addition it supported rational arithmetic.
See also
ALTRAN
References
Bibliography
External links
Computer algebra systems
Fortran programming language family
Procedural programming languages
Programming languages created in 1962
Programming languages created by women
|
https://en.wikipedia.org/wiki/Shepardson%20Microsystems
|
Shepardson Microsystems, Inc. (SMI) was a small company producing operating systems and programming languages for CP/M, the Atari 8-bit family and Apple II computers. SMI is most noted for the original Apple II disk operating system, Atari BASIC, and Atari's disk operating system. Shepardson Microsystems was founded by Robert Shepardson in Saratoga Springs, New York.
CP/M
The company got its start in the microcomputer arena by producing a series of BASIC programming language interpreters for the burgeoning S-100 bus computer market. Their first product was Cromemco 16k BASIC, which, as the name implies, was intended to run on Cromemco Z-series Z80-based computers with 16 kB of RAM.
As machines shipped with ever-increasing amounts of RAM, due largely to the replacement of SRAM with the much denser DRAM in the mid-1970s, SMI further expanded their version as the 26 kB Cromemco Structured BASIC, while a cut-down 12 kB version was released as CP/A Business BASIC.
At the time they were written, Microsoft BASIC was widespread but not as universal as it would be by the early 1980s. SMI's BASICs were based on the concepts and syntax of Data General Business Basic (which was very similar to HP Time-Shared BASIC), as opposed to Digital's BASIC-PLUS that formed the basis for MS BASIC. As a result, SMI's BASICs incorporated a different way to handle strings and input/output, a difference that would be seen in their later languages for the Atari.
Apple Computer
On April 10, 1978, Shepardson Microsystems signed a contract with Apple. For up front, and on delivery, and no additional royalties Shepardson Microsystems would build Apple's first DOS and hand it over just 35 days later. For its money, Apple would get a file manager, an interface for Integer BASIC and Applesoft BASIC, and utilities that would allow disk backup, disk recovery, and file copying. Apple provided detailed specifications, and early Apple employee Randy Wigginton worked closely with Shepardson's Paul Laughton as the latter wrote the operating system with punched cards and a minicomputer. That deal enabled release and sales of Apple's Disk II drive.
Atari, Inc.
Atari, Inc. planned to follow up its successful Atari VCS console with a more powerful home computer (the Atari 400 and 800), to be introduced at the January 1979 Consumer Electronics Show. This required a BASIC interpreter. A version of Microsoft BASIC for the MOS 6502 had been licensed for this purpose, but the task of retrofitting the code into an 8k cartridge proved too difficult.
Atari turned to Shepardson Microsystems to help with the port, but after struggling with it themselves, they proposed developing a new BASIC instead of using Microsoft BASIC. Atari contracted with SMI not only for Atari BASIC, but the Atari Disk Operating System as well. SMI had their BASIC finished before the December 28, 1978 delivery of the contract, which included a $1000 bonus for early completion. In early 1981, SMI concluded that thei
|
https://en.wikipedia.org/wiki/Synergistic%20Software
|
Synergistic Software was a video game developer based in Seattle. Founded in 1978, the company published some of the earliest available games and applications for the Apple II family of computers. They continued developing games for various platforms into the late 1990s.
History
Synergistic was founded in 1978 by Robert Clardy and Ann Dickens Clardy. They developed the Dungeons & Dragons-inspired Dungeon Campaign / Wilderness Campaign game, which was later expanded and repackaged as Odyssey: The Compleat Apventure.
Synergistic also published a number of business applications, including a word processor and simple database program, called The Modifiable Database.
Synergistic was acquired by Sierra On-Line in 1996. They maintained their identity as an independent development group within Sierra until the studio was closed on February 22, 1999.
Software
Campaign-Adventure series
Dungeon Campaign (1978)
Wilderness Campaign (1979)
Odyssey: The Compleat Apventure (1980)
Apventure to Atlantis (1982)
World Builders engine series
War in Middle Earth (1988)
Spirit of Excalibur (1990)
Vengeance of Excalibur (1991)
Conan: The Cimmerian (1991)
Warriors of Legend (1993)
Non-games
Higher Text II (1980)
Data Reporter (1981)
Other games
Escape from Arcturus (1981)
Bolo (1982)
Crisis Mountain (1982)
Probe One: The Transmitter (1982)
Microbe (1983)
The Fool's Errand (1986), MS-DOS port
Pitstop II (1984), Atari 8-bit port
Thexder (1985), MS-DOS port
Rockford (1988)
SideWinder (1988)
Silpheed (1988), MS-DOS & Apple IIGS ports
The Third Courier (1989)
Low Blow (1990)
LA Law: The Computer Game (1992)
The Beverly Hillbillies (1993)
Homey D. Clown (1993)
Super Battleship (1993)
Spectre (1994)
Carrier Aces (1995)
Air Cavalry (1995)
Thexder 95 (1995)
Front Page Sports: Football Pro '97 (1996)
Triple Play 97 (1996)
Birthright - The Gorgon's Alliance (1997)
Diablo: Hellfire (1997)
References
External links
Synergistic Software at MobyGames
Defunct companies based in Washington (state)
Sierra Entertainment
Defunct video game companies of the United States
Video game development companies
Companies based in Bellevue, Washington
Video game companies established in 1978
Video game companies disestablished in 1999
1978 establishments in Washington (state)
1999 disestablishments in Washington (state)
|
https://en.wikipedia.org/wiki/Propane%20%28data%20page%29
|
This page provides supplementary chemical data on propane.
Structure and properties
Thermodynamic properties
Density of liquid and gas
Propane is highly temperature dependent. The density of liquid and gaseous propane are given on the next image.
Vapor pressure of liquid
Table data obtained from CRC Handbook of Chemistry and Physics 44th ed.
Spectral data
Material Safety Data Sheet
Propane does not have health effects other than the danger of frostbite or asphyxiation. The National Propane Gas Association has a generic MSDS available online here. (Issued 1996)
MSDS from Suburban Propane, L.P dated 5/2013 in the SDSdata.org database
References
External links
Physical and Chemical Properties of Propane
Chemical data pages
(Data page)
Chemical data pages cleanup
|
https://en.wikipedia.org/wiki/Community%20Z%20Tools
|
The Community Z Tools (CZT) initiative is based around a SourceForge project to build a set of tools for the Z notation, a formal method useful in software engineering. Tools include support for editing, typechecking and animating Z specifications. There is some support for extensions such as Object-Z and TCOZ. The tools are built using the Java programming language.
CZT was proposed by Andrew Martin of Oxford University in 2001.
References
External links
CZT SourceForge website
CZT initiative information by Andrew Martin
Softpedia information
CZT: A Framework for Z Tools by Petra Malik and Mark Utting (PDF)
2001 establishments in England
2001 software
Z notation
Research projects
Free software programmed in Java (programming language)
Department of Computer Science, University of Oxford
|
https://en.wikipedia.org/wiki/CZT
|
CZT may stand for:
Community Z Tools, a set of tools for the Z notation
Cadmium zinc telluride, a semiconductor material
Chirp_Z-transform, another name for Bluestein's FFT algorithm
Changzhutan, Changsha-Zhuzhou-xiangTan City Cluster
|
https://en.wikipedia.org/wiki/Timothy%20McGee
|
Timothy Farragut "Tim" McGee () is a fictional character from the CBS television series NCIS. He is portrayed by Sean Murray. McGee specializes in cybersecurity and computer crime, and is a graduate of Johns Hopkins University and MIT.
Murray appeared as a guest star in eight episodes of the first season of NCIS. In season two he joined the main cast and was added to the opening credits. In season twenty, Murray became the show's new main lead.
Background
McGee was born in Bethesda, Maryland, on September 13, 1978, to an Irish American family. He spent his childhood in Alameda, California, as his father was a naval officer stationed there. His parents bought him his first car—a 1984 Camaro Z28 5-speed—the day he turned sixteen. However, he crashed into a bus while trying to figure out how to use the windshield wipers. He got a student pass the day he got out of traction. He earned a Bachelor of Science degree in biomedical engineering from Johns Hopkins University and a Master of Science degree in computer forensics from MIT. His college GPA was 3.9, as he failed a fencing class in his sophomore year. He worked at the NCIS field office in Norfolk, Virginia, before being transferred to the headquarters in the Washington Navy Yard, a move made permanent at the end of the season two episode "See No Evil."
McGee has a younger sister, Sarah, who is played by Troian Bellisario (Murray's stepsister in real life). Sarah attends Waverly College and intends to be a writer like her older brother.
Development
Characterization
Special Agent Timothy McGee, commonly referred to by Special Agent Anthony DiNozzo as "Probie", "McGeek", "McQueen", "McGoo", "Probie wan kenobi", "McProbie", "Baldy McBald", "McDigit", "Timmy MaGee", and even "Elf Lord", is part of a major case squad led by Special Agent Gibbs. He gained his field agent status when he was transferred to Washington from Norfolk.
In addition to responding to crime scenes and conducting investigations (along with the rest of the field team), McGee also serves as Gibbs' computer consultant and frequently assisted Abby Sciuto in the forensics lab when necessary. As a computer expert, McGee is stereotypically portrayed as tending to speak in technical jargon, and he and Sciuto both fulfill the "scientific/technological geek as sidekick" trope common to law enforcement procedural shows.
During the first few seasons, McGee was portrayed as timid and inexperienced. In the Season 3 episode "Probie", he was visibly shaken after killing his first suspect, even though it was in self-defense and his teammates backed him in the subsequent investigation. When questioned about McGee's guilt, Gibbs commented that McGee "doesn't know how to lie". His character was almost entirely altered by episode 6.12 "Caged", evolving into a bolder and more assertive character. Critics such as Looper'''s Alex G were still commenting on this personality change as late as 2022. McGee's voice also changed around this time, becomin
|
https://en.wikipedia.org/wiki/The%20Girl%20Who%20Slept%20Too%20Little
|
"The Girl Who Slept Too Little" is the second episode of the seventeenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on September 18, 2005, and was seen by 9.79 million people during this broadcast.
Plot
When construction on a stamp museum wakes up the Simpsons, everyone in Springfield protests against its construction to the beat of the song "Eve of Destruction". Soon, Mayor Quimby moves it to where the Springfield Cemetery used to be, and the cemetery is moved next door to the Simpsons' house. Lisa is the only member of the family whose room overlooks it. She is scared and cannot sleep at night, and ends up sleeping with Homer and Marge. The next night, Lisa meets a white-haired man known as Gravedigger Billy, who is Groundskeeper Willie's cousin. After a hand comes out of a tomb, Lisa goes to Marge and Homer's room and makes a promise that if they go to the Springfield Stamp Museum, Lisa will sleep in her room. At the museum, there is a lecture for Milton Burkhart's book "The Land of the Wild Beasts", and an advertisement based on the book for a restaurant called The Hillside Wrangler.
Lisa then feels that she can sleep in her room with the cemetery, but is already afraid, and sleeps in Homer and Marge's room again, much to their consternation. Marge and Homer then spend a night in Lisa's room and find out how scary the view really is. They then try to book a therapist, but find out that it is expensive and Lisa may have to resolve her fears herself, as she was not nurtured enough as a baby. Lisa, however, does not want to go see a therapist, and goes with Santa's Little Helper to overcome her fears at the cemetery. When the gate is locked, Lisa is left alone when Santa's Little Helper flees. Afterwards, Lisa, unnerved after witnessing Dr Nick Riviera grave-robbing, hits her head on a tombstone and faints. She experiences a dream where she is eaten by a skeleton, and then is on a web in a slime pond with a slug resembling Milhouse, and a spider resembling Bart. Lisa then has another vision with the monsters from "The Land of the Wild Beasts", and finds out they are funny, instead of scary, and that it is okay to be scared. Marge and Homer then find Lisa, wake her up, and they go home.
Reception
John Frink was nominated for a Writers Guild of America Award for Outstanding Writing in Animation at the 58th Writers Guild of America Awards for his script to this episode.
References
External links
"The Girl Who Slept Too Little" at The Simpsons.com
The Simpsons (season 17) episodes
2005 American television episodes
Fiction about cemeteries
|
https://en.wikipedia.org/wiki/Utah%20GLX
|
Utah GLX was a project aimed at creating a fully free and open-source basic hardware-accelerated 3D renderer using the OpenGL rendering API on Linux kernel-based operating systems. Utah GLX predates Direct Rendering Infrastructure, which is what is used as of 2014.
John D. Carmack worked on Utah GLX.
History
References
External links
Utah-GLX Homepage
Historical view at OpenGL and Direct3D
Free 3D graphics software
Free software programmed in C
Graphics libraries
Graphics-related software for Linux
Linux APIs
|
https://en.wikipedia.org/wiki/Michael%20J.%20C.%20Gordon
|
Michael John Caldwell Gordon (28 February 1948 – 22 August 2017) was a British computer scientist.
Life
Mike Gordon was born in Ripon, Yorkshire, England. He attended Dartington Hall School and Bedales School. In 1966, he was accepted to study engineering at Gonville and Caius College, University of Cambridge, but transferred to mathematics. During his studies, in 1969 he worked at the National Physical Laboratory in London during the summer, gaining his first exposure to computers.
Gordon studied for his PhD degree at University of Edinburgh, supervised by Rod Burstall, finishing in 1973 with a thesis entitled Evaluation and Denotation of Pure LISP Programs. He was invited to Stanford University in California by John McCarthy, the inventor of LISP, to work in his Artificial Intelligence Laboratory there. Gordon worked at the Cambridge University Computer Laboratory from 1981, initially as a lecturer, promoted to Reader in 1988 and Professor in 1996.
He was elected a Fellow of the Royal Society in 1994, and in 2008 a two-day research meeting on Tools and Techniques for Verification of System Infrastructure was held there in honour of his 60th birthday.
Mike Gordon was married to Avra Cohn, a PhD student of Robin Milner at the University of Edinburgh, and they undertook research together.
He died in Cambridge after a brief illness and is survived by his wife and two sons.
Work
Gordon led the development of the HOL theorem prover. The HOL system is an environment for interactive theorem proving in a higher-order logic. Its most outstanding feature is its high degree of programmability through the meta-language ML. The system has a wide variety of uses, from formalising pure mathematics to verification of industrial hardware.
There has been a series of international conferences on the HOL system, TPHOLs. The first three were informal users' meetings with no published proceedings. The tradition now is for an annual conference in a continent different from the location of the previous meeting. From 1996, the scope broadened to cover all theorem proving in higher-order logics.
References
External links
Mike Gordon home page
1948 births
2017 deaths
People from Ripon
People educated at Bedales School
Alumni of Gonville and Caius College, Cambridge
Alumni of the University of Edinburgh
English computer scientists
Formal methods people
Members of the University of Cambridge Computer Laboratory
Fellows of the Royal Society
Scientists of the National Physical Laboratory (United Kingdom)
|
https://en.wikipedia.org/wiki/Bokosuka%20Wars
|
is a 1983 action-strategy role-playing video game developed by Kōji Sumii (住井浩司) and released by ASCII for the Sharp X1 computer, followed by ports to the MSX, FM-7, NEC PC-6001, NEC PC-8801 and NEC PC-9801 computer platforms, as well as an altered version released for the Family Computer console and later the Virtual Console service. It revolves around a leader who must lead an army in phalanx formation across a battlefield in real-time against overwhelming enemy forces while freeing and recruiting soldiers along the way, with each unit able to gain experience and level up through battle. The player must make sure that the leader stays alive, until the army reaches the enemy castle to defeat the leader of the opposing forces.
The game was responsible for laying the foundations for the tactical role-playing game genre, or the "simulation RPG" genre as it is known in Japan, with its blend of role-playing and strategy game elements. The game has also variously been described as an early example of an action role-playing game, an early prototype real-time strategy game, and a unique reverse tower defense game. In its time, the game was considered a major success in Japan.
Release
Originally developed in 1983 for the Sharp X1 computer, it won ASCII Entertainment's first "Software Contest" and was sold boxed by them that year. An MSX port was then released in 1984, followed in 1985 by versions for the S1, PC-6000mkII, PC-8801, PC-9801, FM-7 and the Family Computer (the latter released on December 14, 1985).
LOGiN Magazine's November 1984 issue featured a sequel for the X1 entitled New Bokosuka Wars with the source code included. With all-new enemy characters and redesigned items and traps, the level of difficulty became more balanced. It was also included in Tape Login Magazine's November 1984 issue, but never sold in any other form.
The PC-8801 version used to be sold as a download from Enterbrain and was ported for the i-Mode service in 2004. The Famicom version was released for the Wii Virtual Console on April 8, 2008.
A sequel, Bokosuka Wars II was released in Japan on November 10, 2016 for the PlayStation 4 and Xbox One. A western version was released in February 2017 for Xbox One and October for PlayStation 4. A Nintendo Switch version was released on March 19, 2020 in Japan.
Plot
In the later Famicom version, King Suren's forces have been captured and turned into trees and rocks by King Ogereth. King Suren has to release his warriors from trees and rocks, and defeat King Ogereth's forces. The allies coming from trees and rocks only appear in the Famicom version.
In the earlier X1, MSX and PC computer versions, however, the player starts with a complete army and may gain some extra knights by freeing them from prison cells, not from trees or rocks. There are no soldiers turned into objects in the original computer versions.
Gameplay
The player can control three chess-like units: the King, Knight, and Pawn. Pressing the D-Pad will move K
|
https://en.wikipedia.org/wiki/David%20May%20%28computer%20scientist%29
|
Michael David May FRS FREng (born 24 February 1951) is a British computer scientist. He is a Professor in the Department of Computer Science at the University of Bristol and founder of XMOS Semiconductor, serving until February 2014 as the chief technology officer.
May was lead architect for the transputer. As of 2017, he holds 56 patents, all in microprocessors and multi-processing.
Life and career
May was born in Holmfirth, Yorkshire, England and attended Queen Elizabeth Grammar School, Wakefield. From 1969 to 1972 he was a student at King's College, Cambridge, University of Cambridge, at first studying Mathematics and then Computer Science in the University of Cambridge Mathematical Laboratory, now the University of Cambridge Computer Laboratory.
He moved to the University of Warwick and started research in robotics. The challenges of implementing sensing and control systems led him to design and implement an early concurrent programming language, EPL, which ran on a cluster of single-board microcomputers connected by serial communication links. This early work brought him into contact with Tony Hoare and Iann Barron: one of the founders of Inmos.
When Inmos was formed in 1978, May joined to work on microcomputer architecture, becoming lead architect of the transputer and designer of the associated programming language Occam. This extended his earlier work and was also influenced by Tony Hoare, who was at the time working on CSP and acting as a consultant to Inmos.
The prototype of the transputer was called the Simple 42 and was completed in 1982. The first production transputers, the T212 and T414, followed in 1985; the T800 floating point transputer in 1987. May initiated the design of one of the first VLSI packet switches, the C104, together with the communications system of the T9000 transputer.
Working closely with Tony Hoare and the Programming Research Group at Oxford University, May introduced formal verification techniques into the design of the T800 floating point unit and the T9000 transputer. These were some of the earliest uses of formal verification in microprocessor design, involving specifications, correctness preserving transformations and model checking, giving rise to the initial version of the FDR checker developed at Oxford.
In 1995, May joined the University of Bristol as a professor of computer science. He was head of the computer science department from 1995 to 2006. He continues to be a professor at Bristol while supporting XMOS, a University spin-out he co-founded in 2005. Before XMOS, he was involved in Picochip, where he wrote the original instruction set.
May is married with three sons and lives in Bristol, United Kingdom.
Awards and recognition
In 1990, May received an Honorary DSc from the University of Southampton, followed in 1991 by his election as a Fellow of The Royal Society and the Clifford Paterson Medal and Prize of the Institute of Physics in 1992.
In 2010, he was elected a Fellow of the R
|
https://en.wikipedia.org/wiki/MacPerspective
|
MacPerspective was a 3D perspective drawing program developed for the Apple Macintosh computer in 1985. It featured an intuitive system for creating "wireframe" drawings by specifying the X, Y, and Z coordinates of lines to be drawn on the screen. It was developed and distributed by B. Knick Drafting, Inc., which still retains the rights to the software. It enjoyed modest success through the early 1990s when it was still functional on System 7.
References
3D graphics software
Macintosh-only software
|
https://en.wikipedia.org/wiki/Matthias%20Felleisen
|
Matthias Felleisen is a German-American computer science professor and author. He grew up in Germany and immigrated to the US in his twenties.
He received his PhD from Indiana University under the direction of Daniel P. Friedman.
After serving as professor for 14 years in the Computer Science Department of Rice University, Felleisen joined the Khoury College of Computer Sciences at Northeastern University in Boston, Massachusetts as Trustee Professor.
Felleisen's interests include programming languages, including software tools, program design, software contracts, and many more. In the 1990s, Felleisen launched PLT and TeachScheme! (later ProgramByDesign and eventually giving rise to the Bootstrap project
) with the goal of teaching program-design principles to beginners and to explore the use of Scheme to produce large systems. As part of this effort, he authored How to Design Programs (MIT Press, 2001) with Findler, Flatt, and Krishnamurthi.
For his dissertation Felleisen developed an extension of Church's lambda calculus with assignment statements and continuation operators. The dissertation re-proved the Church-Rosser theorem and the Curry-Feys Standardization Theorem for these extended calculus. It thus established a novel form of operational semantics for higher-order functional languages with imperative extensions. Its most well-known application is for a proof of type safety, worked out with his PhD student Andrew Wright.
Tim Griffin showed a few years later that Felleisen's lambda calculus with continuation operations is in a Curry-Howard correspondence to classical logic, a controversial insight at the time. In a similar vein, Barker and Shan connected continuations and especially Felleisen's delimited continuations calculus the linguistic concepts via Montague grammars. Part I of "Semantics Engineering with PLT Redex" is derived from his dissertation.
Control delimiters, the basis of delimited continuations, were introduced by Felleisen in 1988. They have since been used in many domains, particularly in defining new control operators; see Queinnec for a survey.
A-normal form (ANF), an intermediate representation of programs in functional compilers were introduced by Sabry and Felleisen in 1992 as a simpler alternative to continuation-passing style (CPS). An implementation in the CAML compiler demonstrated its practical usefulness and popularized the idea
With Findler, Felleisen developed the notion of higher-order contracts. With such contracts, programmers can express assertions about the behavior of first-class functions, objects, classes and modules. Felleisen's work on gradual typing was a direct continuation of his work on these contracts; see below.
In support of the TeachScheme! project, Felleisen and his team of
Findler, Flatt, and Krishnamurthi designed and implemented the Racket programming language., Racket (nee PLT Scheme). The idea was to create a programming language with which it would be easy to quickly bui
|
https://en.wikipedia.org/wiki/Remote%20Data%20Services
|
Remote Data Services (RDS, formerly known as Advanced Data Connector or ADC) is an older technology that is part of Microsoft SQL Server, and used in conjunction with ActiveX Data Objects (ADO). RDS allowed the retrieval of a set of data from a database server, which the client then altered in some way and then sent back to the server for further processing. With the popular adoption of Transact-SQL, which extends the SQL programming with constructs such as loops and conditional statements, RDS became less necessary and it was eventually deprecated in Microsoft Data Access Components version 2.7. Microsoft produced SOAP Toolkit 2.0, which allows clients to do this via an open XML-based standard.
External links
Remote Data Service (RDS) Programmer's Guide
Microsoft application programming interfaces
|
https://en.wikipedia.org/wiki/Zhang%20Lin%20%28dissident%29
|
Zhang Lin (born 1963 in Bengbu, Anhui) is a cyber-dissident from the People's Republic of China. He led student hunger strikes in Bengbu in 1989. He was imprisoned on 29 January 2005, in Bengbu's No. 1 Detention Center. August 2009, Lin was released free. However, he has constantly been harassed by Chinese government after that. He was imprisoned again on September 5, 2014, and was released in September 2016. Zhang moved to the US in 2018 and he is running his YouTube channel.
Zhang Lin's daughter Zhang Anni was arrested at her primary school on 27 February 2013 and detained with her father Zhang Lin for three hours. On 7 September 2013, Zhang Anni and her elder sister departed China from Shanghai Pudong International Airport with help from Consulate General of the United States, Shanghai, and resettled in San Francisco, United States.
References
External links
Human rights in China on him
Reporters sans frontières on him
1963 births
Living people
People from Bengbu
|
https://en.wikipedia.org/wiki/Gordon%20Plotkin
|
Gordon David Plotkin, (born 9 September 1946) is a theoretical computer scientist in the School of Informatics at the University of Edinburgh. Plotkin is probably best known for his introduction of structural operational semantics (SOS) and his work on denotational semantics. In particular, his notes on A Structural Approach to Operational Semantics were very influential. He has contributed to many other areas of computer science.
Education
Plotkin was educated at the University of Glasgow and the University of Edinburgh, gaining his Bachelor of Science degree in 1967 and PhD in 1972 supervised by Rod Burstall.
Career and research
Plotkin has remained at Edinburgh, and was, with Burstall and Robin Milner, a co-founder of the Laboratory for Foundations of Computer Science (LFCS). His former doctoral students include Luca Cardelli, Philippa Gardner, Doug Gurr, Eugenio Moggi, and Lǐ Wèi.
Awards and honours
Plotkin was elected a Fellow of the Royal Society (FRS) in 1992, and a Fellow of the Royal Society of Edinburgh (FRSE) and is a Member of the Academia Europæa and the American Academy of Arts and Sciences. He is also a winner of the Royal Society Wolfson Research Merit Award. Plotkin received the Milner Award in 2012 for "his fundamental research into programming semantics with lasting impact on both the principles and design of programming languages." His nomination for the Royal Society reads:
References
1946 births
Living people
British computer scientists
Fellows of the Royal Society
Members of Academia Europaea
Fellows of the American Academy of Arts and Sciences
Royal Society Wolfson Research Merit Award holders
Formal methods people
Programming language researchers
Scottish Jews
Jewish scientists
Alumni of the University of Edinburgh
Academics of the University of Edinburgh
Fellows of the Royal Society of Edinburgh
Jewish British scientists
Alumni of the University of Glasgow
|
https://en.wikipedia.org/wiki/Packet%20assembler/disassembler
|
A packet assembler/disassembler, abbreviated PAD is a communications device which provides multiple asynchronous terminal connectivity to an X.25 (packet-switching) network or host computer. It collects data from a group of terminals and places the data into X.25 packets (assembly). A PAD also does the reverse, it takes data packets from packet-switching network or host computer and returns them into a character stream that can be sent to the terminals (disassembly). A Frame Relay assembler/disassembler (FRAD) is a similar device for accessing Frame Relay networks.
ITU-T (Triple-X PAD)
The structure of a PAD is defined by the ITU-T in recommendations X.3, X.28, and X.29. Sometimes, this is referred to as a Triple-X PAD, due to the three X-series recommendations which define it:
X.3 specifies the parameters for terminal-handling functions such as line speed, flow control, character echo, et al. for a connection to an X.25 host. The X.3 parameters are similar in function to present-day Telnet options.
X.28 defines the DTE-C (asynchronous character mode) interface to a PAD, including the commands for making and clearing down connections, and manipulating the X.3 parameters. The commands were very crude, a bit like (but not at all compatible with) the Hayes command set. Many commercial PAD products provided completely different enhanced user interfaces.
X.29 defines the DTE-P (packet mode) interface to a PAD, i.e., how the PAD encapsulates characters and control information in X.25 packets.
Connections are established using X.121 14-digit X.25 addresses.
Green Book PAD
One of the UK Coloured Book protocols, Green Book, also defines two PAD protocols. Green Book was developed by (UK) Post Office Telecommunications in the 1970s. Although not identical to Triple-X, Green Book is sufficiently similar to X.3 and X.29 that generally the two will interwork. Green Book also specifies TS29, a very similar protocol which ran over the Yellow Book Transport Service, which is another of the Coloured Book protocols.
ITP
ITP (Interactive Terminal Protocol) was an early PAD protocol for use over X.25 developed in the 1970s for use with UK GPO's EPSS (Experimental Packet Switching System, the predecessor of PSS). ITP predated Triple-X, and is a completely different protocol. Science and Engineering Research Council (SERC) also used ITP on SERCnet and continued developing ITP after EPSS, although it eventually gave way to Triple-X.
See also
Terminal node controller
References
External links
ITP: Protocols in the SERC/NERC Network"
Packets (information technology)
X.25
|
https://en.wikipedia.org/wiki/Old%20Farmer%27s%20Almanac
|
The Old Farmer's Almanac is an almanac containing weather forecasts, planting charts, astronomical data, recipes, and articles. Topics include gardening, sports, astronomy, folklore, and predictions on trends in fashion, food, home, technology, and living for the coming year. Published every September, The Old Farmer's Almanac has been published continuously since 1792, making it the oldest continuously published periodical in North America. The publication was started by Robert B. Thomas and follows in the heritage of American almanacs such as Benjamin Franklin’s Poor Richard's Almanack.
Early history (1792–1850)
The first Old Farmer's Almanac (then known as The Farmer's Almanac) was edited by Robert Bailey Thomas, the publication's founder.
There were many competing almanacs in the 18th century, but Thomas's book was a success. In its second year, distribution tripled to 9,000. The initial cost of the book was six pence (about four cents).
To calculate the Almanacs weather predictions, Thomas studied solar activity, astronomy cycles and weather patterns and used his research to develop a secret forecasting formula, which is still in use today. Other than the Almanacs prognosticators, few people have seen the formula. It is kept in a black tin box at the Almanac offices in Dublin, New Hampshire.
Thomas also started drilling a hole through the Almanac so that subscribers could hang it from a nail or a string.
Thomas served as editor until his death on May 19, 1846. As its editor for more than 50 years, Thomas established The Old Farmer's Almanac as America's "most enduring" almanac by outlasting the competition.
Becoming "Old"
In 1832, with his almanac having survived longer than similarly named competitors, Thomas inserted the word "Old" in the title, later dropping it in the title of the 1836 edition. After Thomas's death, John Henry Jenks was appointed editor and, in 1848, the book's name was permanently and officially revised to The Old Farmer's Almanac.
19th and 20th centuries
In 1851, Jenks made another change to the Almanac when he featured a "four seasons" drawing on the cover by Boston artist Hammatt Billings, engraved by Henry Nichols. Jenks dropped the new cover for three years and then reinstated it permanently in 1855. This trademarked design is still in use today.
In 1858, Abraham Lincoln may have used a copy of The Old Farmer's Almanac to argue the innocence of his client, William "Duff" Armstrong, who was on trial for murder in Beardstown, Illinois. Lincoln used an almanac to refute the testimony of Charles Allen, an eyewitness who claimed he had seen the crime by the light of the moon on August 29, 1857.
The book stated that not only was the Moon in the first quarter, but it was riding "low" on the horizon, about to set. Because the actual almanac used in the trial was not retained for posterity, there exists some controversy as to whether The Old Farmer's Almanac was the one used. In 2007, a competing almanac, the
|
https://en.wikipedia.org/wiki/ASmallWorld
|
ASmallWorld (stylized as ASMALLWORLD, or ASW) is a media company and a social network based in Zürich, Switzerland. The company markets itself as "the world's leading travel & lifestyle community" and offers its services to travellers around the world.
Membership
The social network has a membership subscription model; offering three different tiers: the basic ASmallWorld, Prestige and Signature.
Events
Annually, in mid-December, over 200 members attend the Winter Weekend at the Gstaad Palace in Gstaad, Switzerland, where members can join in skiing, wine tastings, dinners, and black tie receptions.
History
In March 2004, Erik and Louise Wachtmeister founded ASmallWorld. It was dubbed "MySpace for millionaires" by The Wall Street Journal. To maintain its desired exclusivity, ASmallWorld, while initially free, was invitation-only, open only to those invited by an existing member. In October 2004, the platform had 30,000 users, mostly celebrities, models and bankers between 25 and 35 years old, living in Europe or North America. By August 2005, the platform had 68,000 members.
In May 2006, Harvey Weinstein's The Weinstein Company acquired a majority stake in the platform. Other investors included former AOL COO Robert W. Pittman, film director Renny Harlin, and entrepreneur Prince Alexander von Fürstenberg. At the time, ASmallWorld had approximately 130,000 members. Harvey Weinstein said his company planned to expand the site's membership and bring in additional advertisers. It was the Weinstein Company's first investment in an Internet company. After launching online advertising in 2006, the website had 100 partners. Advertisers included Jaguar Cars, Diane von Furstenberg, Mercedes-Benz, Cartier, and Moet & Chandon.
In October 2009, Swiss entrepreneur and investor Patrick Liotard-Vogt purchased a controlling stake in the company, now stylised ASMALLWORLD, and became its chairman. Sabine Heller became chief executive officer. At that time, membership was in excess of 500,000 members.
In July 2012, the company launched a mobile app for iOS. A mobile app for Android followed.
In February 2013, ASmallWorld announced that as of March 1, 2013, it would not be accepting new members, citing an initiative to ensure the integrity of the community. The company changed its strategy to focus on a smaller network and more perks for its members. After temporarily shutting down, ASW relaunched in May 2013 with a membership model and an advertising-free experience for its members. In March 2013, it acquired World's Finest Club, which offers exclusive access to clubs worldwide.
In April 2013, the company purged many members from its rolls, reducing its user base from 850,000 to 250,000 members.
On March 20, 2018, ASmallWorld AG became a public company via an initial public offering on the SIX Swiss Exchange, raising CHF 18 million.
In September 2018, the company acquired First Class & More International. In February 2019, the company acquired a UK-based tr
|
https://en.wikipedia.org/wiki/Swedish%20Institute%20of%20Computer%20Science
|
RISE SICS (previously Swedish Institute of Computer Science) is a leading research institute for applied information and communication technology in Sweden, founded in 1985.
It explores the digitalization of products, services and businesses.
In January 2005, SICS had about 88 employees, of which 77 were researchers, 30 with PhD degrees. , SICS had about 200 employees, of which 160 were researchers, 83 with PhD degrees. The institute is headquartered in the Kista district of Stockholm, with the main office in the Electrum building.
Software
Several well-known software packages have been developed at SICS:
Contiki, an operating system for small-memory embedded devices
Delegent, an authorization server
Distributed Interactive Virtual Environment or DIVE in short
lwIP, a TCP/IP stack for embedded systems
Oz-Mozart, a multi-platform programming system
Nemesis, a concept exokernel operating system
Protothreads, light-weight stackless threads
Quintus Prolog and SICStus Prolog, Prolog implementations
Simics, a full-system simulator originally developed at SICS
uIP, a TCP/IP stack for embedded systems
Academic output
The research at SICS results in approximately 100 refereed publications in academic journals, conferences and workshops per year. Around 2-4 SICS researchers receive higher academic degrees per year, and 1-3 persons move to academia for tenured positions.
SICS was ranked as the 15th most acknowledged computer science research institution in the world in an article in the December 2004 issue of the highly esteemed journal Proceedings of the National Academy of Sciences (PNAS). SICS is the only Swedish institution included in the list, and is one of two European institutions (the other one is INRIA) alongside 13 well-known American institutions, several of them larger than SICS.
Notable spin-off companies
Dynarc (1997)
Effnet (1997)
Virtutech (1998)
PipeBeach (1998)
Tacton Systems (1998) - knowledge based solutions for sales and product configuration
BotBox (1999)
Voxi (1999)
VerySolid (2004)
Axiomatics (2006) - security solutions for digital data assets
Asimus (2006) - search technology
Peerialism (2007) - scalable and flexible file storage and video streaming solutions
Gavagai (2008) - scalable and robust representation of semantics of linguistic data
Funding
SICS is owned jointly, 60% by the Swedish government, and 40% by Swedish industry. The government owners are the Research Institutes of Sweden (RISE), Swedish ICT, and the Defence Materiel Administration (FMV). The industry owners are a consortium of Ericsson, Asea Brown Boveri (ABB), Saab Group, Green Cargo, Bombardier Transportation, and TeliaSonera.
SICS research is funded by the owners, by national funding sources, often Vinnova (the Swedish Government Agency for Innovation Systems) and the Swedish Foundation for Strategic Research (SSF), and by industrial collaboration partners. SICS also participates in several European research projects funded by the Eur
|
https://en.wikipedia.org/wiki/IEEE%20Transactions%20on%20Software%20Engineering
|
The IEEE Transactions on Software Engineering is a monthly peer-reviewed scientific journal published by the IEEE Computer Society. It was established in 1975 and covers the area of software engineering. It is considered the leading journal in this field.
Abstracting and indexing
The journal is abstracted and indexed in the Science Citation Index Expanded and Current Contents/Engineering, Computing & Technology. According to the Journal Citation Reports, the journal has a 2021 impact factor of 9.322.
Past editors-in-chief
See also
IEEE Software
IET Software
References
External links
Transactions on Software Engineering
Computer science journals
Software engineering publications
Monthly journals
Academic journals established in 1975
English-language journals
|
https://en.wikipedia.org/wiki/Multidimensional%20hierarchical%20toolkit
|
The Multidimensional hierarchical toolkit or Multi-Dimensional and Hierarchical (MDH) Database Toolkit is a Linux-based, open-sourced, toolkit of portable software that supports very fast, flexible, multi-dimensional and hierarchical storage, retrieval and manipulation of information in databases ranging in size up to 256 terabytes. The package is written in C and C++ and is available under the GNU GPL/LGPL/Free Documentation licenses in source code form. The distribution kit contains demonstration implementations of network-capable, interactive text and sequence retrieval tools that function with very large genomic data bases and illustrate the toolkit's capability to manipulate massive data sets of genomic information.
Distribution
The toolkit is distributed as part of the Mumps Compiler. Versions exist for Linux, Cygwin, and Windows XP.
Origins
The toolkit is a solution to the problem of manipulating very large, character string indexed, multi-dimensional, sparse matrices. It is based on MUMPS (also referred to as M), a general purpose programming language that originated in the mid 60's at the Massachusetts General Hospital.
Key features
The principal database feature in this project is the global array which permits direct, efficient manipulation of multi-dimensional arrays of effectively unlimited size. A global array is a persistent, sparse, undeclared, multi-dimensional, string indexed data disk based structure. A global array may appear anywhere an ordinary array reference is permitted and data may be stored at leaf nodes as well as intermediate nodes in the data base array. The number of subscripts in an array reference is limited only by the total length of the array reference with all subscripts expanded to their string values. The toolkit includes several functions to traverse the data base and manipulate the arrays.
The toolkit makes the data base and function set available as C++ classes and also permits interpretive execution of legacy Mumps scripts. To use the toolkit, you install the MDH and Mumps distribution kit and related code.
Functions implemented
The toolkit implements the legacy Mumps functions: $ascii(), $extract(), $find(), , $length(), $name(), $justify(), $order(), $piece(), and $test as well as vector and matrix operations, Boyer–Moore–Gosper string search algorithm functions, a Smith–Waterman algorithm function, relational algebra operations and access to the Perl Compatible Regular Expression library (PCRE).
Science software for Linux
|
https://en.wikipedia.org/wiki/Lithuanian%20National%20Radio%20and%20Television
|
Lithuanian National Radio and Television (Lithuanian: Lietuvos nacionalinis radijas ir televizija) is a non-profit news network that has been providing regular radio services since 1926 and television broadcasts since 1957. LRT joined the European Broadcasting Union in 1993. LRT operates three national television channels, radio stations and an internet website.
LRT is the largest media group in Lithuania and is publicly owned. Its main purpose is to serve the public interest and the public's right to trustworthy and objective information. LRT's radio and television services operate from its headquarters in Vilnius. LRT radijas, the main LRT radio station, has the biggest share in Lithuanian radio market and pays most of attention to the operative news and educative on-air production.
History
The Lithuanian Radio started regular broadcasting on 12 June 1926. The television service has been broadcasting since 30 April 1957. In 1965, radio broadcasts were started in English. In 1975, the first coloured programme from LRT was broadcast. Radio and television services are now operating from LRT headquarters in Vilnius, the capital of Lithuania. At the end of 2019, LRT employed approx. 600 people.
In May 2007 LRT started a project of converting all of its films, including some five thousand hours of cinefilm and some 30,000 hours of videotapes to digital. The oldest entry dates back to 1895.
LRT comprises seven media channels broadcasting nation-wide. The content of all the channels is integrated and shared across all three platforms: television, radio, and on-line (web-portal and LRT's accounts on social media networks). LRT produces around two-thirds of its content in-house, while one third is commissioned from external producers.
In delivering international news coverage, LRT cooperates with private and public media, including Deutsche Welle, Voice of America, Radio Free Europe/Radio Liberty, and others. LRT was admitted as a fully active member of the European Broadcasting Union on 1 January 1993. From the restoration of independence in 1991 to 31 December 1992, LRT was a member of the International Radio and Television Organisation.
Governance
The LRT Council is the highest governing institution of LRT. The Council supervises the implementation of the LRT mission, approves the annual income and spending by LRT administration. The Council comprises twelve members prominent in social, scientific and cultural fields, appointed for six-year terms.
On financial issues, the LRT Council and the management are being consulted by the LRT Administrative Commission. The Administrative Commission is made up of five members – management and (or) finance specialists – who are appointed by the Council for a term of four years.
Currently, the LRT Council is chaired by Eugenijus Valatka with Irena Vaišvilaitė acting as Vice-Chair.
Budget
LRT operations are funded by taxpayers. LRT budget depends directly on taxes collected in the year before the last. T
|
https://en.wikipedia.org/wiki/IBM%20Tivoli%20Storage%20Manager
|
IBM Storage Protect (IBM Spectrum Protect, Tivoli Storage Manager) is a data protection platform that gives enterprises a single point of control and administration for backup and recovery. It is the flagship product in the IBM Spectrum Protect (Tivoli Storage Manager) family.
It enables backups and recovery for virtual, physical and cloud environments of all sizes.
This product is part of the IBM Spectrum Software Defined Storage suite of products and is unrelated to the Tivoli Management Framework.
History
TSM descended from a project done at IBM's Almaden Research Center around 1988 to back up VM/CMS systems. The first product that emerged was Workstation Data Save Facility (WDSF). WDSF's original purpose was to back up PC/DOS, OS/2, and AIX workstation data onto a VM/CMS (and later MVS) server. WDSF morphed into ADSTAR Distributed Storage Manager (ADSM) and was re-branded Tivoli Storage Manager in 1999.
The TSM database (through release 5.5) was a bespoke B+ tree database; although the TSM database used many of the same underlying technologies as IBM's Db2, has a SQL engine (for read-only use), and supports access through ODBC, the database had an architectural limit of approximately 530 GB, and 13 GB of log space. Starting with TSM 6.1, released in May 2009, TSM uses a Db2 instance as its database (thus eliminating the architectural limitations of the previous TSM database).
Product details
TSM maintains a relational database (limit 534GB through TSM v5.5, 4TB with TSM v6.3.3+) and recovery log (aka transaction log, limit 13 GB through TSM v5.5, 128GB with TSM v6.1+) for logging, configuration, statistical information, and object metadata. v5.5 DB pages are always 4KB, and partitions every 4MB. Single row inserts only. On average, 20GB of space is consumed for every 25 million objects. Shallow directory structures use less TSM DB space than deeper paths. This database may generally be queried via an emulated SQL-98 compliant interface, or through undocumented SHOW, CREATE or DELETE commands.
Actual user data is managed via a cascading hierarchy of storage media (Primary Storage Pools) presented as raw devices (UNIX), filesystem containers (Windows and Linux), streaming tape or optical media. Additionally, emulated tape from a Virtual Tape Library or EMC Centera WORM archival device is supported. Duplicate copies (backup sets or Copy Storage Pools) of any subset of data may be created on sequential media for redundancy or off-site management.
The 5.5 release of the TSM Server was supported on AIX, HP-UX, Linux, Solaris, Windows Server, and z/OS. The TSM Client of the same release is supported on NetWare, macOS, AIX, HP-UX, Linux, z/OS, Solaris, and Windows 32/64-bit. The 6.1 release of the TSM Server is supported on AIX, HP-UX, Linux, Solaris, and Windows Server, while the TSM Client is supported on the same operating systems as 5.5. On October 21, 2011, TSM 6.3 was released. Version 8.1.19 was released in June 2023
Comp
|
https://en.wikipedia.org/wiki/ACM%20Queue
|
ACM Queue is a bimonthly computer magazine founded and published by the Association for Computing Machinery (ACM). The magazine was established in 2003. Steve Bourne helped found the magazine when he was president of the ACM and is chair of the editorial board. The magazine is produced by computing professionals and is intended for computing professionals. It is available only in electronic form and is available on the Internet on subscription basis. Some of the articles published in Queue are also included in ACM's monthly magazine, Communications of the ACM, in the Practitioner section.
References
External links
Computer magazines published in the United States
Bimonthly magazines published in the United States
Association for Computing Machinery magazines
Magazines established in 2003
Magazines published in New York City
|
https://en.wikipedia.org/wiki/Spacenet
|
Acquired by SageNet in 2014, Spacenet, Inc. was a provider of VSAT satellite-based data network services as well as hybrid satellite/terrestrial networks and network management services. Spacenet was headquartered in Tysons Corner, Virginia in the United States.
Spacenet's primary business was providing VSAT and hybrid/terrestrial data network services to government and enterprise customers under the Connexstar brand. Spacenet's enterprise/government VSAT services are used for a wide range of applications such as primary broadband or narrowband networks, disaster recovery/backup networks and multicast file delivery. Beginning in 2006, it partnered with Cisco Systems as the service provider for the Cisco IP VSAT Satellite Network WAN Module in the United States. It held around 25% market share in the enterprise VSAT marketplace, according to the Comsys 2005 industry study. As of 2007, Spacenet equipment and services were in use at about 100,000 enterprise, government, residential and small office sites.
History
The company was founded in 1981 as Southern Pacific Communications Corporation (SPCC), a sister company to Sprint, providing satellite links for voice connections. The company was acquired by GTE in 1983 and grew into a worldwide satellite operator and services provider (including launching the first North American Ku band satellite, Spacenet 1). It went through several acquisitions over the next 15 years, absorbing AT&T Tridom and Contel ASC.
GTE Spacenet was sold to General Electric American Communications in 1994. AT&T sold the Tridom Corporation to Spacenet in 1997.
In 1998, GE Americom sold Spacenet's North American operations to VSAT terminal manufacturer Gilat Satellite Networks for $227.5 million in stock and spun the satellite assets off into GE Americom (which later became part of SES).
In March 2005, Gilat wholly acquired StarBand, the first two-way consumer satellite ISP in the United States, and merged StarBand's operations into Spacenet.
Andreas Georghiou became CEO of Spacenet the following year, in 2006. Under Georghiou, Spacenet acquired Chantilly, Virginia-based managed network services provider CICAT Networks in 2011.
In 2012, president and chief operating officer Glenn Katz became CEO of Spacenet, replacing Andreas Georghiou.
Following a loss of $2 million on $77 million in revenues in 2012 and faced with uncertainty about future spending by the U.S. Department of Defense, Gilat Satellite Networks sold Spacenet Inc. to Tulsa, Oklahoma-based managed network solutions provider SageNet for $16 million in 2013.
SageNet CEO Daryl Woodard replaced Glenn Katz as CEO of the new combined company in 2014, with Brad Wise becoming president. Spacenet was wholly absorbed into SageNet by the end of 2014 and became solely a brand name for SageNet's satellite services.
Satellite fleet
References
External links
Spacenet website
Spacenet history
Spacenet 1-3 satellites
GTE Spacenet satellites
Telecommunications co
|
https://en.wikipedia.org/wiki/Pod%20slurping
|
Pod slurping is the act of using a portable data storage device such as an iPod digital audio player to illicitly download large quantities of confidential data by directly plugging it into a computer where the data are held, and which may be on the inside of a firewall.
There has been some work in the development of fixes to the problem, including a number of third-party security products that allow companies to set security policies related to USB device use, and features within operating systems that allow IT administrators or users to disable the USB port altogether. Unix-based or Unix-like systems can easily prevent users from mounting storage devices, and Microsoft has released instructions for preventing users from installing USB mass storage devices on its operating systems.
Additional measures include physical obstruction of the USB ports, with measures ranging from the simple filling of ports with epoxy resin to commercial solutions which deposit a lockable plug into the port.
See also
Data theft
Bluesnarfing
Sneakernet
References
External links
The following external links act as an indirect mechanism of further learning on this topic (e.g., detailed descriptions, examples, and implementations).
How To: Simple Podslurping Script
Podslurping and Bluesnarfing – The latest IT threats
Summary of Podslurping
Podslurping and related risks
Pod Slurping - an easy technique for stealing data (PDF file)
Pod Slurping or Podslurping
Early description of pod slurping activity
Pod Slurping example and presentation
Data security
|
https://en.wikipedia.org/wiki/UTEC
|
UTEC (University of Toronto Electronic Computer Mark I) was a computer built at the University of Toronto (UofT) in the early 1950s. It was the first computer in Canada, one of the first working computers in the world, although only built in a prototype form while awaiting funding for expansion into a full-scale version. This funding was eventually used to purchase a surplus Manchester Mark 1 from Ferranti in the UK instead, and UTEC quickly disappeared.
Background
Immediately after the end of World War II several members of the UofT staff met informally as the Committee on Computing Machines to discuss their computation needs over the next few years. In 1946 a small $1,000 grant was used to send one of the group's members to tour several US research labs to see their progress on computers and try to see what was possible given UofT's likely funding. Due to UofT's preeminent position in the Canadian research world, the tour was also followed by members of the Canadian Research Council.
In January 1947 the committee delivered a report suggesting the creation of a formal Computing Center, primarily as a service bureau to provide computing services both to the university and commercial interests, as well as the nucleus of a research group into computing machinery. Specifically they recommended the immediate renting of an IBM mechanical punched card-based calculator, building a simple differential analyzer, and the eventual purchase or construction of an electronic computer. The report noted that funding should be expected from both the National Research Council (NRC) and the Defense Research Board (DRB).
The DRB soon provided a grant of $6,500 to set up the Computation Center, with the Committee eventually selecting Kelly Gotlieb to run it. Additional funding followed in February 1948 with a $20,000 a year grant from a combined pool set up by the DRB and NRC. Although this was less than was hoped for, the IBM machinery was soon in place and being used to calculate several tables for Atomic Energy of Canada Limited (AECL). Additionally a small version of the differential analyzer was completed by September 1948, although it appears to have seen little use.
Preliminary work on an electronic computer also started about the same time with some experimental work in various circuit designs. However they also felt that in order to get a machine working quickly, a fully electronic design was simply too state of the art and had significant risk. Instead they considered building a copy of Bell Labs' Model 6 relay-based machine, which they had seen earlier. However, when they finally decided to go ahead with the project in August 1948, Northern Electric (Bell's arm in Canada) informed them they would charge $25,000 ($ in ) to license the Model 6 design.
At a meeting with the NRC in March 1949, the NRC turned down their request for additional funding for the license, and instead suggested that the Center invest in a fully electronic computer, upping the ye
|
https://en.wikipedia.org/wiki/DPLL
|
DPLL stands for:
DPLL algorithm, for solving the boolean satisfiability problem
Digital phase-locked loop, an electronic feedback system that generates a signal
|
https://en.wikipedia.org/wiki/Sumi
|
Sumi may refer to:
People
Names
Sumi Haru (1939–2014), American film and television actress
Sumi Hakim (born 1944), Indonesian fashion designer and former model
Sumi Helal, is a computer scientist
Sumi Hwang (born 1986), South Korean soprano
Sumi Jo (born 1962), South Korean lyric coloratura soprano
Sumi Khadka (born 1978), Nepalese actress and beauty queen
Sumi Nishihata (1935-2006), she was the wife of Peter Jenner
, Japanese actress, voice actress
Sumi Tonooka (born 1956), American jazz pianist and composer
Surnames
, Japanese female long-distance runner
, Japanese artist based in Bangkok
Hansjörg Sumi (born 1959), Swiss former ski jumper
, Japanese footballer
Peter Šumi (1895–1981) Yugoslav gymnast
, Japanese freelance announcer
Sharmin Sultana Sumi (better known as Sumi) is a Bangladeshi singer
Shreyaa Sumi (born 1987), Indian-American model
Fictional characters
Sumi Sakurasawa, a character in the Manga and Anime series Rent-a-girlfriend
Places
Bani Sumi', is a sub-district
Sumi Furasawa Site, is an archaeological site
Cultures
Sümi Naga, one of the major Naga ethnic groups in Nagaland, India
Sümi language spoken by the Sümi Nagas
Cinema
Sumi (film) Marathi language feature film
Sport
Sumi, of Miga, Quatchi, Sumi and Mukmuk, the mascots of the 2010 Winter Olympics and Paralympics
Sumi gaeshi, one of the 40 original throws in Judo
Sumi otoshi, one of the original 40 throws of Judo
Other uses
Inkstick or Sumi ink, Japanese solid ink
Ink wash painting or Sumi-e, Japanese ink wash painting
Software Usability Measurement Inventory (SUMI), a questionnaire for assessing quality of use of software by end users
Sumi, an honorific for Buddhist monks
See also
Sumii
Sumitani
Sume (disambiguation)
Sumie (disambiguation)
Sumy (disambiguation)
Japanese feminine given names
Feminine given names
Japanese-language surnames
|
https://en.wikipedia.org/wiki/HP%209800%20series
|
The HP 9800 is a family of what were initially called programmable calculators and later desktop computers that were made by Hewlett-Packard, replacing their first HP 9100 calculator. It is also named "98 line". The 9830 and its successors were true computers in the modern sense of the term, complete with a powerful BASIC language interpreter.
Models
Second generation
Chronologically, the models of the family were:
HP 9810A, a keystroke programmable computer with magnetic cards and LED display, introduced in 1971,
HP 9820A, introduced in 1972, was the first HP model that deals with algebraic input (not only RPN) featured a high level language simpler than BASIC that was later named high performance language (HPL),
HP 9821A, similar to the HP 9820A, however, with Compact Cassette tape drive with clear leaders instead of using magnetic cards. Tapes created on the HP 9821A could be read by the HP 9830A. Unlike later home computers which used standard cassette audio recorders which had to be manually put into record or play mode, it was completely controlled by software command, and could save and load to a file by number.
HP 9830A, introduced in 1972, was the top of the 9800 line, with the addition of a BASIC interpreter in read-only memory (ROM). HP itself referred to it as a "calculator".
All 98x0 and 9821 systems used the same I/O interfaces. A 400 line per minute 80-column thermal line printer was designed to fit on top of the 9820 and 9830.
Third generation
The success of the HP9830 led to a next generation with faster logic:
HP 9805A, the least expensive model using the same chassis as the HP46 (scientific) and HP81 (business) pocket calculators. This was a Programmable Calculator and had plug-in personality modules. It was introduced in 1973.
HP 9815A/S, the HP 9815A was HP's third generation high end RPN desktop and was introduced in 1975. It was much smaller, lighter and less expensive than its predecessor. It provided only a single line display but replaced the earlier card drives with a tape drive.
HP 9825A/B, introduced in 1976, and retired in 1983, featured HPL, a single-line alphanumeric display, and optional thermal printer,
HP 9831, an HP9825 with BASIC instead of HPL,
HP 9835, featured BASIC. There were two models, the A and B. The A had a CRT, and the B had a single-line display,
HP 9845 introduced first as a monochrome (9845A/S), then a high-performance monochrome (9845B/T) and a high performance color (9845C/T) model. The 9845 came with one tape drive, and optional second tape drive and 80 column wide thermal printer integrated into the base under the pillar-mounted display unit.
All the 98x5, with the exception of the 9805, used DC200 cartridge tapes, instead of cassette tapes. The 9825, 9831, 9835, and 9845 all used the same I/O interfaces. the 9815 had a unique I/O interface.
An ancestor of modern personal computers
The HP 9800 series were developed by HP's Loveland division (Calculator Products Division),
|
https://en.wikipedia.org/wiki/My%20Antonia%20%28film%29
|
My Antonia is a 1995 American cable made-for-television drama film based on the 1918 novel of the same name written by Willa Cather, produced for the USA Network. The movie was directed by Joseph Sargent and starred Jason Robards, Eva Marie Saint, and Neil Patrick Harris. It was filmed in part at the Stuhr Museum in Grand Island, Nebraska.
Cast
Jason Robards as Josiah Burden
Eva Marie Saint as Emmaline Burden
Neil Patrick Harris as Jimmy Burden
Jan Triska as Mr. Shimerda
Norbert Weisser as Otto
Anne Tremko as Lena Lingard
Travis Fine as Harry Paine
Mira Furlan as Mrs. Shimerda
Elina Löwensohn as Antonia Shimerda
Bobby Goldstein as Ambrosch Shimerda
T. Max Graham as Mr. Harling
John Livingston as Charley Harling
Pas Sarah Bernhardt as Sally Harling
Devon Arielle Cahill as Nina Harling
Lauren Montgomery as Yulka Shimerda
Cinnamon Schultz as Helga
Megan Birdsall as Margaret
Lemarrt Holman as Blindman Arnault
Abby Sullivan as Mrs. Carlsen
Betty Laird as Mrs. Vannis
Brendan McCurdy as Ambrosch Cuzak
Ian Atwood as Leo Cuzak
Tom Wees as Conductor
Brad Boesen as Traveling Salesman
Endre Hules as Russian Peter
Boris Lee Krutonog as Russian Pavel
Olek Krupa as Krajiek
Kyla Pratt as Yulka Cuzak
Myra Turley as Mrs. Harling
Blair Williamson as Marek Shimerda
References
External links
My Antonia at YouTube
1995 television films
1995 films
1995 drama films
Willa Cather
Films based on American novels
Films set in Nebraska
Films shot in Nebraska
Czech-American culture in Nebraska
Films directed by Joseph Sargent
Grand Island, Nebraska
USA Network original programming
American drama television films
1990s English-language films
1990s American films
English-language drama films
|
https://en.wikipedia.org/wiki/Cyberpsychology
|
Cyberpsychology (also known as Internet psychology, web psychology, or digital psychology) is a scientific inter-disciplinary domain that focuses on the psychological phenomena which emerge as a result of the human interaction with digital technology, particularly the Internet.
Overview
Cyberpsychology is the study of the human mind and behavior and how the culture of technology, specifically, virtual reality, the internet, cell phones and social media, affect them. Mainstream research studies focus on the effect of the Internet and cyberspace on the psychology of individuals and groups. Some hot topics include: online identity, online relationships, personality types in cyberspace, transference to computers, addiction to computers and Internet, regressive behavior in cyberspace, online gender-switching, etc. While much research in this field is based around Internet usage, cyberpsychology also includes the study of the psychological ramifications of cyborgs, artificial intelligence, and virtual reality. Cybersecurity is within cyberpsychology because it impacts the way that people live on a daily basis.
Professional Bodies
The British Psychological Society has a dedicated Cyberpsychology Section which was founded in 2018. Likewise the American Psychological Association has a dedicated division for Media Psychology & Technology.
Social media and cyberpsychological behavior
It was around the turn of the millennium that the United States broke the 50 percent mark in Internet use, personal computer use, and cell phone use. The relevance of human–computer interaction (HCI) research within the field of cyberpsychology may become more visible and necessary in understanding the current modern lifestyles of many people.
Facebook, the leading online social media platform globally, affects users' psychological status in multiple ways. Facebook follows the one-to-many communication pattern, allowing users to share information about their lives, including social activities and photographs. This feature was enhanced in 2012, when Facebook Messenger was implemented to allow users more one-on-one communication merging with the Facebook Chat feature. Facebook users enjoy the sense of being connected.
Comparison and low self-esteem
Social media can be deceptive when the user sees only the joyous or entertaining experiences in a friend's life and compares them to their own lesser experiences. Underestimating peers negative experiences correlates with greater loneliness and lower overall life satisfaction. Inviting constant comparisons inevitably lowers self-esteem and feelings of self-worth; hence, Facebook and other social media accounts appear to exploit a vulnerability in human nature.
Depression
Decreased self-esteem can increase depression. Facebook specifically is criticized for causing depression, especially among teenage users. A study concluded that frequent Facebook use invoked feelings of depression and inadequacy. Social psychologist Ethan Kro
|
https://en.wikipedia.org/wiki/WVEN-TV
|
WVEN-TV (channel 43) is a television station licensed to Melbourne, Florida, United States, broadcasting the Spanish-language Univision network to the Orlando area. It is owned and operated by TelevisaUnivision alongside low-power, Class A UniMás outlet WRCF-CD (channel 29). Both stations share studios on Douglas Avenue in Altamonte Springs, while WVEN-TV's transmitter is located in unincorporated Bithlo, Florida.
History
The station was assigned on February 9, 1987 with the call sign of WLSY. On December 10 of that year, the call sign was changed to WAYQ. In 1988, Beach TV Partners signed on WAYQ at channel 26 as a simulcast of Melbourne's WAYK, giving them a signal in Daytona Beach. In early August 1990, owner Beach Television Partners based in Vero Beach filed for Chapter 11 reorganization over an inability to renegotiation loan payment schedule. At the time, the station was only carried part-time on CableVision of Central Florida, Orlando's major cable system. WAYK was affiliated with the Beach TV investor, Harry Handley, who founded the Star Television Network. The network launched in September 1990 only to close down on January 14, 1991.
In 1992, WAYK and WAYQ were both sold to Robert Rich, who changed their format to feature more paid programming. The two stations' callsigns were respectively changed to WIRB and WNTO on .
WVEN
In 1996, the two stations were split up with Paxson Communications acquiring WIRB (whose call letters would be changed to the present day WOPX-TV), while WNTO was purchased by Entravision Communications. On , WVEN became the station's call sign and the station also affiliated with Univision.
On December 4, 2017, as part of a channel swap made by Entravision Communications, WVEN and sister station WOTF swapped channel numbers, with WVEN moving from digital channel 49 and virtual channel 26 to digital and virtual channel 43.
On October 13, 2021, Univision announced it would take over operation of WVEN and WOTF, as well as Tampa Bay Univision affiliate WVEA-TV, effective January 1, 2022, coinciding with the end of licensing agreements on December 31, 2021.
News operation
WVEN produces evening newscasts at 6 and 11 p.m. newscast under the Noticias Univision Florida Central (formerly Noticias Univision Orlando until 2010), along with local news updates that are broadcast on weekday mornings during Univision's morning news program Despierta América under the title Despierta Orlando. WVEN previously partnered with now-former sister radio station WNUE-FM (which has since been sold to Radio Training Network in mid-2021, now airing a non-commercial Christian AC format), which provided them with news briefs and breaking news events as they warranted.
Technical information
Subchannels
The station's digital signal is multiplexed:
Analog-to-digital conversion
WVEN-TV ended programming on its analog signal, on UHF channel 26, on June 12, 2009, as part of the federally mandated transition from analog to digital television
|
https://en.wikipedia.org/wiki/WARJ
|
WARJ is a radio station licensed to Shawsville, Virginia, broadcasting the Air1 network to Roanoke, Virginia and the New River Valley. WARJ is owned by the Educational Media Foundation.
History
The station signed on in 2013 as WBZS. From its sign-on, the station was leased by owner George S. Flinn, Jr., to Three Daughters Media, which simulcast the talk format of WIQO-FM Lynchburg.
WBZS entered into a three-year lease to Community Media Group, owner of adult album alternative WVMP, on December 1, 2016.
On February 1, 2018, the AAA format moved exclusively to WBZS, which rebranded as "102.5 The Mountain".
Upon the lease ending on December 1, 2019, the AAA programming moved back to WVMP.
In April 2020, Flinn donated the station's signal to air a noncommercial news/talk format focusing specifically on coverage of the COVID-19 pandemic in the New River Valley. The station was led by WVMP's former general manager and a volunteer staff, with on-air hosts remote working from home studios. Three months later, he sold the station and eight others to the Educational Media Foundation for $3.4 million. Upon the sale being consummated on October 29, 2020, the call letters were changed to WARJ, as the station picked up EMF's Air1 network.
References
External links
2013 establishments in Virginia
Radio stations established in 2013
Educational Media Foundation radio stations
Air1 radio stations
ARJ
|
https://en.wikipedia.org/wiki/ECosCentric
|
eCosCentric Limited is a privately held company dedicated to open source software, with a distinct focus on eCos (Embedded Configurable Operating System). Founded in 2002 by the original eCos developers, it has headquarters in Cambridge, England from where it continues to support, develop and provide commercial services for eCos and RedBoot. eCosCentric also provides a commercially strengthened version of eCos, eCosPro, which is targeted at professional developers looking to integrate eCos within commercial products.
In 2017, eCosCentric Limited announced the latest 4.1 release of eCosPro, a "stable, fully tested and supported version of the operating system and RedBoot bootstrap firmware."
References
External links
Official website
eCos
Technology companies of England
Companies established in 2002
Free software companies
Companies based in Cambridge
2002 establishments in England
|
https://en.wikipedia.org/wiki/RedBoot
|
RedBoot (an acronym for Red Hat Embedded Debug and Bootstrap firmware) is an open-source application that uses the eCos real-time operating system Hardware Abstraction Layer to provide bootstrap firmware for embedded systems.
RedBoot allows download and execution of embedded applications via serial or Ethernet, including embedded Linux and eCos applications. It provides debug support in conjunction with GDB to allow development and debugging of embedded applications. It also provides an interactive command line interface to allow management of the Flash images, image download, RedBoot configuration, etc., accessible via serial or Ethernet. For unattended or automated startup, boot scripts can be stored in Flash allowing, for example, loading of images from Flash, hard disk, or a TFTP server.
See also
Comparison of boot loaders
Das U-Boot
Coreboot
References
External links
http://ecos.sourceware.org/redboot/
http://www.ecoscentric.com/ecos/redboot.shtml
http://wiki.openwrt.org/doc/techref/bootloader/redboot
Boot loaders
Free boot loaders
|
https://en.wikipedia.org/wiki/Nova%2093.7
|
Nova 93.7 (call sign: 6PER) is a commercial radio station in Perth, Western Australia. Jointly owned by NOVA Entertainment and Australian Radio Network, it was established in the Perth market on 5 December 2002. Nova 93.7 was launched at 3pm by the Red Hot Chili Peppers and by current drive presenter Tim Blackwell, with "Can't Stop" the first song being aired.
Nova 93.7 is only the second commercial FM radio station in Perth to not have previously been an AM station. The first was ARN's 96fm.
Controversies
Rigged competition
In April 2010, announcer Hans Bruechle tipped off his friend Ashlea Reid when he was about to play the secret song. The radio station was alerted to the rigging by a friend of both Reid and Bruechle. Following the incident Nova gave the prize to youth suicide prevention charity Youth Focus and Bruechle was fired.
Announcers
Nathan, Nat & Shaun (Breakfast) 6:00am–9:00am
Ross Wallman (Mornings) 9:00am–12:00pm
Ben Carney (Afternoons) 12:00pm–2:00pm
The Chrissie Swan Show (Afternoons) 2:00pm–4:00pm
Ricki-Lee, Tim & Joel (Drive) 4:00pm–6:00pm
Fitzy & Wippa with Kate Ritchie (Drive) 6:00pm–7:00pm
Smallzy's Surgery (Nights) 7:00pm–10:00pm
Confidential with J.Mo and Angie Kent 7:00pm–8:00pm (Sunday)
News
Ellie Petricevic (News)
Scott Cunningham (News)
Michelle Stephenson (National News Manager)
References
External links
Nova 93.7's homepage
NOVA Entertainment
Radio stations in Perth, Western Australia
Radio stations established in 2002
Contemporary hit radio stations in Australia
Nova Entertainment
Australian Radio Network
|
https://en.wikipedia.org/wiki/Universal%203D
|
Universal 3D (U3D) is a compressed file format standard for 3D computer graphics data.
The format was defined by a special consortium called 3D Industry Forum that brought together a diverse group of companies and organizations, including Intel, Boeing, HP, Adobe Systems, Bentley Systems, Right Hemisphere and others whose main focus had been the promotional development of 3D graphics for use in various industries, specifically at this time manufacturing as well as construction and industrial plant design. The format was later standardized by Ecma International in August 2005 as ECMA-363.
The goal is a universal standard for three-dimensional data of all kinds, to facilitate data exchange. The consortium promoted also the development of an open source library for facilitating the adoption of the format.
The format is natively supported by the PDF format and 3D objects in U3D format can be inserted into PDF documents and interactively visualized by Acrobat Reader (since version 7).
Editions
There are four editions to date.
The first edition is supported by many/all of the various applications mentioned below. It is capable of storing vertex based geometry, color, textures, lighting, bones, and transform based animation.
The second and third editions correct some errata in the first edition, and the third edition also adds the concept of vendor specified blocks. One such block widely deployed is the RHAdobeMesh block, which provides a more compressed alternative to the mesh blocks defined in the first edition. Deep Exploration, Tetra4D for Acrobat Pro and PDF3D-SDK can author this data, and Adobe Acrobat and Reader 8.1 can read this data.
The fourth edition provides definitions for higher order primitives (curved surfaces).
Application support
Applications which support PDFs with embedded U3D objects include:
Adobe Acrobat Pro allows PDF creation and conversion of various file formats to U3D within the PDF. Acrobat Pro allows PDF creation and embedding of pre-created U3D files.
Adobe Photoshop CS3, CS4 and CS5 Extended are able to export a 3D Layer as a U3D file.
Adobe Substance 3D rendering software.
ArchiCAD allows export of U3D files.
Bluebeam Revu Allows PDF creation and embedding of U3D within the PDF. Comes packaged with plugins that can export 3D PDFs from Revit and Solidworks.
Daz Studio Allows export to U3D.
iText open source Java library allows creation of PDF containing U3D
Jreality, an open source mathematical visualization package with 3D-PDF and U3D export
MeVisLab supports export of U3D models for biomedical images.
MicroStation allows export of PDF containing U3D.
Poser 7
Autodesk Inventor allows saving of files to 3D PDF containing U3D. Soon available since version 2017.
KeyCreator allows reading of U3D data from U3D and PDF files and exporting models to U3D and embedding in 3D PDF.
Siemens Solid Edge allows exorting and saving of files to 3D PDF containing U3D. And also other 3D file Docs.
SolidWorks a
|
https://en.wikipedia.org/wiki/UDB
|
UDB may refer to:
Computing
Universal Database, the original name of the IBM Db2 database
Universal Desktop Box, a line of desktop computers originally named DEC Multia
User database, for T9 predictive text
Ultimate Doom Builder, the level/script editor for the first-person shooter Doom and its derivatives.
Undo debugger, a form of Time travel debugging
Politics
Bolivian Democratic Union (), a former right-wing political party in Bolivia
Breton Democratic Union (Union Démocratique Bretonne), the main Breton autonomist political party
Belgian Democratic Union (Union Démocratique Belge), a short-lived Belgian political party after the Second World War
Other uses
Dakar Bourguiba University () in Dakar, Senegal
Universidad Don Bosco, a university in El Salvador
Urbancorp Development Bank, a subsidiary of Urban Bank, Philippines
See also
Uganda Development Bank Limited (UDBL), a development financial institution, owned by the Government of Uganda
Uprava državne bezbednosti (UDBA), the secret police organization of the Socialist Federal Republic of Yugoslavia
|
https://en.wikipedia.org/wiki/ATM%20%28computer%29
|
The ATM Turbo (ru: "АТМ-ТУРБО"), also known simply as ATM (from ru: "Ассоциация Творческой Молодёжи", meaning "Association of Creative Youth") is a ZX Spectrum clone, developed in Moscow in 1991, by two firms, MicroArt and ATM.
It offers enhanced characteristics, compared to the original Spectrum, such as a , RAM, ROM, AY-8910 (two chips in upgraded models), 8-bit DAC, 8-bit 8-channel ADC, RS-232, parallel port, Beta Disk Interface, IDE interface, AT/XT keyboard, text mode (, , ), and three new graphics modes.
The ATM can be emulated in Unreal Speccy v0.27 and higher.
History
ATM was developed in 1991 based on the Pentagon, a ZX Spectrum clone popular in Russia. In 1992 an upgraded model was introduced, named ATM Turbo 2. Up to 1994 the computer was produced by ATM and MicroArt; later the firms separated and production ended.
In 2004 NedoPC from Moscow resumed production. New versions called ATM Turbo 2+ and ZX Evolution were introduced.
Characteristics
Graphics modes
For compatibility purposes, the original ZX Spectrum mode is available.
New graphics modes offer expanded abilities:
mode, with 2 out of 16 colors per 8x1 pixels. The Profi offers a similar mode, but the ATM can use the full set for both ink and paper.
mode with a raster mode (a two-pixel chunky mode, not planar like EGA). Two games for this mode were converted directly from PC: Prince of Persia and Goblins, and one from Sony PlayStation: Time Gal. Other games that use this mode exist, like Ball Quest, released in August, 2006.
Palette:
from a 64 color palette (6-bit RGB) can be set for all modes.
Operating systems
48K Sinclair BASIC, 128K Sinclair BASIC, TR-DOS, CP/M, iS-DOS, TASiS, DNA OS, Mr Gluk Reset Service.
Software
ATM Turbo
Virtual TR-DOS
Models
Many models exist. Models before version 6.00 are called ATM 1, later models are called ATM 2(2+) or ATM Turbo 2(2+) or simply Turbo 2+. A IDE interface is available since v6.00.JIO0UBH9BY8B9T7GVC6R (the latest model is 7.18).
ATM Turbo 1 (1991)
Features:
Processor: Zilog Z80 at 3.5 and 7 MHz (turbo mode)
RAM: 128 to 512 KB
ROM: 64 to 128 KB
Memory manager: standard for ZX Spectrum 128 (memory over 64KB is addressed through a window in the upper 16KB of address space), with the ability to include a zero page of RAM in the lower 16KB of the address space
Graphics video modes: Standard ZX Spectrum mode (256x192, 2 colors per block of 8x8 pixels from 16 colors); 320x200 with 16 colors per pixel; 640x200 high resolution mode with 2 out of 16 colors per 8x1 pixels
Color palette: 64 colors, 16 can be used at the same time
Firmware: 48K BASIC / 128K BASIC; TR-DOS; CP/M 2.2
Supported external drives: tape recorder (audio cassette); disk drive
Sound devices: standard 1-bit beeper; AY-3-8910; Covox
Additional devices: SECAM encoder for connection to a color TV; single-channel DAC; modem; parallel interface for connecting a printer; stereo audio amplifier (2x1W)
Keyboard: mechanical matrix, standard ZX Spectrum lay
|
https://en.wikipedia.org/wiki/UBR
|
UBR may refer to:
Unspecified Bit Rate, a traffic contract used to guarantee quality of service for networks
Universal broadband router, an alternate name for a cable modem termination system
Uniform Business Rate, see Business rates in England and Wales
"U.B.R. (Unauthorized Biography of Rakim)", a song by Nas from the album Street's Disciple
Unmatched Brutality Records
University Boat Race
Ubrub Airport, Indonesia (by IATA airport code)
UDDI Business Registry (UBR), also known as the Public Cloud, is a conceptually single system built from multiple nodes having their data synchronized through replication.
|
https://en.wikipedia.org/wiki/List%20of%20Atari%20ST%20games
|
The following list contains game titles released for the Atari ST home computer systems.
0–9
'Nam 1965–1975
007: Licence to Kill
1st Math
10th Frame
12. Jahrhundert (Das)
1943: The Battle of Midway
1944
1789 la Révolution Française
1st Division Manager
20,000 Leagues Under the Sea
221B Baker Street
3-D Asteroids
3D Break-Thru
3D Construction Kit
3D Construction Kit II
3D Galax
3D Pool
3rd Reich
4 Saisons de l'ecrit (Les)
4D Sports Boxing
5 Intelligent Strategy Games
500cc Grand Prix
5th Gear
8 Ball Pool
9 Lives
A
À La Conquête De L'Orthographe – 4e/3e
À La Conquête De L'Orthographe – 6e/5e
À La Conquête De L'Orthographe – CE1/CE2
À La Conquête De L'Orthographe – CM1/CM2
A Prehistoric Tale
A.M.C.: Astro Marine Corps
A320 (Loriciel)
A320 Airbus
A320 Airbus – Edition USA (Expansion)
Aaargh!
Aazohm Krypht
ABZoo
Academy
Action Fighter
Action Service (aka Combat Course)
Addams Family, The
Addictaball
ADI 3e – Anglais
ADI 3e – Français
ADI 3e – Maths
ADI 4e – Anglais
ADI 4e – Français
ADI 4e – Maths
ADI 5e – Anglais
ADI 5e – Français
ADI 5e – Maths
ADI 6e – Anglais
ADI 6e – Français
ADI 6e – Maths
ADI CE1 – Français
ADI CE1 – Maths
ADI CE1 – Passage
ADI CE2 – Français
ADI CE2 – Maths
ADI CE2 – Passage
ADI CM1 – Français
ADI CM1 – Maths
ADI CM1 – Passage
ADI CM2 – Français
ADI CM2 – Maths
ADI CM2 – Passage
Adibac Anglais
Adibac Histoire
Adibac Maths A1/B
Adibac Maths C/E
Adibac Maths D/D
Adibou – Je Calcule 4–5 Ans
Adibou – Je Calcule 6–7 Ans
Adibou – Je Lis 4–5 Ans
Adibou – Je Lis 6–7 Ans
Adidas Championship Tie Break (aka Tie-Break)
Adrenalynn
Advanced Dungeons & Dragons: Heroes of the Lance
Advanced Destroyer Simulator
Advanced Fruit Machine Simulator
Advanced Rugby Simulator
Advanced Ski Simulator
Advantage Tennis
Adventurer
Adventures of Maddog Williams in the Dungeons of Duridian (The)
Adventures of Robin Hood (The)
Aesop's Fables
Affaire (L')
African Raiders-01
Afrika Korps
After Burner
After the War
AGE – Advanced Galactic Empire
Air Bucks
Air Supply
Air Support
Airball
Airborne Ranger
Airstrike USA (aka ATF II – Advanced Tactical Fighter II)
Albedo
Alcantor
Alcatraz
Alcon (aka Slap Fight)
ALF – The First Adventure
Aliants – The Desperate Battle for Earth
Alien Fires 2199 AD
Alien Storm
Alien Syndrome
Alien Thing – Exptert Edition
Alien World
All Aboard! Micro Gauge Train Set
All Blocked Up
Alpha Waves
Alphabet Mix
Alphabet Tutor
Alphamax
Alpine Games
Altair
Altered Beast
Alternate Reality: The City
Amazing Spider-Man (The)
Amazon
Amberstar
American Ice Hockey
American Pool II
Anarchy
Ancient Art of War in the Skies (The)
Ancient Games
Andes Attack
Angel Nieto Pole 500cc
Animal Kingdom
Annals of Rome
Annex
Another World
Answer Back Junior Quiz
Antago
Apache Flight
APB – All Points Bulletin
Apprentice
Aquanaut
Arcade Fruit Machine
Arcade Trivia Quiz
Archer Maclean's Pool (aka Pool, aka Billard Americain (Le))
Archipelagos
Arcticfox
Arena
Arkanoid
Arkanoid: Revenge of Doh
Armada
Armalyte
Armour-Geddon
Army Moves
Around the World
Art de la
|
https://en.wikipedia.org/wiki/Rede4
|
Rede4, now Pop, is a Mobile Virtual Network Operator, launched in 2005 in Portugal, over the network Optimus Telecomunicações, S.A.
Telecommunications companies established in 2005
Mobile virtual network operators
2005 establishments in Portugal
|
https://en.wikipedia.org/wiki/Quantum%20register
|
In quantum computing, a quantum register is a system comprising multiple qubits. It is the quantum analogue of the classical processor register. Quantum computers perform calculations by manipulating qubits within a quantum register.
Definition
It is usually assumed that the register consists of qubits. It is also generally assumed that registers are not density matrices, but that they are pure, although the definition of "register" can be extended to density matrices.
An size quantum register is a quantum system comprising pure qubits.
The Hilbert space, , in which the data is stored in a quantum register is given by where is the tensor product.
The number of dimensions of the Hilbert spaces depends on what kind of quantum systems the register is composed of. Qubits are 2-dimensional complex spaces (), while qutrits are 3-dimensional complex spaces (), et.c. For a register composed of N number of d-dimensional (or d-level) quantum systems we have the Hilbert space
The registers quantum state can in the bra-ket notation be written The values are probability amplitudes. Because of the Born rule and the 2nd axiom of probability theory, so the possible state space of the register is the surface of the unit sphere in
Examples:
The quantum state vector of a 5-qubit register is a unit vector in
A register of four qutrits similarly is a unit vector in
Quantum vs. classical register
First, there's a conceptual difference between the quantum and classical register.
An size classical register refers to an array of flip flops. An size quantum register is merely a collection of qubits.
Moreover, while an size classical register is able to store a single value of the possibilities spanned by classical pure bits, a quantum register is able to store all possibilities spanned by quantum pure qubits at the same time.
For example, consider a 2-bit-wide register. A classical register is able to store only one of the possible values represented by 2 bits - accordingly.
If we consider 2 pure qubits in superpositions and , using the quantum register definition it follows that it is capable of storing all the possible values (by having non-zero probability amplitude for all outcomes) spanned by two qubits simultaneously.
References
Further reading
Quantum information science
|
https://en.wikipedia.org/wiki/David%20Cheriton
|
David Ross Cheriton (born March 29, 1951) is a Canadian computer scientist, businessman, philanthropist, and venture capitalist. He is a computer science professor at Stanford University, where he founded and leads the Distributed Systems Group.
He is a distributed computing and computer networking expert, with insight into identifying big market opportunities and building the architectures needed to address such opportunities. He has founded and invested in technology companies, including Google, where he was among the first angel investors; VMware, where he was an early investor; and Arista, where he was cofounder and chief scientist. He has funded at least 20 companies.
Cheriton was ranked by Forbes with an estimated net worth of US$8.8 billion, as of April 2021. He has made contributions to education, with a $25 million donation to support graduate studies and research in the School of Computer Science (subsequently renamed David R. Cheriton School of Computer Science) at the University of Waterloo, a $7.5 million donation to the University of British Columbia, and a $12 million endowment in 2016 to Stanford University to support Computer Science faculty, graduate fellowships, and undergraduate scholarships.
Education
Born in Vancouver, British Columbia, Canada, Cheriton attended public schools in the Highlands neighborhood of Edmonton, Alberta, Canada.
He briefly attended the University of Alberta where he had applied for both mathematics and music. He was rejected by the music program, and then went on to study mathematics and received his Bachelor of Science (B.S.) degree from the University of British Columbia in 1973.
Cheriton received his Master of Science (M.S.) and Doctor of Philosophy (Ph.D.) degrees in computer science from the University of Waterloo in 1974 and 1978, respectively. He spent three years as an assistant professor at his Alma mater, the University of British Columbia, before moving to Stanford.
Research
Cheriton was involved in creating three microkernel operating systems (OSes). He was one of the early principal developers of Thoth, a real-time operating system, and then the Verex kernel. He then founded and led the Distributed Systems Group at Stanford University, which developed a microkernel OS named V. He has published profusely in the areas of distributed computing and computer networking. He won the prestigious SIGCOMM award in 2003, in recognition for his lifetime contribution to the field of telecommunications networks. Cheriton was the mentor and advisor of students such as: Sergey Brin and Larry Page (founders of Google), Kenneth Duda (founder of Arista Networks), Hugh Holbrook (VP Software Engineering at Arista Networks), Sandeep Singhal (was GM at Microsoft, now at Google), and Kieran Harty (CTO and founder of Tintri).
As of 2016, Cheriton is working with Stanford students on transactional memory, making memory systems that are resilient to failures.
Industry
Cheriton cofounded Granite Systems with
|
https://en.wikipedia.org/wiki/Bob%20Braden
|
Robert Braden (28 January 1934 – April 2018) was an American computer scientist who played a role in the development of the Internet. His research interests included end-to-end network protocols, especially in the transport and network layers.
Career
Braden received a Bachelor of Engineering Physics from Cornell University in 1957, and a Master of Science in physics from Stanford University in 1962. After graduating, he worked at Stanford and Carnegie Mellon University. He taught programming and operating systems courses at Stanford, Carnegie Mellon, and also UCLA, where he moved next.
He remained at UCLA for 18 years, 16 of them at the campus computing center. He spent 1981–1982 at the Computer Science Department of University College London. While there, he wrote the first relay system connecting the Internet with the U.K. academic X.25 network.
He joined the networking research group at the Information Sciences Institute (ISI) in 1986, and was a project leader in the Computer Networks Division. He was named an ISI Fellow in 2001.
Professional contributions
While at UCLA, Braden was responsible for attaching UCLA's IBM 360/91 supercomputer to the ARPAnet, beginning in 1970. He was active in the ARPAnet Network Working Group, contributing to the design of the File Transfer Protocol in particular.
In 1978, he became a member of the Internet Working Group, which developed TCP/IP, and began development of a TCP/IP implementation for UCLA's IBM system. The UCLA IBM software was distributed to other OS/MVS sites, and was later sold commercially.
In 1981, he was invited to join the Internet Configuration Control Board, the organization that later became the Internet Architecture Board (IAB). He later served for 13 years as a member of the IAB.
Braden had been a member of the Internet Engineering Task Force and the Internet Research Task Force since their inception. When IAB task forces were formed in 1986, he created the End-to-End Task Force, later known as the IRTF End-to-End Research Group, which he chaired and later ran as a networking community mailing list for a number of years. Among his many contributions during this period are:
Editing the Host Requirements RFCs
Developing the Resource Reservation Protocol
Developing T/TCP
Serving as co-editor of the Request for Comments (RFC) series.
Serving with the Internet Assigned Numbers Authority
Coordinating the DARPA research network DARTnet
Braden was a Fellow of the ACM.
External links
Carl Malamud interviews Bob Braden, Internet Talk Radio, 29 September 1993
Oral history interview with Robert Braden, Charles Babbage Institute, University of Minnesota
Obituary sent to the IETF mailing list
Sources
Gary Malkin, Who's Who in the Internet: Biographies of IAB, IESG and IRSG Members
RFC Editor, et al., 30 Years of RFCs
References
1934 births
2018 deaths
American computer scientists
Cornell University College of Engineering alumni
Academics of University College London
Internet pi
|
https://en.wikipedia.org/wiki/Ron%20Borges
|
Ron Borges is an American sportswriter for the Talk of Fame Network. He has previously written for The Boston Globe, the Boston Herald and was a regular guest on The Mike Felger Show, which aired on 890 ESPN radio until July 2008. Borges also was a regular contributor to the HBO.com's Boxing website until 2008. Borges also writes for The Sweet Science, a boxing website.
Awards
Borges has been named Massachusetts Sportswriter of the Year by the National Association of Sportswriters and Sports Broadcasters five times since 1999. He also holds the record for most first prizes and overall awards in the annual competition of the Professional Boxing Writers Association. He has also been awarded a half dozen writing awards in the Associated Press Sports Editors' annual competition and his work has been included in the annual anthology "Best Sports Stories" eight times. He has been awarded either a first or second prize 20 times in writing competitions held by the Professional Football Writers Association as well, including multiple awards in the same year three times. In 1995, he was the recipient of the Nat Fleischer Award for boxing journalism from the Boxing Writers Association of America. He is one of less than 25 boxing writers to ever receive that honor.
Criticism
Borges' hostile opinions have frequently earned him criticism. He has severely criticized Bill Belichick; some media figures, including Bill Simmons, have asserted that this is because Borges relied on former quarterback Drew Bledsoe, benched and traded by Belichick, as his primary source of Patriots information. Borges also wrote a controversial column asserting that Lance Armstrong is not an athlete.
Ron Borges also played a part in starting the long running feud between the Boston Globe and Boston sports talk radio station WEEI. In 1999, the Boston Globe'''s executive sports editor banned Globe sportswriters from appearing on WEEI's afternoon The Big Show after Borges appeared on it and allegedly used a racial slur to describe New York Yankees pitcher Hideki Irabu. Glenn Ordway, host of the show defended Borges stating that he was only trying to 'recall Yankees owner George Steinbrenner's infamous description of Irabu as a "fat, pussy toad." Ordway claims he corrected Borges on the air and was surprised when the ban was announced. Two weeks later, Skwar banned Globe sportswriters from appearing on WEEI's morning Dennis and Callahan Show because of its perceived lowbrow humor. After this ban, WEEI retaliated by banning Globe sportswriters from all WEEI programs.
Altercation with Michael Katz
In June 2004, Borges was involved in a physical altercation with New York Times and MaxBoxing.com reporter Michael Katz at a press conference in Las Vegas. Reports state that Katz was in the process of interviewing boxing promoter Bob Arum when Borges interrupted to ask Arum a question. Katz objected to the interruption and allegedly accused Borges of "being a shill for" boxing promoter Don
|
https://en.wikipedia.org/wiki/Herb%20Grosch
|
Herbert Reuben John Grosch (September 13, 1918 – January 18, 2010) was an early computer scientist, perhaps best known for Grosch's law, which he formulated in 1950. Grosch's Law is an aphorism that states "economy is as the square root of the speed."
Biography
Born September 13, 1918, in Saskatoon, Saskatchewan, Grosch was the first baby to survive incubator Grosch moved to Midland, Ontario as a child, then Pembroke, then Chatham, and later Windsor, Ontario.
Grosch moved to the United States where he received his B.S. and PhD in astronomy from the University of Michigan in 1942. In 1945, he was hired by IBM to do backup calculations for the Manhattan Project working at Watson Scientific Computing Laboratory at Columbia University. According to an IBM history, he had been previously employed as an optical engineer in defense industry and was eager to return to research. In 1951, he went on to work on Project Whirlwind at MIT, and on other early computer projects at General Electric. Back at IBM, he served as their first space program manager in 1958-1959.
Grosch served as editor of the journal Computerworld from 1973 to 1976, and he was the president of the American Rocket Society (which became the American Institute of Aeronautics and Astronautics) and the Association for Computing Machinery from 1976 to 1978.
Grosch received the Association for Computing Machinery Fellows Award in 1995, and the citation that accompanied it read, "A computer pioneer who managed important space and technology projects, Grosch is respected for discovering and describing the relationship between speed and cost of computers."
He was the second scientist hired by IBM (after Wallace J. Eckert) and the first employee at that company with facial hair, at a time when beards were prohibited by IBM.
On Grosch's religious views, he was an atheist.
Professorships
Columbia University, 1946-1951
Arizona State College, 1956
Boston University, 1972
NMSU Las Cruces, 1994
University of Nevada, Las Vegas, 2002 (Distinguished)
Institute for History and Philosophy of Science and Technology, University of Toronto, 2003-2010.
Publications
Elements and Ephemeris of Delaporte Object 1936 CA, with Maxwell, Allan D, Publications of the Observatory of the University of Michigan, Vol.6, No.11 (1937).
Integration Orbit and Mean Elements of Jupiter's Eighth Satellite, Ph. D. dissertation, University of Michigan (April 1942).
Positions of Pluto, with J.E. Willis, Astronomical Journal, Vol.50, No.14 (June 1942), pp. 14–15.
Ray Tracing on IBM Punched Card Equipment, Journal of the Optical Society of America, Vol.35, 803A (1945).
Bibliography on the Use of IBM Machines in Scientific Research, Statistics, and Education, IBM (1945).
Harmonic Analysis by the Use of Progressive Digiting, Proceedings of the 1946 Research Forum, IBM (1946).
The Orbit of the Eighth Satellite of Jupiter, Astronomical Journal, Vol.53, No.180 (1948) (a condensed published form of Grosch's 1942 Ph. D. thesis).
|
https://en.wikipedia.org/wiki/WDEV
|
WDEV (550 kHz) is a commercial AM radio station in Waterbury, Vermont. Programming is simulcast on WDEV-FM (96.1 MHz) licensed to Warren, Vermont. The stations' studios and offices are located near U.S. Route 2 in Waterbury. WDEV also operates two translator stations, W243AT (96.5 FM), licensed to Barre, Vermont, and W252CU (98.3 FM), licensed to Montpelier, Vermont. WDEV can also be heard on a privately owned translator, W270BR (101.9 FM), licensed to Island Pond, Vermont. The stations are owned by Radio Vermont, Inc., and air a full service radio format, including news, talk, sports and different genres of music.
History
WDEV first signed on the air on July 16, 1931. It is one of Vermont's earliest stations, going on the air after WCAX (now WVMT) in Burlington and WSYB in Rutland. WDEV had been owned by the Squier family and their company, Radio Vermont Group, since 1935. Lloyd Squier owned the station from 1935 until his death in 1979, and passed it to his son, NASCAR broadcaster Ken Squier.
In 1966, one year after The Sound of Music was released, the von Trapp family broadcast a public concert on WDEV from the family's lodge in Stowe, Vermont.
In 1991, Squier bought WDOT in Warren and changed its call sign to WDEV-FM. The FM station serves mainly to improve WDEV's coverage, particularly at night when the AM side must reduce power to 1,000 watts in order to protect other regional stations on the frequency such as WGR in Buffalo, New York, which likewise flips to a directional pattern to protect WDEV.
A 2003 article, in Harper's magazine, cited WDEV as one of the best examples of independent radio broadcasting in the United States.
In April 2017, Squier announced he had put the Radio Vermont stations up for sale, citing his age. On October 1, 2017, Squier turned the station over to Steve Cormier, who served as Radio Vermont's sales manager. The terms of the sale allow Squier to continue to have any role at the station he pleases. In October 2020, WDEV began soliciting donations from listeners.
Translators
In addition to the main station, WDEV is relayed by several translators.
Programming
News and talk
WDEV's news programming consists of several talk shows along with three major newscasts per day. The station's morning drive time program is called The Morning News Service, and the afternoon drive-time show is called The Afternoon News Service, with an additional newscast that airs at noon called The Midday News Service. The morning and afternoon news consist of local, state, and national news, in addition to interviews with reporters from WCAX-TV, Vermont's CBS affiliate, and VTDigger.org, an investigative news site. All newscasts feature a weather update from Roger Hill, the station's meteorologist. Week day programming features several local talk shows that span the political spectrum. Vermont radio veteran Ric Cengeri hosts “Vermont Viewpoint”, followed by Bill Sayer's “Common Sense Radio”, a conservative talk show. Ea
|
https://en.wikipedia.org/wiki/Ogle%20DVD%20Player
|
Ogle is a DVD player for Linux, and other Unix-like operating systems. It was released as free software under the GNU GPL license. It was originally developed in 1999 by a few students at Chalmers Tekniska Högskola (Chalmers University of Technology) in Göteborg, Sweden, and maintained until late 2003. It was the first free software/open source DVD player able to play DVD menus and can play CSS encrypted DVDs, but does not play DVDs with ripping protection schemes such as ARccOS Protection that are common on movie DVDs from major studios. Ogle does not play anything other than DVDs. Ogle runs from the command line, but with the FOX toolkit install it can be used with the Goggles GUI.
See also
List of codecs
References
Chalmers University of Technology
Free media players
Free video software
Linux DVD players
Optical disc-related software that uses GTK
Video player software that uses GTK
|
https://en.wikipedia.org/wiki/SIMpad
|
The SIMpad is a portable computer developed by the company Keith & Koep by order of Siemens AG, with an 8.4" TFT touchscreen. Commonly used with wireless network cards, it was marketed as a device to browse the World Wide Web. Initially announced in January 2001 at the Consumer Electronics Show.
There are five known model variants, all out of production:
CL4: The low-end model with 32 MB RAM and 16 MB Flash ROM without PC card slot but with DECT modem.
WP50: A variant sold by Swisscom. Same as the CL4.
T-Sinus Pad: A variant sold by Deutsche Telekom. This one is the same as the CL4 but with a PC card slot.
SL4: The high end model, with 64 MB RAM and 32 MB Flash ROM. This one also has a PC card slot.
SLC: Identical to the SL4, but with the addition of a Siemens MD34 DECT modem, allowing connection to certain Siemens ISDN telephone systems.
All variants contain:
An Intel StrongARM#SA-1110 SA-1110 32-bit RISC processor with a clock frequency of 206 MHz
An 8.4" TFT LCD with an SVGA resolution (800×600 pixels)
4-wire analog resistive touch interface
A single 16-bit PC card slot (not included in some CL4 models designed to use the Siemens MD34 DECT module)
A standard ISO/IEC 7816 SmartCard interface
A USB 1.1 client interface (not fully functional in production releases, but see Mullenger.org below)
An IrDA interface (V1.3, SIR)
A serial interface (proprietary Siemens "Lumberg" socket)
A 7.2 V 2800 mA·h Lithium Ion Battery (~4hr life)
A built-in mono speaker
A built-in microphone (not on CL4 models)
A headphone interface (proprietary Siemens "Lumberg" socket)
All devices weigh approximately 2.2 lb (1 kg) and measure 10.35 × 7.08 × 1.10 inches (263 mm ×181 mm × 30 mm). The SIMpad was initially released with the Handheld PC 2000 (Windows CE 3.0) operating system, while later units (mostly SL4 and SLC) were released with Windows CE.NET (Windows CE 4.0). Since the SIMpad was discontinued in 2002, all manufacturer support was also discontinued.
The OpenSIMpad project offers a SIMpad related Wiki where one can find information about Linux, Windows CE, hardware and mods.
External links
Developer's homepage
Portable computers
Embedded Linux
Siemens
|
https://en.wikipedia.org/wiki/Maximum%20segment%20lifetime
|
Maximum segment lifetime or MSL is the time a TCP segment can exist in the internetwork system. It was defined in 1981 to be .
The specification calls for this value to be used for the "time-wait" interval, the minimum time a system must keep the socket in the state before designating the socket closed, thus preventing the socket from being re-used before that interval.
Values in various operating systems
The command that can be used on Solaris systems (prior to v11) to determine the time-wait interval is:
ndd -get /dev/tcp tcp_time_wait_interval
60000 (60 seconds) is a common value.
On FreeBSD systems this description and value can be checked by the command sysctl:
sysctl -d net.inet.tcp.msl
sysctl net.inet.tcp.msl
which gets the result:
net.inet.tcp.msl: Maximum segment lifetime
net.inet.tcp.msl: 30000
In Linux, the time-wait interval is defined by the , hard-coded as 60 seconds. Linux implements several possible optimizations to shorten the state through recycling, down to a minimum of 3.5s in recent kernels.
References
Transmission Control Protocol
|
https://en.wikipedia.org/wiki/Independent%20hardware%20vendor
|
An independent hardware vendor (IHV) is a company specializing in making or selling computer hardware, usually for niche markets.
See also
Independent software vendor
Software company
Computer industry
vendor
|
https://en.wikipedia.org/wiki/Cartan%E2%80%93Karlhede%20algorithm
|
The Cartan–Karlhede algorithm is a procedure for completely classifying and comparing Riemannian manifolds. Given two Riemannian manifolds of the same dimension, it is not always obvious whether they are locally isometric. Élie Cartan, using his exterior calculus with his method of moving frames, showed that it is always possible to compare the manifolds. Carl Brans developed the method further, and the first practical implementation was presented by in 1980.
The main strategy of the algorithm is to take covariant derivatives of the Riemann tensor. Cartan showed that in n dimensions at most n(n+1)/2 differentiations suffice. If the Riemann tensor and its derivatives of the one manifold are algebraically compatible with the other, then the two manifolds are isometric. The Cartan–Karlhede algorithm therefore acts as a kind of generalization of the Petrov classification.
The potentially large number of derivatives can be computationally prohibitive. The algorithm was implemented in an early symbolic computation engine, SHEEP, but the size of the computations proved too challenging for early computer systems to handle. For most problems considered, far fewer derivatives than the maximum are actually required, and the algorithm is more manageable on modern computers. On the other hand, no publicly available version exists in more modern software.
Physical applications
The Cartan–Karlhede algorithm has important applications in general relativity. One reason for this is that the simpler notion of curvature invariants fails to distinguish spacetimes as well as they distinguish Riemannian manifolds. This difference in behavior is due ultimately to the fact that spacetimes have isotropy subgroups which are subgroups of the Lorentz group SO+(1,3), which is a noncompact Lie group, while four-dimensional Riemannian manifolds (i.e., with positive definite metric tensor), have isotropy groups which are subgroups of the compact Lie group SO(4).
In 4 dimensions, Karlhede's improvement to Cartan's program reduces the maximal number of covariant derivatives of the Riemann tensor needed to compare metrics to 7. In the worst case, this requires 3156 independent tensor components. There are known models of spacetime requiring all 7 covariant derivatives. For certain special families of spacetime models, however, often far fewer often suffice. It is now known, for example, that
at most one differentiation is required to compare any two null dust solutions,
at most two differentiations are required to compare any two Petrov D vacuum solutions,
at most three differentiations are required to compare any two perfect fluid solutions.
See also
Vanishing scalar invariant spacetime
Computer algebra system
Frame fields in general relativity
External links
Interactive Geometric Database includes some data derived from an implementation of the Cartan–Karlhede algorithm.
References
Riemannian geometry
Mathematical methods in general relativity
|
https://en.wikipedia.org/wiki/Craig%20Crossman
|
Craig Crossman is a national newspaper columnist for McClatchy newspapers, specializing in computer-related articles. Throughout the years his articles have appeared in hundreds of newspapers including The Washington Post, The Boston Globe, The Orange County Register, The Hawaiian Advertiser, The San Jose Mercury News and The Press-Enterprise. He attended Florida Atlantic University.
He created and hosts the programme Computer America, the longest running, nationally syndicated radio talk show about computers.
References
External links
Computer America
Craig Crossman's Computer America Not Just For Techies (1994 Boca Raton News article)
Year of birth missing (living people)
Living people
American talk radio hosts
|
https://en.wikipedia.org/wiki/Computer%20America
|
The Computer America Show is a talk radio/video program about technology ranging from consumer-level to new developments. Airing every weekday for two hours, it features interviews, regular correspondents who specialize in various fields, and a review of developments in technology news.
History
Craig Crossman began as a professional entertainer and singer. He later attained a Bachelor of Science in Computer Science from Florida Atlantic University. Additionally, Craig was a contributing editor for several tech magazines. His articles grew to a weekly column in the Miami Herald in the 1980s, one of the top ten newspapers in the USA at the time. The column was picked up by Knight Ridder (acquired by McClatchy Tribute), and the column reached a national readership once syndicated.
In 1991, Craig approached a local radio station, WJNO, about starting a tech radio program that eventually became Computer America. After a few years, the American Forum Radio Network approached him about syndicating during weekends. The national show entertained live audiences from several venues in South Florida, including The Roof Garden club and Palm Beach Atlantic University.
The show changed networks several times as a result of various mergers and acquisitions, and in 2012 the decision was made to self-syndicate.
Content and Distribution
Distribution
Historically, The Computer America Show has been more of a conventional talk radio program in which interviews and dialogue were conducted by phone and were audio-only. Switching to an internet distribution model has allowed the show to include a video component that has been used for on-air demonstrations and an overall more complete show experience. The audio is still broadcast live via terrestrial and internet radio networks, while the live video is hosted live on the show's website, and archived episodes are available through YouTube.
Interviews
The interviews typically run for the first hour of the program, with occasional half-hour interviews during the second hour.
Show Staff
Founder
Craig Crossman is the founder of the show and is now retired. He still books the show. Prior to hosting Computer America, he worked as a professional singer in Las Vegas and later as a manager of one of the early Apple stores.
Host
Ben Crossman, Craig's son, is now the host of the show.
Support Staff
Aaron Crossman, Craig's other son, helps with the development of content, the show's Web site, and the show in general, is Executive Producer and Webmaster.
American talk radio programs
|
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20Fv1976%20107
|
This runic inscription, designated as U Fv1976;107 under the Rundata catalog, is located at the Uppsala Cathedral in Uppsala, Sweden.
Description
The runic inscription consists of text inscribed on a thin intertwined beast with one upper loop around a Christian cross and two lower loops. This runestone was discovered in 1975 being used as building material at the southern buttress of the Vasa burial chapel during renovations at the Uppsala Cathedral. Many runestones have been reused in building, road, and bridge construction before their historical importance was recognized. The runic inscription was carved by the runemaster Öpir, whose signature is at the bottom of the inscription in a horizontal text band. Öpir was active in the Uppland region during the late eleventh or early twelfth centuries. The inscription is classified as being in runestone style Pr4, which is also known as the Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks.
The runic text is missing a pronoun, the word "his" before "brother." Öpir is known to have left off possessive pronouns in some of his other inscricriptions, such as that on U 993 in Brunnby. Additionally, he left off the final "ʀ" in rúnaʀ, or "runes," which he also did on inscriptions such as that on U 181 in Össeby-Garn.
Of the personal names listed in the runic inscription, Ketilbjôrn means "Kettle Bear" and Karlungr, originally used as a nickname, means "Young Man."
The Rundata designation for this Uppland inscription, U Fv1976;107, refers to the year and page number of the issue of Fornvännen in which the runestone was first described.
Inscription
A transliteration of the runic inscription into roman letters is:
...-arn * uk * brantr litu * risa * stin * at * karluk * faþur * sin in * kitilbiarn at * broþur ybir risti run
See also
Runic alphabet
References
External links
Riksantikvarieämbetet - photograph of inscription
Uppland Runic Inscription Fv1976;107
|
https://en.wikipedia.org/wiki/Wireless%20security
|
Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term may also refer to the protection of the wireless network itself from adversaries seeking to damage the confidentiality, integrity, or availability of the network. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard from 1997. It is a notoriously weak security standard: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP was superseded in 2003 by WPA, a quick alternative at the time to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.11X.
In January 2018, the Wi-Fi Alliance announced WPA3 as a replacement to WPA2. Certification began in June 2018, and WPA3 support has been mandatory for devices which bear the "Wi-Fi CERTIFIED™" logo since July 2020.
Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking is prone to some security issues. Hackers have found wireless networks relatively easy to break into, and even use wireless technology to hack into wired networks. As a result, it is very important that enterprises define effective wireless security policies that guard against unauthorized access to important resources. Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion Detection Systems (WIDS) are commonly used to enforce wireless security policies.
The risks to users of wireless technology have increased as the service has become more popular. There were relatively few dangers when wireless technology was first introduced. Hackers had not yet had time to latch on to the new technology, and wireless networks were not commonly found in the work place. However, there are many security risks associated with the current wireless protocols and encryption methods, and in the carelessness and ignorance that exists at the user and corporate IT level. Hacking methods have become much more sophisticated and innovative with wireless access. Hacking has also become much easier and more accessible with easy-to-use Windows- or Linux-based tools being made available on the web at no charge.
Some organizations that have no wireless access points installed do not feel that they need to address wireless security concerns. In-Stat MDR and META Group have estimated that 95% of all corporate laptop computers that were planned to be purchased in 2005 were equipped with wireless cards. I
|
https://en.wikipedia.org/wiki/SDSF
|
The System Display and Search Facility (SDSF) is a component of IBM's mainframe operating system, z/OS, is an interactive user interface that allows users and administrators to view and control various aspects of the mainframe's operation and system resources. Some of the information displayed in SDSF includes Batch job output, Unix processes, scheduling environments, and the status of external devices such as printers and network lines. SDSF is primarily used to access batch and system log files and dumps.
History
When it was a field-developed program offering, SDSF was known as the SPOOL Display and Search Facility The word SPOOL was changed to System when it became a program product in the late 1980s.
With z/OS Release 1.9 ,SDSF supports a REXX interface, allowing batch programs to use SDSF facilities. This support includes stem variables containing SDSF-originated information.
Prior to z/OS Release 1.10, SDSF was only supported for use with JES2 and not JES3, although ISV products from Phoenix Software International and Tone Software were available with similar functionality for JES3. At and beyond z/OS Release 1.10, SDSF fully supports JES3, including some new commands (JDS and ODS) to display the data/sets and job output for JES3 jobs.
With the release of z/OS V1R13, SDSF came packed with some interesting features like cursor-sensitive sort or point-and-shoot sort and extensive support for open logs from Rexx and Java-programmed environments.
Features
SDSF is organized as a collection of panels where each panel displays information about a specific aspect of the mainframe's operations. These panels are currently provided:
LOG: To see the current log of system activity.
DA: "Display Active users/jobs" or running processes.
I: Input Queue - shows jobs waiting execution.
H: Jobs on HOLD - either waiting to be released into Input or Output or actual copies of job JCL (Job Control Language) or previously executed jobs.
ST: Displays current status of all jobs. Job list can be filtered using the PRE primary command.
PR: Displays printers.
INIT: Displays Initiators (areas where jobs execute or run).
O: Output Queue
LINE: Network Job Entry (NJE) Lines
SR: System Requests
MAS: Members in a MAS (Multiple Access Spool)
JC: Job Classes
PS: z/OS UNIX Processes
RES: WLM ( Workload Manager) Resources
ENC: Enclaves
SE: Scheduling Environments
PUN: Punches
RDR: Readers
NODE: NJE (Network Job Entry) Nodes
SO: Spool offload
SP: Spool volumes
RM: Resource monitor
CK: Health checker
ULOG: User session log
On the ST panel, SDSF supports the following commands for each batch job. These commands are translated into a JES2 or JES3 command that performs the desired function:
C: Cancel a running job
S: Select job (view only)
SE: Select edit job (view in edit mode)
SJ: Show job (view original JCL of the job)
P: Purge a job (remove entirely)
See also
z/OS operating system, and its originator
|
https://en.wikipedia.org/wiki/Nickelodeon%20%28British%20and%20Irish%20TV%20channel%29
|
Nickelodeon (commonly shortened to Nick) is a British pay television network aimed at children aged 5 to 14.
On 1 September 1993, a localised version of the US channel launched in the United Kingdom and launched at a later date in Ireland. In the United Kingdom, the channel is available on Sky, Virgin Media, and TalkTalk Plus TV. In Ireland, the channel is available on Virgin Media Ireland, Eir TV and Sky Ireland. It is the first Nickelodeon feed launched overseas.
History
Nickelodeon was launched in the UK on 1 September 1993 exclusively on Sky as part of the Sky Multichannels package, originally airing for 12 hours from 7am to 7pm. and showing both cartoons and live action series. The first cartoon was James the Cat. Nick@Nite was also planned from early 1994 but never implemented; off-air Nickelodeon would air static logos, schedule information and teletext. From November 1995, it started to timeshare with Paramount Channel.
The British version of Nick Jr. also launched on the channel's first day, broadcasting during school hours. Live presentation followed in 1994, branded as Nick Alive!, which was soon moved into its own studio in the London Trocadero, and relocated to the station's new headquarters on Rathbone Place in 1995. In 1996, Nickelodeon reached an agreement with CBBC to show a block of CBBC programmes for one hour before and one hour after Nick Jr., called CBBC on Nickelodeon. This block lasted until 1999. Nick Jr. was taken off the main channel in July 2000, after launching its own channel the year before, and the increase of subscribers to Sky Digital and cable.
By August 1997, Nickelodeon started signing on at 6am. When Sky Digital was launched in 1998, it was in the original channel line-up on Astra 2A, now broadcasting from 6am until 10pm. However, analogue satellite and analogue cable services continued to shutdown the channel at 7pm each day until Nickelodeon closed on analogue satellite on 30 April 2001. Nicktoons was launched in the UK and Ireland in July 2002.
During the end of 2004, Telewest failed to reach an agreement to broadcast Nickelodeon, Nicktoons and Nick Jr. on their services after 2005 and the channels were removed from Telewest on 17 December, leading to many Telewest customers leaving for Sky and NTL, while Telewest offered either a free upgrade to Disney Channel or to Sky Movies to prevent loss of customers. By the next year, however, Nickelodeon successfully renegotiated with Telewest and the channels were restored.
In February 2010, Nickelodeon adopted the worldwide rebrand. The TeenNick block also adopted the identity of the American channel. In April 2010, Nicktoons and Nick Jr. took on their rebrand logos.
Nickelodeon HD was launched in October 2010 on Sky. Later, it was picked up by Virgin Media.
Since 1 January 2019, it broadcasts for 24 hours a day.
On 31 October 2022, Sky sold its stake in Nickelodeon UK, including Nickelodeon, to Paramount.
On 24 July 2023, Nickelodeon rebranded to t
|
https://en.wikipedia.org/wiki/Windows%20Server%20Update%20Services
|
Windows Server Update Services (WSUS), previously known as Software Update Services (SUS), is a computer program and network service developed by Microsoft Corporation that enables administrators to manage the distribution of updates and hotfixes released for Microsoft products to computers in a corporate environment. WSUS downloads these updates from the Microsoft Update website and then distributes them to computers on a network. WSUS is an integral component of Windows Server.
History
The first version of WSUS was known as Software Update Services (SUS). At first, it only delivered hotfixes and patches for Microsoft operating systems. SUS ran on a Windows Server operating system and downloaded updates for the specified versions of Windows from the remote Windows Update site, which is operated by Microsoft. Clients could then download updates from this internal server, rather than connecting directly to Windows Update. Support for SUS by Microsoft was originally planned to end on 6 December 2006, but based on user feedback, the date was extended to 10 July 2007.
WSUS builds on SUS by expanding the range of software it can update. The WSUS infrastructure allows automatic downloads of updates, hotfixes, service packs, device drivers and feature packs to clients in an organization from a central server or servers.
Operation
Windows Server Update Services 2.0 and above operate on a repository of update packages from Microsoft. It allows administrators to approve or decline updates before release, to force updates to install by a given date, and to produce extensive reports on which updates each machine requires. System administrators can also configure WSUS to approve certain classes of updates automatically (critical updates, security updates, service packs, drivers, etc.). One can also approve updates for detection only, allowing an administrator to see which machines will require a given update without also installing that update.
WSUS may be used to update computers on a disconnected network. This requires exporting patch data from a WSUS server connected to the internet and, using removable media, importing to a WSUS server set up on the disconnected network.
Administrators can use WSUS with Group Policy for client-side configuration of the Automatic Updates client, ensuring that end-users can't disable or circumvent corporate update policies. WSUS does not require the use of Active Directory; client configuration can also be applied by Local Group Policy or by modifying the Windows registry.
WSUS uses .NET Framework, Microsoft Management Console and Internet Information Services. WSUS 3.0 uses either SQL Server Express or Windows Internal Database as its database engine, whereas WSUS 2.0 uses WMSDE. System Center Configuration Manager (SCCM) interoperates with WSUS and can import third party security updates into the product.
Licensing
WSUS is a feature of the Windows Server product and therefore requires a valid Windows Server l
|
https://en.wikipedia.org/wiki/Robert%20Brunner
|
Robert Brunner (born 1958) is an American industrial designer. Brunner was the Director of Industrial Design for Apple Computer from 1989 to 1996, and is a founder and current partner at Ammunition Design Group.
Biography
Brunner received a Bachelor of Science degree in Industrial Design from San José State University in 1981.
After working as a designer and project manager at several high technology companies, Brunner went on to co-found Lunar Design in 1984. In 1989, Brunner accepted the position of Director of Industrial Design at Apple Computer, where he provided design and direction for all Apple product lines, including the PowerBook. He was succeeded by Jonathan Ive in 1997. Brunner claims that while with Apple, he hired Ive three times.
In January 1996, he became a partner in the San Francisco office of Pentagram. In 2006, Brunner partnered Alex Siow, founder of San Francisco-based Zephyr Ventilation, to launch outdoor grill design firm Fuego. Emblematic of his relationship with Siow, he designed the Arc Collection of modern range-hoods for Zephyr Ventilation.
By mid-2007 Brunner left Pentagram to start Ammunition Design Group. In 2008, former MetaDesign leaders Brett Wickens and Matt Rolandson joined Ammunition LLC as partners. In 2008, Brunner collaborated with Jimmy Iovine and Dr. Dre to launch Beats by Dre, and is responsible for the design of the company's lines of headphones and speakers including Beats Studio, Powerbeats, Mixr, Solo and Solo Pro as well as the Pill wireless speaker, among others.
Brunner's work has been widely published in North America, Europe, Asia and Australia. His product designs have won 23 IDSA Awards from the Industrial Designers Society of America and Business Week, including 6 best of category awards. His work is included in the permanent collections of the Museum of Modern Art (MoMA), Cooper Hewitt, Smithsonian Design Museum, Indianapolis Museum of Art (IMA), and the San Francisco Museum of Modern Art (SFMoMA).
See also
Apple Industrial Design Group
Pentagram
Ammunition Design Group
References
External links
Robert Brunner collection at the Museum of Modern Art (MoMA)
Robert Brunner collection at the Cooper Hewitt Museum
Living people
Apple Inc. employees
Computer designers
American industrial designers
1958 births
Pentagram partners (past and present)
|
https://en.wikipedia.org/wiki/IP%20Multimedia%20Services%20Identity%20Module
|
An IP Multimedia Services Identity Module (ISIM) is an application residing on the UICC, an IC card specified in TS 31.101. This module could be on a UMTS 3G or IMS VoLTE network. It contains parameters for identifying and authenticating the user to the IMS. The ISIM application can co-exist with SIM and USIM on the same UICC making it possible to use the same smartcard in both GSM networks and earlier releases of UMTS.
Among the data present on ISIM are an IP Multimedia Private Identity (IMPI), the home operator domain name, one or more IP Multimedia Public Identity (IMPU) and a long-term secret used to authenticate and calculate cipher keys. The first IMPU stored in the ISIM is used in emergency registration requests.
External links
3GPP TS 31.101 UICC-terminal interface; Physical and logical characteristics
3GPP TS 31.103 Characteristics of the IP Multimedia Services Identity Module (ISIM) application - ISIM standard
3GPP TS 24.229 IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3
Mobile telecommunications standards
3GPP standards
|
https://en.wikipedia.org/wiki/A594%20road%20%28Leicester%29
|
The A594 Central Ring is the name of Leicester's central distributor road network.
With the continuing regeneration of the inner city, the Central Ring has become a route within the city centre rather than one that encloses it; especially near the New Walk/Freemen's/University of Leicester and the Bede Island/Waterside/De Montfort University districts, to the south and west of the urban core respectively.
Length and shape
The road's length is approximately anti-clockwise and clockwise due to divergent one-way routings to the southeast. Typical distances from the city centre at Every Street to the Central Ring are between and .
The road is for the most part circular, but it forms a chevron pointing southwards as it merges into the A426 and A5199, Aylestone and Welford Roads. It is largely a dual carriageway urban clear route. There are grade-separated junctions at the A607 (flyover/overpass) to the north and at the A47 (underpass) to the west.
History
The inner ring road was constructed in stages in the 1960s/1970s. A 1974 map shows that the St Nicholas Circle had been constructed, as well as Vaughan Way and Burleys Way, to the junction with Belgrave Road.
The areas in which it was built had a pre-existing street pattern which it has somewhat disrupted. This may be seen most clearly in the eastern part of the ring road, which has severed streets like Bedford Street and Wharf Street into two sections, one in the city centre itself, and one in the nearby residential estate of St Matthew's, which has consequently become very isolated.
Route
Starting in the east, with a roundabout, with exits to the east (the A47, and Humberstone Gate to the west), it passes south along St George's Way, until it joins the route of the London Road (the A6), and becomes Waterloo Way for a short distance. It then turns south-west, leaving the railway station on the outer side of the ring-road, and continues south-west, parallel to the railway line, crossing New Walk. Towards the end of this section it nears Leicester Tigers ground, and a section of the old Waterloo Way near this end has been renamed Tigers Way.
It is here that the inner ring-road splits, with a one-way system causing clockwise and anticlockwise traffic to take different routes. The clockwise traffic uses Infirmary Road and then Oxford Street, passing by Leicester Royal Infirmary and De Montfort University, whilst anticlockwise traffic uses Welford Road and Newark Street.
West of the city centre, the two roads merge into the dual carriageway Vaughan Way. Just north of this is Saint Nicholas Circle, providing access into the old town and western retail core, and also west to the nearby bridge over the River Soar.
Southgates Underpass provides access for traffic going straight on at Saint Nicholas Circle, and joins up with Vaughan Way again at the north. Vaughan Way continues round, and then whilst heading north-east, becomes Burley's Way at the junction with the re-emerged A6, which heads
|
https://en.wikipedia.org/wiki/Social%20Security%20Death%20Index
|
The Social Security Death Index (SSDI) was a database of death records created from the United States Social Security Administration's Death Master File until 2014. Since 2014, public access to the updated Death Master File has been via the Limited Access Death Master File certification program instituted under Title 15 Part 1110. Most persons who have died since 1936 who had a Social Security Number (SSN) and whose death has been reported to the Social Security Administration are listed in the SSDI. For most years since 1973, the SSDI includes 93 percent to 96 percent of deaths of individuals aged 65 or older. It was frequently updated; the version of June 22, 2011 contained 89,835,920 records.
Unlike the Death Master File, the SSDI is available to the public at many online genealogy websites. The SSDI is a popular tool for genealogists and biographers because it contains valuable genealogical data. It is also useful for medical research such as clinical trials and epidemiology, because where survival data is missing from medical records (for reasons such as loss to follow-up), the SSDI can be used to backfill it.
Data contained
Data in the Social Security Death Index include:
Given name and surname; and since the 1990s, middle initial
Date of birth
Month and year of death; or full date of death for accounts active in 2000 or later
Social Security number
State or territory where the Social Security number was issued
Last place of residence while the person was alive (ZIP code).
Once a deceased person is found in the database, the person's application for Social Security card (Form SS-5) can be ordered from the Social Security Administration. The SS-5 may contain additional genealogical data, such as birthplace, father's name, and mother's full maiden name or that information may be blacked out.
Criticisms
A recent government audit revealed that the Social Security Administration had incorrectly listed 23,000 people as dead in a two-year period. These people have sometimes faced difficulties in convincing government agencies that they are actually alive; a 2008 story in the Nashville area focused on a woman who was incorrectly flagged as dead in the Social Security computers in 2000 and has had difficulties, such as having health insurance canceled and electronically filed tax returns rejected. This story also noted that people in this situation can be highly vulnerable to identity theft because of the release of their Social Security numbers.
In November 2011, due to privacy and identity theft concerns, the Social Security Administration redacted and no longer included death data derived from State sources. This resulted in an approximately 33% drop in reported deaths.
On December 18, 2011, Ancestry.com, changed access to the SSDI by moving the SSDI search behind a paywall, and stopped displaying the Social Security information of people who had died within the past 10 years. Some of their originally free information is now availab
|
https://en.wikipedia.org/wiki/Mohammad%20Kaykobad
|
Mohammad Kaykobad () is a computer scientist, educator, author, and columnist from Bangladesh. Along with Muhammed Zafar Iqbal, he started the national mathematics olympiad. He was a professor of computer science and engineering in Bangladesh University of Engineering and Technology.
and currently is a faculty member of computer science and engineering in BRAC University.Also a faculty member of University of information technology and Sciences.
Education
In 1970, Kaykobad finished his SSC from Manikganj Govt. High School and in 1972, his HSC from Debendra College. He did his M.S. in Engineering at the Institute of Marine Engineers, Odesa, Ukraine (then in the USSR), in 1979. He did his M.Eng. in computer applications technology at the Asian Institute of Technology, Thailand, in 1982. He did his PhD at the Flinders University of South Australia, in 1986 under the Supervision of Dr FJM Salzborn.
Career
Dr. Kaykobad served as an adviser to ICT Projects for e-Governance in Bangladesh. He was awarded the gold medal for contribution in ICT Education at a ceremony at Bangabandhu International Conference Center by Bangladesh Computer Society and was presented the award by the President of Bangladesh on 26 July 2005. He was recognized as the best coach of ACM International Collegiate Programming Contest by IBM at 26th World Finals of ACM ICPC at Honolulu, Hawaii on 22 March 2002. He researched the Computerization of class scheduling of different universities of Bangladesh which was submitted to University Grants Commission in 1995. He is a member of the Bangladesh Academy of Sciences.
Honors and awards
Received the Best Coach award in 2002 at Honolulu, Hawaii
Recognized as a distinguished alumnus by the Flinders University of South Australia.
References
1954 births
Living people
Fellows of Bangladesh Academy of Sciences
Asian Institute of Technology alumni
Academic staff of Bangladesh University of Engineering and Technology
People from Manikganj District
Bangladeshi computer scientists
|
https://en.wikipedia.org/wiki/IBM%20SQL/DS
|
SQL/DS (Structured Query Language/Data System), released in 1981, was IBM's first commercial relational-database management system. It implemented the SQL database-query language.
SQL/DS ran on the DOS/VSE and VM/CMS operating systems. A little later, IBM also introduced Db2, another SQL-based DBMS, this one for the MVS operating system. The two products have coexisted since then; however, SQL/DS was rebranded as "DB2 for VM and VSE" in the late 1990s.
Third party software
Software AG's Natural 4GL was an early third-party software product that facilitated using SQL/DS. Software AG used the name Natural 2/SQL-DS and, later on, for a related offering, Natural 2/DB2.
References
External links
SQL Reunion 1995: System R, SQL/DS
A History and Evaluation of System R
Sql DS
SQL/DS
SQL/DS
Relational database management systems
|
https://en.wikipedia.org/wiki/Sarah%20Gordon%20%28computer%20scientist%29
|
Sarah Gordon is a computer security researcher, responsible for early scientific and academic work on virus writers, hackers, and social issues in computing. She was among the first computer scientists to propose a multidisciplinary approach to computer security. Known primarily for work relating to people and computers, the bulk of her original technical work was published or presented between the late 1980s and mid-1990s.
Two of the first "concept viruses" for Microsoft products were discovered by Gordon, refuting the common belief that it was impossible to contract a virus via email and demonstrating the vulnerability of Microsoft Word to macro viruses in 1995. She also wrote the first report on Linux viruses in the wild. She is known for inventing the term "vX" to refer to Virus Exchange. Gordon has always been fascinated with linguistics, and has introduced several other terms into the computer lexicon, including "trigger foot" and "meaningfulness".
Dr. Gordon was appointed to the computer science graduate faculty of the Florida Institute of Technology in 2004. Although she has worked for several computer security companies, including Dr. Solomon's Software, Command Software, IBM Research, and Symantec Corporation, her work has continued to be primarily academic. Sarah Gordon is an alumnus of Indiana University South Bend, where she obtained a Bachelor of Science degree in 1997. She has a master's degree in Human Behaviour and Professional Counseling, and a Ph.D in Computer Science from Middlesex University.
External links
Sarah Gordon's personal website
References
Living people
Computer security academics
American computer scientists
American women computer scientists
Florida Institute of Technology faculty
IBM Research computer scientists
Gen Digital people
Indiana University South Bend alumni
Alumni of Middlesex University
Year of birth missing (living people)
American women academics
21st-century American women
|
https://en.wikipedia.org/wiki/VGG
|
VGG may refer to:
Volgograd Oblast
Van de Graaff generator
Verkehrsgesellschaft Görlitz
Visual Geometry Group, an academic group focused on computer vision at Oxford University
A deep convolutional network for object recognition developed and trained by this group.
Vice Grip Garage, a popular YouTube channel.
Vaush.gg, the website of the streamer Vaush.
|
https://en.wikipedia.org/wiki/Circuit%20identification%20code
|
The ISDN Services User Part (ISUP) Circuit Identification Code (CIC) is part of the Signaling System #7 which is used to set up telephone calls in Public Switched Telephone Networks as part of the Initial Address Message (IAM).
When a telephone call is set up from one subscriber to another, many telephone exchanges will be involved, possibly across international boundaries. To allow a call to be set up correctly, where ISUP is supported, a switch will signal call-related information like called or calling party number to the next switch in the network using ISUP messages. The CIC provides information about where the voice part of the call is carried - on which trunk and in which timeslot.
References
Integrated Services Digital Network
Signaling System 7
|
https://en.wikipedia.org/wiki/Codename%3A%20Strykeforce
|
Strykeforce is a team of mercenary superheroes created by Marc Silvestri and published by Top Cow, an imprint Image Comics. The comic series Codename: Strykeforce was an offshoot of Cyberforce.
Publication history
The comic series Codename: Strykeforce (January 1994 – August 1995) was an offshoot of Cyberforce, a comic series about a group of cyborg shock troops. The series lasted for fourteen issues. The first nine were written by David Wohl and Marc Silvestri and illustrated by Brandon Peterson, with the last five written by Steve Gerber and illustrated by Billy Tan. Fill-in artists included Joe Benitez in issue #8 and Michael Turner in issue #14. Issue #0 was published between #13 and 14 with story by Mike Heisler and art by Anthony Wynn. Gerber and Tan also handled the two-part Cyberforce/Codename: Strykeforce crossover.
The comic was relaunched in 2004 as Strykeforce, lasting for 5 issues. The relaunch was written by Jay Faerber and illustrated by Tyler Kirkham.
Fictional history
Issue #0
When a mission comes along that Cyberforce won't touch, Stryker puts together his team to take care of business. Team members include Stryker, a cyborg with three detachable cybernetic arms on his right side, Phade, a mutant with the ability to alter his molecular density, Black Anvil (often referred to simply as Anvil), a short cobalt blue powerhouse with incredible strength, Bloodbow, an expert marksman, and Icarus, a man with hollow bones possessing the power of flight. The mission turns out to be a set-up, and Phade disappears after using his powers for too long, causing his molecules to drift apart. The team discover that one of their opponents has also been deceived and she joins the team as Tempest, a woman with the power to control the weather. Between issues #0 and #1, Anvil is sent to the Himalayan Mountains to recruit Killrazor, a martial arts expert who can create knives from any portion of his body.
Death's Angel
Stryker and Icarus are sent to Ukraine to protect President Bill Clinton during a peace conference. The proceedings are attacked and Stryker protects the president but Icarus is killed. Several other dignitaries are abducted by a villain who called himself Death's Angel, and Strykeforce tracks him to his nuclear submarine. While fighting aboard the sub, the team narrowly prevents a nuclear missile strike on New York. Instead of payment for the mission, Strykeforce takes the sub as their new base of operations.
Stormwatch
Stryker and his team are tasked with a high-stakes mission to locate and capture an extraterrestrial capable of replicating human beings with alarming precision. With the help of Weatherman One Henry Bendix, they navigate the complex terrain of Skywatch in pursuit of this elusive and potentially dangerous entity. The alien duplicates Anvil and begins to stir up trouble between Strykeforce and Stormwatch, the super team that lives on the space station. The alien is eventually uncovered and fought by both teams. A
|
https://en.wikipedia.org/wiki/Sieve%20%28mail%20filtering%20language%29
|
Sieve is a programming language that can be used for email filtering. It owes its creation to the CMU Cyrus Project, creators of Cyrus IMAP server.
The language is not tied to any particular operating system or mail architecture. It requires the use of RFC-2822–compliant messages, but otherwise generalizes to other systems that meet these criteria. The current version of Sieve's base specification is outlined in RFC 5228, published in January 2008.
Language
Sieve is a data-driven programming language, similar to earlier email filtering languages such as procmail and maildrop, and earlier line-oriented languages such as sed and AWK: it specifies conditions to match and actions to take on matching.
This differs from general-purpose programming languages while this is highly limited – the base standard has no variables, and no loops (but does allow conditional branching), preventing runaway programs which limits the language to simple filtering operations. Although extensions have been devised to extend the language to include variables and, limited loops, the language is still highly restricted, and thus suitable for running user-devised programs as part of the mail system.
There are also a significant number of restrictions on the grammar of the language, in order to reduce the complexity of parsing the language, but the language also supports the use of multiple methods for comparing localized strings, and is fully Unicode-aware.
While Sieve was originally conceived as tool external to SMTP, serendipitously extends it in order to allow rejection at the SMTP protocol level.
Use
The Sieve scripts may be generated by a GUI-based rules editor or they may be entered directly using a text editor.
The scripts are transferred to the mail server in a server-dependent way. The ManageSieve protocol (defined in ) allows users to manage their Sieve scripts on a remote server. Mail servers with local users may allow the scripts to be stored in e.g. a file in the users' home directories.
History
The language was standardized in the (now-obsolete) of January 2001, by Tim Showalter.
Extensions
The IETF Sieve working group has updated the base specification in 2008 (), and has brought the following extensions to Proposed Standard status:
– Copying without side effects; allows a script to be copied across mailboxes without halting the script.
– Body; allows a script to test the body of a message, not just its header.
– Environment; provides access to information about the Sieve interpreter and its system environment.
– Variables; allows the script to save and retrieve values in variables.
– Vacation; specifies an action to send a response informing the sender that the recipient may be away.
– Relational tests; defines numeric tests, so that a script may test a field for a numeric value, and may test against the number of occurrences of a field.
– IMAP4flags; allows a script to test and set a message's IMAP flags.
– Subaddress; allows a
|
https://en.wikipedia.org/wiki/Wired%20glove
|
A wired glove (also called a dataglove or cyberglove) is an input device for human–computer interaction worn like a glove.
Various sensor technologies are used to capture physical data such as bending of fingers. Often a motion tracker, such as a magnetic tracking device or inertial tracking device, is attached to capture the global position/rotation data of the glove. These movements are then interpreted by the software that accompanies the glove, so any one movement can mean any number of things. Gestures can then be categorized into useful information, such as to recognize sign language or other symbolic functions.
Expensive high-end wired gloves can also provide haptic feedback, which is a simulation of the sense of touch. This allows a wired glove to also be used as an output device. Traditionally, wired gloves have only been available at a huge cost, with the finger bend sensors and the tracking device having to be bought separately.
Wired gloves are often used in virtual reality environments and to mimic human hand movement by robots.
History
The Sayre Glove, created by Electronic Visualization Laboratory in 1977, was the first wired glove.
In 1982 Thomas G. Zimmerman filed a patent (US Patent 4542291) on an optical flex sensor mounted in a glove to measure finger bending. Zimmerman worked with Jaron Lanier to incorporate ultrasonic and magnetic hand position tracking technology to create the Power Glove and Data Glove, respectively (US Patent 4988981, filed 1989). The optical flex sensor used in the Data Glove was invented by Young L. Harvill who scratched the fiber near the finger joint to make it locally sensitive to bending.
One of the first wired gloves available to home users in 1987 was the Nintendo Power Glove. This was designed as a gaming glove for the Nintendo Entertainment System. It had a crude tracker and finger bend sensors, plus buttons on the back. The resistive sensors in the PowerGlove were also used by hobbyists to create their own datagloves.
This was followed by the CyberGlove, created by Virtual Technologies, Inc. in 1990. Virtual Technologies was acquired by Immersion Corporation in September 2000. In 2009, the CyberGlove line of products was divested by Immersion Corporation and a new company, CyberGlove Systems LLC, took over development, manufacturing and sales of the CyberGlove.
In addition to the CyberGlove, Immersion Corp also developed three other data glove products: the CyberTouch, which vibrates each individual finger of the glove when a finger touches an object in virtual reality; the CyberGrasp which actually simulates squeezing and touching of solid as well as spongy objects; and the CyberForce device which does all of the above and also measures the precise motion of the user's entire arm.
In 2002, the P5 Glove was released by Essential Reality (hardware designed by Johathan Clarke and Leigh Boyd). In normal applications, it worked as a two-dimensional mouse and a few computer games were spe
|
https://en.wikipedia.org/wiki/Z-Wave
|
Z-Wave is a wireless communications protocol used primarily for residential and commercial building automation. It is a mesh network using low-energy radio waves to communicate from device to device, allowing for wireless control of smart home devices, such as smart lights, security systems, thermostats, sensors, smart door locks, and garage door openers. The Z-Wave brand and technology are owned by Silicon Labs. Over 300 companies involved in this technology are gathered within the Z-Wave Alliance.
Like other protocols and systems aimed at the residential, commercial, MDU and building markets, a Z-Wave system can be controlled from a smart phone, tablet, or computer, and locally through a smart speaker, wireless keyfob, or wall-mounted panel with a Z-Wave gateway or central control device serving as both the hub or controller. Z-Wave provides the application layer interoperability between home control systems of different manufacturers that are a part of its alliance. There is a growing number of interoperable Z-Wave products; over 1,700 in 2017, over 2,600 by 2019, and over 4,000 by 2022.
History
The Z-Wave protocol was developed by Zensys, a Danish company based in Copenhagen, in 1999. That year, Zensys introduced a consumer light-control system, which evolved into Z-Wave as a proprietary system on a chip (SoC) home automation protocol on an unlicensed frequency band in the 900 MHz range. Its 100 series chip set was released in 2003, and its 200 series was released in May 2005, with the ZW0201 chip offering high performance at a low cost. Its 500 series chip, also known as Z-Wave Plus, was released in March 2013, with four times the memory, improved wireless range, improved battery life, an enhanced S2 security framework, and the SmartStart setup feature. Its 700 series chip was released in 2019, with the ability to communicate up to 100 meters directly from point-to-point, or 800 meters across an entire Z-Wave network, an extended battery life of up to 10 years, and comes with S2 and SmartStart technology. In July 2019, the Z-Wave Plus v2 certification was announced. It is designed for devices built on the 700 platform. The Z-Wave Long Range (LR) specification was announced in September 2020, a new specification with up to four-times the wireless range of standard Z-Wave. Z-Wave's 800 series chip was released in late 2021, with improved security and battery life over the 700 series.
The technology began to catch on in North America around 2005, when five companies, including Danfoss, Ingersoll-Rand and Leviton Manufacturing, adopted Z-Wave. They formed the Z-Wave Alliance, whose objective is to promote the use of Z-Wave technology, with all certified products by companies in the Alliance interoperable. In 2005, Bessemer Venture Partners led a $16 million third seed round for Zensys. In May 2006, Intel Capital announced that it was investing in Zensys, a few days after Intel joined the Z-Wave Alliance. In 2008, Zensys received investments f
|
https://en.wikipedia.org/wiki/Meebo
|
Meebo (often stylized as meebo) was an instant messaging and social networking service provider. It was founded in September 2005 by Sandy Jen, Seth Sternberg, and Elaine Wherry, and was based in Mountain View, California. Initially the company offered a web-based instant messenger service, extending its offer in more general online chat and even social networking directions. In June 2012, Google acquired Meebo to merge the company's staff with the Google+ developers team.
History
After the initial period when the project was funded exclusively by its founders, Meebo raised $100,000 as angel investments (investors included Auren Hoffman and Marc Andreessen), received $3.5 million from Sequoia in 2005, and $9 million from Draper Fisher Jurvetson in 2006.
On August 2, 2006, Meebo launched the Flash-based "Meebo Me" chat window widget for personal websites, which automatically added visitors to the site owner's Meebo Messenger contact list, offering the possibility to start a realtime chat both to site owner and visitor In May 2007, Meebo launched media-enabled chat rooms (Rooms) that can be embedded in any website page. At this point, Meebo still didn't have a revenue model.
In April 2008, Meebo secured $25 million in venture capital funding from Jafco Investment, Time Warner and KTB Investment & Securities. In December 2008, Meebo started offering a "Community IM" integration widget, which was targeted at community-oriented sites and provided Meebo's services at third-party locations. A year later, in December 2009, Community IM was replaced with "Meebo Bar", a gadget that could be integrated by third parties into their site, providing advanced chat functionality to their users.
While initially operating on web access to the instant messaging market, Meebo expanded its offerings in the increasingly popular social network services. In February 2009, Meebo added Facebook Messenger to its list of supported instant messengers.
During the rise of the new generation of smartphone operating systems, Meebo released mobile applications for all major platforms: Android, iOS and BlackBerry. In February 2010, after being among the first to launch an iPhone app, Meebo released a fully-fledged native iPhone app.
In May 2010, the original Meebo Rooms service was discontinued, and the feature was ultimately removed in October 2011. In February 2011, Meebo acquired Mindset Media advertising company to improve its ads targeting.
On June 4, 2012, Meebo announced that they had entered into an agreement to be acquired by Google. A month later, on July 11, 2012, all of Meebo's products were discontinued except for Meebo Bar, which remained operational until June 6, 2013. Meebo's staff was assigned to Google+ development.
Meebo was also used as a hack for users to connect to their instant messaging accounts in school or office networks that blocked such applications.
Products
Messenger
Meebo Messenger, Meebo's initial offering, was a browser-based instant
|
https://en.wikipedia.org/wiki/Sony%20Cyber-shot%20DSC-R1
|
The Sony Cyber-shot DSC-R1 is a bridge digital camera announced by Sony in 2005. It featured a 10.3 megapixel APS-C CMOS sensor (21.5 × 14.4 mm), a size typically used in DSLRs and rarely used in bridge cameras (which were using at that time 2/3" (= 6.6 × 8.8 mm) or 1/1.8" (= 5.3 × 7.1 mm)). This was the first time such a large sensor was incorporated into a bridge camera. Besides the APS-C sensor, the DSC-R1 also featured a 14.3–71.5 mm Carl Zeiss Vario-Sonnar T* lens, providing for an angle of view equivalent to 24–120 mm on a full frame camera.
Advantages
Compared to a standard DSLR the Sony DSC-R1 had the following advantages:
since there is no mirror between the sensor and the lens, the lens can be positioned closer to the sensor, which improves the performance at wide angle. The back focal length of the DSC-R1 in wide-angle mode is 2.1 millimeters, which is much smaller than the wide angle back focal length found typically in DSLRs (up to 30 millimeters and more)
the image in the EVF and LCD screen is bright and the light is amplified. An optical viewfinder instead does not amplify the light, so that it becomes difficult to frame and manually focus when there is not sufficient light.
Less dust problems, since the DSC-R1 can't change lens; nevertheless dust can enter while zooming for the volume change 'pumping' the air in and out.
silent operation, as there is no swinging mirror or physical shutter system
as there is no shutter system there is essentially no limit to flash sync; photographs can be taken in broad daylight with fill flash at speeds of 1/1,000" or faster
fewer movable parts, therefore greater reliability
With histogram screen display 'on' the screen/viewer displays the output from the processor, enabling very accurate exposure control - Full-time Live Preview (serial no 4534457).
supports RAW
Disadvantages
and the following disadvantages:
no interchangeable lenses: the supplied lens only covers the 24–120 mm zoom range.
no optical viewfinder. Furthermore, there is some small time shift, i.e. the image appears with a small delay.
Low frame rate and slow contrast-detection autofocus.
See also
Sony RX1
Sony RX10
Sony RX100
List of large sensor fixed-lens cameras
References
External links
Let's Go Digital review
Imaging Resource
Steve's Reviews
DP Review
Comparison between the R1 and its successor RX10 by ePHOTOzine
R1
Bridge digital cameras
Point-and-shoot cameras
Cameras introduced in 2005
|
https://en.wikipedia.org/wiki/Microsoft%20Analysis%20Services
|
Microsoft SQL Server Analysis Services (SSAS) is an online analytical processing (OLAP) and data mining tool in Microsoft SQL Server. SSAS is used as a tool by organizations to analyze and make sense of information possibly spread out across multiple databases, or in disparate tables or files. Microsoft has included a number of services in SQL Server related to business intelligence and data warehousing. These services include Integration Services, Reporting Services and Analysis Services. Analysis Services includes a group of OLAP and data mining capabilities and comes in two flavors multidimensional and tabular, where the difference between the two is how the data is presented. In a tabular model, the information is arranged in two-dimensional tables which can thus be more readable for a human. A multidimensional model can contain information with many degrees of freedom, and must be unfolded to increase readability by a human.
History
In 1996, Microsoft began its foray into the OLAP Server business by acquiring the OLAP software technology from Canada-based Panorama Software.
Just over two years later, in 1998, Microsoft released OLAP Services as part of SQL Server 7. OLAP Services supported MOLAP, ROLAP, and HOLAP architectures, and it used OLE DB for OLAP as the client access API and MDX as a query language. It could work in client-server mode or offline mode with local cube files.
In 2000, Microsoft released Analysis Services 2000. It was renamed from "OLAP Services" due to the inclusion of data mining services. Analysis Services 2000 was considered an evolutionary release, since it was built on the same architecture as OLAP Services and was therefore backward compatible with it. Major improvements included more flexibility in dimension design through support of parent child dimensions, changing dimensions, and virtual dimensions. Another feature was a greatly enhanced calculation engine with support for unary operators, custom rollups, and cell calculations. Other features were dimension security, distinct count, connectivity over HTTP, session cubes, grouping levels, and many others.
In 2005, Microsoft released the next generation of OLAP and data mining technology as Analysis Services 2005. It maintained backward compatibility on the API level: although applications written with OLE DB for OLAP and MDX continued to work, the architecture of the product was completely different. The major change came to the model in the form of UDM - Unified Dimensional Model.
Timeline
The key events in the history of Microsoft Analysis Services cover a period starting in 1996.
Multidimensional Storage modes
Microsoft Analysis Services takes a neutral position in the MOLAP vs. ROLAP arguments among OLAP products.
It allows all the flavors of MOLAP, ROLAP and HOLAP to be used within the same model.
Partition storage modes
MOLAP - Multidimensional OLAP - Both fact data and aggregations are processed, stored, and indexed using a special format optim
|
https://en.wikipedia.org/wiki/Runbook
|
In a computer system or network, a runbook is a compilation of routine procedures and operations that the system administrator or operator carries out. System administrators in IT departments and NOCs use runbooks as a reference.
Runbooks can be in either electronic or in physical book form. Typically, a runbook contains procedures to begin, stop, supervise, and debug the system. It may also describe procedures for handling special requests and contingencies. An effective runbook allows other operators, with prerequisite expertise, to effectively manage and troubleshoot a system.
Through runbook automation, these processes can be carried out using software tools in a predetermined manner. In addition to automating IT specific processes, the results of the runbook can be presented on-screen back to the user or Service Desk engineer. Multiple runbooks can be linked together using a Decision Tree to provide users with interactive troubleshooting and guided procedures.
Runbook applied to operations
Operational runbooks may be tied to ITIL incidents to allow repeatable processes supporting specific aspects of the service catalog. The runbook is typically divided into routine automated processes and routine manual processes. The runbook catalog begins with an index of processes covered and may be broken down in outline form to align the processes to the major elements they support in the service catalog. A runbook is a compilation of routine procedures and operations that the system administrator or operator carries out.
Computer operator documentation
The documentation for running a task, whether in electronic or paper form, is
called a runbook. Sometimes written as "run book," it may supplement bullet-pointed steps with error messages (and what to do) and flowcharts.
Runbook automation
Runbook automation (RBA) is the ability to define, build, orchestrate, manage, and report on workflows that support system and network operational processes. Areas of a business ideal for IT automation are Operations Teams, Service Desk, Network Operations Center's (NOC's), Cloud Operations, Integrations, and Automation Center of Excellence (CoE).
A runbook workflow can potentially interact with all types of infrastructure elements, such as applications, databases, and hardware - using a variety of communication methods such as command-line interfaces (CLI), HTTP REST and SOAP API's, SSH sessions, scripts, utilities, and code libraries.
According to Gartner, the growth of RBA has coincided with the need for IT operations executives to enhance IT operations efficiency measures—including reducing mean time to repair (MTTR), increasing mean time between failures (MTBF), and automating the provisioning of IT resources. In addition, it is necessary to have the mechanisms to implement best practices (for example, implement and manage IT operations processes in line with the ITIL), increase the effectiveness of IT personnel (for example, automate repetitive task
|
https://en.wikipedia.org/wiki/Adaptive%20Binary%20Optimization
|
Adaptive Binary Optimization, (ABO), is a supposed lossless image compression algorithm by MatrixView Ltd. It uses a patented method to compress the high correlation found in digital content signals and additional compression with standard entropy encoding algorithms such as Huffman coding.
External links
: Repetition Coded Compression For Highly Correlated Image Data
: Compressing image data
Image compression
|
https://en.wikipedia.org/wiki/Chris%20Malachowsky
|
Chris Malachowsky (born May 2, 1959) is an American electrical engineer, one of the co-founders of computer graphics company Nvidia.
Raised in the Oakhurst section of Ocean Township, Monmouth County, New Jersey, Malachowsky graduated from Ocean Township High School in 1976. He received a B.S. degree in 1983, in electrical engineering from the University of Florida and an M.S. degree in 1986 from Santa Clara University. In 2008, he received the Distinguished Alumni Award from Santa Clara University and received Distinguished Alumni Award from University of Florida College of Engineering in 2017.
Early in his career, he worked for Hewlett-Packard and Sun Microsystems. He co-founded Nvidia in April 1993 with Curtis Priem and Jen-Hsun Huang and is a Senior Vice President for Engineering and Operations.
References
Nvidia people
University of Florida College of Engineering alumni
Santa Clara University alumni
Living people
American technology company founders
Corporate executives
Ocean Township High School alumni
People from Ocean Township, Monmouth County, New Jersey
Engineers from New Jersey
1959 births
|
https://en.wikipedia.org/wiki/Freewheelers
|
Freewheelers is a British television series made by Southern Television between 1968 and 1973 for the ITV network. It was created by the television producer Chris McMaster, who was aware of the popularity of adult action series such as The Avengers and Department S amongst teenagers and saw the potential of a version aimed at a younger audience.
Plot
In the opening story, three young people become caught up in the plans of ex-Nazi officer Karl von Gelb to "reverse the verdict of the last war" and inflict revenge on his former enemies. Under the direction of Colonel Buchan of MI5, the trio thwart Gelb's scheme to launch Polaris missiles on London from a captured nuclear submarine. This set the template for future stories, with the teenagers regularly preventing Gelb from carrying out massive and ingenious threats to Britain's security.
Background and production
The format of fast-paced action and outdoor locations was enormously successful and the programme enjoyed a large home audience as well as gaining overseas sales. In colour from the fourth series, location filming moved out of the South of England with scenes shot in Spain and Majorca. Future locations would include Amsterdam, Sweden and the Ardèche.
High-tech gadgets were a regular component, often machines developed for peaceful purposes seized by the villain and turned to criminal use. Teams of scientists were also regularly kidnapped and coerced into building similar gadgets: devices for changing the weather, controlling minds and melting metal at great distances all featured.
Strong incidental and closing music by Laurie Johnson and a memorable theme tune, the Carnaby Street Pop Orchestra's "Teenage Carnival" composed by Keith Mansfield, helped maintain the momentum, and Von Gelb's appearances were usually accompanied by stirring passages from Wagner's Ring Cycle. The frequent waterborne sequences of the programme were recorded using Southern Television's unique marine outside broadcast unit, known as Southerner, which also doubled as von Gelb's ship.
Cast and characters
Ronald Leigh-Hunt, as the British secret service agent Colonel Buchan, was the most regular cast member, appearing in series 1–4 and series 6. In 1971, he had a major part in the feature film Le Mans and when production of that overran by two months, he was unavailable for series 5; the absence of his character from the series was explained as him being on an overseas mission. The teenagers, almost invariably referred to as "the kids", varied over the years. The original line-up consisted of Tom Owen, Mary Maude and Gregory Phillips. Chris Chittell featured in series 2 and 3 and Adrian Wright played Mike Hobbs in series 4–7. Former Doctor Who companion Wendy Padbury joined the cast in series 5 as art student Sue Craig. Her youthful looks enabled her to portray a character several years her junior, although by the final series, with the actress in her mid-twenties and then married to actor Melvyn Hayes, careful ca
|
https://en.wikipedia.org/wiki/WUHT
|
WUHT (107.7 FM, "Hot 107.7") is an urban adult contemporary radio station that serves the Birmingham, Alabama, area. The station is also the flagship station of the UAB Blazers Radio Network which had previously been heard on sister station WWMM. Owned by Cumulus Media, the station has studios in Homewood and its transmitter is atop Red Mountain.
History
The first station to broadcast from 107.7 in Birmingham was WENN-FM, a simulcast of the popular AM station at 1320 with the same call letters. WENN was the first FM station in Birmingham to target African-American listeners, playing what was then called “soul” music; the station had no FM competition until 1996. When the AM changed formats and call letters in 1983, WENN-FM was well established as Birmingham’s leading station for what is now called urban contemporary music.
In 1998, new owners of the 107.7 frequency moved the programming and call letters of WENN to 105.9 FM and moved the alternative music format and WRAX call letters to 107.7. Known on the air as "107.7 the X", WRAX became one of the highest rated alternative music/modern rock stations in the country. The station was successful, even though it broadcast from a tower atop Miles Mountain in Palmerdale, Alabama, some 15 miles northeast of downtown Birmingham. The majority of Birmingham’s other FM stations broadcast from towers atop Red Mountain, which overlooks the city.
In 2005, Citadel Broadcasting purchased several stations in nearby Tuscaloosa, including alternative music WANZ, whose signal covered Birmingham. Not wanting to own two stations with the same format in the same market, the WRAX call letters were moved to 100.5 FM. On March 31, 2005, "The X" changed frequencies again, moving to 100.5 and becoming known on the air as "The X @ 100.5". On the same day, WUHT "Hot 107.7" debuted, branding itself as "Birmingham’s New #1 for R & B Hits". The station now broadcasts at slightly reduced power from an antenna atop Birmingham’s Red Mountain. Its musical presentation places it squarely between Summit Media's stations, urban contemporary WBHJ (95.7 Jamz) and adult urban WBHK (98.7 Kiss FM). WUHT carries two nationally syndicated shows: Steve Harvey in the Mornings and D.L. Hughley in the Afternoons. Citadel merged with Cumulus Media on September 16, 2011.
Translators
References
External links
Hot 107.7 WUHT official website
UHT
Urban adult contemporary radio stations in the United States
Cumulus Media radio stations
Radio stations established in 1969
1969 establishments in Alabama
|
https://en.wikipedia.org/wiki/Mary%20Cowden%20Clarke
|
Mary Victoria Cowden Clarke (née Novello; pen names, M. H. and Harry Wandsworth Shortfellow; 22 June 1809 – 12 January 1898) was an English author, and compiler of a concordance to Shakespeare.
Early life and education
Mary Victoria Novello was born at 240 Oxford Street, London, 22 June 1809. She was the eldest daughter of eleven children of Vincent Novello, and his wife, Mary Sabilla Hehl. She was called Victoria after her father's friend the Rev. Victor Fryer. During her early years she made at her father's house the acquaintance of many men distinguished in art and letters. John Varley, Copley Fielding, Havell, and Joshua Cristall among artists, and Charles and Mary Lamb, Leigh Hunt, and John Keats among writers, were included in the circle of her father's most intimate friends, and she acquired much of her taste for literature from Mary Lamb, who gave her lessons in Latin and poetical reading. She is mentioned as "Victoria" in several of Lamb's letters to Vincent Novello; and Leigh Hunt and the Lambs maintained throughout their lives affectionate relations with Cowden-Clarke and her husband.
Her education was entrusted to the care of a M. Bonnefoy, who kept a school at Boulogne-sur-Mer, France.
Career
On her return to England she acted for a short time as governess in a family named Purcell residing at Cranford, London, but she was compelled to abandon this employment owing to ill-health. She published "My Arm Chair", under the initials "M. H.", in William Hone's Table Book in 1827. This contribution was followed by others of a similar nature and a paper on "The Assignats in currency at the time of the French Republic of 1792".
On 1 November 1826 she was engaged to Charles Cowden Clarke, her brother Alfred's business partner, and who had been for many years a close friend of the Novellos. On 5 July 1828, the couple married, spending their honeymoon at the 'Greyhound' at Enfield. The marriage was celebrated by Lamb in a playful Serenata, for two Voices, which he sent to Vincent Novello in a letter dated 6 Nov. 1828. Charles and Mary Cowden-Clarke continued to live with the Novello family.
In the year after her marriage, Cowden Clarke began her valuable Shakespeare concordance. The compilation occupied twelve years, a further four years being devoted to seeing it through the press. It was eventually issued in eighteen monthly parts (1844–1845), and in volume form in 1845 as The Complete Concordance to Shakespeare, being a Verbal Index to all the Passages in the Dramatic Works of the Poet. This work superseded the Copious Index to ... Shakespeare (1790) of Samuel Ayscough, and the Complete Verbal Index ... (1805–1807) of Francis Twiss.
In November 1847 and January 1848, Cowden-Clarke played Mrs. Malaprop in three amateur productions of The Rivals. These private theatricals led to an introduction through Leigh Hunt to Charles Dickens, who persuaded her to perform in the amateur company which, under his direction, gave representations in Lon
|
https://en.wikipedia.org/wiki/Lilliefors%20test
|
In statistics, the Lilliefors test is a normality test based on the Kolmogorov–Smirnov test. It is used to test the null hypothesis that data come from a normally distributed population, when the null hypothesis does not specify which normal distribution; i.e., it does not specify the expected value and variance of the distribution. It is named after Hubert Lilliefors, professor of statistics at George Washington University.
A variant of the test can be used to test the null hypothesis that data come from an exponentially distributed population, when the null hypothesis does not specify which exponential distribution.
The test
The test proceeds as follows:
First estimate the population mean and population variance based on the data.
Then find the maximum discrepancy between the empirical distribution function and the cumulative distribution function (CDF) of the normal distribution with the estimated mean and estimated variance. Just as in the Kolmogorov–Smirnov test, this will be the test statistic.
Finally, assess whether the maximum discrepancy is large enough to be statistically significant, thus requiring rejection of the null hypothesis. This is where this test becomes more complicated than the Kolmogorov–Smirnov test. Since the hypothesised CDF has been moved closer to the data by estimation based on those data, the maximum discrepancy has been made smaller than it would have been if the null hypothesis had singled out just one normal distribution. Thus the "null distribution" of the test statistic, i.e. its probability distribution assuming the null hypothesis is true, is stochastically smaller than the Kolmogorov–Smirnov distribution. This is the Lilliefors distribution. To date, tables for this distribution have been computed only by Monte Carlo methods.
In 1986 a corrected table of critical values for the test was published.
See also
Jarque–Bera test
Shapiro–Wilk test
References
Sources
Conover, W.J. (1999), "Practical nonparametric statistics", 3rd ed. Wiley : New York.
External links
Lilliefors test in R
Lilliefors test in Python
Lilliefors test on Mathworks
Normality tests
|
https://en.wikipedia.org/wiki/Data%20farming
|
Data farming is the process of using designed computational experiments to “grow” data, which can then be analyzed using statistical and visualization techniques to obtain insight into complex systems. These methods can be applied to any computational model.
Data farming differs from Data mining, as the following metaphors indicate:
Miners seek valuable nuggets of ore buried in the earth, but have no control over what is out there or how hard it is to extract the nuggets from their surroundings. ... Similarly, data miners seek to uncover valuable nuggets of information buried within massive amounts of data. Data-mining techniques use statistical and graphical measures to try to identify interesting correlations or clusters in the data set.
Farmers cultivate the land to maximize their yield. They manipulate the environment to their advantage using irrigation, pest control, crop rotation, fertilizer, and more. Small-scale designed experiments let them determine whether these treatments are effective. Similarly, data farmers manipulate simulation models to their advantage, using large-scale designed experimentation to grow data from their models in a manner that easily lets them extract useful information. ...the results can reveal root cause-and-effect relationships between the model input factors and the model responses, in addition to rich graphical and statistical views of these relationships.
A NATO modeling and simulation task group has documented the data farming process in the Final Report of MSG-088.
Here, data farming uses collaborative processes in combining rapid scenario prototyping, simulation modeling, design of experiments, high performance computing, and analysis and visualization in an iterative loop-of-loops .
History
The science of Design of Experiments (DOE) has been around for over a century, pioneered by R.A. Fisher for agricultural studies. Many of the classic experiment designs can be used in simulation studies. However, computational experiments have far fewer restrictions than do real-world experiments, in terms of costs, number of factors, time required, ability to replicate, ability to automate, etc. Consequently, a framework specifically oriented toward large-scale simulation experiments is warranted.
People have been conducting computational experiments for as long as computers have been around. The term “data farming” is more recent, coined in 1998 in conjunction with the Marine Corp's Project Albert, in which small agent-based distillation models (a type of stochastic simulation) were created to capture specific military challenges. These models were run thousands or millions of times at the Maui High Performance Computer Center and other facilities. Project Albert analysts would work with the military subject matter experts to refine the models and interpret the results.
Initially, the use of brute-force full factorial (gridded) designs meant that the simulations needed to run very quickly and the st
|
https://en.wikipedia.org/wiki/Starlink%20Project
|
The Starlink Project, referred to by users as Starlink and by developers as simply The Project, was a UK astronomical computing project which supplied general-purpose data reduction software. Until the late 1990s, it also supplied computing hardware and system administration personnel to UK astronomical institutes. In the former respect, it was analogous to the US IRAF project.
The project was formally started in 1980, though the funding had been agreed, and some work begun, a year earlier. It was closed down when its funding was withdrawn by the Particle Physics and Astronomy Research Council in 2005. In 2006, the Joint Astronomy Centre released its own updated version of Starlink and took over maintenance; the task was passed again in mid-2015 to the East Asian Observatory. The latest version was released on 2018 July 19.
Part of the software is relicensed under the GNU GPL while some of it remain under the original custom licence.
History
From its beginning, the project aimed to cope with the ever-increasing data volumes which astronomers had to handle. A 1982 paper exclaimed that astronomers were returning from observing runs (a week or so of observations at a remote telescope) with more than 10 Gigabits of data on tape; at the end of its life the project was rolling out libraries to handle data of more than 4 Gigabytes per single image.
The project provided centrally-purchased (and thus discounted) hardware, professional system administrators, and the developers to write astronomical data-reduction applications for the UK astronomy community and beyond. At its peak size in the late 1980s and early 1990s, the project had a presence at around 30 sites, located at most of the UK universities with an astronomy department, plus facilities at the Joint Astronomy Centre, the home of UKIRT and the James Clerk Maxwell Telescope in Hawaii. The number of active developers fluctuated between five and more than a dozen.
By 1982, the project had a staff of 17, serving about 400 users at six sites, using seven VAXen (six VAX-11/780s and one VAX-11/750, representing a total of about 6.5 GB of disk space). They were networked from the outset, first with DECNET and later with X.25.
Between 1992 and 1995 the project switched to UNIX (and switched the networking to TCP/IP), supporting Digital UNIX on Alpha-based systems, and Solaris on systems from Sun Microsystems. By the late 1990s it was additionally supporting Linux, and by 2005 it was supporting Red Hat Linux, Solaris, and Tru64 UNIX. It was about this time that the project open-sourced its software (using the GNU General Public License; it had previously had an `academic use only' licence), and reworked its build system so that the software could be built on a much broader range of POSIX-like systems, including OS X and Cygwin.
Though it was not explicitly funded to do so, the project was an early participant in the Virtual Observatory movement, and contributed to the IVOA. One of its VO applica
|
https://en.wikipedia.org/wiki/ESOP
|
ESOP may refer to:
European Symposium on Programming, a conference in computer science
Employee stock ownership plan, an employee-owner scheme
See also
Aesop, an ancient Greek storyteller
|
https://en.wikipedia.org/wiki/DRTE%20Computer
|
The DRTE Computer was a transistorized computer built at the Defence Research Telecommunications Establishment (DRTE), part of the Canadian Defence Research Board. It was one of the earlier fully transistorized machines, running in prototype form in 1957, and fully developed form in 1960. Although the performance was quite good, equal to that of contemporary machines like the PDP-1, no commercial vendors ever took up the design, and the only potential sale to the Canadian Navy's Pacific Naval Laboratories, fell through. The machine is currently part of the Canadian national science and technology collection housed at the Canada Science and Technology Museum.
Transistor research
In the early 1950s transistors had not yet replaced vacuum tubes in most electronics. Tubes varied widely in their actual characteristics from tube to tube even of the same model. Engineers had developed techniques to ensure that the overall circuit was not overly sensitive to these changes so they could be replaced without causing trouble. The same techniques had not yet been developed for transistor-based systems, they were simply too new. While smaller circuits could be "hand tuned" to work, larger systems using many transistors were not well understood. At the same time transistors were still expensive; a tube cost about $0.75 while a similar transistor cost about $8. This limited the amount of experimentation most companies were able to perform.
DRTE was originally formed to improve communications systems, and to this end, they started a research program into using transistors in complex circuits in a new Electronics Lab under the direction of Norman Moody. Between 1950 and 1960, the Electronics Lab became a major center of excellence in the field of transistors, and through an outreach program, the Electronic Component Research and Development Committee, were able to pass on their knowledge to visiting engineers from major Canadian electronics firms who were entering the transistor field.
The key development that led to the eventual construction of the computer was Moody's invention of a new type of flip-flop circuit, a key component of all computer systems. Moody's design used a P-N-P-N junction, consisting of a PNP and NPN transistor connected back-to-back. Most machines of the era used Eccles-Jordan flip-flops; this was originally a tube-based concept that was being used by replacing the tubes with transistors. The P-N-P-N circuit offered much higher power output, allowing it to drive a greater number of "downstream" circuits without additional amplifiers. The overall effect was to reduce, sometimes greatly, the total number of transistors needed to implement a digital circuit. Moody published his circuit in 1956.
One downside, only realized later, is that the current draw of Moody's flip-flop was not balanced, so storing different numbers in them could lead to dramatically different current needs on the power supply. Generally this sort of changing load is so
|
https://en.wikipedia.org/wiki/Extro
|
Extro may refer to:
Extro, an alternative term for Outro
Extro (novel), an alternative title for The Computer Connection by Alfred Bester
|
https://en.wikipedia.org/wiki/Poverty%20of%20the%20stimulus
|
Poverty of the stimulus (POS) is the controversial argument from linguistics that children are not exposed to rich enough data within their linguistic environments to acquire every feature of their language. This is considered evidence contrary to the empiricist idea that language is learned solely through experience. The claim is that the sentences children hear while learning a language do not contain the information needed to develop a thorough understanding of the grammar of the language.
The POS is often used as evidence for universal grammar. This is the idea that all languages conform to the same structural principles, which define the space of possible languages. Both poverty of the stimulus and universal grammar are terms that can be credited to Noam Chomsky, the main proponent of generative grammar. Chomsky coined the term "poverty of the stimulus" in 1980. However, he had argued for the idea since his 1959 review of B.F. Skinner's Verbal Behavior.
The form of the argument
An argument from the poverty of the stimulus generally takes the following structure:
The speech that children are exposed to is consistent with numerous possible grammars.
It is possible to define data, D, that would distinguish the target grammar from all other grammars that are consistent with the input.
D is missing from speech to children.
Children nonetheless acquire the target grammar.
Therefore, the right grammatical structure arises due to some (possibly linguistic) property of the child.
Background and history
Chomsky coined the term "poverty of the stimulus" in 1980. This idea is closely related to what Chomsky calls "Plato's Problem". He outlined this philosophical approach in the first chapter of the Knowledge of Language in 1986. Plato's Problem traces back to Meno, a Socratic dialogue. In Meno, Socrates unearths knowledge of geometry concepts from a slave who was never explicitly taught them. Plato's Problem directly parallels the idea of the innateness of language, universal grammar, and more specifically the poverty of the stimulus argument because it reveals that people's knowledge is richer than what they are exposed to. Chomsky illustrates that humans are not exposed to all structures of their language, yet they fully achieve knowledge of these structures.
Linguistic nativism is the theory that humans are born with some knowledge of language. One acquires a language not entirely through experience. According to Noam Chomsky, "The speed and precision of vocabulary acquisition leaves no real alternative to the conclusion that the child somehow has the concepts available before experience with language and is basically learning labels for concepts that are already a part of his or her conceptual apparatus." One of the most significant arguments generative grammarians have for linguistic nativism is the poverty of the stimulus argument.
Pullum and Scholz frame the poverty of the stimulus argument by examining all of the ways that the input i
|
https://en.wikipedia.org/wiki/National%20Incident-Based%20Reporting%20System
|
National Incident-Based Reporting System (NIBRS) is an incident-based reporting system used by law enforcement agencies in the United States for collecting and reporting data on crimes. Local, state and federal agencies generate NIBRS data from their records management systems. Data is collected on every incident and arrest in the Group A offense category. These Group A offenses are 52 offenses grouped in 23 crime categories. Specific facts about these offenses are gathered and reported to NIBRS. In addition to the Group A offenses, 10 Group B offenses are reported with only the arrest information.
History
Uniform Crime Reports (UCR) began in the late 1920s when the Committee on Uniform Crime Records, established by the International Association of Chiefs of Police (IACP) in 1927, published the first version of the Uniform Crime Reporting Handbook. With this initiative, the Uniform Crime Reporting program began under the jurisdiction of the Federal Bureau of Investigation. Over the years, the uniform crime report developed into a broad utility for summary-based reporting of crimes. By the late 1970s, the law enforcement community saw the need for a more detailed crime reporting program that would meet the needs of law enforcement agencies in the 21st century.
Testing for the new NIBRS system began in South Carolina. The new system was approved for general use at a national UCR conference in March 1988.
Similarities and differences between SRS and NIBRS
The general concepts, such as jurisdictional rules, of collecting and reporting SRS (Summary Reporting System) data [used by UCR] are the same as in NIBRS. However, NIBRS goes into much greater detail than SRS. NIBRS includes 24 Group A crime categories whereas SRS only has 8 crime categories classified as Part I.
In NIBRS, the definition of rape has been expanded to include male victims. SRS, until recently, defined rape as "the carnal knowledge of a female forcibly and against her will" but since has been expanded. Formerly in SRS, sex attacks against males were to be classified only as either assaults or "other sex offenses", depending on the nature of the crime and the extent of the injury.
When multiple crimes are committed by a single person or group of persons during the same basic period of time and same basic location, SRS uses a "Hierarchy Rule" (see UCR for details) to determine which offenses will be reported for that incident. Only the most serious offense is reported. For example, if a criminal burglarizes a residence and assaults the inhabitant, only the assault is reported as it takes precedence over the burglary on the "Hierarchy Rule". NIBRS reports all offenses involved in a particular incident.
SRS has only two crime categories: Crimes Against Persons (e.g., murder, rape, assault, robbery) and Crimes Against Property (e.g., car theft, burglary, larceny, arson). NIBRS adds a third category titled Crimes Against Society for activities such as drug or narcotic offenses and ot
|
https://en.wikipedia.org/wiki/Missinipi%20Broadcasting%20Corporation
|
Missinipi Broadcasting Corporation, or MBC Radio, is a radio network in Canada, serving First Nations and Métis communities in the province of Saskatchewan. The network's flagship station is CJLR in La Ronge. MBC Radio broadcasts to more than 70 communities in Saskatchewan, including the major urban centres, and broadcasts a streaming audio feed over the Internet. MBC's current CEO is Deborah Charles, the first female CEO of an Indigenous radio broadcast network in Canada.
History
Background
Starting in the 1960s, a provincial government radio service called Northern News, broadcasting from Prince Albert, was hosted by its first producer Helga Reydon. The program, a 15-minute weekly series, addressed issues and matters of interest for fishermen and trappers in the north. However, those broadcasts were plagued by poor reception and unequal signal distribution as they were broadcast on an AM radio station in the southern part of the province and had to "skip" into the north. The program also did not air content that was culturally specific to Indigenous peoples.
The provincial government realized its shortcomings in serving the northern citizens of Saskatchewan, and in 1973, the Department of Northern Saskatchewan (DNS) began producing a new Northern News program out of La Ronge. This program was hosted by producer/announcer Barrie Ward, with Indigenous-language content added by Cree and Michif linguists Tom Roberts and Robert Merasty. The new radio program added more northern content and significantly included major Indigenous-language content. The program, however, ended with the provincial government's disbanding of the DNS in 1982.
In the late 1970s, CBC Radio also began broadcasting a northern program, Keewatin Radio. The program contained some relevant northern content and was aided by better reception due to the installation of the low power FM relay transmitters in the north. The stories, though pertinent to the northern populace, were largely in English, and originated in Regina.
Formation
In 1983, the Government of Canada introduced the Northern Native Broadcast Access Program (NNBAP), funded and supported by the Department of Canadian Heritage. The NNBAP's aim was to enhance, protect and preserve Indigenous languages while at the same time allowing Indigenous peoples to control their own communications services.
In March 1984, a full-time coordinating committee was formed and Merasty was hired to gather information. A survey was conducted of the residents of northern Saskatchewan, the results of which gave the organizers a better idea of what Indigenous people wanted to hear on radio. Following the survey, the Missinipi Broadcasting Corporation's first board of directors was elected in 1984, with Merasty as the first CEO. The corporation implemented a basic radio skills training program in 1984 that was delivered through the local community college. The first MBC broadcast took place in February 1985 with Tom Roberts as host.
MBC'
|
https://en.wikipedia.org/wiki/European%20Academy%20of%20Sciences%20and%20Arts
|
The European Academy of Sciences and Arts (EASA, ) is a transnational and interdisciplinary network, connecting about 2,000 recommended scientists and artists worldwide, including 38 Nobel Prize laureates. The European Academy of Sciences and Arts is a learned society of scientists and artists, founded by Felix Unger. The academy was founded 1990, is situated in Salzburg and has been supported by the city of Vienna, the government of Austria, and the European Commission.
The EASA is now headed by President Klaus Mainzer, TUM Emeritus of Excellence at the Technical University of Munich and Senior Professor at the Carl Friedrich von Weizsäcker Center of the University of Tübingen.
It is unrelated to and should not be confused with a different, highly controversial, and less well-established academy, the Belgium-based European Academy of Sciences.
It is a member of the InterAcademy Partnership. Its activities have included a collaboration with the Latvian Academy of Sciences: the European-Latvian Institute for Cultural and Scientific Exchange (EUROLAT), founded in 1993.
History
The origins date back to a scientific working group with the Salzburg cardiac surgeon Felix Unger, the archbishop from Vienna Franz König and the political scientist and philosopher Nikolaus Lobkowicz. On 7 March 1990, the academy was officially founded in Salzburg, where the academy is still located until today.
The Festive Plenary of the European Academy of Sciences and Arts takes place annually with the festive admission of new members in Salzburg. On the occasion of the 25th- and 30th- anniversary the celebrations took place with the Federal Presidents of Austria and other Presidents of European countries. Other Protectors (national patrons) of the academy are King Philippe of Belgium, Borut Pahor (State President of Slovenia), Gjorge Ivanov (State President of Macedonia) and since 12 June 2018 Austrian Federal President Alexander Van der Bellen. Past Protektors are i. a. the former EU Commission President and Prime Minister of Luxembourg Jacques Santer, the former King of Spain Juan Carlos I and the former EU Commission President and Italian Prime Minister Romano Prodi.
Vision and membership
The European Academy of Sciences and Arts is politically independent and financed by donations, private sponsors and public institutions. The activities of the academy do not aim at financial profit. The academy is a forum of scholars who take up interdisciplinarily and transdisciplinarily scientific topics with societal impact. In 2020, the academy had round about 2000 members worldwide, including 34 Nobel Prize Laureates. These are respected and recommended scientists and artists, among them 37 nobel prize laureats. The membership can be awarded following suggestions of their members. The Senate decides on admission on the basis of recommendations of the nomination commission. The membership is considered as distinction of the merits in science and society.
Famous members
|
https://en.wikipedia.org/wiki/Mixed-Up%20Mother%20Goose
|
Roberta Williams' Mixed-Up Mother Goose is a computer game first released by Sierra On-Line in 1987. It is, in essence, an edutainment title, directed specifically at young gamers, as well as an adventure game. It was the first multimedia game released on CD-ROM in 1991. A second game in the series, Mixed-Up Fairy Tales, was released in 1991.
The storyline of the game is very simple, as is common in games for children. One night, while preparing for bed, a child (which is the player's avatar) is sent into the dreamlike world of Mother Goose, who desperately needs help. All the nursery rhymes in the land have gotten mixed up, with none of the inhabitants possessing the items necessary for their rhyme to exist. And so, the child will find themselves helping Humpty Dumpty find a ladder to scramble onto a wall, bringing the little lamb back to Mary and seeking out a pail for Jack and Jill, among others.
Gameplay
Gameplay is again rather simple. The AGI system, similar to the one used extensively in previous Sierra games (e.g. the Quest series: King's Quest, Police Quest, etc.), is utilized in the 1987 version. The player controls his or her characters using - almost exclusively - the four direction keys on the keyboard. When an item of interest comes into view, it is usually shown very clearly, so that younger gamers would not find it difficult to hunt it down. Walking close to an item is synonymous with picking it up and, as there is only one inventory window in the top-right corner of the screen, the character can only hold one object at a time. Inanimate objects can be found in houses or on the ground throughout the land, whereas living objects can only be found outdoors. In the case of living objects, the person or animal will follow behind the player so that they can be led back to the person or place they need to be to complete the rhyme. Human objects, such as Peter Peter Pumpkin Eater's wife, will also explain where they want to go in words and a "thought bubble". Some characters (namely Old King Cole) require several items brought to them in order to put their rhyme back together. All but one of the items are placed randomly throughout the land. There are 18 nursery rhymes to choose from, 20 items to recover, and many screens in which one can find the lost items. A point is awarded for each fixed rhyme. If a player finds it hard to match the objects with the rhymes, he or she can approach the characters who are in need of a specific part of their story and this item will be displayed above them in the form of a "thought bubble". At the beginning of the game, the player can select the character that will be used during the game, with 8 characters from which to choose. The game can be saved, or more precisely, bookmarked (a feature which became prominent - and somewhat infamous - in some later Sierra games, including Phantasmagoria and King's Quest VII), at any time.
Other versions
Mixed-Up Mother Goose was remade by Sierra three t
|
https://en.wikipedia.org/wiki/Open%20Student%20Television%20Network
|
The Open Student Television Network (OSTN), is a USA national student television network, headquartered in downtown Cleveland, Ohio. OSTN was founded in the fall of 2004 and launched its high-bitrate IPTV stream on February 28, 2005.
History
In the fall of 2004, a group of student television station managers met in Cleveland, Ohio, to discuss issues facing student television stations, attempting to program and manage 24/7 schedules with limited financial and production resources. Assisted by technology staff from Case Western Reserve University, the students agreed on a national student television network to share and distribute student content worldwide. Students representing three television stations were present at the initial meeting: Ohio State's Buckeye TV, Carnegie Mellon University, and Case Western Reserve University's IgniteTV, as well as several members of Case Western Reserve University.
OSTN created a national collegiate news show anchored at Northwestern University's Medill School of Journalism. OSTN News content was available via the Associated Press worldwide network of online video distribution.
Over the next several years the network grew to over 600 member schools, who carried the network on both campus cable systems as well as via IPTV deployments on college and university web pages. In the fall of 2007 an enterprise-level broadcast schedule was implemented, allowing OSTN to schedule particular shows and series for the first time.
In 2007 Chief architect Prashant Chopra was arrested in a child sex sting and later pleaded guilty to importuning and attempted abduction of a 12 year old girl.
OSTN distribution
OSTN utilizes a non-traditional method of content and signal distribution, the Internet2 high speed academic network. Whereas a traditional television network sends its programming to affiliates via satellite feeds, OSTN uses a high bandwidth connection via the Internet2 network to directly feed affiliates via standard LAN/WAN connections. Rather than require student television affiliates to purchase and maintain costly microwave, satellite, or dedicated fibre-optic transmission equipment, OSTN allows student stations and member institutions to receive the OSTN channel via existing high-speed IP-based network equipment.
The OSTN stream was initially a 1.6 megabit Windows Media stream, available live 24/7 over Internet2 to all member institutions. Windows Media encoding permitted a true NTSC quality stream of video to be transmitted at a relatively low bitrate. However, the WMV version of OSTN suffered from reliability issues, and was replaced in the fall of 2007 by a highly robust, scalable, and enterprise-grade IPTV distribution system. The current iteration of OSTN is a 2.0-4.0 MPEG-2 program stream, available via the Internet2 network. OSTN's new distribution system will allow the network to eventually offer itself as a 1.5-2.0 megabit H.264 program stream, and will be scalable to future implementations of an OSTN
|
https://en.wikipedia.org/wiki/Lib
|
lib or Lib may refer to:
Computing
Library (computing)
.lib, a static library on Microsoft platforms
, a directory on Unix-like systems
Lib-80, a Microsoft Library Manager tool; see Microsoft MACRO-80
People
Lib, one of two Jaredite kings in the Book of Mormon
Hypocorism for Elizabeth (given name)
Lib Spry, Canadian theatre director and playwright
Politics
Lib Dems (Japan)
Shorthand for Liberal
Supporters of the Liberal Party of Australia
Liberation (disambiguation) (e.g. "women's lib")
Libertarians
Other uses
Lib Island in the Marshall Islands
Libra (constellation), astronomical abbreviation
A library or institution housing books
See also
LIB (disambiguation)
|
https://en.wikipedia.org/wiki/Static%20library
|
In computer science, a static library or statically-linked library is a set of routines, external functions and variables which are resolved in a caller at compile-time and copied into a target application by a compiler, linker, or binder, producing an object file and a stand-alone executable. This executable and the process of compiling it are both known as a static build of the program. Historically, libraries could only be static. Static libraries are either merged with other static libraries and object files during building/linking to form a single executable or loaded at run-time into the address space of their corresponding executable at a static memory offset determined at compile-time/link-time.
Advantages and disadvantages
There are several advantages to statically linking libraries with an executable instead of dynamically linking them. The most significant advantage is that the application can be certain that all its libraries are present and that they are the correct version. This avoids dependency problems, known colloquially as DLL Hell or more generally dependency hell. Static linking can also allow the application to be contained in a single executable file, simplifying distribution and installation.
With static linking, it is enough to include those parts of the library that are directly and indirectly referenced by the target executable (or target library). With dynamic libraries, the entire library is loaded, as it is not known in advance which functions will be invoked by applications. Whether this advantage is significant in practice depends on the structure of the library.
In static linking, the size of the executable becomes greater than in dynamic linking, as the library code is stored within the executable rather than in separate files. But if library files are counted as part of the application then the total size will be similar, or even smaller if the compiler eliminates the unused symbols.
Environment specific
On Microsoft Windows it is common to include the library files an application needs with the application. On Unix-like systems this is less common as package management systems can be used to ensure the correct library files are available. This allows the library files to be shared between many applications leading to space savings. It also allows the library to be updated to fix bugs and security flaws without updating the applications that use the library. In practice, many executables (especially those targeting Microsoft Windows) use both static and dynamic libraries.
Linking and loading
Any static library function can call a function or procedure in another static library. The linker and loader handle this the same way as for kinds of other object files. Static library files may be linked at run time by a linking loader (e.g., the X11 module loader). However, whether such a process can be called static linking is controversial.
Creating static libraries in C/C++
Static libraries can be easily creat
|
https://en.wikipedia.org/wiki/Monster%20House%20%28film%29
|
Monster House is a 2006 American computer-animated supernatural horror comedy film directed by Gil Kenan, in his directorial debut, with a screenplay by Dan Harmon, Rob Schrab and Pamela Pettler, from a story by Harmon and Schrab. The story, set during Halloween, follows a group of kids who discover and attempt to stop a sentient haunted house that consumes anything that comes near it. The film features the voices of Steve Buscemi, Maggie Gyllenhaal, Kevin James, Nick Cannon, Jason Lee, Fred Willard, Jon Heder, Catherine O'Hara, and Kathleen Turner, with Mitchel Musso, Sam Lerner, and Spencer Locke as the main protaganists.
Produced by Columbia Pictures, Relativity Media, and executive producers Robert Zemeckis and Steven Spielberg's ImageMovers and Amblin Entertainment, respectively, the human characters were animated using motion capture animation, which was previously utilized in Zemeckis' The Polar Express (2004). It was also Sony's first computer-animated film produced by Sony Pictures Imageworks, and Relativity's first animated film.
Monster House was released theatrically by Sony Pictures Releasing on July 21, 2006. It received generally positive reviews from critics and grossed $142 million worldwide against a $75 million budget. It received a nomination for the Academy Award for Best Animated Feature, but lost to Happy Feet.
Plot
On October 30, 1983, one day before Halloween, 12-year-old DJ Walters witnesses elderly Horace Nebbercracker stealing a little girl's tricycle and scaring her away from his house. DJ has documented many similar incidents at the Nebbercracker house, which is across the street from his own. The same day, DJ's parents leave for a convention, placing him in the care of a teenage babysitter named Elizabeth (Zee). Later, DJ's friend Chowder comes over to DJs house with his new basketball, shows off his basketball tricks, and loses his basketball in Nebbercracker's lawn; the boys try to retrieve it, but Nebbercracker stops them, and he suffers a heart attack. He is taken away by an ambulance and taken to the hospital, and so, everyone assumes he is dead.
Zee's inebriated boyfriend Bones arrives. He reveals that, many years ago, Nebbercracker stole his kite. Bones also relates rumors that Nebbercracker ate his wife. After Zee throws him out, Bones notices his kite on Nebbercracker's porch, tries to retrieve it, and is devoured by the house. DJ and Chowder are attacked by the house when they investigate; the next day is Halloween. They save young Jenny Bennett, who is selling Halloween candy, from being eaten by the house. Jenny calls police officers Landers and Lister, but the house stays quiet when the officers arrive, and they dismiss the report.
The trio consults supernatural expert Reginald "Skull" Skulinski, who speculates the house must be a rare monster created by the merging of a human ghost and a man-made object, only unbound when its heart is destroyed. Concluding Nebblecracker has died and possessed th
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.