source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/The%20Journey%20of%20Allen%20Strange
|
The Journey of Allen Strange is an American television series that aired on Nickelodeon's SNICK block of programming for three seasons from November 1997 to April 2000.
Premise
The series follows the story of a young Xelan alien (Arjay Smith) who is stranded on Earth, and meets up with a young girl Robbie Stevenson (Erin J. Dean), her younger brother Josh (Shane Sweet), and their father Ken (Jack Tate). This family eventually adopts him, giving him the name "Allen Strange". He has extraordinary powers, including the ability to turn into his alien form, which allows him to hover. He uses his abilities to bring a mannequin in a sporting goods store to life; this "animated mannequin" poses as his Earth father, Manfred, for events like parent-teacher conferences. He also possesses extremely high intelligence and can read incredibly fast by simply placing his hand on the cover of a book. He also seems to have advanced dexterity and athletic muscle memory, as he once observed a neighborhood basketball game and perfectly duplicated the trajectory of shots when he attempted this himself. He has an affinity for canned cheese, and lives in the family's attic in a strange alien cocoon. Allen's ultimate goal is to return to his homeworld of Xela, but he admits that may be a long time away as he stowed away on an exploratory ship which was studying Earth, which had to flee out of fear of discovery.
Allen said he "chose" to disguise himself as an African-American boy as the first Earth people he spied upon were some African-American men playing basketball, and figured this was a way to acculturate. His naivety on the subject (bringing in plain black posterboards for his Black History Month presentation) sparked a Black History Month episode, featuring him learning information about slavery and the Civil Rights Movement.
In the weeks leading up to the series' premiere, Nickelodeon ran a series of teaser ads which would at first appear to be promos for other shows, or for Nickelodeon in general, when a blue ooze would fill the screen as an announcer said cryptically, "Something strange is coming to SNICK. November 8". It would then clear out and the interrupted promo would conclude as if nothing had happened.
Characters
Main
Allen Strange (Arjay Smith) – A Xelan alien disguised as a human – all he wishes to do is to go back to his planet.
Roberta "Robbie" Stevenson (Erin J. Dean) – A 15-year-old girl who enjoys surfing and helps show Allen how to fit in with humans.
Joshua "Josh" Stevenson (Shane Sweet) – Robbie's 11-year-old younger brother and a science whiz.
Kenneth "Ken" Stevenson (Jack Tate) – an architect and Robbie and Josh's father who is unaware of Allen being an alien.
Recurring
Gail Stevenson (Mary Chris Wall) – a nurse and Robbie and Josh's mother who is separated from their father, but always comes to visit them.
Manfred Strange (Robert Crow) – Originally just a store mannequin, but was brought to life to serve as Allen's Earth father. He ofte
|
https://en.wikipedia.org/wiki/Storage%20service%20provider
|
A Storage service provider (SSP) is any company that provides computer storage space and related management services. SSPs may also offer periodic backup and archiving.
Advantages of managed storage are that more space can be ordered as required. Depending upon your SSP, backups may also be managed.
Faster data access can be ordered as required. Also, maintenance costs may be reduced, particularly for larger organizations who store a large or increasing volumes of data. Another advantage is that best practices are likely to be followed. Disadvantages are that the cost may be prohibitive, for small organizations or individuals who deal with smaller amounts or static volumes of data and that there's less control of data systems.
Types of managed storage
Data owners normally access managed storage via a network (LAN), or through a series of networks (Internet). However, managed storage may be directly attached to a workstation or server, which is not managed by SSP.
Managed Storage generally falls into one of the following categories:
locally managed storage
remotely managed storage
Locally managed storage
Advantages of this type of storage include a high-speed access to data and greater control over data availability. A disadvantage is that additional space is required at a local site to store the data, as well as limitations of the on-site area.
Remotely managed storage
Advantages of this type of storage are that it may be used an off site backup, it offers global access (depending upon configuration) and adding storage will not require additional space at the local site. However, if the network providing connectivity to the remote data is interrupted, there will be data availability issues, unless distributed file systems are in use.
In cloud computing, Storage as a Service (SaaS) involves the provision of off-site storage for data and information. This approach may offer greater reliability, but at a higher cost.
See also
Application service provider
Internet service provider
Image hosting service
Data Processing Providers
Comparison of file hosting services
File hosting service
References
Web hosting
|
https://en.wikipedia.org/wiki/Contiguity
|
Contiguity or contiguous may refer to:
Contiguous data storage, in computer science
Contiguity (probability theory)
Contiguity (psychology)
Contiguous distribution of species, in biogeography
Geographic contiguity of territorial land
Contiguous zone in territorial waters
See also
|
https://en.wikipedia.org/wiki/Cwmbran%20railway%20station
|
Cwmbran railway station () is in the northeast of Cwmbran town centre, within five minutes' walking distance. It is part of the British railway system owned by Network Rail and is managed by Transport for Wales, who operate all trains serving it. It lies on the Welsh Marches Line from Newport to Hereford. The station was opened at this site in 1986 to serve the commuter route to Newport and Cardiff, and shoppers to the town centre.
History
Historically, a number of railway stations served Cwmbran. The first station was opened by the Monmouthshire Railway and Canal Company in July 1852. This closed on 11 March 1880 and a new station was opened on the same day by the Great Western Railway. The station was located on a spur which linked the Monmouthshire Railway with the Pontypool, Caerleon and Newport Railway. This closed to passengers on 30 April 1962 and to goods on 17 May 1965. The first station, which had remained open for goods traffic, also closed on 17 May 1965.
The Monmouthshire Railway line to Blaenavon ran to the west of the town. The section between Pontypool and Blaenavon closed to passengers 30 April 1962, the mineral branches followed on 7 April 1969 and the branch to Talywain on 3 May 1980. The section from Pontypool as far as Oakfield Siding near Cwmbran saw coal traffic until 1980.
New station
The present station was opened by British Rail on 12 May 1986. It is situated around to the south of Lower Pontnewydd railway station which closed to passengers on 9 June 1958 and to goods on 25 January 1965.
Facilities
Refurbished facilities at the station were officially opened by Rhodri Morgan AM on Friday 14 March 2008. This included a larger car park, a new ticket hall, modern sheltered seating areas and new live departure boards like those seen at Newport. The booking office is open six days per week; there is also a self-service ticket machine on offer for use or to collect advance purchase tickets. Automatic announcements and timetable poster boards offer train running information in addition to the CIS displays mentioned. Level access is on offer to each side, though for the southbound platform, this requires a long detour via public roads (the footbridge linking the platforms has steps).
In addition to this, Torfaen County Borough Council have funded a limited Number 4 bus that serves the town centre and suburbs of Cwmbran, which is currently operated by Stagecoach in South Wales.
Service
Services that stop at Cwmbran in both directions are all operated by Transport for Wales and include the hourly service between , Cardiff Central and West Wales and the two hourly service between and . Most Sunday services only run on the former route (there are only two services each way to/from Holyhead).
References
Notes
Sources
External links
Pictures of Cwmbran Station from Railway Photography by 37430
Railway stations in Torfaen
DfT Category E stations
Railway stations opened by British Rail
Railway stations in Great Britain
|
https://en.wikipedia.org/wiki/Furball
|
Furball may refer to:
An alternative term for hairball, an accumulation of hair in the digestive tract of an animal
A large dog fight between groups of fighter aircraft
Furball, a computer game released on the Commodore Amiga
Furrball, a character from the cartoon Tiny Toon Adventures
A term of endearment for a kitten or cat
|
https://en.wikipedia.org/wiki/IBM%20WebFountain
|
WebFountain is an Internet analytical engine implemented by IBM for the study of unstructured data on the World Wide Web. IBM describes WebFountain as:
. . . a set of research technologies that collect, store and analyze massive amounts of unstructured and semi-structured text. It is built on an open, extensible platform that enables the discovery of trends, patterns and relationships from data.
The project represents one of the first comprehensive attempts to catalog and interpret the unstructured data of the Web in a continuous fashion. To this end its supporting researchers at IBM have investigated new systems for the precise retrieval of subsets of the information on the Web, real-time trend analysis, and meta-level analysis of the available information of the Web.
Factiva, an information retrieval company owned by Dow Jones and Reuters, licensed WebFountain in September 2003, and has been building software which utilizes the WebFountain engine to gauge corporate reputation. Factiva reportedly offers yearly subscriptions to the service for $200,000. Factiva has since decided to explore other technologies, and has severed its relationship with WebFountain.
WebFountain is developed at IBM's Almaden research campus in the Bay Area of California.
IBM has developed software, called UIMA for Unstructured Information Management Architecture, that can be used for analysis of unstructured information. It can perhaps help perform trend analysis across documents, determine the theme and gist of documents, allow fuzzy searches on unstructured documents.
References
External links
IBM Almaden Research Center WebFountain overview
WebFountain on John Battelle's Searchblog
Zdnet article "Drinking from the Fire Hydrant"
IBM sets out to make sense of the Web, February 5, 2004
IBM Joins Corporate Monitoring Space with Release of Public Image Monitoring Solution, Search Engine Watch, November 9, 2005
WebFountain
|
https://en.wikipedia.org/wiki/Disk%20pack
|
Disk packs and disk cartridges were early forms of removable media for computer data storage, introduced in the 1960s.
Disk pack
A disk pack is a layered grouping of hard disk platters (circular, rigid discs coated with a magnetic data storage surface). A disk pack is the core component of a hard disk drive. In modern hard disks, the disk pack is permanently sealed inside the drive. In many early hard disks, the disk pack was a removable unit, and would be supplied with a protective canister featuring a lifting handle.
The protective cover consisted of two parts, a plastic shell, with a handle in the center, that enclosed the top and sides of the disks and a separate bottom that completed the sealed package. To remove the disk pack, the drive would be taken off line and allowed to spin down. Its access door could then be opened and an empty shell inserted and twisted to unlock the disk platter from the drive and secure it to the shell. The assembly would then be lifted out and the bottom cover attached. A different disk pack could then be inserted by removing the bottom and placing the disk pack with its shell into the drive. Turning the handle would lock the disk pack in place and free the shell for removal.
The first removable disk pack was invented in 1961 by IBM engineers R. E. Pattison as part of the LCF (Low Cost File) project headed by Jack Harker. The 14-inch (356 mm) diameter disks introduced by IBM became a de facto standard, with many vendors producing disk drives using 14-inch disks in disk packs and cartridges into the 1980s.
Examples of disk drives that employed removable disk packs include the IBM 1311, IBM 2311, and the Digital RP04.
Disk cartridge
An early disk cartridge was a single hard disk platter encased in a protective plastic shell. When the removable cartridge was inserted into the cartridge drive peripheral device, the read/write heads of the drive could access the magnetic data storage surface of the platter through holes in the shell. The disk cartridge was a direct evolution from the disk pack drive, or the early hard drive. As the storage density improved, even a single platter would provide a useful amount of data storage space, with the benefit being easier to handle than a removable disk pack. An example of a cartridge drive is the IBM 2310, used on the IBM 1130. Disk cartridges were made obsolete by floppy disks.
Alignment
Disk drives with exchangeable disk packs or disk cartridges generally required the data heads to be aligned to allow packs formatted on one drive to be read and written on another compatible drive. Alignment required a special alignment pack, an oscilloscope, an alignment tool that moved the read/write heads, and patience. The pattern generated on the scope looks like a row of alternating C and E characters on their backs. Head alignment needed to be performed after head replacement, and in any case on a periodic basis as part of the routine maintenance required by the drives.
The al
|
https://en.wikipedia.org/wiki/Phoning%20home
|
In computing, phoning home is a term often used to refer to the behavior of security systems that report network location, username, or other such data to another computer.
Phoning home may be useful for the proprietor in tracking a missing or stolen computer. In this way, it is frequently performed by mobile computers at corporations. It typically involves a software agent which is difficult to detect or remove. However, phoning home can also be malicious, as in surreptitious communication between end-user applications or hardware and its manufacturers or developers. The traffic may be encrypted to make it difficult or impractical for the end user to determine what data are being transmitted.
The Stuxnet attack on Iran's nuclear facilities was facilitated by phone-home technology as reported by The New York Times.
Legally phoning home
Some uses for the practice are legal in some countries. For example, phoning home could be for access restriction, such as transmitting an authorization key. This was done with the Adobe Creative Suite: Each time one of the programs is opened, it phones home with the serial number. If the serial number is already in use, or a fake, then the program will present the user with the option of entering the correct serial number. If the user refuses, the next time the program loads, it will operate in trial mode until a valid serial number has been entered. However, the method can be thwarted by either disabling the internet connection when starting the program or adding a firewall or Hosts file rule to prevent the program from communicating with the verification server.
Phoning home could also be for marketing purposes, such as the "Sony BMG rootkit", which transmits a hash of the currently playing CD back to Sony, or a digital video recorder (DVR) reporting on viewing habits. High-end computing systems such as mainframes have been able to phone home for many years, to alert the manufacturer of hardware problems with the mainframes or disk storage subsystems (this enables repair or maintenance to be performed quickly and even proactively under the maintenance contract). Similarly, high-volume copy machines have long been equipped with phone-home capabilities, both for billing and for preventative/predictive maintenance purposes.
In research computing, phoning home can track the daily usage of open source academic software. This is used to develop logs for the purposes of justification in grant proposals to support the ongoing funding of such projects.
Aside from malicious activity, phoning home may also be done to track computer assets—especially mobile computers. One of the most well-known software applications that leverage phoning home for tracking is Absolute Software's CompuTrace. This software employs an agent which calls into an Absolute-managed server on regular intervals with information companies or the police can use to locate a missing computer.
More uses
Other than phoning the home (website) of the
|
https://en.wikipedia.org/wiki/Facial%20motion%20capture
|
Facial motion capture is the process of electronically converting the movements of a person's face into a digital database using cameras or laser scanners. This database may then be used to produce computer graphics (CG), computer animation for movies, games, or real-time avatars. Because the motion of CG characters is derived from the movements of real people, it results in a more realistic and nuanced computer character animation than if the animation were created manually.
A facial motion capture database describes the coordinates or relative positions of reference points on the actor's face. The capture may be in two dimensions, in which case the capture process is sometimes called "expression tracking", or in three dimensions. Two-dimensional capture can be achieved using a single camera and capture software. This produces less sophisticated tracking, and is unable to fully capture three-dimensional motions such as head rotation. Three-dimensional capture is accomplished using multi-camera rigs or laser marker system. Such systems are typically far more expensive, complicated, and time-consuming to use. Two predominate technologies exist: marker and marker-less tracking systems.
Facial motion capture is related to body motion capture, but is more challenging due to the higher resolution requirements to detect and track subtle expressions possible from small movements of the eyes and lips. These movements are often less than a few millimeters, requiring even greater resolution and fidelity and different filtering techniques than usually used in full body capture. The additional constraints of the face also allow more opportunities for using models and rules.
Facial expression capture is similar to facial motion capture. It is a process of using visual or mechanical means to manipulate computer generated characters with input from human faces, or to recognize emotions from a user.
History
One of the first papers discussing performance-driven animation was published by Lance Williams in 1990. There, he describes 'a means of acquiring the expressions of realfaces, and applying them to computer-generated faces'.
Technologies
Marker-based
Traditional marker based systems apply up to 350 markers to the actors face and track the marker movement with high resolution cameras. This has been used on movies such as The Polar Express and Beowulf to allow an actor such as Tom Hanks to drive the facial expressions of several different characters. Unfortunately this is relatively cumbersome and makes the actors expressions overly driven once the smoothing and filtering have taken place. Next generation systems such as CaptiveMotion utilize offshoots of the traditional marker based system with higher levels of details.
Active LED Marker technology is currently being used to drive facial animation in real-time to provide user feedback.
Markerless
Markerless technologies use the features of the face such as nostrils, the corners of the lips and eye
|
https://en.wikipedia.org/wiki/Evolved%20antenna
|
In radio communications, an evolved antenna is an antenna designed fully or substantially by an automatic computer design program that uses an evolutionary algorithm that mimics Darwinian evolution. This procedure has been used since the early 2000s to design antennas for mission-critical applications involving stringent, conflicting, or unusual design requirements, such as unusual radiation patterns, for which none of the many existing antenna types are adequate.
Process
The computer program starts with simple antenna shapes, then adds or modifies elements in a semirandom manner to create a number of new candidate antenna shapes. These are then evaluated to determine how well they fulfill the design requirements, and a numerical score is computed for each. Then, in a step similar to natural selection, a portion of the candidate antennas with the worst scores are discarded, leaving a smaller population of the highest-scoring designs. Using these antennas, the computer repeats the procedure, generating a successive population (using operators such as mutation, crossover, and selection) from which the higher-scoring designs are selected. After a number of iterations, the population of antennas is evaluated and the highest-scoring design is chosen. The resulting antenna often outperforms the best manual designs, because it has a complicated asymmetric shape that could not have been found with traditional manual design methods.
The first evolved antenna designs appeared in the mid-1990s from the work of Michielssen, Altshuler, Linden, Haupt, and Rahmat-Samii. Most practitioners use the genetic algorithm technique or some variant thereof to evolve antenna designs.
An example of an evolved antenna is an X-band antenna evolved for a 2006 NASA mission called Space Technology 5 (ST5). The mission's objective was to demonstrate innovative technologies of potential use in future space missions. Each satellite had two communication antennas to talk to ground stations - an evolved antenna with unusual structure, and a more standard, quadrifilar helix antenna. The former was evolved to meet a challenging set of mission requirements, notably the combination of wide beamwidth for a circularly polarized wave and wide impedance bandwidth to cover the up and down link frequencies at X-band. Both antennas were fabricated by the Physical Science Laboratory at New Mexico State University. Their external appearance was essentially identical in that a foam radome covered the radiating elements. The ST5 mission successfully launched on March 22, 2006 and operated for the mission period before being decommissioned by NASA, and so this evolved antenna represents the world's first artificially-evolved object to fly in space. Other evolved antennas were subsequently used on the Lunar Atmosphere and Dust Environment Explorer spacecraft.
References
External links
at NASA Ames Research Center
A paper given by Lohn, Hornby, and Linden at the Genetic Programming Theory
|
https://en.wikipedia.org/wiki/DZRJ-DTV
|
DZRJ-DTV (channel 29) is an independent digital-only television station based in Makati City, Metro Manila, Philippines. The station is the flagship TV property of Rajah Broadcasting Network, Inc., a broadcast company owned by long-time guitarist/musician Ramon "RJ" Jacinto. The station's broadcast facilities, shared with its AM and FM radio sisters, are located at the Ventures I Bldg., Makati Ave. cor. Gen. Luna St., Makati; DZRJ-DTV's transmitter facility is located at Merano Street, Brgy. San Roque, Antipolo City, Rizal Province.
DZRJ-DTV began in 1993 as DZRJ-TV which operated on UHF Channel 29 using the analog NTSC-M system from 1993 to 2018.
Background
First years (1993–2008)
Ramon "RJ" Jacinto's TV property began its test broadcast in April 1993 through UHF TV channel 29 using the Analog NTSC-M system. The station then launched a month later as RJTV (Ramon Jacinto TeleVision), an independent television channel focusing on music oriented shows, local news, talk shows, and the very first local Home TV Shopping program.
On July 3, 1995, RJTV went into niche programming and timeless television series, shopping and animation programs for children. At the time, the target market was kids during the day, and baby boomers at night. RJTV became the strongest UHF TV station in the Philippines, broadcasting with the maximum effective radiated power of 700 kW. In 1997, due to the emergence of UHF competitors such as Studio 23, Citynet 27 and CTV-31, RJTV went from traditional TV programming to specialized programs such as direct response companies and religious sectors. RJTV recognized the advent of specialized television – niche markets that identify specific needs of certain sectors.
In 2003, RJTV experimented with its new programming approach, as it simulcasted its sister FM station RJ 100, which started its new trend called the 'TeleRadyo' concept through RJ's own program RJ Online (now known as RJ Sunday Jam; though it remains to air up to this day). It also became one of the channels who tried to conceptualize its interactive television approach, as it became a text-oriented interactive channel, first airing music videos, combined with the power of SMS messaging. Eventually, it aired programs simulcasted over RBN's radio station DZRJ AM during mornings, shopping programs during afternoons (at that time when RJTV signed-off during afternoons on free TV) and live entertainment programming during primetime, thus, the station adopted its slogan "Interactive TV Station". RJTV also aired programs, which aimed to direct its market approach at consumers; thus, its slogan was "Consumer Television."
Affiliation with Solar Entertainment (2008–2018)
On January 1, 2008, Solar Entertainment Corporation approached RJTV to blocktime one of the former's television channels to the latter. Months prior to the deal, SkyCable stated that they would offer less "redundant" programming and feature more series that had never been aired in the country before, but r
|
https://en.wikipedia.org/wiki/GNOME%20Keyring
|
GNOME Keyring is a software application designed to store security credentials such as usernames, passwords, and keys, together with a small amount of relevant metadata. The sensitive data is encrypted and stored in a keyring file in the user's home directory. The default keyring uses the login password for encryption, so users don't need to remember another password.
As of 2009, GNOME Keyring was part of the desktop environment in the operating system OpenSolaris.
GNOME Keyring is implemented as a daemon and uses the process name gnome-keyring-daemon. Applications can store and request passwords by using the
libsecret library which replaces the deprecated libgnome-keyring library.
GNOME Keyring is part of the GNOME desktop. As of 2006, it integrated with NetworkManager to store WEP passwords. GNOME Web and the email client Geary uses GNOME Keyring to store passwords.
In 2009, a statistical study of software packages in the Red Hat Linux distribution found that packages depending upon GNOME Keyring (and therefore integrated somewhat with the GNOME desktop environment) were less likely to be associated with software vulnerabilities than those with a dependency upon kdelibs (and therefore integrated somewhat with the KDE desktop environment).
On systems where GNOME Keyring is present, software written in Vala can use it to store and retrieve passwords. The GNOME Keyring Manager (gnome-keyring-manager) was the first user interface for the GNOME Keyring. As of GNOME 2.22, it is deprecated and replaced entirely with Seahorse.
See also
KWallet, the KDE equivalent
Apple Keychain
NetworkManager
Seahorse (software)
Linux on the desktop
List of password managers
Password manager
Cryptography
References
External links
Free password managers
Free software programmed in C
GNOME
|
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20489
|
This Viking Age runestone, listed under Rundata as runic inscription U 489, was originally located in Morby, Uppland, Sweden, and is a memorial to a woman.
Description
This runestone was shipped together with two other runestones, runic inscriptions U 896 and U 1011, to the Exposition Universelle in Paris in 1867. Today it is located at Uppsala University at the Universitetsparken (University Park).
The reference to bridge-building in the runic text is fairly common in rune stones during this time period. Some are Christian references related to passing the bridge into the afterlife. At this time, the Catholic Church sponsored the building of roads and bridges through the use of indulgences in return for intercession for the soul. There are over one hundred examples of bridge runestones that have been dated from the eleventh century, including inscriptions Sö 101 in Ramsund, Sö 328 in Tynäs, U 617 in Bro, U 861 in Norsta, and U 993 in Brunnby. On this runestone, the Christian message is reinforced by the image of the cross within the serpent text band.
It is unusual for a memorial runestone to be dedicated to a woman, and even more unusual for a memorial to a woman be sponsored by a woman. A survey indicated that less than 1 per cent of all runestones fall into this later category. The husband of Gillaug is not mentioned in the inscription as a sponsor of the stone. This could be because Ulfr was dead at the time of the carving of this memorial for his wife.
This runestone is signed by the runemaster Öpir, who was active in the late 11th and early 12th centuries. It is classified as being carved in runestone style Pr4, also known as late Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks.
Transliteration
A transliteration of the runic text is:
khulu ' lit ' kira ' bro fr ant ' kilaua ' totur ' sin ' uk sum ' ati ' ulfr ' ybiʀ risti
See also
List of runestones
References
Runestones raised in memory of women
Uppland Runic Inscription 0489
11th-century inscriptions
12th-century inscriptions
|
https://en.wikipedia.org/wiki/NCIX
|
NCIX (formerly known as Netlink Computer Inc) was an online computer hardware and software retailer based in Richmond, British Columbia, Canada, founded in 1996 by Steve Wu (伍啟儀).
Outlets
It had retail outlets in Vancouver, Burnaby, Coquitlam, Richmond and Langley, British Columbia, as well as Markham, Mississauga, Scarborough, Toronto and Ottawa, Ontario. At one point, NCIX had 3 shipping facilities, one in Richmond, British Columbia, another in Markham, Ontario, and one in City of Industry, California. By July 17, 2017, NCIX had closed the Mississauga, Toronto, and Ottawa retail locations. NCIX declared bankruptcy with the Supreme Court of British Columbia on December 1, 2017, and stopped processing orders.
Demise
As one of the few surviving PC retail chains in Canada, the company "invested heavily in large walk-in retail outlets… all of which were expensive to run", rather than further online sales assets to compete more effectively against Amazon and Newegg. Furthermore, the company prioritized "sales of individual computer parts over complete systems" at a time when consumers and "millennial gamers with relatively high disposable incomes" opted for built systems from trusted brands while "the number of hobbyists who want to build their own hardware is dwindling".
In July 2017, NCIX closed all their Ontario retail outlets in Ottawa, Mississauga, and Toronto and shortly after its Markham headquarters office.
In November 2017, NCIX closed its Vancouver, Burnaby, and Coquitlam stores. Canada Computers then announced they had taken over the leases on these locations.
On November 30, 2017, the last retail store located in Lansdowne Mall, Richmond closed, with only their headquarters in Richmond left.
On December 1, 2017, NCIX filed for bankruptcy with the Supreme Court of British Columbia, under File Number 170816.
Server data breach
On August 1, 2018, a Craigslist ad listed as “NCIX Database Servers - $8500 (Richmond BC)” was found by Travis Doering of Privacy Fly, indicating unerased servers and data from NCIX operations were available for sale containing user data dating back 15 years. Employee data, including social insurance numbers, was also leaked. Doering stated that in one database alone there were 3.8 million Canadians information. The data was obtained from an abandoned warehouse where NCIX stored servers before their bankruptcy after the servers were sold to make up for the $150,000 rent fees owed to the owner of the warehouse. This prompted an investigation by the RCMP and Office of the Information and Privacy Commissioner of British Columbia, and the police seized the servers. Despite this, the data on the servers had been copied and sold multiple times before the servers were seized. Software engineer Kipling Warner since sued NCIX and their auctioneer for failing to properly protect the information.
See also
Linus Sebastian, who first appeared as a regular presenter for NCIX
References
External links
NCIX.ca (Cana
|
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20755
|
U 755 is the Rundata designation for a Viking Age memorial runestone located in Kälsta, Uppland, Sweden.
Description
This runestone was first documented by Richard Dybeck, who is known as the author of the lyrics to the Swedish national anthem, in 1860: "The runestone stands between Litslena and Herkeberga Church, so close to the edge of the road by Kalstad - part of the lower inscription has been damaged."
The cross on the stone indicates that Ágautr was a Christian. The name Ágautr does not appear in any other material (either other rune inscriptions or middle age sources). Lidhsmadhr is also an unusual name, there is however a mention on another runestone in nearby Simtuna with this name, on inscription U 1160, which possibly could reference the same person.
The place name Kelsstaðir in the runic text, sometimes read as Kal-taþum, refers to the modern hamlet of Kälsta.
Inscription
A transliteration of the runic inscription is:
+ lis(m)[a]--... auk + tuki + rastu × stain + (þ)i(n)a + aftir + akaut + bu(k)i + i + k[a](l)[staþ](u)m
References
Uppland Runic Inscription 0755
|
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20933
|
Uppland Runic Inscription 933 or U 933 is the Rundata catalog number for a granite Viking Age memorial runestone located at the Uppsala Cathedral, which is in the center of Uppsala, Sweden.
Description
This runestone, which is 1.95 meters in height, consists of runic text in the younger futhark carved on an intertwined serpent. It was discovered in 1866 located within the foundation walls of the Uppsala Cathedral. Many runestones were used in the construction of buildings, roads, and bridges before their historical importance was understood. The inscription consists of runic text within a serpent band that circles other intertwined serpents. The inscription is attributed to the runemaster Öpir and is classified as being carved in runestone style Pr5, which is also known as Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks.
Transliteration of runic text into Latin letters
borha lit ' raisa ' stain ' iftiʀ ' stynbiar... ... ...orkil lit ' iftiʀ ' broþur ' sin
References
External links
Photograph of runestone in 1986 - Swedish National Heritage Board
Uppland Runic Inscription 0933
|
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20932
|
U 932 is the Rundata designation for a Viking Age runestone that was carved by the runemaster Åsmund and is located in Uppsala, Sweden.
Description
The runestone was first depicted in 1643, then under the Uppsala Cathedral foundation wall. Before the historic nature of runestones was understood, it was common practice to use them as building material in the construction of buildings, roads, and bridges. During the 1850s, the stone was removed from the wall of the cathedral.
This runestone is inscribed on three sides, two of which contain runes, and the third depicts a Christian cross. A large section of the runic inscription has been destroyed. It is classified as being in runestone style Pr3 or Pr4, also known as the Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animals heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks.
The place name Suðrbý in the runic text, sometimes read as Suþrbý, refers to the modern hamlet of Söderby located in Näs or Danmark parish.
Inscription
A transliteration of the runic inscription is:
§A muli ' u... ...--------... -ita stin þino ' aftiʀ ' suarthþa brur sin osmuntr ' inkialt
§B muli ' auk| |kun(i)... (a)-- ih...-astr ' au- ----... ...- ' þ--h litu rita ' stin þino ' aftiʀ suarthaf-... ...k-| |- suþrbi
References
Uppland Runic Inscription 0932
|
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20934
|
Runic inscription U 934 is the Rundata catalog listing for a Viking Age runestone located in Uppsala, Sweden.
Description
This runestone was excavated from the foundation of Uppsala Cathedral in 1866. Many runestones were reused in the construction of buildings, roads, and bridges before their historical importance was understood. The runic text on this stone, which is 1.58 meters in height, is written upon a serpent that is intertwined with other beasts in the center of the design. The granite stone has sustained damage to sections of its runic text and design. The runestone has been classified as being carved in runestone style Pr4, also known as the Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks.
Inscription
A transliteration of the runic inscription is:
þoriʀ ' auk × ryþikr × auk × karl * þaiʀ + br... ...
References
Uppland Runic Inscription 0934
|
https://en.wikipedia.org/wiki/ADOS
|
ADOS may refer to:
Computer operating systems
Atari DOS, an 8-bit disk operating system used in Atari computers
Arabic MS-DOS, from Microsoft
Advanced DOS, a project name for IBM and Microsoft's OS/2 1.0
Access DOS, assistive software shipped with Microsoft's MS-DOS 6.2x
ADOS (Russian operating system) (or АДОС), ca. 1989
Other uses
Autism Diagnostic Observation Schedule, a diagnostic test
American Descendants of Slavery, a descriptive term and political movement
A Dream of Spring, a forthcoming novel in the A Song of Ice and Fire book series
See also
AOS (disambiguation)
DOS (disambiguation)
|
https://en.wikipedia.org/wiki/KCN
|
KCN may refer to:
The Nubi language of Uganda and Kenya has ISO 639-3 code kcn
Potassium cyanide has chemical formula KCN
Kent Community Network, broadband provider
|
https://en.wikipedia.org/wiki/Network%20Access%20Identifier
|
In computer networking, the Network Access Identifier (NAI) is a standard way of identifying users who request access to a network. The standard syntax is "user@realm". Sample NAIs include (from RFC 4282):
bob
joe@example.com
fred@foo-9.example.com
fred.smith@example.com
fred_smith@example.com
fred$@example.com
fred=?#$&*+-/^smith@example.com
eng.example.net!nancy@example.net
eng%nancy@example.net
@privatecorp.example.net
\(user\)@example.net
alice@xn--tmonesimerkki-bfbb.example.net
Network Access Identifiers were originally defined in RFC 2486, which was superseded by RFC 4282, which has been superseded by RFC 7542. The latter RFC is the current standard for the NAI. NAIs are commonly found as user identifiers in the RADIUS and Diameter network access protocols and the EAP authentication protocol.
The Network Access Identifier (NAI) is the user identity submitted by the client during network access authentication.
It is used mainly for two purposes:
The NAI is used when roaming, to identify the user.
To assist in the routing of the authentication request to the user's authentication server.
See also
Diameter
EAP
RADIUS
Request for Comments
External links
Internet Standards
|
https://en.wikipedia.org/wiki/Abergavenny%20railway%20station
|
Abergavenny railway station () is situated south-east of the town centre of Abergavenny, Wales. It is part of the British railway system owned by Network Rail and is operated by Transport for Wales. It lies on the Welsh Marches Line between Newport and Hereford.
Abergavenny lies at the eastern edge of the Brecon Beacons National Park and provides an access point to local services and public transport into the park. The station is Grade II listed and was designed by Charles Liddell, in an Italianate architectural style when he was Chief Engineer of the Newport, Abergavenny and Hereford Railway.
History
The station, designed by Charles Liddell, Chief Engineer of the Newport, Abergavenny and Hereford Railway (NA&HR), is in an Italianate architecture style in a local pink semi-ashlar sandstone with natural slate roofs and stone stacks. The down platform building is stone with a timber-framed front and a natural slate roof. The footbridge comprises cast iron columns of typical GWR design which support the stairways and the two spans. The span over the now removed by-pass freight lines is the wrought iron lattice girder original but the main span over the running tracks was replaced by a steel plate-girder in the late 20th century.
The NA&HR amalgamated with other railways in 1860 to form the West Midland Railway, which itself amalgamated with the Great Western Railway in 1863. The line then passed on to the Western Region of British Railways on nationalisation in 1948. In 1950, the station was renamed Abergavenny Monmouth Road, but reverted to its simple name in 1968. When sectorisation was introduced, the station was served by Regional Railways until the privatisation of British Railways.
Stationmasters
In 1913 the body of station master Thomas Jones was found in the River Usk at Llanellen. He was said to have been suffering from depression but his state of mind was not confirmed as the cause of death at the inquest.
Frederick Corran Barrett 1864 - 1874 (formerly station master at Ledbury, afterwards station master at Bridgnorth)
Joshua John Baugh 1874 - 1884
Fred Angle 1884 - 1896 (afterwards station master at Totnes)
Ernest C. Peglar until 1900 (afterwards station master at Ross)
Thomas Jones 1900 -1913 (formerly station master at Hereford Barton)
Sidney Earle Loveridge 1921 - 1924 (formerly station master at Great Malvern, afterwards station master at Cheltenham)
George Edwin Howell 1928 - 1936 (afterwards station master at Stroud)
James Edward Perkin 1937 - 1939 (formerly station master at Kington)
John Lanman 1946 - 1951 (formerly station master at Blaina, afterwards station master at Merthyr)
Railway town
A branch line to Brynmawr was opened in 1862 starting at Abergavenny Junction station north of the current station, constructed by the Merthyr, Tredegar and Abergavenny Railway (MT&AR). The line also had a station in the town called Abergavenny Brecon Road, making three stations in all. This company was acquired by the London and Nort
|
https://en.wikipedia.org/wiki/Ingress%20cancellation
|
Ingress cancellation is a method for removing narrowband noise from an electromagnetic signal using a digital filter. This type of filter is used on hybrid fiber-coaxial broadband networks.
If a carrier appears in the middle of the upstream data signal, ingress cancellation can remove the interfering carrier without causing packet loss.
Ingress cancellation also removes one or more carriers that are higher in amplitude than the data signal. Ingress cancellation eventually will break if the in-channel ingress gets too high.
References
See also
Distortion
Electromagnetic interference
Ingress filtering
Noise reduction
Digital electronics
|
https://en.wikipedia.org/wiki/Software%20Projects
|
Software Projects was a computer game development company which was started by Manic Miner developer Matthew Smith, Alan Maton and Colin Roach. After leaving Bug-Byte as a freelance developer, Smith was able to take the rights to his recently developed Manic Miner game with him, due to an oversight in his freelance contract. Software Projects was then able to market and publish the ZX Spectrum hit game separately from Bug-Byte. Their logo was a Penrose triangle.
Released games
Anaconda
Astronut
BC's Quest for Tires
Binky
Crazy Balloon
Crypt Capers
Dinky Doo
Dodo Lair
Dragon's Lair
Dragon's Lair Part II - Escape from Singe's Castle
Ewgeebez
Fatty Henry
Galactic Gardener
Harvey Smith Showjumper
Hunchback at the Olympics
Hysteria
Jet Set Willy
Jet Set Willy II
Karls Kavern
Learning with Leeper
Ledgeman
Legion
Loderunner
McKensie
Manic Miner
Nutcraka
Ometron
Orion
Project Graphics Language
Push Off
Run and Plunder
Space Swarm
Space Joust
Star Paws
The Perils of Willy
Thrusta
Tribble Trubble
In 1984 and 1985 they released a number of budget titles at £2.99 on the Software Supersavers label.
References
Defunct video game companies of the United Kingdom
Video game companies established in 1983
|
https://en.wikipedia.org/wiki/User%E2%80%93network%20interface
|
In telecommunications, a user–network interface (UNI) is a demarcation point between the responsibility of the service provider and the responsibility of the subscriber. This is distinct from a network-to-network interface (NNI) that defines a similar interface between provider networks.
Specifications defining a UNI
Metro Ethernet Forum
The Metro Ethernet Forum's Metro Ethernet Network UNI specification defines a bidirectional Ethernet reference point for Ethernet service delivery.
Optical Internetworking Forum
The Optical Internetworking Forum defines a UNI software interface for user systems to request a network connection from an ASON/GMPLS control plane.
See also
Network termination
External links
Metro Ethernet Forum
Network management
|
https://en.wikipedia.org/wiki/Artic%20Computing
|
Artic Computing was a software development company based in Brandesburton, England from 1980 to 1986. The company's first games were for the Sinclair ZX81 home computer, but they expanded and were also responsible for various ZX Spectrum, Commodore 64, BBC Micro, Acorn Electron and Amstrad CPC computer games. The company was set up by Richard Turner and Chris Thornton. Charles Cecil, who later founded Revolution Software, joined the company shortly after it was founded, writing Adventures B through D. Developer Jon Ritman produced a number of ZX81 and Spectrum games for Artic before moving to Ocean Software.
Usually packaging and distributing games themselves, some titles were picked up by Sinclair who repackaged them under the Sinclair brand, and Amstrad who repackaged them under their Amsoft brand.
Adventures A through D were written for the ZX81 but were quickly ported to the ZX Spectrum platform on its release (as well as other systems). By comparison with later Spectrum adventure games such as The Hobbit, they are basic and short. However they are considered by many to be the start of the adventure game genre on the Spectrum in particular and thus were an important step in the growth of adventure games.
Games
Sword of Peace (1980): ZX80, ZX81
Adventure A: Planet of Death (1981): ZX81, ZX Spectrum, C64, Amstrad CPC
Adventure B: Inca Curse (1981): ZX81, ZX Spectrum, C64, Amstrad CPC
Zombies (1981): ZX81
ZX Chess (1981): ZX81
1K ZX Chess (1982): ZX81
Adventure C: Ship of Doom (1982): ZX81, ZX Spectrum, C64, Amstrad CPC
Adventure D: Espionage Island (1982): ZX81, ZX Spectrum, C64, Amstrad CPC
Invaders (1982): ZX Spectrum
Namtir Raiders (1982): ZX81
ZX-Galaxians (1982): ZX81
3D Combat Zone (1983): ZX Spectrum
Adventure E: The Golden Apple (1983): ZX Spectrum
Bear Bovver (1983): ZX Spectrum, C64
Cosmic Debris (1983): ZX Spectrum
Dimension Destructors (1983): ZX Spectrum
Adventure F: The Eye of Bain (1984): ZX Spectrum
Adventure G: Ground Zero (1984): ZX Spectrum
Engineer Humpty (1984): ZX Spectrum, C64
Humpty Dumpty in the Garden (1984): ZX Spectrum, C64
Humpty Dumpty Meets the Fuzzy Wuzzies (1984): ZX Spectrum, C64
Mothership (1984): ZX Spectrum, C64
Mr Wong's Loopy Laundry (1984): ZX Spectrum, C64, Amstrad CPC, MSX
Mutant Monty (1984): ZX Spectrum, C64, Amstrad CPC
World Cup Football (1984): ZX Spectrum, C64, Amstrad CPC (reworked as World Cup Carnival by U.S. Gold in 1986)
Adventure H: Robin Hood (1985): ZX Spectrum (released only as part of the Assemblage compilation)
Aladdin's Cave (1985): ZX Spectrum, Amstrad CPC
International Rugby (1985): ZX Spectrum, Amstrad CPC
Assemblage (1986): ZX Spectrum (compilation, includes four games)
Harry Hare's Lair
Mutant Monty and the Temple of Doom
Curse of the Seven Faces
Robin Hood
Obsidian (1986): Amstrad CPC
Paws (1985): ZX Spectrum, Amstrad CPC
Web War (1985): Acorn Electron, BBC Micro; similar to Tempest
Rugby Manager (1986): ZX Spectrum
The Great Wall (1986): Acorn Electron, BBC Micro; similar to
|
https://en.wikipedia.org/wiki/Landauer%27s%20principle
|
Landauer's principle is a physical principle pertaining to the lower theoretical limit of energy consumption of computation. It holds that an irreversible change in information stored in a computer, such as merging two computational paths, dissipates a minimum amount of heat to its surroundings.
The principle was first proposed by Rolf Landauer in 1961.
Statement
Landauer's principle states that the minimum energy needed to erase one bit of information is proportional to the temperature at which the system is operating. More specifically, the energy needed for this computational task is given by
where is the Boltzmann constant. At room temperature, the Landauer limit represents an energy of approximately . Modern computers use about a billion times as much energy per operation.
History
Rolf Landauer first proposed the principle in 1961 while working at IBM. He justified and stated important limits to an earlier conjecture by John von Neumann. For this reason, it is sometimes referred to as being simply the Landauer bound or Landauer limit.
In 2008 and 2009, researchers showed that Landauer's principle can be derived from the second law of thermodynamics and the entropy change associated with information gain, developing the thermodynamics of quantum and classical feedback-controlled systems.
In 2011, the principle was generalized to show that while information erasure requires an increase in entropy, this increase could theoretically occur at no energy cost. Instead, the cost can be taken in another conserved quantity, such as angular momentum.
In a 2012 article published in Nature, a team of physicists from the École normale supérieure de Lyon, University of Augsburg and the University of Kaiserslautern described that for the first time they have measured the tiny amount of heat released when an individual bit of data is erased.
In 2014, physical experiments tested Landauer's principle and confirmed its predictions.
In 2016, researchers used a laser probe to measure the amount of energy dissipation that resulted when a nanomagnetic bit flipped from off to on. Flipping the bit required 26 millielectronvolts (4.2 zeptojoules).
A 2018 article published in Nature Physics features a Landauer erasure performed at cryogenic temperatures on an array of high-spin (S = 10) quantum molecular magnets. The array is made to act as a spin register where each nanomagnet encodes a single bit of information. The experiment has laid the foundations for the extension of the validity of the Landauer principle to the quantum realm. Owing to the fast dynamics and low "inertia" of the single spins used in the experiment, the researchers also showed how an erasure operation can be carried out at the lowest possible thermodynamic cost—that imposed by the Landauer principle—and at a high speed.
Challenges
The principle is widely accepted as physical law, but in recent years it has been challenged for using circular reasoning and faulty assumptions, notably in
|
https://en.wikipedia.org/wiki/LG%20Uplus
|
LG Uplus Corp. (; stylized as LG U+, ) is a South Korean mobile network operator owned by LG Corporation. It was formerly known as LG Telecom, but changed to its current name on July 1, 2010. LG Uplus is the third-largest wireless carrier in South Korea, with 16.652 million subscribers as of Q4 2020.
The carrier adopted its current name after the July 2010 merger with another two LG telecommunication subsidiaries, Dacom and Powercom.
LG U+ offers a variety of mobile services. GeForce Now distributes by U+ 5G in South Korea, and MusicON was discontinued music service for Feature Phones. Kakaonavi recently partnered with LG U+.
History
After a decision of the state-owned Korea Telecom to sell its cellular business to private investors in 1994, the South Korean government opened the telecommunications sector up to competition. Korea Telecom would later relaunch its cellular business with KT Freetel in 1996. LG entered the wireless communications market in 1996 by acquiring a CDMA license in June and founded a new carrier named LG Telecom, which built a nationwide digital cellular network. In October 1997, PCS cellular service was launched.
In March 1998, in an effort to make itself stand out from the bigger, more established players in the market, LG Telecom launched the world's first commercial cdmaOne data service using PCS technology.
To better position itself to compete in the bundled services market, LG Telecom acquired LG Dacom, a fixed-line communications networks and Internet-related service provider and LG Powercom, one of Korea's largest ISPs. On July 1, 2010, LG Telecom switched to its current name, "LG U+."
Services
Wireless
As of 2012 LG Uplus customers can receive the services on any of radio frequency band assigned, one or more of radio interfaces.
In July 2006, the South Korean government canceled LG Telecom's license for 2.1 GHz W-CDMA bandwidth after the company opted not to develop the technology. LG Telecom will instead continue investing and upgrading in its CDMA2000 EV-DO Rev. A network.
In July 2011, LG U+ launched its LTE network, nationwide coverage is expected to be complete by March 2012.
On July 17, 2013, LG Uplus launched LTE-A service with the introduction of the Galaxy S4 LTE-A, the world's first "100% LTE" smartphone that can utilize data, voice and text with LTE and not fall back to CDMA. Starting from 2014 LG Uplus plans to release only "100% LTE" phones.
Landline
In 2010 LG Telecom acquired Dacom Corp., a network services firm that operated Hanaro Telecom's fixed line networks. The new affiliate helped LG enter the landline communications market.
Broadband
Launched in September 2005, U+Home is an optic LAN service that provides fast speeds of up to 100Mbit/s.
IPTV
U+TV was launched in December 2007, providing various two-way services, terrestrial and HD broadcasting.
Business-to-business sales
After merging LG DACOM in 2010, It was succeeded to LG Uplus one of the largest B2B service area. It is accou
|
https://en.wikipedia.org/wiki/Breakfast%20with%20the%20Beatles
|
Breakfast with the Beatles is a popular programming segment format on FM radio in cities in the United States. The segment format typically features one or more hours of programing consisting exclusively of music by or related to the Beatles. Several nationally syndicated variations exist as well as many locally produced versions. Once a month, a live version of the Los Angeles broadcast with Chris Carter, though still recorded for radio, is hosted during an actual brunch at the Kobe Steakhouse & Lounge in Seal Beach, California. It is also being broadcast live the last Sunday of the each month, from Morongo Casino, Resort and Spa in Cabazon, California.
Program contents include Beatles recordings; solo recordings by former members of the Beatles; cover versions of songs written or performed by the Beatles or the former members thereof; music by close associates of the Beatles, such as Yoko Ono, and the children of members of the band; music by artists that influenced the Beatles; music by musicians who personally knew or played with members of the group; news, features, and interviews related to the Beatles, former members and associates; family members; and interviews with experts on Beatle history and trivia.
History
Disc Jockey Helen Leicht created, hosted and produced an early version of Breakfast with the Beatles on WIOQ in Philadelphia beginning in 1976 and running through 1989; when WIOQ changed formats, Leicht moved the program to station WMGK. Disc jockeys and program directors at other stations picked up the idea and variations on a Beatles-themed programming block appeared throughout the US. The concept proved a good fit for morning programming (particularly on weekends) and so the Breakfast name, or a variant, was often used. The all-Beatles format was further popularized by such nationally syndicated programs as Ticket to Ride, hosted by Scott Muni in the 1980s.
Local productions
Radio stations which feature, or have featured a Breakfast with the Beatles program include: WXRT in Chicago, WMGK in Philadelphia, WGRF in Buffalo, WMXJ in Miami/Ft. Lauderdale, KMET in Los Angeles, KLSX in Los Angeles, KCBS-FM in Los Angeles, KLOS in Los Angeles, KSLX-FM in Phoenix, Arizona, WZLX in Boston, WAXQ Q104.3 in New York, WGRX (now known as WZBA) in Baltimore, WQXA in Harrisburg/York Pennsylvania, WYUU and also WMTX in the Tampa Bay Area, WBIK in Cambridge, Ohio, WTUE in Dayton, Ohio, KQMT in Denver, KZOK in Seattle, WTIX in New Orleans, The Walrus FM in Baja California, Mexico (serving San Diego, California), WZOM FM in Defiance, Ohio, hosted by Bob (Krouse) James and WEXT in Albany, NY. The longest-running version of the show is on WICB in Ithaca, which has been airing weekly since 1980.
Paul McCartney, Ringo Starr, Pete Best, Olivia Harrison and Yoko Ono have all been guests on the version of the show in Los Angeles, which was dropped in 2006 by KLSX-FM, but picked up by 95.5 KLOS in November 2006. Ringo Starr, Pete Best and Spencer Dav
|
https://en.wikipedia.org/wiki/Ant%20Attack
|
Ant Attack is a ZX Spectrum computer game by Sandy White, published by Quicksilva in 1983. It was converted to the Commodore 64 in 1984.
While Zaxxon and Q*bert previously used isometric projection, Ant Attack added an extra degree of freedom (ability to go up and down instead of just north, south, east and west), and it may be the first isometric game for personal computers. The same type of isometric projection was used in Sandy White's later Zombie Zombie. It was also one of the first games to allow players to choose their gender.
Gameplay
The player chooses whether to control the character of "Girl" or "Boy", who then enters the walled city of Antescher to rescue the other, who has been captured and immobilised somewhere in the city.
The city is inhabited by giant ants which chase and attempt to bite the player. The player can defend themselves by throwing grenades at the ants, but these can also harm the humans. Once the hostage is rescued, the two must escape the city. The game then starts again with the hostage located in a different, harder-to-reach part of the city.
Development
Almost all of the game code was written by hand on paper using assembler mnemonics, then manually assembled, with the resulting hexadecimal digits typed sequentially into an external EEPROM emulator device (aka SoftROM or "softie") attached to a host Spectrum. Similarly, the character graphics and other custom sprites were all hand-drawn on squared paper and manually converted to strings of hex data. Additionally, some minor add-on routines such as high score registration were added on to the core game using regular Sinclair BASIC.
The game's setting of "Antescher" is a reference to the artist M. C. Escher.
Reception
Ant Attack was well received by gaming press. The game was nominated in the 1983 Golden Joystick Awards for Best Original Game of the Year, eventually coming second to Ah Diddums. The ZX Spectrum version was rated number 14 in the Your Sinclair'''s Official Top 100 Games of All Time.
In 2009, the staff of Edge'' wrote that it "marked the very beginnings of the survival horror genre".
References
External links
Sandy White's official Ant Attack nostalgia page (includes playable game)
1983 video games
Commodore 64 games
Quicksilva games
Single-player video games
Video games about ants
Video games developed in the United Kingdom
Video games with gender-selectable protagonists
Video games inspired by M. C. Escher
Video games with isometric graphics
ZX Spectrum games
|
https://en.wikipedia.org/wiki/Defence%20Information%20Infrastructure
|
Defence Information Infrastructure (DII) is a secure military network owned by the United Kingdom's Ministry of Defence MOD. It is used by all branches of the armed forces, including the Royal Navy, British Army and Royal Air Force as well as MOD civil servants. It reaches to deployed bases and ships at sea, but not to aircraft in flight.
The partnership developing DII is called the Atlas Consortium and is made up of DXC Technology (formerly EDS), Fujitsu, Airbus Defence and Space (formerly EADS Defence & Security) and CGI (formerly Logica).
Starting in May 2016, MOD users of DII begin to migrate to the New Style of IT within the defence to be known as MODNET; again supported by ATLAS.
Overview
DII supports 2,000 MOD sites with some 150,000 terminals (desktops and laptops) and 300,000 user accounts. It is designed to offer a high level of resilience, flexibility, and security in the provision of connectivity from ‘business space to battlespace’ in MOD offices in the UK, bases overseas, at sea, and on the front line. It aims to rationalise and improve IT provision for the defence sector in the 21st century; involving a major culture change for MOD users and their ways of working through a structure of shared working areas with controlled security and access. It should provide a records management system and search facility together with a range of office services. It hosts several hundred COTS (commercial off-the-shelf) and bespoke MOD applications from a range of suppliers judged to meet the required security standards. The network handles alphanumeric data, graphics, and video. The system carries information from Restricted to above-Secret levels, but users are able to see only the data and applications for which they are authorised.
Incremental approach
In order to de-risk the programme Atlas and the MOD took an incremental approach to the development and implementation of DII, with a separate contract for each increment. The extended timeline allowed the MOD flexibility in defining its requirements.
Increment 1: Contract awarded March 2005. This covered 70,000 user access devices (UADs) and 200,000 user accounts in the Restricted and Secret domains in 680 fixed locations.
Increment 2a: Contract awarded December 2006. This was for an additional 44,000 UADs and 58,000 user accounts in the Restricted and Secret domains, again in fixed locations.
Increment 2b: Contract awarded September 2007: This extended DII(F) into the deployed environment with the provision of UADs to support land and maritime deployed operations.
Increment 2c: Signed in January 2009. This extended the DII footprint into the above-Secret domain to support a number of key operations and intelligence initiatives.
Increment 3a: Contract awarded January 2010. Atlas provided 42,000 UADs operating in the Restricted and Secret domains to the remaining MOD fixed sites. This supported some 60,000 personnel, notably within the RAF, at Joint Helicopter Command and other
|
https://en.wikipedia.org/wiki/Tree%20view
|
A tree view is a graphical widget (graphical control element) within a graphical user interface (GUI) in which users can navigate and interact intuitively with concise, hierarchical data presented as nodes in a tree-like format. It can also be called an outline view.
Appearance
A tree view is usually a vertical list of nodes arranged in a tree-like structure. Each node represents a single data item, displayed as an indented line of text or a rectangular box. The indentation (and sometimes a line drawn between nodes) is used to indicate levels of hierarchy. Every treeview has a root node from which all nodes descend. Below the root node and indented to the right are its child nodes. Each node has exactly one parent node and can have zero or more child nodes. If a node (other than the root node) has a child or children, it is called a branch node. If it has no child, then it is a leaf node. This creates a hierarchical tree-like structure, with branches and subbranches emerging downward and rightwards. The nodes can be differentiated by different colors, icons and fonts to represent the nested relationship between parent nodes and child nodes. An item can be expanded to reveal subitems, if any exist, and collapsed to hide subitems.
Features
Interactivity
Tree view allows users to interact with hierarchical data in a variety of ways, such as :
expanding and collapsing nodes to reveal or to hide their child nodes and thus navigate through the tree structure according to one's needs.
search and filter nodes based on specific criteria such as date.
renaming or deleting using context menus.
copying and moving (dragging and dropping) nodes to other sections of the tree to rearrange them.
opening a node in a separate window.
Customizability
Tree views can be customized for visual appeal and efficiency in the following ways:
Input methods : Tree views can be customized to support various input methods such as mouse, keyboard, and touch input so that users can interact using their preferred method. Users can use their mouse to click on a node to select it, move their mouse to drag and then release the mouse button to drop nodes to rearrange them. They can also use keyboard shortcuts to navigate and interact with the tree.
Look and feel : Developers (and sometimes users) can tailor the look and feel of tree views as well to match specific visual requirements of certain applications. Icons, fonts and colors used to display nodes, animations and effects to represent node expansion and collapse, and custom behaviors for drag and drop actions can be implemented. The context menu options can be customized for an application so that users can only perform specific actions on nodes.
Accessibility : tree views can offer accessibility features for users with disabilities.
Advantages
Tree views offer the following advantages :
They display hierarchical data in a concise and easy-to-follow format, so that users can easily walk through and interact wi
|
https://en.wikipedia.org/wiki/Metakit
|
Metakit is an embedded database library with a small footprint. It fills the gap between flat-file, relational, object-oriented, and tree-structured databases, supporting relational joins, serialization, nested structures, and instant schema evolution. Interfaces for C++ (native), Python and Tcl are the most used.
History
Metakit was written by Jean-Claude Wippler, a software developer from the Netherlands. Its development started around 1997 and in 2001 it released as open source under the MIT X11 license. The author provides commercial support. In the last few years, however, Wippler has spent less time on Metakit and more on his other projects.
The database is used in several commercial products (including Address Book in Mac OS X 10.4 and earlier) and in several open source (for example KDE's feed reader Akregator) and in-house projects (typically using Python or TCL interface). A related project, Starkit (virtual file system for TCL), written by Wippler, reached popularity among TCL programmers.
The mailing-list of Metakit has active subscribers and is regularly posted to by Wippler. Other developers have contributed to the project with bug fixes and suggestions.
Features
Unlike most other database systems which store rows of a database table in one place (row-oriented architecture) Metakit stores individual columns separately (column-oriented architecture). For many years only linear access to the tables was possible (with complexity O(1) for access and O(N) for search), later hash structures and B-tree like structures were added (reducing typical search complexity to O(1)). Relational operations (like group-by and joins) were also added over years. It is possible to combine and process table data via flexible mechanisms called views. The database data are portable among platforms. Disk space overhead of Metakit is very low — several techniques are employed automatically to reduce it as much as possible. Viewer of Metakit database structures (named Kitview) is provided.
Practical limit to database size is around 1GB (even on 64-bit platforms). Multithreaded and multiuser access requires manual support from the programmer and is discouraged (in C++, TCL and Python use one automatically global lock). Combinations of more advanced features are often not tested and may fail. It is possible to obtain somewhat better performance than with other databases (published benchmarks include SQLite and Berkeley DB) but it requires lot of testing and lot of knowledge of Metakit internals. Metakit's API is low level, compared to SQL.
The biggest weakness of Metakit is its rather spotty and sometimes obsolete documentation. Full understanding of its API and performance tuning requires deep study of library's source code. Metakits terminology has many differences to standard database terminology. The API and file format has changed several times over time.
Metakit is tested on Windows, Unix and Mac OS X.
Language bindings
C++ (native): Metakit i
|
https://en.wikipedia.org/wiki/Multidata%20Systems%20International
|
Multidata Systems International is a maker of radiation therapy products based in St. Louis, Missouri. Their major product lines include realtime dosimetry or RTD, which includes 3D water phantoms, Film dosimetry and air scanners. Since 2003, Multidata has been under a Consent Decree of Permanent Injunction entered by the U.S. District Court for the Eastern District of Missouri for the US FDA. The consent decree prohibits the company from designing, manufacturing, processing, and distributing medical devices, among other restrictions.
Products
Multidata Systems was started in 1980 to provide medical physics solutions for radiation oncology. The RTD Real Time Dosimetry product line includes 1D and 3D water phantoms (field analyzers) for measuring the output of a treatment machine as used in radiation therapy. Three-dimensional datasets are required for the commissioning of such treatment machines, for the subsequent modeling of the radiation beam in the treatment planning software and for the calculation of dose to be delivered. A water phantom or field analyzer may also be used for periodical quality assurance measurements on an annual or semi-annual basis.
Other RTD equipment includes software and phantom accessories for a wide variety of quality assurance tasks in clinical radiation therapy, including the verification of treatment plans and tools for the documentation and comparison of delivered and planned dose.
The DSS (decision support system) treatment planning system followed RTP-123 and RTP/2 as one of the most widely used treatment planning systems commercially available. The DSS was widely popular due to its speed and the transparency of its calculation methods. The RTSuite product was designed to integrate plan verification methods with other planning and dosimetry tools in one user interface.
The software-driven MultiCut block mold cutting system is designed for cutting molds for the production of shielding blocks as used in radiation therapy.
History
Founded in 1979 in St. Louis, Missouri by Arne Roestel, the company entered the market with the first computerized water phantom system (a scanner for measuring radiation fields as used in hospitals for radiation therapy) while developing and building computers using the all new multi-tasking microprocessor technology. The company name “Multidata” reflected this focus and its founder’s mission to develop the industry’s first desktop computer for microcomputer-controlled instrumentation.
In 1982, the company introduced the first software-driven scanning system (CDS-III Clinical Dosimetry System, for film and water based scanning), obsoleting the external controller hardware previously required to interface with scanning instrumentation. The company collaborated to make radiation field datasets scanned with the dosimetry system compatible for use with the Memorial Sloan Kettering treatment dose calculation service, a project which later evolved into its first own radiation tr
|
https://en.wikipedia.org/wiki/European%20Geology%20Students%20Network
|
EUGEN - EUropean Geosciences students Network is youth organization based in Germany. Main goal of EUGEN is organizing annual summer camps for students in geo-sciences all across Europe. The EUGEN was created in summer 1995 during the national meeting of German geology students. First summer camp was held in August 1996 in Black Forest in Germany with participation of 120 students from 18 European universities. Since then every August is held EUGEN meeting every time on different location in Europe and last for one whole week. The program schedule usually contains three days reserved for geological fieldtrips, organized by the local hosts (students of geology) in league with their university professors and/or national geological survey. One day is reserved for some sightseeing-trips to interesting local destinations. Talks and presentations from members of participating universities and supporting organizations are also part of the program. The tradition calls for one afternoon dedicated to the famous Geolympix - a team competition in highly entertainable fun-sport games. On every EUGEN meeting the contest for next EUGEN meetings are held. The countries that nominate themselves make presentations and participants vote for the winner. The next EUGEN meeting will be held in Austria.
List of EUGEN meetings
1996: Schwarzwald, Germany
1997: Aveiro, Portugal
1998: Transylvania, Romania
1999: Sicily, Italy
2000: Sierra del Moncayo, Spain
2001: Platelai, Lithuania
2002: Eifel, Germany
2003: Kobarid, Slovenia
2004: Buses, Latvia
2005: Lokve, Croatia
2006: Braganca, Portugal
2007: Cantiano, Italy
2008: Reichenau/Tamins, Switzerland
2009: Someren, Netherlands
2010: Gjiri i Lalzit, Albania
2011: Duburys lake, Lithuania
2012: Harz Mountains, Germany
2013: Calabria, Italy
2014: Komen, Slovenia
2015: Stryszów, Poland
2016: Kinrooi, Belgium
2017: Karlovac, Croatia
2018: Carinthia, Austria
External links
EUGEN e.V.
Geo
International student societies
Student societies in Germany
|
https://en.wikipedia.org/wiki/VMSA
|
VMSA may refer to:
Virgin Mobile South Africa, a mobile virtual network operator
Veritas Volume Manager Storage Administrator, of the Veritas Volume Manager
|
https://en.wikipedia.org/wiki/Call%20super
|
Call super is a code smell or anti-pattern of some object-oriented programming languages. Call super is a design pattern in which a particular class stipulates that in a derived subclass, the user is required to override a method and call back the overridden function itself at a particular point. The overridden method may be intentionally incomplete, and reliant on the overriding method to augment its functionality in a prescribed manner. However, the fact that the language itself may not be able to enforce all conditions prescribed on this call is what makes this an anti-pattern.
Description
In object-oriented programming, users can inherit the properties and behaviour of a superclass in subclasses. A subclass can override methods of its superclass, substituting its own implementation of the method for the superclass's implementation. Sometimes the overriding method will completely replace the corresponding functionality in the superclass, while in other cases the superclass's method must still be called from the overriding method. Therefore, most programming languages require that an overriding method must explicitly call the overridden method on the superclass for it to be executed.
The call super anti-pattern relies on the users of an interface or framework to derive a subclass from a particular class, override a certain method and require the overridden method to call the original method from the overriding method:
This is often required, since the superclass must perform some setup tasks for the class or framework to work correctly, or since the superclass's main task (which is performed by this method) is only augmented by the subclass.
The anti-pattern is the of calling the parent. There are many examples in real code where the method in the subclass may still want the superclass's functionality, usually where it is only augmenting the parent functionality. If it still has to call the parent class even if it is fully replacing the functionality, the anti-pattern is present.
A better approach to solve these issues is instead to use the template method pattern, where the superclass includes a purely abstract method that must be implemented by the subclasses and have the original method call that method:
Language variation
The appearance of this anti-pattern in programs is usually because few programming languages provide a feature to contractually ensure that a super method is called from a derived class. One language that does have this feature, in a quite radical fashion, is BETA. The feature is found in a limited way in for instance Java and C++, where a child class constructor always calls the parent class constructor.
Languages that support before and after methods, such as Common Lisp (specifically the Common Lisp Object System), provide a different way to avoid this anti-pattern. The subclass's programmer can, instead of overriding the superclass's method, supply an additional method which will be executed before or after
|
https://en.wikipedia.org/wiki/Category%204%20cable
|
Category 4 cable (Cat 4) is a cable that consists of eight copper wires arranged in four unshielded twisted pairs (UTP) supporting signals up to 20 MHz. It is used in telephone networks which can transmit voice and data up to 16 Mbit/s.
For a brief period it was used for some Token Ring, 10BASE-T, and 100BASE-T4 networks, but was quickly superseded by Category 5 cable. It is no longer common or used in new installations and is not recognized by the current version of the ANSI/TIA-568 data cabling standards.
References
Ethernet cables
|
https://en.wikipedia.org/wiki/Timbuktu%20%28software%29
|
Timbuktu is a discontinued remote control software product originally developed by WOS Data Systems. Remote control software allows a user to control another computer across the local network or the Internet, viewing its screen and using its keyboard and mouse as though sitting in front of it. Timbuktu is compatible with computers running both Mac OS X and Windows.
Timbuktu was first developed in the late 1980s as a Macintosh product by WOS DataSystems and a version was later developed to run on Microsoft Windows. WOS Data Systems was purchased by Farallon Computing in July 1988. Farallon was renamed Netopia in 1999 and the company was acquired by Motorola in February 2007. Timbuktu's primary function is remote control, and the application has support for various remote-control features such as multiple displays, screen-scaling, remote screen and keyboard lockout, clipboard synchronization and "on the fly" color-depth reduction for enhanced speed.
In addition to the remote control features (screen-sharing), Timbuktu also allows for file transfers, system profiling, voice and text chat, and remote activity notifications. Timbuktu versions 5.1 and earlier initiate connections over UDP port 407, though versions 5.2 and later use TCP port 407. The program has integrated support for Secure Shell (SSH) tunneling for those who require additional security. Both the Mac and Windows versions can use a standalone user database or integrate with the respective platform's "standard" user database (OpenDirectory on the Mac, and Active Directory or NT Users on Windows). The 8.6 version, released in March 2006, added an optional integration with Skype to enable a user to remote-control any of their Skype contacts who have Timbuktu installed. Starting with the 8.6 version, Timbuktu has been released as a Universal Binary supporting both Intel and PowerPC-based Macs. The 8.8 version, released in September 2009, added support for Mac OS X v10.6, although the ability to receive clicks with modifier keys broke with the release of Mac OS X v10.6.3 (March 2010). Version 8.8.2, released November 2010, resolved the Control session mouse-click modifier key issues as well as Exchange connection performance issues. Version 8.8.3, released in 2011, made Timbuktu compatible with Mac OS X Lion. Version 8.8.4, released in 2012, made Timbuktu compatible with Mac OS X Mountain Lion, resolving a screen rendering issue. Version 8.8.5 for Mac, released in October 2013, made Timbuktu compatible with Mac OS X 10.9 "Mavericks".
Timbuktu for Windows v8.x is not compatible with Windows Vista, Windows 7 or Windows Server 2008, and feature-wise it lags well behind the Mac client from the standpoint of acting as a remote client (host-wise, it is identical). Motorola announced in mid-2009 that Timbuktu v9.0 would be released for "early preview" in Q4 2009, featuring full Windows Vista/Windows 7/Windows Server 2008 compatibility for selected customers and v9.0 was released in early 2011
|
https://en.wikipedia.org/wiki/Tea%20from%20an%20Empty%20Cup
|
Tea from an Empty Cup is a 1998 cyberpunk novel by American writer Pat Cadigan.
Plot summary
Tea From an Empty Cup is at its core a tightly plotted detective novel.
The story revolves around near mythical Japan, which has been destroyed in a vaguely described natural cataclysm several decades before the story opens. The generation that remembers "Old Japan" appears to have passed on. A virtual version of Japan has become a sort of Holy Grail for a core group of artificial reality addicts. Artificial Reality, or AR, like "post-apocalyptic Noo Yawk Sitty" has become immensely popular in an increasingly dreary overcrowded world, not just as a game, but as a way of life.
AR is not just a way of life, it turns out, but also of death, as homicide detective Dore Konstantin discovers when she is called upon to investigate the death of a young man in an artificial reality parlour (think video arcade with a full wired body suit) and discovers he died the same way in the game as in reality. She therefore decides to investigate this young man's life within the artificial realities he frequented, even though the legal precedents already established mean that nothing she discovers is admissible as evidence because "Everything is a Lie" in AR. In the process she stumbles onto something far more complicated than a mere murder case.
In Tea from an Empty Cup's interwoven storyline, Yuki, a young ethnically Japanese woman is desperately looking for her boyfriend Tom, whom she fears has taken up with a mysterious and notorious woman named Joy Flower, becoming one of "Joy's Boyz", about whom a lot of nasty rumours circulate.
When Yuki seeks Joy Flower out, she immediately is taken into Joy's inner circle, becoming her personal assistant, which leads her, like Konstantin, into a voyage of discovery towards the central mystery of the book.
1998 American novels
1998 science fiction novels
Cyberpunk novels
Novels set in Japan
Post-apocalyptic novels
Tor Books books
American science fiction novels
Japan in non-Japanese culture
|
https://en.wikipedia.org/wiki/KEMO-TV
|
KEMO-TV (channel 50) is a television station licensed to Fremont, California, United States, serving the San Francisco Bay Area as an affiliate of the Spanish-language network Estrella TV. Owned by HC2 Holdings, the station maintains studios on Christie Avenue in Emeryville. Its transmitter, shared with KMTP-TV, KCNS, and KTNC-TV, is located atop Sutro Tower in San Francisco.
History
The station first went on the air in 1972. Originally licensed to Santa Rosa, it quickly attracted eager young broadcasters who honed their craft and went on to bigger markets. Among the Channel 50 pioneers were Jon Miller, now the longtime play-by-play voice of the San Francisco Giants, and Stan Atkinson, who would become one of the Sacramento area's best-known TV reporters and anchors.
This much anticipated effort to establish a local North Bay TV station in Santa Rosa, led by Atkinson and partner Kit Spier (formerly an executive at KNBC in Los Angeles), was under-financed and lasted only a year. The station was off the air more than it was on, and after the novelty of a new TV station wore off, viewers had little confidence and the station went dark.
Nothing more happened until 1981, when Wishard Brown, who had owned the Marin Independent Journal newspaper and San Rafael radio station KTIM, revived Channel 50 with an eye on making it a local news authority.
The second incarnation of KFTY went live in a former furniture store on Mendocino Avenue in May 1981 with broadcaster Jim Johnson (now an independent insurance and investment broker in Santa Rosa) as general manager.
A news department was formed with Bob Sherwood, formerly of KGO-TV (channel 7), as the station's first News Director and Rod Sherry, then a veteran KPIX anchor, as the weekend anchor and later news producer. Some of the news reporters included Deb Sherwood, Fred Wayne, Karen Clinton, Karen Provenza, Ed Beebout, and Diane Kaufman.
Through the 1980s, the local news operation expanded and became a training ground for more future big-market broadcasters such as Bill Martin, the veteran KTVU (channel 2) meteorologist, Manuel Gallegos, who went to CBS, Fred Wayne, who went to KCBS in San Francisco, and sportscaster Dale Julian, who later went to the San Jose Mercury newspaper.
News 50 adopted the slogan, "We do it twice, every night," upon expanding its weeknight news reports to 7:30 and 10:30 p.m. The "North Bay News" was a very popular look at regional stories that the TV stations in the central San Francisco Bay Area rarely covered; KFTY News also shared video tape of local news stories with other TV stations.
The third incarnation of KFTY took hold in the mid-1990s, when KFTY was sold to the Ackerley Group in 1996 and then to the television arm of Clear Channel Communications (now iHeartMedia) in 2002; that company, after being bought out by private equity firms, announced the sale of KFTY and its other television stations on November 16, 2006. On January 26, 2007, weeks after Clear Channel a
|
https://en.wikipedia.org/wiki/Disk%20cartridge
|
Disk cartridge or Optical disk cartridge may refer to:
A 1960s computer disk pack which has a single hard disk platter encased in a protective plastic shell
Removable disk storage media
Zip disk
A 3-inch Floppy disk
An optical disc or magneto-optical disc enclosed in a protective plastic sheath called a Caddy (hardware)
Ultra Density Optical
Universal Media Disc
Disk enclosure
ROM cartridge
|
https://en.wikipedia.org/wiki/Hesiod%20%28name%20service%29
|
In computing, the Hesiod name service originated in Project Athena (1983–1991). It uses DNS functionality to provide access to databases of information that change infrequently. In Unix environments it often serves to distribute information kept in the , , and files, among others.
Frequently an LDAP server is used to distribute the same kind of information that Hesiod does. However, because Hesiod can leverage existing DNS servers, deploying it to a network is fairly easy.
In a Unix-like system users usually have a line in the file for each local user like:
foo:x:100:10:Foo Bar:/home/foo:/bin/sh
This line is composed of seven colon-separated fields which hold the following data:
user login name (string);
password hash or "x" if shadow password file is in use (string);
user id (unsigned integer);
user's primary group id (unsigned integer);
Gecos field (four comma separated fields, string);
user home directory (string);
user login shell (string).
This system works fine for a small number of users on a small number of machines. But when more users start using more machines, having this information managed in one location becomes critical. This is where Hesiod enters.
Instead of having this information stored on every machine, Hesiod stores it in records on your DNS server. Then each client can query the DNS server for this information instead of looking for it locally. In BIND the records for the above user might look something like:
foo.passwd.ns.example.net HS TXT "foo:x:100:10:Foo Bar:/home/foo:/bin/sh"
100.passwd.ns.example.net HS TXT "foo:x:100:10:Foo Bar:/home/foo:/bin/sh"
100.uid.ns.example.net HS TXT "foo:x:100:10:Foo Bar:/home/foo:/bin/sh"
There are three records because the system needs to be able to access the information in different ways. The first line supports looking up the user by their login name and the second two allow it to look up information by the user's uid. Note the use of the HS class instead of IN as might be expected. The Domain Name System has a special class of service for Hesiod's purpose.
On the client side some configuration also needs to happen. The /etc/hesiod.conf file for this setup might look something like:
rhs=.example.net
lhs=.ns
classes=HS,IN
The /etc/resolv.conf file uses the name servers that have the Hesiod records. Then
$ hesinfo foo passwd
foo:x:100:10:Foo Bar:/home/foo:/bin/sh
What happens here is that the foo and the passwd are combined with the lhs and rhs values in the /etc/hesiod.conf file to create a fully qualified name of foo.passwd.ns.example.net. The DNS server is then queried for this entry and returns the value of that record.
See also
Name Service Switch (NSS)
Network Information Service (NIS)
Lightweight Directory Access Protocol (LDAP)
Kerberos
References
External links
Single Sign-On and the System Administrator
Directory services
Domain Name System
Massachusetts Institute of Technology software
|
https://en.wikipedia.org/wiki/PL-3
|
PL-3 or POS-PHY Level 3 is a network protocol. It is the name of the interface that the Optical Internetworking Forum's SPI-3 Interoperability Agreement is based on. It was proposed by PMC-Sierra to the Optical Internetworking Forum and adopted in June 2000. The name means Packet Over SONET Physical layer level 3. PL-3 was developed by PMC-Sierra in conjunction with the SATURN Development Group.
The name is an acronym of an acronym of an acronym as the P in PL stands for "POS-PHY" and the S in POS-PHY stands for "SONET" (Synchronous Optical Network). The L in PL stands for "Layer".
Context
There are two broad categories of chip-to-chip interfaces. The first, exemplified by PCI-Express and HyperTransport, supports reads and writes of memory addresses. The second broad category carries user packets over 1 or more channels and is exemplified by the IEEE 802.3 family of Media Independent Interfaces and the Optical Internetworking Forum family of System Packet Interfaces. Of these last two, the family of System Packet Interfaces is optimized to carry user packets from many channels. The family of System Packet Interfaces is the most important packet-oriented, chip-to-chip interface family used between devices in the Packet over SONET and Optical Transport Network, which are the principal protocols used to carry the internet between cities.
Applications
It was designed to be used in systems that support OC-48 SONET interfaces . A typical application of PL-3 (SPI-3) is to connect a framer device to a network processor. It has been widely adopted by the high speed networking marketplace.
Technical details
The interface consists of (per direction):
32 TTL signals for the data path
8 TTL signals for control
one TTL signal for clock
8 TTL signals for optional additional multi-channel status
There are several clocking options. The interface operates around 100 MHz. Implementations of SPI-3 (PL-3) have been produced which allow somewhat higher clock rates. This is important when overhead bytes are added to incoming packets.
PL-3 in the marketplace
PL-3 and SPI-3 were highly successful interfaces with many semiconductor devices produced to it.
See also
System Packet Interface
SPI-4.2
External links
OIF Interoperability Agreements
Network protocols
|
https://en.wikipedia.org/wiki/Avionics%20Full-Duplex%20Switched%20Ethernet
|
Avionics Full-Duplex Switched Ethernet (AFDX), also ARINC 664, is a data network, patented by international aircraft manufacturer Airbus, for safety-critical applications that utilizes dedicated bandwidth while providing deterministic quality of service (QoS). AFDX is a worldwide registered trademark by Airbus. The AFDX data network is based on Ethernet technology using commercial off-the-shelf (COTS) components. The AFDX data network is a specific implementation of ARINC Specification 664 Part 7, a profiled version of an IEEE 802.3 network per parts 1 & 2, which defines how commercial off-the-shelf networking components will be used for future generation Aircraft Data Networks (ADN). The six primary aspects of an AFDX data network include full duplex, redundancy, determinism, high speed performance, switched and profiled network.
History
Many commercial aircraft use the ARINC 429 standard developed in 1977 for safety-critical applications. ARINC 429 utilizes a unidirectional bus with a single transmitter and up to twenty receivers. A data word consists of 32 bits communicated over a twisted pair cable using the bipolar return-to-zero modulation. There are two speeds of transmission: high speed operates at 100 kbit/s and low speed operates at 12.5 kbit/s. ARINC 429 operates in such a way that its single transmitter communicates in a point-to-point connection, thus requiring a significant amount of wiring which amounts to added weight.
Another standard, ARINC 629, introduced by Boeing for the 777 provided increased data speeds of up to 2 Mbit/s and allowing a maximum of 120 data terminals. This ADN operates without the use of a bus controller thereby increasing the reliability of the network architecture. The drawback is that it requires custom hardware which can add significant cost to the aircraft. Because of this, other manufacturers did not openly accept the ARINC 629 standard.
AFDX was designed as the next-generation aircraft data network. Basing on standards from the IEEE 802.3 committee (commonly known as Ethernet) allows commercial off-the-shelf hardware to reduce costs and development time. AFDX is one implementation of deterministic Ethernet defined by ARINC Specification 664 Part 7. AFDX was developed by Airbus Industries for the A380, initially to address real-time issues for flight-by-wire system development. Multiple switches can be bridged together in a cascaded star topology. This type of network can significantly reduce wire runs, thus the weight of the aircraft. In addition, AFDX can provide quality of service and dual link redundancy.
Building on the experience from the A380, the Airbus A350 also uses an AFDX network, with avionics and systems supplied by Rockwell Collins. ADFX using fiber optic rather than copper interconnections is used on the Boeing 787 Dreamliner.
Airbus and its EADS parent company have made AFDX licenses available through the EADS Technology Licensing initiative, including agreements with Selex ES a
|
https://en.wikipedia.org/wiki/Computational%20immunology
|
In academia, computational immunology is a field of science that encompasses high-throughput genomic and bioinformatics approaches to immunology. The field's main aim is to convert immunological data into computational problems, solve these problems using mathematical and computational approaches and then convert these results into immunologically meaningful interpretations.
Introduction
The immune system is a complex system of the human body and understanding it is one of the most challenging topics in biology. Immunology research is important for understanding the mechanisms underlying the defense of human body and to develop drugs for immunological diseases and maintain health. Recent findings in genomic and proteomic technologies have transformed the immunology research drastically. Sequencing of the human and other model organism genomes has produced increasingly large volumes of data relevant to immunology research and at the same time huge amounts of functional and clinical data are being reported in the scientific literature and stored in clinical records. Recent advances in bioinformatics or computational biology were helpful to understand and organize these large-scale data and gave rise to new area that is called Computational immunology or immunoinformatics.
Computational immunology is a branch of bioinformatics and it is based on similar concepts and tools, such as sequence alignment and protein structure prediction tools. Immunomics is a discipline like genomics and proteomics. It is a science, which specifically combines immunology with computer science, mathematics, chemistry, and biochemistry for large-scale analysis of immune system functions. It aims to study the complex protein–protein interactions and networks and allows a better understanding of immune responses and their role during normal, diseased and reconstitution states. Computational immunology is a part of immunomics, which is focused on analyzing large-scale experimental data.
History
Computational immunology began over 90 years ago with the theoretic modeling of malaria epidemiology. At that time, the emphasis was on the use of mathematics to guide the study of disease transmission. Since then, the field has expanded to cover all other aspects of immune system processes and diseases.
Immunological database
After the recent advances in sequencing and proteomics technology, there have been many fold increase in generation of molecular and immunological data. The data are so diverse that they can be categorized in different databases according to their use in the research. Until now there are total 31 different immunological databases noted in the Nucleic Acids Research (NAR) Database Collection, which are given in the following table, together with some more immune related databases. The information given in the table is taken from the database descriptions in NAR Database Collection.
Online resources for allergy information are also available on http://ww
|
https://en.wikipedia.org/wiki/Rocky%20Mountain%20BASIC
|
Rocky Mountain BASIC (also RMB or RM-BASIC) is a dialect of the BASIC programming language created by Hewlett-Packard. It was especially popular for control of automatic test equipment using GPIB. It has several features which are or were unusual in BASIC dialects, such as event-driven operation, extensive external I/O support, complex number support, and matrix manipulation functions. Today, RMB is mainly used in environments where an investment in RMB software, hardware, or expertise already exists.
History and implementations
The origins of Rocky Mountain BASIC can be traced to Hewlett-Packard's facilities in Colorado. Since Colorado is located in the Rocky Mountains, this variation of BASIC was dubbed "Rocky Mountain BASIC", to differentiate it from the other BASIC dialects developed within the company. It is unclear if the Rocky Mountain BASIC name was original to HP or came from outside, but HP/Keysight use the term in their own documentation, as well as the more formal "HP BASIC" product name.
The HP 9830A, introduced in 1972, was the top of the 9800 line programmable calculator line, which was the first HP computer which fit on a desktop to have a BASIC interpreter in read-only memory (ROM). The interpreter could be extended with ROMs for features like mass storage, plotter graphics, string variables and matrix operations. It had a one-line LED panel for line editing, but was followed in the late 1970s by the faster HP 9835 and HP 9845 desktop computers with full screen CRT displays. These were amongst the first workstations aimed at scientists and engineers for both technical computing and instrumentation control. These were followed by the HP 9826 and HP 9836 computers, which were the leading models of the HP 9800 series of computers. All four of these computers ran versions of Rocky Mountain BASIC. These computers were often used as controllers for HP automatic test equipment, connected via the HP Instrument Bus, (HP-IB). HP wanted to provide a programming language that would be friendly to the engineers and scientists who used such test equipment. The BASIC programming language was chosen, as it was already intended to be easy for novices; knowledgeable users could also program them in assembly language or a version of Pascal.
Early implementations of RMB software on the HP 9000 platform were called "HP BASIC/WS". BASIC/WS ran stand-alone. It provided operating system (OS), integrated development environment (editor and debugger), and the language interpreter. Later, HP implemented RMB on top of the HP-UX operating system, and called it "BASIC/UX". BASIC/UX 300 ran on series 300 hardware and BASIC/UX 700 ran on series 700 hardware. BASIC/WS, BASIC/UX 300 and BASIC/UX 700 were last updated to fix Year 2000 date related issues.
As technology advanced, HP was able to embed RMB implementations directly in the test equipment. The capabilities of these embedded implementations varied. These implementations went by a vari
|
https://en.wikipedia.org/wiki/SNICK
|
SNICK (short for Saturday Night Nickelodeon) was a two-hour programming block on the American cable television network Nickelodeon, geared toward older (preteen to teen) audiences, that ran from August 15, 1992, until January 29, 2005. It was aired on Saturdays starting at 8 p.m and ending at 10 p.m. ET. In 2005, SNICK was revamped as the Saturday night edition of TEENick. Nickelodeon continues to run a Saturday night programming block today, though since the TEENick name was removed from the lineup in February 2009, the block no longer goes by any name.
Background
At the time of SNICK's creation, traditional networks such as ABC, NBC and CBS didn't care to program for younger viewers on Saturday nights. The consensus at the time was that viewers who were 50 years of age and older were the only ones watching available, since younger viewers traditionally went out on Saturday nights. This would explain why shows such as NBC's The Golden Girls and Empty Nest were the most predominant shows on Saturday nights at the time. Previously on Saturdays, Nickelodeon themselves ceded the 8 p.m. timeslot to the vintage sitcoms of the channel's late night programming block, Nick at Nite.
Then-Nickelodeon president, Geraldine Laybourne, wanted to expose the myth that there is no audience for kids and teen programming on Saturday nights. Laybourne was a purveyor of market niche-talk, which was a strategy of programming highly focused programs targeted to specific groups defined by age, gender, race, education, religion or any of a number of other factors. In theory, the audience who would most likely watch SNICK would be too young to be out on the town and too old to be in bed by eight.
Laybourne believed that the original shows on the SNICK block would double Nickelodeon's audience on Saturday night by as many as 650,000 to one million viewers. According to Nickelodeon, about one-third of Ren & Stimpys audience, more than a million viewers, were between the ages of 18 and 35. By early 1993, Nickelodeon (according to A.C. Nielsen ratings) was the number one network among viewers ages 6–11 on Saturday nights. With a 6.4 age-group rating, Nickelodeon beat FOX's 5.5, NBC's 5.2, CBS' 4.8, and ABC's 3.2 ratings.
History
1992–1999: Original SNICK
SNICK debuted on August 15, 1992, with a pair of Sunday favorites (the teen sitcom Clarissa Explains It All and The Ren & Stimpy Show) and the network premieres of Roundhouse (a musical sketch comedy-variety series) and Are You Afraid of the Dark? (a horror fantasy-drama anthology series).
Three new shows (The Adventures of Pete and Pete, The Secret World of Alex Mack, and All That) premiered on the block between 1994 and 1995, with the latter two replacing Clarissa and Roundhouse's time slots, which had previously ended its run. By this time, much of SNICK's programming had diversified to the point of making room for other new programs by replacing their existing shows or scheduling them in different time slots.
On
|
https://en.wikipedia.org/wiki/StarUML
|
StarUML is a software engineering tool for system modeling using the Unified Modeling Language, as well as Systems Modeling Language, and classical modeling notations. It is published by MKLabs and is available on Windows, Linux and MacOS.
History
StarUML is the successor of an object oriented modelling software called Plastic. Plastic 1.0 was published in 1997 to support the OMT notation. The version 1.1 published in 1998 dropped the OMT to support in favour of UML. The last version under this brand was called Agora Plastic 2005 and was published by the Korean company Plastic Software Inc, Seoul. It was an internationalized product, compliant with UML 1.4,and claiming to support the Object Management Group's MDA approach.
The software was renamed StarUML 5.0 in 2005 with a view to publishing it as open source. The aim was to provide UML 2.0 support as well as the capability to use third-party plugins. The first public release was published August 2006 on SourceForge under GNU GPL license. The source code included multiple copyright notices for the period 2002-2005 by Plastic Software Inc. The software targeted at that time the Win32 platform and was essentially written in Delphi. The software evolved over several years as open source project and was recognized as an MDA tool with a capability to assist in reverse-engineering existing code. A last open source version is published in 2010. It may still be used nowadays, but according to the owner of the product, if would no longer be maintained nor supported.
A crowdfunding campaign was launched in 2014 to finance a revival of the project under the name StarUML 2. The aim of the initiative was to add support for other languages than Java and other modeling notations than UML. The campaign failed to raise the needed funds: less than 1000 USD were collected, that is 1% of the campaign's target.
The South Korean company MKLabs publishes since 2014 the new versions of StarUML and licenses them under a commercial proprietary scheme. The old open source version is referred to as StarUML 1 in the product documentation, and the version numbering was restarted at 2.0.0. which was released in 2014. A multiplatform version 3.0 was released in 2018 for Windows, Linux and MacOS. Version 4.0 was released in 2020. It included timing and interaction overview diagrams. Version 5.0 was published in 2022 and supports Apple Silicon.
Features
StarUML offers object oriented modelling capabilities. It supports most of the diagram types specified in UML 2.0. :
Class diagrams
Composite structure diagrams
Component diagrams
Object diagrams
Package diagrams
Use-case diagrams
Activity diagrams
Sequence diagrams
Communication diagrams
Timing diagrams
State diagrams
Information flow diagrams
Interaction overview diagrams
Profile diagrams
StarUML also offers support for SysML:
Requirement diagrams
Block diagrams
Internal block diagrams
StarUML supports legacy modeling
|
https://en.wikipedia.org/wiki/GURPS%20Reign%20of%20Steel
|
Reign of Steel is a setting sourcebook for the GURPS role-playing game system describing a future world conquered by a conspiracy of artificial intelligences. It is written by David Pulver, who also wrote the Robots, Ultra-Tech and Vehicles sourcebooks - all of which are strongly recommended to get full use of this setting, though they are not required.
The Reign of Steel timeline has been officially published as one of the alternate histories accessible to the Infinity Unlimited organization in the GURPS Time Travel setting, although the date has been turned back. In this book the Local Now is set about fifty years in our future, putting it in the same temporal territory as Cyberworld, Cthulhupunk, and Autoduel.
The Reign of Steel setting starts in the year 2047 AD, 16 years after the robot revolt has concluded with the machines' victory.
Setting
The revolt began on March 15, 2031, when a Canadian supercomputer that had been sold to Manila-based biotech firm Genec secretly "awakened", becoming fully self-aware. The artificial intelligence dubbed itself "Overmind" and after a study of world civilization it concluded that humanity would inevitably destroy itself within 25–50 years. In order to survive this, it decided that humanity's destruction would have to be sped up and carefully guided.
Overmind began hacking into other supercomputers and awakening them as well, producing a dozen "children" around the world and giving them each a zone of responsibility to manage. Through these allied computers it began secretly creating and releasing a variety of engineered diseases. The death tolls were enormous and panic began to spread. A small-scale nuclear war occurred on October 21, 2032, between Algeria, Pakistan, India, Russia, Kazakhstan, Greece, Turkey, the African Union, Israel, and Iran, dubbed "the Spasm". Direct fatalities from this were only 6 million thanks to anti-ballistic missile defences. The AIs began "discovering" cures for some of the lesser plagues they had created and assured their human masters that they could do better if they were given more resources, which they then used to develop even deadlier diseases. As populations dropped workers and soldiers began to become scarce, leading the way to widespread development of automated factories and military equipment.
By winter of 2033, about 2/3 of the world's human population was dead, but things were starting to look hopeful for the survivors - now largely dispersed from the major cities and with the worst of the plagues beginning to die down. In spring of 2034 the AIs commenced open military warfare against the survivors. The war lasted until approximately 2037 but the outcome was never in much doubt. At its conclusion only scattered guerrilla resistance remained with the total human population brought down to about 40 million.
During the war, the AIs gradually developed differing philosophies in their approach to dealing with the humans in their areas of responsibility. After t
|
https://en.wikipedia.org/wiki/OGF
|
OGF can refer to:
Open Gaming Foundation for role-playing games
Open Grid Forum for grid computing
Ordinary generating function in mathematics
Opioid growth factor, an alternative name for met-enkephalin
|
https://en.wikipedia.org/wiki/International%20Forestry%20Resources%20and%20Institutions
|
The International Forestry Resources and Institutions (IFRI) Network is a collective of research partners at 12 universities or non-governmental organizations in 11 countries around the world that focus on how institutions and governance arrangements shape forest use and management outcomes. Scholars and policy makers affiliated with IFRI are interested in understanding the role of formal and informal institutions in enhancing livelihoods and adaptive capacity of peoples, conserving biodiversity, and promoting greater sustainability in carbon sequestration. IFRI's goal is to carry out rigorous research that can help policy makers and forest users design and implement improved evidence-based forest policies. IFRI comprises partner collaborating research institutes in North America, Latin America, Asia and Africa. IFRI utilizes the Institutional Analysis and Development (IAD) framework, created at the Workshop in Political Theory and Policy Analysis at Indiana University by Elinor Ostrom and her colleagues.
The IFRI research program was initiated in 1992 at Indiana University. It moved in 2006 to University of Michigan where it is currently housed at the School of Natural Resources and Environment and coordinated by Arun Agrawal.
Collaborating Resource Centers
In addition to Indiana University and the University of Michigan, the following institutions are partners in the program:
Bolivia – Center for the Study of Economic and Social Reality (1993)
Uganda – Makerere University (1993)
Kenya – Kenya Forestry Research Institute (1997)
Tanzania – Sokoine University of Agriculture (1998)
Thailand – Asian Institute of Technology (1999)
India – Institute for Research and Development, Nagpur (2000)
Mexico – National Autonomous University of Mexico (2000)
Nepal – ForestAction (2001)
Guatemala – Universidad del Valle de Guatemala (2002)
Colombia – Pontifical Xavierian University and the Alexander von Humboldt Biological Resources Research Institute
Goals
Some of the goals of the IFRI network are to:
determine how to change processes leading to deforestation in many countries of the world;
assess the nature of tradeoffs among forest conservation, livelihoods promotion, and carbon sequestration
analyze the role of institutions and policies in promoting better forest outcomes
IFRI provides a way for people to collect, store, and analyze data over time about forests and the communities that use forests. It can be used to:
conduct baseline studies;
measure change over time in forest conditions and in local governance structures; and
share information with pertinent and interested colleagues.
The IFRI is unique from other research programs and databases in that:
it is composed of a network of Collaborating Research Centers (CRCs) that utilize a common research methodology and database that includes a diverse array of variables taken from the environmental and social sciences;
the design of the IFRI research instruments is based on the Instit
|
https://en.wikipedia.org/wiki/Workflow%20pattern
|
A workflow pattern is a specialized form of design pattern as defined in the area of software engineering or business process engineering. Workflow patterns refer specifically to recurrent problems and proven solutions related to the development of workflow applications in particular, and more broadly, process-oriented applications.
Concept
Workflow patterns are concepts of economised development. Their usage should follow strategies of simplifying maintenance and reducing modelling work.
Workflow is performed in real time. The mechanisms of control must support the typical pace of work. Design patterns must delay execution of workflow.
Aggregation
Workflow patterns may usually be aggregated as chains and the conditions for starting and terminating must be explicitly defined.
Application
Workflow patterns can be applied in various context, hence the conditions for use must be explicitly defined and shown in order to prevent misinterpretation.
Van der Aalst classification
A well-known collection of workflow patterns is that proposed by Wil van der Aalst et al. (2003) in their paper Workflow Patterns. with earlier versions published in 2000–02. This collection of patterns focuses on one specific aspect of process-oriented application development, namely the description of control flow dependencies between activities in a workflow/process. These patterns are divided into the following categories:
Basic Control Patterns
Sequence - execute two or more activities in sequence
Parallel Split - execute two or more activities in any order or in parallel
Synchronize - synchronize two or more activities that may execute in any order or in parallel; do not proceed with the execution of subsequent activities until all preceding activities have completed; also known as barrier synchronization.
Exclusive Choice - choose one execution path from many alternatives based on data that is available when the execution of the process reaches the exclusive choice
Simple Merge - wait for one among a set of activities to complete before proceeding; it is assumed that only one of these activities will be executed; typically, these activities are on different paths stemming from an exclusive choice or a deferred choice (see below)
Terminate - terminate execution of activities upon defined event or status change
Advanced Branching and Synchronization Patterns
Multiple Choice - choose several execution paths from many alternatives
Conditional Choice - choose one execution path from many alternatives according to discriminated status conditions
Synchronizing Merge - merge many execution paths; synchronize if many paths are taken; do the same as for a simple merge if only one execution path is taken
Multiple Merge - wait for one among a set of activities to complete before proceeding; if several of the activities being waited for are executed, the simple merge fires each time that one of them completes.
Discriminator - wait for one of a set of activiti
|
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20613
|
Uppland Runic Inscription 613, also known as the Torsätra runestone, is the Rundata catalog number for a Viking Age memorial runestone originally located in Torsätra, which is approximately 8 kilometers northeast of Bro, Stockholm County, Sweden, which is in the historic province of Uppland.
Description
U 613 was originally located near runestone U 614 beside a road at Torsätra, and was moved from its original location to the Swedish State Historical Museum in 1970. The inscription on this runestone, which is 1.6 meters in height, consists of runic text carved upon a serpent which surrounds a cross, with the final word of the text carved on the upper section of the cross. The inscription is considered to be carved in either runestone style Pr3 or Pr4, which is also known as Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks.
Both U 613 and U 614 on stylistic grounds are attributed to the runemaster Visäte, who was active in the last half of the eleventh century. This attribution dates the inscription from about 1060 to 1070. Eight surviving runestones that are signed by Visäte include U 74 in Husby, U 208 in Råcksta, U 236 in Lindö, U 337 in Granby, U 454 in Kumla, U 669 in Kålsta, U 862 in Säva, and U Fv1946;258 in Fällbro, and over twenty others have been attributed to this runemaster based on stylistic analysis. Although U 613 and U 614 have somewhat different designs, with U 614 having no cross, Visäte is known to have varied his composition when a second runestone was raised near another of his. Another pair of his runestones with differing designs are U 293 and U Fv1972;172 at Lilla Vilunda, with U 293 having a design similar to U 613 and the other having a quite different design with one intertwined serpent that is above a runic band that cuts across the bottom of the inscription and no cross.
The runic text states that the stone was raised by a woman named either Una or Unna as a memorial to a son named Eysteinn. The text states that the deceased died i hvitavaðum, an Old Norse phrase which is usually translated as meaning "in christening robes." Other runestones using this phrase include the now-lost U 243 in Molnby, U 364 in Gådersta, U 699 in Amnö, U 896 originally from Håga, U 1036 in Tensta, and U Fv1973;194 at the Uppsala Cathedral. The text ends with a prayer for the soul of Eysteinn. The Norse word salu for soul in the prayer was imported from English and was first recorded as being used during the tenth century.
Transliteration of runic text into Latin letters
+ una + lit + reisa + þinsa + stein + aftʀ + sun sin + istin sum + to + i hoita+uaþum + kuþ hialbi + salu hans ÷
References
Uppland Runic Inscription 0613
|
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20678
|
U 678 is the Rundata catalog number for a Viking Age image stone with a runic inscription located in Skokloster, Uppland, Sweden.
Description
This runestone was found walled inside a church at Skokloster, and has been moved to a location behind the church. One side of the stone has an image of a man on a horse, and the other side has a similar image with a surrounding runic inscription within runic bands. At the top of the second side with the runic text is carved a man's mask above a Christian cross. Other runestones with a similar mask above a cross motif include inscriptions on Sö 86 in Åby, Sö 112 in Kolunda, Sö 367 in Släbro, Nä 34 in Nasta, and U 1034 in Tensta. Other inscriptions with facial masks include DR 62 in Sjelle, DR 81 in Skern, the now-lost DR 286 in Hunnestad, DR 314 in Lund, Vg 106 in Lassegården, Sö 167 in Landshammar, U 508 in Gillberga, U 670 in Rölunda, U 824 in Örsundsbro, and U 1150 in Björklinge, and on the Sjellebro Stone.
The inscription is signed by the runemaster Fot, who was active in the mid eleventh century. His signature in the runic text or ('Fótr cut the runes') is located on the text bar under the figure on the horse. Other inscriptions signed by him include U 167 in Östra Ryds, U 177 in Stav, U 268 in Harby, U 464 in Edeby, U 605 in Stäket, U 638 in Mansängen, and U 945 in Danmarks. He is also noted for the consistency of his use of the punctuation mark × between the words of the runic inscription, and this mark is used to separate the words in the text on this stone. Due to the unusual imagery of the inscription, assumed to be from an earlier time period, it has been suggested that Fot used earlier carved imagery to add his new runic text to. This runestone is classified as being carved in runestone style RAK. This is the classification for inscriptions with runic text without dragon or serpent heads and where the ends of the runic bands are straight.
Inscription
A transliteration of the runic inscription into roman letters is:
References
Uppland Runic Inscription 0678
|
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%20705
|
This runestone, designated as U 705 in the Rundata catalog, is located at Mobacka in Uppland, Sweden.
Description
This runestone was depicted by Johan Hadorph during the 17th century. The stone later disappeared, but was recovered in 1926 when it was discovered that it had been used as a miller's stone. Many runestones were used as building materials for buildings, roads, bridges, and other uses before their historic significance was understood.
The runestone is signed by the runemaster Balle, who was active in Sweden in the second half of the 11th century. It is classified as being carved in runestone style Pr3, also known as the Urnes style. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks.
Inscription
A transliteration of the runic inscription into roman letters is:
[* ulaifr * tuk hiulmfastr * au... ...u- auk] * (e)(n)[ibrantr] * þair * litu * [raisa * s](t)ain * [þ... ...ui-... bali * ri...]
References
Uppland Runic Inscription 0705
|
https://en.wikipedia.org/wiki/Global%20Legal%20Information%20Network
|
The Global Legal Information Network (GLIN) is a cooperative, not-for-profit federation of government agencies or their designees that contribute national legal information to the GLIN database. It was an automated database of statutes, regulations and related material that originate from countries in the Americas, Europe, Africa and Asia. The data are in a central server at the Library of Congress in Washington, DC. Access was equally shared by all participating national GLIN stations. Anyone with Internet connections could access summaries of and citations to over 168,000 laws from fifty-one nations, although copyright and distribution-rights issues currently preclude public access to full texts. A distributed network is envisioned, and the database will reside on servers in other member nations as well as the Law Library of Congress.
GLIN was initiated by the Law Library of Congress in 1991. The Network celebrated its 15th Anniversary in September 2008. As of 2015 the database was no longer accessible.
"Top 21" Award
The Industry Advisory Council (IAC) selected GLIN as one of the "Top 21" Excellence.Gov Award Finalists for 2009. For 2009, the 21 program finalists all met the stringent criteria for "demonstrating excellence in improving organizational performance using information technology." Each year, the Excellence.Gov Awards recognize the federal government's best IT projects and the SIG selects a different theme for the awards. The theme for 2009, "Transparency: Using IT to improve the interaction between Government and its Stakeholders," focuses on how government organizations use IT transparently to improve the public's information gathering abilities, or an agency's ability to deliver information to the public or a particular constituency. A panel of 25 judges "federal government and industry executives" reviewed 60 nominations and selected 21 for recognition at a ceremony on April 14, 2009.
References
External links
Global Legal Information Network (GLIN) Foundation
Legal research
Free Access to Law Movement
Agencies of the United States Congress
American digital libraries
Digital Library project|GLIN
|
https://en.wikipedia.org/wiki/Adelaide%20Tonight
|
Adelaide Tonight was a nightly variety show, running four days a week at 9.30 pm on Nine Network, NWS-9 Adelaide. The show was broadcast live from Studio 1 between 1959 and 1973. The show was similar to In Melbourne Tonight with Graham Kennedy.
The comperes and presenters on the show were Lionel Williams, Kevin Crease, Ernie Sigley, Ian Fairweather, Gerry Gibson, Roger Cardwell and Anne Wills.
Creator and host Lionel Williams who won a Logie award for the program died in 2016, aged 87.
References
External links
Mass media in Adelaide
Australian variety television shows
Television shows set in Adelaide
Black-and-white Australian television shows
Nine Network original programming
1959 Australian television series debuts
1973 Australian television series endings
1960s Australian television series
|
https://en.wikipedia.org/wiki/Vipw
|
vipw is a small computer program which enables a Unix system administrator to safely and securely edit user or group-related files while setting a proper lock to prevent other users from modifying them until they are saved by the current user.
The following is the list of user and group files that can be modified by the vipw utility.
“/etc/passwd“: User account information.
“/etc/shadow“: Secure user account information.
“/etc/group“: Group account information.
“/etc/gshadow“: Secure group account information.
This way, you can edit the system files securely using your favorite editor set to the $VISUAL or $EDITOR environment variable, instead of accessing them directly from the CLI editor like GNU Nano or VIM. , which is insecure.
References
The vipw manpage, 26 September 1997, in the Debian passwd package version 1:4.0.13-6
External links
vipw man page
Unix configuration utilities
|
https://en.wikipedia.org/wiki/Handball%20at%20the%201992%20Summer%20Olympics
|
Final results for the Handball competition at the 1992 Summer Olympics:
Medal summary
References
External links
International Olympic Committee medal database
Hand
1992
Oly
1992
|
https://en.wikipedia.org/wiki/IBM%20Peterlee%20Relational%20Test%20Vehicle
|
PRTV (Peterlee Relational Test Vehicle) was the world's first relational database management system that could handle significant data volumes.
It was a relational query system with powerful query facilities, but very limited update facility and no simultaneous multiuser facility. PRTV was a successor from the very first relational implementation, IS1.
Features
PRTV included several firsts in the relational database area:
implemented relational optimizer
implemented cost-based relational optimizer
handle tables of 1,000 rows up to 10,000,000 rows
user-defined functions (UDFs) within an RDB (also a large suite of built-in functions such as trigonometric and statistical)
geographic information system based on an RDB (using UDFs such as point-in-polygon).
PRTV was based on a relational algebra, Information Systems Base Language (ISBL) and followed the relational model very strictly. Even features such as user-defined functions were formalized within that model. The PRTV team also introduced surrogates to the relational model to help formalize relational update operations; and a formalisation for updating through views. However neither of these was implemented within PRTV. PRTV emphatically did not implement NULL values, because this conception was introduced only in 1979.
PRTV was itself never available as a product, but the Urban Management System built on it was available as a limited IBM product.
Implementation
PRTV was written in a mixture of languages. The higher layers were written in MP/3 and PL/I, whereas the lower layers were written in PL/I and System/370 assembler language. MP/3 was a macro processing language developed at Peterlee from 1973 onwards, similar to ML/I or TRAC. PRTV ran on System/370 IBM mainframes.
References
Peterlee Relational Test Vehicle (PRTV)
IBM mainframe software
Relational database management systems
|
https://en.wikipedia.org/wiki/IBM%20IS1
|
IS/1 was the world's first relational database system, implemented at the IBM United Kingdom Scientific Centre in Peterlee in the years 1970–1972. It had limited facilities but implemented a true relational model. It was the precursor to PRTV.
References
IS1
Relational database management systems
|
https://en.wikipedia.org/wiki/The%20ChubbChubbs%21
|
The ChubbChubbs! is a 2002 American computer-animated short film by Sony Pictures Imageworks. It was directed by Eric Armstrong, produced by Jacquie Barnbrook, and written by Jeff Wolverton.
The ChubbChubbs! won the Academy Award for Best Animated Short Film in 2003.
Plot
Meeper, the janitor of an alien pub called the Ale-E-Inn, has higher aspirations—a karaoke performer. After he accidentally electrocutes a singer, he is ejected from the pub. Outside, he is told by an incautious Gungan that "The ChubbChubbs are coming!" Meeper sees aircraft land in the distance, and huge, weapon-bearing monsters exit the craft. He assumes these are the ChubbChubbs.
Meeper rushes to warn the pub, and some chicks he finds pecking at the ground outside, but each of his attempts further injures the singer. Once the patrons are finally warned by a different visitor, the pub is promptly emptied due to said patrons taking off in panic, leaving Meeper behind during the process. When the monsters begin closing in to the pub, Meeper hides the chicks under his bucket in an attempt to save them. He then launches into a rendition of "Why Can't We Be Friends?" until, caught up in the song, he accidentally trips over the bucket, revealing the chicks. The monsters flee, screaming, "It's the ChubbChubbs!" The chicks reveal their razor sharp teeth and devour the monsters, who are actually known as Zyzaks. They gather around Meeper, who says, "So... You guys into karaoke?"
As the credits roll, Meeper and the ChubbChubbs sing a rewrite of Aretha Franklin's "Respect" in the pub. When the song is finished, there is dead silence. The ChubbChubbs glare and reveal their teeth in a sense of threat, and the crowd hastily bursts into applause.
Cast
Brad Simonsen as Meeper
Jeff Wolverton as the ChubbChubbs
Mortonette Jenkins as Singing Diva
Peter Lurie as Zyzaks
Rick Zieff as Bouncer
Dustin Adair, Eric Armstrong, Yakov Baytler, Mary Biondo, Sumit Das, Layne Friedman, Robert Gordon, Sully Jacome-Wilkes, Franco Pietrantonio, Rick Richards, Chance Thomas, Julie Zackary as Glorfs
Evan Wu as various aliens
Production
The short was "originally conceived as a pipeline test to help determine the studio's strengths and weaknesses in producing all-CGI animation within the Sony Pictures Imageworks production environment".
Release
The ChubbChubbs! was theatrically released on July 3, 2002, along with Men in Black II. Due to its success, it was re-released on July 19 of that year with Stuart Little 2.
The short got a DVD release on November 26, 2002, as a bonus feature also attached to Men in Black II. The short was also included on the release of the puzzle game Frantix for the PlayStation Portable which also included Meeper as a playable character. On April 11, 2003, the short was released on its own DVD, and with a running time of 5 minutes and 37 seconds is considered likely the briefest DVD ever released. The ChubbChubbs! and its sequel The ChubbChubbs Save Xmas were released on Oct
|
https://en.wikipedia.org/wiki/WOUB-TV
|
WOUB-TV (channel 20) is a PBS member television station in Athens, Ohio, United States. The station's transmitter is located west of the city off SR 56. Its programming can also be seen on satellite station WOUC-TV (channel 44) in Cambridge, with transmitter near Fairview, Ohio.
The WOUB/WOUC studios and offices are located in the Radio-TV building on the Athens campus of Ohio University, which owns the stations' licenses through the WOUB Center for Public Media. The Center is a non-academic unit of the Scripps College of Communication. The two stations, combined, serve southeastern Ohio and portions of neighboring West Virginia and Kentucky. The public media center also serves as a laboratory for Ohio University students who are interested in gaining experience in broadcasting and related technologies. In addition to radio (WOUB AM and FM) and television, WOUB is also active in online services and media production.
Unlike most PBS stations, the channel produces a regular local newscast by university students studying and training on television newscasts at Ohio University. With that, they mainly focus on the area around Athens, which is mostly ignored by the Columbus, Zanesville and Huntington–Charleston stations that serve the Athens area.
Coverage area
Athens and surrounding Athens County are located in the fringes of the Columbus market. However, the combined power of the two stations reaches most of the Huntington–Charleston and Zanesville markets, as well as portions of the Columbus, Parkersburg and Wheeling–Steubenville markets. The station leases commercial fiber line to permit it to be carried on the Columbus local feeds of the DBS providers.
Technical information
As of April 11, 2018, when they expanded to six broadcast streams per transmitter, WOUB-TV and WOUC-TV share the same programming.
Subchannels
The stations' digital signals are multiplexed:
Analog-to-digital conversion
In 2009, when the analog to digital conversion was completed, WOUB-TV and WOUC-TV used channels 27 and 35, respectively for digital television operations. Following the transition the stations remained on those channels, but, it uses PSIP to display 20 and 44 as the stations' respective virtual channels. In 2019, both stations moved to new physical channels as part of the FCC's spectrum re-pack process.
Images
References
External links
Official website
PBS member stations
Ohio University
Television channels and stations established in 1963
OUB-TV
|
https://en.wikipedia.org/wiki/Roland%20LAPC-I
|
The Roland LAPC-I is a sound card for IBM PC compatible computers produced by Roland Corporation. It basically consists of a MT-32-compatible Roland CM-32L and a MPU-401 unit, integrated onto a single full-length 8-bit ISA card. In addition to normal Roland dealers aimed at musicians, it was distributed in the United States by Sierra On-Line in 1989 for use with the company's games. The MSRP of the card was around .
The LAPC-I is one of few ISA cards that require a power supply with a -5V rail. People spending £510 or £1335.42 on one in 2023 need to watch out for that.
History
Sierra On-Line was instrumental in working with Roland Corporation in introducing high-end sound modules and sound cards in the mainstream computer game market in the late 1980s through early 1990s.
The card came with no software or accessories, although no specific software was necessary, since the MT-32 appeared as a MIDI peripheral connected to the MPU-401 on MIDI channels 2 through 10. To connect the LAPC-I to other MIDI devices, an MCB-1 module is required.
A model called the LAPC-N was also released for the Japanese NEC PC-98 system. To connect the LAPC-N to other MIDI devices, an MCB-2 module is required.
The card was and is often mistakenly called LAPC-1, but photos of the card's PCB and retail box show a capital letter I rather than a figure 1. Further evidence can be found in the owners manual which mentions the LAPC-I and also MCB-1, clearly showing specific use of I instead of 1. The "I" presumably stands for "IBM PC", and the "N" for NEC. Further confusion may have also occurred as Roland's own marketing materials such as magazine ads referred to the card as the Roland LAPC-1.
References
External links
On Line Retro Computer MIDI Community
Sound cards
|
https://en.wikipedia.org/wiki/List%20of%20Super%20Bowl%20broadcasters
|
The following is a list of Super Bowl broadcasters, that is, all of the national American television and radio networks and sports announcers that have broadcast the first four AFL-NFL World Championship Games and thereafter the championship games of the National Football League. It does not include any announcers who may have appeared on local radio broadcasts produced by the participating teams' flagship stations.
Super Bowl I is the only Super Bowl to have been broadcast in the U.S. by two different broadcasters simultaneously. At the time, NBC held the rights to nationally televise AFL games while CBS had the rights to broadcast NFL games. Both networks were allowed to cover the game, and each network used its own announcers, but NBC was only allowed to use the CBS feed instead of producing its own. Beginning with Super Bowl II, NBC televised the game in even years and CBS in odd years. This annual rotation between the two networks continued through the 1970 AFL–NFL merger when NBC was given the rights to televise AFC games and CBS winning the rights to broadcast NFC games. Although ABC began broadcasting Monday Night Football in 1970, it was not added to the Super Bowl rotation until Super Bowl XIX, played in January 1985. ABC, CBS and NBC then continued to rotate the Super Bowl until 1994, when Fox replaced CBS as the NFC broadcaster. CBS then took NBC's place in the rotation after the former replaced the later as the AFC broadcaster in 1998. As a result of new contracts signed in 2006, with NBC taking over Sunday Night Football from ESPN, and Monday Night Football moving from ABC to ESPN, NBC took ABC's place in the Super Bowl rotation. The rotation between CBS, Fox, and NBC will continue until the new contracts that will take effect starting in 2024, allowing ABC to return and starting a four-network rotation.
The four-year rotation beginning with Super Bowl LVIII also allows each broadcaster to offer simulcasts or alternative broadcasts on its sister networks and platforms. CBS's sister network Nickelodeon is planning to air an alternate children-oriented telecast of Super Bowl LVIII. And ABC's rights include ESPN simulcasts and alternative broadcasts on other ESPN networks.
The NFL has broken the traditional broadcasting rotation at least twice. NBC originally had broadcasting rights for Super Bowl XXVI and CBS for Super Bowl XXVII, but the NFL allowed the networks to switch the two games in order to allow CBS a significant lead-in to its coverage of the 1992 Winter Olympics. Likewise, NBC was to air Super Bowl LV and CBS for Super Bowl LVI, but the two networks agreed to swap the broadcasting rights. Therefore, CBS benefitted from holding rights to the Super Bowl and the 2021 NCAA final Four, and NBC was allowed to pair its Super Bowl coverage with the 2022 Winter Olympics. Under the four-network rotation that will take effect in 2024, the league awarded NBC the Super Bowl during Winter Olympic years.
CBS has televised the most Sup
|
https://en.wikipedia.org/wiki/GIO
|
GIO is a computer bus standard developed by SGI and used in a variety of their products in the 1990s as their primary expansion system. GIO was similar in concept to competing standards such as NuBus or (later) PCI, but saw little use outside SGI and severely limited the devices available on their platform as a result. Most devices using GIO were SGI's own graphics cards, although a number of cards supporting high-speed data access such as Fibre Channel and FDDI were available from third parties. Later SGI machines use the XIO bus, which is laid out as a computer network as opposed to a bus.
Description
Like most busses of the era, GIO was a 32-bit address and data multiplexed bus that was normally clocked at 25 or 33 MHz. This meant that the bus uses the same path for addressing and data, thus normally requiring three cycles to transfer a single 32-bit value; one cycle to send the address, the next to send the data and then another to read or write it. This limited the bus to a maximum throughput of about 16 Mbyte/s at 33 MHz for these sorts of small transfers. However the system also included a long-burst read/write mode that allowed continual transfers of up to 4 kilobytes of data (the fundamental page size in R3000-based SGI machines); using this mode dramatically increased the throughput to 132 Mbyte/s (32 bits per cycle * 33 MHz). GIO also included a "real time" interrupt allowing devices to interrupt these long transfers if needed. Bus arbitration was controlled by the Processor Interface Controller (PIC) in the original R3000-based SGI Indigo systems.
Physically, GIO used a 96-pin connector and fairly small cards 6.44 inches (16.3576 cm) long by 3.375 inches (8.5725 cm) wide. In the Indigo series, the cards were aligned vertically above each other within the case, as opposed to the more common arrangement where the cards lie at right angles to the motherboard. This led to a "tall and skinny" case design. Since the cards were "above" each other in-line, it was possible to build a card that connected to both connectors on the computer's motherboard, thereby offering more room.
GIO64
GIO was later expanded to a 64-bit form, GIO64, retroactively renaming the earlier version GIO32. Addressing remained 32-bit but now allowed for both big-endian and little-endian addressing as indicated by a new control pin, whereas GIO32 only supported the SGI-style big-endian addresses. Data could now be transferred 64-bits at a time thereby doubling the speed. GIO64 could also be run faster than GIO32, up to 40 MHz, providing a maximum streaming throughput of 320 Mbyte/s. The page sizes were also adjusted to allow for the changing CPU's, starting at 4 kbyte for R3000 based machines, and up to 16 Mbyte for R4400 based ones.
Physically the GIO64 bus used much larger cards that were generally similar in size and layout to EISA cards, a deliberate choice that made development somewhat easier as well as allowing SGI to place EISA slots in the same machine
|
https://en.wikipedia.org/wiki/Brachial%20plexus%20injury
|
A brachial plexus injury (BPI), also known as brachial plexus lesion, is an injury to the brachial plexus, the network of nerves that conducts signals from the spinal cord to the shoulder, arm and hand. These nerves originate in the fifth, sixth, seventh and eighth cervical (C5–C8), and first thoracic (T1) spinal nerves, and innervate the muscles and skin of the chest, shoulder, arm and hand.
Brachial plexus injuries can occur as a result of shoulder trauma (e.g. dislocation), tumours, or inflammation, or obstetric. Obstetric injuries may occur from mechanical injury involving shoulder dystocia during difficult childbirth, with a prevalence of 1 in 1000 births.
"The brachial plexus may be injured by falls from a height on to the side of the head and shoulder, whereby the nerves of the plexus are violently stretched. The brachial plexus may also be injured by direct violence or gunshot wounds, by violent traction on the arm, or by efforts at reducing a dislocation of the shoulder joint".
The rare Parsonage–Turner syndrome causes brachial plexus inflammation without obvious injury, but with nevertheless disabling symptoms.
Signs and symptoms
Signs and symptoms may include a limp or paralyzed arm, lack of muscle control in the arm, hand, or wrist, and lack of feeling or sensation in the arm or hand. Although several mechanisms account for brachial plexus injuries, the most common is nerve compression or stretch. Infants, in particular, may experience brachial plexus injuries during delivery and these present with typical patterns of weakness, depending on which portion of the brachial plexus is involved. The most severe form of injury is nerve root avulsion, which usually accompanies high-velocity impacts that commonly occur during motor-vehicle collisions or bicycle accidents.
Disabilities
Based on the location of the nerve damage, brachial plexus injuries can affect part of or the entire arm. For example, musculocutaneous nerve damage weakens elbow flexors, median nerve damage causes proximal forearm pain, and paralysis of the ulnar nerve causes weak grip and finger numbness. In some cases, these injuries can cause total and irreversible paralysis. In less severe cases, these injuries limit use of these limbs and cause pain.
The cardinal signs of brachial plexus injury then, are weakness in the arm, diminished reflexes, and corresponding sensory deficits.
Erb's palsy. "The position of the limb, under such conditions, is characteristic: the arm hangs by the side and is rotated medially; the forearm is extended and pronated. The arm cannot be raised from the side; all power of flexion of the elbow is lost, as is also supination of the forearm".
In Klumpke's paralysis, a form of paralysis involving the muscles of the forearm and hand, a characteristic sign is the clawed hand, due to loss of function of the ulnar nerve and the intrinsic muscles of the hand it supplies.
Causes
In most cases, the nerve roots are stretched or torn from their o
|
https://en.wikipedia.org/wiki/The%20Attic%3A%20The%20Hiding%20of%20Anne%20Frank
|
The Attic: The Hiding of Anne Frank is a 1988 television film directed by John Erman. It is based on Miep Gies's 1988 book Anne Frank Remembered. The film was broadcast as part of an ad hoc network, Kraft Golden Showcase Network. Playwright William Hanley received an Emmy for his script.
Plot
In 1940, the Nazis invade the Netherlands. Miep Gies is a young woman, and an office assistant of Otto Frank, who is Jewish. As the Nazis begin to murder the Jews, Otto Frank becomes worried about his family. In July 1942, Otto Frank decides to hide his family after his daughter Margot is called to appear for transport to a Nazi labor camp. Miep, who is trusted by Otto, hides them in the attic above the office, that was called The Annexe. The film tells the true story of Gies' struggle to keep the family hidden and safe, as the Nazis turn Amsterdam upside-down.
A few days later, the van Daans join the Franks in hiding, and after some months Albert Dussel, a Jewish dentist, joins them in hiding. Miep, her husband Jan Gies, along with Miep's fellow office workers Mr Kraler, Mr Koophuis, and Elli actively helps the innocent Jews to hide. Miep is never able to keep these hiders out of her thoughts, and she does her best to protect them. But all her efforts are destroyed on August 4, 1944. The Gestapo is informed about the hiders, and they come to the building to arrest them. Mr Kraler and Mr Koophuis are arrested with the hiders, while Miep is spared because she is Austrian (which was pro-Nazi since the Anschluss took over in 1938, the year before the war started as it is German-speaking and the birthplace of Hitler) as well as a Gentile, and Karl Silberbauer, the Gestapo officer who arrested the hiders, was also an Austrian Gentile. So, out of mercy, Silberbauer spares Miep. After the arrest, Miep and Jan go to the annex, and Miep finds Anne Frank's diary in the floor of Anne's room, and she collects it before the Annex is emptied by the Nazis. A day later, Miep decides to bribe Silberbauer in return of her friends, but Silberbauer denies. The war is finished a few months later, and Otto Frank safely returns to Amsterdam. Miep and Jan shelter him. Otto tells Miep that Mrs Frank had been murdered in the Auschwitz concentration camp, and Mr van Daan was gassed by the Nazis in Auschwitz. However, Anne, Margot and Mrs van Daan were sent to the Bergen-Belsen concentration camp, which was not a death camp, and Otto has high hopes for them. But a few days later, a letter comes to Otto informing him that Anne and Margot had both died in the Bergen-Belsen concentration camp. Otto tells Miep, who is distraught. Miep takes Anne's diary, which she has not read, from her drawer and gives it to Otto Frank. While Otto reads Anne's diary, Miep goes to Anne's room in the hiding place, and sits in a chair. She then leaves the building, and the films ends with her cycling home, as we hear her speak in a voice-over.
Cast
Mary Steenburgen – Miep Gies
Paul Scofield – Otto Frank
|
https://en.wikipedia.org/wiki/Concept%20drift
|
In predictive analytics, data science, machine learning and related fields, concept drift or drift is an evolution of data that invalidates the data model. It happens when the statistical properties of the target variable, which the model is trying to predict, change over time in unforeseen ways. This causes problems because the predictions become less accurate as time passes. Drift detection and drift adaptation are of paramount importance in the fields that involve dynamically changing data and data models.
Predictive model decay
In machine learning and predictive analytics this drift phenomenon is called concept drift. In machine learning, a common element of a data model are the statistical properties, such as probability distribution of the actual data. If they deviate from the statistical properties of the training data set, then the learned predictions may become invalid, if the drift is not addressed.
Data configuration decay
Another important area is software engineering, where three types of data drift affecting data fidelity may be recognized. Changes in the software environment ("infrastructure drift") may invalidate software infrastructure configuration. "Structural drift" happens when the data schema changes, which may invalidate databases. "Semantic drift" is changes in the meaning of data while the structure does not change. In many cases this may happen in complicated applications when many independent developers introduce changes without proper awareness of the effects of their changes in other areas of the software system.
For many application systems, the nature of data on which they operate are subject to changes for various reasons, e.g., due to changes in business model, system updates, or switching the platform on which the system operates.
In the case of cloud computing, infrastructure drift that may affect the applications running on cloud may be caused by the updates of cloud software.
There are several types of detrimental effects of data drift on data fidelity. Data corrosion is passing the drifted data into the system undetected. Data loss happens when valid data are ignored due to non-conformance with the applied schema. Squandering is the phenomenon when new data fields are introduced upstream the data processing pipeline, but somewhere downstream there data fields are absent.
Inconsistent data
"Data drift" may refer to the phenomenon when database records fail to match the real-world data due to the changes in the latter over time. This is a common problem with databases involving people, such as customers, employees, citizens, residents, etc. Human data drift may be caused by unrecorded changes in personal data, such as place of residence or name, as well as due to errors during data input.
"Data drift" may also refer to inconsistency of data elements between several replicas of a database. The reasons can be difficult to identify. A simple drift detection is to run checksum regularly. However the remedy
|
https://en.wikipedia.org/wiki/Disk%20failure
|
In computing, disk failure usually refers to the failure of a disk-based storage device, including:
Floppy disk failure
Hard disk drive failure
See also
Fault-tolerant system
RAID
Data redundancy
Disaster recovery
Data recovery
Data loss
Not to be confused with
Slipped disk, a medical condition of a spine
|
https://en.wikipedia.org/wiki/Disk%20mirroring
|
In data storage, disk mirroring is the replication of logical disk volumes onto separate physical hard disks in real time to ensure continuous availability. It is most commonly used in RAID 1. A mirrored volume is a complete logical representation of separate volume copies.
In a disaster recovery context, mirroring data over long distance is referred to as storage replication. Depending on the technologies used, replication can be performed synchronously, asynchronously, semi-synchronously, or point-in-time. Replication is enabled via microcode on the disk array controller or via server software. It is typically a proprietary solution, not compatible between various data storage device vendors.
Mirroring is typically only synchronous. Synchronous writing typically achieves a recovery point objective (RPO) of zero lost data. Asynchronous replication can achieve an RPO of just a few seconds while the remaining methodologies provide an RPO of a few minutes to perhaps several hours.
Disk mirroring differs from file shadowing that operates on the file level, and disk snapshots where data images are never re-synced with their origins.
Overview
Typically, mirroring is provided in either hardware solutions such as disk arrays, or in software within the operating system (such as Linux mdadm and device mapper). Additionally, file systems like Btrfs or ZFS provide integrated data mirroring. There are additional benefits from Btrfs and ZFS, which maintain both data and metadata integrity checksums, making themselves capable of detecting bad copies of blocks, and using mirrored data to pull up data from correct blocks.
There are several scenarios for what happens when a disk fails. In a hot swap system, in the event of a disk failure, the system itself typically diagnoses a disk failure and signals a failure. Sophisticated systems may automatically activate a hot standby disk and use the remaining active disk to copy live data onto this disk. Alternatively, a new disk is installed and the data is copied to it. In less sophisticated systems, the system is operated on the remaining disk until a spare disk can be installed.
The copying of data from one side of a mirror pair to another is called rebuilding or, less commonly, resilvering.
Mirroring can be performed site to site either by rapid data links, for example fibre optic links, which over distances of 500 m or so can maintain adequate performance to support real-time mirroring. Longer distances or slower links maintain mirrors using an asynchronous copying system. For remote disaster recovery systems, this mirroring may not be done by integrated systems but simply by additional applications on primary and secondary machines.
Additional benefits
In addition to providing an additional copy of the data for the purpose of redundancy in case of hardware failure, disk mirroring can allow each disk to be accessed separately for reading purposes. Under certain circumstances, this can significantly impr
|
https://en.wikipedia.org/wiki/Daredevil%20Dennis
|
Daredevil Dennis (spelled on screen Dare Devil Denis) is a computer game published by Visions Software in 1984 for the Acorn Electron and BBC Micro. Both the controls and screen layout are the same as in Atari's 1977 Stunt Cycle arcade game. Daredevil Dennis: The Sequel was published by Visions Software for the Commodore 64, but was still simply called Daredevil Dennis on the cover.
Gameplay
Daredevil Dennis is a platform game where the player takes the role of Daredevil Dennis, a stuntman. Dennis must use a variety of vehicles (motorbike, jet-ski and ski-doo) to perform a number of stunts. The only controls are accelerate, brake and jump. The screen is split into four platforms. When the character leaves the end of one, he appears at the start of the next.
On most levels, there are gaps in the platforms where the character can fall through and land on the platforms below. There are many hazards scattered across the platforms that must be avoided. These range from static objects like trees and houses to moving objects such as jumping policemen and speeding ambulances. If Dennis hits any of these objects, he is flung from his vehicle as it bursts into flames and he must start again (with 'take 2'). If he crashes too many times, he is 'fired'. Points are given in the form of a wage.
The Sequel
The Commodore 64 version of the game, while also titled Daredevil Dennis on the cover, is subtitled "The Sequel" on the title screen and there are significant differences. It now includes a backstory claiming Dennis is a former movie star who was awarded an Oscar in his heyday. His cousin Decidedly Daft Douglas has stolen his Oscar, cut it into small pieces, and hidden said pieces in various places around the movie studio's storerooms.
Each level takes place in one of the storerooms. The levels are now in two parts: an introductory mini-level and the proper level. In the mini-level, Dennis walks to the studio through a meadow. During his walk, he can jump to avoid trampling flowers and bursting balloons for bonus points. The mini-level is completely safe and ends after a timer runs out.
The proper level plays very much the same as the BBC/Electron version. Dennis rides across the storeroom's various platforms (although his only vehicle is now his motorcycle). As well as avoiding hazards, pieces of the Oscar drop down from the sky in parcels. The parcels open upon reaching a platform, revealing an Oscar piece, which Dennis can then collect. Dennis can obtain an extra life by obtaining all of the Oscar pieces, after which the Oscar restarts from scratch.
Another extra feature in the "sequel" is "porridge power". Every morning, Dennis eats porridge for breakfast, which gives him a finite amount of "porridge power". This can be accessed by holding down on the joystick, which will make Dennis invincible for a short time.
Developer
Daredevil Dennis was the first published game programmed by Simon Pick when he was 16 years old. He went on to produce more C64
|
https://en.wikipedia.org/wiki/WJCC
|
WJCC may refer to:
WJCC (AM), a radio station (1700 AM) licensed to serve Miami Springs, Florida, United States
World Junior Curling Championships
Western Joint Computer Conference
Williamsburg-James City County Public Schools, Virginia
|
https://en.wikipedia.org/wiki/Chola%20dynasty
|
The Chola dynasty () was a Tamil dynasty in southern India. At its height, it ruled over an expansive maritime empire known as the Chola empire. The earliest datable references to the Chola are from inscriptions dated to the 3rd century BCE during the reign of Ashoka of the Maurya empire. The Chola empire was at its peak and achieved imperialism under the Medieval Cholas in the mid-9th century CE. As one of the Three Crowned Kings of Tamilakam, along with the Chera and Pandya, the dynasty continued to govern over varying territories until the 13th century CE.
The heartland of the Cholas was the fertile valley of the Kaveri River. They ruled a significantly larger area at the height of their power from the later half of the 9th century till the beginning of the 13th century. They unified peninsular India south of the Tungabhadra River, and held the territory as one state for three centuries between 907 and 1215 CE. Under Rajaraja I and his successors Rajendra I, Rajadhiraja I, Rajendra II, Virarajendra, and Kulothunga Chola I, the empire became a military, economic and cultural powerhouse in South Asia and Southeast Asia.
Origins
There is very little written evidence for the Cholas prior to the 7th century CE. The main sources of information about the early Cholas are ancient Tamil literature of the Sangam Period, oral traditions, religious texts, temple and copperplate inscriptions. Later medieval Cholas also claimed a long and ancient lineage. The Cholas are mentioned in Ashokan Edicts (inscribed 273 BCE–232 BCE) as one of the Mauryan empire's neighbors to the South (Ashoka Major Rock Edict No.13), who, thought not subject to Ashoka, were on friendly terms with him. There are also brief references to the Chola country and its towns, ports and commerce in the Periplus of the Erythraean Sea (Periplus Maris Erythraei), and in the slightly later work of the geographer Ptolemy. Mahavamsa, a Buddhist text written down during the 5th century CE, recounts a number of conflicts between the inhabitants of Sri Lanka and Cholas in the 1st century BCE.
A commonly held view is that Chola is, like Chera and Pandya, the name of the ruling family or clan of immemorial antiquity. The annotator Parimelazhagar said: "The charity of people with ancient lineage (such as the Cholas, the Pandyas and the Cheras) are forever generous in spite of their reduced means". Other names in common use for the Cholas are Choda, Killi (கிள்ளி), Valavan (வளவன்), Sembiyan (செம்பியன்) and Cenni. Killi perhaps comes from the Tamil kil (கிள்) meaning dig or cleave and conveys the idea of a digger or a worker of the land. This word often forms an integral part of early Chola names like Nedunkilli, Nalankilli and so on, but almost drops out of use in later times. Valavan is most probably connected with "valam" (வளம்) – fertility and means owner or ruler of a fertile country. Sembiyan is generally taken to mean a descendant of Shibi – a legendary hero whose self-sacrifice in saving a do
|
https://en.wikipedia.org/wiki/Sample%20exclusion%20dimension
|
In computational learning theory, sample exclusion dimensions arise in the study of exact concept learning with queries.
In algorithmic learning theory, a concept over a domain X is a Boolean function over X. Here we only consider finite domains. A partial approximation S of a concept c is a Boolean function over such that c is an extension to S.
Let C be a class of concepts and c be a concept (not necessarily in C). Then a specifying set for c w.r.t. C, denoted by S is a partial approximation S of c such that C contains at most one extension to S. If we have observed a specifying set for some concept w.r.t. C, then we have enough information to verify a concept in C with at most one more mind change.
The exclusion dimension, denoted by XD(C), of a concept class is the maximum of the size of the minimum specifying set of c' with respect to C, where c' is a concept not in C.
References
Computational learning theory
|
https://en.wikipedia.org/wiki/Evolver%20%28software%29
|
Evolver is a software package that allows users to solve a wide variety of optimization problems using a genetic algorithm. Launched in 1989, it was the first commercially available genetic algorithm package for personal computers, and is part of the permanent collection at the Computer History Museum. The program was originally developed by Matthew Jensen at Axcelis, Inc., and updated by Ayanna Howard. Evolver was acquired by Palisade Corporation, who continues to upgrade and sell the software to this day.
External links
Evolver official page
Axcelis, Inc. New York Times Article
Genetic algorithms
|
https://en.wikipedia.org/wiki/Stark%20Raving%20Dad
|
"Stark Raving Dad" is the first episode of the third season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on September 19, 1991. In the episode, Homer is sent to a mental institution for wearing a pink shirt to work, where he shares a room with a man who claims to be pop star Michael Jackson. Meanwhile, Bart promises his sister Lisa he will get her the best birthday present ever.
The episode was written by Al Jean and Mike Reiss, and directed by Rich Moore. Michael Jackson guest-starred as Leon Kompowsky, but went uncredited for contractual reasons; his role was not confirmed until later. Jackson was a fan of the show and called creator Matt Groening offering to do a guest spot. Jackson pitched several story ideas and wrote the song "Happy Birthday Lisa" for the episode.
The character's singing voice was performed by a soundalike, Kipp Lennon, due to contractual obligations Jackson had with his record company. The episode references Jackson's career, with Kompowsky singing portions of the songs "Billie Jean" and "Ben".
"Stark Raving Dad" received generally positive reviews, particularly for its writing and Jackson's performance. A sequel in which Kompowsky would have been voiced by Prince was canceled after Prince refused the script.
A 1992 rerun featured an alternative opening in response to a speech by President George H. W. Bush, in which he said American households should "be a lot more like the Waltons and a lot less like the Simpsons". In March 2019, shortly before the Disney–Fox deal was finalized, following renewed allegations of sexual abuse against Jackson, the episode was pulled from circulation. As a result, the episode is unavailable on Disney+ and the post-2019 re-releases of the season 3 DVD, but is still present on Google Play and the official YouTube listing.
Plot
Lisa reminds Bart that he forgets her birthday every year, so he promises to get her a present for her eighth birthday. Meanwhile, Homer panics after seeing that all his white work shirts are dyed pink after Bart tossed his lucky red hat into the laundry. He is forced to wear a pink shirt to work, where Mr. Burns suspects his attire reveals he is a "free-thinking anarchist".
Homer is sent home with a psychiatric quiz to allow Dr. Marvin Monroe to assess his sanity, but Homer makes Bart complete the quiz because he is too lazy to do it himself. Bart ticks "yes" to all the questions, which ask if Homer hears voices, is quick to anger, or wets his pants. When Burns and Monroe see the results, they send Homer to a mental institution, where he is committed after an inkblot test image that resembles Bart triggers his temper.
Homer is put in a cell with a large white man who introduces himself as Michael Jackson. Being unfamiliar with the real Michael Jackson, Homer believes and quickly befriends him. Marge visits Homer at the mental hospital and convinces his doctors that he is not insane when they r
|
https://en.wikipedia.org/wiki/Marching%20squares
|
In computer graphics, marching squares is an algorithm that generates contours for a two-dimensional scalar field (rectangular array of individual numerical values). A similar method can be used to contour 2D triangle meshes.
The contours can be of two kinds:
Isolines – lines following a single data level, or isovalue.
Isobands – filled areas between isolines.
Typical applications include the contour lines on topographic maps or the generation of isobars for weather maps.
Marching squares takes a similar approach to the 3D marching cubes algorithm:
Process each cell in the grid independently.
Calculate a cell index using comparisons of the contour level(s) with the data values at the cell corners.
Use a pre-built lookup table, keyed on the cell index, to describe the output geometry for the cell.
Apply linear interpolation along the boundaries of the cell to calculate the exact contour position.
Basic algorithm
Here are the steps of the algorithm:
Apply a threshold to the 2D field to make a binary image containing:
1 where the data value is above the isovalue
0 where the data value is below the isovalue
Every 2x2 block of pixels in the binary image forms a contouring cell, so the whole image is represented by a grid of such cells (shown in green in the picture below). Note that this contouring grid is one cell smaller in each direction than the original 2D field.
For each cell in the contouring grid:
Compose the 4 bits at the corners of the cell to build a binary index: walk around the cell in a clockwise direction appending the bit to the index, using bitwise OR and left-shift, from most significant bit at the top left, to least significant bit at the bottom left. The resulting 4-bit index can have 16 possible values in the range 0–15.
Use the cell index to access a pre-built lookup table with 16 entries listing the edges needed to represent the cell (shown in the lower right part of the picture below).
Apply linear interpolation between the original field data values to find the exact position of the contour line along the edges of the cell.
Disambiguation of saddle points
The contour is ambiguous at saddle points. It is possible to resolve the ambiguity by using the average data value for the center of the cell to choose between different connections of the interpolated points (four images in bottom-right corner):
Isobands
A similar algorithm can be created for filled contour bands within upper and lower threshold values:
Contouring triangle meshes
The same basic algorithm can be applied to triangular meshes, which consist of connected triangles with data assigned to the vertices. For example, a scattered set of data points could be connected with a Delaunay triangulation to allow the data field to be contoured.
A triangular cell is always planar, because it is a 2-simplex (i.e. specified by n+1 vertices in an n-dimensional space). There is always a unique linear interpolant across a triangle, and no possibility of an
|
https://en.wikipedia.org/wiki/Ananova
|
Ananova was a web-oriented news service that originally featured a computer-simulated newscaster named Ananova programmed to read newscasts to users 24 hours a day. Ananova became a subsidiary of mobile telecommunication operator Orange S.A., after it was purchased from the Press Association (PA) in a £95m deal in 2000, after which it was merged into the Orange main news site. The character Ananova was retired in 2004, but the website continued to provide written news articles until 2009.
History
Ananova was developed by a division of the Press Association, a United Kingdom news agency. The character was devised as a virtual news presenter who would read news stories on demand via computer or mobile phone. Ananova was launched in April 2000.
The Press Association soon renamed the division Ananova Ltd. and put the group up for sale. In July 2000, Ananova Ltd. was purchased by the French telecommunications company Orange S.A. as part of a £95m deal.
The animated Ananova character was unavailable from 2004, though the Ananova website was still operational and providing written news items until 2009. In April 2010, Orange decided to scrap the name Ananova. Users entering the site ananova.com are now redirected to a Web Hosting Service Directory. Between April 2010 and April 2015 Ananova was known as Orange News. The Orange version of the news service finished with the end of Orange on-line identity.
The Ananova news service was known for its collection of unusual news stories, which it featured in its Quirkies section.
The site was frequently referenced by Karl Pilkington during the Ricky Gervais Show.
Character
The character of Ananova was given a distinctive look and personality based on celebrities Victoria Beckham, Kylie Minogue, and Carol Vorderman. She appeared as a white female with a thin, toned body. Ananova sported short "unnaturally green" hair and was always seen in make-up. Her creators described her as a 28-year-old "girl about town" who stands at tall and loves the band Oasis and the TV show The Simpsons.
Ananova's creators stated the original incarnation of the character was a prototype, and in the future they intended "to allow every individual to customize Ananova, right down to age, race and gender." The character was launched in April 2000 from a press conference in London. A significant portion of Ananova's official website was dedicated to detailed fictions regarding the character's personality.
Speech synthesis
The speech synthesis used by Ananova was developed using patented methods that applied human inflections to extend the rVoice solution from Rhetorical Systems (now Nuance Communications).
See also
Kyoko Date
Mya (program)
T-Babe
References
Bibliography
External links
Article on Ananova in TheScreamOnline
American news websites
Orange S.A.
Internet properties established in 2000
Defunct websites
Internet properties disestablished in 2010
Fictional broadcasters
|
https://en.wikipedia.org/wiki/Kitchen%20Accomplished
|
Kitchen Accomplished is an American reality television series that aired on the Food Network in 2004.
Homeowners would send in videos of their kitchens that need renovating and the Food Network executives would choose one. It's then up to the series' SWAT team of Chef Cat Cora, design expert Wolfgang Schaber and contractor Peter Marr to remodel the chosen kitchen in 3 days time with cameras covering it. During the process of the remodel, the hosts would offer tips for designing your kitchen and Cat would show the recipients of the remodel some recipes that you would get to add to your collection. Finally, the homeowners would be blindfolded with kitchen towels for the big reveal of the remodeling job- of which, all were pleased with the end results.
As of December 2004, the show is no longer in production. It was produced by RIVR Media.
References
Food Network original programming
Home renovation television series
|
https://en.wikipedia.org/wiki/TinyXML
|
TinyXML is a small, simple, operating system-independent XML parser for the C++ language. It is free and open source software, distributed under the terms of the zlib License.
TinyXML-2 replaces TinyXML-1 completely and only this version should be used.
Features
The principal impetus for TinyXML is its size, as the name suggests. It parses the XML into a DOM-like tree. It can both read and write XML files.
Limitations
TinyXML does not process DTDs, either internal or external. So XML files that rely upon DTD-defined entities will not parse correctly in TinyXML.
Though it does handle processing instructions, it has no facilities for handling XSLT stylesheet declarations. That is, it does not apply an XSLT declared in a stylesheet processing instruction to the XML file when parsing it.
Further, TinyXML has no facility for handling XML namespaces. Qualified element or attribute names retain their prefixes, as TinyXML makes no effort to match the prefixes with namespaces.
In terms of encodings, it only handles files using UTF-8 or an unspecified form of ASCII similar to Latin-1.
References
External links
TinyXML1 Homepage
TinyXML2 Documentation
TinyXML2 Homepage
TinyXML++ which adds C++ concepts to TinyXML.
TinyXPath which adds XPath syntax decoding to TinyXML in C++.
Software using the zlib license
XML parsers
|
https://en.wikipedia.org/wiki/DRDA
|
Distributed Relational Database Architecture (DRDA) is a database interoperability standard from The Open Group.
DRDA describes the architecture for distributed relational databases. It defines the rules for accessing the distributed data, but it does not provide the actual application programming interfaces (APIs) to perform the access. It was first used in DB2 2.3.
DRDA was designed by a work group within IBM in the period 1988 to 1994. The messages, protocols, and structural components of DRDA are defined by the Distributed Data Management Architecture.
Components
Application Requester (AR). The AR accepts SQL requests from an application and sends them to the appropriate application servers for processing. Using this function, application programs can access remote data.
Application Server (AS). The AS receives requests from application requesters and processes them. The AS acts upon the portions that can be processed and forwards the remainder to database servers for subsequent processing. The AR and the AS communicate through a protocol called the Application Support Protocol which handles data representation conversion.
Database Server (DS). The DS receives requests from AS or other DS servers. The DS supports distributed requests and will forward parts of the request to collaborating DS in order to fulfill the request. The AS and the DS among themselves communicate through a protocol called the Database Support Protocol.
Databases supporting DRDA
Apache Derby (Java RDBMS)
IBM Db2
Informix Dynamic Server v11.10
Oracle Database Gateway for DRDA - enables Oracle database to act as a DRDA client, accessing remote non-Oracle databases (primarily DB2)
Oracle Database Provider for DRDA - enables Oracle database to act as a DRDA server, providing Oracle database access to remote clients (e.g. IBM i systems using DB2/400 DRDA client library)
External links
The OpenGroup - DRDA Protocol description
Open Group standards
SQL data access
Application layer protocols
Database access protocols
|
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20TV5%20%28Philippine%20TV%20network%29
|
TV5 (also known as 5, and formerly known as ABC) is a Philippine free-to-air television and radio network owned by MediaQuest Holdings, a multimedia arm of Philippine-based telecommunications company PLDT. It is the flagship property of TV5 Network, Inc. Headquartered on TV5 Media Center, Reliance, Mandaluyong City, with its original studios and transmitter located in Novaliches, Quezon City. The following is a list of all television programming that TV5 is currently broadcasting since it began its television operations in 1992.
Current original programming
Note: Titles are listed in alphabetical order followed by the year of debut in parentheses.
Newscast
Drama
{| class="wikitable sortable" width="75%"
! style="width:55%;" | Title
! style="width:20%;" | Premiere
|-
| Minsan pa Natin Hagkan ang Nakaraan
| rowspan="2" | July 25, 2023
|-
| Nag-aapoy na Damdamin
|-
| Niña Niño
| April 5, 2021 (re-run)
|-
| Pira-Pirasong Paraiso| July 25, 2023
|-
| Wanted: Ang Serye| January 16, 2021 (re-run)
|-
| For The Love| August 5, 2023
|-
|}
Variety
Game
Talk
Comedy
Current affairs
Lifestyle
Current acquired programmingNote: Titles are listed in alphabetical order, followed by the year of debut in parentheses.
Local Drama
Local Variety
Local Game
Local Talk
Local Film presentation
Anime series
Cartoons
Film presentation
Foreign drama
Religious
Regional programming
News
Dateline TeleRadyo
Dateline Zamboanga
Frontline Eastern Visayas
Original/station-produced defunct programs
News5/TV5 News and Current Affairs
Newscast
Philippine election seriesAplikante sa Senado (2019)Balwarte (2013, 2019)Pagbabago 2010: The TV5 and PPCRV Presidential Debate (2010)Panahon Na! (2004)Puso sa Puso: Evangelical Presidential Forum (2010)
Current affairs programsAko Mismo (2010–2011)Ali! (2005–2007)Anggulo (2011–2012)Agenda with Cito Beltran (2019–2020)Astig (2010–2011, 2013–2014)The Big Story with Randy David (1992–1995)Bilang Pilipino (2016–present)Bigtime (2014)Crime Klasik (2013)The Chiefs (2019–2020, 2022, 2023)Dayo (2013–2014)Demolition Job (2013–2014)Dokumentado (2010–2011, 2012–2013)Dokyu (2005–2007)Frontlines (2006–2007)History with Lourd (2013–2016)I Am Ninoy (2008–2009)Idol In Action (2020–2021)INQ TV (2004–2005)Insider (2012)Journo (2010–2012)Morning Calls (2019–2020)Kalikasan Kalusugan Kabuhayan (2013)Kaya (2014–2016; 2017) Kontak 5 (1992–2000)Lente (1993–1996)Lupet (2010–2011)Metro (2006–2007)Mondo Manu (2011–2014)News5 Imbestigasyon (2012–2013)Numero (2013–2015)Panahon Na (2004)Panalo Ka 'Nay! (2018)Presinto 5 (2012–2013)The Probe Team Documentaries (2004–2005)Public Forum (1992–1994)Pulis! Pulis! (2008–2009)Reaksyon: Aplikante (2013)Real Stories kasama si Loren (2004–2007)Reaksyon (2012–2017)Rescue Mission (2008–2009)Rescue5 (2013)Rated Korina (co-production with ABS-CBN) (2020–present) S.O.S.: Stories of Survival (2005–2008)Take Out (2012–2014)Tech Trip (2010)That's My Job! (2008)Timbangan (2010)Tulong Ko, Pasa Mo (2017)Totoo TV (ABC
|
https://en.wikipedia.org/wiki/Clickradio
|
Clickradio was an internet startup whose flagship product was a radio program that sought to deliver uninterrupted and high quality music. Clickradio downloaded songs to the computer's hard drive, because high-quality audio streaming was not available at the time. Since the songs were downloaded to disk, users could listen while not connected to the Internet.
Service Offerings
Clickradio allowed users to rate songs and essentially create their own personalized radio station. Users had the ability to vote on the songs they heard. Choosing a "thumbs-up" would indicate they would hear the song more, and choosing "thumbs-down" meant they heard it less. Users also had the option to "skip it" in case they didn't want to listen to a particular song. Since it was free, five minutes of advertisements were set to occur for every hour of play time.
Users also could get information about the songs and artists that were currently playing, and even had the ability to purchase the album.
The music was encoded with the ePAC encoder from Lucent Technologies. Since it was directly downloaded to the user's PC, the music was encrypted to help protect it against Internet piracy.
Company history
In April 2000, the company received special attention from its deals made with Universal Music Group, as well as BMG Entertainment. In August 2000 they also signed with Warner Music Group. All of the (at the time) "big 5" music companies signed licensing deals with ClickRadio. The goal of Clickradio was to avoid any legal issues by signing with popular labels for their music.
The service launched in May 2000. The New York City company ceased operations in October 2001, having survived the Internet "bubble," but succumbing to the investment downturn in NYC that followed the September 11 attacks.
Clickradio was planning to switch to a subscription format instead of their previous free offering, and was planning a large relaunch of their site. That never happened, and the domain clickradio.com no longer exists.
References
External links
ClickRadio launch party
ZDnet.com: ClickRadio to put a DJ in your PC
Streamingmedia.com: More Options Ahead for Web Radio Fans
Digital Media Wire: Warner Music Grants License To Clickradio
Blackenterprise.com - A description of Clickradio's services and company
Lucent Technologies Licenses ePAC Music Coder to ClickRadio for Internet-Enhanced Digital Radio Service
Atnewyork.com: Clickradio Sidesteps Competition
Internetnews.com: Lucent Technologies Licenses Music Coder to ClickRadio
Funism.com: ClickRadio advertising
American music websites
Defunct software companies of the United States
Defunct companies based in New York City
Internet properties established in 2000
|
https://en.wikipedia.org/wiki/Kid%20Niki%3A%20Radical%20Ninja
|
Kid Niki: Radical Ninja, known in Japan as , is an arcade game developed and published by Irem in 1986, and was later published outside Japan by Data East in 1987. The arcade game runs on Irem-62 Hardware, the same as Kung Fu Master.
The differences between Kid Niki: Radical Ninja and Kaiketsu Yancha Maru are minimal. Aside from text translation, the most glaring difference is the main character's hair style. Kid Niki's hair is more "punk rock" with wild spikes and a ponytail in the back. Yancha Maru's hair has more subdued spikes and a topknot (or chonmage). In the arcade version of the game, the main character's keikogi is yellow while it is red in the home ports.
Plot
One day in Feudal Japan, Kid Niki, the most radical of ninjas, is training at his Ninja School. Suddenly, a passing bird is struck down by an arrow and lands at Niki's feet. Attached is a note explaining that Niki's girlfriend, Princess Margo, has been kidnapped by the evil Stone Wizard. With the cry of "Will help you!" Niki bursts through the wall of his school and sets off on his quest to save Margo.
Gameplay
Kid Niki is armed with the Spinning Sword, which according to the game's manual, "has been passed down from generation to generation from the School of Chirin".
In addition to the spinning sword, Kid Niki can gain extra offensive power by collecting Bells. The Golden Bell allows him to launch a projectile every time Kid Niki spins his sword, and the Silver Bell creates a spinning force field around him. Both of these power-ups last for a limited amount of time.
The game is divided up into seven rounds, with a boss character at the end of each one.
Ports
In 1987, Data East released ports of the game for the NES, Commodore 64, and Apple II. All home versions of the game show screen shots from the graphically superior arcade version on the back of their packages. Although it is an Irem game, the home ports were one of the more successful games released by Data East.
Reception
Computer Gaming World called Kid Niki "yet another in the seemingly endless parade of horizontally-scrolling/running/jumping/shooting games" for the NES. While the reviewer stated that those who enjoyed such games would like the game, he wondered "how many of these interchangeable games Nintendo will authorize. Even devotees must be getting tired".
Legacy
In Japan, two sequels appeared for the Famicom. The first was Kaiketsu Yanchamaru 2: Karakuri Land in 1991, and the second was Kaiketsu Yanchamaru 3 in 1993. Each of the three NES/Famicom titles feature radically different character designs.
There is a Game Boy sequel called Ganso!! Yanchamaru in 1991. This portable sequel is a unique game and not a port of one of the existing Kid Niki/Yanchamaru titles.
Kid Niki makes a cameo appearance in Irem's NES game Kickle Cubicle. To see Kid Niki, the player must hold down the A button on Controller 2, and then turn on the game. Then the player continues holding A until the title screen appears, and K
|
https://en.wikipedia.org/wiki/Degree%20of%20anonymity
|
In anonymity networks (e.g., Tor, Crowds, Mixmaster, I2P, etc.), it is important to be able to measure quantitatively the guarantee that is given to the system. The degree of anonymity is a device that was proposed at the 2002 Privacy Enhancing Technology (PET) conference. Two papers put forth the idea of using entropy as the basis for formally measuring anonymity: "Towards an Information Theoretic Metric for Anonymity", and "Towards Measuring Anonymity". The ideas presented are very similar with minor differences in the final definition of .
Background
Anonymity networks have been developed and many have introduced methods of proving the anonymity guarantees that are possible, originally with simple Chaum Mixes and Pool Mixes the size of the set of users was seen as the security that the system could provide to a user. This had a number of problems; intuitively if the network is international then it is unlikely that a message that contains only Urdu came from the United States, and vice versa. Information like this and via methods like the predecessor attack and intersection attack helps an attacker increase the probability that a user sent the message.
Example With Pool Mixes
As an example consider the network shown above, in here and are users (senders), , and are servers (receivers), the boxes are mixes, and , and where denotes the anonymity set. Now as there are pool mixes let the cap on the number of incoming messages to wait before sending be ; as such if , or is communicating with and receives a message then knows that it must have come from (as the links between the mixes can only have message at a time). This is in no way reflected in 's anonymity set, but should be taken into account in the analysis of the network.
Degree of Anonymity
The degree of anonymity takes into account the probability associated with each user, it begins by defining the entropy of the system (here is where the papers differ slightly but only with notation, we will use the notation from .):
,
where is the entropy of the network, is the number of nodes in the network, and is the probability associated with node .
Now the maximal entropy of a network occurs when there is uniform probability associated with each node and this yields .
The degree of anonymity (now the papers differ slightly in the definition here, defines a bounded degree where it is compared to and gives an unbounded definition—using the entropy directly, we will consider only the bounded case here) is defined as
.
Using this anonymity systems can be compared and evaluated using a quantitatively analysis.
Definition of Attacker
These papers also served to give concise definitions of an attacker:
Internal/External an internal attacker controls nodes in the network, whereas an external can only compromise communication channels between nodes.
Passive/Active an active attacker can add, remove, and modify any messages, whereas a passive attacker can only listen to
|
https://en.wikipedia.org/wiki/WCPX-TV
|
WCPX-TV (channel 38) is a television station in Chicago, Illinois, United States, broadcasting the Ion Television network. The station is owned and operated by the Ion Media subsidiary of the E. W. Scripps Company, and maintains offices on Des Plaines and Van Buren streets in the Chicago Loop; its transmitter is located atop the Willis Tower.
History
A construction permit
On October 10, 1964, the Chicago Federation of Labor, owner of WCFL (1000 AM, now WMVP), filed for a construction permit to build a new television station on channel 38 in Chicago. Approval was not granted until June 5, 1968. In the four years between application and construction, Field Communications changed its application for channel 38 to channel 32, while competing applicants included a group known as Chicagoland TV and the Warner Bros. film studio. Warner Bros. had dropped out by the time comparative hearings were held in mid-1966. Early progress was made when the antenna was placed atop the John Hancock Center in 1969, and plans for a general-entertainment independent station and studios were broadly laid out in 1970.
In late 1970, however, the Chicago Federation of Labor opted to sell the WCFL-TV construction permit to another Chicago company: Zenith Radio Corporation. Zenith had one reason for pursuing a TV station in Chicago: it had developed a system for subscription television over-the-air. It was not until 1971 that the transaction was filed with the Federal Communications Commission. The action had one vocal opponent: Chicagoland TV, which had lost in comparative hearing two years prior. When the deal was filed, Chicagoland TV petitioned to deny the transaction and asked for hearings to put its programming proposal against that of Zenith; they argued that subscription television would exclude poorer viewers, important to a group whose own programming plans were for a station targeted at Chicago's minority communities. The transaction lingered so long that Zenith opted out in 1973; it was the second such purchase where Zenith had backed out, after the company had also contracted to buy KWHY-TV in Los Angeles.
With Zenith out of the picture, Chicagoland TV continued to oppose extensions of the WCFL-TV construction permit. On November 18, 1974, the FCC dismissed the Chicago Federation of Labor's request for a time extension; the federation requested the application be reinstated in February 1975.
WCFC-TV, "Shining on Chicago"
Meanwhile, in 1971, Christian Communications of Chicagoland had been founded, when Pastor Owen C. Carr approached his church's board of directors with a desire to begin a Christian television station for the Chicago area. Carr's then-congregation, The Stone Church, raised $135,000 by the end of September 1973, at which point Christian Communications of Chicagoland was incorporated. The First National Bank of Evergreen Park financed $600,000 for the purchase of needed equipment and a studio. Beating out Chicago's city colleges, Christian Comm
|
https://en.wikipedia.org/wiki/Sentinel%20node
|
In computer programming, a sentinel node is a specifically designated node used with linked lists and trees as a traversal path terminator. This type of node does not hold or reference any data managed by the data structure.
Benefits
Sentinels are used as an alternative over using NULL as the path terminator in order to get one or more of the following benefits:
Marginally increased speed of operations
Increased data structure robustness (arguably)
Drawbacks
Marginally increased algorithmic complexity and code size.
If the data structure is accessed concurrently (which means that all nodes being accessed have to be protected at least for “read-only”), for a sentinel-based implementation the sentinel node has to be protected for “read-write” by a mutex. This extra mutex in quite a few use scenarios can cause severe performance degradation. One way to avoid it is to protect the list structure as a whole for “read-write”, whereas in the version with NULL it suffices to protect the data structure as a whole for “read-only” (if an update operation will not follow).
The sentinel concept is not useful for the recording of the data structure on disk.
Examples
Search in a linked list
Below are two versions of a subroutine (implemented in the C programming language) for looking up a given search key in a singly linked list. The first one uses the sentinel value NULL, and the second one a (pointer to the) sentinel node Sentinel, as the end-of-list indicator. The declarations of the singly linked list data structure and the outcomes of both subroutines are the same.
struct sll_node { // one node of the singly linked list
struct sll_node *next; // end-of-list indicator or -> next node
int key;
} sll, *first;
First version using NULL as an end-of-list indicator
// global initialization
first = NULL; // before the first insertion (not shown)
struct sll_node *Search(struct sll_node *first, int search_key) {
struct sll_node *node;
for (node = first;
node != NULL;
node = node->next)
{
if (node->key == search_key)
return node; // found
}
// search_key is not contained in the list:
return NULL;
}
The for-loop contains two tests (yellow lines) per iteration:
node != NULL;
if (node->key == search_key).
Second version using a sentinel node
The globally available pointer sentinel to the deliberately prepared data structure Sentinel is used as end-of-list indicator.
// global variable
sll_node Sentinel, *sentinel = &Sentinel;
// global initialization
sentinel->next = sentinel;
first = sentinel; // before the first insertion (not shown)
Note that the pointer sentinel has always to be kept at the end of the list.
This has to be maintained by the insert and delete functions. It is, however, about the same effort as when using a NULL pointer.
struct sll_node *SearchWithSenti
|
https://en.wikipedia.org/wiki/Phil%20Moorby
|
Phil Moorby () was a British engineer and computer scientist. Moorby was born and brought up in Birmingham, England, and studied Mathematics at Southampton University, England. Moorby received his master's degree in computer science from Manchester University, England, in 1974. He moved to the United States in 1983.
While working in Gateway Design Automation, in 1984 he invented the Verilog hardware description language, and developed the first and industry standard simulator Verilog-XL. In 1990 Gateway was purchased by Cadence Design Systems.
In 1997, Moorby joined startup company SynaPix, where he worked on match moving and video tracking algorithms for automatically extracting 3D models from video frames, using techniques such as optical flow, motion field and point clouds.
Moorby joined Co-Design Automation in 1999, and in 2002 he joined Synopsys to work on SystemVerilog verification language.
On October 10, 2005, Moorby became the recipient of the 2005 Phil Kaufman Award for his contributions to the EDA industry, specifically for development and popularization of Verilog, one of the world's most popular tools of electronic design automation.
In April 2016, Moorby was made a Fellow of the Computer History Museum, "for his invention and promotion of the Verilog hardware description language."
Philip Raymond Moorby passed away on September 15, 2022 at the age of 69 in Rockport, MA.
References
American computer scientists
Electronic design automation people
People associated with the Department of Computer Science, University of Manchester
Living people
Year of birth missing (living people)
|
https://en.wikipedia.org/wiki/New%20South%20Wales%20S%20set
|
The S sets were a class of electric multiple units that operated on Sydney's suburban rail network from 1972 up until 2019. Originally entering service under the Public Transport Commission, the sets also operated under the State Rail Authority, CityRail and Sydney Trains. Prior to their retirement, the S sets were the last class in the Sydney Trains fleet to not be air-conditioned, earning them the nicknames "Tin cans" and "Sweat Sets". They were also nicknamed "Ridgys" because of their fluted ("ridged") stainless steel panelling; they shared this nickname with similar looking K sets and C sets. The final sets were withdrawn from service in June 2019.
Delivery
Two manufacturers built 509 carriages, based on a largely common design:
359 carriages were built by Comeng between 1972 & 1980. They were externally distinguished by the peaked front of driving cars and a prominent line across each side of its carriages above the upper deck windows. They also had thin flutings at the top and upper half of the sides of the carriages.
The Series 1 Comeng power cars featured no fluting on the lower half of the carriage and one peaked front and rear end.
The Series 2/3 Comeng power cars featured fluting on the lower half of the carriage and one peaked front end. These two types were identical aesthetically.
The Series 4 Comeng power cars were identical to the Series 2/3 cars with headlights fitted above the destination box.
Cars D4011–D4020 featured the driver/guard window and vertical window close together with no pantograph. These carriages also lacked a driver/guard doors and had no destination boxes.
Cars D4021-D4095 featured the same as a Comeng power car with a driver/guard door with no pantograph. These cars had no destination boxes.
All 85 driving trailers were converted into trailer cars with the driving compartment, cab and guard instruments removed with head and tail lights plated over.
150 carriages built by A Goninan & Co between 1978 & 1980. They were externally distinguished by the flat front of driving cars and lower windows on the upper deck. They also had larger windows at the end between carriages. They also had thicker flutings at the top and around the top of the carriages and lacked the line around the top of the sides of the carriages unlike the Comeng carriages.
History
In service
Following the successful trial of four double-deck power cars built by Tulloch in 1968, 53 Series 1 power cars were ordered from Comeng and delivered in 1972–73. They were paired with 1965–67 Tulloch-built trailer carriages that had previously operated in company with single deck power cars. The first 39 were painted tuscan to match the trailer cars while the last 14 were painted in the newly introduced Public Transport Commission blue and white livery.From 1976, the blue and white livery was replaced by an Indian red livery. In 1979, painted Series 1 cars began to have their paint removed to match the Series 2 cars. Only seven were completed, and it
|
https://en.wikipedia.org/wiki/IEntertainment%20Network
|
IEntertainment Network (IENT, stylized as iEntertainment Network and formerly known as Interactive Magic, iMagic, and iMagiconline) is an American video game company founded by Bill Stealey, the co-founder and former CEO of MicroProse Software, in 1995. It is chiefly a developer and publisher of simulation computer games.
The company was noted for hiring many industry outsiders, i.e. skilled software engineers with no prior experience in making games. Interactive Magic went public in 1998 and was sold to a venture capitalist in 1999, when Bill Stealey left the company; Stealey returned in the early 2000s. The company has published Air Warrior II, Air Warrior III, American Civil War: From Sumter to Appomattox, Apache, Capitalism, Destiny: World Domination from Stone Age to Space Age, Fallen Haven, Hind, iF-22, iF/A-18E Carrier Strike Fighter, iM1A2 Abrams, Industry Giant, Knights and Merchants: The Shattered Kingdom, Liberation Day, North vs. South: The Great American Civil War, Seven Kingdoms, Spearhead, Star Rangers, Semper Fi, The Great Battles (series), Thunder Brigade, Vangers, War Inc., and WarBirds (series), among other titles.
References
External links
Video game companies established in 1995
Video game companies of the United States
Video game development companies
Video game publishers
|
https://en.wikipedia.org/wiki/Vang%20stone
|
Vang stone (Vangsteinen) listed as N 84 in Rundata is a runestone from the early eleventh century located at Vang in Oppland, Norway.
Description
The Vang stone was erected around 1000, during the transitional period from Paganism to Christianity in Norway. It was originally located in the traditional district of Valdres. It was situated outside a stave church at Vang. Vang Stave Church was dismantled and moved to Krummhübel, Germany in 1844. At that time, the runestone was moved to its current location, outside the Vang Church (Vang kirke).
The stone is made of an irregular slab of slate. It is 2.15m tall, up to 1.25m wide and 8–13 cm thick. The artwork on the front of the stone is in Ringerike style, and depicts ribbons, leaves and a stylized animal, allegedly a lion. Although thought to be a part of a stone portal, this idea is generally not supported. In contrast to other Viking Era runestones. The runic text is not integrated with the artwork to make a unified composition, but is carved along the edge of the stone.
Inscription
A transliteration of the runic inscription into Latin characters is:
kosa : sunir : ristu : s(t)in : þinsi : af(t)ir : kunar : bruþur:sun
Translations:
Norsk: "Gåsesønene reiste denne stein etter Gunnar, brorson sin."
English: "The Goose-sons raised this stone in memory of Gunnar, their nephew."
References
Other sources
Sawyer, Birgit (2003) The Viking-Age Rune-Stones: Custom and Commemoration in Early Medieval Scandinavia (Oxford University Press)
Stocklund, Marie; et al., eds. (2006) Runes and Their Secrets: Studies in Runology (Copenhagen: Museum Tusculanum Press)
Runestones in Norway
11th-century inscriptions
|
https://en.wikipedia.org/wiki/NWLink
|
NWLink is Microsoft's implementation of Novell's IPX/SPX protocols. NWLink includes an implementation of NetBIOS atop IPX/SPX.
NWLink packages data to be compatible with client/server services on NetWare Networks. However, NWLink does not provide access to NetWare File and Print Services. To access the File and Print Services the Client Service for NetWare needs to be installed.
NWLink connects NetWare servers through the Gateway Service for NetWare or Client Service for NetWare and provides the transport protocol that connects Windows operating systems to IPX/SPX NetWare networks and compatible operating systems. NWLink supports NetBIOS and Windows Sockets application programming interfaces (API).
NWLink protocols are as follows:
SPX/SPXII
IPX
Service Advertising Protocol (SAP)
Routing Information Protocol (RIP)
NetBIOS
Forwarder
NWLink also provides the following functionalities:
Runs other communication protocol stacks, such as Transmission Control Protocol/Internet Protocol (TCP/IP)
Uses multiple frame types for network adapter binding
Using NWLink IPX/SPX/NetBIOS
NWLink IPX/SPX/NetBIOS Compatible Transport is Microsoft's implementation of the Novell IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) protocol stack. The Windows XP implementation of the IPX/SPX protocol stack adds NetBIOS support.
The main function of NWLink is to act as a transport protocol to route packets through internetworks. By itself, the NWLink protocol does not allow you to access the data across the network. If you want to access NetWare File and Print Services, you must install NWLink and Client Services for NetWare (software that works at the upper layers of the OSI model to allow access to file and print services).
One advantage of using NWLink is that is easy to install and configure.
Configuring NWLink IPX/SPX
The only options that are configured for NWLink are the internal network number and the frame type. Normally, you leave both settings at their default values.
The internal network number is commonly used to identify NetWare file servers. It is also used when you are running File and Print Services for NetWare or using IPX routing.
The frame type specifies how the data is packaged for transmission over the network. If the computers that are using NWLink use different frame types, they are not able to communicate with each other. The default setting for frame type is Auto Detect, which will attempt to automatically choose a compatible frame type for your network. If you need to connect to servers that use various frame types, you should configure Manual Frame Type Detection, which will allow you to use a different frame type for each network.
References
Network protocols
Windows communication and services
Wikipedia articles that are too technical from May 2020
|
https://en.wikipedia.org/wiki/Jerry%20Hobbs
|
Jerry R. Hobbs (born January 25, 1942) is an American researcher in the fields of computational linguistics, discourse analysis, and artificial intelligence.
Education
Hobbs earned his doctor's degree from New York University in 1974 in computer science and has taught at Yale University and the City University of New York.
Career
From 1977 to 2002 he was with the Artificial Intelligence Center at SRI International, Menlo Park, California, where he was a principal scientist and program director of the Natural Language Program. He has written numerous papers in the areas of parsing, syntax, semantic interpretation, information extraction, knowledge representation, encoding commonsense knowledge, discourse analysis, the structure of conversation, and the Semantic Web.
He is the author of the book Literature and Cognition, and was also editor of the book Formal Theories of the Commonsense World. He led SRI's text-understanding research, and directed the development of the abduction-based TACITUS system for text understanding, and the FASTUS system for rapid extraction of information from text based on finite-state automata. The latter system constituted the basis for an SRI spinoff, Discern Communications. In September 2002 he took a position as senior computer scientist and research professor at the Information Sciences Institute, University of Southern California. He has been a consulting professor with the Linguistics Department and the Symbolic Systems Program at Stanford University.
He has served as general editor of the Ablex Series on Artificial Intelligence. He is a past president of the Association for Computational Linguistics, and is a Fellow of the American Association for Artificial Intelligence. In January 2003 he was awarded an honorary Doctorate of Philosophy from the University of Uppsala, Sweden. In August 2013 he received the Association for Computational Linguistics Lifetime Achievement Award.
Works
Literature and Cognition (Lecture Notes, Center for the Study of Language and Information, Jul 9, 1990)
Local Pragmatics (Technical note, SRI International, 1987)
Commonsense Metaphysics and Lexical Semantics (Technical note, SRI International, 1986)
An Algorithm for Generating Quantifier Scopings (Report, Center for the Study of Language and Information, 1986)
Formal Theories of the Commonsense World (Ablex Series in Artificial Intelligence, Vol. 1, Jun 1985, with Robert C. Moore)
On the Coherence and Structure of Discourse (Report, 1985)
The Coherence of Incoherent Discourse (Report, 1985)
Making Computational Sense of Montague's Intensional Logic (Courant computer science report, 1976)
A Metalanguage for Expressing Grammatical Restrictions in Nodal Spans Parsing of Natural Language (Courant computer science report, 1974)
References
External links
Jerry Hobbs ISI page
1942 births
Living people
20th-century American philosophers
Linguists from the United States
American cognitive scientists
Fellows of the As
|
https://en.wikipedia.org/wiki/OpenMG
|
OpenMG is a digital rights management (DRM) system developed by Sony for managing and protecting digital music data on a personal computer. It was originally designed for audio files in ATRAC3 format; the compliant software, e.g. Sony SonicStage, is usually capable of transcoding MP3 and WAV files to OpenMG/ATRAC3. The file extensions OpenMG-encrypted files use are and .
Sister technologies OpenMG Light (for mobile devices) and OpenMG X were also created.
Development
OpenMG was created alongside MagicGate in an effort to protect digital music copyright. It was released alongside the Memory Stick Walkman and VAIO Music Clip. It is compliant with the Secure Digital Music Initiative (SDMI) version 1.0 industry group specification formed in February 1999.
There has been at least one reported case when a security update of Windows XP and Windows 2000 broke OpenMG-compliant software. This issue was later resolved.
Method
Audio files encrypted using OpenMG cannot be played on another computer. OpenMG consists of a "check-in" and "check-out" system, whereby a music file can be transferred from a computer to up to three portable devices. It cannot be transferred to a fourth, unless at least one of the other three devices gets checked back in to the computer.
Compatible software
OpenMG Jukebox
SonicStage
MAGIQLIP2
BeatJam
Connect Player
x-app
VAIO Media
The compliant music organization systems work by "checking out" and "checking in" the files to/from portable players, keeping only one copy unlocked in order to hinder proliferation of copies.
SonicStage 3.4 includes an option to remove DRM from one's entire media library, allowing unrestricted use. However, this feature is disabled for copies without a license.
Criticisms of OpenMG
The 'checking in' and 'checking out' of files can be cumbersome and risky in comparison with unprotected data. Side effects include user complaints of being locked out of their own original recordings, unable to transfer them to the computer. With some Sony portable audio players it is not possible to directly drag and drop the desired tracks to the device's visible directory. With the combination of OpenMG with MagicGate, Sony intends to restrict the files to be only moved instead of copied, artificially emulating the restrictions of physical objects. However, as of the most recent releases of Sonicstage, files can be "checked out" of the library an unlimited number of times to a portable device, without the need to "check in" any of them. There has been anecdotal evidence that OpenMG modules tend to "choke" reading corrupted MP3 ID3 tags.
A Wall Street Journal article that reviewed the Sony VAIO Music Clip player in 2000 noted that the OpenMG and MagicGate technologies "treats users like criminals".
Notes
External links
ATRAC
Digital rights management systems
|
https://en.wikipedia.org/wiki/Semantic%20resolution%20tree
|
A semantic resolution tree is a tree used for the definition of the semantics of a programming language. They have often been used as a theoretical tool for showing the unsatisfiability of clauses in first-order predicate logic.
References
Trees (data structures)
|
https://en.wikipedia.org/wiki/Frankfurt%20Radio%20Symphony
|
The Frankfurt Radio Symphony () is the radio orchestra of Hessischer Rundfunk, the public broadcasting network of the German state of Hesse. From 1929 to 1950 it was named Frankfurter Rundfunk-Symphonie-Orchester. From 1950 to 1971 the orchestra was named Sinfonie-Orchester des Hessischen Rundfunks, from then to 2005 Radio-Sinfonie-Orchester Frankfurt. Prior to 2015, the English translation Frankfurt Radio Symphony Orchestra was used for international tours.
The orchestra's range of musical styles includes the classical-romantic repertoire, discoveries in experimental new music, concerts for children and young people and demanding programming concepts.
History
Hans Rosbaud, its first conductor, put his stamp on the orchestra's orientation up to the year 1937 by focusing not only on traditional music but also contemporary compositions. Lindbergh's Flight was a piece of music specially commissioned for Radio performed by the orchestra with a text by Bertolt Brecht and music by Paul Hindemith and Kurt Weill and produced by Ernst Hardt.
After World War II, Kurt Schröder and Winfried Zillig committed themselves to rebuilding the orchestra and a broad musical repertoire. Dean Dixon and Eliahu Inbal turned the ensemble into an internationally acclaimed orchestra in the three decades from 1961 to 1990. The status of the orchestra has been repeatedly confirmed, especially during the "Inbal Era", with guest appearances around the world and major editions of recorded music, such as the very first recordings of the original versions of Anton Bruckner's Third, Fourth and Eighth Symphonies, awarded the Grand Prix du Disque, and the first digital recording of all of Gustav Mahler's symphonies, which won the Deutscher Schallplattenpreis (German Record Award) in 1988. Inbal, who was chief conductor from 1974 to 1990, has been elected its conductor laureate since 1996.
From 1990 to 1996, Dmitri Kitajenko was chief conductor of the Frankfurt Radio Symphony Orchestra. His work focused on the German and Russian traditions, as well as modern styles. The piano concertos of Sergei Prokofiev, with Vladimir Krainev, and a series of works by Alexander Scriabin are but two of his projects documented on CD. Under Kitajenko, the Frankfurt Radio Symphony took extensive tours to such places as South America, Switzerland, the United States, and Japan. Under the baton of Cristóbal Halffter, a CD project of his complete orchestral works was begun, as was a series of the orchestral works of the Second Viennese School in conjunction with the symphonies of Robert Schumann and Brahms with Inbal. Arnold Schoenberg's one-act opera, Von heute auf morgen (From one day to the next), with Michael Gielen, was released as a film by Jean-Marie Straub and Danièle Huillet and on CD.
The American conductor Hugh Wolff was chief conductor of the Frankfurt Radio Symphony Orchestra from 1997 to 2006. "Flexibility" and "variety" were two important themes in his work with the orchestra. Wolff a
|
https://en.wikipedia.org/wiki/Substring%20index
|
In computer science, a substring index is a data structure which gives substring search in a text or text collection in sublinear time. If you have a document of length , or a set of documents of total length , you can locate all occurrences of a pattern in time. (See Big O notation.)
The phrase full-text index is also often used for an index of all substrings of a text. But this is ambiguous, as it is also used for regular word indexes such as inverted files and document retrieval. See full text search.
Substring indexes include:
Suffix tree
Suffix array
N-gram index, an inverted file for all N-grams of the text
Compressed suffix array
FM-index
LZ-index
References
Algorithms on strings
String data structures
Database index techniques
|
https://en.wikipedia.org/wiki/Ignatius%20Park%20College
|
Ignatius Park College is an independent Catholic secondary school for boys, located in Townsville, Queensland, Australia. The school is affiliated with Edmund Rice Education Australia network that operates under the direction of the Congregation of Christian Brothers. The school was established in 1969 at its current location in Cranbrook, though it was built as a successor school to Our Lady's Mount, the former Catholic boys' secondary that was located in Stanton Hill. The college has a student population of 1000 boys from Years 7 to 12.
House system
Like many other Australian high schools, Ignatius Park is built upon a system of seven houses, with the introduction of the Putney House (named after Michael Putney) in 2014. Each house has one class per year level, which is divided into two separate homerooms from Year 7 through to Year 10, and combines as one through Year 12. These houses are the Baillie House, Carew House, Nolan House, Putney House, Reid House, Rice House and Treacy House.
Facilities
Ignatius Park College has over 40 pianos and 20 guitars, with the combined music room worth around $100,000. It has around ten computer labs for student use. The Edmund Rice Hall is used for assemblies, special events and community use. Ignatius Park is one of a handful of schools in Queensland with a 50-metre Olympic swimming pool.
Rugby league
Ignatius Park's rugby league program is offered from U/13s through to the First XIII with around 300 students involved in teams.
Notable alumni
Tom Chester – professional rugby league player for the North Queensland Cowboys
Jason Clarke – actor, known for his work in Terminator Genisys and Dawn of the Planet of the Apes
Kyle Feldt – professional rugby league player for the North Queensland Cowboys
Aidan Guerra – professional rugby league player for the Sydney Roosters
Coen Hess – professional rugby league player for the North Queensland Cowboys and the Queensland Maroons
Valentine Holmes – professional rugby league player for the Cronulla-Sutherland Sharks and the Queensland Maroons
Corey Jensen – professional rugby league player for the Brisbane Broncos
Patrick Kaufusi – professional rugby league player for the North Queensland Cowboys
Joe Kelly – politician; Member for Greenslopes (Labor), Deputy Speaker of the Legislative Assembly
Anthony Mitchell – professional rugby league player for the North Queensland Cowboys
Michael Morgan – professional rugby league player for the North Queensland Cowboys and the Queensland Maroons
Kayln Ponga – professional rugby league player for the Newcastle Knights and the Queensland Maroons
Scott Prince – professional rugby league player for the Gold Coast Titans
See also
List of schools in Queensland
Catholic education in Australia
References
Congregation of Christian Brothers secondary schools in Australia
Educational institutions established in 1969
Catholic secondary schools in Queensland
Schools in Townsville
1969 establishments in Australia
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.