source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/SIOX
|
SIOX may refer to:
Serial Input/Output eXchange an asynchronous datacommunications bus.
Simple Interactive Object Extraction an algorithm for extracting foreground objects from color photographs.
Silicon oxide (SiOx)
Sistema de Ingresos de Oaxaca
|
https://en.wikipedia.org/wiki/Death%20Master%20File
|
The Death Master File (DMF) is a computer database file made available by the United States Social Security Administration since 1980. It is known commercially as the Social Security Death Index (SSDI). The file contains information about persons who had Social Security numbers and whose deaths were reported to the Social Security Administration from 1962 to the present; or persons who died before 1962, but whose Social Security accounts were still active in 1962. , the file contained information on 111 million deaths.
In 2011, some records were removed from the file.
Overview
The data includes:
Name (Given name, surname), since 1990s the middle initial
Date of birth (Year, Month, Day)
Date of death (Year, Month), since 2000 the day of month
Social Security number
Whether death has been verified or a death certificate has been observed.
In 2011, the following information was removed:
Last ZIP code of the person while alive
ZIP code to which the lump sum death benefit was sent, if applicable
The Death Master File is a subset of the Social Security Administration's Numident database file, computerized in 1961, which contains information about all Social Security numbers issued since 1936. The Death Master File is considered a public document under the Freedom of Information Act, and monthly and weekly updates of the file are sold by the National Technical Information Service of the U.S. Department of Commerce. Knowing that a patient died is important in many observational clinical studies and is important for medical research. It is also used by financial and credit firms and government agencies to match records and prevent identity fraud.
The Death Master File, in its SSDI form, is also used extensively by genealogists. Lorretto Dennis Szucs and Sandra Hargraves Luebking report in The Source: A Guidebook of American Genealogy (1997) that the total number of deaths in the United States from 1962 to September 1991 is estimated at 58.2 million. Of that number, 42.5 million (73 percent) are found in the Death Master File. Other research published by the Social Security Administration in 2002 suggests that for most years since 1973, 93 percent to 96 percent of deaths of individuals aged 65 or older were included in the DMF. Today the number of deaths, at any age, reported to the Death Master File is around 95 percent.
Distribution
Social Security Administration distributes the file via National Technical Information Service. In May 2013, the cost of a single download (with no weekly, monthly or quarterly annual subscription costs) was $1825.
Errors and omissions
The Social Security Administration has estimated that about 16 million decedents were missing from the File, leading to government benefits being paid out improperly; the total amount of improper payments in 2014 was estimated at $124 billion.
Conversely, the Social Security Administration estimates that roughly 12,000 living people are added to the File annually, potentially d
|
https://en.wikipedia.org/wiki/Standard%20algorithms
|
In elementary arithmetic, a standard algorithm or method is a specific method of computation which is conventionally taught for solving particular mathematical problems. These methods vary somewhat by nation and time, but generally include exchanging, regrouping, long division, and long multiplication using a standard notation, and standard formulas for average, area, and volume. Similar methods also exist for procedures such as square root and even more sophisticated functions, but have fallen out of the general mathematics curriculum in favor of calculators (or tables and slide rules before them).
The concepts of reform mathematics which the NCTM introduced in 1989 favors an alternative approach. It proposes a deeper understanding of the underlying theory instead of memorization of specific methods will allow students to develop individual methods which solve the same problems. Students' alternative algorithms are often just as correct, efficient, and generalizable as the standard algorithms, and maintain emphasis on the meaning of the quantities involved, especially as relates to place values (something that is usually lost in the memorization of standard algorithms). The development of sophisticated calculators has made manual calculation less important (see the note on square roots, above) and cursory teaching of traditional methods has created failure among many students. Greater achievement among all types of students is among the primary goals of mathematics education put forth by NCTM. Some researchers such as Constance Kamii have suggested that elementary arithmetic, as traditionally taught, is not appropriate in elementary school. Many first editions of textbooks written to the original 1989 standard such as TERC deliberately discouraged teaching of any particular method, instead devoting class and homework time to the solving of nontrivial problems, which stimulate students to develop their own methods of calculation, rooted in number sense and place value. This emphasis by no means excludes the learning of number facts; indeed, a major goal of early mathematical education is procedural fluency.
The NCTM in recent revisions has made more explicit this need for learning of basic math facts and correct, efficient methods. Many new editions of standards-based texts do present standard methods and basic skills. However, the original guidelines continue to draw fire from well-meaning parents and community members, some of whom advocate a return to traditional mathematics. Success of a particular text depends not only upon its content, but also on the willingness of a school community to allow new pedagogy and content and to commit to the recommended implementation of the materials.
Mathematics education
|
https://en.wikipedia.org/wiki/Internet%20transit
|
Internet transit is the service of allowing network traffic to cross or "transit" a computer network, usually used to connect a smaller Internet service provider (ISP) to the larger Internet. Technically, it consists of two bundled services:
The advertisement of customer routes to other ISPs, thereby soliciting inbound traffic toward the customer from them
The advertisement of other ISPs' routes (usually but not necessarily in the form of a default route or a full set of routes to all of the destinations on the Internet) to the ISP's customer, thereby soliciting outbound traffic from the customer towards these networks.
In the 1970s and early 1980s-era Internet, the assumption was made that all networks would provide full transit for one another. In the modern private-sector Internet, two forms of interconnect agreements exist between Internet networks: transit, and peering. Transit is distinct from peering, in which only traffic between the two ISPs and their downstream customers is exchanged and neither ISP can see upstream routes over the peering connection. A transit free network uses only peering; a network that uses only unpaid peering and connects to the whole Internet is considered a Tier 1 network. In the 1990s, the network access point concept provided one form of transit.
Pricing for the internet transit varies at different times and geographical locations. The transit service is typically priced per megabit per second per month, and customers are often required to commit to a minimum volume of bandwidth, and usually to a minimum term of service as well, usually using a 95e percentile burstable billing scheme. Some transit agreements provide "service-level agreements" which purport to offer money-back guarantees of performance between the customer's Internet connection and specific points on the Internet, typically major Internet exchange points within a continental geography such as North America. These service level agreements still provide only best-effort delivery since they do not guarantee service the other half of the way, from the Internet exchange point to the final destination.
See also
Commercial Internet eXchange (CIX)
Federal Internet Exchange (FIX)
Internet exchange point (IXP)
References
Internet architecture
|
https://en.wikipedia.org/wiki/Optimum%20programming
|
In the history of computing, optimum programming, or optimum coding is the practice of arranging a computer program's instructions in memory so as to minimize the time the machine spends waiting for instructions. It is of historical interest mainly due to the design of many early digital computers.
Most early computers used some form of serial memory, primarily delay-line memory or magnetic drums. Unlike the random-access memory of modern computers, words in serial memory are made available one at a time; the time required to access a particular word depends on the "distance" between it and the word currently being read. If a given delay line held n words, the average time to read a word would be n/2 word times. Without optimum coding, such a machine would spend most of its time idly waiting for instructions and data.
To circumvent this problem, many machines, particularly Alan Turing's ACE and its descendants, included a field specifying the address of the next instruction to be executed in their instruction format. A programmer employing optimum coding would look up the time needed to perform the current instruction, calculate how far the memory system would move in that time, and then place the next instruction for the program at that location. Thus when the current instruction completed and the computer looked for the next one as specified in the instruction, that memory location would just be arriving and would be able to be read in immediately. For example, if a programmer had just coded an ADD instruction at address 400, and the ADD instruction required 4 word-times to execute, the programmer would set the "next address" field of the instruction to 404, and would place the next instruction there.
In the United States, optimum coding was most commonly employed on the IBM 650 and the Bendix G-15. Both machines had optimizing assemblers (SOAP for the IBM, POGO for Bendix) that could automate this task.
See also
Mel Kaye, who authored one particularly clever bit of optimum programming that has entered computer lore, is described in The Story of Mel.
References
Software optimization
|
https://en.wikipedia.org/wiki/List%20of%20CSX%20Transportation%20lines
|
CSX Transportation owns and operates a vast network of rail lines in the United States east of the Mississippi River. In addition to the major systems which merged to form CSX – the Baltimore and Ohio Railroad, Chesapeake and Ohio Railway, Louisville and Nashville Railroad, Atlantic Coast Line Railroad and Seaboard Air Line Railroad – it also owns major lines in the Northeastern United States acquired from the 1999 breakup of Conrail.
The lines are split into two regions – Northern and Southern, further split into divisions (five per region), and finally into subdivisions, most of which consist of a single main line with short branches.
Active lines
Former lines
See also
List of Norfolk Southern Railway lines
References
CSX Transportation Timetables
CSX
|
https://en.wikipedia.org/wiki/Predictive%20Model%20Markup%20Language
|
The Predictive Model Markup Language (PMML) is an XML-based predictive model interchange format conceived by Robert Lee Grossman, then the director of the National Center for Data Mining at the University of Illinois at Chicago. PMML provides a way for analytic applications to describe and exchange predictive models produced by data mining and machine learning algorithms. It supports common models such as logistic regression and other feedforward neural networks. Version 0.9 was published in 1998. Subsequent versions have been developed by the Data Mining Group.
Since PMML is an XML-based standard, the specification comes in the form of an XML schema. PMML itself is a mature standard with over 30 organizations having announced products supporting PMML.
PMML Components
A PMML file can be described by the following components:
Header: contains general information about the PMML document, such as copyright information for the model, its description, and information about the application used to generate the model such as name and version. It also contains an attribute for a timestamp which can be used to specify the date of model creation.
Data Dictionary: contains definitions for all the possible fields used by the model. It is here that a field is defined as continuous, categorical, or ordinal (attribute optype). Depending on this definition, the appropriate value ranges are then defined as well as the data type (such as, string or double).
Data Transformations: transformations allow for the mapping of user data into a more desirable form to be used by the mining model. PMML defines several kinds of simple data transformations.
Normalization: map values to numbers, the input can be continuous or discrete.
Discretization: map continuous values to discrete values.
Value mapping: map discrete values to discrete values.
Functions (custom and built-in): derive a value by applying a function to one or more parameters.
Aggregation: used to summarize or collect groups of values.
Model: contains the definition of the data mining model. E.g., A multi-layered feedforward neural network is represented in PMML by a "NeuralNetwork" element which contains attributes such as:
Model Name (attribute modelName)
Function Name (attribute functionName)
Algorithm Name (attribute algorithmName)
Activation Function (attribute activationFunction)
Number of Layers (attribute numberOfLayers)
This information is then followed by three kinds of neural layers which specify the architecture of the neural network model being represented in the PMML document. These attributes are NeuralInputs, NeuralLayer, and NeuralOutputs. Besides neural networks, PMML allows for the representation of many other types of models including support vector machines, association rules, Naive Bayes classifier, clustering models, text models, decision trees, and different regression models.
Mining Schema: a list of all fields used in the model. This can be a subset of the fields
|
https://en.wikipedia.org/wiki/Andrew%20Bradfield
|
Andrew "Andy" Bradfield (1966 – 21 September 2001) was a video game programmer from New Zealand best known for his work on games for the Atari 8-bit family of home computers. He created Laser Hawk (1986) and its sequel Hawkquest (1989). He teamed with artist Harvey Kong Tin on both titles.
He died on 21 September 2001, aged 35, following a two-year battle with leukemia.
References
1966 births
2001 deaths
Video game programmers
Deaths from leukemia
New Zealand computer programmers
New Zealand computer scientists
Deaths from cancer in New Zealand
|
https://en.wikipedia.org/wiki/Consolidation
|
Consolidation may refer to:
In science and technology
Consolidation (computing), the act of linkage editing in computing
Consolidation (locomotive), popular name of a steam locomotive with a 2-8-0 wheel arrangement
Consolidation (soil), a geological process whereby a soil decreases in volume
Consolidation ratio, the number of virtual servers that can run on each physical host machine
Mathematical consolidation, the fusion of diverse theories into one
Memory consolidation, the process in the brain by which recent memories are crystallised into long-term memory
Pulmonary consolidation, a clinical term for solidification into a firm dense mass
Semiconductor consolidation, the trend of semiconductor companies collaborating
Ultrasonic consolidation, a manufacturing technique for metals
In economics
Consolidation (business), the mergers or acquisitions of many smaller companies into much larger ones
Consolidation (media), consolidation of United States media into a few companies
Debt consolidation, the process of combining two or more loans into one big loan
Federal student loan consolidation, allows students to consolidate student loans into one single debt
Fiscal Consolidation, a euphemism for austerity measures
Other uses
Championship consolidation, the act of combining two separate championships into a single title
Consolidation bill, a type of bill in the Parliament of the United Kingdom
Democratic consolidation, the process by which a new democracy matures
Federal student loan consolidation
Joinder, the consolidation of multiple legal cases
Land consolidation, the process that consolidates small fragmented parcels of land into larger contiguous plots
Likud, a conservative Israeli political party whose name is Hebrew for "Consolidation"
Municipal consolidation, the act of merging two or more municipalities to form a single new one
Urban consolidation
See also
Consolidated (disambiguation)
Consolidator (disambiguation)
|
https://en.wikipedia.org/wiki/Optical%20computing
|
Optical computing or photonic computing uses light waves produced by lasers or incoherent sources for data processing, data storage or data communication for computing. For decades, photons have shown promise to enable a higher bandwidth than the electrons used in conventional computers (see optical fibers).
Most research projects focus on replacing current computer components with optical equivalents, resulting in an optical digital computer system processing binary data. This approach appears to offer the best short-term prospects for commercial optical computing, since optical components could be integrated into traditional computers to produce an optical-electronic hybrid. However, optoelectronic devices consume 30% of their energy converting electronic energy into photons and back; this conversion also slows the transmission of messages. All-optical computers eliminate the need for optical-electrical-optical (OEO) conversions, thus reducing electrical power consumption.
Application-specific devices, such as synthetic-aperture radar (SAR) and optical correlators, have been designed to use the principles of optical computing. Correlators can be used, for example, to detect and track objects, and to classify serial time-domain optical data.
Optical components for binary digital computer
The fundamental building block of modern electronic computers is the transistor. To replace electronic components with optical ones, an equivalent optical transistor is required. This is achieved by crystal optics (using materials with a non-linear refractive index). In particular, materials exist where the intensity of incoming light affects the intensity of the light transmitted through the material in a similar manner to the current response of a bipolar transistor. Such an optical transistor can be used to create optical logic gates, which in turn are assembled into the higher level components of the computer's central processing unit (CPU). These will be nonlinear optical crystals used to manipulate light beams into controlling other light beams.
Like any computing system, an optical computing system needs three things to function well:
optical processor
optical data transfer, e.g. fiber-optic cable
optical storage,
Substituting electrical components will need data format conversion from photons to electrons, which will make the system slower.
Controversy
There are some disagreements between researchers about the future capabilities of optical computers; whether or not they may be able to compete with semiconductor-based electronic computers in terms of speed, power consumption, cost, and size is an open question. Critics note that real-world logic systems require "logic-level restoration, cascadability, fan-out and input–output isolation", all of which are currently provided by electronic transistors at low cost, low power, and high speed. For optical logic to be competitive beyond a few niche applications, major breakthroughs in non-linear optica
|
https://en.wikipedia.org/wiki/Content%20repository%20API%20for%20Java
|
Content Repository API for Java (JCR) is a specification for a Java platform application programming interface (API) to access content repositories in a uniform manner. The content repositories are used in content management systems to keep the content data and also the metadata used in content management systems (CMS) such as versioning metadata. The specification was developed under the Java Community Process as JSR-170 (Version 1), and as JSR-283 (version 2). The main Java package is javax.jcr.
Overview
A JCR is a type of object database tailored to storing, searching, and retrieving hierarchical data. The JCR API grew out of the needs of content management systems, which require storing documents and other binary objects with associated metadata; however, the API is applicable to many additional types of applications. In addition to object storage, the JCR provides: APIs for versioning of data; transactions; observation of changes in data; and import or export of data to XML in a standard way.
Data structure
The data in a JCR consists of a tree of nodes with associated properties. Data is stored in the properties, which may hold simple values such as numbers and strings or binary data of arbitrary length. Nodes may optionally have one or more types associated with them which dictate the kinds of properties, number and type of child nodes, and certain behavioral characteristics of the nodes. Nodes may point to other nodes via a special reference type property. In this way nodes in a JCR offer both referential integrity and object-oriented concept of inheritance. Additional node types include the referenceable node type which allows the user to reference said node through use of a universally unique identifier. Another popular type is the versionable type. This makes the repository track a document's history and store copies of each version of the document.
Queries
A JCR can export portions of its tree to XML in two standard formats and can import hierarchies directly from XML. JSR 283 compliant implementations must support a standardized form of SQL for queries and a query object model QOM. JSR 283 deprecates the XPath query language defined in JSR 170.
The Apache Jackrabbit reference implementation of JCR also supports the integration of the Apache Lucene search engine to give full text searches of data in the repository.
Available implementations
Both JSRs are led by David Nüscheler of Adobe Systems (formerly of Day Software). Day had both a commercial JCR implementation called Content Repository Extreme (CRX) and was involved in the open source Apache Jackrabbit JCR, which had its 2.0 release in January 2010. ModeShape is another open source JCR implementation that supports JSR-283. Jahia, Hippo CMS and Magnolia are Enterprise Content Management systems built on the JCR API, using Jackrabbit as its repository by default, but able to plug in any other JSR-170 certified repository implementation. JSR-170 is also supported
|
https://en.wikipedia.org/wiki/Vantage-point%20tree
|
A vantage-point tree (or VP tree) is a metric tree that segregates data in a metric space by choosing a position in the space (the "vantage point") and partitioning the data points into two parts: those points that are nearer to the vantage point than a threshold, and those points that are not. By recursively applying this procedure to partition the data into smaller and smaller sets, a tree data structure is created where neighbors in the tree are likely to be neighbors in the space.
One generalization is called a multi-vantage-point tree (or MVP tree): a data structure for indexing objects from large metric spaces for similarity search queries. It uses more than one point to partition each level.
History
Peter Yianilos claimed that the vantage-point tree was discovered independently by him (Peter Yianilos) and by Jeffrey Uhlmann.
Yet, Uhlmann published this method before Yianilos in 1991.
Uhlmann called the data structure a metric tree, the name VP-tree was proposed by Yianilos. Vantage-point trees have been generalized to non-metric spaces using Bregman divergences by Nielsen et al.
This iterative partitioning process is similar to that of a -d tree, but uses circular (or spherical, hyperspherical, etc.) rather than rectilinear partitions. In two-dimensional Euclidean space, this can be visualized as a series of circles segregating the data.
The vantage-point tree is particularly useful in dividing data in a non-standard metric space into a metric tree.
Understanding a vantage-point tree
The way a vantage-point tree stores data can be represented by a circle. First, understand that each node of this tree contains an input point and a radius. All the left children of a given node are the points inside the circle and all the right children of a given node are outside of the circle. The tree itself does not need to know any other information about what is being stored. All it needs is the distance function that satisfies the properties of the metric space.
Searching through a vantage-point tree
A vantage-point tree can be used to find the nearest neighbor of a point . The search algorithm is recursive. At any given step we are working with a node of the tree that has a vantage point and a threshold distance . The point of interest will be some distance from the vantage point . If that distance is less than then use the algorithm recursively to search the subtree of the node that contains the points closer to the vantage point than the threshold ; otherwise recurse to the subtree of the node that contains the points that are farther than the vantage point than the threshold . If the recursive use of the algorithm finds a neighboring point with distance to that is less than then it cannot help to search the other subtree of this node; the discovered node is returned. Otherwise, the other subtree also needs to be searched recursively.
A similar approach works for finding the nearest neighbors of a point . In the recursion, t
|
https://en.wikipedia.org/wiki/RainbowCrack
|
RainbowCrack is a computer program which generates rainbow tables to be used in password cracking. RainbowCrack differs from "conventional" brute force crackers in that it uses large pre-computed tables called rainbow tables to reduce the length of time needed to crack a password drastically. RainbowCrack was developed by Zhu Shuanglei, and implements an improved time–memory tradeoff cryptanalysis attack which originated in Philippe Oechslin's Ophcrack.
Some organizations have made RainbowCrack's rainbow tables available free over the internet.
See also
DistrRTgen
References
External links
Project RainbowCrack - Developer's official site.
Rainbow Tables & Rainbow Crack tutorial
Recovering Windows passwords with RainbowCrack
Password cracking software
|
https://en.wikipedia.org/wiki/Network%20For%20Teaching%20Entrepreneurship
|
The Network for Teaching Entrepreneurship (formerly National Foundation for Teaching Entrepreneurship), also referred to as NFTE (pronounced Nifty), is an international nonprofit organization providing entrepreneurship training and educational programs to middle and high school students, college students, and adults. Much of NFTE's work focuses specifically on young people in underserved communities.
Through the organization's patented entrepreneurship education, NFTE helps young people build entrepreneurial creativity and skills. Since 1987, NFTE has reached more than a million young people, and currently has programs in 25 states across the U.S. and 14 countries around the globe.
NFTE provides highly academic programs and has worked with established universities such as Columbia University and University of Pennsylvania to develop programming that inspires learners to recognize opportunity and plan for successful futures by pursuing educational opportunities and by encouraging starting their own businesses.
History
Founded in 1987 by business executive and entrepreneur Steve Mariotti, while he was a public high school teacher in New York City’s South Bronx, NFTE was started up as a program to prevent high school dropout and improve academic performance among at-risk urban students. Combining his business background with his desire to teach at-risk students, Mariotti developed his concept based on the theory that low-income youth when given an opportunity in entrepreneurship, can employ their innate "street smarts" to develop "academic smarts" and "business smarts".
The organization's supporters include leading global companies, successful entrepreneurs and business leaders, family foundations, and respected philanthropic organizations.
Programs
NFTE programs instruct in entrepreneurship using experiential curriculum, developed through associations with major universities, as well as NFTE personnel's own experiences in teaching. There multiple versions designed for middle school, high school, and young adult students, with graduated levels of reading and complexity.
The curriculum may be used in a semester-long or year-long entrepreneurship course work, with the programs are offered in a variety of settings, including public schools, after-school programs at community-based organizations, and summer business camps. Business plan competitions and regional competitions organized by NFTE and program partners, lead to national NFTE competitions each year. Winning students receive a trip to the annual awards dinner in New York City and a grant to apply toward their business or college expenses.
NFTE runs intensive summer programs called BizCamps for students aged 13 to 18. The camp model includes field trips, guest speakers and full day, five-days-a-week course work, providing a solid understanding of business. At the end of the camp, students compete for cash awards to fund their businesses or college.
Anecdotal Results
Tim Perez, 18, of S
|
https://en.wikipedia.org/wiki/Cybrid%20%28disambiguation%29
|
Cybrid may refer to:
Cybrids (medical), a cytoplasmic hybrid
Cybrids, a race of artificially intelligent machines in the Earthsiege computer game universe
Cybrid, an artificial intelligence in a human body in the Hyperion Cantos novels of Dan Simmons
Cybrid, a comic book character published by Maximum Press
Cybrid, a brand of paintball marker
|
https://en.wikipedia.org/wiki/Love%2C%20Inc.%20%28TV%20series%29
|
Love, Inc. is an American television sitcom created by Andrew Secunda, which originally aired for one season on United Paramount Network (UPN) from September 22, 2005, to May 11, 2006. With an ensemble cast led by Busy Philipps, Vince Vieluf, Reagan Gomez-Preston, Ion Overman and Holly Robinson Peete, the show revolves around five matchmakers working at a dating agency. The series was produced by Chase TV, the Littlefield Company, Burg/Koules Television, and Paramount Television. It was distributed by UPN in its original run and later by LivingTV and Nelonen in the United Kingdom and Finland respectively. The executive producers were Adam Chase, Warren Littlefield, Mark Burg and Oren Koules.
The series was originally developed as a vehicle and sitcom debut for Shannen Doherty under the working title Wingwoman. Though picked up by UPN, Doherty was removed from the project at the request of the network due to her poor reception by preview audiences; she was replaced by Philipps. The show was set in New York City, but filming took place at Paramount Studios in Hollywood, Los Angeles and other locations in California. It included contemporary hip hop music and was promoted heavily by UPN to attract an urban audience, and to that end it was paired with Everybody Hates Chris as its lead-in on Thursday nights.
Love, Inc. suffered from low viewership despite its high ratings among young Hispanic women; it was canceled following UPN's merger with the WB to launch the CW in 2006. The series' cancellation, along with that of other black sitcoms, was criticized by media outlets for reducing representation of African American characters and the amount of roles for African American actors on television. Critical response to Love, Inc. was mixed; some critics praised its multi-ethnic cast, while others felt that the storylines and characters were unoriginal and Philipps' portrayal of her character was unsympathetic.
Premise
Set in New York City, the dating agency Love, Inc. features a staff of single friends desperately looking for love. Newly divorced Clea Lavoy, the founder and owner of the company, seeks out the help of her friend and employee Denise Johnson to reignite her romantic life. She struggles continually to find love despite Denise's best attempts. The future of the agency is jeopardized since its success relied on advertising Clea's "successful", nearly decade-long marriage. Love, Inc. also includes the receptionist Viviana, the style expert Francine, and the technician and photographer Barry.
Episodes typically depict the inner workings of the agency, such as their first experience with a lesbian client, a consultation with a former priest, and marketing strategies to appeal to geeks and agoraphobes. Hired as wingmen for their clients, the employees act as "guardian angels for the conversationally challenged". Each of the characters has various comedic and romantic adventures outside the agency, like Viviana's search for an eligible United St
|
https://en.wikipedia.org/wiki/Healtheon
|
Healtheon was a dot-com company founded by James H. Clark and Pavan Nigam. The company's mission was to "use the power of computing and the Internet to revolutionize the healthcare industry, stripping away its inefficiencies and inequities and streamlining it for the new millennium".
In 1999, the company was acquired by WebMD.
History
In mid-1995, James H. Clark, the founder of Netscape, came up with the idea to modernize technology in the health care industry. He founded Healthscape in early 1996 with funding from Kleiner Perkins Caufield & Byers. To avoid confusion with Netscape, the company changed its name to Healtheon.
The company's first big idea was to develop a system for linking insurers and human resources departments. However, the idea failed since insurers dismissed it as too expensive and human resource departments were not interested.
In 1997, Mike Long became chief executive officer of the company. Five months later, the company formed a research and development partnership with Brown & Toland, a network of 1,600 physicians in San Francisco.
in February 1998, the company announced the acquisition of ActaMed, a medical-records clearinghouse for doctors and insurers, for $150 million, which gave the company a source of revenue.
In August 1998, the company filed for an initial public offering, but the offering was cancelled in October 1998, after stock prices dropped due to the 1998 Russian financial crisis.
In February 1999, the company completed its IPO and became a public company and the stock price rose 400% on its first day of trading.
On April 21, 1999, the company announced the acquisition of MedE America for $478 million in stock.
On May 20, 1999, the company announced a merger with WebMD.
References
1996 establishments in California
American companies established in 1996
1999 initial public offerings
1999 mergers and acquisitions
Defunct online companies of the United States
Defunct software companies of the United States
Dot-com bubble
|
https://en.wikipedia.org/wiki/Claude%20Cr%C3%A9peau
|
Claude Crépeau is a professor in the School of Computer Science at McGill University. Ηe was born in Montreal, Quebec, Canada, in 1962. He received a master's degree from the Université de Montréal in 1986, and obtained his Ph.D. in Computer Science from MIT in 1990, working in the field of cryptography with Silvio Micali as his Ph.D. advisor and Gilles Brassard as his M.Sc advisor. He spent two years as a Postdoctoral
Fellow at Université d'Orsay, and was a CNRS researcher at École Normale Supérieure from 1992 to 1995. He was appointed associate professor at Université de Montréal in 1995,
and has been a faculty member at McGill University since 1998. He was a member of the Canadian Institute for Advanced Research
program on Quantum Information Processing from 2002 to 2012.
Crépeau is best known for his fundamental work in zero-knowledge proof, multi-party computing, quantum cryptography, and quantum teleportation.
In 1993, together with Charles H. Bennett, Gilles Brassard, Richard Jozsa, Asher Peres, and William Wootters, Crépeau invented quantum teleportation.
Publications
References
1962 births
20th-century Canadian scientists
21st-century Canadian scientists
Living people
Canadian computer scientists
Modern cryptographers
Scientists from Montreal
Academic staff of McGill University
Université de Montréal alumni
French National Centre for Scientific Research scientists
|
https://en.wikipedia.org/wiki/Real-Time%20Messaging%20Protocol
|
Real-Time Messaging Protocol (RTMP) is a communication protocol for streaming audio, video, and data over the Internet. Originally developed as a proprietary protocol by Macromedia for streaming between Flash Player and the Flash Communication Server, Adobe (which acquired Macromedia) has released an incomplete version of the specification of the protocol for public use.
The RTMP protocol has multiple variations:
RTMP proper, the "plain" protocol which works on top of Transmission Control Protocol (TCP) and uses port number 1935 by default.
RTMPS, which is RTMP over a Transport Layer Security (TLS/SSL) connection.
RTMPE, which is RTMP encrypted using Adobe's own security mechanism. While the details of the implementation are proprietary, the mechanism uses industry standard cryptographic primitives.
RTMPT, which is encapsulated within HTTP requests to traverse firewalls. RTMPT is frequently found utilizing cleartext requests on TCP ports 80 and 443 to bypass most corporate traffic filtering. The encapsulated session may carry plain RTMP, RTMPS, or RTMPE packets within.
RTMFP, which is RTMP over User Datagram Protocol (UDP) instead of TCP, replacing RTMP Chunk Stream. The Secure Real-Time Media Flow Protocol suite has been developed by Adobe Systems and enables end‐users to connect and communicate directly with each other (P2P).
While the primary motivation for RTMP was to be a protocol for playing Flash video, it is also used in some other applications, such as the Adobe LiveCycle Data Services ES.
Basic operation
RTMP is a TCP-based protocol which maintains persistent connections and allows low-latency communication. To deliver streams smoothly and transmit as much information as possible, it splits streams into fragments, and their size is negotiated dynamically between the client and server. Sometimes, it is kept unchanged; the default fragment sizes are 64 bytes for audio data, and 128 bytes for video data and most other data types. Fragments from different streams may then be interleaved, and multiplexed over a single connection. With longer data chunks, the protocol thus carries only a one-byte header per fragment, so incurring very little overhead. However, in practice, individual fragments are not typically interleaved. Instead, the interleaving and multiplexing is done at the packet level, with RTMP packets across several different active channels being interleaved in such a way as to ensure that each channel meets its bandwidth, latency, and other quality-of-service requirements. Packets interleaved in this fashion are treated as indivisible, and are not interleaved on the fragment level.
The RTMP defines several virtual channels on which packets may be sent and received, and which operate independently of each other. For example, there is a channel for handling RPC requests and responses, a channel for video stream data, a channel for audio stream data, a channel for out-of-band control messages (fragment size negotiation, et
|
https://en.wikipedia.org/wiki/The%20Pet%20Network
|
The Pet Network was a Canadian English language Category B specialty channel owned by Stornoway Communications. The channel broadcast entertainment and information programming for children and adults primarily related to pets in the form of feature films, documentary films, television dramas, cartoons, docuseries, and more.
History
In November 2000, a joint venture between Stornoway Communications and Cogeco were granted approval by the Canadian Radio-television and Telecommunications Commission (CRTC) to launch a television channel called The Pet Network, described as "a national English-language Category 2 specialty television service devoted to pets and working animals."
Prior to the channel's launch, in January 2004, the CRTC approved an application that would see Stornoway acquire Cogeco's interest in the proposed service, along with all other services owned by Stornoway, namely ichannel and bpm:tv.
In November 2004, Stornoway announced that it had reached an agreement with Rogers Communications to launch the channel on its digital cable platform in December 2004. The channel subsequently ran a 30-minute promotional program on a loop from November 23 until its official launch on December 3 at 5:00pm EST.
The channel would subsequently be added to various other television services providers over the years since its launch, however, the largest being Shaw Cable and Shaw Direct, added in October and November 2010, respectively. The launch on the Shaw Communications-owned platforms gave the channel wide distribution in Western Canada on cable and nationally via satellite.
On November 12, 2012, to coincide with the launch of the channel's 2012-2013 fall programming launch, The Pet Network underwent a rebranding including of a new logo, on-air graphics, and website.
In early April 2016, it was revealed by several television service providers, via their respective websites and other communications, that the channel would cease broadcasting on May 2, 2016. Stornoway Communications, who earlier shuttered another one of its own television channels, bpm:tv, in June 2015, revealed through regulatory filings, that it shuttered the channel and was requesting to revoke its broadcast licence due to inabilities in securing sustainable distribution agreements with television service providers. The company would later that year exit the television broadcasting business entirely when it shuttered its last remaining channel, ichannel, citing the same reasons for closing The Pet Network.
See also
List of programs broadcast by The Pet Network
References
External links
The Pet Network
Digital cable television networks in Canada
Television channels and stations established in 2004
Television channels and stations disestablished in 2016
Defunct television networks in Canada
2004 establishments in Canada
2016 disestablishments in Canada
English-language television stations in Canada
|
https://en.wikipedia.org/wiki/Leonardo%20World%20%28Canadian%20TV%20channel%29
|
Leonardo World was a Canadian category 2 Italian language digital cable television channel wholly owned by Telelatino Network Inc. The channel broadcast programming related to Italian arts and culture including cuisine, fashion, travel, and more. It was a Canadian version of the Italian channel, Leonardo World.
History
In December 2000, Telelatino Network was granted approval by the Canadian Radio-television and Telecommunications Commission (CRTC) to launch Sitcom Canada, described as "a national ethnic Category 2 specialty television service directed to Italians/Italian-speaking audiences. The programming will be primarily sourced from existing European thematic satellite services operated by the Sitcom Spa group including its news and information, travel, lifestyle, motoring and Italian design services."
The channel launched in June 2005 initially on Vidéotron as Leonardo World in a package marketed as Super Trio Italiano with 2 other newly launched Telelatino channels, SKY TG24 and Video Italia.
On September 11, 2007, Vidéotron discontinued carriage of Leonardo World and on September 18, 2007 the remaining carriers, Rogers Cable and Mountain Cablevision discontinued carriage of the service. In Telelatino's message posted on its website, they noted that they were "disappointed" with the decisions of the distributors to drop the channel, along with some of the others in the Super Trio Italiano package, suggesting it was not Telelatino's decision to discontinue the service, rather it was a lack of interest from distributors. The unease of the providers would prove correct, as the domestic Italian version of the channel ended a year later.
References
Defunct television networks in Canada
Former Corus Entertainment networks
Multicultural and ethnic television in Canada
Television channels and stations established in 2005
Television channels and stations disestablished in 2007
Italian-Canadian culture
Italian-language television stations
|
https://en.wikipedia.org/wiki/Signalling%20Connection%20Control%20Part
|
The Signalling Connection Control Part (SCCP) is a network layer protocol that provides extended routing, flow control, segmentation, connection-orientation, and error correction facilities in Signaling System 7 telecommunications networks. SCCP relies on the services of MTP for basic routing and error detection.
Published specification
The base SCCP specification is defined by the ITU-T, in recommendations Q.711 to Q.714, with additional information to implementors provided by Q.715 and Q.716. There are, however, regional variations defined by local standards bodies. In the United States, ANSI publishes its modifications to Q.713 as ANSI T1.112. The TTC publishes as JT-Q.711 to JT-Q.714, and Europe ETSI publishes ETSI EN 300-009-1: both of which document their modifications to the ITU-T specifications.
Routing facilities beyond MTP
Although MTP provides routing capabilities based on the Point Code, SCCP allows routing using a Point Code and Subsystem number or a Global Title.
A Point Code is used to address a particular node on the network, whereas a Subsystem number addresses a specific application available on that node. SCCP employs a process called Global Title Translation to determine Point Codes from Global Titles so as to instruct MTP on where to route messages.
SCCP messages contain parameters which describe the type of addressing used, and how the message should be routed:
Address Indicator
Routing indicator
Route on Global Title
Route on Point Code/Subsystem Number
Global title indicator
No Global Title
Global Title includes Translation Type (TT), Numbering Plan Indicator (NPI) and Type of Number (TON)
Global Title includes Translation Type only
Subsystem indicator
Subsystem Number present
Subsystem Number not present
Point Code indicator
Point Code present
Point Code not present
Global Title
Address Indicator Coding
Address Indicator coded as national (the Address Indicator is treated as international if not specified)
Protocol classes
SCCP provides 4 classes of protocol for its applications:
Class 0: Basic connectionless.
Class 1: Sequenced connectionless.
Class 2: Basic connection-oriented.
Class 3: Flow control connection oriented.
The connectionless protocol classes provide the capabilities needed to transfer one Network Service Data Unit (NSDU) in the "data" field of an XUDT, LUDT or UDT message. When one connectionless message is not sufficient to convey the user data contained in one NSDU, a segmenting/reassembly function for protocol classes 0 and 1 is provided. In this case, the SCCP at the originating node or in a relay node provides segmentation of the information into multiple segments prior to transfer in the "data" field of XUDT (or as a network option LUDT) messages. At the destination node, the NSDU is reassembled.
The connection-oriented protocol classes (protocol classes 2 and 3) provide the means to set up signalling connections in order to exchange a number of related NSDUs. The
|
https://en.wikipedia.org/wiki/Steve%20Lyons%20%28baseball%29
|
Stephen John Lyons (born June 3, 1960) is a former American professional baseball player who previously worked as a television sportscaster for the New England Sports Network (NESN). He played in Major League Baseball (MLB) for four teams over a period of nine seasons (1985–1993), including four stints with the Boston Red Sox. He was initially an outfielder and third baseman, but found a niche as a utility player. After his retirement as a player, he became a television baseball commentator. In 2021, NESN announced Lyons would not be returning to his in-studio pre- and post-game analyst role.
Early years
Lyons was born in 1960 in Tacoma, Washington, and grew up in Eugene and Beaverton, Oregon. His father, Richard Lyons, was a star athlete at Hudson High School in Massachusetts, who encouraged him to play baseball. He attended Marist Catholic High School in Eugene, before graduating from Beaverton High School in 1978. He attended Oregon State on a partial baseball scholarship. After his junior year, Lyons was a first round draft pick (19th overall) by the Boston Red Sox in the 1981 MLB draft; he left Oregon State without graduating, to begin his baseball career.
Playing career
Path to the majors
At the start of his professional career, Lyons played for four teams in Boston's farm system: the Class A Winston-Salem Red Sox in 1981, the Double-A Bristol Red Sox in 1982, the Double-A New Britain Red Sox in 1983, and the Triple-A Pawtucket Red Sox in 1984. He had a .248 batting average while hitting 43 home runs and 222 RBIs in 462 minor league games.
Boston Red Sox
After playing for years in the minor leagues, Lyons was promoted to the Red Sox in 1985, due in large part to having an impressive spring training; in addition to hitting well, his speed on the bases, and his ability to play a number of positions contributed to the decision. Lyons made his major league debut with the Red Sox on April 15, as a pinch runner at age 24. He collected his first major league hit on April 30, off of Donnie Moore of the California Angels. Starting in early June, Lyons became Boston's regular center fielder; he went on to play 133 games with the 1985 Red Sox, batting .264 with five home runs and 30 RBIs.
In 1986, Lyons appeared in 59 games through late June, batting .250 with one home run and 14 RBIs. On May 10, he was ejected for the only time in his MLB career, by umpire Terry Cooney after arguing a called third strike.
Chicago White Sox
Lyons was traded to the Chicago White Sox for pitcher Tom Seaver on June 29, 1986. For the remainder of the 1986 season, Lyons played 42 games with the White Sox, batting .203 with six RBIs; he also played 20 games with the Triple-A Buffalo Bisons. During 1987, Lyons split time between Chicago and their Triple-A affiliate, the Hawaii Islanders of the Pacific Coast League. With the White Sox, he batted .280 with one home run and 19 RBIs in 76 games.
Lyons spent all of the 1988 season with Chicago, batting .269 with five hom
|
https://en.wikipedia.org/wiki/Patrick%20Tufts
|
Patrick Tufts is a computer scientist and inventor. He created Alexa Internet's collaborative filter for creating related web site recommendations and later, one of Amazon.com's most successful product recommendation systems.
References
External links
Patrick Tufts's website
American computer scientists
Year of birth missing (living people)
Living people
|
https://en.wikipedia.org/wiki/Heat-assisted%20magnetic%20recording
|
Heat-assisted magnetic recording (HAMR) (pronounced "hammer") is a magnetic storage technology for greatly increasing the amount of data that can be stored on a magnetic device such as a hard disk drive by temporarily heating the disk material during writing, which makes it much more receptive to magnetic effects and allows writing to much smaller regions (and much higher levels of data on a disk).
The technology was initially seen as extremely difficult to achieve, with doubts expressed about its feasibility in 2013. The regions being written must be heated in a tiny area - small enough that diffraction prevents the use of normal laser focused heating - and requires a heating, writing and cooling cycle of less than 1 nanosecond, while also controlling the effects of repeated spot-heating on the drive platters, the drive-to-head contact, and the adjacent magnetic data which must not be affected. These challenges required the development of nano-scale surface plasmons (surface guided laser) instead of direct laser-based heating, new types of glass platters and heat-control coatings that tolerate rapid spot-heating without affecting the contact with the recording head or nearby data, new methods to mount the heating laser onto the drive head, and a wide range of other technical, development and control issues that needed to be overcome.
HAMR's planned successor, known as heated-dot magnetic recording (HDMR), or bit-pattern recording, is also under development, although not expected to be available until at least 2025. HAMR drives have the same form factor (size and layout) as existing traditional hard drives, and do not require any change to the computer or other device in which they are installed; they can be used identically to existing hard drives. 32 TB HAMR drives were released in June 2023.
Overview
There have been a series of technologies developed to allow hard drives to increase in capacity with little effect on cost. To increase storage capacity within the standard form factor, more data must be stored in a smaller space. New technologies to achieve this, have included perpendicular recording (PMR), helium-filled drives, shingled magnetic recording (SMR); however these all appear to have similar limitations to areal density (the amount of data that can be stored on a magnetic platter of a given size). HAMR is a technique that breaks this limit with magnetic media.
The limitation of traditional as well as perpendicular magnetic recording is due to the competing requirements of readability, writeability and stability (known as the Magnetic Recording Trilemma). The problem is that to store data reliably for very small bit sizes the magnetic medium must be made of a material with a very high coercivity (ability to maintain its magnetic domains and withstand any undesired external magnetic influences). The drive head must then overcome this coercivity when data is written. But as the areal density increases, the size occupied by one bit
|
https://en.wikipedia.org/wiki/Lifecell
|
lifecell (formerly life:)) is the third largest Ukrainian mobile telephone network operator, (after Kyivstar and Vodafone Ukraine) covering 98.82% of Ukrainian inhabited territory. The company is wholly owned by Turkcell. Lifecell's dialing prefixes are +38063, +38093 and +38073.
As of the end of Q3 of 2014, Ukrainian GSM operator life:) serves 13.6 million subscribers of prepaid, contract and corporate subscription. Company provides roaming opportunities in 184 countries via more than 456 roaming partners. The operator was the first mobile network operator in Ukraine to introduce EDGE technology that offers high speed data transfer. Now the technology is enabled in 100% life:) network.
As of today, six lifecell customer service centers and 193 exclusive shops operate in 103 cities of Ukraine. In addition, life:) subscribers can order life:) services through 153 branded points of sale and 49 487 GSM and non-GSM sales points throughout Ukraine.
History
In January 2005 Astelit launched GSM-1800 service under the life:) brand, and has attracted 7.6 million contract and prepaid subscribers by December 2007.
In June 2011, it was reported that Russian conglomerate Alfa Group was negotiating a deal to purchase the 45% share in Astelit.
In July 2015, Turkcell completed the acquisition of a 44.96% stake in the company owned by Rinat Akhmetov's SCM Holdings.
In 2017, the company ended its operations in Ukraine's separatist entities Donetsk People's Republic and Luhansk People's Republic.
In 2018, the operator received licenses for 4G LTE in the ranges of 2600 MHz and 1800 MHz. On March 30, 2018, lifecell launched LTE Advanced Pro standard in about 20 cities of Ukraine. First and foremost, Kyiv, Lviv, Kharkiv, Odesa and Dnipro. The company launched its 4G network on 1 July 2018. It is planned that by the end of 2018 the new standard will be available in 1500 cities, covering up to 50% of the total population of Ukraine.
Corporate Social Responsibility
In 2007, lifecell joined the UN Global Compact, as an initiative to encourage CSR (corporate social responsibility) practices by example including the 10 basic principles of human rights, labor standards, environmental protection and anti-corruption measures.
References
External links
lifecell Web site
Ukrainian companies established in 2005
Telecommunications companies established in 2005
Mobile phone companies of Ukraine
Ukrainian brands
Companies based in Kyiv
|
https://en.wikipedia.org/wiki/CEBus
|
CEBus(r), short for Consumer Electronics Bus, also known as EIA-600, is a set of electrical standards and communication protocols for electronic devices to transmit commands and data. It is suitable for devices in households and offices to use, and might be useful for utility interface and light industrial applications.
History
In 1984, members of the Electronic Industries Alliance (EIA) identified a need for standards that included more capability than the de facto home automation standard X10. X10 provided blind transmission of the commands ON, OFF, DIM, BRIGHT, ALL LIGHTS ON, and ALL UNITS OFF over powerline carrier, and later infrared and short range radio mediums. Over a six-year period, engineers representing international companies met on a regular basis and developed a proposed standard. They called this standard CEBus (pronounced "see bus"). The CEBus standard was released in September 1992.
CEBus is an open architecture set of specification documents which define protocols for products to communicate through power line wire, low voltage twisted pair wire, coaxial cable, infrared, RF, and fiber optics.
The CEBus Standard was developed on the foundation of an IR (infrared) protocol developed by GE (General Electric). This work was transferred to the EIA at the beginning of the EIA's involvement, under the plan that it would be expanded then maintained by the EIA.
Technology
Powerline carrier
The CEBus standard includes such things as spread spectrum modulation on the power line. Spread spectrum involves starting a modulation at one frequency, and altering the frequency during its cycle. The CEBus power line standard begins each burst at 100 kHz, and increases linearly to 400 kHz during a 100 microsecond duration. Both the bursts (referred to as "superior" state) and the absence of burst (referred to as the "inferior" state) create similar digits, so a pause in between is not necessary.
A digit 1 is created by an inferior or superior state that lasts 100 microseconds, and a digit 0 is created by an inferior or superior state that lasts 200 microseconds. Consequently, the transmission rate is variable, depending upon how many of the characters are one and how many are zero; the average rate is about 7,500 bits per second. A 400 microsecond burst is an end of frame indicator and also saves time. For example, if the 32-bit destination address field has some of its most significant bits zero, they need not be sent; the end of frame delimits the field and all receiving devices assume the untransmitted bits are zero.
CEBus transmissions are strings or packets of data that also vary in length, depending upon how much data is included. Some packets can be hundreds of bits in length. The minimum packet size is 64 bits, which at an average rate of 7,500 bits per second, will take about 1/117th of a second to be transmitted and received.
Other media
Other media besides powerline carrier are specified: coaxial cable, infrared, radio f
|
https://en.wikipedia.org/wiki/NetFlights
|
Netflights.com is an internet based travel company and part of Gold Medal Travel Group in the United Kingdom supplying flights, hotels, holidays and car hires. Established in 1992 as Airline Network, the company was privately owned 100% by Ken Townsley. In February 2014 the company was acquired by Dubai-based air service provider dnata, that is part of the Emirates Group.
Netflights.com won the Best Digital Experience in the Leisure, Entertainment, Events & Travel sector at the UK Digital Experience Awards 2014
and were commended in the Large Size Online Retailer Site of the Year category at the Online Retail Awards 2014.
References
External links
Companies based in Preston
Travel and holiday companies of the United Kingdom
British travel websites
Online travel agencies
|
https://en.wikipedia.org/wiki/Mendata
|
Mendata is a village and municipality located in the province of Biscay, in the autonomous community of Basque Country, northern Spain.
References
External links
MENDATA in the Bernardo Estornés Lasa - Auñamendi Encyclopedia (Euskomedia Fundazioa)
Municipalities in Biscay
|
https://en.wikipedia.org/wiki/Theresa-Marie%20Rhyne
|
Theresa-Marie Rhyne is an expert in the field of computer-generated visualization and a consultant who specializes in applying artistic color theories to visualization and digital media. She has consulted with the Stanford University Visualization Group on a color suggestion prototype system (2013), the Center for Visualization at the University of California at Davis (2013), the Scientific Computing and Imaging Institute at the University of Utah (2010 - 2012) & (2014) on applying color theory to ensemble data visualization and the Advanced Research Computing Unit at Virginia Tech (2019).
Her book on "Applying Color Theory to Digital Media and Visualization" was published by CRC Press on November 17, 2016. In 2017, Theresa-Marie began exploring color harmony Harmony (color) with the Munsell color system and her work on "Visual Analytics with Complementary and Analogous Color Harmony" was published in the Munsell Color Blog. In 2018, she organized and contributed to the SIGGRAPH 2018 panel on "Color Mavens Advise on Digital Media Creation and Tools", that included representation from X-Rite/Pantone, Adobe, Rochester Institute of Technology and Pixar and was presented in Vancouver, Canada. In 2019, she combined "her Munsell Color Harmony work with Scientific Visualization efforts". As of 2020, she began writing on applying color to data visualizations for "Nightingale", the journal of the Data Visualization Society and UX Collective "UX Collective", an independent user experience (UX), visual, and product design publication under Medium.
In the 1990s, as a government contractor with Lockheed Martin Technical Services, she was the founding visualization leader of the US Environmental Protection Agency's Scientific Visualization Center. In the 2000s, she founded the Center for Visualization and Analytics and the Renaissance Computing Institute's Engagement Facility at North Carolina State University. Rhyne is the editor of the Visualization Viewpoints Department for IEEE Computer Graphics & Applications Magazine and serves on the Advisory Board of IEEE Computer magazine. She received a BS degree, two MS degrees, and the Degree of Engineer in Civil Engineering from Stanford University. She entered the computer graphics field as a result of her computational and geographic modeling research in geotechnical and earthquake engineering. She is also an internationally recognized digital media artist who began creating digital media with early Apple computers, including the colorization of early Macintosh educational software. She is a senior member of the IEEE Computer Society and of the Association for Computing Machinery (ACM).
She is also the founding director of the Association for Computing Machinery Special Interest Group on Graphics Cartographic Visualization Project (ACM SIGGRAPH Carto Project) that began in 1996. This effort holds a Birds-of-a-Feather session each year at the annual SIGGRAPH conference.
References
External links
Theresa-Ma
|
https://en.wikipedia.org/wiki/Load-link/store-conditional
|
In computer science, load-linked/store-conditional (LL/SC), sometimes known as load-reserved/store-conditional (LR/SC), are a pair of instructions used in multithreading to achieve synchronization. Load-link returns the current value of a memory location, while a subsequent store-conditional to the same memory location will store a new value only if no updates have occurred to that location since the load-link. Together, this implements a lock-free, atomic, read-modify-write operation.
"Load-linked" is also known as load-link, load-reserved, and load-locked.
LL/SC was originally proposed by Jensen, Hagensen, and Broughton for the S-1 AAP multiprocessor at Lawrence Livermore National Laboratory.
Comparison of LL/SC and compare-and-swap
If any updates have occurred, the store-conditional is guaranteed to fail, even if the value read by the load-link has since been restored. As such, an LL/SC pair is stronger than a read followed by a compare-and-swap (CAS), which will not detect updates if the old value has been restored (see ABA problem).
Real implementations of LL/SC do not always succeed even if there are no concurrent updates to the memory location in question. Any exceptional events between the two operations, such as a context switch, another load-link, or even (on many platforms) another load or store operation, will cause the store-conditional to spuriously fail. Older implementations will fail if there are any updates broadcast over the memory bus. This is called weak LL/SC by researchers, as it breaks many theoretical LL/SC algorithms. Weakness is relative, and some weak implementations can be used for some algorithms.
LL/SC is more difficult to emulate than CAS. Additionally, stopping running code between paired LL/SC instructions, such as when single-stepping through code, can prevent forward progress, making debugging tricky.
Nevertheless, LL/SC is equivalent to CAS in the sense that either primitive can be implemented in terms of the other, in O(1) and in a wait-free manner.
Implementations
LL/SC instructions are supported by:
Alpha: ldl_l/stl_c and ldq_l/stq_c
PowerPC/Power ISA: lwarx/stwcx and ldarx/stdcx
MIPS: ll/sc
ARM: ldrex/strex (ARMv6 and v7), and ldxr/stxr (ARM version 8)
RISC-V: lr/sc
ARC: LLOCK/SCOND
Some CPUs require the address being accessed exclusively to be configured in write-through mode.
Typically, CPUs track the load-linked address at a cache-line or other granularity, such that any modification to any portion of the cache line (whether via another core's store-conditional or merely by an ordinary store) is sufficient to cause the store-conditional to fail.
All of these platforms provide weak LL/SC. The PowerPC implementation allows an LL/SC pair to wrap loads and even stores to other cache lines (although this approach is vulnerable to false cache line sharing). This allows it to implement, for example, lock-free reference counting in the face of changing object graphs with arbitrary counter reuse
|
https://en.wikipedia.org/wiki/Sorenson%20Squeeze
|
Sorenson Squeeze was a software video encoding tool used to compress and convert video and audio files on Mac OS X or Windows operating systems. It was sold as a standalone tool and has also long been bundled with Avid Media Composer.
History
Sorenson Squeeze was first announced on July 17, 2001, as the first variable bit rate (VBR) compression application for Mac OS X, and was released on October 29 of that same year. By March 2002, Sorenson Squeeze became available for Windows OS. Sorenson Squeeze was originally released as a tool for encoding videos for the Web and QuickTime playback but began adding new codecs as more versions were released.
The software was discontinued by Sorenson in January 2019, and correspondingly was no longer offered as part of Avid Media Composer.
Features
Squeeze includes a number of features to improve video & audio quality. Features included: GPU-accelerated H.264 encoding, adaptive bitrate encoding, HD encoding, and Dolby-certified AC3 Audio. Intelligent encoding presets available in Squeeze included: x265 (H.265) Main Concept H.264 and Main Concept H.264 CUDA. Adaptive bitrate encoding allows for optimal bitrate and error resilience based on network conditions, resulting in a dynamic adjustment of the video bitstream being delivered.
It encoded to multiple formats including QuickTime, Windows Media, Flash Video, Silverlight, Web-M & WMV. It uses multiple codecs, including the Sorenson codecs SV3 Pro and Spark, H.265, H.264, H.263, VP6, VC1, MPEG2, and many others. Squeeze operates on the Apple Macintosh and Microsoft Windows operating systems. Squeeze offers native plugins to Avid, Apple Final Cut Pro and Adobe Premiere (CS4, CS5) NLEs.
Each copy of Squeeze included the Dolby Certified AC3 Consumer encoder. Squeeze also includes a simplified review and approval process, which allows the user to automatically send secure, password-protected videos for immediate review. Instant feedback is received via Web or mobile.
Versions
Sorenson Squeeze was released on October 29, 2001.
Sorenson Squeeze for Macromedia Flash MX was released on March 14, 2002.
Sorenson Squeeze 3 for MPEG-4 was released in January 2003.
Sorenson Squeeze 3 Compression Suite was released in January 2003.
Sorenson Squeeze 5 was released on March 31, 2008.
Sorenson Squeeze was updated to version 5.1 on May 11, 2009.
Sorenson Squeeze 6 was released on November 3, 2009.
Sorenson Squeeze 7 was released January 25, 2011.
Awards
Streaming Media magazine Readers’ Choice Award for Encoding Software for 2007, 2008, 2009 and 2010.
2008 Vanguard Award from Digital Content Producer magazine
Squeeze 7 system requirements
Windows
Pentium IV-based computer or greater
Windows XP, Vista or 7
32- and 64-bit compatible (including AVID 64-bit update); Faster performance on 64-bit systems
512 MB RAM
120 MB available hard drive space
QuickTime 7.2 or later
DirectX 9.0b or later
Macintosh
Intel-based processor
Mac OS 10.4 or later
32- and 64-bit comp
|
https://en.wikipedia.org/wiki/Martin%20Porter
|
Martin F. Porter is the inventor of the Porter Stemmer, one of the most common algorithms for stemming English, and the Snowball programming framework. His 1980 paper "An algorithm for suffix stripping", proposing the stemming algorithm, has been cited over 8000 times (Google Scholar).
The Muscat search engine comes from research performed by Porter at the University of Cambridge and was commercialized in 1984 by Cambridge CD Publishing; it was subsequently sold to MAID which became the Dialog Corporation. Part of Dialog was then spun off to become BrightStation in 2000, which transitioned Open Muscat to a closed-source development model in 2001. Subsequently, a group of developers led by Porter initiated a project based on Open Muscat called Xapian and released the first official version on September 30, 2002.
In 2000 he was awarded the Tony Kent Strix award.
Porter read mathematics at St John's College, Cambridge (1963–66) and went to get a Diploma in Computer Science (1967) and a PhD. at Cambridge Computer Laboratory. He worked at the University of Leeds for a year before returning to Cambridge's Literary and Linguistic Computing Centre (1971-1974) and at the Sedgwick Museum as a programmer (1974-1976). In 1977, he became the Director of the Museum Documentation Advisory Unit (MDA).
Martin Porter is co-founder with John Snyder of the contextual targeting and content recommendation company, Grapeshot. John Snyder is listed as CEO and Martin Porter is listed as Chief Scientist. Grapeshot took £250,000 in UK government subsidies and subsequently raised £16m from UK investors.
On May 15, 2018, Oracle Corporation completed the acquisition of Grapeshot.
References
External links
Martin Porter's personal homepage
Living people
1944 births
Alumni of St John's College, Cambridge
Academics of the University of Leeds
|
https://en.wikipedia.org/wiki/Smoothfm
|
smoothfm is an Australian commercial radio network owned and operated by NOVA Entertainment. From original launch in 2012, The format was focused on providing 'more music and less talk' along with an eclectic easy-listening playlist, usually featuring ballads. From Valentine’s Day in February 2020, the station revised genres when the primary channel became an adult contemporary radio station.
History
Vega
Vega launched in 2005 to target the baby boomer market of listeners in the 40 to 60 age bracket, with a mix of talk and music from the 1960s to the 2000s. The positioning statement for the network was "On your wavelength" with a blue squiggle and sign wave as the logo.
The network first launched in August 2005 in Sydney and September 2005 in Melbourne along with announcers Angela Catterns, Denise Scott, Shaun Micallef, Beverley O'Connor, Wendy Harmer, Francis Leach, Wilbur Wilde, Tony Squires, Rebecca Wilson and Mike Perso.
To coincide with the station's positioning statement the first song played at the launch was Van Morrison's Wavelength.
Vega's stations had failed to attract a significant audience with the Sydney station reaching a 1.8 percent audience share, and the Melbourne station gained a 1.2 percent share, placing it second last (ahead only of ABC NewsRadio) and last out of surveyed stations in each market, respectively. However, station management state that the slow take-up was to be expected, claiming the target audience will be slower than some audience groups to try a new station.
In June 2006 the Sydney and Melbourne stations stopped sharing programmes. Both stations dropped their "40 years of music" slogan and moved drive-time hosts Rebecca Wilson and Tony Squires to share the Sydney breakfast slot with former host Angela Catterns. The changes were slow to grow market share, with the Sydney audience falling to 1.7% in Sydney (No. 6, 2006, but climbing slowly to 1.8% in Melbourne, which, at the time, was their highest audience share to date in Melbourne.
By the end of 2006, Vega had increased their ratings share in both cities and the Sydney station reached 2.8%, while the Melbourne station reached 3%.
In January 2007, Vega expanded its "Vega Variety" positioner to include "the '70s, and '80s and the best new songs", and also put out advertisements in the form of billboards and on the side of buses, based around that expanded positioner. It was hoped that this would encourage more listeners to sample the station.
In the first radio survey of 2007, Vega in Sydney and Melbourne again both had small increases, with the Sydney station reaching 3% and the Melbourne station reaching 3.3%. The station's best demographic performer on both stations in that survey, is the 25–39 age group.
By the 4th radio survey of 2007, Vega in Sydney and Melbourne had gone over the 4% mark, with the Sydney station rating 4.6% and the Melbourne station rating 4.4%. In the 40–54 age group, Vega in Sydney was the second highest rating FM station
|
https://en.wikipedia.org/wiki/Danese%20Cooper
|
Danese Cooper is an American programmer, computer scientist and advocate of open source software.
Career
Cooper has managed teams at Symantec and Apple Inc. For six years, she served as chief open source "evangelist" for Sun Microsystems before leaving to serve as senior director for open source strategies at Intel. In 2009 she worked as "Open Source Diva" at REvolution Computing (now Revolution Analytics). She is a board member of the Open Source Hardware Association. She is a board observer at Mozilla, and serves as a member of the Apache Software Foundation. She was a board member at the Drupal Association and the Open Source Initiative. In October 2018, Danese joined Irish tech company NearForm as VP of Special Initiatives.
Open source
Cooper's major work within the open source area of computer software has garnered her the nickname "Open Source Diva". She was recruited, while at a sushi bar in Cupertino, to a position at Sun working towards opening the source code to Java. Within six months she quit frustrated by the claims of open source development with Java that Sun made, only to find that little "open sourcing" was taking place. Sun sought to keep Cooper understanding her need to further open source software and re-hired her as their corporate open source officer. Her six years with Sun Microsystems is credited as the key to the company opening up its source code and lending support to Sun's OpenOffice.org software suite, Oracle Grid Engine, among others. In 2009 she joined REvolution Computing, a "provider of open source predictive analytics solutions", to work on community outreach amongst developers unfamiliar with the programming language R and general open source strategies. She has also made public speaking appearances discussing open sourcing, speaking at the Malaysian National Computer Confederation Open Source Compatibility Centre, OSCON, gov2.0 Expo, and the Southern California Linux Expo. In 2005 Cooper was a contributing author to Open Sources 2.0: The Continuing Evolution.
Wikimedia Foundation
In February 2010 Cooper was appointed Chief Technical Officer of the Wikimedia Foundation, leading their technical team and developing and executing the Foundation's technical strategy, along with which she would also be working on outreach with Wikimedia volunteers to expand on development and localizing of software. Cooper credits the open source community in helping her obtain the position at Wikimedia. She left the organization in July 2011.
InnerSource
Danese Cooper is the founder and chair of the InnerSource Commons Foundation. In 2018 she co-authored Adopting InnerSource with Klaas-Jan Stol which was published by O'Reilly.
daneseWorks
In June 2011, Cooper started a consultancy, daneseWorks, whose first client was inBloom. She is also currently helping Numenta with their open source & machine learning strategy.
Personal life
Danese Cooper obtained her high school diploma from Chadwick School and her B.A. from the Uni
|
https://en.wikipedia.org/wiki/Chow%20test
|
The Chow test (), proposed by econometrician Gregory Chow in 1960, is a test of whether the true coefficients in two linear regressions on different data sets are equal. In econometrics, it is most commonly used in time series analysis to test for the presence of a structural break at a period which can be assumed to be known a priori (for instance, a major historical event such as a war). In program evaluation, the Chow test is often used to determine whether the independent variables have different impacts on different subgroups of the population.
Illustrations
First Chow Test
Suppose that we model our data as
If we split our data into two groups, then we have
and
The null hypothesis of the Chow test asserts that , , and , and there is the assumption that the model errors are independent and identically distributed from a normal distribution with unknown variance.
Let be the sum of squared residuals from the combined data, be the sum of squared residuals from the first group, and be the sum of squared residuals from the second group. and are the number of observations in each group and is the total number of parameters (in this case 3, i.e. 2 independent variables coefficients + intercept). Then the Chow test statistic is
The test statistic follows the F-distribution with and degrees of freedom.
The same result can be achieved via dummy variables.
Consider the two data sets which are being compared. Firstly there is the 'primary' data set i={1,...,} and the 'secondary' data set i={+1,...,n}. Then there is the union of these two sets: i={1,...,n}. If there is no structural change between the primary and secondary data sets a regression can be run over the union without the issue of biased estimators arising.
Consider the regression:
Which is run over i={1,...,n}.
D is a dummy variable taking a value of 1 for i={+1,...,n} and 0 otherwise.
If both data sets can be explained fully by then there is no use in the dummy variable as the data set is explained fully by the restricted equation. That is, under the assumption of no structural change we have a null and alternative hypothesis of:
The null hypothesis of joint insignificance of D can be run as an F-test with degrees of freedom (DoF). That is: .
Remarks
The global sum of squares (SSE) is often called the Restricted Sum of Squares (RSSM) as we basically test a constrained model where we have assumptions (with the number of regressors).
Some software like SAS will use a predictive Chow test when the size of a subsample is less than the number of regressors.
References
External links
Computing the Chow statistic, Chow and Wald tests, Chow tests: Series of FAQ explanations from the Stata Corporation at https://www.stata.com/support/faqs/
: Series of FAQ explanations from the SAS Corporation
Time series statistical tests
Regression diagnostics
|
https://en.wikipedia.org/wiki/HERA-B
|
The HERA-B detector was a particle physics experiment at the HERA accelerator at the German national laboratory DESY that collected data from 1993 to 2003. It measured 8 m × 20 m × 9 m and weighed 1000 tons. The HERA-B collaboration consisted of some 250 scientists from 32 institutes in 13 countries.
Its primary aim was to measure CP violation in the decays of heavy B mesons in the late 1990s, several years ahead of the Large Hadron Collider and B Factory programs. Unlike most particle physics detectors, the particles were produced not by colliding two circulating beams head-on, nor by slamming the beam into a stationary target, but by moving a thin wire target directly into the waste 'halo' of the circulating proton beam of the HERA accelerator. The beam was unaffected by this 'scraping' but the collision rate produced could be made extremely high, around 5 to 10 million interactions per second (5–10 MHz). The collaboration developed a novel scheme for moving the wires and the vertex detectors very close to the beam (less than one centimetre), using a vacuum chamber and motorised 'arms', had to be developed.
External links
HERA-B webpage
HERA-B experiment record on INSPIRE-HEP
References
Particle experiments
B physics
Experimental particle physics
|
https://en.wikipedia.org/wiki/Turbine%20map
|
Each turbine in a gas turbine engine has an operating map. Complete maps are either based on turbine rig test results or are predicted by a special computer program. Alternatively, the map of a similar turbine can be suitably scaled.
Description
A turbine map shows lines of percent corrected speed (based on a reference value) plotted against the x-axis which is pressure ratio, but deltaH/T (roughly proportional to temperature drop across the unit/component entry temperature) is also often used. The y-axis is some measure of flow, usually non-dimensional flow or corrected flow, but not actual flow. Sometimes the axes of a turbine map are transposed, to be consistent with those of a compressor map. As in this case, a companion plot, showing the variation of isentropic (i.e. adiabatic) or polytropic efficiency, is often also included.
The turbine may be a transonic unit, where the throat Mach number reaches sonic conditions and the turbine becomes truly choked. Consequently, there is virtually no variation in flow between the corrected speed lines at high pressure ratios.
Most turbines however, are subsonic devices, the highest Mach number at the NGV throat being about 0.85. Under these conditions, there is a slight scatter in flow between the percent corrected speed lines in the 'choked' region of the map, where the flow for a given speed reaches a plateau.
Unlike a compressor (or fan), surge (or stall) does not occur in a turbine. This is because the gas flows through the unit in its natural direction, from high to low pressure. Consequently there is no surge line marked on a turbine map.
Working lines are difficult to see on a conventional turbine map because the speed lines bunch up. The map may be replotted, with the y-axis being the multiple of flow and corrected speed. This separates the speed lines, enabling working lines (and efficiency contours) to be cross-plotted and clearly seen.
Progressive unchoking of the expansion system
The following discussion relates to the expansion system of a 2 spool, high bypass ratio, unmixed, turbofan.
On the RHS is a typical primary (i.e. hot) nozzle map (or characteristic). Its appearance is similar to that of a turbine map, but it lacks any (rotational) speed lines. Note that at high flight speeds (ignoring the change in altitude), the hot nozzle is usually in, or close to, a choking condition. This is because the ram rise in the air intake factors-up the nozzle pressure ratio. At static (e.g. SLS) conditions there is no ram rise, so the nozzle tends to operate unchoked (LHS of plot).
The low pressure turbine 'sees' the variation in flow capacity of the primary nozzle. A falling nozzle flow capacity tends to reduce the LP turbine pressure ratio (and deltaH/T). As the left hand map shows, initially the reduction in LP turbine deltaH/T has little effect upon the entry flow of the unit. Eventually, however, the LP turbine unchokes, causing the flow capacity of the LP turbine to start to decrease.
A
|
https://en.wikipedia.org/wiki/Jakarta%20Monorail
|
The Jakarta Monorail ( JET Monorail) was a cancelled monorail network project in Jakarta, Indonesia. If completed, it would have comprised two lines, totalling up to .
The project had a tumultuous history. First awarded in 2003, the contract changed owners three times by 2005, before being abandoned with little more than some pillars built in 2008. The project was revived in February 2013, but cancelled again in 2015 due to financial problems and legal disputes. Jakarta Governor Basuki "Ahok" Tjahaja Purnama confirmed in September 2015 that the project would not continue.
History
Planning and early construction
The project was initially awarded in 2003 to Malaysian company MTrans, the technology owner and builders of the KL Monorail. Construction started in June 2004 but was halted after only a few weeks after the funds for the project stopped. MTrans' memorandum of understanding (MoU) was then cancelled after MTrans didn't respond adequately, and the MoU did not move towards a formal agreement.
The project was subsequently awarded to the Singaporean-led Omnico consortium, which proposed to use the Hitachi Monorail system (the base used for the KL Monorail) and then later on switched to the maglev technology by South Korean company Rotem.
In July 2005, the project changed hands again with a new MoU granted to a consortium of PT Bukaka Teknik Utama, PT INKA and Siemens Indonesia (former vice president Jusuf Kalla, who then assumed office, owns a large stake in Bukaka). Omnico contested this move, but construction continued nonetheless, under the assumption that the basic foundation piles and pillars can be used by whichever consortium and technology wins in the end. By 2006, a change in shareholder structure resulted to PT Indonesia Transit Central (ITC) controlling 98 percent of the shares in the company, leaving partner Omnico with only 2 percent, reduced from its initial 45 percent. Reports indicate fares of Rp 5,000 per trip were considered with government subsidies and that the Dubai Islamic Bank was sought as an investor of up to US$500 million but had pulled out when the government refused to provide guarantees if ridership were to fall below 160,000 per day.
In March 2008, developers PT Jakarta Monorail officially abandoned the project. Then, in April, numerous pylons to support the future track were illegally demolished, probably by metal thieves.
In September 2011, the Jakarta administration called off the monorail project with a maximum Rp.204 billion ($23.3 million) compensation to PT Jakarta Monorail.
Construction resumes
In February 2013, the revival of the monorail project was announced by Dedy S. Priatna, deputy of infrastructure at the National Development Planning Agency (Bappenas), as part of plans to improve public transport in Jakarta.
Private corporation PT Jakarta Monorail undertook the project's development. The consortium was 90% owned by Singapore-based Ortus Group and 10% by PT Indonesia Transit Central (
|
https://en.wikipedia.org/wiki/Arts%20and%20Humanities%20Data%20Service
|
The Arts and Humanities Data Service (AHDS) was a United Kingdom national service aiding the discovery, creation and preservation of digital resources in and for research, teaching and learning in the arts and humanities. It was established in 1996 and ceased operation in 2008 (although the website and related digital collections are still accessible).
Organised via a Managing Executive at King's College London and five AHDS Centres, hosted by various UK Higher Education Institutions, the AHDS was funded until the end of March 2008 by the Joint Information Systems Committee and the Arts and Humanities Research Council (AHRC).
However, in March 2007 the AHRC decided to cease funding for the AHDS beyond March 2008. As a result, the AHDS is now advising AHRC applicants to ensure their projects include a budget for the costs of preservation and sustainability (whether with the AHDS or another service).
Following the demise of AHDS, and the cessation of the Methods Network, the Centre for e-Research (CeRch) was established at King's College London in 2008. The Centre's aims are to facilitate interdisciplinary, institutional, national and international collaboration.
The five subject-based AHDS Centres are:
AHDS Archaeology — University of York
AHDS History — University of Essex
AHDS Literature, Languages and Linguistics — Oxford University
AHDS Performing Arts — HATII at the University of Glasgow
AHDS Visual Arts — University for the Creative Arts (Farnham campus)
Specific areas of work that the Arts and Humanities Data Service covers include:
digital preservation — including a series of preservation handbooks detailing specific preservation issues with various digital file formats and information on its digital repository
Advice on digitization — including a series of case studies of existing digitization projects, information papers on specific issues in digitization, and longer Guides to Good Practice dealing with digitization topics in particular arts and humanities disciplines
Online collections created by universities and museums in the UK. These include:
An online catalogue with details of collections held within the archive
Designing Shakespeare — 40 years of Shakespearian performance in London and Stratford
The Stormont Papers - Parliamentary debates from Northern Ireland from 1921 to 1972.
References
External links
Official website
CeRch website
1996 establishments in the United Kingdom
Arts in the United Kingdom
Humanities organizations
Jisc
2008 disestablishments in the United Kingdom
Digital humanities projects
|
https://en.wikipedia.org/wiki/Insert
|
Insert may refer to:
Insert (advertising)
Insert (composites)
Insert (effects processing)
Insert (filmmaking)
Insert key on a computer keyboard, used to switch between insert mode and overtype mode
Insert (molecular biology)
Insert (SQL)
Fireplace insert
Package insert
Threaded insert
Another name for a tipped tool, a cutting tool used in metalworking
Another name for patch point, a feature on audio mixing consoles
Inserts, a 1974 film directed by John Byrum
See also
Insertion (disambiguation)
|
https://en.wikipedia.org/wiki/Kiros
|
Kiros may refer to:
Kiros (band), a Canadian rock band
Kiros Seagill, a computer games character in Fantasy VIII
Ethiopian & Eritrean name
Kiros (Ge'ez: ኪሮስ) is a male given name of Ge'ez origin that may refer to:
Kiros Alemayehu, an Ethiopian Tigrigna singer
Aheza Kiros (born 1985), Ethiopian long-distance runner
Kiros Asfaha, an Eritrean singer
Kiros (footballer) (born 1988), Kiros Stanlley Soares Ferraz, brazilian footballer
Amharic-language names
Ethiopian given names
|
https://en.wikipedia.org/wiki/UDP%20Helper%20Address
|
A UDP Helper Address is a special router configuration used to forward broadcast network traffic from a client machine on one subnet to a server in another subnet.
Usage example
The Internet Protocol requires every network interface controller to be assigned at least one unique IP address. Groups of machines with similar addresses are considered to be part of the same logical subnet. One method of assigning IP addresses is DHCP in which addresses typically are issued by a DHCP server running on one or more hosts. If one of these machines is on the same subnet as its clients, the DHCP server can respond to their broadcast DHCP requests and issue an address. But the DHCP servers may be hosted on a different subnet and, by default, most routers do not pass broadcast messages to nodes outside their own subnet.
To resolve this, a UDP helper address is established in the router configuration to forward broadcast network traffic outside the local subnet. If a DHCP client outside the DHCP server's subnet broadcasts an address request, it is the helper that forwards the message to the DHCP server. The server then chooses an address and sends the client a unicast message, using the helper to send the message back to the client's subnet. The address is reserved for a limited time while the DHCP server waits for a response. If the client responds with another broadcast message, the DHCP server distributes the address. Helper addresses also can be used to forward other UDP traffic (for example, BOOTP).
Implementation
Cisco's first implementation of this protocol was introduced in version 10 of their router software. It is implemented through the use of the router configuration commands ip helper-address and ip forward-protocol.
ip helper-address
To enable the forwarding of User Datagram Protocol (UDP) broadcasts, including BOOTP, received on an interface, use the ip helper-address command in interface configuration mode. To disable the forwarding of broadcast packets to specific addresses, use the no form of this command.
Syntax Description:
ip helper-address [vrf name | global] address [redundancy vrg-name]
no ip helper-address [vrf name | global] address [redundancy vrg-name]
vrf name
(Optional) Enables VPN routing and forwarding (VRF) instance and VRF name.
global
(Optional) Configures a global routing table.
address
Destination broadcast or host address to be used when forwarding UDP broadcasts. There can be more than one helper address per interface.
redundancy vrg-name
(Optional) Defines the VRG group name.
Special consideration
The use of UDP helper addresses can cause issues with some Windows-based network configurations.. According to Microsoft these issues stem from the fact that ports 137,138 are forwarded by default on Cisco routers. Since these ports are used by NetBIOS to help determine network configuration the added broadcasts can confuse the system.
See also
Packet forwarding
Port forwarding
References
Internet protoco
|
https://en.wikipedia.org/wiki/Automated%20reasoning
|
In computer science, in particular in knowledge representation and reasoning and metalogic, the area of automated reasoning is dedicated to understanding different aspects of reasoning. The study of automated reasoning helps produce computer programs that allow computers to reason completely, or nearly completely, automatically. Although automated reasoning is considered a sub-field of artificial intelligence, it also has connections with theoretical computer science and philosophy.
The most developed subareas of automated reasoning are automated theorem proving (and the less automated but more pragmatic subfield of interactive theorem proving) and automated proof checking (viewed as guaranteed correct reasoning under fixed assumptions). Extensive work has also been done in reasoning by analogy using induction and abduction.
Other important topics include reasoning under uncertainty and non-monotonic reasoning. An important part of the uncertainty field is that of argumentation, where further constraints of minimality and consistency are applied on top of the more standard automated deduction. John Pollock's OSCAR system is an example of an automated argumentation system that is more specific than being just an automated theorem prover.
Tools and techniques of automated reasoning include the classical logics and calculi, fuzzy logic, Bayesian inference, reasoning with maximal entropy and many less formal ad hoc techniques.
Early years
The development of formal logic played a big role in the field of automated reasoning, which itself led to the development of artificial intelligence. A formal proof is a proof in which every logical inference has been checked back to the fundamental axioms of mathematics. All the intermediate logical steps are supplied, without exception. No appeal is made to intuition, even if the translation from intuition to logic is routine. Thus, a formal proof is less intuitive and less susceptible to logical errors.
Some consider the Cornell Summer meeting of 1957, which brought together many logicians and computer scientists, as the origin of automated reasoning, or automated deduction. Others say that it began before that with the 1955 Logic Theorist program of Newell, Shaw and Simon, or with Martin Davis’ 1954 implementation of Presburger's decision procedure (which proved that the sum of two even numbers is even).
Automated reasoning, although a significant and popular area of research, went through an "AI winter" in the eighties and early nineties. The field subsequently revived, however. For example, in 2005, Microsoft started using verification technology in many of their internal projects and is planning to include a logical specification and checking language in their 2012 version of Visual C.
Significant contributions
Principia Mathematica was a milestone work in formal logic written by Alfred North Whitehead and Bertrand Russell. Principia Mathematica - also meaning Principles of Mathematics - was written w
|
https://en.wikipedia.org/wiki/MNP
|
MNP can stand for:
Manor Park railway station, a National Rail station in England
2-methyl-2-nitrosopropane
Microcom Networking Protocol, for modems
MNP LLP (Meyers Norris Penny) - a Canadian accounting firm headquartered in Calgary, Alberta
Mobile number portability, of telephone numbers
National Museum, Poznań
National Order Party (Milli Nizam Partisi), Turkey
Netherlands Environmental Assessment Agency (Milieu en Natuur Planbureau)
Northern Mariana Islands, in the Pacific
Northern Min, a Chinese language
|
https://en.wikipedia.org/wiki/Transaction%20Capabilities%20Application%20Part
|
Transaction Capabilities Application Part, from ITU-T recommendations Q.771-Q.775 or ANSI T1.114 is a protocol for Signalling System 7 networks. Its primary purpose is to facilitate multiple concurrent dialogs between the same sub-systems on the same machines, using Transaction IDs to differentiate these, similar to the way TCP ports facilitate multiplexing connections between the same IP addresses on the Internet.
TCAP uses ASN.1 BER encoding, as well as the protocols it encapsulates, namely MAP in mobile phone networks or INAP in Intelligent Networks.
Overview
TCAP messages are sent over the wire between machines. TCAP primitives are sent between the application and the local TCAP stack. All TCAP messages are primitives but there are primitives that are not messages. In other words, some are only transferred inside the local machine. A TCAP primitive is made up of one or more TCAP components.
An ITU-T TCAP primitive may be one of the following types:
A Begin primitive has an Originating Transaction ID (up to 4 bytes). A Continue primitive has an Originating Transaction ID and a Destination Transaction ID. End and Abort primitives only have a Destination Transaction ID. Each primitive has both an optional component and (optional) dialogue portions. The component portion for the unidirectional primitive is mandatory.
The dialogue portion carries dialogue or unidialogue control PDUs. For MAP and INAP, dialogue PDU is used which performs establishment and release of dialogues for the application context provided in the primitives. Following primitives are defined for the dialogue PDU:
Each ITU-T TCAP component may be one of the following types:
Invoke components have a signed 7 bit InvokeID which is present in all the other components to identify which invoke they relate to.
TCAP is based on the OSI defined ROSE, Remote Operations Services Element protocol.
Transaction ID
The transaction ID is a TCAP reference for a set of TCAP operations that are performed within a single dialog. When machine A starts a TCAP dialog with another machine B, A sends a Begin message to B. This Begin message contains an Originating Transaction ID, which is the Transaction ID reference for A. When machine B replies to A with a Continue message, it includes A's Transaction ID as the Destination Transaction ID. Furthermore, B includes its own Transaction ID as the Originating Transaction ID.
As the TCAP dialog goes on, each Continue message includes the Transaction ID of the destination machine as the Destination Transaction ID and the Transaction ID of the originating machine as the Originating Transaction ID. When either machine wants to close the dialog, it sends an End message or an Abort message to the other machine. This message contains the Destination Transaction ID only.
Invoke ID
Invoke ID is a TCAP reference for a specific TCAP operation and must be unique within a dialog.
Decoded TCAP Message
This is a MO-SMS sent by a MAP layer and the hex stream
|
https://en.wikipedia.org/wiki/Active%20record%20pattern
|
In software engineering, the active record pattern is an architectural pattern. It is found in software that stores in-memory object data in relational databases. It was named by Martin Fowler in his 2003 book Patterns of Enterprise Application Architecture. The interface of an object conforming to this pattern would include functions such as Insert, Update, and Delete, plus properties that correspond more or less directly to the columns in the underlying database table.
The active record pattern is an approach to accessing data in a database. A database table or view is wrapped into a class. Thus, an object instance is tied to a single row in the table. After creation of an object, a new row is added to the table upon save. Any object loaded gets its information from the database. When an object is updated, the corresponding row in the table is also updated. The wrapper class implements accessor methods or properties for each column in the table or view.
This pattern is commonly used by object persistence tools and in object–relational mapping (ORM). Typically, foreign key relationships will be exposed as an object instance of the appropriate type via a property.
Implementations
Implementations of the concept can be found in various frameworks for many programming environments. For example, if there is a table parts in a database with columns name (string type) and price (number type), and the Active Record pattern is implemented in the class Part, the pseudo-code
will create a new row in the parts table with the given values, and is roughly equivalent to the SQL command
INSERT INTO parts (name, price) VALUES ('Sample part', 123.45);
Conversely, the class can be used to query the database:
This will find a new Part object based on the first matching row from the parts table whose name column has the value "gearbox". The SQL command used might be similar to the following, depending on the SQL implementation details of the database:
SELECT * FROM parts WHERE name = 'gearbox' LIMIT 1; -- MySQL or PostgreSQL
Criticism
Large files
Because the data and the database access methods are in the same file, those files end up being bigger.
Single responsibility principle and separation of concerns
Another critique of the active record pattern is that, due to the strong coupling of database interaction and application logic, an active record object does not follow the single responsibility principle and separation of concerns. This is opposed to multitier architecture, which properly addresses these practices. Because of this, the active record pattern is best and most often employed in simple applications that are all forms-over-data with CRUD functionality, or only as one part of an architecture. Typically that part is data access and why several ORMs implement the active record pattern.
See also
References
Architectural pattern (computer science)
Software design patterns
|
https://en.wikipedia.org/wiki/A.out
|
a.out is a file format used in older versions of Unix-like computer operating systems for executables, object code, and, in later systems, shared libraries. This is an abbreviated form of "assembler output", the filename of the output of Ken Thompson's PDP-7 assembler. The term was subsequently applied to the format of the resulting file to contrast with other formats for object code.
"a.out" remains the default output file name for executables created by certain compilers and linkers when no output name is specified, even though the created files actually are not in the a.out format.
Support for the a.out format was removed in Linux kernel version 5.18.
History
An a.out format for the PDP-7, similar to the a.out format used on the PDP-11, appeared in the first edition of UNIX.
It was superseded by the COFF format in AT&T Unix System V, which was in turn superseded by the ELF format in System V Release 4. a.out files are identified by the magic numbers with octal codes 0407, 0410 or 0413.
Though Berkeley Unix continued using the a.out format for some time, modern BSD-systems have since switched to ELF. NetBSD/i386 switched formally from a.out to ELF in its 1.5 release (Dec. 2000). FreeBSD/i386 switched to ELF as a standard format during the 2.2 to 3.0 transition in 1998, however support for a.out remained in the system.
MINIX 3 switched to ELF in the 3.2.0 release.
Linux also used a.out only until kernel 1.2 (Mar. 1995), when it was superseded by ELF for that platform as well. ELF support was added in the experimental 1.1.52 kernel. Linux's transition to ELF was more or less forced due to the complex nature of building a.out shared libraries on that platform, which included the need to register the virtual address space at which the library was located with a central authority, as the a.out ld.so in Linux was unable to relocate shared libraries. The various BSD flavors were able to continue using a.out binaries long after Linux was forced to switch to ELF, due to the somewhat more flexible nature of the BSD a.out format compared to that of Linux. The a.out file format on Linux was deprecated with the release of the 5.1 Linux kernel and the last parts of source code handling it were removed in 5.18.
Debugging
The a.out support for debug information is done through the use of special entries in the symbol table called stabs. The stabs format has also been used in many COFF and ELF variations.
See also
Comparison of executable file formats
Portable Executable
References
External links
a.out manual page for Version 6 Unix
a.out manual page for 2.11BSD
a.out manual page for FreeBSD
Executable file formats
|
https://en.wikipedia.org/wiki/Venix
|
Venix is a discontinued version of the Unix operating system for low-end computers, developed by VenturCom, a "company that specialises in the skinniest implementations of Unix".
Overview
A working version of Venix/86 for the IBM PC XT was demoed at COMDEX in May 1983. It was based on Version 7 Unix with some enhancements from BSD (notably vi, more and csh) and custom inter-process communication mechanisms. It was the first licensed UNIX operating system available for the IBM PC and its compatibles, supported read/write access to a separate DOS/FAT-partition and could run in as little as 128 KB (256 KB - 512 KB recommended).
In September 1984, Venix/86 Encore was released; it supported a number of early PC-compatibles, including the AT&T 6300, the Zenith 150, the (first) NCR PC, and the Texas Instruments Professional Computer.
Venix Encore, which then became Venix 2.0, was still based on Version 7 Unix, and ran on the DEC Rainbow 100 (Venix/86R) as well as PCs (Venix/86 and /286). The system contained a number of enhancements, notably tools to access DOS files directly on a DOS/FAT-partition, and an updated ADB debugger. The system came in two flavors: a 2-user version priced at $800, and an 8-user version at $1,000. There were no technical differences between the two.
Confusingly, Venix 2.0 for the DEC PRO-380 microcomputer (Venix/PRO) was based "essentially" on System III. It no longer ran on the PRO-350. This is made clear in the ckermit 4E build instructions, which has a special target for Pro running Venix 1.0, but instructs the user to use the sysiii target for the Pro running Venix 2.0. These same sources also make it clear that Venix had an enhanced TTY interface relative to a pure V7 Unix System.
Venix 2.1 was released for at least the PC. Like the original Venix/86, it included a C compiler, a BASIC interpreter and added a Fortran 77 compiler as an option. An optional driver kit made it possible to develop hardware drivers for the system and generate new kernels. In November 1985, Unisource Software Corp., a Venix retailer, announced the availability of RM/Cobol for Venix.
From version 3.0, Venix was based on System V. A real-time version based on System V.3.2 was released for the 386 in 1990.
The last version, Venix 4.2.1, based on UNIX System V Release 4.2 (UnixWare), was released in 1994. The workstation system included the real-time operating system, NFS and TCP/IP networking, X, OpenLook and Motif GUIs, and the Veritas journaling File System (vxfs). A development system included additionally an ANSI C compiler, a library of real-time functions, GUI development software, real-time development utilities, and selected industrial I/O device drivers.
Reception
In its 1984 review PC Magazine found Venix functional, despite some bugs in the initial versions. Its use of the BIOS for accessing devices made it more portable than its competitor PC/IX, but slowed down its display processing; the disk access speed was found to be simila
|
https://en.wikipedia.org/wiki/YTA
|
YTA may refer to:
Pembroke Airport, Ontario, Canada with IATA code YTA
Youth Taking Action
YTA TV, an American television network formerly known as Youtoo America
|
https://en.wikipedia.org/wiki/MAJC
|
MAJC (Microprocessor Architecture for Java Computing) was a Sun Microsystems multi-core, multithreaded, very long instruction word (VLIW) microprocessor design from the mid-to-late 1990s. Originally called the UltraJava processor, the MAJC processor was targeted at running Java programs, whose "late compiling" allowed Sun to make several favourable design decisions. The processor was released into two commercial graphical cards from Sun. Lessons learned regarding multi-threads on a multi-core processor provided a basis for later OpenSPARC implementations such as the UltraSPARC T1.
Design elements
Move instruction scheduling to the compiler
Like other VLIW designs, notably Intel's IA-64 (Itanium), MAJC attempted to improve performance by moving several expensive operations out of the processor and into the related compilers. In general, VLIW designs attempt to eliminate the instruction scheduler, which often represents a relatively large amount of the overall processor's transistor budget. With this portion of the CPU removed to software, those transistors can be used for other purposes, often to add additional functional units to process more instructions at once, or to increase the amount of cache memory to reduce the amount of time spent waiting for data to arrive from the much slower main memory. Although MAJC shared these general concepts, it was unlike other VLIW designs, and processors in general, in a number of specific details.
Generalized functional units
Most processors include a number of separate "subprocessors" known as functional units that are tuned to operating on a particular type of data. For instance, a modern CPU typically has two or three functional units dedicated to processing integer data and logic instructions, known as ALUs, while other units handle floating-point numbers, the FPUs, or multimedia data, SIMD. MAJC instead used a single multi-purpose functional unit which could process any sort of data. In theory this approach meant that processing any one type of data would take longer, perhaps much longer, than processing the same data in a unit dedicated to that type of data. But on the other hand, these general-purpose units also meant that you did not end up with large portions of the CPU being unused because the program just happened to be doing many (for example) floating point calculations at that particular point in time.
Variable-length instruction packets
Another difference is that MAJC allowed for variable-length "instruction packets", which under VLIW contain a number of instructions that the compiler has determined can be run at the same time. Most VLIW architectures use fixed-length packets and when they cannot find an instruction to run they instead fill it with a NOP, which simply takes up space. Although variable-length instruction packets added some complexity to the CPU, it reduced code size and thus the number of expensive cache misses by increasing the amount of code in the cache at any one
|
https://en.wikipedia.org/wiki/Robust%20statistics
|
Robust statistics are statistics with good performance for data drawn from a wide range of probability distributions, especially for distributions that are not normal. Robust statistical methods have been developed for many common problems, such as estimating location, scale, and regression parameters. One motivation is to produce statistical methods that are not unduly affected by outliers. Another motivation is to provide methods with good performance when there are small departures from a parametric distribution. For example, robust methods work well for mixtures of two normal distributions with different standard deviations; under this model, non-robust methods like a t-test work poorly.
Introduction
Robust statistics seek to provide methods that emulate popular statistical methods, but are not unduly affected by outliers or other small departures from model assumptions. In statistics, classical estimation methods rely heavily on assumptions that are often not met in practice. In particular, it is often assumed that the data errors are normally distributed, at least approximately, or that the central limit theorem can be relied on to produce normally distributed estimates. Unfortunately, when there are outliers in the data, classical estimators often have very poor performance, when judged using the breakdown point and the influence function, described below.
The practical effect of problems seen in the influence function can be studied empirically by examining the sampling distribution of proposed estimators under a mixture model, where one mixes in a small amount (1–5% is often sufficient) of contamination. For instance, one may use a mixture of 95% a normal distribution, and 5% a normal distribution with the same mean but significantly higher standard deviation (representing outliers).
Robust parametric statistics can proceed in two ways:
by designing estimators so that a pre-selected behaviour of the influence function is achieved
by replacing estimators that are optimal under the assumption of a normal distribution with estimators that are optimal for, or at least derived for, other distributions: for example using the t-distribution with low degrees of freedom (high kurtosis; degrees of freedom between 4 and 6 have often been found to be useful in practice ) or with a mixture of two or more distributions.
Robust estimates have been studied for the following problems:
estimating location parameters
estimating scale parameters
estimating regression coefficients
estimation of model-states in models expressed in state-space form, for which the standard method is equivalent to a Kalman filter.
Definition
There are various definitions of a "robust statistic." Strictly speaking, a robust statistic is resistant to errors in the results, produced by deviations from assumptions (e.g., of normality). This means that if the assumptions are only approximately met, the robust estimator will still have a reasonable efficiency, and reaso
|
https://en.wikipedia.org/wiki/Weak%20ontology
|
In computer science, a weak ontology is an ontology that is not sufficiently rigorous to allow software to infer new facts without intervention by humans (the end users of the software system).
By this standard – which evolved as artificial intelligence methods became more sophisticated, and computers were used to model high human impact decisions – most databases use weak ontologies.
A weak ontology is adequate for many purposes, including education, where one teaches a set of distinctions and tries to induce the power to make those distinctions in the student. Stronger ontologies only tend to evolve as the weaker ones prove deficient. This phenomenon of ontology becoming stronger over time parallels observations in folk taxonomy about taxonomy: as a society practices more labour specialization, it tends to become intolerant of confusions and mixed metaphors, and sorts them into formal professions or practices. Ultimately, these are expected to reason about them in common, with mathematics, especially statistics and logic, as the common ground.
On the World Wide Web, folksonomy in the form of tag schemas and typed links has tended to evolve slowly in a variety of forums, and then be standardized in such schemes as microformats as more and more forums agree. These weak ontology constructs only become strong in response to growing demands for a more powerful form of search engine than is possible with keywording.
Ontology (information science)
|
https://en.wikipedia.org/wiki/MacMach
|
MacMach is a computer operating system from the early 1990s, developed by Carnegie Mellon University. Architecturally, it consists of Berkeley Software Distribution (BSD) 4.3 code running on the Mach microkernel, with the Apple Macintosh System 7 running experimentally as a Mach task. The entire system runs on Macintoshes based on the Motorola 68000 series (68k) family of microprocessors. Its license requires the user to have an AT&T UNIX license, and includes Apple, Inc.'s restriction against further redistribution.
See also
MkLinux
MachTen
A/UX
NeXTSTEP
References
Berkeley Software Distribution
Mach (kernel)
Microkernel-based operating systems
Microkernels
|
https://en.wikipedia.org/wiki/CTV%20Atlantic
|
CTV Atlantic (formerly known as the Atlantic Television System, or ATV) is a system of four television stations in the Maritimes, owned and operated by the CTV Television Network, a division of Bell Media. Despite the name, it is not available on basic cable or analog in Newfoundland and Labrador even though that province is part of Atlantic Canada.
The CTV Atlantic stations are:
CJCH-DT – Halifax, Nova Scotia (flagship station)
CJCB-DT – Sydney, Nova Scotia
CKCW-DT – Moncton, New Brunswick/Charlottetown, Prince Edward Island
CKLT-DT – Saint John, New Brunswick
All four stations refer to themselves on air as CTV, not by their call letters. CJCB and CKCW simulcast CJCH for most of the day, but air separate commercials and local telethons. CKLT is a full repeater of CKCW. However, all four stations are separately licensed by the Canadian Radio-television and Telecommunications Commission (CRTC). Station information and history is discussed in each station's own article.
History
CJCH was a charter CTV affiliate when that network began on October 1, 1961. CJCB and CKCW were established as CBC Television stations in 1954. CKCW affiliated with CTV in 1969, adding sister station CKLT the same year. Between 1969 and 1976, CKCW's relay stations in Northern New Brunswick (Campbellton, Upsalquitch Lake and Newcastle [Miramichi], plus three relay stations in Quebec) carried a combined CBC/CTV schedule, becoming full relays of CKCW after CHSJ in Saint John, the CBC affiliate in New Brunswick, established its own relays in the area.
CHUM Limited, a Toronto broadcaster, bought CJCH in 1970, CJCB in 1971 and CKCW and CKLT in 1972. After the CBC opened a relay in Sydney, CHUM switched CJCB's affiliation to CTV and merged its four Maritimes CTV affiliates into the ATV system. Shortly afterward, CKCW opened a rebroadcaster in Charlottetown, making Prince Edward Island the last province to get CTV. On February 26, 1997 (with CRTC approval given on August 28, 1997), as part of a group deal, the ATV stations were sold to CTV.
Although each station originally produced its own news and local programming, these were progressively cut back from the 1980s onward. Today, nearly all programming originates from Halifax. However, CJCB and CKCW break off from CJCH's signal to air separate commercials and locally produced telethons.
As with many regional networks, this creates a balancing act where local stories in one community or province are of little interest in another area of CTV Atlantic's coverage area, and viewers in each province feel the news division focuses too much on either New Brunswick or Nova Scotia, along with a lesser focus on Prince Edward Island. However, CTV Atlantic has had some of the highest ratings of any local newscasts in Canada, although its presence and viewing audience is somewhat less in PEI mainly as a result of competition from CBCT in Charlottetown, which provides the province's only PEI-specific newscast.
On October 11, 2005, ATV
|
https://en.wikipedia.org/wiki/Control%20bus
|
In computer architecture,
a control bus is part of the system bus and is used by CPUs for communicating with other devices within the computer. While the address bus carries the information about the device with which the CPU is communicating and the data bus carries the actual data being processed, the control bus carries commands from the CPU and returns status signals from the devices. For example, if the data is being read or written to the device the appropriate line (read or write) will be active (logic one).
Lines
The number and type of lines in a control bus varies but there are basic lines common to all microprocessors, such as:
Read (). A single line that when active (logic zero) indicates the device is being read by the CPU.
Write (). A single line that when active (logic zero) indicates the device is being written by the CPU.
Byte enable (). A group of lines that indicate the size of the data (8, 16, 32, 64 bytes).
The RD and WR signals of the control bus control the reading or writing of RAM, avoiding bus contention on the data bus.
Additional lines are microprocessor-dependent, such as:
Transfer ACK ("acknowledgement"). Delivers information that the data was acknowledged (read) by the device.
Bus request (BR, BREQ, or BRQ). Indicates a device is requesting the use of the (data) bus.
Bus grant (BG or BGRT). Indicates the CPU has granted access to the bus.
Interrupt request (IRQ). A device with lower priority is requesting access to the CPU.
Clock signals. The signal on this line is used to synchronize data between the CPU and a device.
Reset. If this line is active, the CPU will perform a hard reboot.
Systems that have more than one bus master have additional control bus signals that control which bus master drives the address bus, avoiding bus contention on the address bus.
See also
Address bus
Data bus
Bus mastering
References
External links
Definition by Webopedia.
Computer system organization at the University of California, Riverside.
"Hardware and Software Architecture", a PowerPoint presentation at California State University, Los Angeles.
Computer buses
|
https://en.wikipedia.org/wiki/NeXTcube
|
The NeXTcube is a high-end workstation computer developed, manufactured, and sold by NeXT from 1990 until 1993. It superseded the original NeXT Computer workstation and is housed in a similar cube-shaped magnesium enclosure, designed by frog design. The workstation runs the NeXTSTEP operating system and was launched with a list price.
Hardware
The NeXTcube is the successor to the original NeXT Computer. It differs from its predecessor in having a 68040 processor, a hard disk in place of the magneto-optical drive, and a floppy disk drive. NeXT offered a 68040 system board upgrade (and NeXTSTEP 2.0) for . A 33 MHz NeXTcube Turbo was later produced.
NeXT released the NeXTdimension for the NeXTcube, a circuit board based on an Intel i860 processor, which offers 32-bit PostScript color display and video-sampling features.
The Pyro accelerator board increases the speed of a NeXTcube by replacing the standard 25 MHz processor with a 50 MHz one.
Specifications
Display: 1120×832 17 in (432 mm) 82 ppi grayscale MegaPixel Display
Operating System: NeXTSTEP 2.2 Extended or later
CPU: 25 MHz 68040 with integrated floating-point unit
Digital Signal Processor: 25 MHz Motorola DSP56001
RAM: 8 MB, expandable to 64 MB (Sixteen 30-pin SIMM slots)
Floppy Drive: 2.88 MB
Hard Drive: 105 MB, 340 MB, 400 MB, 660 MB, 1.4 GB or 2.8 GB SCSI drive
Network interface: 10BASE-T and 10BASE2 Ethernet
Expansion: four NeXTbus slots (mainboard uses one slot)
Size (H × W × D): 12 in × 12 in × 12 in (305 mm x 305 mm x 305 mm (±1 mm))
See also
NeXT character set
NeXT Computer
NeXTcube Turbo
NeXTstation
Power Mac G4 Cube, a similar cube computer from Apple.
References
External links
Computer workstations
NeXT
History of the Internet
Steve Jobs
68k-based computers
|
https://en.wikipedia.org/wiki/Young%20Moro%20Professionals%20Network
|
The Young Moro Professionals Network (YMPN) is a non-governmental organization (NGO) composed of young Moro professionals advocating peaceful means to improve the socio-economic well-being of the Bangsamoro people. While a majority of members live in the Philippines, particularly in Metro Manila and Mindanao, there are several members who are based in other countries. YMPN members are largely employed, both in government and private sector jobs.
The YMPN was founded in 2000 during the administration of former Philippine president Joseph "Erap" Estrada. A group of young Moro professionals initially organized themselves as part of the popular protest at EDSA against the alleged corruptions of Erap. As a result of these protests, Erap was ousted from the presidency.
The founding Moros were further motivated by dismay with the Philippine government total war policy against the Moro communities in Mindanao, despite an outstanding peace agreement with the Moro National Liberation Front (MNLF) and ongoing negotiation with the Moro Islamic Liberation Front (MILF). Many NGOs concerned with the cultivation of lasting peace and harmony in Mindanao perceived the unilateral declaration of war by the government of the Philippines (GRP) as a diversion from investigations and protests against the alleged corruptions and unfitness of president of the GRP. The war displaced hundreds of thousands of Moros and threatened to poison Muslim-Christian relations, like what happened in the early 1970s.
The success of EDSA II in ousting then President Erap motivated the YMPN founders to continue peacefully advocating and working for the socio-economic well-being of the Moro masses. The founders envisioned a network of young Muslim professionals that promote volunteerism; using their own resources, talents, education and training, and working collectively or individually to help other Muslims in unfortunate circumstances. This peaceful means is in stark contrast to the armed liberation struggle by MNLF and MILF against the GRP from the early 1970s to present.
Since its founding, the YMPN has been active in encouraging young Moros to adopt peaceful means to uplift themselves. The YMPN has stressed the practice of Islam as a peaceful and modest way of life. The core members have designed and implemented leadership training program, using an Islamic framework, aimed at the next generation of YMPN members. In most engagements, these core members are the lecturers and readily provide a role model to their audience for their advocacy for peaceful means. The YMPN has established a website at YMPN.org to reach a larger audience of both Muslims and non-Muslims. The YMPN has also been recognized for their contributions by other local and international NGOs, as well as senior statesmen of the GRP, like Senator Ramon Magsaysay.
On May 9, 2003, the YMPN was incorporated as a non-profit organization with the Securities and Exchange Commission of the Philippines. It hol
|
https://en.wikipedia.org/wiki/Camrose%20Canadian
|
The Camrose Canadian was a local news publication for the Camrose, Alberta area. Founded in 1908, the paper was one of many Alberta publications owned by Postmedia Network. On June 26, 2018, Postmedia announced that the newspaper would cease publication by the end of August 2018.
See also
List of newspapers in Canada
References
External links
The Camrose Canadian
Weekly newspapers published in Alberta
Camrose, Alberta
|
https://en.wikipedia.org/wiki/Wishbone%20%28computer%20bus%29
|
The Wishbone Bus is an open source hardware computer bus intended to let the parts of an integrated circuit communicate with each other. The aim is to allow the connection of differing cores to each other inside of a chip. The Wishbone Bus is used by many designs in the OpenCores project.
Wishbone is intended as a "logic bus". It does not specify electrical information or the bus topology. Instead, the specification is written in terms of "signals", clock cycles, and high and low levels.
This ambiguity is intentional. Wishbone is made to let designers combine several designs written in Verilog, VHDL or some other logic-description language for electronic design automation (EDA). Wishbone provides a standard way for designers to combine these hardware logic designs (called "cores").
Wishbone is defined to have 8, 16, 32, and 64-bit buses. All signals are synchronous to a single clock but some slave responses must be generated combinatorially for maximum performance. Wishbone permits addition of a "tag bus" to describe the data. But reset, simple addressed reads and writes, movement of blocks of data, and indivisible bus cycles all work without tags.
Wishbone is open source. To prevent preemption of its technologies by aggressive patenting, the Wishbone specification includes examples of prior art, to prove its concepts are in the public domain.
A device does not conform to the Wishbone specification unless it includes a data sheet that describes what it does, bus width, utilization, etc. Promoting reuse of a design requires the data sheet. Making a design reusable in turn makes it easier to share with others.
The Simple Bus Architecture is a simplified version of the Wishbone specification.
Wishbone topologies
Wishbone adapts well to common topologies such as point-to-point, many-to-many (i.e. the classic bus system), hierarchical, or even switched fabrics such as crossbar switches. In the more exotic topologies, Wishbone requires a bus controller or arbiter, but devices still maintain the same interface.
Shared bus
Data flow
Crossbar switch
Comparisons
Wishbone control signals compared to other system on a chip (SoC) bus standards:
See also
Master/slave (technology)
Advanced eXtensible Interface
References
External links
Wishbone Version B3- The PDF specification
Wishbone Version B4- PDF specification of latest version of Wishbone
appnote_01- Combining WISHBONE interface signals application note
Comparison to other SoC buses
Wishbone@OpenCores
Wishbone@FPGA-Cores.com
Computer buses
Open hardware electronic devices
|
https://en.wikipedia.org/wiki/Cops%20%28TV%20program%29
|
Cops (stylized as COPS) is an American reality legal television documentary programming series that is currently in its 35th season. It is produced by Langley Productions and premiered on the Fox network on March 11, 1989. The series, known for chronicling the lives of law enforcement officials, follows police officers and sheriff's deputies, sometimes backed up by state police or other state agencies, during patrol, calls for service, and other police activities including prostitution and narcotic stings, and occasionally the serving of search/arrest warrants at criminal residences. Some episodes have also featured federal agencies. The show's formula follows the cinéma vérité convention, which does not consist of any narration, scripted dialogue or incidental music/added sound effects, depending entirely on the commentary of the officers and on the actions of the people with whom they come into contact, giving the audience a fly on the wall point of view. Each episode typically consists of three self-contained segments which often end with one or more arrests.
It is one of the longest-running television shows in the United States and, in May 2011, it became the longest-running show on Fox (since then, its duration has been surpassed by the duration of The Simpsons). It also became the longest running live action series on Fox. When America's Most Wanted was canceled after 23 years, the show's host John Walsh, made numerous appearances on Cops. In 2013, the program moved to Spike TV, now known as Paramount Network.
In late 2007, during the premiere of its 20th season, episodes of Cops began broadcasting in widescreen, though not in high definition. In June 2020, Paramount Network pulled the show from its schedule in response to George Floyd protests following his death while under arrest by the Minneapolis Police Department, and announced its cancellation days later. The show remains in production for its international and overseas partners, and began to film anew in Spokane County, Washington, with its sheriff's department in October 2020. In September 2021, it was announced that Fox Nation picked up the show. The 34th season premiered in September, 2022. Season 35 premiered on April 7, 2023. Following a three month hiatus, the show returned on October 6.
History
Cops was created by John Langley and Malcolm Barbour, who tried unsuccessfully for several years to get a network to carry the program. When the 1988 Writers Guild of America strike forced them to find other kinds of programming, the young Fox Television network picked up the low-cost Cops, which had no union writers.
The program premiered on Fox on March 11, 1989. When the show went primetime in 1991, and consisted of two episodes in the 8 p.m. hour, it was called Primetime Cops in promos for several years. The program was one of only two remaining first-run prime-time programs airing on Saturday nights on the four major U.S. broadcast television networks (along with CBS's 48 Hou
|
https://en.wikipedia.org/wiki/.odc
|
In computing, the .odc file-suffix may label:
an OpenDocument chart
an "Office Data Connection" file for accessing external data from within Microsoft Office
a Component Pascal file
|
https://en.wikipedia.org/wiki/Trusted%20Information%20Systems
|
Trusted Information Systems (TIS) was a computer security research and development company during the 1980s and 1990s, performing computer and communications (information) security research for organizations such as NSA, DARPA, ARL, AFRL, SPAWAR, and others.
History
TIS was founded in 1983 by NSA veteran Steve Walker, and at various times employed notable information security experts including David Elliott Bell, Martha Branstad, John Pescatore, Marv Schaefer, Steve Crocker, Marcus Ranum, Wei Xu, John Williams, Steve Lipner and Carl Ellison. TIS was headquartered in Glenwood, Maryland, in a rural location. The company was started in Walker's basement on Shady Lane in Glenwood, MD. As the company grew, rather than move to Baltimore or the Washington D.C. suburbs, a small office building was constructed on land next to Walker's new home on Route 97.
Products
TIS projects included as the following:
Trusted Xenix, the first commercially available B2 operating system;
Trusted Mach, a research project that influenced DTOS and eventually SELinux;
Domain and Type Enforcement (DTE) which likewise influenced SELinux;
FWTK Firewall Toolkit (the first open source firewall software) in 1993;
First whitehouse.gov e-mail server was hosted at TIS headquarters from June 1 of 1993 to January 20 of 1995;
Gauntlet Firewall in 1994, one of the first commercial firewall products, with broad range of Internet Standards, including S/MIME, SNMP, DNS, DNSSEC, and many others. This Firewall became the inception of the third generation firewall;
IP Security (IPSec) product in late 1994, known as the first IPSec VPN commercial product in IT history;
Encryption Recovery technology integrated with IPSEC, ISAKMP, IKE, and RSA.
TIS's operating system work directly affected BSD/OS, which the Gauntlet Firewall and IPSec was based on, as well as Linux, FreeBSD, HP UX, Sun OS, Darwin, and others.
Post company
The company went public in 1996
and soon afterwards attempted to acquire PGP Inc.; it was instead acquired in 1998 by Network Associates (NAI), which later became McAfee, who had already bought PGP Inc. in 1997. The security research organization became NAI Labs and the Gauntlet engineering and development organization was folded into Network Associates' engineering and development.
NAI Labs went through a couple of branding changes which complemented Network Associates' branding efforts. In 2001 the name was changed to Network Associates Laboratories to better match the corporate identity. Then, in 2002-2003, there was a major branding initiative by Network Associates culminating in selection of the flag brand, McAfee. As a result, the security research organization became McAfee Research.
In 2003, SPARTA, Inc., an employee-owned company, acquired the Network Security branch of McAfee Research.
In 2005, SPARTA acquired the remaining branches of McAfee Research, which were organized into the Security Research Division (SRD) of the Information Systems Sec
|
https://en.wikipedia.org/wiki/Precedence%20diagram%20method
|
The precedence diagram method (PDM) is a tool for scheduling activities in a project plan. It is a method of constructing a project schedule network diagram that uses boxes, referred to as nodes, to represent activities and connects them with arrows that show the dependencies. It is also called the activity-on-node (AON) method.
Critical tasks, noncritical tasks, and slack time
Shows the relationship of the tasks to each other
Allows for what-if, worst-case, best-case and most likely scenario
Key elements include determining predecessors and defining attributes such as
early start date
late start date
early finish date
late finish date
duration
activity name
WBS reference
Slack/Float: Determines the duration of activity delay that the project can tolerate before the project comes in late. The difference between the earliest and the latest start time. i.e. Slack = latest start date - earliest start day or Slack = latest finish time - earliest finish time.
Any activities which have a slack of 0, they are on the critical path.
Different Precedence diagram Methods
Arrow diagramming method
Project network
Critical-path method
Gantt chart
Program evaluation and review technique
References
Further reading
External links
Precedence Diagram Method at Better Projects
Project management techniques
Schedule (project management)
|
https://en.wikipedia.org/wiki/WADO
|
WADO (1280 AM) is a commercial radio station licensed to New York City. It is owned by Latino Media Network. It broadcasts a Spanish-language sports radio format.
By day, WADO is powered at 50,000 watts, the maximum permitted for American AM stations. But to protect other stations on 1280 AM from interference, at night it reduces power to 7,200 watts. It uses a directional antenna with a four-tower array. The transmitter is on New Jersey Route 120 in Carlstadt, New Jersey.
Programming
WADO currently broadcasts all games of the New York Jets, and certain games for the New York Yankees, New York Knicks and New York Islanders. It previously aired the New York City FC soccer team.
Sports
New York Jets and Monday Night Football from the National Football League - Spanish language play by play from Clemson Smith-Muñiz
New York Islanders from the National Hockey League - Spanish language play by play from Bruno Vain
New York Knicks from the National Basketball Association - Spanish language play by play, produced by MSG Network, simulcast on second audio program
New York Yankees from Major League Baseball - all regular season and postseason games aired; simulcast on the second audio program of YES Network, and MLB.tv
History
WGL and WOV
WGL was first reported in December 1926, owned by the International Broadcasting Corporation in New York City. WGL's start occurred during a period when the U.S. government had temporarily lost its authority to assign transmitting frequencies, and at the end of 1926 the station was reported to be on a non-standard frequency of 678 kHz. On January 30, 1927, the station signed on, with International Broadcasting president Colonel Lewis Landes stating on the inaugural broadcast, "The International Broadcasting Corporation's aim is to adhere to truth, to be free of partisanship, religious or political."
Full government regulation of radio was restored with the formation of the Federal Radio Commission (FRC). Stations were initially issued a series of temporary authorizations starting on May 3, 1927, which assigned WGL to 720 kHz. The station also moved to Secaucus, New Jersey. WGL's assignment was changed to 1170 kHz, with WOR in Newark moving to 710 kHz. WGL's owners wanted to remain on 720 kHz, and after WOR was awarded 710 kHz, both stations went to court, with WOR eventually winning the case. In June 1927, WGL moved to 1020 AM, sharing this frequency with a Paterson station, WODA. In August 1927, studio manager Charles Isaacson announced one of the city's first attempts at local news coverage. WGL was organizing listeners to volunteer as radio reporters and call the station with breaking news stories.
Stations were informed that if they wanted to continue operating, they needed to file a formal license application by January 15, 1928, as the first step in determining whether they met the new "public interest, convenience, or necessity" standard. On May 25, 1928, the FRC issued General Order 32, which notified
|
https://en.wikipedia.org/wiki/WZRC
|
WZRC, known on-air as "AM1480" (), is a radio station licensed to New York City. The station is owned by Multicultural Broadcasting and airs Cantonese programming. It is one of two Cantonese radio stations serving the New York metropolitan area, the other is Chung Wah Chinese Broadcasting Company. WZRC's transmitting facility is located in Ridgefield Park, New Jersey.
History
WZRC was first licensed on June 29, 1925, as a portable broadcasting station, with the sequentially issued call letters of WIBS, to the New Jersey National Guard, 57th Infantry Brigade, in Elizabeth, New Jersey. (Portable radio stations were installed on movable platforms such as trucks, so they could be transported to various locations.) In early 1926 ownership of the station was changed to Lieut. Thomas F. Hunter, and in mid-1927 the station was reported to be "no longer portable". In November 1927 the station's owner became the New Jersey Broadcasting Corporation, located at 80 Broad Street in Elizabeth.
On May 25, 1928, the recently formed Federal Radio Commission (FRC) issued General Order 32, which notified 164 stations, including WIBS, that "From an examination of your application for future license it does not find that public interest, convenience, or necessity would be served by granting it." However, the station successfully convinced the commission that it should remain licensed.
On November 11, 1928, the FRC implemented a sweeping reallocation of station transmitting frequencies, as part of a reorganization resulting from its General Order 40. The New York City area had a large excess of stations, and WIBS was ordered to begin timesharing on 1450 kHz with four other New Jersey stations: WNJ (Newark), WBMS (Union City), WAAT (Jersey City) and WKBO (Jersey City). WAAT (now WNYM) was able to quickly gain permission to move to 1070 kHz, but this still left WIBS in the tenuous financial situation of reduced operating hours and revenues due to having to share its frequency with three other stations.
WHOM and the Popes (1930 - 1960)
On April 12, 1930, the station's call letters were changed to WHOM, standing for owner Harry O'Melia, operated by the New Jersey Broadcasting Company, with studios in Jersey City. At the start of 1933 WHOM was still limited to one-quarter of the airtime on its shared frequency, however during the year it was able to achieve full time operation. In April, it expanded to use of three-quarters of the hours, after the FRC refused to renew WNJ's license, and WHOM's owners purchased and silenced WKBO. A few weeks later, WBMS was acquired and shut down, giving WHOM unlimited use of its frequency. The station's format was a combination of educational programming, ethnic programming, sports, and some music. Among the personalities who broadcast on WHOM was African-American sportscaster Jocko Maxwell; by the time he joined the station in 1934, it had studios in Newark, and would later add a studio in New York.
By 1940, the station was known
|
https://en.wikipedia.org/wiki/Mark%20Healey
|
Mark Healey is a British video game developer from Ipswich, Suffolk. Healey started his career making games for the Commodore 64 home computer – his first published game was KGB Super Spy for Codemasters, which led to developing the educational Fun School series of games for Europress Software. Healey joined Bullfrog Productions to work with Peter Molyneux on titles such as Magic Carpet and Dungeon Keeper. When Molyneux left Bullfrog to form Lionhead Studios, Healey joined him, and worked as a senior artist on Black & White and Fable. Whilst still at Lionhead, he developed Rag Doll Kung Fu independently in his spare time, which was the first third party game to be distributed over Steam - Valve's online distribution system. He is a co-founder of Media Molecule and creative director of LittleBigPlanet and LittleBigPlanet 2. In April 2023, Healey announced he would be leaving Media Molecule.
References
External links
Mark Healey at mediamolecule.com
Mark Healey (video game person) at Giant Bomb
Year of birth missing (living people)
20th-century births
Living people
British video game designers
Bullfrog Productions
Creative directors
Lionhead Studios
Media Molecule
Video game artists
|
https://en.wikipedia.org/wiki/MachTen
|
MachTen is a Unix-like operating system from Tenon Intersystems. It is based on 4.4BSD and the Mach kernel, and features the X Window System and GNU programming tools. It runs only as a classic Mac OS application program (in a virtual machine) on Macintosh computers.
MachTen development started in 1989, culminating in the first release in 1991. The Professional MachTen branch, intended for Motorola 68000-based Macintoshes, ended with release 2.3. The Power MachTen branch, which is Power Macintosh compatible, lacks some of the features of Professional MachTen (including true virtual and protected memory models), but takes full advantage of the PowerPC processor and is compatible with Mac OS 9 through its final version, 4.1.4. MachTen is no longer developed, and is functionally superseded by macOS.
See also
A/UX
MacMach
macOS
NeXTSTEP
External links
Floodgap's Power MachTen Hacking Page
Berkeley Software Distribution
Mach (kernel)
Microkernel-based operating systems
Microkernels
Unix emulators
|
https://en.wikipedia.org/wiki/Independent%20Television%20Network
|
The Independent Television Network Ltd (; ) also known as ITN Ltd or simply as ITN is a Sri Lankan state-governed television and radio broadcaster located in Wickramasinghepura, Battaramulla, Sri Lanka. It is a Shrama Abhimani Award winner (Oct 2009)
, broadcasts content to a wide demographic within Sri Lanka as well as the expatriate community. The programmes are broadcast in three languages: Sinhala, Tamil, and English. The ITN broadcast coverage extends to 99% of the island of Sri Lanka.
The ITN channel is the flagship television channel of ITN Ltd. ITN further operates three FM radio stations; Lakhanda (Former ITN FM), the Sinhala language service; Vasantham FM, the Tamil language service and Prime Radio, the English language service. Vasantham TV, a second television channel operated by ITN Ltd, broadcasts content in the Tamil language. ITN recently launched a website ITN News, which is an online portal for the distribution of local news internationally.
ITN channel is also the first 1080p full HD television channel in Sri Lanka. The ITN Ltd has invested Rs. 200 Mn on the construction of the country's first HD studio complex and started high resolution broadcasting since 30 June 2016.
History
Ahead of the start of ITN there were decisions facing the deployment of television in Sri Lanka. Japanese company NEC provided basic support for the building of the station (and did the same later with Rupavahini in 1982). The development of the station happened at the same time as Rupavahini's. One of the key steps was selecting the colour system. PAL was favoured despite the fact that neighbouring India had a black and white system using NTSC equipment, and was provided by Japan despite using its form of NTSC. ITN was being set up by Anil Wijewardene and Shan Wickremesinghe in Mahalwarawa and was expedited by an American investor. The first test transmissions in 1979 were well-received in Colombo alone, which was the initial coverage area of the channel. Programmes such as American educational series Sesame Street and the LWT British sitcom Mind Your Language were among the first programmes seen.
ITN Ltd commenced operations on 13 April 1979 with the introduction of the TN television channel. As the first television broadcasting service of Sri Lanka and South Asia they began transmission of the first terrestrial television channel in the country. It was also the first privately owned television station in a region where the government was in control of radio and television.
The founding board of directors was composed of Mr. Shan Wickramasinghe, Mr. Anil Wijewardene and Mr. Bob Christie. Initially the ITN Ltd studios and transmission station were based in Mahalwarawa Estate, Pannipitiya. A one kilowatt (1 KW) transmitter and transmission tower were used to broadcast the ITN channel within a radius of the city of Colombo. Due to the geographical location of the transmission station, local weather and the transmission equipment used early viewers
|
https://en.wikipedia.org/wiki/Targus
|
Targus may refer to:
Anastasia Targus, a character in the TV series Star Trek: Borg
Targus (corporation), a company that makes computer accessories
Targus, a planet in the role-playing game Star Hero RPG world
See also
Târgu Mureș, a Romanian city
Târgu Jiu, a Romanian city
|
https://en.wikipedia.org/wiki/List%20of%20information%20graphics%20software
|
This is a list of software to create any kind of information graphics:
either includes the ability to create one or more infographics from a provided data set
either it is provided specifically for information visualization
Vector graphics
Vector graphics software can be used for manual graphing or for editing the output of another program. Please see:
:Category:Vector graphics editors
Comparison of vector graphics editors
A few online editors using vector graphics for specific needs have been created. This kind of creative interfaces work well together with data visualization tools like the ones above.
See also
:Category:Diagramming software
Comparison of numerical-analysis software
List of graphical methods
References
Comparisons of mathematical software
Graphics software
Infographics
Lists of software
Statistics-related lists
|
https://en.wikipedia.org/wiki/Barebone%20computer
|
A barebone computer is a partially assembled platform or an unassembled kit of computer parts allowing more customization and lower costs than a retail computer system. They are available for desktop computer, notebook (see barebook) and server purposes, and in nearly any form factor. Manufacturers are also able to produce systems of a specialized or non-standard form factor, since the system is sold as a pre-built unit, with the motherboard and power supply already installed.
Components
Assembling a barebone computer by hand is usually less expensive than buying a pre-configured computer from a retailer, and may save time and labor compared with building a system from scratch. A typical barebone desktop system consists of a CPU, a computer case (or tower), with a pre-fitted motherboard and power supply. If not already provided, the purchaser of such a platform only has to equip it with a RAM, and optionally a hard drive (in some cases, an operating system is/can be installed to a lower-cost flash drive instead). Additional input/output devices may be required depending on their needs. Sometimes, it is necessary to install an operating system if the one built into the motherboard is deemed insufficient (or not present at all). An audio adapter or network adapter may be added but this is less common as recent motherboards often already contain capable solutions.
Peripherals, such as a keyboard, mouse and monitor, almost always must be acquired separately. Barebone systems sometimes include a graphics processor or RAM, but rarely any mass storage media (hard drives), operating system or other software. Sometimes PCs with everything a normal desktop PC has except Microsoft Windows operating systems are sold as a barebone computer, but may include free software such as Linux. Refurbished and used computers may also be repackaged as barebone computers, as many computers returned for refurbishing may have missing, broken, or obsolete parts such as hard drives and peripherals.
Barebook
A barebook computer (or barebone laptop) is an incomplete notebook PC. A barebone laptop is similar to a barebone computer, but in a laptop form.
As it leaves the factory, it contains only elements strictly tied to the computer's design (case, motherboard, display, keyboard, pointing device, etc.), and the consumer or reseller has to add standardized off-the-shelf components such as CPU and GPU (when not integrated on the motherboard), memory, mass storage, WiFi card, etc. separately.
Because it is not manufactured with storage media such as harddisks or SSDs, a barebook does not typically include an operating system, which may make barebooks appealing to opposers of the bundling of Microsoft Windows.
Upgrade limitations
Future upgradeability of a barebone system may be limited, especially the motherboard component, which may have less space for extra I/O devices and fewer memory and PCI card slots than desired. The motherboard may not be compatible with faster p
|
https://en.wikipedia.org/wiki/KIIT-CD
|
KIIT-CD (channel 11) is a low-power, Class A television station in North Platte, Nebraska, United States, affiliated with the Fox network. It is owned by Gray Television alongside NBC affiliate KNOP-TV (channel 2) and low-power CBS affiliate KNPL-LD (channel 10). The three stations share studios on South Dewey Street in downtown North Platte; KIIT-CD's transmitter is located on US 83 in the northern part of the city; master control and some internal operations are based at the studios of co-owned KOLN in Lincoln.
Although KIIT broadcasts a digital signal, it is limited to the immediate North Platte area. It is therefore simulcast in high definition on KNOP's second digital subchannel. Fox programming also airs in the area on Lincoln's KFXL-TV, which is carried on KWNB's subchannel.
History
From the grant of its original construction permit on December 12, 1994, through June 26, 2014, the station was assigned the translator-style call sign of K11TW, and retained it even after obtaining Class A status in 2001. However, outside of Federal Communications Commission (FCC)-required station identification, the station has always called itself "KIIT" on the air. It signed on the air on August 28, 1995 as a UPN affiliate; it switched to Fox on January 22, 2001. Prior to K11TW's switch to Fox, KHGI-TV served as a secondary affiliate of the network for the purposes of carrying its sports programming.
K11TW was originally owned by North Platte Television, longtime owner of KNOP-TV; the company was reorganized as Greater Nebraska Television after the 1997 purchase of KHAS-TV in Hastings. Greater Nebraska Television sold its stations, including K11TW and KNOP, to Hoak Media in December 2005; the sale followed the death of majority shareholder Richard Shively. On November 20, 2013, Hoak Media announced the sale of most of its stations, including K11TW and KNOP-TV, to Gray Television, making them sister stations to KNPL; the sale was completed on June 13, 2014.
Technical information
Subchannels
The station's digital signal is multiplexed:
References
External links
Gray Television
Television channels and stations established in 1996
1996 establishments in Nebraska
Fox network affiliates
IIT-CD
Low-power television stations in Nebraska
|
https://en.wikipedia.org/wiki/Front%20Row%20%28software%29
|
Front Row is a discontinued media center software application for Apple's Macintosh computers and Apple TV for navigating and viewing video, photos, podcasts and music from a computer, optical disc or the Internet through a 10-foot user interface (similar to Kodi and Windows Media Center). The software relies on iTunes and iPhoto and is controlled by an Apple Remote or the keyboard function keys. The first version was released in October 2005, with two major revisions since. Front Row was removed and discontinued in Mac OS X 10.7.
Versions
Introduction
Front Row was first unveiled on October 12, 2005 with the new iMac G5 (along with the built-in iSight camera, the Apple Remote, and Photo Booth). The software was billed as an alternative interface for playing and running iPhoto, DVD Player, and iTunes (Internet radio stations could play by adding the station into a playlist in iTunes).
In 2006, Front Row was added to the first Intel Mac Mini, which also gained a built-in infrared sensor and Apple Remote. The model's media center features were reviewed positively by PC World. This new version of Front Row could stream media from other computers on the local network.
Apple TV
The next incarnation, released in the original Apple TV software in March 2007, was a complete, stand alone application that played content directly from libraries. Among the features added were more prominent podcasts and TV show menus, trailer streaming, a settings menu, streaming content from computers on the local network, and album and video art for local media. In the summer of 2007, Apple released an update adding streaming of YouTube videos.
Version two
Released in November 2007 with Mac OS X v10.5 (Leopard), version two of Front Row included the new features introduced with the Apple TV (except for the YouTube viewer), a different opening transition, ending AirTunes functionality, and a launcher application in addition to the Command+Escape keyboard shortcut.
Front Row 2 has an undocumented plug-in architecture, for which various third-party plugins are now available, based on reverse-engineering the Front Row environment. Because it uses QuickTime to render video, Front Row can utilize any codec installed in QuickTime, including DivX, Xvid and WMV, and play DVD images copied to the hard disk. However, because Front Row does not use QuickTime X, it lacks support for certain codec features like Sample Aspect Ratio.
"Take 2"
In January 2008, Apple announced an update branded "Apple TV Take Two" for Apple TV Software. In addition to the prominent addition of direct downloads for movies, TV episodes, and podcasts via the iTunes Store, movie rentals, the ability to view online photos from Flickr or iCloud (branded .Mac at the time), and the ability to stream audio to AirTunes were added. This update did away with Front Row and introduced a new interface for the original Apple TV in which content was organized into six categories, all of which appeared in a large sq
|
https://en.wikipedia.org/wiki/AFNLP
|
AFNLP (Asian Federation of Natural Language Processing Associations) is the organization for coordinating the natural language processing related activities and events in the Asia-Pacific region.
Foundation
AFNLP was founded on 4 October 2000.
Member Associations
ALTA – Australasian Language Technology Association
ANLP Japan Association of Natural Language Processing
ROCLING Taiwan ROC Computational Linguistics Society
SIG-KLC Korea SIG-Korean Language Computing of Korea Information Science Society
Existing Asian Initiatives
NLPRS: Natural Language Processing Pacific Rim Symposium
IRAL: International Workshop on Information Retrieval with Asian Languages
PACLING: Pacific Association for Computational Linguistics
PACLIC: Pacific Asia Conference on Language, Information and Computation
PRICAI: Pacific Rim International Conference on AI
ICCPOL: International Conference on Computer Processing of Oriental Languages
ROCLING: Research on Computational Linguistics Conference
Conferences
IJCNLP-04: The 1st International Joint Conference on Natural Language Processing in Hainan Island, China
IJCNLP-05: The 2nd International Joint Conference on Natural Language Processing in Jeju Island, Korea
IJCNLP-08: The 3rd International Joint Conference on Natural Language Processing in Hyderabad, India
ACL-IJCNLP-2009: Joint Conference of the 47th Annual Meeting of the Association for Computational Linguistics (ACL) and 4th International Joint Conference on Natural Language Processing (IJCNLP) in Singapore
IJNCLP-11: The 5th International Joint Conference on Natural Language Processing in Chiang Mai, Thailand
References
External links
http://www.afnlp.org/
Natural language processing
|
https://en.wikipedia.org/wiki/Netsukuku
|
Netsukuku is an experimental peer-to-peer routing system, developed by the FreakNet MediaLab in 2005, created to build up a distributed network, anonymous and censorship-free, fully independent but not necessarily separated from the Internet, without the support of any server, ISP and no central authority.
Netsukuku is designed to handle up to 2128 nodes without any servers or central systems, with minimal CPU and memory resources. This mesh network can be built using existing network infrastructure components such as Wi-Fi.
The project has been in slow development since 2005, never abandoning a beta state. It has also never been tested on large scale.
Operation
As of December 2011, the latest theoretical work on Netsukuku could be found in the author's master thesis Scalable Mesh Networks and the Address Space Balancing problem. The following description takes into account only the basic concepts of the theory.
Netsukuku uses a custom routing protocol called QSPN (Quantum Shortest Path Netsukuku) that strives to be efficient and not taxing on the computational capabilities of each node. The current version of the protocol is QSPNv2. It adopts a hierarchical structure. 256 nodes are grouped inside a gnode (group node), 256 gnodes are grouped in a single ggnode (group of group nodes), 256 ggnodes are grouped in a single gggnode, and so on. This offers a set of advantages main documentation. The protocol relies on the fact that the nodes are not mobile and that the network structure does not change quickly, as several minutes may be required before a change in the network is propagated. However, a node that joins the network is immediately able to communicate using the routes of its neighbors. When a node joins the mesh network, Netsukuku automatically adapts and all other nodes come to know the fastest and most efficient routes to communicate with the newcomer. Each node has no more privileges or restrictions than the other nodes.
The domain name system (DNS) is replaced by a decentralised and distributed system called ANDNA (Abnormal Netsukuku Domain Name Anarchy). The ANDNA database is included in the Netsukuku system, so each node includes such database that occupies at most 355 kilobytes of memory.
Simplifying, ANDNA works as follows: to resolve a symbolic name the host applies a function Hash on its behalf. The Hash function returns an address that the host contacts asking for the resolution generated by the hash. The contacted node receives a request, searches in its ANDNA database for the address associated with the name and returns it to the applicant host. Recording works in a similar way: for example, let's suppose that the node X wants to register the address FreakNet.andna; X calculates the hash name and obtains the address 11.22.33.44 associated with node Y. The node X contacts Y asking to register 11.22.33.44 as its own. Y stores the request in its database and any request for resolution of 11.22.33.44 hash, will answer with
|
https://en.wikipedia.org/wiki/1939%20Pacific%20hurricane%20season
|
The 1939 Pacific hurricane season ran through the summer and fall of 1939. Before the satellite age started in the 1960s, data on east Pacific hurricanes was extremely unreliable. Most east Pacific storms were of no threat to land. However, 1939 saw a large number of storms threaten California.
Systems
Hurricane One
On June 12, a hurricane was detected. The lowest pressure reported by a ship was . The hurricane was last seen June 13.
Possible Tropical Cyclone Two
A possible tropical cyclone was located off the coast of Mexico on June 27. A ship reported a gale and a pressure of . The system was last seen on June 28.
Tropical Cyclone Three
On July 19, a tropical cyclone was detected. A ship reported a pressure of .
Tropical Cyclone Four
On July 29, a tropical cyclone was located midway between Manzanillo and Acapulco. It moved up the coast, and a ship reported a pressure of on July 29 as the cyclone made landfall in the vicinity of Manzanillo.
Tropical Cyclone Five
A small tropical cyclone was detected on August 31. A ship reported gales and a pressure of .
Hurricane Six
A storm developed southwest of Cabo San Lucas on September 4 and paralleled the western coast of the Baja California Peninsula for two days, eventually curving northeast into the northern Baja California on September 6. From September 4 to 7, moisture from the storm and its remnants brought heavy rain to Southern California. The storm delivered over a year's worth of rainfall to Blythe, while Imperial received more than two years' worth. The flooding caused major damage in Mecca, California, and of water swamped Thermal. Unusually heavy rains spread across the Colorado River Valley to western Arizona ahead of an approaching shortwave trough, with a maximum of falling in Truxton, Arizona. Across the state, seven stations set 24-hour rainfall records between September 4–6, while the storm's rains would contribute to the rainiest September at 38 stations.
Hurricane Seven
A tropical cyclone was first detected south of Acapulco on September 5. It intensified into a hurricane and moved northwestward. A ship sailing through the eye reported a pressure reading of . The tropical cyclone made landfall somewhere along the Baja California Peninsula. It dissipated inland over the northern part of the peninsula on September 12. Remnants of this tropical storm, in association with a trough, caused rain of up to in southern California on September 11 and 12.
Tropical Cyclone Eight
On September 5, a tropical cyclone formed off the coast of Costa Rica. It also headed northwest and dissipated over the southern part of Baja California on September 15. The lowest reported pressure was . From September 19 to 21, remnants of this tropical cyclone caused rain measuring up to in Southern California.
Hurricane Nine
On September 14, a tropical cyclone formed off the coast of Central America. This tropical storm tracked northwestward and intensified into a hurricane. The sea-level pressu
|
https://en.wikipedia.org/wiki/Computer%20Conservation%20Society
|
The Computer Conservation Society (CCS) is a British organisation, founded in 1989. It is under the joint umbrella of the British Computer Society (BCS), the London Science Museum and the Manchester Museum of Science and Industry.
Overview
The CCS is interested in the history of computing in general and the conservation and preservation of early British historical computers in particular.
The society runs a series of monthly public lectures between September and May each year in both London and Manchester. The events are detailed on the society's website.
The CCS publishes a quarterly journal, Resurrection.
The society celebrated its 25th anniversary in 2014.
Dr Doron Swade, formerly the curator of the computing collection at the London Science Museum, was a founding committee member and is the current chair of the society. David Morriss, Rachel Burnett, and Roger Johnson are previous chairs, also all previous presidents of the BCS.
Projects
The society organises a number of projects to reconstruct and maintain early computers and to conserve early software. For example:
Restorations
Elliott 401
Elliott 803
Elliott 903 and 905
DEC Systems
Pegasus
ICT 1301 Project
Harwell Dekatron Computer
Differential Analyser
HEC 1
Reconstructions
Colossus Rebuild
Manchester Baby
Bombe Rebuild
EDSAC Replica Project
Babbage's Analytical Engine
Other projects
Software preservation
"Our Computer Heritage" website
Tony Sale Award for computer conservation and restoration
Locations
London Science Museum:
Ferranti Pegasus (Not currently being displayed working)
Museum of Science and Industry, Manchester:
Manchester Baby
Hartree Differential Analyser
The National Museum of Computing:
Colossus
Harwell Dekatron or WITCH
ICL 2966
Elliot 803
Elliott 905
EDSAC Replica
Bletchley Park Trust:
Bombe
Currently not on public display:
ICT 1301 (Currently in storage at The National Museum of Computing)
Elliott 401
References
External links
CCS website
Our Computer Heritage – a project led by the CCS
Scientific organizations established in 1989
Information technology organisations based in the United Kingdom
History of science organizations
History of computing in the United Kingdom
BCS Specialist Groups
Science Museum, London
1989 establishments in the United Kingdom
|
https://en.wikipedia.org/wiki/Terminal%20access%20controller
|
A terminal access controller (TAC) is a host computer that accepts terminal connections, usually from dial-up lines, and that allows the user to invoke Internet remote log-on procedures, such as Telnet.
Networking hardware
|
https://en.wikipedia.org/wiki/But%20Can%20They%20Sing%3F
|
But Can They Sing? is an American reality television series that premiered on October 30, 2005 on VH1 as part of its celebreality programming. Hosted by Ahmet Zappa, the series was partially based on NBC's announced but abandoned project I'm a Celebrity but I Wanna Be a Pop Star (originally entitled Celebrity Pop Superstar). Like its network predecessor, it was produced by Granada America. In January 2006 VH1 announced that the show would not return for a second season.
Premise
Nine celebrities set out to prove their singing prowess in an American Idol-style competition, while viewers voted online on their favorite performers. The celebrities were aided in their quest by movement/dance instructor Tony Michaels and vocal coaches Jackie Simley-Stevens and Rachel Riggs. The winner's favorite charity received $50,000.
Contestants
Joe Pantoliano
I Get a Kick Out of You (Frank Sinatra) (week one)
Volare* (week two)
Michael Copon
I Don't Wanna Be (Gavin DeGraw, 2004) (week one)
American Woman (The Guess Who) (week two)
You Give Love a Bad Name (Bon Jovi, 1986) and Don't Go Breakin' My Heart (Elton John & Kiki Dee) duet w/Larry Holmes (week three)
This Is How We Do It (Montell Jordan, 1995) (week four)
Hot in Herre (Nelly, 2002) and Walking on Sunshine (Katrina and the Waves, 1985) duet w/Morgan Fairchild (week five)
Blowin' Me Up (With Her Love) (JC Chasez, 2002) (week six)
Larry Holmes
I Got You (I Feel Good) (James Brown) (week one)
Let's Get it On (Marvin Gaye) (week two)
Brick House (The Commodores, 1977)* and Don't Go Breakin' My Heart duet w/Michael Copon (week three)
Morgan Fairchild
These Boots Are Made for Walkin' (Nancy Sinatra) (week one)
I Will Survive (Gloria Gaynor, 1979) (week two)
You're So Vain (Carly Simon, 1972) and (I've Had) The Time of My Life (Bill Medley & Jennifer Warnes, 1987) duet w/Antonio Sabato, Jr. (week three)
Believe (Cher, 1999) (week four)
Son of a Preacher Man (Dusty Springfield) and Walking On Sunshine duet w/Michael Copon (week five)
Heartbreaker (Pat Benatar, 1979) (week six)
Bai Ling
Like a Virgin (Madonna, 1984) (week one)
Call Me (Blondie, 1980) (week two)
Girls Just Wanna Have Fun (Cyndi Lauper, 1984) and Summer Nights duet w/Carmine Gotti Agnello (week three)
I Wanna Be Sedated (The Ramones) (week four)
Volare and Rock and Roll All Nite (KISS) duet/Carmine Gotti Agnello* (week five)
Special Performance: I Touch Myself (Divinyls, 1991) (week six)
Antonio Sabato Jr.
Every Breath You Take (The Police, 1983) (week one)
I Want You to Want Me (Cheap Trick, 1978) (week two)
Addicted to Love (Robert Palmer, 1986) and I Had the Time of My Life duet w/Morgan Fairchild (week three)
Nothin' But a Good Time (Poison, 1988)* (week four)
Myrka Dellanos
Don't Know Why (Norah Jones, 2002) (week one)
It's My Life (No Doubt, 2003)* (week two)
During Week 6, all nine contestants (except Joe Pantoliano) returned to perform Bohemian Rhapsody (Queen, 1975).
Not aired (*)
Eliminated
Week 2: Myrka Dellanos, Kim Alexis Joe
|
https://en.wikipedia.org/wiki/Tyne%20Dock%20Metro%20station
|
Tyne Dock is a Tyne and Wear Metro station, serving South Tyneside Hospital and the suburb of Tyne Dock, South Tyneside in Tyne and Wear, England. It joined the network on 24 March 1984, following the opening of the fifth phase of the network, between Heworth and South Shields.
History
The station was opened as Jarrow Dock on 1 August 1856, by the Stanhope and Tyne Railway. It was later resited and renamed Tyne Dock on 1 January 1861.
The resited station was situated to the east of the divergence of the Brandling Junction Railway and the Stanhope and Tyne Railway route via Chichester. The current Tyne and Wear Metro station is built to the east of the divergence, but on the former Stanhope and Tyne Railway route.
The route via High Shields was closed in June 1981, with the Tyne and Wear Metro line to South Shields following the former route of the Stanhope and Tyne Railway.
The station was refurbished in 2018, at a cost of £350,000. The refurbishment project involved the installation of white vitreous enamel panels, new seating and lighting, and improved security and accessibility, as well as resurfaced platforms. The station was also painted in the new black and white corporate colour scheme.
Facilities
Step-free access is available at all stations across the Tyne and Wear Metro network, with ramps providing step-free access to both platforms at Tyne Dock. The station is equipped with ticket machines, waiting shelter, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is also fitted with smartcard validators, which feature at all stations across the network.
There is a free car park available at the station, with 34 spaces. There is also the provision for cycle parking, with two cycle pods available for use.
Services
, the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains per hour during the evening and on Sunday.
Rolling stock used: Class 599 Metrocar
References
External links
Timetable and station information for Tyne Dock
Metro stations in South Shields
1984 establishments in England
Railway stations in Great Britain opened in 1984
Tyne and Wear Metro Yellow line stations
Transport in Tyne and Wear
|
https://en.wikipedia.org/wiki/Fellgate%20Metro%20station
|
Fellgate is a Tyne and Wear Metro station, serving the suburbs of Fellgate and Hedworth, South Tyneside in Tyne and Wear, England. It joined the network on 31 March 2002, following the opening of the extension from Pelaw to South Hylton.
History
Along with other stations on the line between Fellgate and South Hylton, the station is fitted with vitreous enamel panels designed by artist, Morag Morrison. Each station uses a different arrangement of colours, with strong colours used in platform shelters and ticketing areas, and a more neutral palate for external elements.
The station was used by 380,620 passengers in 2017–18, making it the fourth-most-used station on the Wearside extension, after Pelaw (1,092,716), Sunderland (772,975) and Park Lane (392,327).
Facilities
Step-free access is available at all stations across the Tyne and Wear Metro network, with lifts providing step-free access to platforms at Fellgate. The station is also equipped with ticket machines, waiting shelter, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is also fitted with smartcard validators, which feature at all stations across the network.
There is a free car park available, with 54 parking spaces, plus three accessible spaces, as well as a taxi rank. There is also the provision for cycle parking, with five cycle pods available for use.
Services
, the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains per hour during the evening and on Sunday.
Rolling stock used: Class 599 Metrocar
References
External links
Timetable and station information for Fellgate
Railway stations in Great Britain opened in 2002
2002 establishments in England
Tyne and Wear Metro Green line stations
Transport in Tyne and Wear
Jarrow
Buildings and structures in the Metropolitan Borough of South Tyneside
|
https://en.wikipedia.org/wiki/Longbenton%20Metro%20station
|
Longbenton is a Tyne and Wear Metro station, serving the Freeman Hospital and suburb of Longbenton, North Tyneside in Tyne and Wear, England. It joined the network on 11 August 1980, following the opening of the first phase of the network, between Haymarket and Tynemouth via Four Lane Ends.
History
The station originally opened in July 1947, under the London and North Eastern Railway, which operated electric suburban passenger services on the North Tyneside Loop – known as the Tyneside Electrics. The original neoclassical station building was joined by a covered concrete footbridge and waiting rooms in the late 1950s, all of which were frequent targets for vandals by the 1970s.
Following closure for conversion in the late 1970s, a number of alterations were made to the station, including the shortening of platforms, construction of a new footbridge with spiral ramps to improve wheelchair access, and installation of new signage and ticket machines.
After the initial conversion work, the station buildings remained largely unchanged until 1999, when extensive refurbishment work took place. A new ticket hall was added on the eastbound platforms, and related aesthetic changes were made to the original footbridge constructed by the London and North Eastern Railway. The 1940s station building on the westbound platforms of the station was also upgraded and refurbished.
In 2001, Tag-Tile, an artwork designed by Rob Belilios and Simon Jones, was commissioned for the station. The artwork was created with the involvement of local young people, in response to graffiti issues at the station. The station also features Journey's Echo, a collection of artwork created in collaboration with sixth form students from the nearby secondary school, which was commissioned in 1999.
Facilities
Step-free access is available at all stations across the Tyne and Wear Metro network, with ramped access to platforms. Ramps also provide step-free access over the footbridge between platforms. The station is equipped with ticket machines, waiting shelter, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is also fitted with smartcard validators, which feature at all stations across the network. A small newsagent's shop is housed within the station building, on the westbound platform (trains towards South Shields).
There is no dedicated car parking available at the station. There is the provision for cycle parking, with five cycle pods available for use.
Services
, the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains per hour during the evening and on Sunday. Additional services operate between and or at peak times.
Rolling stock used: Class 599 Metrocar
References
External links
Timetable and station information for Longbenton
M
|
https://en.wikipedia.org/wiki/Four%20Lane%20Ends%20Interchange
|
Four Lane Ends is a Tyne and Wear Metro station, serving the suburbs of Benton and Longbenton, North Tyneside in Tyne and Wear, England. It joined the network on 11 August 1980, following the opening of the first phase of the network, between Haymarket and Tynemouth via Four Lane Ends.
History
The station is located at the junction of Benton Lane (A188), Benton Park Road (A191) and Front Street (A191). The crossroads has historically been important for traders, cattle drivers, and those transporting local salts and lime towards the shipyards and factories in Newcastle. Nearby employment sites include Benton Park View to the west, Tyneview Park to the south east, and Quorum Business Park to the north.
Unlike neighbouring Longbenton and Benton, Four Lane Ends was purpose-built for the Tyne and Wear Metro network. These purpose-built stations, such as Four Lane Ends, Heworth and Regent Centre, had a definite corporate look of rectangular blocks, light enamelled wall panels, and black roofing.
The station is situated at the site of the first Longbenton station, which opened in 1864 and closed at the start of 1871 – being replaced by Benton. The last remains of this station disappeared following the construction of Four Lane Ends in the late 1970s.
Four Lane Ends houses two art installations, both of which were commissioned in the early 2000s. Andrew Stonyer's Pulse (2000) features in the station's courtyard, adjacent to the ticket concourse, and consists of a diameter corten steel ring, with a circle of bright neon red. Cath Campbell's Detour (2003) features on the south and west elevations of the station's multi-storey car park, creating an "animated" and "dynamic" surface, describing movement and journeys through space.
Facilities
Step-free access is available at all stations across the Tyne and Wear Metro network, with two lifts providing step-free access to platforms at Four Lane Ends. As part of the Metro: All Change programme, new lifts were installed at Four Lane Ends in 2012, with new escalators installed in 2015. The station is equipped with ticket machines, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is also fitted with smartcard validators, which feature at all stations across the network. The station houses a small number of shops and services. A Nexus TravelShop also operated at the station until 2014.
A large multi-storey pay and display car park is available, with 457 spaces plus 22 accessible spaces, as well as a taxi rank. There is also the provision for cycle parking, with five cycle pods, five cycle lockers, and 18 cycle spaces available for use. A bus interchange is also available at the station, providing frequent connections in and around Newcastle upon Tyne and North Tyneside.
Services
, the station is served by up to five t
|
https://en.wikipedia.org/wiki/Benton%20Metro%20station
|
Benton is a Tyne and Wear Metro station, serving the suburb of Benton, North Tyneside in Tyne and Wear, England. It joined the network on 11 August 1980, following the opening of the first phase of the network, between Haymarket and Tynemouth via Four Lane Ends.
History
The station originally opened on 27 June 1864 under the Blyth and Tyne Railway. It was resited on 1 March 1871 by the North Eastern Railway. Following closure for conversion in the late 1970s, the original station building on the westbound platform was retained, and now serves as a private residence.
Prior to the network's extension to Wearside in March 2002, Benton was a terminus station of the former Red Line, which operated between Pelaw and Benton. The station still serves as a terminus for Yellow Line trains from Pelaw during peak hours. However, following the opening of Northumberland Park in December 2005, many of these trains now continue to Monkseaton.
The station was used by 348,120 passengers in 2017–18.
Facilities
Step-free access is available at all stations across the Tyne and Wear Metro network, with ramped access to platforms. Two lifts, which were installed in 2011, provide step-free access over the footbridge between platforms. The station is equipped with ticket machines, waiting shelter, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is also fitted with smartcard validators, which feature at all stations across the network.
A small free car park is available, with ten spaces, plus two accessible spaces. There is also the provision for cycle parking, with five cycle pods available for use.
Services
, the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains per hour during the evening and on Sunday. Additional services operate between and Benton or at peak times.
Rolling stock used: Class 599 Metrocar
References
External links
Timetable and station information for Benton
Metropolitan Borough of North Tyneside
1871 establishments in England
Railway stations in Great Britain opened in 1871
1980 establishments in England
Railway stations in Great Britain opened in 1980
Tyne and Wear Metro Yellow line stations
Transport in Tyne and Wear
Former North Eastern Railway (UK) stations
|
https://en.wikipedia.org/wiki/CYCL
|
CYCL may refer to:
CYCL, the ICAO airport code for Charlo Airport in Canada
CycL, an ontological knowledge-based programming language
See also
Cycle (disambiguation)
|
https://en.wikipedia.org/wiki/Palmersville%20Metro%20station
|
Palmersville is a Tyne and Wear Metro station, serving the village of Holystone and suburb of Forest Hall, North Tyneside in Tyne and Wear, England. It joined the network on 19 March 1986.
History
The station is situated on the opposite side of the bridge with Great Lime Road to the short-lived former station, . It was opened by the North Eastern Railway on 1 July 1909, closing on 20 September 1915, as part of an economy measure during the First World War.
Prior to the opening of the station, the distance between Benton and Shiremoor was the longest between stations on the network.
In 2011, Palmersville was the first station on the network to be fitted with new ticket machines and smartcard validators, as part of the Metro: All Change programme. A total of 225 new ticket machines were installed, at 60 stations, between 2011 and 2013.
The station was used by 221,793 passengers in 2017–18, making it the third-least-used station in North Tyneside, after Hadrian Road (141,431) and Percy Main (203,204).
Facilities
Step-free access is available at all stations across the Tyne and Wear Metro network, with ramped access to both platforms. The station is equipped with ticket machines, waiting shelter, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is also fitted with smartcard validators, which feature at all stations across the network.
There is no dedicated car parking available at the station. There is the provision for cycle parking, with five cycle pods available for use.
Services
, the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains per hour during the evening and on Sunday. Additional services operate between and at peak times.
Rolling stock used: Class 599 Metrocar
References
External links
Timetable and station information for Palmersville
Metropolitan Borough of North Tyneside
1986 establishments in England
Railway stations in Great Britain opened in 1986
Tyne and Wear Metro Yellow line stations
Transport in Tyne and Wear
|
https://en.wikipedia.org/wiki/Shiremoor%20Metro%20station
|
Shiremoor is a Tyne and Wear Metro station, serving the village of Shiremoor, North Tyneside in Tyne and Wear, England. It joined the network on 11 August 1980, following the opening of the first phase of the network, between Haymarket and Tynemouth via Four Lane Ends.
History
Unlike neighbouring West Monkseaton, a converted British Rail station, Shiremoor was purpose-built for the Tyne and Wear Metro network in the late 1970s. The station opened as a replacement for the former Backworth station, which closed to passengers in June 1977.
Facilities
Step-free access is available at all stations across the Tyne and Wear Metro network, with ramped access to both platforms. The station is equipped with ticket machines, waiting shelter, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is also fitted with smartcard validators, which feature at all stations across the network.
There is a small free car park available at the station, with 20 spaces. There is also the provision for cycle parking, with four cycle pods available for use.
Services
, the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains per hour during the evening and on Sunday. Additional services operate between and at peak times.
Rolling stock used: Class 599 Metrocar
References
External links
Timetable and station information for Shiremoor
Metropolitan Borough of North Tyneside
1980 establishments in England
Railway stations in Great Britain opened in 1980
Tyne and Wear Metro Yellow line stations
Transport in Tyne and Wear
|
https://en.wikipedia.org/wiki/Oklahoma%20Educational%20Television%20Authority
|
The Oklahoma Educational Television Authority (OETA) is a state network of PBS member television stations serving the U.S. state of Oklahoma. The authority operates as a statutory corporation that holds the licenses for all of the PBS stations operating in the state; it is managed by an independent board of gubernatorial appointees, and university and education officials, which is linked to the executive branch of the Oklahoma state government through the Secretary of Education.
In addition to offering television programs supplied by the Public Broadcasting Service (PBS) and acquired from various independent distributors, the network produces news, public affairs, cultural, and documentary programming; the OETA also distributes online education programs for classroom use and teacher professional development, and maintains the state's Warning, Alert and Response Network (WARN) infrastructure to disseminate emergency alerts to Oklahoma residents. The broadcast signals of the four full-power and fifteen translator stations comprising the network cover almost all of the state, as well as fringe areas of Kansas, Missouri, Arkansas, and Texas near the Oklahoma state line. It and KRSU-TV, an independent public station owned by Rogers State University in Claremore, are Oklahoma's only public television stations.
The OETA network's main offices, production facilities, and Oklahoma City transmitter are located at the intersection of Kelley Avenue and Britton Road in northeastern Oklahoma City, adjacent to the former studios of KWTV-DT and KSBI. In Tulsa, OETA uses studios on the campus of Oklahoma State University's extension center.
History
Incorporation and development
The OETA network traces its history to November 19, 1951, when a state educational television development conference was held to direct the Oklahoma State Regents for Higher Education to file applications with the Federal Communications Commission (FCC) to reserve certain broadcast television frequencies in selected cities throughout Oklahoma for non-commercial educational stations. In a unanimous vote, the Oklahoma Legislature subsequently approved House Concurrent Resolution #5, which urged the FCC to reserve broadcast television frequencies for non-commercial use. On May 18, 1953, Oklahoma became the first state that passed legislation to develop a statewide educational television service, when the legislature passed House Bill #1033, creating the Oklahoma Educational Television Authority as an independent statutory corporation. The bill—which was co-sponsored by State Rep. W. H. Langley (D-Stilwell) and State Sen. J. Byron Dacus (D-Gotebo), and was signed by Governor Johnston Murray—charged the organization with providing educational television programming to Oklahomans on a coordinated statewide basis, to be made possible with cooperation from the state's educational, government and cultural agencies, under the supervision and direction of the statute authority.
After appointing
|
https://en.wikipedia.org/wiki/KOKH-TV
|
KOKH-TV (channel 25) is a television station in Oklahoma City, Oklahoma, United States, affiliated with the Fox network. It is owned by Sinclair Broadcast Group alongside independent station KOCB (channel 34). The stations' studios and transmitter facilities are co-located on East Wilshire Boulevard and 78th Street on the city's northeast side.
History
As a non-commercial educational station
On July 25, 1958, while it was in the midst of protracted hearings regarding the predecessor station's bankruptcy, the Republic Television and Radio Company (owner of the allocation's original occupant, ABC affiliate KTVQ, which operated from November 1, 1953, until it was forced off the air by court order on December 15, 1955) donated the construction permit and license to Independent School District No. 89 of Oklahoma County (now Oklahoma City Public Schools). Although the Federal Communications Commission (FCC) reserved the UHF channel 25 allocation in Oklahoma City for commercial broadcasting purposes, the school district proposed upon acquiring the permit to operate it as a non-commercial educational independent station. The district requested for the television station to use the KOKH call letters (standing for its state of license, "Oklahoma") assigned at the time to its public radio station on 88.9 FM (now KYLV).
KOKH-TV first signed on the air on February 2, 1959. The station originally operated from studio facilities based out of the district's Broadcasting Center at the former Classen High School building on North Ellison Avenue and Northwest 17th Street in Oklahoma City's Mesta Park neighborhood (later occupied by the Classen School of Advanced Studies until the district consolidated it with Northeast Academy at that school's campus on Northeast 30th Street and Kelley Avenue in August 2019), which also served as a production facility for National Educational Television affiliate KETA-TV (channel 13, now a PBS member station), which the Oklahoma Educational Television Authority (OETA) signed on as Oklahoma's first educational television station on April 13, 1956. Channel 25's programming—which originally ran Monday through Fridays for seven hours per day, from 8:00 a.m. to 4:00 p.m.—consisted mainly of instructional and lecture-based telecourse programs developed or acquired in cooperation with the Oklahoma State Department of Education, which offered the course subjects attributable for college credit. Unlike KETA, which offered educational programming year-round (at least, during prime time through NET and later PBS), KOKH only offered programming during the academic year, temporarily suspending broadcasting operations during the district's designated summer break period.
In the summer of 1970, KOKH became the last television station in the Oklahoma City market to transmit programming in color, after RCA color transmission equipment—including three studio cameras, two videotape recorders, two film systems and two switchers—worth around $500,0
|
https://en.wikipedia.org/wiki/Veronica%20TV
|
Veronica is a Dutch free-to-cable commercial television channel currently a part of Talpa TV (Talpa Network). The channel was launched as TV10 Gold on 1 May 1995, then became TV10, Fox, Fox 8 and V8, before becoming Veronica on 20 September 2003. The channel is dedicated to young adults and the male audience.
Veronica is time-sharing with Disney XD: Disney XD broadcasts on daytime and Veronica on night time, the practice began when Saban International bought TV10 in January 1997, and launched a Fox Kids slot on the channel.
It is not to be confused with the Veronica Association ().
History
TV10 Gold and TV10 (1995-1998)
In 1995, Dutch media company Arcade launched two television channels in the Netherlands: The Music Factory, a competing music channel for MTV, and TV10 Gold which launched on 1 May 1995. TV10 Gold's programming focused on reruns of classic TV series such as Dynasty, Fantasy Island, James Herriot, Hill Street Blues, Are You Being Served?, The Monkees, The Onedin Line, Sanford and Son, Bergerac and Colditz.
In 1996, TV10 Gold became part of the second largest Dutch media corporation Wegener Arcade. On 1 January 1996, Arcade merged with publishing company Wegener. In the first quarter of 1996, TV10 Gold changed into just TV10 to modernize its image. British sitcoms such as 'Allo 'Allo! and You Rang, M'Lord? remained part of the programming, along with the American TV series M*A*S*H.
In January 1997, Saban International bought TV10 and partnered with Holland Media Groep. Fox/Saban's Fox Kids was introduced in the Netherlands, time-sharing with TV10. Within the year, the partnership ended and Holland Media Groep's shares of TV10 were bought by Fox.
Fox and Fox 8 (1998-2001)
On 19 December 1998, TV10 was rebranded into Fox. Rupert Murdoch's Fox International Channels wanted to expand in Europe and through its cooperation with Saban it could make its first try-outs in the Netherlands with TV10. Popular TV series such as Sex and the City, Dawson's Creek, Malcolm in the Middle and Charmed premiered on the channel. Fox became Fox 8 in September 1999, but it rebranded back to Fox in September 2000. However, Fox could not get rid of TV10's image as an old-fashioned rerun channel.
In 2001, SBS Broadcasting B.V., then the Dutch branch of the SBS Broadcasting Group, bought the channel from the News Corporation.
21st Century Fox (the legal successor of the original News Corporation) later launched the second incarnation of Fox on 19 August 2013 through Eredivisie Media & Marketing CV, in which Fox Networks Group Benelux has a 51% share.
V8 (2001-2003)
SBS, having bought the channel from News Corporation, renamed it into V8 on 1 May 2001 in anticipation of Veronica. Earlier in 2000 Veronica Association announced that it would leave the Holland Media Groep and wanted to start a channel of its own. SBS and Veronica could not get an agreement and it would take more than two years before both parties closed a deal.
V8 was focused to young
|
https://en.wikipedia.org/wiki/Bart%27s%20Comet
|
"Bart's Comet" is the fourteenth episode of the sixth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on February 5, 1995. In the episode, Bart Simpson accidentally discovers a comet, which is heading towards Springfield. The show's writing staff saw an issue of Time magazine that presented the threat of comets hitting Earth on its cover, and decided to create an episode in a similar vein. "Bart's Comet" contains references to Where's Waldo? and The Twilight Zone, and received positive reviews.
The episode was written by John Swartzwelder and directed by Bob Anderson.
Plot
After Bart sabotages Principal Skinner's weather balloon, Skinner punishes him by making him arrive in the schoolyard at 4:30 a.m. to be his amateur astronomy assistant. Whilst Skinner is distracted by retrieving the weather balloon, Bart accidentally locates a comet, which scientists soon discover is headed straight for Springfield. Professor Frink plans to launch a missile at the comet, exploding it before it touches the ground. Instead, the missile undershoots the comet and destroys the only bridge out of town. An evacuation of the town is voted down in Congress due to the addition of an amendment to the enabling legislation.
Homer decides his family should stay in Ned Flanders' bomb shelter; anticipating this scenario, Ned has constructed a shelter large enough for several people. Other townspeople soon arrive, crowding the shelter until Homer is unable to close the door. Because everyone else thinks they deserve to live, Ned is expelled from his own shelter.
Eventually, Homer feels guilty and leaves the shelter, followed by the other townspeople. Everyone joins Ned on a hill, joining in with his singing while awaiting death from the comet. As it enters the Earth's atmosphere, the comet burns up in the thick layer of pollution over Springfield. When it touches down, all that remains is a meteorite the size of a Chihuahua's head. Only the shelter and the weather balloon are destroyed, leaving the rest of the town untouched. The townspeople band together to burn down the observatory so "it will never happen again". With Homer having accurately predicted the comet's fate earlier, he, Bart and Lisa huddle together in fear.
Production
The episode was written by John Swartzwelder and directed by Bob Anderson. After seeing an issue of Time magazine, which presented the threat of comets hitting Earth on its cover, the writing staff decided to have an episode based on the concept of a comet hitting Springfield. They fleshed out the episode's plot over several days and Swartzwelder then set about writing the details of the script. According to showrunner David Mirkin, examples of "Swartzwelder humor" in the episode include the American fighter pilots mistaking Groundskeeper Willie for an Iraqi jet and cutting to Grampa and Jasper outside a 1940s general store. For the bomb shelter scene, the mass of tow
|
https://en.wikipedia.org/wiki/Timothy%20O%27Shea
|
Sir Timothy Michael Martin O'Shea (born 28 March 1949, Hamburg, Germany) is a British computer scientist and academic. He was the Vice-Chancellor and Principal of the University of Edinburgh from 2002 to 2018.
Biography
O'Shea grew up in London, attended the Royal Liberty School, in Romford, Essex. A computer scientist, he was Master of Birkbeck College from 1998 to 2002 and Pro-Vice-Chancellor of the University of London from 2001.
A graduate of the Universities of Sussex and Leeds, he has worked in the United States and for the Open University where he founded the Computer Assisted Learning Research Group and worked on a range of educational technology research and development projects, later becoming Pro-Vice-Chancellor there.
He was a Research Fellow at the University of Edinburgh, Department of Artificial Intelligence, from 1974 to 1978.
The most translated of his ten books is Learning and Teaching with Computers, co-authored with John Self and his most recent 2007 book, In Order to Learn, published by Oxford University Press, was co-edited with Frank Ritter, Josef Nerb and Erno Lehtinen.
O'Shea became Principal of the University of Edinburgh in October 2002. Since his appointment he has sat on various boards including the Boards of Scottish Enterprise, the Intermediary Technology Institute Scotland Ltd, the British Council, the Governing Body of the Roslin Institute and has been Convenor of the Research and Commercialisation Committee of Universities Scotland and Acting Convener of Universities Scotland.
In 2004 he was elected Fellow of The Royal Society of Edinburgh.
He was knighted in the 2008 New Year Honours.
O'Shea received an Honorary Doctorate from Heriot-Watt University in 2008
On 21 June 2016, it was announced that O'Shea would step down from his position as Principal and Vice-Chancellor of the university in September 2017.
Boards and Committees
Since January 2008, O’Shea has been Chair of Jisc (formerly the Joint Information Systems Committee). He is also Chair of the Scottish Institute for Enterprise, was Chair of the board of directors of the Edinburgh Festival Fringe from 2012 to 2021, and the Board of Newbattle Abbey College Trust. He sits on the Council of the Confucius Institute Headquarters, and is currently a member of the German Initiative for Excellence, or 'Excellenzinitiative'.
References
Principals of the University of Edinburgh
Academics of the University of Edinburgh
Alumni of the University of Sussex
Alumni of the University of Leeds
Edinburgh Festival Fringe staff
1949 births
Living people
Fellows of the Royal Society of Edinburgh
Jisc
Knights Bachelor
Masters of Birkbeck, University of London
People educated at the Royal Liberty Grammar School
|
https://en.wikipedia.org/wiki/History%20of%20artificial%20intelligence
|
The history of artificial intelligence (AI) began in antiquity, with myths, stories and rumors of artificial beings endowed with intelligence or consciousness by master craftsmen. The seeds of modern AI were planted by philosophers who attempted to describe the process of human thinking as the mechanical manipulation of symbols. This work culminated in the invention of the programmable digital computer in the 1940s, a machine based on the abstract essence of mathematical reasoning. This device and the ideas behind it inspired a handful of scientists to begin seriously discussing the possibility of building an electronic brain.
The field of AI research was founded at a workshop held on the campus of Dartmouth College, USA during the summer of 1956. Those who attended would become the leaders of AI research for decades. Many of them predicted that a machine as intelligent as a human being would exist in no more than a generation, and they were given millions of dollars to make this vision come true.
Eventually, it became obvious that commercial developers and researchers had grossly underestimated the difficulty of the project. In 1974, in response to the criticism from James Lighthill and ongoing pressure from congress, the U.S. and British Governments stopped funding undirected research into artificial intelligence, and the difficult years that followed would later be known as an "AI winter". Seven years later, a visionary initiative by the Japanese Government inspired governments and industry to provide AI with billions of dollars, but by the late 1980s the investors became disillusioned and withdrew funding again.
Investment and interest in AI boomed in the first decades of the 21st century when machine learning was successfully applied to many problems in academia and industry due to new methods, the application of powerful computer hardware, and the collection of immense data sets.
Precursors
Mythical, fictional, and speculative precursors
Myth and legend
In Greek mythology, Talos was a giant constructed of bronze who acted as guardian for the island of Crete. He would throw boulders at the ships of invaders and would complete 3 circuits around the island's perimeter daily. According to pseudo-Apollodorus' Bibliotheke, Hephaestus forged Talos with the aid of a cyclops and presented the automaton as a gift to Minos. In the Argonautica, Jason and the Argonauts defeated him by way of a single plug near his foot which, once removed, allowed the vital ichor to flow out from his body and left him inanimate.
Pygmalion was a legendary king and sculptor of Greek mythology, famously represented in Ovid's Metamorphoses. In the 10th book of Ovid's narrative poem, Pygmalion becomes disgusted with women when he witnesses the way in which the Propoetides prostitute themselves. Despite this, he makes offerings at the temple of Venus asking the goddess to bring to him a woman just like a statue he carved.
Medieval legends of artificial beings
In Of
|
https://en.wikipedia.org/wiki/Neerim
|
Neerim is a locality in Victoria, Australia, on Main Neerim Road in the Shire of Baw Baw.
The locality was connected to the Victorian Railways network when on 27 March 1917 an extension of the line from Warragul to Neerim South was opened, later connecting to Noojee in 1919. The line closed in 1958.
The Post Office opened on 25 August 1877 and closed in 1967.
The locality, in conjunction with neighbouring township Neerim South, has an Australian Rules football team competing in the Ellinbank & District Football League.
References
External links
Towns in Victoria (state)
Shire of Baw Baw
|
https://en.wikipedia.org/wiki/Diego%20Alcazar
|
Diego Alcazar is a fictional character from General Hospital, an American soap opera on the ABC network. Diego is the son of Lorenzo Alcazar and Maria Sanchez. Ignacio Serricchio originated the role of Diego in October 2004 and portrayed him until the character's supposed death in November 2006. Serricchio returned briefly in 2008, when it is revealed Diego is alive and terrorizing the citizens of Port Charles as the Text Message Killer.
Casting
Ignacio Serricchio joined the cast in 2004, and remained on contract until November 2006, despite being off-screen from December 2005 until March 2006. In 2006 he amicably left the show, telling Soap Opera Digest, "I was not fired and I didn't quit. [...] It's a win-win for everybody." Despite the character being killed off the series, Serricchio briefly reprised the role of Diego in 2008 as the Text Message Killer villain, before the character died again.
Storylines
2004–06
After being taken in as a foster child by Courtney Matthews, 17-year-old Diego began acting out with Brook Lynn Ashton. Eventually he finds out his father is crime boss and arms dealer Lorenzo Alcazar, and Maria Sanchez, who Diego grew up believing was his sister, is actually his mother. Diego begins living with his father and following in his criminal footsteps.
In May 2005 Diego takes a liking to Maxie Jones and breaks up with his current girlfriend, Brook Lynn. It eventually turns out Diego is the Port Charles University stalker who had been drugging girls and taking pictures of them, including Maxie and Brook. He claims he was getting revenge for the death of his cousin, Sage Alcazar, who was locked in a freezer by Brook and Georgie Jones leading up to her stabbing by Mary Bishop. Lorenzo turns Diego in to the police for his crimes, but Diego runs out of the police station, holding Georgie hostage. He is ultimately caught and sent to prison, but returns to Port Charles a few months later. Serricchio spoke to Soap Opera Digest about the turn of his character, saying, "I think everybody has that [dark] side. I don’t know if it’s because he’s a bad person. I think it’s the teenage hormones that really got to him. You hear of kids that are wonderful human beings and all of a sudden they snap — and it comes out of nowhere. So, it’s more of a psychological thing. It doesn’t matter if he comes back or not. I’m good to go both ways."
In March 2006, Diego develops a relationship with Georgie, who was fighting with her husband Dillon Quartermaine, especially after he found out she had been writing to Diego while he was in prison. Diego teamed up with Lulu Spencer, who had a crush on Dillon, to break up Dillon and Georgie. The plan works and Diego and Georgie start dating until they realize what Diego and Lulu had done. Diego told Georgie he accepted her for who she was and loved her and refused to give up on them which touched Georgie.
In November 2006, Diego works with Lorenzo to try to frame Sam McCall, Jason Morgan, and Damian Spin
|
https://en.wikipedia.org/wiki/Internet%20traffic%20engineering
|
Internet traffic engineering is defined as that aspect of Internet network engineering dealing with the issue of performance evaluation and performance optimization of operational IP networks. Traffic engineering encompasses the application of technology and scientific principles to the measurement, characterization, modeling, and control of Internet traffic [RFC-2702, AWD2].
Enhancing the performance of an operational network, at both traffic and resource levels, are major objectives of Internet engineering. This is accomplished by addressing traffic performance requirements, while utilizing network economically and reliably. Traffic oriented performance includes packet transfer delay, packet delay variation, packet loss, and throughput.
An important objective of Internet traffic engineering is to facilitate reliable network operations [RFC-2702]. This can be done by providing mechanisms that network integrity and by embracing policies emphasizing survivability. This results in a minimization of the network to service outages arising from errors, faults and failures occurring within the infrastructure.
The Internet exists in order to transfer information from nodes to destination nodes. Accordingly, one of the most crucial functions performed by the Internet is the routing of traffic ingress nodes to egress nodes.
Ultimately, it is the performance of the network as seen by network services that is truly paramount. This crucial function should be considered throughout the development of engineering mechanisms and policies. The characteristics visible to end users are the emergent properties of the network, which are characteristics of the network when viewed as a whole. A goal of the service provider, therefore, is to enhance the properties of the network while taking economic considerations into account.
The importance of the above observation regarding the properties of networks is that special care must be taken when choosing network performance metrics to optimize. Optimizing the wrong metrics may achieve certain local objectives, but may have repercussions elsewhere.
References
Abdel-Hameed Nawar, "E-Commerce" Lecture Notes, Cairo University, Faculty of Economics and Political Science, Egypt, 2005. et al.
Internet architecture
Emergence
|
https://en.wikipedia.org/wiki/Project%20Firestart
|
Project Firestart is a cinematic survival horror game for the Commodore 64 computer system. It was designed by Jeff Tunnell and Damon Slye and published by Electronic Arts in 1989. Taking place in the 21st century, the game follows a government agent dispatched to a research station in orbit around Saturn's moon, Titan, to learn why the scientists there abruptly cut off communication with Earth. The game has been cited by various gaming journalists and writers as one of, if not the first, survival horror game, pioneering many conventions of the genre including limited ammunition, an emphasis on escaping enemies and puzzle solving over combat, solving a central mystery, and multiple endings.
Plot
In 2061, agent Jon Hawking of the United System States is sent to the research ship Prometheus, in orbit around Titan. Hawking's mission is to make contact with the members of Project Firestart, an initiative of the System Science Foundation, who have recently dropped out of communication with their superiors on Earth. Hawking is further instructed to retrieve all of the scientific data on board the Prometheus and then to destroy the ship, based on the USS' belief that Project Firestart has been compromised and could potentially pose a threat to Earth. Should Hawking fail in his mission, the USS will remotely activate the Prometheus' self destruct sequence on the assumption that Hawking himself has been killed.
On board the Prometheus, Hawking discovers the entire crew brutally murdered and the ship infested with large, hostile creatures. Retrieving the ship's science logs, Hawking discovers that Project Firestart was a genetic engineering program that sought to create a mining species resistant to extreme cold and low oxygen levels by combining the DNA of oxen with a new species of fungi discovered in asteroids around Titan. Hawking further learns that one of the scientists on the project, Dr. Arno, secretly altered the DNA of the mining creatures in an attempt to create a race of super soldiers. The plan backfired, as Arno's creations proved to be mindlessly hostile and capable of asexual reproduction. Unable to contain the monsters, the crew of the Prometheus was slaughtered. SIA Agent Annar Kensan, who was working in secret with Dr. Arno, survived by placing himself in cryosleep; upon Hawking's arrival on the Prometheus, he awakens. Also in cryosleep is Mary, another Firestart scientist who survived the massacre because she was placed in suspended animation after suffering a minor injury.
The creatures spawn a giant, white version of themselves, which begins attacking them. The supercreature then seeks out Hawking, who discovers that it is completely invulnerable to all of his weaponry. Using the Firestart scientists' notes on the genetic flaws in their original organisms, he must improvise a way to kill the creature using the resources available to him on board the ship.
Endings
The ending of the game varies depending on different actions take
|
https://en.wikipedia.org/wiki/Tim%20Stryker
|
Timothy J. Stryker, better known as Tim Stryker or Stryker (9 December 1954 – 6 August 1996) was a computer programmer who created MajorBBS, a computer bulletin board software package. With Ken Wasserman he wrote the 1980 game Flash Attack for the Commodore PET, then he created the color vector arcade video game Aztarac (1983) for Centuri.
Education
Stryker graduated from Northfield Mount Hermon School in 1972, and received his bachelor's degree in physics from Brown University in 1977.
Game development
Stryker and Ken Wasserman wrote the real-time strategy game Flash Attack (1980) for the Commodore PET personal computer. It is written in a custom Forth-derived programming language called RPL. Stryker developed a cable so that two PET computers can be linked to play against each other. The game was later rewritten for MS-DOS, allowing up to four players in real time, interconnected by modems dialed into MajorBBS.
Stryker authored arcade vector game Aztarac released by Centuri in 1983. It was not a commercial success, and its rarity has made it sought after by collectors. During the attract mode of the game, quickly spinning the spinner control reveals a message in the starfield: "Designed by T. Stryker".
The MajorBBS
Stryker founded Galacticomm in 1985 and created The Major BBS. It supports real-time teleconference, gaming, discussion forums, user profiles (registry), and file transfer sections.
Later, Stryker hired Scott Brinker, originally of Moonshae Isles BBS, who created many of the early games available for MajorBBS, including Kyrandia.
Personal life & death
Tim Stryker was a staunch advocate of electronic democracy, and began a movement called Superdemocracy to computerize voting and help people follow politics in cyberspace. He dreamed of creating the "perfect society based on compassion and love".
Stryker suffered from severe depression, and was found dead of a self-inflicted shotgun wound in the mountains of Colorado on 6 August 1996 at the age of 41.
Other works
Books
Art
STRYKER ART (1993-1994) - Stryker produced several computer art images, from which only 150 prints each were made, and each one was numbered, signed and dated by the artist. The printing technique took the digital output of the artist's custom computer software directly to transparencies, from which each print was lovingly created, direct-to-positive on ultra-high-gloss Fuji film. STRYKER ART was distributed by Consensus Systems, Inc. in Plantation, Florida.
Unpublished
What Goes Around (1995 - preliminary copy available)
References
External links
Flash Attack Page about Flash Attack, with notes on link cable
BBS: The Documentary Historical Reference to BBSing, and the people who created the systems.
The Major BBS Restoration Project Historical information about Galacticomm, The Major BBS, and its software vendors.
1954 births
1996 deaths
American computer programmers
MUD developers
Suicides by firearm in Colorado
Northfield Mount Hermon Scho
|
https://en.wikipedia.org/wiki/DSL%20modem
|
A digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line which provides the digital subscriber line (DSL) service for connection to the Internet, which is often called DSL broadband. The modem connects to a single computer or router, through an Ethernet port, USB port, or is installed in a computer PCI slot.
The more common DSL router is a standalone device that combines the function of a DSL modem and a router, and can connect multiple computers through multiple Ethernet ports or an integral wireless access point. Also called a residential gateway, a DSL router usually manages the connection and sharing of the DSL service in a home or small office network.
Different DSL routers and modems support different DSL technology variants: VDSL, SDSL, and ADSL.
Description
A DSL router consists of a box with an RJ11 jack to connect to a standard subscriber telephone line. It has several RJ45 jacks for Ethernet cables to connect it to computers or printers, creating a local network. It usually also has a USB jack which can be used to connect to computers via a USB cable, to allow connection to computers without an Ethernet port. A wireless DSL router also has antennas to allow it to act as a wireless access point, so computers can connect to it forming a wireless network. Power is usually supplied by a cord from a wall wart transformer.
It usually has a series of LED status lights which show the status of parts of the DSL communications link:
Power light - indicates that the modem is turned on and has power
Ethernet lights - there is usually a light over each Ethernet jack; a steady (or sometimes flashing) light indicates that the Ethernet link to that computer or device is functioning
DSL light - a steady light indicates that the modem has established contact with the equipment in the local telephone exchange (DSLAM) so the DSL link over the telephone line is functioning; newer modems that support ADSL2+ bonding will have one light for each line
Internet light - a steady light indicates that the IP address and DHCP protocol are initialized and working, so the system is connected to the Internet
Wireless light - (only in wireless DSL modems) indicates that the wireless network is initialized and working
Many routers provide an internal web page to the local network for device configuration and status reporting. Most DSL routers are designed to be installed by the customer for which a CD or DVD containing an installation program is supplied. The program may also activate the DSL service. Upon powering the router it may take several minutes for the local network and DSL link to initialize, usually indicated by the status lights turning green. There are also PCI DSL modems, which plug into an available PCI card slot on a computer.
Technology
DSL concept
The public switched telephone network, the network of switching centers, trunk lines, amplifiers and switches which transmits telephone calls from
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.