source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Multimedia%20Broadcast%20Multicast%20Service
Multimedia Broadcast Multicast Services (MBMS) is a point-to-multipoint interface specification for existing 3GPP cellular networks, which is designed to provide efficient delivery of broadcast and multicast services, both within a cell as well as within the core network. For broadcast transmission across multiple cells, it defines transmission via single-frequency network configurations. The specification is referred to as Evolved Multimedia Broadcast Multicast Services (eMBMS) when transmissions are delivered through an LTE (Long Term Evolution) network. eMBMS is also known as LTE Broadcast. Target applications include mobile TV and radio broadcasting, live streaming video services, as well as file delivery and emergency alerts. Questions remain whether the technology is an optimization tool for the operator or if an operator can generate new revenues with it. Several studies have been published on the domain identifying both cost savings and new revenues. Deployments In 2013, Verizon announced that it would launch eMBMS services in 2014, over its nationwide (United States) LTE networks. AT&T subsequently announced plans to use the 700 MHz Lower D and E Block licenses it acquired in 2011 from Qualcomm for an LTE Broadcast service. Several major operators worldwide have been lining-up to deploy and test the technology. The frontrunners being Verizon in the United States, Kt and Reliance in Asia, and recently EE and Vodafone in Europe. In January 2014, Korea’s Kt launched the first commercial LTE Broadcast service. The solution includes Kt’s internally developed eMBMS Bearer Service, and Samsung mobile devices fitted with the Expway Middleware as the eMBMS User Service. In February 2014, Verizon demonstrated the potential of LTE Broadcast during Super Bowl XLVIII, using Samsung Galaxy Note 3s, fitted with Expway's eMBMS User Service. In July 2014, Nokia demonstrated the use of LTE Broadcast to replace Traditional Digital TV. This use case remains controversial as some study are doubting about the capability of LTE Broadcast to address this use case efficiently in its current version. Also in July 2014, BBC Research & Development and EE demonstrated LTE Broadcast during the XX Commonwealth Games in Glasgow, Scotland using equipment from Huawei and Qualcomm. In August 2014, Ericsson and Polkomtel successfully tested LTE Broadcast technology by streaming the opening game of the 2014 World Volleyball Championship to hundreds of guests at Warsaw’s National Stadium in Poland on August 30. In June 2015, BBC Research & Development and EE demonstrated LTE Broadcast during the FA Cup final in the U.K. In September 2015, Verizon demonstrated eMBMS by broadcasting INDYCAR races. In October 2015, Verizon commercially launched their Go90 eMBMS service. Go90 offers both On-Demand and LiveTV, in both Unicast and Broadcast, and supports more than 10 different LTE Broadcast mobile devices. Verizon ceased operating the go90 service on July 31, 2018.
https://en.wikipedia.org/wiki/Blocks%20world
The blocks world is a planning domain in artificial intelligence. The algorithm is similar to a set of wooden blocks of various shapes and colors sitting on a table. The goal is to build one or more vertical stacks of blocks. Only one block may be moved at a time: it may either be placed on the table or placed atop another block. Because of this, any blocks that are, at a given time, under another block cannot be moved. Moreover, some kinds of blocks cannot have other blocks stacked on top of them. The simplicity of this toy world lends itself readily to classical symbolic artificial intelligence approaches, in which the world is modeled as a set of abstract symbols which may be reasoned about. Motivation Artificial Intelligence can be researched in theory and with practical applications. The problem with most practical application is, that the engineers don't know how to program an AI system. Instead of rejecting the challenge at all the idea is to invent an easy to solve domain which is called a toy problem. Toy problems were invented with the aim to program an AI which can solve it. The blocks world domain is an example for a toy problem. Its major advantage over more realistic AI applications is, that many algorithms and software programs are available which can handle the situation. This allows to compare different theories against each other. In its basic form, the blocks world problem consists of cubes in the same size which have all the color black. A mechanical robot arm has to pick and place the cubes. More complicated derivatives of the problem consist of cubes in different sizes, shapes and colors. From an algorithm perspective, blocks world is an np-hard search and planning problem. The task is to bring the system from an initial state into a goal state. Automated planning and scheduling problem are usually described in the Planning Domain Definition Language (PDDL) notation which is an AI planning language for symbolic manipulation tasks. If something was formulated in the PDDL notation, it is called a domain. Therefore, the task of stapling blocks is a blocks world domain which stays in contrast to other planning problems like the dock worker robot domain and the monkey and banana problem. Example setup in blocks world Theses/projects which took place in a blocks world Terry Winograd's SHRDLU Patrick Winston's Learning Structural Descriptions from Examples and Copy Demo Gerald Jay Sussman's Sussman anomaly Decision problem (Gupta and Nau, 1992): Given a starting Blocks World, an ending Blocks World, and an integer L > 0, is there a way to move the blocks to change the starting position to the ending position with L or less steps? This decision problem is NP-hard. See also Blocksworld from Linden Lab Toy problem References Sources History of artificial intelligence
https://en.wikipedia.org/wiki/List%20of%20ITV%20channels
ITV (Independent Television) is the original British advertising television network. Some of the franchise holders, most notably ITV plc and its predecessor companies Granada plc and Carlton Communications, launched other television channels, some with the ITV brand, some not. Current channels ITV1/STV The ITV network was launched in 1955 as a federal network of, eventually, fifteen mutually independent regional companies granted franchises either solely on a geographical basis or also on a weekday/weekend split basis. The franchises were reallocated several times and now all the franchises are owned by ITV plc and STV Group, and are branded as ITV1 (in England, Wales, Southern Scotland, Isle of Man and Channel Islands), STV (in Central and Northern Scotland) or UTV/ITV1 (in Northern Ireland). The network broadcasts a variety of programming, such as entertainment, dramas, documentaries, news, films and sport. A timeshift channel, ITV1 +1, is available on Freeview, Sky, Freesat and Virgin Media. ITV1 HD/STV HD ITV1 HD is the simulcast high-definition television channel created by ITV. It was first trialled primarily to show the 2006 World Cup games to which ITV had the rights. It also showed looping previews, it began scheduled broadcasting on 9 June 2006 and ended on 30 November 2006. The full version was released as a simulcast on 17 July 2008 on all platforms. STV launched their HD service in June 2010. STV HD broadcasts in Central and Northern Scotland on Virgin Media and Freeview. The channel was made available on the Sky and Freesat EPGs in April 2014. UTV HD was launched in Northern Ireland in October 2010 exclusively to Virgin Media. It was later added to Freeview on 24 October 2012 after the completion of the digital switchover in the region. ITV2 In 1998, ITV launched its first new digital channel, known as ITV2. This combines more repeated and new entertainment and films as well as behind the scenes and imported programmes for the modern world. It is available on all digital services and broadcasts 24 hours a day. A timeshift channel, ITV2 +1, is available on Freeview, Sky, Freesat and Virgin Media. Before 2 August 2011, ITV2 +1 was only available on Freeview between 19:00 and 06:00, as it was forced to timeshare with CITV, and, in Scotland, TeleG (until it closed). On 2 September 2023, the day after the closure of the CITV channel, ITV2 began broadcasting a daily, four-hour children's programming block, using the "CITV" brand. This runs from 05:00 until 09:00 every day. ITV2 HD is the simulcast high-definition television channel of ITV2. Until November 8th 2022 it was a Pay-TV Channel. It is available Free To Air on Sky, Freesat and Virgin Media. ITV3 ITV plc's third channel was launched on 1 November 2004 as ITV3. It was initially thought that ITV3 would continue alongside Plus, broadcasting only on Freeview and cable, but at a last minute deal made it available on Sky, replacing Plus on all platforms (except Freeview
https://en.wikipedia.org/wiki/National%20Television%20Awards
The National Television Awards (often shortened to NTAs) is a British television awards ceremony, broadcast by the ITV network and begun in 1995. The National Television Awards are the most prominent ceremony for which the results are voted on by the general public and are often branded as "television's biggest night of the year". History The first National Television Awards (NTAs) ceremony was held in August 1995 and was hosted by Eamonn Holmes at Wembley Conference Centre. From 1996 onwards, it was traditionally held annually in October at the Royal Albert Hall and hosted by Sir Trevor McDonald. McDonald retired from the role after 12 years in 2008. In 2009, the NTAs changed the timing of the event from October to January so there was no event in that year. For the 2010 ceremony, Dermot O'Leary took over as host, and the ceremony was hosted at the O2 for the first time. O'Leary decided to leave the programme on 13 February 2019. On 4 October 2019, in a video posted on social media, David Walliams was announced as the new NTAs host for 2020. Despite this, the ceremony remained at the O2 for the 10th successive year. The 26th ceremony was originally going to take place on 26th January but then due to the COVID-19 pandemic, it was postponed to 20 April, then postponed again to 9 September. In May 2021, it was announced that Joel Dommett would present the 26th ceremony, replacing Walliams. On 6 April 2022, it was confirmed that Dommett would return as host with the upcoming ceremony being held in September at a new venue, this being OVO Arena Wembley. The 2022 ceremony was subsequently delayed to 13 October as a mark of respect following the death of Elizabeth II. In 2023, it returned to the O2 with Dommett returning as host. Ceremonies References External links 1995 British television series debuts National Television Awards ITV (TV network) original programming British television awards Award ceremonies Awards established in 1995 Annual television shows
https://en.wikipedia.org/wiki/Nokia%20Pop-Port
The Pop-Port interface (originally codenamed "Tomahawk") was a proprietary plug-in port for accessories and data synchronisation, available with many Nokia mobile phones. The port consists of one metal pin on either end, and a plastic tab containing thirteen contacts. Pop-Port-like interfaces first appeared in Nokia phones since circa 1996, but the Pop-Port was standardised as a single interface in 2002. By early 2007 the Pop-Port was fully replaced by the industry standard USB (miniUSB, and later by microUSB) sockets for data services and a 4-part 2.5mm or 3.5mm "standard" TRRS socket for audio. Nokia had been equipping certain devices with one of these connectors as alternatives from about 2004. Nokia filed "Pop-Port" as a trademark in the United States on September 3, 2002. Functions The port carries signals for hands-free microphone, stereo speakers, FBus Rx/Tx or USB signals for the phones supporting them, power output for feeding the accessories that do not have their own batteries, and the Accessory Control Interface (ACI), a bidirectional serial control bus for connection and authentication of phone accessories, with a specific ASIC inside accessories and a proprietary protocol. It is also used to upgrade USB-enabled phones' software using a specific USB data cable and the Nokia Software Updater. Earlier cables connected to RS-232 but later was replaced by USB. Criticisms A common problem with Pop-port was that contacts often lost connection, thus resulting in drop-outs in audio (when a hands-free device is used) or an unstable data connection (when a USB cable is used). This was a common problem when listening to music from the phone while the phone was in a pocket. The more stable 2.5 mm and 3.5 mm audio sockets aren't prone to such problems. The contacts are exposed to dust and dirt, more so than those of a TRRS socket. This, combined with the small size of the contacts, prevented connections in some cases. Also, the plug's 'hook' tended to lose its hooking capability, making it even easier to accidentally lose connection. The data cables had to be original in most cases. Available Pop-Port plug-ins Camera FM radio Headphones LCD display remote controller USB cable 3.5mm stereo plug adapter Flash 8P8C (RJ-45) cable (CA-41) CarKit See also Sony Ericsson's FastPort References External links Nokia Pop-Port connector pinout nokia-tuning.net Nokia Pop-Port pinout pinouts.ru Popport Electrical connectors
https://en.wikipedia.org/wiki/Hayling%20Island%20branch%20line
The Hayling Island branch was a short railway branch line in Hampshire, England, that connected a station on Hayling Island with the main line network at Havant. It was built by the Hayling Railway; at first the company planned to run it along a new embankment built along tidal mudflats, but this proved impractical. The line was opened along firm ground in 1867. The line included a bridge and viaduct over tidal water at Langstone; there was a low weight restriction on the viaduct, and only small locomotives were allowed to use it; this resulted in the survival in active service of former LB&SCR A1 class tank engines (known as "Terriers" until closure of the line). In the early 1960s large numbers of holidaymakers were carried on the line in high season, but heavy expenditure on repairs to the viaduct would have been necessary, and the cost was unsupportable; the line closed in 1963. History Before the Hayling Railway Hayling Island had long been isolated, situated off the south coast at the eastern side of the island where Portsmouth stands. The soil is good, encouraging agriculture. In 1824 the lord of the manor, Lord Norfolk, had a road bridge constructed at Langstone. Mitchell describes the bridge as frail. For the first time the island had a roadway connection to the mainland; but the poor road system on the island, and the widely dispersed farming settlements meant that transport was still a major difficulty. In 1847 the London, Brighton and South Coast Railway opened a line from Chichester to Portsmouth, connecting with the route from London via Brighton. There was a station at Havant, but this did little to improve Hayling's commercial position, chiefly because of the poor roads in the general district. In 1858 the Portsmouth Direct Railway was opened; it became aligned with the London and South Western Railway (LSWR) and was eventually absorbed by the LSWR. Serious friction developed between the LBSCR and the LSWR and it took some time for ordinary railway business to resume. The LSWR considered Portsmouth to be the only significant population centre in the area and gave little thought to the island. Hayling Railway authorised It was left to local people to promote a railway into the island, and they did so, getting Parliamentary authorisation for the Hayling Railway on 23 July 1860. There would be a substantial timber viaduct at Langstone with an opening section for navigation. The line would continue to Sinah Point, at the extreme western tip of the island; it would cross mudflats passing some distance to the west of the hard ground, and enabling the reclamation of substantial areas of land. In addition, docks were to be constructed at Sinah. Authorised capital was £50,000, but this proved to be very difficult to generate. Nevertheless, a limited start was made, and by August 1864 the first part of the line, as far as Langstone Quay was ready; this was opened to goods trains on 19 January 1865. The directors did not lack ambitio
https://en.wikipedia.org/wiki/Hiroshi%20Ishii%20%28computer%20scientist%29
is a Japanese computer scientist. He is a professor at the Massachusetts Institute of Technology. Ishii pioneered the Tangible User Interface in the field of Human-computer interaction with the paper "Tangible Bits: Towards Seamless Interfaces between People, Bits and Atoms", co-authored with his then PhD student Brygg Ullmer. Biography Ishii was born in Tokyo and raised in Sapporo. He received B.E. in electronic engineering, and M.E. and Ph.D. in computer engineering from Hokkaido University in Sapporo, Japan. Hiroshi Ishii founded the Tangible Media Group and started their ongoing Tangible Bits project in 1995, when he joined the MIT Media Laboratory as a professor of Media Arts and Sciences. Ishii relocated from Japan's NTT Human Interface Laboratories in Yokosuka, where he had made his mark in Human Computer Interaction (HCI) and Computer-Supported Cooperative Work (CSCW) in the early 1990s. Ishii was elected to the CHI Academy in 2006. He was named to the 2022 class of ACM Fellows, "for contributions to tangible user interfaces and to human-computer interaction". He currently teaches the class MAS.834 Tangible Interfaces at the Media Lab. External links Computer programmers Japanese computer scientists Human–computer interaction researchers Ubiquitous computing researchers MIT School of Architecture and Planning faculty Hokkaido University alumni MIT Media Lab people 1956 births Living people People from Tokyo Fellows of the Association for Computing Machinery
https://en.wikipedia.org/wiki/Siren%20%28video%20game%29
known as Forbidden Siren in the PAL region, is a 2003 survival horror stealth video game developed by Project Siren, a development team within Japan Studio, and published by Sony Computer Entertainment for the PlayStation 2. It was originally released in Japan in November 6, 2003, and in other regions between March and April of the following year. Directed and co-written by Keiichiro Toyama after he wrote and directed the original Silent Hill for Konami in 1999, the game revolves around interconnected storylines featuring a cast of characters throughout different time periods who find themselves in the mysterious town of Hanuda, inhabited by the shibito, deadly zombie-like creatures. The player must use sightjacking, a power allowing them to see the shibitos perspectives, to help deal with threats as they progress throughout levels. The game was positively received by critics for its story, atmosphere and originality, although its gameplay drew criticism. It was followed by a sequel, Siren 2, in 2006, and by a remake acting as a re-imagining of its story, Siren: Blood Curse, in 2008. It was also adapted into two mangas, titled Siren: Akai Umi no Yobigoe and Siren: ReBIRTH respectively. Gameplay Siren is divided into stages, each taking place in one of ten areas in the village of Hanuda, and organized chronologically in a table called the "Link Navigator". In order to complete a stage, the player must accomplish a primary objective that usually involves reaching an exit point, subduing undead enemies called shibito, or finding an item. Objectives in different stages are interconnected via a butterfly effect, and a character's actions in one stage can trigger a secondary objective in another stage. There are miscellaneous items scattered throughout each stage that give the player further insight into the plot's background. Once obtained, these items are archived in a catalog and can be viewed at any time during the game's duration. The game's player characters possess a psychic power known as "sightjacking", which enables them to see and hear what a nearby Shibito or human sees and hears, and thus pinpoint its position, as well as gain knowledge of their activities and of the position of obtainable items. The clarity of each target depends on the distance from the player character. Once a point of view is located, it can be assigned to one of certain buttons of the controller to easily switch between multiple points of view. However, the player character is unable to move during use of the ability and is thus vulnerable to attack. The game encourages the player to avoid Shibito rather than fight them. Characters can walk silently, avoid the use of a flashlight, and crouch behind objects to elude detection. Certain mission objectives require the player character to use items and/or the environment to distract Shibito from their activity, in order for them to achieve a goal. Others require the player to escort a non-player character. Player char
https://en.wikipedia.org/wiki/UK%20railway%20signalling
The railway signalling system used across the majority of the United Kingdom rail network uses lineside signals to control the movement and speed of trains. The modern-day system mostly uses two, three, and four aspect colour-light signals using track circuit – or axle counter – block signalling. It is a development of the original absolute block signalling that is still being used on many secondary lines. The use of lineside signals in Britain is restricted to railways with a maximum speed limit of up to . This is the maximum speed at which the train can travel safely using line-side signalling; if the train runs any faster, it will not be possible for the train driver to safely read colour-light signalling. Trains operating at speeds faster than 125 mph (for example on High Speed 1) use an in-cab signalling system that automatically determines and calculates speed restrictions. Early days In the days of the first British railways, "policemen" were employed by every railway company. Their jobs were many and varied, but one of their key roles was the giving of hand signals to inform engine drivers as to the state of the line ahead. They had no means of communication with their colleagues along the line, and trains were only protected by a time interval; after a train had passed him, a policeman would stop any following train if it arrived within (say) 5 minutes; for any between 5 and 10 minutes after, he would show a caution signal, and after 10 minutes, the line was assumed to be clear. Therefore, if a train failed within a section (as was very common in the early days), the policeman controlling entry to the section would not know, and could easily give a 'clear' signal to a following train when the section was not in fact clear. The number of collisions which resulted from this led to the gradual introduction of the absolute block principle; all systems of working other than this (including time-interval and permissive block) were outlawed on passenger lines in 1889, and all passenger lines were suitably equipped by 1895. As train speeds increased, it became increasingly difficult for enginemen to see hand signals given by the policemen, so the railways provided various types of fixed signals to do the job, operated by the policemen, or signalmen as they soon became known (it is due to this that British railway slang still names signalmen as "Bobbies"). Many types were devised, but the most successful was the semaphore, introduced in 1841 and soon becoming widespread, although some other types did linger on until the 1890s. Running signals The terms "on" and "off" are used in describing British railway signals. When describing an older semaphore, "on" refers to a signal arm in the horizontal position, and "off" means a signal raised upwards or lowered downwards from pivot point (at up to 60°). With regard to newer colour-light signals, "on" is synonymous with the most restrictive aspect, while all other aspects are considered to be
https://en.wikipedia.org/wiki/Cross-platform%20Audio%20Creation%20Tool
Cross-platform Audio Creation Tool (XACT) is an audio programming library and engine released by Microsoft as part of the DirectX SDK. It is a high-level audio library for authoring/playing audio that is written to use Xaudio on the Xbox, DirectSound on Windows XP, and the new audio stack on Windows Vista and Windows 7. Xaudio is an Xbox-only API designed for optimal digital signal processing. XACT also includes X3DAudio, a spatialization helper library available on both platforms, Windows and the Xbox. XACT was originally developed for Xbox development, and was later modified to work for Microsoft Windows development as well. Overview The original release of XACT was in 2002 and shipped as part of the Xbox SDK only and was originally called the "Xbox Audio Creation Tool". It was designed to allow sound designers and composers for the original Xbox console to have access and control of the powerful MCPx audio chip in the console, which previously could only be accessed through program code, via Xbox extensions to DirectSound. XACT was the first widely available game audio tool that allowed a sound designer to run a tool connected to a running game and modify the sounds in real time, as the game was running, and support easy streaming of audio data from the console hard drive. Later, under the XNA initiative, it was re-written to work on both Windows and Xbox and renamed the "Cross-platform Audio Creation Tool" and included as part of the DirectX SDK. Support for XACT has been carried over from DirectX to XNA. The XACT Audio Authoring Tool is also available in XNA Game Studio. With the release of Windows SDK for Windows 8 Developer Preview, XACT is no longer supported on Windows. The XACT Audio Authoring Tool is a companion application used to organize audio assets into wave banks (single files containing multiple WAV files) and sound banks (single files containing instructions for playing the WAV files in wave banks). The wave banks and sound banks for a project are subsequently called by XACT from within the application. XACT sound creation features Support for the following formats: WAV, AIFF, XMA Note: also supports embedded loop points in WAV and AIFF formats 16 and 8 bit PCM data Supports Stereo and 5.1 speaker arrangements Organization of sounds Multiple audio files can be grouped together into Wave Banks (XWB extension) Cues and settings can be bundled with the Waves in Sound Banks (XSB extension) Auditioning Audio console window can be used to preview audio Audio settings can be adjusted in-game (with debug mode libraries) XACT API programming features The API allows the integration of the wave, sound and cue information from the creation phase In memory and streaming support Audio event notification Includes a code-driven API allowing lower level loading and playback of sounds without having to use all the XACT sound organisation features.... XACT terminology and file types Sound Banks (.xsb) - a collection of sou
https://en.wikipedia.org/wiki/Logical%20Methods%20in%20Computer%20Science
Logical Methods in Computer Science (LMCS) is a peer-reviewed open access scientific journal covering theoretical computer science and applied logic. It opened to submissions on September 1, 2004. The editor-in-chief is Stefan Milius (Friedrich-Alexander Universität Erlangen-Nürnberg). History The journal was initially published by the International Federation for Computational Logic, and then by a dedicated non-profit. It moved to the . platform in 2017. The first editor-in-chief was Dana Scott. In its first year, the journal received 75 submissions. Abstracting and indexing The journal is abstracted and indexed in Current Contents/Engineering, Computing & Technology, Mathematical Reviews, Science Citation Index Expanded, Scopus, and Zentralblatt MATH. According to the Journal Citation Reports, the journal has a 2016 impact factor of 0.661. References External links Academic journals established in 2005 Computer science journals Open access journals Logic journals Logic in computer science Formal methods publications Quarterly journals English-language journals
https://en.wikipedia.org/wiki/The%20Happy%20Elf
The Happy Elf is a 2005 computer-animated Christmas television special based on Harry Connick, Jr.'s song of the same name. The special is narrated by Connick and stars the voices of Rob Paulsen, Carol Kane, Lewis Black, Kevin Michael Richardson and Mickey Rooney. The animation was provided by Film Roman, an IDT Entertainment company, known for animating The Simpsons. The Happy Elf originally aired on NBC on December 2, 2005. Plot Eubie the Elf (Rob Paulsen) loves working in Santa's workshop up at the North Pole, despite the other elves' complaints about being annoyed by his overly happy personality. One Christmas Eve morning, Eubie's boss, Norbert, assigns him to checking the naughty and nice lists. However, while checking the lists, Eubie discovers that every child in the town of Bluesville is naughty and decides to go to Bluesville and spread Christmas cheer. Bluesville is a dark miserable town at the bottom of a very deep valley, completely surrounded by tall dark cliffs. There, the townspeople feel the warmth of the sun only once a day. They never smile, they don't know how to tell a joke properly, most of them work at the What Factory, where all the world's question marks are made, and at the Bluesville school, recess only lasts one minute. Eubie tries to brighten everyone's spirits, but his overly good mood frightens them. Eubie talks to the mayor about what is wrong with Bluesville and if there's anything about Bluesville that makes him feel proud. The mayor replies that Bluesville is the world's largest manufacturer of un-burnable coal, which children enjoy throwing at people and at each other. The mayor then makes a deal with Eubie. If he can find another use for the coal, he'll put a Christmas tree up in the town square. Eubie's first plan on getting the kids to help him make Bluesville a happier place is having them gather on a busy street and start a pie fight, but that only makes all the people angry. To search for more help, Molly (Mae Whitman), a naughty 10-year-old girl, takes Eubie to downtown Bluesville, the most miserable part of Bluesville, for a meeting of a group called S.L.O.B. (Smile League Of Bluesville), which only has one member of its group. While there, Molly and Eubie meets up with Curtis (Candi Milo), who is there because he brought along his foreign friend, Oreg, who doesn't speak English, but is happy to be there. Molly soon decides that Eubie's plans are hopeless, and tells him to just take all his big ideas home. At the mention of that, Eubie gets another idea, and is about to implement it when the lights in the room go off and Eubie is taken back to the North Pole. In his bid to get Bluesville off the naughty list, Eubie violated several rules in one day. As punishment, Santa had Eubie turn in his magic hat, which, at the North Pole, meant his Christmas happiness and powers were taken away. When Gilda (Carol Kane) hears this, she motivates Eubie to go back to Bluesville to finish his job and gives him he
https://en.wikipedia.org/wiki/ICFP%20Programming%20Contest
The ICFP Programming Contest is an international programming competition held annually around June or July since 1998, with results announced at the International Conference on Functional Programming. Teams may be of any size and any programming language(s) may be used. There is also no entry fee. Participants have 72 hours to complete and submit their entry over the Internet. There is often also a 24-hour lightning division. The winners reserve "bragging rights" to claim that their language is "the programming tool of choice for discriminating hackers". As such, one of the competition's goals is to showcase the capabilities of the contestants' favorite programming languages and tools. Previous first prize winners have used Haskell, OCaml, C++, Cilk, Java, F#, and Rust. The contests usually have around 300 submitted entries. Past tasks Prizes Prizes have a modest cash value, primarily aimed at helping the winners to attend the conference, where the prizes are awarded and the judges make the following declarations: First prize [Language 1] is the programming tool of choice for discriminating hackers. Second prize [Language 2] is a fine programming tool for many applications. Third prize [Language 3] is also not too shabby. Winner of the lightning division [Language L] is very suitable for rapid prototyping. Judges' prize [Team X] are an extremely cool bunch of hackers. Where a winning entry involves several languages, the winners are asked to nominate one or two. The languages named in the judges' declarations have been: See also International Collegiate Programming Contest (ICPC) Online judge References and notes External links Contest at ICFP site Programming contests
https://en.wikipedia.org/wiki/Enrichment
Enrichment may refer to: Behavioral enrichment, the practice of providing animals under managed care with stimuli such as natural and artificial objects Data enrichment, appending or enhancing data with relevant context from other sources, see data management Enrichment factor, used to describe bodies of mineral ore Enrichment in education: activities outside the formal curriculum, or an extra program for the most able students Environmental enrichment, how the brain is affected by the stimulation of its information processing provided by its surroundings The process of adding nutrients to cereals or grain, see food fortification The process of adding sugar to grape must during winemaking in order to achieve a higher alcohol content of the wine, more commonly referred to as chaptalization The process of enhancing breathing gas for scuba diving (e.g. in Enriched Air Nitrox). Job enrichment, improving work processes and environments so they are more satisfying for employees Nuclear enrichment, the process of increasing the Uranium-235 content of nuclear fuel in preparation for nuclear power plants or nuclear weapons The United States Enrichment Corporation, a manufacturer of enriched uranium Unjust enrichment, in civil law, a term for someone who has benefitted another party with the expectation of compensation, but who has not been justly compensated The Enrichment Center Percussion Ensemble from the Enrichment Centre in Winston-Salem NC The Living Enrichment Center, a church in Portland, Oregon The notion of enriched category in mathematics The analysis of gene product annotations using GO Term Enrichment in biology The use of an enrichment culture, to select for the growth of a particular microorganism The paradox of enrichment, a principle of ecology where an abundance of prey tends to destabilize the predator population Enrich (comics) (1929–2023), Spanish comic writer
https://en.wikipedia.org/wiki/Google%20Base
Google Base was a database provided by Google into which any user can add almost any type of content, such as text, images, and structured information in formats such as XML, PDF, Excel, RTF, or WordPerfect. As of September 2010, the product has been downgraded to Google Merchant Center. If Google found user-added content relevant, submitted content appeared on its shopping search engine, Google Maps or even the web search. The piece of content could then be labeled with attributes like the ingredients for a recipe or the camera model for stock photography. Because information about the service was leaked before public release, it generated much interest in the information technology community prior to release. Google subsequently responded on their blog with an official statement: "You may have seen stories today reporting on a new product that we're testing, and speculating about our plans. Here's what's really going on. We are testing a new way for content owners to submit their content to Google, which we hope will complement existing methods such as our web crawl and Google Sitemaps. We think it's an exciting product, and we'll let you know when there's more news." Files could be uploaded to the Google Base servers by browsing your computer or the web, by various FTP methods, or by API coding. Online tools were provided to view the number of downloads of the user's files, and other performance measures. On December 17, 2010, it was announced that Google Base's API is deprecated in favor of a set of new APIs known as Google Shopping APIs. See also List of Google services and tools Resources of a Resource – ROR Base Feeder – Software to create bulk submission Google Base Feeds External links Google Base About Google Base Official Google Base Blog Official Google Blog Press Release Google Base API Mashups References Beta software Defunct websites Base Internet properties disestablished in 2009 Online databases
https://en.wikipedia.org/wiki/Direct%20numerical%20control
Direct numerical control (DNC), also known as distributed numerical control (also DNC), is a common manufacturing term for networking CNC machine tools. On some CNC machine controllers, the available memory is too small to contain the machining program (for example machining complex surfaces), so in this case the program is stored in a separate computer and sent directly to the machine, one block at a time. If the computer is connected to a number of machines it can distribute programs to different machines as required. Usually, the manufacturer of the control provides suitable DNC software. However, if this provision is not possible, some software companies provide DNC applications that fulfill the purpose. DNC networking or DNC communication is always required when CAM programs are to run on some CNC machine control. Wireless DNC is also used in place of hard-wired versions. Controls of this type are very widely used in industries with significant sheet metal fabrication, such as the automotive, appliance, and aerospace industries. History 1950s-1970s Programs had to be walked to NC controls, generally on paper tape. NC controls had paper tape readers precisely for this purpose. Many companies were still punching programs on paper tape well into the 1980s, more than twenty-five years after its elimination in the computer industry. 1980s The focus in the 1980s was mainly on reliably transferring NC programs between a host computer and the control. The Host computers would frequently be Sun Microsystems, HP, Prime, DEC or IBM type computers running a variety of CAD/CAM software. DNC companies offered machine tool links using rugged proprietary terminals and networks. For example, DLog offered an x86 based terminal, and NCPC had one based on the 6809. The host software would be responsible for tracking and authorising NC program modifications. Depending on program size, for the first time operators had the opportunity to modify programs at the DNC terminal. No time was lost due to broken tapes, and if the software was correctly used, an operator running incorrect or out of date programs became a thing of the past. Older controls frequently had no port capable of receiving programs such as an RS-232 or RS-422 connector. In these cases, a device known as a Behind The Reader or BTR card was used. The connection between the control's tape reader and the internal processor was interrupted by a microprocessor based device which emulated the paper tape reader's signals, but which had a serial port connected to the DNC system. As far as the control was concerned, it was receiving from the paper tape unit as it always had; in fact it was the BTR or Reader Emulation card which was transmitting. A switch was frequently added to permit the paper tape reader to be used as a backup. 1990s to present The PC explosion in the late 1980s and early 1990s signalled the end of the road for proprietary DNC terminals. With some exceptions, CNC manufacturers be
https://en.wikipedia.org/wiki/Roller%20locked
In firearms operating systems, the term roller locked refers to locking the bolt with rollers. Notable examples of firearms using this method are the MG 42 general-purpose machine gun, and the CZ 52 semi-automatic pistol. It was also applied in the experimental Gerät 03 semi-automatic rifle and Gerät 06 and EM-1 experimental assault rifles. The MG 42's lineage continued past World War II, forming the basis for the nearly identical MG1 (MG 42/59), chambered in 7.62×51mm NATO, which subsequently evolved into the MG1A3, and later the Bundeswehr's MG 3, Italian MG 42/59 and Austrian MG 74. It also spawned the Yugoslav unlicensed nearly identical Zastava M53. History Origin of the roller-locking is debated: even though the general principle of utilizing "ball bearing parts" under radial pressure "for preventing uncoupling of the coupling members" was known no later than 1910s, it was apparently not used in firearms until 1930s. Mechanism In roller locked arms in the locked position during firing the rollers rest on parallel surfaces relative to the bore axis on the bolt head, so no amount of force pushing back on the bolt can cause the bolt to unlock. When chambering a fresh cartridge the bolt head is used to push out the rollers. For that the bolt head ends in an angled/oblique wedge to smoothly move the rollers outwards into their lockup position. Roller locking is used by the CZ 52 pistol. Slide, barrel, locking piece and rollers are shown here. Normally the recoil spring pushes the locking piece rearward, which in turn pushes the barrel back and holds the locking rollers. (In some of these pictures the spring is removed) When the gun is fired, the barrel, slide and locking piece (right side of picture) will move backwards a short distance, while the locking piece will be stopped by a tab on the frame, shown on the left with a stick pointing out the mating surface. With the locking piece stopped by the tab, the rollers will continue rearward with the slide, until they reach the recessed portion of the locking piece. The rollers will then be allowed to move inward, and will release from their indentations in the slide releasing the slide from the barrel. At about the same time, the barrel will be stopped by the locking piece. Momentum will carry the slide back against the pressure of the recoil spring where extraction and feeding a fresh cartridge happen similarly to other designs. As the slide moves forward, the locking piece maintains outward pressure on the rollers. When the recesses in the slide are positioned with the rollers, the locking piece will push them out into the recesses and move forward, locking the barrel to the slide again, the barrel and slide will move forward a small amount and stop. Unlike a standard Browning short-recoil action, there is no tipping of the barrel during operation. Other locking systems with similarities Roller-delayed blowback as in the HK G3, where similar rollers are used is sometimes mistakenly ca
https://en.wikipedia.org/wiki/WHOI%20%28TV%29
WHOI (channel 19) is a television station in Peoria, Illinois, United States, broadcasting the digital multicast network TBD. Owned and operated by Sinclair Broadcast Group, the station maintains a transmitter on Springfield Road (along I-474) in East Peoria, a section of Groveland Township, Tazewell County. WHOI was the ABC affiliate for the market until 2016. History WHOI was Peoria's second television station, signing-on as WTVH-TV on October 20, 1953. The station was founded by Hugh Norman and Edward Schoede. Hilltop Broadcasting, which co-owned the Peoria Journal Star bought the station in 1954. Its first studios were on Main Street in Peoria. Originally broadcasting an analog signal on VHF channel 8, it was a primary CBS affiliate but also carried shows from ABC and DuMont. WTVH lost DuMont when the network ceased operations in 1955, and lost CBS when WMBD-TV (channel 31) began broadcasting. WTVH dropped the -TV suffix in its callsign on August 3, 1955. The Metropolitan Broadcasting Corporation, later known as Metromedia, purchased the station in 1959. In 1963, WTVH was bumped down to UHF channel 19 so that a third commercial VHF station could sign-on in the Quad Cities using that channel (the new station, WQAD-TV, is also an ABC affiliate). In 1965, Metromedia sold the station to Mid-America Media, owners of WIRL radio (1290 AM) who, on September 12 of that year, changed the call sign to WIRL-TV. It became WRAU-TV in 1971 and adopted its present calls of WHOI on March 17, 1985. The WTVH call sign was picked up by a station in Syracuse, New York in 1976. In 1987, WHOI came under the ownership of Adams Communications following a merger with its previous owner, Forward Communications. The station was sold to Brissette Broadcasting in 1991, then to Benedek Broadcasting in 1996. When Benedek declared Chapter 7 bankruptcy in 2002, WHOI was sold to Chelsey Broadcasting instead of Gray Television (which is coincidentally the current owner of WEEK-TV after acquiring Quincy Media in 2021). In April 2004, WHOI, KHQA-TV in the Hannibal, Missouri–Quincy, Illinois media market, and WEYI-TV in Saginaw, Michigan, became three of the founding stations of Barrington Broadcasting. WHOI carried some programming from UPN, including Star Trek: Voyager, from the network's launch in January 1995 until WAOE (channel 59) went on the air in 1999. Starting in 1998, WHOI began to run a cable-only WB affiliate. Known by the fictional call sign "WBPE", it was on channel 4 on most cable systems in the area. On September 18, 2006, when The WB and UPN merged to create The CW, "WBPE" became part of The CW Plus which is a similar operation to The WB 100+. WHOI added a new second digital subchannel to simulcast this programming to offer non-cable subscribers access to The CW. The channel then began to use WHOI-DT2 as its official calls. WHOI has been digital-only since February 17, 2009 with the "WHOI" calls being transferred from the now-defunct analog channel 19 to th
https://en.wikipedia.org/wiki/Andrew%20Maher
Andrew Maher is an Australian sports journalist and broadcaster for the Seven Network and Melbourne sport radio station 1116 SEN. He is best known for covering both Australian rules football and the Big Bash League for the Ten television network, as well as hosting AFL review program Before the Game. Maher was a boundary rider for the 2004, 2007, 2009 and 2011 AFL grand finals for Network Ten. Maher hosted The Fifth Quarter (post-match show, following Saturday Night AFL games from 2004 to 2007 (with Michael Christian), and 2009 and 2011 with rotating expert commentators Malcolm Blight, Matthew Lloyd and Luke Darcy. Early career Maher began working for weekly football newspaper 'Inside Football' as a staff writer. He progressed to be the paper's assistant editor. He then moved on to The Sunday Age, where he worked as Football Editor in the late 1990s. Television career In 1996, he joined television production company Vuecast (now AFL Films) after it landed the contract to supply content for the Pay TV operator 'Sports AFL' as part of the Optus Vision network. As part of its Pay TV coverage of AFL football, Andrew mixed duties as host of 'One on One', the producer of its Monday night show, Football Feedback, and as the station's boundary rider on its exclusive match-day coverage. Joining Channel 7 in 2001, he produced the highly acclaimed "Talking Footy" while sharing boundary line duties on Channel 7's football coverage. In 2002, Maher moved to Channel 10 after they, with Channel 9 and Foxtel won the rights to broadcast the AFL from Channel 7. He has multiple roles at Channel 10, working on-air and also as a part of their AFL/Sports production teams. Maher's Channel 10 on-air contributions are as the boundary rider for their Saturday afternoon coverage, the host of their Saturday night preview show "Before the Game" as well as on the Saturday night review show, The Fifth Quarter as co-host (with Michael Christian). Maher has also been credited with coining the phrase "spotfires" – to describe those occasions where small melees or other acts of physical aggression between opponents were breaking out during a game. In September 2011 Fox Sports announced he hosted the association football panel show Fox Sports FC. In 2013, Maher commentated for Network Ten's coverage of the T20 Big Bash League. In addition to the Cricket, Maher is a roving sport reporter across the board for Ten Sport, including the Formula 1; MotoGP; Golf; Tennis and Athletics (Commonwealth Games and Stawell Gift) among others. Maher continued his hosting duties for popular AFL show Before the Game on Network Ten as well, until it was axed at the end of 2013. Since 2015, he has co-hosted The Front Bar, aired on afl.com.au and on Channel 7 along with comedians Mick Molloy and Sam Pang, seeking to take a comedic view on news from that week in the AFL community. AFL Maher contributes on the following programmes: Monday's Experts, Monday review show showing highlights of t
https://en.wikipedia.org/wiki/Craig%20Willis
Craig Willis (born 1954) is a former Australian announcer who has appeared as the voice of many of Network Ten / One HD and Seven Network's AFL Grand Final, Anzac Day and major Finals Broadcasts from the early 2000s to 2018. He is colloquially known as the 'voice of the AFL'. Career Willis has also performed voiceovers at non-AFL major events, including the Melbourne Cup and is regarded as one of Australia's premier announcers. Willis is often a Master of Ceremonies and hosts the traditional Grand Final Breakfast, a fixture of the AFL grand final day. Additionally, he does voiceovers and is occasionally a fill in presenter on Melbourne radio station 3AW. In 2000, he was the ground announcer at the Sydney Olympic Games, a role he also fulfilled at the Athens Olympics four years later. Willis is also heavily involved in Tennis coverage and announces the players at the Australian Open. He also narrates the Fox Sports television show ATP Tennis and acted as a player announcer at the International Premier Tennis League (IPTL). In recent times, he has become the voice of Bank of Melbourne for directing customers through call queue options. References Australian male voice actors Australian television personalities Living people 1954 births
https://en.wikipedia.org/wiki/James%20Brayshaw
James Antony Brayshaw (born 11 May 1967) is an Australian media personality and retired cricketer working in television for the Seven Network and radio for Triple M. For Seven Sport, he hosts and calls Test cricket during summer and Australian Football League during winter. Brayshaw worked for the Nine Network for 15 years, calling AFL, cricket and co-hosting The Footy Show with Garry Lyon. As a cricketer, he was known as Jamie Brayshaw. He is a former chairman of the North Melbourne Football Club, serving from 2008 to 2016. From 2011 to 2015, he was chairman of the Melbourne Renegades cricket team. In September 2022, Brayshaw was made a life member of the North Melbourne Football Club. Cricket career Like his father Ian Brayshaw, James Brayshaw played domestic cricket for Western Australia and then South Australia; Brayshaw had a career spanning almost a decade. In that time he was a consistent fielder, with 43 catches. Brayshaw is a two-time Sheffield Shield winner; this achievement was completed with two different states. In the 1987/1988 final, Brayshaw won with Western Australia, who defeated Queensland by 5 wickets. Brayshaw scored 24 off 104 balls and 4 off 8 balls; he also had the rare but dubious distinction of being caught by two international Test captains, with Allan Border in the first innings and Ian Botham in the second innings. The other Shield was in the 1995/1996 final, where he won with South Australia in a draw against his former state. Brayshaw performed solidly with the bat for the Redbacks, scoring 87 in the first innings and 66 in the second innings. He would continue to play domestic cricket for one more season, retiring at 30 years of age to focus on his media career. He also played at first-class level for Australia A, but, due to Australian Cricket enjoying a successful era and many batsmen considered to be ahead of him, Brayshaw wasn't really in contention for a baggy green cap. Media career Early career at Seven Network Following his retirement from cricket in 1996, Brayshaw worked for the Seven Network in Adelaide. This included being a sports reporter for Seven Nightly News and working on local football discussion programs, including Footy Plus. In early 1998, he was teamed up with Amanda Blair and Paul Gale on Adelaide's SAFM, which eventually became the city's number-one rated breakfast show. One on-air incident at SAFM saw him covered in Adelaide Football Club bodypaint after the club he supports, North Melbourne, lost the 1998 AFL Grand Final to them. Arrival at Nine Network and Triple M In 2001, his big break came as the host of the Seven's coverage of 2001 Ashes with Jeff Thomson, but he later moved to the Nine Network when the Australian Football League was transferred from Seven, becoming a commentator on Sunday, mainly with Brian Taylor, Garry Lyon and Dennis Cometti. He eventually became involved behind the microphone in Nine's cricket coverage. In 2005, Brayshaw co-hosted Any Given Sunday with
https://en.wikipedia.org/wiki/Free%20Speech%20TV
Free Speech TV (FSTV) is an American progressive news and opinion network. It was launched in 1995 and is owned and operated by Public Communicators Incorporated, a 501(c)(3) non-profit, tax-exempt organization founded in 1974. Distributed principally by Dish Network, DirecTV, and the network's live stream at freespeech.org and on Roku, Free Speech TV has run commercial free since 1995 with support from viewers and foundations. The network claims to "amplify underrepresented voices and those working on the front lines of social, economic and environmental justice," predominantly from a progressive perspective. History 1995–1999 Free Speech TV is an outgrowth of three projects that attempted to establish wider dissemination of progressive perspectives on television: The 90's, a landmark television series seen on public television and cable; The 90's Channel, a network of seven full-time cable channels dedicated to independent media; and the part-time Free Speech TV Program Service, launched in 1995 as an innovative approach to curating and distributing independent media to a distribution network of community access cable stations. Public television stations carried some Free Speech TV's special series, such as Just Solutions: Campaigning for Human Right. The network's efforts in streaming media online won it a 1998 Streamers Award and 1999 Webby Award. 2000–2006 In January 2000—as the result of an FCC-mandated public interest channel set-aside—Free Speech TV became a national, full-time channel on the Dish Network satellite television system while continuing to build a national network of part-time local cable affiliates. Program highlights from the channel's formative years included live field reporting of the anti-globalization movement spawned at the 1999 WTO protests in Seattle; the 2000 US presidential elections, including Democracy Now!s premiere as a television program at the Republican and Democratic conventions; the September 11 attacks, to which FSTV responded with a daily news report and weekly current affairs program; and extensive coverage of the large global anti-war mobilization and the subsequent U.S. invasions of Afghanistan and Iraq. 2007–2010 In 2007, FSTV moved from Boulder to Denver, covering events inside and outside the 2008 Democratic National Convention, where Barack Obama accepted his party's nomination for president. Over the following years, the network stepped up its daily coverage of national politics with the addition of GRITtv with Laura Flanders, The Big Picture with Thom Hartmann and Al Jazeera English. FSTV's daily news programs—led by The Thom Hartmann Program and Democracy Now!—became FSTV's top programs in terms of popularity and "stickiness" (a measure of audience engagement and loyalty). During the Arab Spring, FSTV pre-empted much of its regular non-news programming to Al Jazeera English's reporting from Cairo's Tahrir Square and other locations. 2011–2012 In 2011 and 2012, FSTV coverage provided
https://en.wikipedia.org/wiki/Retro%20TV
Retro TV (stylized as retrotv), formerly known as Retro Television Network, is an American broadcast television network owned by Get After It Media. The network mainly airs classic television sitcoms and drama series from the 1950s through the 1980s, although it also includes more recent programs from the 1990s and 2000s. Through its ownership by Luken, Retro TV is a sister network to several broadcast network properties that are wholly or jointly owned by the company, including the family-oriented Family Channel and country music-oriented network Heartland. At its outset, Retro TV was designed to be broadcast on the digital subchannels of television stations; however in recent years, the network's affiliate body has been drawn down to primarily low-power stations, as many station groups have replaced the network on the subchannels of their full-power major network affiliates with similarly formatted networks such as Antenna TV and MeTV, which have assumed rights to many of the distributors that formerly held programming agreements with Retro. The network is also available nationwide on free-to-air C-band satellite via SES-2 in DVB-S2 format; as individualized transmitter-ready feeds for each station are centrally generated using broadcast automation and delivered to the stations by satellite. In March 2020, Retro TV launched a live online feed, which carries a limited six-hour selection of the network's programming, looped four times each day. History The Retro Television Network (originally branded as "RTN") launched in July 2005 on select television stations owned by the Equity Broadcasting Corporation (later known as Equity Media Holdings), a chain of small (often low-powered) satellite-fed VHF and UHF television stations controlled directly from Equity's headquarters in Little Rock, Arkansas. Equity had expanded quickly with purchases of many small stations in the early 2000s, but by 2008, the company was struggling to meet its obligations. In June 2008, while the company was undergoing financial troubles, Equity Media Holdings sold RTN to Henry Luken III's – Equity's former president and CEO, and the company's largest shareholder – Luken Communications (which later rebranded as Reach High Media Group in 2019) for $18.5 million in cash. Equity had an option to repurchase the network for $27.75 million; the purchase option was not exercised and expired on December 24, 2008. Equity had filed for Chapter 11 bankruptcy three weeks before the expiration of the purchase option. On January 4, 2009, a contract conflict between Equity and Luken Communications interrupted RTN programming on many of its affiliates with Luken alleging that Equity had left many obligations to RTN's creditors, including programming suppliers, unpaid. As a result, Luken restored a national feed of the network from its Chattanooga headquarters with individual feeds to affiliates not owned by Equity following suit on a piecemeal basis. Equity-owned or -operated stations
https://en.wikipedia.org/wiki/Certance
Certance, LLC, was a privately held company engaged in design and manufacture of computer tape drives. Based in Costa Mesa, California, Certance designed and manufactured drives using a variety of tape formats, including Travan, DDS, and Linear Tape-Open computer tape drives. Certance was one of the three original technology partners, (Certance, IBM, and Hewlett-Packard), that created the Linear Tape-Open technology. In 2005, Certance was acquired by Quantum Corporation. History The company began as the removable storage systems division of Seagate Technology. The division was formed in 1996 from storage companies Archive Corporation, Irwin Magnetic Systems, Cipher Data Products, and Maynard Electronics. In a restructuring involving Seagate Technology and Veritas Software, the division was spun off in 2000 into the independent company Seagate Removable Storage Systems. The company was the worldwide unit volume shipment leader in 2001, 2002, and 2003. The company name was changed to "Certance" in 2003. In 2004, Quantum Corporation announced plans to acquire Certance. The acquisition was completed in 2005, whereupon Certance ceased to exist as an independent company. References Computer storage companies Companies based in Costa Mesa, California Defunct technology companies of the United States Defunct computer hardware companies 1996 establishments in California 2005 establishments in California 2005 mergers and acquisitions Technology companies established in 1996 Technology companies disestablished in 2005 Defunct computer companies of the United States
https://en.wikipedia.org/wiki/Manitoba%20Eco-Network
The Manitoba Eco-Network is an environmental non-governmental organization (ENGO) and registered charity located in Winnipeg, Manitoba, Canada. It is a regional affiliate of the Canadian Environmental Network, based in Ottawa, Ontario. The Manitoba Eco-Network is a network for approximately 50 ENGOs throughout the province. The stated goal of the Manitoba Eco-Network is to "promote positive environmental action by connecting people and groups in our communities." In practice, it attempts to achieve this goal by providing services to its member groups and the public indirectly through its varied projects. The Manitoba Eco-Network does not lobby and is non-partisan; however, some of its member groups are partisan organizations and may lobby government or participate in government consultations. The Steering Committee of the organization is elected at the Annual General Meeting and is composed of representatives of member groups and one or two individual members. Funding is provided by the Government of Manitoba, the Government of Canada, various foundations and granting agencies, membership fees, donations, and through fundraising events. In 2019, cuts to Manitoba's environmental programming budgets threatened the organization's future. Projects Alice Chambers Memorial Library The Alice Chambers Memorial Library is a public library of environmental information. It contains several thousand items, including books, journals, DVDs, and periodicals. In addition, the library is a public registry for development proposals in the Province of Manitoba. The Eco-Network has also partnered with another library in Manitoba (Ducks Unlimited) to offer an inter-library loan program. Children's Health and Environment Partnership The Children's Health and Environment Partnership was formed in 2003. At that time, it was a partnership between several environmental NGOs attempting to educate the public about the effects of environmental issues on the health of children. It was then called "The Children's Environmental Health Project". In from 2006 to 2008, it went through several changes and became a more formal project. A new website was launched and the name was changed to its current incarnation, The Children's Health and Environment Project. In its current form, The Children's Health and Environment Partnership is composed of five supporting member groups, including The Manitoba Eco-Network. Climate Change Connection Climate Change Connection is an initiative to provide public education and outreach to Manitobans about [Climate Change]. This organization takes the position that man-made climate change is occurring. The organization was "started in January 2002 as part of Canada's effort to meet our Kyoto Protocol objectives." Climate Change Connection is partially funded by The Province of Manitoba and Manitoba Hydro, which is the main Manitoban electricity utility. It is jointly governed by The Manitoba Eco-Network and The University of Winn
https://en.wikipedia.org/wiki/Proportional-fair%20scheduling
Proportional-fair scheduling is a compromise-based scheduling algorithm. It is based upon maintaining a balance between two competing interests: Trying to maximize the total throughput of the network (wired or not) while at the same time allowing all users at least a minimal level of service. This is done by assigning each data flow a data rate or a scheduling priority (depending on the implementation) that is inversely proportional to its anticipated resource consumption. Weighted fair queuing Proportionally fair scheduling can be achieved by means of weighted fair queuing (WFQ), by setting the scheduling weights for data flow to , where the cost is the amount of consumed resources per data bit. For instance: In CDMA spread spectrum cellular networks, the cost may be the required energy per bit in the transmit power control (the increased interference level). In wireless communication with link adaptation, the cost may be the required time to transmit a certain number of bits using the modulation and error coding scheme that this required. An example of this is EVDO networks, where reported SNR is used as the primary costing factor. In wireless networks with fast Dynamic Channel Allocation, the cost may be the number of nearby base station sites that can not use the same frequency channel simultaneously, in view to avoid co-channel interference. User prioritization Another way to schedule data transfer that leads to similar results is through the use of prioritization coefficients. Here we schedule the channel for the station that has the maximum of the priority function: denotes the data rate potentially achievable for the station in the present time slot. is the historical average data rate of this station. and tune the "fairness" of the scheduler. By adjusting and in the formula above, we are able to adjust the balance between serving the best mobiles (the ones in the best channel conditions) more often and serving the costly mobiles often enough that they have an acceptable level of performance. In the extreme case ( and ) the scheduler acts in a "packet" round-robin fashion and serves all mobiles one after the other (but not equally often in time), with no regard for resource consumption, and such that each user gets the same amount of data. The ( and ) scheduler could be called "maximum fairness scheduler" (to be used to provide equal throughout to voice users for example). If and then the scheduler will always serve the mobile with the best channel conditions. This will maximize the throughput of the channel while stations with low are not served at all. The ( and ) scheduler could be called "max rate" scheduler. Using and will yield the proportional fair scheduling algorithm used in 3G networks. The ( and ) scheduler could be implemented by providing the same amount of time & spectrum for each user, irrespective of the desired packet size, channel quality and data rate (MCS) used. The proportional fair ( and ) sch
https://en.wikipedia.org/wiki/Eovia
The Eovia Corporation was founded in November 2000, with offices in both the US and France. The company's 3D computer graphics software products were aimed towards professional and amateur artists, with a focus on remaining accessible in price and usability. On April 25, 2006, it was announced that DAZ Productions (now Daz 3D Inc) had acquired the US division of Eovia, as well as the rights to Carrara and Hexagon. In June 2006, Amapi, Eovia's last remaining product, was acquired by e frontier. However, the future of Amapi's development is unclear, as it relies on the rendering engine from Carrara 3, now a Daz 3D product. In July 2007, e frontier closed the France branch and let the Amapi development team go. In March 2012, EOVIA founded a new Asset management company, Trade my Bitcoin in London with the participation of BARCLAYS Securities. Products Carrara: Originally acquired from MetaCreations, Carrara is a toolset used for 3D modeling, texturing, animation, and industrial design. VectorStyle: VectorStyle is a Carrara plug-in allowing 3D scenes to be rendered to two-dimensional vector graphics in a variety of graphic styles and file formats. A popular use is rendering an animated 3D scene as an Adobe Flash file. Amapi: Amapi is an application used for the conception and creation of high-end 3D models, often used for product design and architecture. Hexagon: Hexagon is a 3D polygonal modeler used for the creation of organic 3D models. Carrara Basics: a simplified, easy to use and learn version of Carrara. References External links Daz 3D web site e frontier web site 3DExtract.com Defunct software companies of the United States
https://en.wikipedia.org/wiki/List%20of%20countries%20by%20exports
The following article lists different countries and territories by their exports according to data from the World Bank. Included are merchandise exports and service exports. Merchandise exports are goods that are produced in one country and sold to another country. Service exports refer to the cross-border sale or supply of services by residents of one country to residents of another country. By total exports By merchandise exports By service exports See also List of countries by exports per capita List of top exporting countries by product category List of countries by high tech exports List of countries by imports List of countries by leading trade partners List of Chinese administrative divisions by exports List of U.S. states and territories by exports and imports List of German states by exports List of countries by oil exports References Export
https://en.wikipedia.org/wiki/The%20Edge%20%28radio%20station%29
The Edge is a youth-oriented New Zealand entertainment brand consisting of a national radio network and an entertainment website. It is owned and operated by MediaWorks New Zealand. It previously had a TV channel, The Edge TV. The station was founded in Hamilton in 1994 and is now based in Auckland; it broadcasts nationwide over multiple channels. Research International audience surveys suggest The Edge has approximately 581,200 listeners across all markets that are surveyed and the station makes up 7.0% of the New Zealand radio market. The network is most successful in Waikato, Rotorua and Nelson surveys and in the 15–19 and 10–14 female demographics, whereas rival station ZM is most popular with listeners aged between 20 and 34. The station's breakfast programme is number two in the ratings for nationwide commercial breakfast radio; its 240,000 listeners compare with 325,600 listeners for the top-rating Newstalk ZB. This compares with the non-commercial RNZ National whose breakfast programme, Morning Report, has an audience of 522,000 listeners. History Early years In 1994 both Buzzard 98FM, The Rock 93FM and The Rock 100FM in Taranaki were sold to the Taranaki-based company Energy Enterprises which operated Energy FM in the area. Buzzard 98FM was rebranded as The Edge 97.8FM and switched to a Top 40 format, first airing on 8 August 1994. The Edge TV The Edge TV is the brand's TV channel. It was launched on 27 June 2014 as a replacement of C4, and airs music videos, specialist music and pop culture shows and original video content filmed with The Edge radio hosts. It is available free-to-air on Kordia digital terrestrial and Sky satellite services, as well as online. On 1 July 2019, it moved to online only, with its terrestrial broadcast element being replaced by ThreeLife + 1. It returned to terrestrial broadcast on 26 March 2020, replacing ThreeLife. In September 2020, MediaWorks sold the TV portion of its business including Edge TV to Discovery, Inc. Programs Breakfast , hosted by Clint Randell, Megan Mansell and Dan Webby, is The Edge's flagship breakfast programme which airs 6 am–10 am, Monday–Friday. They are joined by producers Brock and Ash. A podcast of the show is produced and released on Rova, and other podcast platforms. Previous hosts of The Edge's breakfast show include Nickson Clark, Eli Matthewson, Dom Harvey, Jay-Jay Feeney, Mike Puru, Jason Reeves, Martin Devlin, Malcolm Paul, Brian "Butt Ugly Bob" Reid, and Jesse Mulligan. Workday airs 10 am–3 pm, Monday–Friday and is hosted by Sean Hill. Previous hosts of The Edge's days show include Sophie Nathan, Steph Monks, Sarah Gandy, Guy Mansell, Sam Robertson, Megan Mansell, Sharyn Casey, Megan Sellers, Clint Roberts, Joe Cotton, Angelina Boyd, Tarsh Tolson, and Jay-Jay Feeney. Afternoons airs 3 pm–7 pm, Monday–Friday and is hosted by Sharyn Casey, Steph Monks, and Nickson Clark with producer Cal Payne and Intern Yas. Previous hosts of The Edge's drive show includ
https://en.wikipedia.org/wiki/Howe%20Sound
Howe Sound (, ) is a roughly triangular sound, that joins a network of fjords situated immediately northwest of Vancouver, British Columbia, Canada. It was designated as a UNESCO Biosphere Reserve in 2021. Geography Howe Sound's mouth at the Strait of Georgia is situated between West Vancouver and the Sunshine Coast. The sound is triangular, opening to the southwest into the Strait of Georgia, and extends northeast to its head at Squamish. There are several islands in the sound, three of which are large and mountainous in their own right. The steep-sided mainland shores funnel the breezes as the daily thermals build the wind to or more at the northern end of the sound on a typical summer day. A small outcrop of volcanic rock is located on the eastern shore of Howe Sound called the Watts Point volcanic centre. History The history of Howe Sound begins with the Indigenous people, the Squamish and Shishalh, who have roamed this land and traveled on this body of water for thousands of years, and whose village sites and camp sites are spread throughout the area. The land and islands are still used by Squamish and Shishalh for cultural practices. Both the Squamish and Shishalh are a part of the Coast Salish linguistic and cultural groupings. Spanish explorer José María Narváez observed the sound in 1791 and named it Boca del Carmelo. Captain George Vancouver entered the sound in 1792, and named it after Admiral Earl Howe. In 1888, copper was discovered in the mountains around Britannia Creek, south of Squamish. Large scale mining began at Britannia Beach in 1905, and by 1929, the largest copper mine in the British Empire was located here, beside the shores of Howe Sound. The mine closed in 1974, but part of its historical legacy has been the large amounts of toxic effluent it has deposited into Howe Sound. In September 2021, Howe Sound was designated a UNESCO Biosphere Reserve in recognition of its recovery from industrial pollution and to promote sustainable development. Name The Sound and many of its features are named after British naval officers. There were multiple Indigenous names in use prior to the colonial period, and the Sound is often referred to by a Squamish name, Átl’ḵa7tsem, meaning "paddling north". Restoration In the 20th century Howe Sound experienced high industrial growth. The Britannia mine, chemical plants, and sullfur mills leaked hazardous chemicals and heavy metals into the surrounding environment. The toxic materials leaked into the waters of Howe Sound and seeped into the ground. Although the Britannia mine was shut down in 1974 the pollutants that were leaked into the ecosystem stayed persistent. The pollutants as well as over fishing and hunting lead to a dramatic decrease in biodiversity. A loss in humpback whales, orcas, dolphins, seals, salmon, and other species all suffered severely. The salmon were weakened and died off which caused a shortage of food available in the estuaries that surround Howe Sound. Th
https://en.wikipedia.org/wiki/WDBD
WDBD (channel 40) is a television station in Jackson, Mississippi, United States, affiliated with the Fox network. It is owned by American Spirit Media, which maintains a shared services agreement (SSA) with Gray Television, owner of NBC affiliate WLBT (channel 3), for the provision of certain services; it is also sister to Vicksburg-licensed MyNetworkTV outlet WLOO (channel 35). Although technically owned by Tougaloo College, WLOO is actually controlled by American Spirit through a separate joint sales agreement (JSA), with Gray providing limited engineering support. The stations share studios on South Jefferson Street in downtown Jackson, while WDBD's transmitter is located on Thigpen Road southeast of Raymond, Mississippi. History The station began broadcasting on November 30, 1984, as the market's first independent outlet. It was also the first television station in Mississippi to not be affiliated with a network. Jackson Family Television, originally consisting of Nashville housewife and communications student Brenda Harrison and Cleveland, Tennessee, businessman H. Bernard Dixon, owned the station while Media Central, Inc. of Chattanooga, Tennessee, operated it under a local marketing agreement (LMA). Two months after it signed on, Harrison sold her interest in the station to Dixon, and in October 1985, Media Central took over ownership of the station. On July 6, 1987, WDBD became the area's first Fox affiliate, although the fourth broadcast network had launched back in October 1986. For the first nine months of the network's existence, the network's only affiliate in Mississippi was Gulfport-based WXXV-TV, which had signed on the air in February 1987 and had a decent signal that was able to cover most of southern Mississippi, but not the city of Jackson. As a result, Fox programming was not available in a large part of Mississippi for the network's first four months of operations, although WDBD did air an episode of The Late Show Starring Joan Rivers that featured Delta State University pompom squad after the team was mired in controversy over their uniforms. In 1988, while Media Central was in Chapter 11 bankruptcy proceedings, Act III Broadcasting tried to acquire WDBD and sister station WZDX in Huntsville, Alabama, but the deal had fallen through. In 1989, the station was sold to Donatelli & Klein of Bethesda, Maryland, making it a sister station to WDSI in Chattanooga. Pegasus Broadcasting brought out Donatelli & Klein in 1993. In October 2001, due to a payment dispute between Pegasus and Fox, WDBD became an affiliate of The WB, leaving Jackson without an over-the-air Fox affiliate for the next 23 months; sister station WPXT in Portland, Maine, also made the switch at the same time as Pegasus and Fox failed to agree on an affiliation agreement for the two stations. It would not be until September 2003 when WUFX (now sister station WLOO) signed-on in nearby Vicksburg and became the area's second Fox affiliate. In the interim, programm
https://en.wikipedia.org/wiki/WLOO
WLOO (channel 35) is a television station licensed to Vicksburg, Mississippi, United States, serving the Jackson area as an affiliate of MyNetworkTV. Owned by Tougaloo College, it has a joint sales agreement (JSA) with Fox affiliate WDBD (channel 40, owned by American Spirit Media). Both stations, in turn, are controlled under a shared services agreement (SSA) by Gray Television, owner of NBC affiliate WLBT, channel 3 (with Gray providing limited engineering support to WLOO). The stations share studios on South Jefferson Street in downtown Jackson, while WLOO's transmitter is located on Thigpen Road southeast of Raymond, Mississippi. History The station signed on September 29, 2003, as WUFX, airing an analog signal on UHF channel 35. The station was Jackson's second Fox affiliate; until its launch, there was no over-the-air affiliate in the area because WDBD had dropped the network in favor of The WB almost two years earlier in October 2001. During the previous 23 months, Fox programming was made available on cable in Jackson via Foxnet, although cable providers in the Natchez area carried WNTZ-TV from Alexandria, Louisiana instead. Throughout its Fox affiliation, WUFX carried the branding "Fox 35" and used the slogan "Fox For You". Channel 35 would have officially begun broadcasting at 11:00 a.m. on September 7 in time for the start of the 2003 NFL season. However, two members of the tower construction crew had shots fired at them at the station's analog transmitter site in Edwards on August 31. As a result, all work was halted for 22 days while the Hinds County Sheriff's Department conducted an investigation. Deputies eventually decided it was safe for the construction crew to resume work on WUFX's transmitter and even provided on-site security until its completion. In early 2006, it was announced The WB and UPN would merge to form The CW. At the same time, News Corporation (owner of Fox) made public another new network called MyNetworkTV would be launching as well. UPN affiliate WRBJ was announced as the new station for The CW while WUFX would join MyNetworkTV. In advance of the switch to MyNetworkTV, WUFX and WDBD swapped affiliations. On July 3, 2006, the station temporarily picked up The WB but began identifying itself on-air as "My 35" in anticipation of joining the new network. After joining MyNetworkTV, it continued carrying WB programming in a secondary nature until that network shut down September 17. Meanwhile, WDBD rejoined Fox and adopted the branding "Fox 40". WUFX and WDBD were sold by Jackson Television to Roundtable Broadcasting in early 2010. However, the latter's licensee listing with the FCC still says Jackson Television. Vicksburg Broadcasting filed to sell WUFX and WBMS-CA to American Spirit Media in July 2012. As American Spirit also acquired WDBD and WXMS-LP from Roundtable Broadcasting, the WUFX license was then sold for $1 to Tougaloo College, though American Spirit provides sales services to the station under a joi
https://en.wikipedia.org/wiki/JDBC%20driver
A JDBC driver is a software component enabling a Java application to interact with a database. JDBC drivers are analogous to ODBC drivers, ADO.NET data providers, and OLE DB providers. To connect with individual databases, JDBC (the Java Database Connectivity API) requires drivers for each database. The JDBC driver gives out the connection to the database and implements the protocol for transferring the query and result between client and database. JDBC technology drivers fit into one of four categories. JDBC-ODBC bridge Native-API driver Network-Protocol driver (Middleware driver) Database-Protocol driver (Pure Java driver) or thin driver. Type 1 driver – JDBC-ODBC bridge Type 1 driver – JDBC-ODBC bridge The JDBC type 1 driver, also known as the JDBC-ODBC bridge, is a dbase driver implementation that employs the ODBC driver to connect to the database. The driver converts JDBC method calls into ODBC function calls. The driver is platform-dependent as it makes use of ODBC which in turn depends on native libraries of the underlying operating system the JVM is running upon. Also, use of this driver leads to other installation dependencies; for example, ODBC must be installed on the computer having the driver and the database must support an ODBC driver. The use of this driver is discouraged if the alternative of a pure-Java driver is available. The other implication is that any application using a type 1 driver is non-portable given the binding between the driver and platform. This technology isn't suitable for a high-transaction environment. Type 1 drivers also don't support the complete Java command set and are limited by the functionality of the ODBC driver. Sun (now Oracle) provided a JDBC-ODBC Bridge driver: sun.jdbc.odbc.JdbcOdbcDriver. This driver is native code and not Java, and is closed source. Sun's/Oracle's JDBC-ODBC Bridge was removed in Java 8 (other vendors' are available). If a driver has been written so that loading it causes an instance to be created and also calls DriverManager.registerDriver with that instance as the parameter, then it is in the DriverManager's list of drivers and available for creating a connection. It may sometimes be the case that more than one JDBC driver is capable of connecting to a given URL. For example, when connecting to a given remote database, it might be possible to use a JDBC-ODBC bridge driver, a JDBC-to-generic-network-protocol driver, or a driver supplied by the database vendor. In such cases, the order in which the drivers are tested is significant because the DriverManager will use the first driver it finds that can successfully connect to the given URL. First the DriverManager tries to use each driver in the order it was registered. (The drivers listed in jdbc.drivers are always registered first.) It will skip any drivers that are untrusted code unless they have been loaded from the same source as the code that is trying to open the connection. It tests the drivers by calling
https://en.wikipedia.org/wiki/RGU
RGU may refer to: Rajiv Gandhi University, India Remote graphics unit, a computer control device Robert Gordon University, Scotland Royal Global University, India Russell Gaelic Union, Downpatrick, Gaelic football club, Ireland ISO 639:rgu, the ISO code for the Ringgou language
https://en.wikipedia.org/wiki/Environmental%20Change%20Network
The Environmental Change Network (ECN) was established in 1992 by the Natural Environment Research Council (NERC) to monitor long-term environmental change and its effects on ecosystems at a series of sites throughout Great Britain and Northern Ireland. Measurements made include a wide range of physical, chemical and biological variables. See also Climate change External links Environmental Change Network website Environment of the United Kingdom Natural Environment Research Council
https://en.wikipedia.org/wiki/Cash%20Bonanza
Cash Bonanza is an Australian game show hosted by Larry Emdur, which was broadcast on the Nine Network in 2001. Filmed at Warner Bros. Movie World on the Gold Coast, Queensland, Australia, Cash Bonanza was a joint initiative between all five Australian lottery agencies. Format Overview At the start of each show, a shot of the contestants going down the famous splash drop at the end of the Wild West Falls Adventure Ride also at Movie World was shown. Three contestants participated in each game, selected at random from the 15 contestants, who were already drawn from those who had eligible winning scratch-it tickets. If on any game when the contestant did not win the full $5000, the part of the $5000 that they did not win will be given to a lucky home viewer. For example, if the contestant won $3000, the home viewer will get the other $2000. Round 1 - Gold Diggers Derby The contestants, seated in mine carts, competed in getting their minecart to the end of the track. They took turns in picking numbers from a board of 15. Each number concealed either a red, yellow or blue coloured screen, which moves that coloured cart forward one space. The first contestant to reach the end of their track won an amount up to $5,000. The runners up got $500 each. Round 2 - Double Quick Draw Three new contestants played Rock, Paper, Scissors. This game is played over nine rounds. In the first round they play for $30 and this amount increases progressively for each round until the final round where it is $2000. If each contestant selected the same item as each other, the round is considered a draw and the cash up for grabs will be added onto the next round. In cases where all three items appear by one of three contestants, it is also a draw. Whenever two players select the item that beats the other player, the two winners will get the amounts up on offer each. If one player beats the other two, they will get double amount they were playing for. At the end of the last round, the player with the highest amount of cash will win that amount of cash up to $5000 and the runners get $500 each regardless of how high their score was. Round 3 - Drop The Silver Dollar The contestants take turns of dropping "silver dollars", or giant coins into a giant Pachinko machine, which have movable, rotatable parts. Each contestant has three drops each and at the bottom of the Pachinko board there are five pockets, each with a different cash amount each. The amounts increase after each round of drops. After all contestants have dropped three coins into the machine, the contestant who got the highest cash amount will get to drop another coin. This time each pocket will be given either the word 'WIN' or 'LOSE' randomly. If the coin lands in a ‘WIN’ pocket, that player wins $5000 and the other two players will get $500 each regardless of their score. If however, the coin lands in a ‘LOSE’ pocket, the person who dropped it will only get $500 and the next highest scorer will win whatever
https://en.wikipedia.org/wiki/European%20Association%20for%20Quality%20Assurance%20in%20Higher%20Education
The European Association for Quality Assurance in Higher Education (ENQA), formerly the European Network for Quality Assurance in Higher Education, was established as an organization to represent quality assurance and accreditation organisations from the European Higher Education Area and internationally. Activities In 2003, the Ministers of the Bologna process asked ENQA to elaborate "an agreed set of standards, procedures and guidelines" for higher education. The resulting European Standards and Guidelines for Quality Assurance (ESG) was adopted by the Bologna Process Ministers in 2005 and was revised in 2015. EQAR ENQA worked with the other "E4" agencies, the European University Association (EUA), the European Association of Institutions in Higher Education (EURASHE) and the European Students Union (ESU), to establish the European Quality Assurance Register for Higher Education (EQAR), which makes available a validated list of higher education quality assurance agencies which adhere to the ESG, and reduces the risk of bodies which purport to grant accreditation without rigorous review. EQAR is composed of the founding E4 bodies, government members (any state which is part of the Bologna Process may join) and social partners, and governed by an elected Executive Board. It has a small secretariat and is based in Brussels. Notable affiliations Council for Higher Education Accreditation In 2011, ENQA hosted a seminar jointly with the International Network for Quality Assurance Agencies in Higher Education (INQAAHE). References External links Official ENQA site Education in the European Union Educational institutions established in 2000 College and university associations and consortia in Europe International organizations based in Europe Quality assurance 2000 establishments in Europe Higher education accreditation
https://en.wikipedia.org/wiki/WGTE-FM
WGTE-FM (91.3 MHz) is a public radio station in Toledo, Ohio, and is the radio partner of Channel 30 WGTE-TV, Toledo's PBS network affiliate. It features news, talk, classical music, jazz and folk music. It also airs programs from National Public Radio (NPR) and Public Radio International (PRI). Public Radio FM 91 is simulcast on three other radio stations: WGBE (90.9 FM) in Bryan, Ohio, WGDE (91.9 FM) in Defiance, Ohio and WGLE (90.7 FM) in Lima, Ohio. Several times each year, WGTE-FM does on-air fundraisers to ask for listener support for the radio stations. History On May 2, 1976, WGTE-FM signed on the air. At first, its programming was mostly classical music with six hours of jazz per week and hourly news updates. It also featured NPR's first weekday news program, "All Things Considered." When NPR began "Morning Edition" in 1979, that program was also heard on the weekday schedule. Gradually more news and talk programs from NPR and PRI were added, although unlike most other NPR affiliates, WGTE-FM continues to air a sizable number of classical music programs and some jazz and folk music on weekends. In 1981, WGLE-FM in Lima became the first simulcast station of WGTE-FM. WGBE-FM in Bryan was added in 1996 and WGDE-FM in Defiance signed on in 1999. Repeaters References External links Lima, Ohio GTE-FM Classical music radio stations in the United States NPR member stations 1976 establishments in Ohio Radio stations established in 1976
https://en.wikipedia.org/wiki/Language%20binding
In programming and software design, binding is an application programming interface (API) that provides glue code specifically made to allow a programming language to use a foreign library or operating system service (one that is not native to that language). Characteristics Binding generally refers to a mapping of one thing to another. In the context of software libraries, bindings are wrapper libraries that bridge two programming languages, so that a library written for one language can be used in another language. Many software libraries are written in system programming languages such as C or C++. To use such libraries from another language, usually of higher-level, such as Java, Common Lisp, Scheme, Python, or Lua, a binding to the library must be created in that language, possibly requiring recompiling the language's code, depending on the amount of modification needed. However, most languages offer a foreign function interface, such as Python's and OCaml's ctypes, and Embeddable Common Lisp's cffi and uffi. For example, Python bindings are used when an extant C library, written for some purpose, is to be used from Python. Another example is libsvn which is written in C to provide an API to access the Subversion software repository. To access Subversion from within Java code, libsvnjavahl can be used, which depends on libsvn being installed and acts as a bridge between the language Java and libsvn, thus providing an API that invokes functions from libsvn to do the work. Major motives to create library bindings include software reuse, to reduce reimplementing a library in several languages, and the difficulty of implementing some algorithms efficiently in some high-level languages. Runtime environment Object models Common Object Request Broker Architecture (CORBA) – cross-platform-language model Component Object Model (COM) – Microsoft Windows only cross-language model Distributed Component Object Model (DCOM) – extension enabling COM to work over networks Cross Platform Component Object Model (XPCOM) – Mozilla applications cross-platform model Common Language Infrastructure – .NET Framework cross-platform-language model Freedesktop.org D-Bus – open cross-platform-language model Virtual machines Comparison of application virtual machines Porting Portable object – cross-platform-language object model definition See also Application programming interface (API) Application binary interface (ABI) Calling convention Embedded SQL Name mangling Simplified Wrapper and Interface Generator (SWIG) – interface binding generator from many languages to many languages, open-source Wrapper function References External links JTC1/SC22/WG11 - Binding Techniques, an ISO standard for language bindings What is a language binding? Compilers Computer libraries
https://en.wikipedia.org/wiki/Network%20of%20practice
Network of practice (often abbreviated as NoP) is a concept originated by John Seely Brown and Paul Duguid. This concept, related to the work on communities of practice by Jean Lave and Etienne Wenger, refers to the overall set of various types of informal, emergent social networks that facilitate information exchange between individuals with practice-related goals. In other words, networks of practice range from communities of practice, where learning occurs, to electronic networks of practice (often referred to as virtual or electronic communities). Basic concepts To further define the concept, firstly the term network implies a set of individuals who are connected through social relationships, whether they be strong or weak. Terms such as community tend to denote a stronger form of relationship, but networks refer to all networks of social relationships, be they weak or strong. Second, the term practice represents the substrate that connects individuals in their networks. The principal ideas are that practice implies the actions of individuals and groups when conducting their work, e.g., the practice of software engineers, journalists, educators, etc., and that practice involves interaction among individuals. What distinguishes a network of practice from other networks is that the primary reason for the emergence of relationships within a network of practice is that individuals interact through information exchange in order to perform their work, asking for and sharing knowledge with each other. A network of practice can be distinguished from other networks that emerge due to other factors, such as interests in common hobbies or discussing sports while taking the same bus to work, etc. Finally, practice need not necessarily be restricted to include those within one occupation or functional discipline. Rather it may include individuals from a variety of occupations; thus, the term, practice, is more appropriate than others such as occupation. As indicated above, networks of practice incorporate a range of informal, emergent networks, from communities of practice to electronic networks of practice. Following Lave and Wenger's original work (1991), Brown and Duguid proposed that communities of practice are a localized and specialized subset of networks of practice, typically consisting of strong ties linking individuals engaged in a shared practice who typically interact in face-to-face situations. At the opposite end of the spectrum are electronic networks of practice, which are often referred to as virtual or electronic communities and consist of weak ties. In electronic networks of practice, individuals may never get to know one another or meet face-to-face, and they generally coordinate through means such as blogs, electronic mailing lists, or bulletin boards. Distinguishing from formal workgroups such as project teams In contrast to the use of formal controls to support knowledge exchange often used in formal workgroups, such as contract
https://en.wikipedia.org/wiki/Aluminium%20oxide%20%28data%20page%29
This page provides supplementary chemical data on aluminium oxide. Material Safety Data Sheet SIRI Science Stuff Structure and properties Thermodynamic properties Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/Ghost%20in%20the%20Shell%3A%20Stand%20Alone%20Complex%20%282005%20video%20game%29
Ghost in the Shell: Stand Alone Complex, released in Japan as , is a first-person shooter video game based on the cyberpunk anime series Ghost in the Shell: Stand Alone Complex and a sequel to the first Ghost in the Shell: Stand Alone Complex game of the same title, developed by G-Artists and published for the PlayStation Portable by Sony Computer Entertainment and Bandai in 2005. It was released in Japan on September 15, 2005, in Europe on October 21, 2005 distributed by Atari Europe, and in North America on October 26, 2005, but releasing it under the same name as the original PS2 game caused confusion and misinterpretation of it as a port. Gameplay Ghost in the Shell features first-person shooter gameplay. Customizable Tachikoma sentient tanks, which can operate independently as AI characters or be ridden inside by players, accompany the player at all times. Playable characters include Motoko Kusanagi, Batou, Togusa, and Saito. All levels can be played by all characters. Aramaki is also available for multiplayer matches. All characters have varying statistics which can affect how a game plays out, for example Batou has more health than other players and Saito holds sniper rifles steadier than others. In addition, Tachikoma robots can act as an AI companion, and players can select from four Tachikoma "characters", balanced, aggressive, intelligent and humorous. Controls are similar to other first person shooter games on the platform, such as Coded Arms and Medal of Honor: Heroes. Plot Dealing with similar concepts to other incarnations of Ghost in the Shell, the game has an original storyline which follows on from and refers to the PlayStation 2 game's plotline. Reception The game received "mixed" reviews according to the review aggregation website Metacritic. Reviewers generally noted flaws in gameplay and graphics. In Japan, Famitsu gave it a score of 30 out of 40. References External links NAMCO BANDAI Games America Inc. page: PSP 2005 video games Cavia (company) games First-person shooters Ghost in the Shell video games PlayStation Portable games PlayStation Portable-only games Spy video games Video game Video games about police officers Video games developed in Japan Video games featuring female protagonists Video game sequels Video games set in 2030 Multiplayer and single-player video games
https://en.wikipedia.org/wiki/Antimony%20trioxide%20%28data%20page%29
This page provides supplementary chemical data on antimony trioxide. Also known as Sb2O3. It has a melting point of 656 °C, and a boiling point of 1550 °C. It is a Cubic Crystal Structure with a density of 5.2G/Cm3 Material Safety Data Sheet MSDS from SIRI Structure and properties Thermodynamic properties Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/Generic%20Framing%20Procedure
Generic Framing Procedure (GFP) is a multiplexing technique defined by ITU-T G.7041. This allows mapping of variable length, higher-layer client signals over a circuit switched transport network like OTN, SDH/SONET or PDH. The client signals can be protocol data unit (PDU) oriented (like IP/PPP or Ethernet media access control) or can be block-code oriented (like Fibre Channel). There are two modes of GFP: Generic Framing Procedure - Framed (GFP-F) and Generic Framing Procedure - Transparent (GFP-T): GFP-F maps each client frame into a single GFP frame. GFP-F is used where the client signal is framed or packetized by the client protocol. GFP-T, on the other hand, allows mapping of multiple 8B/10B block-coded client data streams into an efficient 64B/65B block code for transport within a GFP frame. GFP utilizes a length/HEC-based frame delineation mechanism that is more robust than that used by High-Level Data Link Control (HDLC), which is single octet flag based. There are two types of GFP frames: a GFP client frame and a GFP control frame. A GFP client frame can be further classified as either a client data frame or a client management frame. The former is used to transport client data, while the latter is used to transport point-to-point management information like loss of signal, etc. Client management frames can be differentiated from the client data frames based on the payload type indicator. The GFP control frame currently consists only of a core header field with no payload area. This frame is used to compensate for the gaps between the client signal where the transport medium has a higher capacity than the client signal, and is better known as an idle frame. Frame format A GFP frame consists of: a core headers a payload header an optional extension header a GFP payload an optional payload frame check sequence (FCS). Modes Framed GFP (GFP-F) is optimized for bandwidth efficiency at the expense of latency. It encapsulates complete Ethernet (or other types of) frames with a GFP header. Transparent GFP (GFP-T) is used for low latency transport of block-coded client signals such as Gigabit Ethernet, Fibre Channel, ESCON, FiCON, and Digital Video Broadcast (DVB). In this mode, small groups of 8B/10B symbols are transmitted rather than waiting for a complete frame of data. See also Virtual concatenation Link Capacity Adjustment Scheme External links Download the G.7041 Recommendation Multiplexing Optical Transport Network Synchronous optical networking ITU-T recommendations ITU-T G Series Recommendations
https://en.wikipedia.org/wiki/Arsine%20%28data%20page%29
This page provides supplementary chemical data on arsine. Material Safety Data Sheet SIRI Soxal Structure and properties Thermodynamic properties Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/PowerBook%20500%20series
The PowerBook 500 series (codenamed Blackbird, which it shared with the older Macintosh IIfx) is a range of Apple Macintosh PowerBook portable computers first introduced by Apple Computer with the 540c model on May 16, 1994. It was the first to have stereo speakers, a trackpad, and Ethernet networking built-in. It was the first PowerBook series to use a Motorola 68LC040 CPU (simultaneous with Duo 280) and be upgradeable to the PowerPC architecture via a swap-out CPU daughter card (with the PowerPC and 68040 upgrades for sale), use 9.5-inch Dual Scan passive color/B&W displays, 16-bit stereo sound with stereo speakers, have an expansion bay, PC Card capability, two battery bays (and a ten-minute sleep/clock battery, which allowed for main batteries to be swapped out while in sleep mode), full-size keyboard with F1–F12 function keys, be able to sleep while connected to an external monitor and have a battery contact cover included on the actual batteries. It included a single serial port which could be to connect to a serial printer or a network via Apple's LocalTalk. In another first, it also included an AAUI port for connecting to Ethernet networks. The 500 series was discontinued completely with the introduction of the ill-fated PowerBook 5300. The PowerBook 190 was the de facto successor to the 500 and continued the only 68LC040 processor offering as the low end of the PowerPC-based PowerBook family. In a survey taken in November 2000, Insanely Great Macintosh ranked the 540c No. 2 on its list of the all-time best PowerBook models made. History The PowerBook 500 series was introduced on May 16, 1994, with the high-end active matrix LCD PowerBook 540c and 540, with the passive matrix 520c and 520 soon after. One of its marketing highlights was the promise of a PowerPC upgrade to its CPU and PC Card (PCMCIA) expansion. The introduction of this model came at the time of Apple's changeover to the new PowerPC chip from the 68k line of CPUs, and Apple's advertising and promise of the PowerPC was the cause of headaches to the company. The strong demand for its ground-breaking design and Apple's incorrect market prediction that customers would wait for the fully PowerPC PowerBooks resulted in shortages early on. In August 1995 the 540 was dropped from the line, 8 MB of additional memory and the modem was offered installed from the factory, hard drive capacity was increased (from 160 and 240 to 320 and 500 MB), and the installed system upped from System 7.1.1 to 7.5. The PC Card Cage was also released, allowing Macintosh users to add PCMCIA capability to their laptops for the first time. In 1995 Apple Japan introduced an updated version, called the 550c, with a bigger display (10.4 inches), CPU with FPU (68040), bigger hard drive, and Japanese keyboard with black case. It was only sold in Japan and never received FCC certification. With delays for the new PowerPC PowerBook 5300, demand for the PPC upgrade mounted, and Newer Technology began to mar
https://en.wikipedia.org/wiki/Arush%20Entertainment
Arush Entertainment was a video game publisher and developer based in Scottsdale, Arizona, United States. It published interactive entertainment software for personal computers and advanced entertainment consoles. As a division of World Entertainment Broadcasting Corporation (Web Corp.,) Arush published PC and console video games for sale in retail outlets and on the Internet. In 2005, the company was bought by HIP Interactive, who eventually went bankrupt. The assets of Arush and HIP were held by a bankruptcy company. Scott Miller of 3D Realms at the time, attempted to acquire the rights to Duke Nukem: Manhattan Project, but was not successful. The current status of Arush's rights are unknown. Published games PC Devastation Duke Nukem: Manhattan Project Emergency 2 Fear Factor: Unleashed Feeding Chloe Hunting Unlimited Hunting Unlimited 2 Hunting Unlimited 3 Monkey Brains Playboy: The Mansion Primal Prey RC Daredevil PlayStation 2 Fear Factor: Unleashed Playboy: The Mansion Xbox Fear Factor: Unleashed Playboy: The Mansion Developed games PC Devastation Real Pool 2 References External links IGN.com – company profile Arush Entertainment at UVL Defunct companies based in Arizona Companies based in Scottsdale, Arizona Defunct video game companies of the United States Video game development companies Video game publishers
https://en.wikipedia.org/wiki/Empirical%20modelling
Empirical modelling refers to any kind of (computer) modelling based on empirical observations rather than on mathematically describable relationships of the system modelled. Empirical Modelling Empirical Modelling as a variety of empirical modelling Empirical modelling is a generic term for activities that create models by observation and experiment. Empirical Modelling (with the initial letters capitalised, and often abbreviated to EM) refers to a specific variety of empirical modelling in which models are constructed following particular principles. Though the extent to which these principles can be applied to model-building without computers is an interesting issue (to be revisited below), there are at least two good reasons to consider Empirical Modelling in the first instance as computer-based. Without doubt, computer technologies have had a transformative impact where the full exploitation of Empirical Modelling principles is concerned. What is more, the conception of Empirical Modelling has been closely associated with thinking about the role of the computer in model-building. An empirical model operates on a simple semantic principle: the maker observes a close correspondence between the behaviour of the model and that of its referent. The crafting of this correspondence can be 'empirical' in a wide variety of senses: it may entail a trial-and-error process, may be based on computational approximation to analytic formulae, it may be derived as a black-box relation that affords no insight into 'why it works'. Empirical Modelling is rooted on the key principle of William James's radical empiricism, which postulates that all knowing is rooted in connections that are given-in-experience. Empirical Modelling aspires to craft the correspondence between the model and its referent in such a way that its derivation can be traced to connections given-in-experience. Making connections in experience is an essentially individual human activity that requires skill and is highly context-dependent. Examples of such connections include: identifying familiar objects in the stream of thought, associating natural languages words with objects to which they refer, and subliminally interpreting the rows and columns of a spreadsheet as exam results of particular students in particular subjects. Principles In Empirical Modelling, the process of construction is an incremental one in which the intermediate products are artefacts that evoke aspects of the intended (and sometimes emerging) referent through live interaction and observation. The connections evoked in this way have distinctive qualities: they are of their essence personal and experiential in character and are provisional in so far as they may be undermined, refined and reinforced as the model builder's experience and understanding of the referent develops. Following a precedent established by David Gooding in his account of the role that artefacts played in Michael Faraday's experimental investi
https://en.wikipedia.org/wiki/FDX
FDX may refer to: FedEx Corporation, original FDX Corporation, American logistics services company FedEx Express, the ICAO code FDX, American cargo airline Computing: FDX, an expansion pack for the 1980s Memotech MTX computer .fdx, the filename extension for Final Draft files Fetch-decode-execute cycle, or FDX, basic operation cycle of a computer Fast Data eXchange, a proprietary communication protocol used on boats Telecommunications: Full-duplex, communication circuit
https://en.wikipedia.org/wiki/Weighting
The process of weighting involves emphasizing the contribution of particular aspects of a phenomenon (or of a set of data) over others to an outcome or result; thereby highlighting those aspects in comparison to others in the analysis. That is, rather than each variable in the data set contributing equally to the final result, some of the data is adjusted to make a greater contribution than others. This is analogous to the practice of adding (extra) weight to one side of a pair of scales in order to favour either the buyer or seller. While weighting may be applied to a set of data, such as epidemiological data, it is more commonly applied to measurements of light, heat, sound, gamma radiation, and in fact any stimulus that is spread over a spectrum of frequencies. Weighting and loudness In the measurement of loudness, for example, a weighting filter is commonly used to emphasise frequencies around 3 to 6 kHz where the human ear is most sensitive, while attenuating very high and very low frequencies to which the ear is insensitive. A commonly used weighting is the A-weighting curve, which results in units of dBA sound pressure level. Because the frequency response of human hearing varies with loudness, the A-weighting curve is correct only at a level of 40-phon and other curves known as B-, C- and D-weighting are also used, the latter being particularly intended for the measurement of aircraft noise. Weighting in audio measurement In broadcasting and audio equipment measurements 468-weighting is the preferred weighting to use because it was specifically devised to allow subjectively valid measurements on noise, rather than pure tones. It is often not realised that equal loudness curves, and hence A-weighting, really apply only to tones, as tests with noise bands show increased sensitivity in the 5 to 7 kHz region on noise compared to tones. Other weighting curves are used in rumble measurement and flutter measurement to properly assess subjective effect. In each field of measurement, special units are used to indicate a weighted measurement as opposed to a basic physical measurement of energy level. For sound, the unit is the phon (1 kHz equivalent level). In the fields of acoustics and audio engineering, it is common to use a standard curve referred to as A-weighting, one of a set that are said to be derived from equal-loudness contours. Weighting and gamma rays In the measurement of gamma rays or other ionising radiation, a radiation monitor or dosimeter will commonly use a filter to attenuate those energy levels or wavelengths that cause the least damage to the human body but letting through those that do the most damage, so any source of radiation may be measured in terms of its true danger rather than just its strength. The resulting unit is the sievert or microsievert. Weighting and television colour components Another use of weighting is in television, in which the red, green and blue components of the signal are weighted accord
https://en.wikipedia.org/wiki/Valiant%E2%80%93Vazirani%20theorem
The Valiant–Vazirani theorem is a theorem in computational complexity theory stating that if there is a polynomial time algorithm for Unambiguous-SAT, then NP = RP. It was proven by Leslie Valiant and Vijay Vazirani in their paper titled NP is as easy as detecting unique solutions published in 1986. The proof is based on the Mulmuley–Vazirani–Vazirani isolation lemma, which was subsequently used for a number of important applications in theoretical computer science. The Valiant–Vazirani theorem implies that the Boolean satisfiability problem, which is NP-complete, remains a computationally hard problem even if the input instances are promised to have at most one satisfying assignment. Proof outline Unambiguous-SAT is the promise problem of deciding whether a given Boolean formula that has at most one satisfying assignment is unsatisfiable or has exactly one satisfying assignment. In the first case, an algorithm for Unambiguous-SAT should reject, and in the second it should accept the formula. If the formula has more than one satisfying assignment, then there is no condition on the behavior of the algorithm. The promise problem Unambiguous-SAT can be decided by a nondeterministic Turing machine that has at most one accepting computation path. In this sense, this promise problem belongs to the complexity class UP (which is usually only defined for languages). The proof of the Valiant–Vazirani theorem consists of a probabilistic reduction from SAT to SAT such that, with probability at least , the output formula has at most one satisfying assignment, and thus satisfies the promise of the Unambiguous-SAT problem. More precisely, the reduction is a randomized polynomial-time algorithm that maps a Boolean formula with variables to a Boolean formula such that every satisfying assignment of also satisfies , and if is satisfiable, then, with probability at least , has a unique satisfying assignment . By running the reduction a polynomial number of times, each time with fresh independent random bits, we get formulas . Choosing , we get that the probability that at least one formula is uniquely satisfiable is at least if is satisfiable. This gives a Turing reduction from SAT to Unambiguous-SAT since an assumed algorithm for Unambiguous-SAT can be invoked on the . Then the self-reducibility of SAT can be used to compute a satisfying assignment, should it exist. Overall, this proves that NP = RP if Unambiguous-SAT can be solved in RP. The idea of the reduction is to intersect the solution space of the formula with random affine hyperplanes over , where is chosen uniformly at random. An alternative proof is based on the isolation lemma by Mulmuley, Vazirani, and Vazirani. They consider a more general setting, and applied to the setting here this gives an isolation probability of only . References Structural complexity theory Theorems in computational complexity theory
https://en.wikipedia.org/wiki/Inside%20Entertainment
Inside Entertainment was a Canadian entertainment news program. The show was produced in Calgary, Alberta and aired on the Global and CH networks throughout Canada. It no longer airs as of 2006. The show was hosted by Calgary-based Su-Ling Goh. Entertainment news shows in Canada
https://en.wikipedia.org/wiki/European%20Network%20of%20Information%20Centres
The European Network of Information Centres (ENIC) were established in 1994 as a joint initiative of UNESCO and the Council of Europe. They are intended to implement the Lisbon recognition convention (LRC) and, in general, to develop policy and practice for the recognition of qualifications. The ENIC Network works closely with the NARIC network of the European Union. ENIC legally complies with Article X.1(b) and X.3 of the LRC. Network and members The network is made up of several countries, where each country represents a party, and each party appoints a National information Centre as a member of the ENIC Network. In this sense, each country or a member holds one vote. There is an annual meeting where all the members meet. ENIC also elects three official representatives to the ENIC Bureau (EB) for a two-year mandate. There are a total of 54 members; ENIC usually offers the following information for its members: National Information Centres National education bodies System of education University education Quality Assurance in Higher Education Post-secondary non-university education Recognised higher education institutions Policies and procedures for the recognition of qualifications Recognition of Qualifications held by Refugees Qualifications Framework Diploma Supplement Information Access to higher education Verification sources References See also NARIC Academia in Europe Educational organizations based in Europe Higher education accreditation Higher education organisations based in Europe
https://en.wikipedia.org/wiki/GiST
In computing, GiST or Generalized Search Tree, is a data structure and API that can be used to build a variety of disk-based search trees. GiST is a generalization of the B+ tree, providing a concurrent and recoverable height-balanced search tree infrastructure without making any assumptions about the type of data being stored, or the queries being serviced. GiST can be used to easily implement a range of well-known indexes, including B+ trees, R-trees, hB-trees, RD-trees, and many others; it also allows for easy development of specialized indexes for new data types. It cannot be used directly to implement non-height-balanced trees such as quad trees or prefix trees (tries), though like prefix trees it does support compression, including lossy compression. GiST can be used for any data type that can be naturally ordered into a hierarchy of supersets. Not only is it extensible in terms of data type support and tree layout, it allows the extension writer to support any query predicates that they choose. GiST is an example of software extensibility in the context of database systems: it allows the easy evolution of a database system to support new tree-based indexes. It achieves this by factoring out its core system infrastructure from a narrow API that is sufficient to capture the application-specific aspects of a wide variety of index designs. The GiST infrastructure code manages the layout of the index pages on disk, the algorithms for searching indexes and deleting from indexes, and complex transactional details such as page-level locking for high concurrency and write-ahead logging for crash recovery. This allows authors of new tree-based indexes to focus on implementing the novel features of the new index type — for example, the way in which subsets of the data should be described for search — without becoming experts in database system internals. Although originally designed for answering Boolean selection queries, GiST can also support nearest-neighbor search, and various forms of statistical approximation over large data sets. Implementations The most widely used GiST implementation is in the PostgreSQL relational database; it was also implemented in the Informix Universal Server, and as a standalone library, libgist. PostgreSQL The PostgreSQL GiST implementation includes support for variable length keys, composite keys, concurrency control and recovery; these features are inherited by all GiST extensions. There are several contributed modules developed using GiST and distributed with PostgreSQL. For example: rtree_gist, btree_gist - GiST implementation of R-tree and B-tree intarray - index support for one-dimensional array of int4's tsearch2 - a searchable (full text) data type with indexed access ltree - data types, indexed access methods and queries for data organized as a tree-like structures hstore - a storage for (key,value) data cube - data type, representing multidimensional cubes The PostgreSQL GiST implementation
https://en.wikipedia.org/wiki/Mobile%20daughter%20card
The mobile daughter card, also known as an MDC or CDC (communications daughter card), is a notebook version of the AMR slot on the motherboard of a desktop computer. It is designed to interface with special Ethernet (EDC), modem (MDC) or bluetooth (BDC) cards. Intel MDC specification 1.0 In 1999, Intel published a specification for mobile audio/modem daughter cards. The document defines a standard connector (AMP* 3-179397-0), mechanical elements including several form factors, and electrical interface. The 30-pin connector carries power, several audio channels and AC-Link serial data. Up to two AC'97 codecs are supported on such a card. Several form factors are specified: 45 × 27 mm 45 × 37 mm 55 × 27 mm with RJ11 jack 55 × 37 mm with RJ11 jack 45 × 55 mm 45 × 70 mm 30-pin AMP* 3-179397-0 pinout See also Daughter board External links intel.com – MDC specification.pdf Mobile computers Motherboard expansion slot
https://en.wikipedia.org/wiki/Warpath
Warpath may refer to: Great Indian Warpath, a network of trails in eastern North America used by Native Americans Games Warpath (video game), a 2006 FPS video game by Digital Extremes for the PC and Xbox Warpath: Jurassic Park, a 1999 video game that accompanies the Jurassic Park movies Warpath, a tabletop miniature game by Mantic Games Warpath, a 1994 space video game by Synthetic Reality for PC Other Warpath (comics), a mutant superhero in Marvel Comics Warpath (film), a 1951 Cavalry Western film directed by Byron Haskin Warpath (Boris album) Warpath (Six Feet Under album) Warpath, a 2006 novel by David Mack that is part of the Star Trek: Deep Space Nine relaunch series of novels Warpath, the name of several characters in the Transformers media franchise See also
https://en.wikipedia.org/wiki/Shlomi%20Dolev
Shlomi Dolev (; born December 5, 1958) is a Rita Altura Trust Chair Professor in Computer Science at Ben-Gurion University of the Negev (BGU) and the head of the BGU Negev Hi-Tech Faculty Startup Accelerator. Biography Shlomi Dolev received B.Sc. in Civil Engineering and B.A. in Computer Science in 1984 and 1985, and his M.Sc. and D.Sc. in computer science in 1990 and 1992 from the Technion Israel Institute of Technology. From 1992 to 1995 he was at Texas A&M University as a visiting research specialist. Academic career In 1995 Dolev joined the Department of Mathematics and Computer Science at BGU. He was the founder and first department head of the Computer Science Department, established in 2000. After 15 years, the department was ranked among the first 150 best departments in the world. He is the author of Self-Stabilization published by MIT Press in 2000. From 2011 to 2014, Dolev served as Dean of the Natural Sciences Faculty. From 2010 he has served for six years, as the Head of the Inter University Computation Center of Israel. He is a co-founder, board member and CSO of Secret Double Octopus. He is also a co-founder of Secret Sky (SecretSkyDB) Ltd. In 2015 Dolev was appointed head of the steering committee on computer science studies of the Israeli Ministry of Education. Dolev together with Yuval Elovici and Ehud Gudes established the Telekom Innovation Laboratories at Ben-Gurion University. Dolev was instrumental in establishing the IBM Cyber Security Center of Excellence (CCoE) in Collaboration with Ben-Gurion University of the Negev, and JVP Cyber Labs. Several agencies and companies support his research including ISF, NSF, IBM (faculty awards), Verisign, EMC, Intel, Orange France, Deutsche Telekom, US Airforce and the European Union in the sum of several millions of dollars. Dolev was a visiting professor at MIT, Paris 11, Paris 6 and DIMACS. He served in more than a hundred program committees, chairing two leading conferences in distributed computing, DISC 2006, and PODC 2014. Recently Prof. Dolev established and chaired the International Symposium on Cyber Security Cryptography and Machine Learning. Dolev serves as an Associate Editor of the IEEE Transactions on Computers and PeerJ. Dolev became a fellow of the European Alliance for Innovation in 2019, (EAI), and in 2020 became IEEE fellow. Research work Dolev turned a workshop on self-stabilization (Austin, 1989) into a series of events on the subject. Dolev's MA thesis, under the supervision of Shlomo Moran and Amos Israeli resulted in the most cited paper on self-stabilization, following the pioneering paper of Dijkstra introducing the concept of fair composition of self-stabilizing systems. Dolev's contribution to the investigation of self-stabilization spans several decades of research and publications, including research on randomized self-stabilizing algorithms, He has researched Super Stabilizing algorithms that react gracefully to dynamic changes while preserving
https://en.wikipedia.org/wiki/Callboard%20Network
The Callboard Network was an electronic communication network operated by the University of Alberta for USITT in the late 1980s and early 1990s. Its purpose was to provide a means by which USITT members around the world, but primarily in the US and Canada, could easily communicate amongst each other. As the internet expanded rapidly during this period, it rapidly became obsolete but was an invaluable early resource for the members of the organization. One notable event which occurred on this network was the creation of the MIDI Show Control standard between January and August 1990. This was done using the 'MIDI Forum' which was set up by Charlie Richmond. Several dozen participants from around the world logged in using a variety of means, including dialing long distance. The unique feature of this group of developers was that they never once met to discuss the evolving standard in person. It has been suggested that this was the first international standard that was created 100% virtually and is notable for that reason. Telecommunications infrastructure
https://en.wikipedia.org/wiki/Bell%27s%20law%20of%20computer%20classes
Bell's law of computer classes formulated by Gordon Bell in 1972 describes how types of computing systems (referred to as computer classes) form, evolve and may eventually die out. New classes of computers create new applications resulting in new markets and new industries. Description Bell considers the law to be partially a corollary to Moore's law which states "the number of transistors per chip double every 18 months". Unlike Moore's law, a new computer class is usually based on lower cost components that have fewer transistors or less bits on a magnetic surface, etc. A new class forms about every decade. It also takes up to a decade to understand how the class formed, evolved, and is likely to continue. Once formed, a lower priced class may evolve in performance to take over and disrupt an existing class. This evolution has caused clusters of scalable personal computers with 1 to thousands of computers to span a price and performance range of use from a PC, through mainframes, to become the largest supercomputers of the day. Scalable clusters became a universal class beginning in the mid-1990s; by 2010, clusters of at least one million independent computers will constitute the world's largest cluster. Definition: Roughly every decade a new, lower priced computer class forms based on a new programming platform, network, and interface resulting in new usage and the establishment of a new industry. Established market class computers aka platforms are introduced and continue to evolve at roughly a constant price (subject to learning curve cost reduction) with increasing functionality (or performance) based on Moore's law that gives more transistors per chip, more bits per unit area, or increased functionality per system. Roughly every decade, technology advances in semiconductors, storage, networks, and interfaces enable the emergence of a new, lower-cost computer class (aka "platform") to serve a new need that is enabled by smaller devices (e.g. more transistors per chip, less expensive storage, displays, i/o, network, and unique interface to people or some other information processing sink or source). Each new lower-priced class is then established and maintained as a quasi-independent industry and market. Such a class is likely to evolve to substitute for an existing class or classes as described above with computer clusters. Computer classes that conform to the law mainframes (1960s) minicomputers (1970s) personal computers and workstations evolving into a network enabled by Local Area Networking or Ethernet (1980s) web browser client-server structures enabled by the Internet (1990s) cloud computing, e.g., Amazon Web Services (2006) or Microsoft Azure (2012) hand held devices from media players and cell phones to tablets, e.g., Creative, iPods, BlackBerrys, iPhones, Smartphones, Kindles, iPads (c. 2000–2010) Wireless sensor networks (WSNs) that enable sensor and actuator interconnection, enabling the evolving Internet of Things.
https://en.wikipedia.org/wiki/List%20of%20Wellington%20railway%20stations
This page lists all railway stations in Wellington, New Zealand that are or were on Wellington's suburban passenger rail network. Ownership of all station buildings except Wellington was transferred to Greater Wellington Regional Council on 1 July 2011. Wellington Station is owned by KiwiRail, along with all station platforms and other railway network infrastructure. All stations have platforms, the majority of which were designed to accommodate 9-car DM/D EMUs. Exceptions to this include the Wairarapa stations, which have platforms long enough for either 3 or 7 car sets of SW-class carriages; and those on the Johnsonville Line, which have platforms designed for 6-car Matangi sets. Most stations in the suburban network have been upgraded to accommodate the "Matangi" electric units which were introduced from 2010. The train services are run by Transdev Wellington. Maps Schematic map Geographic map List Current stations Former stations Notes Stations Parkside until 1964. Never used for passenger traffic. Renamed Manor Park when the Hutt Valley Branch became the main line. Demolished in 1938. Was known as Dolly Varden (after a ship) until 1960 when local pressure resulted in the area being renamed Mana. With the closure of the Western Hutt section of the Wairarapa Line and the formation of the Melling Branch from the remainder, Melling station was relocated to the south side of the Melling Link road. Replaced by Andrews, to the south. Originally Pukerua. Thought to have been reopened during WW II to serve the nearby hospital. On or near the site of the Silver Stream Railway's McKirdy station. Near Mackays Crossing. On closure relocated and later named Lambton. Originally Lower Hutt. Dates A date with a question mark means the date is from an ambiguous source or sources. – in the Closed column means the station is still open. ? without a date means that the date is not known, but the station has definitely been opened/closed. Proposals The GWRC 2009 Long Term Community Plan (LTCCP) indicates that it is considering introducing user-pays charges to some station carparks where demand exceeds supply. Some stations are being considered for expanded parking facilities where sufficient demand exists and suitable land is available, but necessary station upgrades to accommodate new rolling stock have constrained the amount of funding that can be committed to projects like improved Park-and-Ride facilities. There are several proposals for new stations to be built along existing lines. Kapiti Line GWRC's Western Corridor Plan calls for improvements to rail services in the Kapiti area, including two new stations: Raumati, proposed for completion in 2009, south of Paraparaumu, probably just north of the intersection of State Highway 1 and Poplar Avenue; and Lindale, proposed for completion in 2010, would be part of a larger transport hub north of Paraparaumu. However, a more recent decision by the council to invest its funds and resources in electr
https://en.wikipedia.org/wiki/Bay%20Area%20Open%20Space%20Council
The Bay Area Open Space Council was a network of 65 nonprofits and public agencies San Francisco Bay Area founded in 1990 by a group of land conservation practitioners to provide information, tools, and connections for its members. Though the Open Space Council's office was located in Berkeley, California, member organizations represented all nine counties of the San Francisco Bay Area plus Santa Cruz County. In March 2020, a group of member organizations of the Open Space Council launched Together Bay Area to replace the former organization. Programs Conservation Lands Network One of the Open Space Council's projects was the Conservation Lands Network, a vision for the region's efforts to preserve biodiversity. Part of a five-year science-based study by over 125 organizations and individuals, the project was tasked to identify the most essential lands needed to sustain the natural infrastructure of the region. The Conservation Land Network studied over and over 1,000 variables, such as redwood forests and California red legged frog habitats. Along with the Subtidal Habitat Goals Project and the Baylands Ecosystem Goals Project, this project is part of a science-based, regional approach to protecting biodiversity of the Bay Area. Protected Areas Database The Council collaborated with Greeninfo Network to develop a GIS database of protected areas in the nine county San Francisco Bay Area called the Bay Area Protected Lands Database (BPAD). In 2010, Santa Cruz County was included for the first time, adding a tenth county to the nine Bay Area counties. Native American Partnerships The film Here and Now], produced by the Open Space Council with help from the Christensen Fund, Midpeninsula Regional Open Space District, and The Trust for Public Land, is a short film that combines social justice, land conservation, human history, and scientific knowledge to tell the story of four partnerships between Native Americans and land conservation organizations. Outdoor Voice The Open Space Council is building a constituency for land conservation by engaging Bay Area park users in ways to get involved. The program Outdoor Voice is regional throughout all ten Bay Area counties, focusing on action, targeting Bay Area park users, and leveraging social media. External links Together Bay Area References Parks in the San Francisco Bay Area Organizations based in the San Francisco Bay Area
https://en.wikipedia.org/wiki/Transderivational%20search
Transderivational search (often abbreviated to TDS) is a psychological and cybernetics term, meaning when a search is being conducted for a fuzzy match across a broad field. In computing the equivalent function can be performed using content-addressable memory. Unlike usual searches, which look for literal (i.e. exact, logical, or regular expression) matches, a transderivational search is a search for a possible meaning or possible match as part of communication, and without which an incoming communication cannot be made any sense of whatsoever. It is thus an integral part of processing language, and of attaching meaning to communication. A psychological example of TDS is in Ericksonian hypnotherapy, where vague suggestions are used that the patient must process intensely in order to find their own meanings, thus ensuring that the practitioner does not intrude his own beliefs into the subject's inner world. TDS in human communication and processing Because TDS is a compelling, automatic and unconscious state of internal focus and processing (i.e. a type of everyday trance state), and often a state of internal lack of certainty, or openness to finding an answer (since something is being checked out at that moment), it can be utilized or interrupted, in order to create, or deepen, trance. TDS is a fundamental part of human language and cognitive processing. Arguably, every word or utterance a person hears, for example, and everything they see or feel and take note of, results in a very brief trance while TDS is carried out to establish a contextual meaning for it. Examples Leading statements: "And those thoughts you had yesterday..." the human mind cannot process hearing this phrase, without at some level searching internally for some thoughts or other that it had yesterday, to make the subject of the sentence. "The many colors that fruit can be" likewise starts the human mind considering even if briefly, different fruit sorted by color. "You did it again, didn't you!" This everyday manipulative use of TDS usually sends the recipient looking internally for some "it" they may have done for which blame is being fairly given. Regardless of whether such a matter can be identified, guilt or anger may result. "There has been pain, hasn't there" the mind of a patient suffering an illness will find it very hard or impossible to hear or answer this sentence without conducting internal searches to verify whether this is true or not, or to find an example if so. "You'd forgotten something [or: some part of your body], hadn't you?" the mind usually checks through the various things, or parts of the body, on hearing this, seeing if each in turn has been forgotten. Textual ambiguity: "Do you remember line dancing on the steps?" Without sufficient context, some statements may trigger TDS in order to resolve inherent ambiguity in the interpretation of a posed question. Do I remember a bygone fad called "line dancing on the steps"? Do I remember perso
https://en.wikipedia.org/wiki/Information%20privacy%20law
Information privacy, data privacy or data protection laws provide a legal framework on how to obtain, use and store data of natural persons. The various laws around the world describe the rights of natural persons to control who is using its data. This includes usually the right to get details on which data is stored, for what purpose and to request the deletion in case the purpose is not given anymore. Over 80 countries and independent territories, including nearly every country in Europe and many in Latin America and the Caribbean, Asia, and Africa, have now adopted comprehensive data protection laws. The European Union has the General Data Protection Regulation (GDPR), in force since May 25, 2018. The United States is notable for not having adopted a comprehensive information privacy law, but rather having adopted limited sectoral laws in some areas like the California Consumer Privacy Act (CCPA). By Jurisdiction The German state of Hessia enacted the World's first data privacy law on 30SEP1970. In Germany the term informational self-determination was first used in the context of a German constitutional ruling relating to personal information collected during the 1983 census. Asia India India passed its Digital Personal Data Protection Act, 2023 in August 2023. China China passed its Personal Information Protection Law (PIPL) in mid-2021, and was effective from November 1, 2021. It focuses heavily on consent, rights of the individual, and transparency of data processing. PIPL has been compared to the EU GDPR as it has similar scope and many similar provisions. Philippines In the Philippines, The Data Privacy Act of 2012 mandated the creation of the National Privacy Commission that would monitor and maintain policies that involve information privacy and personal data protection in the country. Modeled after the EU Data Protection Directive and the Asia-Pacific Economic Cooperation (APEC) Privacy Framework, the independent body would ensure compliance of the country with international standards set for data protection. The law requires government and private organizations composed of at least 250 employees or those which have access to the personal and identifiable information of at least 1000 people to appoint a Data Protection Officer that would assist in regulating the management of personal information in such entities. In summary, the law identifies important points regarding the handling of personal information as follows: Personal information must be collected for reasons that are specified, legitimate, and reasonable. Personal information must be handled properly. Information must be kept accurate and relevant, used only for the stated purposes, and retained only for as long as reasonably needed. The law required entities to be active in ensuring that unauthorized parties do not have access to their customers' information. Personal information must be disposed in way that unauthorized third parties could not access the disca
https://en.wikipedia.org/wiki/Virtual%20cinematography
Virtual cinematography is the set of cinematographic techniques performed in a computer graphics environment. It includes a wide variety of subjects like photographing real objects, often with stereo or multi-camera setup, for the purpose of recreating them as three-dimensional objects and algorithms for the automated creation of real and simulated camera angles. Virtual cinematography can be used to shoot scenes from otherwise impossible camera angles, create the photography of animated films, and manipulate the appearance of computer-generated effects. History Early stages An early example of a film integrating a virtual environment is the 1998 film, What Dreams May Come, starring Robin Williams. The film's special effects team used actual building blueprints to generate scale wireframe models that were then used to generate the virtual world. The film went on to garner numerous nominations and awards including the Academy Award for Best Visual Effects and the Art Directors Guild Award for Excellence in Production Design. The term "virtual cinematography" emerged in 1999 when special effects artist John Gaeta and his team wanted to name the new cinematic technologies they had created. Modern virtual cinematography The Matrix trilogy (The Matrix, The Matrix Reloaded, and The Matrix Revolutions) used early Virtual Cinematography techniques to develop virtual "filming" of realistic computer-generated imagery. The result of John Gaeta and his crew at ESC Entertainment's work was the creation of photo-realistic CGI versions of the performers, sets, and actions. Their work was based on Paul Debevec et al.'s findings on the acquisition and subsequent simulation of the reflectance field over the human face acquired using the simplest of light stages in 2000. Famous scenes that would have been impossible or exceedingly time-consuming to produce within the context of traditional cinematography include the burly brawl in The Matrix Reloaded (2003) where Neo fights up-to-100 Agent Smiths and the beginning of the final showdown in The Matrix Revolutions (2003), where Agent Smith's cheekbone gets punched in by Neo leaving the digital look-alike unharmed. For The Matrix trilogy, the filmmakers relied heavily on virtual cinematography to attract audiences. Bill Pope, the Director of Photography, used this tool in a much more subtle manner. Nonetheless, these scenes still managed to reach a high level of realism and made it difficult for the audience to notice that they were actually watching a shot created entirely by visual effects artists using 3D computer graphics tools. In Spider-Man 2 (2004), the filmmakers manipulated the cameras to make the audience feel as if they were swinging together with Spider-Man through New York City. Using motion capture camera radar, the cameraman moves simultaneously with the displayed animation. This makes the audience experience Spider-Man's perspective and heightens the sense of reality. In Avengers: Infinity War (2
https://en.wikipedia.org/wiki/Atari%20MMU
Atari MMU is a custom memory management unit chip for the Atari 8-bit computers. It enables access to the hardware registers on ANTIC, GTIA, POKEY and 6520 PIA. The later XL/XE MMU (C061618) also selects OS ROM, Atari BASIC ROM, self-test ROM and LEDs in the 1200XL. On the 128K 130XE the EMMU chip handles similar functionality. The user cannot directly manipulate the Atari MMU, but selects the various ROMS and memory via the memory-mapped hardware register known as PORTB (5401710 or D30116). Atari changed PORTB from an input port on the 400/800 machines to an output port on the XL/XE machines, leaving two joystick ports instead of four on the XL/XE machines. By setting and clearing specific bits in PORTB, the user can access either the ROMs or memory locations. No synchronization is required as the OS handles the access. The bit assignments for PORTB on the XL/XE machines are: Note: The 1200XL does not have BASIC built-in. See also Atari FREDDIE References Chadwick, Ian (1985). Mapping the Atari Revised Edition. COMPUTE! Publications, Inc. . External links jindroush site(archived) MMU info INSIGHT: Atari - Compute! Magazine - Talks about Bank Selection in the Atari XL machines. MMU, Atari
https://en.wikipedia.org/wiki/Leslie%20Valiant
Leslie Gabriel Valiant (born 28 March 1949) is a British American computer scientist and computational theorist. He was born to a chemical engineer father and a translator mother. He is currently the T. Jefferson Coolidge Professor of Computer Science and Applied Mathematics at Harvard University. Valiant was awarded the Turing Award in 2010, having been described by the A.C.M. as a heroic figure in theoretical computer science and a role model for his courage and creativity in addressing some of the deepest unsolved problems in science; in particular for his "striking combination of depth and breadth". Education Valiant was educated at King's College, Cambridge, Imperial College London, and the University of Warwick where he received a PhD in computer science in 1974. Research and career Valiant is world-renowned for his work in Theoretical Computer Science. Among his many contributions to Complexity Theory, he introduced the notion of #P-completeness ("Sharp-P completeness") to explain why enumeration and reliability problems are intractable. He created the Probably Approximately Correct or PAC model of learning that introduced the field of Computational Learning Theory and became a theoretical basis for the development of Machine Learning. He also introduced the concept of Holographic Algorithms inspired by the Quantum Computation model. In computer systems, he is most well-known for introducing the Bulk Synchronous Parallel processing model. Analogous to the von Neumann model for a single computer architecture, BSP has been an influential model for parallel and distributed computing architectures. Recent examples are Google adopting it for computation at large scale via MapReduce, MillWheel, Pregel and Dataflow, and Facebook creating a graph analytics system capable of processing over 1 trillion edges. There have also been active open-source projects to add explicit BSP programming as well as other high-performance parallel programming models derived from BSP. Popular examples are Hadoop, Spark, Giraph, Hama, Beam and Dask. His earlier work in Automata Theory includes an algorithm for context-free parsing, which is still the asymptotically fastest known. He also works in Computational Neuroscience focusing on understanding memory and learning. Valiant's 2013 book is Probably Approximately Correct: Nature's Algorithms for Learning and Prospering in a Complex World. In it he argues, among other things, that evolutionary biology does not explain the rate at which evolution occurs, writing, for example, "The evidence for Darwin's general schema for evolution being essentially correct is convincing to the great majority of biologists. This author has been to enough natural history museums to be convinced himself. All this, however, does not mean the current theory of evolution is adequately explanatory. At present the theory of evolution can offer no account of the rate at which evolution progresses to develop complex mechanisms or to mainta
https://en.wikipedia.org/wiki/KTUU-TV
KTUU-TV (channel 2) is a television station in Anchorage, Alaska, United States, affiliated with NBC. It is owned by Gray Television alongside dual CBS/MyNetworkTV affiliate KAUU (channel 5). Both stations share studios on East 40th Avenue in midtown Anchorage, while KTUU-TV's transmitter is located in Knik, Alaska. Some of KTUU-TV's programming is broadcast to rural communities via low-power translators through the Alaska Rural Communications Service (ARCS). History The construction permit for channel 2 in Anchorage was issued on July 29, 1953, to Keith Kiggins and Richard R. Rollins. The permit took the call sign KFIA ("First in Anchorage") and then began construction, with an antenna being placed atop the Westward Hotel at Third Avenue and F Street. The same day the FCC granted a construction permit for channel 2, it also greenlit Anchorage's channel 11, KTVA, sparking a race to be the first broadcast television station in the territory (statehood for Alaska would come in 1959). It appeared that KFIA was ahead when it announced it would broadcast its first test pattern on October 15, as KTVA was unpacking its equipment. However, it failed to put out a picture that night. Two days later, on the 17th, the first television test pattern in Alaska was broadcast, but the station missed its announced November 1 start date. Picture quality control equipment was late getting to Anchorage, pushing back the start date twice. It was only a month and a half later that KFIA made it on the air, on December 14, but in that time, it had lost its claim to be first in Anchorage with programming, as KTVA had signed on December 11. Both stations had also been beat by a cable system in Ketchikan to be the first source of television programming anywhere in the territory. When the station did get on the air, it did so "quietly and without fanfare", in the words of its general manager. Midnight Sun Broadcasting (The Lathrop Company), owned by Alvin Oscar "Al" Bramstedt Sr. bought the station in 1954; the station's call letters were changed to KENI-TV in 1955; that year, it moved into the Fourth Avenue Theatre, also known as the Lathrop Building, downtown. Lathrop sold KENI-AM-TV plus its other radio and TV stations—KTKN in Ketchikan, KFAR-TV (now KATN)/FM in Fairbanks, and KINY-TV (now KJUD)-FM in Juneau—to All-Alaska Broadcasting Company, which later became Midnight Sun Broadcasters in 1960. On September 19, 1966, channel 2 became the first station in Alaska to transmit in color when it aired the premiere episode of the ABC sitcom That Girl (entitled "Don't Just Do Something, Stand There!"). The station had joint primary affiliation with NBC and ABC (with KTVA picking up some of the slack) until October 1, 1967, when it switched to ABC primary and NBC secondary, primarily because ABC had more programs on film. Channel 2 became a full-time ABC affiliate in 1970 when KHAR (channel 13, now KYUR) took the NBC affiliation. The two stations switched networks in Octob
https://en.wikipedia.org/wiki/Eberswalder%20Stra%C3%9Fe%20%28Berlin%20U-Bahn%29
Eberswalder Straße is an overground station located on the line of the Berlin U-Bahn network. It is located in the Prenzlauer Berg area of the city on Schönhauser Allee, a major street running from the city centre north towards Pankow. The station is a raised iron structure on stone columns, designed by architect Alfred Grenander. History The station opened in 1913 as Danziger Straße. It was severely damaged in December 1943 and was also closed during the last months of World War II. The post-war division of Berlin put it in the Russian sector. In 1950 it was renamed Dimitroffstrasse, in honour of Bulgarian communist leader Georgi Dimitrov who had died in the previous year. In 1991, following the reunification of Germany, the station's name was changed in order to remove its political links. The station was named Eberswalder Straße, a street that crosses Schönhauser Allee very nearby. A local landmark below the elevated tracks at the south end of the station is Konnopke's Imbiß, a well-known fast food stand that sells currywurst. Max Konnopke started selling sausages on the same spot in 1930 from a board strapped around his neck. In 1960 he built the hut that served as the food stand until replaced by a new construction in 2011. References U2 (Berlin U-Bahn) stations Buildings and structures in Pankow Railway stations in Germany opened in 1913
https://en.wikipedia.org/wiki/Vijay%20Vazirani
Vijay Virkumar Vazirani (; b. 1957) is an Indian American distinguished professor of computer science in the Donald Bren School of Information and Computer Sciences at the University of California, Irvine. Education and career Vazirani first majored in electrical engineering at Indian Institute of Technology, Delhi but in his second year he transferred to MIT and received his bachelor's degree in computer science from MIT in 1979 and his Ph.D. from the University of California, Berkeley in 1983. His dissertation, Maximum Matchings without Blossoms, was supervised by Manuel Blum. After postdoctoral research with Michael O. Rabin and Leslie Valiant at Harvard University, he joined the faculty at Cornell University in 1984. He moved to the IIT Delhi as a full professor in 1990, and moved again to the Georgia Institute of Technology in 1995. He was also a McKay Visiting Professor at the University of California, Berkeley, and a Distinguished SISL Visitor at the Social and Information Sciences Laboratory at the California Institute of Technology. In 2017 he moved to the University of California, Irvine as distinguished professor. Research Vazirani's research career has been centered around the design of algorithms, together with work on computational complexity theory, cryptography, and algorithmic game theory. During the 1980s, he made seminal contributions to the classical maximum matching problem, and some key contributions to computational complexity theory, e.g., the isolation lemma, the Valiant-Vazirani theorem, and the equivalence between random generation and approximate counting. During the 1990s he worked mostly on approximation algorithms, championing the primal-dual schema, which he applied to problems arising in network design, facility location and web caching, and clustering. In July 2001 he published what is widely regarded as the definitive book on approximation algorithms (Springer-Verlag, Berlin). Since 2002, he has been at the forefront of the effort to understand the computability of market equilibria, with an extensive body of work on the topic. His research results also include proving, along with Leslie Valiant, that if UNIQUE-SAT is in P, then NP = RP (Valiant–Vazirani theorem), and obtaining in 1980, along with Silvio Micali, an algorithm for finding maximum matchings in general graphs; the latter is still the most efficient known algorithm for the problem. With Mehta, Saberi, and Umesh Vazirani, he showed in 2007 how to formulate the problem of choosing advertisements for AdWords as an online matching problem, and found a solution to this problem with optimal competitive ratio. Awards and honors In 2005 both Vazirani and his brother Umesh Vazirani (also a theoretical computer scientist, at the University of California, Berkeley) were inducted as Fellows of the Association for Computing Machinery. In 2011, he was awarded a Guggenheim Fellowship. In 2022, Vazirani received the John von Neumann Theory Prize for "fundam
https://en.wikipedia.org/wiki/Corsair%20Gaming
Corsair Gaming, Inc. is an American computer peripherals and hardware company based in Milpitas, California. Previously Corsair Components and Corsair Memory, it was incorporated in California in January 1994 as Corsair Microsystems and reincorporated in Delaware in 2007. It designs and sells a range of computer products, including high-speed DRAM modules, ATX power supplies (PSUs), USB flash drives (UFDs), CPU/GPU and case cooling, gaming peripherals (such as keyboards and computer mice), computer cases, solid-state drives (SSDs), and speakers. It leases a production facility in Taoyuan City, Taiwan for assembly, testing and packaging of select products, with distribution centers in North America, Europe, and Asia and sales and marketing offices in major markets worldwide. It trades under the ticker symbol CRSR on the NASDAQ stock exchange. Lockdown orders associated with the COVID-19 pandemic, and a rise in demand for computing equipment, including the computer gaming sector, led to a significant short-term increase in Corsair's revenue. History The company was founded as Corsair Microsystems Inc. in 1994 by Andy Paul, Don Lieberman, and John Beekley. Corsair originally developed level 2 cache modules, called cache on a stick (COASt) modules, for OEMs. After Intel incorporated the L2 cache in the processor with the release of its Pentium Pro processor family, Corsair changed its focus to DRAM modules, primarily in the server market. This effort was led by Richard Hashim, one of the early employees at Corsair. In 2002, Corsair began shipping DRAM modules that were designed to appeal to computer enthusiasts, who were using them for overclocking. Since then, Corsair has continued to produce memory modules for PCs, and has added other PC components as well. Corsair expanded its DRAM memory module production into the high end market for overclocking. This expansion allows for high power platforms and the ability to get more performance out of the CPU and RAM. The Corsair Vengeance Pro series and Corsair Dominator Platinum series are built for overclocking applications. Corsair has since expanded their product line to include many types of high-end gaming peripherals, high performance air and water cooling solutions, and other enthusiast-grade components. Around 2009, Corsair contacted CoolIT Systems to integrate their liquid cooling technology into Corsair's offerings which resulted in a long term partnership. In May 2021, Corsair announced that it will relocate its headquarters from Fremont to Milpitas, with the new lease stated to take effect in March 2022. Transactions On July 26, 2017, EagleTree Capital entered into an agreement to acquire a majority stake in Corsair from Francisco Partners and several other minority shareholders in a deal valued at $525 million. Corsair Founder and CEO Andy Paul retains his equity stake and remains in his role as CEO. On June 27, 2018, Corsair announced that it will be acquiring Elgato Gaming from the M
https://en.wikipedia.org/wiki/KTBY
KTBY (channel 4) is a television station in Anchorage, Alaska, United States, affiliated with the Fox network. The station is owned by Coastal Television Broadcasting Company LLC, which provides certain services to dual ABC/CW+ affiliate KYUR (channel 13) under joint sales and shared services agreements (JSA/SSA) with owner Vision Alaska LLC. The two stations share studios on East Tudor Road in Anchorage; KTBY's transmitter is located in historic downtown Anchorage atop the Hilton Anchorage East Tower hotel. Some of KTBY's programming is broadcast to rural communities via low-power translators through the Alaska Rural Communications Service (ARCS). History KTBY signed on the air on December 2, 1983, as a locally owned independent with Mike Parker as President, Mike Buck as General Manager and Dave Peters II as Program Director before joining the new Fox network on its launch of October 9, 1986 (being part of a small number of TV stations on the VHF dial not owned by the network to be affiliated with Fox upon its startup), an affiliation which continues today. It was the only Fox station in Alaska until 1992, when KFXF in Fairbanks went on the air; in the late 1980s, it also became the first station in Alaska to broadcast 24 hours a day. During the 1980s, KTBY was the first Anchorage station to air professional wrestling with any regularity, largely in response to the increase in mainstream interest. Televised wrestling programs were largely absent from Anchorage television, as the programs were traditionally used to promote live events, which have been held only occasionally in Alaska dating back to the 1950s. The station originally aired AWA All-Star Wrestling (in conjunction with a short-lived attempt on their part to promote events in the market), and later World Class Championship Wrestling and WWF Superstars of Wrestling. On August 29, 2007, Coastal Television Broadcasting Company, LLC of Cumming, Georgia (led by Bill Fielder) announced its intent to acquire KTBY for $3,242,500. The sale was completed on May 7, 2008. In June 2010, Coastal Television hired Scott Centers as General Manager to manage KTBY and under a shared services agreement, manage Vision Alaska I and Vision Alaska II. In September 2010, KTBY relocated its master control operations to colocate with Vision Alaska I. On January 28, 2013, Coastal was notified by the FCC that it had failed to update ownership information for KTBY's antenna structure. The company was fined $4,200 and the information was subsequently updated as a result. News operation Until October 1, 2008, KTBY aired a 9:00 p.m. weeknight newscast produced by then-CBS affiliate KTVA (channel 11). This production ceased when KTBY began its own news operation. In April 2020, as a result of impending economic concerns caused by the COVID-19 pandemic, KTBY and KYUR announced plans to outsource its news production to the national NewsNet service, which began operations one year earlier. All of the stations' ne
https://en.wikipedia.org/wiki/Parry%20Aftab
Parry Aftab is an Internet privacy and security lawyer, considered one of the founders of cyberlaw and founder of the world's largest and oldest cybersafety charity. Named by The Boston Herald as "the leading expert in cybercrime in the world," Aftab wrote the first cybersafety book in the world for parents (in 1996) and has received a long list of honors and has been appointed to the boards of directors and advisory boards of several companies, including TRUSTe, Facebook, MTV and Sesame Street Online. She is a longtime Internet safety expert who founded the Internet safety organization WiredSafety, StopCyberbullying and the consulting firm, WiredTrust. She was "the Privacy Lawyer" columnist for Information Week Magazine for many years. In 2016 Parry Aftab founded Cybersafety India and the StopCyberbullying and sextortion and morphing prevention initiatives for India. She resides in both the US and Canada. Career Aftab was appointed by UNESCO's Director General Federico Mayor as the chief of the U.S. National Action Committee for UNESCO's World Citizen's Committee on Protecting Innocence in Danger group in 1999 to address online sexual exploitation of children. She became a member of the Board of Directors for the non-profit, TRUSTe in 2003. In 2005, the United States Congress issued a resolution that recognized her efforts to combat cyberbullying as Executive Director of StopCyberbullying and WiredSafety. Her organization, WiredSafety, became a member of Facebook's Safety Advisory Board in 2009 and in April, Aftab appeared on Good Morning America for its town hall meeting on sexting. In 2010 she received the FBI Director's Community Leadership Award and was one of 28 members in the Online Safety and Technology Working Group of the National Telecommunications and Information Administration. She was one of 29 members of the Internet Safety Technical Task Force, run by Harvard's Berkman Center. She was the co-recipient of the RCMP's Child Recovery Award in 2011. Aftab was the organizer for a 2015 anti-cyberbullying event in Ireland, and has been a member of the advisory boards for MTV's A Thin Line, Fair Play, Sesame Street Online and the Ad Council. Her clients have included Facebook, Disney and Nickelodeon. Reception Members of radical internet groups who disagree with her anti-cyberbullying campaigns have "launched a massive Internet harassment campaign" against her. In 2010, she was forced to cancel a Good Morning America appearance (where she would be discussing the cyberbullying campaign against Jessi Slaughter by members of 4chan's /b/ board) due to targeted harassment, which included Google bombing baseless accusations of child molestation against Aftab. In July 2011 her detractors incited a swatting incident at her home when they contacted police claiming her house was the site of murders and hostages. Aftab was on vacation at the time and a local police swat team investigated the false claims. According to the British blogger Katie
https://en.wikipedia.org/wiki/BBP
BBP may refer to: Science Bailey–Borwein–Plouffe formula, a formula for computing the nth binary digit of pi Baseband processor, a device in a network interface that manages all the radio functions Benzyl butyl phthalate, a plasticizer Bloodborne pathogens, a virus that can be spread through contamination by blood and other body fluids Branchpoint Binding Protein, a pre-mRNA processing factor involved in RNA splicing Blue Brain Project, a Swiss brain research initiative that aims to create a digital reconstruction of rodent and eventually human brains Places Bayport-Blue Point School District, a school district in Bayport and Blue Point, New York Bembridge Airport, Isle of Wight, England (IATA airport code: BBP) Brooklyn Bridge Park, a park on the Brooklyn side of the East River in New York City Other Bayou Bridge Pipeline, an oil pipeline constructed from 2017 to 2019 in Louisiana that was the subject of protests due to its environmental impact Best Business Practice, a method or technique that has consistently shown results superior to those achieved with other means, and that is used as a benchmark Binibining Pilipinas, a Filipino beauty pageant Bobby's Burger Palace, a group of fast casual restaurants which opened in July 2008 in Lake Grove, New York "Boom Boom Pow", a 2009 song by The Black Eyed Peas British Bangladeshi Power 100, an annual publication listing the 100 leading British Bangladeshi figures Great Union Party (Turkish: Büyük Birlik Partisi), an extreme far-right nationalist political party in Turkey
https://en.wikipedia.org/wiki/KAUU
KAUU (channel 5) is a television station in Anchorage, Alaska, United States, affiliated with CBS and MyNetworkTV. It is owned by Gray Television alongside NBC affiliate KTUU-TV (channel 2). Both stations share studios on East 40th Avenue in Anchorage, while KAUU's transmitter is located in Knik, Alaska. KAUU (as KYES-TV) acquired the CBS affiliation for Anchorage on July 31, 2020, when Gray Television purchased the non-license assets of KTVA (channel 11) from Denali Media Holdings, a subsidiary of local cable television operator GCI. KAUU continues to carry its former primary service and schedule, which includes syndicated programming and MyNetworkTV, on its fourth subchannel, and GCI channel 11. Programming from KAUU's main and fourth subchannels is available statewide through the Alaska Rural Communications Service (ARCS) translator network. As of September 2020, KAUU shares its website and news operation with KTUU, which are both branded under the "Alaska's News Source" moniker. As of March 3, 2021, CBS programming moved to KYES-LD and KTUU-DT5 (mapped as 5.11) as part of a major transmitter upgrade; the station's other subchannels are still in operation. History Channel 5 signed on the air as KYES on January 21, 1990 as an independent before joining UPN in January 1995. It also had a secondary affiliation with The WB until that network launched The WB 100+ Station Group on September 21, 1998 in order to shift to cable-only distribution in smaller markets. In January 2006 it was announced that the WB and UPN were to merge operations in September 2006 to form The CW. The station was expected to become a CW affiliate, but on April 24 it was announced that The CW would be carried on a digital subchannel of ABC's Anchorage affiliate KIMO (channel 13, now KYUR). KYES instead became an affiliate of MyNetworkTV and one of only two in Alaska (former sister station K17HC in Juneau was the other); KFXF, the Fox affiliate in Fairbanks, declined an offer to air it as a secondary affiliation. The "-TV" suffix was added in 2007. On October 1, 2015, Gray Television announced that it would acquire KYES-TV and four of its five translators from Fireweed Communications for $500,000, and apply for a "failing station" waiver from the Federal Communications Commission (FCC) so it could form a duopoly between KYES-TV and NBC affiliate KTUU, which Gray was acquiring as part of a separate transaction with Schurz Communications. Gray stated that it planned to invest in improving the quality of the station's services and programming. The acquisition was opposed by GCI—the dominant cable provider in Alaska and owner of then-CBS affiliate KTVA (channel 11)–who filed a complaint to the FCC in December 2015. The company argued that the consolidation of KTUU and KYES would harm the ability for other stations to compete. Alaska state Attorney General Craig W. Richards also objected to the purchase, stating that such a consolidation would have the "potential for signifi
https://en.wikipedia.org/wiki/Podbielskiallee%20%28Berlin%20U-Bahn%29
Podbielskiallee is an underground railway station in the German capital city of Berlin. It is part of the Berlin U-Bahn network and located in the Dahlem district on the line. History The station opened on 12 October 1913 (architect was H.Schweitzer). The street was named after Prussian Minister of State Victor von Podbielski (1844–1916), son of General Eugen Anton Theophil von Podbielski. It was destroyed in the Battle of Berlin. The platform was roofed over in 1978, before only a part of it was under the roof. The U3 trains towards Krumme Lanke emerge above ground after Breitenbachplatz. References U3 (Berlin U-Bahn) stations Railway stations in Germany opened in 1913 Buildings and structures in Steglitz-Zehlendorf
https://en.wikipedia.org/wiki/Simitar%20Entertainment
Simitar Entertainment, Inc. was an American media company that sold music, videos, DVDs, and computer software. The company specialized in compilation albums, special interest video, and urban media. Simitar also distributed its own label. History In 1985, Mickey Elfenbein, former president and CEO of K-Tel International, and Philip Kives (K-tel founder), after K-Tel just went to bankruptcy in October 1984, started Simitar Entertainment. The first film released by Simitar was the children's film Shinbone Alley, which was retailed at $39.95, and a soundtrack album would be marketed through television commercials. Simitar bought Pickwick Records. Simitar was a long-time leader in budget VHS throughout the 80s and early 90s. In 1986, Simitar Entertainment had reached a deal with the United States Hot Rod Association to bring and promote its home video title Monster Madness. By 1987, Minnesota-based Wedding Information Services had inked an agreement with Simitar Entertainment, whereas Simitar would release several titles on videocassette to mass merchandise and their video stores. Reach Entertainment produced sports home video programs for Simitar. In 1991, Simitar scored a hit with the title Desert Shield, a documentary on the Gulf War. On February 25, 1997, Simitar Entertainment had distributed the six-part documentary series Hollywood Starlets, produced by Promotions Plus in cooperation with Orphen Enterprises, which primarily focused on B-movie actresses. By April, 1997 Simitar was the first independent in the U.S. with DVD releases. On May 18, 1998, Simitar licensed the rights to 14 Jackie Chan movies, and several Godzilla movies to bring it onto DVD release, under license from United Productions of America, then-U.S. holder of the franchise. In 1999, Simitar's revenues rose from $5 million to $40 million in just three years. On March 9, 1999, Titan Sports, Inc.—the parent company of the World Wrestling Federation (WWF)– and its music licensee, The Cherry River Music Co., sued Simitar Entertainment for copyright infringement relating to WWF The Music, Vol. 3 and won. Subsequently, in 2000, Simitar folded due to problems in the music division; the company's total assets were $19,570,059, with debts of $25,556,878. Simitar auctioned off its assets later that year, including its film library, which sold to Brentwood Communications, Inc. (BCI) for $215,000. Ed Goetz and Greg Glass went to BCI to start a DVD division. In October/November 2003, BCI was purchased by Navarre Corporation. Naverre's assets have since been sold to Speed Commerce in 2012, then to WYNIT Distribution in 2014. Following the bankruptcy of WYNIT in 2017, Sereno Holdings acquired most of the company assets and relaunched Navarre Distribution as "Encore Software", and it is currently this "new" Encore which owns Simitar and the other former BCI labels. Simitar releases 5th Day of Peace, American Bullfighters 1 & 2 Abraxas, Guardian of the Universe Anima Mundi Awesome Ri
https://en.wikipedia.org/wiki/Working%20set
Working set is a concept in computer science which defines the amount of memory that a process requires in a given time interval. Definition Peter Denning (1968) defines "the working set of information of a process at time to be the collection of information referenced by the process during the process time interval ". Typically the units of information in question are considered to be memory pages. This is suggested to be an approximation of the set of pages that the process will access in the future (say during the next time units), and more specifically is suggested to be an indication of what pages ought to be kept in main memory to allow most progress to be made in the execution of that process. Rationale The effect of the choice of what pages to be kept in main memory (as distinct from being paged out to auxiliary storage) is important: if too many pages of a process are kept in main memory, then fewer other processes can be ready at any one time. If too few pages of a process are kept in main memory, then its page fault frequency is greatly increased and the number of active (non-suspended) processes currently executing in the system approaches zero. The working set model states that a process can be in RAM if and only if all of the pages that it is currently using (often approximated by the most recently used pages) can be in RAM. The model is an all or nothing model, meaning if the pages it needs to use increases, and there is no room in RAM, the process is swapped out of memory to free the memory for other processes to use. Often a heavily loaded computer has so many processes queued up that, if all the processes were allowed to run for one scheduling time slice, they would refer to more pages than there is RAM, causing the computer to "thrash". By swapping some processes from memory, the result is that processes—even processes that were temporarily removed from memory—finish much sooner than they would if the computer attempted to run them all at once. The processes also finish much sooner than they would if the computer only ran one process at a time to completion since it allows other processes to run and make progress during times that one process is waiting on the hard drive or some other global resource. In other words, the working set strategy prevents thrashing while keeping the degree of multiprogramming as high as possible. Thus it optimizes CPU utilization and throughput. Implementation The main hurdle in implementing the working set model is keeping track of the working set. The working set window is a moving window. At each memory reference a new reference appears at one end and the oldest reference drops off the other end. A page is in the working set if it is referenced in the working set window. To avoid the overhead of keeping a list of the last k referenced pages, the working set is often implemented by keeping track of the time t of the last reference, and considering the working set to be all pages referen
https://en.wikipedia.org/wiki/Stanley%20Osher
Stanley Osher (born April 24, 1942) is an American mathematician, known for his many contributions in shock capturing, level-set methods, and PDE-based methods in computer vision and image processing. Osher is a professor at the University of California, Los Angeles (UCLA), Director of Special Projects in the Institute for Pure and Applied Mathematics (IPAM) and member of the California NanoSystems Institute (CNSI) at UCLA. He has a daughter, Kathryn, and a son, Joel. Education BS, Brooklyn College, 1962 MS, New York University, 1964 PhD, New York University, 1966 Research interests Level-set methods for computing moving fronts Approximation methods for hyperbolic conservation laws and Hamilton–Jacobi equations Total variation (TV) and other PDE-based image processing techniques Scientific computing Applied partial differential equations L1/TV-based convex optimization Osher is listed as an ISI highly cited researcher. Research contributions Osher was the inventor (or co-inventor) and developer of many highly successful numerical methods for computational physics, image processing and other fields, including: High resolution numerical schemes to compute flows having shocks and steep gradients, including ENO (essentially non-oscillatory) schemes (with Harten, Chakravarthy, Engquist, Shu), WENO (weighted ENO) schemes (with Liu and Chan), the Osher scheme, the Engquist-Osher scheme, and the Hamilton–Jacobi versions of these methods. These methods have been widely used in computational fluid dynamics (CFD) and related fields. Total variation (TV)-based image restoration (with Rudin and Fatemi) and shock filters (with Rudin). These are pioneering - and widely used - methods for PDE based image processing and have also been used for inverse problems. Level-set method (with Sethian) for capturing moving interfaces, which has been phenomenally successful as a key tool in PDE based image processing and computer vision, as well as applications in differential geometry, image segmentation, inverse problems, optimal design, Two-phase flow, crystal growth, deposition and etching. Bregman iteration and augmented Lagrangian type methods for L1 and L1-related optimization problems which are fundamental to the fields of compressed sensing, matrix completion, robust principal component analysis, etc. Overcoming the curse of dimensionality for Hamilton–Jacobi equations arising in control theory and differential games. Osher has founded (or co-founded) three successful companies: Cognitech (with Rudin) Level Set Systems Luminescent Technologies (with Yablonovitch) Osher has been a thesis advisor for at least 53 PhD students, with 188 descendants, as well as postdoctoral adviser and collaborator for many applied mathematicians. His PhD students have been evenly distributed among academia and industry and labs, most of them are involved in applying mathematical and computational tools to industrial or scientific application areas. Honors Nati
https://en.wikipedia.org/wiki/Reality%20Check%20Network
Reality Check Network was a diskmag warez magazine that existed from November 18, 1995, to Summer 1997 with two breaks in Spring 1996 and Winter 1996/1997. With origins as a promotional magazine for the Legacy group, it evolved into a general magazine describing various aspects of the warez scene. It contained interviews with key group leaders and described gossip and fights in the warez world. They would list each period's various releases, FTP and BBS courier MB totals, and up-to-date NFO files for each group. This was during a period when private Internet accounts were becoming widespread in the United States and increasingly in Europe and the Internet-based warez scene was expanding rapidly. They also had an open IRC channel #rcn where people would gossip about the activities of various groups under the watch of the magazine's chief editor Rebel Chicken. Its front-end and graphical design were considered excellent and based on efficient assembly code. The magazine also sometimes embedded small games like space shooters into the code. As the magazine became more sophisticated in its graphics, its size in kilobytes grew, but until close to its end fit onto a single floppy disk. It was controversial for its frank discussion of government busts and its indirect involvement in various feuds. Although it was frequently criticized for this and other various reasons, most groups interacted with it because of its popularity. Issues RCN 1 - "MindCrash Who?" - 18 November 1995 2 - "Malice #1?" - 25 November 1995 3 - "Fake Releases" - 2 December 1995 4 - "TDU-Jam Retires" - 9 December 1995 5 - "Hybrid's WarCraft 2" - 15 December 1995 6 - "Drink or Die vs Demolition" - 22 December 1995 7 - "Best of 1995" - 31 December 1995 8 - "Exclusive FBI Interview" - 7 January 1996 9 - "Hybrid Leaders on the Warpath" - 14 January 1996 10 - "Passing Of Spyder-X" - 21 January 1996 11 - "Anarchist Bust" - 28 January 1996 12 - "Apogee/Distinct" - 4 February 1996 13 - "Farewell" - 11 February 1996 14 - "James Makes His Visit" - 19 May 1996 15 - "Malice Downfall" - 26 May 1996 16 - "Passing of Zieg" - 2 June 1996 17 - "Dr Jekyll Busted" - 7 June 1996 18 - "GODS Meeting Logs" - 16 June 1996 19 - "Chris Carter Revealed" - 23 June 1996 20 - "Amnesia Falls" - 30 June 1996 21 - "ROR Dead? I wish" - 7 July 1996 Reality Check Network Theme Pack - "Designed for Windows 95" - 7 July 1996 22 - "United Cracking Force" - 14 July 1996 23 - "Amnesia's Catch 22?" - 21 July 1996 24 - "AMN vs. RISC" - 4 August 1996 25 - "DOD vs. MTY" - 18 August 1996 26 - "Group Trickery?" - 1 September 1996 27 - "Rebel Chicken No More?" - 20 October 1996 28 - "Rebel Chicken No More?" - 20 October 1996 29 - "Orion's New PWA!" - 26 October 1996 30 - "Razor Busts Supplier" - 11 November 1996 30 - "Art Edition" - 13 November 1996 31 - "One Year Anniversary" - 24 November 1996 32 - "The End of a Chapter" - 8 December 1996 33 - "We're Back" - 6 April 1997 34 - "The Kings
https://en.wikipedia.org/wiki/WBXK-CA
WBXK-CA, VHF analog channel 8, was a low-powered, Class A America One-affiliated licensed to Jackson, Mississippi, United States. The station was owned by the Community Television Network. History It began broadcasting on March 16, 1990 as W08CU, and was an over-the-air music-video outlet. In the 1990s, WBXK was affiliated with the Video Jukebox Network, which was renamed The Box in 1991. The station's "programming" was basically music videos requested by non-cable viewers in the greater Jackson area. On September 1, 1995, the station's call letters changed from W08CU to WBXK-CA. In 2001, WBXK remained a music video station even though it inevitably became an MTV2 affiliate (at the time known as M2, which absorbed The Box that year). In mid-January 2005, WBXK had switched to an all-informercial format for about two weeks. On February 2, WBXK flipped to Urban America Television, flipping again to its next network, America One, in April 2006. The station's owners surrendered its license to the Federal Communications Commission on March 29, 2013, at which point the license was cancelled. BXK-CA Defunct television stations in the United States Television channels and stations disestablished in 2013 BXK-CA
https://en.wikipedia.org/wiki/Rent%27s%20rule
Rent's rule pertains to the organization of computing logic, specifically the relationship between the number of external signal connections to a logic block (i.e., the number of "pins") with the number of logic gates in the logic block, and has been applied to circuits ranging from small digital circuits to mainframe computers. Put simply, it states that there is a simple power law relationship between these two values (pins and gates). E. F. Rent's discovery and first publications In the 1960s, E. F. Rent, an IBM employee, found a remarkable trend between the number of pins (terminals, T) at the boundaries of integrated circuit designs at IBM and the number of internal components (g), such as logic gates or standard cells. On a log–log plot, these datapoints were on a straight line, implying a power-law relation , where t and p are constants (p < 1.0, and generally 0.5 < p < 0.8). Rent's findings in IBM-internal memoranda were published in the IBM Journal of Research and Development in 2005, but the relation was described in 1971 by Landman and Russo. They performed a hierarchical circuit partitioning in such a way that at each hierarchical level (top-down) the fewest interconnections had to be cut to partition the circuit (in more or less equal parts). At each partitioning step, they noted the number of terminals and the number of components in each partition and then partitioned the sub-partitions further. They found the power-law rule applied to the resulting T versus g plot and named it "Rent's rule". Rent's rule is an empirical result based on observations of existing designs, and therefore it is less applicable to the analysis of non-traditional circuit architectures. However, it provides a useful framework with which to compare similar architectures. Theoretical basis Christie and Stroobandt later derived Rent's rule theoretically for homogeneous systems and pointed out that the amount of optimization achieved in placement is reflected by the parameter , the "Rent exponent", which also depends on the circuit topology. In particular, values correspond to a greater fraction of short interconnects. The constant in Rent's rule can be viewed as the average number of terminals required by a single logic block, since when . Special cases and applications Random arrangement of logic blocks typically have . Larger values are impossible, since the maximal number of terminals for any region containing g logic components in a homogeneous system is given by . Lower bounds on p depend on the interconnection topology, since it is generally impossible to make all wires short. This lower bound is often called the "intrinsic Rent exponent", a notion first introduced by Hagen et al. It can be used to characterize optimal placements and also measure the interconnection complexity of a circuit. Higher (intrinsic) Rent exponent values correspond to a higher topological complexity. One extreme example () is a long chain of logic blocks, while a cli
https://en.wikipedia.org/wiki/Controlled%20NOT%20gate
In computer science, the controlled NOT gate (also C-NOT or CNOT), controlled-X gate, controlled-bit-flip gate, Feynman gate or controlled Pauli-X is a quantum logic gate that is an essential component in the construction of a gate-based quantum computer. It can be used to entangle and disentangle Bell states. Any quantum circuit can be simulated to an arbitrary degree of accuracy using a combination of CNOT gates and single qubit rotations. The gate is sometimes named after Richard Feynman who developed an early notation for quantum gate diagrams in 1986. The CNOT can be expressed in the Pauli basis as: Being both unitary and Hermitian, CNOT has the property and , and is involutory. The CNOT gate can be further decomposed as products of rotation operator gates and exactly one two qubit interaction gate, for example In general, any single qubit unitary gate can be expressed as , where H is a Hermitian matrix, and then the controlled U is . The CNOT gate is also used in classical reversible computing. Operation The CNOT gate operates on a quantum register consisting of 2 qubits. The CNOT gate flips the second qubit (the target qubit) if and only if the first qubit (the control qubit) is . If are the only allowed input values for both qubits, then the TARGET output of the CNOT gate corresponds to the result of a classical XOR gate. Fixing CONTROL as , the TARGET output of the CNOT gate yields the result of a classical NOT gate. More generally, the inputs are allowed to be a linear superposition of . The CNOT gate transforms the quantum state: into: The action of the CNOT gate can be represented by the matrix (permutation matrix form): The first experimental realization of a CNOT gate was accomplished in 1995. Here, a single Beryllium ion in a trap was used. The two qubits were encoded into an optical state and into the vibrational state of the ion within the trap. At the time of the experiment, the reliability of the CNOT-operation was measured to be on the order of 90%. In addition to a regular controlled NOT gate, one could construct a function-controlled NOT gate, which accepts an arbitrary number n+1 of qubits as input, where n+1 is greater than or equal to 2 (a quantum register). This gate flips the last qubit of the register if and only if a built-in function, with the first n qubits as input, returns a 1. The function-controlled NOT gate is an essential element of the Deutsch–Jozsa algorithm. Behaviour in the Hadamard transformed basis When viewed only in the computational basis , the behaviour of the CNOT appears to be like the equivalent classical gate. However, the simplicity of labelling one qubit the control and the other the target does not reflect the complexity of what happens for most input values of both qubits. Insight can be won by expressing the CNOT gate with respect to a Hadamard transformed basis . The Hadamard transformed basis of a one-qubit register is given by and the corresponding basis of a 2-qub
https://en.wikipedia.org/wiki/DTED
DTED (or Digital Terrain Elevation Data) is a standard of digital datasets which consists of a matrix of terrain elevation values, i.e., a Digital Elevation Model. This standard was originally developed in the 1970s to support aircraft radar simulation and prediction. Terrain elevations are described as the height above the Earth Gravitational Model 1996 (EGM96) geoid, not the WGS84 reference ellipsoid. DTED supports many applications, including line-of-sight analyses, terrain profiling, 3-D terrain visualization, mission planning/rehearsal, and modeling and simulation. DTED is a standard National Geospatial-Intelligence Agency (NGA) product that provides medium resolution, quantitative data in a digital format for military system applications that require terrain elevation. The DTED format for level 0, 1 and 2 is described in U.S. Military Specification Digital Terrain Elevation Data (DTED) MIL-PRF-89020B, and amongst other parameters describes the resolution for each level: Level 0 has a post spacing of approximately 900 meters. Level 1 has a post spacing of approximately 90 meters. Level 2 has a post spacing of approximately 30 meters. The precise spacing is defined by dividing the world into zones based on latitude, and is given in the following table: In addition three more levels (3, 4 and 5) at increasing resolution have been proposed, but not yet standardized. DTED data is stored in a big endian format where negative numbers are signed magnitude. References External links FAS: Digital Terrain Elevation Data [DTED] DTED at National Geospatial-Intelligence Agency website DTED specification MATLAB has in its Mapping toolbox a function for reading DTED files: source code documentation Radar Cartography Digital elevation models GIS raster file formats
https://en.wikipedia.org/wiki/Software%20token
A software token (a.k.a. soft token) is a piece of a two-factor authentication security device that may be used to authorize the use of computer services. Software tokens are stored on a general-purpose electronic device such as a desktop computer, laptop, PDA, or mobile phone and can be duplicated. (Contrast hardware tokens, where the credentials are stored on a dedicated hardware device and therefore cannot be duplicated — absent physical invasion of the device) Because software tokens are something one does not physically possess, they are exposed to unique threats based on duplication of the underlying cryptographic material - for example, computer viruses and software attacks. Both hardware and software tokens are vulnerable to bot-based man-in-the-middle attacks, or to simple phishing attacks in which the one-time password provided by the token is solicited, and then supplied to the genuine website in a timely manner. Software tokens do have benefits: there is no physical token to carry, they do not contain batteries that will run out, and they are cheaper than hardware tokens. Security architecture There are two primary architectures for software tokens: shared secret and public-key cryptography. For a shared secret, an administrator will typically generate a configuration file for each end-user. The file will contain a username, a personal identification number, and the secret. This configuration file is given to the user. The shared secret architecture is potentially vulnerable in a number of areas. The configuration file can be compromised if it is stolen and the token is copied. With time-based software tokens, it is possible to borrow an individual's PDA or laptop, set the clock forward, and generate codes that will be valid in the future. Any software token that uses shared secrets and stores the PIN alongside the shared secret in a software client can be stolen and subjected to offline attacks. Shared secret tokens can be difficult to distribute, since each token is essentially a different piece of software. Each user must receive a copy of the secret, which can create time constraints. Some newer software tokens rely on public-key cryptography, or asymmetric cryptography. This architecture eliminates some of the traditional weaknesses of software tokens, but does not affect their primary weakness (ability to duplicate). A PIN can be stored on a remote authentication server instead of with the token client, making a stolen software token no good unless the PIN is known as well. However, in the case of a virus infection, the cryptographic material can be duplicated and then the PIN can be captured (via keylogging or similar) the next time the user authenticates. If there are attempts made to guess the PIN, it can be detected and logged on the authentication server, which can disable the token. Using asymmetric cryptography also simplifies implementation, since the token client can generate its own key pair and exchange publ
https://en.wikipedia.org/wiki/Apple%20Adjustable%20Keyboard
The Apple Adjustable Keyboard is an ergonomic keyboard introduced by Apple Computer, Inc. in 1993 for the Macintosh family of personal computers. The keyboard attaches to the computer via the Apple Desktop Bus port. The last Apple computer released compatible with this keyboard without using a USB to ADB adapter was the Power Macintosh G3 (Blue and White), as it was the last one with the Apple Desktop Bus. The Apple Adjustable Keyboard came with contoured plastic wrist rests, and a separate keypad with function keys and arrow keys. This was the third and last time Apple offered a separate numeric keypad. Unlike its predecessors, it was not sold separately. The keyboard also included volume buttons and a record button on the right side of the keyboard. It was hinged at the top, allowing the user to adjust the angle between the right and left sides of the keyboard. The split came between the key pairs: 5/6, T/Y, G/H, and B/N. The space bar floated midway between the two parts. The keyboard uses Alps SKFS switches, which provide tactile feedback with a slightly "clicky" feel. See also Apple Keyboard Ergonomic keyboard Microsoft ergonomic keyboards References External links Apple Adjustable Keyboard Service parts at Sun Remarketing Apple Adjustable Keyboard TidBITS article Apple Adjustable Keyboard keymap diagrams Apple Adjustable Keyboard photos Apple Sued For Ergonomic Keyboard TidBITS article Article showing internal ALPS Low Profile SKFS Clicky Switches Macintosh keyboards Computer-related introductions in 1993
https://en.wikipedia.org/wiki/Macintosh%20LC%20III
The Macintosh LC III is a personal computer designed, manufactured, and sold by Apple Computer from February 1993 to February 1994. It replaced the commercially successful Macintosh LC II in Apple's lineup of mid-class computers, and was significantly faster, with MacWorld Magazine benchmarks showing 2x performance in all major categories - CPU, disk, video and maths. It was also significantly less expensive; the LC III with an 80 MB hard disk was priced at US$1,349 at introduction, $700 less than the LC II. The LC III was sold primarily (but not exclusively) to educational institutions, and a corresponding Performa variant called the Performa 450 was sold to the consumer market. A speed-bumped version, called the Macintosh LC III+ was released in October of the same year, with a 33 MHz CPU. Three Performa variants of this model were released: the 460, 466 and 467. These faster models replaced the LC III and Performa 450, with sales of the original models continuing until the end of 1993 as dealers depleted their stocks. New sales of the LC III+ ended in early 1994 as Apple neared the completion of the transition away from 68030 processors. The 68LC040-based LC 475 and Performa 475 were their replacements. Models Introduced February 10, 1993: Macintosh LC III: 25 MHz 68030 CPU, 80 MB HDD. Macintosh Performa 450: 25 MHz 68030 CPU, 120 MB HDD. Introduced October 18, 1993: Macintosh LC III+: 33 MHz 68030 CPU. Macintosh Performa 460: 4 MB RAM, 80 MB HDD. Macintosh Performa 466: 4 MB RAM, 160 MB HDD. Macintosh Performa 467: 4 MB RAM, 160 MB HDD. Timeline References External links Mac LC III and Mac LC III+ at lowendmac.com. III LC III LC III Computer-related introductions in 1993 Products and services discontinued in 1994
https://en.wikipedia.org/wiki/Nancy%20D.%20Griffeth
Nancy Davis Griffeth (born October 26, 1945) is an American computer scientist notable for approaches to the feature interaction problem. In 2014, she is a professor at Lehman College of The City University of New York and is modelling biological systems in computational biology. Early life Griffeth was born in Oak Park, Illinois and lived in Laurel, Mississippi and Memphis, Tennessee as a child. She received a bachelor's degree from Harvard University, a master's degree from Michigan State University, and a PhD degree from the University of Chicago. Career Griffeth did seminal work in the feature interaction problem as a founding organizer of the feature interaction workshops and co-author of one of the most cited papers in feature interactions, "A Feature Interaction Benchmark for IN and Beyond." The feature interaction problem is a software problem that arises when one feature interacts with another in such a way that it changes what the feature does. This can cause serious issues for developers and users of the software. The problem was first documented as features were added to telecommunications systems. If new features on a telecommunications network were either undetected or unwanted, they could cause confusion and dissatisfaction among customers if not handled properly. Griffeth also researched the related problem of how to test networks to see how well they work together, called "interoperability". She worked at the Next Generation Networking Lab at Lucent Technologies where she designed and built tools to test interoperability of Voice-over-IP networks, which included conformance testing for MeGaCo media gateways and controllers. For this purpose, she also researched how to model protocols. In addition, she studied virtual node layers regarding Mobile Ad Hoc Networks or MANETs. In the 1990s, she patented methods to protect databases against hackers trying to deduce confidential attributes. Her research has included distributed databases, simulations, concurrency and recovery controls, database design issues, performance modeling, and other issues. Teaching From 2010 to 2014 Griffeth directed workshops on computational biology, funded by the National Science Foundation Expedition in Computing "Computational Modeling and Analysis of Complex Systems." Seventy-eight undergraduate students were trained in computational biology methods and tools and executed research projects on atrial fibrillation and pancreatic cancer. Awards Griffeth received the Top 100 Women in Computing award from McGraw-Hill in 1995 for her work in feature interactions in telecommunications systems, distributed systems, and databases. She received awards in 2007 and 2008 from Cisco Systems for work on ad hoc networks. Personal life Griffeth married engineer and author Bill Griffeth and is the mother of American rugby athlete Valerie Griffeth, and the professor of mathematics at Chile's University of Talca, Dr. Stephen Griffeth. References External links
https://en.wikipedia.org/wiki/MGW
MGW may refer to: Maguwo railway station, Indonesia (station code) Maximum gross weight, abbreviated "m g w" on road signs Media gateway, a translation unit between telecommunications networks Morgantown Municipal Airport, United States (IATA code) Morgan Gibbs-White, professional footballer Marianne Geraldine Walker, a soon to be doctor at the University of Loughborough
https://en.wikipedia.org/wiki/DWH
DWH can stand for: Domino Web Access, an IBM software product. Data warehouse Drain water heat recovery David Wayne Hooks Memorial Airport Deepwater Horizon, oil drilling rig destroyed in an incident that resulted in a large oil spill
https://en.wikipedia.org/wiki/Barium%20chloride%20%28data%20page%29
This page provides supplementary chemical data on barium chloride. Material Safety Data Sheet SIRI Science Stuff (Dihydrate) Structure and properties Thermodynamic properties Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/Barium%20hydroxide%20%28data%20page%29
This page provides supplementary chemical data on barium hydroxide. Material Safety Data Sheet SIRI Science Stuff Structure and properties Thermodynamic properties Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/Barium%20oxide%20%28data%20page%29
This page provides supplementary chemical data on barium oxide. Material Safety Data Sheet SDS from Millipore Sigma Structure and properties Thermodynamic properties Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/QuickPlay
QuickPlay is a technology pioneered by Hewlett-Packard that allows users to directly play multimedia without booting a computer to the main operating system. QuickPlay software, known as QuickPlay or HP QuickPlay is software custom developed for HP by CyberLink Corp. A media component of HP Pavilion Entertainment laptops, QuickPlay is a feature of the dv1000 series and above, including the new Pavilion HDX series of notebooks. QuickPlay is also a feature of many other HP Compaq notebooks. The technology has been emulated by other computer manufacturers such as Dell, Alienware, and Toshiba in various iterations. QuickPlay software revisions up to version 2.3 have two main components. The first component is a "Direct" function that provides instant access upon boot to music CDs, DVD movies, and MP3s stored on the hard drive. It is launched by the QuickPlay external button found on the notebook or included IR remote. QuickPlay "Direct" is possible through software on a separate partition with a custom operating system (Linux for QuickPlay 1.0 and Windows XP embedded for QuickPlay 2.3) installed. The secondary component of QuickPlay software (all versions) is an application run under Windows with identical functions. Newer versions of the Windows-only component (QuickPlay versions above 2.3) have additional gaming and karaoke functions. QuickPlay software versions 3.0 and newer included in notebooks shipping with Windows Vista, solely retain the Windows-only component, as the "Direct" component is no longer implemented due to unresolved compatibility issues. Instead, users must first boot Windows Vista and log into their user accounts before the Windows-only version of the QuickPlay software can be run. This occurs regardless of whether QuickPlay is launched externally (via a notebook button or IR remote button) when the notebook is off, or when Windows Vista is running. QuickPlay software has been replaced by the HP MediaSmart Software on HP Desktops and Notebook PC HP QuickPlay should not be confused with the QuickPlay project hosted by SourceForge. External links Official HP QuickPlay support page Backup QuickPlay files & Info at Asifism.com HP software Media players
https://en.wikipedia.org/wiki/Cryptomeria%20cipher
The Cryptomeria cipher, also called C2, is a proprietary block cipher defined and licensed by the 4C Entity. It is the successor to CSS algorithm (used for DVD-Video) and was designed for the CPRM/CPPM digital rights management scheme which are used by DRM-restricted Secure Digital cards and DVD-Audio discs. Cipher details The C2 symmetric key algorithm is a 10-round Feistel cipher. Like DES, it has a key size of 56 bits and a block size of 64 bits. The encryption and decryption algorithms are available for peer review, but implementations require the so-called "secret constant", the values of the substitution box (S-box), which are only available under a license from the 4C Entity. The 4C Entity licenses a different set of S-boxes for each application (such as DVD-Audio, DVD-Video and CPRM). Cryptanalysis In 2008, an attack was published against a reduced 8-round version of Cryptomeria to discover the S-box in a chosen-key scenario. In a practical experiment, the attack succeeded in recovering parts of the S-box in 15 hours of CPU time, using 2 plaintext-ciphertext pairs. A paper by Julia Borghoff, Lars Knudsen, Gregor Leander and Krystian Matusiewicz in 2009 breaks the full-round cipher in three different scenarios; it presents a 224 time complexity attack to recover the S-box in a chosen-key scenario, a 248 boomerang attack to recover the key with a known S-box using 244 adaptively chosen plaintexts/ciphertexts, and a 253.5 attack when both the key and S-box are unknown. Distributed brute force cracking effort Following an announcement by Japanese HDTV broadcasters that they would start broadcasting programs with the copy-once broadcast flag starting with 2004-04-05, a distributed Cryptomeria cipher brute force cracking effort was launched on 2003-12-21. To enforce the broadcast flag, digital video recorders employ CPRM-compatible storage devices, which the project aimed to circumvent. However, the project was ended and declared a failure on 2004-03-08 after searching the entire 56-bit keyspace, failing to turn up a valid key for unknown reasons. Because the attack was based on S-box values from DVD-Audio, it was suggested that CPRM may use different S-boxes. Another brute force attack to recover DVD-Audio CPPM device keys was mounted on 2009-05-06. The attack was intended to find any of 24570 secret device keys by testing MKB file from Queen "The Game" DVD-Audio disc. On 2009-10-20 such key for column 0 and row 24408 was discovered. The similar brute force attack to recover DVD-VR CPRM device keys was mounted on 2009-10-20. The attack was intended to find any of 3066 secret device keys by testing MKB from Panasonic LM-AF120LE DVD-RAM disc. On 2009-11-27 such key for column 0 and row 2630 was discovered. By now the CPPM/CPRM protection scheme is deemed unreliable. Notes References Broken block ciphers Feistel ciphers
https://en.wikipedia.org/wiki/DNAS
Dynamic Network Authentication System (DNAS) was a proprietary authentication system created by Sony Computer Entertainment Inc made for the PlayStation 2, PlayStation Portable, and PSX. DNAS retrieved information about a user's hardware and software for authentication, copy protection, account blocking, system, rules, or game management and other purposes. PlayStation 2 DNAS used a set of codes in a protected area of the game DVD together with serial numbers from the console EEPROM for online authentication. Game backups or copies using regular DVD-R burners do not have this protected area, and thus games failed to authenticate to the servers. To circumvent this, programs were made available that patch the client portion of the game to report hardcoded values without attempting to access the protected area of the DVD. This made it possible to play online with game backups and illegal copies. Some games have a double DNAS check to prevent these patches. These techniques were introduced by Electronic Arts in most of their later games. Discontinuation The DNAS service was terminated on 4 April 2016 for NTSC-U and PAL regions after the last official online game, Final Fantasy XI, was taken offline on 31 March 2016, but continued to support NTSC-J PS2 titles and the PlayStation Store on the PSP. Unofficial private servers allowed game play on other PS2 games until 4 April. Certain games continued to work beyond 4 April and are still operational thanks to certain workarounds. References Sony Interactive Entertainment
https://en.wikipedia.org/wiki/The%20SyncML%20Initiative
The SyncML Initiative, Ltd. was a non-profit corporation formed by a group of companies who co-operated to produce an open standard for data synchronization and device management. Prior to SyncML, data synchronization and device management had been based on a set of different, proprietary protocols, each functioning only with a limited number of devices, systems and data types. The SyncML Initiative, Ltd. consolidated into the Open Mobile Alliance (OMA) in 2002, contributing their technical work to the OMA technical Working Groups: Device Management Working Group and Data Synchronization Working Group. The SyncML legacy specifications were converted to the OMA format with the 1.2.2 versions of OMA SyncML, OMA Data Synchronization and OMA Device Management specifications. References Recent documents OMA SyncML Section (old site) Companies disestablished in 2002 SyncML
https://en.wikipedia.org/wiki/Minification%20%28programming%29
Minification (also minimisation or minimization) is the process of removing all unnecessary characters from the source code of interpreted programming languages or markup languages without changing its functionality. These unnecessary characters usually include white space characters, new line characters, comments, and sometimes block delimiters, which are used to add readability to the code but are not required for it to execute. Minification reduces the size of the source code, making its transmission over a network (e.g. the Internet) more efficient. In programmer culture, aiming at extremely minified source code is the purpose of recreational code golf competitions. Minification can be distinguished from the more general concept of data compression in that the minified source can be interpreted immediately without the need for an uncompression step: the same interpreter can work with both the original as well as with the minified source. The goals of minification are not the same as the goals of obfuscation; the former is often intended to be reversed using a pretty-printer or unminifier. However, to achieve its goals, minification sometimes uses techniques also used by obfuscation; for example, shortening variable names and refactoring the source code. When minification uses such techniques, the pretty-printer or unminifier can only fully reverse the minification process if it is supplied details of the transformations done by such techniques. If not supplied those details, the reversed source code will contain different variable names and control flow, even though it will have the same functionality as the original source code. Example For example, the JavaScript code // This is a comment that will be removed by the minifier var array = []; for (var i = 0; i < 20; i++) { array[i] = i; } is equivalent to but longer than for(var a=[],i=0;i<20;a[i]=i++); History In 2001 Douglas Crockford introduced JSMin, which removed comments and whitespace from JavaScript code. It was followed by YUI Compressor in 2007. In 2009, Google opened up its Closure toolkit, including Closure Compiler which contained a source mapping feature together with a Firefox extension called Closure Inspector. In 2010, Mihai Bazon introduced UglifyJS, which was superseded by UglifyJS2 in 2012; the rewrite was to allow for source map support. From 2017, Alex Lam took over maintenance and development of UglifyJS2, replacing it with UglifyJS3 which unified the CLI with the API. In 2018, Terser has been forked from uglify-es and has gained momentum since; in 2020 it outstripped UglifyJS when measured in daily downloads. Source mapping A Source Map is a file format that allows software tools for JavaScript to display different code to a user than the code actually executed by the computer. For example, to aid in debugging of minified code, by "mapping" this code to the original unminified source code instead. The original format was created by Joseph Schorr as part of the
https://en.wikipedia.org/wiki/Oracle%20metadata
Oracle Database provides information about all of the tables, views, columns, and procedures in a database. This information about information is known as metadata. It is stored in two locations: data dictionary tables (accessed via built-in views) and a metadata registry. Other relational database management systems support an ANSI-standard equivalent called information schema. Views for metadata The total number of these views depends on the Oracle version, but is in a 1000 range. The main built-in views accessing Oracle RDBMS data dictionary tables are few, and are as follows: ALL_OBJECTS – list of all objects in the current database that are accessible to the current user; ALL_TABLES – list of all tables in the current database that are accessible to the current user; ALL_VIEWS – list of all views in the current database that are accessible to the current user; ALL_TAB_COLUMNS – list of all columns in the database that are accessible to the current user; ALL_ARGUMENTS – lists the arguments of functions and procedures that are accessible to the current user; ALL_ERRORS – lists descriptions of errors on all stored objects (views, procedures, functions, packages, and package bodies) that are accessible to the current user; ALL_OBJECT_SIZE – included for backward compatibility with Oracle version 5; ALL_PROCEDURES – (from Oracle 9 onwards) lists all functions and procedures (along with associated properties) that are accessible to the current user; ALL_SOURCE – describes the text (i.e. PL/SQL) source of the stored objects accessible to the current user; ALL_TRIGGERS – list all the triggers accessible to the current user. In addition there are equivalent views prefixed "USER_" which show only the objects owned by the current user (i.e. a more restricted view of metadata) and prefixed "DBA_" which show all objects in the database (i.e. an unrestricted global view of metadata for the database instance). Naturally the access to "DBA_" metadata views requires specific privileges. Example 1: finding tables Find all Tables that have PATTERN in the table name SELECT Owner AS Schema_Name, Table_Name FROM All_Tables WHERE Table_Name LIKE '%PATTERN%' ORDER BY Owner, Table_Name; Example 2: finding columns Find all tables that have at least one column that matches a specific PATTERN in the column name SELECT Owner AS Schema_Name, Table_Name, Column_Name FROM All_Tab_Columns WHERE Column_Name LIKE '%PATTERN%' ORDER BY 1,2,3; Example 3: counting rows of columns Estimate a total number of rows in all tables containing a column name that matches PATTERN (this is SQL*Plus specific script) COLUMN DUMMY NOPRINT COMPUTE SUM OF NUM_ROWS ON DUMMY BREAK ON DUMMY SELECT NULL DUMMY, T.TABLE_NAME, C.COLUMN_NAME, T.NUM_ROWS FROM ALL_TABLES T, ALL_TAB_COLUMNS C WHERE T.TABLE_NAME = C.TABLE_NAME AND C.COLUMN_NAME LIKE '%PATTERN%' AND T.OWNER = C.OWNER ORDER BY T.TABLE_NAME; Note that NUM_R
https://en.wikipedia.org/wiki/Dakar%20Dem%20Dikk%20Workers%20Democratic%20Union
Dakar Dem Dikk Workers Democratic Union (Union démocratique des travailleurs de Dakar Dem Dikk, UDT-3D) is a trade union of employees of Dakar Dem Dikk (the public transportation network of Dakar, Senegal). The general secretary of UDT-3D is Mamadou Goudiaby, another important leader and negotiator of the union is Christian Salvy. UDT-3D is affiliated to CNTS/FC. Trade unions in Senegal
https://en.wikipedia.org/wiki/JUMP%20GIS
Java Unified Mapping Program (JUMP) is a Java based vector and raster GIS and programming framework. Current development continues under the OpenJUMP name. Features As featured on the project's website: Platform independent (Windows, Linux, Unix, Apple macOS), Java Runtime needs to be installed Reads and writes the file formats ESRI Shapefile, GeoJSON, GML, JML, CSV, OSM, DXF and more Reads database datastores PostGIS, SpatiaLite, Oracle Spatial and MariaDB, MySQL Writes PostGIS datastore Reads raster files (world file supported) eg. GeoTIFF, TIFF, JPEG, BMP, PNG, FLT, ASC, JPEG 2000 and ECW* Writes raster eg. GeoTIFF, TIFF, PNG, FLT, and ASC Save view to georeferenced rasters like JPEG and PNG Full geometry and attribute editing OpenGIS SFS compliant Geometry algorithms based on Java Topology Suite Many third party plugins exist (e.g. connecting to Postgis, Oracle database or ArcSDE, print, reproject vectos, etc.) Supports standards like WMS, WFS and SLD Easily extensible GIS programming environment for own GIS-applications Supports multiple languages: Czech German English Italian Spanish Finnish French Hungarian Malayalam Portuguese Portuguese (Brazil) Telugu Chinese (simplified) Chinese (Hong Kong SAR) License: GPL 2.0 History In 2002, as a project for the British Columbia Ministry of Sustainable Resource Management, Vivid Solutions Inc. created a software program to do automated matching ("conflation") of roads and rivers from different digital maps into an integrated single geospatial data set. The software team made the program flexible enough to be used not just for roads and rivers, but almost any kind of spatial data: provincial boundaries, power-station locations, satellite images, and so on. The program was named JUMP (JAVA Unified Mapping Platform), and it has become a popular, free Geographic Information System (GIS). After the initial creation and deployment of JUMP, regular development of the program by Vivid Solutions stopped. However, the company continued offering support to the user community that had grown around JUMP, and provided information to developers that had begun to improve JUMP in small ways, or who had customized it to fit their needs. Martin Davis and Jon Aquino, two former employees of Vivid Solutions that worked on the original JUMP, played a key role in the growth of this community centered on JUMP. It soon became evident that both the users and developers would benefit from a "unified" JUMP platform. This central or core platform would eliminate the compatibility issues that plagued the JUMP user community, and would give developers a platform on which to focus and coordinate their efforts. A number of the lead members from each team working with JUMP formed the JPP Development Committee, whose purpose was to guide and oversee this new unified platform. A name was chosen for this open source GIS program to be based on JUMP, "OpenJUMP". In particular during the second half