source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Human%20rights%20in%20Japan
Japan is a constitutional monarchy. The Human Rights Scores Dataverse ranked Japan somewhere the middle among G7 countries on its human rights performance, below Germany and Canada and above the United Kingdom, France, Italy, and the United States. The Fragile States Index ranked Japan second last in the G7 after the United States on its "Human Rights and Rule of Law" sub-indicator. According to the statistics of the Ministry of Justice (MOJ) for 2022, the MOJ human rights organs received 159,864 consultations on human rights violations, completed 7,627 cases of remedial measures for victims, and initiated 7,859 cases of remedial measures. Of the cases in which the MOJ completed redress for victims, the largest number of cases related to discriminatory treatment were for discriminated burakumin (406 cases), followed by the physically disabled, the sick, foreign residents, women, the elderly, and gender identity. Of the cases in which the MOJ initiated redress for victims, 18.6% involved privacy violations, 14.5% involved labor rights, 13.3% involved school bullying, 12.8% involved assault and abuse, and 10.2% involved extortion and coercion. According to the MOJ, the number of human rights violations has decreased from year to year, but the number of cases of school bullying and human rights violations on the Internet remained high. Foreigners in Japan may face human-rights violations that Japanese citizens do not. In recent years, Western media has reported that Japanese firms frequently confiscate the passports of guest workers in Japan, particularly unskilled laborers from the Philippines and other poorer Asian countries. Major issues Article 14 of the Japanese Constitution guarantees equality between the sexes. The percentage of women in full-time jobs grew steadily during the 1980s and early 1990s. The Diet's passage of the Law for Equal Opportunity in Employment for Men and Women in 1985 is of some help in securing women's rights, even though the law is a "guideline" and entails no legal penalties for employers who discriminate (see Working women in Japan). Japan has a conviction rate of over 99%. In several cases, courts have acknowledged confessions were forced and released those imprisoned. To combat this, a law was passed in 2016 requiring some interrogations to be videotaped. However, this only applies to people accused of serious crimes, such as murder, arson and kidnapping, which make up only 3% of cases. In common law countries which practice trial by jury, a high conviction rate may indicate that defendants are not receiving a fair trial. Sometimes Japanese prosecutors decide not to prosecute in the case of minor crimes or when there is a high possibility of innocence. Some Japanese researchers believe that is one of the causes of the high conviction rate in Japan. The prosecution rate in Japan is 33.4%. 64.3% was not pursued. Japan also practices the death penalty, to which the U.N. objects, as do several prominent NGOs and
https://en.wikipedia.org/wiki/Internet%20Authentication%20Service
Internet Authentication Service (IAS) is a component of Windows Server operating systems that provides centralized user authentication, authorization and accounting. Overview While Routing and Remote Access Service (RRAS) security is sufficient for small networks, larger companies often need a dedicated infrastructure for authentication. RADIUS is a standard for dedicated authentication servers. Windows 2000 Server and Windows Server 2003 include the Internet Authentication Service (IAS), an implementation of RADIUS server. IAS supports authentication for Windows-based clients, as well as for third-party clients that adhere to the RADIUS standard. IAS stores its authentication information in Active Directory, and can be managed with Remote Access Policies. IAS first showed up for Windows NT 4.0 in the Windows NT 4.0 Option Pack and in Microsoft Commercial Internet System (MCIS) 2.0 and 2.5. While IAS requires the use of an additional server component, it provides a number of advantages over the standard methods of RRAS authentication. These advantages include centralized authentication for users, auditing and accounting features, scalability, and seamless integration with the existing features of RRAS. In Windows Server 2008, Network Policy Server (NPS) replaces the Internet Authentication Service (IAS). NPS performs all of the functions of IAS in Windows Server 2003 for VPN and 802.1X-based wireless and wired connections and performs health evaluation and the granting of either unlimited or limited access for Network Access Protection clients. Logging By default, IAS logs to local files (%systemroot%\LogFiles\IAS\*) though it can be configured to log to SQL as well (or in place of). When logging to SQL, IAS appears to wrap the data into XML, then calls the stored procedure report_event, passing the XML data as text... the stored procedure can then unwrap the XML and save data as desired by the user. History The initial version of Internet Authentication Service was included with the Windows NT 4.0 Option Pack. Windows 2000 Server's implementation added support for more intelligent resolution of user names that are part of a Windows Server domain, support for UTF-8 logging, and improved security. It also added support for EAP Authentication for IEEE 802.1x networks. Later on it added PEAP (with service Pack 4). Windows Server 2003's implementation introduces support for logging to a Microsoft SQL Server database, cross-forest authentication (for Active Directory user accounts in other Forests that the IAS server's Forest has a cross-forest trust relationship with, not to be confused with Domain trust which has been a feature in IAS since NT4), support for IEEE 802.1X port-based authentication, and other features. All versions of IAS support multi domain setups. Only Windows Server 2003 supports cross forest. While NT4 version includes a Radius Proxy, Windows 2000 didn't have such a feature. Windows Server 2003 reintroduced the feature
https://en.wikipedia.org/wiki/Matru%20Sewa%20Sangh
Matru Sewa Sangh is an Indian non-profit organisation founded in 1921, by Kamalatai Hospet and Venutai Nene in Nagpur, Maharashtra. It runs a network of sites dedicated to providing health services to the poor, including a maternity hospital, school for mentally retarded, home for the aged, child adoption services, working women's hostel and family counseling center. It also runs the Institute of Social Work, affiliated with Nagpur University, which provides adult education and development programmes. Matru Sewa Sangh was founded by Kamalatai Hospet (1896–1981) and Venutai Nene (1896–1973). Recognition The leaders of Indian society, such as Jawaharlal Nehru and Indira Gandhi, among others, recognised Matru Sewa Sangh's work over the course of its existence. Awards to the organisation and its staff include: 1961 Padma Shri, Government of India: Kamalatai Hospet 1961 Nalava Best Nurse Award, Red Cross Society: Krishnatai Bhave 1980 Jamnalal Bajaj Award, Bajaj Foundation: Kamalatai Hospet 1994 Platinum Jubilee Endowment Trust Award, Indian Merchants' Chamber, Bombay: Matru Sewa Sangh, Nagpur 1996 Sir Arthur Eyre Brook International Award, World Orthopaedic Concern, Amsterdam: Dr Vikram Marwah Maternity hospitals The organisation has 12 maternity hospitals in the states of Maharashtra and Madhya Pradesh. Founded in 1921, the original hospital at Nagpur now provides 75 beds and a range of out-patient clinics. It is a government-recognised facility for training house officers and for medical fee reimbursement. Services include family planning, antenatal and postnatal care, premature baby care, a well-baby clinic with a neonatal intensive care unit (NICU), cancer detection, orthopaedics, and homeopathy and ayurvedic clinics. The hospital has an outreach vehicle taking family planning services to outlying areas. Matru Sewa Sangh Institute of Social Work The MSS Institute of Social Work was founded in 1921, is the first Institute of Social Work in Vidarbha and provides Social Work Education in Nagpur for both men and women. It also runs Field Action Projects and programmes in the slums and in rural areas. In conjunction with Nagpur University it grants bachelor's and master's degrees in social work, M.Phil (Social Work) and PhD programme in Social Work. It is a NAAC accredited A grade college with its own spacious campus in Bajaj Nagar, Nagpur. The Institute also collaborates with the Tata Institute of Social Sciences (Deemed University), Mumbai, for running Bachelor of Vocation courses in Child Care, Child Protection and Geriatric Care. Snehangan This residential school for physically handicapped children is a project by Matru Sewa Sangh for Physically Handicapped Students. This institute aims at the Rehabilitation of the children by providing them medical attention & education simultaneously. Other organisations In 1971, Kamalatai Hospet also co-founded Vidya Shikshan Prasarak Manda, which now has more than fifty educational institutes. Refe
https://en.wikipedia.org/wiki/Autoroutes%20of%20France
The autoroute (, highway or motorway) system in France consists largely of toll roads (76% of the total). It is a network of of motorways as of 2014. On road signs, autoroute destinations are shown in blue, while destinations reached through a combination of autoroutes are shown with an added autoroute logo. Toll autoroutes are signalled with the word péage (toll or toll plaza). Length Numbering scheme Unlike other motorway systems, there is no systematic numbering system, but there is a clustering of Autoroute numbers based on region. A1, A3, A4, A5, A6, A10, A13, A14, A15, A16 radiate clockwise from Paris, with A2, A11, and A12 branching from A1, A10, and A13, respectively. A7 begins in Lyon, where A6 ends. A8 and A9 begin from the A7. The 20s are found in northern France. The 30s are found in eastern France. The 40s are found near the Alps. The 50s are in the southeast, near the French Riviera . The 60s are found in southern France. The 70s are found in the center of the country. The 80s are found in western France. Named routes Autoroutes are often given a name, even if these are not very used: A1 is the autoroute du Nord (Northern motorway). A4 is the autoroute de l'Est (Eastern motorway). A6 and A7 are autoroutes du Soleil (Motorways of the Sun), as both lead from northern France to the sunny beach resorts of southern France. A8 is named La provençale as it cross the geographical region of Provence. A9 is named La Languedocienne as it crosses the geographic region of Languedoc and also La Catalane because it leads to the region Catalonia in Spain A10 is named L'Aquitaine because it leads to Bordeaux and the region Nouvelle-Aquitaine. A11 is named L'Oceane because it leads to the Atlantic Ocean (Nantes) A13 is named the autoroute de Normandie as it traverses the region Normandy. A16 is named L'Européenne (the European) because it connects Paris with several European destinations such as the Belgium–France border, as well as Calais, which is connected with England. A20 is named L'occitane as it leads to the region Occitanie in south-west France. A21 is named the rocade minière (mining road) because it crosses the Nord-Pas de Calais Mining Basin, the largest mining stub in France. A26 is named the autoroute des Anglais (motorway of the English) as it connects Calais, the main point of arrival for cars and lorries from the UK, before continuing to Troyes, and through the Champagne region, whose wines are loved by the British. In addition, it passes near the sites of the most famous battles fought by the British Army in World War I, such as Arras, Cambrai, and the Somme and not far from Ypres and Mons in Belgium. It also passes sites of earlier UK interest such as Crecy and The Field of the Cloth of Gold. A35 is called l'Alsacienne or autoroute des Cigognes (Storks' motorways) as it passes only through the historical region of Alsace, for whom storks are a cultural symbol A36 is called la Comtoise after the old region Franche Comté A40
https://en.wikipedia.org/wiki/Dragons%3A%20Fire%20and%20Ice
Dragons: Fire & Ice is a 2004 computer-animated fantasy adventure film and the first of a two-part series based on the Mega Bloks toyline. The film was released directly to DVD in 2004, but also aired on Jetix in September 2005. The story concerns two unlikely heroes, Prince Dev of the Norvagen and Princess Kyra of the Draigar. These two band together along with their dragons, Targon and Aurora, to help save Dragon World and their world from evil. A sequel, Dragons II: The Metal Ages, was released in 2005. Plot The movie starts with the history of how mighty fire-breathing dragons came to be. The dragons and their crystals of tremendous power came to the human world through a portal from their world of the dragons. But while the dragons brought knowledge and wanted only peace, the human kingdoms of Norvagen and Draigar wanted war and, having misused the knowledge brought by the dragons, battled erupted. Thoron, the Dragon King and holder of the legendary Aurathon crystal, appointed Xenoz the wizard as an ambassador for both the dragons and the two kingdoms with gifts of immortality and power and strength over all of the dragon crystals. However, when things started looking good, an evil force came upon the land and killed the Dragon Queen and took her ice crystal. After this, The Dragon King and many followers returned to their world, vowing to return only after the war had ended. In the present day, King Olsef of the Norvagen Kingdom is giving his eight-year-old son, Prince Dev, some practice for battle while expressing his hatred for the Draigar, who he believes hunted the remaining dragons to near-extinction. While Dev's practice shows him to be too impulsive, Olsef believes nevertheless that he is ready to begin riding on Targon, the only dragon that they have left. During this time, Xenoz arrives and gives Dev his blessing. Meanwhile, in the Draigar kingdom, King Siddari is training Princess Kyra in the same form and blames the Norvagen for the disappearances of the dragons. Xenoz comes by to give the same blessing he gave to Dev so that Kyra can begin flying on the Draigar's last dragon, Aurora. During the flight, the dragons are drawn to a fireball in the sky where a portal opens and a black dragon on fire falls through, knocking the dragons and royals into an old battle field. The black dragon absorbs a bright green crystal on its neck and marks both the children with his mystical teardrops, disappearing into the ground soon after. As Dev and Kyra prepare to fight, their fathers appear and duel. While Dev and Kyra are taken away by their dragons, Xenoz watches through his scrying crystal, stating that the battle begins again. Eight years later, Dev and Kyra are both sixteen-year-old teenagers with strange abilities and want the war to end, but their fathers object to their ideas on how it should. They both violate orders and continue with their ideas anyway, catching the eye of Xenoz in the process. The two royals fight until their fa
https://en.wikipedia.org/wiki/Descriptor
Descriptor may refer to: An identifier In computer science: Billing descriptor, the merchant's name that appears on a credit card statement Short Payment Descriptor, a compact data format for an easy exchange of a payment information using modern electronic channels Data descriptor, a software or hardware structure describing data Visual descriptors, a representation of visual features in image or video Security descriptor, a Windows data structure containing security information Segment descriptor, used for memory addressing in x86 computer architectures Index term, also known as a "descriptor" in information retrieval File descriptor, an abstract key for accessing a file In chemistry: Molecular descriptor, which helps characterize a chemical compound Descriptor (chemistry), a prefix used to specify a chemical name In languages: Epithet, a descriptive term (word or phrase), accompanying or occurring in place of a name and having entered common usage
https://en.wikipedia.org/wiki/The%20Save-Ums%21
The Save-Ums! is a Canadian CGI animated children's television series produced by Decode Entertainment. The series premiered on Discovery Kids as part of the Ready Set Learn programming block on February 24, 2003, and ended on July 11, 2006 with 40 episodes being produced. Synopsis The Save-Ums, which consist of Jazzi, Noodle, Custard, Ka-Chung, Foo and B.B. Jammies, are patrol group of six aliens of various appearances, who help various critters when they run into difficulty. Each episode begins with a call on the "adventure screen" (essentially a videophone) from an inhabitant of the world in which the Save-Ums live. The caller describes the difficulty that needs to be resolved, and then select Save-Ums travel to the scene of the problem. There are three different places that the Save-Ums travel to solve problems: Rock World, an island with a huge mountain; Lava World, a tropical island with a volcano; and Wave World, which is under the ocean. The Save-Ums then assist in solving the problem. Each episode ends with the problem being solved and the Save-Ums returning to their safety headquarters. Characters The Save-Ums Jazzi (voiced by Tajja Isen) is a purple passionate girl with red hair tied into two puppytails who dreams to speak the language of wild horses. She is afraid of water and is shown to be the leader in numerous episodes. She is known to say "People, we have a plan!" whenever she, another Save-Um, or a secondary character has an idea. Noodle (Caboche in the French dub, voiced by Mark Rendall in season 1 and Cameron Ansell in season 2) is a male white pound puppy-like alien who is the most intelligent and mature of the group, often being the voice of reason and helping others to see what is right. He also pilots the subchopper, a helicopter that travels on air or under the sea. Custard (Berlingot in the French dub, voiced by Jordan Francis) is a cool male purple and red cat-eared Save-Um who pilots the Zoomer, a powerboat that travels on either water or snow, and goes on most missions. He is known for saying "Bam!" when he has an idea. Ka-Chung (Aïkido in the French dub, voiced by Mitchell Eisner) is a male red and white hippopotamus-like alien who is the toughest Save-Um. He is known to shout "Ka-Chung!" as his catchphrase. He strongs the Ka-Drill, a tunnel boring machine. Foo (Louna in the French dub, voiced by Aaryn Doyle) is a female blue and yellow long limbed angelfish-like bird who is the youngest and nicest of the Save-Ums. She also goes on most missions. She flies a jet pack. B.B. Jammies (Bébé Jimmy in the French dub, voiced by Connor Price) is Jazzi's miniature brother, who has a purple diamond-shaped head. Since he is too little to go on missions, he mostly plays with the Puffs. Other recurring The Puffs are six tiny fluffy colorful of rainbow pets who live and play with the Save-Ums, but don't go on any missions. They sometimes are a help to them. Winston (voiced by Asa Perlman impersonating Woody Allen) is
https://en.wikipedia.org/wiki/IBM%20InfoSphere%20DataStage
IBM InfoSphere DataStage is an ETL tool and part of the IBM Information Platforms Solutions suite and IBM InfoSphere. It uses a graphical notation to construct data integration solutions and is available in various versions such as the Server Edition, the Enterprise Edition, and the MVS Edition. It uses a client-server architecture. The servers can be deployed in both Unix as well as Windows. It is a powerful data integration tool, frequently used in Data Warehousing projects to prepare the data for the generation of reports. History DataStage originated at VMark Software Inc, a company that developed two notable products: UniVerse database and the DataStage ETL tool. The first VMark ETL prototype was built by Lee Scheffler in the first half of 1996. Peter Weyman was VMark VP of Strategy and identified the ETL market as an opportunity. He appointed Lee Scheffler as the architect and conceived the product brand name "Stage" to signify modularity and component-orientation. This tag was used to name DataStage and subsequently used in related products QualityStage, ProfileStage, MetaStage and AuditStage. Lee Scheffler presented the DataStage product overview to the board of VMark in June 1996 and it was approved for development. The product was in alpha testing in October, beta testing in November and was generally available in January 1997. VMARK and Unidata merged in October 1997 and renamed themselves to Ardent Software. In 1999 Ardent Software was acquired by Informix the database software vendor. In April 2001 IBM acquired Informix and took just the database business leaving the data integration tools to be spun off as an independent software company called Ascential Software. In November 2001, Ascential Software Corp. of Westboro, Mass. acquired privately held Torrent Systems Inc. of Cambridge, Massachusetts for $46 million in cash. Ascential announced a commitment to integrate Orchestrate's parallel processing capabilities directly into the DataStageXE platform. In March 2005 IBM acquired Ascential Software and made DataStage part of the WebSphere family as WebSphere DataStage. In 2006 the product was released as part of the IBM Information Server under the Information Management family but was still known as WebSphere DataStage. In 2008 the suite was renamed to InfoSphere Information Server and the product was renamed to InfoSphere DataStage. Releases Enterprise Edition (PX): a name given to the version of DataStage that had a parallel processing architecture and parallel ETL jobs. Server Edition: the name of the original version of DataStage representing Server Jobs. Early DataStage versions only contained Server Jobs. DataStage 5 added Sequence Jobs and DataStage 6 added Parallel Jobs via Enterprise Edition. MVS Edition: mainframe jobs, developed on a Windows or Unix/Linux platform and transferred to the mainframe as compiled mainframe jobs. DataStage for PeopleSoft: a server edition with prebuilt PeopleSoft EPM jobs under
https://en.wikipedia.org/wiki/SoundBridge
SoundBridge is a hardware device from Roku, Inc. designed to play internet radio or digital audio streamed across a home network, over either Wi-Fi or ethernet. SoundBridge devices directly browsed the Radio Roku guide. As of 2008 all Roku SoundBridge products were discontinued; Roku focused on IPTV. As of January 2012, the SoundBridge was no longer available from Roku. As of May 2018, internet radio functionality was no longer supported by Roku; they shut down their Radio Roku server that provided searching, saving and accessing "Favorite" stations. However, the Roku SoundBridge can still access radio streams stored in its 18 URL presets. The music is also made available by a streaming server, usually a PC running media software. The SoundBridge had a high resolution vacuum fluorescent display and was compatible with various media servers, namely servers using Apple Computer's Digital Audio Access Protocol; popular servers are iTunes, or mt-daapd, Windows Media Connect, Rhapsody, SlimServer and UPnP (Universal Plug and Play) compatible servers such as TwonkyVision. Some of these servers run not only on PCs, but also on NAS devices like the Linksys NSLU2, so a SoundBridge could be operated without a PC. Models There were several SoundBridge models: The M1000, the M500 and the M2000. There was also a tabletop model called the SoundBridge Radio that had built-in speakers, an AM/FM radio, and an alarm clock. SoundBridge models sold in most countries were manufactured and sold by Pinnacle Systems, under a license from Roku. Although some Pinnacle models were similar or identical in hardware, Pinnacle didn't have a licence for the DAAP protocol, so Pinnacle models couldn't directly connect to iTunes. Pinnacle and Roku promote the Firefly Media Server as an alternative that offers similar functionality. Pinnacle models include: SoundBridge (one version identical to Roku SoundBridge M1001, another known as M1001HR with the higher resolution 280×32 pixel display as used in the SoundBridge Radio) SoundBridge Radio (identical to Roku SoundBridge Radio sans native iTunes support) Soundbridge HomeMusic - M400PX (character-based LCD - 16×2 characters; no Ethernet; no digital output; SD card slot; low-cost plastic housing in place of aluminum extrusion on original models) Those sold in the US included: M1001 SoundBridge (bitmapped VFD display - 280×16; similar to original M1000 model(see note)) R1000 SoundBridge Radio (bitmapped VFD display - 280×32; AM/FM tuner; SD card slot; built-in speakers) M500 SoundBridge (character-based LCD display - 40×2 characters) M1000 SoundBridge (bitmapped VFD display - 280×16) M2000 SoundBridge (bitmapped VFD display - 512×32; larger, enclosure with very large display) WPA support Firmware version 2.7 supported Wi-Fi Protected Access, but only for the M1001, the SoundBridge Radio, and the European versions from Pinnacle; not for the older M500/1000/2000 versions. The SoundBridge is an 802.11b device, but it can be use
https://en.wikipedia.org/wiki/Biomedical%20text%20mining
Biomedical text mining (including biomedical natural language processing or BioNLP) refers to the methods and study of how text mining may be applied to texts and literature of the biomedical domain. As a field of research, biomedical text mining incorporates ideas from natural language processing, bioinformatics, medical informatics and computational linguistics. The strategies in this field have been applied to the biomedical literature available through services such as PubMed. In recent years, the scientific literature has shifted to electronic publishing but the volume of information available can be overwhelming. This revolution of publishing has caused a high demand for text mining techniques. Text mining offers information retrieval (IR) and entity recognition (ER). IR allows the retrieval of relevant papers according to the topic of interest, e.g. through PubMed. ER is practiced when certain biological terms are recognized (e.g. proteins or genes) for further processing. Considerations Applying text mining approaches to biomedical text requires specific considerations common to the domain. Availability of annotated text data Large annotated corpora used in the development and training of general purpose text mining methods (e.g., sets of movie dialogue, product reviews, or Wikipedia article text) are not specific for biomedical language. While they may provide evidence of general text properties such as parts of speech, they rarely contain concepts of interest to biologists or clinicians. Development of new methods to identify features specific to biomedical documents therefore requires assembly of specialized corpora. Resources designed to aid in building new biomedical text mining methods have been developed through the Informatics for Integrating Biology and the Bedside (i2b2) challenges and biomedical informatics researchers. Text mining researchers frequently combine these corpora with the controlled vocabularies and ontologies available through the National Library of Medicine's Unified Medical Language System (UMLS) and Medical Subject Headings (MeSH). Machine learning-based methods often require very large data sets as training data to build useful models. Manual annotation of large text corpora is not realistically possible. Training data may therefore be products of weak supervision or purely statistical methods. Data structure variation Like other text documents, biomedical documents contain unstructured data. Research publications follow different formats, contain different types of information, and are interspersed with figures, tables, and other non-text content. Both unstructured text and semi-structured document elements, such as tables, may contain important information that should be text mined. Clinical documents may vary in structure and language between departments and locations. Other types of biomedical text, such as drug labels, may follow general structural guidelines but lack further details. Uncertain
https://en.wikipedia.org/wiki/Superscan
SuperScan is a free connect-based port scanning software designed to detect open TCP and UDP ports on a target computer, determine which services are running on those ports, and run queries such as whois, ping, ICMP traceroute, and Hostname lookups. Superscan 4, which is a completely rewritten update to the other Superscan (version 3, released in 2000), features windows enumeration, which can list a variety of important information dealing with Microsoft Windows such as: NetBIOS information User and Group Accounts Network shares Trusted Domains Services - which are either running or stopped Superscan is a tool used by system administrators, crackers and script kiddies to evaluate a computer's security. System administrators can use it to test for possible unauthorised open ports on their computer networks, whereas crackers use it to scan for insecure ports in order to gain illegal access to a system. References Port scanners Windows network-related software
https://en.wikipedia.org/wiki/Physical%20computing
Physical computing involves interactive systems that can sense and respond to the world around them. While this definition is broad enough to encompass systems such as smart automotive traffic control systems or factory automation processes, it is not commonly used to describe them. In a broader sense, physical computing is a creative framework for understanding human beings' relationship to the digital world. In practical use, the term most often describes handmade art, design or DIY hobby projects that use sensors and microcontrollers to translate analog input to a software system, and/or control electro-mechanical devices such as motors, servos, lighting or other hardware. Physical computing intersects the range of activities often referred to in academia and industry as electrical engineering, mechatronics, robotics, computer science, and especially embedded development. Examples Physical computing is used in a wide variety of domains and applications. Education The advantage of physicality in education and playfulness has been reflected in diverse informal learning environments. The Exploratorium, a pioneer in inquiry based learning, developed some of the earliest interactive exhibitry involving computers, and continues to include more and more examples of physical computing and tangible interfaces as associated technologies progress. Art In the art world, projects that implement physical computing include the work of Scott Snibbe, Daniel Rozin, Rafael Lozano-Hemmer, Jonah Brucker-Cohen, and Camille Utterback. Product design Physical computing practices also exist in the product and interaction design sphere, where hand-built embedded systems are sometimes used to rapidly prototype new digital product concepts in a cost-efficient way. Firms such as IDEO and Teague are known to approach product design in this way. Commercial applications Commercial implementations range from consumer devices such as the Sony Eyetoy or games such as Dance Dance Revolution to more esoteric and pragmatic uses including machine vision utilized in the automation of quality inspection along a factory assembly line. Exergaming, such as Nintendo's Wii Fit, can be considered a form of physical computing. Other implementations of physical computing include voice recognition, which senses and interprets sound waves via microphones or other soundwave sensing devices, and computer vision, which applies algorithms to a rich stream of video data typically sensed by some form of camera. Haptic interfaces are also an example of physical computing, though in this case the computer is generating the physical stimulus as opposed to sensing it. Both motion capture and gesture recognition are fields that rely on computer vision to work their magic. Scientific applications Physical computing can also describe the fabrication and use of custom sensors or collectors for scientific experiments, though the term is rarely used to describe them as such. An example of physical co
https://en.wikipedia.org/wiki/Logical%20access%20control
In computers, logical access controls are tools and protocols used for identification, authentication, authorization, and accountability in computer information systems. Logical access is often needed for remote access of hardware and is often contrasted with the term "physical access", which refers to interactions (such as a lock and key) with hardware in the physical environment, where equipment is stored and used. Models Logical access controls enforce access control measures for systems, programs, processes, and information. The controls can be embedded within operating systems, applications, add-on security packages, or database and telecommunication management systems. The line between logical access and physical access can be blurred when physical access is controlled by software. For example, entry to a room may be controlled by a chip and PIN card and an electronic lock controlled by software. Only those in possession of an appropriate card, with an appropriate security level and with knowledge of the PIN are permitted entry to the room. On swiping the card into a card reader and entering the correct PIN code. Logical controls, also called logical access controls and technical controls, protect data and the systems, networks, and environments that protect them. In order to authenticate, authorize, or maintain accountability a variety of methodologies are used such as password protocols, devices coupled with protocols and software, encryption, firewalls, or other systems that can detect intruders and maintain security, reduce vulnerabilities and protect the data and systems from threats. Businesses, organizations and other entities use a wide spectrum of logical access controls to protect hardware from unauthorized remote access. These can include sophisticated password programs, advanced biometric security features, or any other setups that effectively identify and screen users at any administrative level. The particular logical access controls used in a given facility and hardware infrastructure partially depend on the nature of the entity that owns and administrates the hardware setup. Government logical access security is often different from business logical access security, where federal agencies may have specific guidelines for controlling logical access. Users may be required to hold security clearances or go through other screening procedures that complement secure password or biometric functions. This is all part of protecting the data kept on a specific hardware setup. Militaries and governments use logical access biometrics to protect their large and powerful networks and systems which require very high levels of security. It is essential for the large networks of police forces and militaries where it is used not only to gain access but also in six main essential applications. Without logical access control security systems highly confidential information would be at risk of exposure. There is a wide range of bio
https://en.wikipedia.org/wiki/Deir%20Alla
Deir Alla (Arabic: دير علا) is the site of an ancient Near Eastern town in Balqa Governorate, Jordan. The Deir Alla Inscription, datable to ca. 840–760 BCE, was found here. On 20 August 2010, it recorded a scorching temperature of 51.1 °C, the new official highest temperature in the history of Jordan. Identification Deir Alla has been suggested to be the biblical Sukkot in Transjordan. Some believe it to be the biblical Pethor. It was also suggested by an early traveler to the site, Selah Merrill, who found parallels with names in the Hebrew Bible. Deir Alla is identified with the Byzantine period town of Tar'elah or Dar'elah, which the Jerusalem Talmud identifies with biblical Sukkot. Archaeology The tell is 50 by 200 meters and rises to 27 meters above the plain. A series of Dutch excavations sponsored by the Netherlands Organisation for the Advancement of Pure Research began in 1960, under the auspices of the department of theology, University of Leiden. These excavations continued for five seasons until 1967. The excavation made its most dramatic discovery in 1967, an ink wall inscription relating a hitherto-unknown prophecy of Balaam, who thereby becomes the first Old Testament prophet to be identified in an inscription. After a long interruption, work resumed in 1976, initially under Franken, for several seasons. After another long break, occasional seasons were conducted beginning in 1994 until 2008. At the end of the 1964 campaign, 11 clay tablets, 3 inscribed in a West Semitic Early Canaanite script, 7 bearing only dots, and one uninscribed, were discovered. The tablets were found in the destruction layer of storerooms dated by a cartouche of Queen Twosret of Egypt to around 1200 BC. Earlier objects were also found there so the tablets may well predate the destruction. In the later excavations several more clay tablets were found, for a total of 15. The Balaam inscription The 1967 excavation revealed a many-chambered structure that had also been destroyed by earthquake, during the Persian period at the site. On a wall was written a story relating visions of the seer of the gods "Balʿam son of Beʿor" (Balaam son of Beor), who may be the same Balʿam son of Beʿor mentioned in Numbers 22–24 and in other passages of the Bible. The Deir Alla Balaam is associated with "a god bearing the name Shgr, 'Shadday' gods and goddesses, and with the goddess Ashtar." It reflects the oldest example of story from a biblical book (Numbers) written in a West Semitic alphabetic script, and is considered the oldest piece of West Semitic literature transmitted in a still debated Semitic language. The Deir Alla Inscription is datable to ca. 840–760 BCE; it was written in red and black inks on a plastered wall; 119 pieces of inked plaster were recovered. The wall, near the summit of the tell, was felled by yet another tremor. History The town was a sanctuary and metal-working centre, ringed by smelting furnaces built against the exterior of the city wal
https://en.wikipedia.org/wiki/BlackDog
The BlackDog is a pocket-sized, self-contained computer with a built-in biometric fingerprint reader which was developed in 2005 by Realm Systems, which is plugged into and powered by the USB port of a host computer using its peripheral devices for input and output. It is a mobile personal server which allows a user to use Linux, ones applications and data on any computer with a USB port. The host machine's monitor, keyboard, mouse, and Internet connection are used by the BlackDog for the duration of the session. As the system is self-contained and isolated from the host, requiring no additional installation, it is possible to make use of untrusted computers, yet using a secure system. Various hardware iterations exist, and the original developer Realm Systems closed down in 2007, being picked up by the successor Inaura, Inc. Hardware history Original Black Dog & Project BlackDog Skills Contest Identified as the BlackDog, the Project BlackDog, or Original BlackDog, the first hardware version was touted as "unlike any other mobile computing device, BlackDog contains its own processor, memory and storage, and is completely powered by the USB port of a host computer with no external power adapter required." It was created in conjunction with Realm System's Project BlackDog Skills Contest (announced on Oct 27, 2005) which was supposed to raise interest, and create a developer community surrounding the product. The BlackDog was publicly available for purchase from the Project BlackDog website in September 2005 for those who wished to enter the contest or to experiment with the platform. Production ended in mid January 2006 when the contest closed. On 7 February 2006, the winners of the contest were announced for the categories: Security (the Michael Chenetz), Entertainment (Michael King), Productivity (Terry Bayne) and "Dogpile" (Paul Chandler). On Feb 15, 2006, during the Open Source Business Conference, San Francisco, Terry Bayne was announced the grand prize winner of the contest and received US$50,000 for his creation "Kibble," a tool for building integration solutions between the host PC and the BlackDog device using a SOAP-based RPC mechanism to send arbitrary LUA code to be executed on the host PC from the BlackDog. At this conference, the second iteration of the BlackDog, the K9 was publicly announced. K9 Identified as the K9 Ultra-Mobile Server, or K9, this version was announced at the Open Source Business Conference in February 2006 with expected availability in the third quarter of 2006. However, company turbulences (see Company History below) prevented the K9 from being sold until early 2009 by Inaura, Inc. Promotional literature shows the form factor to be the same as the intermediate iD3 prototype a very thin chrome model resembling an iPod Nano, but all black with a rubberized exterior. Before Realm Systems shut down, there were working prototypes of the K9, the hardware design seemed to be finished, and the software was func
https://en.wikipedia.org/wiki/Lobe%20Attachment%20Module
In Token Ring networks, A Lobe Attachment Module is a box with multiple interfaces to which new network nodes (known as lobes) can be attached. A LAM may have interfaces up to 20 lobes. Functionally a LAM is like a multi-station access unit (MAU), but with a larger capacity: 20 nodes as opposed to 8 nodes for MAU. The LAM interface may use either IBM connectors or 8P8C (RJ-45) modular plugs. LAMs can be daisy chained and connected to a HUB, known as Controlled Access Unit (CAU) in Token Ring terminology. Each CAU can handle up to 4 LAMs for a total of 80 lobes. Networking hardware
https://en.wikipedia.org/wiki/SCTV%20%28TV%20network%29
Surya Citra Televisi (SCTV) is an Indonesian free-to-air television network. It was launched on 24 August 1990 in Surabaya, East Java as Surabaya Centra Televisi, broadcasting to the city and its surrounding area. At first, the programming was similar to that of RCTI, broadcasting foreign shows and some of RCTI news programs until they could produce their own. On 30 January 1993, SCTV obtained a national license and eventually moved its operations to Jakarta marks the end of 3 years affiliations with RCTI from Jakarta, changing its name to Surya Citra Televisi. Its main offices are located in Central Jakarta, with studios in West Jakarta. It is owned by Surya Citra Media, a publicly-listed subsidiary of the technology company Emtek. History In 1991, the channel was criticized by the Muslim community of Surabaya for airing Wonder Woman which, according to newspapers, focused "unduly on the physical attributes of women", and an episode of Wok with Yan involving the preparation of a pork dish, both during Ramadan. The station took Wonder Woman off the air until the end of Ramadan and apologized for the specific episode of Wok with Yan. Station manager Mohamoad Noer demanded that SCTV would review its programming following the scandal. Television series made in western countries gave SCTV an impact, whose signal at the time went as far as villages in Banyuwangi. On 18 February 2011, the commissioners of its parent companies Indosiar and SCTV agreed to a merger, although this was subject to government approval due to both companies going public. In 2014, SCM won the lawsuit in an attempted merger which had previously been hampered by taxes. Programs Local programming In 2001, SCTV's affiliated television station in East Java launched the East Java edition of Liputan 6 SCTV which can only be seen in Surabaya. The North Sumatra edition of Liputan 6 SCTV is seen on SCTV Medan at 9:30 am and re-run at 4:00 pm on SCTV; this version debuted in 1997. Depending on the relay station, additional then-local television channel in Jakarta O Channel (now Moji) programs may also be seen. TV series To produce TV series, SCTV previously turned to Indonesia's leading production house, such as Multivision Plus, Starvision Plus, Prima Entertainment, Soraya Intercine Films, Screenplay Productions, Amanah Surga Produksi (AS Productions), and Mega Kreasi Films, to presented various of the most popular soap operas. There are Deru Debu (Beyond the Dust), Kisah Cinta Ratu Pantai Selatan (The Legend of the Queen of the Southern Sea), Melati, Permata Hati (Purest Hearts), Rahasia Perkawinan (Wedding Agreement), Bayangan Adinda (Adinda's Shadows), Heart the Series, Sephia, Putri Duyung (The Mermaid), Cowokku Superboy (My Boyfriend is Superboy), Bidadari Takut Jatuh Cinta (Fairies Who Afraid of Falling in Love), Putih Abu-Abu (White and Gray) (Since 2012), Cintaku Bersemi di Putih Abu-Abu (My Love Blooms in White and Gray) The Series (Since 2012), Diam-Diam Suka (Secret L
https://en.wikipedia.org/wiki/WKTC
WKTC (channel 63) is a television station licensed to Sumter, South Carolina, United States, serving the Columbia area as an affiliate of MyNetworkTV and Telemundo. The station is locally owned by WBHQ Columbia, LLC, and maintains studios in the Pontiac Business Center complex in Elgin and a transmitter on Rush Road (southeast of I-20) in rural southwestern Kershaw County. History The station first signed on the air on September 8, 1997, as WQHB; it originally operated as a primary UPN and secondary WB affiliate, with The WB's prime time programming airing on a one-day delay from 6:00 to 8:00 p.m. It also aired select programming from Pax TV (now Ion Television) following that network's 1998 launch. The station's original main transmitter in Sumter was not nearly strong enough to provide a decent over-the-air signal to Columbia; as a result, WQHB began operating a fill-in translator in Columbia, W67DP (channel 67). In 2001, the station became a primary WB affiliate, shifting UPN prime time programming to the late evening hours from 10:00 p.m. to midnight, after The WB's prime time schedule. Pax TV programming was dropped altogether at this time. In 2003, the station changed its call letters to WBHQ (reversing the last three letters of its original calls) and moved its transmitter to space on the tower of ABC affiliate WOLO-TV (channel 25) near Camden. This gave the station an over-the-air coverage area comparable to Columbia's other full-power stations, enabling it to shut down the channel 67 translator. It also changed its on-air branding from "WB63" to "Midlands' WB4" (a reference to its cable channel placement in the market on Time Warner Cable). During this period, it moved to its current studio facilities in Elgin. WBHQ dropped UPN programming on August 27, 2004, leaving the market without a UPN affiliate until Roberts Broadcasting signed on WZRB (channel 47) on January 1, 2005. On January 24, 2006, the Warner Bros. unit of Time Warner and CBS Corporation announced that the two companies would shut down The WB and UPN and combine the networks' respective programming to create a new "fifth" network called The CW. On February 22, 2006, News Corporation announced the launch of a new "sixth" network called MyNetworkTV, which would be operated by Fox Television Stations and its syndication division Twentieth Television, which was created to give UPN and WB stations that would not become CW affiliates another option besides converting to independent stations. On March 25, it was announced that WBHQ would become MyNetworkTV's Columbia affiliate. On June 26, 2006, the station changed its call letters to WKTC (standing for "Television of Columbia", according to the station's co-owner). On June 28, the station began running advertisements in the Columbia Free Times newspaper featuring the cast of one of MyNetworkTV's original telenovelas Desire, with the text "September 5 / It's a whole new ballgame," alongside a stylized "My 63" logo and the new
https://en.wikipedia.org/wiki/Atari%20FREDDIE
FREDDIE is the name for a 40-pin large scale integrated circuit found in later model Atari 8-bit computers. It is a RAM address multiplexer, used for DRAM access. Atari created this chip to replace several other chips to cut costs and to enhance CPU and ANTIC memory access. FREDDIE, combined with a C061618 MMU (XL/XE) and C025953 EMMU (130XE) allows the CPU and ANTIC to access memory independently of each other. Originally designed for the cancelled 1400XL and 1450XLD, it was eventually used in the 800XLF (labelled "800XL," refers to European version), 65XE, 130XE, and XEGS. External links atarimuseum.com Freddie MCU Engineering Data (PDF file) Jindrich site(archived) Freddie info and diagram FREDDIE, Atari
https://en.wikipedia.org/wiki/Stick%20Stickly
Stick Stickly is a fictional character created by Agi Fodor and Karen Kuflik, that appears on the television network Nickelodeon. He is a popsicle stick with googly eyes, a jelly bean nose, and a small mouth. He was the host of Nick in the Afternoon, a programming block on the network that aired summers from 1994 to 1998 on weekday afternoons. Stickly would often be subject to U-Dip, where viewers pick which substance he is dipped in. After more than a dozen years off the air, Stickly was next seen in various promos for the TeenNick programming block The '90s Are All That, including the music video for the block's anthem. On September 6, 2011, an ad aired announcing that Stick would be returning to television on Friday October 7, 2011 at midnight. The following week, it was announced via a separate ad that he would host every Friday for the block's version of U-Pick. On his debut night, it became apparent that his segments were adapted for his new target demographic, both in terms of more mature language and humor and in terms of modern technology. For New Year's Eve 2011/12, he was joined by correspondents Woodknot and Face. Stickly's appearances were placed on hiatus in March 2012. He temporarily returned to host 1990s Game Show Week on August 5, 2013, then returned to U-Pick on a regular weekly basis in June 2015. On February 8, 2016, TeenNick's block The Splat, had a "U-Pick" week, where Twitter users could ask to play certain shows using the hashtag, #UPickTheSplat. The whole event was hosted by Stick Stickly and featured classic Nick in the Afternoon "U-Dip" segments during commercial breaks. Stickly is voiced by Paul Christie, who also voiced Noggin's mascot Moose A. Moose. References Television characters introduced in 1994 Fictional characters from New York City Puppets
https://en.wikipedia.org/wiki/Light-weight%20process
In computer operating systems, a light-weight process (LWP) is a means of achieving multitasking. In the traditional meaning of the term, as used in Unix System V and Solaris, a LWP runs in user space on top of a single kernel thread and shares its address space and system resources with other LWPs within the same process. Multiple user-level threads, managed by a thread library, can be placed on top of one or many LWPs - allowing multitasking to be done at the user level, which can have some performance benefits. In some operating systems, there is no separate LWP layer between kernel threads and user threads. This means that user threads are implemented directly on top of kernel threads. In those contexts, the term "light-weight process" typically refers to kernel threads and the term "threads" can refer to user threads. On Linux, user threads are implemented by allowing certain processes to share resources, which sometimes leads to these processes to be called "light weight processes". Similarly, in SunOS version 4 onwards (prior to Solaris) "light weight process" referred to user threads. Kernel threads Kernel threads are handled entirely by the kernel. They need not be associated with a process; a kernel can create them whenever it needs to perform a particular task. Kernel threads cannot execute in user mode. LWPs (in systems where they are a separate layer) bind to kernel threads and provide a user-level context. This includes a link to the shared resources of the process to which the LWP belongs. When a LWP is suspended, it needs to store its user-level registers until it resumes, and the underlying kernel thread must also store its own kernel-level registers. Performance LWPs are slower and more expensive to create than user threads. Whenever an LWP is created a system call must first be made to create a corresponding kernel thread, causing a switch to kernel mode. These mode switches would typically involve copying parameters between kernel and user space, also the kernel may need to have extra steps to verify the parameters to check for invalid behavior. A context switch between LWPs means that the LWP that is being pre-empted has to save its registers, then go into kernel mode for the kernel thread to save its registers, and the LWP that is being scheduled must restore the kernel and user registers separately also. For this reason, some user level thread libraries allow multiple user threads to be implemented on top of LWPs. User threads can be created, destroyed, synchronized and switched between entirely in user space without system calls and switches into kernel mode. This provides a significant performance improvement in thread creation time and context switches. However, there are difficulties in implementing a user level thread scheduler that works well together with the kernel. Scheduler activation While the user threading library will schedule user threads, the kernel will schedule the underlying LWPs. Without coordinatio
https://en.wikipedia.org/wiki/Distributed%20Systems%20Technology%20Centre
The Distributed Systems Technology Centre (DSTC) was a leading research organization in the field of information technology in Australia. It conducted applied research focusing on a number of application domains, such as government, defence and health care. It was a centre of excellence in distributed systems technologies and had an international reputation as one of the most effective and influential IT research organisations in Australia. DSTC was supported by the Australian Government's Cooperative Research Centre (CRC) program and participants included universities, government, and industry players. The company DSTC Pty Ltd was created in 1992 to manage the CRC for Distributed Systems Technology. It completed its research program in June 2000. A second CRC was established in July 2000: the CRC for Enterprise Distributed System Technology which was also managed by DSTC Pty Ltd. This CRC completed its operations on 30 June 2006. DSTC was one of the most successful CRCs in Australia, and was a leading centre for expertise in distributed systems and information technology. It was a major contributor to the Australian information technology industry through its research, projects with industry, support for training and education. It organised the annual Evolve Conference, which brought leading international experts to Australia. It was a strong participant in international standards organisations such as the Object Management Group (OMG), World Wide Web Consortium (W3C) and Organization for the Advancement of Structured Information Standards (OASIS). The DSTC started and hosted the Australian W3C Office. Spin-offs Several spin-off companies were created from DSTC projects : In 1997, Active Tools commercialised Nimrod, a tool for performing parameterised computations in a grid, as EnFuzion. EnFuzion is now owned and distributed by Axceleon. In 2001, Wedgetail Communications commercialised several security products including μPKI, a PKI library for small devices, and a Java Crypto and Security Implementation (JCSI) Single Sign-On product. In 2004, the company was bought by Vintela, which in 2005 was in turn bought by Quest Software. In 2003, Mantara commercialised Elvin, a light-weight event notification service. In 2013, Mantara was effectively acquired by Deutsche Bank. In 2004, Extensia Solutions commercialised the RecordPoint shared electronic health record system. In 2006, distIP purchased some of the remaining intellectual property assets of DSTC. Trading as Veriluma, it commercialised the Sheba modeling system for intelligence assessment. In addition to these commercial ventures, one of DSTC's greatest legacies is its alumni, some of whom have taken on prominent positions in academia, whilst others have found employment in some of the world's leading ICT companies. DSTC also made a massive contribution to computer science education, playing a major role in the education of many computer science students (including a large number
https://en.wikipedia.org/wiki/Layer%202%20MPLS%20VPN
A Layer 2 MPLS VPN is a term in computer networking. It is a method that Internet service providers use to segregate their network for their customers, to allow them to transmit data over an IP network. This is often sold as a service to businesses. Layer 2 VPNs are a type of Virtual Private Network (VPN) that uses MPLS labels to transport data. The communication occurs between routers that are known as Provider Edge routers (PEs), as they sit on the edge of the provider's network, next to the customer's network. Internet providers who have an existing Layer 2 network (such as ATM or Frame Relay) may choose to use these VPNs instead of the other common MPLS VPN, Layer 3. There is no one IETF standard for Layer 2 MPLS VPNs. Instead, two methodologies may be used. Both methods use a standard MPLS header to encapsulate data. However, they differ in their signaling protocols. Types of Layer 2 MPLS VPNs BGP-based The BGP-based type is based on a draft specification by Kireeti Kompella, from Juniper Networks. It uses the Border Gateway Protocol (BGP) as the mechanism for PE routers to communicate with each other about their customer connections. Each router connects to a central cloud, using BGP. This means that when new customers are added (usually to new routers), the existing routers will communicate with each other, via BGP, and automatically add the new customers to the service. LDP-based The second type is based on a draft specification by Chandan Mishra from Cisco Systems. This method is also known as a Layer 2 circuit. It uses the Label Distribution Protocol (LDP) to communicate between PE routers. In this case, every LDP-speaking router will exchange FECs (forwarding equivalence classes) and establish LSPs with every other LDP-speaking router on the network (or just the other PE router, in the case when LDP is tunnelled over RSVP-TE), which differs from the BGP-based methodology. The LDP-based style of layer 2 VPN defines new TLVs and parameters for LDP to aid in the signaling of the VPNs. Vendor implementations Alcatel-Lucent: LDP based Foundry Networks: LDP-based (NetIron XMR Series, NetIron MLX Series) Juniper Networks: BGP-based (MX/M/T/J-series) Juniper Networks: LDP-based (MX/M/T/J/E-series) Cisco Systems: LDP-based (IOS) Cisco Systems: LDP-based and BGP-based (IOS XR) Cisco Systems: LDP-Based [BGP-DISC] MRV communications : LDP-based Lucent Technologies (formerly Riverstone Networks): LDP-based Ericsson (formerly Redback Networks): LDP-based Huawei Technologies: LDP-based & BGP-based (NE/S-series) ZTE:LDP-based & BGP-based (ZXCTN6000/9000 series, ZXR10 series) References MPLS networking
https://en.wikipedia.org/wiki/Ryan%20Whitney
Ryan Whitney (born February 19, 1983) is an American former professional ice hockey defenseman. He is an analyst on NHL Network and a co-host of the Barstool Sports hockey podcast Spittin' Chiclets with former NHL enforcer Paul Bissonnette. In 2019, New Amsterdam Vodka collaborated with Whitney to create a pink lemonade flavored vodka called Pink Whitney. Whitney represented the United States in international competitions, winning a silver medal at the 2010 Winter Olympics. Upon completing his freshman year at Boston University, Whitney was selected by the Pittsburgh Penguins fifth overall in the 2002 NHL Entry Draft. Following three seasons with the Penguins' minor league affiliate, the Wilkes-Barre/Scranton Penguins, Whitney played his NHL rookie season in 2005–06. Whitney remained in Pittsburgh for three-and-a-half seasons, helping the club to the 2008 Stanley Cup Finals. He was traded to the Edmonton Oilers in 2010 after a brief stint with the Anaheim Ducks. On September 20, 2015, Whitney announced his retirement from professional hockey. Playing career Early years As a youth, Whitney played in the 1997 Quebec International Pee-Wee Hockey Tournament with a minor ice hockey team from the South Shore. Whitney enrolled at Thayer Academy, a college-prep school in Braintree, Massachusetts, in 1998, and logged significant playing time with their hockey team. Head Coach Jack Foley often paired Whitney, a freshman, with senior Brooks Orpik, his future rival in college (being on separate ends of the Boston College-Boston University Rivalry), and later his teammate on the Pittsburgh Penguins. Whitney's size and skill drew the attention of the USA Hockey National Team Development Program. After initially resisting the programs invitations, he left Thayer Academy for the program, based in Ann Arbor, Michigan, for his senior year of high school. After graduating from high school, Whitney accepted a full scholarship to play for Boston University under Jack Parker. In his freshman year, he recorded 21 points in 35 games and was named to the 2002 Hockey East All-Rookie Team. He was then selected by the Pittsburgh Penguins, as the fifth overall pick in the 2002 NHL Entry Draft. Upon completing his third year with Boston, he opted to forgo his senior year of college eligibility to turn professional. He was subsequently assigned by Pittsburgh to their American Hockey League (AHL) affiliate, the Wilkes-Barre/Scranton Penguins, for the 2004 Calder Cup Playoffs. He played in 20 games, recording 10 points, however, Wilkes-Barre/Scranton was defeated by the Milwaukee Admirals in the finals. Following his professional debut in the AHL playoffs, Whitney joined Wilkes-Barre/Scranton for the 2004–05 season. Under head coach Michel Therrien, Whitney played in 80 games in 2004–05, recording 41 points and 101 penalty minutes. Pittsburgh Penguins Whitney made his NHL debut with Pittsburgh in the 2005–06 NHL season, playing in 68 games. He was called up on October
https://en.wikipedia.org/wiki/Hooking
In computer programming, the term hooking covers a range of techniques used to alter or augment the behaviour of an operating system, of applications, or of other software components by intercepting function calls or messages or events passed between software components. Code that handles such intercepted function calls, events or messages is called a hook. Hook methods are of particular importance in the Template Method Pattern where common code in an abstract class can be augmented by custom code in a subclass. In this case each hook method is defined in the abstract class with an empty implementation which then allows a different implementation to be supplied in each concrete subclass. Hooking is used for many purposes, including debugging and extending functionality. Examples might include intercepting keyboard or mouse event messages before they reach an application, or intercepting operating system calls in order to monitor behavior or modify the function of an application or other component. It is also widely used in benchmarking programs, for example frame rate measuring in 3D games, where the output and input is done through hooking. Hooking can also be used by malicious code. For example, rootkits, pieces of software that try to make themselves invisible by faking the output of API calls that would otherwise reveal their existence, often use hooking techniques. Methods Typically hooks are inserted while software is already running, but hooking is a tactic that can also be employed prior to the application being started. Both these techniques are described in greater detail below. Source modification Hooking can be achieved by modifying the source of the executable or library before an application is running, through techniques of reverse engineering. This is typically used to intercept function calls to either monitor or replace them entirely. For example, by using a disassembler, the entry point of a function within a module can be found. It can then be altered to instead dynamically load some other library module and then have it execute desired methods within that loaded library. If applicable, another related approach by which hooking can be achieved is by altering the import table of an executable. This table can be modified to load any additional library modules as well as changing what external code is invoked when a function is called by the application. An alternative method for achieving function hooking is by intercepting function calls through a wrapper library. A wrapper is a version of a library that an application loads, with all the same functionality of the original library that it will replace. That is, all the functions that are accessible are essentially the same between the original and the replacement. This wrapper library can be designed to call any of the functionality from the original library, or replace it with an entirely new set of logic. Runtime modification Operating systems and software may pro
https://en.wikipedia.org/wiki/Mercedes-Benz%20COMAND
Cockpit Management and Data system COMAND for short acts as a combined command and control center for all audio, telematics and telecommunications functions on Mercedes-Benz vehicles and includes a dedicated flat display screen. In addition to the GPS navigation system and general processing and control logic, COMAND includes components such as an address book, telephone, radio and in many cases a CD/DVD drive. It is connected to other (often separate) devices such as CD/DVD changers, sound system and surround sound amplifier, TV receiver and the optional Linguatronic voice control system via an optical fiber network. The first generations of COMAND used the D2B optical network standard whereas later models are based on MOST. A key feature of all COMAND systems is to provide deep integration between the various functions such as multimedia, navigation and telephony and to also allow multiple presentation and control facilities. An example of functional integration is where other audio sources can be muted when a phone call comes in or when navigation guidance is being given. It is also the case that the main audio system, speakers and microphone are used for all these functions instead of being logically and functionally separate. With regard to multiple presentation and control facilities, COMAND-based vehicles allow steering wheel controls to be used alongside the main COMAND buttons and controller and COMAND-related status information and instructions can be displayed in the instrument cluster in addition to the main COMAND display. On vehicles with a factory-fitted Mercedes-Benz rear seat entertainment system, this also provides integration with the COMAND system, allowing for instance the rear seat displays to show content from the COMAND TV receiver or to play out the rear DVD audio over the car's surround sound system. On newer S-Class and CL-Class models such as the W221, the integration between COMAND and other vehicle functions is even more complete, including access via COMAND to the HVAC system, seat controls, etc. On these cars, in contrast to most other Mercedes-Benz vehicles, COMAND is part of the standard specification rather than an optional extra. COMAND was introduced first exclusively on the flagship S-Class and CL-Class models. Later, it became available on other Mercedes cars too. Model history COMAND 2.5 Somewhat confusingly, COMAND 2.5 (not to be confused with the much later COMAND-APS NTG2.5) actually refers to the first generation of COMAND systems, introduced on the W220. The "2.5" label seems to refer to the fact that the main COMAND unit for this first generation had a height of 2.5 DIN. This COMAND system had a cassette drive, a built-in CD drive for the navigation map discs, an FM/AM radio tuner, a 4-channel amplifier and external connectors to other systems. The European models used Tele Atlas map discs (CD). Towards the end of 1999, the system was upgraded to use the improved DX type navigation discs. COMA
https://en.wikipedia.org/wiki/Canadian%20Heritage%20Information%20Network
The Canadian Heritage Information Network (CHIN; , RCIP) is a special operating agency within the federal Department of Canadian Heritage that provides a networked interface to Canada's heritage institutions. It is based in Gatineau, Quebec, and is administratively merged with the Canadian Conservation Institute (CCI), another special operating agency of Canadian Heritage. Along with providing online public access to millions of collections records, CHIN offers collections management resources to Canada's museum community; more specifically, it assists museums in documenting, managing, and sharing information about their collections, thereby ensuring the accessibility of such information. CHIN provides bilingual information for all its resources. CHIN has three core areas of activity: create and maintain an online point of entry to Canadian collections; carry out research and development on collections documentation tools and standards; and provide guidance and training to cultural institutions on managing collections information. CHIN was the first national organization to participate in the Virtual Library museums pages (VLmp) online museums directory, later supported by ICOM. Moreover, the agency oversees Artefacts Canada, a national inventory of museum collections that provides access to several million records and images from Canadian museums. It used by national and international heritage professionals—as well as by the public—to research Canadian cultural collections. CHIN also manages the online database for Rowman & Littlefield's Nomenclature for Museum Cataloging, a structured and controlled list of object terms organized in a classification system in order to "provide a basis for indexing and cataloging collections of human-made objects." First published in 1978 (launching online in 2018), it is North America's most extensively used "museum classification and controlled vocabulary for historical and ethnological collections." History The Canadian Heritage Information Network was established in 1972 as Canada's National Inventory Programme, originally to create a data bank, accessed through a computerized national network, and to help museums construct computerized inventories of their collections. In the 1990s, CHIN began maintaining a website where the museum community of Canada could find resources to improve the online visibility of their collections. In the 2010s, Rowman & Littlefield agreed to allow CHIN to create an online version to supplement the published version of Nomenclature for Museum Cataloging 4.0. The site was launched in 2018. See also Virtual Museum of Canada References External links Canadian Heritage Information Network Réseau canadien d'information sur le patrimoine Artefacts Canada English Artefacts Canada French Organizations with year of establishment missing Federal departments and agencies of Canada Heritage organizations Canadian Heritage Information Network Museum organizations Departme
https://en.wikipedia.org/wiki/CHIN
CHIN may refer to: Canadian Heritage Information Network, a government agency in Canada that promotes Canadian culture and heritage on the Internet CHIN Radio/TV International, a media company based in Toronto, Ontario, Canada CHIN (AM), a radio station (1540 AM) licensed to Toronto, Ontario, Canada CHIN-FM, a radio station (100.7 FM) licensed to Toronto, Ontario, Canada See also Chin (disambiguation) These meanings are distinct from the word chin.
https://en.wikipedia.org/wiki/North%20Texas%20Food%20Bank
The North Texas Food Bank (NTFB) is a social benefit organization located in Plano, Texas. The organization distributes donated, purchased and prepared foods through a network of nearly 1,000 feeding programs and 400 Partner Agencies in 13 North Texas counties. The NTFB supports the nutritional needs of children, seniors, and families through education, advocacy and strategic partnerships. History The North Texas Food Bank was established in 1982 by Liz Minyard (prior owner of the Minyard's Food Stores chain), Kathryn Hall, Jo Curtis and Lorraine Griffin Kircher. Their goal was to address the critical issue of hunger in North Texas by securing donations of surplus unmarketable, but wholesome, foods and grocery products for distribution through a network of charitable organizations in 13 North Texas counties: Dallas, Denton, Collin, Fannin, Rockwall, Hunt, Grayson, Kaufman, Ellis, Navarro, Lamar, Delta and Hopkins. In the first year of operation, the Food Bank distributed 400,000 pounds of food. Members of the North Texas Food Bank's organizing committee became advocates with members of the Texas Legislature for the passage of the Good Faith Donor Act, which protects donors from liability of donated product. With the passage of this act in 1983, many potential donors began actively donating. The North Texas Food Bank is a certified member of Feeding America's Food Bank Network. Feeding America, the nation's largest domestic hunger relief organization, solicits food and grocery products from national suppliers for distribution through more than 200 certified Food Banks nationally. Feeding America also provides Food Banks with operational standards, training, support and inspection, and educates the public and government officials about the nature and solutions to the problem of hunger in the U.S. Based on distribution North Texas Food Bank is ranked 8th nationally among Feeding America food banks. Since 1982, NTFB has distributed more than half a billion pounds of food. Close the Gap (2008-2011) Ending in June 2011, Close the Gap was the organization's three-year strategic plan to narrow the food gap by providing access to 50 million meals annually. By the end of their 2011 fiscal year (July 2010-June 2011), the organization provided access to 50.5 million meals; exceeding their goal. ReThink Hunger (2011-2014) Beginning in July 2011, NTFB began its three-year strategic plan, ReThink Hunger, to improve the services provided. The plan focused on three pillars: Healthier – Providing more nutritious food, including fresh produce. Smarter – Understanding hunger better through the development of The Hunger Center of North Texas, a collaborative research program that provides tools and information to fight hunger more efficiently. Stronger – Building capacity and collaborating more efficiently by investing in programs, facilities and partnerships that offer the best opportunities to improve service and efficiency. In Fiscal Year 2014, the fina
https://en.wikipedia.org/wiki/Noise%20%28economic%29
Economic noise, or simply noise, describes a theory of pricing developed by Fischer Black. Black describes noise as the opposite of information: hype, inaccurate ideas, and inaccurate data. His theory states that noise is everywhere in the economy and we can rarely tell the difference between it and information. Noise has two broad implications. It allows speculative trading to occur (see below). It is indicative of market inefficiency. Loudon and Della Bitta (1988) refer to noise as “a type of disruption in the communication process” and go further stating that "each state of the communication process is susceptible to (this) message distortion." (As cited in Wu & Newell, 2003). Therefore, we can say that noise is a disruption within the communication process and can be found in all forms within the communication process. Some examples of noise could be distortion of a television advertisement or interference of a radio broadcast. This therefore would mean that your reception of the information could be misunderstood as your reception of the information has been interfered with, meaning you may not receive the message in the way the sender is implying. Another, and probably more likely, example of noise is whilst an ad break is occurring on television, the reception of the ad has been interrupted by your mobile phone, meaning you do not fully and clearly receive and decode the information the advertisement is trying to deliver. What also must be considered when looking at the idea of noise is the understanding that the more the sender and receiver have in common, the less likely it will be for noise to have an effect on the encoding of the message. For example, if the receiver did not understand a symbol or the symbol had a different meaning to the receiver then it did to the sender, this would mean the receiver could encode the message in a different way to how the sender had intended. Types of noise Environmental or External Noise. “This consists of sounds and visual distractions that are present in the environment where the viewing takes place.” (Wu & Newell, 2003) An example of this is using a mobile phone whilst watching a television advertisement, as the mobile is within the external environment and could have an impact, as a distraction, on how the receiver decodes the message. Clutter is another type of noise. Russel and Lane (1996) define clutter as “"non-program material carried during or between shows including commercials, public service announcements, and program promotional spots” (as cited in Wu & Newell, 2003). Therefore, if the television advertisement had been shown after a public service announcement, the receiver could be distracted, thinking about what was discussed within the announcement, as opposed to being fully focused on the television advertisement. Internal Noise is the third type of noise to be considered. MacInnis and Jaworski (1989, as cited in Wu & Newell, 2003) and MacInnis, et al. (1991 also cited in Wu
https://en.wikipedia.org/wiki/Ed%2C%20Edd%20n%20Eddy%3A%20The%20Mis-Edventures
Ed, Edd n Eddy: The Mis-Edventures is a 3D platform video game based on the Cartoon Network animated television series Ed, Edd n Eddy, developed by Artificial Mind and Movement and Cartoon Network Interactive and published by Midway Games. The game's plot is loosely structured around six different stories with two bonus levels, each involving a scam by the titular trio to acquire enough money to buy jawbreakers, a plot that mirrors that of the animated series. Players may choose at any point to take control of Ed, Edd, or Eddy to overcome the game's obstacles. Character selection is strategical due to each of the Eds having his own unique ability. Throughout the game, the player encounters not only the Ed trio but also the series' side characters, such as Jimmy, Sarah, Kevin, Jonny, and the Kanker sisters. It was announced on February 15, 2005, and released on October 31, 2005, for the PlayStation 2, GameCube, Xbox, Game Boy Advance, and Microsoft Windows. It is the second video game based on Ed, Edd n Eddy, succeeding Ed, Edd n Eddy: Jawbreakers! and preceding Ed, Edd n Eddy: Scam of the Century. Gameplay Ed, Edd n Eddy: The Mis-Edventures is a 3D platforming game in which protagonists Ed, Edd, and Eddy are playable characters. Players can use them in special tag team formations like the "(Leaning-)Tower-of-Eddy" (as Eddy), "Trampol-Edd" (as Edd), and "Batter-Ed(-Ram)" (as Ed) to complete eight levels, referred to as scams. The Eds' normal weapons and skills include Ed lifting heavy objects and smashing his head, Edd using a slingshot to hit distant targets and smacking with his ruler in close range, and Eddy using the El Mongo stink bomb to stun enemies, along with using his wallet attached to a chain like a yo-yo. Unlike other releases of the game, the Game Boy Advance version is a 2D side-scroller with slightly different missions and an additional tutorial level. This version has a stronger emphasis on collecting coins to buy jawbreakers, although the plot as well as the Eds' special abilities remain largely the same. Plot The game is divided into six main levels, each having its own separate plot. In the first level, "Cool Yer Ed", the Eds attempt to gather ice cubes to sell snow-cones in the hot summer weather. During the second level, "Pin the Tail on the Ed", the Eds sneak through a sewer system to crash Jimmy's birthday party. For the third level, "Must Be Something I Ed", the Eds race to the candy store, which is offering free jawbreakers as part of a customer appreciation event. The fourth level, "Ed on Arrival", features the Eds navigating through Rolf's construction zone obstacle course to achieve an Urban Ranger badge. In the fifth level, "Nightmare on Ed Street", the Eds venture into an abandoned house to retrieve Jimmy's stuffed animal. The game's sixth level, "Ed Marks the Spot", has the Eds scour the neighborhood for Eddy's stolen stash of jawbreakers. Two bonus stages are available in the console and Windows versions of t
https://en.wikipedia.org/wiki/Objectory
Objectory is an object-oriented methodology mostly created by Ivar Jacobson, who has greatly contributed to object-oriented software engineering. The framework of objectory is a design technique called design with building blocks. With the building block technique, a system is viewed as a system of connecting blocks with each block representing a system service. It is considered to be the first commercially available object-oriented methodology for developing large-scale industrial systems. This approach gives a global view of the software development and focuses on cost efficiency. Its main techniques are: conceptual modelling, Object-oriented programming, and a block design technique. References Object-oriented programming
https://en.wikipedia.org/wiki/Kali%20%28software%29
Kali is an IPX network emulator for DOS and Windows, enabling legacy multiplayer games to work over a modern TCP/IP network such as the Internet. Later versions of the software also functioned as a server browser for games that natively supported TCP/IP. Versions were also created for OS2 and Mac, but neither version was well polished. Today, Kali's network is still operational but development has largely ceased. Kali also features an Internet Game Browser for TCP/IP native games, a buddy system, a chat system, and supports 400+ games including Doom 3, many of the Command & Conquer games, the Mechwarrior 2 series, Unreal Tournament 2004, Battlefield Vietnam, Counter-Strike: Condition Zero, and Master of Orion II. The Kali software is free to download, and once had a time-based cap for unregistered versions. For a one-time $20 fee, the time restriction was removed. However, as of January 2023, Kali.net offers the download and a registration code generator on the website, so registration is currently free. History The original MS-DOS version of Kali was created by Scott Coleman, Alex Markovich and Jay Cotton in the spring of 1995. It was the successor to a program called iDOOM (later Frag) that Cotton wrote so he could play id Software's DOS game DOOM over the Internet. After the release of Descent, Coleman, Markovich and Cotton wrote a new program to allow Descent, or any other game which supported LAN play using the IPX protocol, to be played over the Internet; this new program was named Kali. In the summer of 1995, Coleman went off to work for Interplay Productions, Markovich left the project and Cotton formed a new company, Kali Inc., to develop and market Kali. Cotton and his team developed the first Windows version (Kali95) and all subsequent versions. Initially Kali appealed only to hardcore computer tinkerers, due to the difficulty of getting TCP/IP running on MS-DOS. Kali95 took advantage of the greater network support of Windows 95, allowing Kali to achieve mainstream popularity. In the mid-1990s, it was an extremely popular way to play Command & Conquer, Descent, Warcraft II: Tides of Darkness, Duke Nukem 3D, and other games over the Internet, with more than 50,000 users worldwide by the end of 1996. The fact that only a small one-time fee was charged for the service, rather than a monthly subscription, also contributed to its popularity. This was largely possible due to Kali's scaled-down services; it did not provide the contests and high-tech chat features offered by other leading online gaming services. Since it was the only way for Windows and DOS users to play Warcraft II: Tides of Darkness against people outside of a LAN or dial-up connection, Blizzard actually included a copy of the program on the CD, going so far as to also provide a customized executable (WAR2KALI.EXE) which optimized the game's network code to account for Internet latency and also allowed users to specify their own settings for packet transmission and handl
https://en.wikipedia.org/wiki/Peter%20Brackley
Peter Brackley (13 June 1951 – 14 October 2018) was an English football commentator, perhaps most famous for commentating for Football Italia on Channel 4 in the 1990s, for the computer game series Pro Evolution Soccer until Pro Evolution Soccer 6 (after which Jon Champion replaced him as primary commentator), and for Michael Owen's World League Soccer '99. Broadcasting career Radio He began his career at BBC Radio Brighton in the early 1970s, before moving to the network. During his time with BBC Radio in London, Brackley covered football – including two FA Cup Finals and the 1982 European Cup Final – and athletics, as well as presenting flagship programmes Sport on Two and Sports Report. ITV The summer of 1982 saw Brackley make the switch to television, initially with ITV company Central Independent Television replacing Hugh Johns. During his initial spell with the network he covered the 1986 FIFA World Cup and the European Championship in France in 1984 – including commentaries on semi-final matches in both tournaments. His first live match for ITV Sport was the First Division contest between Manchester United and Sheffield Wednesday in April 1986. He also stepped into the breach during the live broadcast of the 1986 European Cup Final between Barcelona and Steaua Bucharest alongside that night's ITV studio co-pundit, Ron Atkinson, when communication with the commentary team in Seville, Brian Moore and Kevin Keegan, was lost. Sky In 1988 Brackley left ITV. Still stuck behind Brian Moore, Martin Tyler and Alan Parry in the pecking order he made the move to Rupert Murdoch's Sky Television. The bulk of his work would be for the pan-European channel Eurosport, then part-owned by Sky. He led their commentary team at the 1990 FIFA World Cup in Italy, with Ian Darke, Paul Dempsey and Gary Bloom among his colleagues. Brackley was also behind the mic for Sky's first live matches, which came in the Zenith Data Systems Cup. When Sky and BSB merged in 1991, Brackley took up other duties including regular FA Cup matches and weekly coverage of live Italian football. This was the continuation of a long relationship with coverage of Serie A, which had actually begun in the middle of the 1980s when he took up work for CSI Sports who picked up the international broadcast rights. Brackley also commentated Eurosport's coverage of the 1991 World Masters snooker tournament at the NEC in Birmingham alongside Mike Watterson, Jim Wych, Willie Jamieson, Paul Wade and Phil Yates. Football Italia This association with Italian football deepened in 1992 when, in the wake of Paul Gascoigne's transfer from Tottenham to Serie A side Lazio, Channel 4 bought the rights to cover the league. For the next decade, they provided regular live games on Sunday afternoons, with Brackley commentating from a studio in England. He worked alongside James Richardson, Kenneth Wolstenholme, Gary Bloom, Ray Wilkins, Don Howe and Luther Blissett, Return to ITV 1992 was an eventful year f
https://en.wikipedia.org/wiki/Run-Time%20Abstraction%20Services
Run-Time Abstraction Services (RTAS) is run-time firmware that provides abstraction to the operating systems running on IBM System i and IBM System p computers. It contrasts with Open Firmware, in that the latter is usually used only during boot, while RTAS is used during run-time. Firmware IBM mainframe technology
https://en.wikipedia.org/wiki/Tippett%20Studio
Tippett Studio is an American visual effects company specializing in computer-generated imagery (CGI) for films and television commercials. The studio has created visual effects and animations on over fifty feature films and commercials, garnering an Academy Award, four Clio Awards and two Emmy Awards. The company currently consists of approximately , with offices located in Berkeley, California. History Tippett Studio was founded in 1984 by Phil Tippett and Jules Roman, Phil's wife and the president of the company. The studio began as a stop motion animation company (by means of its particular stop motion animation variant, the so-called go motion animation technique). It also designed and built live action props for films, such as RoboCop, RoboCop 2, Honey, I Shrunk the Kids and Ghost. In 1991, the studio shifted its focus to computer-generated imagery to work on Jurassic Park, (released in 1993, with Industrial Light and Magic) by developing the Digital Input Device (DID). The DID was a new effects technology which placed computer-linked sensors into the moving joints of three-dimensional, articulated character models. This system earned Craig Hayes a Scientific and Technical Achievement Academy Award and the work on Jurassic Park earned the studio an Oscar. Creature animation work for Coneheads (also released in 1993) was the last go motion puppet project done by this company. The studio also worked on Blockbuster commercials featuring Ray and Carl, a guinea pig and rabbit at a pet store window from 2002 to 2007 during the Super Bowl. Paul Verhoeven's 1997 film Starship Troopers became at the time Tippett Studio's biggest project, with over 500 effects shots, for which the company received another Academy Award nomination. Phil Tippett co-directed the large-scale battle sequences with Verhoeven. The studio doubled in size to digitally animate and composite hundreds of creature shots for the film. Early in 2000, the studio re-teamed with Paul Verhoeven on Hollow Man. Craig Hayes co-supervised the creation of the invisible Sebastian whose outline becomes visible in steam, rain, water and even blood. The outstanding visual effects were recognized with another Academy Award nomination. Motion picture filmography 1984 Prehistoric Beast 1984 Caravan of Courage: An Ewok Adventure 1985 Dinosaur! 1985 Ewoks: The Battle for Endor 1986 Howard the Duck (alongside Industrial Light & Magic) 1986 The Golden Child 1987 RoboCop 1988 Willow (alongside Industrial Light & Magic) 1989 Ghostbusters II (alongside Industrial Light & Magic) 1989 Honey, I Shrunk the Kids 1990 RoboCop 2 1993 Coneheads 1993 Jurassic Park (alongside Industrial Light & Magic) 1993 RoboCop 3 1995 Three Wishes 1996 Dragonheart 1996 Tremors 2: Aftershocks 1997 Starship Troopers 1998 Armageddon 1998 Practical Magic 1999 Bicentennial Man 1999 Komodo 1999 My Favorite Martian 1999 The Haunting 1999 Virus 2000 Hollow Man 2000 Mission to Mars 2001 Cats & Dogs 2001
https://en.wikipedia.org/wiki/OpenStreetMap
OpenStreetMap (OSM) is a free, open geographic database updated and maintained by a community of volunteers via open collaboration. Contributors collect data from surveys, trace from aerial imagery and also import from other freely licensed geodata sources. OpenStreetMap is freely licensed under the Open Database License and as a result commonly used to make electronic maps, inform turn-by-turn navigation, assist in humanitarian aid and data visualisation. OpenStreetMap uses its own topology to store geographical features which can then be exported into other GIS file formats. The OpenStreetMap website itself is an online map, geodata search engine and editor. OpenStreetMap was created by Steve Coast in response to the Ordnance Survey, the United Kingdom's national mapping agency, failing to release its data to the public under free licences in 2004. Initially, maps were created only via GPS traces, but it was quickly populated by importing public domain geographical data such as the U.S. TIGER and by tracing permitted aerial photography or satellite imagery. OpenStreetMap's adoption was accelerated by Google Maps's introduction of pricing in 2012 and the development of supporting software and applications. The database is hosted by the OpenStreetMap Foundation, a non-profit organisation registered in England and Wales and is funded mostly via donations. Meta (formerly Facebook) launched its distribution called Daylight, based on OSM in 2020. Overture released their first reliable open map data based on OSM and other sources in July 2023. History Steve Coast founded the project in 2004 while at a university in Britain, initially focusing on mapping the United Kingdom. In the UK and elsewhere, government-run and tax-funded projects like the Ordnance Survey created massive datasets but declined to freely and widely distribute them. The first contribution was made in the city of London in 2005. In April 2006, the OpenStreetMap Foundation was established to encourage the growth, development and distribution of free geospatial data and provide geospatial data for anybody to use and share. In April 2007, Automotive Navigation Data (AND) donated a complete road data set for the Netherlands and trunk road data for India and China to the project. By July 2007, when the first "The State of the Map"(SotM) conference was held, there were 9,000 registered users. In October 2007, OpenStreetMap completed the import of a US Census TIGER road dataset. In December 2007, Oxford University became the first major organisation to use OpenStreetMap data on their main website. Ways to import and export data have continued to grow – by 2008, the project developed tools to export OpenStreetMap data to power portable GPS units, replacing their existing proprietary and out-of-date maps. In March 2008, two founders of CloudMade, a commercial company that uses OpenStreetMap data, announced that they had received venture capital funding of €2.4million. Yahoo! (2006–20
https://en.wikipedia.org/wiki/Catasto
Catasto is the Italian system of land registration. The register itself is maintained at a local level by the individual councils or Comuni. The data held in the Catasto is the basis for the ICI council property tax (Imposta Comunale sugli Immobili). There are several companies which offer easy search facilities to draw data from the various Italian local councils. This information can be used to understand the property holdings of individuals or companies and the charges (e.g. mortgages) which might be held over their ownership. The Florentine Catasto of 1427 provided an important source of raw historical data for historians of the Renaissance. The extensive surveys conducted by Florentine officials reveal changing forms of social organization over the period that records were collected. David Herlihy and Christiane Klapisch-Zuber's work on these records, Tuscans and Their Families is one of the first historical works to make use of computer-assisted statistical analysis. See also David Herlihy External links Brown.edu: 1427 Catasto for the Republic of Florence, Italy (~10,000 records) Ancestry.com: 1754 Catasto Onciario for Marano Marchesato, Cosenza, Calabria region, Italy Oresteparise.it: 1753 Catasto Onciario for Cavallerizzo, Italy Law of Italy Real estate in Italy Land registration 1427 establishments in Europe 15th-century establishments in the Republic of Florence it:Catasto
https://en.wikipedia.org/wiki/Whitespace%20character
In computer programming, whitespace is any character or series of characters that represent horizontal or vertical space in typography. When rendered, a whitespace character does not correspond to a visible mark, but typically does occupy an area on a page. For example, the common whitespace symbol (also ASCII 32) represents a blank space punctuation character in text, used as a word divider in Western scripts. Overview With many keyboard layouts, a whitespace character may be entered by pressing . Horizontal whitespace may also be entered on many keyboards with the key, although the length of the space may vary. Vertical whitespace may be input by typing , which creates a 'newline' code sequence in most programs. In some systems has a separate meaning but in others the two are conflated. Many early computer games used whitespace characters to draw a screen (e.g. Kingdom of Kroz). The term "whitespace" is based on the appearance of the characters on ordinary paper. However, within an application, whitespace characters can be processed in the same way as any other character code and different programs may define their own semantics for the characters. Unicode The table below lists the twenty-five characters defined as whitespace ("WSpace=Y", "WS") characters in the Unicode Character Database. Seventeen use a definition of whitespace consistent with the algorithm for bidirectional writing ("Bidirectional Character Type=WS") and are known as "Bidi-WS" characters. The remaining characters may also be used, but are not of this "Bidi" type. Note: Depending on the browser and fonts used to view the following table, not all spaces may be displayed properly. Substitute images Unicode also provides some visible characters that can be used to represent various whitespace characters, in contexts where a visible symbol must be displayed: Exact space The Cambridge Z88 provided a special "exact space" (code point 160 aka 0xA0) (invokable by key shortcut ), displayed as "…" by the operating system's display driver. It was therefore also known as "dot space" in conjunction with BBC BASIC. Under code point 224 (0xE0) the computer also provided a special three-character-cells-wide SPACE symbol "SPC" (analogous to Unicode's single-cell-wide U+2420). Non-space blanks The Braille Patterns Unicode block contains , a Braille pattern with no dots raised. Some fonts display the character as a fixed-width blank, however the Unicode standard explicitly states that it does not act as a space. Unicode's coverage of the Korean alphabet includes several code points which represent the absence of a written letter, and thus do not display a glyph: Unicode includes a Hangul Filler character in the Hangul Compatibility Jamo block (). This is classified as a letter, but displayed as an empty space, like a Hangul block containing no jamo. It is used in KS X 1001 Hangul combining sequences to introduce them or denote the absence of a letter in a position, but not i
https://en.wikipedia.org/wiki/Jean-Yves%20Bouguet
Jean-Yves Bouguet Ph.D. was a member of the Computer Vision Research Group in the Department of Electrical Engineering at the California Institute of Technology, having graduated from the École Supérieure d'Ingénieurs en Électronique et Électrotechnique. Bouguet developed and holds a patent for a new method for 3D scanning based on dual-space geometry. From 1997 until 2007, Bouguet worked at Intel Research where he contributed camera calibration ideas to the Open Source Computer Vision Library (OpenCV), based on his Matlab toolkit that he developed at Caltech. In 2007 he joined Google as senior software engineer working in their Street View group. Awards 1999: J. Walker von Brimer award for "extraordinary accomplishments in the field of 3D photography" Accomplishments Developed "Camera Calibration Toolkit" for MATLAB Developed method for 3D scanning Research interests Computer vision Computer graphics Three-dimensional scene modeling Visual navigation Computational geometry Visual calibration Image processing Early vision processes Machine learning and pattern recognition Analog VLSI for visual sensors References External links Caltech: Bouguet's Homepage MATLAB documentation: Camera Calibration Toolkit manual OpenCV Open Source Computer Vision Library California Institute of Technology faculty Google employees Living people Year of birth missing (living people)
https://en.wikipedia.org/wiki/Raw%20image%20format
A camera raw image file contains unprocessed or minimally processed data from the image sensor of either a digital camera, a motion picture film scanner, or other image scanner. Raw files are so named because they are not yet processed, and contain large amounts of potentially redundant data. Normally, the image is processed by a raw converter, in a wide-gamut internal color space where precise adjustments can be made before conversion to a viewable file format such as JPEG or PNG for storage, printing, or further manipulation. There are dozens of raw formats in use by different manufacturers of digital image capture equipment. Rationale Raw image files are sometimes incorrectly described as "digital negatives". Rather, the raw datasets are more like exposed but undeveloped film which can be converted (electronically developed) in a non-destructive manner multiple times in observable, reversible steps to reach a visually desired image. (With exposed film, development is a single event that physically transforms the unexposed film irreversibly.) Like undeveloped photographic film, a raw digital image may have a wider dynamic range or color gamut than the developed film or print. Unlike physical film after development, the Raw file preserves the information captured at the time of exposure. The purpose of raw image formats is to save, with minimum loss of information, data obtained from the sensor. Raw image formats are intended to capture the radiometric characteristics of the scene, that is, physical information about the light intensity and color of the scene, at the best of the camera sensor's performance. Most raw image file formats store information sensed according to the geometry of the sensor's individual photo-receptive elements (sometimes called pixels) rather than points in the expected final image: sensors with hexagonal element displacement, for example, record information for each of their hexagonally-displaced cells, which a decoding software will eventually transform into the rectangular geometry during "digital developing". File contents Raw files contain the information required to produce a viewable image from the camera's sensor data. The structure of raw files often follows a common pattern: A short file header which typically contains an indicator of the byte-ordering of the file, a file identifier and an offset into the main file data Camera sensor metadata which is required to interpret the sensor image data, including the size of the sensor, the attributes of the CFA and its color profile Image metadata which can be useful for inclusion in any CMS environment or database. These include the exposure settings, camera/scanner/lens model, date (and, optionally, place) of shoot/scan, authoring information and other. Some raw files contain a standardized metadata section with data in Exif format. An image thumbnail Most raw files contain a full size JPEG conversion of the image, which is used to preview the file on
https://en.wikipedia.org/wiki/Ameriquest%20Mortgage
Ameriquest was one of the largest United States sub-prime mortgage lenders until its dissolution in September 2007. Among the first mortgage companies employing computers to solicit prospective borrowers and hasten the loan application process, Ameriquest was accused of predatory lending practices by United States banking regulators. The company was notable for its promotion of the stated income loan, whereby potential borrowers were allowed to claim income without verification of employment. The proliferation of lending to customers with marginal creditworthiness proved to be not only a key factor leading to the 2007 subprime mortgage financial crisis, but also a catalyst to Ameriquest's own demise. Ameriquest was widely known throughout the United States for its promotional activity. It advertised widely on television; flew blimps over football and baseball stadiums; and sponsored the Rolling Stones' A Bigger Bang tour, the Super Bowl XXXIX halftime show, and NASCAR drivers. Its ad slogan was "proud sponsor of the American dream," and its company motto was "do the right thing." Ameriquest frequently reiterated that their customers were "more than a number," producing a series of commercials with the theme "Don't judge too quickly. We won't." History Ameriquest was founded in 1979 by Roland Arnall, in Orange County, California, as a savings and loan association, or thrift, called Long Beach Savings & Loan. After moving to Long Beach, California and being converted to a pure mortgage lender in 1994, the company was renamed Long Beach Mortgage Co. In 1997, the department that funded loans made by independent brokers was spun off into a publicly traded company that was ultimately purchased by Washington Mutual in 1999. Long Beach Savings & Loan was subsequently reorganized into three divisions under the auspices of ACC Capital Holdings, a private conglomerate owned entirely by Arnall: Ameriquest Mortgage Company (retail banking), Argent Mortgage (wholesale banking), and AMC Mortgage Services (loan servicing). In 2004 alone, Ameriquest was estimated to have originated over $50 billion in new subprime mortgages. The home stadium of the Texas Rangers was called Ameriquest Field until March 19, 2007, when Ameriquest relinquished naming rights. The stadium was renamed Rangers Ballpark in Arlington and subsequently Globe Life Park in Arlington. On September 1, 2007, Citigroup completed its acquisition of Argent Mortgage and AMC Mortgage Services, shutting down Ameriquest Mortgage. Predatory lending allegation In 1996, the company agreed to pay $3 million into an "educational fund" to settle a Justice Department lawsuit accusing it of gouging and predatory lending practices against older, female, and minority borrowers. Prosecutors accused it of allowing mortgage brokers and its own employees to charge these customers an additional fee of as much as 12 percent of the loan amount. As part of the settlement, Ameriquest (then still known as Long Beac
https://en.wikipedia.org/wiki/Alice%20Lon
Alice Lon Wyche (November 23, 1926 – April 24, 1981), known as Alice Lon, was an American singer and dancer on The Lawrence Welk Show during its early years on network television. Early years By age 6, Lon was taking lessons in piano, singing, and dancing. When she was 10, she was featured as a singer, earning $20 per week on her own radio program in Henderson, Texas. In her teens, she traveled across Texas, performing in a variety of venues. She attended Kilgore College in Texas and was a member of the school's Rangerettes dance team. Biography Throughout the big-band era and the years that followed, each of Lawrence Welk's female vocalists was always nicknamed "The Champagne Lady". Lon assumed the title in 1955, during the TV program's first season. Her alto singing voice graced Welk's show weekly until 1959, when she left the show over musical and money issues, although a popular legend developed that she was fired for showing too much leg and for crossing her feet on Welk's desk, something he didn't like. Viewers missed the popular Alice Lon, and Welk received many messages in the American Broadcasting Company mailbox demanding that she be rehired. Welk tried to bring her back, but she refused and was ultimately replaced in 1960 by Norma Zimmer. Lawrence and Lon eventually reconciled personally, but never worked together professionally again. On Welk's show, Lon was known for wearing particularly full skirts with colorful petticoats designed by her mother, Lois Wyche, as she told TV Guide. She gave instructions in the article on how viewers might make their own petticoats. She recorded an album for Coral Records titled It's Alice with orchestra directed by George Cates, the musical supervisor for Welk's show. The liner notes provide the following: "Miss Lon, first introduced by Welk as "Alice from Dallas", began singing, dancing and playing the piano at six. By the time she was ten, the precocious young songstress was appearing on her own sponsored radio show. In her teens she began touring her native Texas playing theaters, veterans' hospitals and army camps until she was signed by Interstate Theaters in Dallas. Appearing on the Interstate circuit, she also starred on its weekly radio show, "Showtime", emanating from the Palace Theater in Dallas. While touring for Interstate, she was invited to appear on the Don McNeill's famous radio show The Breakfast Club in Chicago, an engagement that was to be the first of a great many radio and TV appearances in that area. Family Lon was married to Bob Waterman, with whom she had three sons, Bobby, Clint and Larry. After she and Waterman divorced, she married George Bowling. On the night of June 13, 1955, Lon and her family were victims of a violent robbery in their North Hollywood, California home. Death She died April 24, 1981, at Baylor University Medical Center at Dallas. The cause of death was scleroderma, an autoimmune disease. References External links 1926 births 198
https://en.wikipedia.org/wiki/Screen%20hotspot
A screen hotspot, in computing, provides a special area on the display screen of a computer for hyperlinking or for other GUI-based activity (such as re-direction, pop-up display, macro execution, etc.). Hotspots may not look visually distinct; however, a mouseover operation over elements such as hyperlinks, buttons or idle windows will often reveal them by changing the shape of the pointer. The corners and edges of the whole screen may also act as hotspots. Some screen savers under DOS and older versions of Windows can be configured to be activated immediately (that is, without waiting for some period of inactivity to time out) or to never activate the screen saver mode at all (even after timeout) when the mouse is moved into a particular (often configurable) corner of the screen. Hotspots are used extensively in Windows 8, where they are referred to as "hot corners". According to Fitts's law, which predicts the time it takes to reach a target area, moving mouse and trackball pointers to those spots is easy and fast. As the pointer usually stops when reaching a screen edge, the size of those spots can be considered of virtual infinite size, so the hot corners and edges can be reached quickly by throwing the pointer toward the edges. See also Context menu Image map References Hypertext
https://en.wikipedia.org/wiki/Cyclops%20%28computer%20system%29
Cyclops is a computer system co-invented by Bill Carlton of Great Britain and Margaret Parnis England of Malta, which is used on the ATP and WTA professional tennis tours as an electronic line judge to help determine whether a serve is in or out. The system, which must be activated by the service line umpire before each serve, projects five or six infra-red horizontal beams of light along the court 10 mm above the ground. One beam covers the good (short) side of the service line and others cover the fault (long) side. If a served ball hits the first beam, the other beams are turned off, while a long serve will break one of the other beams. A long serve is indicated by an audible signal. Obvious long serves that go beyond Cyclops' beams are called by the service line umpire. The system is tuned before and during each tournament by a representative of the company which rents the system. This representative stays through the tournament and confers with tournament officials afterwards to determine any problems which may have arisen. The system has been constantly refined to improve accuracy, although no statistics on its efficacy are available. The Cyclops computer system was introduced to the Wimbledon Championships in 1980 and the U.S. Open in 1981, and was also used at the Australian Open. With the advent of the more comprehensive Hawk-eye system in the early 2000s, Cyclops began to be superseded at major tournaments. Cyclops was replaced by Hawk-eye at the US Open from 2006, and at the Australian Open and Wimbledon from 2007. Cyclops is not currently used in any capacity at any of the tennis Grand Slam events. See also Electronic line judge Hawk-Eye Notes Tennis equipment Sports officiating technology
https://en.wikipedia.org/wiki/Lok%20Ma%20Chau
Lok Ma Chau or Lokmachau is an area in Hong Kong's New Territories. It is the site of a major pedestrian (linked directly to the Hong Kong rapid transit network) and road border crossing point between Hong Kong and mainland China. Administratively, most of the Lok Ma Chau area is located within the Yuen Long District of Hong Kong. Geography Lok Ma Chau lies just south of the Sham Chun River (or Shenzhen River in Mandarin), which forms the border between Hong Kong and mainland China. Lok Ma Chau lies opposite Huanggang in Shenzhen, China. Lok Ma Chau lies within Hong Kong's Frontier Closed Area, a buffer zone established by the Hong Kong government to prevent illegal immigration from mainland China, and access to the area is restricted to those holding Closed Area Permits. Those who are crossing the border to or from China do not need permits but must leave the area immediately after completing immigration procedures. To the southwest of Lok Ma Chau is the Mai Po Wetlands. Lok Ma Chau Loop The proposed Lok Ma Chau Loop Innovation and Technology Park is located just east of the border post and will be expected to generate up to 1.2 million square metres of additional office space when completed. Lok Ma Chau Village The Cheung clan originated from Dongguan in Guangdong province and settled in Lok Ma Chau Village () about 500 years ago. Education Lok Ma Chau is in Primary One Admission (POA) School Net 74. Within the school net are multiple aided schools (operated independently but funded with government money) and one government school: Yuen Long Government Primary School (元朗官立小學). Facilities Lok Ma Chau Control Point Lok Ma Chau station See also Ha Wan Tsuen, another village in the Lok Ma Chau area References Hong Kong articles needing attention
https://en.wikipedia.org/wiki/Shannon%20Denton
Shannon Eric Denton is an American veteran storyteller and artist with credits at Cartoon Network, Warner Bros., Jerry Bruckheimer Films, NBC, Disney, Sony, ToyBiz, Marvel Entertainment, Fox Kids, Paramount Pictures, CBS, Dimension Films, DC Comics, and Nickelodeon. Biography Denton is a veteran storyteller and artist with credits at Cartoon Network, Warner Bros., Riot Games, Showtime, Jerry Bruckheimer Films, NBC, Disney, Sony, LEGO, Marvel Entertainment, FoxKids, Paramount, CBS, Dimension Films, DC Comics, and Nickelodeon. Denton was a storyboard artist on the Oscar-nominated feature Jimmy Neutron: Boy Genius and directed the original commercial animations for the movie. He has written for Cartoon Network, Warner Bros. and Disney/Marvel and worked in live action on shows like Community, Con Man, Ally McBeal, Las Vegas, US of Tara and his projects have been featured in Entertainment Weekly and Publishers Weekly. In 1992, Denton was an artist for Image Comic's Extreme Studios working with Deadpool creator Rob Liefeld. From 1995–1999 Denton contributed to the design and development of almost every animated action adventure show produced by the Fox Kids Network, including X-Men, Spider-Man and the Annie nominated Silver Surfer series, as well as doing comic work for DC Comics, Dark Horse, Image Comics and Marvel on titles ranging from Deadpool to Star Wars. Denton is featured in a section of the book Toon Art: The Graphic Art of Digital Cartooning and contributed to the cover art. In 2000 Denton founded Komikwerks, an independent comic publishing entity with partner Patrick Coyle, which has partnered with AOL and comics legend Stan Lee. Komikwerks has also launched a new line of illustrated children's action books under the Actionopolis imprint. He has worked for publishers Tokyopop, Desperado Publishing, Boom, AiT/Planet Lar, IDW, Dynamite and Image Comics. Denton was also nominated for the 27th, 28th, and 29th Annual Comic Buyers Guide Fan Awards for Favorite Editor. Denton's book Grunts: War Stories was nominated for the 29th Annual Comic Buyers Guide Fan Awards for Favorite Graphic Novel. Denton worked on the Eisner & Harvey Nominated Outlaw Territory from Image Comics. Denton's book Graveslinger was nominated for a 2010 Harvey Award. Denton's co-creation, Fleshdigger, was picked as an entrant in Image Comics/TopCow's 2011 pilot season project and he was featured on MTV. Denton won the 2011 Shel Dorf Award for editor of the year, and was again nominated in 2012. Denton is currently working with Alan Tudyk, Nathan Fillion and PJ Haarsma on their sci-fi epic Spectrum (spinning out of the Lionsgate/ComicCon HQ Con Man series) and overseeing production of the comic and animation. Denton was a producer on season 2 of Con Man. Denton and Actionopolis are represented by Circle of Confusion. Denton co-founded TV/film development company Monster Forge Productions with 30 Days of Night co-creator Steve Niles. Monster Forge Productions is repped
https://en.wikipedia.org/wiki/Philosophy%20of%20artificial%20intelligence
The philosophy of artificial intelligence is a branch of the philosophy of mind and the philosophy of computer science that explores artificial intelligence and its implications for knowledge and understanding of intelligence, ethics, consciousness, epistemology, and free will. Furthermore, the technology is concerned with the creation of artificial animals or artificial people (or, at least, artificial creatures; see artificial life) so the discipline is of considerable interest to philosophers. These factors contributed to the emergence of the philosophy of artificial intelligence. The philosophy of artificial intelligence attempts to answer such questions as follows: Can a machine act intelligently? Can it solve any problem that a person would solve by thinking? Are human intelligence and machine intelligence the same? Is the human brain essentially a computer? Can a machine have a mind, mental states, and consciousness in the same sense that a human being can? Can it feel how things are? Questions like these reflect the divergent interests of AI researchers, cognitive scientists and philosophers respectively. The scientific answers to these questions depend on the definition of "intelligence" and "consciousness" and exactly which "machines" are under discussion. Important propositions in the philosophy of AI include some of the following: Turing's "polite convention": If a machine behaves as intelligently as a human being, then it is as intelligent as a human being. The Dartmouth proposal: "Every aspect of learning or any other feature of intelligence can in principle be so precisely described that a machine can be made to simulate it." Allen Newell and Herbert A. Simon's physical symbol system hypothesis: "A physical symbol system has the necessary and sufficient means of general intelligent action." John Searle's strong AI hypothesis: "The appropriately programmed computer with the right inputs and outputs would thereby have a mind in exactly the same sense human beings have minds." Hobbes' mechanism: "For 'reason' ... is nothing but 'reckoning,' that is adding and subtracting, of the consequences of general names agreed upon for the 'marking' and 'signifying' of our thoughts..." Can a machine display general intelligence? Is it possible to create a machine that can solve all the problems humans solve using their intelligence? This question defines the scope of what machines could do in the future and guides the direction of AI research. It only concerns the behavior of machines and ignores the issues of interest to psychologists, cognitive scientists and philosophers, evoking the question: does it matter whether a machine is really thinking, as a person thinks, rather than just producing outcomes that appear to result from thinking? The basic position of most AI researchers is summed up in this statement, which appeared in the proposal for the Dartmouth workshop of 1956: "Every aspect of learning or any other feature of int
https://en.wikipedia.org/wiki/Supply%20network%20operations
Supply network operations are the synchronized execution of compliant manufacturing and logistics processes across a dynamically reconfigurable supply network to profitably meet demand.supply network References Supply chain management
https://en.wikipedia.org/wiki/Spelling%20suggestion
Spelling suggestion is a feature of many computer software applications used to suggest plausible replacements for words that are likely to have been misspelled. Spelling suggestion features are commonly included in Internet search engines, word processors, spell checkers, medical transcription, automatic query reformulation, and frequency-log statistics reporting. Algorithms Any spell checker must have some data about the words in the target language, either in general usage or with specialized knowledge (like medical vocabulary). This can come from: A dictionary of all known words. A text corpus which includes typical text, known to be correctly spelled. A list of frequently misspelled words, mapping errors to corrections. Logs of human text input, such as from a popular search engine. This is essentially a crowdsourced corpus, but it is assumed there will be some spelling mistakes. Data might be included about when people click on a spelling suggestion or make a second, very similar query; this creates a crowdsourced mapping of misspelled words to reliable corrections. A list of frequently misspelled words, possibly including multi-word phrases, can simply be consulted to see if any of the input words or phrases are listed. To make use of a dictionary without a pre-existing mapping from misspellings to corrections, the typical technique is to calculate the edit distance between an input word and any given word in the dictionary. The Levenshtein distance metric considers an "edit" to be the insertion, deletion, or substitution (with another letter) of one letter. The Damerau–Levenshtein distance adds transpositions (the swapping of neighboring letters). Dictionary words that are an edit distance of 1 away from the input word are considered highly likely as corrections, edit distance 2 less likely, and edit distance 3 sometimes included in suggestions and sometimes ignored. A text corpus can be summed up as a dictionary of known words, with a frequency of appearance for each word. This can be used to sort the spelling suggestions. For example, if there are multiple suggestions of edit distance 1, the words that appear most frequently in the corpus are most likely to be the desired correction. Because a dictionary of known words is very large, calculating the edit distance between an input word and every word in the dictionary is computationally intensive and thus relatively slow. Various data structures can be utilized to speed up storage lookups, such as BK-trees. A faster approach adopted by Peter Norvig generates all the permutations from an input word of all possible edits. For a word of length n and an alphabet of size a, for edit distance 1 there are at most n deletions, n-1 transpositions, a*n alterations, and a*(n+1) insertions. Using only the 26 letters in the English alphabet, this would produce only 54*n+25 dictionary lookups, minus any duplicates (which depends on the specific letters in the word). This is relatively sm
https://en.wikipedia.org/wiki/Jeff%20Trinkle
Jeffrey C. Trinkle is Professor and Chair of the Computer Science and Engineering department at Lehigh University in Bethlehem, Pennsylvania. He is known for his work in robotic manipulation, multibody dynamics, and automated manufacturing. He has bachelor's degrees in physics (1979) and engineering (1979) from Ursinus College and Georgia Institute of Technology, respectively, and a PhD (1987) from the University of Pennsylvania. He has taught at the University of Arizona, Rensselaer Polytechnic Institute, and Texas A&M University. From 1998 to 2003 he was a research scientist at Sandia National Laboratories in Albuquerque, New Mexico. Trinkle's primary research interests lie in the areas of robotic manipulation, multibody dynamics, and automated manufacturing. With continuous support from the National Science Foundation since 1988, he has written over 100 technical articles. One of these articles (with David Stewart) was the first to develop a popular method for simulating multibody systems. Variants of this method are key components of several physics engines for computer game development, for example, NVIDIA PhysX and Bullet. For his work in the area of robotic grasping and dexterous manipulation, Trinkle was elected Fellow of the IEEE in 2010. He spent most of 2010 as a Humboldt Fellow at the Institute for Mechatronics and Robotics at the German Aerospace Center and the Institute for Applied Mechanics at Technical University of Munich. References External links Selected publications, from Trinkle's website. Feature on Trinkle in Design news. Brief bio, from Trinkle's website. News from RPI. American computer scientists Georgia Tech alumni Ursinus College alumni University of Pennsylvania alumni University of Arizona faculty Texas A&M University faculty Academic staff of the Technical University of Munich Fellow Members of the IEEE Living people Year of birth missing (living people) Sandia National Laboratories people Rensselaer Polytechnic Institute faculty
https://en.wikipedia.org/wiki/Cenobita
Cenobita is an aggrotech/cyberpunk band based in Mexico City, created in 1994 by Claus Bita (programming, vocals and production) and former band member Omar Flo (vocals). History Cenobita formed as a duo of Claus Bita and Omar Flo in August of 1994. Bita and Flo met in Mexico City in 1993 and discovered a shared like for industrial and electronic music, inspired by bands such as Skinny Puppy and Front Line Assembly, and drawing mutual conceptual inspiration from the 'cyberpunk' works of William Gibson. At the time, Flo owned some equipment that the duo used to begin making their own electronic music. They chose the name "Cenobita," english for Cenobite, which they described as meaning "an anchorate, a person that is dedicated to conceiving the meaning of life and to following his or her own principles." Cenobita was a founding member of a loose association known as 'La Corporacion' alongside fellow Mexico City acts Hocico and Deus Ex Machina. Their involvement in this group, which was organized around the desire to promote the electro-industrial scene in Mexico City, led to numerous live performances. By 1996, Flo established the annual Electronic Music and Arts festival in Mexico City, at which Cenobita was a frequent participant. Their first public work was the track "Genetica Mechanica," which was released on the Opción Sónica compilation From Trance to Cyber in 1994. The following year Cenobita recorded the demo tape Cybertuality which featured a more crossover sound using guitars. In 1996 they released a longer demo tape named Visiones. The early demos were met to a generally positive response, both in their homeland and around the world. By 1999, they released their debut CD Neo Milenio on the independent Mexican label Opción Sónica. By this time they dropped the guitars and engaged in a more sample-heavy electronic sound. The band began to make inroads into the US market, though Omar Flo left the line-up in 2001, leaving Claus Bita as the sole member of the group. The Matrix Cube label issued their debut album in Europe during the same year, and Cenobita's first European tour followed the release of follow-up album 'Metamorphosis' in 2002. Musical and performance style The lyrics are influenced by many cyberpunk themes and features, including novel Neuromancer by writer William Gibson, and daily life experiences in Mexico City. The music itself goes around the electronica/aggrotech sound, with pounding beats, complex harmony and noisy soundscapes. Vocals are mainly distorted and are sung in both English and Spanish. For live performances, the band used Omar Flo's theater background to generate a highly visual aspect to their shows. Their stage shows take on a distinct performance art ethic, including customized stage props and dynamic effects and theatrics including smashing electronics and the use of blood. Discography Albums Neo Milenio (1999, Opción Sónica, Released by Trisol Music Group in Europe in 2001) Metamorfosis (2002,
https://en.wikipedia.org/wiki/Forward%20declaration
In computer programming, a forward declaration is a declaration of an identifier (denoting an entity such as a type, a variable, a constant, or a function) for which the programmer has not yet given a complete definition. It is required for a compiler to know certain properties of an identifier (size for memory allocation, data type for type checking, such as type signature of functions), but not other details, like the particular value it holds (in case of variables or constants) or definition (in the case of functions). This is particularly useful for one-pass compilers and separate compilation. Forward declaration is used in languages that require declaration before use; it is necessary for mutual recursion in such languages, as it is impossible to define such functions (or data structures) without a forward reference in one definition: one of the functions (respectively, data structures) must be defined first. It is also useful to allow flexible code organization, for example if one wishes to place the main body at the top, and called functions below it. In other languages forward declarations are not necessary, which generally requires instead a multi-pass compiler and for some compilation to be deferred to link time. In these cases identifiers must be defined (variables initialized, functions defined) before they can be employed during runtime without the need for pre-definition in the source code for either compilation or interpretation: identifiers do not need to be immediately resolved to an existing entity. Examples A basic example in C is: void printThisInteger(int); In C and C++, the line above represents a forward declaration of a function and is the function's prototype. After processing this declaration, the compiler would allow the program code to refer to the entity printThisInteger in the rest of the program. The definition for a function must be provided somewhere (same file or other, where it would be the responsibility of the linker to correctly match references to a particular function in one or several object files with the definition, which must be unique, in another): void printThisInteger(int x) { printf("%d\n", x); } Variables may have only forward declaration and lack definition. During compilation time these are initialized by language specific rules (to undefined values, 0, NULL pointers, ...). Variables that are defined in other source/object files must have a forward declaration specified with a keyword extern: int foo; //foo might be defined somewhere in this file extern int bar; //bar must be defined in some other file In Pascal and other Wirth programming languages, it is a general rule that all entities must be declared before use, and thus forward declaration is necessary for mutual recursion, for instance. In C, the same general rule applies, but with an exception for undeclared functions and incomplete types. Thus, in C it is possible (although unwise) to implement a pair of mutually recursive fu
https://en.wikipedia.org/wiki/Media%20history%20of%20China
A timeline of China's media-related history since World War II, including computer hardware, software development, the history of the Internet, etc. Prior to founding of the People's Republic of China Mao Zedong stated that the masses should be involved in journalism. In his widely publicized remarks with journalists at Jin-Sui Daily in 1948, Mao said, "With our newspapers, too, we must rely on everybody, on the masses of the people, on the whole Party to run them, not merely on a few persons behind closed doors." 1950s In both the Yan'an era of the 1930s and the early 1950s, the Chinese Communist Party (CCP) encouraged grassroots journalism in the form of "worker-peasant correspondents," an idea originating from the Soviet Union. At the PRC's founding in 1949, there were less than 600 movie theatres in the country. In 1956, the “Long-Range Plan for the Development of Science and Technology from 1956-1967” commissioned a group of scientists and researchers to develop computer technology for national defense. The Plan's goals included furthering radio, telecommunication, and atomic energy projects. Shortly thereafter, the first state-sanctioned computer development program began with the Chinese Academy of Sciences affiliated Beijing Institute of Computing Technology (ICT). In 1958, the first Chinese-made computer was developed by the Institute of Military Engineering at the University of Harbin as part of the ICT. The computer, dubbed the 901, was a vacuum-tube computer. The 901 was a copy of an earlier Soviet model. 1960s After the Chinese stopped receiving Soviet technical and financial assistance in 1960, there was a deeply felt loss of technical expertise that stunted development. Additionally, the Cultural Revolution slowed technological progress. However, transistor-based computers including the 109B, 109C, DJS-21, DJS-5 and C-2 were developed during the 1960s. Despite the large improvements in the computing power of these machines, and advances in the hardware like integrated-circuitry there is little evidence that computers were being designed for widespread consumer use. During this period of Chinese "self-reliance," the computers developed in the second half of the 1960s did not resemble Soviet computers nor their Western counterparts. The new transistor-based machines were distinctly Chinese creations. During the early period (1966-1968) of the Cultural Revolution, freedom of the press in China was at its peak. While the number of newspapers declined in this period, the number of independent publications by mass political organizations grew. Mao used mass media to encourage rebels to establish their own independent mass political organizations and their own publications. According to China's National Bureau of Statistics, the number of newspapers dropped from 343 in 1965, to 49 in 1966, and then to a 20th-century low of 43 in 1967. At the same time, the number of publications by mass organizations such as Red Guards grew t
https://en.wikipedia.org/wiki/ACDT
ACDT may refer to: Apple Certified Desktop Technician, a computer certification Australian Central Daylight Time, a time in Australia
https://en.wikipedia.org/wiki/ESTAR%20project
The eSTAR project was a multi-agent system that aimed to implement a heterogeneous network of robotic telescopes for automated observing, and ground-based follow-up to transient events. The project is a joint collaboration between the Astrophysics Group of the University of Exeter and the Astrophysics Research Institute at Liverpool John Moores University. The project was led by Alasdair Allan and Tim Naylor at the University of Exeter, and Iain Steele at Liverpool John Moores University. The eSTAR Project was affiliated with the RoboNet Consortium, and the global Heterogeneous Telescope Networks Consortium. Begun in 2001, the project was part of the virtual observatory. By 2006 the project was running autonomous software agent for observations of variable stars implementing the optimal sampling techniques of Saunders et al. (2006), and the prototype was successfully tested on the RoboNet network of telescopes which includes: the Liverpool Telescope, the Faulkes Telescope North and the Faulkes Telescope South. By 2007 the eSTAR Project was "live" supporting two real-time observing projects. The first was automated follow-up observations of gamma-ray bursts performed using the 3.8m United Kingdom Infrared Telescope (UKIRT) operated by Joint Astronomy Centre in Hawaii (JACH). The first ground based observations of GRB 090423 were triggered via the eSTAR Project, with initial observations by the Swift Gamma-Ray Burst Mission automatically followed by UKIRT just a few minutes after the initial observation by the SWIFT satellite. The observations autonomously triggered by the eSTAR software were reported in Tanvir et al. This gamma-ray burst was, at the time of discovery, the most distant object then known in the Universe. The second project was the search for extra-solar planets by placing observations on the RoboNet system of telescopes on behalf of the PLANET collaboration. The technique of gravitational microlensing is used to monitor large numbers of stars in the galactic bulge looking for the tell-tale signature of cool planets orbiting those stars. The project also operated the heaviest used of the initial generation of Virtual Observatory VOEvent brokers, exposing its real-time alert system to other collaborators, like the TALONS Project. In 2009 the project lost funding and was shuttered. References Observational astronomy Applications of artificial intelligence University of Exeter Liverpool John Moores University Robotic telescopes Agent-based software 2006 robots Robots of the United Kingdom
https://en.wikipedia.org/wiki/Ronja
Ronja may refer to: Ronia, the Robber's Daughter (Ronja Rövardotter), a children's book by Astrid Lindgren Reasonable Optical Near Joint Access, an optical point-to-point Free Space Optics data link Ronja (given name), the name Ronja. See also Ronya (disambiguation) Ronia (disambiguation)
https://en.wikipedia.org/wiki/Disk%20First%20Aid
Disk First Aid is a free software utility made by Apple Inc. that was bundled with all computers running the classic Mac OS. This tool verifies and repairs a limited number of directory structure problems on any HFS or HFS Plus hard disk or volume. Disk First Aid is a very simple tool, with it only being able to detect and repair directory damage and many books are critical of its sometimes inaccurate reporting of errors, and often suggest to run the tool more than once to ensure a consistent result. Disk First Aid is located in Applications:Utilities:Disk First Aid. The classic Mac OS provides an option to run Disk First Aid on startup, although it has been reported that it provides little gain and sometimes can amplify a problem. Its capabilities were incorporated into Disk Utility in macOS. Situations to use the tool One source suggests that disk utility should be used when there are: Frequent system crashes, Disappearing files, Files changing size, Problems copying files from one place to another, Problems saving files, Cryptic error messages, as well as for general maintenance every 6 months. Analysis Disk First Aid has built-in capabilities to check for damage to: Partition Map, Device Driver, Boot Blocks, Master Directory Block, Volume Bitmap, Catalog File, Extents File, Finder Attributes, Disk volume, Extent B-tree, Catalog B-tree, Catalog Hierarchy, Volume Info, and to search for locked volume name. After analyzing the disk directory, Disk First Aid determines whether it is able to repair any damage that was detected. The utility can commonly only fix problems associated with the catalog/extents files and the volume bitmap. Commonly, the program reports that there is an error, but cannot fix it. See also List of data recovery software Notes Classic Mac OS Classic Mac OS-only software made by Apple Inc. Hard disk software
https://en.wikipedia.org/wiki/Security%20operations%20center
A security operations center (SOC) is responsible for protecting an organization against cyber threats. SOC analysts perform round-the-clock monitoring of an organization’s network and investigate any potential security incidents. If a cyberattack is detected, the SOC analysts are responsible for taking any steps necessary to remediate it. It comprises the three building blocks for managing and enhancing an organization's security posture: people, processes, and technology. Thereby, governance and compliance provide a framework, tying together these building blocks. A SOC within a building or facility is a central location from which staff supervises the site using data processing technology. Typically, a SOC is equipped for access monitoring and control of lighting, alarms, and vehicle barriers. IT An information security operations center (ISOC) is a dedicated site where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended. The United States government The Transportation Security Administration in the United States has implemented security operations centers for most airports that have federalized security. The primary function of TSA security operations centers is to act as a communication hub for security personnel, law enforcement, airport personnel and various other agencies involved in the daily operations of airports. SOCs are staffed 24-hours a day by SOC watch officers. Security operations center watch officers are trained in all aspects of airport and aviation security and are often required to work abnormal shifts. SOC watch officers also ensure that TSA personnel follow proper protocol in dealing with airport security operations. The SOC is usually the first to be notified of incidents at airports such as the discovery of prohibited items/contraband, weapons, explosives, hazardous materials as well as incidents regarding flight delays, unruly passengers, injuries, damaged equipment and various other types of potential security threats. The SOC in turn relays all information pertaining to these incidents to TSA federal security directors, law enforcement and TSA headquarters. See also National SIGINT Operations Centre References Security Surveillance Security engineering
https://en.wikipedia.org/wiki/Apple%20HD%20SC%20Setup
Apple HD SC Setup is a small software utility that was bundled with various versions of the classic Mac OS and A/UX operating systems made by Apple Computer. Introduced with Apple's first SCSI hard drive, the Hard Disk 20SC in September 1986, Apple HD SC Setup can update drivers and partition and initialize hard disks. It was often used when reinstalling the operating system of an Apple Macintosh computer, or to repair corrupt partition information on a SCSI hard disk. Prior to its introduction, the formatting of disks was handled exclusively by the Mac's Finder application, or by third-party formatting utility software customized for a specific disk drive. The version of Apple HD SC Setup that shipped with the classic Mac OS was only able to manipulate hard disks that featured Apple ROMs. Versions of the program that were bundled with A/UX, however, could be used with any SCSI disk. A third-party patch was released enabling standard editions of Apple HD SC Setup to work on any SCSI disk. In the mid-1990s, when Apple began shipping computers using ATA hard drives, Apple HD SC Setup was joined by Internal HD Format, which could only format IDE drives. Eventually, both Internal HD Format and Apple HD SC Setup were superseded with Drive Setup in 1995, which combined SCSI and IDE formatting abilities, and ultimately by Disk Utility in macOS. References External links Download Apple HD SC Setup 7.3.5 from apple.com Classic Mac OS software Products introduced in 1986
https://en.wikipedia.org/wiki/Rebecca%20Wirfs-Brock
Rebecca J. Wirfs-Brock (born 1953 in Portland, Oregon) is an American software engineer and consultant in object-oriented programming and object-oriented design, the founder of the information technology consulting firm Wirfs-Brock Associates, and inventor of Responsibility-Driven Design, the first behavioral approach to object design. Wirfs-Brock holds a B.A. in computer and information science and psychology from the University of Oregon. She worked at Tektronix for 15 years as a software engineer before moving on to Instantiations (founded by her husband Allen Wirfs-Brock), which was acquired by Digitalk which merged with Parc Place Systems to become ParcPlace-Digitalk in 1995. She was the Chief Technologist for the professional services organization of a Smalltalk language vendor. She holds a U.S. Patent #4,635,049 "Apparatus for Presenting Image Information for Display Graphically" together with Warren Dodge. Wirfs-Brock first coined the "-driven" meme in an OOPSLA 1989 paper she co-authored with Brian Wilkerson. Before that time, the most prevalent way of structuring objects was based on entity-relationship modeling ideas (popularized by James Rumbaugh, Steve Mellor and Sally Shlaer). She wrote about object role stereotypes in 1992 in a Smalltalk Report article and this influenced the UML notion of stereotypes. Her invention of the conversational (two-column) form of use cases was then popularized by Larry Constantine. Most of the more recent "driven" design approaches acknowledge their roots and the influence of RDD, of which class-responsibility-collaboration cards are one popular technique. She was the design columnist for IEEE Software until December 2009. Bibliography Designing Object-Oriented Software, with Brian Wilkerson and Lauren Wiener, Prentice-Hall, 1990, Object Design: Roles, Responsibilities, and Collaborations, with Alan McKean. Addison-Wesley, 2003, References External links An Interview with Rebecca Wirfs-Brock Wirfs-Brock Consulting SE Radio Interview With Rebecca Wirfs-Brock Living people American technology writers 1953 births Writers from Portland, Oregon University of Oregon alumni Tektronix people Engineers from Oregon
https://en.wikipedia.org/wiki/Charter%20College%20%28United%20States%29
Charter College is a network of private, for-profit colleges in the United States. They offer programs in healthcare, business, veterinary science, information technology, and select trade careers. Charter operates campuses in five states and offers certificates, associate, and bachelor's degrees. Fully online programs are available for select programs. History Charter College was founded in by Milton Byrd, former provost of Florida International University and President of Chicago State University with a campus in Anchorage, Alaska. Charter has opened campuses in 14 additional cities and has added online degree programs, as well. In 2016, Charter Institute was developed to bring the Charter education approach to New Mexico. Risk of closure in 2023 In the spring of 2023, the state of Washington listed the school as "at risk" due to the companies financial status. The school was forced to notify all incoming and existing students as well as present a closure plan to the state. A few months later, the state of Alaska also listed the school as "at risk" due to the company's financial status. The school was forced to notify all incoming and existing students as well as present a closure plan to the state. The college reported a net operating loss of 5.2 million dollars with a negative cash flow of 6.6 million dollars, further depleting the cash reserves of the company. Mass layoffs occurred at or around the time of this report. The school was unable to secure the required surety bond that was requested by the state of Alaska. Accreditation Charter College is accredited by the Accrediting Bureau of Health Education Schools to award bachelor of science degrees, associate of applied science degrees, certificates, and non-credit courses. Charter College also holds programmatic accreditation for the Associate of Applied Science in Nursing program from the Accrediting Commission for Education in Nursing. References External links Official website Private universities and colleges in Alaska Education in Anchorage, Alaska Education in Matanuska-Susitna Borough, Alaska Universities and colleges in Los Angeles County, California Universities and colleges in Ventura County, California Universities and colleges in Bellingham, Washington Education in Vancouver, Washington Pasco, Washington Two-year colleges in the United States For-profit universities and colleges in the United States Private universities and colleges in California
https://en.wikipedia.org/wiki/Jean%20E.%20Sammet
Jean E. Sammet (March 23, 1928 – May 20, 2017) was an American computer scientist who developed the FORMAC programming language in 1962. She was also one of the developers of the influential COBOL programming language. She received her B.A. in Mathematics from Mount Holyoke College in 1948 and her M.A. in Mathematics from University of Illinois at Urbana-Champaign in 1949. She received an honorary D.Sc. from Mount Holyoke College in 1978. Sammet was employed by Sperry Gyroscope from 1955 to 1958 where she supervised the first scientific programming group. From 1958 to 1961, she worked for Sylvania as a staff consultant for programming research and a member of the original COBOL group. She joined IBM in 1961 where she developed FORMAC, the first widely used computer language for symbolic manipulation of mathematical formulas. At IBM she researched the use of restricted English as a programming language and the use of natural language for mathematical programs. She was Programming Technology Planning Manager for the Federal Systems Division from 1968 to 1974, and was appointed Software Technology Manager in 1979. Sammet founded the ACM Special Interest Committee on Symbolic and Algebraic Manipulation (SICSAM) in 1965 and was chair of the Special Interest Group on Programming Languages (SIGPLAN). She was the first female president of the ACM, from 1974 to 1976. Early life Jean E. Sammet was born on March 23, 1928, in New York City. Jean and her sister, Helen, were born to Harry and Ruth Sammet who were both lawyers. Jean and Helen attended public elementary schools in Manhattan. Sammet had a strong interest in mathematics but was unable to attend the Bronx High School of Science because it did not accept girls. Instead, Sammet attended Julia Richman High School. Sammet chose to enroll at Mount Holyoke College based on the strength of its mathematics program. Sammet majored in mathematics and took education courses, which allowed her to be certified to teach high school mathematics in New York. She minored in political science. After graduating from Mount Holyoke, Sammet pursued graduate studies at the University of Illinois, where she received her MA in 1949. While taking courses toward a Ph.D., she was a teaching assistant in the Mathematics department at the University of Illinois from 1948 to 1951. When Sammet first encountered a computer, in 1949 at the University of Illinois, she was not impressed, considering it an obscene piece of hardware. In 1951, Sammet began looking for a position in education. Sammet was forced to search for positions in New Jersey because New York City was not hiring new teachers. The authorities in New Jersey determined that Sammet was missing two courses from her studies: a course in education and one in the history of New Jersey. Sammet fought this determination, stating that her knowledge of New Jersey history did not strengthen her ability to teach mathematics in high school. This forced Sammet to seek o
https://en.wikipedia.org/wiki/Miracle%20Systems
Miracle Systems Ltd. were a manufacturer of personal computer peripherals and upgrades, specializing in the Sinclair QL, in the 1980s and early 1990s.The company was incorporated in February 1983. Initially, they produced simple peripherals such as an RS-232 to Centronics parallel printer interface adapter. Later, they designed the Expanderam series of RAM expansion cards for the QL, which led to the Trump Card combined RAM expansion and floppy disk interface. This was notable in that it mapped RAM into memory space reserved for external peripheral devices, thus allowing the QL's RAM to be expanded to 768 kB rather than the official limit of 512 kB. The Trump Card was later superseded by the Gold Card processor upgrade card. This replaced the QL's 68008 CPU with a 16 MHz 68000 and included 2 MB of RAM, a floppy disk interface (supporting DD, HD, and ED density 3.5 in drives) and a non-volatile real-time clock. Gold Card plugged into the QL expansion slot and required no internal modifications to the host QL. The follow-up Super Gold Card had a 24 MHz 68020 CPU, 4MB of RAM, and added a Centronics parallel printer interface. In 1993, Miracle launched the QXL QL emulator card for PCs. This comprised a 20 MHz (later 25 MHz) 68EC040 processor, up to 8 MB of RAM and an FPGA on an ISA card. The QXL ran the SMSQ Qdos-compatible operating system and used the host PC's disks, screen, keyboard, serial and parallel ports via an MS-DOS "server". Two QLAN-compatible network ports were also provided on the QXL card. The company was finally wound up in August 2004. References See also Cambridge Systems Technology Sinclair QL Sinclair Research Defunct computer companies of the United Kingdom Sinclair QL
https://en.wikipedia.org/wiki/One%20Per%20Desk
The One Per Desk, or OPD, was an innovative hybrid personal computer/telecommunications terminal based on the hardware of the Sinclair QL. The One Per Desk was built by International Computers Limited (ICL) and launched in the UK in 1984. It was the result of a collaborative project between ICL, Sinclair Research and British Telecom begun in 1983, originally intended to incorporate Sinclair's flat-screen CRT technology. Rebadged versions of the OPD were sold in the United Kingdom as the Merlin Tonto and as the Computerphone by Telecom Australia and the New Zealand Post Office. The initial orders placed for the One Per Desk were worth £4.5 million (for 1500 units) from British Telecom and £8 million from Telecom Australia, with ICL focusing on telecommunications providers as the means to reach small- and medium-sized businesses. Sales of the OPD worth were reportedly made by ICL within the first nine months of the product becoming available, largely involving contracts with British Telecom and the telecommunications authorities of Australia, Hong Kong and New Zealand. Hardware From the QL, the OPD borrowed the 68008 CPU, ZX8301/8302 ULAs, 128 KB of RAM and dual Microdrives (re-engineered by ICL for greater reliability) but not the Intel 8049 Intelligent Peripheral Controller. Unique to the OPD was a "telephony module" incorporating an Intel 8051 microcontroller (which also controlled the keyboard), two PSTN lines and a V.21/V.23 modem, plus a built-in telephone handset and a TI TMS5220 speech synthesiser (for automatic answering of incoming calls). The OPD was supplied with either a 9-inch monochrome (white) monitor, priced at £1,195 plus VAT, or with a 14-inch colour monitor, priced at £1,625 plus VAT. Both monitors also housed the power supply for the OPD itself. Later, 3.5" floppy disk drives were also available from third-party vendors. Software The system firmware (BFS or "Basic Functional Software") was unrelated to the QL's Qdos operating system, although a subset of SuperBASIC was provided on Microdrive cartridge. The BFS provided application-switching, voice/data call management, call answering, phone number directories, viewdata terminal emulation and a simple calculator. The Psion applications suite bundled with the QL was also ported to the OPD as Xchange and was available as an optional ROM pack, priced at £130. Other optional application software available on ROM included various terminal emulators such as Satellite Computing's ICL7561 emulator, plus their Action Diary and Presentation Software, address book, and inter-OPD communications utilities. An ICL supplied application was used to synchronise a national bingo game across hundreds of bingo halls in the UK. The integral V.23 dialup modem was used to provide remote communications to the central server. Several UK ICL Mainframe (Series 39) customers, in Local Government and Ministry of Defence sectors, used statistics applications on OPD systems to view graphical re
https://en.wikipedia.org/wiki/Barracuda%20Networks
Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's security products include products for protection against email, web surfing, web hackers and instant messaging threats such as spam, spyware, trojans, and viruses. The company's networking and storage products include web filtering, load balancing, application delivery controllers, message archiving, NG firewalls, backup services and data protection. History Barracuda Networks was founded in 2003 by Dean Drako (founding CEO), Michael Perone, and Zach Levow; the company introduced the Barracuda Spam and Virus Firewall in the same year. In 2007 the company moved its headquarters to Campbell, California, and opened an office in Ann Arbor, Michigan. In January 2006, it closed its first outside investment of $40 million from Sequoia Capital and Francisco Partners. On January 29, 2008, Barracuda Networks was sued by Trend Micro over their use of the open source anti-virus software Clam AntiVirus, which Trend Micro claimed to be in violation of their patent on 'anti-virus detection on an SMTP or FTP gateway'. In addition to providing samples of prior art in an effort to render Trend Micro's patent invalid, in July 2008 Barracuda launched a countersuit against Trend Micro claiming Trend Micro violated several antivirus patents Barracuda Networks had acquired from IBM. In December 2008, the company launched the BRBL (Barracuda Reputation Block List), its proprietary and dynamic list of known spam servers, for free and public use in blocking spam at the gateway. Soon after opening BRBL many IP addresses got blacklisted without apparent reason and without any technical explanation. As of October 2009, Barracuda had over 85,000 customers. As of November 2011, Barracuda had more than 130,000 customers. As of January 2014, Barracuda has more than 150,000 customers worldwide. In 2012, the company became a co-sponsor of the Garmin-Barracuda UCI ProTour cycling team and entitlement sponsor of the 2011 Indianapolis 500 champion Bryan Herta Autosport in the IndyCar Series, with the #98 Lotus driven by Alex Tagliani, who will defend the team's championship. Barracuda Networks expanded its research and development facility in Ann Arbor to a 12,500 square foot office building on Depot Street in 2008. By 2012, the Michigan-based research division had grown to about 180 employees, again outgrowing its space. In June 2012, Barracuda signed a lease to occupy the 45,000 square foot office complex previously used as the Borders headquarters on Maynard St in downtown Ann Arbor. In July 2012, Dean Drako, Barracuda Networks's co-founder, president and CEO since it was founded in 2003, resigned his operating position, remaining on the company's board of directors. At the time of Drako's departure, the company stated it had achieved profitability, a nearly ongoing 30 annual percent growth rate since inception, 150,00
https://en.wikipedia.org/wiki/Watermead%20Country%20Park
The Watermead Country Park is a network of artificial lakes in the valley of the River Soar and the old Grand Union Canal, in and to the north of Leicester and in and to the south of the Borough of Charnwood in Leicestershire. The southern part of the park, which includes the Hill and the Mammoth is located in Rushey Mead. It runs north to south along the path of the watercourses, with Birstall to the west and Thurmaston to the east. The parks provide bird watching, fishing and watersports facilities, and are managed by a partnership of Leicestershire County Council, Leicester City Council and Charnwood Borough Council. The park includes three Local Nature Reserves, Reedbed - Watermead Country Park (North), Watermead Country Park - South and Birstall Meadows. The northernmost lake is named John Merricks Lake, after the late John Merricks, a silver Olympic medallist who competed in sailing events on a nearby lake as a schoolboy. He died in a car accident in 1997. Further south is King Lear's Lake, a popular fishing lake which can be circumnavigated and is popular with people walking dogs and cyclists. A statue on the western side of the lake depicts the final scene of Shakespeare's play King Lear. The lake is also used for open water swim training by Leicester Triathlon Club, and for water training of Newfoundland Dogs. A 5km parkrun takes place at the Country Park each Saturday morning. There are several further artificial lakes continuing south following the course of the canal ending with the southernmost lake, often referred to as the Mammoth lake due to the presence of a large statue of a Mammoth atop a small hill aside the lake, from where one can see Leicester and the surrounding area for some distance in either direction. There was a previous woolly mammoth where the current one stands, although it was burned down in an arson attack several years ago. The Millennium Mammoth was built to commemorate the discovery of ice age mammoth remains found when Watermead was a quarry. In January 2010, two brothers died after falling into one of the frozen lakes. They had been plucked from the lake by a police officer, who was leaning out of a helicopter hovering above the frozen surface. References External links Watermead Country Park Leicester Triathlon Club Country parks in Leicestershire Local Nature Reserves in Leicestershire Lakes of Leicestershire
https://en.wikipedia.org/wiki/Electronic%20remittance%20advice
An electronic remittance advice (ERA) is an electronic data interchange (EDI) version of a medical insurance payment explanation. It provides details about providers' claims payment, and if the claims are denied, it would then contain the required explanations. The explanations include the denial codes and the descriptions, which present at the bottom of ERA. ERA are provided by plans to Providers. In the United States the industry standard ERA is HIPAA X12N 835 (HIPAA = Health Insurance Portability and Accountability Act; X12N = insurance subcommittees of ASC X12; 835 is the specific code number for ERA), which is sent from insurer to provider either directly or via a bank. See also Remittance advice References Citations Data interchange standards Health insurance
https://en.wikipedia.org/wiki/Network%20analyzer
Network analyzer may mean: Packet analyzer, used on a computer data network Network analyzer (AC power), an analog computer system used to study electrical power networks Network analyzer (electrical), a type of electronic test equipment See also Network management
https://en.wikipedia.org/wiki/Kernel%20Normal%20Form
Kernel normal form, or KNF, is the coding style used in the development of code for the BSD operating systems. Based on the original KNF concept from the Computer Systems Research Group, it dictates a programming style to which contributed code should adhere prior to its inclusion into the codebase. KNF started out as a codification of how Ken Thompson and Dennis Ritchie formatted the original UNIX C source code. It describes such things as how to name variables, use indents and the use of ANSI C or K&R C code styles. Each BSD variant has its own KNF rules, which have evolved over time to differ from each other in small ways. The SunOS kernel and userland also uses a similar indentation style that was derived from AT&T style documents and that is sometimes known as Bill Joy Normal Form. The correctness of the indentation of a list of source files can be verified by a style checker program written by Bill Shannon. This style checker program is called cstyle. See also Programming style Indent style References External links Berkeley Software Distribution Source code
https://en.wikipedia.org/wiki/Endurance%20%28TV%20series%29
Endurance is an American reality television series, previously shown on the Discovery Kids cable network in the United States and also on networks in other countries. The show's format is somewhat similar to the television series Survivor, with a teenage cast. Endurance contestants live in a remote location and participate in various mental and physical challenges, although Endurance contestants compete as pairs (one boy and one girl), and the outcome of the competitions determines which pair of players is eliminated. In its six-year run between 2002 through 2008, each season began with a new slate of contestants, who were gradually eliminated as the season progressed until the remaining two teams competed to get all of the Endurance Pyramid pieces. The winning boy and girl received an all-expenses paid vacation package with their parents to an exotic location as the prize. Production ended with the final episode of the sixth season, first aired on June 28, 2008. After the series ended, reruns continued to air on Hub Network until July 21, 2013. The first four seasons of the show also aired on NBC on Saturday mornings under the Discovery Kids on NBC umbrella from 2002 to 2006. Three seasons of Endurance (Hawaii, Tehachapi and High Sierras) were each nominated for a Daytime Emmy Award in the category of "Outstanding Children's Series", however the show never won. Production The show was produced by 3Ball Productions. Its co-creator, former actor and children's game show presenter, J. D. Roth, is the executive producer and on-screen host. Roth received a Daytime Emmy nomination in 2006 as "Outstanding Performer in a Children's Series" for Endurance: Tehachapi but did not win. Contestants ages 12–15 were chosen each spring from five-minute audition tapes sent in by more than 12,000 teens to the show's production team. Twenty players were selected to participate in each of the first five seasons of Endurance; this was reduced to sixteen in Season 6. In a 2004 newspaper interview, Roth revealed that he looked for as diverse a group as possible. Shooting of the series took place each summer over a three-week period and began with the selected teenaged contestants arriving at a secret remote location in late July. Each season was taped in a different location, including California, Hawaii, Mexico, and Fiji. In a January, 2007, interview with the Boston Globe, Connor Finnegan recalled his experience as an Endurance: High Sierras player the previous summer: "At first it was weird being filmed all the time. You'd be talking and suddenly there would be a camera or microphone shoved into your face. The big rule with reality TV is never to look at the camera." As part of the show, host J. D. Roth and the players sometimes discuss the interpersonal drama occurring among the teams. Roth has said that many participants have become close friends while the series was being shot, learning tolerance for people who were different from themselves. However, the B
https://en.wikipedia.org/wiki/Photo%20Booth
Photo Booth is an application developed by Apple Inc. for the macOS and iPadOS operating systems that allows users to take photos and videos using the device's built-in camera. Photo Booth was released in October 2005 and was originally available only on Macintosh computers that had a built-in iSight camera running Mac OS X Tiger. Photo Booth displays a preview showing the camera's view in real time. Thumbnails of saved photos and videos are displayed along the bottom of this window, obscuring the bottom of the video preview. These can be shown or played by clicking on the thumbnails. By default, Photo Booth's live preview and captured images are reversed horizontally, to simulate the user looking into a mirror; an option provides unreversed images. History Photo Booth was first introduced by Apple in 2005 with the release of iMac G5, which featured a built-in iSight camera. The app was later introduced on iPad devices with the release of iPad 2 in March 2011. Since its initial release, Photo Booth has received several updates and new features. Notable updates include: Additional Effects: Apple has added new filters and effects to the app, such as Space Alien, Blockhead, Dizzy, and Lovestruck, among others. Sharing Features: In 2012, Apple added new sharing features to Photo Booth, allowing users to share photos and videos to social media sites such as Facebook, Twitter, and Flickr. Post-processing After the picture is taken effects can be applied by clicking on the "Effects" button. Photo Booth has two sets of image effects that can be applied when taking a picture. The first set contains photographic filters similar to those in Adobe Photoshop; additional effects may be downloaded from websites. Another set allows replacing the background with a custom backdrop. Backgrounds From Mac OS X 10.5 Leopard to macOS 10.15 Catalina, the user could apply backdrops to provide an effect similar to a green screen. When a backdrop was selected, a message appeared telling the user to step away from the camera. Once the background was analyzed, the user stepped back in front of the camera and was shown in front of the chosen backdrop. See also Comparison of webcam software References External links Photo Booth User Guide for Mac - Apple Support MacOS-only proprietary software Camera software IPadOS software IOS-based software made by Apple Inc.
https://en.wikipedia.org/wiki/VoicePulse
VoicePulse was an American communications company that used its VoIP network to deliver phone service to residential and business consumers. VoicePulse was founded and was based in North Brunswick, New Jersey, in April 2003 by Ravi Sakaria and Ketan Patel. References External links VoIP companies of the United States Companies based in Middlesex County, New Jersey Companies established in 2003
https://en.wikipedia.org/wiki/Principal%20Charming
"Principal Charming" is the fourteenth episode of the second season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on February 14, 1991. In the episode, Marge asks Homer to find a husband for her sister Selma. Homer invites Principal Skinner to dinner after Bart gets caught vandalizing the school's lawn. Skinner's dinner with the Simpsons fails to go as planned when he instead falls for Selma's twin sister Patty. The episode was written by David M. Stern and directed by Mark Kirkland. The characters Hans Moleman, Groundskeeper Willie and Squeaky Voiced Teen make their first appearances on The Simpsons in this episode. "Principal Charming" features cultural references to films such as Vertigo, Gone with the Wind, and The Hunchback of Notre Dame. Since airing, the episode has received mostly positive reviews from television critics. It acquired a Nielsen rating of 14.1, and was the highest-rated show on Fox the week it aired. Plot After attending the wedding of a coworker, Selma begs Marge to help her find a husband. Marge asks Homer to help find a husband for her sister, but he struggles to find anyone suitable. When Bart is caught spelling his name on the school's lawn by killing the grass with a herbicide, Principal Skinner summons Homer to his office to discuss the prank. After learning that Skinner is single, Homer invites him to dinner. When Skinner arrives at the Simpsons' house, Homer accidentally introduces him to Patty instead of Selma; Skinner is instantly smitten with her, making Selma feel even worse about her marriage prospects. Skinner asks Patty for a date, but she is reluctant. Selma encourages her to go on her first date in 25 years and warns her this may be her last chance to marry. Patty does not enjoy her first date with Skinner, but they keep seeing other and eventually bond, much to Selma's chagrin. Because Skinner is distracted by his love for Patty, he allows Bart and the other children to do whatever they want at school. He soon enlists Bart's help to persuade Patty to marry him. At the same time, Homer arranges a date between Barney and Selma, which she reluctantly attends. Following Bart's lead, Skinner uses an herbicide to write "Marry Me Patty" on the school's lawn. Skinner takes her to the top of the school's bell tower to propose marriage. Patty is flattered, but she declines because she and Selma share a special bond as twin sisters. Patty appreciates Skinner's understanding and gentlemanly conduct, and admits that were she ever to settle down with a man, she would marry him. After rescuing Selma from her date with Barney, Patty drives her home to their apartment. Meanwhile, Skinner accepts his fate and reasserts his authority over Bart by destroying the entire lawn with herbicide and forcing him to repair the damage by replanting the field seed by seed, much to Groundskeeper Willie's satisfaction. Production The episode was written by Davi
https://en.wikipedia.org/wiki/EFront
eFront was an affiliate marketing network which purchased successful websites, such as Penny Arcade, SquareGamer, and BetaNews, and pooled traffic to those sites to command higher prices for advertising during an industrywide ad revenue slowdown. In 2001, there was a scandal when ICQ instant messaging logs between the CEO Sam P. Jain and other employees were leaked onto the internet through Fuckedcompany.com. The logs detailed activities such as not paying websites that had hosted their banner ads, sending legal threats to websites that spoke poorly of eFront, and threatening to "rape her and spit on her" (referring to a female webmaster angry about not receiving her check from the company). The logs also detailed how eFront attempted to hire, though never ended up paying, Something Awful founder and webmaster Richard "Lowtax" Kyanka, ostensibly to have him generate a positive buzz for the company. Richard Kyanka stated during a presentation at the University of Illinois in October 2005 that he was still owed $40,000 by eFront, and that the company ran a number of competitions to attract clients, yet the prizes were awarded to employees. As of July 2006, the company's former efront.com domain is owned by an unrelated French software firm, eFront Alternative Investment Solutions. References External links eFront website from the Internet Archive Original ICQ logs - Sam Jain detailing his activity Betanews escapes eFront meltdown from The Register eFront Fiasco Was an Affront to Advertisers' Trust Online advertising services and affiliate networks Companies disestablished in 2001 Defunct marketing companies of the United States
https://en.wikipedia.org/wiki/Behavior-driven%20development
In software engineering, behavior-driven development (BDD) is a software development process that goes well with agile software development process that encourages collaboration among developers, quality assurance experts, and customer representatives in a software project. It encourages teams to use conversation and concrete examples to formalize a shared understanding of how the application should behave. It emerged from test-driven development (TDD). Behavior-driven development combines the general techniques and principles of TDD with ideas from domain-driven design and object-oriented analysis and design to provide software development and management teams with shared tools and a shared process to collaborate on software development. Although BDD is principally an idea about how software development should be managed by both business interests and technical insight, the practice of BDD does assume the use of specialized software tools to support the development process. Although these tools are often developed specifically for use in BDD projects, they can be seen as specialized forms of the tooling that supports test-driven development. The tools serve to add automation to the ubiquitous language that is a central theme of BDD. BDD is largely facilitated through the use of a simple domain-specific language (DSL) using natural-language constructs (e.g., English-like sentences) that can express the behaviour and the expected outcomes. Test scripts have long been a popular application of DSLs with varying degrees of sophistication. BDD is considered an effective technical practice especially when the "problem space" of the business problem to solve is complex. History Behavior-driven development, an extension of test-driven development, is a development process that makes use of a simple DSL. These DSLs convert structured natural language statements into executable tests. The result is a closer relationship to acceptance criteria for a given function and the tests used to validate that functionality. As such it is a natural extension of TDD testing in general. BDD focuses on: Where to start in the process What to test and what not to test How much to test in one go What to call the tests How to understand why a test fails At its heart, BDD is about rethinking the approach to unit testing and acceptance testing in order to avoid issues that naturally arise. For example, BDD suggests that unit test names be whole sentences starting with a conditional verb ("should" in English for example) and should be written in order of business value. Acceptance tests should be written using the standard agile framework of a user story: "Being a [role/actor/stakeholder] I want a [feature/capability] yielding a [benefit]". Acceptance criteria should be written in terms of scenarios and implemented in classes: Given [initial context], when [event occurs], then [ensure some outcomes] . Starting from this point, many people developed BDD frameworks
https://en.wikipedia.org/wiki/CDC%203000%20series
The CDC 3000 series ("thirty-six hundred" or "thirty-one hundred") are a family of mainframe computers from Control Data Corporation (CDC). The first member, the CDC 3600, was a 48-bit system introduced in 1963. The same basic design led to the cut-down CDC 3400 of 1964, and then the 24-bit CDC 3300, 3200 and 3100 introduced between 1964 and 1965. The 3000 series replaced the earlier CDC 1604 and CDC 924 systems. The line was a great success and became CDC's cash cow through the 1960s. The series significantly outsold the much faster and more expensive machines in the CDC 6000 series, but the performance of the 3000's relative to other vendors quickly eroded. The line was phased out of production in the early 1970s in favour of new members of the 6000 series, and then the CDC Cyber series, initially based on the 6600 design but spanning a wide range of performance. Specifications Upper 3000 series The upper 3000 series used a 48-bit word size. The first 3000 machine to be produced was the CDC 3600; first delivered in June 1963. First deliveries of the CDC 3400 and CDC 3800 were in December 1965. These machines were designed for scientific computing applications; they were the upgrade path for users of the CDC 1604 machines. However these machines were overshadowed by the upcoming 60-bit CDC 6000 series machines when the CDC 6600 was introduced in December 1964 and delivered in 1965. Some high-end computer labs purchased these machines as stopgaps, while waiting for delivery of their 6600 machine. (CDC had indicated that the 6600 machines would use the same assembler language.) Lower 3000 series The lower 3000 series used a 24-bit word size. They were based on the earlier CDC 924 - a 24-bit version of the (48-bit) CDC 1604. The first lower 3000 to be released was the CDC 3200 (May 1964), followed by the smaller CDC 3100 (February 1965), and the CDC 3300 (December 1965). The final machine in the series, the CDC 3500, was released in March 1967 and used integrated circuits instead of discrete components. The 3300 and 3500 had optional relocation capabilities, floating-point arithmetic, and BDP (Business + Data Processing) instructions. These machines were targeted towards business and commercial computing. The 3150 Control Data Corporation's CDC 3150 was described as a "batch computer," and it included a FORTRAN and a COBOL compiler. Its console looked like this. Instruction sets The instruction set of the upper 3000 series was composed mostly of 24-bit instructions (packed two per word), but also contained some 48-bit instructions. The lower 3000 was based on a 24-bit subset of those available on the upper 3000 systems. It was therefore possible to write programs which would run on all 3000 systems. And as these systems were based on the prior 1604 and 924 instruction sets, some backward compatibility also existed. However the systems did diverge from each other in areas such as relocation and the BDP instructions. Memo
https://en.wikipedia.org/wiki/Leisure%20Suit%20Larry%205%3A%20Passionate%20Patti%20Does%20a%20Little%20Undercover%20Work
Leisure Suit Larry 5: Passionate Patti Does a Little Undercover Work is a graphical adventure game developed and published by Sierra On-Line for the Amiga, DOS and Macintosh computers in 1991. It is the fourth entry in their Leisure Suit Larry series and the first Larry title to have 256-color graphics and a fully icon-based interface. Being an (in)direct sequel to 1989's Leisure Suit Larry 3, its title is misleading, as there is no Leisure Suit Larry 4. The game is followed by Leisure Suit Larry 6 in 1993. It was re-released in 2017 on Steam with Windows support. Gameplay Leisure Suit Larry 5 expands on the multi-character feature of the previous installment, with control periodically passing between the protagonists Larry and Patti. A difference in the interface is that it includes the "Zipper" icon, enabling the character to perform an erotic action. The overall difficulty is greatly reduced in comparison with past games; neither character can become trapped or die, and losing the game is impossible. Many of the items players collect on their journey are merely optional, only triggering alternative solutions and affecting the final score, but not the game's progress. Plot The absence of a Leisure Suit Larry 4 forms the basis of this newest installment, as Julius Biggs has stolen the "missing floppies" of the game and caused Larry Laffer to become amnesiac. Larry is now in the adult film industry, working for a Mafia-connected company known as PornProdCorp. His boss sends him across the United States to scout for models to appear in "America's Sexiest Home Videos". Meanwhile, Patti is recruited by the FBI to dig up incriminating evidence on two record companies which are suspected of hiding subliminal messages in their songs. At the same time, PornProdCorp schemes to eliminate the competition in their industry by donating money to CANE (Conservatives Against Nearly Everything). On his way back to Los Angeles, Larry is involved in an airplane incident, landing the plane safely and being greeted as a hero. He is invited to the White House by George H. W. Bush, where he is reunited with Patti, and Biggs's sinister role is revealed. Development Al Lowe has offered several reasons for the numbering discrepancy in the Leisure Suit Larry games, ranging from a scrapped sequel to an internal office prank. In truth, a multiplayer Leisure Suit Larry game was apparently in the works, designed to be played over Sierra On-Line's burgeoning online service. The project was canceled due to hardware difficulties, inspiring Lowe to skip the "4" title entirely. Reception Al Lowe has said that each game in the Leisure Suit Larry franchise, including Leisure Suit Larry 5, sold over 250,000 copies. According to Sierra, combined sales of the Larry series surpassed 1.4 million units by the end of March 1996, before the release of Leisure Suit Larry: Love for Sail! The total sales of the first five Leisure Suit Larry games had surpassed 2 million copies by th
https://en.wikipedia.org/wiki/Slovenian%20Spirit
Slovenian Spirit was the name of a subsidiary of the now-defunct Austrian airline Styrian Spirit. Services Slovenian Spirit operated flights on the Styrian Spirit network connecting Maribor Airport in Slovenia with Salzburg in Austria, and Paris. The airline suspended services in March 2006. References Defunct airlines of Slovenia Airlines established in 2002 Airlines disestablished in 2006 2002 establishments in Austria 2006 disestablishments in Slovenia Slovenian companies established in 2002
https://en.wikipedia.org/wiki/Arturo%20Rosenblueth
Arturo Rosenblueth Stearns (October 2, 1900 – September 20, 1970) was a Mexican researcher, physician and physiologist, who is known as one of the pioneers of cybernetics. Biography Rosenblueth was born in 1900 in Ciudad Guerrero, Chihuahua. He began his studies in Mexico City, then traveled to Berlin and Paris where he obtained his medical degree. Returning to Mexico City in 1927, he engaged in teaching and research in physiology. In 1930 he obtained a Guggenheim Scholarship and moved to Harvard University, to the department of Physiology, then directed by Walter Cannon. With Cannon he explored the chemical mediation of homeostasis. Rosenblueth cowrote research papers with both Cannon and Norbert Wiener, pioneer of cybernetics. Notably he was the lead author for the 1943 article 'Behavior, Purpose and Teleology' that was co-written by Wiener and Julian Bigelow and which was published in Philosophy of Science. Rosenblueth was an influential member of the core group at the Macy Conferences. In 1944, Rosenblueth became professor of physiology at the National Autonomous University of Mexico. Eventually he became head of the Physiology Laboratory of the National Institute of Cardiology, head of the Physiology Department and, in 1961, director of the Center for Scientific Research and Advanced Studies (Cinvestav) at the National Polytechnic Institute. Between 1947 and 1949, and again between 1951 and 1952, using grants from the Rockefeller Foundation, he returned to Harvard to further collaborate with Wiener. Arturo Rosenblueth died on September 20, 1970, in Mexico City. Work Since the 1930s Rosenblueth worked with Cannon on issues related with Chemical transmission among nervous elements. Between 1931 and 1945 he worked with several specialists, among them Cannon, del Pozo, H.G. Schwartz, and Norbert Wiener. With Wiener and Julian Bigelow he wrote "Behavior, Purpose and Teleology", which, according to Wiener himself, set the bases for the new science of Cybernetics. In his 1943 cybernetic classification "Behavior, Purpose and Teleology", purpose is a behavior subclass. Behavior is active or passive and active behavior is purposeful or random. Active purposeful behavior is then either feedback teleological on non-teleological. Negative feedback is important to guide the positive goal route. Purposeful teleological feedback helps guide the predictive behavior orders. Teleology is feedback controlled purpose. Rosenblueth's classification system was criticized and the need for an external observability to the purposeful behavior was established to validate the behavior and goal-attainment. The purpose of observing and observed systems is respectively distinguished by the system's subjective autonomy and objective control. He devoted himself to the fields of nervous impulse transmissions, neuromuscular transmission, synaptic transmission, the propagation of impulses in the heart, the control of blood circulation, and the physiology of brain cort
https://en.wikipedia.org/wiki/Atari%20Pascal
The Atari Pascal Language System (usually shortened to Atari Pascal) is a version of the Pascal programming language released by Atari, Inc. for the Atari 8-bit family of home computers in March 1982. Atari Pascal was published through the Atari Program Exchange as unsupported software instead of in Atari's official product line. It requires two disk drives, which greatly limited its potential audience. It includes a 161-page manual. Development Atari Pascal was developed by MT Microsystems, which was owned by Digital Research. It's similar to MT/PASCAL+ from the same company. The compiler produces code for a virtual machine, as with UCSD Pascal, instead of generating machine code, but the resulting programs are as much as seven times faster than Apple Pascal. MT Microsystems wrote Atari Pascal with a planned "super Atari" 8-bit model in mind, one with 128K of RAM and dual-floppy drives (similar to a common configuration of the 1983 Apple IIe). This machine never materialized, but the software was released because of pressure within Atari, though only through the Atari Program Exchange. Atari's 1980 in-store demonstration program mentions Pascal as one of the available programming languages, despite Atari Pascal not being released until 1982. Other Pascal implementations Draper Pascal was released in 1983 and Kyan Pascal in 1986. Each works with a single floppy drive, a point emphasized in Draper Pascal magazine ads. References 1982 software Atari 8-bit family software Pascal (programming language) compilers Atari Program Exchange software
https://en.wikipedia.org/wiki/Atari%20Logo
Atari Logo is ROM cartridge-based version of the Logo programming language for the Atari 8-bit family published by Atari, Inc. in 1983. It was developed by Logo Computer Systems, Inc. (LCSI) in Quebec, Canada. LCSI wrote Apple Logo, and the Atari version maintains strong compatibility with it. Atari Logo includes commands that support Atari 8-bit enhanced graphics: 4 simultaneous drawing turtles that look like actual turtles instead of triangles, a built-in editor for redefining turtle shapes, and an event handler for collision detection. The TOOT primitive plays a tone on one of two 16-bit audio channels given a frequency, volume, and duration. Atari Logo shipped with a 216-page manual and a 16-page Quick Reference Guide. Reception Scott Mace of InfoWorld wrote, "Atari Logo is an excellent product and it enhances the value of Atari computers for learning in the classroom and in the home. It wins the battle with BASIC hands down." In a 1983 review for ANALOG Computing, Brian Moriarty concluded, "Atari Logo is one of the most intelligently-conceived and well-executed pieces of software ever published by ATARI." References External links Atari Logo at Atari Mania Computer Art and Animation: A User's Guide to Atari Logo 1984 book by David Thornburg Logo (ANTIC Interview 435) Cynthia Solomon and Brian Silverman discuss the development of LCSI Logo. 1983 software Atari 8-bit family software Logo programming language family
https://en.wikipedia.org/wiki/Single%20address%20space%20operating%20system
In computer science, a single address space operating system (or SASOS) is an operating system that provides only one globally shared address space for all processes. In a single address space operating system, numerically identical (virtual memory) logical addresses in different processes all refer to exactly the same byte of data. Single address-space operating systems offer certain advantages. In a traditional OS with private per-process address space, memory protection is based on address space boundaries ("address space isolation"). Single address-space operating systems use a different approach for memory protection that is just as strong. One advantage is that the same virtual-to-physical map page table can be used with every process (and in some SASOS, the kernel as well). This makes context switches on a SASOS faster than on operating systems that must change the page table and flush the TLB caches on every context switch. SASOS projects include the following: Amiga family – AmigaOS, AROS and MorphOS Angel BareMetal Br1X Genera by Symbolics IBM i (formerly called OS/400) Iguana at NICTA, Australia JX a research Java OS IncludeOS Mungi at NICTA, Australia Nemesis Opal OS-9 Phantom OS RTEMS Scout Singularity Sombrero TempleOS Theseus OS Torsion VxWorks Zephyr See also Exokernel Hybrid kernel Kernel Microkernel Nanokernel Unikernel Flat memory model Virtual memory References Bibliography . Operating systems
https://en.wikipedia.org/wiki/Alcon%20%28computer%20virus%29
Alcon, or RSY (which is more or less as commonly used of a name as Alcon), is a computer virus that was discovered to be spreading in Europe in 1997. It is a boot virus. Infection Alcon is a standard boot sector virus that spreads via floppies. Instead of the MBR, it infects the DBR, making some antivirus programs miss it. Symptoms Alcon contains no notable symptoms beyond one extremely damaging one, which is overwriting random information. Assuming that the overwrites are subtle, this may result in significant compounding data over time, as Alcon is a slow damager. Alcon contains the text "R.SY". Prevalence Alcon was listed as being spreading by the WildList from April 1998 to July 1999. F-Secure lists it as having been common in Europe throughout 1997. Like most boot viruses, it is near extinct, although it was certainly in the last wave of boot viruses, so cases involving Alcon may be false positives, but may also be due to older, unused infected disks resurfacing. Aliases and variants Alcon's most common alias is RSY, based on inclusions in the virus code. Other aliases include Kendesm, Ken&Desmond, and Ether. It is unknown where these names are derived from. This virus is unrelated to W32/Alcon. References F-Secure (RSY) Boot viruses
https://en.wikipedia.org/wiki/Upering
Upering (alias "Annoyer.B", or "Sany") is a mass-mailing computer worm. It was isolated in Tacoma, Washington, in the United States, from several submissions from America Online members. As of late 2005, it is listed on the WildList, and has been since 2003. Worm A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected email. Mass-Mailing Worm Mailing Worm (also known as an email worm or less commonly known as an internet worm) distributes copies of itself in an infectious email attachment. Often, these infected emails are sent to email addresses that the worm harvests from files on an infected computer. Isolation Date July 22, 2003 Systems Affected Windows 2000, Windows Me, Windows XP, Windows 95 How it is spread This type of worm is embedded in an e-mail attachment, and spreads using the infected computer's e-mailing networks. Uses social engineering tactics to entice the user into opening and executing the e-mail attachment. Upering spreads by sending itself to email addresses and instant message contacts in the AOL address book. Upering worm arrives as an attachment to an email or an instant message with the lines: HEY HERE'S MY PIC!!! ITS TO BIG TO SHOW IN MAIL CLICK DOWNLOAD NOW TO DOWNLOAD IT! How to identify It may arrive in an email with an attachment named WinUpdate32Login.exe. The filename could differ depending on the original filename of the worm on the system on which the email originated. Effects Sends an ICQ notification message to the creators of the worm sends itself to the contacts in the AOL address book, either by email or instant message. Adds the registry value Recommendation on how to avoid Upering Users can avoid infection by simply refusing to open any email file attachments without first verifying its safety with the email sender. By using a firewall to block all incoming connections from the internet services that should not be publicly available. By enforcing a password policy. Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. Disable AutoPlay to prevent the automatic launching of executable files on network and removable drives, and disconnect the drive when not required. Turn off file sharing if needed. Removal Automatic action Once detected, the F-Secure Security product will automatically disinfect the suspect file by either deleting it or renaming it. References External links Symantec http://www.symantec.com/security_response/writeup.jsp?docid=2003-073012-2202-99&tabid=2] Email worms
https://en.wikipedia.org/wiki/FFTW
The Fastest Fourier Transform in the West (FFTW) is a software library for computing discrete Fourier transforms (DFTs) developed by Matteo Frigo and Steven G. Johnson at the Massachusetts Institute of Technology. FFTW is one of the fastest free software implementations of the fast Fourier transform (FFT). It implements the FFT algorithm for real and complex-valued arrays of arbitrary size and dimension. Library FFTW expeditiously transforms data by supporting a variety of algorithms and choosing the one (a particular decomposition of the transform into smaller transforms) it estimates or measures to be preferable in the particular circumstances. It works best on arrays of sizes with small prime factors, with powers of two being optimal and large primes being worst case (but still O(n log n)). To decompose transforms of composite sizes into smaller transforms, it chooses among several variants of the Cooley–Tukey FFT algorithm (corresponding to different factorizations and/or different memory-access patterns), while for prime sizes it uses either Rader's or Bluestein's FFT algorithm. Once the transform has been broken up into subtransforms of sufficiently small sizes, FFTW uses hard-coded unrolled FFTs for these small sizes that were produced (at compile time, not at run time) by code generation; these routines use a variety of algorithms including Cooley–Tukey variants, Rader's algorithm, and prime-factor FFT algorithms. For a sufficiently large number of repeated transforms it is advantageous to measure the performance of some or all of the supported algorithms on the given array size and platform. These measurements, which the authors refer to as "wisdom", can be stored in a file or string for later use. FFTW has a "guru interface" that intends "to expose as much as possible of the flexibility in the underlying FFTW architecture". This allows, among other things, multi-dimensional transforms and multiple transforms in a single call (e.g., where the data is interleaved in memory). FFTW has limited support for out-of-order transforms (using the Message Passing Interface (MPI) version). The data reordering incurs an overhead, which for in-place transforms of arbitrary size and dimension is non-trivial to avoid. It is undocumented for which transforms this overhead is significant. FFTW is licensed under the GNU General Public License. It is also licensed commercially (for a cost of up to $12,500) by MIT and is used in the commercial MATLAB matrix package for calculating FFTs. FFTW is written in the C language, but Fortran and Ada interfaces exist, as well as interfaces for a few other languages. While the library itself is C, the code is actually generated from a program called 'genfft', which is written in OCaml. In 1999, FFTW won the J. H. Wilkinson Prize for Numerical Software. See also FFTPACK References External links Numerical libraries FFT algorithms OCaml software Free mathematics software Massachusetts Institute of Technolo
https://en.wikipedia.org/wiki/Homer%20the%20Smithers
"Homer the Smithers" is the seventeenth episode of the seventh season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on February 25, 1996. In the episode, Smithers takes a vacation and hires Homer to temporarily replace him as Mr. Burns' assistant. The episode was written by John Swartzwelder and directed by Steven Dean Moore. The plot came from another writer on the show, Mike Scully. The episode features cultural references to The Little Rascals, a series of comedy short films from the 1930s, and the 1971 film A Clockwork Orange. Since airing, the episode has received mostly positive reviews from television critics. It acquired a Nielsen rating of 8.8, and was the fifth-highest-rated show on the Fox network the week it aired. Plot As employee night at the Springfield drag races ends, Smithers fails to protect Mr. Burns from being harassed by a drunken Lenny. Smithers tries to make amends the next day but again bungles his duties. When he attempts to drown himself in a water cooler, Burns demands he take a vacation once a suitable replacement can be found. Seeking a substitute who will not outshine him, Smithers selects Homer. Homer is scolded for being unable to perform any of his duties to Burns' satisfaction. He is soon exhausted after waking up at 4:30 a.m. to prepare Burns' breakfast, assist him at the office all day, and cater to his every whim late at night in his mansion. After enduring Burns' constant abuse for several days, Homer loses his temper and knocks him unconscious with a punch. Fearing he has killed his boss, Homer flees to his house in panic. At Marge's urging, he returns to the plant to apologize, but a fearful Burns turns him away. With no one around to help him, Burns learns to do things for himself and soon becomes completely self-reliant. After thanking Homer for his independence, Burns fires a returning Smithers. Unable to find another job, Smithers enlists Homer's help in a scheme to get his job back: he plans to save Burns from a phone call from his abusive mother, the one task he still cannot handle alone. Homer accidentally disconnects Burns' mother and tries to impersonate her voice. He is caught by Burns, who berates him and Smithers. A furious Smithers attacks Homer in Burns' office. During the tussle, Burns is accidentally pushed from a third-story window and seriously injured, forcing him to rely on Smithers completely again. In gratitude, Smithers sends Homer a fruit basket with a thank-you note. Production The episode was written by John Swartzwelder, who got the story from another member of the writing staff, Mike Scully. When the show runners of this season, Bill Oakley and Josh Weinstein, took over the job from David Mirkin, they wanted to "take the show back" to the Simpson family. Their goal was to have at least fifteen episodes per season that revolved around the family or a member of the family, but they still wanted to do the
https://en.wikipedia.org/wiki/Intelligent%20Computing%20CHIP%20magazine%20%28India%29
Intelligent Computing CHIP (IC CHIP) was a monthly Information Technology magazine published by Network 18 Publishing Ltd (formerly Infomedia 18 Ltd.) since December 2003. It was the Indian edition of the German monthly CHIP, which is a registered trademark of Vogel Burda Holding Inc. It was shut down in September 2013. Jamshed Avari served as the Deputy Editor-in-chief of the magazine from January 2010 to June 2013. Sharon Khare served as Deputy Editor from July 2013 to September 2013. About IC Chip was launched in India in March 1998. It was earlier published in India by Exicom India Ltd from Jasubhai Digital Media under a licensing agreement with Vogel-Veriag of Germany. It touched a circulation of 120,000. However, financial issues led to Jasubhai parting ways with Vogel, and launching their own magazine called Digit. Later, the magazine was licensed to Infomedia 18. IC CHIP carried a free, dual layer DVD and a supplement called CHIP Insider every month. The DVD contained software, game demos, Linux Distros and tools, and CHIP archives. It also carried a few videos such as Tech Toyz videos and game trailers. Another supplement, CHIP Plus, was discontinued before the magazine shut down, was meant for beginners. It contained guides and tutorials on various IT-related topics. On 22 October 2013, Chip subscribers received an e-mail regarding the discontinuation of IC CHIP. Download CHIP Asia Download CHIP Asia was a community introduced in 2008. Download CHIP Asia, which was discontinued in 2012, enabled users of the CHIP website to download software, write reviews, and recommend software to be featured. References External links Official website of IC CHIP Publisher of IC CHIP - Infomedia 18 Limited Website of the German edition 1998 establishments in India 2013 disestablishments in India Defunct computer magazines Defunct magazines published in India English-language magazines published in India Computer magazines published in India Monthly magazines published in India Magazines established in 1998 Magazines disestablished in 2013
https://en.wikipedia.org/wiki/Symbolic%20Link%20%28SYLK%29
Symbolic Link (SYLK) is a Microsoft file format typically used to exchange data between applications, specifically spreadsheets. SYLK files conventionally have a .slk suffix. Composed of only displayable ANSI characters, it can be easily created and processed by other applications, such as databases. Microsoft has never published a SYLK specification. Variants of the format are supported by Multiplan, Microsoft Excel, Microsoft Works, OpenOffice.org, LibreOffice and Gnumeric. The format was introduced in the 1980s and has not evolved since 1986. A commonly encountered (and spurious) 'occurrence' of the SYLK file happens when a comma-separated value (CSV) format is saved with an unquoted first field name of 'ID', that is the first two characters match the first two characters of the SYLK file format. Microsoft Excel (at least to Office 2016) will then emit misleading error messages relating to the format of the file, such as "The file you are trying to open, 'x.csv', is in a different format than specified by the file extension...". SYLK is known to cause security issues, as it allows an attacker to run arbitrary code, offers the opportunity to disguise the attack vector under the benign-looking appearance of a CSV file, and is still enabled by default on recent (2016) versions of Microsoft Excel. Limitations SYLK does not have support for Unicode. Even if a SYLK file is created by an application that supports Unicode (for example Microsoft Excel), the SYLK file will be encoded in the current system's ANSI code page, not in Unicode. If the application contained characters that were displayable in Unicode but have no code point in the current system's code page, they will be converted to question marks ('?') in the SYLK file. The semicolon is treated as a field separator in SYLK, so cannot be used unescaped in data values. If a character string in the SYLK file is to contain a semicolon (;) then it should be prefixed with another semicolon so the string would appear as e.g., "WIDGET;;AXC1254". MS Excel will strip the first semicolon on import and the data element will appear as "WIDGET;AXC1254". Each line of a SYLK input file must be no longer than 260 characters. Otherwise, Microsoft Excel will issue an error message and skip loading the overlong line. Sample SYLK code As an example, the following SYLK code in a text file with the .slk extension: ID;P C;Y1;X1;K"Row 1" C;Y2;X1;K"Row 2" C;Y3;X1;K"Total" C;Y1;X2;K11 C;Y2;X2;K22 C;Y3;X2;K33 E would be displayed like this when read by an appropriate spreadsheet: for numeric formatting The formatting of 2 decimal digits is applied to Column 2 using F;P2;C2 where P0 is for General, P1 is for no decimal, P2 is for 2 digits, P3 has leading $ sign with 2 decimal points as defined below. ID;P P;PGeneral P;P_(* #,##0_);;_(* \-#,##0_);;_(* "-"_);;_(@_) P;P_(* #,##0.00_);;_(* \(#,##0.00\);;_(* "-"??_);;_(@_) P;P_("$"* #,##0.00_);;_("$"* \(#,##0.00\);;_("$"* "-"??_);;_(@_) C;Y1;X
https://en.wikipedia.org/wiki/OPN
OPN may stand for: Osteopontin, a glycoprotein secreted by osteoblasts Object Process Network, a simulation model meta-language Optics & Photonics News, a magazine Oneohtrix Point Never, recording alias of musician Daniel Lopatin Olivary pretectal nucleus, a nucleus in the pretectal area, or pretectum In mathematics, odd perfect number Ora pro Nobis, Latin phrase litt. meaning "pray for us", often abbreviated as OpN in prayer books and breviaries Yamaha YM2203, a sound chip
https://en.wikipedia.org/wiki/List%20of%20Food%20Network%20original%20programming
This is a list of shows that have been broadcast (or are planned to be broadcast) on Food Network. # 3 Days to Open with Bobby Flay – hosted by Bobby Flay 5 Ingredient Fix – hosted by Claire Robinson 24 Hour Restaurant Battle - hosted by Scott Conant $24 in 24 - hosted by Jeff Mauro 30 Minute Meals – hosted by Rachael Ray $40 a Day – hosted by Rachael Ray A Aarti Party - hosted by Aarti Sequeira Ace of Cakes – starring Duff Goldman After Midnight - hosted by Robin Dorian Alex's Day Off – hosted by Alex Guarnaschelli Alex vs. America - hosted by Alex Guarnaschelli and Eric Adjepong All American Festivals – hosted by Tyler Florence and Jim O'Connor All-Star Academy - hosted by Ted Allen All-Star Gingerbread Build All-Star Halloween Spectacular All-Star Holiday and Homecoming All-Star Holiday Party All-Star Kitchen Makeover – three-part special American Diner Revival - hosted by Ty Pennington and Amanda Freitag America's Best - hosted by Alton Brown America's Best Cook - hosted by Ted Allen Amy Schumer Learns to Cook - hosted by Amy Schumer and Chris Fischer Appetite for Adventure – hosted by Joey Altman and Tori Ritchie Ask Aida – hosted by Aida Mollenkamp Ayesha's Homemade - hosted by Ayesha Curry B B. Smith with Style – hosted by B. Smith Bake You Rich – hosted by Buddy Valastro Bakers vs. Fakers Baker's Dozen – hosted by 13 of America's top bakers, including Flo Braker, Marion Cunningham, and Nick Malgieri Bama Glama - reality show starring Scot Wedgeworth Barefoot Contessa – hosted by Ina Garten BBQ Blitz - hosted by Eddie Jackson BBQ Brawl - hosted by Bobby Flay, Jet Tila and Anne Burrell BBQ USA - hosted by Michael Symon BBQ with Bobby Flay – hosted by Bobby Flay Beach Eats USA - hosted by Curtis Stone Beat Bobby Flay - hosted by Bobby Flay Behind the Bash – hosted by Giada De Laurentiis Best Baker in America – hosted by Scott Conant Best. Ever. - Hosted by Ted Allen Best in Smoke The Best Of – hosted by Marc Silverstein and Jill Cordes The Best of Bill Boggs' Corner Table – hosted by Bill Boggs The Best Thing I Ever Ate The Best Thing I Ever Made Big Cheese Big Daddy's House – hosted by Aaron McCargo, Jr. Big Restaurant Bet - hosted by Iron Chef Geoffrey Zakarian Big Time Bake The Big Waste – hosted by Anne Burrell, Bobby Flay, Alex Guarnaschelli and Michael Symon Bobby Flay's Barbecue Addiction - hosted by Bobby Flay Bobby's Dinner Battle - hosted by Bobby Flay Bobby's Triple Threats - hosted by Bobby Flay Bocuse d'Or: A Chef's Dream - cooking competition Boy Meets Grill – hosted by Bobby Flay Breakaway Camp with Martha Stewart - hosted by Martha Stewart Brunch at Bobby's hosted by Bobby Flay B. Smith with Style - hosted by B. Smith Bubba-Q Buddy vs. Duff Buddy's Family Vacation - hosted by Buddy Valastro Burgers, Brew,& Que- hosted by Michael Symon Buy This Restaurant - hosted by Keith Simpson C Cake Masters - hosted by Duff Goldman Cake Wars - hosted by Jonathan Bennett Cake Wars: Christmas - hosted by Jonathan Bennett Caketa
https://en.wikipedia.org/wiki/OmniPage
OmniPage is an optical character recognition (OCR) application available from Kofax Incorporated. OmniPage was one of the first OCR programs to run on personal computers. It was developed in the late 1980s and sold by Caere Corporation, a company headed by Robert Noyce. The original developers were Philip Bernzott, John Dilworth, David George, Bryan Higgins, and Jeremy Knight. Caere was acquired by ScanSoft in 2000. ScanSoft acquired Nuance Communications in 2005, and took over its name. By 2019 OmniPage had been sold to Kofax Inc. OmniPage supports more than 120 different languages. OmniPage provides software development kits for integrating OCR functionality into other applications, such as Microsoft Office Document Imaging and UiPath. References External links Nuance software Optical character recognition software
https://en.wikipedia.org/wiki/PC%20Plus
PC Plus was a computer magazine published monthly from 1986 until September 2012 in the UK by Future plc. The magazine was aimed at intermediate to advanced PC users, computer professionals and enthusiasts. The magazine was specifically for users of PCs and related technologies so features articles were undiluted by coverage of other platforms. It began its life specifically as a magazine aimed at the Amstrad PC user. Staff For many years, the editor (later editor-in-chief) was Dave Pearman. PC Plus print magazine was closed in October 2012, when the editor was Martin Cooper. Each edition of the print magazine was centered on four main sections - news, reviews, features, and tutorials. Under Pearman's editorship, the magazine was characterised by the inclusion of irreverent off-the-wall features and content including Huw Collingbourne's Rants and Raves, a serialisation of a fictional office entitled Group Efforts and the Bastard Operator From Hell. The magazine frequently drew on images of Bath, its office base, during multimedia tutorial articles. Future plc. no longer publishes PC Plus as a print publication although the on-line domain is still serviced by parent brand TechRadar.com. References External links PC Plus Official website (archived copy in the Wayback Machine) 1986 establishments in the United Kingdom 2012 disestablishments in the United Kingdom Monthly magazines published in the United Kingdom Defunct computer magazines published in the United Kingdom Home computer magazines Magazines established in 1986 Magazines disestablished in 2012
https://en.wikipedia.org/wiki/MPM
MPM may refer to: Biology MPM (psychedelic), a psychedelic drug Malignant Pleural Mesothelioma Matrix population models Computing and technology MPM (automobile), an automobile built in Mount Pleasant, Michigan, 1914–1915 MP/M (Multi-Programming Monitor Control Program), a Digital Research operating system Manufacturing process management, to define how products are to be manufactured Manufacturing Programming Mode, a configuration mode of the BIOS on some HP computers Material point method, a numerical technique to simulate the behavior of solids, liquids, gases Microwave Power Module, a microwave device to amplify radio frequency signals Request processing modes, a feature of the Apache HTTP Server Apache MultiProcessing Modules, part of the Apache HTTP Server architecture Education Master of Project Management, a graduate degree Master of Public Management Master of Science in Project Management Other uses Maputo International Airport (IATA code: MPM), in Maputo, Mozambique Marginal propensity to import Measures per minute, a measure of musical tempo Metra potential method, a means of describing, organizing, and planning a project Mid-Pacific Mountains, an oceanic plateau in the Pacific Ocean Milwaukee Public Museum Moviment Patrijotti Maltin, a Maltese anti-immigration political party Movimiento Peronista Montonero, Argentine guerrilla group the Montoneros Mysore Paper Mills, at Bhadravathi in the Shimoga district of Karnataka state, India
https://en.wikipedia.org/wiki/Anniesland%20railway%20station
Anniesland railway station is a railway station that serves the Anniesland suburb of Glasgow, Scotland. The station is served by ScotRail as part of the Strathclyde Partnership for Transport network. It is located on the Argyle Line, west of Glasgow Central (Low Level), on the North Clyde Line west of Glasgow Queen Street (Low Level), and is the terminus of the Maryhill Line away from Glasgow Queen Street (High Level). A recent plan has been approved to upgrade the station to include a new lift and over pass to provide more disabled access. History Opened by the North British Railway in 1874 on their route linking the Glasgow, Dumbarton and Helensburgh Railway at Maryhill to Queens Dock (the site that is now occupied by the Scottish Exhibition Centre) on the north side of the River Clyde (the Stobcross Railway), it became part of the London and North Eastern Railway during the Grouping of 1923. The station then passed on to the Scottish Region of British Railways on nationalisation in 1948. When Sectorisation was introduced by British Rail in the 1980s, the station was served by ScotRail until the privatisation of British Rail. The line towards (which was opened some years after the Maryhill line in 1886 as part of the Glasgow City and District Railway) was electrified in 1960, along with the line southwards to & as part of the North Clyde Line modernisation scheme. The chord from Maryhill (which was part of the original Stobcross Railway route) remains diesel worked. This chord was closed completely in 1985 and lifted three years later (after being disused since 1980), but relaid and reopened in 2005 when the Maryhill Line was extended as part of the project to re-open the railway to Larkhall on the Argyle Line. After the 2005 re-opening, there had been no physical link between the two routes here – the single line from Maryhill Park Junction terminated in its own separate bay platform (number 3) on the eastern side of the station and the two routes were under the control of different signalling centres. However, in late 2015, Network Rail carried out a programme of works to connect the Maryhill chord to the North Clyde Line, just north of Anniesland station. This was done to provide a diversionary route from the main Edinburgh to Glasgow line into Low Level while the High Level station was shut during 2016 for tunnel works; however, it is intended that the new connection be permanent. Services There is a regular service daily from Anniesland to Glasgow Queen Street (Low Level) on the North Clyde Line and to Glasgow Central (Low Level) on the Argyle Line. Destinations that are accessible from Anniesland are , and (Mondays-Saturdays) and (Sundays) northwestbound and , , and on the Argyle Line and (Monday-Saturday daytimes) and Edinburgh Waverley on the North Clyde Line southeastbound. Argyle line arrivals are from Motherwell (hourly), Whifflet (hourly) and . There is a half-hourly service from Anniesland on the Maryhill
https://en.wikipedia.org/wiki/Nervous
Nervous may refer to: Nervousness Nervous system, a network of cells in an animal's body that coordinates movement and the senses Nervous tissue, the cells of the nervous system that work in aggregate to transmit signals Music "Nervous" (Gene Summers song), 1958; covered by several performers "Nervous" (Gavin James song), 2016 "Nervous" (Shawn Mendes song), 2018 "Nervous", a song by K.Flay from Solutions, 2019 "Nervous", a song by L Devine, 2018 "Nervous", a song by Nick Jonas from Spaceman, 2021 "Nervous", a song by the Drums from Brutalism, 2019 "Nervous", a song by X Ambassadors from VHS, 2015 Nervous Records, a UK record label Nervous Records (US), a US record label See also "Nervousness", a song by the Gigolo Aunts from Tales from the Vinegar Side Nervous Norvus (1912–1968), the performing name of Jimmy Drake Nervous shark, a species of requiem shark
https://en.wikipedia.org/wiki/Must%20See%20TV
Must See TV is an American advertising slogan that was used by NBC to brand its primetime blocks during the 1990s, and most often applied to the network's Thursday night lineup, which featured some of its most popular sitcoms and drama series of the period, allowing the network to dominate prime time ratings on Thursday nights in the 1980s and 1990s. Ratings for NBC's lineup fell during the mid-to-late 2000s, and today the network ranks behind Fox, ABC, and CBS on Thursday nights. In 2015, the network canceled comedy programming on Thursdays and switched entirely to dramas. However, the branding returned for the 2017–18 television season. Usage In popular culture, the phrase is most strongly associated with the network's entire Thursday night lineup, including both sitcoms and dramas, which dominated the ratings from the 1980s through the late 1990s. As originally conceived, "Must See TV" originally applied to sitcoms only (dramas would normally be promoted separately), and for much of the 1990s the phrase was used several nights a week as an attempt at brand extension. At one point in the fall of 1997, the brand was used five nights a week, with four sitcoms a night from Monday to Thursday, and two on Sunday. NBC itself would later adopt the more common interpretation; the 2002 retrospective, 20 Years of Must See TV, focused on NBC's overall dominance on Thursday nights from 1982 onwards, and overlooked extensions such as "Must See TV Tuesday." History First years By 1979, NBC had fallen to third place in the Nielsen ratings. Network executive Fred Silverman, who previously led ABC and CBS to the top of the ratings, joined the network a year earlier, however, he could not bring the same ratings success he had as programming whiz at the latter two networks, resulting in a string of new programs that were derided by critics and eventually being canceled after a few showings. The 1980-81 television season was the low point for NBC; as the network had only three shows in the Nielsen top 20 (one of them, Diff'rent Strokes, would enter NBC's Thursday night lineup for the 1981-82 season). Silverman would leave NBC in the summer of 1981; and was replaced by Brandon Tartikoff. Starting with the 1981-82 season, situation comedies would enter NBC's Thursday programming, such as Diff'rent Strokes, Harper Valley, and newcomers Gimme a Break! and Lewis & Clark (the latter was canceled after one season). Success in the 1980s Branding the quality Thursday night lineup began during the 1982-83 season, which NBC promoted Fame, Hill Street Blues, Taxi (after being canceled by ABC after its fourth season) and new arrival Cheers, as "America's Best Night of Television on Television". When the season ended, Fame and Taxi were canceled, with the former being later revived in first-run syndication. However, though Cheers disappointed on ratings during its first season (74th out of 77 shows in that year's ratings), it was critically acclaimed, mostly due to its ear
https://en.wikipedia.org/wiki/List%20of%20ReBoot%20episodes
This is the complete episode listing for the Canadian CGI television series ReBoot, which was broadcast on YTV, as well as in the United States on ABC and Cartoon Network's Toonami block between 1994 and 2001. A total of 47 episodes have been produced, including two television films which were syndicated as the eight-episode fourth season in 2001. An un-aired "making of" special, set within the first two seasons, has also been produced. Series overview Season 1 (1994–1995) Season 2 (1995–1996) Season 3 (1997–1998) Season 4 (2001) In its DVD release and original Canadian broadcast, the fourth season was initially presented as two films, and was then syndicated as separate episodes. Daemon Rising My Two Bobs Special External links tv.com episode listings (archived) TV Guide The unofficial ReBoot home page ReBoot Episodes
https://en.wikipedia.org/wiki/Melissa%20Doyle
Melissa Jane Doyle (born 10 February 1970) is an Australian television presenter, author and journalist. She was previously co-host of the Seven Network's breakfast television program Sunrise from 2002 to 2013 alongside David Koch and host and senior correspondent of Sunday Night. Doyle is currently host of Weekend Breakfast on Smooth FM and the Seven Network documentary series This is Your Life. Early life and training Doyle attended Pymble Ladies' College. She studied communications at Charles Sturt University at the Bathurst campus and during her studies she was a broadcaster with on-campus community radio station 2MCE-FM. Career Doyles started her career, when she gained a cadetship at WIN Television's Canberra bureau in 1990, later becoming their weather presenter. Doyle then moved to Prime Television in 1993, where she was a news anchor and general reporter. After her stint at Prime ended in 1995, Doyle joined the Seven Network (which was Prime's affiliation partner at the time) as a Canberra-based political reporter before moving to Sydney where she read the news on 11AM, reported the news and read the afternoon updates. Doyle was one of the original hosts of the breakfast television program Sunrise before it was axed in 1999, before being resurrected in 2000, and which she rejoined in 2002. In 1999 she was the fill in presenter of the last bulletin of 11AM due to the incumbent presenter Anne Fulwood having already relocated to Melbourne. She also had a stint reading the Seven Late News. In 2000, she took over as host of Sydney's Today Tonight following the departure of Stan Grant. She stayed until March 2001 when she went on maternity leave. Doyle supports the Greater Western Sydney Giants AFL team; in 2012, she was named as the GWS Giants' inaugural No. 1 Ticket Holder. Sunrise Doyle returned to Seven from maternity leave in a variety of news and presenting roles before being asked to front a revamped Sunrise program with Chris Reason, who was later replaced by David Koch. Together, Doyle and Koch under the guidance of Executive producer Adam Boland, surpassed their incumbent opposition and market leaders, Today on the Nine Network. They built the program from a virtually zero viewer base to be the leading breakfast television program in Australia and there it remained throughout Doyle's tenure on the program. She was then dubbed the 'Queen of Australian Brekky TV'. In 2003, Doyle enjoyed a very public pregnancy with her second child, who was born in December of that year. Doyle was nominated for the Silver Logie as Most Popular Television Presenter in 2006, 2007, 2008, 2009 and 2010. She was the only female nominated in that category. Doyle was involved in legal proceedings in which it was alleged she identified a minor who was divorcing his parents. The divorce case was being heard in the Victorian Children's Court and because the boy was only 14 years old he couldn't be named. But Sunrise, as well as a number of other ne
https://en.wikipedia.org/wiki/Google%20Search%20Appliance
The Google Search Appliance (GSA) was a rack-mounted computer device that provided document indexing functionality. The GSA operating system was based on CentOS. The software was produced by Google and the hardware was manufactured by Dell. The final 2009 GSA version was based on Dell's PowerEdge R710. Google announced the phase out of the GSA in early 2016 and a complete discontinuation by 2019. The GSA was supplied in two models: a 2U model (GB-7007) capable of indexing up to 10 million documents, and a 5U (2U plus 3U storage) model (GB-9009) that was capable of indexing up to 30 million documents. Sales were operated on a licensing scheme which started as a two-year contract for maintenance, support and software updates. Features The GSA contained Google search technologies and a means of configuring and customizing the appliance. Versions The GSA was first introduced in 2002. Software version 6.0 was released in June, 2009. This software ran on some hardware versions of the GB-1001 model (all units with an "S5" prefix in their "Appliance ID"), and all GB-7007 and GB-9009 models. Google released version 7.0 on October 9, 2012 and version 7.2 on February 11, 2014. Models The GSA could be purchased in two separate versions based on the number of documents being indexed. Model G100, a 2U appliance, could index up to 20,000,000 documents. The G500 5U appliance could index up to 100,000,000 documents. Other versions Older appliances Google sold a 2U appliance (GB-1001) capable of indexing up to 5 million documents, a half-rack cluster (GB-5005) of five 2U nodes capable of indexing up to 10 million documents, and a full-rack cluster (GB-8008) of eight―and later 12 nodes―capable of indexing up to 30 million documents. Some models were based on Dell PowerEdge 2950 2U rack mounted servers. Google Mini The Google "Blue" Mini was a smaller and lower-cost search solution that occupied 1U of rack space for small and medium-sized businesses to set up an Intranet search engine that allowed them to index and search up to 300,000 documents. The hardware was manufactured by Gigabyte Technology then Super Micro Computer, Inc. Manufacture and sale of the Google Mini were discontinued beginning in July 31, 2012. GSA virtual edition for developers For a brief period in 2008, Google offered a virtual version of the GSA aimed at developers. The virtual edition could be downloaded free of charge and index up to 50,000 documents. It was discontinued for unknown reasons. Retirement and shutdown Early in February 2016, Google sent a confidential letter to its business partners and customers, stating that the GSA would not be available past 2018. It began with the discontinuation of GSA three-year contracts in 2016; in 2017 there would be only one-year renewal contracts and no hardware sales, followed by a complete shutdown in 2018. Customers were expected to migrate to a cloud-based solution. References External links Review at SearchTools Ana