source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/KLUZ-TV
|
KLUZ-TV (channel 14) is a television station in Albuquerque, New Mexico, United States, broadcasting the Spanish-language Univision network to most of the state. It is owned by TelevisaUnivision, which maintains a local marketing agreement (LMA) with Entravision Communications, owner of UniMás affiliate KTFQ-TV (channel 41), for the provision of certain services. Both stations share studios on Broadbent Parkway in northeastern Albuquerque, while KLUZ-TV's transmitter is located in Rio Rancho.
History
Prior usage of channel 14 in Albuquerque
Channel 14 signed on as KGSW on May 8, 1981. The call sign was derived from the station's original owners, Galaxy Communications and Southwest Television. Initially, KGSW carried drama shows, movies from the 1940s through the 1970s, sitcoms, and religious shows. In the fall of 1983, the station added more sitcoms and began running cartoons in the 7–9 a.m. and the 3–5 p.m. weekday slots.
In 1984, the Providence Journal Company bought KGSW from the original owners. The station affiliated with the Fox network when it launched on October 9, 1986. The station continued a general entertainment format with cartoons, sitcoms, and movies. KGSW also carried a news capsule titled Fox 14 News Update. In the fall of 1992, after KKTO-TV (channel 2) went dark, Providence Journal acquired its programming and integrated it into KGSW's lineup. Shortly afterward, it acquired the KKTO license as well, and on April 5, 1993, KGSW moved to channel 2 and changed call letters to KASA-TV. The channel 14 license was then surrendered to the Federal Communications Commission (FCC) for cancellation.
In 1997, Paxson Communications was awarded a construction permit for a new station on channel 14; in April 1999, it signed on as Pax TV station KAPX. Paxson chose to sell some of its stations, including KAPX; in 2003, Univision bought the station, and that June relaunched channel 14 as Telefutura (now UniMás) affiliate KTFQ.
KLUZ-TV
KLUZ began operation in September 1987 on channel 41 and has been a Univision affiliate since then. In 2007, it added LATV as a digital subchannel on 41.2.
On December 4, 2017, as part of a channel swap made by Entravision Communications, KLUZ and sister station KTFQ swapped channel numbers, with KLUZ moving from digital channel 42 and virtual channel 41 to digital channel 22 and virtual channel 14.
Newscasts
In 1992, KLUZ premiered a news program called 5 en Punto (five o'clock). In 1993, KLUZ launched Albuquerque's first Spanish-language newscast, Noticias 41. The show was anchored by New Mexico native Bonita Ulibarrí, along with weatherman Sergio Schwartz and sportscaster Liliana Carrillo. The newscast aired Monday through Friday at 10 p.m.
In 1993, the station launched a 5 p.m. program that replaced 5 En Punto and was anchored by Ulibarrí. Schwartz continued to do weather, but a new sportscaster, Donaldo Zepeda, was introduced. For the 10 p.m. broadcast, Ulibarrí was replaced as anchor by Susana Oliva
|
https://en.wikipedia.org/wiki/QNN
|
QNN may refer to:
Quantum neural network, computational neural network models which are based on the principles of quantum mechanics
Quds News Network, the leading news agency in the state of Palestine
|
https://en.wikipedia.org/wiki/Jhapa%20District
|
Jhapa District (; ) is a district of Koshi Province in eastern Nepal named after a Rajbanshi |Surjapuri language word "Jhapa" meaning "to cover" (verb). The latest official data, the 2021 Nepal Census, puts the total population of the district at 994,090. The total area of the district is 1,606 square kilometres.
The lowlands of Limbuwan (present-day terai lands of Sunsari, Morang and Jhapa) was collectively known as Morang since the time of King Mawrong of 7th century. In the beginning of 1400 AD, Morang Kingdom patriated from Kingdom of Ilam and Kingdom of Mikluk Bodhey (Choubise) and started ruling on its own.
Location
Jhapa is the easternmost district of Nepal and lies in the fertile Terai plains. It is part of the Outer Terai. Jhapa borders with Ilam in the north, Morang in the west, the Indian state of Bihar in the south and the Indian state of West Bengal to the southeast and east. Geographically, it covers an area of and lies on 87°39’ east to 88°12’ east longitude and 26°20’ north to 26°50’ north latitude.
Climate and geography
Jhapa receives 250 to 300 cm of rainfall a year, and mostly during the monsoon season in the summer, and its hilly northern area receives more rainfall than the south. The maximum temperature recorded is 42 °C in summer and 10 °C in winter. The lowest elevation point is 58 meters which is the lowest land in Nepal and the highest elevation point is 500 meters from mean sea level.
Administrative Division
Jhapa consists of 15 administrative divisions including 8 municipalities and 7 rural municipalities. Each divisions have wards according to the demographic and geographic size. These are:
Municipalities
Mechinagar Municipality
Bhadrapur Municipality
Birtamod Municipality
Arjundhara Municipality
Kankai Municipality
Shivasatakshi Municipality
Gauradaha Municipality
Damak Municipality
Rural Municipalities
Buddhashanti Rural Municipality
Haldibari Rural Municipality
Kachankawal Rural Municipality
Barhadashi Rural Municipality
Jhapa Rural Municipality
Gauriganj Rural Municipality
Kamal Rural Municipality
Demographics
At the time of the 2011 Nepal census, Jhapa District had a population of 812,650.
As first language, 55.7% spoke Nepali, 10.3% Rajbanshi, 5.6% Limbu, 5.5% Maithili, 3.6% Santali, 2.5% Rai, 2.4% Urdu, 2.1% Tamang, 1.5% Newar, 1.5% Tajpuriya, 1.2% Magar, 1.0% Dhimal, 0.8% Tharu, 0.7% Bengali, 0.6% Gurung, 0.5% Meche, 0.4% Bantawa, 0.4% Bhojpuri, 0.4% Hindi, 0.4% Rajasthani, 0.2% Chamling, 0.2% Danuwar, 0.2% Sunuwar, 0.2% Uranw/Urau, 0.1% Bhujel, 0.1% Ganagai, 0.1% Haryanvi, 0.1% Kisan, 0.1% Kulung, 0.1% Kumhali, 0.1% Majhi, 0.1% Sherpa, 0.1% Yakkha and 0.4% other languages.
Ethnicity/caste: 23.8% were Hill Brahmin, 15.7% Chhetri, 9.1% Rajbanshi, 6.6% Limbu, 4.7% Rai, 3.8% Satar/Santal, 3.3% Newar, 3.2% Musalman, 3.0% Kami, 2.9% Tamang, 2.2% Magar, 1.9% Damai/Dholi, 1.5% Tajpuriya, 1.3% Sanyasi/Dasnami, 1.2% Gangai, 1.2% Tharu, 1.1% Dhimal, 0.9% Gharti/Bhujel, 0.9% Gurung, 0.9% Ma
|
https://en.wikipedia.org/wiki/Ethylene%20%28data%20page%29
|
This page provides supplementary chemical data on ethylene.
Structure and properties
Thermodynamic properties
Vapor pressure of liquid
Table data obtained from CRC Handbook of Chemistry and Physics, 44th ed.
Spectral data
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. It is highly recommend that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source such as SIRI, and follow its directions.
References
NIST Standard Reference Database
Chemical data pages
Data page
Chemical data pages cleanup
|
https://en.wikipedia.org/wiki/Andrew%20Sears
|
Andrew Sears is an American computer scientist. He is a professor and dean of the College of Information Sciences and Technology (IST) at The Pennsylvania State University.
His research explores issues related to human-computer interaction including mobile computing, speech recognition, information technology accessibility, and situationally-induced impairments and disabilities. He earned his B.S. in Computer Science from Rensselaer Polytechnic Institute and his Ph.D. from the University of Maryland Department of Computer Science in College Park. His expert opinion on information technology and IT workforce issues have been reported by a variety of media sources.
Biography
Sears was born in Newton, Massachusetts, and attended Natick High School located in Natick, Massachusetts. He pursued undergraduate studies at Rensselaer Polytechnic Institute, graduating in 1988 with a BS in Computer Science. Subsequently, Sears pursued graduate studies at the University of Maryland, College Park, earning a PhD in Computer Science (1993). His dissertation, titled “Layout Appropriateness: Guiding user interface design with simple task descriptions” was chaired by Ben Shneiderman, with whom he worked in the Human-Computer Interaction Lab.
Upon receiving his Ph.D. from the University of Maryland, College Park, Sears joined the faculty of the School of Computer Science, Information Systems, and Telecommunications at DePaul University in Chicago. He left DePaul to accept a position with the Information Systems Department at UMBC in 1999. He served as the Chair of the Information Systems Department at UMBC from 2002 until 2011. In 2011, he left UMBC to join RIT as Dean of the B. Thomas Golisano College of Computing and Information Sciences. In 2015, he left RIT and joined The Pennsylvania State University as Dean of the College of Information Sciences and Technology (IST). He served as Interim Chief Information Security Officer for the university from September 2015 until December 2016.
Sears has been actively involved with the Association for Computing Machinery's Special Interest Group on Accessible Computing (SIGACCESS) since 2001 when he was elected Secretary/Treasurer of the group. In 2006 he was elected Vice Chair of SIGACCESS and in 2009 he was elected to serve as the chair of the group. In 2010, Sears was named a Distinguished Scientist by the Association for Computing Machinery (ACM). He has chaired the premier conferences in the fields of human-computer interaction (CHI) and computer accessibility (ASSETS). He also served in numerous other capacities on the organizing committees of these and other conferences. His research and expert opinion on information technology and IT workforce issues have been reported by a variety of media sources including The New York Times, The Chronicle of Higher Education, ComputerWorld, InformationWeek, Baltimore Business Journal, the Baltimore Examiner, WEAA radio, WYPR radio, and Maryland Public Television. Sears, work
|
https://en.wikipedia.org/wiki/Peter%20Bruff
|
Peter Schuyler Bruff (23 July 1812 – 24 February 1900) was an English civil engineer and land developer
remembered primarily for his part in establishing the East Anglian railway networks between the 1840s and 1860s. His contribution to the region's infrastructure and development extended far beyond the railways, however, and included the renovation of the Colchester water supply (1851-1880) and the Ipswich sewerage system (completed 1881), the development of the town of Harwich and the Essex resorts of Walton-on-the-Naze and Clacton on Sea (which he built up from an empty piece of farmland into a flourishing seaside town), and (not least) the late Victorian revival of the Coalport porcelain factory in Shropshire, which he purchased in 1880.
Early career
Bruff was born in Plymouth Dock. He published his Treatise on Engineering Field-Work, Containing Practical Land-Surveying for Railways, &c. in 1838, with an enlarged edition in 1840 and a second part in 1842. He was elected an Associate of the Institution of Civil Engineers on 19 May 1840.
Bruff worked on the Eastern Counties Railway from Shoreditch to Colchester, which was constructed between 1837 and 1843, but was discharged from the Company in 1842 owing to disagreements with the chief engineer John Braithwaite. Braithwaite's proposals for the line from Colchester to Ipswich involved very costly earthworks and construction. Bruff saw the opportunity for a more competitive and achievable project, and with the support of John Chevallier Cobbold of Ipswich, a director of the ECR, this was constructed between October 1844 and May 1846 with Joseph Locke as consulting engineer and Bruff as resident engineer, in the company name of the Eastern Union Railway.
In 1845-6 the line was extended through Bruff's 361 yd (330 m) Stoke Tunnel as the route was developed toward Bury St Edmunds. Ipswich railway station, originally sited at the southern end of the tunnel, was relocated to its present site nearer the town centre in 1860. The original station site became the good yard, and when this site was redeveloped for housing the new streets included a 'Bruff Road'. The line to Bury was constructed under the auspices of the Ipswich and Bury Railway Company.
Between 1847 and 1849 Bruff engineered the Chappel Viaduct, which carries the Sudbury Branch Line across the Colne Valley in Essex. It stands above the river, has 32 arches and is long. The viaduct contains 4.5 million bricks.
In 1852 he applied for a patent, No. 14,096, for "Improvements in the construction of the permanent way of rail, tram, or other roads, and in the rolling stock or apparatus used therefor".
Colchester water supply
In 1851 Bruff, in partnership with William Hawkins, bought the Colchester Waterworks Company as an investment, as awareness of the relationship between water supply and public health increased. He sank an artesian well on the site of the old waterworks in 1852, which soon doubled the supply on the west side of Colc
|
https://en.wikipedia.org/wiki/Transportation%20in%20Virginia
|
Transportation in the Commonwealth of Virginia is by land, sea and air. Virginia's extensive network of highways and railroads were developed and built over a period almost 400 years, beginning almost immediately after the founding of Jamestown in 1607, and often incorporating old established trails of the Native Americans.
History
Colonial period, 19th century
During the colonial period, the Virginia Colony was dependent upon the waterways as avenues of commerce, and James River Plantations such as John Rolfe's Varina Farms with their own wharfs on the rivers of the Fall Line (at present-day Richmond were soon shipping tobacco and other export crops abroad. Other important navigable rivers in this period were the Elizabeth, York, and Potomac.
By the 19th century, the Virginia Board of Public Works was funding transportation infrastructure improvements, stimulating such private enterprises as the James River and Kanawha Canal, the Chesterfield Railroad, and the Valley Turnpike. Claudius Crozet's innovative tunnels under the Blue Ridge Mountains were a key link in Collis P. Huntington's railroad linking Virginia to the Ohio River Valley in 1873. Soon thereafter, Pocahontas coal was riding the rails from the mountains eastbound for export via the Chesapeake and Ohio, Norfolk and Western and Virginian Railways with coal piers on Hampton Roads.
20th-21st centuries
With urging from the state chapter founded in Roanoke in 1894 of the National Good Roads Movement, in 1906 the Virginia General Assembly created the first State Highway Commission. In 1932, the state's role was expanded when the provisions of the Byrd Road Act during the Great Depression brought most secondary roads in the counties into the scope of state control and maintenance.
In the mid-20th century, Virginia's Henry G. Shirley Memorial Highway in Northern Virginia pioneered HOV and reversible traffic lanes. Prior to the creation of the Interstate Highway System, Virginia had some other notable roads to handle heavy traffic including Military Highway in South Hampton Roads, Mercury Boulevard on the Virginia Peninsula, and State Route 168, which extended from west of Williamsburg to the North Carolina border near the eastern edge of the Great Dismal Swamp, including Tidewater Drive in the Norfolk area. The Richmond-Petersburg Turnpike was built to relieve heavy traffic on US1-301 between those two cities.
In 1957, The Hampton Roads Bridge-Tunnel, first of its kind, was completed, and was soon incorporated into Interstate 64. The Chesapeake Bay Bridge-Tunnel completed in 1964 is the longest bridge-tunnel in the world. Interstate highways I-81 and I-95 are some of the busiest roads of commerce on the East Coast.
Of course, people and property continue to travel by ship, as the first settlers did. The Atlantic Ocean is accessed by the more sheltered Chesapeake Bay and Hampton Roads, with 5 major navigable rivers offering a wide choice of ports and industrial sites. International sh
|
https://en.wikipedia.org/wiki/BCU
|
BCU may refer to:
Computing
BIOS configuration utility
Bus Coupling Unit, an EIB/KNX bus coupler
IBM Balanced Configuration Unit
Universities and libraries
Bengaluru City University, formerly Bengaluru Central University, in Karnataka, India
Bethune–Cookman University
Birmingham City University
Briar Cliff University
Business and Computer University, Lebanon
Cantonal and University Library of Lausanne, Switzerland (Bibliothèque cantonale et universitaire de Lausanne)
Other uses
Awad Bing language (ISO 639-2 code "bcu")
Babish Culinary Universe, a YouTube cooking channel
Banco Central del Uruguay, official name in Spanish of the Central Bank of Uruguay
Basic command unit
British Canoeing AKA British Canoe Union
British Columbia United is a centre-right political party in the province of British Columbia, Canada
IATA airport code for Bauchi State Airport, Nigeria
Bumilangit Cinematic Universe, an Indonesian superhero franchise
|
https://en.wikipedia.org/wiki/Zope%20Object%20Database
|
The Zope Object Database (ZODB) is an object-oriented database for transparently and persistently storing Python objects. It is included as part of the Zope web application server, but can also be used independently of Zope.
Features of the ZODB include: transactions, history/undo, transparently pluggable storage, built-in caching, multiversion concurrency control (MVCC), and scalability across a network (using ).
History
Created by Jim Fulton of Zope Corporation in the late 90s.
Started as simple Persistent Object System (POS) during Principia development (which later became Zope)
ZODB 3 was renamed when a significant architecture change was landed.
ZODB 4 was a short lived project to re-implement the entire ZODB 3 package using 100% Python.
Implementation
Basics
ZODB stores Python objects using an extended version of Python's built-in object persistence (pickle). A ZODB database has a single root object (normally a dictionary), which is the only object directly made accessible by the database. All other objects stored in the database are reached through the root object. Objects referenced by an object stored in the database are automatically stored in the database as well.
ZODB supports concurrent transactions using MVCC and tracks changes to objects on a per-object basis. Only changed objects are committed. Transactions are non-destructive by default and can be reverted.
Example
For example, say we have a car described using 3 classes Car, Wheel and Screw. In Python, this could be represented the following way:
class Car: [...]
class Wheel: [...]
class Screw: [...]
myCar = Car()
myCar.wheel1 = Wheel()
myCar.wheel2 = Wheel()
for wheel in (myCar.wheel1, myCar.wheel2):
wheel.screws = [Screw(), Screw()]
If the variable mycar is the root of persistence, then:
zodb['mycar'] = myCar
This puts all of the object instances (car, wheel, screws etc.) into storage, which can be retrieved later. If another program gets a connection to the database through the mycar object, performing:
car = zodb['myCar']
And retrieves all the objects, the pointer to the car being held in the car variable. Then at some later stage, this object can be altered with a Python code like:
car.wheel3 = Wheel()
car.wheel3.screws = [Screw()]
The storage is altered to reflect the change of data (after a commit is ordered).
There is no declaration of the data structure in either Python or ZODB, so new fields can be freely added to any existing object.
Storage unit
For persistence to take place, the Python Car class must be derived from the persistence. Persistent class — this class both holds the data necessary for the persistence machinery to work, such as the internal object id, state of the object, and so on, but also defines the boundary of the persistence in the following sense: every object whose class derives from Persistent is the atomic unit of storage (the whole object is copied to the storage when a field is modified).
In the example above, if Car is
|
https://en.wikipedia.org/wiki/Around%20the%20Bay%20in%20a%20Day
|
Around the Bay in a Day is a non-competitive fully supported recreational cycling fundraising event organised by Bicycle Network in Victoria, Australia. Cyclists register to ride a course which is either clockwise or anti-clockwise around Port Phillip Bay, starting and ending in Melbourne, though other distances, both shorter and longer, are available.
Routes
Cyclists register to ride a course which was originally (but later augmented with a option) either clockwise or anti-clockwise around Port Phillip Bay, starting and ending in Melbourne, and catching the Searoad Ferry between Queenscliff and Sorrento. For those who choose to do the or route (the only two that properly fit the event description) the ride begins and ends at Alexandra Gardens. Half of the riders head towards the east-side of the bay, riding to Sorrento, and the other half head west towards Queenscliff. Riders cross the bay near the Port Phillip heads on ferries to complete the ride.
In 2005 entrants were offered shorter alternative rides, a ride from Sorrento to Docklands, or a ride to the western suburbs and return from the Alexandra Gardens using the West Gate Bridge in both directions.
With the popularity of these alternative shorter routes, and responding to the growing number of cyclists wanting to take part in Australia's biggest one-day challenge ride, the then Bicycle Victoria devised four options for the ride scheduled for 15 October 2006. The organisers expected 9000 participants to choose from the Legend or the Challenge ride. Less experienced riders could pick the Classic, which included the West Gate Bridge, or the Bay Ride. A post ride count put the number of total entrants to more than 14,000, raising $440,000.
The Legend starts at Docklands, heads down to Queenscliff via Geelong and the Bellarine Peninsula, crosses on the ferry to Sorrento, then back to Melbourne.
The Challenge takes the opposite tack down to Sorrento, cross to Queenscliff on the ferry, then back to Melbourne, without the Bellarine Peninsula section.
The Classic starts in Sorrento, heads back to Melbourne via the Mornington Peninsula.
The Bay Ride starts at Docklands, pedals to Williamstown, over the West Gate Bridge and back to the cycling festival.
History
The event was first run in 1993, following on from the success the then Bicycle Victoria had experienced with its Great Victorian Bike Ride. Approximately 500 cyclists took part in the inaugural event.
In October 2004, over 8,600 riders took part. In 2005 almost 11,000 people registered for the ride and raised about $300,000 for The Smith Family charity for disadvantaged children.
In 2008 more than 16,000 riders participated in Around the Bay in a Day. Several riders were injured before the start of the ride when a car hit a leading rider in a group on the Nepean Highway at around 4am just south of Mt Eliza. Later on the same day, a male rider collided with a fellow rider and fell head first on to the road at Olivers Hil
|
https://en.wikipedia.org/wiki/Free%20Software%20Directory
|
The Free Software Directory (FSD) is a project of the Free Software Foundation (FSF). It catalogs free software that runs under free operating systems—particularly GNU and Linux. The cataloged projects are often able to run in several other operating systems. The project was formerly co-run by UNESCO.
Unlike some other directories that focus on free software, Free Software Directory staff verify the licenses of software listed in the directory.
Coverage growth and usages
FSD has been used as a source for assessing the share of free software, for example finding in September 2002 an amount of "1550 entries, of which 1363 (87.9%) used the GPL license, 103 (6.6%) used the LGPL license, 32 (2.0%) used a BSD or BSD-like license, 29 (1.9%) used the Artistic license, 5 (0.3%) used the MIT license". By September 2009, the Directory listed 6,000 packages whose number grew up to 6,500 in October 2011, when the newly updated directory was launched. All listed packages are "free for any computer user to download, run and share. Each entry is individually checked and tested ... so users know that any program they come across in the directory will be truly free software ... with free documentation and without proprietary software requirements".
Several scientific publications review or refer to the directory. It has been remarked that the Directory "only includes software that runs on free operating systems. The FSF/UNESCO Free Software Directory is also a collaborative project, offering a web interface for users to enter and update entries".
Among the critical issues of the previous version, it has been pointed out that while "available software is described using a variety of textual metadata, including the components upon which a particular piece of software depends", "unfortunately, those dependencies are only listed by name, and locating and retrieving them is left to the user".
On the other hand, the accuracy of the directory review on licenses is acknowledged.
The code review from the directory's editorial board is suitable for obtaining statistics on subsets of free software packages reliably clustered by license.
In September 2011, the Free Software Directory was re-implemented as a wiki, using MediaWiki and the Semantic MediaWiki extension, to allow users to directly add to and modify its contents.
Semantic MediaWiki provides the directory with semantic web technologies by adding "advanced search and presentation capabilities, structured to be useful for reading by both humans and data-mining programs".
The new edition of the directory has been described as designed to ease and support with semantics the discovery and harvesting of information on free software programs. "An extensive and flexible category system, plus over 40,000 keywords and more than 40 different fields of information, enhance both simple and advanced searching".
A recent snapshot of the taxonomy of the projects reviewed and accepted in the directory is the following:
acces
|
https://en.wikipedia.org/wiki/Chief%20analytics%20officer
|
Chief analytics officer (CAO) is a job title for the senior manager responsible for the analysis of data within an organization, such as a listed company or an educational institution. The CAO often reports to the chief executive officer.
This position, along with that of chief information officer has risen to prominence due to the rise in information technology and data acquisition. The two positions are similar in that both deal with information, but the CIO focuses on the infrastructure required for maintaining and communicating information while the CAO focuses on the infrastructure required for generating and analyzing information. A similar position is that of the chief data officer (CDO); while the CDO focuses on data processing and maintenance, the CAO focuses on providing input into operational decisions on the basis of the analysis. As such, the CAO requires experience in statistical analysis and marketing, finance, or operations. The CAO may be a member of the board of directors of the organization, but this is dependent on the type of organization.
No specific qualification is typical of CAOs in general. Many have advanced degrees in mathematics, statistics, economics, or econometrics but this is by no means universal. Many were analysts in the past.
References
Business occupations
Management occupations
A
|
https://en.wikipedia.org/wiki/List%20of%20numerical%20computational%20geometry%20topics
|
List of numerical computational geometry topics enumerates the topics of computational geometry that deals with geometric objects as continuous entities and applies methods and algorithms of nature characteristic to numerical analysis. This area is also called "machine geometry", computer-aided geometric design, and geometric modelling.
See List of combinatorial computational geometry topics for another flavor of computational geometry that states problems in terms of geometric objects as discrete entities and hence the methods of their solution are mostly theories and algorithms of combinatorial character.
Curves
In the list of curves topics, the following ones are fundamental to geometric modelling.
Parametric curve
Bézier curve
Spline
Hermite spline
Beta spline
B-spline
Higher-order spline
NURBS
Contour line
Surfaces
Bézier surface
Isosurface
Parametric surface
Other
Level-set method
Computational topology
Mathematics-related lists
Geometric algorithms
Geometry
|
https://en.wikipedia.org/wiki/Sett%20%28disambiguation%29
|
A sett is the underground home or den of a family of badgers, usually consisting of a network of tunnels.
Sett or SETT may also refer to:
Sett (paving), a shaped piece of rock used to make hard surfaces for roads
The Submarine Escape Training Tower at HMS Dolphin, Gosport, England
The River Sett, a river in Derbyshire, England
Sett, the pattern of colored threads or yarns that make of up the distinctive plaid of a Scottish tartan
Mining sett, a legal arrangement used to manage the exploitation of land for the extraction of tin
Sett, a fictional creature in the animated television series Hellsing
Meskwaki Settlement, Iowa, called the "Sett" by residents
Sett (surname)
See also
Sette (disambiguation)
Set (disambiguation)
Seth (disambiguation)
Shet (disambiguation)
|
https://en.wikipedia.org/wiki/Tod%20Frye
|
Tod R. Frye (born 1955) is an American computer programmer once employed by Atari, Inc., and is most notable for being charged with the home adaptation of Pac-Man for the Atari 2600 video computer system, which, while reputedly the top selling title for that system, is popularly claimed to have been a factor in both Atari Inc.'s downfall and the video game crash of 1983.
Following the collapse of Atari he worked at video game and computer game companies such as 3DO and Pronto Games.
In 2015 he was working as Senior Embedded Software Engineer for the SunPower Corporation, where he worked in the field of IoT, developing hardware and software systems for monitoring solar power systems. His work extended from 'edge' devices, collecting and transmitting device telemetry, to cloud hosted Big Data systems for storing, analyzing, and reporting device data.
Leaving Sunpower in late 2016, Tod joined Bonsai AI, which was developing an artificial intelligence platform, focusing primarily on reinforcement learning.
Atari Pac-Man
Frye landed the 2600 Pac-Man project in early 1981. Atari had licensed the arcade games Defender and Pac-Man and while Frye preferred Defender, when fellow programmer Bob Polaro got that assignment, Frye got Pac-Man by default. Frye's landing the high-profile title did not pass without critical comment. One Atari employee wrote "Why Frye?" on the Pac-Man arcade machine contained in Atari's in-office arcade room. In response, Frye drew a horizontal line over the "Why", which means "Why not Frye" in logic notation.
Frye's Pac-Man port was started in May 1981, and was the most anticipated release for 1982, so marketing pressed Frye to produce the game on a very strict timetable (lead times on the cartridge ROMs was several months, so the code needed to be completed in September 1981 to get the product into stores during the first quarter of 1982). Atari corporate management demanded Frye complete the game in the standard 4K ROM, as the 8K ROM form factor was not quite available at the time.
Frye made several decisions which later proved controversial. First, he decided that supporting two-player gameplay was important, which meant 25–30 bytes of the 2600's meager 128 byte memory was utilized to store the second player's game state, score, etc. as opposed to using it for game data and features. Second, he chose to abandon plans for a flicker-management system which would have minimized the flashing of objects. Finally, his game did not conform to the arcade game's color scheme in order to comply with Atari's official home product policy that only space type games should feature black backgrounds. Frye states that there were no negative comments within Atari about these elements, but upon release the title drew criticism for not closely hewing to the specifics of its arcade counterpart.
Pac-Man proved to be a stunning financial coup for Atari, and Frye reportedly received $0.10 in royalties per Pac-Man cartridge. Atari would m
|
https://en.wikipedia.org/wiki/Josh%20Bongard
|
Josh Bongard is a professor at the University of Vermont and a 2010 PECASE awardee.
He attended Northern Secondary School in Toronto, and received his bachelor's degree in Computer Science from McMaster University ('97), Canada, his master's degree from the University of Sussex, UK, and his PhD from the University of Zurich (1999–2003), Switzerland. He served as a postdoctoral associate under Hod Lipson in the Computational Synthesis Laboratory at Cornell University in the United States from 2003 to 2006.
He is the co-author of the popular science book entitled "How the Body Shapes the Way We Think: A New View of Intelligence", MIT Press, November 2006. (With Rolf Pfeifer) . He is also the co-author of "Designing Intelligence: Why Brains Aren't Enough" (with Rolf Pfeifer and Don Berry) .
In 2007, he was named to the MIT Technology Review TR35 as one of the top 35 innovators in the world under the age of 35.
Selected publications
Kriegman, S., Blackiston, D., Levin, M., and Bongard, J. (2020) A scalable pipeline for designing reconfigurable organisms. Proceedings of the National Academy of Sciences, .
Bongard J. (2011) Morphological change in machines accelerates the evolution of robust behavior. Proceedings of the National Academy of Sciences, .
Bongard J. and Lipson H. (2007) Automated reverse engineering of nonlinear dynamical systems. Proceedings of the National Academy of Sciences, 104(24): 9943-9948.
Bongard, J., Zykov, V., Lipson, H. (2006) Resilient machines through continuous self-modeling. Science, 314: 1118-1121.
References
External links
Josh Bongard's web site
Computer-designed organisms - webpage about Xenobot research
Artificial intelligence researchers
Living people
McMaster University alumni
Alumni of the University of Sussex
University of Zurich alumni
1974 births
Researchers of artificial life
Northern Secondary School alumni
|
https://en.wikipedia.org/wiki/Cross-site%20tracing
|
In web security, cross-site tracing (abbreviated "XST") is a network security vulnerability exploiting the HTTP TRACE method.
XST scripts exploit ActiveX, Flash, or any other controls that allow executing an HTTP TRACE request. The HTTP TRACE response includes all the HTTP headers including authentication data and HTTP cookie contents, which are then available to the script. In combination with cross domain access flaws in web browsers, the exploit is able to collect the cached credentials of any web site, including those utilizing SSL.
External links
Cross-site tracing on use Perl.
Vulnerability Note VU#867593 - Multiple vendors' web servers enable HTTP TRACE method by default
WhiteHat Security - Whitepaper - Cross-Site Tracing (XST)
Web security exploits
|
https://en.wikipedia.org/wiki/CBS%20News%20Radio
|
CBS News Radio, formerly known as CBS Radio News and historically known as the CBS Radio Network, is a radio network that provides news to more than 1,000 radio stations throughout the United States. The network is owned by Paramount Global. It is the last of the three original national U.S. radio networks (CBS, NBC Radio Network and Mutual Broadcasting System) still operating and still owned by its parent company, even though CBS sold its owned and operated radio stations in 2017. The current NBC Radio Network is actually owned by iHeartMedia but licenses use of the NBC name and NBC's TV news reports.
CBS News Radio is one of the two national news services distributed by Skyview Networks, which transmits national news, talk, music and special event programs, in addition to local news, weather, video news and other information to radio and television stations, as well as traffic reporting services.
Background
The network is the second-oldest unit of Paramount Global after Paramount Pictures. CBS Radio traces its roots to CBS's predecessor, United Independent Broadcasters, founded in 1927 with 47 network affiliates. The next year, Columbia Records invested in the radio network, which was named the Columbia Phonographic Broadcasting System. Eventually, the record company pulled its backing from the struggling web. William S. Paley bought a half-interest in what became the Columbia Broadcasting System in 1928, and became its president. (In 1938, CBS bought its former parent, Columbia Records.) For more about the network's history, see CBS.
On February 2, 2017, CBS Corporation announced that its shareholders had acquired a majority stake in Entercom, whose corporate management will continue to oversee the company along with CBS's radio assets. The merger was approved on November 9, 2017, and was consummated on the 17th. The CBS News Radio network service will continue to be managed by CBS News.
On August 2, 2017, CBS announced that it had signed a contract with Skyview Networks for distribution of CBS News Radio. This went into effect January 1, 2018.
Programming
Stations and affiliates
Today, CBS News Radio is best known for its news and public affairs programming distributed to more than 500 affiliates, including flagship station WCBS in New York, and several other all-news and news-talk stations. They include KNX in Los Angeles, WBBM in Chicago, KCBS in San Francisco, KRLD in Dallas, KYW in Philadelphia, WTOP-FM in Washington, WBZ in Boston, WWJ in Detroit, WCCO in Minneapolis, KXNT Las Vegas, KMOX in St. Louis, and WTIC in Hartford.
CBS News Radio offers hourly News-on-the-Hour newscasts (available in three- and six-minute versions) and a one-minute newscast at 31 minutes past the hour. They are sent to member stations 24 hours a day, 7 days a week. In addition to the over-the-air product, reports and actualities are made available to affiliates via the network's Newsfeed service. Many of the aforementioned outlets make heavy use of
|
https://en.wikipedia.org/wiki/Tombstone%20%28programming%29
|
Tombstones are a mechanism to detect dangling pointers and mitigate the problems they can cause in computer programs. Dangling pointers can appear in certain computer programming languages, e.g. C, C++ and assembly languages.
A tombstone is a structure that acts as an intermediary between a pointer and its target, often heap-dynamic data in memory. The pointer – sometimes called the handle – points only at tombstones and never to its actual target. When the data is deallocated, the tombstone is set to a null (or, more generally, to a value that is illegal for a pointer in the given runtime environment), indicating that the variable no longer exists. This mechanism prevents the use of invalid pointers, which would otherwise access the memory area that once belonged to the now deallocated variable, although it may already contain other data, in turn leading to corruption of in-memory data. Depending on the operating system, the CPU can automatically detect such an invalid access (e.g. for the null value: a null pointer dereference error). This supports in analyzing the actual reason, a programming error, in debugging, and it can also be used to abort the program in production use, to prevent it from continuing with invalid data structures.
In more generalized terms, a tombstone can be understood as a marker for "this data is no longer here". For example, in filesystems it may be efficient when deleting files to mark them as "dead" instead of immediately reclaiming all their data blocks.
The downsides of using tombstones include a computational overhead and additional memory consumption: extra processing is necessary to follow the path from the pointer to data through the tombstone, and extra memory is necessary to retain tombstones for every pointer throughout the program. One other problem is that all the code that needs to work with the pointers in question needs to be implemented to use the tombstone mechanism.
Among popular programming languages, C++ implements the tombstone pattern in its standard library as a weak pointer using std::weak_ptr. Built–in support by programming languages or the compiler is not necessary to use this mechanism.
See also
Locks-and-keys
Multiple indirection
References
Programming constructs
|
https://en.wikipedia.org/wiki/Locks-and-keys
|
Locks-and-keys is a solution to dangling pointers in computer programming languages.
The locks-and-keys approach represents pointers as ordered pairs (key, address) where the key is an integer value. Heap-dynamic variables are represented as the storage for the variable plus a cell for an integer lock value. When a variable is allocated, a lock value is created and placed both into the variable's cell and into the pointer's key cell. Every access to the pointer compares these two values, and access is allowed only if the values match.
When a variable is deallocated, the key of its pointer is modified to hold a value different from the variable's cell. From then on, any attempt to dereference the pointer can be flagged as an error. Since copying a pointer also copies its cell value, changing the key of the ordered pair safely disables all copies of the pointer.
See also
Tombstone (programming)
Multiple indirection
References
Computer programming
|
https://en.wikipedia.org/wiki/List%20of%20Polish%20sports%20players
|
Note: Names that cannot be confirmed in Wikipedia database nor through given sources are subject to removal. If you would like to add a new name please consider writing about the player first.
This is a partial list of Polish sportspeople.
Alpine skiing
Andrzej Bachleda-Curuś II
Agnieszka Gąsienica-Daniel
Maryna Gąsienica-Daniel
American football
Sebastian Janikowski
Rob Gronkowski thru ancestry
Archery
Iwona Dzięcioł
Katarzyna Klata
Joanna Nowicka
Irena Szydłowska
Athletics
Andrzej Badeński
Sylwester Bednarek
Teresa Ciepły
Kamila Chudzik
Paweł Czapiewski
Marian Dudziak
Leszek Dunecki
Paweł Fajdek
Marian Foik
Halina Górecka
Zbigniew Jaremski
Anna Jesień
Celina Jesionowska
Jarosława Jóźwiakowska
Ryszard Katus
Urszula Kielan
Ewa Kłobukowska
Władysław Komar
Halina Konopacka
Robert Korzeniowski
Władysław Kozakiewicz
Elżbieta Krzesińska
Zdzisław Krzyszkowiak
Adam Kszczot
Andrzej Kupczyk
Janusz Kusociński
Maria Kwaśniewska
Lucyna Langer
Marcin Lewandowski
Zenon Licznerski
Tomasz Majewski
Piotr Małachowski
Bronisław Malinowski
Bogusław Mamiński
Wiesław Maniak
Aleksandra Mirosław
Artur Partyka
Jerzy Pietrzyk
Marek Plawgo
Ryszard Podlas
Monika Pyrek
Anna Rogowska
Tadeusz Rut
Janusz Sidło
Kamila Skolimowska
Tadeusz Ślusarski
Barbara Sobotta
Irena Szewińska
Józef Szmidt
Jadwiga Wajs
Stanisława Walasiewicz
Sebastian Wenta
Jan Werner
Joanna Wiśniewska
Anita Włodarczyk
Urszula Włodarczyk
Paweł Wojciechowski
Marian Woronin
Jacek Wszoła
Krystyna Zabawska
Andrzej Zieliński
Kazimierz Zimny
Szymon Ziółkowski
Krzysztof Zwoliński
Badminton
Robert Mateusiak
Nadieżda Zięba
Basketball
Aleksander Balcerowski
Agnieszka Bibrzycka
Aaron Cel
Margo Dydek
Aleksander Dziewa
Jacob Eisner
Jakub Garbacz
Marcin Gortat
Michał Ignerski
Edward Jurkiewicz
Przemek Karnowski
Thomas Kelati
Eugeniusz Kijewski
Ewelina Kobryn
Łukasz Kolenda
Łukasz Koszarek
Maciej Lampe
Mieczysław Łopatka
Dominik Olejniczak
Andrzej Pluta
Mateusz Ponitka
A. J. Slaughter
Jeremy Sochan
Michał Sokołowski
Szymon Szewczyk
Krzysztof Szubarga
Cezary Trybański
Adam Waczyński
Adam Wójcik
Beach volleyball
Monika Brzostek
Grzegorz Fijałek
Kinga Kołosińska
Mariusz Prudel
Biathlon
Magdalena Gwizdoń
Monika Hojnisz
Zofia Kiełpińska
Stanisław Łukaszczyk
Helena Mikołajczyk
Weronika Nowakowska-Ziemniak
Krystyna Guzik
Andrzej Rapacz
Józef Rubiś
Tomasz Sikora
Józef Sobczak
Anna Stera-Kustusz
Stanisław Szczepaniak
Bobsleigh
Dawid Kupczyk
Paweł Mróz
Marcin Niewiara
Michał Zblewski
Boxing
Kazimierz Adach
Tomasz Adamek
Jerzy Adamski
Aleksy Antkiewicz
Wojciech Bartnik
Brunon Bendig
Leszek Błażyński
Zygmunt Chychła
Stanisław Dragan
Leszek Drogosz
Jan Dydak
Krzysztof Głowacki
Andrzej Gołota
Janusz Gortat
Józef Grudzień
Józef Grzesiak
Marian Kasprzyk
Leszek Kosedowski
Krzysztof Kosedowski
Jerzy Kulej
Dariusz Michalczewski
Karolina Michalczuk
Henryk Niedźwiedzki
Artur Olech
Kazimierz Paździor
Henryk Petrich
Zbigniew Pietrzykowski
Grzegorz Proksa
Wiesław Rudkowski
Jerzy Rybicki
Grzegorz Skrzecz
Paweł Skrzecz
|
https://en.wikipedia.org/wiki/Ticketron
|
Ticketron was a computerized event ticketing company that was in operation from the 1960s until 1990. It was the industry leader until overtaken by Ticketmaster. In 1990, the majority of Ticketron's assets and business were sold and the following year they were sold on to rival Ticketmaster.
History
The original Ticketron was based in Fort Lee, New Jersey and its president was Clayton B Hulsh. Ticketron unsuccessfully trialled its computerized ticketing system in summer 1967 and folded later that year. The name was bought by a rival, Ticket Reservations Systems, Inc (TRS) and became the name of the service run by TRS in July 1969.
Ticket Reservations Systems, Inc had been incorporated on May 4, 1965 and was based in New York. It was funded by Cemp Investments headed by Edgar Bronfman Sr. It hired Jack Quinn who became president and the company started selling tickets in May 1967 from six Alexander's stores in New York and New Jersey using a duplexed Control Data Corporation 1700 computer system with terminal equipment supplied by Computer Applications, Inc. that it called "electronic box offices". TRS initially charged 25 cents to the customer and 25 cents to the event but returned 12.5 cents to the house. It moved to a 10% charge in 1970. The terminals expanded to other publicly accessible locations, such as banks and department stores.
The original software resided on a pair (one for backup) of CDC 1700 computers located on the first floor of the Beverly Hilton Hotel with a large window facing Wilshire Blvd. The system had back-up power generators in the basement to help ensure un-interruptible service. The system was designed to ensure that a given 'seat' at an event could not be sold more than once.
In 1969, 51% of TRS was sold to Control Data for $3.9 million with Edgar Bronfman Sr. and his family retaining 25%. Former ABC television president, Thomas W. Moore became chairman of TRS.
Another competitor, Computicket, owned by Computer Sciences Corporation, folded in April 1970 leaving Ticketron as the sole computerized ticketing provider in the US. In 1973, Control Data bought out Cemp Investments. In 1979, Ticketron starting selling tickets by phone.
In addition to the better-known event ticketing system, Ticketron also provided ticketing terminals and back-end infrastructure for parimutuel betting, and provided similar services for a number of US lotteries, including those in New York, Illinois, Pennsylvania, Delaware, Washington and Maryland.
By the mid 1980s, Ticketron had 600 outlets in 22 US states and Canada. By 1990, Ticketron had 750 outlets and had a 40% market share, behind Ticketmaster with 50% of the market. In 1990 the majority of Ticketron's assets and business, with the exception of a small antitrust carve-out for Broadway's "Telecharge" business-unit, were bought by The Carlyle Group who sold it the following year to rival Ticketmaster, which had been founded in 1976.
The Ticketron name was revived in 2017 after Tick
|
https://en.wikipedia.org/wiki/Ioctl
|
In computing, ioctl (an abbreviation of input/output control) is a system call for device-specific input/output operations and other operations which cannot be expressed by regular system calls. It takes a parameter specifying a request code; the effect of a call depends completely on the request code. Request codes are often device-specific. For instance, a CD-ROM device driver which can instruct a physical device to eject a disc would provide an ioctl request code to do so. Device-independent request codes are sometimes used to give userspace access to kernel functions which are only used by core system software or still under development.
The ioctl system call first appeared in Version 7 of Unix under that name. It is supported by most Unix and Unix-like systems, including Linux and macOS, though the available request codes differ from system to system. Microsoft Windows provides a similar function, named "DeviceIoControl", in its Win32 API.
Background
Conventional operating systems can be divided into two layers, userspace and the kernel. Application code such as a text editor resides in userspace, while the underlying facilities of the operating system, such as the network stack, reside in the kernel. Kernel code handles sensitive resources and implements the security and reliability barriers between applications; for this reason, user mode applications are prevented by the operating system from directly accessing kernel resources.
Userspace applications typically make requests to the kernel by means of system calls, whose code lies in the kernel layer. A system call usually takes the form of a "system call vector", in which the desired system call is indicated with an index number. For instance, exit() might be system call number 1, and write() number 4. The system call vector is then used to find the desired kernel function for the request. In this way, conventional operating systems typically provide several hundred system calls to the userspace.
Though an expedient design for accessing standard kernel facilities, system calls are sometimes inappropriate for accessing non-standard hardware peripherals. By necessity, most hardware peripherals (aka devices) are directly addressable only within the kernel. But user code may need to communicate directly with devices; for instance, an administrator might configure the media type on an Ethernet interface. Modern operating systems support diverse devices, many of which offer a large collection of facilities. Some of these facilities may not be foreseen by the kernel designer, and as a consequence it is difficult for a kernel to provide system calls for using the devices.
To solve this problem, the kernel is designed to be extensible, and may accept an extra module called a device driver which runs in kernel space and can directly address the device. An ioctl interface is a single system call by which userspace may communicate with device drivers. Requests on a device driver are vectored w
|
https://en.wikipedia.org/wiki/Bogot%C3%A1%27s%20Bike%20Paths%20Network
|
Bogotá is the Americas city with the most extensive and comprehensive network of bike paths with a total of 564 kilometers at year 2022. Bogotá’s bike paths network or Ciclorrutas de Bogotá in Spanish, designed and built and is also one of the most extensive in the world.
The design of the network was made taking into consideration the morphology and topography of the city. This is, from north to south the city has a flat topography and from east to west the city has varying degrees of inclination.
A mesh concept was applied for the theoretical plan of the network because it presented greater versatility and adaptation given that the road network was designed as a grid plan with streets going from south to north and from east to west.
The network was also integrated with the TransMilenio bus system which has bicycle parking facilities.
Network hierarchy
A network hierarchy was determined following the criteria above.
Main Network: connects the main centres of the city in a direct and expeditious manner, for instance connecting the main work and education centers with the most populated residential areas, and receiving the flow from secondary networks.
Secondary Network: leads riders to the main network, it connects housing centers and attraction centres and parks with the main network.
Complementary Network: links and provides continuity to the network. It consists of additional bike paths that are required to complete the mesh system and to distribute bicycle traffic on specific areas. It includes a recreational network, local networks and a system of long green areas.
Bike paths' impact on city life
Since the construction of the bike paths, bicycle use has quintupled in the city. There were 635,431 trips made daily in Bogotá by bicycle in 2015, corresponding to a modal share of 4.28%. A large portion of this use is in southern, poorer areas.
The bike paths are an ongoing project. Many segments are still not connected to the main network. In some parts, they are placed on the sidewalk in a way that puts pedestrians and cyclists in competition.
Routes
Year 2016
Year 2022
Bogotá currently has more than 600 kilometers of bike paths and various projects under construction and design to expand this network, such as "CicloAlameda Medio Milenio", "Corredor Verde de la 7ma" and "Transmilenio Avenida 68".
See also
Segregated cycle facilities
Ciclovía
World Carfree Network
References
Cycleways in Colombia
Transport in Bogotá
|
https://en.wikipedia.org/wiki/XBase%2B%2B
|
Xbase++ is an object oriented programming language which has multiple inheritance and polymorphism. It is based on the XBase language dialect and conventions.
It is 100% Clipper compatible language supporting multiple inheritance, polymorphism, object oriented programming. It supports the xBase data types, including Codeblocks. With Xbase++ it is possible to generate applications for Windows NT, 95, 98, Me, 2000, XP, VISTA and Windows 7, 8, 10.
Xbase++ offers complete integration of all common Windows forms, which are encapsulated as objects within the program code. All object-oriented approaches are supported in Xbase++ (e.g. single and multiple inheritance, abstract classes, abstract methods).
Using a so-called web application adapter, it is possible to support business processes via the Internet and to access dBASE databases directly via the Internet. The result can then be conveniently displayed in any browser or even in your own program interface via ActiveX components. With version 2.0, the web front end was expanded to include the Compiled Xbase Pages class (), with which the usual Xbase++ logic, embedded in HTML code for the user interface, can continue to be used. These pages can then be accessed from a web server using any browser; only the created program DLL must be on a Windows server.
In addition to the command line commands, Alaska provides licensees with the free Visual Xbase++ tool for development up to and including version 1.9 SL1. As of version 2.0, the IDE is made available as the central development environment under the name Workbench.
Clipper Support
Xbase++ supports the old commands @SAY/GET to define data entry forms as well as a graphic editor to create data entry forms similar to Visual FoxPro. It also has a visual development environment, support for OEM files (DOS format) and ANSI (Windows), an integrated debugger and a resource compiler to add icons and graphics to the application. It can generate EXE or DLL files.
RDD
Xbase++ supports the Replaceable Database Drivers (RDD, which provide access to multiple database formats) of Clipper through the DatabaseEngines (DBEs). The basic package includes support for DBF, FOX, NTX, CDX, SDF and DEL(delimited). It also supports CORBA 2.0, based on IBM SOM, Visual FoxPro 3.0 to 5.0 database formats, and access to SQL servers.
Birth
Xbase++ was born after the decision of Computer Associates to abandon Clipper to develop Visual Objects. The failure of Visual Objects as Clipper substitute empowered the creation of third party libraries and the creation of Clipper syntax compilers.
Source code example
#include "class.ch"
//
// This program prints:
//
// Missy Meow!
// Mr. Bojangles Meow!
// Lassie Bark!
// Press any key to continue...
//
/////////////////////////////
//
PROCEDURE Main()
//
/////////////////////////////
LOCAL aAnimals := Array(3)
LOCAL i
aAnimals[1] := Cat():New("Missy")
aAnimals[2] := Cat():New("Mr. Bojangles")
aAnimals[3] := Dog()
|
https://en.wikipedia.org/wiki/Odious%20number
|
In number theory, an odious number is a positive integer that has an odd number of 1s in its binary expansion. Non-negative integers that are not odious are called evil numbers.
In computer science, an odious number is said to have odd parity.
Examples
The first odious numbers are:
Properties
If denotes the th odious number (with ), then for all , .
Every positive integer has an odious multiple that is at most . The numbers for which this bound is tight are exactly the Mersenne numbers with even exponents, the numbers of the form , such as 3, 15, 63, etc. For these numbers, the smallest odious multiple is exactly .
Related sequences
The odious numbers give the positions of the nonzero values in the Thue–Morse sequence. Every power of two is odious, because its binary expansion has only one nonzero bit. Except for 3, every Mersenne prime is odious, because its binary expansion consists of an odd prime number of consecutive nonzero bits.
Non-negative integers that are not odious are called evil numbers. The partition of the non-negative integers into the odious and evil numbers is the unique partition of these numbers into two sets that have equal multisets of pairwise sums.
References
External links
Integer sequences
|
https://en.wikipedia.org/wiki/Collaboration%20Data%20Objects
|
Collaboration Data Objects (CDO), previously known as OLE Messaging or Active Messaging, is an application programming interface included with Microsoft Windows and Microsoft Exchange Server products. The library allows developers to access the Global Address List and other server objects, in addition to the contents of mailboxes and public folders.
Overview
CDO is a technology for building messaging or collaboration applications. CDO can be used separately or in connection with Outlook Object Model to gain more access over Outlook. CDO is not a part of Outlook Object Model and it doesn't provide any event-based functionality, nor can Outlook objects be manipulated using CDO.
Starting with Exchange 2007, neither the Messaging API (MAPI) client libraries nor CDO 1.2.1 are provided as a part of the base product installation. They are available as downloads.
Versions
CDONTS: available on Windows NT 4.0 by installing the Option Pack, or Exchange Server.
CDOSYS: available on Windows 2000 and onwards by installing the SMTP service in Internet Information Server (IIS).
See also
Collaboration Data Objects for Windows NT Server
MAPI
ActiveX
References
External links
j-XChange - Pure and Open Source (LGPL v3) Java implementation of the Collaboration Data Objects (CDO 1.21) for accessing Microsoft Exchange Server in a platform independent manner.
Overview of CDO - Overview of CDO at MSDN
CDOSYS protocol
Downloads
ExchangeMapiCdo.EXE download
ExchangeCdo.MSI download
Microsoft application programming interfaces
Email
|
https://en.wikipedia.org/wiki/The%20Graham%20Kennedy%20Show
|
The Graham Kennedy Show was an Australian variety and comedy tonight show which debuted on 19 September 1972 on the Nine Network.
On 23 December 1969, host Graham Kennedy quit as host of In Melbourne Tonight (IMT) due to exhaustion and rested for two years. In spite of his fame and fortune, he later described that period as "years of misery".
After specials on 15 November 1971 and 2 March 1972, he returned with this series produced by Bob Phillips and Peter Faiman. The concept, regular cast and crew were mainly recycled from the IMT days, with Brian Rangott leading the GTV band for live musical performances. As the series began pushing more permissive humor boundaries from 1973, it received a suitable for Adults Only (AO) superimposed viewer guidance at the beginning.
Kennedy sparked controversy after a "crow-call", which sounded like the word "fuck", was broadcast in March 1975. Forced to prerecord from that point on, he abruptly departed following GTV-9 management's censorship of the 16 April 1975 edition.
Episodes from March 1975 were transmitted in "living colour from Television City Melbourne" according to the opening and closing voiceovers. Following Kennedy's resignation, the final two April shows were hosted by Noel Ferrier and Daryl Somers.
Crow call incident
On the show of 3 March 1975 (his first seen in color), Kennedy imitated a crow, saying "faaaaaaark", during a live read of a Cedel hairspray advertisement by announcer Rosemary Margan. Kennedy later claimed the Adelaide network station immediately cut the live feed of that show. The Nine Network reportedly received hundreds of complaints, followed by a rash of newspaper headlines the next day. This led the Australian Broadcasting Control Board to request that Kennedy "show cause" why he should not be removed from the airwaves. Kennedy replied that he could not show cause, suggesting that the Board take action to limit his appearances, while hinting at legal action should they do so. Rather than removing him, the ABCB banned Kennedy from appearing live, forcing him to pre-record the show on videotape.
In 2002, in The Age newspaper, writer Jonathan Green reported that the crow call segment was in fact pretaped and that the controversy was probably just a pretext for other issues. Rival Nine personality Ernie Sigley, who presented his own variety show on different nights to Kennedy, has claimed the real reason Kennedy was axed was that his ratings were so poor compared to Sigley's.
According to Age reporter Suzanne Carbone, the first known use of the expletive on Australian TV was in the 1960s, when Nine Adelaide evening news presenter Kevin Crease said "fucking hell" during a mishap in a live advertisement on variety show Adelaide Tonight. Crease told The Age that "The audience fell off their chairs laughing" and that he was amazed no complaints were received and that although he feared he would be sacked, nothing happened.
During the February 1973 Logie Awards, American acto
|
https://en.wikipedia.org/wiki/General%20Instrument%20AY-3-8910
|
The AY-3-8910 is a 3-voice programmable sound generator (PSG) designed by General Instrument in 1978, initially for use with their 16-bit CP1610 or one of the PIC1650 series of 8-bit microcomputers. The AY-3-8910 and its variants were used in many arcade games—Konami's Gyruss contains five—and pinball machines as well as being the sound chip in the Intellivision and Vectrex video game consoles, and the Amstrad CPC, Oric-1, Colour Genie, Elektor TV Games Computer, MSX, and later ZX Spectrum home computers. It was also used in the Mockingboard and Cricket sound cards for the Apple II and the Speech/Sound Cartridge for the TRS-80 Color Computer.
After General Instrument's spinoff of Microchip Technology in 1987, the chip was sold for a few years under the Microchip brand. It was also manufactured under license by Yamaha (with a selectable clock divider pin and a double-resolution and double-rate volume envelope table) as the YM2149F; the Atari ST uses this version. It produces very similar results to the Texas Instruments SN76489 and was on the market for a similar period.
The chips are no longer made, but functionally-identical clones are still in active production. An unofficial VHDL description is freely available for use with FPGAs.
Description
The AY-3-8910 was essentially a state machine, with the state being set up in a series of sixteen 8-bit registers. These were programmed over an 8-bit bus that was used both for addressing and data by toggling one of the external pins. For instance, a typical setup cycle would put the bus into "address mode" to select a register, and then switch to "data mode" to set the contents of that register. This bus was implemented natively on GI's own CPUs, but it had to be recreated in glue logic or with the help of an additional interface adapter such as the MOS Technology 6522 when the chip was used with the much more common MOS Technology 6502 or Zilog Z80 CPUs.
Six registers controlled the pitches produced in the three primary channels. The wavelength to generate was held in two eight-bit registers dedicated to each channel, but the value was limited to 12-bits for other reasons, for a total of 4095 (the register value is used as the frequency divider and 0 is treated as 1) different pitches. Another register controlled the period of a pseudo-random noise generator (a total of 31 different cycle times), while another controlled the mixing of this noise into the three primary channels.
Three additional registers controlled the volume of the channels, as well as turning on or off the optional envelope controls on them. Finally the last three registers controlled the times of the envelope controller, by setting the envelope type and envelope cycle time. A total of eight envelope types include sawtooth shape or triangle shape, starting on either maximum or minimum. The shape can also be set to repeat for a cycling effect. A total of 65535 different cycle times can be set. As there was only one envelope sha
|
https://en.wikipedia.org/wiki/The%20Surgeon
|
The Surgeon is a 2005 Australian television medical drama. It screened at 9:30pm on Thursdays on Network Ten and in Ireland early morning on RTÉ One. The show was based at a fictional hospital named Sydney General Hospital.
The first season consisted of eight half-hour episodes. The show was nominated for two Logie Awards (Most Outstanding Drama Series & Most Outstanding Actress) as well as two AACTAs (Best Lead Actress in a Television Drama and Best Telefeature or Mini Series).
Cast
Justine Clarke as Dr. Eve Agius
Sam Worthington as Dr. Sam Dash
Nicholas Bell as Dr. Julian Sierson
Christopher Morris as Dr. Abe Morris
Katie Wall as Siobhan Kerry
Matthew Newton as Dr. Nick Steele
Matthew Zeremes as Dr. Lachie Hatsatouris
Khalid Malik as Dr. Rob Singh
Chum Ehelepola as Dr. Ravi Jayawardener
Episodes
(Episode information retrieved from Australian Television Information Archive).
Credits theme
"Kid You're A Dreamer" by Perth band The Panics from their first album A House on a Street in a Town I'm From was used as the opening credits theme music for the series.
References
External links
The Surgeon at the National Film and Sound Archive
2005 Australian television series debuts
2005 Australian television series endings
Australian medical television series
Network 10 original programming
Television series by Endemol Australia
Television shows set in New South Wales
|
https://en.wikipedia.org/wiki/Digital%20soil%20mapping
|
Digital soil mapping (DSM) in soil science, also referred to as predictive soil mapping or pedometric mapping, is the computer-assisted production of digital maps of soil types and soil properties. Soil mapping, in general, involves the creation and population of spatial soil information by the use of field and laboratory observational methods coupled with spatial and non-spatial soil inference systems.
The international Working Group on Digital Soil Mapping (WG-DSM) defines digital soil mapping as "the creation and the population of a geographically referenced soil databases generated at a given resolution by using field and laboratory observation methods coupled with environmental data through quantitative relationships."
Ambiguities
DSM can rely upon, but is considered to be distinct from traditional soil mapping, which involves manual delineation of soil boundaries by field soil scientists. Non-digital soil maps produced as result of manual delineation of soil mapping units may also be digitized or surveyors may draw boundaries using field computers, hence both traditional, knowledge-based and technology and data-driven soil mapping frameworks are in essence digital. Unlike traditional soil mapping, digital soil mapping is, however, considered to make an extensive use of:
technological advances, including GPS receivers, field scanners, and remote sensing, and
computational advances, including geostatistical interpolation and inference algorithms, GIS, digital elevation model, and data mining
In digital soil mapping, semi-automated techniques and technologies are used to acquire, process and visualize information on soils and auxiliary information, so that the end result can be obtained at cheaper costs. Products of the data-driven or statistical soil mapping are commonly assessed for the accuracy and uncertainty and can be more easily updated when new information comes available.
Digital soil mapping tries to overcome some of the drawbacks of the traditional soil maps that are often only focused on delineating soil-classes i.e. soil types. Such traditional soil maps:
do not provide information for modeling the dynamics of soil conditions and
are inflexible to quantitative studies on the functionality of soils.
An example of successful digital soil mapping application is the physical properties (soil texture, bulk density) developed in the European Union with around 20,000 topsoil samples of LUCAS database.
Scorpan
Scorpan is a mnemonic for an empirical quantitative descriptions of relationships between soil and environmental factors with a view to using these as soil spatial prediction functions for the purpose of Digital soil mapping. It is an adaptation of Hans Jenny's five factors not for explanation of soil formation, but for empirical descriptions of relationships between soil and other spatially referenced factors.
S = f(s,c,o,r,p,a,n), where
S = soil classes or attributes (to be modeled)
f = function
s = soil, other or
|
https://en.wikipedia.org/wiki/Packet%20loss
|
Packet loss occurs when one or more packets of data travelling across a computer network fail to reach their destination. Packet loss is either caused by errors in data transmission, typically across wireless networks, or network congestion. Packet loss is measured as a percentage of packets lost with respect to packets sent.
The Transmission Control Protocol (TCP) detects packet loss and performs retransmissions to ensure reliable messaging. Packet loss in a TCP connection is also used to avoid congestion and thus produces an intentionally reduced throughput for the connection.
In real-time applications like streaming media or online games, packet loss can affect a user's quality of experience (QoE).
Causes
The Internet Protocol (IP) is designed according to the end-to-end principle as a best-effort delivery service, with the intention of keeping the logic routers must implement, as simple as possible. If the network made reliable delivery guarantees on its own, that would require store and forward infrastructure, where each router devotes a significant amount of storage space to packets while it waits to verify that the next node properly received them. A reliable network would not be able to maintain its delivery guarantees in the event of a router failure. Reliability is also not needed for all applications. For example, with live streaming media, it is more important to deliver recent packets quickly than to ensure that stale packets are eventually delivered. An application or user may also decide to retry an operation that is taking a long time, in which case another set of packets will be added to the burden of delivering the original set. Such a network might also need a command and control protocol for congestion management, adding even more complexity.
To avoid all of these problems, the Internet Protocol allows for routers to simply drop packets if the router or a network segment is too busy to deliver the data in a timely fashion. This is not ideal for speedy and efficient transmission of data, and is not expected to happen in an uncongested network. Dropping of packets acts as an implicit signal that the network is congested, and may cause senders to reduce the amount of bandwidth consumed, or attempt to find another path. For example, using perceived packet loss as feedback to discover congestion, the Transmission Control Protocol (TCP) is designed so that excessive packet loss will cause the sender to throttle back and stop flooding the bottleneck point with data.
Packets may also be dropped if the IPv4 header checksum or the Ethernet frame check sequence indicates the packet has been corrupted. Packet loss can also be caused by a packet drop attack.
Wireless networks
Wireless networks are susceptible to a number of factors that can corrupt or lose packets in transit, such as radio frequency interference (RFI), radio signals that are too weak due to distance or multi-path fading, faulty networking hardware, or faulty networ
|
https://en.wikipedia.org/wiki/Solutions%20by%20stc
|
solutions by stc, formerly Qualitynet, is a data and Internet service provider operating in Kuwait. The company provides services to residential and business customers. Qualitynet was acquired by stc in 2019, and has been rebranded under the name "solutions by stc" as of 10 November 2020.
History
The company was established in 1998, after the Ministry of Communications made it possible for private companies to provide data communication services. Batelco and National Bank of Kuwait are shareholders. QualityNet achieved ISO 9001:2000 certification.
The company's backbone network is based on a fiber optic medium with a centralized ATM switch and access nodes to provide coverage in Kuwait. The access to the backbone network is primarily through Frame Relay, ADSL and ISDN networks. Teleglobe and EMIX are used for international connectivity.
References
Telecommunications companies established in 1998
Telecommunications companies of Kuwait
Kuwaiti companies established in 1998
|
https://en.wikipedia.org/wiki/Wings%20%281996%20video%20game%29
|
Wings is a freeware video game (originally shareware) created by Miika Virpioja. A 2D, DOS-based computer game with space ships that behave like lunar landers. The player can select one of 33 weapons, and the surroundings can be destroyed. The game includes multiplayer capabilities, either through linked PCs or two or more players using one keyboard plus gamepads/joysticks. In the original shareware version certain weapons were locked until the game was registered. The game includes a level editor.
The game featured a number of module files as soundtrack. One of them, "januski.s3m", was an original composition by Juha Lehtioksa, guitarist of the Finnish gothic metal band Silentium, and bears a very strong resemblance to the band's song Forever Sleep on the album Infinita Plango Vulnera, released in 1999. While the track had initially been used without permission and even credited to another person, Lehtioksa had nothing against using his song in the game—in fact, he even liked the idea of having the track on Wings's soundtrack—but after receiving a number of enquiries regarding the song over the years, some of them very hostile in nature, he finally asked Virpioja to remove it from the game.
References
External links
Wings official homepage
Wings 2 official homepage - Sequel to Wings, public 1.2 version released 10th of June 2007.
1996 video games
2006 video games
DOS games
DOS-only games
Video games developed in Finland
|
https://en.wikipedia.org/wiki/Toku%20%28TV%20network%29
|
Toku (stylized in all capital letters) is an American pay television network and streaming service owned by Olympusat and dedicated to broadcasting anime and East Asian programming.
It was launched on December 31, 2015, replacing Funimation Channel, after Funimation ended their partnership with Olympusat. Tristan Leostar is the content aggregator for the network.
History
As Funimation Channel
Funimation Channel started out as a syndicated block on Colours TV, one of OlympuSAT's affiliate networks. Programs during this era were Dragon Ball, Negima!, Kodocha, The Slayers, Blue Gender, Kiddy Grade, Fruits Basket, Case Closed and YuYu Hakusho. The block was later discontinued in favor of a more successful expansion on subscription television.
The Funimation Channel launched on September 29, 2005, as a joint venture between Funimation and Olympusat, it became the second 24-hour anime digital cable network in North America (the first being A.D. Vision's Anime Network). Olympusat was the exclusive distributor of the channel.
On May 1, 2008, Funimation Channel became a 24-hour English-dubbed anime subscription network; the second of its kind in North America (following A.D. Vision's Anime Network). Olympusat was chosen as the exclusive distributor of Funimation Channel. The service originally was available to a few cities via digital terrestrial television and was temporary-only as the channel was trying to gain a foothold in the already-crowded pay television landscape.
In May 2009, Funimation Channel continued its expansion on subscription providers launching on Comcast's VOD platform and offering two services - Free on demand and PPV on demand. The PPV VOD offers viewers a chance to watch titles prior to their DVD release.
As of September 27, 2010, Funimation launched an HD feed alongside existing VOD services. On February 16, 2012, Verizon announced that it will drop Funimation Channel from its Verizon FiOS service "on, or after March 15" due to "very low viewership". In response to reaction from its customers, Verizon returned Funimation Channel via VOD. Channel 262 remains on the FiOS system operated by Frontier Communications in some ex-Verizon territories. Cablevision's Optimum TV recently launched FUNimation Channel On Demand in the NY/NJ/CT Tri-State area. Adding this MSO increased FUNimation Channel's footprint to over 40 million households nationwide.
Funimation Channel's programming came from Funimation, Aniplex of America, Viz Media, Sentai Filmworks, Right Stuf Inc., NIS America, Discotek Media, and the now-defunct Central Park Media and Enoki Films USA.
As Toku
On December 8, 2015, it was reported that the channel would change its name to Toku on December 31, 2015, and would start broadcasting live-action, grindhouse and independent East Asian movies. It was subsequently announced, on December 15, 2015, that Funimation would end its partnership with Olympusat, and announced plans to relaunch Funimation Channel in 2016.
On Mar
|
https://en.wikipedia.org/wiki/The%20Interpublic%20Group%20of%20Companies
|
The Interpublic Group of Companies, Inc. (IPG) is an American publicly traded advertising company. The company consists of five major networks: FCB, IPG Mediabrands, McCann Worldgroup, MullenLowe Group, and Marketing Specialists, as well as several independent specialty agencies in the areas of public relations, sports marketing, talent representation, and healthcare. It is one of the "Big Four" agency companies, alongside WPP, Publicis and Omnicom. Phillippe Krakowsky became the company's CEO on January 1, 2021.
History
On October 2, 1930, IPG was founded in New York City as McCann-Erickson, when H.K. McCann Co. (founded in 1911) and Erickson Co. (founded in 1902) merged. At the time, it was the largest agency in the ad industry.
In 1960, McCann was restructured into four operating units, each reporting to a new holding company. The four units were McCann-Erickson Advertising (U.S.), McCann-Erickson Corp. (international), McCann-Marschalk, and Communications Affiliates. In January 1961, McCann was renamed Interpublic Group (IPG) and created the first marketing services management holding company with McCann-Erickson as a subsidiary.
In late 1973, as clients began focusing more on international strategies, McCann-Erickson combined its domestic and international branches into a single worldwide agency under IPG. In 1997, the McCann-Erickson World Group was formed with several of IPG's different units.
In December 2000, Deutsch Inc, reported by the New York Times at the time to be the largest and last big independent agency, was acquired by IPG to be an autonomous unit. In 2001, IPG acquired True North Communications, the holding company for Foote Cone & Belding.
In 2003, IPG agreed to pay $115 million to settle class action lawsuits brought by its shareholders. The shareholders had sued Interpublic after accounting irregularities led to restatements of financial results, causing the company's stock to fall.
In March 2004, IPG renamed its McCann-Erickson World Group as McCann Worldgroup.
On September 15, 2005, IPG announced plans to restate earnings for fiscal 2000 through 2004 due to problems in accounting for revenue, acquisitions, and lease expenses. On March 22, 2006, IPG posted a loss for the fourth quarter and restated results for the first three quarters of 2005, which reduced revenue by $14.1 million. It also announced its controller and chief accounting officer was leaving the company.
IPG disposed of 51 businesses in 2005 and 2006, primarily outside the U.S.; the company said it exited 23 "loss-making international affiliates" in 2006. IPG in April 2007 announced it agreed to buy Reprise Media, a search engine marketing firm. In July of that same year, FCB-Ulka Advertising Private Limited, a subsidiary of IPG, was renamed DRAFTFCB+Ulka Advertising Pvt. Ltd.
In July 2008, IPG formed a media buying and planning unit called Mediabrands (later IPG Mediabrands). In March 2014, IPG draftfcb was renamed as IPG's international network F
|
https://en.wikipedia.org/wiki/Yoker%20railway%20station
|
Yoker railway station serves the district of Yoker, Scotland.
The station is served by ScotRail as part of the SPT network, on the Argyle and
North Clyde Lines.
It is the nearest railway station to the Renfrew Ferry on the north side of the River Clyde.
The large Yoker Traction Maintenance Depot, which looks after the EMU fleet used on North Clyde suburban services, is a short distance to the east, towards . Yoker IECC is also nearby - this has controlled the signalling on the entire North Clyde network since established by British Rail in 1989.
Services
There is a basic weekdays and Saturday daytime service of 4 times every hour (every 15 minutes) in each direction, northbound to via Clydebank (two of which continue to ) and southbound to . From here alternate services run via Queen Street Low Level to via and via Central Low Level to via (2tph to each route - one Whifflet train continues to Motherwell). Services towards Dalmuir from the Argyle line, however, are from Cumbernauld (hourly) or (both trains per hour) via Hamilton.
After a timetable change in 2014, the Yoker line now receives 4tph all day on Mondays-Saturdays (previously the evening Argyle line services were cut back to Partick). The Sunday service runs between and alternately Motherwell via Whifflet and Larkhall.
See also
Yoker line
References
External links
Railway stations in West Dunbartonshire
Former North British Railway stations
Railway stations in Great Britain opened in 1882
Railway stations in Great Britain closed in 1917
Railway stations in Great Britain opened in 1919
SPT railway stations
Railway stations served by ScotRail
Clydebank
|
https://en.wikipedia.org/wiki/Joseph%20Halpern
|
Joseph Yehuda Halpern (born 1953) is an Israeli-American professor of computer science at Cornell University. Most of his research is on reasoning about knowledge and uncertainty.
Biography
Halpern graduated in 1975 from University of Toronto with a B.S. in mathematics. He went on to earn a Ph.D. in mathematics from Harvard University in 1981 under the supervision of Albert R. Meyer and Gerald Sacks. He has written three books, Actual Causality, Reasoning about Uncertainty, and Reasoning About Knowledge and is a winner of the 1997 Gödel Prize in theoretical computer science and the 2009 Dijkstra Prize in distributed computing.
From 1997 to 2003, he was editor-in-chief of the Journal of the ACM.
In 2002, he was inducted as a Fellow of the Association for Computing Machinery and in 2012 he was selected as an IEEE Fellow.
In 2011, he was awarded a Senior Fellowship of the Zukunftskolleg at the University of Konstanz.
In 2019, Halpern was elected a member of the National Academy of Engineering for methods of reasoning about knowledge, belief, and uncertainty and their applications to distributed computing and multiagent systems.
Halpern is also the administrator for the Computing Research Repository, the computer science branch of arXiv.org, and the moderator for the "general literature" and "other" subsections of the repository.
His students include Nir Friedman, Daphne Koller, and Yoram Moses.
References
External links
Joe Halpern's homepage
Google scholar profile
Cornell University faculty
Gödel Prize laureates
20th-century American Jews
Dijkstra Prize laureates
Fellows of the Association for the Advancement of Artificial Intelligence
Fellows of the Association for Computing Machinery
Fellow Members of the IEEE
American computer scientists
Researchers in distributed computing
University of Toronto alumni
Harvard University alumni
Artificial intelligence researchers
Living people
1953 births
IBM Research computer scientists
IBM employees
21st-century American Jews
|
https://en.wikipedia.org/wiki/Rhizome%20Navigation
|
Rhizome Navigation is a method of dynamically creating a navigation interface for data systems, such as websites and databases.
The navigation links presented to the user are not predefined, they are generated in response to user behavior, and analysis of other data.
The word rhizome is used as a metaphor, to compare the growth and structure of rhizome navigation interfaces with the complex organic growth and structure of rhizomes, underground plant stems that send out roots and shoots from their nodes.
Examples of use
A good example of rhizome navigation in use can be found in the program Enronic. In their investigation into the Enron scandal, the Federal Energy Regulatory Commission made a large portion of Enron's email database available to the public. Enronic analyzes these email messages to display the relationships between Enron employees, based on who emailed whom and how often. The program uses Prefuse, an open source Java library for creating visual representations of data.
Rhizome Navigation is an open source project which aims to provide useful text and graphical navigation aids to users of websites and databases, by analysing the navigation selections of previous users.
References
Wired: Science Puts Enron E-Mail to Use, 01.30.06
External links
Enronic
Enron email database
Rhizome Navigation Open Source Project
User interface techniques
Visualization (graphics)
Infographics
|
https://en.wikipedia.org/wiki/Ancestry.com
|
Ancestry.com LLC is an American genealogy company based in Lehi, Utah. The largest for-profit genealogy company in the world, it operates a network of genealogical, historical records, and related genetic genealogy websites.
In November 2018, the company was said to have provided access to approximately 10 billion historical records, to have 3 million paying subscribers, and to have sold 18 million DNA kits to customers. By 2022, this number had risen to 30 billion records according to the company. On December 4, 2020, The Blackstone Group acquired the company in a deal valued at $4.7 billion.
History
Ancestry
1990–1999
In 1990, Paul Brent Allen (not to be confused with Microsoft cofounder Paul Allen or the Allen Holdings CEO Paul Allen) and Dan Taggart, two Brigham Young University graduates, founded Infobases and began offering Latter-day Saints (LDS) publications on floppy disks. In 1988, Allen had worked at Folio Corporation, founded by his brother Curt and his brother-in-law Brad Pelo.
The service was initially to help members of the church to research their ancestors to support the church's practice of conducting baptisms for dead relatives/ancestors into the church.
Infobases' first products were floppy disks and compact disks sold from the back seat of the founders' car. In 1994, Infobases was named among Inc. magazine's 500 fastest-growing companies. Their first offering on CD was the LDS Collectors Edition, released in April 1995, selling for $299.95, which was offered in an online version in August 1995. Ancestry officially went online with the launch of Ancestry.com in 1996.
On January 1, 1997, Infobases' parent company, Western Standard Publishing, purchased Ancestry, Inc., publisher of Ancestry magazine and genealogy books. Western Standard Publishing's CEO was Joseph A. Cannon, one of the principal owners of Geneva Steel.
In July 1997, Allen and Taggart purchased Western Standard's interest in Ancestry, Inc. At the time, Brad Pelo was president and CEO of Infobases, and president of Western Standard. Less than six months earlier, he had been president of Folio Corporation, whose digital technology Infobases was using. In March 1997, Folio was sold to Open Market for $45 million. The first public evidence of the change in ownership of Ancestry magazine came with the July/August 1997 issue, which showed a newly reorganized Ancestry, Inc., as its publisher. That issue's masthead also included the first use of the Ancestry.com web address.
More growth for Infobases occurred in July 1997, when Ancestry, Inc. purchased Bookcraft, Inc., a publisher of books written by leaders and officers of the LDS Church. Infobases had published many of Bookcraft's books as part of its LDS Collector's Library. Pelo also announced that Ancestry's product line would be greatly expanded in both CDs and online. Alan Ashton, a longtime investor in Infobases and founder of WordPerfect, was its chairman of the board.
Allen and Taggart began running A
|
https://en.wikipedia.org/wiki/MacWorks%20XL
|
MacWorks XL was an Apple Lisa computer program which shipped with the Macintosh XL. It allowed 64K Apple Macintosh ROM emulation so the Macintosh XL could run classic Mac OS programs.
History
Soon after the debut of the Macintosh, which sold over 50,000 units in the first 100 days compared to only a few thousand Lisas during its entire first year, it became clear to Apple that the Lisa (then Lisa 2/10) would benefit from the ability to run the Macintosh system software as well as reduce the development platform resources required to maintain two separate operating systems.
In April 1984, Apple introduced MacWorks v1.0 for the Lisa. Essentially it allowed the Lisa to run a Macintosh environment from a floppy disk, but did not support a hard disk environment. By the fall, Apple had introduced versions 2.0 & 3.0 which allowed MacWorks to run from the Lisa's internal Widget or attached ProFile hard disk. With the introduction of the re-branded Macintosh XL in January 1985, MacWorks was likewise renamed for the release.
Features
MacWorks XL shipped on two diskettes. The first booted the Lisa into the Mac OS bootloader. When that process completed, the system displayed an entirely white screen, ejected the first disk, and displayed the usual blinking question mark (with a Macintosh XL graphic below it) to indicate that a boot volume (the second disk) was needed. With this disk, titled the "MacWorks XL System Disk", the Lisa would boot Macintosh System 5.
When the Lisa was discontinued, Sun Remarketing continued development of the MacWorks environment under license up to the release of MacWorks Plus 1.1 (which supports System Software 6). Dafax Processing Corp. with the assistance of Query Engineering, Inc. then further developed the environment to MacWorks Plus II which will support up to System 7.5 along with all other late model Motorola 68000-based Macs.
Timeline of Macintosh operating systems
References
External links
Lisa Emulator supports MacWorks
Apple Inc. software
|
https://en.wikipedia.org/wiki/Term%20indexing
|
In computer science, a term index is a data structure to facilitate fast lookup of terms and clauses in a logic program, deductive database, or automated theorem prover.
Overview
Many operations in automatic theorem provers require search in huge collections of terms and clauses. Such operations typically fall into the following scheme. Given a collection of terms (clauses) and a query term (clause) , find in some/all terms related to according to a certain retrieval condition. Most interesting retrieval conditions are formulated as existence of a substitution that relates in a special way the query and the retrieved objects . Here is a list of retrieval conditions frequently used in provers:
term is unifiable with term , i.e., there exists a substitution , such that =
term is an instance of , i.e., there exists a substitution , such that =
term is a generalisation of , i.e., there exists a substitution , such that =
clause subsumes clause , i.e., there exists a substitution , such that is a subset/submultiset of
clause is subsumed by , i.e., there exists a substitution , such that is a subset/submultiset of
More often than not, we are actually interested in finding the appropriate
substitutions explicitly, together with the retrieved terms ,
rather than just in establishing existence of such substitutions.
Very often the sizes of term sets to be searched are large,
the retrieval calls are frequent and the retrieval condition test
is rather complex. In such situations linear search in , when the retrieval
condition is tested on every term from , becomes prohibitively costly.
To overcome this problem, special data structures, called indexes, are
designed in order to support fast retrieval. Such data structures,
together with the accompanying algorithms for index maintenance
and retrieval, are called term indexing techniques.
Classic indexing techniques
discrimination trees
substitution trees
path indexing
Substitution trees outperform path indexing, discrimination tree indexing, and abstraction trees.
A discrimination tree term index stores its information in a trie data structure.
Indexing techniques used in logic programming
First-argument indexing is the most common strategy where the first argument is used as index. It distinguishes atomic values and the principal functor of compound terms.
Nonfirst argument indexing is a variation of first-argument indexing that uses the same or similar techniques as first-argument indexing on one or more alternative arguments. For instance, if a predicate call uses variables for the first argument, the system may choose to use the second argument as the index instead.
Multiargument indexing creates a combined index over multiple instantiated arguments if there is not a sufficiently selective single argument index.
Deep indexing is used when multiple clauses use the same principal functor for some argument. It recursively uses the same or similar indexing techn
|
https://en.wikipedia.org/wiki/Bart%27s%20Dog%20Gets%20an%20%22F%22
|
"Bart's Dog Gets an 'F" is the sixteenth episode of the second season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on March 7, 1991. In the episode, the Simpson family's dog, Santa's Little Helper, infuriates Homer and Marge by destroying a family heirloom and an expensive pair of shoes. When Marge and Homer want to get rid of the dog, Bart enrolls him at an obedience school to curb his bad behavior.
The episode was written by Jon Vitti and directed by Jim Reardon. Tracey Ullman guest starred as Emily Winthrop, the obedience school instructor; she also voiced Sylvia Winfield, the Simpsons' neighbor. The animal noises for the episode were performed by Frank Welker. "Bart's Dog Gets an 'F features cultural references to films such as Predator, Jaws, E.T. the Extra-Terrestrial, and National Lampoon's Animal House.
Since airing, the episode has received mostly positive reviews from television critics. It acquired a Nielsen rating of 13.8 and was the highest-rated show on Fox the week it aired.
Plot
Lisa is home from school with the mumps, so Marge teaches her to sew. While Homer is at the mall buying magazines for Lisa, he splurges on a $125 pair of Assassins athletic shoes after seeing Ned sporting them. Santa's Little Helper promptly destroys Homer's Assassins. Marge shows Lisa a patchwork quilt, a family heirloom, which Santa's Little Helper chews apart. When Homer and Marge want to rid themselves of the dog, Bart and Lisa promise to train him, so they may keep him.
Santa's Little Helper attends an obedience school run by Emily Winthrop, an English woman. After seeing how misbehaved the dog is, she sternly suggests Bart use a choke chain to correct his behavior. Since Bart is reluctant to use firm discipline to train him, the dog fails to master basic commands like sitting and heeling. Emily grows more exasperated with Bart and his dog at each class.
Thinking it will be their last time together, Bart plays with Santa's Little Helper the night before the final exam. The dog is finally able to understand Bart's commands and passes obedience school, to Homer's chagrin. Lisa marks the occasion by starting a new quilt to replace the one the dog destroyed.
Production
The episode was written by Jon Vitti and directed by Jim Reardon. Tracey Ullman guest starred as Emily Winthrop, the instructor at the obedience school, a parody of Margaret Thatcher in her mannerisms. The Simpsons began as a series of one-minute shorts that aired on Ullman's variety show, The Tracey Ullman Show, for three seasons during 1987–89. Due to the success of the shorts, the characters spun off into their own half-hour prime-time show on the Fox network named The Simpsons. Matt Groening, the series' creator, wanted Ullman to make a guest appearance in one of the shorts, but was told that she was too busy with the rest of The Tracey Ullman Show. When her show was canceled in 1990, Ullman agreed to do a gu
|
https://en.wikipedia.org/wiki/Sam%20Lantinga
|
Sam Oscar Lantinga is a computer programmer. He used to be the lead software engineer at Blizzard Entertainment, where he was known to the community as Slouken. He is best known as the creator of the Simple DirectMedia Layer, a very popular open source multimedia programming library, and also developed the compatibility database for Executor, a proprietary Mac OS emulator.
He was the lead programmer and a co-founder of the now-defunct Loki Software, which ported several game titles to Linux. A Linux client of World of Warcraft was developed, and negotiations with Linux Game Publishing were under way until Blizzard cancelled the project. It is unknown if Lantinga was involved with this port.
He also founded Galaxy Gameworks in 2008 to help commercially support the Simple DirectMedia Layer. He left Blizzard Entertainment to "relax, spend time with family, and explore some ideas to expand the Galaxy Gameworks business." Soon after he launched a new website for Gameworks including an extensive list of developer testimonials. Lantinga went on to work for 38 Studios, which shut down in May 2012. Lantinga is currently employed at Valve.
Games credited
The following is a list of game products Lantinga either developed on or was involved in porting.
Blizzard Entertainment
Hearthstone
World of Warcraft
Warcraft III: Reign of Chaos
Loki Software
Kohan: Immortal Sovereigns
Tribes 2
MindRover
Sid Meier's Alpha Centauri
Rune
Rune: Halls of Valhalla
Heavy Gear II
Heretic II
Heroes of Might and Magic III
Railroad Tycoon II
Civilization: Call To Power
Ambrosia Software
Maelstrom
References
External links
Sam Lantinga's Homepage (archived 2008-05-22)
Homepage for SDL, Sam's cross-platform open source game library
Sam Lantinga at Wowpedia
Sam Lantinga Slings Some Answers (2001 interview)
The Sam Lantinga interview - November 11th, 1999 (Linux.com)
Living people
Video game programmers
Free software programmers
Linux game porters
Blizzard Entertainment people
Valve Corporation people
University of California, Davis alumni
Year of birth missing (living people)
|
https://en.wikipedia.org/wiki/Liberal%20Network%20for%20Latin%20America
|
The Liberal Network for Latin America (), (), abbreviated to RELIAL, is a network of 33 liberal institutions from 15 Latin American countries. Members of RELIAL include political parties as well as think tanks, foundations and research institutes. RELIAL is the regional organization of the Liberal International.
It was founded in 2003 with the official launch taking place in Costa Rica November, 2004.
Members
Full Members
Associate Members
References
External links
Hispanic American Liberal Conference CLH official site
International liberal organizations
|
https://en.wikipedia.org/wiki/Urban%20Assault
|
Urban Assault is a 3D combined first-person shooter and real-time strategy computer game developed by the German company TerraTools and published by Microsoft in the year 1998.
It was the third strategy title that was directly published by Microsoft Game Studios. The player creates and commands groups of tanks and aircraft, and can also take direct control of one vehicle at a time. Over the course of the game one can acquire upgrades and new vehicles.
Gameplay
The player is in command of a futuristic host station with plasma energy technology, allowing the player to create units and buildings, as long as the blueprints and sufficient energy are available. The player also has access to various commander assets such as an overhead Map screen; where the player can monitor actions on the battlefield in the bigger picture and assess various strategic and tactical elements that's not covered by the fog of war, or Squadron Manager; which allows the player to easily check status and manage all units under control as well as set various parameters for each squadron to better suit their specializations. The Map and Squadron Manager windows are fully interactive and can be turned on/off at any time. Most importantly, these windows can be re-sized and re-positioned into anywhere on the screen, allowing players to accommodate their preferences.
The levels in Urban Assault consist of a full 3D polygonal landscape, which can be used strategically or tactically by the players or AI units to their advantages. For example, neutral buildings or structures can be used as a cover to block the enemy fire, while terrains and elevations offer a vertical depth of tactical elements. Many unit types (or even individual units) also possess varying advantages in different environments, allowing the player to carefully plan their unit compositions to effectively counter the enemy unit presences.
In the single-player campaign, the objective of each mission is to capture each key sector on the map, allowing use of the beam gate to transport the host station and any accompanying vehicles to the next field of battle. However, destroying enemy host stations provides additional space to the player's maximum room for accompanying vehicles. Combined with the fact that many key sectors are located deep in enemy territory or even right below an enemy faction's host station, the unstated goal of the game is to eliminate all enemy host stations. There is no strict need to eliminate the enemy to complete a level, but it does make the task more reliable. In multiplayer, beam gates are not present on the map and the only objective is to destroy opponents.
Urban Assault also has a completely cheat-free AI, which is bound to many same restrictions and rules as the players are. Just like the players, the AI players must peel back the fog of war by securing a line-of-sight with reconnaissance units or radar stations first in order to assess and gather information around the level before ma
|
https://en.wikipedia.org/wiki/Raised%20floor
|
A raised floor (also raised flooring, access floor(ing), or raised-access computer floor) provides an elevated structural floor above a solid substrate (often a concrete slab) to create a hidden void for the passage of mechanical and electrical services. Raised floors are widely used in modern office buildings, and in specialized areas such as command centers, Information technology data centers and computer rooms, where there is a requirement to route mechanical services and cables, wiring, and electrical supply. Such flooring can be installed at varying heights from to heights above to suit services that may be accommodated beneath. Additional structural support and lighting are often provided when a floor is raised enough for a person to crawl or even walk beneath.
In the U.S., underfloor air distribution is becoming a more common way to cool a building by using the void below the raised floor as a plenum chamber to distribute conditioned air, which has been done in Europe since the 1970s. In data centers, isolated air-conditioning zones are often associated with raised floors. Perforated tiles are traditionally placed beneath computer systems to direct conditioned air directly to them. In turn, the computing equipment is often designed to draw cooling air from below and exhaust into the room. An air conditioning unit then draws air from the room, cools it, and forces it beneath the raised floor, completing the cycle.
Above describes what has historically been perceived as raised floor and still serves the purpose for which it was originally designed. Decades later, an alternative approach to raised floor evolved to manage underfloor cable distribution for a wider range of applications where underfloor air distribution is not utilized. In 2009 a separate category of raised floor was established by Construction Specifications Institute (CSI) and Construction Specifications Canada (CSC) to separate the similar, but very different, approaches to raised flooring. In this case the term raised floor includes low-profile fixed-height access flooring. Offices, classrooms, conference rooms, retail spaces, museums, studios, and more, have the primary need to quickly and easily accommodate changes of technology and floor plan configurations. Underfloor air distribution is not included in this approach since a plenum chamber is not created. The low-profile fixed-height distinction reflects the system's height ranges from as low as ; and the floor panels are manufactured with integral support (not traditional pedestals and panels). Cabling channels are directly accessible under light-weight cover plates.
Design
The traditional type of floor consists of a gridded metal framework or substructure of adjustable-height supports (called "pedestals") that provide support for removable (liftable) floor panels, which are usually . The height of the legs/pedestals is dictated by the volume of cables and other services provided beneath, but typically arrang
|
https://en.wikipedia.org/wiki/Xubuntu
|
Xubuntu () is a Canonical Ltd.–recognized, community-maintained derivative of the Ubuntu operating system. The name Xubuntu is a portmanteau of Xfce and Ubuntu, as it uses the Xfce desktop environment, instead of Ubuntu's customized GNOME desktop.
Xubuntu seeks to provide "a light, stable and configurable desktop environment with conservative workflows" using Xfce components. Xubuntu is intended for both new and experienced Linux users. Rather than explicitly targeting low-powered machines, it attempts to provide "extra responsiveness and speed" on existing hardware.
History
Xubuntu was originally intended to be released at the same time as Ubuntu 5.10 Breezy Badger, 13 October 2005, but the work was not complete by that date. Instead the Xubuntu name was used for the xubuntu-desktop metapackage available through the Synaptic Package Manager which installed the Xfce desktop.
The first official Xubuntu release, led by Jani Monoses, appeared on 1 June 2006, as part of the Ubuntu 6.06 Dapper Drake line, which also included Kubuntu and Edubuntu.
Cody A.W. Somerville developed a comprehensive strategy for the Xubuntu project named the Xubuntu Strategy Document. This document was approved by the Ubuntu Community Council in 2008.
In February 2009 Mark Shuttleworth agreed that an official LXDE version of Ubuntu, Lubuntu, would be developed. The LXDE desktop uses the Openbox window manager and, like Xubuntu, is intended to be a low-system-requirement, low-RAM environment for netbooks, mobile devices and older PCs and will compete with Xubuntu in that niche.
In November 2009, Cody A.W. Somerville stepped down as the project leader and made a call for nominations to help find a successor. Lionel Le Folgoc was confirmed by the Xubuntu community as the new project leader on 10 January 2010 and requested the formation of an official Xubuntu council. , discussions regarding the future of Xubuntu's governance and the role a council might play in it were still ongoing.
In March 2012 Charlie Kravetz, a former Xubuntu project leader, formally resigned from the project. Despite this, the project members indicated that Xubuntu 12.04 would go ahead as scheduled.
In the beginning of 2016, the Xubuntu team began the process to transition the project to become council run rather than having a single project leader. On 1 January 2017, an official post on the Xubuntu site's blog announced the official formation of the Xubuntu Council. The purpose of the council is not just to make decisions about the future of the project, but to make sure the direction of the project adheres to guidelines established in the Strategy Document.
Performance
The Xfce desktop environment is intended to use fewer system resources than the default Ubuntu GNOME desktop. In September 2010, the Xubuntu developers claimed that the minimum RAM Xubuntu could be run on was 128 MB, with 256 MB of RAM strongly recommended at that time.
Testing conducted by Martyn Honeyford at IBM in January 20
|
https://en.wikipedia.org/wiki/Hyperion%20%28computer%29
|
The Hyperion is an early portable computer that vied with the Compaq Portable to be the first portable IBM PC compatible. It was marketed by Infotech Cie of Ottawa, a subsidiary of Bytec Management Corp., who acquired the designer and manufacturer Dynalogic Corporation, in January 1983. In 1984, the design was licensed by Commodore International in a move that was forecast as a "radical shift of position" and a signal that Commodore would soon dominate the PC compatible market. Despite computers being "hand-assembled from kits" provided by Bytec and displayed alongside the Commodore 900 at a German trade show as their forthcoming first portable computer, it was never sold by Commodore and some analysts downplayed the pact. The Hyperion was shipped in January 1983 at C$4995, two months ahead of the Compaq Portable.
Brand name
The name "Hyperion" was invented by Taylor-Sprules Corporation in Toronto. They also designed the retail packaging, all marketing materials and the tradeshow exhibit at Comdex in Atlantic City where Hyperion was first introduced in 1982. Two prototypes were shown. The amber graphics screens, and a built-in modem, were notable features that attracted comment at the show.
Design
The machine featured 256 KB RAM, dual 360 KB 5.25" floppy disk drives, a graphics card compatible with both CGA and HGC, a video-out jack, a built-in 7-inch amber CRT, 300 bit/s modem, and an acoustic coupler. It included a version of MS-DOS called H-DOS and bundled word processor, database, and modem software. While the Hyperion weighed just eighteen pounds (8.2 kg), or about 2/3 the weight of the Compaq, it was not as reliable or as IBM compatible and was discontinued within two years. One significant difference from the IBM system was the use of a Zilog Z80-SIO chip instead of a National Semiconductor 8250 for serial communications.
Interface
H-DOS was remarkable and is of historical significance because it featured a simple menu system. The through keys beneath the 7" screen corresponded to five menu items displayed at the bottom of the screen. This menu was context sensitive and greatly facilitated entering DOS commands. All but the least frequently used commands were available as F-key menu selections, and this greatly reduced the amount of typing required. This user interface was comparable to the many DOS shell programs available at the time but functioned much more smoothly because of the soft key concept.
The soft keys were also featured in the word processor, database, and modem software that came bundled with the Hyperion, where they were used to select application commands from context-sensitive menus.
Demise
The initial interest in the Hyperion was high. An order backlog worth had built up, and plans were made to manufacture most units in the United States. However, incompatibility with the IBM PC was a concern for buyers, since many programs of the time made direct calls to the system ROM, and the video display and serial por
|
https://en.wikipedia.org/wiki/CITP
|
CITP may stand for:
Computers and networking - Entertainment control systems (Lighting / Media)
Controller Interface Transport Protocol, an open communications protocol for the integration of visualizers, lighting consoles and media servers
Law enforcement training
Criminal Investigator Training Program
Organizations
Center for Information Technology Policy at Princeton University
Professional certifications
Chartered IT Professional, a designation awarded by the British Computer Society for experienced ICT professionals
Certified Information Technology Professional, a credential granted by the American Institute of Certified Public Accountants to members with technology expertise
Certified International Trade Professional, a designation awarded by the Forum for International Trade Training for experienced international trade professionals.
|
https://en.wikipedia.org/wiki/Standard%20test%20image
|
A standard test image is a digital image file used across different institutions to test image processing and image compression algorithms. By using the same standard test images, different labs are able to compare results, both visually and quantitatively.
The images are in many cases chosen to represent natural or typical images that a class of processing techniques would need to deal with. Other test images are chosen because they present a range of challenges to image reconstruction algorithms, such as the reproduction of fine detail and textures, sharp transitions and edges, and uniform regions.
Historical origins
Test images as transmission system calibration material probably date back to the original Paris to Lyon fax link. Analogue Fax equipment (and photographic equipment for the printing trade) were the largest user groups of the standardized image for calibration technology until the coming of television and digital image transmission systems.
Common test image resolutions
The standard resolution of the images is usually 512×512 or 720×576. Most of these images are available as TIFF files from the University of Southern California's Signal and Image Processing Institute. Kodak has released 768×512 images, available as PNGs, that was originally on Photo CD with higher resolution, that are widely used for comparing image compression techniques.
See also
Carole Hersee
FERET database (DARPA/NIST face recognition database)
Lenna
List of common 3D test models
References
External links
The USC-SIPI Image Database — A large collection of standard test images
Computer Vision website — A large collection of links to various test images
Vision @ Reading — University of Reading's set of popular test images
CIPR still images — Some sets of test images at Rensselaer Polytechnic Institute (including the Kodak set)
True-color Kodak test images — The Kodak set in PNG format
TESTIMAGES — Large collection of sample images designed for analysis and quality assessment of different kinds of displays (i.e. monitors, televisions and digital cinema projectors) and image processing techniques
Image processing
Test items
|
https://en.wikipedia.org/wiki/Free%20list
|
A free list (or freelist) is a data structure used in a scheme for dynamic memory allocation. It operates by connecting unallocated regions of memory together in a linked list, using the first word of each unallocated region as a pointer to the next. It is most suitable for allocating from a memory pool, where all objects have the same size.
Free lists make the allocation and deallocation operations very simple. To free a region, one would just link it to the free list. To allocate a region, one would simply remove a single region from the end of the free list and use it. If the regions are variable-sized, one may have to search for a region of large enough size, which can be expensive.
Free lists have the disadvantage, inherited from linked lists, of poor locality of reference and so poor data cache utilization, and they do not automatically consolidate adjacent regions to fulfill allocation requests for large regions, unlike the buddy allocation system. Nevertheless, they are still useful in a variety of simple applications where a full-blown memory allocator is unnecessary or requires too much overhead.
The OCaml runtime uses free lists to satisfy allocation requests, as does RosAlloc on Android Runtime.
See also
Buddy memory allocation
References
Further reading
The Memory Management Glossary
Memory Allocation Lecture Slides (ppt)
Memory management
Linked lists
|
https://en.wikipedia.org/wiki/Hybrid%20intelligent%20system
|
Hybrid intelligent system denotes a software system which employs, in parallel, a combination of methods and techniques from artificial intelligence subfields, such as:
Neuro-symbolic systems
Neuro-fuzzy systems
Hybrid connectionist-symbolic models
Fuzzy expert systems
Connectionist expert systems
Evolutionary neural networks
Genetic fuzzy systems
Rough fuzzy hybridization
Reinforcement learning with fuzzy, neural, or evolutionary methods as well as symbolic reasoning methods.
From the cognitive science perspective, every natural intelligent system is hybrid because it performs mental operations on both the symbolic and subsymbolic levels. For the past few years, there has been an increasing discussion of the importance of A.I. Systems Integration. Based on notions that there have already been created simple and specific AI systems (such as systems for computer vision, speech synthesis, etc., or software that employs some of the models mentioned above) and now is the time for integration to create broad AI systems. Proponents of this approach are researchers such as Marvin Minsky, Ron Sun, Aaron Sloman, and Michael A. Arbib.
An example hybrid is a hierarchical control system in which the lowest, reactive layers are sub-symbolic. The higher layers, having relaxed time constraints, are capable of reasoning from an abstract world model and performing planning.
Intelligent systems usually rely on hybrid reasoning processes, which include induction, deduction, abduction and reasoning by analogy.
See also
AI alignment
AI effect
Applications of artificial intelligence
Artificial intelligence systems integration
Intelligent control
Lists
List of emerging technologies
Outline of artificial intelligence
Notes
References
R. Sun & L. Bookman, (eds.), Computational Architectures Integrating Neural and Symbolic Processes. Kluwer Academic Publishers, Needham, MA. 1994. http://www.cogsci.rpi.edu/~rsun/book2-ann.html
S. Wermter and R. Sun, (eds.) Hybrid Neural Systems. Springer-Verlag, Heidelberg. 2000. http://www.cogsci.rpi.edu/~rsun/book4-ann.html
R. Sun and F. Alexandre, (eds.) Connectionist-Symbolic Integration. Lawrence Erlbaum Associates, Mahwah, NJ. 1997.
Albus, J. S., Bostelman, R., Chang, T., Hong, T., Shackleford, W., and Shneier, M. Learning in a Hierarchical Control System: 4D/RCS in the DARPA LAGR Program NIST, 2006
A.S. d'Avila Garcez, Luis C. Lamb & Dov M. Gabbay. Neural-Symbolic Cognitive Reasoning. Cognitive Technologies, Springer (2009). .
International Journal of Hybrid Intelligent Systems http://www.softcomputing.net/ijhis/
http://www.iospress.nl/html/14485869.php
International Conference on Hybrid Intelligent Systems http://his.hybridsystem.com/
HIS'01: http://www.softcomputing.net/his01/
HIS'02: https://web.archive.org/web/20060209160923/http://tamarugo.cec.uchile.cl/~his02/
HIS'03: http://www.softcomputing.net/his03/
HIS'04: https://web.archive.org/web/20060303051902/http://www.cs.nmt.edu/~his04/
HIS
|
https://en.wikipedia.org/wiki/Portable%20storage%20device
|
A portable storage device (PSD) is a compact plug-and-play mass storage device designed to hold a large volume of digital data of any kind. This is slightly different from a portable media player, which is designed to only store music and video files that its internal reader softwares can play.
Most modern PSDs are dedicated solid state drives (SSD) that are connected to a computer and powered via USB ports. Some PSDs, usually those from before the wide adoption of SSDs, are modified hard disk drives via the installation of a disk enclosure, and require an additional AC adapter as the power required to operate the drive typically exceeds that can be provided by the USB port.
PSDs, while much bigger and heavier than ultracompact flash drives such as USB flash drives and memory cards, offer significantly more external storage capacities, yet are still convenient enough for carrying around when travelling or as a readily accessible offline backup storage option, especially in situations where online storage alternatives such as network-attached storage and cloud storage are unavailable, unreliable or unsafe.
Photography
One type of data that may be stored is digital photographs (RAW data), transferred from a digital camera.
Many PSDs will connect directly to a camera and copy the images, or they may provide a slot for a memory card to plug in, with or without a card reader device. Some early models allow the user to review the images on a colour screen, but at the top end of the market.
See also
Computer storage
Mass Storage Digital Class (MSDC)
References
Computer storage media
|
https://en.wikipedia.org/wiki/Intel%20Turbo%20Memory
|
Intel Turbo Memory is a technology introduced by Intel Corporation that uses NAND flash memory modules to reduce the time it takes for a computer to power up, access programs, and write data to the hard drive. During development, the technology was codenamed Robson. It is supported by most of the Core 2 Mobile chipset series, but not by the newer Core i Series mobile chipsets.
Overview
The technology was publicly introduced on October 24, 2005, at the Intel Developer Forum (IDF) in Taiwan when a laptop that booted up almost immediately was demonstrated. The technology attempts to decrease hard drive usage by moving frequently accessed data over to the flash memory. Flash memory can be accessed faster than hard drives and requires less power to operate, thereby allowing laptops to operate faster while also being more power efficient.
The Turbo memory cache connects to a motherboard via a mini-PCIe interface.
It is designed to leverage features introduced in Windows Vista, namely ReadyBoost (a supplementation of RAM-based disk caching by dedicated files on flash drives, except on the 512 MB version) and/or ReadyDrive (a non-volatile caching solution, i.e. an implementation of a hybrid drive, as long as the main storage isn't already one);
as ReadyBoost is backed by temporary files on generic storage volumes, it is unofficially possible to destinate this space for general purpose storage.
Turbo Memory is not compatible with previous versions of Windows (with only a no-op driver that merely acknowledges the device existing for Windows 2000 and XP);
Linux support is limited to a third-party experimental MTD driver only supporting 2 GB modules.
Availability
Intel Turbo Memory was made available on May 9, 2007, on the Intel's Santa Rosa platform and their Crestline (GM965) chipsets. Intel Turbo Memory 2.0 was introduced on July 15, 2008, on Intel's Montevina platform and their Cantiga (GM47) chipsets. It is available in 1, 2, and 4GB modules. It is supported in the Intel 965 Express chipset, and the Intel 4 Series Express chipsets (2GB and 4GB modules only).
Several retailers, such as Acer, Asus, Dell, Lenovo, Sager, Toshiba, etc., sold laptops enabled with the Intel Turbo Memory technology.
Reception
A review in AnandTech largely concurred with some OEM criticism finding that "it basically does nothing for the user experience". HP refused to use the technology. Ars Technica wrote in 2009 that Turbo Memory "never took off", and CNET similarly pronounced that it was "never widely adopted", because "Turbo Memory (and Turbo Memory 2.0) wasn't cheap, and it definitely wasn't worth the cost."
In 2009 Intel had announced the successor to Turbo Memory for the 5-Series mobile chipsets, codename Braidwood. However, the series was launched without this technology. The ThinkPad lineup built on the first generation Intel Core-i platform features lands to connect a Braidwood module, however no production ThinkPad motherboard had the connector populated. In
|
https://en.wikipedia.org/wiki/Electronic%20funds%20transfer
|
Electronic funds transfer (EFT) is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of bank staff.
According to the United States Electronic Fund Transfer Act of 1978 it is "a funds transfer initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer's account".
EFT transactions are known by a number of names across countries and different payment systems. For example, in the United States, they may be referred to as "electronic checks" or "e-checks". In the United Kingdom, the term "BACS Payment", "bank transfer" and "bank payment" are used, in Canada, "e-transfer" is used, while in several other European countries "giro transfer" is the common term.
Types
EFTs include, but are not limited to:
Automated teller machine (ATM) transfers
Direct deposit payment or withdrawals of funds initiated by the payer
Direct debit payments in which a business debits the consumer's bank accounts for payment for goods or services
Electronic bill payment in online banking, which may be delivered by EFT or paper check
QR code payment is a payment initiated using a QR Code scanned from a mobile app
Transfers initiated by telephone
Transfers resulting from credit or debit card transactions, whether initiated through a payment terminal
Wire transfer via an international banking network such as SWIFT
See also
Automated Clearing House (ACH)
E-commerce payment system
Electronic funds transfer at point of sale (EFTPOS)
Immediate Payment Service
Interbank network
Payment system
Real time gross settlement
Society for Worldwide Interbank Financial Telecommunication (SWIFT)
Instant payment
References
External links
Electronic Funds Transfer Association
|
https://en.wikipedia.org/wiki/Sun%20Remarketing
|
Sun Remarketing, Inc. (originally Cook's, Inc. before 1983) was a retail company that specialized in reselling old Apple Computer software and hardware. It was founded by Robert L. "Bob" Cook in 1979.
Apple Lisa
In 1985, Sun Remarketing purchased between 5,000 and 7,000 unsold Apple Lisa computers from Apple Computers after the latter had discontinued it in September that year. The company had also acquired 3,500 unsold Apple III computers and thousands of used and broken Lisas from surrounding businesses in the same year. Sun sold roughly thousands of these consigned Lisas between 1985 and 1989, the company modernizing the machines by retrofitting them with 800-KB 3.5-inch floppy disk drives and 20-MB hard drives. Sun began reselling Apple's Macintosh line of computers in 1988, including Macintosh Plus, Macintosh SE, and Macintosh II, after years of having only sold the Lisa, Apple II, and Apple III. In September 1989, Apple took the remaining 2,700 in their warehouse (which they had consigned to Sun) and buried them at a landfill in Utah.
Sun Remarketing bought the MacWorks XL emulator from Apple in the 1980s to spur sales of the Lisa computers by making them able to run Macintosh applications. Following the introduction of the Macintosh Plus by Apple with its enhanced 128K ROM, many new Macintosh applications no longer worked under MacWorks XL. To clear its remaining inventory, Sun Remarketing took the bold step of underwriting the development of a new emulator called MacWorks Plus which fully supported the 128K ROM on the Lisa hardware, and packaged it together as the Lisa Professional.
Demise
Sun Remarketing was also known locally within Cache Valley as one of the first commercial internet service providers in Northern Utah, but did not take advantage of the situation. In 2006, Sun Remarketing was bought out by Cherokee Data, a computer wholesaler in Oklahoma.
A second company using the name Cherokee Data Solutions (aka CDS) is unrelated and unaffiliated with either Cherokee Data or Sun Remarketing.
Notes
External links
Sun Remarketing 1991–1992 Catalogue
Lisa/Macintosh XL Do-it-yourself Guide published by Sun Remarketing
Sun Remarketing Lisa ads at Vectronics Apple World
1983 establishments in Utah
2006 disestablishments in Utah
American companies established in 1983
American companies disestablished in 2006
Computer companies established in 1983
Computer companies disestablished in 2006
Defunct computer companies of the United States
Defunct software companies of the United States
|
https://en.wikipedia.org/wiki/Institut%20de%20la%20Francophonie%20pour%20l%27Informatique
|
The Institut de la Francophonie pour l'Informatique (IFI), French for the "Computer Science Institute for the Francophonie", is a graduate school in computer science in Vietnam.
It was created and funded by the Agence universitaire de la Francophonie (AUF) in 1995 following a request from the Vietnamese government for the training of high-level Vietnamese engineers and college professors in computer science. The countries and regions funding the project are Wallonia, Belgium; Québec, Canada; France; French-speaking Switzerland; and Luxembourg.
IFI recruits its students in Vietnam and other French-speaking countries. Professors at the member universities of the AUF (such as ENST Paris, Université catholique de Louvain, UQAM, etc.) come to IFI to give lectures. All courses are conducted in French.
Usually, the final internship then takes place abroad (Europe or Canada) in industries, universities or research laboratories. Research internships are often used as a bridge toward a PhD. Industrial internships are taken by those who seek the profile of a project leader in software development.
IFI is considered one of the best graduate schools in computer science in Vietnam. About one third of its students continue their PhD in foreign universities; many become professors or founders of software companies in Vietnam.
External links
Official Website
Student's Magazine
Universities in Hanoi
Francophonie
|
https://en.wikipedia.org/wiki/Template%20network
|
The Template Network was once called the Emin Society or the Emin Foundation, and is now an international network of independent groups. As of 2014 there are some 1600 people regularly engaged within these groups worldwide in countries including Australia, Brazil, Canada, Denmark, England, Germany, Ireland, Israel, the Netherlands, New Zealand, Norway and the United States of America. Activities are diverse with interests including personal development, spirituality, psychology, meditation, music, dance, ecology, healing, sustainable development, evolution and health and well-being.
Historical background
In 1971 a small number of people began to meet with Raymond Armin (1924 - 2002) to research the core issues of life, the universe and everything. The group called their activities "The Way" and later "The Emin".
By 1974 the group had 80 members; Raymond Armin was employed full-time by the society and a centre was rented for meetings at Gospel Oak in London. By 1976 a larger place was found at Putney. By 1977 there were 700 members in the UK.
Origins of the name
Emin is an Arabic word which means the faithful one.
In 1981 a request for verification of this from the London Central Mosque produced the response that Emin is a Europeanised variation of the Arabic: Ameen. The meanings attributed to the various forms of the word are: "trust", "faith", "worthy to be trusted", "truly", "reliable". It is also a form of the Hebrew word Amen and appears also in Christian usage with the meaning: "I concur" (used at the end of a prayer to signify that the words in the prayer are true and reliable, a statement of faith).
Origins of the philosophy
The Emin philosophy is the result of the work of Raymond Armin (AKA Leo), born in Camden Town, London, in 1924. As a child, Leo came to develop a deep conviction that everything that existed did so according to a core set of laws or principles; later he would call these the Natural Laws.
During the 1940s and 50's Leo married and had a family but maintained his on-going enquiry into the meaning and purpose of life. He spent much time researching in the British Museum and the British Library. In 1971 a number of young people met Leo and started meeting with him on a regular basis. They found him to have the ability to unlock perception into a huge range of subjects using a toolkit of techniques later referred to as groundwork.
Leo shared these techniques with the students and together they worked into new subjects as the topics arose during their regular meetings. To aid students in their own researches, Leo wrote papers explaining important concepts and these became known as the Emin archives. Using the natural laws, Leo was able to understand and explain even the most complicated of phenomena in a simple to grasp form - the basic premise being that natural laws are at the core of the appearance of everything.
As Leo continued to work with students, so the Emin philosophy developed and grew. The concept of un
|
https://en.wikipedia.org/wiki/Coding%20efficiency
|
Coding efficiency may refer to:
In computing
Data compression efficiency
Algorithmic efficiency
In biology
Efficient coding hypothesis
See also
Efficiency (disambiguation)
Coding (disambiguation)
|
https://en.wikipedia.org/wiki/DATA
|
Debt, AIDS, Trade, Africa (DATA) was a multinational non-governmental organization founded in January 2002 in London by U2's lead vocalist, Bono, with Bobby Shriver and activists from the Jubilee 2000 Drop the Debt campaign.
DATA was created for the purposes of obtaining equality and justice for Africa through debt relief, adjusting trade rules which burden Africa, eliminating the epidemic of AIDS in Africa, strengthening democracy, furthering accountability by the wealthiest nations and African leaders and transparency towards the people. In 2007, in the United States, DATA and Bono were jointly awarded the National Constitution Center's 2007 Liberty Medal for their groundbreaking efforts to address the AIDS crisis and extreme poverty in Africa.
Start-up funds came from the Bill & Melinda Gates Foundation, the financier George Soros and the technology entrepreneur Edward W. Scott.
In October 2007, it was announced that DATA and the One Campaign would merge in the United States under the single organization "One". The change occurred in January 2008.
DATA received support from the Christian rock / alternative rock bands Switchfoot and Third Day.
References
External links
Global development Millennium development goals DATA Report 2013 via ONE and RED campaign
DATA site at Causes
Economic development organizations
HIV/AIDS in Africa
Organizations founded by Bono
|
https://en.wikipedia.org/wiki/National%20Centre%20for%20Computer%20Animation
|
The National Centre for Computer Animation (NCCA) is part of the Media School at Bournemouth University in the United Kingdom. Founded in 1989, it is often regarded as one of the best UK institutions available for study in the field of computer graphics, offering both undergraduate and postgraduate degree courses. Its first director was Peter Comninos. The interdisciplinary centre, operating under the motto 'Science in the service of the Arts', enjoys strong links with industry, with much of it consisting of NCCA graduates. In the 2001 national Research Assessment Exercise (RAE), the NCCA was awarded the maximum possible mark of 5 and performed similarly well in the 2008 RAE. NESTA's 'Livingstone-Hope Skills Review of Video Games and Visual Effects', launched in 2010, published its result in the Next Gen. report, which singles out the NCCA for 'excellence in visual effects education', placing it 'at the forefront of education for the visual effects and animation industries'. In 2011 the work of the NCCA at Bournemouth University was further recognised through the award of the Queen's Anniversary Prize for 'world-class computer animation teaching with wide scientific and creative applications'.
Selected publications
References
External links
Official NCCA website.
Bournemouth University
Computer animation
|
https://en.wikipedia.org/wiki/Run-time%20algorithm%20specialization
|
In computer science, run-time algorithm specialization is a methodology for creating efficient algorithms for costly computation tasks of certain kinds. The methodology originates in the field of automated theorem proving and, more specifically, in the Vampire theorem prover project.
The idea is inspired by the use of partial evaluation in optimising program translation.
Many core operations in theorem provers exhibit the following pattern.
Suppose that we need to execute some algorithm in a situation where a value of is fixed for potentially many different values of . In order to do this efficiently, we can try to find a specialization of for every fixed , i.e., such an algorithm , that executing is equivalent to executing .
The specialized algorithm may be more efficient than the generic one, since it can exploit some particular properties of the fixed value . Typically, can avoid some operations that would have to perform, if they are known to be redundant for this particular parameter .
In particular, we can often identify some tests that are true or false for , unroll loops and recursion, etc.
Difference from partial evaluation
The key difference between run-time specialization and partial evaluation is that the values of on which is specialised are not known statically, so the specialization takes place at run-time.
There is also an important technical difference. Partial evaluation is applied to algorithms explicitly represented as codes in some programming language. At run-time, we do not need any concrete representation of . We only have to imagine when we program the specialization procedure.
All we need is a concrete representation of the specialized version . This also means that we cannot use any universal methods for specializing algorithms, which is usually the case with partial evaluation. Instead, we have to program a specialization procedure for every particular algorithm . An important advantage of doing so is that we can use some powerful ad hoc tricks exploiting peculiarities of and the representation of and , which are beyond the reach of any universal specialization methods.
Specialization with compilation
The specialized algorithm has to be represented in a form that can be interpreted.
In many situations, usually when is to be computed on many values in a row, we can write as a code of a special abstract machine, and we often say that is compiled.
Then the code itself can be additionally optimized by answer-preserving transformations that rely only on the semantics of instructions of the abstract machine.
Instructions of the abstract machine can usually be represented as records. One field of such a record stores an integer tag that identifies the instruction type, other fields may be used for storing additional parameters of the instruction, for example a pointer to another
instruction representing a label, if the semantics of the instruction requires a jump. All instructions of a code can be s
|
https://en.wikipedia.org/wiki/Local%20search%20%28Internet%29
|
Local search is the use of specialized Internet search engines that allow users to submit geographically constrained searches against a structured database of local business listings. Typical local search queries include not only information about "what" the site visitor is searching for (such as keywords, a business category, or the name of a consumer product) but also "where" information, such as a street address, city name, postal code, or geographic coordinates like latitude and longitude. Examples of local searches include "Hong Kong hotels", "Manhattan restaurants", and "Dublin car rental". Local searches exhibit explicit or implicit local intent. A search that includes a location modifier, such as "Bellevue, WA" or "14th arrondissement", is an explicit local search. A search that references a product or service that is typically consumed locally, such as "restaurant" or "nail salon", is an implicit local search.
Local searches on Google Search typically return organic results prefaced with a 'local 3-pack', a list of three local results. More local results can be obtained by clicking on “more places” under the 3-pack. The list of results one obtains is also called the Local Finder.
Search engines and directories are primarily supported by advertising from businesses that wish to be prominently featured when users search for specific products and services in specific locations. Google for instance, has developed local inventory ads and features ads in the local pack. Local search advertising can be highly effective because it allows ads to be targeted very precisely to the search terms and location provided by the user.
Evolution
Local search is the natural evolution of traditional off-line advertising, typically distributed by newspaper publishers and TV and radio broadcasters, to the Web. Historically, consumers relied on local newspapers and local TV and radio stations to find local product and services. With the advent of the Web, consumers are increasingly using search engines to find these local products and services online. In recent years, the number of local searches online has grown rapidly while off-line information searches, such as print Yellow Page lookups, have declined. As a natural consequence of this shift in consumer behavior, local product and service providers are slowly shifting their advertising investments from traditional off-line media to local search engines.
Of directories, search engines and maps
One can search local information via search engines. These often return local search results from directories and maps. Google for instance, will present results from its directory (called Google Business Profile) in Google Maps and also in the search engine results pages in the form of a local pack. One can also look for local information by searching Apple Maps Search engines offer local businesses the possibility to upload their business data to their respective local search databases.
Other local search engi
|
https://en.wikipedia.org/wiki/Claris%20Resolve
|
Claris Resolve was a spreadsheet computer program for the Apple Macintosh. It was released by Claris in 1991 and sold until 1994.
In an effort to flesh out their software suite, in the early 1990s Claris wanted to introduce a spreadsheet application, and decided to buy an existing one. This was not particularly difficult, as Informix had essentially abandoned the Mac version of WingZ, and Claris was able to purchase the non-exclusive rights to the codebase. After changing the interface to conform to their new "Pro" line of product's GUI, they released it at the MacWorld Expo Boston on June 6, 1991, as Resolve.
Resolve supports a worksheet size of more than one billion cells and includes 149 built-in functions that allow users to create financial, statistical and mathematical models. Resolve also contains object-oriented, MacDraw-like drawing tools for combining illustrations, clip art, text, charts and numbers in reports. Resolve also included WingZ scripting language, renamed Resolve Script. Resolve also offered 3D charting that Wingz was the first to bring on Macintosh.
Resolve failed to gain significant market share due to Microsoft Excel, which also stopped Lotus 1-2-3 becoming popular on the Macintosh. This led to disappointing sales, and in 1993 development was stopped. On 31 March 1994 Claris stopped selling Resolve, the program was supported up until 31 March 1995. Claris suggested existing Resolve users to upgrade to the spreadsheet module of ClarisWorks.
Reception
Resolve 1.0v3 got mice (out of 5) in June 1992 issue of MacUser, praising the familiar interface and the scripting.
References
External links
TidBITS#76/12-Aug-91 Claris Resolve introduction information
TidBITS#216/07-Mar-94 Claris Resolve discontinuation info
Claris Resolve Information and Screenshots on knubbelmac.de
Macintosh-only software
Spreadsheet software
|
https://en.wikipedia.org/wiki/Canterbury%20corpus
|
The Canterbury corpus is a collection of files intended for use as a benchmark for testing lossless data compression algorithms. It was created in 1997 at the University of Canterbury, New Zealand and designed to replace the Calgary corpus. The files were selected based on their ability to provide representative performance results.
Contents
In its most commonly used form, the corpus consists of 11 files, selected as "average" documents from 11 classes of documents, totaling 2,810,784 bytes as follows.
The University of Canterbury also offers the following corpora. Additional files may be added, so results should be only reported for individual files.
The Artificial Corpus, a set of files with highly "artificial" data designed to evoke pathological or worst-case behavior. Last updated 2000 (tar timestamp).
The Large Corpus, a set of large (megabyte-size) files. Contains an E. coli genome, a King James bible, and the CIA world fact book. Last updated 1997 (tar timestamp).
The Miscellaneous Corpus. Contains one million digits of pi. Last updated 2000 (tar timestamp).
See also
Data compression
References
External links
Data compression
Test items
|
https://en.wikipedia.org/wiki/Image%20scaling
|
In computer graphics and digital imaging, image scaling refers to the resizing of a digital image. In video technology, the magnification of digital material is known as upscaling or resolution enhancement.
When scaling a vector graphic image, the graphic primitives that make up the image can be scaled using geometric transformations, with no loss of image quality. When scaling a raster graphics image, a new image with a higher or lower number of pixels must be generated. In the case of decreasing the pixel number (scaling down) this usually results in a visible quality loss. From the standpoint of digital signal processing, the scaling of raster graphics is a two-dimensional example of sample-rate conversion, the conversion of a discrete signal from a sampling rate (in this case the local sampling rate) to another.
Mathematical
Image scaling can be interpreted as a form of image resampling or image reconstruction from the view of the Nyquist sampling theorem. According to the theorem, downsampling to a smaller image from a higher-resolution original can only be carried out after applying a suitable 2D anti-aliasing filter to prevent aliasing artifacts. The image is reduced to the information that can be carried by the smaller image.
In the case of up sampling, a reconstruction filter takes the place of the anti-aliasing filter.
A more sophisticated approach to upscaling treats the problem as an inverse problem, solving the question of generating a plausible image, which, when scaled down, would look like the input image. A variety of techniques have been applied for this, including optimization techniques with regularization terms and the use of machine learning from examples.
Algorithms
An image size can be changed in several ways.
Nearest-neighbor interpolation
One of the simpler ways of increasing image size is nearest-neighbor interpolation, replacing every pixel with the nearest pixel in the output; for upscaling this means multiple pixels of the same color will be present. This can preserve sharp details in pixel art, but also introduce jaggedness in previously smooth images. 'Nearest' in nearest-neighbor does not have to be the mathematical nearest. One common implementation is to always round towards zero. Rounding this way produces fewer artifacts and is faster to calculate.
Bilinear and bicubic algorithms
Bilinear interpolation works by interpolating pixel color values, introducing a continuous transition into the output even where the original material has discrete transitions. Although this is desirable for continuous-tone images, this algorithm reduces contrast (sharp edges) in a way that may be undesirable for line art. Bicubic interpolation yields substantially better results, with an increase in computational cost.
Sinc and Lanczos resampling
Sinc resampling in theory provides the best possible reconstruction for a perfectly bandlimited signal. In practice, the assumptions behind sinc resampling are not completely
|
https://en.wikipedia.org/wiki/Atari%20Corporation
|
Atari Corporation was an American manufacturer of computers and video game consoles. It was founded by Jack Tramiel on May 17, 1984, as Tramel Technology, Ltd., but then took on the Atari name less than two months later when Warner Communications sold the home computing and game console assets of Atari, Inc. to Tramiel. Its chief products were the Atari ST, Atari XE, Atari 7800, Atari Lynx and Atari Jaguar.
The company reverse merged with JTS Inc. in 1996, becoming a small division which itself closed after JTS sold all Atari assets to Hasbro Interactive in 1998.
History
The company was founded by Commodore International's founder Jack Tramiel soon after his resignation from Commodore in January 1984. Initially named Tramel Technology, Ltd., the company's goal was to design and sell a next-generation home computer. On July 1, 1984, TTL bought the Consumer Division assets of Atari, Inc. from Warner, and TTL was renamed Atari Corporation. Warner sold the division in exchange for $240 million in stock in the new company.
In order to halt the massive losses Atari, Inc. had been yielding under Warner's ownership, Tramiel shut down nearly all of their 80 domestic branches, laying off the staff and liquidating the inventory. Under Tramiel's ownership, Atari used the remaining stock of game console inventory to keep the company afloat while they finished the development of their 16-bit computer system, the Atari ST. In 1985, they released their update to the 8-bit computer line—the Atari XE series—as well as the 16-bit Atari ST line. Then in 1986, Atari Corp. launched two consoles designed when Atari was under Warner's control: Atari 2600 Jr and Atari 7800 (which had a limited release in 1984). Atari Corp. rebounded, producing a $25 million profit for 1986. The Atari ST line proved very successful (mostly in Europe, not the U.S.), ultimately selling more than 5 million units. Its built-in MIDI ports made it especially popular among musicians. Still, after initially outselling the Amiga line, its closest competitor in the marketplace, the Amiga outsold it 3 to 2 in the end. Atari eventually released a line of inexpensive IBM PC compatibles as well as an MS-DOS compatible palm computer called the Atari Portfolio.
Atari, under Tramiel, had a poor reputation in the marketplace. In 1986 a columnist for Atari magazine ANALOG Computing warned that company executives seemed to emulate Tramiel's penny-pinching' [and] hard-nosed bargaining, sometimes at the risk of everything else," resulting in poor customer service and documentation, and product release dates that were "perhaps not the entire truth ... Pretty soon, you don't believe anything they say." He concluded, "I think Atari Corp. had better start considering how they're perceived by the non-Atari-using public." The company, however, was much more open to the press than its predecessor Atari Inc., which had refused to let Antic preview forthcoming announcements and even opposed the magazine printing th
|
https://en.wikipedia.org/wiki/Carlos%20Meglia
|
Carlos Meglia (December 11, 1957 – August 15, 2008) was a comic book artist and penciller born in the city of Quilmes, Argentina. One of his best-known creations is the Cybersix series, done in partnership with Carlos Trillo. Meglia died on August 15, 2008, at the age of 50.
1974
1974 is when Meglia debuted as an assistant to the illustrator Oswal Sanson, where he produced many illustrations for the magazines Pendulum and Skorpio.
1979
Meglia illustrated the comic book adaptations of various literary classics such as Don Quichotte, La Bible pour les Enfants, and several books of Martin Fierro, the poet.
Early 1980s
He contributed to several major magazines of Argentina, including Satiricon – a humorous periodical, El Grafico – a sports magazine, and Billiken – a children's magazine.
1983
He made his first short comic stories for the Publisher Record.
1984
Meglia decided to enter the Hanna-Barbera Studios, where he worked in animation for some popular cartoon series, including The Smurfs, The Flintstones, and Scooby-Doo, Where Are You?, as well as the animated film The Magic Pumpkin.
1987
He teamed up with the famous Argentinian writer, Carlos Trillo, and together they started Irish Coffee which is a comic series about a detective with supernatural powers.
Meglia subsequently created Big Bang and The Book of Gabriel, the story of an archangel who lost his immortality and must endure a quest to gain forgiveness from the sin he committed.
He also did the cover art for Acme Editorial (on which it is signed with the pseudonym Mercuria Karur) and was a teacher of illustration at the School of Fine Arts in Quilmes, where he was born.
1991
Trillo and Meglia created their most famous character, Cybersix.
1993
Meglia was awarded Best European Comic Character.
Meglia and Trillo start the two miniseries Lam and Livevil.
1995
Cybersix becomes a live-action television series in Argentina however, its low ratings led it to only lasting seven episodes.
1999
Cybersix becomes an animated television series. It debuted in Canada and Argentina on September 6, and was subsequently dubbed for French, Japanese, Malaysian, Polish, South American, and Thai viewers.
Meglia begins overseeing the production of a film based on Livelil.
Second half of the 1990s
After settling down in Spain, Meglia began working for the US market. He cooperated on series such as Wildcats, Dark Horse titles like Star Wars and Spyboy, as well as DC's Superman/Tarzan: Sons of the Jungle, Crimson, Adventures of Superman, and Monster World, as well as Marvel's Elektra.
2001
Cybersix animated series wins "Special Mention for the Best Science Fiction Program" at the Pulcinella Awards in Italy.
2005
He created the series Canari with Belgian comic artist Didier Crisse.
Carlos Meglia dies of a heart attack on August 15, 2008, at age 50.
Bibliography
Star Wars: Underworld
Superman/Tarzan: Sons of the Jungle (2001)
Adventures of Superman #603-605 (2002)
Action Comics #799 (2003)
Superman: I
|
https://en.wikipedia.org/wiki/Horizontal%20blanking%20interval
|
Horizontal blanking interval refers to a part of the process of displaying images on a computer monitor or television screen via raster scanning. CRT screens display images by moving beams of electrons very quickly across the screen. Once the beam of the monitor has reached the edge of the screen, it is switched off, and the deflection circuit voltages (or currents) are returned to the values they had for the other edge of the screen; this would have the effect of retracing the screen in the opposite direction, so the beam is turned off during this time. This part of the line display process is the Horizontal Blank.
In detail, the Horizontal blanking interval consists of:
front porch – blank while still moving right, past the end of the scanline,
sync pulse – blank while rapidly moving left; in terms of amplitude, "blacker than black".
back porch – blank while moving right again, before the start of the next scanline. Colorburst occurs during the back porch, and unblanking happens at the end of the back porch.
In the NTSC television standard, horizontal blanking occupies out of every scan line (17.2%). In PAL, it occupies out of every scan line (18.8%).
Some modern monitors and video cards support reduced blanking, standardized with Coordinated Video Timings.
In the PAL television standard, the blanking level corresponds to the black level, whilst other standards, most notably NTSC, set the black level slightly above the blanking level on a pedestal.
HBlank effects
Some graphics systems can count horizontal blanks and change how the display is generated during this blank time in the signal; this is called a raster effect, of which an example is raster bars.
In video games, the horizontal blanking interval was used to create some notable effects. Some methods of parallax scrolling use a raster effect to simulate depth in consoles that do not natively support multiple background layers or do not support enough background layers to achieve the desired effect. One example of this is in the game Castlevania: Rondo of Blood, which was written for the PC Engine CD-ROM which does not support multiple background layers. The Super Nintendo Entertainment System's Mode 7 uses the horizontal blanking interval to vary the scaling and rotation, per scan line, of one background layer to make the background appear to be a 3D plane.
See also
Nominal analogue blanking
Vertical blanking interval
References
Video signal
Television technology
Television terminology
|
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20TLC
|
This is a list of television programs formerly or currently broadcast by TLC.
Current programming
1000-lb Best Friends (2022–present)
1000-lb Sisters (2020–present)
7 Little Johnstons (2015–present)
90 Day Diaries (2022–present)
90 Day Fiancé (2014–present)
90 Day Fiancé: Before the 90 Days (2017–present)
90 Day Fiancé: Happily Ever After? (2016–present)
90 Day Fiancé: Love in Paradise (2023–present, moved from Discovery+)
90 Day Fiancé: Pillow Talk (2019–present)
90 Day: The Single Life (2022–present)
Baby Surgeons: Delivering Miracles (2022–present)
Bad Hair Day (2022–present)
Crack Addicts (2023–present)
Darcey & Stacey (2020–present)
David and Annie: After the 90 Days (2022–present)
Dr. Pimple Popper (2018–present)
Doubling Down with the Derricos (2020–present)
Extreme Sisters (2021–present)
The Family Chantel (2019–present)
I Am Jazz (2015–present)
I Am Shauna Rae (2022–present)
I Love a Mama's Boy (2020–present)
Little People, Big World (2006–present)
Loren and Alexei: After the 90 Days (2022–present)
Match Me Abroad (2023–present)
MILF Manor (2023–present)
My 600-lb Life (2012–present)
My Big Fat Fabulous Life (2015–present)
My Feet Are Killing Me (2020–present)
OutDaughtered (2016–present)
Return to Amish (2014–present)
Save My Skin (2020–present)
Say Yes to the Dress (2007–present)
Say Yes to the Dress: UK (2017–present)
Seeking Brother Husband (2023–present)
Seeking Sister Wife (2018–present)
Sister Wives (2010–present)
sMothered (2019–present)
Unexpected (2017–present)
Welcome to Plathville (2019–present)
You, Me & My Ex (2021–present)
Upcoming programming
90 Day: The Last Resort (August 14, 2023)
Former programming
Original programming
Acquired programming
Amazing Space
Bling It On
Beakman's World (1992–1995)
The Boy With a Tumor for a Face
Breaking the Faith
Brides of Beverly Hills
Bringing Home Baby
The Busey Bunch
Biba's Italian Kitchen
Bob Vila's Home Again
Cash Cab
Carlo Cooks Italian
Caprial's Cafe
Cover Shot
Dancing Tweens
Death by Chocolate
The Day the Universe Changed
Escaping the Prophet
Everyday Exotic
Extreme Machines
Fabulous Cakes
Furniture on the Mend
Furniture to Go
Fast Food Babies
Firefight: Stories From The Frontlines
Former Smokers
Four Weddings
Great Castles of Europe
Hands on Crafts
Home Made Simple
Home Savvy
The Home Pro
Hometime
Honey, We're Killing the Kids
I am the Elephant Man
I Eat 33,000 Calories a Day
Kennedy Home Movies
The Lottery Changed My Life
Making Over America
Man Versus Food
Master of Dance
Middle Eastern Café
Million Dollar Agents
Miss America Pageant
My Crazy Obsession
My Unique Family
Mysteries of the ER
The Operation
Outrageous Kid Parties
Plain Jane
Psychic Witness
Rags to Red Carpet
The Renovation Guide
She Does Not Feel Pain
Shopaholic Showdown
Surprise Homecoming
Surviving Motherhood
Ted Haggard: Scandalous
Trading Spouses
The Ultimate Guide
Undercover Boss
Traveling Family Features: The Adrids
War and Civilization
We
|
https://en.wikipedia.org/wiki/Transport%20in%20England
|
England has a dense and modern transportation infrastructure. The Department for Transport is the government department responsible for the transport network in England. The Secretary of State for Transport is the member of the cabinet responsible to Parliament for the Department for Transport.
Transport in England is highly facilitated with road, rail, air, and water networks. A radial road network totals of main roads, of motorways and of paved roads.
The National Rail network of 10,072 route miles (16,116 km) in Great Britain and 189 route miles (303 route km) carries over 18,000 passenger and 1,000 freight trains daily. Urban rail networks exist in all cities and towns. There are many regional and international airports, with Heathrow Airport in London being the second busiest in the world and the busiest in Europe.
Transport trends
Passenger transport has grown in recent years. Figures from the DfT show that total passenger travel inside the United Kingdom has risen from 403 billion passenger kilometres in 1970 to 793 billion in 2015.
Freight transport has undergone similar changes, increasing in volume and shifting from railways onto the road. In 1953 89 billion tonne kilometres of goods were moved, with rail accounting for 42%, road 36% and water 22%. By 2010 the volume of freight moved had more than doubled to 222 billion tonne kilometres, of which 9% was moved by rail, 19% by water, 5% by pipeline and 68% by road. Despite the growth in tonne kilometres, the environmental external costs of trucks and lorries in the UK have reportedly decreased. Between 1990 and 2000, there has been a move to heavier goods vehicles due to major changes in the haulage industry including a shift in sales to larger articulated vehicles. A larger than average fleet turnover has ensured a swift introduction of new and cleaner vehicles in England and the rest of the UK.
Figures from the DfT show in 2018 people made 4.8 billion local bus passenger journeys in England, 58% of all public transport journeys. There were 1.8 billion rail passenger journeys in England. Light rail and tram travel also continued to grow, to the highest level (0.3 million journeys) since comparable records began in 1983. Rail travel tends to be used for longer journeys. On average, people made 48 trips by bus and travelled 441 kilometres compared to 22 trips and 992 kilometres by rail in 2018. In 2018/19, there was £18.1bn of public expenditure on railways, an increase of 12% (£1.9bn).
272 million passenger journeys were made on the eight light rail and tram systems in England in 2018/19. 87% of adults in London walked at least once a week - the highest rate in the country. This was followed by Isles of Scilly (83%) and Richmond upon Thames (83%). 57% of adults in Cambridge cycled at least once a week. This was followed by Oxford (39%) and Isles of Scilly (35%).
Road
The road network in Great Britain in 2006 consisted of of trunk roads (including of motorway), of princip
|
https://en.wikipedia.org/wiki/Constraint-based%20Routing%20Label%20Distribution%20Protocol
|
Constraint-based Routing Label Distribution Protocol (CR-LDP) is a control protocol used in some computer networks.
As of February 2003, the IETF MPLS working group deprecated CR-LDP and decided to focus purely on RSVP-TE.
It is an extension of the Label Distribution Protocol (LDP), one of the protocols in the Multiprotocol Label Switching architecture. CR-LDP contains extensions for LDP to extend its capabilities such as setup paths beyond what is available for the routing protocol. For instance, a label-switched path can be set up based on explicit route constraints, quality of service constraints, and other constraints. Constraint-based routing (CR) is a mechanism used to meet traffic engineering requirements. These requirements are met by extending LDP for support of constraint-based routed label-switched paths (CR-LSPs). Other uses for CR-LSPs include MPLS-based virtual private networks.
CR-LDP is almost same as basic LDP, in packet structure, but it contains some extra TLVs which basically set up the constraint-based LSP.
References
MPLS networking
Network protocols
|
https://en.wikipedia.org/wiki/John%20Gage
|
John Burdette Gage (born October 9, 1942) was the 21st employee of Sun Microsystems, where he is credited with creating the phrase The Network is the Computer. He served as vice president and chief researcher and director of the Science Office for Sun Microsystems, until leaving on June 9, 2008, to join Kleiner Perkins Caufield & Byers as a partner to work on green technologies for global warming; he departed KPCB in 2010 to apply what he had learned "to broader issues in other parts of the world".
In 2006, he joined the board of the Tegla Loroupe Peace Foundation, to build a school and orphanage in Kapenguria, in remote north-west Kenya.
In 2012, he helped build the Kibera Town Centre, a major water and community education center in the middle of Kibera, Kenya, the largest slum in Africa.
He is known as one of the co-founders of NetDay in 1995, a crowd-sourced effort to bring the Internet to every school in the world. NetDay was the first large-scale crowd-sourced mass movement on the Internet. He joined the Human Needs Project in 2012 to build a networked water source and water treatment plant in the Kibera slum in Nairobi, Kenya.
For twelve years he hosted the annual JavaOne conference, bringing 20,000 Java programmers to San Francisco and establishing the Java language in over 95% of mobile devices, and as the basis of the Android operating system.
Background
Gage received his bachelor's degree in 1975 from the College of Natural Resources at the University of California, Berkeley. He also attended Harvard Kennedy School and Harvard Business School. Gage worked at Berkeley with Bill Joy, the person largely responsible for the authorship of Berkeley UNIX, also known as BSD, from which spring many modern forms of UNIX, including Solaris, FreeBSD, NetBSD, and OpenBSD. Gage helped found Sun Microsystems in 1982 with Bill Joy and others.
Gage is one of the central figures in Mark Kitchell's film Berkeley in the Sixties, recounting Berkeley's Free Speech Movement. He appears in American Stories: the American Dream: A Future Reborn 1918–1945, a five-part Discovery Channel documentary produced by Atlantic Productions.
In June 2008, Gage retired from Sun Microsystems and joined Kleiner Perkins as a venture capitalist along with Al Gore. He left Kleiner Perkins in 2010.
Gage has served on scientific advisory panels for the US National Research Council, the US National Academy of Sciences, the United Nations, the World Bank, and the World Economic Forum.
He was appointed by President Bill Clinton to the Web Based Education Commission in 2000.
He served on the US National Academy of Sciences Committee on Scientific Communication and National Security and on the Markle Foundation Task Force on National Security, whose reports aided in reorganizing US intelligence agencies after the September 11 attacks. He has served on the boards of the US National Library of Medicine, of FermiLab, the Berkeley Mathematical Sciences Research Institute, and othe
|
https://en.wikipedia.org/wiki/Scalar%20processor
|
Scalar processors are a class of computer processors that process only one data item at a time. Typical data items include integers and floating point numbers.
Classification
A scalar processor is classified as a single instruction, single data (SISD) processor in Flynn's taxonomy. The Intel 486 is an example of a scalar processor. It is to be contrasted with a vector processor where a single instruction operates simultaneously on multiple data items (and thus is referred to as a single instruction, multiple data (SIMD) processor). The difference is analogous to the difference between scalar and vector arithmetic.
The term scalar in computing dates to the 1970 and 1980s when vector processors were first introduced. It was originally used to distinguish the older designs from the new vector processors.
Superscalar processor
A superscalar processor (such as the Intel P5) may execute more than one instruction during a clock cycle by simultaneously dispatching multiple instructions to redundant functional units on the processor. Each functional unit is not a separate CPU core but an execution resource within a single CPU such as an arithmetic logic unit, a bit shifter, or a multiplier. The Cortex-M7, like many consumer CPUs today, is a superscalar processor.
Scalar data type
A scalar data type, or just scalar, is any non-composite value.
Generally, all basic primitive data types are considered scalar:
The boolean data type (bool)
Numeric types (int, the floating point types float and double)
Character types (char and string)
See also
Instruction pipeline
Parallel computing
References
Central processing unit
|
https://en.wikipedia.org/wiki/Emergency%20Response%20Information%20Network
|
The Emergency Response Information Network (ERIN), is a 24-hour hurricane TV channel set up by the Dish Network. It was formerly called the Katrina Information Network. Dish network set up the channel to provide information on missing people from Hurricane Katrina, but then changed the name before Hurricane Rita came ashore. Dish Network provides the channel free of charge to all Dish customers. Important phone numbers and other updates provided by hurricane relief agencies are shown in addition to the names of missing or dislocated children and adults.
ERIN is currently shown on channel 206, and was developed by Flying Colors Broadcasts, a Washington, D.C.-based company.
References
Disaster preparedness in the United States
Dish Network
|
https://en.wikipedia.org/wiki/Challenge%20of%20the%20Ancient%20Empires%21
|
Challenge of the Ancient Empires!, also known as Ancient Empires is an educational computer game created by The Learning Company in 1990 for both MS-DOS and Macintosh. It is designed to improve history, logic, and problem solving skills in children ages 7 to 10 (or 10 and up, according to the box art seen to the right).
Challenge of the Ancient Empires! is an adventure game whose objective is to obtain the artifacts hidden in each of the four regions. To do this, the player must navigate through cavern chambers, dodging enemies and obstacles, recovering pieces of artifacts and putting them together in a tiling puzzle in order to advance to the next level.
Gameplay
The objective of Challenge of the Ancient Empires! is to collect the hidden treasures from caverns in 4 different regions of the world: Greece and Rome, Egypt, India and China, and the Near East. Each of these caverns consists of four chambers. The decorations and artifacts in each of these chambers correlates to the region being explored. For example, the Egyptian cavern features decorations of hieroglyphs and mummies and will contain artifacts like the sphinx or the Rosetta Stone.
Additionally, each cavern has a different style of puzzle; The Near East section implements switches that move panels blocking the way, while the Egyptian section consists mainly of triangular reflectors, which the player must orient correctly to direct a light beam and trigger a switch. Greece and Rome caverns imply Greek letter coded gates that open by entering the right combination. India and China involves the manipulation of conveyor belts to advance in the proper direction. Upon successfully navigating a chamber's puzzle and collecting six pieces of the artifact, the player must then solve a puzzle by orienting and placing rectangular puzzle pieces in the proper configuration to reveal a picture of the artifact. Afterwards, he must find the exit door and solve a logic puzzle to advance to the next chamber.
The four main caverns, associated with the four regions of the world, may be played in any order. Once the player completes all four chambers in each of the four caverns, a new cavern opens. This cavern is referred to as the "Ancient World" and is composed of four new chambers. Each chamber is in the style of one of the four regions from the previous caverns. The Ancient World cavern is more difficult than the others and consists of a combination of all the puzzles in the main caverns.
The player has three items to help him navigate through each cavern's puzzles. These items include a miner's hat, a pair of special shoes, called "turbo tennies" that allow the player to jump higher, and four force fields that will protect the player from all damage for a few seconds. The miner's hat shines a beam of light used to flip switches or temporarily stun any cave animals that can cause the player damage. The Egyptian cavern has several challenges that involve rotating prisms and mirrors to deflect the l
|
https://en.wikipedia.org/wiki/Mia%20station
|
Mia Station is an underground station on the Seoul Subway Line 4. It is located in Mia-dong, Gangbuk-gu, Seoul, South Korea. Its station subname is Seoul Cyber Univ., where said university is nearby.
Station layout
Surrounding area
Seoul Cyber University
References
Seoul Metropolitan Subway stations
Railway stations in South Korea opened in 1985
Metro stations in Gangbuk District
|
https://en.wikipedia.org/wiki/Sanggye%20station
|
Sanggye Station is a station on Line 4 of the Seoul Metropolitan Subway network in Nowon-gu, Seoul. It is named after the upper valley of the Suraksan mountain nearby.
The station has 4 exits and is also connected with Daeho Department Store. The name of the subway station comes from its local name. The local name is the name of a nearby river.
Station layout
References
Metro stations in Nowon District
Seoul Metropolitan Subway stations
Railway stations in South Korea opened in 1985
|
https://en.wikipedia.org/wiki/Time%20series%20database
|
A time series database is a software system that is optimized for storing and serving time series through associated pairs of time(s) and value(s). In some fields, time series may be called profiles, curves, traces or trends. Several early time series databases are associated with industrial applications which could efficiently store measured values from sensory equipment (also referred to as data historians), but now are used in support of a much wider range of applications.
In many cases, the repositories of time-series data will utilize compression algorithms to manage the data efficiently. Although it is possible to store time-series data in many different database types, the design of these systems with time as a key index is distinctly different from relational databases which reduce discrete relationships through referential models.
Overview
Time series datasets are relatively large and uniform compared to other datasets―usually being composed of a timestamp and associated data. Time series datasets can also have fewer relationships between data entries in different tables and don't require indefinite storage of entries. The unique properties of time series datasets mean that time series databases can provide significant improvements in storage space and performance over general purpose databases. For instance, due to the uniformity of time series data, specialized compression algorithms can provide improvements over regular compression algorithms designed to work on less uniform data. Time series databases can also be configured to regularly delete (or downsample) old data, unlike regular databases which are designed to store data indefinitely. Special database indices can also provide boosts in query performance.
List of time series databases
The following database systems have functionality optimized for handling time series data.
See also
Operational historian
Delta encoding
Differential backup
References
|
https://en.wikipedia.org/wiki/Multi-mode%20optical%20fiber
|
Multi-mode optical fiber is a type of optical fiber mostly used for communication over short distances, such as within a building or on a campus. Multi-mode links can be used for data rates up to 100 Gbit/s. Multi-mode fiber has a fairly large core diameter that enables multiple light modes to be propagated and limits the maximum length of a transmission link because of modal dispersion. The standard G.651.1 defines the most widely used forms of multi-mode optical fiber.
Applications
The equipment used for communications over multi-mode optical fiber is less expensive than that for single-mode optical fiber. Typical transmission speed and distance limits are 100 Mbit/s for distances up to 2 km (100BASE-FX), 1 Gbit/s up to 1000 m, and 10 Gbit/s up to 550 m.
Because of its high capacity and reliability, multi-mode optical fiber generally is used for backbone applications in buildings. An increasing number of users are taking the benefits of fiber closer to the user by running fiber to the desktop or to the zone. Standards-compliant architectures such as Centralized Cabling and fiber to the telecom enclosure offer users the ability to leverage the distance capabilities of fiber by centralizing electronics in telecommunications rooms, rather than having active electronics on each floor.
Multi-mode fiber is used for transporting light signals to and from miniature fiber optic spectroscopy equipment (spectrometers, sources, and sampling accessories) and was instrumental in the development of the first portable spectrometer.
Multi-mode fiber is also used when high optical powers are to be carried through an optical fiber, such as in laser welding.
Comparison with single-mode fiber
The main difference between multi-mode and single-mode optical fiber is that the former has much larger core diameter, typically 50–100 micrometers; much larger than the wavelength of the light carried in it. Because of the large core and also the possibility of large numerical aperture, multi-mode fiber has higher "light-gathering" capacity than single-mode fiber. In practical terms, the larger core size simplifies connections and also allows the use of lower-cost electronics such as light-emitting diodes (LEDs) and vertical-cavity surface-emitting lasers (VCSELs) which operate at the 850 nm and 1300 nm wavelength (single-mode fibers used in telecommunications typically operate at 1310 or 1550 nm). However, compared to single-mode fibers, the multi-mode fiber bandwidth–distance product limit is lower. Because multi-mode fiber has a larger core-size than single-mode fiber, it supports more than one propagation mode; hence it is limited by modal dispersion, while single mode is not.
The LED light sources sometimes used with multi-mode fiber produce a range of wavelengths and these each propagate at different speeds. This chromatic dispersion is another limit to the useful length for multi-mode fiber optic cable. In contrast, the lasers used to drive single-mode fibers pr
|
https://en.wikipedia.org/wiki/Tibbles
|
Tibbles and Tibble may refer to:
Tibbles, a pet cat which is alleged to have wiped out Lyall's wren on Stephens Island in New Zealand
tibble, an alternative to a dataframe or datatable in the tidyverse in the R programming language
People
Thomas Henry Tibbles (1840–1928), American abolitionist, author, journalist, Indians' rights activist, and politician
Susette LaFlesche Tibbles (1854–1903), Native American lecturer, writer, and artist from the Omaha tribe in Nebraska
George Tibbles (1913–1987), American screenwriter and composer
Stephen Andrew Tibble (1953–1975), London Metropolitan Police officer who was shot and killed by Liam Quinn, a member of the IRA
Geoffrey Arthur Tibble (1909–1952), English artist
Tayi Tibble (born 1995), New Zealand poet
Characters
The Tibble twins, brothers Timmy Tommy Tibble, characters from the TV show Arthur
|
https://en.wikipedia.org/wiki/Death%20Gate
|
Death Gate is an adventure game loosely based on Margaret Weis and Tracy Hickman's fantasy book series The Death Gate Cycle. Legend Entertainment released it for MS-DOS compatible operating systems in 1994. It received several awards. The box cover is the painting that Keith Parkinson created for the third book, Fire Sea.
GOG.com released an emulated version for Microsoft Windows, macOS, and Linux in January 2018. It was removed from sale two months later.
Plot
The player takes the role of Haplo and starts in the Nexus with Lord Xar. Lord Xar tasks Haplo to visit the four worlds, Arianus, Pryan, Abarrach and Chelestra and retrieve the seal pieces of these worlds. Xar plans to undo the Sundering with the Reformation, the act of recreating the Earth again and he needs the seal pieces to do so. To travel to the other worlds, Haplo is given a ship with a magical steering stone. If the symbol of a world is magically engraved on it, the ship can travel to that world through the Death Gate. Xar gives Haplo the symbol of Arianus, the realm of air, and Haplo sets sail.
Arianus
Haplo arrives in the lower realm of Arianus, where he encounters dwarves and a machine called the Kicksey-winsey. Glowing figures attempt to operate the Kicksey-winsey, and the dwarves believe them to be gods. Haplo discovers that these figures are actually elves, and they use human slaves to operate their ship. Haplo relays a message to King Stephen, a human slave and cousin of the king. He manages to break the elves' control over the dwarves, leading to the expulsion of the elves. Haplo lures the elven ship into a human ambush and rescues the slaves.
Continuing his quest, Haplo travels to Skurvash, a smuggler's den, where he attracts the attention of Hugh the Hand and infiltrates the Brotherhood. He finds an artifact of Sartan origin, a manual for the Kicksey-winsey, and the book of Pryan in their tower. Haplo returns to the Kicksey-winsey, repairs it, and uses it to dig a tunnel to a hidden chamber. Inside, he discovers crystal coffins containing deceased Sartan. In this chamber, he finds the seal piece of Arianus.
After obtaining the seal piece, Haplo returns to the Nexus and delivers it to Xar. Xar then sends Haplo to Pryan, the realm of Fire. Haplo transfers Pryan's symbol from the book onto the steering stone and travels through the Death Gate to Pryan.
Pryan
Haplo arrives near a massive citadel but faces difficulty in entering. He encounters giant creatures known as tytans in the forest. Stranded, he sets sail for a nearby city he had spotted. There, he meets elves and joins a group of elven and human children led by the elven prince. They introduce Haplo to Zifnab, a seemingly eccentric wizard, who is revealed to be a Sartan. Zifnab senses Haplo's significance despite his Patryn heritage. He informs Haplo about the Citadel's role in generating power for the realms and the task of the tytans to operate it. The Citadel holds the seal piece of Pryan, but it can only b
|
https://en.wikipedia.org/wiki/Japanese%20input%20method
|
Japanese input methods are used to input Japanese characters on a computer.
There are two main methods of inputting Japanese on computers. One is via a romanized version of Japanese called rōmaji (literally "Roman character"), and the other is via keyboard keys corresponding to the Japanese kana. Some systems may also work via a graphical user interface, or GUI, where the characters are chosen by clicking on buttons or image maps.
Japanese keyboards
Japanese keyboards (as shown on the second image) have both hiragana and Roman letters indicated. The JIS, or Japanese Industrial Standard, keyboard layout keeps the Roman letters in the English QWERTY layout, with numbers above them. Many of the non-alphanumeric symbols are the same as on English-language keyboards, but some symbols are located in other places. The hiragana symbols are also ordered in a consistent way across different keyboards. For example, the Q, W, E, R, T, Y keys correspond to た, て, い, す, か, ん (ta, te, i, su, ka, and n) respectively when the computer is used for direct hiragana input.
Input keys
Since Japanese input requires switching between Roman and hiragana entry modes, and also conversion between hiragana and kanji (as discussed below), there are usually several special keys on the keyboard. This varies from computer to computer, and some OS vendors have striven to provide a consistent user interface regardless of the type of keyboard being used. On non-Japanese keyboards, option- or control- key sequences can perform all of the tasks mentioned below.
On most Japanese keyboards, one key switches between Roman characters and Japanese characters. Sometimes, each mode (Roman and Japanese) may even have its own key, in order to prevent ambiguity when the user is typing quickly.
There may also be a key to instruct the computer to convert the latest hiragana characters into kanji, although usually the space key serves the same purpose since Japanese writing doesn't use spaces.
Some keyboards have a mode key to switch between different forms of writing. This of course would only be the case on keyboards that contain more than one set of Japanese symbols. Hiragana, katakana, halfwidth katakana, halfwidth Roman letters, and fullwidth Roman letters are some of the options. A typical Japanese character is square while Roman characters are typically variable in width. Since all Japanese characters occupy the space of a square box, it is sometimes desirable to input Roman characters in the same square form in order to preserve the grid layout of the text. These Roman characters that have been fitted to a square character cell are called fullwidth, while the normal ones are called halfwidth. In some fonts these are fitted to half-squares, like some monospaced fonts, while in others they are not. Often, fonts are available in two variants, one with the halfwidth characters monospaced, and another one with proportional halfwidth characters. The name of the typeface with proportional
|
https://en.wikipedia.org/wiki/Monte%20Davidoff
|
Monte Davidoff (; born 1956) is an American computer programmer.
Davidoff is from Glendale, Wisconsin. He graduated from Nicolet High School in 1974, and went on to Harvard College, where he majored in applied mathematics, the department at Harvard that, at the time, included computer science. Davidoff also worked at WHRB, the college radio station, and graduated from Harvard in 1978.
A college dormmate of Bill Gates who had a summer job at Gates's new company Microsoft during college, Davidoff is best known for writing the Microsoft Binary Format floating-point arithmetic routines for Altair BASIC while he was at Harvard. The routines were subsequently reused in Microsoft BASIC products for other systems. He later worked at Honeywell Information Systems on the Multics project, Tandem Computers, Ready Systems, and Stratus Computer. Since 2000 he has consulted through his own company, Alluvial Software.
See also
Microsoft Binary Format
References
External links
Alluvial Software
2001 Interview with Davidoff in The Register
2022 Interview with Davidoff in the Floppy Days Vintage Computing Podcast
1956 births
Living people
People from Glendale, Wisconsin
American computer programmers
Harvard College alumni
Multics people
|
https://en.wikipedia.org/wiki/List%20of%20sovereign%20states%20and%20dependent%20territories%20by%20continent%20%28data%20file%29
|
The list of sovereign states and dependent territories by continent data file is a plain text format describing the list of countries by continent, suitable for automated processing.
Format
Data file
Note: This data was compiled by hand and may contain mistakes. One small modification is that the various "insular areas of the United States" listed above are recorded here as the single "United States Minor Outlying Islands" in Oceania.
See also
List of sovereign states and dependent territories by continent
List of countries and capitals in native languages
List of national capitals
Gallery of sovereign state flags
Gallery of dependent territory flags
References
External links
UN List of Territories
CIA – The World Factbook
European Commission: List of countries, territories and currencies
Administrative Divisions of Countries ("Statoids")
Data file
States (data file), list
|
https://en.wikipedia.org/wiki/VOLMET
|
VOLMET (French origin vol (flight) and météo (weather report)), or meteorological information for aircraft in flight, is a worldwide network of radio stations that broadcast TAF, SIGMET and METAR reports on shortwave frequencies, and in some countries on VHF too. Reports are sent in upper sideband mode, using automated voice transmissions.
Pilots on international routes, such as North Atlantic Tracks, use these transmissions to avoid storms and turbulence, and to determine which procedures to use for descent, approach, and landing.
The VOLMET network divides the world into specific regions, and individual VOLMET stations in each region broadcast weather reports for specific groups of air terminals in their region at specific times, coordinating their transmission schedules so as not to interfere with one another. Schedules are determined in intervals of five minutes, with one VOLMET station in each region broadcasting reports for a fixed list of cities in each interval. These schedules repeat every hour.
An aircraft in flight can obtain by VOLMET the Aviation routine weather reports (METAR) of specific airports.
See also
Automatic Terminal Information Service (ATIS)
External links
VOLMET station frequencies
VOLMET station schedules
Aviation meteorology
|
https://en.wikipedia.org/wiki/List%20of%20World%20Series%20broadcasters
|
The following is a list of national American television and radio networks and announcers that have broadcast World Series games over the years, as well as local flagship radio stations that have aired them since 1982.
Television
Television coverage of the World Series began in 1947. Since that time, eight different men have called eight or more different World Series telecasts as either a play-by-play announcer or color commentator. They are (through 2023) Joe Buck (24), Tim McCarver (24), Curt Gowdy (12), Mel Allen (11), Vin Scully (11), Joe Garagiola (10), Tony Kubek (8), Al Michaels (8), and John Smoltz (8).
2020s
Per the current broadcast agreement, the World Series will be televised by Fox through 2028.
2010s
Notes
2010 – For the second consecutive year, World Series games had earlier start times in hopes of attracting younger viewers. First pitch was just before 8 p.m. EDT for Games 1–2, and 5, while Game 3 started at 7 p.m. EDT. Game 4, however, started at 8:22 p.m. EDT to accommodate Fox's football coverage of the game between the Tampa Bay Buccaneers and Arizona Cardinals. Many viewers in the New York City and Philadelphia markets were unable to watch Games 1 and 2 because News Corporation, Fox's parent company, pulled WNYW and WTXF from cable provider Cablevision on October 16 because of a carriage dispute. The agreement was reached just before Game 3.
MLB International syndicated its own telecast of the series, with announcers Gary Thorne and Rick Sutcliffe, to various networks outside the U.S. ESPN America broadcast the series live in the UK and in Europe. Additionally, the American Forces Network and Canadian Forces Radio and Television carried the games to U.S. and Canadian service personnel stationed around the globe. Fox Deportes carried the Series in Spanish on American cable and satellite TV.
The overall national Nielsen rating for the five games was 8.4, tied with the 2008 World Series for the event's lowest-ever TV rating. Game 4 was beaten in the ratings by a Pittsburgh Steelers–New Orleans Saints game on NBC Sunday Night Football, the first time a World Series game was outdrawn by a regular-season NFL contest airing in the same time slot.
The 2011 World Series was televised in the United States and Canada by Fox. Joe Buck called play-by-play on his 14th World Series for the network, dating back to , while color analyst Tim McCarver handled his 22nd World Series since . Ken Rosenthal served as field reporter for the games, while Chris Rose hosted the pregame and postgame coverage with analysts A. J. Pierzynski and Eric Karros.
MLB International syndicated television coverage of the 2011 World Series (with Gary Thorne and Rick Sutcliffe announcing) to viewers outside of North America.
In the United States, Fox televised the 2012 World Series, with Joe Buck calling play-by-play in his 15th World Series, and Tim McCarver handling color commentary for his 23rd World Series. Ken Rosenthal also appeared on the Fox telecasts a
|
https://en.wikipedia.org/wiki/Community%20television%20in%20Canada
|
Community television in Canada is a form of media that carries programming of local community interest produced by a cable television company and by independent community groups and distributed by a local cable company.
A community channel is a form of community television, much like public-access television cable TV in the United States and other forms of citizen-produced content. The provision of a community channel is required by CRTC regulations governing the licensing of cable companies. Cable companies are required to allocate a small percentage of cable subscription revenues for the provision of a community channel. As of 2009, this amounted to over $116 million annually in Canada. The community channel is viewed as a public trust that the cable companies manage on behalf of the Canadian public.
In 2016, the CRTC enacted rules allowing television providers in metropolitan markets (population of 1 million or higher) to allocate the required investment to the local news departments of a co-owned terrestrial television station instead, in lieu of operating a community channel. In the wake of the changes, Rogers Cable and Shaw Cable began to wind down their community channels in larger regions to take advantage of this policy. Community television services remain mandatory among television providers in smaller markets (or if not co-owned by a local owner of broadcast stations).
History
In Canada, citizen media has roots going back to 1922 when filmmaker Robert Flaherty brought in an Inuit hunter to participate in Nanook of the North. In the 1960s this film was cited as an inspiration by a group of filmmakers associated with the National Film Board of Canada, whose Challenge for Change project was part of Canada's War on Poverty. In 1967 Challenge for Change contributed to a prototype studio where people were free to help shape community media. More public access experiments followed. The Canadian Radio-television and Telecommunications Commission required cable companies to provide public access on July 16, 1971.
In 1997, the CRTC deregulated community television in Canada, causing a protracted period of political tension between cable companies and community groups. After complaints to the CRTC from the Canadian public, a policy review process was initiated, culminating in CRTC Decision 2002-61, a reinvigoration of the participatory elements of the community channel. Under 2002-61, community channels can be run by independent community groups, and up to one-half of the channel must be made available for independent community producers.
In 2016, the CRTC enacted a policy stating that a television provider which also owns television stations within a metropolitan market they serve (defined as having a population higher than 1 million) can re-allocate funding normally devoted to community television to support the news departments of their local broadcast television stations. Subsequently, Shaw Communications announced in April 2017 that i
|
https://en.wikipedia.org/wiki/SDTI
|
SDTI may stand for:
Serial Data Transport Interface, a way of transmitting data packets
San Diego Trolley, Inc., an American public transport operator
Suspected deep tissue injury, a medical abbreviation
|
https://en.wikipedia.org/wiki/ICAP
|
ICAP may refer to:
Computers
ICAP/4, analog circuit emulation software
Internet Content Adaptation Protocol, a lightweight HTTP-like protocol
Inter exchange Client Address Protocol for Ethereum platform
Organizations
ICAP at Columbia University, a support center for support of HIV/AIDS prevention and treatment
Institute of Chartered Accountants of Pakistan, a professional accountancy body in Pakistan
International Carbon Action Partnership, an international cooperative forum
International Center for Alcohol Policies; see International Alliance for Responsible Drinking
Institute for Constitutional Advocacy and Protection at Georgetown University Law Center
Businesses
TP ICAP, professional intermediaries in financial, energy and commodities markets
ICAP plc, a UK-based money broker now known as NEX Group
Other uses
ICAP Leopard 3 (yacht), a 30-metre IRC maxi yacht
Improved Capability, upgrades to the Northrop Grumman EA-6B Prowler
Installed capacity requirement for maintaining resource adequacy in the electrical grid
See also
ICAAP, International Consortium for the Advancement of Academic Publication
|
https://en.wikipedia.org/wiki/Pursuit%20Force
|
Pursuit Force is an action game developed by Bigbig Studios and published by Sony Computer Entertainment for the PlayStation Portable in 2005. The game places the player in the role of a police agent who is a member of the titular elite law enforcement agency that specialises in direct armed encounters with adversaries, whether it be on foot or on the bonnet of a speeding car. The player has to try to seize cars and motorbikes while engaging in high-speed chases and gun battles against heavily armed gangs.
On 16 May 2023, Pursuit Force was made available on Playstation 4 and Playstation 5 as part of the Classics Catalogue.
A sequel titled Pursuit Force: Extreme Justice was released in 2007.
Gameplay
There are a total of 30 missions, six per gang, involving fighting enemies on foot, in a speedboat and a car/motorcycle chases, or in a helicopter while manning a minigun. The player character can leap into enemy vehicles and commandeer them after shooting their occupants. The player can earn different ranks which unlock different content while completing missions will unlock new ranks which will unlock new gang missions and different abilities to help make the game easier, such as regenerating health.
The game also includes a race mode with several different courses and scenarios and a time trial mode, setting the player across all the games' tracks. These two modes are completely independent of each other and will not help nor hinder the gameplay of the other game modes. There is also a wide variety of unlockable content such as pictures and videos to access. The amount of content to unlock, however, is completely dependent on the scores in the career mode.
Plot
The Pursuit Force has been organised to destroy the threat posed by gangs responsible for many vehicle-related crime sprees across Capital State and to eliminate their leaders:
Capelli Family: One of the two gangs that are initially available at the start of the game, the Capellis are Capital State's most powerful Mafia family headed up by Don Capelli, and are said to be the state's oldest gang. The other significant member of the Capelli Family is their best sniper Stefano De Tomaso, also known as "Deadeye".
Warlords: The second of the two gangs available at the start of the game, the Warlords are a group of mercenaries and rogue soldiers who feel that they were betrayed by the military. They focus primarily on hijacking military hardware and are led by "The General", with the other significant member of the gang being Lieutenant Davies.
Convicts: The Convicts are a group of psychotic prison escapees who have broken out of prison to cause as much chaos as they can around Capital State and are about to flee the city so they can wreak havoc on a much larger scale. Their leader is a gigantic criminal known only as "Hard Balls", while the other significant member of the Convicts is an insane pyromaniac named Billy Wilde.
Vixens: The Vixens are an all-female group of professional thieves
|
https://en.wikipedia.org/wiki/Jegi-dong%20station
|
Jegi-dong Station is a station on Line 1 on the Seoul Subway network.
This station is very close to the site of the former Seongdong Station, the original western terminus of the Gyeongchun Line from 1939 to 1971. Only a moments walk from the station is Gyeongdong Market, a large, well known medicinal market, and the Seoul Yangnyeongsi Herb Medicine Museum, a free museum dedicated to educating visitors about traditional Korean medicine.
Station layout
References
Metro stations in Dongdaemun District
Seoul Metropolitan Subway stations
Railway stations opened in 1974
Railway stations in South Korea opened in the 1970s
|
https://en.wikipedia.org/wiki/Piggybacking%20%28data%20transmission%29
|
In two-way communication, whenever a frame is received, the receiver waits and does not send the control frame (acknowledgment or ACK) back to the sender immediately. The receiver waits until its network layer passes in the next data packet. The delayed acknowledgment is then attached to this outgoing data frame. This technique of temporarily delaying the acknowledgment so that it can be hooked with next outgoing data frame is known as piggybacking.
Working principle
Piggybacking data is a bit different from sliding window protocols used in the OSI model. In the data frame itself, we incorporate one additional field for acknowledgment (i.e., ACK).
Whenever party A wants to send data to party B, it will carry additional ACK information in the PUSH as well.
For example, if A has received 5 bytes from B, with a sequence number starting from 12340 (through 12344), A will place "ACK 12345" as well in the current PUSH packet to inform B it has received the bytes up to sequence number 12344 and expects to see 12345 next time. (ACK number is the next sequence number of the data to be pushed by the other party.)
Three rules govern the piggybacking data transfer.
If station A wants to send both data and an acknowledgment, it keeps both fields there.
If station A wants to send the acknowledgment, after a short period of time to see whether a data frame needs to be sent, then decide whether send an ACK frame alone or attach a data frame with it.
If station A wants to send just the data, then the previous acknowledgment field is sent along with the data. Station B simply ignores this duplicate ACK frame upon receiving.
Advantages and disadvantages
Advantages:
Improves the efficiency
Usage cost reduction
Improves latency of data transfer
Better use of available channel bandwidth.
Disadvantages: The receiver can jam the service if it has nothing to send. This can be solved by enabling a counter (receiver timeout) when a data frame is received. If the count ends and there is no data frame to send, the receiver will send an ACK control frame. The sender also adds a counter (emitter timeout). If the counter ends without receiving confirmation, the sender assumes packet loss, and sends the frame again.
References
Data transmission
|
https://en.wikipedia.org/wiki/People%27s%20Television%20Network
|
People's Television Network (; abbreviated PTV) is the flagship state broadcaster owned by the Government of the Philippines. Founded in 1974, PTV is the main brand of People's Television Network, Inc. (PTNI), one of the attached agencies under the Presidential Communications Office (PCO).
PTV, along with government-owned media companies Intercontinental Broadcasting Corporation and the Presidential Broadcast Service-Bureau of Broadcast Services, forms the media arm of the PCO and acts as a primary state television broadcaster that focuses on news, information and public service programming. Its head office, studios and transmitter are located at Broadcast Complex, Visayas Avenue, Barangay Vasra, Diliman, Quezon City.
As a government-run station, PTV receives funding from the General Appropriations Act (Annual National Budget) and sales from blocktimers and advertisers, among others. PTV also runs a former Muslim-oriented digital television channel Salaam TV.
History
In 1961, the Philippine government, through the Philippine Broadcasting Service established a government TV station called DZFM-TV Channel 10 which it time-shared with two other organizations. It was financed by government subsidy; the channel did not last long because of frequency allocation.
On September 28, 1972, after declaring martial law in the Philippines, Marcos ordered the takeover of ABS-CBN Corporation and turned over its facilities to Kanlaon Broadcasting System (KBS), controlled by Marcos crony Roberto Benedicto. ABS-CBN's facilities were later transferred from KBS to the government-owned Maharlika Broadcasting System. Under the Marcos dictatorship, crony-owned media companies broadcast or published news and entertainment meant to project a positive image for the dictatorship and conceal its abuses.
The country's government television network began operations on February 2, 1974, as Government Television (GTV-4), a division of the National Media Production Center. The government channel was first headed by Lito Gorospe and later by Press Secretary Francisco Tatad. It was first headquartered in the Solana Building in Intramuros, Manila and later relocated to the ABS-CBN Broadcasting Center in Bohol Avenue, Quezon City. In 1976, it began color broadcasts, the last national network to do so, when it became the long time home of the Philippine Basketball Association for almost two decades.
GTV was renamed Maharlika Broadcasting System (MBS) in 1980 under the leadership of Minister of Information Gregorio Cendaña. By then, it began expanding with the opening of provincial stations nationwide, including 3 stations in Cebu, Bacolod, and Davao who once owned by pre-martial law ABS-CBN.
MBS-4 was captured by rebel soldiers during the 1986 People Power Revolution. It was, during that very historic event in national history, initially called as New TV 4 but later rebranded as People's Television (PTV) two months later in April. Broadcasters Tina Monzón-Palma and José Mari
|
https://en.wikipedia.org/wiki/Intercontinental%20Broadcasting%20Corporation
|
Intercontinental Broadcasting Corporation (IBC) is a Philippine free-to-air television and radio network based in Quezon City. It is a state broadcaster owned by the Government Communications Group under the Presidential Communications Office (PCO). IBC is also commonly referred to as "The Kaibigan Network", the Filipino term for "friend", which was introduced in 2019.
IBC, along with government-owned media companies People's Television Network and the Presidential Broadcast Service-Bureau of Broadcast Services, form the media arm of the PCO and it is designated as a secondary state broadcaster that primarily broadcasts education, culture, arts and sports programming. Its studios, offices and broadcast facilities are located at the IBC Compound, Lot 3-B, Capitol Hills Drive cor. Zuzuarregui Street, Barangay Matandang Balara, Diliman, Quezon City.
History
The beginnings
Inter-Island Broadcasting Corporation was established on October 1, 1959, when DZTV Channel 13 in Manila aired its test broadcast. On March 1, 1960, at 6:30 pm, DZTV-TV 13 was finally launched and it became as the third television station in the country after the monopoly of DZAQ-TV of ABS and DZXL-TV of CBN owned by the Lopez family's Bolinao Electronics Corporation (now ABS-CBN Corporation). Its original location was at the corner of P. Guevara St. (formerly Little Baguio) in San Juan from 1960 to 1978. American businessman Dick Baldwin was the station's first owner and programming consisted of mostly foreign programs from American television network CBS and a few local shows.
Andrés Soriano, Sr. of San Miguel Corporation acquired the network in 1962. Soriano was also the majority owner of the Radio Mindanao Network (RMN) and The Philippine Herald newspaper. Soriano's combined media interests formed the first tri-media organization in the Philippines. As the television arm of the RMN, it partnered with the RMN radio stations for coverage of the general elections of 1969 and 1971. The station built relay transmitters to bring its programs to viewers in Cebu and Davao, with plans to open more in other cities.
Between 1970 and 1972, IBC launched its color transmission system, Vinta Color, named after the vintas from Zamboanga, becoming the third network in the Philippines to convert to all-color broadcasts, after ABS-CBN and KBS. In September 1972, President Ferdinand Marcos declared martial law for the entire country, forcing all television and radio networks (except KBS which was owned by Roberto Benedicto) to be shut down by the government. A few months later, IBC was allowed by the government to return to the air.
ABS-CBN veteran Ben Aniceto became the station manager of DZTV Channel 13 from 1973 to 1976.
The Benedicto years
On February 1, 1975, the network was acquired by Roberto Benedicto (who also owned Radio Philippines Network and Banahaw Broadcasting Corporation) from the Soriano group due to a constitutional limitation prohibiting the ownership of media by non-Fil
|
https://en.wikipedia.org/wiki/Ulster%20Clubs
|
The Ulster Clubs was the name given to a network of Unionist organisations founded in Northern Ireland in November 1985. Emerging from an earlier group based in Portadown, the Ulster Clubs briefly mobilised wide support across Northern Ireland and sought to coordinate opposition to the development of closer relations between the governments of the United Kingdom and Ireland. The group's motto was "hope for the best and prepare for the worst".
Origins
The movement had its origins in the Portadown Action Committee, a group established in the County Armagh town during the middle of 1985 to oppose plans to reroute the traditional 12 July Orange Order parades away from nationalist areas of the town. This group was reconstituted as a wider umbrella movement, the United Ulster Loyalist Front (UULF) not long after the Twelfth. Leadership of the group rested with Alan Wright, a member of the Salvation Army, whose policeman father had been murdered by the Irish National Liberation Army in 1979.
The UULF was given the support of the paramilitary Ulster Defence Association (UDA) with South Belfast Brigade chief and UDA deputy leader John McMichael being appointed to the group's coordinating committee. Following the signing of the Anglo-Irish Agreement in November 1985 by Margaret Thatcher and Garret FitzGerald, the UULF organised a rally in Belfast in opposition to the agreement. Those in attendance dressed in combat clothes with dark glasses and slouch hats, indicating the support the group had secured from the UDA as well as the Ulster Volunteer Force (UVF).
Development
After an initial flurry of activity, the UULF, which was a loose alliance at best, ground to a halt. However, the movement was given a new lease of life when a meeting was held at the Ulster Hall on 1 November at which the formation of a more formalised arrangement, the Ulster Clubs, was announced. A network of clubs was to be established across Northern Ireland with the aim, according to Ian S. Wood, of working to uphold "equal citizenship" and "fight the erosion of their Protestant heritage". Before long 88 clubs had been established, with around 20,000 members listed as having joined. The new name was chosen in homage to a similarly titled network established by Edward Carson during the crisis surrounding the Government of Ireland Act 1914.
Wright hoped that the Ulster Clubs could organise a widespread campaign of civil disobedience that would make Northern Ireland ungovernable and endorsed such initiatives as the mass resignation of Unionist MPs and a Day of Action held on 3 March 1986, which featured mass protest marches and strike action. Individual members of the Ulster Clubs also became involved in Peter Robinson's ill-fated attempt to launch an "invasion" of southern Ireland on 7 August 1986, when he led a group of supporters into Clontibret in County Monaghan. Andrew Park of Lisburn was deputy leader and took up the reins of the movement when Alan Wright was hospitalised and t
|
https://en.wikipedia.org/wiki/Memory%20mapping
|
In computing, memory mapping may refer to:
Memory-mapped file, also known as mmap()
Memory-mapped I/O, an alternative to port I/O; a communication between CPU and peripheral device using the same instructions, and same bus, as between CPU and memory
Virtual memory, technique which gives an application program the impression that it has contiguous working memory, while in fact it is physically fragmented and may even overflow on to disk storage
See also
Port-mapped I/O, a method complementary to Memory-mapped I/O
|
https://en.wikipedia.org/wiki/Mathematica%20Inc.
|
Mathematica Inc., formerly Mathematica Policy Research, is an American research organization and consulting company headquartered in Princeton, New Jersey. The company provides data science, social science, and technological services for social policy initiatives. Mathematica employs approximately 1,600 researchers, analysts, technologists, and practitioners in nine offices across the United States: Princeton, New Jersey; Cambridge, Massachusetts; Chicago, Illinois; Washington, DC; Ann Arbor, Michigan; Seattle, Washington; Woodlawn, Maryland; Tucson, Arizona and Oakland, California. In 2018, the company acquired EDI Global, a data research company based in the United Kingdom and Africa. Mathematica's clients include federal agencies, state and local governments, foundations, universities, private-sector companies, and international organizations.
History
Samuel G. Barton founded the Industrial Surveys Company in the late 1930s. His company later became Market Research Corporation of America. The latter formed a unit named Mathematica, which in 1969 "was spun off ... to allow for faster growth." Oskar Morgenstern was the first chairman of Mathematica, Inc.
Mathematica had three divisions:
Mathematica Products Group – best known for developing RAMIS (software).
MathTech, the company's technical and economic consulting group – "research projects and computer systems other than Ramis.".
Mathematica Policy Research (MPR). This unit's strength was in "social experiments and surveys." In 1983 MPR reported "a major survey assignment for the American Medical Association."
A quarter of a century after Mathematica's founding, it "was largely owned by a group of professors in Mathematics and Economics at Princeton University ... as this group aged, they opted to cash out by selling." The result was a 3-way split:
Mathematica, now employee-owned, is the only unit still carrying the Mathematica name.
Mathematica Products Group was sold in 1983, eventually becoming part of Computer Associates.
MathTech was described as "a Washington-area educational consulting firm shortly after becoming, in 1986, an employee-owned company.
Research
In 1968, the pre-split Mathematica company conducted the first social policy experiment in the United States, the New Jersey Income Maintenance Experiment (an experimental study of a negative income tax), to test ways of encouraging low-income individuals to work.
In 1975, it was incorporated under its present name, as part of Mathematica, Inc. In 1986, the firm became employee-owned, and the only firm using the Mathematica name.
MPR became known for its large-scale random assignment evaluations of policies and programs such as abstinence education and Job Corps.
Research centers
In early 1995, Mathematica formed a research affiliate, the Center for Studying Health System Change, which provides objective analyses of how the country’s changing health care system affects individuals and families.
In 2007, the company la
|
https://en.wikipedia.org/wiki/Network-to-network%20interface
|
In telecommunications, a network-to-network interface (NNI) is an interface that specifies signaling and management functions between two networks. An NNI circuit can be used for interconnection of signalling (e.g., SS7), Internet Protocol (IP) (e.g., MPLS) or ATM networks.
In networks based on MPLS or GMPLS, NNI is used for the interconnection of core provider routers (class 4 or higher).
In the case of GMPLS, the type of interconnection can vary across Back-to-Back, EBGP or mixed NNI connection scenarios, depending on the type of VRF exchange used for interconnection. In case of Back-to-Back, VRF is necessary to create VLANs and subsequently sub-interfaces (VLAN headers and DLCI headers for Ethernet and Frame Relay network packets) on each interface used for the NNI circuit. In the case of eBGP NNI interconnection, IP routers are taught how to dynamically exchange VRF records without VLAN creation.
NNI also can be used for interconnection of two VoIP nodes. In cases of mixed or full-mesh scenarios, other NNI types are possible.
NNI interconnection is encapsulation independent, but Ethernet and Frame Relay are commonly used.
See also
User–network interface
Asynchronous Transfer Mode
References
Network management
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.