source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Warblade
Warblade is a shareware computer game for Microsoft Windows and OS X, written by Norwegian developer Edgar M. Vigdal. The Windows version runs well on Linux under Wine. It is also available for retail in the App Store for iOS devices (in iPhone/iPod Touch and iPad versions). The game is a 2D space shooter in the vein of the perennial classic Galaga. It is a rewrite and modernization of a popular Amiga shareware game, Deluxe Galaga, which was written by the same author back in the mid-1990s. Where technically possible, the graphics and sounds are respectful to their Amiga origins. Gameplay The player controls a small ship, which moves along the bottom of the screen. An assembly of bug-like alien creatures fly onto the screen and shoot at the player's ship. The player must defeat all the aliens on the screen by shooting at them from the ship to advance to the next level. On defeating some aliens, random bonuses will be dropped for the player to collect, such as money, improved weaponry, or mini games. Levels Levels are made in packs of four, with each pack introducing a new alien design. The first two levels of a pack are levels containing only small aliens. The third level introduces larger versions of the aliens. When defeating a larger alien, there is the opportunity to collect a rank marker. When six different rank markers have been collected, the player advances a rank. The fourth and final level of the pack, alternates between a kamikaze level, in which aliens dive from above the screen, and a bonus level, in which the player earns a bonus if all aliens are defeated before they leave the screen area. Every 25 levels there is a boss level. Shop At the end of each pack, the player is taken to the shop where there is the option to purchase upgrades, such as extra lives and improved weapons. Memorystation A memorystation is one of two mini games that can be entered by collecting a falling bonus from an alien. The object of memorystation is to find pairs by turning over grid-like squares. If all pairs in a memorystation are found, the player receives bonus points and the next time a memorystation is entered there are more squares. Meteor Storm A meteor storm is the second mini game that can be entered by collecting a falling bonus from an alien. During a meteor storm, the player must navigate through falling rocks. Occasionally, money, points or gems can be collected that are also falling from the top of the screen. If the player reaches the end of the meteor storm, they are rewarded with a large number of points and amount of money. Gem Drop A gem drop is a third mini game that cannot be entered by collecting a bonus. The only way to enter a gem drop is to collect 100 gems, through the use of gem bombs, or collecting gems in memorystations and meteor storms. A gem drop is much like a meteor storm, however only gems fall, and they are worth large numbers of points. If the player collects 1000 gems in one game, a super gem drop is enter
https://en.wikipedia.org/wiki/Watermark%20%28data%20file%29
A watermark stored in a data file refers to a method for ensuring data integrity which combines aspects of data hashing and digital watermarking. Both are useful for tamper detection, though each has its own advantages and disadvantages. Data hashing A typical data hash will process an input file to produce an alphanumeric string unique to the data file. Should the file be modified, such as if one or more bit changes occur within this original file, the same hash process on the modified file will produce a different alphanumeric. Through this method, a trusted source can calculate the hash of an original data file and subscribers can verify the integrity of the data. The subscriber simply compares a hash of the received data file with the known hash from the trusted source. This can lead to two situations: the hash being the same or the hash being different. If the hash results are the same, the systems involved can have an appropriate degree of confidence to the integrity of the received data. On the other hand, if the hash results are different, they can conclude that the received data file has been altered. This process is common in P2P networks, for example the BitTorrent protocol. Once a part of the file is downloaded, the data is then checked against the hash key (known as a hash check). Upon this result, the data is kept or discarded. Digital watermarking Digital watermarking is distinctly different from data hashing. It is the process of altering the original data file, allowing for the subsequent recovery of embedded auxiliary data referred to as a watermark. A subscriber, with knowledge of the watermark and how it is recovered, can determine (to a certain extent) whether significant changes have occurred within the data file. Depending on the specific method used, recovery of the embedded auxiliary data can be robust to post-processing (such as lossy compression). If the data file to be retrieved is an image, the provider can embed a watermark for protection purposes. The process allows tolerance to some change, while still maintaining an association with the original image file. Researchers have also developed techniques that embed components of the image within the image. This can help identify portions of the image that may contain unauthorized changes and even help in recovering some of the lost data. A disadvantage of digital watermarking is that a subscriber cannot significantly alter some files without sacrificing the quality or utility of the data. This can be true of various files including image data, audio data, and computer code. See also Steganography External links The Digital Watermarking Alliance - Furthering the Adoption of Digital Watermarking Open Platform for testing digital watermarking systems Authentication methods Watermarking cs:Vodoznak (watermark)
https://en.wikipedia.org/wiki/Meta%20Data%20Services
Meta Data Services was an object-oriented repository technology that could be integrated with enterprise information systems or with applications that process metadata. Meta Data Services was originally named the Microsoft Repository and was delivered as part of Visual Basic 5 in 1997. The original intent was to provide an extensible programmatic interface via Microsoft's OLE automation to metadata describing software artifacts and to facilitate metadata interchange between software tools from multiple vendors. The Repository became part of SQL Server 7 and a number of SQL Server tools took dependencies on the Repository, especially the OLAP features. In 1998, Microsoft joined the Meta Data Coalition and transferred management of the underlying Open Information Model (OIM) of the Repository to the standards body. The Repository was renamed Meta Data Services with the release of SQL Server 2000. Support for Meta Data Services was withdrawn from support with the release of SQL Server 2005. A number of Microsoft technologies used Meta Data Services as a native store for object definitions or as a platform for deploying metadata. One of the ways in which Microsoft SQL Server 2000 used Meta Data Services was to store versioned DTS Packages. In Microsoft Visual Studio Meta Data Services supported the exchange of model data with other development tools. Users could use Meta Data Services for their own purposes: as a component of an integrated information system, as a native store for custom applications that process metadata, or as a storage and management service for sharing reusable models. Users could also extend Meta Data Services to provide support for new tools for resale or customize it to satisfy internal tool requirements. References External links Download page of Microsoft Meta Data Services SDK Metadata Microsoft server technology
https://en.wikipedia.org/wiki/Max%20Long
Max Long is the name of: Max Freedom Long (1890–1971), American teacher and philosopher Maxie Long (1878–1959), American athlete and Olympic medalist In computer science, the term max long may also refer to the maximum value that can be represented by a long integer data type.
https://en.wikipedia.org/wiki/IP%20address%20management
IP address management (IPAM) is a methodology implemented in computer software for planning and managing the assignment and use of IP addresses and closely related resources of a computer network. It does not typically provide Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) services, but manages information for these components. Additional functionality, such as controlling reservations in DHCP and other data aggregation and reporting capabilities, is also common. Data tracked by an IPAM system may include information such as IP addresses in use, and the associated devices and users. Centralized collection of this information may support troubleshooting and abuse investigations. IPAM tools are increasingly important as new IPv6 networks are deployed with large address pools of 128-bit hexadecimal numbers and new subnetting techniques. References External links IP Address Management as a Service on the Cloud. Domain Name System
https://en.wikipedia.org/wiki/Pocket%20Change
Pocket Change may refer to: Pocket Change (band), a Christian punk band from the United States Pocket Change (arcade), a chain of video arcades owned by Namco Cybertainment Pocket Change (The Price Is Right), a segment game from the television game show The Price Is Right "Pocket Change", a song by Alabama Shakes from their 2012 album Boys & Girls See also Pocket Money
https://en.wikipedia.org/wiki/Ryan%20Spilborghs
Ryan Adam Rene Jean Spilborghs (born September 5, 1979) is an American baseball broadcaster for AT&T SportsNet Rocky Mountain & SiriusXM's MLB Network Radio, and a former professional baseball outfielder. He played in Major League Baseball (MLB) for the Colorado Rockies and in Nippon Professional Baseball (NPB) for the Saitama Seibu Lions. Baseball career College Spilborghs played college ball at the University of California, Santa Barbara, where he was all Big West Conference in 2001. He also played for the Madison Mallards during the summer of 2001. Colorado Rockies Spilborghs was drafted by the Colorado Rockies in the 7th round of the 2002 MLB Draft. Between 2002 and 2005, he played for the Tri-City Dust Devils, Asheville Tourists, Visalia Oaks, and Tulsa Drillers. He made his Major League debut for the Rockies on July 16, 2005 against the Cincinnati Reds and recorded his first hit in that game, a single to right field off of Todd Coffey. That was the only game he played in for the Rockies that year, spending the rest of the year in AAA with the Colorado Springs Sky Sox, where he hit .338 in 68 games. He rejoined the Rockies in 2006 and hit his first home run on May 29 off of Jim Brower of the San Diego Padres. He began the 2007 season at Triple-A with the Sky Sox, after being beaten out for a roster spot by veteran Steve Finley. After Finley was released by the Rockies, Spilborghs returned to the team. In 2008, he made the team from spring training, serving as the fourth outfielder. On August 24, 2009, in the 14th inning against the San Francisco Giants with the Rockies down 4–2, Spilborghs homered off pitcher Merkin Valdéz for the first walk-off grand slam in Rockies history. This solo Rockies record was held for over 11 years until Charlie Blackmon, also wearing jersey number 19, hit a walk-off grand slam against the Los Angeles Angels on September 11, 2020. On December 12, 2011, Spilborghs was non-tendered by the Rockies and became a free agent. Cleveland Indians Spilborghs signed a minor league contract with the Cleveland Indians on January 20, 2012. He also received an invitation to spring training. He failed to make the team and was assigned to the AAA Columbus Clippers, where he hit .250 in 21 games. Texas Rangers On May 4, 2012, Spilborghs was traded to the Texas Rangers organization for cash considerations and played for the Triple-A Round Rock Express. In 103 games with Round Rock, he hit .295. Saitama Seibu Lions On December 6, 2012 he agreed to a one-year contract with the Saitama Seibu Lions of the Japanese Pacific League. Broadcasting On February 6, 2014, it was announced that Spilborghs had joined the Root Sports Rocky Mountain broadcasting team, where his primary role is sideline reporting during games; however he occasionally provides in booth color commentary. He is an analyst for Rockies pregame and postgame shows, as well as for other programs on the network. Spilborghs currently co-hosts (with CJ Nitkowski) the
https://en.wikipedia.org/wiki/Eclipse%20Trilogy
The Eclipse Trilogy (also referred to as A Song Called Youth trilogy) is a series of three English language cyberpunk science fiction novels by John Shirley consisting of Eclipse (1985), Eclipse Penumbra (1988), and Eclipse Corona (1990). The books depict a dystopian future, set in a hypothetical mid 21st century where a new Russian Soviet has invaded Western Europe, causing massive disruption and destruction. Their armies were only repelled by the (unseen) use of tactical nuclear weapons, resulting in a stalemate, somewhat like the middle years of World War I. The New Soviet—more oligarchic than communist—has been stymied. But now Europe is in chaos, the USA is in crisis. To keep order and free up troops for actual fighting, NATO has contracted with the Second Alliance Security Corporation (SA), a right-wing, private security company of mercenaries, an anticipation of Blackwater-style privatization of the military. Second Alliance is part of a hidden (fascist) agenda unbeknownst to most of those who hired them. The heroes of the series are the New Resistance, who are fighting to expose and defeat the SA's racist policies and the neofascist attempt to grab power. The scope of the story is worldwide, but the main action mostly takes place in Europe, on a small Caribbean island and on humanity's first space colony. On the book jacket of the 2012 re-release, William Gibson calls Shirley "cyberpunk's patient zero", and Bruce Sterling calls the trilogy "a complex, bizarre, and unique vision of the near future, with a kaleidoscopic mix of politics, pop, and paranoia." An of the trilogy has been released by Dover Books, starting with A Song Called Youth: Eclipse, in October 2017. All three books are out now, from Dover, and still in print. Characters "Smiling" Rick Crandall is the leader of the SA is a charismatic American preacher/televangelist Steinfeld is the leader of the New Resistance (NR), a former Mossad agent Jack "Smoke" Brendon is a former professor, the public face of the NR. He is the first character we meet, disillusioned and living in a bombed out Amsterdam Dan "Hard-Eyes" Torrence is the NR's best fighter Claire Rimpler is the protected daughter of the man who runs the space colony, FirStep Technologies and advances Various technologies and societal changes are employed in this fictional world, and help define it while also anticipating the future through extrapolation and/or speculation. Among these are: Extraction is a tactic used by both sides in the war. The term is applied to both the process of removing memories from an enemy to find out secrets and the process of implanting other memories that can go as far as altering one's identity and changing one's allegiance. Orbiting space colony - FirStep has its own gravity and a vulnerable environment that plays a key role in the action of the trilogy. Removable mind implants - Characters exchange mind implants and otherwise interface with them. These removable implants (like
https://en.wikipedia.org/wiki/The%20Fourth%20Network
The Fourth Network: How Fox Broke the Rules and Reinvented Television () is a non-fiction book about the history of the Fox television network. It was written by Daniel M. Kimmel and published in 2004. The Fourth Network details the history of Fox up until the 1999-2000 broadcast season, with events happening afterward included in an epilogue. Many times throughout the book Kimmel makes a point of how Fox, during its first 20 years of existence, radically changed the standards by which network television stations in America operate, such as putting an emphasis on looking at demographics in show ratings as opposed to overall viewership, and working with cable television suppliers in order to attain a broader audience. While much of the book, which is laden with interviews of former network executives, deals with the network's prime time programming, some material is left to the network's other endeavors, both successful and unsuccessful, such as Fox's stunning acquisition of the rights to NFL games, the start-up of the Fox Kids Saturday morning cartoon block, as well Fox's failed attempts at a morning show and late-night talk shows. Reception In 2005, the book won the Goddard Book Award from the Cable Center for best book of 2004. Publishers Weekly called the book "a solid but rather dry account of the birth of a network and its impact on TV". See also Fourth television network References 2004 non-fiction books Books about television Fox Broadcasting Company English-language books
https://en.wikipedia.org/wiki/Toronto%20Internet%20Exchange
The Toronto Internet Exchange Community (TorIX) is a not-for-profit Internet Exchange Point (IXP) located in a carrier hotel at 151 Front Street West, Equinix's TR2 data centre at 45 Parliament Street and 905 King Street West in Toronto, Ontario, Canada. , TorIX has 259 unique autonomous systems representing 285 peer connections and peak traffic rates of 1.344 Tbps, making it the largest IXP in Canada. According to Wikipedia's List of Internet Exchange Points by Size, TorIX is the 16th largest IXP in the world in numbers of peers, and 17th in the world in traffic averages. The Exchange is organized and run by industry professionals in voluntary capacity. Within 151 Front Street, TorIX is accessible within facilities operated by Equinix, Cologix, Neutral Data Centres and Frontier Networks, or available via the building's meet-me-room (MMR), which makes the IX reachable by any organization with a presence in the building. At Equinix TR2, TorIX is available to all organizations present there. At 905 King Street West, TorIX is accessible via the building meet-me-room. History TorIX initially started by Bill Campbell and Jason Lixfeld in 1997 the RACO facility in suite 604 at 151 Front Street West. In 2003, the exchange began offering gigabit Ethernet. In 2008, the Exchange began offering 10GE ports. In 2015, 100GE ports began to be offered. Architecture The exchange is Ethernet-based and currently operates Cisco Nexus switches 9000 series switches. Core nodes handle port speeds of GigabitEthernet, 10 Gigabit Ethernet and 100 Gigabit Ethernet, including bonded configurations. Peers connect to the Layer 2 fabric using IPv4 & IPv6 addresses provided by TorIX to communicate with each other using the BGP routing protocol. Single-mode fiber is the only physical connection media supported. Route-Servers The Exchange also offers two BGP Route-Servers, which allow peers to exchange prefixes with each other while minimizing the number of direct BGP peering sessions configured on their routers. Participation is voluntary, with approximately 85 percent of the membership using the free service. Strict prefix filtering to prevent unintentional announcements of IP address blocks to other participants. The exchange allows participants the option of eliminating the TorIX ASN from the AS path of prefixes received via the route-servers. This can substantially increase the utility of the route-servers for participants, but should only be undertaken after careful consideration. In addition, TorIX participants will have a range of BGP communities that can be used for traffic engineering purposes. Portal The Exchange operates a members-only portal that allows peers to publish their peering policies, contact other members with peering requests, configure route-server access and options, track traffic usage, etc. Community Projects TorIX will consider hosting Internet community projects that are of an interest to members of the Exchange or the wider Can
https://en.wikipedia.org/wiki/Nibble%20%28magazine%29
Nibble was a magazine for Apple II personal computer enthusiasts published from 1980 until 1992. The name means "half a byte" or "four bits." The proper spelling for a half-byte is "nybble", riffing off of the term "byte". Most of the articles incorporated the source code of a small to medium-sized utility, application program, or game (each written specifically for the magazine) and a detailed description of how it worked. The headquarters was in Lincoln, Massachusetts. History The magazine was first published in January 1980 by Mike Harvey. Originally published eight times per year, by 1984 the magazine had attained a popularity that allowed it to become a monthly publication. It was published for more than twelve years; the July 1992 issue was the last. The magazine also published checksum tables that, with utilities available from the magazine, helped pinpoint the location of any errors in a reader's own typed-in copy. The programs were also available on disk for a small fee for those who did not want to spend the time to type them in. A technical highlight of Nibble was a regular column called Disassembly Lines, in which Dr. Sanford Mossberg presented assembly listings he had reverse-engineered from interesting parts of Applesoft BASIC and the DOS to illustrate how they worked. Later Mossberg turned his attention to the Apple IIGS and dissected its Toolbox and operating system as well. Omnibus editions of the best articles from each year's issues, dubbed Nibble Express, were published annually. The magazine also published other books that repurposed magazine material on various topics, such as games, personal finance programs, and "Apple secrets." Mossberg's Disassembly Lines columns were also collected in four volumes. Harvey's publishing company, MicroSPARC (later MindCraft), published a number of Apple II programming utilities including an assembler and a BASIC-like set of macros for it. These were sold by mail-order from ads in the magazine. (Trivia: the company changed its name after Sun Microsystems bought the name MicroSPARC for a new line of processors.) A spinoff Macintosh publication, Nibble Mac, was first a section in Nibble and then was published separately. Like the original, Nibble Mac focused on hobbyist programming, notably HyperCard. Most of the Nibble material, including Nibble Mac, is now available again from the publisher through his Web site. References External links Official site Monthly magazines published in the United States Apple II periodicals Defunct computer magazines published in the United States Home computer magazines Magazines established in 1980 Magazines disestablished in 1992 Magazines published in Massachusetts Eight times annually magazines published in the United States
https://en.wikipedia.org/wiki/Diatrizoate
Diatrizoate, also known as amidotrizoate, Gastrografin, is a contrast agent used during X-ray imaging. This includes visualizing veins, the urinary system, spleen, and joints, as well as computer tomography (CT scan). It is given by mouth, injection into a vein, injection into the bladder, through a nasogastric tube, or rectally. Relatively common side effects include vomiting, diarrhea, and skin redness. Other side effects include itchiness, kidney problems, low blood pressure, and allergic reactions. It is not recommended in people who have an iodine allergy. Diatrizoate is an iodinated ionic radiocontrast agent with high osmolality. Diatrizoate was approved for medical use in the United States in 1954. It is on the World Health Organization's List of Essential Medicines. Medical uses Diatrizoic acid may be used as an alternative to barium sulfate for medical imaging of the gastrointestinal tract, such as upper gastrointestinal series and small bowel series. It is indicated for use in patients who are allergic to barium, or in cases where the barium might leak into the abdominal cavity. It does not coat the stomach/bowel lining as well as barium, so it is not used commonly for this purpose. It is also used to treat Ascaris lumbricoides (roundworms). Diatrizoate may not actually kill Ascaris, but instead it promotes , so may relieve intestinal obstruction caused by impacted Ascaris. Diatrizoate is used in suspected intestinal perforation, meconium ileus, and to identify bowel-lumen communication. It should not be used to investigate tracheo-oesophageal fistula because it can cause pulmonary oedema when aspirated into respiratory system. Diatrizoate can dislodge sticky meconium by drawing water into intestines. Diatrizoate is minimally absorbed from the intestines and excreted into urinary bladder. Because of its high osmolarity it can draw water from the surrounding tissues into the intestines, thus cause dehydration in people with already small plasma volume such as infants. Because of the additives and flavouring agents, diatrizoate must not be used intravascularly. This chemical must be keep away from sunlight during storage. Administration It is given orally on computed tomography of the abdomen and pelvis as 30 ml solution with 3% concentration to visualise the bowel lumen and any communications with the bowel lumen. In principle, diatrizoic acid is administered by the route most appropriate and sensible to image the structure/-s of interest (e.g., IV for blood vessels through which it is distributed and kidney–ureters–bladder that excrete it; orally or per rectally as an enema for the gastrointestinal tract). It is given orally or by enema to image the gastrointestinal tract. It is given by Foley catheter to image the urinary tract. Contraindications A history of sensitivity to iodine is not a contraindication to using diatrizoate, although it suggests caution in use of the agent. In this case, a regimen of oral or intravenous co
https://en.wikipedia.org/wiki/Beryllium%20oxide%20%28data%20page%29
This page provides supplementary chemical data on beryllium oxide. Material Safety Data Sheet Beryllium Oxide MSDS from American Beryllia Structure and properties Thermodynamic properties Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/List%20of%20The%20O.C.%20episodes
The O.C. is an American teen drama television series created by Josh Schwartz. It premiered on Fox, an American television network, on August 5, 2003, with the pilot episode "Premiere". The O.C. is set in Newport Beach, Orange County, California and follows the stories of residents in the wealthy, harbor-front community. The series mainly focuses around the Cohen and Cooper families, and the Cohen's adoption of Ryan Atwood, a troubled teenager from Chino, California. The show ran until February 22, 2007, with ninety-two episodes split over four seasons. The first season consisted of twenty-seven episodes, the second season was twenty-four episodes long and preceded by two specials that gave a retrospective look at season one, and previewed the upcoming second season. Season three was twenty-five episodes long, but only sixteen episodes were ordered for the final fourth season as falling ratings led to the show's cancellation. All four seasons are available on DVD in Regions 1, 2 and 4. Additionally, The O.C. The Complete Series was released on November 27, 2007, in Canada and the United States, which included the first season remastered in widescreen. The complete series was also released as a Region 2 DVD on November 19, 2007, but did not include the remastered version of the first season. For registered members of the US iTunes Store, all four seasons are available for purchase and download. These seasons are also available in the US as video on demand from Amazon Video. In October 2008 the first and second seasons were made available on the United Kingdom iTunes Store. In the United States, the fourth season was also made available in the Zune. Series overview Episodes Season 1 (2003–04) Season 2 (2004–05) Season 3 (2005–06) Season 4 (2006–07) Ratings Specials Two special episodes, not part of the official continuity, were produced to complement the second season and were broadcast on Fox in the weeks leading up to the season premiere. The first documents the show's impact on popular culture, and the second provides "a day in the life" of the show. References General "Backstage Pass: Episode Guide". The OC Insider. Warner Bros. Entertainment Inc. Retrieved on 2008-11-26. Specific External links Lists of American teen drama television series episodes it:The O.C.#Episodi
https://en.wikipedia.org/wiki/Bismuth%28III%29%20oxide%20%28data%20page%29
This page provides supplementary chemical data on bismuth(III) oxide. Material Safety Data Sheet MSDS from Fischer Scientific Structure and properties Thermodynamic properties Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/Space%20Rangers%202%3A%20Dominators
Space Rangers 2: Dominators (Russian: Космические рейнджеры 2: Доминаторы), released in North America with the subtitle Rise of the Dominators, is a multi-genre science fiction computer game developed by Elemental Games for Windows and first published in 2004 by 1C Company. The player takes the role of a spaceship pilot, and may explore, trade, engage in space and ground-based combat, and undertake various types of missions. Space Rangers 2 is the sequel to the 2002 computer game Space Rangers. Setting Space Rangers 2 is set in the year 3300. Sentient combat robots known as Dominators are attacking the five civilizations of the Coalition: the humans, the Maloqs, the Pelengs, the Faeyans, and the Gaalians. There are three Dominator types, each at war with each other: the Blazeroids, the Kelleroids, and the Terronoids. The player begins the game as a trainee member of the Space Rangers – a corps of pilots charged with defending the galaxy from the Dominators. Gameplay Space Rangers 2 is a hybrid game with multiple game types of gameplay. Players explore a randomly generated galaxy, with each sector featuring multiple stars and planets. This leads to a universe with hundreds of planets, each with their own economy, government, and opinion of the player. The main goal of the game is to defeat the three command units of the titular Dominators, though the game allows the player to ignore the main quest in favor of exploration, trade, and other sidequests. The Dominators are much more powerful than the player at the start of the game, forcing the player to evade them, while pursuing smaller jobs to gain wealth, equipment, and experience. The game's multiple systems are compared to other multi-genre games such as Pirates! or Star Control II. The player begins by selecting an alien race and a profession, and is dropped into a dynamic open universe to explore. Space travel is seen from a top-down viewpoint, with movement utilizing a turn-based system measured in solar days. The game also includes a 3D real-time strategy engine for planetary battles, where the player can take control of any unit to shift gameplay to that of a third-person shooter. The player can also pursue enemies into space, playing an arcade-style shooter mode, where players use the keyboard to maneuver and fire in an action sequence. Players can also survey planets for valuables by launching probes, with some planets triggering text-based quests similar to text adventure games. The planet encounters can initiate several types of missions, such as hunting pirates, delivering contraband goods, or performing a covert operation against another alien race. The player can perform these missions to earn wealth, to buy bigger ships, improved weapons and equipment, or even maps that unlock new sectors of the galaxy. Players can also earn wealth through a trading system, with the markets for goods changing dynamically due to supply and demand. It is also possible to earn wealth through piracy
https://en.wikipedia.org/wiki/IOS%20%28disambiguation%29
iOS is a mobile operating system developed by Apple Inc. IOS or ios may also refer to: Technology Instructor operating station, in flight simulators International operator services, making an international call via a live telephone operator Computing Cisco IOS, router and switch operating system Cisco IOS XE Cisco IOS XR ios (C++), a C++ header file ("input/output stream") I/O System (86-DOS), DOS BIOS in 86-DOS I/O System (MS-DOS), DOS BIOS in MS-DOS Input/Output Supervisor, a part of the control program in the IBM mainframe OS/360 operating system and its successors IOS (Wii firmware), firmware that runs on the Nintendo Wii used with Wii homebrew Internet operating system, any operating system designed to run all of its applications and services through an Internet client, generally a web browser Interorganizational system, a system between organization Organizations Illinois Ornithological Society, American state-based bird club Institute for Objectivist Studies, the former name of The Atlas Society Institute of Oriental Studies of the Russian Academy of Sciences International Organizations for Succulent Plant Research, in Zürich, Switzerland Interorbital Systems, an aerospace design firm in Mojave, California, US Investors Overseas Service, an investment company Places Ios, a Greek island Ilhéus Jorge Amado Airport (IATA airport code), Ilhéus, Brazil Media IOS Press, a Dutch scientific and medical publisher Independent on Sunday, a UK newspaper Ireland on Sunday, an Irish newspaper published from 1996 to 2006 Other uses International Open Series, an amateur snooker tour See also eyeOS I/O System (disambiguation) IO (disambiguation) Input/Output Control System (IOCS) BIOS (disambiguation) XIOS, Extended Input/Output System
https://en.wikipedia.org/wiki/Software%20factory
A software factory is a structured collection of related software assets that aids in producing computer software applications or software components according to specific, externally defined end-user requirements through an assembly process. A software factory applies manufacturing techniques and principles to software development to mimic the benefits of traditional manufacturing. Software factories are generally involved with outsourced software creation. Description In software engineering and enterprise software architecture, a software factory is a software product line that configures extensive tools, processes, and content using a template based on a schema to automate the development and maintenance of variants of an archetypical product by adapting, assembling, and configuring framework-based components. Since coding requires a software engineer (or the parallel in traditional manufacturing, a skilled craftsman) it is eliminated from the process at the application layer, and the software is created by assembling predefined components instead of using traditional IDEs. Traditional coding is left only for creating new components or services. As with traditional manufacturing, the engineering is left to creation of the components and the requirements gathering for the system. The end result of manufacturing in a software factory is a composite application. Purpose Software factory–based application development addresses the problem of traditional application development where applications are developed and delivered without taking advantage of the knowledge gained and the assets produced from developing similar applications. Many approaches, such as training, documentation, and frameworks, are used to address this problem; however, using these approaches to consistently apply the valuable knowledge previously gained during development of multiple applications can be an inefficient and error-prone process. Software factories address this problem by encoding proven practices for developing a specific style of application within a package of integrated guidance that is easy for project teams to adopt. Developing applications using a suitable software factory can provide many benefits, such as improved productivity, quality and evolution capability. Components Software factories are unique and therefore contain a unique set of assets designed to help build a specific type of application. In general, most software factories contain interrelated assets of the following types: Factory Schema: A document that categorizes and summarizes the assets used to build and maintain a system (such as XML documents, models, etc.) in an orderly way, and defines relationships between them. Reference implementation: Provides an example of a realistic, finished product that the software factory helps developers build. Architecture guidance and patterns: Help explain application design choices and the motivation for those choices. How-to topics: Provid
https://en.wikipedia.org/wiki/Goal%20programming
Goal programming is a branch of multiobjective optimization, which in turn is a branch of multi-criteria decision analysis (MCDA). It can be thought of as an extension or generalisation of linear programming to handle multiple, normally conflicting objective measures. Each of these measures is given a goal or target value to be achieved. Deviations are measured from these goals both above and below the target. Unwanted deviations from this set of target values are then minimised in an achievement function. This can be a vector or a weighted sum dependent on the goal programming variant used. As satisfaction of the target is deemed to satisfy the decision maker(s), an underlying satisficing philosophy is assumed. Goal programming is used to perform three types of analysis: Determine the required resources to achieve a desired set of objectives. Determine the degree of attainment of the goals with the available resources. Providing the best satisfying solution under a varying amount of resources and priorities of the goals. History Goal programming was first used by Charnes, Cooper and Ferguson in 1955, although the actual name first appeared in a 1961 text by Charnes and Cooper. Seminal works by Lee, Ignizio, Ignizio and Cavalier, and Romero followed. Schniederjans gives in a bibliography of a large number of pre-1995 articles relating to goal programming, and Jones and Tamiz give an annotated bibliography of the period 1990-2000. A recent textbook by Jones and Tamiz . gives a comprehensive overview of the state-of-the-art in goal programming. The first engineering application of goal programming, due to Ignizio in 1962, was the design and placement of the antennas employed on the second stage of the Saturn V. This was used to launch the Apollo space capsule that landed the first men on the moon. Variants The initial goal programming formulations ordered the unwanted deviations into a number of priority levels, with the minimisation of a deviation in a higher priority level being infinitely more important than any deviations in lower priority levels. This is known as lexicographic or pre-emptive goal programming. Ignizio gives an algorithm showing how a lexicographic goal programme can be solved as a series of linear programmes. Lexicographic goal programming is used when there exists a clear priority ordering amongst the goals to be achieved. If the decision maker is more interested in direct comparisons of the objectives then weighted or non-pre-emptive goal programming should be used. In this case, all the unwanted deviations are multiplied by weights, reflecting their relative importance, and added together as a single sum to form the achievement function. Deviations measured in different units cannot be summed directly due to the phenomenon of incommensurability. Hence each unwanted deviation is multiplied by a normalisation constant to allow direct comparison. Popular choices for normalisation constants are the goal target value
https://en.wikipedia.org/wiki/Sadmind
The Sadmind worm was a computer worm which exploited vulnerabilities in both Sun Microsystems' Solaris (Security Bulletin 00191) and Microsoft's Internet Information Services (MS00-078), for which a patch had been made available seven months earlier. It was discovered on May 8, 2001. fuck USA Governmentfuck PoizonBOxcontact:@yahoo.com.cn Message displayed on sites altered by Sadmind worm. The worm defaced web servers with a message against the United States government and the anti-Chinese cracking group PoizonBOx. Systems affected by version Microsoft (IIS): Version 4.0 Version 5.0 Sun Microsystems (Solaris): Version 2.3 Version 2.4 See also Timeline of computer viruses and worms Comparison of computer viruses Computer viruses References External links CERT Advisory CA-2001-11 CERT Vulnerability Note VU#28934 Symantec Rates Sadmind/IIS Worm a One In Severity - Risk Impact of Security Vulnerability Resulting From Worm Exploit Rated as High Solaris Worm Attacks IIS Servers Exploit-based worms
https://en.wikipedia.org/wiki/Ingress%20filtering
In computer networking, ingress filtering is a technique used to ensure that incoming packets are actually from the networks from which they claim to originate. This can be used as a countermeasure against various spoofing attacks where the attacker's packets contain fake IP addresses. Spoofing is often used in denial-of-service attacks, and mitigating these is a primary application of ingress filtering. Problem Networks receive packets from other networks. Normally a packet will contain the IP address of the computer that originally sent it. This allows devices in the receiving network to know where it came from, allowing a reply to be routed back (amongst other things), except when IP addresses are used through a proxy or a spoofed IP address, which does not pinpoint a specific user within that pool of users. A sender IP address can be faked (spoofed), characterizing a spoofing attack. This disguises the origin of packets sent, for example in a denial-of-service attack. The same holds true for proxies, although in a different manner than IP spoofing. Potential solutions One potential solution involves implementing the use of intermediate Internet gateways (i.e., those servers connecting disparate networks along the path followed by any given packet) filtering or denying any packet deemed to be illegitimate. The gateway processing the packet might simply ignore the packet completely, or where possible, it might send a packet back to the sender relaying a message that the illegitimate packet has been denied. Host intrusion prevention systems (HIPS) are one example of technical engineering applications that help to identify, prevent and/or deter unwanted, unsuspected or suspicious events and intrusions. Any router that implements ingress filtering checks the source IP field of IP packets it receives and drops packets if the packets don't have an IP address in the IP address block to which the interface is connected. This may not be possible if the end host is multi-homed and also sends transit network traffic. In ingress filtering, packets coming into the network are filtered if the network sending it should not send packets from the originating IP address(es). If the end host is a stub network or host, the router needs to filter all IP packets that have, as the source IP, private addresses (RFC 1918), bogon addresses or addresses that do not have the same network address as the interface. Networks Network ingress filtering is a packet filtering technique used by many Internet service providers to try to prevent IP address spoofing of Internet traffic, and thus indirectly combat various types of net abuse by making Internet traffic traceable to its source. Network ingress filtering makes it much easier to track denial-of-service attacks to their source(s) so they can be fixed. Network ingress filtering is a good neighbor policy that relies on cooperation between ISPs for their mutual benefit. The best current practices for network in
https://en.wikipedia.org/wiki/Dichotomic%20search
In computer science, a dichotomic search is a search algorithm that operates by selecting between two distinct alternatives (dichotomies) at each step. It is a specific type of divide and conquer algorithm. A well-known example is binary search. Abstractly, a dichotomic search can be viewed as following edges of an implicit binary tree structure until it reaches a leaf (a goal or final state). This creates a theoretical tradeoff between the number of possible states and the running time: given k comparisons, the algorithm can only reach O(2k) possible states and/or possible goals. Some dichotomic searches only have results at the leaves of the tree, such as the Huffman tree used in Huffman coding, or the implicit classification tree used in Twenty Questions. Other dichotomic searches also have results in at least some internal nodes of the tree, such as a dichotomic search table for Morse code. There is thus some looseness in the definition. Though there may indeed be only two paths from any node, there are thus three possibilities at each step: choose one onwards path or the other, ''or' stop at this node. Dichotomic searches are often used in repair manuals, sometimes graphically illustrated with a flowchart similar to a fault tree. See also Binary search algorithm References xlinux.nist.gov, Dictionary of Algorithms and Data Structures: Dichotomic search National Institute of Standards and Technology, Dictionary of Algorithms and Data Structures: Dichotomic search External links Python Program for Binary Search (Recursive and Iterative) Binary Search Search algorithms
https://en.wikipedia.org/wiki/Compupress
Compupress is a Greek publishing company formed in 1982. Originally the company was formed in order to publish computer magazines and books. Following the decline of the computer magazine market, the company expanded to publish fantasy and science fiction, comic books and graphic novels, manga and children's magazines. Computer magazines Compupress published the first Greek computer magazine: Computers For All () - which celebrated its 300th issue in August 2009. In the past the magazine has licensed material from the well-known British magazines Personal Computer World, PC Plus and PC Answers. Having already migrated as an e-magazine to the iPad as well as the Adobe Digital Editions platforms in 2012, the magazine published its final paper issue (#344) in May 2013. The company also published Pixel, a Greek language home computing magazine during the era of the 8/16-bit micros (Sinclair ZX81, ZX Spectrum, VIC-20, Commodore 64, Amstrad CPC, Atari ST, Amiga etc.). Pixel was one of the few Greek magazines to have a whole section dedicated to type-in programs. Pixel helped initiate a large number of young Greeks to the computer revolution of the 1980s. In September 1989, Compupress launched PC Master - similar to Pixel but with a focus on IBM Compatible computing. In 2007, the company launched Update an annual Business Software Guide aimed at the professional. Computer Fairs During the 1980s and 90s, the company organised a number of Consumer Fairs and Trade Shows related to computer technology. Among the various shows the company organised through the 1980s and 1990s, most prominent were the following: The Computer Show The DeskTop Publishing Show The CAD/CAM Show The Multimedia Show The Internet Show Book Publishing Since the early 1980s, Compupress had sporadically published a number of computer books, however in 1991, the company decided to launch a branch dedicated solely to this function. Thus was Anubis Publishing formed. In addition to Greek translations of previously written books, Anubis also publishes original works. Anubis has published more than 200 computer books and has diversified into business book publishing. Since the 2000s, Anubis has been publishing translations of well-known science-fiction and fantasy books. Television In 1991, Compupress made a deal with ERT (Ellinikí Radiofonía Tileórasi), the Greek National TV (at that time the only existing set of channels, given that there was still no private TV in Greece), through which it acquired the right to produce two 13-episode TV Shows promoting the use of computers and new technology. The first show, (Computers: Tools of the Year 2000) would deal with computers in the office and in everyday life while the second, (The Computer Show) would deal with computer games. Both shows would be fully financed by Compupress which would recuperate the costs by finding the required sponsors amongst the local computer companies. In 2008, celebrating 25 years of publishing "Comput
https://en.wikipedia.org/wiki/Don%20Stark
Donald Martin Stark (born July 5, 1954) is an American actor known for his role as Bob Pinciotti on the Fox Network sitcom That '70s Show for all eight seasons (19982006) and fictional Los Angeles Devils owner Oscar Kinkade in VH1's Hit the Floor, Star Trek: First Contact (1996), and John Carter (2012). He also provided the voice of Vincent in Father of the Pride (2004–2005) and voiced Rhino in Spider-Man: The Animated Series (1995-1997). He is the proud of father of two daughters, Nicole and Samantha. Early life Stark was born in New York City. His father, Nathan Stark (1924–2008), was an actor. Don's mother, Harriet (1926–1993), was a homemaker. As a child, Stark and his family relocated to Los Angeles, California, settling in the San Fernando Valley. Stark graduated from Grover Cleveland High School in Reseda, California, in 1972. He played football for the school team, and he won leading roles in the theater arts department. He portrayed John in Dark of the Moon, Sky Masterson in Guys and Dolls, Tevye in Fiddler on the Roof, and, in an award-winning Shakespeare Festival scene, the title role in Othello. After high school, Stark attended California State University, Northridge, originally studying business before deciding to major in theater arts. Career Stark has an extensive background in dancing, bodybuilding and martial arts. Don is probably best recognized as Bob Pinciotti, the bumbling next-door neighbor of the Forman family and the father of Donna Pinciotti (Laura Prepon) on the FOX sitcom That '70s Show. Don's roles in movies include Switchblade Sisters (1975), Tilt (1979), Evilspeak (1981), Peggy Sue Got Married (1986) and The Couch Trip (1988), as well as a small role as a clerk in the comedy film Feds (1988). He has also been a guest on Curb Your Enthusiasm, and had a small role in the Star Trek film Star Trek: First Contact. He had a small role in an episode of Supernatural as a victim of a ghost that had been summoned by ritual to murder. He also guest starred on Viper, Disney Channel's Cory in the House, Stargate SG-1 and CSI. He had a supporting role in the 1996 television series Time Cop. In addition, he appeared in iCarly's movie: iGo to Japan as Freight Dog, the pilot who flies the gang over to Tokyo, Japan. Stark appears in the first episode of the 1987 TV series Beauty and the Beast as one of the attackers who puts Linda Hamilton's character "Catherine" in Central Park where the beast, or "Vincent", played by Ron Perlman, finds her and helps her, which begins the series. He appeared as David in the film My Name is Jerry. He appeared as the Prime Minister of Russia in the episode of Cory in the House, "Air Force One Too Many". He plays the boss, Stan, in the web series Corey & Lucas For the Win. He also provided his voice for Rhino in few episodes of Spider-Man: The Animated Series. One of his more recent appearances was as a mobster in the episode of Castle, "Murder He Wrote". He also had a small, uncredited role a
https://en.wikipedia.org/wiki/Evidence%20Eliminator
Evidence Eliminator is a computer software program that runs on Microsoft Windows operating systems at least through Windows 7. The program deletes hidden information from the user's hard drive that normal procedures may fail to delete. Such "cleaner" or "eraser" programs typically overwrite previously allocated disk space, in order to make it more difficult to salvage deleted information. In the absence of such overwrite procedures, information that a user thinks has been deleted may actually remain on the hard drive until that physical space is claimed for another use (i.e. to store another file). When it was offered for sale, the program cost between $20 early on to $150 later. History Evidence Eliminator was produced by Robin Hood Software, based in Nottingham, England, up to version 6.04. Controversy There has been controversy surrounding Evidence Eliminator's marketing tactics. The company has used popup ads to market the program, including claims that the user's system was being compromised. In response, Robin Hood Software produced a "dis-information page" addressing these concerns. Radsoft, a competitor to Robin Hood, criticised its operation. Legal On June 1, 2005, Peter Beale, one of the "Phoenix Four" used Evidence Eliminator to remove all trace of certain files from his PC the day after the appointment of DTI inspectors to investigate the collapse of MG Rover. In a 2011 case, MGA v. Mattel, a federal court found that a former employee used the program to delete information that he was accused of giving to MGA while employed at Mattel. References Windows security software Anti-forensic software
https://en.wikipedia.org/wiki/Hierarchical%20task%20network
In artificial intelligence, hierarchical task network (HTN) planning is an approach to automated planning in which the dependency among actions can be given in the form of hierarchically structured networks. Planning problems are specified in the hierarchical task network approach by providing a set of tasks, which can be: primitive (initial state) tasks, which roughly correspond to the actions of STRIPS; compound tasks (intermediate state), which can be seen as composed of a set of simpler tasks; goal tasks (goal state), which roughly corresponds to the goals of STRIPS, but are more general. A solution to an HTN problem is then an executable sequence of primitive tasks that can be obtained from the initial task network by decomposing compound tasks into their set of simpler tasks, and by inserting ordering constraints. A primitive task is an action that can be executed directly given the state in which it is executed supports its precondition. A compound task is a complex task composed of a partially ordered set of further tasks, which can either be primitive or abstract. A goal task is a task of satisfying a condition. The difference between primitive and other tasks is that the primitive actions can be directly executed. Compound and goal tasks both require a sequence of primitive actions to be performed; however, goal tasks are specified in terms of conditions that have to be made true, while compound tasks can only be specified in terms of other tasks via the task network outlined below. Constraints among tasks are expressed in the form of networks, called (hierarchical) task networks. A task network is a set of tasks and constraints among them. Such a network can be used as the precondition for another compound or goal task to be feasible. This way, one can express that a given task is feasible only if a set of other actions (those mentioned in the network) are done, and they are done in such a way that the constraints among them (specified by the network) are satisfied. One particular formalism for representing hierarchical task networks that has been fairly widely used is TAEMS. Some of the best-known domain-independent HTN-planning systems are: NOAH, Nets of Action Hierarchies. Nonlin, one of the first HTN planning systems. SIPE-2 O-Plan, Open Planning Architecture UMCP, the first probably sound and complete HTN planning systems. I-X/I-Plan SHOP2, a HTN-planner developed at University of Maryland, College Park. PANDA, a system designed for hybrid planning, an extension of HTN planning developed at Ulm University, Germany. HTNPlan-P, preference-based HTN planning. HTN planning is strictly more expressive than STRIPS, to the point of being undecidable in the general case. However, many syntactic restrictions of HTN planning are decidable, with known complexities ranging from NP-complete to 2-EXPSPACE-complete, and some HTN problems can be efficiently compiled into PDDL, a STRIPS-like language. See also STRIPS Hiera
https://en.wikipedia.org/wiki/Norkom
Norkom Technologies was a provider of financial services and anti-crime software, founded in Dublin in 1998. In November 2004, it signed an agreement to acquire Belgium-based risk management firm Data4s. In 2011, it was acquired by BAE Systems and merged into its subsidiary Detica (now BAE Systems Applied Intelligence). References External links Financial software companies Software companies of Ireland Companies based in Dublin (city) Companies established in 1998 BAE Systems subsidiaries and divisions
https://en.wikipedia.org/wiki/Local%20telephone%20service
Local telephone service is the provision of telecommunications networks and services within a limited geographic region. Traditionally, local telephone service was provided by small companies based in given cities and towns as opposed to larger, national or international companies. Telephone calls outside of the local area provided for by these companies were patched through long-distance networks that were, until de-regulation, operation mainly by AT&T. Some providers of local services were regional Bell operating companies, but not all local telephone companies were a regional Bell operating company or tied to one at the local level, especially after de-regulation of 1996. After de-regulation, these regional Bell operating companies continued providing the same technical services despite being under a different type of corporate structure. Many communities in the United States had local telephone companies and in rural areas, up until around the early 1980s (perhaps later in some cases) party lines were commonplace. The local telephone company was responsible for providing equipment and services to their customers in most cases although over time, as technology changed, so did the nature of the technical services thus provided. At one time telephones were leased from the local phone company rather than sold outright to customers. Many customers had rotary telephones that were leased prior to the 1980s. Despite the fact that the leasing system was not intended to promote this situation, customers in some cases ended up paying ten times the worth of their phones over the course of decades-long leases. Local telephone companies also provided PBX (Private Branch Exchange) services for local businesses that needed these switchboard and internal telecommunications services. Local telephone companies more recently become involved in providing Internet by DSL and dial-up services. Local telephone wires terminate at the central office (telephone exchange), a structure containing the hardware needed to switch calls among local lines and long-distance networks. Thus, when a call was placed by a customer outside the local calling area, the central office would switch the call to the respective long-distance network. As technology advanced, central offices offered more services and their technical abilities improved. Services such as Caller ID, call return call-waiting, three-way calling, and voice-mail were first offered via central office-based technology although later PBXs also provided them. The role of the local phone company includes serving a given community and interfacing with the large long-distance carriers. Prior to the advent of cell phones, most phone calls were made via landlines and local companies were thereby involved in some capacity in this communication. Deregulation and especially cell phones have reduced the need for local telephone services while Digital subscriber line Internet service and other services give local companies
https://en.wikipedia.org/wiki/Pdftotext
pdftotext is an open-source command-line utility for converting PDF files to plain text files—i.e. extracting text data from PDF-encapsulated files. It is freely available and included by default with many Linux distributions, and is also available for Windows as part of the Xpdf Windows port. Such text extraction is complicated as PDF files are internally built on page drawing primitives, meaning the boundaries between words and paragraphs often must be inferred based on their position on the page. pdftotext is part of the Xpdf software suite. Poppler, which is derived from Xpdf, also includes an implementation of pdftotext. On most Linux distributions, pdftotext is included as part of the poppler-utils package. See also List of PDF software References External links Free PDF software Linux text-related software
https://en.wikipedia.org/wiki/Astrology%20software
Astrology software is a type of computer programs designed to calculate horoscopes. Many of them also assemble interpretive text into narrative reports. History Astro Computing Services (ACS) in San Diego, founded by Neil Michelsen in 1973, published a computer-generated astrological ephemeris in 1976, The American Ephemeris. When personal computers generally became available, astrologers and astrology hobbyists were able to purchase them and use astrological or astronomical calculation software or make such programs themselves. Astrologer and computer programmer Michael Erlewine was involved early in making astrological software for microcomputers available to the general public in the late 1970s. In 1978, Erlewine founded Matrix Software, and in 1980 he published a book with all the algorithms and data required for owners of microcomputers to make their own complete astrological programs. At first, astrology software was opposed by American astrologers who did not approve of computers in their field. However, acceptance grew as it became clear how more efficient and profitable such software could be. A few hundred fixed-purpose astrology computers were made, one of which was used by Nancy Reagan's astrologer beginning in about 1981. Astrology software has been made available in the open-source model, starting with the release of Astrolog in 1991. Features Computer astrology programs today typically make accurate planet position calculations, display and print these positions using astrological glyph symbols in graphic charts, save and retrieve individuals' data to and from database files, compare the planet positions of different charts to find the astrological aspects between them (e.g. for compatibility), calculate the dates of important events in the future for a chart, and research the saved chart database. Some generate colorful geographical maps with lines showing where the planets rise and culminate at a significant time, usually the time of birth or the time of inception of an organization (called astrocartography). Astrology programs usually come bundled with an electronic atlas, allowing the review of the longitudes, latitudes, and time zone observance histories for cities and towns. Many assemble interpretive text about the various element combinations in a chart into comprehensive printed reports. See also Astrolog Planetarium software References Software Divination software and games
https://en.wikipedia.org/wiki/CMRI
CMRI may refer to: Children's Medical Research Institute, an Australian scientific research group Computer Model Railroad Interface Congregatio Mariae Reginae Immaculatae or Congregation of Mary Immaculate Queen, a sedevacantist Catholic religious congregation
https://en.wikipedia.org/wiki/Star%20count
Star counts are bookkeeping surveys of stars and the statistical and geometrical methods used to correct the survey data for bias. The surveys are most often made of nearby stars in the Milky Way galaxy. One of the interests of astronomy is to determine how many stars there are of each of several types that stars can be categorized into, and how these stars are distributed in space. Reasons for star counts When performing star counts, astronomers consider many different categories that have been created to classify a few stars that have been well studied. One of the hopes of studying the results of star counts is to discover new categories. Different counts typically seek to categorize stars for only a few of the qualities listed below, and determine how common each considered quality is and how stars of that kind are distributed. Temperature: In astronomy, temperature is usually shown using the letter codes O B A F G K M running from 'blue' (type O, actually bluish white) through white (type F) to 'red' (type M, actually ruddy orange). Types L and T are used for brown dwarfs, whose 'colors' are in the infrared. Size: Size is usually designated by Roman numerals I (supergiants) through V (dwarfs). Age: Stars are usually grouped into Population I (young) and Population II (old). Location: In the Milky Way galaxy the groups are described as thin disk, thick disk, central bulge, and halo. Multiplicity: Most stars are members of double star, or triple star, or even double-double star systems. Our own sun appears to be unusual for not having a companion star. There are many finer subdivisions in all of the above categories. Bias There are many unavoidable problems in counting stars for the purpose of getting an accurate picture of the distribution of stars in space. The effects of our point of view in the galaxy, the obscuring clouds of gas and dust in the galaxy, and especially the extreme range of inherent brightness, create a biased view of stars. Stars vary far more in intrinsic brightness than they do in distance. Our line of sight through the Milky Way is interrupted by great clouds of gas and dust, which block our view of stars more than a few thousand light-years away. The Sun is located in the disk of the Milky Way, in the northern edge of the thin disk and on the inner edge of a spiral arm called the Orion–Cygnus Arm. There is good reason to believe that stars in the galaxy's thin disk are different from thicker part of the disk, and from the bulge and the halo. Some stars are obviously more common in spiral arms than in the disk in between the arms. Knowing that these effects create bias, astronomers analyzing star counts attempt to find how much bias each effect has caused and then compensate for it as well as they can. Inherent luminosity complications The greatest problem biasing star counts is the extreme differences in inherent brightness of different sizes. Heavy, bright stars (both giants and blue dwarfs) are the mos
https://en.wikipedia.org/wiki/The%20Look%20for%20Less
The Look for Less is a television show airing on the Style Network. Previously hosted by Survivor: The Australian Outback contestant Elisabeth Hasselbeck, the current host is America's Next Top Model winner Yoanna House. House was one of twelve contestants on America's Next Top Model, Cycle Two. In most episodes, a person must shop with a fashion stylist to recreate a runway outfit with a set budget (ex: $150) in under an hour. External links The Look for Less Official Website - StyleNetwork.com The Look for Less Be On TV Application Fashion-themed reality television series English-language television shows Style Network original programming 2000s American reality television series 2001 American television series debuts 2002 American television series endings
https://en.wikipedia.org/wiki/Graham%E2%80%93Denning%20model
The Graham–Denning model is a computer security model that shows how subjects and objects should be securely created and deleted. It also addresses how to assign specific access rights. It is mainly used in access control mechanisms for distributed systems. There are three main parts to the model: A set of subjects, a set of objects, and a set of eight rules. A subject may be a process or a user that makes a request to access a resource. An object is the resource that a user or process wants to access. Features This model addresses the security issues associated with how to define a set of basic rights on how specific subjects can execute security functions on an object. The model has eight basic protection rules (actions) that outline: How to securely create an object. How to securely create a subject. How to securely delete an object. How to securely delete a subject. How to securely provide the read access right. How to securely provide the grant access right. How to securely provide the delete access right. How to securely provide the transfer access right. Moreover, each object has an owner that has special rights on it, and each subject has another subject (controller) that has special rights on it. The model is based on the Access Control Matrix model where rows correspond to subjects and columns correspond to objects and subjects, each element contains a set of rights between subject i and object j or between subject i and subject k. For example an action A[s,o] contains the rights that subject s has on object o (example: {own, execute}). When executing one of the 8 rules, for example creating an object, the matrix is changed: a new column is added for that object, and the subject that created it becomes its owner. Each rule is associated with a precondition, for example if subject x wants to delete object o, it must be its owner (A[x,o] contains the 'owner' right). Limitations Harrison-Ruzzo-Ullman extended this model by defining a system of protection based on commands made of primitive operations and conditions. See also Access Control Matrix Bell–LaPadula model Biba model Brewer and Nash model Clark-Wilson model Harrison–Ruzzo–Ullman model References Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003. Security in Computing (by Charles P. Pfleeger, Shari Lawrence Pfleeger) http://www.cs.ucr.edu/~brett/cs165_s01/LECTURE11/lecture11-4up.pdf Computer security models
https://en.wikipedia.org/wiki/Killer%20Instinct%20%28TV%20series%29
Killer Instinct is an American crime drama television series filmed in Vancouver that originally aired on the Fox Network. The pilot episode aired on September 23, 2005, and the final episode aired on December 2, 2005. Fox ordered 13 episodes, only nine of which were broadcast in the United States; the remaining four premiered in the UK on Five, then on Universal HD. The series has also been broadcast in France, New Zealand, Croatia, Italy, Netherlands, Australia, Japan, and Poland. Premise Johnny Messner plays Detective Jack Hale of the San Francisco Police Department. Hale has a history of causing tension in whatever department to which he is assigned, as much for his abrasive nature towards co-workers as the direct and sometimes unsettling manner in which he conducts investigations. Hale's reputation is also worsened by the infamy of his father, a self-confessed serial killer currently serving life in prison. The gruesome nature of his father's crimes combined with Hale's attitude has led many of his co-workers to wonder if he will one day become a serial killer himself, a fear which Hale secretly shares. Nonetheless, this strong familiarity with serial killers leads to Hale being recruited by the Deviant Crimes Unit. The Deviant Crimes Unit's mission is to track down the perpetrators of unusual crimes within the city. Each new crime spree is investigated by the head of the unit, Lieutenant Matt Cavanaugh (Chi McBride), who judges whether the crime is "deviant" enough to be investigated by the DCU. In addition to Hale and Cavanaugh, the DCU employs Detective Danielle Carter (Kristin Lehman), whose analytical nature clashes both with the impulsive Hale and the subjective nature of their shared mission. Cast Main cast Johnny Messner as Det. Jack Hale Marguerite Moreau as Det. Ava Lyford ("Pilot" only) Kristin Lehman as Det. Danielle Carter (episode two onward) Chi McBride as Lt. Matt Cavanaugh Recurring cast Ramon De Ocampo as Harry Oka Jessica Steen as Dr. Francine Klepp Benita Ha as Riley Byron Lawson as Det. Lee Adam Reid as Boze Episodes References External links 2000s American crime drama television series 2000s American police procedural television series 2005 American television series debuts 2005 American television series endings English-language television shows Fox Broadcasting Company original programming Television series by 20th Century Fox Television Television shows set in San Francisco Fictional portrayals of the San Francisco Police Department Television shows filmed in Vancouver
https://en.wikipedia.org/wiki/Kate%20Starbird
Catherine Evelyn Starbird (born July 30, 1975) is an American computer scientist and former professional basketball player. Playing at the guard position, Starbird earned All-American honors as a high school athlete at Lakes High School in Lakewood, Washington, and later at the collegiate level at Stanford. The 1997 Naismith College Player of the Year, Starbird helped Stanford make three consecutive Final Four appearances from 1995 to 1997 and scored 2,215 career points, a school record that stood for 11 years. From 1997 to 2006, Starbird played professional basketball in the American Basketball League, Women's National Basketball Association, and various European teams. Having been a computer science major at an undergraduate at Stanford, Starbird completed a doctorate in technology, media, and society at the University of Colorado at Boulder in 2012. Later that year, she joined the faculty of the University of Washington. Her research focuses on disinformation and social media communication during disasters. Early life Catherine Evelyn Starbird was born July 30, 1975, in West Point, New York, to a military family. Her father Edward Starbird was a United States Army colonel, and her mother Margaret (née Leonard) was a teacher and author. Growing up in Tacoma, Washington, Starbird attended Lakes High School in nearby Lakewood. As a senior in 1993, Starbird made the Parade All-American first team and was the Kodak All-America MVP. She was also named Washington Player of the Year by Gatorade and USA Today. At the 1993 Women's Basketball Coaches Association High School All-America Game, she scored 12 points and earned MVP honors. College basketball career At Stanford University, Starbird played at guard for the Stanford Cardinal under coach Tara VanDerveer from 1993 to 1997 with NCAA tournament appearances every season, including the Final Four from 1995 to 1997. In her first season in 1993–94, Starbird averaged 9.9 points and 2.9 rebounds and made the Pac-10 All-Freshman team. Starbird had a breakout season in 1994–95 with 16.0 points, 4.2 rebounds, and 4.0 assists and was a first-team All-Pac-10 honoree. Averaging 20.1 points, 4.7 rebounds, and 3.5 assists as a junior in 1995–96, Starbird was the Pac-10's Co-Player of the Year and received multiple All-American honors, specifically first team honors from Kodak, Basketball America magazine, and the United States Basketball Writers Association and second team honors from the Associated Press and United Press International. On January 13, 1996, Starbird scored a career high 44 points against USC. As a senior in 1996–97, Starbird averaged 20.9 points, 3.7 rebounds, and 3.2 assists and was a first-team Associated Press All-American. Starbird also won the Naismith College Player of the Year, USBWA Women's National Player of the Year award, and WBCA Player of the Year awards. Upon graduating, Starbird had a program record 2,215 career points. That record would be broken 11 years later in 2008 by C
https://en.wikipedia.org/wiki/Computer%20security%20model
A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all. A computer security model is implemented through a computer security policy. For a more complete list of available articles on specific security models, see :Category:Computer security models. Selected topics Access control list (ACL) Attribute-based access control (ABAC) Bell–LaPadula model Biba model Brewer and Nash model Capability-based security Clark-Wilson model Context-based access control (CBAC) Graham-Denning model Harrison-Ruzzo-Ullman (HRU) High-water mark (computer security) Lattice-based access control (LBAC) Mandatory access control (MAC) Multi-level security (MLS) Non-interference (security) Object-capability model Protection ring Role-based access control (RBAC) Take-grant protection model Discretionary access control (DAC) References Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003. CISSP Boot Camp Student Guide, Book 1 (v.082807), Vigilar, Inc. Computer security models
https://en.wikipedia.org/wiki/Menu%20%28disambiguation%29
A menu is a list of foods at a restaurant. Menu may also refer to: Menu (computing), a list of options Menu key, on a keyboard Menu (film), 1933 American film The Menu (TV series), 2015 Hong Kong television series The Menu (2016 film), a Hong Kong film The Menu (2022 film), an American comedy horror film Menu Foods, a pet food company Operation Menu, a bombing campaign People with the name Alain Menu (born 1963), Swiss racing driver Bernadette Menu (born 1942), French Egyptologist Jean-Christophe Menu (born 1964), French underground cartoonist Michel Menu (1916–2015), French engineer and author
https://en.wikipedia.org/wiki/Ternary%20computer
A ternary computer, also called trinary computer, is one that uses ternary logic (i.e., base 3) instead of the more common binary system (i.e., base 2) in its calculations. This means it uses trits (instead of bits, as most computers do). Types of states Ternary computing deals with three discrete states, but the ternary digits themselves can be defined differently: Ternary quantum computers use qutrits rather than trits. A qutrit is a quantum state that is a complex unit vector in three dimensions, which can be written as in the bra-ket notation. The labels given to the basis vectors () can be replaced with other labels, for example those given above. History One early calculating machine, built entirely from wood by Thomas Fowler in 1840, operated in balanced ternary. The first modern, electronic ternary computer, Setun, was built in 1958 in the Soviet Union at the Moscow State University by Nikolay Brusentsov, and it had notable advantages over the binary computers that eventually replaced it, such as lower electricity consumption and lower production cost. In 1970 Brusentsov built an enhanced version of the computer, which he called Setun-70. In the United States, the ternary computing emulator Ternac working on a binary machine was developed in 1973. The ternary computer QTC-1 was developed in Canada. Balanced ternary Ternary computing is commonly implemented in terms of balanced ternary, which uses the three digits −1, 0, and +1. The negative value of any balanced ternary digit can be obtained by replacing every + with a − and vice versa. It is easy to subtract a number by inverting the + and − digits and then using normal addition. Balanced ternary can express negative values as easily as positive ones, without the need for a leading negative sign as with unbalanced numbers. These advantages make some calculations more efficient in ternary than binary. Considering that digit signs are mandatory, and nonzero digits are magnitude 1 only, notation that drops the '1's and use only zero and the + − signs is more concise than if 1's are included. Unbalanced ternary Ternary computing can be implemented in terms of unbalanced ternary, which uses the three digits 0, 1, 2. The original 0 and 1 are explained as an ordinary binary computer, but instead uses 2 as leakage current. The world's first unbalanced ternary semiconductor design on a large wafer was implemented by the research team led by Kim Kyung-rok at Ulsan National Institute of Science and Technology in South Korea, which will help development of low power and high computing microchips in the future. This research theme was selected as one of the future projects funded by Samsung in 2017, published on July 15, 2019. Potential future applications With the advent of mass-produced binary components for computers, ternary computers have diminished in significance. However, Donald Knuth argues that they will be brought back into development in the future to take advantage of te
https://en.wikipedia.org/wiki/Chart%20%28disambiguation%29
A chart is a graphical representation of data. Chart or CHART may also refer to: A specific type of map, for example: Aeronautical chart, a representation of airspace and ground features relevant to aviation Nautical chart, a representation of a maritime area and adjacent coastal regions Chart, in computer science, a data structure used by a chart parser to store partial hypothesized results for re-use Chart (magazine), a Canadian music publication Chart, in geometry or topology, a coordinate chart for a manifold CHART (Coordinated Highways Action Response Team), part of the Maryland State Highway Administration Chart of accounts, an accounting term Chart Records, a record label Chord chart, a form of sheet music Medical record, a medical file Project CHART, a digital history project in Brooklyn, New York Record chart, for music popularity rankings See also Charl (name) Charo (disambiguation) Charter Charting (disambiguation) Chartres
https://en.wikipedia.org/wiki/Downtown%20Halifax%20Link
The Downtown Halifax Link system is a network of climate-controlled pedways (pedestrian tunnels and skywalks) connecting various office buildings, hotels, parkades, and entertainment venues around downtown Halifax, Nova Scotia, Canada. It is similar to Toronto's PATH or Montreal's RÉSO system, but on a much smaller scale. These walkways are all open to the public, and are convenient during inclement weather and the winter months. Connected buildings Hotels: The Prince George Hotel The Hotel Halifax (formally Delta Halifax) The Barrington Hotel (formally Delta Barrington) Marriott Halifax Harbourfront (formerly Casino Nova Scotia hotel) Office buildings: TD Tower (Barrington Street) Barrington Tower (Scotia Square) Duke Tower (Scotia Square) Cogswell Tower (Scotia Square) CIBC Building (Barrington Street) Brunswick Place formerly Trade Mart (Scotia Square) World Trade and Convention Centre Purdy's Wharf Purdy's Landing Purdy's Wharf Tower 1 Purdy's Wharf Tower 2 Residential: Plaza 1881 (Brunswick Street) Entertainment and retail: Scotiabank Centre Casino Nova Scotia Scotia Square Mall Granville Mall Barrington Place Shops Proposed connections Trade Centre Limited (TCL), the developers of the new Halifax Convention Centre, have sought to connect the new facility with the Downtown Halifax Link via a new tunnel along Grafton Street. Scott Ferguson, president of TCL, said that such a tunnel would help Halifax compete by linking the new centre with the existing network of hotel rooms. The tunnel is expected to cost $7-10 million. City staff are exploring possible alternatives but have not ruled the tunnel out. References External links Downtown Halifax Link website Buildings and structures in Halifax, Nova Scotia Downtown Halifax Pedways in Canada Skyways Underground cities
https://en.wikipedia.org/wiki/Organic%20search%20results
In Web search engines, organic search results are the query results which are calculated strictly algorithmically, and not affected by advertiser payments. They are distinguished from various kinds of sponsored results, whether they are explicit pay per click advertisements, shopping results, or other results where the search engine is paid either for showing the result, or for clicks on the result. Background The Google, Yahoo!, Bing and Sogou search engines insert advertising on their search results pages. In U.S. law, advertising must be distinguished from organic results. This is done with various differences in background, text, link colors, and/or placement on the page. However, a 2004 survey found that a majority of search engine users could not distinguish the two. Because so few ordinary users (38% according to Pew Research Center) realized that many of the highest placed "results" on search engine results pages (SERPs) were ads, the search engine optimization industry began to distinguish between ads and natural results. The perspective among general users was that all results were, in fact, "results." So the qualifier "organic" was invented to distinguish non-ad search results from ads. It has been used since at least 2004. Because the distinction is important (and because the word "organic" has many metaphorical uses) the term is now in widespread use within the search engine optimization and web marketing industry. As of July 2009, the term "organic search" is now commonly used outside the specialist web marketing industry, even used frequently by Google (throughout the Google Analytics site, for instance). Google claims their users click (organic) search results more often than ads, essentially rebutting the research cited above. A 2012 Google study found that 81% of ad impressions and 66% of ad clicks happen when there is no associated organic search result on the first page. Research has shown that searchers may have a bias against ads, unless the ads are relevant to the searcher's need or intent. The same report and others going back to 1997 by Pew show that users avoid clicking "results" they know to be ads. According to a June 2013 study by Chitika, 9 out of 10 searchers don't go beyond Google's first page of organic search results, a claim often cited by the search engine optimization (SEO) industry to justify optimizing websites for organic search. Organic SEO describes the use of certain strategies or tools to elevate a website's content in the "free" search results. Users can prevent ads in search results and list only organic results by using browser add-ons and plugins. Other browsers may have different tools developed for blocking ads. Organic search engine optimization is the process of improving web sites' rank in organic search results. See also Internet marketing References Search engine optimization Internet terminology Online advertising
https://en.wikipedia.org/wiki/DCE%20Distributed%20File%20System
The DCE Distributed File System (DCE/DFS) is the remote file access protocol used with the Distributed Computing Environment. It was a variant of Andrew File System (AFS), based on the AFS Version 3.0 protocol that was developed commercially by Transarc Corporation. AFS Version 3.0 was in turn based on the AFS Version 2.0 protocol (also used by the Coda disconnected file system) originally developed at Carnegie Mellon University. DCE/DFS consisted of multiple cooperative components that provided a network file system with strong file system semantics, attempting to mimic the behavior of POSIX local file systems while taking advantage of performance optimizations when possible. A DCE/DFS client system utilized a locally managed cache that would contain copies (or regions) of the original file. The client system would coordinate with a server system where the original copy of the file was stored to ensure that multiple clients accessing the same file would re-fetch a cached copy of the file data when the original file had changed. The advantage of this approach is that it provided very good performance even over slow network connections because most of the file access was actually done to the local cached regions of the file. If the server failed, the client could continue making changes to the file locally, storing it back to the server when it became available again. DCE/DFS also divorced the concept of logical units of management (Filesets) from the underlying volume on which the fileset was stored. In doing this it allowed administrative control of the location for the fileset in a manner that was transparent to the end user. To support this and other advanced DCE/DFS features, a local journaling file system (DCE/LFS also known as Episode) was developed to provide the full range of support options. IBM has not maintained it since 2005: https://web.archive.org/web/20071009171709/http://www-306.ibm.com/software/stormgmt/dfs/ IBM was working on a replacement for DCE/DFS called ADFS (Advanced Distributed File System). One major goal of this project was to decouple DFS from the complexities of DCE's cell directory services (CDS) and security services (secd). Another key feature would have been the elimination of enctype limitations associated with DCE/RPC. No public mention of this effort has been made since 2005, leading many to believe the project has been killed. The DCE Distributed File System (DFS) was adopted by the Open Software Foundation in 1989 as part of their Distributed Computing Environment. See also Andrew File System Distributed Computing Environment References External links DCE Official Web Site (archived). Some DCE Papers Available On-Line. IBM DFS home Distributed file systems Network file systems Internet Protocol based network software
https://en.wikipedia.org/wiki/Ternary%20search%20tree
In computer science, a ternary search tree is a type of trie (sometimes called a prefix tree) where nodes are arranged in a manner similar to a binary search tree, but with up to three children rather than the binary tree's limit of two. Like other prefix trees, a ternary search tree can be used as an associative map structure with the ability for incremental string search. However, ternary search trees are more space efficient compared to standard prefix trees, at the cost of speed. Common applications for ternary search trees include spell-checking and auto-completion. Description Each node of a ternary search tree stores a single character, an object (or a pointer to an object depending on implementation), and pointers to its three children conventionally named equal kid, lo kid and hi kid, which can also be referred respectively as middle (child), lower (child) and higher (child). A node may also have a pointer to its parent node as well as an indicator as to whether or not the node marks the end of a word. The lo kid pointer must point to a node whose character value is less than the current node. The hi kid pointer must point to a node whose character is greater than the current node. The equal kid points to the next character in the word. The figure below shows a ternary search tree with the strings "cute","cup","at","as","he","us" and "i": c / | \ a u h | | | \ t t e u / / | / | s p e i s As with other trie data structures, each node in a ternary search tree represents a prefix of the stored strings. All strings in the middle subtree of a node start with that prefix. Operations Insertion Inserting a value into a ternary search can be defined recursively or iteratively much as lookups are defined. This recursive method is continually called on nodes of the tree given a key which gets progressively shorter by pruning characters off the front of the key. If this method reaches a node that has not been created, it creates the node and assigns it the character value of the first character in the key. Whether a new node is created or not, the method checks to see if the first character in the string is greater than or less than the character value in the node and makes a recursive call on the appropriate node as in the lookup operation. If, however, the key's first character is equal to the node's value then the insertion procedure is called on the equal kid and the key's first character is pruned away. Like binary search trees and other data structures, ternary search trees can become degenerate depending on the order of the keys. Inserting keys in alphabetical order is one way to attain the worst possible degenerate tree. Inserting the keys in random order often produces a well-balanced tree. function insertion(string key) is node p := root //initialized to be equal in case root is null node last := root int idx := 0 while p is not null do //recurse o
https://en.wikipedia.org/wiki/Alias%20%28command%29
In computing, alias is a command in various command-line interpreters (shells), which enables a replacement of a word by another string. It is mainly used for abbreviating a system command, or for adding default arguments to a regularly used command. alias is available in Unix shells, AmigaDOS, 4DOS/4NT, KolibriOS, Windows PowerShell, ReactOS, and the EFI shell. Aliasing functionality in the MS-DOS and Microsoft Windows operating systems is provided by the DOSKey command-line utility. An alias will last for the life of the shell session. Regularly used aliases can be set from the shell's rc file (such as .bashrc) so that they will be available upon the start of the corresponding shell session. The alias commands may either be written in the config file directly or sourced from a separate file. History In Unix, aliases were introduced in the C shell and survive in descendant shells such as tcsh and bash. C shell aliases were strictly limited to one line. This was useful for creating simple shortcut commands, but not more complex constructs. Older versions of the Bourne shell did not offer aliases, but it did provide functions, which are more powerful than the csh alias concept. The alias concept from csh was imported into Bourne Again Shell (bash) and the Korn shell (ksh). With shells that support both functions and aliases but no parameterized inline shell scripts, the use of functions wherever possible is recommended. Cases where aliases are necessary include situations where chained aliases are required (bash and ksh). The command has also been ported to the IBM i operating system. Usage Creating aliases Common Unix shells Non-persistent aliases can be created by supplying name/value pairs as arguments for the alias command. In Unix shells the syntax is: alias gc='git commit' C shell The corresponding syntax in the C shell or tcsh shell is: alias gc "git commit" This alias means that when the command gc is read in the shell, it will be replaced with git commit and that command will be executed instead. 4DOS In the 4DOS/4NT shell the following syntax is used to define cp as an alias for the 4DOS copy command: alias cp copy Windows PowerShell To create a new alias in Windows PowerShell, the new-alias cmdlet can be used: new-alias ci copy-item This creates a new alias called ci that will be replaced with the copy-item cmdlet when executed. In PowerShell, an alias cannot be used to specify default arguments for a command. Instead, this must be done by adding items to the collection $PSDefaultParameterValues, one of the PowerShell preference variables. Viewing currently defined aliases To view defined aliases the following commands can be used: alias # Used without arguments; displays a list of all current aliases alias -p # List aliases in a way that allows re-creation by sourcing the output; not available in 4DOS/4NT and PowerShell alias myAlias # Displays the command for a defined alias Overriding aliases In Unix sh
https://en.wikipedia.org/wiki/Acidity%20%28novelette%29
Acidity is a dystopian, cyber novelette written by Pakistani journalist and writer, Nadeem F. Paracha. Written exclusively for the website Chowk.com in 2003, it has gone on to become a controversial cult favorite among many young Pakistanis and Indians. Plot summary While recovering from his addictions, Paracha spent time rearranging these notes using the cut-up method and surrealist automatism. He then turned it all into a work of fiction in which a heroin addict narrates his story set in future Pakistan and India that have turned into capitalist and theistic dystopias. He is a traveler who is always moving up and down both the countries looking for drugs and in the process having hallucinatory dialogues with a Pakistani cleric/Islamic extremist (called in the book as "The Mufti"), a group of Hindu fundamentalists (called "The pundits"), a group of young neoliberals (referred to as "the fun young people" and the "polite voids"), and an aging Indian Christian (called the "Holy Father"). There are also many other characters, but much of the story revolves around these main characters as Paracha constructs his dystopia in which capitalism and organized religion have been fused together as a new totalitarian system. Acidity makes a clear comment this way on the rapid economic, political and social changes taking place in India and Pakistan, especially after the end of the Cold War. See also Dystopia List of dystopian literature Social science fiction External links Acidity Pt: I, II, & III (Chowk.com) q 2003 novels Dystopian novels Pakistani novels Novelettes Novels set in Pakistan Books about Pakistan Novels about drugs Religion in science fiction
https://en.wikipedia.org/wiki/Interlacing%20%28bitmaps%29
In computing, interlacing (also known as interleaving) is a method of encoding a bitmap image such that a person who has partially received it sees a degraded copy of the entire image. When communicating over a slow communications link, this is often preferable to seeing a perfectly clear copy of one part of the image, as it helps the viewer decide more quickly whether to abort or continue the transmission. Interlacing is supported by the following formats, where it is optional: GIF interlacing stores the lines in the order PNG uses the Adam7 algorithm, which interlaces in both the vertical and horizontal direction. TGA uses two optional interlacing algorithms: Two-way: And four-way: JPEG, JPEG 2000, and JPEG XR (actually using a frequency decomposition hierarchy rather than interlacing of pixel values) PGF (also using a frequency decomposition) Interlacing is a form of incremental decoding, because the image can be loaded incrementally. Another form of incremental decoding is progressive scan. In progressive scan the loaded image is decoded line for line, so instead of becoming incrementally clearer it becomes incrementally larger. The main difference between the interlace concept in bitmaps and in video is that even progressive bitmaps can be loaded over multiple frames. For example: Interlaced GIF is a GIF image that seems to arrive on your display like an image coming through a slowly opening Venetian blind. A fuzzy outline of an image is gradually replaced by seven successive waves of bit streams that fill in the missing lines until the image arrives at its full resolution. Interlaced graphics were once widely used in web design and before that in the distribution of graphics files over bulletin board systems and other low-speed communications methods. The practice is much less common today, as common broadband internet connections allow most images to be downloaded to the user's screen nearly instantaneously, and interlacing is usually an inefficient method of encoding images. Interlacing has been criticized because it may not be clear to viewers when the image has finished rendering, unlike non-interlaced rendering, where progress is apparent (remaining data appears as blank). Also, the benefits of interlacing to those on low-speed connections may be outweighed by having to download a larger file, as interlaced images typically do not compress as well. References External links Comparison of GIF and PNG interlacing Videos of SCTP vs TCP in progressive interlaced ("progressive") vs progressive scanned ("non-progressive") Computer graphics
https://en.wikipedia.org/wiki/Darkspace
Darkspace usually refers to the intergalactic void that exists between celestial galaxies. It may refer to: DarkSpace, a computer game Darkspace, a Swiss ambient black metal band "Darkspace", a song by Morten Harket from Letter from Egypt "Darkspace", a short story by Robert F. Young Dark Space, a 2013 film Dark Space, a role-playing game supplement for Space Master by Monte Cook, published by Iron Crown Enterprises
https://en.wikipedia.org/wiki/Site%20Security%20Handbook
The Site Security Handbook, RFC 2196, is a guide on setting computer security policies and procedures for sites that have systems on the Internet (however, the information provided should also be useful to sites not yet connected to the Internet). The guide lists issues and factors that a site must consider when setting their own policies. It makes a number of recommendations and provides discussions of relevant areas. This guide is only a framework for setting security policies and procedures. In order to have an effective set of policies and procedures, a site will have to make many decisions, gain agreement, and then communicate and implement these policies. The guide is a product of the IETF SSH working group, and was published in 1997, obsoleting the earlier RFC 1244 from 1991. See also RFC 2504 - Users' Security Handbook References RFC 2196 - Site Security Handbook Computer security
https://en.wikipedia.org/wiki/Heart%20Digital
Heart Digital was a digital radio network of stations that broadcast on DAB Digital Radio in the North East of England (on the MXR North East multiplex), the North West of England (MXR North West), Yorkshire (MXR Yorkshire), South Wales and the West of England (MXR Severn Estuary) and in Central Scotland (Switch Scotland), as part of the Heart network. Heart Digital is now closed, listeners now hear Heart London or a local Heart service instead. Global also used this same approached with their Galaxy branded stations, where Galaxy Yorkshire has replaced Galaxy Digital. Background The stations are currently in the adult CHR format, although some suggest that they broadcast strong Adult contemporary music. The station's breakfast show was a delayed simulcast of Heart 106.2's breakfast show with Jamie Theakston and Harriet Scott. Other presenters included Paul Hollins and Steve Denyer. The station's Programme Manager was Carol Cheetham. Saturday nights from 6 pm to 2 am had a show called "Club Classics", which featured uninterrupted disco music. After the move to simulcast more with Heart London, the shows became presenter-led. Most of the MXR multiplex services ceased in 2013 (Yorkshire's continued to 2015). In 2014 regional Real Radio services in south Wales, central Scotland, Yorkshire, the North West and the North East - all areas into which Heart Digital had once broadcast - were relaunched as Heart stations on FM and DAB, carrying localised programming, news and advertising alongside Heart network content. Heart continues to broadcast a digital service, which relays all the output of Heart London, into areas where Heart is not currently represented on FM (including the East Midlands) and nationally via digital TV platforms. Chrysalis Radio Sold On 25 June 2007 it was announced that Heart along with its sister stations The Arrow, LBC and Galaxy were to be sold for £170 million to Global Radio from Chrysalis Radio. See also Heart References Digital-only radio stations Radio stations in England Radio stations in Scotland Defunct radio stations in the United Kingdom Digital
https://en.wikipedia.org/wiki/Rotronics%20Wafadrive
The Rotronics Wafadrive is a magnetic tape storage peripheral launched in late 1984 for the ZX Spectrum home computer. Each tape is a continuous loop, unlike cassette tape. It was intended to compete with Sinclair's ZX Interface 1 and ZX Microdrive. The Wafadrive comprises two continuous loop stringy floppy tape drives, an RS-232 interface and Centronics parallel port. The drives can run at two speeds: High speed (for seeking) and low speed (for reading/writing, which was significantly slower than that of Microdrives). The cartridges (or "wafers"), the same as those used in Entrepo stringy floppy devices for other microcomputers, are physically larger than Microdrive cartridges. They were available in three different capacities, nominally 16 kB, 64 kB or 128 kB. The larger sizes had the disadvantage of slower access, due to the longer length of tape. The same drive mechanism, manufactured by BSR, and cartridges were used in at least the following similar devices: Quick Data Drive (QDD), designed to connect to the cassette port of Commodore 64 and VIC-20 home computers. A&J Micro Drive System 100, for TRS-80 Model 100 and it's clones (Kyotronic KC-85, NEC PC-8201 & PC-8300, Olivetti M10), connected via the RS-232 port. External links Rotronics Wafadrive User Manual meulie.net Rotronics Wafadrive User Manual archive.org/sincuser.f9.co.uk Review of Wafadrive in Sinclair User, December 1984 Review of Waferdrive in Your Sinclair, Issue 5, May 1986 Computer storage devices Home computer peripherals ZX Spectrum
https://en.wikipedia.org/wiki/Hoodwinked%21
Hoodwinked! is a 2005 computer-animated musical comedy mystery film. It retells the folktale Little Red Riding Hood as a police procedural, using backstories to show multiple characters' points of view. It was produced independently by Blue Yonder Films with Kanbar Entertainment, directed and written by Cory Edwards along with Todd Edwards, and Tony Leech, and produced by Katie Hooten, Maurice Kanbar, David K. Lovegren, Sue Bea Montgomery, and Preston Stutzman. The film features the voices of Anne Hathaway, Glenn Close, Jim Belushi, Patrick Warburton, Anthony Anderson, David Ogden Stiers, Xzibit, Chazz Palminteri, and Andy Dick. Hoodwinked! was among the earliest computer-animated films to be completely independently funded. Working apart from a major studio allowed the filmmakers greater creative control, but also restrained them economically. Due to the film's low budget, its animation was produced in the Philippines, with a less realistic design inspired by stop motion films. The Weinstein Company did not sign on as the film's distributor until near the end of production, and while the company had several roles recast with higher-profile actors, it otherwise made few changes to the film. Structurally, the film was inspired by non-linear crime dramas, such as Rashomon and Pulp Fiction. It was released shortly after the first two installments in the successful Shrek series, which accentuated the fairy tale parody genre of which Hoodwinked! is a part. Hoodwinked!, however, intentionally deviated from the Shrek series in its style of humor and in certain plot elements. This was in part based on Cory Edwards' concerns over exposing children to the high level of cynicism often found in the genre. The film was released by The Weinstein Company in Los Angeles, California, and Philadelphia on December 16, 2005, for a one-week engagement before expanding nationwide on January 13, 2006. Critical reception to the film was varied; although its script and voice performances were praised by many reviews, its animation quality was heavily criticized. The film was a commercial success, earning over thirteen times its less-than-$8 million budget. A sequel, Hoodwinked Too! Hood vs. Evil, was directed by Mike Disa and created by an entirely different team, even though the original draft of the screenplay was written by the Edwards brothers and Leech. It was released in 2011 to negative reviews and financial failure. Plot Little Red Riding Hood arrives at her grandmother's house, where the Big Bad Wolf has disguised himself as Red's Granny. The Wolf attacks Red. Granny, who has been tied up, jumps out of a closet just as ax-wielding woodsman Kirk bursts through the window. The police arrive, and Detective Nicky Flippers questions everyone about the incident. Little Red, actually named Red Puckett, explains she was delivering goodies for her grandmother's business when she discovered a threat from the Goody Bandit, who has been stealing recipes. Red had set o
https://en.wikipedia.org/wiki/Remote%20File%20Sharing
Remote File Sharing (RFS) is a Unix operating system component for sharing resources, such as files, devices, and file system directories, across a network, in a network-independent manner, similar to a distributed file system. It was developed at Bell Laboratories of AT&T in the 1980s, and was first delivered with UNIX System V Release 3 (SVR3). RFS relied on the STREAMS Transport Provider Interface feature of this operating system. It was also included in UNIX System V Release 4, but as that also included the Network File System (NFS) which was based on TCP/IP and more widely supported in the computing industry, RFS was little used. Some licensees of AT&T UNIX System V Release 4 did not include RFS support in SVR4 distributions, and Sun Microsystems removed it from Solaris 2.4. Features The basic application architecture of RFS is the client–server model, in which a participating host may be a server as well as a client, simultaneously. It was based on different design decisions, in comparison to the Network File System (NFS). Instead of focusing on reliable operation in the presence of failures, it focused on preserving UNIX file system semantics across the network. This enabled the system to provide remote access to hardware resources located on an RFS server. Unlike NFS (before version 4), the RFS server maintains state to keep track of how many times a file has been opened, or the locks established on a file or device. RFS provides complete UNIX/POSIX file semantics for all file types, including special devices, and named pipes. It supports access controls and record and file locking of remote files in a transparent manner as if the shared files are local. This permitted binary application compatibility when involving network resources. It allows the mounting of devices across the network. For example, /dev/cdrom can be accessed remotely, as if it were a local resource. Access to any specific file or a file system directory is transparent across the network, so that users do not need to know where a file is actually located. RFS is implemented independently of the underlying network technology. For this it relies on the System V STREAMS mechanism using the Transport Provider Interface. Remote system call interface ACCESS SYSACCT CHDIR Change directory CHMOD Change file mode CHOWN Change file owner CHROOT CLOSE Close a file CREAT Create a file EXEC Execute a file EXECE Execute a file with an environment FCNTL FSTAT Stat a file using a file descriptor FSTATFS Stat a file system using a file descriptor IOCTL LINK First half of link() operation LINK1 Second half of link() operation MKNOD Make block or character special file OPEN Open a file READ Read from a file SEEK Seek on a file STAT Stat a file using pathname STATFS Stat a file system using pathname UNLINK UTIME UTSSYS Return information about a mounted files WRITE GETDENTS Read directory entries in a file system MKDIR RMDIR SRMOUNT Server side of remote m
https://en.wikipedia.org/wiki/Peyman%20Faratin
Peyman Faratin (born September 16, 1965) is an Iranian/American computer scientist, and the founder of Robust Links, an Internet company building algorithms for creating and processing a knowledge graph. Background Peyman completed his PhD in computer science under the supervision of Prof. Nicholas R. Jennings and Prof. Carles Sierra. He made significant contributions in the area of artificial intelligence, particularly to automated negotiation in multi-agent systems. He was then a research scientist at MIT's Computer Science and Artificial Intelligence (CSAIL) laboratory, working with David D. Clark in the Advanced Network Architecture group. Peyman has over eighteen years of experience in design and implementation of online marketplaces. He graduated from University of London (EECS department) in 2000 completing his doctoral thesis on algorithms for online bargaining and auction mechanisms, with application to business process management and supply chain management in telecommunication domains. Between 2000 and 2008 he was a researcher at MIT (Computer Science and AI Lab and Sloan School of Management) working with David Clark (the chief Internet protocol architect between 81 and 89) on design, analysis and implementation of various online market mechanisms for multi-scaled provisioning, control and access problems to IP networks. Work included design of various markets at both layer 3 and 7 applications. Dr. Faratin joined Strands Inc. as VP of innovation in 2008, where he served as SVP of Innovation, responsible for the entire innovation pipeline of the $55 million startup. While at Strands, he envisaged, developed, marketed and sold a prediction market technology to BBVA. He has published over fifty scientific articles in peer reviewed publications, served as reviewer for the NSF and won multiple competitive NSF and DARPA grants. Current Peyman is currently the founder of RobustLinks, funded by the National Science Foundation. The mission of RobustLinks is to use state of the art AI, NLP, and ML to compose Knowledge as a Service (KaaS). KaaS takes unstructured (textual) "big data" and reduces it to searchable knowledge. It integrates end-to-end technology stack that continuously gather, summarize and represent the semantics of unstructured text, in real-time and at scale. The derived semantics is then analyzed to condense the big data to a compact and searchable semantic graph. Associations Peyman is a board member of number of emerging startups, as well as member of the Association for Computing Machinery, New York Academy of Science, the New York City CTO club and a visiting scholar at Courant Institute of Mathematics at NYU. Dr. Faratin is an active member of the NYC technology community. Selected publications P. Faratin, D. Clark, P. Gilmore, S. Bauer, A. Berger and W. Lehr (2008). The Growing Complexity of Internet Interconnections: Communications and Strategies, no.72, 4th quarter 2008 D. D.Clark, W. Lehr, S.J. Bauer, P. Fara
https://en.wikipedia.org/wiki/Jerry%20White%20%28activist%29
Jerry White (born June 7, 1963) is Executive Director of the United Religions Initiative. He co-founded the Survivor Corps, formerly the Landmine Survivors Network, created by and for survivors to help victims of war, and is a member of the International Campaign to Ban Landmines, which was the recipient of the 1997 Nobel Peace Prize. He was a Professor of Practice at the University of Virginia from 2015 to 2022. He is a Senior Ashoka Fellow and a Gabelli Fellow at the Gabelli School of Business in New York City. Background In 1984, while studying abroad in Jerusalem, White lost his lower right leg after stepping on a landmine during a backpacking trip. The mine had been laid by Syrian soldiers during the 1967 war. Following this incident, White co-founded Survivor Corps with Ken Rutherford, where he led efforts to draft and enact human rights and humanitarian legislation, including the UN Convention on the Rights of Persons with Disabilities, promoting and protecting the rights of 650 million people with disabilities. Through this work, White arranged for Diana, Princess of Wales, to visit Bosnia and Herzegovina, and later joined in efforts to promote a "mine-free Middle East" with King Hussein and Queen Noor of Jordan. In 2010, White received a Knesset vote in Israel to clear sufficiently old minefields, including the Baptismal Site of Jesus on the Jordan River. White has been published extensively; testified before the United States Congress and the United Nations; and received several awards in recognition of his humanitarian and human rights leadership, including the Lifetime Achievement Award from Glasgow Caledonian New York College in 2019; the University of Massachusetts-Boston Chancellor’s Medal for Global Service in 2016; the Rumi Award for Interreligious Diplomacy in 2015; the Superior Honor Award from the U.S. State Department in 2014; the Roots of Peace Global Humanitarian Award in 2010; the first International UNA Humanitarian Prize from Sir Paul McCartney and Heather Mills in 2003; the 2001 Paul G. Hearne American Association of People with Disabilities Leadership Award; the 2000 Mohammed Amin Humanitarian Award; Brown University's 2000 William Rogers Alumni Award; and the Center for International Rehabilitation's Leadership Award in 1999. He shares in the 1997 Nobel Peace Prize, awarded to the International Campaign to Ban Landmines and its first coordinator Jody Williams. Professional White began his career at the Brookings Institution and at the Council on Foreign Relations, where he served as a research assistant. He later became Assistant Director of the Wisconsin Project on Nuclear Arms Control and an editor for Risk Report. In the late 1990s he served on the board of directors of the Amputee Coalition of America. In these positions White campaigned against weapons of mass destruction. In 1995, White co-founded Landmine Survivors Network, later Survivor Corps, with Ken Rutherford, which pioneered improvements in war vi
https://en.wikipedia.org/wiki/Cross-interleaved%20Reed%E2%80%93Solomon%20coding
In the compact disc system, cross-interleaved Reed–Solomon code (CIRC) provides error detection and error correction. CIRC adds to every three data bytes one redundant parity byte. Overview Reed–Solomon codes are specifically useful in combating mixtures of random and burst errors. CIRC corrects error bursts up to 3,500 bits in sequence (2.4 mm in length as seen on CD surface) and compensates for error bursts up to 12,000 bits (8.5 mm) that may be caused by minor scratches. Characteristics High random error correctability Long burst error correctability In case the burst correction capability is exceeded, interpolation may provide concealment by approximation Simple decoder strategy possible with reasonably-sized external random access memory Very high efficiency Room for future introduction of four audio channels without major changes in the format (as of 2023, this has not been implemented). Interleave Errors found in compact discs (CDs) are a combination of random and burst errors. In order to alleviate the strain on the error control code, some form of interleaving is required. The CD system employs two concatenated Reed–Solomon codes, which are interleaved cross-wise. Judicious positioning of the stereo channels as well as the audio samples on even or odd-number instants within the interleaving scheme, provide the error concealment ability, and the multitude of interleave structures used on the CD makes it possible to correct and detect errors with a relatively low amount of redundancy. See also Multiplexing Parity (mathematics) Parity (telecommunication) Checksum References Error detection and correction Compact disc
https://en.wikipedia.org/wiki/Phoenix%20Technologies
Phoenix Technologies Ltd is an American company that designs, develops and supports core system software for personal computers and other computing devices. The company's products commonly referred to as BIOS (Basic Input/Output System) or firmware support and enable the compatibility, connectivity, security and management of the various components and technologies used in such devices. Phoenix Technologies and IBM developed the El Torito standard. Phoenix was incorporated in Massachusetts in September 1979, and its headquarters are in Campbell, California. History In 1979, Neil Colvin formed what was then called Phoenix Software Associates after his prior employer, Xitan, went out of business. Neil hired Dave Hirschman, a former Xitan employee. During 1980–1981, they rented office space for the first official Phoenix location at 151 Franklin Street, Boston, Massachusetts. In this same time period Phoenix purchased a non-exclusive license for Seattle Computer Products 86-DOS. Phoenix developed customized versions of 86-DOS (or sometimes called PDOS for Phoenix DOS) for various microprocessor platforms. Phoenix also provided PMate as a replacement for Edlin as the DOS file editor. Phoenix also developed C language libraries, called PForCe, along with Plink-86/Plink-86plus, overlay linkers, and Pfix-86, a windowed Debugger for DOS. These products only provided a small revenue stream to Phoenix during the early 1980s and the company did not significantly expand in size. Cloning the IBM PC BIOS After the success of the IBM PC, many companies began making PC clones. Some, like Compaq, developed their own compatible ROM BIOS, but others violated copyright by directly copying the PC's BIOS from the IBM PC Technical Reference Manual. After Apple Computer, Inc. v. Franklin Computer Corp. IBM sued companies that it claimed infringed IBM's copyright. Clone manufacturers needed a legal, fully compatible BIOS. To develop a legal BIOS, Phoenix used a clean room design. Engineers read the BIOS source listings in the IBM PC Technical Reference Manual. They wrote technical specifications for the BIOS APIs for a single, separate engineer—one with experience programming the Texas Instruments TMS9900, not the Intel 8088 or 8086—who had not been exposed to IBM BIOS source code. The single engineer developed code to mimic the BIOS APIs. By recording the audit trail of the two groups' interactions, Phoenix developed a defensibly non-infringing IBM PC compatible ROM BIOS. Because the programmers who wrote the Phoenix code never read IBM's reference manuals, nothing they wrote could have been copied from IBM's code, no matter how closely the two matched. This reverse engineering technique is commonly referred to as a "Chinese wall". This story was portrayed in the TV show Halt and Catch Fire. The first Phoenix PC ROM BIOS was introduced in May 1984, which enabled OEMs such as Hewlett-Packard, Tandy Corporation, and AT&T Computer Systems to build essentially 100%-
https://en.wikipedia.org/wiki/INT%2013H
INT 13h is shorthand for BIOS interrupt call 13hex, the 20th interrupt vector in an x86-based (IBM PC-descended) computer system. The BIOS typically sets up a real mode interrupt handler at this vector that provides sector-based hard disk and floppy disk read and write services using cylinder-head-sector (CHS) addressing. Modern PC BIOSes also include INT 13h extension functions, originated by IBM and Microsoft in 1992, that provide those same disk access services using 64-bit LBA addressing; with minor additions, these were quasi-standardized by Phoenix Technologies and others as the EDD (Enhanced Disk Drive) BIOS extensions. INT is an x86 instruction that triggers a software interrupt, and 13hex is the interrupt number (as a hexadecimal value) being called. Modern computers come with both BIOS INT 13h and UEFI functionality that provides the same services and more, with the exception of UEFI Class 3 that completely removes CSM thus lacks INT 13h and other interrupts. Typically, UEFI drivers use LBA-addressing instead of CHS-addressing. Overview Under real mode operating systems, such as DOS, calling INT 13h would jump into the computer's ROM-BIOS code for low-level disk services, which would carry out physical sector-based disk read or write operations for the program. In DOS, it serves as the low-level interface for the built-in block device drivers for hard disks and floppy disks. This allows INT 25h and INT 26h to provide absolute disk read/write functions for logical sectors to the FAT file system driver in the DOS kernel, which handles file-related requests through DOS API (INT 21h) functions. Under protected mode operating systems, such as Microsoft Windows NT derivatives (e.g. NT4, 2000, XP, and Server 2003) and Linux with dosemu, the OS intercepts the call and passes it to the operating system's native disk I/O mechanism. Windows 9x and Windows for Workgroups 3.11 also bypass BIOS routines when using 32-bit Disk Access. Besides performing low-level disk access, INT 13h calls and related BIOS data structures also provide information about the types and capacities of disks (or other DASD devices) attached to the system; when a protected-mode OS boots, it may use that information from the BIOS to enumerate disk hardware so that it (the OS) can load and configure appropriate disk I/O drivers. The original BIOS real-mode INT 13h interface supports drives of sizes up to about 8 GB using what is commonly referred to as physical CHS addressing. This limit originates from the hardware interface of the IBM PC/XT disk hardware. The BIOS used the cylinder-head-sector (CHS) address given in the INT 13h call, and transferred it directly to the hardware interface. A lesser limit, about 504 MB, was imposed by the combination of CHS addressing limits used by the BIOS and those used by ATA hard disks, which are dissimilar. When the CHS addressing limits of both the BIOS and ATA are combined (i.e. when they are applied simultaneously), the number
https://en.wikipedia.org/wiki/Liocracy
Liocracy was a Canadian mockumentary comedy television series, which aired on The Comedy Network in 2001 and 2002. The show, a spoof of biographical documentary series such as Biography or Life and Times, starred Leslie Nielsen as host Terrence Brynne McKennie. Each episode presented a Biography-type profile of a fictional person loosely based on a real-life personality. The first episode centred on Friendly Giant, a Friendly Giant–like children's television host with a penchant for sadomasochism who became a pariah after being caught having sex with his rooster sidekick Rudy. Later episodes focused on Anne Surly, a serial killer indirectly based on Lucy Maud Montgomery and her Anne of Green Gables novels; Simon Duke, a horror novelist who was a spoof of Stephen King; Rachel Lange, a soap opera diva; Boyz 'r Us, a pop music boy band; and the on-again off-again romance of Hollywood acting icons Richard Button and Elizabeth Paladoro. Filmed in Halifax, Nova Scotia, the show was created by Ian Johnston and Peter Hays, two former journalists for the Halifax Daily News. The show was titled Liography in its first season, but was changed to Liocracy in the second season after the A&E Network, the producers of the original Biography series, threatened a copyright infringement lawsuit. The second season premiered in November 2002, and ran for 13 episodes into early 2003. The series was not renewed for a third season. References External links 2000s Canadian comedy television series 2000s Canadian satirical television series 2001 Canadian television series debuts 2003 Canadian television series endings Canadian parody television series CTV Comedy Channel original programming Television shows filmed in Halifax, Nova Scotia
https://en.wikipedia.org/wiki/505%20Cava
Cava (minor planet designation: 505 Cava) is a minor planet orbiting the Sun. In 2001, the asteroid was detected by radar from the Arecibo Observatory at a distance of 1.18 AU. The resulting data yielded an effective diameter of . References External links Background asteroids Cava Cava FC-type asteroids (Tholen) 19020821
https://en.wikipedia.org/wiki/509%20Iolanda
Iolanda (minor planet designation: 509 Iolanda) is a minor planet orbiting the Sun. References External links Lightcurve plot of (509) Iolanda, Antelope Hills Observatory Data and Model of Iolanda at Database of Asteroid Models from Inversion Techniques Background asteroids Iolanda Iolanda S-type asteroids (Tholen) S-type asteroids (SMASS) 19030428
https://en.wikipedia.org/wiki/663%20Gerlinde
663 Gerlinde is a minor planet orbiting the Sun. References External links Lightcurve plot of 663 Gerlinde, Palmer Divide Observatory, B. D. Warner (2005) Asteroid Lightcurve Database (LCDB), query form (info ) Dictionary of Minor Planet Names, Google books Asteroids and comets rotation curves, CdR – Observatoire de Genève, Raoul Behrend Discovery Circumstances: Numbered Minor Planets (1)-(5000) – Minor Planet Center Background asteroids Gerlinde Gerlinde X-type asteroids (Tholen) 19080624
https://en.wikipedia.org/wiki/674%20Rachele
674 Rachele is a minor planet orbiting the Sun. It was discovered by Wilhelm Lorenz on 28 October 1908 in Heidelberg, and was named by orbit computer Emilio Bianchi after his wife. This is classified as an S-type asteroid, indicating a stony composition. Measurements made using the adaptive optics system at the W. M. Keck Observatory give a size estimate of 89 km. It has a size ratio of 1.08 between the major and minor axes. By comparison, measurements reported in 1998 from the IRAS observatory give a similar size of 97 km and a ratio of 1.15. References External links Background asteroids Rachele Rachele S-type asteroids (Tholen) S-type asteroids (SMASS) 19081028
https://en.wikipedia.org/wiki/690%20Wratislavia
690 Wratislavia is a minor planet orbiting the Sun. Wratislavia was discovered on October 16, 1909. IRAS data shows it is about 135 km in diameter. Wratislavia has been studied by radar. References External links Discovery Circumstances: Numbered Minor Planets (1)-(5000) Minor Planet Center Rotational Period Determination of 690 Wratislavia Background asteroids Wratislavia Wratislavia CPF-type asteroids (Tholen) 19091016
https://en.wikipedia.org/wiki/670%20Ottegebe
670 Ottegebe is a minor planet orbiting the Sun. In 2007 lightcurve data showed that Ottegebe rotates every 10.041 ± 0.002 hours. The name refers to a character in Gerhardt Hauptmann's play Der arme Heinrich. It is orbiting close to a 5:2 mean motion resonance with Jupiter, which is located at . References External links 000670 Discoveries by August Kopff Named minor planets 000670 19080820
https://en.wikipedia.org/wiki/Lifetime%20Entertainment%20Services
Lifetime Entertainment Services (LES) is an American entertainment industry company, whose media properties are focused on women. Lifetime Entertainment Services is a subsidiary of A&E Networks, a joint venture of Hearst Communications (50%) and The Walt Disney Company (50%). Background Hearst-ABC Video Services ABC and the Hearst Corporation in January 1981 formed a joint venture, Hearst/ABC Video Services (HAVS), to provide programming to Alpha Repertory Television Service and launch BETA, a women's cable service, later that year. Beta was supposed to operate four hours a day and be supported by advertising. HAVS instead launched the service under the name Daytime in March 1982. Cable Health Network Cable Health Network was a 24-hour cable channel launched by Viacom with health-related programming in June 1982. In June 1983, Hearst-ABC Video Services and Viacom International agreed to combine Hearst-ABC Video Services and Cable Health Network, creating the joint venture Hearst/ABC-Viacom Entertainment Services, which contained the merged Daytime and Lifetime Medical Television satellite channel. History Hearst/ABC-Viacom Entertainment Services In 1984, Hearst/ABC-Viacom Entertainment Services (HAVES) was formed from the merger of Daytime and Lifetime Medical Television to start and operate a new cable channel, Lifetime Television. Lifetime committed $25 million to produce talk show programming, but very little worked with the audience. So by the end of 1985, Lifetime was $16 million in debt. Lifetime added more original programming to diversify its audience while programming a medical block on Sunday with all the medical talk shows which attracted pharmaceutical advertisers bringing in 25% of the network's revenue. By 1986, the talk shows were canceled and the company was $36 million in debt. Lifetime instead refocused its programming towards women in 1987 and acquired second run syndicated programming and off-network shows. Beginning in the early 1990, Lifetime began producing multiple, original telefilms each year targeting the female audience. Over the next decade, the original movies boosted Lifetime TV's ratings, and successfully launched the "Television for Women" era and brand. In September 1991, HAVES launched Healthlink Television, which created health and wellness content, and provided the equipment to broadcast it into doctors' offices. Eventually, and to focus on its original content to support its women-centric brand, HAVES agreed to sell Healthlink TV to Whittle Communications. In October 1991, HAVES reorganized the company to have five group vice-presidents run the company so the CEO/President can focus on new programming acquisitions, the startup of new programming ventures, and to develop growth strategies; putting plans into motion that increased budgets for original content produced in New York and California by 50%. In 1993, and to better utilize its existing NY studio facilities that independently operated at th
https://en.wikipedia.org/wiki/ABC%20News%20%26%20Talk
ABC News & Talk was a news/talk and entertainment radio channel programmed and distributed by ABC Radio Networks for satellite radio services. It aired on XM Satellite Radio channel 124, and Sirius Satellite Radio channel 143 both in the United States until September 24, 2007. The channel also existed on Sirius Canada until February 2007. Each morning, the channel featured a six-hour news wheel, produced by ABC News Radio. In the afternoon, hourly newscasts preceded some of ABC Radio's top talk show talent, like Sean Hannity, KABC's Larry Elder and WBAP's Mark Davis. History ABC News & Talk used to host a mid-day talk show exclusively for satellite radio titled Live from 125. The show's host was rotated on a weekly basis so there were several different program personalities. This show was discontinued in 2006. In September 2006, John Batchelor took a leave of absence from the ABC Radio network. Mark Levin took his place on the ABC News & Talk lineup. Levin's show was broadcast on a 2-hour tape-delay basis, which was assumed to be twofold: to protect Elder's spot in the lineup, since Elder had the slot prior to Levin's arrival, and so Levin can continue to grow his terrestrial affiliate base. The channel was programmed by ABC Radio until June 12, 2007, when it was turned over to Citadel Broadcasting as part of the divestiture by ABC parent Disney of nearly all of its radio assets. The network was shut down September 24, 2007. Former on-air staff ABC Satellite News has ceased production, as it was produced exclusively for this channel. Sean Hannity, ABC Radio Networks' (Citadel/Cumulus Media Networks and now Westwood One's) most popular host, can be heard live, all three hours, weekdays on XM's America Right and Sirius' SIRIUS Patriot Channel 144. Mark Levin can also be heard live, for 3 hours, weekdays on America Right and SIRIUS Patriot. Bob Brinker can still be heard live weekends on XM's America Right, but will not be broadcast further on Sirius. Mark Davis' show has since been dropped from ABC Radio Networks, reverting to a local show on WBAP, and Davis has reestablished his national presence by becoming a substitute host for various shows, including The Rush Limbaugh Show. He is now heard on KSKY since 2012. While The Larry Elder Show is no longer airing on either satellite provider, he has returned to his regular local (Los Angeles) drive-time (3-6PM Pacific) time-slot on KABC. His show streams free over the internet during most live broadcasts, and is podcast for "Elderado" subscribers. The Satellite Sisters were not picked up by either service, and were dropped from ABC Radio Networks in October. Since then, their show is now an internet–based podcast. Peter Tilden will no longer be heard on either satellite provider. He was laid off by KABC in cost-cutting measures in February 2008, but was called back to work (replacing Doug McIntyre) in October 2009. This version of the show will strictly be local. John Batchelor returned
https://en.wikipedia.org/wiki/Battlestar%20Galactica%20%281978%20TV%20series%29
Battlestar Galactica is an American science fiction television series created by Glen A. Larson that aired on the ABC network from September 17, 1978 to April 29, 1979. It stars an ensemble cast led by Lorne Greene, Richard Hatch, and Dirk Benedict. The series follows a group of human survivors fleeing the destruction of their homeworlds aboard the titular spacecraft, searching for a new home while they are being pursued by the Cylons. Beginning production as a miniseries, ABC subsequently ordered a full season and the show was reworked as an episodic serial. However, high production costs and declining ratings led to the series' cancellation after twenty-four episodes. ABC attempted to revive the series as a lower-budget spinoff, Galactica 1980, but it performed poorly and was cancelled after airing ten episodes. Despite initially failing to find a wide audience, Battlestar Galactica developed a 1970s American cult and pop culture following. The show also spawned a media franchise which includes comics, theme park attractions, games, and the reimagined series. Show summary In a distant star system, the Twelve Colonies of Mankind were reaching the end of a thousand-year war with the Cylons, warrior robots created by a reptilian race which expired long ago, presumably destroyed by their own creations. Humanity was ultimately defeated in a sneak attack on the colonies by the Cylons, carried out with the help of a human traitor, Baltar. Protected by the last surviving capital warship, a battlestar, named Galactica, the survivors fled in available ships. The Commander of the Galactica, Adama, led this "rag-tag fugitive fleet" of 220 ships in search of a new home. They begin a quest to find the long lost thirteenth tribe of humanity that had settled on a legendary planet called Earth. However, the Cylons continued to pursue them relentlessly across the galaxy. The main characters include Captain Apollo, a Colonial warrior, fighter pilot and the son of Adama. His best friend is Lieutenant Starbuck, a highly regarded fighter pilot, and also a gambler and womanizer. The era in which this exodus took place is never clearly stated in the series itself. At the start of the series, it is mentioned as being "the seventh millennium of time", although it is unknown when this is in relation to Earth's history. The final aired episode, "The Hand of God", indicates that the original series took place after the Apollo 11 Moon landing in 1969 as the Galactica receives a television transmission from Earth showing the landing. The later Galactica 1980 series is expressly set in the year 1980 after a 30-year voyage to Earth. A member of the Church of Jesus Christ of Latter-day Saints, Larson incorporated many themes from Mormon theology into the shows. Pilot and subsequent changes The pilot to this series, budgeted at $8 million (one of the most expensive at that time), was released theatrically in Sensurround. A shortened (125-minute), edited version was releas
https://en.wikipedia.org/wiki/Narborough%20railway%20station
Narborough railway station serves the villages of Narborough and Littlethorpe in Leicestershire. It is on the Birmingham to Peterborough Line about southwest of . The station is owned by Network Rail and managed by East Midlands Railway, who do not serve the station. Only CrossCountry trains serve the station. A full range of tickets for travel is available from the station ticket office, which is open from 0640 to 1300 Mondays to Saturdays, or at other times from the guard on the train at no extra cost. History The station was opened in 1864 by the South Leicestershire Railway, which was taken over by the London and North Western Railway in 1867. British Railways closed the station on 4 March 1968, but public objections led BR to reopen it on 5 January 1970. Restoration of the station after 21 months of disuse cost £3,250, which was paid for by the then Blaby Rural District Council and Narborough Parish Council. Next to the station is a level crossing across Station Road. Services There are services to and : usually one train in each direction every hour (including Sundays). There is one early morning train per day to Stansted Airport on weekdays only, plus three additional peak services as far as . There is also one late evening train a day on weekdays only to . This station has a waiting room, which is open for the same hours as the booking office. References External links Railway stations in Leicestershire DfT Category F2 stations Former London and North Western Railway stations Railway stations in Great Britain opened in 1864 Railway stations in Great Britain closed in 1968 Railway stations in Great Britain opened in 1970 Reopened railway stations in Great Britain Railway stations served by CrossCountry Beeching closures in England Railway stations in Great Britain not served by their managing company
https://en.wikipedia.org/wiki/Bull%20Creek%20railway%20station
Bull Creek railway station is a railway station on the Transperth network. It is located on the Mandurah line, 11.7 kilometres from Perth station inside the median strip of the Kwinana Freeway serving the suburb of Bull Creek. History The contract for the construction of Bull Creek railway station, along with Canning Bridge railway station and Murdoch railway station, was awarded to John Holland Pty Ltd in November 2004. This contract was the first contract awarded for the construction of stations on the Southern Suburbs Railway project, and it had a value of $32 million. During planning, the station was projected to have 3,100 boardings per day upon opening. Bull Creek station is situated in the Kwinana Freeway median strip, and perpendicular to the Leach Highway interchange. It also features integrated bus services on the concourse level; this level operates as a bus station. The station opened along with the rest of the Mandurah line on 23 December 2007. Services Bull Creek station is served by Transperth Mandurah line services. Canning Bridge station saw 1,366,696 passengers in the 2013–14 financial year. Platforms Transfers Bus transfers are available on the concourse level. The bus station is on a bridge structure extending over the Kwinana Freeway carriageways and train station. Traffic signals at both ends of the bridge have been modified to include a bus phase. Bus routes Stands 1–5 Stands 6–10 References External links Station map New MetroRail Mandurah line Transperth railway stations Railway stations in Australia opened in 2007 Bull Creek, Western Australia Transperth railway stations in highway medians Transperth bus stations
https://en.wikipedia.org/wiki/VoIP%20User
VoIP User was a community-driven and financed SIP based VoIP network. The project's aim was to allow users to experiment with VoIP by providing opportunities to work with SIP and IAX2 devices. History VoIP User was created by Dean Elwood and Tjardick van der Kraan in July 2003. The VoIP User website became unavailable in late 2011 due to a major data loss. Despite a short notice promising a rebuild it eventually failed to resolve to a destination in November 2012. However, as of December 2012, existing SIP accounts at sip.voipuser.org are still operational. As of July 2023, the site is unavailable. Features The VoIP User network was designed for a community environment, making it different from many other VoIP networks. One key distinction was that users could call PSTN phone numbers through VoIP User's PSTN gateway without call charges. This was possible because calls to VoIP User’s numbers generated a small revenue called the "termination charge", which was added to a community account. Outbound calls then used this accrued revenue. If users maintained a balance between incoming and outgoing calls, this account remained steady. There was a limit on the routes through the VoIP User PSTN gateway, allowing only calls to countries that cost 2.5p/min or less. This primarily covered landlines, with some mobile phones included. Each call had a maximum duration of 10 minutes. The call rates to different locations were determined by VoIP User’s PSTN line providers, causing fluctuations similar to those seen with commercial international telecommunication companies. These variations could be influenced by factors like currency exchange rates and commercial negotiations. Unlike commercial providers, VoIP User aimed to break even rather than profit, a concept termed "minute neutral". Information on calls routed by the VoIP User network was available on their analytics page. Members could get a UK non-geographic phone number for free, which could be directed to any landline globally or specific VoIP devices. VoIP User was a member of ITSPA, the self-regulating body for the VoIP industry. It complied with the UK number portability scheme. Technology VoIP User supported Session Initiation Protocol (SIP) for both incoming and outgoing calls and IAX2 protocol for incoming calls. It also supported SIP SIMPLE for Instant Messaging and Presence. A wide variety of customer equipment was used on the VoIP User network including desktop VoIP phones, softphones, mobile phones (using Fring on the Apple iPhone and Windows Mobile devices and in-built Wi-Fi functionality in Nokia E series), ATAs and open source switches and PBXes like FreeSWITCH and Asterisk. VoIP User enabled these devices to be mapped to UK non-geographic numbers (typically 0844 or 0870) that have a per minute call rate low enough to fit in with VoIP User’s mode of operation. As an experimental network, several software vendors and private authors tested their SIP devices using the VoIP User
https://en.wikipedia.org/wiki/5x86
5x86 may refer to: Cyrix Cx5x86, computer chip made by Cyrix Am5x86, 486 computer chip made by AMD See also x86 for a more general explanation of this line of chips
https://en.wikipedia.org/wiki/11i
11i may refer to: 11i (album), an album by The Supreme Beings of Leisure Oracle 11i, an Oracle Applications version WPA2, an international standard specifying security mechanisms for wireless networks See also IEEE 802.11i-2004, an international standard specifying security mechanisms for wireless networks
https://en.wikipedia.org/wiki/Aspirating%20smoke%20detector
An aspirating smoke detector (ASD) is a system used in active fire protection, consisting of a central detection unit which draws air through a network of pipes to detect smoke. The sampling chamber is based on a nephelometer that detects the presence of smoke particles suspended in air by detecting the light scattered by them in the chamber. ASDs can typically detect smoke before it is visible to the naked eye. In most cases aspirating smoke detectors require a fan unit to draw in a sample of air from the protected area through its network of pipes. History In 1970 the Australian Commonwealth Scientific and Industrial Research Organisation (CSIRO) used a nephelometer to carry out research into forest fires. Subsequently, the Australian Postmaster-General's Department engaged the CSIRO to investigate technologies that could prevent service interruption due to fire. After selecting a sample site to carry out research, the CSIRO suggested that the nephelometer should be used as the benchmark for the APO fire tests. This was installed to monitor smoke levels within the return-air ducts of the mechanical ventilation system, utilising a chart-recorder output display. At the conclusion of several weeks of testing, it was discovered that there no commercially available fire detection technology suitable for preventing damage to telephone equipment. One technology that did show great promise however was the nephelometer itself. In 1979, Xtralis, then IEI Pty Ltd., produced and sold an air sampling device they called VESDA (Very Early Smoke Detection Apparatus). The company redesigned the detector in 1982 to provide the reliability, features, size and reduced cost for export markets. ASD systems have gained popularity due to their ability to sense smoke long before a catastrophic incident. Design ASD design corrects shortcomings of conventional smoke detectors by using a sampling pipe with multiple holes. The air samples are captured and filtered, removing any contaminants or dust to avoid false alarms and then processed by a centralized, highly sensitive laser detection unit. If smoke is detected, the systems alarm is triggered, and signals are then processed through centralized monitoring stations within a few seconds. Unlike passive smoke detection systems, including spot detectors, ASD systems actively draw smoke to the detector through bore holes within a piping system that runs throughout the protected area. Furthermore, ASD systems incorporate integrity monitoring to ensure an alert is raised at any time the ASD's ability to detect smoke is compromised. This is not the case with passive devices that are generally only electrically monitored with no ability to determine if smoke can actually reach the detection element. ASD systems incorporate more than one level of alarm. This allows an ASD system to provide very early warning of an event, prompting investigation at the earliest smouldering stage of a fire when it is easily addressed. Other
https://en.wikipedia.org/wiki/Kevin%20Crease
Kevin John Crease (8 May 1936 – 12 April 2007) was a South Australian television presenter and news presenter. He was most noted for presenting South Australian edition of the Nine Network's National Nine News with Rob Kelvin between 1987 and 2007. Early life Born in North Adelaide and raised in the working class seaside suburb of Semaphore, Crease was the eldest of four children. He was a prodigious public speaker from a young age and won the Year 7 senior school debating championship. He started his working life as a clerical worker in 1952 with Shell before becoming a copy boy and later cadet at Adelaide's The News newspaper, where he quickly "fell foul of the chief-of-staff" and was sacked. Crease completed his national service, but resigned from the army following an incident where he used an armored car to attend a party with his girlfriend. Professional career Crease started his radio career at radio station 5DN in 1957 after being noticed as a spruiker selling plastic raincoats in Adelaide's city streets. On 17 July 1959, Channel 9 began its first broadcast in Adelaide. Crease was chosen to compere the station's first program – Clarkson's TV Hostess Quest. During the 1960s, he worked on a variety of different projects, from reading commercials and news, to performing on Adelaide Tonight as compere from 1962 to 1975. In the early 1970s, he hosted the news program News Beat. From 1975 to 1977, Crease was then Premier of South Australia Don Dunstan's press secretary before returning to television. He went on to present news for ADS-7. 1983 saw the release of his children's book Sam and the Dreamtime, which was set in his home city of Adelaide and included illustrations by John Draper and photographs by Crease. He returned to Channel 9 in April 1987 as presenter for National Nine News with Rob Kelvin. Together, the pair would enjoy considerable ratings success, taking Nine News Adelaide to the top of the ratings in the 1990s. On 9 February 2007, co-host Rob Kelvin announced that Crease was going through a serious health issue and was taking extended leave from presenting. It was revealed on 17 March 2007 on National Nine News that he was suffering from a 'serious form of cancer'. The Sunday Mail reported the following day that Crease would be retiring from television broadcasting. Death Crease died on 12 April 2007, aged 70 at the Queen Elizabeth Hospital. Honours Following his death, Crease was posthumously inducted into the South Australian Media Hall of Fame. The award was accepted by his son, Tom Crease, at the awards ceremony held 28 April 2007, at the Adelaide Festival Centre. Later that week NWS-9 aired Farewell Creasey which was the top rating program in Adelaide for the week. Personal life He had three children with his first wife Josie. He was also the father with his second wife Cathy of Frenzal Rhomb bassist Tom Crease. References 1936 births 2007 deaths Nine News presenters Journalists from South Australia Australi
https://en.wikipedia.org/wiki/The%20Cyber%20Shinobi
The Cyber Shinobi (also known as Shinobi Part 2) is a side-scrolling hack and slash produced by Sega that was released for the Master System in 1990. It was the third Shinobi game for the console (including Alex Kidd in Shinobi World) and served as a futuristic sequel to the original Shinobi. The game was released in Canada, Europe, Australia and Brazil, at a time when the Master System was discontinued in other markets. Gameplay The controls and rules of the game are very different from the original Shinobi. Although the objective of the game is still to reach the end of the stage and then fight a boss, the player is prevented from proceeding onwards at certain points of each stage until certain enemies are eliminated, similar to a side-scrolling beat-'em-up. The player attacks primarily with their sword and a crouching kick. The height of the player's jumps can be increased as well by holding the d-pad upwards while pressing the jump button. The player has a total of four gauges on the top screen. In addition to their "life" gauge that shows the amount of damage the player can sustain before losing a life, there is also a "power" gauge that determines the strength of their basic attacks, a "shot" gauge that shows the remaining ammunition of their current sub-weapon, and a "Ninjutsu" gauge that determines which spells the player can use. By destroying item containers located throughout each stage, the player can pick up power-ups marked by the letters "L", "P", "S" and "N" to fill out each individual gauge by one unit. When the player first picks up a "Shot" power-up, they will wield a shuriken launcher, which can be replaced with an automatic "Vulcan" gun, and then a supply of grenades, by picking up subsequent "shot" power-ups. Each sub-weapon can only hold up to eight shots each and when the player's current sub-weapon runs out of ammo, they will revert to the previous one and so-on until their last sub-weapon runs out as well. "Ninjutsu" spells are performed by pressing buttons '1' and '2' simultaneously. There are a total of four Ninjutsu spells and, although each one requires a different number of units to perform, only two units are actually consumed when one is performed. As a result, the player can max out their Ninjutsu gauge, use the powerful spell, and then work their way down to the weaker ones. The Ninjutsu spells available are "Fire" (requires one or two units), "Tornado" (four units), "Lightning" (six units) and "Earth Element" (eight units). Plot Set sometime during the 21st century, the player controls the grandson of the ninja master Joe Musashi, also named Joe, who is on a mission to defeat the minions of Cyber-Zeed, a terrorist organization founded by the remnants of the Zeed organization that the original Joe Musashi destroyed. Joe must fight his way through a series of six stages in order to prevent Cyber-Zeed from launching its stolen stockpiles of plutonium around the world. The stages consist of a construction site
https://en.wikipedia.org/wiki/863%20Benkoela
863 Benkoela is an A-type asteroid orbiting the Sun that was discovered by German astronomer Max Wolf on 9 February 1917 from Heidelberg. 10μ radiometric data collected from Kitt Peak in 1975 gave a diameter estimate of 34 km. References External links Lightcurve plot of 863 Benkoela, Palmer Divide Observatory, B. D. Warner (2004) Asteroid Lightcurve Database (LCDB), query form (info ) Dictionary of Minor Planet Names, Google books Asteroids and comets rotation curves, CdR – Observatoire de Genève, Raoul Behrend Discovery Circumstances: Numbered Minor Planets (1)-(5000) – Minor Planet Center 000863 Discoveries by Max Wolf Named minor planets 000863 000863 19170209
https://en.wikipedia.org/wiki/972%20Cohnia
972 Cohnia is a minor planet orbiting the Sun, one of several such in the asteroid belt. It was discovered on 18 January 1908 by a team in Heidelberg led by Max Wolf. In 2007, lightcurve data showed that Cohnia rotates every 18.472 ± 0.004 hours. It is named after the German astronomer Fritz Cohn. References External links 000972 Discoveries by Max Wolf Named minor planets 19220118
https://en.wikipedia.org/wiki/BlueHippo%20Funding
BlueHippo Funding, LLC was an installment credit company operating in the USA founded by Joseph Rensin that claimed to offer personal computers, flat-screen televisions and other high-tech items for sale to customers with poor credit. In an article published November 25, 2009 titled BlueHippo files for bankruptcy: Company blames its bank; was accused of violating settlement with FTC, Eileen Ambrose reported that the company "was forced to file for protection under Chapter 11." On Wednesday December 9, 2009, the company filed for Chapter 7 bankruptcy after having its funds frozen by their payment processor. A petition to a Delaware bankruptcy judge to release the funds was denied. The company's advertised toll-free phone number and website are no longer functioning. The company encountered several complaints with the Better Business Bureau; the Greater Maryland Better Business Bureau issued a consumer alert against the company within eight months of its founding. BlueHippo's main product was a personal computer system. Its radio commercials stated that a customer must build a "short credit history" to qualify. The payment was made through an installment plan. The company had been investigated several times for consumer fraud. In April 2008, BlueHippo settled with the Federal Trade Commission to reimburse defrauded customers up to $5 million. However, on November 12, 2009, the FTC filed a memorandum in federal court reporting that despite collecting more than $15 million from customers since the April 2008 settlement, BlueHippo shipped "at most a single computer" before the FTC resumed legal action in April 2009. Blue Hippo was repeatedly fined by the court for failure to file the FTC reports it had agreed to file as part of the agency's oversight. On November 13, 2009, Ars Technica reported, "The FTC has had it, and today went back to court asking a federal judge for a contempt order against BlueHippo." Criticisms and investigations The Federal Trade Commission (FTC) received 8,000 pages of complaints and launched an investigation of the company. In February 2008 the FTC settled its grievances with BlueHippo and required the company to pay up to $5,000,000 to settle the FTC's charges. In April 2009, a federal court found BlueHippo in contempt for not issuing reports to the FTC as required by the settlement. The Maryland Attorney General reached a settlement with Blue Hippo in 2007. Under the terms of the settlement, the company agreed to pay restitution to consumers who overpaid or did not receive their goods. Bill McCollum, Florida Attorney General said, "We think that overall, this is a very deceptive trade practice." The Tennessee Attorney General filed a civil lawsuit for alleged deceptive practices against BlueHippo companies, as well as proposing an injunction requiring greater disclosures in advertising and prior to obtaining further payments, as well as the freezing of $2.5 million in cash. West Virginia also sued BlueHippo.
https://en.wikipedia.org/wiki/Kenji%20Fukui
is a Japanese television announcer. He began his broadcasting career in 1976 with Fuji Television, and was one of the three longest-serving television presenters on the Fuji network, before he quit the station in 2013. Fukui has hosted numerous television news and variety programs, but is best known as the "play by play" announcer of Iron Chef. He is known for his frequent jokes towards actors and guests on the show, and has a comical attitude on the show. He is the almost constant narrator on the show and talks about the food being used, the chefs, and explains the finished dishes to the home audience before they are judged. He is also known for making frequent analogies to baseball while commentating. Fukui is the host of the television variety show Tamori's Japonica Logos, starring Japanese TV personality Tamori. References External links Fuji Television announcer Official site 1953 births Living people People from Hiroshima Japanese announcers
https://en.wikipedia.org/wiki/Supernode%20%28networking%29
In peer-to-peer networking, a supernode is any node that also serves as one of that network's relayers and proxy servers, handling data flow and connections for other users. This semi-distributed architecture allows data to be decentralized without requiring excessive overhead at every node. However, the increased workload of supernodes generally requires additional network bandwidth and central processing unit (CPU) time. References File sharing
https://en.wikipedia.org/wiki/Transportation%20in%20Oklahoma%20City
Oklahoma City is near the geographic center of the United States and is an integral point on the U.S. Interstate Network. The city is served by numerous roads and highways, toll roads, three major airports, a train station, a bus station, and a transit system. Roads and highways Oklahoma City is served by an extensive freeway network. The city's network serves every major city in the region and are 6–8 lanes. Most have a level of congestion significantly lower than most comparably sized cities. In fact, OKC's freeways are rarely congested with the "stop and go" commuter patterns of other major cities. It is often said that one can get from any part of the OKC Metro area to downtown in 30 minutes or less by freeway. The city streets are on a N–S–E–W grid network with major streets one mile separated. The former section of I-40 directly adjacent to downtown was known as the "Crosstown Expressway". The I-40 Crosstown Construction Project relocated the original elevated stretch of highway several blocks to the south. It opened to the public in 2012. Interstate highways Three major interstate routes serve the city in addition to two secondary interstates. Oklahoma City is the only city in the nation dissected by two interstate highways that reach the entire length of the nation (Interstate 40 E-W and Interstate 35 N-S). Interstate 35 – Major cities connected: (N) Wichita, Kansas City, Minneapolis; (S) Dallas-Fort Worth, Austin, San Antonio Interstate 40 – Major cities connected: (W) Amarillo, Albuquerque, Los Angeles/Riverside area (terminus); (E) Little Rock, Memphis, Nashville Interstate 44 – Major cities connected: (E) Tulsa, St. Louis (terminus); (W) Lawton, Wichita Falls, Texas (terminus) Interstate 235 –Downtown Oklahoma City; I-35/I-40 junction to the I-44/Broadway Extension junction in North Oklahoma City Interstate 240 – SW Oklahoma City; I-44 to I-40 in Eastern Oklahoma County Other major thoroughfares Broadway Extension (US-77) – North Oklahoma City Lake Hefner Parkway (SH-74) – Northwest Oklahoma City Kilpatrick Turnpike (Outer Loop Tollway) – North and West Oklahoma City Airport Road (SH-152) – Southwest Oklahoma City Northwest Expressway (SH-3) – Northwest Oklahoma City 39th Expressway (SH-66) – West Oklahoma City Northeast 23rd Street (US-62) – East Oklahoma County Shields Boulevard (US-77) – South Oklahoma City Reno Avenue – West/East Central Oklahoma City Air Oklahoma City is a major air transportation and maintenance center, with three major airports and numerous other smaller ones. Will Rogers World Airport (OKC) is the principal commercial airport of the state and is the anchor of the city's network; located on the SW side of the city, the airport is completing the second phase of an expansion plan and is currently expanding its non-stop flight offerings (with emphasis on its top-15 O/D destinations). Will Rogers also serves as a major maintenance facility with numerous companies providing maintenance to larg
https://en.wikipedia.org/wiki/Pororo%20the%20Little%20Penguin
Pororo the Little Penguin () is a South Korean computer animation television show. The series premiered on EBS 1 in South Korea in 2003. The series had 8 seasons. The series revolves around the adventures of a little penguin named Pororo, and his friends who live in the snowy hamlet of Porong Porong Forest, who often encounter challenges and learn practical and moral lessons in each episode. Production It was created in 2003 Iconix Entertainment Co., Ltd, a company based in Seoul, South Korea. Choi Sang-hyun, who was working at Iconix Entertainment, was given a project of creating a character that represents an animal living in the winter. Choi visited a zoo in order to see those animals and understand how children enjoyed watching them. Several professional designers joined the project to come up with a character, but Choi's design was chosen as the winner, which then became Pororo. The original Pororo was a blue and white, petite penguin sporting an aviator helmet and goggles, which became popular among children. When it was introduced, it targeted children aged 4–7. Pororo has no specific background or cultural coding, so that the series could be popular to children worldwide. Pororo's design inspirations include iconic mascots Mickey Mouse and Hello Kitty. The creators picked the colours blue, pink and white to ensure familiarity for children, as well as representing said colors for boys and girls. When making episodes, producers focused to details that could be biased to certain cultural codes or give a historical reference, that is sensitive to viewers in certain parts of the world. For example, they ensured that the characters wave rather than bowing or nodding to each other. In the third season, the characters were all given redesigns and outfits that correspond to their personalities. Characters English credits: English translation: Ani100 English voice director: Anna Paik English cast: Bommie Catherine Han: Pororo, Monkey 1 Anna Desmarais: Eddy, Petty Nancy Kim: Harry, Monkey 3 Anna Paik: Loopy, Tutu, Monkey 2 Matt Anipen: Poby, Narrator, Wall Clock Josh Schwartzentruber: Rody, Fuzzy Wuzzy John Lee: Tong-tong, Yeti Broadcast The series premiered on EBS 1 in South Korea in 2003. In the US, the show was dubbed in Spanish and aired on V-me in the late 2000s and currently aired on V-me Kids. In the UK, the series was dubbed in British English and aired on CiTV and then, Cartoonito. In Australia, the series aired on ABC Kids. On October 5, 2015, it was broadcast in Brazil through TV Cultura and later on October 12 through TV Rá-Tim-Bum. In Italy, the show aired on Rai 2. In Spain, the series aired on Clan and was dubbed in Castillian Spanish. In 2010, the series was purchased by the NPO for Zappelin in the Netherlands. In Poland, the show was aired on MiniMini+ under the title "Mały pingwinek Popolo". In Japan, the first season aired on Fuji TV, but other three aired on Disney Junior. In Southeast Asia, the ser
https://en.wikipedia.org/wiki/RFD-TV
RFD-TV is an American pay television channel owned by Rural Media Group, Inc. The channel features programming devoted to rural issues, concerns and interests. The channel's name is a reference to Rural Free Delivery, the name for the United States Postal Service's system of delivering mail directly to rural patrons. Production and uplinking facilities for RFD-TV are located at 49 Music Square West, Music Row in Nashville, Tennessee. RFD-TV's sister radio channel is Rural Radio on Sirius XM. RFD-TV also owns a theater in Branson, Missouri where some variety shows that air on RFD-TV are filmed, as well as the Imus Ranch in Ribera, New Mexico. RFD-TV is the flagship network for Rural Media Group. Launched in December 2000, RFD-TV is the nation's first 24-hour television network featuring programming focused on the agribusiness, equine and the rural lifestyle, along with traditional country music and entertainment. As of 2017, RFD-TV operates on a full-service format. Mornings and the early part of daytime feature syndicated newsmagazines and a five-hour block of news, weather (forecasting services on the network are outsourced to The Weather Channel) and agricultural commodity market prices, in the basic format of an American cable news outlet. An additional newscast airs during the evening hours. The remainder of the daytime and evening schedule consists of horse-related magazines, coverage of rodeo and other Western sports, rural lifestyle programs, reruns of classic television programs with rural appeal, and music programs centered around country music, polka, and Southern gospel. Infomercials, which were previously publicly banned from the network, appear during the overnight hours. The network also features brokered programming in the form of its call-in program Rural America Live, and brokered televangelism from Charles Stanley, David Jeremiah and John Hagee. As of February 2015, RFD-TV is available to approximately 52 million pay television households (44.8% of households with television) in the United States. It is currently carried by satellite providers Dish Network and DirecTV and their associated streaming services (Sling TV and DirecTV Stream, respectively), as well as through cable providers such as Mediacom, Charter Communications, Cox Communications and Armstrong. It is not available in most Comcast markets; Comcast dropped the channel in many of its Western markets in 2013. In addition to its subscription coverage, RFD-TV is offered as an Internet television feed; the feed is currently paywalled and requires a paying subscription. In March 2020, RFD-TV launched a streaming app RFD-TV Now, making RFD-TV programming available on tablets, phones, and connected TVs. It was added to Sling TV on April 4, 2017, as part of the "Heartland Extra" add-on service. With an average of 136,000 viewers in 2016, RFD-TV has some of the highest viewership relative to availability compared to other "ultra-niche" networks with similar or wider dist
https://en.wikipedia.org/wiki/List%20of%20The%20Powerpuff%20Girls%20episodes
The Powerpuff Girls is an American animated television series created by Craig McCracken for Cartoon Network. The series began as a student film called Whoopass Stew, made by McCracken while he attended the California Institute of the Arts in 1992. Two additional shorts, "Meat Fuzzy Lumpkins" and "Crime 101", later aired on Cartoon Network's World Premiere Toons. The series officially premiered on November 18, 1998, lasting 6 seasons with 78 episodes total. A Christmas special and a 10th anniversary special were also produced. Episodes of The Powerpuff Girls have seen numerous VHS and DVD releases as well. The musical episode "See Me, Feel Me, Gnomey" was never aired in the United States, but was broadcast on YTV in Canada in 2004–2005 as well as in other countries (including Japan), and is included on the complete series DVD box set. Series overview Episodes Whoopass Stew A short was made by Craig McCracken while he was in college at CalArts. He submitted it to Cartoon Network, with the name "Whoopass Stew" changed to "The Powerpuff Girls". Four pilot shorts were started, though only one was finished. The other three pilots are presented on the Complete Series DVD set accompanied by the original storyboards and their original audio. What a Cartoon! shorts Both shorts are written and directed by Craig McCracken, with Genndy Tartakovsky as animation director, Paul Rudish as art director and Mike Moon as layout designer. Season 1 (1998–99) Series creator Craig McCracken directs every episode in this season, although there are co-directors directing alongside him. Craig Kellman also serves as art director of each episode. Season 2 (1999–2000) Like with the last season, Craig McCracken directs every episode although there are co-directors. Season 3 (2000–01) As with previous seasons, Craig McCracken directs every episode although with different co-directors. Don Shank also serves as art director of every episode, with Craig Kellman co-directing the art in "Monkey See, Doggy Two". Season 4 (2001–02) As with previous seasons, Craig McCracken directs every episode. This is the final season where he directs all of the episodes. Don Shank also serves as art director, being the final season as such in that position. Season 5 (2002–04) Season 6 (2004–05) Specials Christmas special (2003) 10th anniversary special (2009) A special 22-minute episode was produced to celebrate the series' 10th anniversary. The episode in question, "The Powerpuff Girls Rule!!!", aired on January 19, 2009, and is included as a bonus feature on the 10th anniversary DVD box set. CGI special (2014) On January 28, 2013, it was announced that a new CGI special titled "Dance Pantsed" starring the girls would premiere late 2013. By the end of the year however, it was announced that the special would air on January 20, 2014. Craig McCracken did not participate in the production and has had no say regarding the special. Home media The following is a list of VHS, DVD, an
https://en.wikipedia.org/wiki/Sleuth
Sleuth may refer to: Detective Sleuth, collective noun for a group of bears Computing The Sleuth Kit, a collection of forensic analysis software SLEUTH assembler language for the UNIVAC 1107 Entertainment and media Cloo, formerly Sleuth, an American cable television channel owned by NBCUniversal Sleuth (Australian TV channel), formerly Fox Sleuth, an Australian cable channel owned by Foxtel Sleuth (Disney), a fictional Disney character Sleuth (video game), a 1983 computer game Theatre and film The Sleuth (1925 film), a silent era film featuring Stan Laurel Sleuth (play), a 1970 play by Anthony Shaffer Sleuth (1972 film), a film adaptation of the Anthony Shaffer play, directed by Joseph L. Mankiewicz Sleuth (2007 film), a film adaptation of the Anthony Shaffer play, adapted by Harold Pinter and directed by Kenneth Branagh Vessels HMAS Sleuth, ships of the Royal Australian Navy HMS Sleuth (P261), a submarine of the Royal Navy, in service 1944–1958 Other Sleuth (game), one of the 1960s 3M "gamette" card games
https://en.wikipedia.org/wiki/Matt%20Dillon%20%28disambiguation%29
Matt Dillon (born 1964) is an American actor. Matt Dillon or Matthew Dillon may also refer to: Matthew Dillon (born 1966), computer programmer and founder of the DragonFly BSD and HAMMER projects Matt Dillon (Gunsmoke), main character in the Western radio and TV drama Gunsmoke Matt Dillon (chef), chef and restaurateur in Seattle, Washington Matt Dillon, American infantry officer portrayed by Jon Hamm in the 2002 film We Were Soldiers See also Dillon (surname)
https://en.wikipedia.org/wiki/Procedural%20animation
A procedural animation is a type of computer animation used to automatically generate animation in real-time to allow for a more diverse series of actions than would otherwise be tedious using predefined animations. Procedural animation is used to simulate particle systems (smoke, fire, water), cloth and clothing, rigid body dynamics, and hair and fur dynamics, as well as character animation. In video games, it is often used for simple or complex actions such as turning a character's head whenever a player looks around (as in Quake III Arena) or ragdoll physics, which is usually used for the death of a character in which the ragdoll will realistically fall to the floor. A ragdoll usually consists of a series of connected rigid bodies that are programmed to have Newtonian physics acting upon them; therefore, very realistic effects can be generated that would very hardly be possible with traditional animation. For example, a character can die slumped over a cliff and the weight of its upper-body can drag the rest of it over the edge. Even more complex examples of procedural animation can be found in the game Spore wherein user-created creatures will automatically be animated to all actions needed in the game from walking, to driving, to picking things up. In the game Unreal Tournament 3, bodies who have gone into ragdoll mode to fake death can arise from any position into which they have fallen and get back on their feet. The canceled Indiana Jones game from LucasArts shown at E3 2006 featured character motions that were animated entirely in real-time, with characters dodging, punching, and reacting to the environment based on an engine called Euphoria by NaturalMotion which has since been used in games such as Grand Theft Auto IV and Backbreaker. See also Procedural programming Procedural generation Procedural texture Physics engine Ragdoll physics Game physics Cartoon physics References Virtual reality
https://en.wikipedia.org/wiki/Better%20Homes%20and%20Gardens%20%28TV%20program%29
Better Homes and Gardens is an Australian television program which is broadcast on the Seven Network, which is based on the magazine of the same name domestically published by Are Media (itself licensing the brand and magazine format from the American Dotdash Meredith). The programs covers a wide variety of lifestyle related topics. These include, gardening, landscaping, architecture, cooking, DIY, pet care, and home improvement, as well as featuring celebrity guests. The show is hosted by former Commonwealth Games swimmer-turned-television presenter Johanna Griggs, who has hosted the program since 2005. In 2014, Better Homes and Gardens was awarded a record 12th Silver Logie Award for Australia's Most Popular Lifestyle Program. History The show was created by Peter E. Fox, who was also an executive producer for the 1995 series, along with Grahame Duckham. This was for the original magazine publisher, Murdoch Magazines and executive director Mark Kelly. The series aired its 1000th episode on 29 June 2018. Gardening guru Graham Ross has appeared on the show since 1995, presenting over 700 episodes. Resident vet Dr. Harry Cooper joined the team in 2004 and has been providing pet information and advice to viewers ever since. Ed Halmagyi (known on the show as 'Fast Ed') joined the team in 2004 he transforms elegant restaurant cuisine into recipes that anyone can prepare at home. Melbourne Chef Karen Martini joined the show in 2006 bringing with her a love of relaxed cooking with fresh, healthy, seasonal produce. Builder Adam Dovile joined the show in 2015 after winning season two of House Rules in 2014, and is the go-to for DIY projects on the show. In January 2020, Charlie Albone, James Tobin and Melissa King joined the show as presenters. Albone's partner Juliet Love is the show's designer and decorator and joined the show in 2021. Presenters Hosts Johanna Griggs (2005–present) Graham Ross (2004) Noni Hazlehurst (1995–2004) John Jarratt (1995–98) Food Karen Martini (2007–present) "Fast Ed" Ed Halmagyi (2004–present) Pete Evans (2018–2020) Maeve O'Meara (2000–2007) Belinda Jeffrey (1996–2000) Gardening Graham Ross (1995–present) Charlie Albone (2020–present) Melissa King (2020–present) Jason Hodges (2005–2019) (Landscaping) Linda Ross (1996–2000) Colm O'Leary (1995-1996) Architecture Peter Coulqhoun (2003–present) Grahame Bond (1998–2002) Tony Fragar (1996) Decorating Juliet Love (2021–present) Tara Dennis (2006–2020) Lissanne Oliver (2005) Gwen Jones Palmer (2004) Monica Trapaga (1997–2003) Fiona Connolly (1996–2004) (Craft) Sandy de Beyer (1996) Noni Hazlehurst (1995) DIY Adam Dovile (2015–present) Rob Palmer (2004–2014) Scott McGregor (1999–2003) John Jarratt (1995–1998) Motoring & Technology James Tobin (2020–present) Health & Fitness Sam Wood (2020–2021) Pets Harry Cooper (2004–present) Noni Hazlehurst (1995–2003) Better Living (consumer advice) Noni Hazlehurst (1995–1997) Broadcast
https://en.wikipedia.org/wiki/Superlink
Superlink may refer to: Superlink (railway network) Transformer: Superlink, see Transformers: Energon M&M Superlink, see Mutants & Masterminds
https://en.wikipedia.org/wiki/Galaxy%20Force%20%28disambiguation%29
Galaxy Force may refer to: Galaxy Force (video game), a 3D shooter video game by Sega, also released by Activision for many home computers Transformers: Galaxy Force, the 16th Transformers animated series (Transformers: Cybertron in United States) Power Rangers: Galaxy Force, an animated Super Sentai and Power Rangers television series
https://en.wikipedia.org/wiki/Xawtv
xawtv is software for watching and recording television and webcams with either a TV tuner or a Satellite receiver card (DVB-S). xawtv works on Unix-like operating systems, and is licensed under the GPL. xawtv does not favour any particular desktop environment. It comes with applications which use Motif-based widgets, as well as other X11 and command line applications. It works with Video4linux and XVideo. The interface to xawtv is minimalistic, so it has been used to add video support to other programs. See also List of free television software References External links Free television software X Window programs
https://en.wikipedia.org/wiki/Pioneer%20Plague
Pioneer Plague is a game designed by Bill Williams for the Amiga computer and published in 1988 by Mandarin Software and Terrific Software. It is one of the few games to use the Hold-And-Modify display mode of the Amiga for in-game graphics, a mode which allows thousands of colors to be displayed at once, but in a format that's better suited to static images than moving objects. It may have been the first commercial game to use Hold-And-Modify. Pioneer Plague was not ported to other systems. Williams also wrote the 1986 Amiga game Mind Walker. Reception Pioneer Plague received an 88% from Amiga Computing and 86% from Zzap!64. British magazine Computer and Video Games was less enthusiastic with an overall score of 39%, commending the graphics but criticizing playability. References External links Pioneer Plague at Lemon Amiga 1988 video games Action games Amiga games Amiga-only games Single-player video games Video games developed in the United States
https://en.wikipedia.org/wiki/Blue%20Pacific
Blue Pacific may refer to ASCI Blue Pacific, a supercomputer Blue Pacific (album), a 1990 album by Michael Franks Blue Pacific (Streeton), an 1890 painting by Arthur Streeton See also Partners in the Blue Pacific
https://en.wikipedia.org/wiki/MTV%20Brasil
MTV Brasil was a Brazilian over-the-air television network owned by Grupo Abril focused on the youth and entertainment. The network was launched on 20 October 1990, as the first specialty television network to broadcast over-the-air, becoming the local version of MTV. It was the third MTV iteration launched in the world, and the first to broadcast via terrestrial television. The network headquarters was at 52 Avenida Professor Alfonso Bovero, Sumaré, São Paulo city, which was formerly the headquarters of Rede Tupi. This building was listed by Conselho de Defesa do Patrimônio Histórico (Condephaat) as having an historical heritage, becoming the first to be officially listed in the city. At the beginning of the 2010s, the channel was considered the largest youth network and the seventh largest terrestrial TV network in Brazil; it is still counted by Meio&Mensagem newspaper as the fifth most-viewed TV network in the country. MTV Brasil was the first network in the country dedicated to young people, in addition to being the first TV network in Brazil to broadcast their programming 24-hours-a-day, morning and night. The network ceased their operations on 30 September 2013, being replaced by a new channel operated by Viacom on subscription television. Its last music broadcast was “Orra Meu” by Rita Lee while its last music video to air was "Maracatu Atômico" by Chico Science & Nação Zumbi. On terrestrial television, however, the network was replaced by Ideal TV. Background MTV, acronym of Music Television, debuted in the United States on 20 August 1981 under the control of Warner-Amex Satellite Entertainment. Today owned by Viacom, the subscription network revolutionized the music industry worldwide with the popularization of music videos, that were showcased by hosts known as video jockeys.p, or “VJ’s”. In Brazil, the company has partnered with the Rede Bandeirantes for the broadcasting of special events, such as awards shows. The music video itself first came to Brazil through the Rede Globo's weekly news and entertainment show Fantástico. The news magazine was the only TV show to produce and broadcast this type of programming, until the early 1980s, when the independent music video producers wanted to escape the standards imposed by the network. At the same time, MTV appeared in the North American market. Throughout the decade, other programs dedicated to music videos were created, like Clip Trip, on TV Gazeta, Som Pop, on TV Cultura, FMTV and Manchete Clip Show from the defunct Rede Manchete and the Clip Clip, broadcast by Rede Globo. History MTV Brasil was launched on 20 October 1990, only to metropolitan São Paulo, through UHF channel A32 and metropolitan Rio de Janeiro, through VHF channel A9 (with TV Corcovado as an affiliate station). The first video shown was Garota de Ipanema, sung by Marina Lima. In 1996, Viacom acquired 50% of the network, which was, until then, a wholly owned subsidiary of Abril. In 2005, due to regulatory requi
https://en.wikipedia.org/wiki/Joker%20Poker
Joker Poker was a late night Australian poker program on Network Ten which aired in 2005 and 2006. The 2005 edition was hosted by Adam Spencer, with the second and final edition hosted by Mike Goldman. Both were co-hosted by New Zealand poker pro Lee Nelson and Australian model Laura Weston acted as hostess. The show was produced by Australian Production Company Freehand Productions. The show featured Australian comedians playing no-limit Texas hold'em poker. Four comedians compete in each episode on behalf of their chosen charity. It was recorded in the high rollers' room of Sydney's Star City Casino for the first season and in a studio at Fox Studios in Sydney for the second. The weekly winner donates $5,000 to charity, while the overall winner donates $25,000. A New Zealand version also aired in 2007. Season one Joker Poker was the first locally produced poker program to go to air in Australia. Hosted by Adam Spencer and Lee Nelson, it featured 40 local comedians during the course of the inaugural season. It aired on Saturday nights at 10:30pm. The first season was won by comedian Andy Lee. The final players were Andy Lee, Doctor Turf, Simon Kennedy and Jackie Loeb. Charities Star City Casino provided the $100,000 prize pool that was distributed by the winners of each round and the two final tables to the following charities: The Westmead Hospital The Heart Foundation Prince of Wales Foundation Canteen The Australian Red Cross Barnardos Australia The Mirrabel Foundation The Fred Hollows Foundation The Aids Trust of Australia Amnesty International Season two Joker Poker returned in 2006, with Lee Nelson being joined by Mike Goldman in place of Spencer. The second and final season consisted of 12 late night Joker Poker shows (airing on Wednesday nights at 11:15pm), Sporting Joker Poker and Lee Nelson Invitational specials, and four Celebrity Joker Poker specials (airing Tuesday nights at 9.30pm). Contestants Charities Wild Turkey provided the $140,000 prize pool that was distributed by the winners of each round and the two final tables to the following charities: Clown Doctors Amnesty International Matthew Talbot Variety Club Surf Life Saving Association Motor Neurone Disease Royal Children's Hospital in Melbourne – specifically the genetics department Royal Children's Hospital Melbourne Trisha & The Reach Broadridge Fund Kids Help Line Bonnie Babes Foundation Challenge Kids with Cancer New Zealand version The New Zealand version of the show was hosted by Brooke Howard-Smith and co-hosted by Lee Nelson. The two editions of the New Zealand version of Joker Poker (consisting of 12 episodes) began screening on TV3 Sunday nights at 10:30pm from 10 February 2007. The series was repeated on C4 with great results, airing on the following Wednesday nights at 8:30pm beginning 13 February 2007. Sponsors for the New Zealand were Pokerstars.net, Sky City Casino and Wild Turkey. Contestants Season one Episode 1: Jamie Linehan, Angus MacDonald,
https://en.wikipedia.org/wiki/Modern%20valence%20bond%20theory
Modern valence bond theory is the application of valence bond theory (VBT) with computer programs that are competitive in accuracy and economy with programs for the Hartree–Fock or post-Hartree-Fock methods. The latter methods dominated quantum chemistry from the advent of digital computers because they were easier to program. The early popularity of valence bond methods thus declined. It is only recently that the programming of valence bond methods has improved. These developments are due to and described by Gerratt, Cooper, Karadakov and Raimondi (1997); Li and McWeeny (2002); Joop H. van Lenthe and co-workers (2002); Song, Mo, Zhang and Wu (2005); and Shaik and Hiberty (2004) While molecular orbital theory (MOT) describes the electronic wavefunction as a linear combination of basis functions that are centered on the various atoms in a species (linear combination of atomic orbitals), VBT describes the electronic wavefunction as a linear combination of several valence bond structures. Each of these valence bond structures can be described using linear combinations of either atomic orbitals, delocalized atomic orbitals (Coulson-Fischer theory), or even molecular orbital fragments. Although this is often overlooked, MOT and VBT are equally valid ways of describing the electronic wavefunction, and are actually related by a unitary transformation. Assuming MOT and VBT are applied at the same level of theory, this relationship ensures that they will describe the same wavefunction, but will do so in different forms. Theory Bonding in H2 Heitler and London's original work on VBT attempts to approximate the electronic wavefunction as a covalent combination of localized basis functions on the bonding atoms. In VBT, wavefunctions are described as the sums and differences of VB determinants, which enforce the antisymmetric properties required by the Pauli exclusion principle. Taking H2 as an example, the VB determinant is In this expression, N is a normalization constant, and a and b are basis functions that are localized on the two hydrogen atoms, often considered simply to be 1s atomic orbitals. The numbers are an index to describe the electron (i.e. a(1) represents the concept of ‘electron 1’ residing in orbital a). ɑ and β describe the spin of the electron. The bar over b in indicates that the electron associated with orbital b has β spin (in the first term, electron 2 is in orbital b, and thus electron 2 has β spin). By itself, a single VB determinant is not a proper spin-eigenfunction, and thus cannot describe the true wavefunction. However, by taking the sum and difference (linear combinations) of VB determinants, two approximate wavefunctions can be obtained: ΦHL is the wavefunction as described by Heiter and London originally, and describes the covalent bonding between orbitals a and b in which the spins are paired, as expected for a chemical bond. ΦT is a representation of the bond that where the electron spins are parallel, resulting in a
https://en.wikipedia.org/wiki/Azteca%20Am%C3%A9rica
Azteca América (, sometimes shortened to Azteca) was an American Spanish-language free-to-air television network owned by INNOVATE Corp., which acquired the network from the Azteca International Corporation subsidiary of TV Azteca. Headquartered in New York City, the network's programming was aimed at the Hispanic and Latin American communities in the United States and had access to programming from TV Azteca's three television national networks in Mexico, including a library with over 200,000 hours of original programming and news content from local bureaus in 32 Mexican states. Its programming consisted of a mix of telenovelas, drama series, news programming, and reality and variety series. Azteca was available on pay television (primarily carried on dedicated Spanish language programming tiers, except in some markets with a free-the-air affiliate), with local stations in over 60 markets with large Hispanic and Latin American populations (reaching 89% of the Hispanic population in the U.S. The network's former flagship station KAZA-TV in Los Angeles (until January 2018) was the highest-rated station in Azteca's portfolio. Azteca América ceased all operations on December 31, 2022. History The network was formed through a programming alliance between Mexico-based broadcaster TV Azteca and Visalia, California-based television station owner Pappas Telecasting Companies announced on September 8, 2000; the two companies planned to launch a new Spanish language broadcast network during the second quarter of 2001, that would act as a competitor to established networks Univision and Telemundo. TV Azteca, which planned to own 20% of the network, contributed an exclusive programming agreement in the United States, Canada and Puerto Rico, while Pappas, which owned a majority 80% interest, planned to have stations it owned in ten markets – three already owned by the network, and seven that Pappas was in the process of acquiring in Nevada, Arizona and Texas (most of which were low-power stations) – serve as charter stations of the network, which was originally named Azteca América. Pappas and Azteca invested close to $500 million to start up the network, with an additional $450 million allocated for station acquisitions and a $129 million loan made by TV Azteca to Pappas. The network hoped to reach 65% to 70% of the Hispanic population in the U.S. by 2002. TV Azteca, which was formed in 1993, launched the network to capitalize on its success with its two television stations in Mexico City – XHDF-TV (channel 13) and XHIMT-TV (channel 7), respectively branded as "Azteca Trece" and "Azteca Siete" – which maintained a lineup of programs, including telenovelas and other serialized dramas with socially relevant themes, that helped it quickly grow to maintain a 36% ratings share during prime time against competition from the longer established and dominant Televisa networks. Azteca founder Ricardo Salinas Pliego had made previous attempts at entering into U.S.
https://en.wikipedia.org/wiki/List%20of%20publications%20and%20periodicals%20devoted%20to%20the%20Apple%20II
The Apple II is an 8-bit home computer. It is one of the first highly successful mass-produced microcomputer products. Introduced in 1977, it was the first consumer product sold by Apple Computer and the first model in the Apple II series. Its success spurred a thriving magazine industry aimed at Apple II owners which published type-in programs, programming tutorials, reviews, and other articles. Magazines 8/16 A+ (published by International Data Group) A2 Central On Disk Apple Assembly Lines A.U.G.E. (Apple User Group Europe) Call-A.P.P.L.E. Compute! Apple Co-Op Spirit, published after A.P.P.L.E. ceased business operations in 1990, returning the group to User Group Status. GS+ Hardcore Computist (later just Computist) II Alive (published by Quality Computers, a large mail-order retailer specializing in the Apple II) inCider (later merged with A+ and renamed "inCider/A+") Juiced.GS Nibble Open-Apple (later renamed "A2-Central"), published by Resource Central Pom's (France) Peelings II Reboot Softdisk and Softdisk G-S, by Softdisk Publishing SoftSide Apple Edition Shareware Solutions II The Apple II Review (later renamed "Apple IIGS Buyer's Guide") The Road Apple The Sorcerer's Apprentice Script-Central Softalk Studio City Windfall Juiced.GS is still in print as of 2018, and is the only remaining print publication dedicated to the Apple II computer. User group newsletters Most Apple user groups published newsletters; some of these gained fame outside their local area. The best known of these was the Call-A.P.P.L.E. (published by the Apple Pugetsound Program Library Exchange, A.P.P.L.E., in Seattle), the Washington Apple Pi Journal (published by Washington Apple Pi in Washington, D.C.). The Washington Apple Pi is still in operation and still publishing (though the focus is now on the Macintosh); A.P.P.L.E. ceased publication of Call-A.P.P.L.E. in 1990, printing the Co-Op Spirit for 3 years and restarting publication of Call-A.P.P.L.E. as an e-zine in 2002. External links Juiced.GS A2Central.com , Apple II news and downloads
https://en.wikipedia.org/wiki/Aprisma%20Management%20Technologies
Aprisma Management Technologies was created after Cabletron Systems was broken up into 4 smaller pieces, as the business unit to continue the highly successful SPECTRUM network management suite. It was acquired in early 2005 by Concord, which in turn was acquired by Computer Associates. References Defunct software companies of the United States