source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Juliya%20Chernetsky
Juliya Chernetsky Denning (, Yulia Chernetska; born July 10, 1982), is a television personality best known for her stage name Mistress Juliya and the popularity on the music-themed network Fuse. She also hosted the heavy metal-themed program Uranium and a call-in and email advice program called Slave to the Metal. She formerly hosted Fuse Top 20 Countdown along with several online programs that she self-promotes. Early life and career Chernetsky was born in Ukraine and raised in Brooklyn, New York. She attended Fort Hamilton High School and Hunter College. She was a big fan of MMUSA and a frequent poster on their bulletin boards. She was chosen to make her broadcast debut on the show Tastemakers. Her brashness made her an instant favorite, and after a year on Tastemakers, she moved on to host Uranium in June 2002. Uranium would offer one of the few televised outlets for heavy metal music and become one of MMUSA's (which changed its name to Fuse TV in 2003) most popular programs. Chernetsky's popularity led to the debut of a spin-off entitled Metal Asylum which followed a similar format and lasted over 100 episodes. Around this same time, she began hosting the music-themed advice show Slave to the Metal. These programs allowed Chernetsky to interview many of the biggest names in heavy metal as well as her personal idols. Within these few years, she established herself as a fixture of music journalism and the metal community, gaining exposure for new bands and exclusive access to events such as the Ozzfest 10th anniversary. Chernetsky would also sporadically join the multi-hosted team on IMX which ran from 2003 to 2004. On April 14, 2010, she announced over Twitter the death of Type O Negative frontman Peter Steele on her Twitter account, saying "Peter Steele passed today. I loved my friend...our idol...my heart is with his band and family..." She was also the host/MC of Rock on the Range 2010 in Columbus, Ohio, on May 22 and 23, introducing each band on the main stage. In July 2010, Juliya worked as tour correspondent for RockStar Mayhem Tour. In 2011, Mistress Juliya hosted Welcome to Rockville in Jacksonville, Florida. Fuse After over two years of being absent from Fuse, Juliya announced via Myspace her return to Fuse to do a weekly hard rock/metal countdown show. She also appeared on The Weekly Riff, a panel show hosted by Steven Smith. On September 22, 2008, she replaced Sami Jarroush as the host of No. 1 Countdown Rock. Juliya is currently the co-host of Fuse Top 20 Countdown along with Allison Hagendorf. Fuse Top 20 Countdown is a countdown show of the 20 most popular rock, pop, hip-hop and R&B videos of the week that also features interviews with the artists behind the hits and the most popular celebrities of today. Filmography References External links Official Website Juliya Chernetsky at Myspace Juliya Chernetsky at Twitter Official Juliya Chernetsky at Facebook Top 20 Countdown at fuse.tv 1982 births Living peop
https://en.wikipedia.org/wiki/Artificial%20Linguistic%20Internet%20Computer%20Entity
A.L.I.C.E. (Artificial Linguistic Internet Computer Entity), also referred to as Alicebot, or simply Alice, is a natural language processing chatterbot—a program that engages in a conversation with a human by applying some heuristical pattern matching rules to the human's input. It was inspired by Joseph Weizenbaum's classical ELIZA program. It is one of the strongest programs of its type and has won the Loebner Prize, awarded to accomplished humanoid, talking robots, three times (in 2000, 2001, and 2004). The program is unable to pass the Turing test, as even the casual user will often expose its mechanistic aspects in short conversations. Alice was originally composed by Richard Wallace; it "came to life" on November 23, 1995. The program was rewritten in Java beginning in 1998. The current incarnation of the Java implementation is Program D. The program uses an XML Schema called AIML (Artificial Intelligence Markup Language) for specifying the heuristic conversation rules. Alice code has been reported to be available as open source. The AIML source is available from ALICE A.I. Foundation on Google Code and from the GitHub account of Richard Wallace. These AIML files can be run using an AIML interpreter like Program O or Program AB. In popular culture Spike Jonze has cited ALICE as the inspiration for his academy award-winning film Her, in which a human falls in love with a chatbot. In a New Yorker article titled “Can Humans Fall in Love with Bots?” Jonze said “that the idea originated from a program he tried about a decade ago called the ALICE bot, which engages in friendly conversation.” The LATimes reported:Though the film’s premise evokes comparisons to Siri, Jonze said he actually had the idea well before the Apple digital assistant came along, after using a program called Alicebot about ten years ago. As geek nostalgists will recall, that intriguing if at times crude software (it flunked the industry-standard Turing Test) would attempt to engage users in everyday chatter based on a database of prior conversations. Jonze liked it, and decided to apply a film genre to it. “I thought about that idea, and what if you had a real relationship with it?” Jonze told reporters. “And I used that as a way to write a relationship movie and a love story.” See also Kuki (chatbot) Notes References Note: Online the article appears as four pages, which can be individually accessed by taking the article link and adding "?pagewanted=1" after it for the first page, or =2, =3 or =4 for each of the other pages available online. Further reading External links Chatbots
https://en.wikipedia.org/wiki/TAG%20%28bulletin%20board%20system%29
TAG is a DOS-based bulletin board system (BBS) computer program, released from 1986 to 2000. TAG was written in Borland Pascal and is free for business or personal use. The authors considered it fun to give the program away while others tried to charge for BBS programs. The software was a fork from an early version of the WWIV source code. At its peak, there were over 1000 running instances, mostly in the United States and Canada. The largest concentration was in the Detroit area, where it was one of the most popular BBS software run in the area. References Bulletin board system software DOS software Computer-related introductions in 1986
https://en.wikipedia.org/wiki/Instruction%20set%20simulator
An instruction set simulator (ISS) is a simulation model, usually coded in a high-level programming language, which mimics the behavior of a mainframe or microprocessor by "reading" instructions and maintaining internal variables which represent the processor's registers. Instruction simulation is a methodology employed for one of several possible reasons: To simulate the instruction set architecture (ISA) of a future processor to allow software development and test to proceed without waiting for the development and production of the hardware to finish. This is often known as "shift-left" or "pre-silicon support" in the hardware development field. A full system simulator or virtual platform for the future hardware typically includes one or more instruction set simulators. To simulate the machine code of another hardware device or entire computer for upward compatibility. For example, the IBM 1401 was simulated on the later IBM/360 through use of microcode emulation. To monitor and execute the machine code instructions (but treated as an input stream) on the same hardware for test and debugging purposes, e.g. with memory protection (which protects against accidental or deliberate buffer overflow). To improve the speed performance—compared to a slower cycle-accurate simulator—of simulations involving a processor core where the processor itself is not one of the elements being verified; in hardware description language design using Verilog where simulation with tools like ISS can be run faster by means of "PLI" (not to be confused with PL/1, which is a programming language). Implementation Instruction-set simulators can be implemented using three main techniques: Interpretation, where each instruction is executed directly by the ISS. Just-in-time compilation (JIT), where the code to be executed is first translated into the instruction set of the host computer. This is typically about ten times faster than a well-optimized interpreter. Virtualization, where processor extensions for virtual machines are used to execute instructions in the ISS. This only works for same-on-same instruction-set simulation, such as running x86 simulators on x86 hosts, or ARM simulators on ARM hosts. An ISS is often provided with (or is itself) a debugger in order for a software engineer/programmer to debug the program prior to obtaining target hardware. GDB is one debugger which has a compiled-in ISS. It is sometimes integrated with simulated peripheral circuits such as timers, interrupts, serial ports, general I/O ports, etc. to mimic the behavior of a microcontroller. The basic instruction simulation technique is the same regardless of purpose: first execute the monitoring program passing the name of the target program as an additional input parameter. The target program is then loaded into memory, but control is never passed to the code. Instead, the entry point within the loaded program is calculated, and a pseudo program status word (PSW) is set t
https://en.wikipedia.org/wiki/Machine%20epsilon
Machine epsilon or machine precision is an upper bound on the relative approximation error due to rounding in floating point arithmetic. This value characterizes computer arithmetic in the field of numerical analysis, and by extension in the subject of computational science. The quantity is also called macheps and it has the symbols Greek epsilon . There are two prevailing definitions. In numerical analysis, machine epsilon is dependent on the type of rounding used and is also called unit roundoff, which has the symbol bold Roman u. However, by a less formal, but more widely used definition, machine epsilon is independent of rounding method and may be equivalent to u or 2u. Values for standard hardware arithmetics The following table lists machine epsilon values for standard floating-point formats. Each format uses round-to-nearest. Formal definition Rounding is a procedure for choosing the representation of a real number in a floating point number system. For a number system and a rounding procedure, machine epsilon is the maximum relative error of the chosen rounding procedure. Some background is needed to determine a value from this definition. A floating point number system is characterized by a radix which is also called the base, , and by the precision , i.e. the number of radix digits of the significand (including any leading implicit bit). All the numbers with the same exponent, , have the spacing, . The spacing changes at the numbers that are perfect powers of ; the spacing on the side of larger magnitude is times larger than the spacing on the side of smaller magnitude. Since machine epsilon is a bound for relative error, it suffices to consider numbers with exponent . It also suffices to consider positive numbers. For the usual round-to-nearest kind of rounding, the absolute rounding error is at most half the spacing, or . This value is the biggest possible numerator for the relative error. The denominator in the relative error is the number being rounded, which should be as small as possible to make the relative error large. The worst relative error therefore happens when rounding is applied to numbers of the form where is between and . All these numbers round to with relative error . The maximum occurs when is at the upper end of its range. The in the denominator is negligible compared to the numerator, so it is left off for expediency, and just is taken as machine epsilon. As has been shown here, the relative error is worst for numbers that round to , so machine epsilon also is called unit roundoff meaning roughly "the maximum error that can occur when rounding to the unit value". Thus, the maximum spacing between a normalised floating point number, , and an adjacent normalised number is . Arithmetic model Numerical analysis uses machine epsilon to study the effects of rounding error. The actual errors of machine arithmetic are far too complicated to be studied directly, so instead, the following simple model is
https://en.wikipedia.org/wiki/Trams%20in%20Sydney
The Sydney tramway network served the inner suburbs of Sydney, Australia, from 1879 until 1961. In its heyday, it was the largest in Australia, the second largest in the Commonwealth of Nations (after London), and one of the largest in the world. The network was heavily worked, with about 1,600 cars in service at any one time at its peak during the 1930s (cf. about 500 trams in Melbourne today). Patronage peaked in 1945 at 405 million passenger journeys. Its maximum street trackage totalled 291 km (181 miles) in 1923. History Early tramways Sydney's first tram was horse-drawn, running from the old Sydney railway station to Circular Quay along Pitt Street. Built in 1861, the design was compromised by the desire to haul railway freight wagons along the line to supply city businesses and return cargo from the docks at Circular Quay with passenger traffic as an afterthought. This resulted in a track that protruded from the road surface and it caused damage to the wheels of wagons trying to cross it. Hard campaigning by competing Horse Omnibus owners – as well as a fatal accident involving the leading Australian musician Isaac Nathan in 1864 – led to closure in 1866. In 1879 a steam tramway was established in conjunction with the upcoming Sydney International Exhibition that was to be held in the Domain/Botanical Gardens area of Sydney. Originally planned by the government to be removed after the exhibition, the success of the steam tramway led to the system being expanded rapidly through the city and inner suburbs during the 1880s and 1890s. The Steam Trams in Sydney comprised a Baldwin steam tram motor hauling one or more trailers of either single deck or double deck construction. Unlike the earlier horse tramway, the steam tramway used grooved rail for on-street running. Preserved Sydney Steam Trams are Motor 1A, owned by the Powerhouse Museum and is usually stored at the "Discovery Centre" at Castle Hill, however it is currently on loan to the Sydney Tramway Museum at Loftus (currently non-operational), Motor 100A (operational) at the Museum of Transport and Technology, Auckland New Zealand as it was sold to Wanganui Tramways in 1910 and Motor 103A which operates with a former trailer car 93B at Valley Heights Rail Museum after previously being at Parramatta Park.Two cable tram routes were also built in Sydney. The first route ran from the original Milsons Point ferry wharf in North Sydney to near Falcon Street North Sydney and was later extended to Crows Nest. Construction of a cable line north of harbour was due to the steep terrain involved from Milsons Point to North Sydney. The second route ran from King Street Wharf on the eastern side of Darling Harbour to Ocean Street Edgecliff. Cable Trailer 23 is preserved at the Sydney Tramway Museum at Loftus. Additionally, horse trams operated between Newtown and St Peters railway stations in the 1890s and between Manly and North Manly from 1903 to 1907. However these two instances, the opera
https://en.wikipedia.org/wiki/Peephole%20optimization
Peephole optimization is an optimization technique performed on a small set of compiler-generated instructions; the small set is known as the peephole or window. Peephole optimization involves changing the small set of instructions to an equivalent set that has better performance. For example: instead of pushing register A onto the stack and then immediately popping the value back into register A, a peephole optimization would remove both instructions; instead of adding A to A, a peephole optimization might do an arithmetic shift left; instead of multiplying a floating point register by 8, a peephole optimization might scale the floating point register's exponent by 3; and instead of multiplying an index by 4, adding the result to a base address to get a pointer value, and then dereferencing the pointer, a peephole optimization might use a hardware addressing mode that accomplishes the same result with one instruction. The term peephole optimization was introduced by William Marshall McKeeman in 1965. Replacement rules Common techniques applied in peephole optimization: Null sequences – Delete useless operations. Combine operations – Replace several operations with one equivalent. Algebraic laws – Use algebraic laws to simplify or reorder instructions. Special case instructions – Use instructions designed for special operand cases. Address mode operations – Use address modes to simplify code. There can be other types of peephole optimizations. Examples Replacing slow instructions with faster ones The following Java bytecode ... aload 1 aload 1 mul ... can be replaced by ... aload 1 dup mul ... This kind of optimization, like most peephole optimizations, makes certain assumptions about the efficiency of instructions. For instance, in this case, it is assumed that the dup operation (which duplicates and pushes the top of the stack) is more efficient than the aload X operation (which loads a local variable identified as X and pushes it on the stack). Removing redundant code Another example is to eliminate redundant load stores. a = b + c; d = a + e; is straightforwardly implemented as MOV b, R0 ; Copy b to the register ADD c, R0 ; Add c to the register, the register is now b+c MOV R0, a ; Copy the register to a MOV a, R0 ; Copy a to the register ADD e, R0 ; Add e to the register, the register is now a+e [(b+c)+e] MOV R0, d ; Copy the register to d but can be optimised to MOV b, R0 ; Copy b to the register ADD c, R0 ; Add c to the register, which is now b+c (a) MOV R0, a ; Copy the register to a ADD e, R0 ; Add e to the register, which is now b+c+e [(a)+e] MOV R0, d ; Copy the register to d Removing redundant stack instructions If the compiler saves registers on the stack before calling a subroutine and restores them when returning, consecutive calls to subroutines may have redundant stack instructions. Suppose the compiler generates the following Z80 instructions for each procedure call: PUSH AF
https://en.wikipedia.org/wiki/Cumulus%20%28disambiguation%29
Cumulus is a type of cloud with the appearance of a lump of cotton wool. Cumulus may also refer to: Computing and technology Cumulus (software), digital asset management software developed by Canto Software Cumulus Corporation, a defunct computer hardware company Cumulus Networks, a computer software company Gliders Reinhard Cumulus, glider US Aviation Cumulus, motorglider Other uses Cumulus Media, a radio broadcasting company Cumulus oophorus, cells which surround a human egg after fertilisation
https://en.wikipedia.org/wiki/Multidrop%20bus
A multidrop bus (MDB) is a computer bus in which all components are connected to the electrical circuit. A process of arbitration determines which device sends information at any point. The other devices listen for the data they are intended to receive. Multidrop buses have the advantage of simplicity and extensibility, but their differing electrical characteristics make them relatively unsuitable for high frequency or high bandwidth applications. In computing Since 2000, multidrop standards such as PCI and Parallel ATA are increasingly being replaced by point-to-point systems such as PCI Express and SATA. Modern SDRAM chips exemplify the problem of electrical impedance discontinuity. Fully Buffered DIMM is an alternative approach to connecting multiple DRAM modules to a memory controller. For vending machines MDB/ICP MDB/ICP (formerly known as MDB) is a multidrop bus computer networking protocol used within the vending machine industry, currently published by the American National Automatic Merchandising Association. ccTalk The ccTalk multidrop bus protocol uses an TTL-level asynchronous serial protocol. It uses address randomization to allow multiple similar devices on the bus (after randomisation the devices can be distinguished by their serial number). ccTalk was developed by CoinControls, but is used by multiple vendors. See also Bus network topology EIA-485 1-Wire Open collector External links IBM Journal of Research and Development Computer buses
https://en.wikipedia.org/wiki/Demosaicing
A demosaicing (also de-mosaicing, demosaicking or debayering) algorithm is a digital image process used to reconstruct a full color image from the incomplete color samples output from an image sensor overlaid with a color filter array (CFA). It is also known as CFA interpolation or color reconstruction. Most modern digital cameras acquire images using a single image sensor overlaid with a CFA, so demosaicing is part of the processing pipeline required to render these images into a viewable format. Many modern digital cameras can save images in a raw format allowing the user to demosaic them using software, rather than using the camera's built-in firmware. Goal The aim of a demosaicing algorithm is to reconstruct a full color image (i.e. a full set of color triples) from the spatially undersampled color channels output from the CFA. The algorithm should have the following traits: Avoidance of the introduction of false color artifacts, such as chromatic aliases, zippering (abrupt unnatural changes of intensity over a number of neighboring pixels) and purple fringing Maximum preservation of the image resolution Low computational complexity for fast processing or efficient in-camera hardware implementation Amenability to analysis for accurate noise reduction Color filter array A color filter array is a mosaic of color filters in front of the image sensor. Commercially, the most commonly used CFA configuration is the Bayer filter illustrated here. This has alternating red (R) and green (G) filters for odd rows and alternating green (G) and blue (B) filters for even rows. There are twice as many green filters as red or blue ones, catering to the human eye's higher sensitivity to green light. Since the color subsampling of a CFA by its nature results in aliasing, an optical anti-aliasing filter is typically placed in the optical path between the image sensor and the lens to reduce the false color artifacts (chromatic aliases) introduced by interpolation. Since each pixel of the sensor is behind a color filter, the output is an array of pixel values, each indicating a raw intensity of one of the three filter colors. Thus, an algorithm is needed to estimate for each pixel the color levels for all color components, rather than a single component. Illustration To reconstruct a full color image from the data collected by the color filtering array, a form of interpolation is needed to fill in the blanks. The mathematics here is subject to individual implementation, and is called demosaicing. In this example, we use Adobe Photoshop's bicubic interpolation to simulate the circuitry of a Bayer filter device such as a digital camera. The image below simulates the output from a Bayer filtered image sensor; each pixel has only a red, green or blue component. The corresponding original image is shown alongside the demosaiced reconstruction at the end of this section. A digital camera typically has means to reconstruct a whole RGB image using the abov
https://en.wikipedia.org/wiki/RUNT%20Linux
RUNT Linux is an acronym for ResNet USB Network Tester. It is one of many Linux distributions designed to run from a USB flash drive. RUNT is based on Slackware's bare kernel. It was originally designed as a network tool for students at North Carolina State University. It consists of a boot floppy image and a zip file, similar to zipslack. It is intended to be a fairly complete Linux installation for use as a testing tool capable of booting on any x86 computer with a USB port and a bootable floppy. External links Runt Linux Homepage of the distribution Linux on a Stick! Screenshot walkthrough showing how to put Runt on a pendrive RUNT Linux at DistroWatch Live USB Linux distributions
https://en.wikipedia.org/wiki/Steve%20Dahl
Steven Robert Dahl (born November 20, 1954) is an American radio personality. He is the owner and operator of the Steve Dahl Network, a subscription-based podcasting network. Dahl gained a measure of national attention after organizing and hosting Disco Demolition Night at Comiskey Park. Originally, Dahl broadcast with Detroit stations WABX and WWWW and later with Chicago stations WCKG, WDAI, WLUP, WMVP and WLS. He served as a columnist for the Chicago Tribune in their Live section as the resident "vice advisor" until November 2010. He is also known in Chicago for his longstanding former role as one half of the Steve & Garry team (with Garry Meier), and the two are members of the National Radio Hall of Fame. Dahl is considered an influential shock jock in talk radio. In addition to his radio career, Dahl is a singer, songwriter, and guitarist. His band, Teenage Radiation, recorded and performed a number of song parodies (which he often played on his show throughout the 1980s) and since 1990 he has performed and recorded as Steve Dahl and the Dahlfins. Dahl is also an occasional actor, and has appeared in films such as Grandview, U.S.A., Outing Riley and I Want Someone to Eat Cheese With. Early life Dahl grew up in La Cañada, California. He is the son of Roger and Carol Dahl, an electronics parts manufacturer's representative and a homemaker. Radio career Early radio career In the 9th grade, Dahl began hanging around a local underground radio station, KPPC, in his home state of California. At the age of sixteen, after he started working at the radio station full-time, he unofficially dropped out of high school. Dahl later explained, "I convinced my parents and the school that I would do an independent work-study thing. I never got around to it." At the age of eighteen, he obtained his GED and briefly married a woman he met after she called him on-air to request "Suzanne", a song by Leonard Cohen which told a tale of a troubled relationship. Dahl later explained his short-lived marriage by commenting, "I should have paid more attention to that song." Dahl was told by radio executives that he'd never make it in radio because his voice was too high. At one point, Dahl was so discouraged that he quit for about six months and attempted to pursue a career as a recording engineer. However, this never amounted to anything more than making mix tapes of popular songs for play on airplanes. Throughout this time period, he was making efforts to reconcile with his ex-wife, who by then was dating the program director at the Los Angeles radio station where she worked. He later admitted to stalking her by sleeping in his Subaru outside her house. In 1976, Dahl's ex-wife told him about an opening for a morning show in Detroit, Michigan on WABX. He managed to secure the job, despite the fact that he did not think he was good enough for it (he later learned that the station was owned by the same company his ex-wife worked for). At WABX, Dahl learned as much
https://en.wikipedia.org/wiki/Brian%20Goes%20Back%20to%20College
"Brian Goes Back to College" is the 15th episode of the fourth season of the American animated television series Family Guy. It originally aired on the Fox network in the United States on November 13, 2005. Guest stars on the show were Ralph Garman, Mark Hentemann and Phil LaMarr. The episode was described by show creator Seth MacFarlane to be "a real treat for The A-Team fans". The episode contained several connections with The New Yorker; in response, they wrote a friendly article about the episode. The plot consists of Peter, Joe, Cleveland and Quagmire winning a costume contest dressed as characters from The A-Team, and deciding to improve their community by continuing to act like the characters of the show. Brian is hired by The New Yorker, but is later dismissed as he did not complete college, so he returns to finish his education. Plot Peter, Joe, Cleveland, and Quagmire win a costume contest as characters from The A-Team (because they had an actual black guy as B. A. Baracus and the other team had a Jewish man for the same role). The four men find Brian, who is writing a report for the local newspaper. When Peter and his friends win the costume contest, Brian writes a report about it, and is later telephoned by a member of The New Yorker, who tell him they would like him to work for their magazine. Brian is initially given a warm welcome by the staff, but he is immediately fired after he informs them he never graduated from college. Meanwhile, disappointed at no longer being able to be The A-Team, Peter decides to become an unofficial A-Team alongside Joe, Cleveland, and Quagmire, and decide to help their local community. Peter designs a replica of the van used by The A-Team. After encouragement from Lois, Brian decides to return to Brown University in order to complete his education so he can go back to The New Yorker. Stewie, unknowing to Brian, returns to college with him. Brian's new teacher (the Stephen Hawking-esque man from "Ready, Willing, and Disabled") takes an instant disliking to him, but his opinion of Brian quickly changes after he cheats on a test by plagiarizing Stewie's work with his permission (due to Stewie's knowledge of technology and physics) and gets a high mark. Brian goes to tell his teacher that he cheated, but is interrupted, as the teacher tells him Brian has inspired him, and he was so depressed that he was planning to commit suicide. Meanwhile, Peter becomes very satisfied with his A-Team's actions, but the team fails a mission to save a local park from demolition by becoming "side-tracked by idle conversation" with the builders. The guilty A-Team disbands afterwards. Brian eventually cracks under the pressure of a final test and knowing he will only pass if he cheats, he decides to return home with Stewie. A shocked Lois attempts to encourage him to go back and finish the test, and eventually chases him away with a vacuum cleaner called "Mr. Hoover". Brian ends up exercising for hours with the help of S
https://en.wikipedia.org/wiki/Bulmer
Bulmer may refer to: People Bulmer (surname) Bulmer (family), an English family Bulmer (directories), a Victorian era historian, surveyor and compiler of directories Places Bulmer, Essex, England Bulmer, North Yorkshire, England Other uses Bulmer (typeface), an English transitional classification serif typeface H. P. Bulmer, English cider manufacturer - a British merchant ship damaged in a hurricane and condemned at Sadras in 1821 USS Bulmer, a United States Navy Clemson-class destroyer (named after Captain Roscoe Carlyle Bulmer USN) that was launched in 1920 and saw service during WW2. See also Bulmers (Republic of Ireland), Irish cider manufacturer
https://en.wikipedia.org/wiki/WWDJ
WWDJ (1150 AM) is a Catholic radio station licensed to Boston, Massachusetts. Owned by Relevant Radio, Inc., the station serves Greater Boston. WWDJ does not broadcast any local programming, functioning as a repeater for the Relevant Radio network. WWDJ's studios and offices are co-located with the network in Lincolnwood, Illinois, and the station transmitter are located in Lexington. History The station signed on as WCOP on August 26, 1935; owned by the Massachusetts Broadcasting Company, their call letters representing its original studio location at the Copley Plaza Hotel. Originally, WCOP broadcast on 1120 kilocycles at 500 watts, and was required to go off the air at night. With the enactment of NARBA in 1941, WCOP moved to 1150 kHz and received authorization to broadcast around the clock. In June 1945, it became Boston's affiliate for the ABC Radio Network, which it would keep until the early 1950s. The station adopted a music format in 1956, and became one of the first stations in New England to utilize disk jockeys. In the late 1950s, one such DJ was Bob Wilson, who later became the radio play-by-play voice of the Boston Bruins. After stints as Top-40 (1956–62), and middle-of-the-road (1962–68), WCOP switched to a country music format, and was an affiliate of NBC Radio Network (WCOP became an NBC affiliate in 1966, two years before the switch to country). In 1977, WCOP dropped NBC Radio, and flipped from country to top-40 under the call letters WACQ. The new format lasted only until the station was sold and new owners came in on January 1, 1979. At that time, WACQ and then-sister station WTTK (now WZLX) flipped to a partially simulcast beautiful music station, owing to then-existing FCC regulations, as WHUE and WHUE-FM. Stints as an all-news station and a soft adult contemporary format under the call letters of WSNY followed. In 1985, the station became an oldies station under the well-known WMEX callsign, after a sale to Greater Media. Although enjoying some moderate success at first, WODS flipped to an oldies format in late 1987, and WMEX never recovered. By 1990, the oldies format was replaced by business talk; this gave way in 1991 to a simulcast of WMJX, and then to leased ethnic programming shortly afterwards. WMEX briefly held the WROR callsign in a "parking" move until Greater Media could place the calls on the former WKLB (105.7 FM), then became WNFT on October 17, 1996, as the market's KidStar children's radio network affiliate. After the network ceased operations in February 1997, WNFT simulcasted WKLB (96.9 FM), then simulcast WAAF after June 2 following a sale to American Radio Systems the month before. During its time simulcasting WAAF, it was noticed one day that WNFT was simulcasting WJMN by accident; a cleaning crew at the transmitter site the night before changed the radio to a more desired station, not realizing they accidentally changed the audio source sent to the station's transmitter. CBS Radio merged with Ameri
https://en.wikipedia.org/wiki/Rockman%20EXE%20WS
is a platform video game, part of the Mega Man Battle Network subseries of Mega Man video games. The game was released on the WonderSwan Color, only in Japan. This game is a platformer like Mega Man Network Transmission, rather than a role-playing game. Plot The storyline of Rockman EXE WS follows most of the story beats from the first season of the MegaMan NT Warrior animated series. Each stage from the first 5 chapters of the game loosely adapts an episode from the show, and Chapters 2, 3, 4, and 5 have branching paths that lead to different episode adaptations. After having his plans foiled by Lan and MegaMan.EXE several times throughout the game, Dr. Wily has Roll.EXE kidnapped to draw out the heroes. Lan and MegaMan.EXE track down WWW's base, beat Chaud and ProtoMan.EXE in a duel, defeat Dr. Wily and his Life Virus, and save Roll.EXE. After fulfilling specific requirements, Lan and MegaMan.EXE later end up exploring the Undernet. In there, MegaMan.EXE encounters the Gospel Multibug Organism and defeats it in battle. Gameplay Rockman EXE WS incorporates action and platforming elements from the classic Mega Man games while incorporating elements from the Battle Network series of games. Unlike the majority of the Battle Network games, MegaMan.EXE is the only playable character in the game as Lan Hikari acts as a support character throughout the game, only appearing in dialogue boxes, menus, or calls to MegaMan.EXE to give him advice on the currently stage. Combat is handled in real-time. MegaMan.EXE has the ability to jump, slide, climb ladders, fire his default arm cannon, or use one of his four equipped Battle Chips. His default arm cannon can be charged up to release bigger projectiles that deal more damage. Player health is displayed on the left side of the screen with a health bar while bosses have their health displayed on the right side of the screen. Like the rest of the Battle Network series, an elemental system vaguely similar to the Pokémon series exists for most characters. The elements are Heat, Aqua, Elec, Wood, and Null. Barring Null, the elements receive double damage from their succeeding element (e.g., Heat attacks deal double damage to Wood characters, but Heat characters take double damage from Aqua attacks, etc.). MegaMan.EXE by default is Null element, but he can use Style Changes to change his element, his charge shots, and his statistics (i.e., move faster, take reduced damage, etc.) after winning them from specific boss battles. Battle Chips are mapped to the four directional buttons on the Y-Pad of the WonderSwan Color and are grouped into several different categories. Some chips are support chips that alter MegaMan.EXE's stats when selected (e.g., Air Shoes increases MegaMan.EXE's jump height, etc.), some can be toggled and change MegaMan.EXE's attack when toggled on (e.g., Sword changes MegaMan.EXE's buster to a sword, etc.), and others act as single use weapons or power-ups that deplete in overall quantity
https://en.wikipedia.org/wiki/Rockman%20EXE%204.5%20Real%20Operation
is a title in the Mega Man Battle Network sub-series of Mega Man video games. The game was released only in Japan on August 6, 2004, and is not part of the main Mega Man Battle Network storyline. Gameplay In Real Operation, the Game Boy Advance itself acts as a PET, allowing the player to control various NetNavis from previous games in the series. The game could also be used with the Battle Chip Gate, a Game Boy accessory that allowed players to use real-life toy Battle Chips for use in the game, a feature that would be carried over to later games in the series. Users of Real Operation can also play multiplayer games against Battle Network 4 users and other Real Operation users. Due to the Battle Chip gate being an important part of much of the gameplay, the game was not released out of Japan for that very reason, due to the accessories, like the e-reader not being very popular in the US. Real Operation is also compatible with the Nintendo e-Reader, which allows for the unlocking of certain Navis, some of which are required to complete the game. Navis also give unique features and mini-games to the player, such as NumberMan who will help the player study math problems. Each Navi has different personality traits to alter the playing experience as they speak and interact with the player. The game also features a real-time system and on certain days of the week, tournaments will be held in-game that the player can compete in, or you can set reminders on calendars that your Navi will keep track of. Darkloid versions of Navis that appeared in Mega Man Battle Network 4 (such as TopMan) also appear in cyberspace for the player to battle against. During the course of the game, the player does not manually control the NetNavis in battle as in the main Battle Network games. Instead, the NetNavis act independently, and the player provides the Battle Chips by either selecting them during battle via in-game controls (in the same fashion as older Battle Network games) or by manually slotting them into the Battle Chip Gate accessory. The player can also alter the Navis' evasion strategies to guide them closer or farther from the enemies to set up attacks. This is to simulate an actual PET experience with the player as the NetOperator, and as such, no human characters appear in the game. While the game was not released in the US, hacking in Battle Network 5: Double Team DS shows that the game can in fact, be run exactly the same way as 4.5, using the same windows and such, though the player is stuck using only Megaman and whatever chips they start with. Navis Initially, the player can only choose from MegaMan, Roll, GutsMan, and NumberMan as their Navi companion. However, by slotting-in the corresponding NetNavi battle chip into the Battle Chip Gate, more Navis will be unlocked for the player to use. Each Navi has unique battling styles, personalities, and mini-games to interact with. There are a total of 21 Navis for the player to use, including all 12 S
https://en.wikipedia.org/wiki/List%20of%20Nine%20Network%20presenters
This is a list of Nine Network's past and present presenters and the programs they appear on, in alphabetical order by their last name. Presenters See also Nine News for lists of reporters for each state's bulletins. Australian television-related lists
https://en.wikipedia.org/wiki/Amazon%20Mechanical%20Turk
Amazon Mechanical Turk (MTurk) is a crowdsourcing website with which businesses can hire remotely located "crowdworkers" to perform discrete on-demand tasks that computers are currently unable to do as economically. It is operated under Amazon Web Services, and is owned by Amazon. Employers (known as requesters) post jobs known as Human Intelligence Tasks (HITs), such as identifying specific content in an image or video, writing product descriptions, or answering survey questions. Workers, colloquially known as Turkers or crowdworkers, browse among existing jobs and complete them in exchange for a fee set by the employer. To place jobs, the use an open application programming interface (API), or the more limited MTurk Requester site. , Requesters could register from 49 approved countries. History The service was conceived by Venky Harinarayan in a U.S. patent disclosure in 2001. Amazon coined the term artificial artificial intelligence for processes that outsource some parts of a computer program to humans, for those tasks carried out much faster by humans than computers. It is claimed that Jeff Bezos was responsible for proposing the development of Amazon's Mechanical Turk to realize this process. The name Mechanical Turk was inspired by "The Turk", an 18th-century chess-playing automaton made by Wolfgang von Kempelen that toured Europe, and beat both Napoleon Bonaparte and Benjamin Franklin. It was later revealed that this "machine" was not an automaton, but a human chess master hidden in the cabinet beneath the board and controlling the movements of a humanoid dummy. Analogously, the Mechanical Turk online service uses remote human labor hidden behind a computer interface to help employers perform tasks that are not possible using a true machine. MTurk launched publicly on November 2, 2005. Its user base grew quickly. In early- to mid-November 2005, there were tens of thousands of jobs, all uploaded to the system by Amazon itself for some of its internal tasks that required human intelligence. HIT types expanded to include transcribing, rating, image tagging, surveys, and writing. In March 2007, there were reportedly more than 100,000 workers in over 100 countries. This increased to over 500,000 registered workers from over 190 countries in January 2011. That year, Techlist published an interactive map pinpointing the locations of 50,000 of their MTurk workers around the world. By 2018, research demonstrated that while over 100,000 workers were available on the platform at any time, only around 2,000 were actively working. Overview A user of Mechanical Turk can be either a "Worker" (contractor) or a "Requester" (employer). Workers have access to a dashboard that displays three sections: total earnings, HIT status, and HIT totals. Workers set their own hours and are not under any obligation to accept any particular task. Amazon classifies Workers as contractors rather than employees and does not pay payroll taxes. Classifying Workers a
https://en.wikipedia.org/wiki/VDT
VDT may refer to: Video display terminal, or computer terminal 2-Vinyl-4,6-diamino-1,3,5-triazine (vinyl triazine), an organic compound
https://en.wikipedia.org/wiki/VMM
VMM may refer to: Computing Virtual memory, manager The Windows 9x Virtual Machine Manager (see VMM32) Virtual Machine Manager or Virtual Machine Monitor (see Hypervisor) VAX VMM, an unreleased hypervisor for Digital's VAX hardware. The RedHat Virtual Machine Manager Verification Methodology Manual (see Reference Verification Methodology) vmm: a native hypervisor on OpenBSD The .vmm file type, used for 3D movies Other Value measuring methodology in Project Management and Governance Vodafone McLaren Mercedes, a motor racing team based England best known as a Formula One constructor Vlaamse Media Maatschappij, a Belgian commercial radio and television provider Virginia Mennonite Missions common abbreviation for the Middle Magdalena Valley in Colombia
https://en.wikipedia.org/wiki/UMT
UMT can refer to: Universal Mobile Telecommunications System, a 3rd generation (3g) GSM-based cellular network standard. Metropolitan University of Tirana Moroccan Workers' Union (French: Union Marocaine du Travail) Universal Military Training Military Selective Service Act, conscription law in the United States (formerly known as the Universal Military Training and Service Act) UMT AG (United Mobility Technology AG) in Munich University of Management and Technology, Virginia in United States University of Management and Technology, Lahore in Pakistan Universiti Malaysia Terengganu (formerly known as KUSTEM)
https://en.wikipedia.org/wiki/Linear%20network%20coding
In computer networking, linear network coding is a program in which intermediate nodes transmit data from source nodes to sink nodes by means of linear combinations. Linear network coding may be used to improve a network's throughput, efficiency, and scalability, as well as reducing attacks and eavesdropping. The nodes of a network take several packets and combine for transmission. This process may be used to attain the maximum possible information flow in a network. It has been proven that, theoretically, linear coding is enough to achieve the upper bound in multicast problems with one source. However linear coding is not sufficient in general; even for more general versions of linearity such as convolutional coding and filter-bank coding. Finding optimal coding solutions for general network problems with arbitrary demands is a hard problem, which can be NP-hard and even undecidable. Encoding and decoding In a linear network coding problem, a group of nodes are involved in moving the data from source nodes to sink nodes. Each node generates new packets which are linear combinations of past received packets by multiplying them by coefficients chosen from a finite field, typically of size . More formally, each node, with indegree, , generates a message from the linear combination of received messages by the formula: Where the values are coefficients selected from . Since operations are computed in a finite field, the generated message is of the same length as the original messages. Each node forwards the computed value along with the coefficients, , used in the level, . Sink nodes receive these network coded messages, and collect them in a matrix. The original messages can be recovered by performing Gaussian elimination on the matrix. In reduced row echelon form, decoded packets correspond to the rows of the form Background A network is represented by a directed graph . is the set of nodes or vertices, is the set of directed links (or edges), and gives the capacity of each link of . Let be the maximum possible throughput from node to node . By the max-flow min-cut theorem, is upper bounded by the minimum capacity of all cuts, which is the sum of the capacities of the edges on a cut, between these two nodes. Karl Menger proved that there is always a set of edge-disjoint paths achieving the upper bound in a unicast scenario, known as the max-flow min-cut theorem. Later, the Ford–Fulkerson algorithm was proposed to find such paths in polynomial time. Then, Edmonds proved in the paper "Edge-Disjoint Branchings" the upper bound in the broadcast scenario is also achievable, and proposed a polynomial time algorithm. However, the situation in the multicast scenario is more complicated, and in fact, such an upper bound can't be reached using traditional routing ideas. Ahlswede et al. proved that it can be achieved if additional computing tasks (incoming packets are combined into one or several outgoing packets) can be done in the
https://en.wikipedia.org/wiki/Gold%20104.3
Gold 104.3 (call sign: 3KKZ) is a radio station broadcasting in Melbourne, Australia. Gold 104.3 is part of the Pure Gold Network (which itself is a part of the Australian Radio Network) and broadcasts on the 104.3 MHz frequency. History 3KZ 3KZ commenced operations on 8 December 1930. The radio station was initiated by the Industrial Printing and Publicity Group as a means of spreading its message, and in the station's early years, it was broadcast from the Victorian Trades Hall. (In contrast, it must be pointed out that rival station 3XY was originally owned by the inaugural United Australia Party and then by the Liberal Party.) Its original frequency was 1350 kHz, moving to 1180 kHz on 1 September 1935. The frequency changed again on 23 November 1978 to 1179 kHz when all Australian AM radio stations were assigned new frequencies as part of the new 9 kHz spacing plan implemented. 3KZ was, along with 3DB, one of the "old guard" of Melbourne radio. (Don't Touch That Dial by Wayne Mac) In 1989, 3KZ was one of two successful bidders to convert to the FM band. 3KZ bid A$32 million for the right to convert to the FM band, the highest bid made for FM conversion in Australia. The second highest Melbourne bid – A$20.1 million – was from radio 3AK (then operated by Bond Media), and the 3rd highest – A$10 million – was from 3TT. Alan Bond purchased GTV9 but was not interested in its subsidiary 3AK and did not convert it to the FM band. Therefore, the second new Melbourne FM licence went to 3TT which became 3TTT, and which now broadcasts as KIIS 101.1. KZFM As a result of winning an FM licence, 3KZ moved to 104.3 MHz at 12:00 am on 1 January 1990. The station relaunched as KZFM, despite the station's official call sign of 3KKZ, carrying over its successful "Hits And Memories" positioner, with some changes to presentation style. KZFM was simulcasted on both 1179 kHz and 104.3 MHz frequencies for one month before the old AM frequency was closed down, to be later reassigned (after 12 months) to 3RPH. The KZ switch to FM paid immediate short term dividends, as the new KZFM debuted at number one in the first ratings survey of 1990, breaking an almost three-year dominance by rival Fox FM. However KZFM's success was short-lived, with ratings soon taking a dive and the station going into receivership in 1993. Radio network Austereo soon purchased the station to supplement its popular Fox FM, however after lack of direction from its new parent company, and severe staff reductions, removal of its news room, and other cost cutting measured at KZFM, ownership of which shortly changed to the Australian Radio Network, which was already operating rival radio station 101.1 TT-FM. Gold 104.3 On 7 October 1991, the KZFM branding was replaced with a new name of Gold 104 with a revamped playlist predominantly of hit songs from the 1960s and 1970s, under the banner "Good Times, Great Oldies". After the change in ownership with the Australian Radio Network, Gold beca
https://en.wikipedia.org/wiki/London%20News%20Network
London News Network (or LNN) was a television news, production and facilities organisation in London. It was created in 1992 as a joint operation between London's two ITV contractors, Carlton Television and London Weekend Television, with each company holding a 50% stake. Overview After weeks of shadowing Thames and LWT, LNN debuted on air on 1 January 1993 as Carlton replaced Thames Television as London's weekday ITV franchise. The company's flagship programme, London Tonight launched three days later, replacing the previous separate news services provided by Thames and LWT. The company's headquarters were located at The London Television Centre on the South Bank (home to LWT and The London Studios). A view of the London skyline, including St. Paul's Cathedral, could be seen from the window set of Studio 7, the main news studio. LNN continued production of London Tonight (and London Today) until 2004, when ITN took over those responsibilities. The final edition of London Tonight produced by LNN was broadcast on 29 February 2004, following which, its news operation was absorbed into ITN. At the same time, the set and visual style of the programme altered to match, more closely, the new corporate ITV News branding. The final programme produced by LNN was The Week on 7 March 2004 and the programme ended with the original LNN Production graphic from the 1993 launch. However the ITV Weather contract continued well into April. The transmission business continued at The London Television Centre, albeit under the aegis of the Southern Transmission Centre (now managed by Technicolor Network Services, at its UK headquarters in Chiswick). Programming LNN's core programmes were London Today and the flagship evening programme London Tonight, produced seven days a week for Carlton and LWT (the first time ITV had offered a single seven-day news service for the capital). Although primarily a news provider, LNN also produced non-news regional output for both its joint owners – ranging from current affairs (The London Programme), documentaries (First Edition) and features (After 5, The Weekend Show) to entertainment (Boot Sale Challenge, Big Screen), arts (Good Stuff) and children's programming (The Totally Friday Show, Food Factory) through its "LNN Factuals" division. Sports programming was also often produced for both the London region and the ITV network by LNN's sport division, known as "LSN/London Sports Network". LSN also maintained the ITV Sport archive and was the production partner (with Central) on ITV's football coverage, as well as other sports. LSN and Central's sports department (by now controlled and branded Carlton) were merged in 2006, forming ITV Sport Productions, now under the control of ITV director of sport Niall Sloane. List of programmes produced After 5 (1994–1996) The Big Screen (1998–2002) Boot Sale Challenge (1998–2004) Breakaways (1994 -1996) Capital Gains (2001–2002) Crime Monthly (2000–2002) Crosstalk (1993–1998) Fi
https://en.wikipedia.org/wiki/RAM%20parity
RAM parity checking is the storing of a redundant parity bit representing the parity (odd or even) of a small amount of computer data (typically one byte) stored in random-access memory, and the subsequent comparison of the stored and the computed parity to detect whether a data error has occurred. The parity bit was originally stored in additional individual memory chips; with the introduction of plug-in DIMM, SIMM, etc. modules, they became available in non-parity and parity (with an extra bit per byte, storing 9 bits for every 8 bits of actual data) versions. History Early computers sometimes required the use of parity RAM, and parity-checking could not be disabled. A parity error typically caused the machine to halt, with loss of unsaved data; this is usually a better option than saving corrupt data. Logic parity RAM, also known as fake parity RAM, is non-parity RAM that can be used in computers that require parity RAM. Logic parity RAM recalculates an always-valid parity bit each time a byte is read from memory, instead of storing the parity bit when the memory is written to; the calculated parity bit, which will not reveal if the data has been corrupted (hence the name "fake parity"), is presented to the parity-checking logic. It is a means of using cheaper 8-bit RAM in a system designed to use only 9-bit parity RAM. Memory errors In the 1970s-80s, RAM reliability was often less-than-perfect; in particular, the 4116 DRAMs which were an industry standard from 1975 to 1983 had a considerable failure rate as they used triple voltages (-5, +5, and +12) which resulted in high operating temperatures. By the mid-1980s, these had given way to single voltage DRAM such as the 4164 and 41256 with the result of improved reliability. However, RAM did not achieve modern standards of reliability until the 1990s. Since then errors have become less visible as simple parity RAM has fallen out of use; either they are invisible as they are not detected, or they are corrected invisibly with ECC RAM. Modern RAM is believed, with much justification, to be reliable, and error-detecting RAM has largely fallen out of use for non-critical applications. By the mid-1990s, most DRAM had dropped parity checking as manufacturers felt confident that it was no longer necessary. Some machines that support parity or ECC allow checking to be enabled or disabled in the BIOS, permitting cheaper non-parity RAM to be used. If parity RAM is used the chipset will usually use it to implement error correction, rather than halting the machine on a single-bit parity error. However, as discussed in the article on ECC memory, errors, while not everyday events, are not negligibly infrequent. Even in the absence of manufacturing defects, naturally occurring radiation causes random errors; tests on Google's many servers found that memory errors were not rare events, and that the incidence of memory errors and the range of error rates across different DIMMs were much higher than previous
https://en.wikipedia.org/wiki/NHibernate
NHibernate is an object–relational mapping (ORM) solution for the Microsoft .NET platform. It provides a framework for mapping an object-oriented domain model to a traditional relational database. Its purpose is to relieve the developer from a significant portion of relational data persistence-related programming tasks. NHibernate is free and open-source software that is distributed under the GNU Lesser General Public License. NHibernate is a port of Hibernate. Feature summary NHibernate's primary feature is mapping from .NET classes to database tables (and from CLR data types to SQL data types). NHibernate provides data query and retrieval tools. It generates the SQL commands and removes the need of manual data set handling and object conversion, keeping the application portable to most SQL databases, with database portability delivered at very little performance overhead. NHibernate provides transparent persistence for Plain Old CLR Objects (POCOs). The only strict requirement for a persistent class is a no-argument constructor, which does not have to be public. (Proper behavior in some applications also requires special attention to the Equals() and GetHashCode() methods.) History Tom Barrett started NHibernate, and later picked up by Mike Doerfler and Peter Smulovics. At the end of 2005, JBoss, Inc. (now part of Red Hat) hired Sergey Koshcheyev, the then lead developer of NHibernate, to work full-time on its future versions. At the end of 2006, JBoss stopped the support to this project. NHibernate is now entirely developed and led by the community. Version 1.0 mirrored the feature set of Hibernate 2.1, as well as a number of features from Hibernate 3. NHibernate 1.2.1, released in November 2007, introduced many more features from Hibernate 3 and support for .NET 2.0, stored procedures, generics, and nullable types. NHibernate 2.0 NHibernate 2.0 was released on August 23, 2008. It is comparable to Hibernate 3.2 in terms of features. With the version 2.0 release, NHibernate dropped support for .NET 1.1. NHibernate 2.1 was released July 17, 2009. NHibernate 3.0 NHibernate 3.0 was released on December 4, 2010, and is the first version to use .NET 3.5, with features such as: Integrated LINQ support Strongly typed criteria-like API called QueryOver New AST-based parser for HQL engine Support for lazy loading columns NHibernate 3.2 NHibernate 3.2 was released in April, 2011. New features included: Mapping by code: fluent configuration, .hbm.xml files are no longer required; Subselect: ability to map SQL views as entities; HQL paging: TAKE and SKIP on HQL; Integrated bytecode provider: one less DLL to deploy. NHibernate 4.0 NHibernate 4.0 was released on August 17, 2014. This version requires .NET Framework 4.0 or later. NHibernate 5.0 NHibernate 5.0 was released on October 10, 2017. It provides support for asynchronous programming. This version requires .NET Framework 4.6.1 or later. NHibernate 5.1 NHibernate 5.1 w
https://en.wikipedia.org/wiki/Robotboy
Robotboy is an animated television series produced by Gaumont Animation (originally Alphanim) for France 3 and Cartoon Network Europe, in association with studios LuxAnimation and Cofinova 1 for Series 1 only. In a total of 52 23-minute episodes with 104 segments produced, it was created and designed by Jan Van Rijsselberge. The series was directed at Alphanim's studio in Vincennes by American animator Charlie Bean—who worked on Dexter's Laboratory, The Powerpuff Girls, and Samurai Jack—and later with Bob Camp and Heath Kenny. It debuted in the United Kingdom on November 1, 2005, on Cartoon Network. Prior to debuting its airdate, the series was shown during the MIPCOM annual trading program on October 12, 2005. It later premiered reportedly in the United States on December 28, 2005, for Cartoon Network's "Sneak Peek Week" for their new lineup, with episodes premiering on January 14, 2006. Reruns of the series have broadcast around Europe and Latin America, with fewer exceptions shown in Asia. Plot Robotboy is the latest creation of the world-renowned scientist Professor Moshimo. Due to suspicions that Robotboy would be taken by his arch-enemy Dr. Kamikazi and his main henchman Constantine to be used to take over the world, Professor Moshimo assigns Robotboy to 10-year-old Tommy Turnbull, his biggest fan living in San Francisco. While being protected by Tommy and his two friends Lola and Augustus, Robotboy learns how to behave and act as if he were human while occasionally battling Kamikazi and Constantine who pursued to capture him. Episodes Cast Laurence Bouvard as Robotboy, Robotgirl, Lola Mbola, Miu-Miu, Hester Turner, additional voices Lorraine Pilkington as Tommy Turnbull, Debbie Turnbull, and Computer Teacher Rupert Degas as Augustus Bachman Turner, Constantine, Protoboy, Donnie Turnbull, Kurt, Ambassador Mbola, Brian the Consultant, Stu, Mookie, Walter the Tapeworm, Jebidiah Turner, Mr. Fournier, additional voices Lewis MacLeod as Dwight Turnbull, Felonius Hexx, Special Agent, Bjorn Bjornson, Bjornbot, General Yakitori, Principal Dr. Friedman-Culpepper, additional voices Eiji Kusuhara as Dr. Kamikazi Togo Igawa as Professor Moshimo Characters Protagonists – The titular character who is best friends with Tommy Turnbull. He is a robot created by Professor Moshimo as a force to protect the world from threats after Protoboy failed, as he was captured and reprogrammed by Kazi. He intended to enter him into a robot-competition television program. Prior to this, Kazi learned of Robotboy and intended to steal him to take over the world. Knowing the evil he could do with Robotboy, despite that he was in danger, Moshimo sent him to Tommy Turnbull. According to the opening sequence, Robotboy was given to Tommy for him to learn about the world and how to become human but never stated the longer he had been activated or why Tommy was his chosen guardian. He has the following modes: Deactivated – Robotboy's inanimate "toy" mode. In it,
https://en.wikipedia.org/wiki/Colour%20Genie
The EACA EG2000 Colour Genie was a computer produced by Hong Kong-based manufacturer EACA, and introduced in Germany in August 1982 by Tromeschläger Computer Service and Schmidtke Electronic. It followed their earlier Video Genie I and II computers and was released around the same time as the business-oriented Video Genie. The LEVEL II BASIC was compatible with the Video Genie I and II and the TRS-80, except for graphic and sound commands; most of the routines for Video Genie I BASIC commands were left over in the Colour Genie's BASIC ROM. Programs were provided to load TRS-80 programs into the Colour Genie. Colour Genie disks could be read in a TRS-80 floppy disk drive and vice versa, editing the commands. The original Video Genies had been based upon (and broadly compatible with) the then-current TRS-80 Model I. As the Colour Genie was descended from this architecture, it was incompatible with Tandy's newer TRS-80 Color Computer which - despite its name - was an entirely new and unrelated design based on an entirely different CPU, and thus incompatible with the TRS-80 Model I and derivatives such as the Color Genie. About 190 games were published for the system in English and German. A 80 column card was produced. Modern emulators for this system exist. Technical specifications Central Processing Unit Z80 running at 2.2 MHz. Usually using the NEC D780 (and unlicenced Japanese clone) or the SGS Z80 (a European second source for Zilog). Internal hardware Video Hardware Motorola 6845 CRTC 40×24 text (original ROMs) or 40×25 text (upgraded ROMs), 16 colours, 128 user defined characters 160×96 graphics (original ROMs) or 160×102 graphics (upgraded ROMs), 4 colours x up to 4 pages Sound Hardware General Instruments AY-3-8910 3 sound channels, ADSR programmable 1 noise channel 2 8-bit wide I/O ports I/O ports and power supply I/O ports: Composite video out and audio out (cinch plugs) Integrated RF modulator antenna output, which also carries sound, to TV Cartridge expansion slot (slot for edge connector with Z80 CPU address/data bus lines and control signals, as well as GND and voltage pins; used for ROM cartridges or the floppy disk controller 1200 baud tape interface (5 pin DIN) RS-232 port (5 pin DIN) Light pen port (5 pin DIN) Parallel port for printer or joystick controller External hardware options Floppy disk controller with floppy disk station. Supported up to 4 drives (5.25 inch). Support for 90 KB SS/SD up to 720 KB DS/DD drives. Cassette recorder EPROM cartridge of 12 KB EG2013 Joystick Controller 2 Analogue joysticks with keypad References Z80-based home computers Home computers
https://en.wikipedia.org/wiki/Tony%20Robbin
Tony Robbin (born November 24, 1943, in Washington, DC) is an American artist and author, who works with painting, sculpture and computer visualizations. He is considered part of the Pattern and Decoration (P&D) art movement. Work Robbin has had over 25 solo exhibitions of his painting and sculpture since his debut at the Whitney Museum of American Art in 1974, and has been included in over 100 Robbin was granted a patent for the application of quasicrystal geometry to architecture, and has implemented this geometry for a large-scale architectural sculpture at the Danish Technical University in Kongens Lyngby, Denmark, as well as one for the city of Jacksonville, Florida. Robbin is the author of four books: Fourfield: Computers, Art, & the 4th Dimension (1992 ), Engineering A New Architecture, (1996), Shadows of Reality (2006) and Mood Swings A Painters Life (2011), an autobiography. Robbin is a pioneer in the computer visualization of four-dimensional geometry. Since 1981, his realtime rotation programs of four-dimensional figures have been useful for obtaining an intuitive feel for four-dimensional space, and quasicrystal space. The original DOS and Microsoft Windows versions are available for free download from his website. An Android live-wallpaper hypercube, rotating in 4-space, is available for free at the Android market, or on his official website. (see external links below) In 2011 the Orlando Museum of Art organized a retrospective of Robbin's paintings and drawings. The companion book Tony Robbin, A Retrospective is distributed by Hudson Hills Press. Notes References books External links Official site Shadows of Reality Review of Shadows of Reality by David Ebony Hypercube live wall-paper for Android devices 20th-century American painters 20th-century American male artists American male painters 21st-century American painters 21st-century American male artists Living people 1943 births 20th-century American sculptors American male sculptors
https://en.wikipedia.org/wiki/Xbase-clients
Xbase-Clients is a suite of tools and utilities for the X Window System. Included tools editres, which queries and updates the X resource database startx and xinit, which initialize X sessions from the command line xauth, a tool for controlling access to the X session xbiff, a tool which tells you when you have new email xcalc, a scientific calculator desktop accessory xclipboard, a tool to manage cut-and-pasted text selections xcutsel, which exchanges selection and cut buffer contents xedit, a text editor xev, an X event displayer xhost, a tool to add or remove access to the X server for specified hosts xman, a manual page browser Xmark, tool for benchmarking graphical operations xrandr, a command-line interface to the RandR extension xsm, a session manager for X sessions xwd and xwud, utilities for taking and viewing window dumps ("screenshots") of the X session Demos xeyes, in which a pair of eyes track the pointer See also xterm External links XBaseClients X Window programs
https://en.wikipedia.org/wiki/Random%20self-reducibility
Random self-reducibility (RSR) is the rule that a good algorithm for the average case implies a good algorithm for the worst case. RSR is the ability to solve all instances of a problem by solving a large fraction of the instances. Definition If for a function f evaluating any instance x can be reduced in polynomial time to the evaluation of f on one or more random instances yi, then it is self-reducible (this is also known as a non-adaptive uniform self-reduction). In a random self-reduction, an arbitrary worst-case instance x in the domain of f is mapped to a random set of instances y1, ..., yk. This is done so that f(x) can be computed in polynomial time, given the coin-toss sequence from the mapping, x, and f(y1), ..., f(yk). Therefore, taking the average with respect to the induced distribution on yi, the average-case complexity of f is the same (within polynomial factors) as the worst-case randomized complexity of f. One special case of note is when each random instance yi is distributed uniformly over the entire set of elements in the domain of f that have a length of |x|. In this case f is as hard on average as it is in the worst case. This approach contains two key restrictions. First the generation of y1, ..., yk is performed non-adaptively. This means that y2 is picked before f(y1) is known. Second, it is not necessary that the points y1, ..., yk be uniformly distributed. Application in cryptographic protocols Problems that require some privacy in the data (typically cryptographic problems) can use randomization to ensure that privacy. In fact, the only provably secure cryptographic system (the one-time pad) has its security relying totally on the randomness of the key data supplied to the system. The field of cryptography utilizes the fact that certain number-theoretic functions are randomly self-reducible. This includes probabilistic encryption and cryptographically strong pseudorandom number generation. Also, instance-hiding schemes (where a weak private device uses a strong public device without revealing its data) are easily exemplified by random self-reductions. Examples The discrete logarithm problem, the quadratic residuosity problem, the RSA inversion problem, and the problem of computing the permanent of a matrix are each random self-reducible problems. Discrete logarithm Theorem: Given a cyclic group G of size |G|. If a deterministic polynomial time algorithm A computes the discrete logarithm for a 1/poly(n) fraction of all inputs (where n = log |G| is the input size), then there is a randomized polynomial time algorithm for discrete logarithm for all inputs. Given a generator g of a cyclic group G = { gi | 0 ≤ i < |G| }, and an x ∈ G, the discrete log of x to the base g is the integer k (0 ≤ k < |G|) with x = gk. Take B to be distributed uniformly on {0,...,|G| − 1}, then xgB = gk+B is also distributed uniformly on G. Therefore xgB is independent of x, and its logarithm can be computed with probability
https://en.wikipedia.org/wiki/Bit%20flipping
In computing, bit flipping may refer to: Bit manipulation, algorithmic manipulation of binary digits (bits) Bitwise operation NOT, performing logical negation to a single bit, or each of several bits, switching state 0 to 1, and vice versa Memory error or soft error, an unintentional state switch from 0 to 1, or vice versa, of a bit stored to random access memory or other medium See also Bit-flipping attack Single-event upset
https://en.wikipedia.org/wiki/Bit%20twiddler
In computing, bit twiddler may refer to: A piece of source code that does bit twiddling, which may mean: Doing bit manipulation; Interacting with computer hardware, especially when using a bit-banging technique; Reading or writing binary file formats; or Being unnecessarily complex, perhaps due to premature optimization A programmer who writes bit twiddlers, as described above A hacker, an enthusiast or a programmer with profound understanding of the fundamentals of computer operation A hex editor, a software application that allows the manipulation of binary computer files
https://en.wikipedia.org/wiki/Finisterra%20%28album%29
Finisterra is a 2000 album by the Spanish folk metal band Mägo de Oz. It narrates the story of Satania, a fictional society in the future where life depends on the Internet and computers. Plot In the year 2199, a new order, Satania, is ruling the world. This was caused in the beginning of the 21st century, when the Third World, under the name of "Batallón de la Cochambre", made a revolution called "la guerra del hambre" (the war of hunger). This made the world's dominant powers to use all their bacteriological and nuclear arsenals, causing the destruction of all animal and plant life, but not destroying all humanity. A selected group of corporate leaders, politicians and computer programmers, organized by the enigmatic figure of "elmaestro.com", created Satania, a world without violence, revolutions or the right of the people to think by themselves to create another option. Years passed in a world where reading was forbidden, sex was practiced in the "clean way" (virtually), oxygen was rationed, and society was slowly falling on itself. In Necropolis, the official capital of Satania, a group of "doubters" (people who were not conformed with digital life and with an automatic society) began the search of another way of life, based more on the spiritual ways, and running away from the advances that will lead to the destruction of the Earth. Bribing the biggest hacker in the zone, "alamierda.es" (toshit.es), with oxygen credit cards and the most powerful hallucinating drug that ever existed (which is, a video of notable moments of a game show), they search in the hard drive of "elmaestro.com" (themaster.com) for the reason why humanity reached that point. They find a CD-ROM that narrates the story of Diego Cortéz, a swordsman that protects an enigmatic pilgrim from Puente La Reina to Santiago de Compostela, known to be the pilgrimage of the Way of St. James and they both make a long voyage of self-discovery. When they finally reach Santiago de Compostela the pilgrim kills Diego, after revealing he is Astaroth (the Devil). He then goes to the nearby church. To close the agreement, the Devil leaves a CD-ROM with an inscription on it, "You are in Satania, this is the end of the road!". Track listing Disc one "Prólogo" (Prologue) - 1:59 "Satania" (Satania) - 8:14 "La Cruz de Santiago" (Santiago's Cross) - 5:19 "La Danza del Fuego" (The Dance of Fire) - 5:13 "Hasta que el cuerpo aguante" (As much as the body can stand) - 4:32 "El Señor de los Gramillos" (The Lord of the Grams, pun on The Lord of the Rings in Spanish) - 4:59 "Polla Dura no cree en Dios" ("Boner" does not believe in God, Spanish saying) - 4:30 "Maite Zaitut" (Basque for "I Love You") (cover of "Deu tu Ganeme" by Gwendal) - 3:20 "Duerme... (Canción de cuna)" (Sleep... (Lullaby)) (cover of "Scarborough Fair", popularized by Simon & Garfunkel) - 4:29 "Es hora de marchar" (It's Time To Go) (cover of "Rainbow Eyes" by Rainbow) - 5:03 Disc two "Fiesta Pagana" (Pagan Party) - 4:56 "El que qu
https://en.wikipedia.org/wiki/GORM
Gorm or GORM may refer to: Gorm (computing), Graphical Object Relationship Modeller, a graphical interface builder application in the developer tools of GNUstep Grails Object Relational Mapping (GORM), the persistence layer of the Grails framework
https://en.wikipedia.org/wiki/Profinet
Profinet (usually styled as PROFINET, as a portmanteau for Process Field Network) is an industry technical standard for data communication over Industrial Ethernet, designed for collecting data from, and controlling equipment in industrial systems, with a particular strength in delivering data under tight time constraints. The standard is maintained and supported by Profibus and Profinet International, an umbrella organization headquartered in Karlsruhe, Germany. Functionalities Overview Profinet implements the interfacing to peripherals. It defines the communication with field connected peripheral devices. Its basis is a cascading real-time concept. Profinet defines the entire data exchange between controllers (called "IO-Controllers") and the devices (called "IO-Devices"), as well as parameter setting and diagnosis. IO-Controllers are typically a PLC, DCS, or IPC; whereas IO-Devices can be varied: I/O blocks, drives, sensors, or actuators. The Profinet protocol is designed for the fast data exchange between Ethernet-based field devices and follows the provider-consumer model. Field devices in a subordinate Profibus line can be integrated in the Profinet system seamlessly via an IO-Proxy (representative of a subordinate bus system). Conformance Classes (CC) Applications with Profinet can be divided according to the international standard IEC 61784-2 into four conformance classes: In Conformance Class A (CC-A), only the devices are certified. A manufacturer certificate is sufficient for the network infrastructure. This is why structured cabling or a wireless local area network for mobile subscribers can also be used. Typical applications can be found in infrastructure (e.g. motorway or railway tunnels) or in building automation. Conformance Class B (CC-B) stipulates that the network infrastructure also includes certified products and is structured according to the guidelines of Profinet. Shielded cables increase robustness and switches with management functions facilitate network diagnostics and allow the network topology to be captured as desired for controlling a production line or machine. Process automation requires increased availability, which can be achieved through media and system redundancy. For a device to adhere to Conformance Class B, it must communicate successfully via Profinet, have two ports (integrated switch), and support SNMP. With Conformance Class C (CC-C), positioning systems can be implemented with additional bandwidth reservation and application synchronization. Conformance Class C devices additionally communicate via Profinet IRT. For Conformance Class D (CC-D), Profinet is used via Time-Sensitive Networking (TSN). The same functions can be achieved as with CC-C. In contrast to CC-A and CC-B, the complete communication (cyclic and acyclic) between controller and device takes place on Ethernet layer 2. The Remote Service Interface (RSI) was introduced for this purpose. Device types A Profinet system consist
https://en.wikipedia.org/wiki/Bitmap%20file
"Bitmap file" may be a generic term for: A file format for storing raster graphics A computer file containing a raster graphics image Bitmap file may also refer to: Windows bitmap, or BMP, a particular graphics file format
https://en.wikipedia.org/wiki/Project%20SHAMROCK
Project SHAMROCK was the sister project to Project MINARET, an espionage exercise started in August 1945. Project MINARET involved the accumulation of all telegraphic data that entered or exited the United States. The Armed Forces Security Agency (AFSA) and its successor, the National Security Agency (NSA), were given direct access to daily microfilm copies of all incoming, outgoing, and transiting telegrams via the Western Union and its associates RCA and ITT. NSA did the operational interception, and, if there was information that would be of interest to other intelligence agencies, the material was passed to them. Intercepted messages were disseminated to the FBI, CIA, Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), and the Department of Defense. No court authorized the operation and there were no warrants. According to Stephen Budiansky, the precursor to the project occurred in 1940: "In January 1940 the Army's adjutant general sent a letter to the president of RCA, David Sarnoff, asking if a Lieutenant Earle F. Cook might be assigned to the company..." Cook photographed all international commercial cablegrams. "The clandestine arrangement—almost certainly illegal—set a precedent..." Official wartime censorship began in Dec. 1940, when all cables were "turned over to the government for inspection." According to Louis W. Tordella, "the collection program 'just ran on' ever since its beginning in World War II 'without a great deal of attention from anyone'..." Three major cable companies provided copies of all international telegrams passing through New York, Washington, and San Francisco. In the 1950s, "New Shamrock" tapped the links of 60–70 foreign embassies. According to Athan Theoharis, the post-World War II continuation of Project SHAMROCK brought hesitation from the telegraph companies, who were concerned about the legality of their actions and that employees would reveal the companies' government cooperation to the public. Their fears were assuaged after a promise from Attorney General Tom Clark that the U.S. government would not prosecute the companies for their participation in Project SHAMROCK, and after Congress approved a bill section that made it illegal for "unauthorized" individuals to reveal information related to code-breaking, which was a part of SHAMROCK's operations. At the height of Project SHAMROCK, 150,000 messages were printed and analyzed by NSA personnel in a month. In May 1975 however, Congressional critics began to investigate and expose the program. As a result, NSA director Lew Allen terminated it, on his own authority rather than that of other intelligence agencies. According to Budiansky, a 1977 US Department of Justice review concluded wiretap laws were violated, but "If the intelligence agencies possessed too much discretionary authority with too little accountability, that would seem to be a 35-year failing of Presidents and the Congress rather than the agencies or their personnel." The
https://en.wikipedia.org/wiki/Commonwealth%20Broadcasting%20Network
Commonwealth Broadcasting Network (CBN) is a Canadian English language discretionary specialty channel owned by Asian Television Network (ATN). CBN primarily focuses on cricket programming such as live and tape-delayed matches featuring Commonwealth nations. CBN also broadcasts a select number of lifestyle, entertainment, and informational series aimed primarily at the Caribbean and African communities. History In November 2000, ATN, through one of its subsidiaries, was granted approval by the Canadian Radio-television and Telecommunications Commission (CRTC) to launch a television channel called Caribbean & African Network, described as "a national ethnic Category 2 pay television service targeting Caribbean and African communities." The channel was launched on April 19, 2005 as ATN Caribbean on Rogers Cable, airing a variety of programming aimed at the Caribbean and African communities in Canada with such programming as sports, music, dramas, and more. The channel later rebranded in the later 2000s as the Commonwealth Broadcasting Network (CBN) and began focusing more on cricket and other programming that would appeal to those outside the Caribbean and African communities, such as other Commonwealth nations. On September 25, 2012, CBN's broadcasting licence to operate as a pay service was revoked at ATN's request. The channel subsequently re-launched as a regular specialty service on June 17, 2012, under the following license: ATN Cricket Channel One References External links Weekly schedule Digital cable television networks in Canada Multicultural and ethnic television in Canada Television channels and stations established in 2005 English-language television stations in Canada Cricket on television Indo-Canadian culture Indian diaspora mass media Asian-Canadian culture in Ontario
https://en.wikipedia.org/wiki/Micros%20Systems
Micros Systems, Inc., was an American computer company who manufactured hardware and developed software and services for the restaurant point of sale, hotel, hospitality, sports and entertainment venues, casinos, cruise lines, specialty retail markets and other similar markets. Analyst estimates cited in 2003 put Micros' market share at about 35% of the restaurant point-of-sale business. Independently active from 1978 to 2014, Micros is now owned by Oracle Corporation and renamed Oracle Food and Beverage and Oracle Hospitality (two of the global business units at Oracle Corporation). Micros was headquartered in Columbia, Maryland, United States, and the current business unit it still based there. On June 23, 2014, Oracle Corporation announced its intent to purchase Micros Systems for $68 per share in cash for a total value of approximately $5.3 billion. History The company was incorporated in 1977 as Picos Manufacturing, Inc. and changed its name to Micros Systems, Inc. in 1978. Micros Systems, Inc. was headquartered in Columbia, Maryland. The name Micros is an acronym for Modular Integrated Cash Register Operating Systems. Products Oracle offers multiple products under the Micros name. Oracle Micros Simphony is a cloud-based restaurant POS system. Opera is the Micros property management system used in many large hotel chains, such as Accor Hotels, Meliá Hotels International, Four Seasons Hotels and Resorts, Travelodge Hotels UK, Crown Resorts, Hyatt Hotels and Resorts, Rydges Hotels & Resorts, Indian Hotels Company Limited (IHCL), Oberoi Hotels & Resorts, Jupiter Hotels, Marriott Hotels & Resorts, Starwood Hotels and Resorts, Resorts and Suites, Radisson Hotels and Resorts (subsidiary of Carlson Companies), the InterContinental Hotels Group and the Thistle Hotels. With the purchase of the company Torex from Cerberus Capital Management, Micros acquired MiRetail Hub, a Workflow application written using Windows Workflow Foundation and designed for the Retail market. Subsidiaries References External links 1977 establishments in Maryland 2014 disestablishments in Maryland 2014 mergers and acquisitions American companies established in 1977 American companies disestablished in 2014 Computer companies established in 1977 Computer companies disestablished in 2014 Companies based in Columbia, Maryland Companies formerly listed on the Nasdaq Defunct computer companies of the United States Defunct computer hardware companies Defunct software companies of the United States Oracle acquisitions Point of sale companies Travel technology
https://en.wikipedia.org/wiki/Millennium%202.2
Millennium 2.2 is a resource management computer game by Ian Bird, released in 1989 for Atari ST, Amiga and MS-DOS. The MS-DOS version of the game was released as Millennium: Return to Earth. It is the forerunner to Bird's Deuteros, which is in a similar resource management game but many times larger and more difficult. Gameplay In the game, humanity has colonized the Moon and Mars. However, a 20 trillion ton asteroid has collided with Earth, making it uninhabitable. All that is left of humanity is a small, self-sufficient colony on the surface of the Moon, and a race of mutant humans on Mars. As the commander of Moonbase, it is your job to ensure the survival of mankind by exploring the Solar System for other habitable planets and moons, and ultimately re-establish life on Earth. However, the Martian mutants consider themselves the superior race and want Earth for themselves, meaning a war is inevitable. The core of the game is spent in resource management and researching new technologies for space ships and base improvements. At first it is possible only to mine asteroids before a suitable planetary colony can be discovered and established. A typical game involves manufacturing probes, maintain defenses to fend off the Martian attacks, managing each colony's solar power energy generation, mining for resources on various planets and their moons and control the traffic to and from the Moon. Out of fifteen ingame resources, only silver, uranium, and chromium cannot be obtained by mining the Moon or Asteroid Belt. The only break from the resource management simulation comes when the player is under attack by Martians. Combat is represented with a space ship fighting mini-game with basic 3D graphics. Initially the game is a race against time as each attack is heavier than the previous. The player eventually must find the necessary technology to attack Mars to make the attacks cease, establish a base there, and while there discover the terraforming technology. The player needs to balance manufacturing output with the available solar power, and many minerals are only available from certain planets or asteroids. Depending on planetary orbits, colony ships and probes can take longer to reach their destinations. As time progresses, colonists will adapt to different atmospheres, and after Earth is terraformed, secede from the player's control (this event will also strand any of player's ships that may be docked on those planets). In the PC version, resources are largely randomized for different planets, as is atmosphere determining if mutations occur, with notable exceptions of Earth, Mars and Moon. Reception In the July 1989 edition of Zzap!, Robin Hogg called this "an exceptionally compelling game." He did think the game could be completed relatively easily in about 20 hours, but nevertheless found it addictive. He concluded, "A little slow to start with, Millennium quickly becomes engrossing with interesting problems all the way and is easily
https://en.wikipedia.org/wiki/HP%20Pavilion
HP Pavilion is a line of consumer-oriented laptop and desktop computers produced by HP Inc. Introduced in 1995, HP has used the name for both desktops and laptops in its home and home office product range. The Pavilion mainly competes against computers such as Acer's Aspire, Dell's Inspiron and XPS, Lenovo's IdeaPad, Samsung's Sens, and Toshiba's Satellite. When Hewlett-Packard merged with Compaq in 2002, it took over Compaq's existing naming rights agreement, and so sold both HP- and Compaq-branded machines, until 2013. History In 1995, HP introduced the Pavilion PC, an IBM-compatible computer of the desktop type, which marked the company's introduction into the home-computing market. Dave Packard published The HP Way, a book that chronicled the rise of Hewlett-Packard and gave consumers insight into its business practices, culture, and management style. HP also produced a low-cost, high-speed infrared transceiver that allowed wireless data exchange in a range of portable computing applications; these included telephones, computers, printers, cash registers, automatic teller machines, and digital cameras. The first HP Pavilion PC The HP Pavilion 5030, released in 1995 as the first computer in the HP Pavilion line, was technically HP's second multimedia PC designed specifically for the home market. The first was called the HP Multimedia PC; model numbers were 6100, 6140S, and 6170S. The Pavilion went on to become a popular model. Specifications included a quad-speed CD-ROM drive, Altec Lansing speakers, software for online service access, and came shipped with Windows 95. This entry-level model featured a 75 MHz Intel Pentium processor, 8 MB RAM, and an 850 MB hard drive. Desktops HP offers about 30 customizable desktops; of these, 5 are standard HP Pavilion, 4 are Slimline, 6 are High Performance Edition (HPE), 5 are "Phoenix" HPE Gaming editions*, 5 are Touchsmart, and 5 are All-In-One. Current desktop models HP Pavilion: p7m, p7z, p7t, p7xt, p7qe HP Pavilion Slimline: s5m, s5t, s5z, s5xt HP Pavilion HPE (High Performance Edition): h8m, h8t, h8z, h8xt, h8qe, h8se HP Pavilion HPE (High Performance Edition) Phoenix (Gaming): h9-1100z, h9-1120t, h9-1150t, h9-1170t, h9-1135, h9-1200ex *(not customizable) HP Pavilion Wave: 600t HP Touchsmart PC: 310z, 610z, 610t, 610xt, 610 Quad HP Omni Series (All-In-One): 100z, 100t, 200t, 200xt, 200 Quad Past desktop models (Note that this is not a complete list, but a list of more recent models.) HP Pavilion: a255c, a445c, a1740n, a6560t, a6560z, a6510t, a6500z, a6460t, a6450z, a6410t, a6400z, a6250z, a6250t, a6210z, a6205t, a6200t, a6600z, a6608f, a6610t, ?6617?, a6660t, a6660z, a6700z, a6750f, p6300z, p6310t, p6350z, p6370t, p6380t, a705w, a000 series - Panther / Jaguar a1000 series - Mojave / Gobi a6000 / p6000 series - Venus / Venus2 HP Pavilion Slimline: s3100n, s3200t, s3200z, s3400t, s3400z, s3500t, s3500z, s3600f, s3600t, s3600z, s3700f, s3700z, s3710t, s3750t, s5305z, s5310t, s5350z, s5
https://en.wikipedia.org/wiki/Power%20Macintosh%207600
The Power Macintosh 7600 is a personal computer designed, manufactured and sold by Apple Computer from April 1996 to November 1997. It is identical to the Power Macintosh 7500, but with a PowerPC 604 CPU. Three models were available with 120 MHz, 132 MHz and 200 MHz processors. Like the 7500, it includes advanced Audio-Video ports including RCA audio in and out, S-Video in, composite video in and standard Apple video ports. The 7600 features the easy-access "outrigger" desktop case first introduced with the Power Macintosh 7500. It was eventually replaced by the Power Macintosh 7300, one of the very few times that Apple updated a computer but gave it a lower model number - the reason is that the 7300 was a joint replacement for the 7600 and the Power Macintosh 7200. Models Introduced April 22, 1996: Power Macintosh 7600/120: PowerPC 604, 120 MHz Introduced August 3, 1996: Power Macintosh 7600/132: PowerPC 604, 132 MHz Introduced February 2, 1997: Power Macintosh 7600/200: PowerPC 604e, 200 MHz. Sold in Japan only. Timeline References External links Power Mac 7600 at lowendmac.com 7600/120, 7600/132 and 7600/200 at everymac.com 7600 7600 Macintosh desktops Computer-related introductions in 1996
https://en.wikipedia.org/wiki/Jon%20Ritman
Jon Ritman is a game designer and programmer notable for his work on 1980s computer games, primarily for the ZX Spectrum and Amstrad CPC home computers. His first experience with a computer was when he was 13, his first computer was a Sinclair ZX81 he bought in 1981. His first game, Namtir Raiders for the ZX81, gained its name from his surname reversed. He first drew attention with his games Bear Bovver and Match Day for the ZX Spectrum. In 1988, Ritman was voted Best Programmer Of The Year at the Golden Joystick Awards. In 2014 Ritman appeared in the documentary feature film From Bedrooms to Billions, which tells the story of the British video game industry from 1979 to its release. Games Namtir Raiders, Artic Cosmic Debris, Artic 3D Combat Zone, Artic Dimension Destructors, Artic Bear Bovver, Artic Match Day series, Ocean Batman, Ocean Head over Heels, Ocean Monster Max, Rare/Titus Super Match Soccer, 1998 Ritman also worked on two other football games that were not published: Final Whistle was developed for the Razz arcade system, but was cancelled as it looked like an improved version of Match Day II not suitable for arcade games. Soccerama was developed for Super Nintendo Entertainment System, but did not pass Nintendo's quality control due to bugs. References External links Jon Ritman's website Interview with Ritman at crashonline.org.uk Ritman interview at computeremuzone.com Ritman interview at tacgr.emuunlim.com Biography British video game designers British computer programmers Golden Joystick Award winners Living people Video game programmers Year of birth missing (living people)
https://en.wikipedia.org/wiki/Ubuntu%20Forums
The Ubuntu Forums is the official forum for the Ubuntu operating system. As of May 2022, The Ubuntu Forums has 2.1 million registered members and more than 2.2 million threads. The Ubuntu Forums currently runs on the forum software vBulletin. On July 20, 2013 the site was compromised, with attacker(s) both defacing the site and gaining access to "all user email addresses and hashed passwords" The site was compromised once again on July 15, 2016. "Usernames, email addresses and IPs for 2 million users" were compromised but 'no active passwords' were accessed. History The Ubuntu Forums were created by Ryan Troy in October 2004. The forums became a popular resource for Ubuntu and were deemed the Official Ubuntu Forums in November 2004. The forums hosting continued to be paid for by Ryan and the occasional donations of forum community members until March 2006, when Canonical offered to host the forums on its own servers. In June 2007, the forums' domain name, license, and assets were all transferred to Canonical, which now has sole ownership. Role The primary function of The Ubuntu Forums is for Ubuntu support, but it also has a popular community area where other topics may be discussed. Governance The Ubuntu Forums are governed by a moderation team made up of volunteers, often referred to as The Forum Staff. The Forum Staff have three ranks: Administrators, Super Moderators and Moderators. The Administrators serve on the Forum Council. See also List of Internet forums References Computing websites Internet properties established in 2004 Internet services supporting OpenID Knowledge markets Ubuntu
https://en.wikipedia.org/wiki/Index%20to%20Marine%20%26%20Lacustrine%20Geological%20Samples
The Index to Marine & Lacustrine Geological Samples is a collaboration between multiple institutions and agencies that operate geological sample repositories. The purpose of the database is to help researchers locate sea floor and lakebed cores, grabs, dredges, and drill samples in their collections. Sample material is available from participating institutions unless noted as unavailable. Data include basic collection and storage information. Lithology, texture, age, principal investigator, province, weathering/metamorphism, glass remarks, and descriptive comments are included for some samples. Links are provided to related data and information at the institutions and at NCEI. Data are coded by individual institutions, several of which receive funding from the US National Science Foundation. For more information see the NSF Division of Ocean Sciences Data and Sample Policy. The Index is endorsed by the Intergovernmental Oceanographic Commission, Committee on International Oceanographic Data and Information Exchange (IODE-XIV.2). The index is maintained by the National Centers for Environmental Information (NCEI), formerly the National Geophysical Data Center (NGDC), and collocated World Data Center for Geophysics, Boulder, Colorado. NCEI is part of the National Environmental Satellite, Data and Information Service of the National Oceanic & Atmospheric Administration, U. S. Department of Commerce. Searches and data downloads are available via a JSP and an ArcIMS interface. Data selections can be downloaded in tab-delimited or shapefile form, depending on the interface used. Both WMS and WFS interfaces are also available. The Index was created in 1977 in response to a meeting of Curators of Marine Geological Samples, sponsored by the U.S. National Science Foundation. The Curators' group continues to meet every 2–3 years. Dataset Digital Object Identifier DOI:10.7289/V5H41PB8 Web site The Index to Marine and Lacustrine Geological Samples Participating Institutions Antarctic Research Facility, Florida State University Geological Survey of Canada, Atlantic BPCRC Polar Rock Repository, Ohio State University BPCRC Sediment Repository, Ohio State University Lamont–Doherty Earth Observatory, Columbia University National Lacustrine Core Repository, University of Minnesota Ocean Drilling Program/Deep Sea Drilling Project Oregon State University, College of Ocean and Atmospheric Sciences Scripps Institution of Oceanography University of Rhode Island, Graduate School of Oceanography USGS West Coast Repository USGS East Coast Repository Woods Hole Oceanographic Institution Complete list of Participants References https://www.re3data.org/repository/r3d100011045 Moore, C.J. and R.E. Habermann, 2006, Core data stewardship: A long-term perspective. In, Rothwell, Guy, ed., New Techniques in Sediment Core Analysis, Geological Society of London Special Publication 267, pp. 241–251 (DOI: 10.1144/GSL.SP.2006.267.01.18). Mix, A., Conard, B., Broda, J., Ca
https://en.wikipedia.org/wiki/George%20Sadowsky
George Sadowsky (born September 30, 1936) is an American computer scientist who has worked in a number of entities related to promotion of the Internet worldwide. He is known through his decades of work with developing countries. In many of these countries, he was the one to actually bring the Internet, or make it affordable, or help change the legislation to make sure it minimized government control and regulation. On August 3, 2013, Sadowsky was inducted into the Internet Hall of Fame as a Global Connector. On November 9, 2022, he was presented the Johnathan B. Postel award at IETF meeting 115. Education 1953–1957 Harvard College, majored in mathematics, A.B. 1957. 1957–1958 Harvard University, graduate study in mathematics 1963–1966 Yale University, graduate study in economics, M.A. 1965, Ph.D. 1988 Career Sadowsky's first work was at Combustion Engineering, Inc. (1958–1962), where he was an applied mathematician and programmer for the Nuclear Division. He then went to Yale University (1962–1963), where he was Manager of Operations of Yale Computer Center and Research Assistant in Economics. For three years (1962–1965), while in graduate school at Yale, Sadowsky was a consultant to government agencies and research projects, e.g. he introduced the use of computers for revenue estimation in the Office of Tax Analysis of the U. S. Treasury Department and developed a large computer-based microanalytic simulation model to analyze the revenue and distributional effects of preliminary versions of the Revenue Act of 1964. He then went to the Brookings Institution (1966–1970), where he served as director of the Computer Center and was a senior fellow at the same time. The next three years Sadowsky spent at The Urban Institute as a senior research staff member. In 1973 he joined the United Nations, where he worked until 1986 as technical adviser in Computer Methods and concurrently as adviser to the director of the Statistical Office. He also performed occasional consulting work for government, research and social service agencies. In 1986 Sadowsky moved to Northwestern University, where he was a director for academic computing and network services until 1990. The next ten years, until 2000, Sadowsky was working at the New York University as a director of networking services and as director of Academic Computing Facility. In 2001, he became executive director of the GIPI project, Global Internet Policy Initiative. Boards Sadowsky served as chair of the nominating committee at Internet Corporation for Assigned Names and Numbers (ICANN), 2005. He is a member of the board of directors and secretary for the Digital Policy Institute. Like Vint Cerf, Sadowsky served as a member of Bulgarian President Georgi Parvanov's IT Advisory Council from March 2002 till January 2012. Sadowsky was a member of the Election Committee of the Internet Society, 2005–2006. He also serves on the Board of Directors of Peoplink, and he is a member of
https://en.wikipedia.org/wiki/Spaceway
The Spaceway system was originally envisioned as a global Ka-band communications system by Hughes Electronics. When the project to build the system was taken over by Hughes Network Systems, a subsidiary of Hughes Electronics, it was transformed into a phased deployment initially only launching a North American satellite system. This is in comparison to other more ambitious systems such as Teledesic and Astrolink which retained their full global nature and which subsequently failed to complete their systems. Hughes Network Systems working with Hughes Electronics subsidiary Hughes Space and Communications (and subsequently sold to Boeing and called Boeing Satellite Systems and later the Boeing Satellite Development Center) completed and built the North American Spaceway system meant to provide broadband capabilities of up to 512 kbit/s, 2 Mbit/s, and 16 Mbit/s uplink data communication rates with fixed Ka-band satellite terminal antennas sized as small as . The broadband Spaceway system was standardized by Telecommunications Industry Association and European Telecommunications Standards Institute (ETSI) as the Regenerative Satellite Mesh - A Air Interface. After News Corp purchased a controlling interest in Hughes Electronics, the company sold off its controlling interest in Hughes Network Systems but retained Spaceway-1 and Spaceway-2 for use in the DirecTV satellite television subsidiary of Hughes Electronics. Boeing retrofitted the first two satellites for bent pipe Ka-band communications for use in high-definition television and disabled the regenerative on-board processing of the original system that was to be used for broadband satellite communications. Despite statements to the contrary in the system's initial filings with the Federal Communications Commission, none of the three satellites have inter-satellite links connecting the satellites directly with each other in space. Spaceway-1, Spaceway-2 and Spaceway-3 have been launched and Hughes Network Systems had an option to purchase and have Boeing build Spaceway-4. Spaceway-1 was decommissioned in February 2020 after suffering extensive thermal damage to its batteries in December 2019, forcing the satellite to be moved to a graveyard orbit to prevent the risk of it exploding. Notes References External links Spaceway 3 Boeing's Original Spaceway Specification and Picture Communications satellites
https://en.wikipedia.org/wiki/Spaceway-3
Spaceway-3 is a communications satellite which was launched in August 2007. The third satellite in the Spaceway series, it includes a Ka-band communications payload. It is used by Hughes Network Systems to provide broadband Internet Protocol network service. History In March 2007, shortly after the failure of a Sea Launch rocket launch in January 2007, Hughes Network Systems switched launch of Spaceway-3 from a Zenit-3SL rocket to an Ariane 5 launch vehicle. Launch Spaceway-3 was launched 14 August 2007 on an Ariane 5 launch vehicle with BSAT-3a. It lifted off at 23:44 UTC from ELA-3 of the Centre Spatial Guyanais. Five hours and 46 minutes later, signals from the spacecraft were successfully received at a ground station in Hartebeesthoek, South Africa. See also Regenerative Satellite Mesh – A (RSM – A) References Communications satellites in geostationary orbit Satellites using the BSS-702 bus High throughput satellites
https://en.wikipedia.org/wiki/SGI%20Prism
The Silicon Graphics Prism is a series of visualization computer systems developed and manufactured by Silicon Graphics (SGI). Released in April 2005, the Prism's basic system architecture is based on the Altix 3000 servers, but with graphics hardware. The Prism uses the Linux operating system and the OpenGL software library. Three models of the SGI Prism are Power, Team and Extreme levels. The Power level supports two to eight Itanium 2 processors, up to 96 GB of memory and two to four graphics pipelines. The Team level supports 8 to 16 Itanium 2 processors, up to 192 GB of memory and four to eight graphics pipelines. The Extreme level supports 16 to 256 Itanium 2 processors, up to 3 TB of memory and 4 to 16 graphics pipelines. The graphics pipelines for the Prism are ATI FireGL cards based on either the R350 or R420 GPUs. References Prism Prism Very long instruction word computing 64-bit computers
https://en.wikipedia.org/wiki/Garfield%3A%20Big%20Fat%20Hairy%20Deal
Garfield: Big Fat Hairy Deal is a 1987 computer game for the Atari ST, ZX Spectrum, Commodore 64, Amstrad CPC and the Amiga based on the comic strip Garfield. It is the second video game based on Jim Davis' Garfield comics to be released, following 1986's Create with Garfield. Plot and gameplay Garfield must rescue his girlfriend Arlene from the cat pound and then return to Jon Arbuckle's map. He starts his quest in Jon's house, venturing through streets, dark alleys, convalescent homes, and sanitary sewers to find Arlene. Various objects are littered along the way, and Garfield meets characters such as Odie, Nermal and giant rats, whom can help or hinder his quest. In some versions of this game, the background graphics are only in black and white, while the sprites show a little color. In other versions (i.e. the Commodore 64 version), the graphics are all full color. Reception Zzap!64 reviewing the C64 version complemented the graphics, practically the characters, calling them "Large, beautifully animated", but criticised the repetitive level design and lack of replay value. Nic Outterside writing in Atari ST User found that the game had "you in stitches of laughter", employed "suburb graphics and animation", was "a delight to play" and thought it was one of the most enjoyable games he had played in 1988. References External links at the Hall of Light (HOL) 1987 video games Amiga games Amstrad CPC games Atari ST games Commodore 64 games Video games based on Garfield Platform games Video games scored by David Whittaker Video games developed in the United Kingdom ZX Spectrum games Single-player video games
https://en.wikipedia.org/wiki/ARMD
ARMD may refer to: Aeronautics Research Mission Directorate, within NASA Age-related macular degeneration, a type of vision loss ATAPI removable media device, a type of computing storage
https://en.wikipedia.org/wiki/Utah%20Telecommunication%20Open%20Infrastructure%20Agency
The Utah Telecommunication Open Infrastructure Agency (UTOPIA) is a consortium of 16 Utah cities engaged in deploying and operating a fiber to the premises network to every business and household (about 160,000) within its footprint. Using an active Ethernet infrastructure and operating at the wholesale level, UTOPIA is considered an open-access network and promotes competition in all telecommunications services. History 2002 First feasibility study 2004 authorization of first bonds 2007 falls short of subscriber goal of 35%, reaching only 16% subscribership to service. 2014 proposal for a private equity firm purchase, which fails to go through 2015 approached net zero operational cost, which would end years of operational losses subsidized by member cities. Operations UTOPIA operates as a wholesale fiber-optic network and is prohibited by law from providing retail services. There are currently 17 service providers on the UTOPIA network and the network is open to additional service providers that meet certain qualifications. Though UTOPIA has extended an open invitation to Comcast, CenturyLink (formerly Qwest), and Frontier Communications, the incumbent service providers, all have declined to join the network. Financing UTOPIA bonds for construction costs using sales tax pledges as collateral to secure the bond. Revenues to cover the bonds are then set aside by pledging cities in an interest-bearing account and will only be used should subscriber revenues fail to cover the debt service. Because UTOPIA cities all bond at the same time and use their collective bond ratings and taxing authority, financing is generally seen as low-risk and secures a low interest rate. UTOPIA encountered financial problems in late 2007 and halted all new construction. They have applied for and been approved for loans from the US Department of Agriculture's Rural Utilities Service (RUS) program. These loans required UTOPIA to submit a construction plan for approval and, once approved, apply for reimbursement. UTOPIA reportedly ran into multiple delays in seeking reimbursement before being outright refused any further reimbursement from RUS without explanation. At the time, UTOPIA had $11M in outstanding construction costs that had not been reimbursed by RUS. UTOPIA has since sued RUS for damages. Because of these problems, UTOPIA asked its pledging member cities to extend the bonding period from 20 to 30 years and bond for additional to connect additional customers, complete unfinished sections of the network, and provide two years of capitalized interest payments. The new bond is for $185M with a total cost including interest of $500M. The network has over 11,000 subscribers. A new proposal in 2014 has surfaced from an Australian investment company called Macquarie Group. By June 27, 2014 eleven of the cities will need to decide to move forward with a proposed plan to incorporate the expense of construction costs as a mandatory utility fee or not. The pr
https://en.wikipedia.org/wiki/UNITY%20%28programming%20language%29
UNITY is a programming language constructed by K. Mani Chandy and Jayadev Misra for their book Parallel Program Design: A Foundation. It is a theoretical language which focuses on what, instead of where, when or how. The language contains no method of flow control, and program statements run in a nondeterministic way until statements cease to cause changes during execution. This allows for programs to run indefinitely, such as auto-pilot or power plant safety systems, as well as programs that would normally terminate (which here converge to a fixed point). Description All statements are assignments, and are separated by #. A statement can consist of multiple assignments, of the form a,b,c := x,y,z, or a := x || b := y || c := z. You can also have a quantified statement list, <# x,y : expression :: statement>, where x and y are chosen randomly among the values that satisfy expression. A quantified assignment is similar. In <|| x,y : expression :: statement >, statement is executed simultaneously for all pairs of x and y that satisfy expression. Examples Bubble sort Bubble sort the array by comparing adjacent numbers, and swapping them if they are in the wrong order. Using expected time, processors and expected work. The reason you only have expected time, is that k is always chosen randomly from . This can be fixed by flipping k manually. Program bubblesort declare n: integer, A: array [0..n-1] of integer initially n = 20 # <|| i : 0 <= i and i < n :: A[i] = rand() % 100 > assign <# k : 0 <= k < 2 :: <|| i : i % 2 = k and 0 <= i < n - 1 :: A[i], A[i+1] := A[i+1], A[i] if A[i] > A[i+1] > > end Rank-sort You can sort in time with rank-sort. You need processors, and do work. Program ranksort declare n: integer, A,R: array [0..n-1] of integer initially n = 15 # <|| i : 0 <= i < n :: A[i], R[i] = rand() % 100, i > assign <|| i : 0 <= i < n :: R[i] := <+ j : 0 <= j < n and (A[j] < A[i] or (A[j] = A[i] and j < i)) :: 1 > > # <|| i : 0 <= i < n :: A[R[i]] := A[i] > end Floyd–Warshall algorithm Using the Floyd–Warshall algorithm all pairs shortest path algorithm, we include intermediate nodes iteratively, and get time, using processors and work. Program shortestpath declare n,k: integer, D: array [0..n-1, 0..n-1] of integer initially n = 10 # k = 0 # <|| i,j : 0 <= i < n and 0 <= j < n :: D[i,j] = rand() % 100 > assign <|| i,j : 0 <= i < n and 0 <= j < n :: D[i,j] := min(D[i,j], D[i,k] + D[k,j]) > || k := k + 1 if k < n - 1 end We can do this even faster. The following programs computes all pairs shortest path in time, using processors and work. Program shortestpath2 declare n: integer, D: array [0..n-1, 0..n-1] of integer initially n = 10 # <|| i,j : 0 <= i < n and 0 <= j < n :: D[i,j] = rand() % 10 >
https://en.wikipedia.org/wiki/Sequential%20transmission
Sequential transmission may refer to: Automated manual transmission, a type of mechanical power transmission; which is based on a conventional manual transmission, but is controlled by a computer, and can operate fully automatically. Semi-automatic transmission, a method of mechanical power transmission used in motor vehicles; where part of its operation is automated (namely the clutch system), but the driver's input is still required to manually change gears Sequential manual transmission, a type of mechanical power transmission; commonly used in motorcycles, race cars, and certain road cars Serial communication, a method of data transmission in telecommunication and computing See also Automatic transmission
https://en.wikipedia.org/wiki/Bit%20specification
In computing, bit specification may mean: Computer hardware or software capabilities or design features expressed in terms of bit counts. Higher bit specification (e.g. 16-bit vs. 8-bit) usually indicates better performance. Examples: Color depth Computer bus size Processor register size Sound quality Specification or datasheet where the meaning of individual bits in a larger, for example byte-length, message is described. Bit specifications are often required to document low-level device control or data transmission protocols. See bit manipulation. See also Functional specification
https://en.wikipedia.org/wiki/Global%20Forecast%20System
The Global Forecast System (GFS) is a global numerical weather prediction system containing a global computer model and variational analysis run by the United States' National Weather Service (NWS). Operation The mathematical model is run four times a day, and produces forecasts for up to 16 days in advance, but with decreased spatial resolution after 10 days. The forecast skill generally decreases with time (as with any numerical weather prediction model) and for longer term forecasts, only the larger scales retain significant accuracy. It is one of the predominant synoptic scale medium-range models in general use. Principles The GFS model is a FV3 model with an approximate horizontal resolution of 13 km for the days 0-16 days. In the vertical, the model is divided into 127 layers and extends to the mesopause (roughly ~80 km), and temporally, it produces forecast output every hour for the first 120 hours, three hourly through day 10 and 12 hourly through day 16. The output from the GFS is also used to produce model output statistics. Variants In addition to the main model, the GFS is also the basis of a lower-resolution 30-member (31, counting the control and operational members) ensemble that runs concurrently with the operational GFS and is available on the same time scales. This ensemble is referred to as the "Global Ensemble Forecast System" (GEFS). The GFS ensemble is combined with Canada's Global Environmental Multiscale Model ensemble to form the North American Ensemble Forecast System (NAEFS). Usage As with most works of the U.S. government, GFS data is not copyrighted and is available for free in the public domain under provisions of U.S. law. Because of this, the model serves as the basis for the forecasts of numerous private, commercial, and foreign weather companies. Accuracy By 2015, the GFS model had fallen behind the accuracy of other global weather models. This was most notable in the GFS model incorrectly predicting Hurricane Sandy turning out to sea until four days before landfall, while the European Centre for Medium-Range Weather Forecasts' model predicted landfall correctly at 7 days. Much of this was suggested to be due to limits in computational resources within the National Weather Service. In response, the NWS purchased new supercomputers, increasing processing power from 776 teraflops to 5.78 petaflops. As of the 12z run on 19 July 2017, the GFS model has been upgraded. Unlike the recently-upgraded ECMWF, the new GFS behaves a bit differently in the tropics and in other regions compared to the previous version. This version accounts more accurately for variables such as the Madden–Julian oscillation and the Saharan Air Layer. In 2018, the processing power was increased again to 8.4 petaflops, The agency also tested a potential replacement model with different mechanics, the flow-following, finite-volume icosahedral model (FIM), in the early 2010s; it abandoned that model around 2016, after it did not show subs
https://en.wikipedia.org/wiki/Bit%20nibbler
A bit nibbler, or nibbler, is a computer software program designed to copy data from a floppy disk one bit at a time. It functions at a very low level directly interacting with the disk drive hardware to override a copy protection scheme that the floppy disk's data may be stored in. In most cases the nibbler software still analyses the data on a byte level, only looking to the bit level when dealing with synchronization marks (syncs), zero-gaps and other sector & track headers. When possible, nibblers will work with the low-level data encoding format used by the disk system, being Group Coded Recording (GCR - Apple, Commodore), Frequency Modulation (FM - Atari), or Modified Frequency Modulation (MFM - Amiga, Atari, IBM PC). Overview Software piracy began to be a concern when floppy disks became the common storage media. The ease of copying depended on the system; Jerry Pournelle wrote in BYTE in 1983 that "CP/M doesn't lend itself to copy protection" so its users "haven't been too worried" about it, while "Apple users, though, have always had the problem. So have those who used TRS-DOS, and I understand that MS-DOS has copy protection features". Apple and Commodore 64 copy protection schemes were extremely varied and creative because most of the floppy disk reading and writing was controlled by software (or firmware), not by hardware. Pournelle disliked copy protection and, except for games, refused to review software that used it. He did not believe that it was useful, writing "For every copy protection scheme there's a hacker ready to defeat it. Most involve so-called nybble copiers, which try to analyze the original disk and then make a copy". By 1980, the first 'nibble' copier, Locksmith, was introduced for the Apple II. These copiers reproduced copy protected floppy disks an entire track at a time, ignoring how the sectors were marked. This was harder to do than it sounds for two reasons: firstly, Apple disks did not use the index hole to mark the start of a track; their drives could not even detect the index hole. Tracks could thus start anywhere, but the copied track had to have this "write splice", which always caused some bits to be lost or duplicated due to speed variations, roughly in the same (unused for payload data) place as the original, or it would not work. Secondly, Apple used special "self-sync" bytes to achieve agreement between drive controller and computer about where any byte ended and the next one started on the disk. These bytes were written as normal data bytes followed by a slightly longer than normal pause, which was notoriously unreliable to detect on read-back; still, you had to get the self-sync bytes roughly right as without them being present in the right places, the copy would not work, and with them present in too many places, the track would not fit on the destination disk. Apple II Locksmith copied Apple II disks by taking advantage of the fact that these sync fields between sectors almost always consist
https://en.wikipedia.org/wiki/Corporation%20Bank
Corporation Bank was a public-sector banking company headquartered in Mangalore, India. The bank had a pan-Indian presence. Presently, the bank has a network of 2,432 fully automated CBS branches, 3,040 ATMs, and 4,724 branchless banking units across the country. In 2019, finance minister Nirmala Sitharaman announced that Corporation Bank and Andhra Bank would be merged into the Union Bank of India, with all their branches becoming branches of the latter on 1 April 2020. History Corporation Bank was founded on 12 March 1906 in Udupi, with capital, Haji Abdulla Haji Khasim Saheb Bahadur as founding president, and guided by the principles of the Swadeshi movement of Bal Gangadhar Tilak. On 14 November, Corporation Bank said it raised an amount of of the Basel III compliant Tier-II Bonds (Series1) and the same has been allotted by the Securities Allotment Committee of the Board of the Bank. On 2 December 2017, Corporation Bank launched its RuPay Select and RuPay Platinum credit cards. RuPay credit cards are accepted at all RuPay-enabled 1.5 million-plus PoS terminals and 80,000-plus e-commerce merchants in India and all ICS Partner acceptance points (POS, e-commerce merchants) globally. On 30 August 2019, Finance Minister Nirmala Sitharaman announced that Corporation Bank and Andhra Bank would be merged into Union Bank of India. The proposed merger would make Union Bank of India the fifth largest public sector bank in the country with assets of and 9,609 branches. The Board of Directors of Andhra Bank approved the merger on 13 September. The Union Cabinet approved the merger on 4 March, and it was completed on 1 April 2020. See also Indian banking List of banks in India Economy of Mangalore References External links Defunct banks of India Indian companies established in 1906 Banks established in 1906 Banks disestablished in 2020 Indian companies disestablished in 2020 Companies nationalised by the Government of India Banks based in Karnataka Companies based in Mangalore Companies formerly listed on the Bombay Stock Exchange Companies formerly listed on the National Stock Exchange of India
https://en.wikipedia.org/wiki/MTV%20%28Philippine%20TV%20channel%29
MTV Philippines was a 24-hour music/entertainment television network owned by All Youth Channels, Inc., through a partnership with MTV Networks Asia Pacific. The network originally started its broadcast on January 1, 2001. Two other MTV-branded networks carrying domestic its final broadcast on March 20, 2011, content have since struggled to stay on the air through the 2010s, neither lasting more than four years. Prior to its last incarnation, MTV Philippines was a corporate venture between MTV Networks Asia and Nation Broadcasting Corporation. MTV Networks Asia provided much of the broadcast content, while NBC provided the infrastructure. MTV Philippines' facilities were located at the Citibank Center (now BDO Towers Valero) in Makati, The Richmonde Hotel in Ortigas Center, Pasig, The Fort in Bonifacio Global City, Taguig, and Silver City in Frontera Verde, Ortigas Avenue, Pasig. History MTV Asia in the Philippines on UHF Channel 23 MTV started in the Philippines in May 1992 as MTV Asia. It started as one of the channels of the STAR group—a partnership of Viacom, MTV's parent company, and STAR TV. It began airing on UHF Channel 23 licensed to Ermita Electronics Corporation, the country's first UHF TV station fully devoted to re-broadcasting from a foreign satellite channel. In 1994, the partnership suffered a conflict of interest when STAR launched its own music channel, Channel V. After UHF 23 was put off-air in July 1996, the frequency was reassigned to ABS-CBN through a subsidiary, AMCARA Broadcasting Network, and has been rebranded as Studio 23. However, Studio 23 had to deal with the then-active agreement between Ermita Electronics and MTV Asia (whose main broadcast headquarters is located in Singapore). Studio 23 By October 12, 1996, MTV was being aired on Studio 23 (now known as ABS-CBN Sports+Action in 2014) during daytime hours, while original Studio 23 programming aired on primetime. The partnership with Studio 23 ended on December 31, 2000, and moved to a new channel frequency, UHF 41. ABS-CBN earlier launched its own music channel, Myx on November 20, 2000, and later became Studio 23's daytime block on January 1, 2001. MTV UHF Channel 41 / MTV Philippines Before 2000 was about to end, MTV Networks Asia and Nation Broadcasting Corporation (NBC) signed a joint-venture agreement to form Music Source, and acquired the rights to air MTV 24 hours a day on UHF Channel 41, which was licensed to NBC. MTV Philippines showcased local Filipino talent through videos and shows presented in-between numbers featuring international pop and rock superstars. The channel did not promote a pan-Asian format. However, MTV Southeast Asia presented Indonesian, Malaysian and Singaporean artists on their network, alternating with international pop and rock talents. Within six months from its inception on January 1, 2001, it immediately won the hearts of pop-culturally conscious young Filipino viewers. It was said that the presence of this channel eventua
https://en.wikipedia.org/wiki/Byker%20Metro%20station
Byker is a Tyne and Wear Metro station, serving the suburb of Byker, Newcastle upon Tyne in Tyne and Wear, England. It joined the network on 14 November 1982, following the opening of the fourth phase of the network, between Tynemouth and St James via Wallsend. History Prior to the construction of the Tyne and Wear Metro, there was a British Rail station at Byker, which was located to the north of Shields Road. The station closed to passengers in 1954, with the remainder of the Riverside Branch closing to passengers in July 1973. Heading west from the station, the route crosses the Byker Viaduct over the Ouseburn Valley, then running alongside the East Coast Main Line, before heading underground, to Manors. The S-shaped viaduct was constructed for the Tyne and Wear Metro by Ove Arup, with work on the structure commencing in 1976, with completion in 1979. In 2021, a montage was added with works from the Baltic Centre for Contemporary Art. Facilities Step-free access is available at all stations across the Tyne and Wear Metro network, with ramps providing step-free access to platforms at Byker. The station is equipped with ticket machines, a sheltered waiting area, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is fitted with automatic ticket barriers, which were installed at 13 stations across the network during the early 2010s, as well as smartcard validators, which feature at all stations. There is no dedicated car parking available at the station. There is the provision for cycle parking, with three cycle racks available for use. Services , the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains per hour during the evening and on Sunday. Rolling stock used: Class 599 Metrocar References External links Timetable and station information for Byker Newcastle upon Tyne 1982 establishments in England Railway stations in Great Britain opened in 1982 Tyne and Wear Metro Yellow line stations Transport in Newcastle upon Tyne Transport in Tyne and Wear
https://en.wikipedia.org/wiki/Chillingham%20Road%20Metro%20station
Chillingham Road is a station on the Tyne and Wear Metro network, serving the suburbs of Byker and Heaton, Newcastle upon Tyne in Tyne and Wear, England. It joined the network on 14 November 1982, following the opening of the fourth phase of the network, between Tynemouth and St James via Wallsend. The station is located adjacent to Heaton Traction Maintenance Depot. History It is the closest station to the former Heaton station, which closed to passengers in August 1980. Chillingham Road was originally intended to be named Parsons, reflecting the station's proximity to the Parsons Engineering Works. The station is adjacent to Heaton Traction Maintenance Depot, as well as the East Coast Main Line. Chillingham Road was the first surface station on the network to undergo major renovation, with work completed in October 2011. The refurbishment project involved the installation of white vitreous enamel panels, new seating and lighting, improved security and accessibility, as well as resurfaced platforms. Refurbishment work was completed in October 2011, with the station having been branded in the updated black and white corporate colour scheme. West of Chillingham Road, the Tyne and Wear Metro route diverges from the former route of the North Eastern Railway. Immediately east of the station was a rail connection into the Heaton Traction Maintenance Depot and Parsons Engineering Works – a connection which remained in place until British Rail's re-signalling of the depot at the end of the millennium. Facilities Step-free access is available at all stations across the Tyne and Wear Metro network, with ramps providing step-free access to platforms at Chillingham Road. The station is equipped with ticket machines, sheltered waiting area, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is also fitted with smartcard validators, which feature at all stations across the network. There is no dedicated car parking available at the station. There is the provision for cycle parking, with five cycle pods available for use. Services , the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains per hour during the evening and on Sunday. Rolling stock used: Class 599 Metrocar References External links Timetable and station information for Chillingham Road Newcastle upon Tyne 1982 establishments in England Railway stations in Great Britain opened in 1982 Tyne and Wear Metro Yellow line stations Transport in Newcastle upon Tyne Transport in Tyne and Wear
https://en.wikipedia.org/wiki/Symbol%20%28disambiguation%29
A symbol is something that represents an idea, a process, or a physical entity. Symbol may also refer to: Computing Symbol (computing), a data structure used by a language translator Symbol (data), the smallest amount of data transmitted at a time in digital communications Symbol (programming), a primitive data type in many programming languages used to name variables and functions Symbol (typeface), a font designed by Aldo Novarese (1982), one of the four standard PostScript fonts Debug symbol, debugging information used to troubleshoot computer programs, analyze memory dumps Unicode character, symbols which can be represented and displayed with standard code numbers Film and television Symbol (film), a movie by Hitoshi Matsumoto Symbol (TV series), a TV series that aired on Disney Channel from 1984 to 1991 Logic Symbol (formal), a string, used in formal languages and formal systems Symbol grounding, the problem of how symbols acquire meaning Music Symbol (album), a 2005 album by Japanese electronica musician Susumu Yokota Symbol (Prince album), unofficial name for his 1992 album Symbols (album), a 1997 album from the industrial rock band KMFDM Symbol (choir), a choir in Romania The Symbol (album), a 2007 album by Japanese girl group Shanadoo The Symbols, an English pop music band Symbol Records, a record label, part of Sue Records Theology Creed, a statement of shared beliefs of a religious community Nicene Creed or Symbolum Nicaenum, the profession of faith or creed that is most widely used in Christian liturgy Other uses Symbol (chemistry), an abbreviation that identifies a chemical element Symbol (semiotics), a sign that signifies through arbitrary social convention Symbol (mathematics) Symbol (metric system), a representation of a metric unit independent of language Symbol (number theory), various generalizations of the Legendre symbol Symbol, Kentucky, an unincorporated community in Laurel County, Kentucky, United States Ticker symbol, an abbreviation used to uniquely identify publicly traded shares of a particular stock Symbol Technologies, an AIDC company based in Holtsville, New York, United States Casablanca Conference codenamed SYMBOL, the conference to plan the Allied European strategy for the next phase of World War II See also Simbolul, a Romanian literary magazine Symbolic (disambiguation) Symbolism (disambiguation) Cymbal, round metal plates used as percussion instruments List of symbols
https://en.wikipedia.org/wiki/Computer-aided%20quality%20assurance
Computer-aided quality assurance (CAQ) is the engineering application of computers and computer-controlled machines for the planning and implementation of the quality of products. This includes: Measuring equipment management Goods inward inspection Vendor rating Attribute chart Statistical process control (SPC) Documentation Additional themes: Advanced Product Quality Planning (APQP) Failure mode and effects analysis (FMEA) Dimensional tolerance stack-up analysis using product and manufacturing information (PMI) on CAD models Computer aided inspection with coordinate-measuring machines (CMM) Comparison of data obtained by mean of 3D scanning technologies of physical parts against CAD models References Product lifecycle management
https://en.wikipedia.org/wiki/Tim%20King
Tim King (born June 15, 1967) is an American educator, non-profit leader, and the founder and CEO of Urban Prep Academies, a network of all-male charter public high schools in Chicago. King and Urban Prep have received international attention for the fact that since the school's first graduating class in 2010, 100% of its graduates have been accepted into a four-year college or university. Personal life King was born in Chicago and attended St. Ignatius College Prep, and completed his bachelors and Juris Doctor degrees at Georgetown University. While at the Georgetown University Law Center, King became involved working as a teacher at a nearby Catholic high school, and eventually he determined to pursue teaching as a full-time career. King is a member of Alpha Phi Alpha fraternity. In 2010, he was named one of People Magazine′s Heroes of the Year. He holds doctoral degrees honoris causa from Adler University and Dominican University. Professional career After completing law school, King was named President of Hales Franciscan High School in Chicago, an all-male, predominately African-American school on the city's South Side. While at Hales, King appeared on The Oprah Winfrey Show in an interview in which Oprah characterized him as an "Angel". During King's five-year tenure as President of Hales, 100 percent of the school's graduates were admitted to college. Two years after departing Hales, King founded a network of all-male public high schools, Urban Prep Academies, in order to address Chicago’s woefully low rate of college graduation for black males. Under King's leadership, Urban Prep Academies received charters from the Chicago Board of Education to open three high schools in neighborhoods throughout the city. For his work with Urban Prep Academies, King is recognized as a national leader on education reform. In addition to his management of Urban Prep, King has taught courses on the subjects of urban education and philanthropy at Northwestern University, written for the Chicago Tribune, Chicago Sun-Times, Chronicle of Higher Education, Crain’s Chicago Business, Huffington Post, and New York Times and lectured to groups across the United States. On February 5, 2014, King was appointed to the Board of Commissioners of the Chicago Park District; in 2018 he was appointed to the Georgetown University Board of Regents; in 2020, he was elected to the Georgetown University Board of Governors; and in 2021, King joined the Advisory Board of WorkBox. Awards and media King has been recognized by Black Entertainment Television, Ebony Magazine, Jet Magazine, Crain's Chicago Business, and The Grio for his leadership within the African-American and Chicago communities. In 2006, he was named one of Crain’s "Forty under Forty." In February 2009, he was named one of the top 100 African-American "History Makers in the Making" by The Grio. In March 2010, King was named ABC World News Tonight's "Person of the Week" along with the students of Urban Prep Academ
https://en.wikipedia.org/wiki/CAQ
CAQ can refer to: Computer-aided quality assurance, using computers to assure quality in manufacturing (Coalition for Quebec's Future), a Canadian political party (, Quito German School), Ecuador CovertAction Quarterly, an American political journal published from 1978 to 2005
https://en.wikipedia.org/wiki/Internet%20Privacy%20Act
The Internet Privacy Act is a non-existent and fictitious American law cited by websites that conduct illegal activities in order to deter organizations that look to prosecute such activities. Networks which share music, films and software, for example, often display the fictitious act in an attempt to protect themselves from arrest by being able to claim entrapment in court. In the statement, websites claim that it prevents organizations which may be associated with anti-P2P or government organizations from entering the site or network as it would breach the terms of the act. According to the statement which many sites display, it was signed by Bill Clinton in 1995, but in reality he never signed the act as it never existed. Using this and other such "disclaimers" would actually make it easier for such a site to be found via the major search engines. The text notice on these sites are usually as follows, but can vary: History of usage The false act was first displayed during the late 1990s on many sites that engaged in illegal activities, such as the promotion and distribution of "knock-off" (counterfeit) materials. Over time, the paragraph was picked up and copied and pasted with the exception of a few minor variations to match the content of the containing website. An example is provided below: Through the turn of the century, thousands of web, FTP, and other sites used the statement in an attempt to deter authorities. It is sometimes still seen in modern file sharing networks and protocols. Other reasons for it might have been to reassure the visiting public that their actions and data would be somehow protected. References File sharing Urban legends Copyright infringement Fictional laws
https://en.wikipedia.org/wiki/Data%20retention
Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The different data retention policies weigh legal and privacy concerns economics and need-to-know concerns to determine the retention time, archival rules, data formats, and the permissible means of storage, access, and encryption. Implementation In the field of telecommunications, "data retention" generally refers to the storage of call detail records (CDRs) of telephony and internet traffic and transaction data (IPDRs) by governments and commercial organisations. In the case of government data retention, the data that is stored is usually of telephone calls made and received, emails sent and received, and websites visited. Location data is also collected. The primary objective in government data retention is traffic analysis and mass surveillance. By analysing the retained data, governments can identify the locations of individuals, an individual's associates and the members of a group such as political opponents. These activities may or may not be lawful, depending on the constitutions and laws of each country. In many jurisdictions, access to these databases may be made by a government with little or no judicial oversight. In the case of commercial data retention, the data retained will usually be on transactions and web sites visited. Data retention also covers data collected by other means (e.g., by Automatic number-plate recognition systems) and held by government and commercial organisations. Data retention policies A data retention policy is a recognized and proven protocol within an organization for retaining information for operational use while ensuring adherence to the laws and regulations concerning them. The objectives of a data retention policy are to keep important information for future use or reference, to organize information so it can be searched and accessed at a later date and to dispose of information that is no longer needed. The data retention policies within an organization are a set of guidelines that describes which data will be archived, how long it will be kept, what happens to the data at the end of the retention period (archive or destroy) and other factors concerning the retention of the data. A part of any effective data retention policy is the permanent deletion of the retained data; achieving secure deletion of data by encrypting the data when stored, and then deleting the encryption key after a specified retention period. Thus, effectively deleting the data object and its copies stored in online and offline locations. Australia In 2015, the Australian government introduced mandatory data retention laws that allows data to be retained up to two years. The scheme is estimated to cost at least AU$400 million per year to implement, working out to at least $16 per user per
https://en.wikipedia.org/wiki/Meetro
Meetro was a multi-network social messenger with location-based services (LBS). It was compatible with AOL Instant Messenger, Yahoo! Messenger, MSN Messenger, GTalk, XMPP, and ICQ. Meetro's features made it useful for meeting people with similar interests in a given area, as well as bundling multiple messaging protocols into one program. Meetro was located in San Francisco, California. Meetro is a software that runs on Windows and Mac OS X operating systems. Launch and early history Meetro launched on June 1, 2005. On August 8, 2005, InternetNews reported a rumor that Meetro was in talks to be bought out by search giant Google. On August 14, 2005 SlashDot picked up the story and rumors spread over the internet very quickly. Paul Bragiel, CEO of Meetro, did not initially deny or confirm the rumor, which has been described as a publicity stunt to attract attention, however the rumor was not created by any Meetro Inc. employees but rather a Meetro follower and fan, whom the original article publishing the story called "a source close to the transaction". How it works Meetro differed from the other popular messengers in that users could input location specifications to see other online users in surrounding areas. Its location finder was strongest in the Americas and Europe but worked the world over. Users unable to obtain a location could input latitude and longitude details to see how far away other online users are at a particular moment. Meetro worked by actively scanning for the MAC addresses of wireless access points around a user's location. Then Meetro contacted the main database server and compared the MAC address to a list of known access points. Subsequently it did some mathematical calculations to determine the latitude and longitude of a location. Once Meetro had calculated the general area (usually a quarter mile) of a user's physical location, it then compared it to others users and displayed who's online within a quarter mile, half mile, mile, etc... A user's exact location was never displayed to other people on the network for privacy and security reasons. Meetro would only present that a user is within a range of 1/4 of a mile. Users could choose to make information of their location public, such as "I'm at the cafe on 2nd and Broadway." Shortly before closing, Meetro added support for business address look-ups in the United States as an alternative method for users to report their location. Features Meetro allowed users to create custom profile pages which could be searched and browsed by other users nearby. Meetro's profiles supported feeds for videos, photos, and blogs in addition to the typical social networking profile questions. Users had the option of embedding dynamic feeds from their YouTube videos, Flickr photos, and their personal blogs directly into their profiles. Meetro was one of the few services offering 'profile aggregation' - crawling the web to aggregate a user's digital persona. Meetro was different than o
https://en.wikipedia.org/wiki/StrataVision%203D
StrataVision 3D is a comprehensive 3D computer graphics software package developed by Strata. Features include primitives-based modeling with texturising, keyframe animation, raytrace and later radiosity rendering under the name of Raydiosity. It is notable for being part of the first wave of 3D graphics in desktop publishing. One particular milestone was rendering the environment in the blockbuster game Myst entirely using StrataVision. The multimedia novel, Sinkha, and the Warner Bros 3D Looney Tunes Project were also created initially using this software. History StrataVision was released as the first product of the Strata company in 1989 to facilitate professional 3D graphics on regular desktop Macs. In 1993, StudioPro was added to the product line, with StrataVision remaining a reduced-feature "light" version. In May 2000, the Strata product lineup was consolidated into Strata 3D which is still developed to this day. Features At the time, StrataVision and StrataStudio Pro offered certain features found on dedicated workstations that had not available before on Macintosh. Raydiosity StrataVision 2.0 introduced the Raydiosity rendering algorithm, an algorithm slower than ray tracing, but offering a result deemed more realistic, by taking into account light reflection on textures, atmospheric conditions, inter-reflections between objects, among other things. Raydiosity is often described as Strata's experimental version of radiosity, and at the time was the only implementation of a radiosity-like rendering algorithm available to Macintosh users. It was only found in StrataVision and StrataStudio Pro. RayPainting Another Strata specific rendering, found in StrataStudio Pro, was called RayPainting and applied splotches of colour onto the surface of the object, making it looks like if it were hand painted. Different effects can be applied to simulate the medium used, like, for example, chalk or water color. Extensions StrataVision 2.0 introduced an extension architecture, named SRX, that allowed, for example, to interoperate with Pixar RenderMan or to distribute rendering across computers on the network. Reception MacUser in the September 1992 issue gave 4 1/2 mice (out of five) to StrataVision 3D 2.5 praising its excellent rendering quality and advanced texture control despite the slow rendering and the mediocre animation tools. Version release history 5.0 1998 4.0: available in 1995. It introduced the ability to perform boolean operations, 3.0 1994 2.6: ? 2.5: available in 1992. It introduced "skin modeling" to wrap a surface around ribs, and "flex object" to make these ribs move or change shape over time. It also allow extruding font shapes. 2.0: available in 1991 - introduced the Raydiosity rendering algorithm (not to be confused with radiosity) along with more powerful modelling features, faster rendering, basic animation and extensibility. 1.4: 1990 1.0: August 1989 References External links Strata's website 1989 softwa
https://en.wikipedia.org/wiki/Explicit%20parallelism
In computer programming, explicit parallelism is the representation of concurrent computations by means of primitives in the form of special-purpose directives or function calls. Most parallel primitives are related to process synchronization, communication or task partitioning. As they seldom contribute to actually carry out the intended computation of the program, their computational cost is often considered as parallelization overhead. The advantage of explicit parallel programming is the absolute programmer control over the parallel execution. A skilled parallel programmer takes advantage of explicit parallelism to produce very efficient code. However, programming with explicit parallelism is often difficult, especially for non computing specialists, because of the extra work involved in planning the task division and synchronization of concurrent processes. In some instances, explicit parallelism may be avoided with the use of an optimizing compiler that automatically extracts the parallelism inherent to computations (see implicit parallelism). Programming with explicit parallelism Occam (programming language) Erlang (programming language) Message Passing Interface Parallel Virtual Machine Ease programming language Ada programming language Java programming language JavaSpaces Computer programming
https://en.wikipedia.org/wiki/HDC
HDC may refer to: Computing Hyperdimensional computing, or computation that uses very long vectors Handle of Device Context, part of the GDI API High-Definition Coding, an audio compression codec ; Unix-like ATA device file Organizations Halal Industry Development Corporation, Malaysia Health and Disability Commissioner, New Zealand Health Data Consortium, US Historic Districts Council, New York City, US Honeysuckle Development Corporation, NSW, Australia HDC Hyundai Development Company, South Korea Transportation Haldia Dock Complex, of the Port of Kolkata, India Hammond Northshore Regional Airport (FAA LID code), Louisiana, US Hill descent control system, of an automobile Other uses Heavyweight Dub Champion, an American electronic music group Herräng Dance Camp, Sweden Histidine decarboxylase, an enzyme Holder in due course, a concept in commercial law Home Detention Curfew, in the UK
https://en.wikipedia.org/wiki/Bit-oriented%20protocol
A bit-oriented protocol is a communications protocol that sees the transmitted data as an opaque stream of bits with no semantics, or meaning. Control codes are defined in terms of bit sequences instead of characters. Bit oriented protocol can transfer data frames regardless of frame contents. It can also be stated as "bit stuffing". Synchronous framing High-Level Data Link Control may work like this: Each frame begins and ends with a special bit pattern 01111110, called a flag byte. A bit stuffing technique is used to prevent the receiver from detecting the special flag byte in user data e.g. whenever the sender's data link layer encounters 5 consecutive 1 (one) in the data, it automatically stuffs 0 into the outgoing stream. See also Byte-oriented protocol References Linktionary page for bit-oriented protocol Data transmission Telecommunication protocols
https://en.wikipedia.org/wiki/WRDW-TV
WRDW-TV (channel 12) is a television station in Augusta, Georgia, United States, affiliated with CBS and MyNetworkTV. It is owned by Gray Television alongside low-power, Class A NBC affiliate WAGT-CD (channel 26). Both stations share studios at The Village at Riverwatch development in Augusta, while WRDW-TV's transmitter is located in Beech Island, South Carolina. History WRDW-TV commenced operations in February 1954; it is the second-oldest television station in Augusta. The station was originally owned by Radio Augusta, the parent company of the original WRDW radio (1480 AM, later WCHZ and now defunct). WRDW-TV has been Augusta's CBS affiliate for its entire history, owing to its radio sister's long affiliation with the CBS Radio Network. However, it shared ABC with then-primary NBC affiliate WJBF (channel 6). In 1956, Radio Augusta was sold to the Morris family and their company, Southeastern Newspapers, publishers of the Augusta Chronicle. On September 1, 1967, WJBF switched its primary affiliation to ABC, and began splitting NBC with WRDW-TV. This was very unusual for a two-station market, especially one as small as Augusta. However, WJBF's namesake owner, J. B. Fuqua, wanted to get that station in line with two ABC affiliates he had just purchased, WTVW in Evansville, Indiana, and KTHI-TV (now KVLY-TV) in Fargo, North Dakota. When WATU (channel 26, later WAGT) appeared as the market's third station in late 1968, NBC allowed WRDW-TV and WJBF to keep their secondary NBC affiliations because of WATU's painfully weak signal. This situation mostly shut WATU out of access to network programming, thereby forcing it to go dark in 1970. Channel 12 continued to split NBC with WJBF until WATU resumed broadcasting in 1974 with a primary NBC affiliation. WATU's return forced channel 12 to drop NBC programming for good, per a 1971 FCC order that required VHF stations in markets with three or more commercial outlets to affiliate with only one network. In 1960, the Morrises exited Augusta broadcasting, with channel 12 being sold to what would eventually become Rust Craft Broadcasting. (Channel 12 and 1480 AM continued to share the WRDW call letters until the early 1980s, when the radio station was sold by entertainer and Augusta native James Brown; it later became WCHZ). Magazine publisher Ziff-Davis purchased Rust Craft in 1979. Channel 12 was sold along with then-sister stations WEYI-TV in Saginaw, Michigan, WROC-TV in Rochester, New York, WRCB-TV in Chattanooga, Tennessee, and WTOV-TV in Steubenville, Ohio, to Television Station Partners, a group composed of Ziff Davis's broadcast executives, in 1983. Television Station Partners sold off all of its stations in early January 1996, with WRDW going to Gray Communications Systems (now Gray Television). Ever since CBS began broadcasting the Masters Tournament in 1956, WRDW has been the de facto flagship station of the annual golf tournament played at Augusta National Golf Club. On July 12, 2018, WRDW
https://en.wikipedia.org/wiki/Fox%2023
Fox 23 may refer to one of five television stations in the United States affiliated with the Fox television network: KBSI, licensed to Cape Girardeau, Missouri KOKI-TV, licensed to Tulsa, Oklahoma WHPM-LD, licensed to Hattiesburg, Mississippi WPFO, licensed to Waterville, Maine WXXA-TV, licensed to Albany, New York
https://en.wikipedia.org/wiki/Block-matching%20algorithm
A Block Matching Algorithm is a way of locating matching macroblocks in a sequence of digital video frames for the purposes of motion estimation. The underlying supposition behind motion estimation is that the patterns corresponding to objects and background in a frame of video sequence move within the frame to form corresponding objects on the subsequent frame. This can be used to discover temporal redundancy in the video sequence, increasing the effectiveness of inter-frame video compression by defining the contents of a macroblock by reference to the contents of a known macroblock which is minimally different. A block matching algorithm involves dividing the current frame of a video into macroblocks and comparing each of the macroblocks with a corresponding block and its adjacent neighbors in a nearby frame of the video (sometimes just the previous one). A vector is created that models the movement of a macroblock from one location to another. This movement, calculated for all the macroblocks comprising a frame, constitutes the motion estimated in a frame. The search area for a good macroblock match is decided by the ‘search parameter’, p, where p is the number of pixels on all four sides of the corresponding macro-block in the previous frame. The search parameter is a measure of motion. The larger the value of p, larger is the potential motion and the possibility for finding a good match. A full search of all potential blocks however is a computationally expensive task. Typical inputs are a macroblock of size 16 pixels and a search area of p = 7 pixels. Block-matching and 3D filtering makes use of this approach to solve various image restoration inverse problems such as noise reduction and deblurring in both still images and digital video. Motivation Motion estimation is the process of determining motion vectors that describe the transformation from one 2D image to another; usually from adjacent frames in a video sequence. The motion vectors may relate to the whole image (global motion estimation) or specific parts, such as rectangular blocks, arbitrary shaped patches or even per pixel. The motion vectors may be represented by a translational model or many other models that can approximate the motion of a real video camera, such as rotation and translation in all three dimensions and zoom. Applying the motion vectors to an image to predict the transformation to another image, on account of moving camera or object in the image is called motion compensation. The combination of motion estimation and motion compensation is a key part of video compression as used by MPEG 1, 2 and 4 as well as many other video codecs. Motion estimation based video compression helps in saving bits by sending encoded difference images which have inherently less entropy as opposed to sending a fully coded frame. However, the most computationally expensive and resource extensive operation in the entire compression process is motion estimation. Hence, fast and c
https://en.wikipedia.org/wiki/Toasted%20TV
Toasted TV was an Australian children's television program which aired on Network 10 and later 10 Peach from 22 August 2005 to 18 September 2020. Toasted TV replaced similar children's program Cheez TV in the same timeslot. The series originally aired on Network 10 until 25 February 2012, when it moved to 10 Peach (then known as Eleven). It was originally presented by Pip Russell and Dan Sweetman; the final hosts were Ollie McCormack and Lia Walsh. On 13 July 2020, Network 10 announced that Toasted TV has been axed and that the show would end production in August; the final episode aired on 18 September 2020. Hosts Format The show targeted an audience of 7- to 14-year-olds. The activities of the hosts are interspersed with cartoons and anime, such as Pokémon, Avatar: The Last Airbender, Beyblade: Metal Fusion, SpongeBob SquarePants, Yu-Gi-Oh! GX (Yu-Gi-Oh! Duel Monsters GX), The Penguins of Madagascar, and Bakugan. Premiering on 22 August 2005, it succeeded Cheez TV, and is produced in conjunction with Village Roadshow Theme Parks, the owner of Warner Bros. Movie World, Sea World and Wet'n'Wild Water World. On 13 July 2011 to show changed to filming at Dreamworld. As of 2 July 2012, the show is shot in a studio. Regular segments on Toasted TV included: Letter of the Week, where letters are read and prizes are given out for them. This segment used to show on Saturdays and now shows on a weekday. Facebook Watch, a segment where Ollie and Lia read out a topic they have posted on Facebook and the viewers replies or the posts on their Facebook feed. The Week That Was where every Friday, recaps of the week are shown from Sunday to Thursday. Former segments on Toasted TV included: Appearances by a wide range of guests from sportstars to artists and celebrities. Bike Wheel of Misfortune, where the bike wheel is spun and the hosts have to do one of the many double dares that have been sent in. The Bike Wheel of Misfortune has five categories of double dare: Physical Challenge, Face Off (Kell vs Seamus), On Your Head, Wild Card, and Down Your Pants. The most popular is "Down Your Pants". This segment was showing on Saturdays. Brain Squeeze, the world's dodgiest quiz show, where contestants played for Wahu items. Used to be hosted by Pip and Dan. Bread Board, where viewers send in a question about a situation and the board consisting of at least four kids try to solve the problem. Chuck It In. This is one of the most popular segments on the show. People send in their gross recipes and Kellyn and Palmer mix them in a blender and then have to drink it. This segment was showing on Saturdays. Delson Asprin, portrayed by Palmer who brings in the latest scoop from Hollywood. No longer happening due to him leaving the show. E Toasted, a segment that is a parody of Entertainment Tonight. Game Roadtest where Kellyn and Seamus test out new games that are yet to be released in Australia. Get Active Time, where a countdown timer appears every Wednesday and wh
https://en.wikipedia.org/wiki/Data%20Interchange%20Format
Data Interchange Format (.dif) is a text file format used to import/export single spreadsheets between spreadsheet programs. Applications that still support the DIF format are Collabora Online, Excel, Gnumeric, and LibreOffice Calc. Historical applications that used to support it until they became end of life or no longer acknowledge support of the format are dBase, FileMaker, Framework, Lotus 1-2-3, Multiplan, OpenOffice.org Calc and StarCalc. A limitation with DIF format is that it cannot handle multiple spreadsheets in a single workbook. Due to the similarity in abbreviation and in age (both date to the early 1980s), the DIF spreadsheet format it is often confused with Navy DIF; Navy DIF, however, is an unrelated "document interchange format" for word processors. History DIF was developed by Software Arts, Inc. (the developers of the VisiCalc program) in the early 1980s. The specification was included in many copies of VisiCalc, and published in Byte Magazine. Bob Frankston developed the format, with input from others, including Mitch Kapor, who helped so that it could work with his VisiPlot program. (Kapor later went on to found Lotus and make Lotus 1-2-3 happen.) The specification was copyright 1981. DIF was a registered trademark of Software Arts Products Corp. (a legal name for Software Arts at the time). Syntax DIF stores everything in an ASCII text file to mitigate many cross-platform issues back in the days of its creation. However modern spreadsheet software, e.g. OpenOffice.org Calc and Gnumeric, offer more character encoding to export/import. The file is divided into 2 sections: header and data. Everything in DIF is represented by a 2- or 3-line chunk. Headers get a 3-line chunk; data, 2. Header chunks start with a text identifier that is all caps, only alphabetic characters, and less than 32 letters. The following line must be a pair of numbers, and the third line must be a quoted string. On the other hand, data chunks start with a number pair and the next line is a quoted string or a keyword. Values A value occupies two lines, the first a pair of numbers and the second either a string or a keyword. The first number of the pair indicates type: −1 – directive type, the second number is ignored, the following line is one of these keywords: BOT – beginning of tuple (start of row) EOD – end of data 0 – numeric type, value is the second number, the following line is one of these keywords: V – valid NA – not available ERROR – error TRUE – true boolean value FALSE – false boolean value 1 – string type, the second number is ignored, the following line is the string in double quotes Header chunk A header chunk is composed of an identifier line followed by the two lines of a value. TABLE - a numeric value follows of the version, the disused second line of the value contains a generator comment VECTORS - the number of columns follows as a numeric value TUPLES - the number of rows follows as a numeric value DATA - after a dummy 0 numeric
https://en.wikipedia.org/wiki/Microsoft%20Video%201
Microsoft Video 1 or MS-CRAM is an early lossy video compression and decompression algorithm (codec) that was released with version 1.0 of Microsoft's Video for Windows in November 1992. It is based on MotiVE, a vector quantization codec which Microsoft licensed from Media Vision. In 1993, Media Vision marketed the Pro Movie Spectrum, an ISA board that captured video in both raw and MSV1 formats (the MSV1 processing was done in hardware on the board). Compression algorithm Microsoft Video 1 operates either in an 8-bit palettized color space or in a 15-bit RGB color space. Each frame is split into 4×4 pixel blocks. Each 4×4 pixel block can be coded in one of three modes: skip, 2-color or 8-color. In skip mode, the content from the previous frame is copied to the current frame in a conditional replenishment fashion. In 2-color mode, two colors per 4×4 block are transmitted, and 1 bit per pixel is used to select between the two colors. In 8-color mode, the same scheme applies with 2 colors per 2×2 block. This can be interpreted as a 2-color palette which is locally adapted on either a 4×4 block basis or a 2×2 block basis. Interpreted as vector quantization, vectors with components red, green, and blue are quantized using a forward adaptive codebook with two entries. Use in NetShow Encoder The codec was available in Microsoft NetShow Encoder, which was later renamed Windows Media Encoder, and made available via the SDK. The NetShow encoder allowed the user to select a 2 pass option, where in the first pass the video was analyzed to create a color palette, and in the second pass converted to the palettized color space and encoded. Before encoding, the video could be scaled. Later versions of Windows Media Encoder dropped support for Microsoft Video 1 and only supported Windows Media Video. See also Indexed color Color quantization Block truncation coding, a similar coding technique for grayscale content Color Cell Compression, a similar coding technique for color content, based on block truncation coding Apple Video, a codec based on a similar design QuickTime Graphics, a codec based on a similar design Smacker video, a codec based on a similar design S3 Texture Compression, a texture compression format based on a similar design References External links Microsoft Video 1 - MultimediaWiki Microsoft Video 1 decoder - FFmpeg Microsoft Video 1 encoder - FFmpeg Video codecs Film and video technology Lossy compression algorithms Microsoft proprietary codecs
https://en.wikipedia.org/wiki/Cyberjack
Cyberjack was a Web browser application created by Delrina in 1995. It was sold as a stand-alone product, and was also bundled as part of Delrina's CommSuite 95 offering. In addition to the Web browser application, it also included an ftp client, Usenet newsgroup reader, an IRC client, a graphic interface to gopher services and more. It used a Wizard-based front-end that provided access to all of these services. It was touted as being the first 32-bit based Web browsing program, and was aimed squarely at Windows 95 users. It could transform seamlessly from one application to another as required, a feature that would not be emulated until later browsers of the late 1990s. As an application it had two main drawbacks: its browser application was incapable of rendering tables, which were then becoming predominant in Web site design, and it also lacked an email client. While table support was added more than a year later, by that time it had lost important mindshare. In the end, it could not compete against other browser offerings that were offered for free, such as the contemporaneous Internet Explorer 2, which came out November 1995 and Netscape Navigator. Although marketed by Symantec, the Cyberjack suite was written by a small South African startup, Vironix Software Laboratories. Vironix was owned by Dave and Paula Hall and originally operated from Westville, Durban. During the development of Cyberjack, the majority of the programmers moved to a new office in Muizenberg, a beach town near Cape Town. The entire programming team consisted of only about six developers, roughly one per Internet application. The suite was sold to Delrina, which was later bought by Symantec. However, it came to market at about the time that the Internet Explorer/Netscape Navigator browser war was developing, and the small programming team with limited resources could not keep up with the pace of browser development. After Cyberjack was discontinued by Symantec, Vironix went into liquidation although some of the members of the Cyberjack team went on to develop the WebFerret application. See also Internet Suite List of mergers and acquisitions by Symantec References External links Gopher clients Windows-only proprietary software Windows web browsers Gopher (protocol) 1995 software Discontinued internet suites
https://en.wikipedia.org/wiki/Viewport
A viewport is a polygon viewing region in computer graphics. In computer graphics theory, there are two region-like notions of relevance when rendering some objects to an image. In textbook terminology, the world coordinate window is the area of interest (meaning what the user wants to visualize) in some application-specific coordinates, e.g. miles, centimeters etc. The word window as used here should not be confused with the GUI window, i.e. the notion used in window managers. Rather it is an analogy with how a window limits what one can see outside a room. In contrast, the viewport is an area (typically rectangular) expressed in rendering-device-specific coordinates, e.g. pixels for screen coordinates, in which the objects of interest are going to be rendered. Clipping to the world-coordinates window is usually applied to the objects before they are passed through the window-to-viewport transformation. For a 2D object, the latter transformation is simply a combination of translation and scaling, the latter not necessarily uniform. An analogy of this transformation process based on traditional photography notions is to equate the world-clipping window with the camera settings and the variously sized prints that can be obtained from the resulting film image as possible viewports. Because the physical-device-based coordinates may not be portable from one device to another, a software abstraction layer known as normalized device coordinates is typically introduced for expressing viewports; it appears for example in the Graphical Kernel System (GKS) and later systems inspired from it. In 3D computer graphics it refers to the 2D rectangle used to project the 3D scene to the position of a virtual camera. A viewport is a region of the screen used to display a portion of the total image to be shown. In virtual desktops, the viewport is the visible portion of a 2D area which is larger than the visualization device. When viewing a document in a web browser, the viewport is the region of the browser window which contains the visible portion of the document. If the size of the viewport changes, for example as a result of the user resizing the browser window, then the browser may reflow the document (recalculate the locations and sizes of elements of the document). If the document is larger than the viewport, the user can control the portion of the document which is visible by scrolling in the viewport. See also Image plane Angle of view References External links http://www.tecgraf.puc-rio.br/ftp_pub/lfm/L1J_WindowViewport.pdf https://www.siggraph.org/education/materials/HyperGraph/viewing/view2d/2dview0.htm Computer graphics 3D computer graphics Computer graphics data structures
https://en.wikipedia.org/wiki/CADR
CADR may refer to: CAR and CDR, a programming language construct used in Common Lisp or Scheme CADR, the name of a computing system developed at M.I.T.; see Lisp machine Clean Air Delivery Rate, a rating system developed for portable room air cleaners Continuous Adiabatic Demagnetisation Refrigeration, a multi-stage magnetic refrigeration system Center for Alternative Dispute Resolution, an institution that provides training and accreditation
https://en.wikipedia.org/wiki/Immortal%20Coil
Immortal Coil is a Star Trek: The Next Generation novel written by Jeffrey Lang, published by Pocket Books in February 2002. The novel focuses on the character Data, investigating an incident at Starfleet. The novel takes place in the 24th century of the Star Trek Universe. Story When a newly developed android developed by Starfleet is destroyed, Lieutenant Commander Data helps investigate the incident and who is responsible. During the course of his search he discovers he is not as unique as he once believed. During the run of the original Star Trek series many other robots and androids were seen, yet Data is often referred to as the only android in existence during the time of Star Trek: The Next Generation. Immortal Coil explains what happened to those other robots and androids, and how Data fits into their histories. The story references several previously-seen artificial intelligences and characters: Exocomps from the TNG episode "The Quality of Life" Androids from the TOS episode "What Are Little Girls Made Of?" The M5 computer from the TOS episode "The Ultimate Computer" Flint and Reyna from the TOS episode "Requiem for Methuselah" Doctor Ira Graves from the TNG episode "The Schizoid Man" Commander Bruce Maddox from the TNG episode "The Measure of a Man" Dr. Noonien Soong, Data's creator, first seen in the TNG episode "Brothers" See also List of Star Trek: The Next Generation novels List of Star Trek novels References External links 2002 American novels Novels based on Star Trek: The Next Generation Pocket Books books
https://en.wikipedia.org/wiki/EmelFM2
emelFM2 is an orthodox file manager which uses the GTK+ 2 widget toolkit for X11 on Unix-like operating systems. The default window layout is two filesystem directories in the left and right panes similar to that found in Norton Commander, a strip down the middle with commonly used commands to operate on files in one or both of these browsing panes, and a log which shows the output of commands at the bottom. This layout is configurable - for example, the panes can be reorganized so that the directory panes are stacked vertically or it can be set to have only one directory pane. The colors, icons, included functions and file descriptor columns are all configurable. emelFM2 ships with the function keys bound to the common commands which keybindings can be customized. emelFM2 can handle archives and mounted filesystems. Every feature, including user-created functions, can be used through the GUI or with keyboard shortcuts. See also Comparison of file managers References External links Official website Project page at Gnomefiles Orthodox file managers Free file managers File managers that use GTK
https://en.wikipedia.org/wiki/Runtime%20verification
Runtime verification is a computing system analysis and execution approach based on extracting information from a running system and using it to detect and possibly react to observed behaviors satisfying or violating certain properties. Some very particular properties, such as datarace and deadlock freedom, are typically desired to be satisfied by all systems and may be best implemented algorithmically. Other properties can be more conveniently captured as formal specifications. Runtime verification specifications are typically expressed in trace predicate formalisms, such as finite state machines, regular expressions, context-free patterns, linear temporal logics, etc., or extensions of these. This allows for a less ad-hoc approach than normal testing. However, any mechanism for monitoring an executing system is considered runtime verification, including verifying against test oracles and reference implementations . When formal requirements specifications are provided, monitors are synthesized from them and infused within the system by means of instrumentation. Runtime verification can be used for many purposes, such as security or safety policy monitoring, debugging, testing, verification, validation, profiling, fault protection, behavior modification (e.g., recovery), etc. Runtime verification avoids the complexity of traditional formal verification techniques, such as model checking and theorem proving, by analyzing only one or a few execution traces and by working directly with the actual system, thus scaling up relatively well and giving more confidence in the results of the analysis (because it avoids the tedious and error-prone step of formally modelling the system), at the expense of less coverage. Moreover, through its reflective capabilities runtime verification can be made an integral part of the target system, monitoring and guiding its execution during deployment. History and context Checking formally or informally specified properties against executing systems or programs is an old topic (notable examples are dynamic typing in software, or fail-safe devices or watchdog timers in hardware), whose precise roots are hard to identify. The terminology runtime verification was formally introduced as the name of a 2001 workshop aimed at addressing problems at the boundary between formal verification and testing. For large code bases, manually writing test cases turns out to be very time consuming. In addition, not all errors can be detected during development. Early contributions to automated verification were made at the NASA Ames Research Center by Klaus Havelund and Grigore Rosu to archive high safety standards in spacecraft, rovers and avionics technology. They proposed a tool to verify specifications in temporal logic and to detect race conditions and deadlocks in Java programs by analyzing single execution paths. Currently, runtime verification techniques are often presented with various alternative names, such as ru
https://en.wikipedia.org/wiki/Penguin%20Software
Penguin Software was a computer software and video game publisher from Geneva, Illinois that produced graphics and application software and games for the Apple II, Macintosh, IBM PC, Commodore 64, Amiga, Atari 8-bit, and Atari ST computers. They produced the graphics programs Graphics Magician and Complete Graphics System, graphic adventure games such as the Transylvania series, arcade-style games like Spy's Demise, and role-playing video games such as Xyphus. History The company was founded in 1978 by Mark Pelczarski as "MP Software" with its first product, a graphics program called Magic Paintbrush. It evolved to "Co-op Software" as part of a sister company, Micro Co-op, then adopted the name "Penguin Software" in 1981 when software publishing became the primary focus. Like many other home computer publishers at the time, Penguin Software openly credited the developers of their games on boxes and title screens; developers that were often not direct employees of Penguin Software but rather independent designers that were paid royalties by Penguin Software for the games that sold. Penguin Software's core products were its graphics programs that were among the industry best-sellers of the early 1980s. The Complete Graphics System, first published in 1981, was a set of drawing and 3D graphics editing programs for the Apple II by founder Mark Pelczarski. Special Effects, co-written by Pelczarski and David Lubar later the same year, helped establish the company's slogan, "the graphics people". In early 1982, Pelczarski, Lubar, and Chris Jochumson created The Graphics Magician, which would define the next several years of the company's evolution. Graphics Magician was aimed toward developers or anyone wanting to be a developer, allowing any programmer to create animations for arcade-style games and compact graphic images for adventure games and educational software. Developers began submitting their own creations written in part with Graphics Magician to Penguin Software for publication. Those that were accepted were polished and published and the authors were paid royalties on sales. These included the first two games published by Penguin Software, the animated game Pie Man by Eagle Berns and Michael Kosaka, and the adventure game Transylvania written by Antonia Antiochia. Many other publishers of software for the Apple II also licensed The Graphics Magician for their products, as there was no fee for the license; the only requirement was a credit line that Graphics Magician software was used in the product, which served as advertising for more sales of the Penguin Software graphics tools. One of the other widely touted aspects of Penguin Software's titles was that they deliberately stopped using copy protection, thus making it easier to back up their programs. Pelczarski sent a letter to many computer magazines to describe his position, which asked that users of their software not abuse their trust. As software sales expanded into book stores
https://en.wikipedia.org/wiki/Blum%E2%80%93Goldwasser%20cryptosystem
The Blum–Goldwasser (BG) cryptosystem is an asymmetric key encryption algorithm proposed by Manuel Blum and Shafi Goldwasser in 1984. Blum–Goldwasser is a probabilistic, semantically secure cryptosystem with a constant-size ciphertext expansion. The encryption algorithm implements an XOR-based stream cipher using the Blum-Blum-Shub (BBS) pseudo-random number generator to generate the keystream. Decryption is accomplished by manipulating the final state of the BBS generator using the private key, in order to find the initial seed and reconstruct the keystream. The BG cryptosystem is semantically secure based on the assumed intractability of integer factorization; specifically, factoring a composite value where are large primes. BG has multiple advantages over earlier probabilistic encryption schemes such as the Goldwasser–Micali cryptosystem. First, its semantic security reduces solely to integer factorization, without requiring any additional assumptions (e.g., hardness of the quadratic residuosity problem or the RSA problem). Secondly, BG is efficient in terms of storage, inducing a constant-size ciphertext expansion regardless of message length. BG is also relatively efficient in terms of computation, and fares well even in comparison with cryptosystems such as RSA (depending on message length and exponent choices). However, BG is highly vulnerable to adaptive chosen ciphertext attacks (see below). Because encryption is performed using a probabilistic algorithm, a given plaintext may produce very different ciphertexts each time it is encrypted. This has significant advantages, as it prevents an adversary from recognizing intercepted messages by comparing them to a dictionary of known ciphertexts. Operation The Blum–Goldwasser cryptosystem consists of three algorithms: a probabilistic key generation algorithm which produces a public and a private key, a probabilistic encryption algorithm, and a deterministic decryption algorithm. Key generation The public and private keys are generated as follows: Choose two large distinct prime numbers and such that and . Compute . Then is the public key and the pair is the private key. Encryption A message is encrypted with the public key as follows: Compute the block size in bits, . Convert to a sequence of blocks , where each block is bits in length. Select a random integer . Compute . For from 1 to Compute . Compute the least significant bits of . Compute . Finally, compute . The encryption of the message is then all the values plus the final value: . Decryption An encrypted message can be decrypted with the private key as follows: Compute . Compute . Compute . Compute . Using the Extended Euclidean Algorithm, compute and such that . Compute . This will be the same value which was used in encryption (see proof below). can then used to compute the same sequence of values as were used in encryption to decrypt the message, as follows. For from 1 to C
https://en.wikipedia.org/wiki/Magna%20Carta%3A%20Tears%20of%20Blood
MagnaCarta: Tears of Blood , also known as MagnaCarta: Crimson Stigmata is a role-playing video game developed by Softmax and originally released for the PlayStation 2 in South Korea by Sony Computer Entertainment as MagnaCarta: Crimson Stigmata (마그나카르타: 진홍의 성흔, Mageuna Kaleuta: Jinhong-ui Seongheun) and in Japan as simply (a title later used in the PAL version) by Banpresto in 2004. It is the second installment of the Magna Carta series and a sequel to the 2001 game Magna Carta: The Phantom of Avalanche. The game was later released as MagnaCarta: Tears of Blood in the United States. A PlayStation Portable version was released in May 2006 as . A high definition remaster of the PlayStation 2 game along with the first game called MagnaCarta Origins is now development. A remastered version features multi audio including Japanese dub, Korean dub and new English Dub. Gameplay The game's battle elements borrowed from Shadow Hearts and the Star Ocean series. Up to three characters may move around the battlefield in real time. The player can only control one character at a time and can only attack after the character fills its "leadership meter" by remaining still. Once filled, the character can initiate an attack by performing a series of three timed button presses (known as the "trinity ring"). If the attack is unsuccessful, the leadership meter empties, and the player must wait for it to refill again. The three modes of combat that are uniquely embedded are "standard", "combo" and "counter". The standard mode is excellent for offensive and defensive attacks. By perfecting the timing of the buttons, characters will learn stronger attacks. Combo attacks lack defense but are generally used to create powerful offensive attacks by combining all attacks in one turn. The counter mode does what its name implies; not only is the user able to block, but also attack by predicting their enemies' attacks. Players using this mode do not exhaust their leadership meter. Characters may attack with various combat "styles" learned in the game, which use different chi (energy) types to increase their utility. There are eight different types of chi present in all areas, but in different exhaustible quantities. Plot The game takes place in the land of Efferia, where a seemingly endless war has raged between the continent's two species: Humans and Yason. Humans and Yason are similar in appearance, but Yason have lighter skin and differently shaped ears. The protagonist of the game, Calintz, is a high-ranking leader of the Tears of Blood, a mercenary squad hired out by the Human Alliance to deal with problems they cannot, or will not, touch. Since the group is not part of the official army, the mercs are disliked by the Alliance soldiers. The core group also consists of Azel, a youthful sword wielder who looks up to Calintz, Eonis, a powerful mage, and Haren, a martial artist. Save for Azel, all group members have a heavy grudge against the Yason for the deaths of frie
https://en.wikipedia.org/wiki/HRL
HRL may refer to: HRL (software), an artificial intelligence program HRL Laboratories, formerly Hughes Research Laboratories, in Malibu, California, United States Harlech railway station, in Wales Hilandar Research Library, at Ohio State University IBM Haifa Research Laboratory, in Haifa, Israel Valley International Airport, serving Harlingen, Texas, United States
https://en.wikipedia.org/wiki/HTC%20Wizard
The HTC Wizard (also known as the HTC Prodigy and the HTC P4300) is an Internet-enabled Windows Mobile Pocket PC smartphone designed by High Tech Computer Corporation of Taiwan. It has a touchscreen with a left-side slide-out QWERTY keyboard. The Wizard's functions include those of a camera phone and a portable media player in addition to text messaging and multimedia messaging. It also offers Internet services including e-mail, instant messaging, web browsing, and local Wi-Fi connectivity. It is a quad-band GSM phone with GPRS and EDGE. There are variants which differ in the design of the case, the keyboard and the presence of an on-board camera. On AT&T/Cingular, the Wizard was superseded by the HTC TyTN, known as the AT&T/Cingular 8525. On T-Mobile USA, the Wizard was superseded by the HTC P4350, known as the T-Mobile Wing. Versions Besides the branding differences, there are several models of the HTC Wizard. The Wizard 100 model has a squared design with square keys. The Wizard 110 model is physically similar to the 100 model, and contains the same technical features, with the exception of a camera. The Wizard 200 model is the most common model, and has a rounded design with rounded keys. The Wizard model was sold as: HTC Wizard 100 Cingular 8100 (US) HTC Wizard 110 Cingular 8125 (US) Dopod 838 (Asia) HTC P4300 Qtek A9100 (Latin America) Vodafone VPA Compact II HTC Wizard 200 i-mate K-Jam (Middle East) O2 Xda Mini Pro O2 Xda Mini S (Europe) Orange (brand) SPV M3000 (Europe) Qtek 9100 (Europe) T-Mobile MDA (US) T-Mobile MDA Vario (Europe) ROM updates Official ROM updates are or were available for several versions of the Wizard, including the Cingular 8125 (AKU 2.2.0), the Dopod 838, the i-mate K-Jam (AKU 2.0.0), the O2 XDA Mini S (AKU 2.0.0), the Qtek 9100 (AKU 2.0.0), the T-Mobile MDA US (AKU 2.3.0), and the T-Mobile MDA Vario. These ROM updates often include a new adaptation kit upgrade which adds features and fixes bugs. Unofficial and unsupported updates to Windows Mobile 6.5 exist. However, a Wizard must be Carrier Identification (CID) unlocked before flashing to one of these ROMs or flashing to another carrier's ROM (for example, flashing a T-Mobile MDA with a ROM for the Cingular 8125). There are two models of the Wizard: G3 and G4. The procedures for CID and SIM unlocking each model are different. Following the wrong procedure or attempting to flash a Wizard that has not been CID unlocked could result in a permanently inoperable phone. Specifications Screen size: Screen resolution: 240×320 pixels at 143 ppi, with 4:3 aspect ratio Screen colors: 65,536 (16-bit) Input devices: Touchscreen interface and slide-out QWERTY keyboard Battery: 1250 mAh, user-accessible Battery has up to 5 hours of talk and up to 200 hours of standby. 1.3 megapixel camera with fixed lens, LED flash, and self-portrait mirror Location finding by detection of cell towers and Wi-Fi networks (through Google Maps Mobile) TI OMAP 850 (195 MHz ARM 926EJ-S process
https://en.wikipedia.org/wiki/Super%20I/O
Super I/O is a class of I/O controller integrated circuits that began to be used on personal computer motherboards in the late 1980s, originally as add-in cards, later embedded on the motherboards. A super I/O chip combines interfaces for a variety of low-bandwidth devices. Now it is mostly merged with EC. The functions below are usually provided by the super I/O if they are on the motherboard: A floppy-disk controller An IEEE 1284-compatible parallel port (commonly used for printers) One or more 16C550-compatible serial port UARTs Keyboard controller for PS/2 keyboard and/or mouse Most Super I/O chips include some additional low-speed devices, such as: Temperature, voltage, and fan speed interface Thermal Zone Chassis intrusion detection Mainboard power management LED management PWM fan speed control An IrDA Port controller A game port (not provided by recent super I/O chips anymore because Windows XP is the last Windows OS to support a game port unless the vendor has a custom driver in the future OS) A watchdog timer A consumer IR receiver A MIDI port Some GPIO pins Legacy Plug and Play or ACPI support for the included devices By combining many functions in a single chip, the number of parts needed on a motherboard is reduced, thus reducing the cost of production. The original super I/O chips communicated with the central processing unit via the ISA bus. With the evolution away from ISA towards use of the PCI bus, the Super I/O chip was often the biggest remaining reason for continuing inclusion of ISA on the motherboard. Later super I/O chips use the LPC bus instead of ISA for communication with the central processing unit. This normally occurs through an LPC interface on the southbridge chip of the motherboard. Since Intel is replacing the LPC bus with the eSPI bus, super I/O chips that connect to that bus have appeared on the market. Companies that make super I/O controllers include Nuvoton (has incorporated Winbond), , Fintek Inc. ,ENE Tech. (for laptop) and Microchip Technology (has incorporated SMSC™). National Semiconductor (Now Texas Instruments) used to make super I/O controllers but sold that business to Winbond at 2005, which already had a competing super I/O controller business. In 2008, Winbond then spun off its logic businesses to a wholly owned subsidiary, Nuvoton. SMSC made super I/O chips and then got acquired by Microchip Technology. Common models and brief ENE Tech. Many models are used for laptops with built-in keyboard controllers KB3930 KB930QF ITE Inc. T8510E series Microchip Technology (SMSC) Microchip Technology provides Super I/O components with their SCH, MEC and LPC47 series. Here are some examples: SCH3112 SCH3114 SCH3116 SCH3223 Nuvoton Technology (Winbond) NCT6776 See also envsys hw.sensors lm_sensors contains a tool named sensors-detect that can also detect which Super I/O is used on a mainboard SpeedFan Embedded controller (EC) References External links Superi
https://en.wikipedia.org/wiki/Diversity%20index
A diversity index is a quantitative measure that reflects how many different types (such as species) there are in a dataset (a community), and that can simultaneously take into account the phylogenetic relations among the individuals distributed among those types, such as richness, divergence or evenness. These indices are statistical representations of biodiversity in different aspects (richness, evenness, and dominance). Effective number of species or Hill numbers When diversity indices are used in ecology, the types of interest are usually species, but they can also be other categories, such as genera, families, functional types, or haplotypes. The entities of interest are usually individual plants or animals, and the measure of abundance can be, for example, number of individuals, biomass or coverage. In demography, the entities of interest can be people, and the types of interest various demographic groups. In information science, the entities can be characters and the types of the different letters of the alphabet. The most commonly used diversity indices are simple transformations of the effective number of types (also known as 'true diversity'), but each diversity index can also be interpreted in its own right as a measure corresponding to some real phenomenon (but a different one for each diversity index). Many indices only account for categorical diversity between subjects or entities. Such indices, however do not account for the total variation (diversity) that can be held between subjects or entities which occurs only when both categorical and qualitative diversity are calculated. True diversity, or the effective number of types, refers to the number of equally abundant types needed for the average proportional abundance of the types to equal that observed in the dataset of interest (where all types may not be equally abundant). The true diversity in a dataset is calculated by first taking the weighted generalized mean of the proportional abundances of the types in the dataset, and then taking the reciprocal of this. The equation is: The denominator equals the average proportional abundance of the types in the dataset as calculated with the weighted generalized mean with exponent . In the equation, is richness (the total number of types in the dataset), and the proportional abundance of the th type is . The proportional abundances themselves are used as the nominal weights. The numbers are called Hill numbers of order q or effective number of species. When , the above equation is undefined. However, the mathematical limit as approaches 1 is well defined and the corresponding diversity is calculated with the following equation: which is the exponential of the Shannon entropy calculated with natural logarithms (see above). In other domains, this statistic is also known as the perplexity. The general equation of diversity is often written in the form and the term inside the parentheses is called the basic sum. Some popula
https://en.wikipedia.org/wiki/IMG%20%28file%20format%29
IMG, in computing, refers to binary files with the .img filename extension that store raw disk images of floppy disks, hard drives, and optical discs or a bitmap image – .img. Overview The .img filename extension is used by disk image files, which contain raw dumps of a magnetic disk or of an optical disc. Since a raw image consists of a sector-by-sector binary copy of the source medium, the actual format of the file contents will depend on the file system of the disk from which the image was created (such as a version of FAT). Raw disk images of optical media (such as CDs and DVDs) contain a raw image of all the tracks in a disc (which can include audio, data and video tracks). In the case of CD-ROMs and DVDs, these images usually include not only the data from each sector, but the control headers and error correction fields for each sector as well. Since IMG files hold no additional data beyond the disk contents, these files can only be automatically handled by programs that can detect their file systems. For instance, a typical raw disk image of a floppy disk begins with a FAT boot sector, which can be used to identify its file system. Disc images of optical media are usually accompanied by a descriptor file which describes the layout of the disc, and includes information such as track limits which are not stored in the raw image file. Filename extensions and variants The .img file extension was originally used for floppy disk raw disk images only. A similar file extension, .ima, is also used to refer to floppy disk image files by some programs. A variant of IMG, called IMZ, consists of a gzipped version of a raw floppy disk image. These files use the .imz file extension, and are commonly found in compressed images of floppy disks created by WinImage. QEMU uses the .img file extension for raw images of hard drive disks, calling the format simply "raw". CloneCD stores optical disc images in .img files and generates additional CloneCD Control Files (with .ccd extension) for each image to hold the necessary metadata. The CUE/BIN format stores disc images in .bin files, which are functionally equivalent to .img image files, and uses .cue files as descriptor files. Size The file size of a raw disk image is always a multiple of the sector size. For floppy disks and hard drives this size is typically 512 bytes (but other sizes such as 128 and 1024 exist). More precisely, the file size of a raw disk image of a magnetic disk corresponds to: Cylinders × Heads × (Sectors per track) × (Sector size) E.g. for 80 cylinders (tracks) and 2 heads (sides) with 18 sectors per track: 80 × 2 × 18 × 512 = 1,474,560 bytes or 1440 KB For optical discs such as CDs and DVDs, the raw sector size is usually 2,352, making the size of a raw disc image a multiple of this value. Comparison to ISO images ISO images are another type of optical disc image files, which commonly use the .iso file extension, but sometimes use the .img file extension as well. They are simil
https://en.wikipedia.org/wiki/IconBuilder
IconBuilder is a popular plugin for Adobe Photoshop, Adobe Photoshop Elements and Macromedia Fireworks for the editing and creation of computer icons created and used by The Iconfactory. It supports all icon sizes for both Mac OS X and Microsoft Windows. IconBuilder was created when there was no official tool from Apple Computer for making icons in the .icns format introduced by Mac OS 8.5. The Windows version is at version 2.0, lagging far behind the Macintosh version. The Mac OS 9 version is frozen at 3.1. Version 8 adds support for Windows Vista's 256×256 icons. Features Create icons of any size, up to 1,024×1,024 pixels. Supports Mac OS X icon drop state. Export to multiple file formats simultaneously. Import existing icons. File integrity checks. See also Icon editor Favicon References Leslie Ayers (7 June 2007) How to Make Your Own Icon, Mac Life, also appeared in print Mac How-To, Spring 2007, p. 86 Steve Caplin (May 2003) IconBuilder Pro 4.0, MacUser Product Reviews External links IconBuilder website Ko Maruyama (5 Oct 2005) IconBuilder 8 The IconFactory lets you take a closer look at art, Digital Media Online Icon software The Iconfactory Proprietary raster graphics editors Macintosh graphics software MacOS graphics software Windows graphics-related software 2001 software Adobe Photoshop
https://en.wikipedia.org/wiki/Screen%20pop
Screen pop is a call centre term that refers to the feature of a computer telephony integration (CTI) which automatically displays customer information via a window or dialog box on an agent's computer upon answering a customer's call. For inbound calls, the data displayed typically contains call information such as: Caller ID (CID) Automatic number identification (ANI) Dialed Number Identification Service (DNIS) Information entered from an Interactive voice response (IVR) system. Extended information derived from one of the above. For example, the CTI system looking up in a database an order the caller just entered in an IVR, and displaying that order's information to the agent. For outbound calls, the data displayed typically contains information that was sent to the outbound dialer as part of the customer call record. See also Computer telephony integration References Telephone service enhanced features
https://en.wikipedia.org/wiki/Middlesbrough%20railway%20station
Middlesbrough is a railway station on the Durham Coast Line, Esk Valley Line and Tees Valley Line. The station serves the town of Middlesbrough in North Yorkshire, England. It is owned by Network Rail and managed by TransPennine Express. Direct destinations include Darlington, Saltburn, Sunderland, Newcastle, York, and Manchester Airport. There is a direct service to London Kings Cross once per weekday. According to the Office of Rail and Road statistics, Middlesbrough railway station is the fourth busiest in the North East region, with 1,210,906 total entries and exits (2021–22 period). History The first railway line was opened in the area as long ago as December 1830, as an extension of the Stockton and Darlington Railway, to connect with the port of the (then new) town of Middlesbrough. From the opening of the line until 1837, passengers were served by a wooden shed on the route to the riverside coal staithes. The line was extended to the new exchange along Commercial Street in 1837, with a new station being constructed two years later. This new, more substantial station was opened by the S&DR in 1839. In June 1846, a branch line extending eastwards from the Stockton and Darlington Railway towards Redcar was opened by the Middlesbrough and Redcar Railway. Situated on the Redcar branch line on the southern edge of the new town, a new passenger station was designed by John Middleton, which opened on 26 July 1847. As the town expanded rapidly southwards during the second half of the nineteenth century, the station was unable to cope with the increased traffic. Due to the design of the station not lending itself to expansion, it was subsequently demolished in 1874. It was replaced by the current, much larger station, which opened in December 1877. The Commercial Street station, becoming increasingly isolated from the town by the opening of the Redcar branch line, became a goods station, before eventually being demolished. The current station was designed by the North Eastern Railway's chief architect, William Peachey, with an ornate Gothic style frontage. Behind this, an overall roof of elliptical design once existed. Constructed out of wrought iron of lattice design, with glass covering the middle half, and timber (inside) and slate (outside) covering the outer quarters. The two end screens were glazed with timber cladding around the outer edges. The roof was high in relation to its width. The elliptical roof was severely damaged in a German daylight air raid, which took place on the afternoon of 3 August 1942. It was eventually removed in 1954, to be replaced by the current design over the concourse and platforms. A major refurbishment of the station took place during 2017 and 2018, with repairs carried out to the station's roof and stonework, as well as the upgrading of the Wood Street car park. New information screens were also installed as part of the refurbishment. As part of a major upgrade to the station, platform 2 was extended i
https://en.wikipedia.org/wiki/Code%3A%3ABlocks
Code::Blocks is a free, open-source cross-platform IDE that supports multiple compilers including GCC, Clang and Visual C++. It is developed in C++ using wxWidgets as the GUI toolkit. Using a plugin architecture, its capabilities and features are defined by the provided plugins. Currently, Code::Blocks is oriented towards C, C++, and Fortran. It has a custom build system and optional Make support. Code::Blocks is being developed for Windows and Linux and has been ported to FreeBSD, OpenBSD and Solaris. The latest binary provided for macOS version is 13.12 released on 2013/12/26 (compatible with Mac OS X 10.6 and later), but more recent versions can be compiled and MacPorts supplies version 17.12. History After releasing two release candidate versions, 1.0rc1 on July 25, 2005 and 1.0rc2 on October 25, 2005, instead of making a final release, the project developers started adding many new features, with the final release being repeatedly postponed. Instead, there were nightly builds of the latest SVN version made available on a daily basis. The first stable release was on February 28, 2008, with the version number changed to 8.02. The versioning scheme was changed to that of Ubuntu, with the major and minor number representing the year and month of the release. Version 20.03 is the latest stable release; however for the most up-to-date version the user can download the relatively stable nightly build or download the source code from SVN. In April 2020, a critical software vulnerability was found in the Code::Blocks IDE v17.12, identified by CVE-2020-10814. Jennic Limited distributes a version of Code::Blocks customized to work with its microcontrollers. Features Compilers Code::Blocks supports multiple compilers, including GCC, MinGW, Digital Mars, Microsoft Visual C++, Borland C++, LLVM Clang, Watcom, LCC and the Intel C++ compiler. Although the IDE was designed for the C++ language, there is some support for other languages, including Fortran and D. A plug-in system is included to support other programming languages. Code editor The IDE features syntax highlighting and code folding (through its Scintilla editor component), C++ code completion, class browser, a hex editor and many other utilities. Opened files are organized into tabs. The code editor supports font and font size selection and personalized syntax highlighting colours. Debugger The Code::Blocks debugger has full breakpoint support. It also allows the user to debug their program by having access to the local function symbol and argument display, user-defined watches, call stack, disassembly, custom memory dump, thread switching, CPU registers and GNU Debugger Interface. GUI designer As of version 13.12 Code::Blocks comes with a GUI designer called wxSmith. It is a derivative port of wxWidgets version 2.9.4. To make a complete wxWidgets application, the appropriate wxWidgets SDK must be installed. User migration Some of Code::Blocks features are targeted at users migrating
https://en.wikipedia.org/wiki/Shine%20%28charity%29
Shine (a name derived from Spina bifida, Hydrocephalus, Information, Networking and Equality) (formerly known as ASBAH) is a UK registered charity providing information and advice about spina bifida and hydrocephalus to individuals, families and carers. Their services are targeted towards: support to parents before and around the birth of their baby, or diagnosis of the disability support to the child and family on educational matters specialised information and help on health matters helping young people access services to progress towards control of their lives responding to the needs of adults with spina bifida and/or hydrocephalus. They do this by employing a network of advisers throughout England, Wales and Northern Ireland who deliver advice, support and advocacy services. Their staff also include specialist advisers in education, health and continence management. Shine works in partnership with a network of independent affiliated local associations to share information and promote good practice, and to deliver a range of support and specialist services. Advisory committees for medical matters and education are composed of professionals from the relevant fields who offer guidance for ASBAH's services. Shine's work is financed by voluntary donations, trading activities and grants from charitable and corporate trusts. Conductor with spina bifida Jeffrey Tate, CBE, has been their president since 1989. Footballer Danny Mills is a patron. References External links Health and disability rights organisations in the United Kingdom Charities for disabled people based in the United Kingdom
https://en.wikipedia.org/wiki/Yankee%20Global%20Enterprises
Yankee Global Enterprises, LLC, formerly YankeeNets, LLC, is an American limited liability company (LLC) which owns the New York Yankees baseball team, along with a plurality stake in YES Network and a 20% and 10% stake in New York City FC and AC Milan soccer clubs, respectively. It was formed in 1999 and is controlled by the family of George Steinbrenner. Other investors, including Lester Crown, Donald Marron and Jerry Speyer, own minority stakes. The company was originally created as YankeeNets, through a merger between the Yankees and the New Jersey Nets (now known as Brooklyn Nets). History In 1998, the New York Yankees had their most successful season in modern history, winning a combined total of 125 regular season and playoff games, culminating in a World Series championship. The team was in discussions to be sold to Cablevision, who at the time owned the broadcast rights to every Major League Baseball, National Basketball Association (NBA), and National Hockey League (NHL) team in the New York metropolitan area. The proposed deal fell through because the two sides could not come to an agreement that would include George Steinbrenner continuing to run the team and Cablevision's other pro teams, New York Knicks of the NBA and New York Rangers of the NHL, for the new owners. After the proposed sale fell through, the Yankees and New Jersey Nets of the NBA agreed to merge business operations, creating a combined holding company. This was done to increase the negotiating power of both teams for future television contracts and stadium and arena construction deals. The Yankees' local broadcasting rights with Cablevision's MSG Network were expiring at the end of 2000 season and the Nets' deal with Fox Sports New York would end with the 2001–2002 season. Steinbrenner began considering his own regional sports cable channel. Primary Nets owner Lewis Katz was mainly interested in a new arena. The pre-merger owners would continue to control their teams, with a minority interest in the other team. This arrangement was approved by both Major League Baseball and the NBA. Harvey Schiller was hired as chairman and chief executive officer of the company in October 1999. The New Jersey Devils of the NHL was offered for sale to YankeeNets at the end of 1999. With the company and Nets team unable to take on more debt, Katz and Ray Chambers formed Puck Holdings as an affiliate of the company to acquire the Devils for $175 million. Bonds were issued in March 2000 to pay for Steinbrenner's share of the Yankees. With the Yankees' television contract with Cablevision expiring in 2001 and the Nets' contract expiring after the 2001–2002 season, the teams negotiated together with potential cable partners for the next contract. They spoke to Cablevision about remaining on their networks. After an IMG proposed partnership channel, an MSG/Cablevision lawsuit and a termination payment by September 2001, YankeeNets had cleared the way to start its Yankees Entertainment