source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Great%20Wave%20Software
Great Wave Software was an educational computer software company founded in 1984 by Dr. Chad Mitchell and Stacy Mitchell and was located in Scotts Valley, California. It was a division of Instructional Fair Group, which was based in Grand Rapids, Michigan, and was a Tribune Education company. Products produced by Great Wave included: NumberMaze NumberMaze Challenge ReadingMaze KidsMath KidsTime Deluxe Reading Mansion World Discovery Deluxe World Discovery ConcertWare Prairie Explorer: Biomes of North America (Eddie Award Winner) Redwoods Explorer: Biomes of North America Axel's Whirled Math DaisyQuest & Daisy's Castle McGraw-Hill Children's Publishing (now part of School Specialty Publishing) bought Great Wave Software, and the company no longer exists. All of Great Wave Software's products are out of print. School Specialty Publishing was later bought by Carson Dellosa publishing. References External links Great Wave Software(archive) Defunct educational software companies Defunct software companies of the United States Software companies based in the San Francisco Bay Area Companies based in Santa Cruz County, California Software companies established in 1984 1984 establishments in California Defunct companies based in the San Francisco Bay Area
https://en.wikipedia.org/wiki/John%20Robert%20Anderson%20%28psychologist%29
John Robert Anderson (born August 27, 1947) is a Canadian-born American psychologist. He is currently professor of Psychology and Computer Science at Carnegie Mellon University. Biography Anderson obtained a B.A. from the University of British Columbia in 1968, and a Ph.D. in Psychology from Stanford in 1972. He became an assistant professor at Yale in 1972. He moved to the University of Michigan in 1973 as a Junior Fellow (and married Lynne Reder who was a graduate student there) and returned to Yale in 1976 with tenure. He was promoted to full professor at Yale in 1977 but moved to Carnegie Mellon University in 1978. From 1988 to 1989, he served as president of the Cognitive Science Society. He was elected to the American Academy of Arts and Sciences and the National Academy of Sciences and has received a series of awards: 1968: Governor General's Gold Medal: Graduated as top student in Arts and Sciences at University of British Columbia 1978: Early Career Award of the American Psychological Association 1989–1994: Research Scientist Award, NIMH 1994: American Psychological Association's Distinguished Scientific Career Award 1999: Elected to the National Academy of Sciences 1999: Fellow of American Academy of Arts and Sciences 2004: The David E. Rumelhart Prize, for Contributions to the Formal Analysis of Human Cognition 2005: Howard Crosby Warren Medal for outstanding achievement in Experimental Psychology in the United States and Canada, Society of Experimental Psychology 2006: Inaugural Dr. A.H. Heineken Prize for Cognitive Science awarded by the Royal Netherlands Academy of Arts and Sciences 2011: Benjamin Franklin Medal in Computer and Cognitive Science, Franklin Institute "for the development of the first large-scale computational theory of the process by which humans perceive, learn and reason, and its application to computer tutoring systems." 2016: Atkinson Prize from the National Academy of Sciences. Research In cognitive psychology, John Anderson is widely known for his cognitive architecture ACT-R and rational analysis. He has published many papers on cognitive psychology, including recent criticism of unjustified claims in mathematics education that lack experimental warrant and sometimes (in extreme cases) contradict known findings in cognitive psychology. He was also an early leader in research on intelligent tutoring systems, such as cognitive tutors, and many of Anderson's former students, such as Kenneth Koedinger and Neil Heffernan, have become leaders in that area. Intelligent tutoring systems Anderson's research has used fMRI brain imaging to study how students learn with intelligent tutoring systems. Most of his studies have looked at neural processes of students while they are solving algebraic equations or proofs. Anderson and colleagues generated a cognitive model that predicted that while students were learning an algebra proof, neuroimages showed decreased activation in a lateral inferior prefron
https://en.wikipedia.org/wiki/Pilot%20%28Desperate%20Housewives%29
"Pilot" is the first episode of the American dramedy-mystery series Desperate Housewives. It premiered on October 3, 2004, on the ABC network. It was written by series creator Marc Cherry and directed by Charles McDougall. The pilot introduces the residents of the suburban neighborhood of Wisteria Lane. Following the suicide of an outwardly successful neighbor, her friends begin to deal with the problems in their personal lives. Susan Mayer (Teri Hatcher) competes for the attention of a new plumber who has moved across the street; Bree Van de Kamp (Marcia Cross) struggles with her failing marriage and ungrateful family; Gabrielle Solis (Eva Longoria) continues an affair with her sixteen-year-old gardener; and Lynette Scavo (Felicity Huffman) copes with life as a stay-at-home mother of four. Cherry conceived the idea for the series while watching coverage of the Andrea Yates murder trials, and was fascinated by how women lead lives of quiet desperation. He began writing the script in 2002 and pitched it to several networks throughout the following year. In October 2003, ABC announced that it had picked up the pilot. Casting began in February 2004 and filming took place the following month primarily on the Colonial Street backlot set at Universal Studios. According to Nielsen ratings, the episode was watched by 21.6 million viewers on its original American broadcast, becoming the most-watched program of the week. The pilot received extremely positive reviews, with critics complimenting the series' tonal diversity. The cast, particularly the four leads and Sheridan, also received praise. The episode won various awards, including three Emmys. Plot Desperate Housewives focuses on the lives of several residents of the fictitious street of Wisteria Lane. The suburban neighborhood is shocked by the suicide of Mary Alice Young (Brenda Strong), who seems to have led an ideal domestic life. Mary Alice's close friends, Susan Mayer (Teri Hatcher), Lynette Scavo (Felicity Huffman), Bree Van de Kamp (Marcia Cross), and Gabrielle Solis (Eva Longoria), struggle to come to terms with the news. Later, Mary Alice's son, Zach (Cody Kasch), awakens in the middle of the night to find his father, Paul (Mark Moses), unearthing a mysterious chest from the drained swimming pool in their backyard. Susan, a divorced mother, takes interest in Mike Delfino (James Denton), a plumber who has recently moved to Wisteria Lane; however, she faces competition with neighbor Edie Britt (Nicollette Sheridan), a promiscuous serial divorcée. Suspicious that Mike is spending the night with Edie, Susan enters Edie's home uninvited with the pretense of borrowing sugar. While inside, she accidentally knocks over a candle, which sets fire to the entire house. Susan flees the scene, leaving behind her glass measuring cup. Though wracked with guilt, Susan is relieved to learn that Mike was not the man with whom Edie was fornicating. Meanwhile, Lynette, a former career woman, is frustrated wit
https://en.wikipedia.org/wiki/Offset%20%28computer%20science%29
In computer science, an offset within an array or other data structure object is an integer indicating the distance (displacement) between the beginning of the object and a given element or point, presumably within the same object. The concept of a distance is valid only if all elements of the object are of the same size (typically given in bytes or words). For example, if A is an array of characters containing "abcdef", the fourth element containing the character 'd' has an offset of three from the start of A. In assembly language In computer engineering and low-level programming (such as assembly language), an offset usually denotes the number of address locations added to a base address in order to get to a specific absolute address. In this (original) meaning of offset, only the basic address unit, usually the 8-bit byte, is used to specify the offset's size. In this context an offset is sometimes called a relative address. In IBM System/360 instructions, a 12-bit offset embedded within certain instructions provided a range of between 0 and 4096 bytes. For example, within an unconditional branch instruction (X'47F0Fxxx'), the xxx 12bit hexadecimal offset provided the byte offset from the base register (15) to branch to. An odd offset would cause a program check (unless the base register itself also contained an odd address)—since instructions had to be aligned on half-word boundaries to execute without a program or hardware interrupt. The previous example describes an indirect way to address to a memory location in the format of segment:offset. For example, assume we want to refer to memory location 0xF867. One way this can be accomplished is by first defining a segment with beginning address 0xF000, and then defining an offset of 0x0867. Further, we are also allowed to shift the hexadecimal segment to reach the final absolute memory address. One thing to note here is that we can reach our final absolute address in many ways. An offset is not always relative to the base address of the module, for example: If you have a class (GUI) and you want to retrieve the "color" attribute of this class, the offset may be 0x0100, but this offset has to be added to the offset of the class itself, not the base address. If the class's offset is 0xFF881 and the base address is 0x0A100, then to retrieve the "color" attribute both offsets are added to the base address. 0x0A100 (base) + 0xFF881 (class) + 0x0100 (attribute). Ultimately the attribute's address will be 0x109A81. A collection of offsets added together is known as a computer programming. See also Array Index Computer memory
https://en.wikipedia.org/wiki/Text%20processing
In computing, the term text processing refers to the theory and practice of automating the creation or manipulation of electronic text. Text usually refers to all the alphanumeric characters specified on the keyboard of the person engaging the practice, but in general text means the abstraction layer immediately above the standard character encoding of the target text. The term processing refers to automated (or mechanized) processing, as opposed to the same manipulation done manually. Text processing involves computer commands which invoke content, content changes, and cursor movement, for example to search and replace format generate a processed report of the content of, or filter a file or report of a text file. The text processing of a regular expression is a virtual editing machine, having a primitive programming language that has named registers (identifiers), and named positions in the sequence of characters comprising the text. Using these, the "text processor" can, for example, mark a region of text, and then move it. The text processing of a utility is a filter program, or filter. These two mechanisms comprise text processing. Definition Since the standardized markup such as ANSI escape codes are generally invisible to the editor, they comprise a set of transitory properties that become at times indistinguishable from word processing. But the definite distinctions from word processing are that text processing proper: represents "text processing utilities", not just "text editing" applications. is much more "the keyboard way", as opposed to "the mouse way" (e.g. drag and drop, cut and paste) of initiating an edit. is sequential access rather than random access in approach. operates directly at the presentation layer rather than indirectly at the application layer. works raw data that is standardized and works more openly rather than tending towards any proprietary methods. In this way markup such as font and color are not really a distinguishing factor, because the character sequences that affect font and color are simply standard characters inserted automatically by a background text processing mode, made to work transparently by compliant text editors, yet becoming otherwise visible as text processing commands when that mode is not in effect. So text processing is defined most basically (but not entirely) around the visual characters (or graphemes) rather than the standard, yet invisible characters. History The development of computer text processing started in earnest with Kleene's formalizing what is a regular language. Such regular expressions could then become a mini-program, complete with a compilation process, available to perform any edit, once that language was extended. Similarly, filters are extended by evolving particular options. Basic concepts An editor essentially invokes an input stream and directs it to the text processing environment, which is either a command shell or a text editor. The resulting outp
https://en.wikipedia.org/wiki/SINIX
SINIX is a discontinued variant of the Unix operating system from Siemens Nixdorf Informationssysteme. SINIX supersedes SIRM OS and Pyramid Technology's DC/OSx. Following X/Open's acceptance that its requirements for the use of the UNIX trademark were met, version 5.44 and subsequent releases were published as Reliant UNIX by Fujitsu Siemens Computers. Features In some versions of SINIX (5.2x) the user could emulate the behaviour of a number of different versions of Unix (known as universes). These included System V.3, System III or BSD. Each universe had its own command set, libraries and header files. Xenix-based SINIX The original SINIX was a modified version of Xenix and ran on Intel 80186 processors. For some years Siemens used the NSC-32x32 (up to Sinix 5.2x) and Intel 80486 CPUs (Sinix 5.4x - non MIPS) in their MX-Series. System V-based SINIX Later versions of SINIX based on System V were designed for the: SNI RM-200, RM-300, RM-400 and RM-600 servers running on the MIPS processor (SINIX-N, SINIX-O, SINIX-P, SINIX-Y) SNI PC-MX2, MX300-05/-10/-15/-30, Siemens MX500-75/-85 running NS320xx (SINIX-H) PC-MXi, MX300-45 on the Intel X86 processor (SINIX-L) SNI WX-200 and other IBM-compatible i386 PCs on the Intel 80386 and newer processors (SINIX-Z) The last release under the SINIX name was version 5.43 in 1995. Reliant UNIX The last Reliant UNIX versions were registered as UNIX 95 compliant (XPG4 hard branding). The last release of Reliant UNIX was version 5.45. See also BS2000 VM2000 External links Siemens Business Services - SINIX patches and support The SINIX operating system Sven Mascheck, SINIX V5.20 Universes MIPS operating systems UNIX System V
https://en.wikipedia.org/wiki/Dtlogin
dtlogin is a display manager for the X Window System. It is typically found on Unix and Unix-like computer systems running The Open Group's Common Desktop Environment (CDE) desktop environment. It allows users to log into a local system; it can also handle remote XDMCP requests. This is still the default display manager for Solaris 10 even though CDE is no longer the default desktop environment, having been replaced by the Java Desktop System, a modification of GNOME. It can also start other environments like KDE, Xfce or Window Maker. See also Other X display managers References X display managers
https://en.wikipedia.org/wiki/Romanian%20Canadians
Romanian Canadians are Canadian citizens of Romanian descent or Romania-born people who reside in Canada. According to the Canadian Census data of 2021, there are 215,885 Romanian-Canadians. History of Romanian migration in Canada Before World War I Romanians moved to Canada in several periods. The first period was at the end of the 19th century and the beginning of the 20th century. Romanians had discovered Canada towards the end of the 19th century, after Clifford Sifton – Minister of Home Affairs representing a Liberal government that had promised to populate the West – had visited Bukovina. From 1896 to 1900, a group of Romanians established themselves in Assiniboia (now Saskatchewan), at Clifford Sifton's advice. The first two Romanian families that migrated to Canada from the Bukovina village of Boian stopped in Alberta in 1898. Other 100 Bucovina families took their example and followed them and they gave the settlement the name of their home village. At the end of the 19th century and the beginning of the 20th century, many Romanians from the former Austro-Hungarian Empire (Transylvania, Bukovina, Banat, Crişana, and Maramureş) migrated to the Prairie provinces of Canada to work as farmers. The Dominion Lands Act encouraged homesteaders to come to the area. The migrants from the Romanian Old Kingdom were mostly Romanian Jews. Many Romanians moved to Canada and the United States between 1895 and 1920. St Nicholas's Romanian Orthodox Church (established in 1902 in Regina) is the oldest Romanian Orthodox parish in North America; St George's Cathedral (founded in 1914 though the present building dates from the early 1960s), is the episcopal seat of the Romanian Orthodox Bishop of Regina. Today, the Romanian school from Boian, Alberta is a museum showcasing Romanian immigration, photos of the first Romanian settlers in the area and the typical Romanian farmer's life in rural Canada. During the interwar period the number of ethnic Romanians who migrated to Canada decreased as a consequence of the economic development in Romania, but the number of Romanian Jews who migrated to Canada increased, mostly after the rise of the Iron Guard. According to Canada 1911 Census, in Canada lived 15,000 Romanians and in 1941: 25,000. After World War II The second period was between 1945 and 1955, when Romanians moved after World War II, during Communist Romania, at a time when Romania was in a difficult period in its history. In this period, 1,460,000 Romanian citizens left their country. Many of them were political refugees. Many of them left for Canada. Post-communism Another wave of Romanian emigration to Canada occurred after 1989 following the Romanian Revolution of 1989, when people obtained the right to leave Romania subsequent to the fall of Communism in Central and Eastern Europe. The wave intensified after the Mineriad of 13–15 June 1990. After 1998, for the fourth time, a large number of Romanians were leaving Europe to come to Canada.
https://en.wikipedia.org/wiki/VA10
VA-10 has the following meanings: Attack Squadron 10 (U.S. Navy) State Route 10 (Virginia) Virginia's 10th congressional district VAIO, a brand of computer products.
https://en.wikipedia.org/wiki/Eurodad
Eurodad (European Network on Debt and Development) is a network of 53 non-governmental organisations and seven statutory allies from 29 European countries. Eurodad and its members make up a network, this network researches and works on issues that are related to debt, development finance and poverty reduction. Recently this network has focussed on issues such as tracking the aid spent by European countries, multilateral debt cancellation, debt sustainability, aid quality, conditionality and harmonisation, illegitimate debt, and export credit debts. Eurodad's main targets are organisations such as the World Bank, the International Monetary Fund (IMF), the Organisation for Economic Co-operation and Development, however it also targets European governments themselves. Eurodad’s stated aims are to: push for development policies that support pro-poor and democratically defined sustainable development strategies. support the empowerment of Southern people to chart their own path towards development and ending poverty. seek a lasting and sustainable solution to the debt crisis, appropriate development financing, and a stable international financial system conducive to development. Eurodad coordinates the work of non-governmental organisations working on these issues, and collaborates actively with civil society in the North and South to attain these goals. Eurodad has existed since 1990 and is registered as a non-profit organisation in both the Netherlands and Belgium. It is funded by its members (about one-third of its budget) and by the Dutch Ministry of Foreign Affairs, Swedish International Development Cooperation Agency and UK Department for International Development. The members in the UK include CAFOD, Oxfam, Christian Aid, Tearfund and the World Development Movement. Illicit capital flight Eurodad has focused a lot of attention on the issue of illicit capital flight (or illicit financial flows) in their campaign to promote economic development in the developing world. As such, they've become a coordinating committee member of the Task Force on Financial Integrity & Economic Development, a coalition of NGOs and governments working to promote transparency in the international financial system. The problem of Illicit capital flight is aggravated by the fact that it is not exactly illegal and it assumes the informal unofficial economic activities of organizations. It aims to "get around rules and processes typically not using money but favors, privileges and perks as a means of exchange." In 2009, Eurodad published a limited-edition book called Global Development Finance: Illicit Flows Report 2009. The hundreds of pages, which were expected to contain comprehensive estimates of the illicit global financial flows, were all blank. According to the organization, this was to highlight a willful blindness on the part of world's most powerful institution to this transfer of wealth. This is underscored by the fact that more than 50 percent of
https://en.wikipedia.org/wiki/Lexer%20hack
In computer programming, the lexer hack is a common solution to the problems in parsing ANSI C, due to the reference grammar being context-sensitive. In C, classifying a sequence of characters as a variable name or a type name requires contextual information of the phrase structure, which prevents one from having a context-free lexer. Problem The problem is that in the following code, the lexical class of A cannot be determined without further contextual information: (A)*B This code could be multiplication of two variables, in which case A is a variable; written unambiguously: A * B Alternatively, it could be casting the dereferenced value of B to the type A, in which case A is a typedef name; written unambiguously: (A) (*B) In more detail, in a compiler, the lexer performs one of the earliest stages of converting the source code to a program. It scans the text to extract meaningful tokens, such as words, numbers, and strings. The parser analyzes sequences of tokens attempting to match them to syntax rules representing language structures, such as loops and variable declarations. A problem occurs here if a single sequence of tokens can ambiguously match more than one syntax rule. This ambiguity can happen in C if the lexer does not distinguish between variable and typedef identifiers. For example, in the C expression: (A) * B the lexer may find these tokens: left parenthesis identifier 'A' right parenthesis operator '*' identifier 'B' The problem is precisely that the lexical class of A cannot be determined without further context: the parser can interpret this as variable A multiplied by B or as type A casting the dereferenced value of B. This is known as the "typedef-name: identifier" problem, due to the name of the problematic production rule. The hack solution The solution generally consists of feeding information from the semantic symbol table back into the lexer. That is, rather than functioning as a pure one-way pipeline from the lexer to the parser, there is a backchannel from semantic analysis back to the lexer. This mixing of parsing and semantic analysis is generally regarded as inelegant, which is why it is called a "hack". Without added context, the lexer cannot distinguish type identifiers from other identifiers because all identifiers have the same format. With the hack in the above example, when the lexer finds the identifier A it should be able to classify the token as a type identifier. The rules of the language would be clarified by specifying that typecasts require a type identifier and the ambiguity disappears. The problem also exists in C++ and parsers can use the same hack. Alternative solutions This problem does not arise (and hence needs no "hack" in order to solve) when using lexerless parsing techniques, as these are intrinsically contextual. These are generally seen as less elegant designs, however, because they lack the modularity of having a concurrent lexer and parser in a pipeline. Some parser
https://en.wikipedia.org/wiki/Jeff%20Melman
Jeffrey L. Melman (born May 18, 1947) is an American television director and producer. Melman has directed for several present-day network television series. More recently Melman has directed episodes of ABC's Grey's Anatomy, Private Practice and Desperate Housewives. Melman previously directed on many hit sitcoms which include The Fresh Prince of Bel-Air, Malcolm in the Middle, Everybody Loves Raymond, That's My Bush!, The King of Queens, Two and a Half Men and Frasier. Melman was also a producer on Oliver Beene, Laverne & Shirley, and Night Court. Filmography Private Practice (2007) TV series episode 1.07 "In Which Sam Gets Taken For a Ride" episode 2.09 "Know When to Fold" Everybody Hates Chris episode 1.21 "Everybody Hates Jail" Ugly Betty (2006) TV series episode 1.17 "Icing on the Cake" Grey's Anatomy (2005) TV series episode 2.06 "Into You Like a Train" episode 2.23 "Blues for Sister Someone" episode 3.02 "I Am a Tree" episode 3.05 "Oh, the Guilt" episode 3.08 "Staring at the Sun" episode 4.07 "Physical Attraction Chemical Reaction" Hot Properties (2005) TV series episode "Online Dating" episode "It's a Wonderful Christmas Carol on 34th Street" episode "When Chloe Met Marco" episode "Whatever Lola Wants" episode "Return of the Ring" episode "Dating Up, Dating Down" episode "Waiting For Oprah" Living With Fran (2005) TV series Desperate Housewives (2004) TV series episode 1.04 "Who's That Woman?" episode 1.14 "Love Is in the Air" episode 1.17 "There Won't Be Trumpets" episode 1.20 "Fear No More" Two and a Half Men (2003) TV series episode 5.17 "Fish in a Drawer" episode 5.19 "Waiting for the Right Snapper" episode 6.08 "Pinocchio's Mouth" episode 6.09 "The Mooch at the Boo" episode 6.10 "He Smelled the Ham, He Got Excited" episode 6.11 "The Devil's Lube" episode 6.12 "Thank God for Scoliosis" episode 6.13 "I Think You Offended Don" episode 6.14 "David Copperfield Slipped Me a Roofie" episode 6.15 "I'd Like to Start with the Cat" episode 6.16 "She'll Still Be Dead at Halftime" Arrested Development (2003) TV series episode 2.04 "Good Grief!" Sixteen to Life (2003) TV series Luis (2003) TV series episode 1.01 "Pilot" Oliver Beene (2003) TV series Exit 9 (2003) TV series Off Centre (2001) TV series Scrubs (2001) TV series episode 1.11 "My Own Personal Jesus" That's My Bush! (2001) TV series Titus (2000) TV series episode "Tommy's Girlfriend II" Malcolm in the Middle (2000) TV series episode 1.05 "Malcolm Babysits" episode 1.15 "Smunday" episode 2.04 "Dinner Out" episode 2.06 "Convention" episode 2.09 "High School Play" episode 2.10 "The Bully" episode 2.16 "Traffic Ticket" episode 2.17 "Surgery" episode 2.18 "Reese Cooks" episode 2.25 "Flashback" episode 3.05 "Charity" episode 3.07 "Christmas" episode 3.10 "Lois's Makeover" episode 3.13 "Reese Drives" episode 3.16 "Hal Coaches" episode 3.18 "Poker #2" episode 3.21 "Cliques" episode 4.02 "Humilithon" episode 4.07 "Malcolm Holds His Tongue" episode 4.12 "Kicked Out" episode 4.14 "Hal's Friend" S
https://en.wikipedia.org/wiki/Treasure%20MathStorm%21
Treasure MathStorm! is an educational computer game intended to teach children ages five to nine mathematical problem solving. This sequel to Treasure Mountain! is the sixth installment of The Learning Company's Super Seekers games and the second in its "Treasure" series. The objective of Treasure MathStorm! is to return all of the treasures hidden across the mountain to the treasure chest in the castle at the top of the mountain. Although it runs smoother and has better graphics, basic gameplay is very similar to that of its predecessor. In 1994, an enhanced and more Windows-friendly version was released on CD-ROM. Gameplay The game takes place in a magical realm called Treasure Mountain. As the game opens, the Master of Mischief, the common antagonist to the Super Seekers games, uses a weather machine to freeze the mountain in snow and ice and scatters the castle's treasures all over the mountain. The player takes on the role of the Super Seeker, whose job is to find the scattered treasures and return them to the castle's treasure chest in order to thaw out the mountain. The mountain itself consists of three levels. The player cannot climb higher until he has gathered the supplies, like ice axes, ladders, or catapult parts, useful for scaling the mountain. To obtain these items, the players must help out the local inhabitants complete math-related tasks such as adjusting clocks to a given time, balancing scales, and counting crystals. In order to find treasures, the player must place a specific amount of snowballs at a certain location. To find out how many snowballs are needed, the player must catch an elf carrying a scroll. If he answers the riddle correctly, he will be told how to find treasures on that particular level. Once the player reaches the top of the castle on the highest level of the mountain, he deposits all treasures found into the castle's treasure chest and is given a prize as a reward for completing the three stages. This prize is kept on display in the player's clubhouse, showing how many times he has ascended the mountain. These prizes are usually children's toys, such as flutes or toy trains. From this point, the player may exit the clubhouse and start again from the bottom of the mountain. At higher ranks, the game becomes more difficult, as there will be more treasures to find, harder riddles to answer, and snowbullies that steal money. Development Treasure series Treasure MathStorm! is the second of four games in The Learning Company's "Treasure" series along with Treasure Mountain!, Treasure Cove!, and Treasure Galaxy!. The "Treasure" series is a subgroup of the company's Super Solvers series. All the games in this series are math and reading comprehension oriented educational adventure games aimed at younger children. Games in the treasure series all have the same three stage gameplay format where a special object, whose location can be deduced by answering educational riddles, is needed to reach the next stage.
https://en.wikipedia.org/wiki/StAX
Streaming API for XML (StAX) is an application programming interface (API) to read and write XML documents, originating from the Java programming language community. Traditionally, XML APIs are either: DOM based - the entire document is read into memory as a tree structure for random access by the calling application event based - the application registers to receive events as entities are encountered within the source document. Both have advantages: DOM, for example, allows for random access to the document, and event driven algorithm like SAX has a small memory footprint and is typically much faster. These two access metaphors can be thought of as polar opposites. A tree based API allows unlimited, random access and manipulation, while an event based API is a 'one shot' pass through the source document. StAX was designed as a median between these two opposites. In the StAX metaphor, the programmatic entry point is a cursor that represents a point within the document. The application moves the cursor forward - 'pulling' the information from the parser as it needs. This is different from an event based API - such as SAX - which 'pushes' data to the application - requiring the application to maintain state between events as necessary to keep track of location within the document. Origins StAX has its roots in a number of incompatible pull APIs for XML, most notably XMLPULL, the authors of which (Stefan Haustein and Aleksander Slominski) collaborated with, amongst others, BEA Systems, Oracle, Sun and James Clark. Examples From JSR-173 Specification• Final, V1.0 (used under fair use). Quote: The following Java API shows the main methods for reading XML in the cursor approach. public interface XMLStreamReader { public int next() throws XMLStreamException; public boolean hasNext() throws XMLStreamException; public String getText(); public String getLocalName(); public String getNamespaceURI(); // ...other methods not shown } The writing side of the API has methods that correspond to the reading side for “StartElement” and “EndElement” event types. public interface XMLStreamWriter { public void writeStartElement(String localName) throws XMLStreamException; public void writeEndElement() throws XMLStreamException; public void writeCharacters(String text) throws XMLStreamException; // ...other methods not shown } 5.3.1 XMLStreamReader This example illustrates how to instantiate an input factory, create a reader and iterate over the elements of an XML document. XMLInputFactory xmlInputFactory = XMLInputFactory.newInstance(); XMLStreamReader xmlStreamReader = xmlInputFactory.createXMLStreamReader(...); while (xmlStreamReader.hasNext()) { xmlStreamReader.next(); } See also Competing and complementary ways to process XML in Java (the order is loosely based on initial date of introduction): Document Object Model (DOM), the first standardized, language/platform-independent tree-base
https://en.wikipedia.org/wiki/Brown%20University%20Interactive%20Language
Brown University Interactive Language (BRUIN) was an introductory programming language developed at Brown University in the late 1960s. It operated in the IBM 360, and was similar to PL/1. The abstract of R. G. Munck's document, "Meeting the Computational Requirements of the University, Brown University Interactive Language" describes BRUIN as "a JOSS-like interpreter and a WATFOR-Like compiler and has a syntax very much like PL/I. It is intended that BRUIN and PL/I will together form a language system which will supply most of the (non-computer science) computational requirements of the university." Educational programming languages Brown University
https://en.wikipedia.org/wiki/FORK-256
FORK-256 is a hash algorithm designed in response to security issues discovered in the earlier SHA-1 and MD5 algorithms. After substantial cryptanalysis, the algorithm is considered broken. Background In 2005, Xiaoyun Wang announced an order- collision attack on the government's hash standard SHA-1. The National Institute of Standards and Technology (NIST), the body responsible for setting cryptographic standards in the United States, concluded this was a practical attack (as previous estimates were order-) and began encouraging additional research into hash functions and their weaknesses. As part of this effort, NIST hosted two workshops where potential new algorithms, including FORK-256, were introduced and discussed. Rather than immediately select any of these algorithms, NIST conducted a public competition from 2007–2012 which ultimately resulted in the Keccak algorithm being selected for use as the SHA-3 standard. Algorithm and Analysis FORK-256 was introduced at the 2005 NIST Hash workshop and published the following year. FORK-256 uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged. The initial algorithm garnered significant cryptanalysis, summarized in (Saarinen 2007). Matusiewicz et al. (2006) discovered a collision attack with complexity of . Mendel et al. (2006) independently derived a similar attack. The following year Matusiewicz's team improved their attack to no worse than and (Contini 2007) demonstrated a practical implementation of the attack. In response to these attacks, Hong and his team proposed an improved version of FORK-256. Markku-Juhani Saarinen derived a -complexity attack again the improved algorithm. By way of comparison, the eventual SHA-3 standard withstands up to an order- attack. Deployment FORK-256 was added to the Botan cryptographic library after its introduction. Botan developer Jack Lloyd removed the algorithm in 2010 after concluding the hash suffered from several weaknesses and had never become widely used. References Cryptographic hash functions
https://en.wikipedia.org/wiki/.bss
In computer programming, the block starting symbol (abbreviated to .bss or bss) is the portion of an object file, executable, or assembly language code that contains statically allocated variables that are declared but have not been assigned a value yet. It is often referred to as the "bss section" or "bss segment". Typically only the length of the bss section, but no data, is stored in the object file. The program loader allocates memory for the bss section when it loads the program. By placing variables with no value in the .bss section, instead of the .data or .rodata section which require initial value data, the size of the object file is reduced. On some platforms, some or all of the bss section is initialized to zeroes. Unix-like systems and Windows initialize the bss section to zero, allowing C and C++ statically allocated variables initialized to values represented with all bits zero to be put in the bss segment. Operating systems may use a technique called zero-fill-on-demand to efficiently implement the bss segment. In embedded software, the bss segment is mapped into memory that is initialized to zero by the C run-time system before main() is entered. Some C run-time systems may allow part of the bss segment not to be initialized; C variables must explicitly be placed into that portion of the bss segment. On some computer architectures, the application binary interface also supports an sbss segment for "small data". Typically, these data items can be accessed using shorter instructions that may only be able to access a certain range of addresses. Architectures supporting thread-local storage might use a tbss section for uninitialized, static data marked as thread-local. Origin Historically, BSS (from Block Started by Symbol) is a pseudo-operation in UA-SAP (United Aircraft Symbolic Assembly Program), the assembler developed in the mid-1950s for the IBM 704 by Roy Nutt, Walter Ramshaw, and others at United Aircraft Corporation. The BSS keyword was later incorporated into FORTRAN Assembly Program (FAP) and Macro Assembly Program (MAP), IBM's standard assemblers for its 709 and 7090/94 computers. It defined a label (i.e. symbol) and reserved a block of uninitialized space for a given number of words. In this situation BSS served as a shorthand in place of individually reserving a number of separate smaller data locations. Some assemblers support a complementary or alternative directive BES, for Block Ended by Symbol, where the specified symbol corresponds to the end of the reserved block. BSS in C In C, statically allocated objects without an explicit initializer are initialized to zero (for arithmetic types) or a null pointer (for pointer types). Implementations of C typically represent zero values and null pointer values using a bit pattern consisting solely of zero-valued bits (despite filling bss with zero is not required by the C standard, all variables in .bss are required to be individually initialized to some sort of zeroe
https://en.wikipedia.org/wiki/Ice%20Wireless
Ice Wireless is a Canadian mobile network operator and telecommunications company that provides 4G/LTE mobility services, mobile broadband Internet, and fixed line telephone in Canada's northern territories: Yukon, the Northwest Territories, Nunavut, and Nunavik, Quebec. The company's corporate headquarters are located in Markham, Ontario. History Ice Wireless was launched in 2005 to serve rural and remote communities in Northern Canada. The network was first developed in the community of Inuvik, Northwest Territories, a base for oil and gas exploration located approximately from the Arctic Ocean and north of the Arctic Circle. The network was the first GSM system in Northern Canada, originally designed as a "small cell" system that could be scaled down and economically deployed to rural and remote communities. Due to the scalability of its technology, Ice Wireless could offer mobility service in locations that could not be economically reached by larger telecommunications companies. Ice Wireless was the first to launch mobility service in Inuvik, Aklavik and Behchoko (Rae-Edzo) in the Northwest Territories. As customers increased, Ice Wireless expanded service to include Yellowknife, Northwest Territories. In 2012, Ice Wireless announced a $12.4 million network upgrade to roll out 3G/4G Evolved High Speed Packet Access (HSPA+) across the three Canadian territories. As part of this upgrade, Ice Wireless launched a full range of telecommunications services, including 3G/4G mobility services, mobile broadband Internet, and fixed line telephone. Ice Wireless also announced a strategic partnership with Iristel, the largest competitive local exchange carrier (CLEC) in Canada and the first CLEC to enter Northern Canada. In 2013, Ice Wireless became the first mobile network operator to launch 3G/4G services to Iqaluit, Nunavut. These services were launched using SES’ AMC-9 satellite. In 2017, Ice Wireless became the first mobile operator to launch LTE service to Iqaluit, Nunavut. In 2019, Ice Wireless launched 3G LTE service in Kuujjuaq, Quebec and Quaqtaq, Quebec as part of a larger roll-out to all 14 communities of the Nunavik region of Northern Quebec. The Ice Wireless network now extends across Canada's North and includes the Yukon, Northwest Territories, Nunavut and the Nunavik region of Northern Quebec. Services 4G/LTE Mobility Services Mobile Broadband Internet Fixed Line Telephone Retail stores Ice Wireless operates its own corporate retail stores, and also conducts business through a network of agents that operate in each local market. Ice Wireless provides 24/7 customer care and technical support for its customers, as well as 9-1-1 service. Network As a Mobile Network Operator (MNO) Ice Wireless owns and operates communication towers, facilities and radio access network equipment in all three Canadian territories. Ice Wireless provides UMTS wireless services with HSPA+ for data, using its licenses on the 850 MHz/1900 MHz frequenc
https://en.wikipedia.org/wiki/Tracy%20Grimshaw
Tracy Grimshaw (born 3 June 1960) is an Australian journalist and television presenter. Grimshaw is best known for her work with the Nine Network where she was the host of A Current Affair from 2006 to 2022 and the co-host of Today from 1996 until 2005. Grimshaw will return to the network in 2024 to host a new program. Career Grimshaw's career began in 1981 when she joined Nine News in Melbourne as a reporter. In 1985 she began presenting news bulletins and by 1987 had been appointed the presenter of Nine Morning News. Through the early 1990s, Grimshaw reported on overseas events for the Nine Network, as well as reporting for A Current Affair and hosting the program over the summer non-ratings period. In 1995, Grimshaw appeared as co-host of The Midday Show with David Reyne. The following year she was host of Today on Saturday and Animal Hospital. On 4 November 1996, Grimshaw was appointed the co-host of Today with Steve Liebmann, a position she held for nine years. She finished her role as co-host of Today on 23 December 2005 and was replaced by Jessica Rowe. In 2005, Grimshaw played the news reporter character Katie Current in the Australian cinema and DVD release of Shark Tale (the original lines were provided by American journalist Katie Couric). On 30 January 2006, Grimshaw began presenting A Current Affair, replacing Ray Martin. In May 2006, she interviewed Beaconsfield Mine collapse survivors Todd Russell and Brant Webb in a special two-hour presentation called The Great Escape. Grimshaw was a nominee for the Gold Logie in 2018. On 5 September 2022, Grimshaw announced that she would step down as host of A Current Affair on 24 November 2022 after 17 years. The Nine Network announced in September 2023 that Grimshaw would be returning to the network in 2024. Personal life Grimshaw grew up in Greensborough, Victoria. On 7 May 2015, she was involved in a horse riding accident believed to have been at her property in Sydney's north-western suburbs. She was airlifted to Westmead Hospital. Grimshaw supports St Kilda Football Club in the Australian Football League. References External links A Current Affair website 1960 births Living people Australian journalists Australian women journalists Australian television presenters Australian women television presenters Journalists from Melbourne People from Greensborough, Victoria Television personalities from Melbourne
https://en.wikipedia.org/wiki/Atrato
Atrato is a municipality and town in the Chocó Department near the Pacific Ocean, Colombia. Climate Atrato has an extremely wet tropical rainforest climate (Af). The following climate data is for Yutó, the capital of the municipality. References [ Colombian geografic Institute; Creation of the Atrato municipality] Municipalities of Chocó Department
https://en.wikipedia.org/wiki/Stop%20AIDS%20Campaign
STOPAIDS is a UK-based HIV, health and rights network. Drawing on its 35-year experience working on the HIV response, it supports UK and global movements to challenge systemic barriers and inequalities to end AIDS and support people around the world to realise their right to good health and wellbeing. History It is a coalition of more than eighty of the leading international NGOs and HIV/AIDS groups in the United Kingdom. The Stop AIDS Campaign is the previous name of a campaign run by the UK Consortium on AIDS and International Development. The Stop AIDS Campaign and the AIDS Consortium relaunched as STOPAIDS, in September 2013. Members of the network include Christian Aid, CAFOD, the International HIV/AIDS Alliance, OXFAM, UNICEF UK, Restless Development (hosts of the Youth STOPAIDS Campaign) and Oxfam. The network continues to campaign, to increase access to prevention, treatment, care and support services for HIV and AIDS. Related groups Student Stop AIDS Campaign References External links Home STOPAIDS website HIV/AIDS prevention organizations HIV/AIDS organisations in the United Kingdom Health campaigns
https://en.wikipedia.org/wiki/3270%20emulator
A 3270 Emulator is a terminal emulator that duplicates the functions of an IBM 3270 mainframe computer terminal on a computer, usually a PC or similar microcomputer. As the original 3270 series terminals were connected to the host computer through a display controller (cluster controller) using coaxial cable, emulators originally required channel (rare), coax or synchronous communication adapter cards to be installed in the PC. Today, many emulators communicate with the mainframe computer through a TN3270 server using the TN3270 () variant of the Telnet ()protocol common on TCP/IP networks including the Internet, so special hardware is no longer required on machines with Internet access. Several vendors offered both coax and communications attached 3270 emulators and TN3270 clients as part of the same product. Connectivity One way of categorizing a 3270 simulator is by how it connects to the host. Some 3270 simulators use a channel adapter to connect directly to the host. This is common in protocol converters or other situations where performance justifies the higher cost. Some 3270 simulators use a coax adapter such as the Irma board to connect to a cluster controller. Some 3270 simulators use a synchronous serial link to connect to a communications controller. Using BSC requires less code, but SDLC with SNA allows more functionality. Some 3270 simulators use a LAN interface to a cluster controller. Contemporary 3270 simulators typically use TN3270 to connect to a TN3270 server on the host. Products In 1983, IBM marketed the IBM 3270 PC, a bundled package including a PC, a graphics adapter, 3270 emulation software and coax interface card. 3270 emulators and TN3270 clients are also available from many third-party vendors like Attachmate and Ericom. Some solutions permitted a coax interface to be shared by workstations in a LAN. See also Irma board Terminal emulator Systems Network Architecture (SNA) Synchronous Data Link Control (SDLC) TN3270 TN3270 Plus IND$FILE Notes External links x3270: open-source, multi-platform TN3270 client TN3270: emulator for Linux, Windows, Mac OS X Virtel: terminal thin-client emulation for 3270 mainframe screens QWS3270 PLUS, a TN3270 client by Jolly Giant Software QWS3270 Secure, a TN3270E client by Jolly Giant Software Vista tn3270, a TN3270 emulator by Tom Brennan Software Rocket BlueZone: a 3270 terminal emulator by Rocket Software Nexus Terminal, a TN3270/TN5250, SSH, SFTP/FTPS and printer client by Nexus Integration Flex Terminal Emulator, a TN3270 client by FlexSoftware Inc Mocha TN3270, a TN3270 client by Mochasoft Extra! X-treme, a TN3270 client by Attachmate Host Explorer, a TN3270 client by OpenText (formerly Hummingbird) Personal Communications, PCOMM: a 3270 emulator and TN3270 client by IBM tn3270 X, a TN3270 emulator for Mac OS from Brown University Flynet Viewer, a web-based client by Flynet Host Access for the Cloud, a highly available, cloud deployed, web-based client by Micro F
https://en.wikipedia.org/wiki/SVT%20Barn
SVT Barn, formerly Barnkanalen and SVT B, is a Swedish free-to-air television channel from state broadcaster Sveriges Television dedicated to children's television programming. Barn is Swedish for children, whereas Barnkanalen meant The Children's Channel. (No relation to the British The Children's Channel.) History SVT Barn, then known as Barnkanalen, started broadcasting on 23 December 2002. During its first year it was only available from 6.30 a.m. to 6.00 p.m. on weekdays. The channel also took a "summer vacation" between 23 May and 18 August. The rest of the time could be used for other programming; some weekends, one could see tennis in the schedule. The programming was aimed at pre-school children in the mornings and the afternoon programming was targeted at older children (pre-teens). The morning block featured special announcers that presented programmes from "the TV ship". Right after it had finished, the morning programmes would rerun immediately. At 1.00 p.m., an interactive show called Twebby was broadcast, followed by programmes for older children presented by two animated continuity announcers called "Joppe and Nella". Afternoon programming included animation, English language programming as well as dramas from the SVT archives. On 1 November 2003, the channel started broadcasting on weekends, from 7.00 a.m.. From 2004, SVT Barn would be a full year service. During the 2004 Summer Olympics and the 2004 Summer Paralympics , SVT Extra would simulcast with SVT Barn in the evenings and from 27 September 2004, the evening slot would be occupied by Kunskapskanalen. The TV ship was removed in the autumn of 2005 and its presenters was integrated with Bolibompa, the evening children strand on SVT1. Bolibompa would from then be the brand for pre-school programming on SVT Barn as well. Twebby was discontinued later in the autumn. In February 2006, SVT Barn got new graphics and Joppe and Nella were removed. Instead, a new show called Bobster was shown between the programmes in the afternoon. Bobster would also broadcast between 7 p.m. and 7.30 p.m. in SVT1. On 27 August 2007, SVT Barn started its broadcasting hours extended to 7 p.m., allowing Bobster to broadcast for another hour. On 25 August 2008 SVT made a major reshuffle in its schedules. This meant that the primetime broadcasts from Bolibompa at 6 p.m. and Bobster at 7 p.m. that were previously broadcast on SVT1 would be moved to SVT Barn. SVT Barn was upgraded as one of the three main channels from SVT, meaning that the channel would receive most of SVT's funding for children's programmes. With the reorganization, SVT Barn was given a new look. The new logo reads "SVTB", but it is still referred to as "Barnkanalen". SVTB would now start every day at 6.30 a.m. with programmes aimed at pre-schoolers under the Bolibompa brand. This includes presenter-lead segments called Bolibompamorgon between 7 a.m. and 8.30 a.m. on Weekdays and Bolibompahelg between 8 a.m. and 10 p.m. on Weekend
https://en.wikipedia.org/wiki/8-N-1
8-N-1 is a common shorthand notation for a serial port parameter setting or configuration in asynchronous mode, in which there is one start bit, eight (8) data bits, no (N) parity bit, and one (1) stop bit. As such, 8-N-1 is the most common configuration for PC serial communications today. The abbreviation is usually given together with the line speed in bits per second, as in 9600–8-N-1. The speed includes bits for framing (stop bits, parity, etc.) and the effective data rate is lower than the bit transmission rate. For 8-N-1 encoding, only 80% of the bits are available for data (for every eight bits of data, ten bits are sent over the serial link — one start bit, the eight data bits, and the one stop bit). References Serial buses Data transmission
https://en.wikipedia.org/wiki/Arcomage
Arcomage is a computerized card game produced by The 3DO Company. It originated as a minigame in Might and Magic VII: For Blood and Honor and Might and Magic VIII: Day of the Destroyer, in which it was used to gamble for in-game money or to complete a quest to win games in every tavern. 3DO later released it as a stand-alone game in 2000. In the stand-alone version a single player can play against a computer opponent, or two players can play via a LAN or TCP/IP connection. Arcomage uses the fantasy themes of the game in which it is set. Arcomage was developed by Stickman Games. The game was sold to 3DO. Gameplay Arcomage takes the form of a tabletop game, in which there are two players, each with a deck of cards, a "tower" and a "wall", as well as several other variables that determine whether they win or lose, and what cards they can play. As Might and Magic is a single-player game, one would always play against an AI opponent - making the game relatively easy to win. Players take it in turns to: Draw the appropriate number of cards to complete their 6-part deck (one or more cards would have been played or discarded during their previous turn) Either play or discard a card, depending on their options - in some cases discard will be the only option available, as the player might not have the appropriate number of "gems", "bricks" or "recruits". If their chosen card allows it, play again and/or choose a card to discard. Every tavern has its different victory conditions, so players must adapt their styles for different situations. A game could end in one of the following ways: A player's tower has been reduced to 0 A player's tower has achieved a "height" of X (value depends on Tavern) A player accumulates X amount of resources (value depends on Tavern) As well as having a "Tower", "Wall" and Deck of Cards, each player also has: "Quarry" - controls how many "bricks" are gained each turn "Bricks" - spent on brick cards "Magic" - controls how many "gems" are gained each turn "Gems" - spent on gem cards "Dungeon" - controls how many "recruits" are gained each turn "Recruits" - spent on recruit cards Arcomage employs a wide range of cards, each with their own name, effects and picture. Several cards were added to the original deck in Might and Magic VIII. Examples include: Faerie (recruit card): 2 damage (to enemy tower/wall); play Again. Cost: 1 recruit. Portcullis (brick card): +5 wall; +1 dungeon. Cost: 9 bricks. Sanctuary (gem card): + 10 tower; +5 wall; gain 5 recruits. Cost: 15 gems. 1999 video games 2000 video games Card games introduced in 1999 Digital collectible card games The 3DO Company games New World Computing games Video games developed in the United States Windows games Windows-only games Multiplayer and single-player video games Freeware games Might and Magic spin-off games Video game spin-offs
https://en.wikipedia.org/wiki/KSNV
KSNV (channel 3) is a television station in Las Vegas, Nevada, United States, affiliated with NBC. It is owned by Sinclair Broadcast Group alongside dual CW/MyNetworkTV affiliate KVCW (channel 33). Both stations share studios on Foremaster Lane in Las Vegas (making them the only major television stations whose operations are based inside the city limits), while KSNV's transmitter is located on Black Mountain, near Henderson (southwest of I-515/US 93/US 95). History Early years The station was founded on March 8, 1982, with grant of a construction permit issued by the Federal Communications Commission (FCC) to build a new full-power television station on UHF channel 21 to serve Las Vegas. The original owner Frank Scott, an early independent casino pioneer in Las Vegas, named his company Dres Media Inc., and chose KRLR, which contained the first letter of each of his three children's names, for the station's call letters in December 1982. In August 1984, after a couple of extensions to the original construction permit, the station applied for its license to cover construction and went on the air under a Program Test Authority. KRLR was an independent station branding itself as Vusic 21, and at first, aired only music videos. In addition to its over-the-air broadcast on channel 21, the station was carried by Prime Cable on channel 2. The first music video aired on the station, was "Video Killed the Radio Star". In mid-1985, KRLR began to introduce a few classic television programs, and also began airing World Class Championship Wrestling, a popular one-hour professional wrestling program originating from Dallas, Texas. KRLR was given an FCC license on April 11, 1986. By 1987, the station had replaced the music videos with more conventional fare, such as sitcoms, dramas, movies, and sports. KRLR was best known for being the broadcast home of UNLV Runnin' Rebels and Los Angeles Lakers basketball, as well as San Diego Padres and Oakland A's Major League Baseball. KRLR received competition from movie-intensive KBLR (channel 39, now a Telemundo O&O) and family-oriented independent KFBT (channel 33, now KVCW) in 1989, but held their own to be the number two independent station in Las Vegas (counting Fox-affiliated KVVU-TV, which was still programmed like an independent during its early Fox years). In May 1994, Dres Media sold the station to Channel 21, LP, a subsidiary of Los Angeles-based Lambert Broadcasting, for $2.85 million. On January 16, 1995, the station became an affiliate of the new United Paramount Network (UPN), and changed its call letters to KUPN to reflect the new affiliation. One of the most successful turnaround stories in broadcasting, Lambert sold the station just two years later to the Sinclair Broadcast Group in April 1997 for $87 million. On March 1, 1998, Sinclair changed the station's affiliation to The WB and on May 27, 1998, changed the station's call letters to KVWB, again in honor of its new affiliation. The station moved t
https://en.wikipedia.org/wiki/Amiga%20%28disambiguation%29
Amiga is the name of a series of personal computers. Amiga is the Portuguese, Spanish, Occitan and Catalan word for "friend" in the feminine, or "female friend". The word may also refer to: Businesses and products Amiga Corporation, the company that originally developed the Amiga personal computer AmigaOS, the operating system of the Amiga personal computer Commodore-Amiga, Inc., a subsidiary of Commodore International (both now defunct) that developed and marketed the Amiga personal computer Amiga Technologies GmbH, a subsidiary of Escom (both now defunct) that was set up following their purchase of Commodore International in 1996 Amiga, Inc. (South Dakota), the original 1997 Gateway subsidiary named Amiga, Inc. (incorporated in the US state of South Dakota) Amiga, Inc., the company incorporated in the US state of Delaware Amiga 1000, the first Amiga computer, originally known simply as the Amiga Amiga (record label), a record label that originated in East Germany People Coral Amiga, English actress Other uses Amiga (butterfly), a butterfly in the family Nymphalidae Amiga (album) See also Amigo (disambiguation) Amica (disambiguation) Amicus (disambiguation)
https://en.wikipedia.org/wiki/OTN
OTN may refer to: OTN1, a Canadian television channel Open Transport Network, a specific ring-based telecommunication network architecture Optical transport network, a telecommunication network standards framework for optical networks Oracle Technology Network, the official online/offline community for Oracle technical professionals Ed-Air Airport – Oaktown, Indiana, United States (IATA code: OTN)
https://en.wikipedia.org/wiki/Sarah%20Horton
Sarah Horton is a fictional character from Days of Our Lives, an American soap opera on the NBC network. Created by Pat Falken Smith, and introduced by Betty Corday and Al Rabin, Sarah is the daughter of Neil Curtis (Joseph Gallison) and Maggie Horton (Suzanne Rogers). In 2018, under head writer Ron Carlivati, the character was reintroduced with actress Linsey Godfrey in the role. Godfrey's performance in the role garnered her a Daytime Emmy Award nomination for Outstanding Supporting Actress in a Drama Series in 2019. In March 2021, Godfrey departed the role, but returned in January 2022. Casting In July 2018, it was announced that actress Linsey Godfrey had joined the cast as Sarah Horton. She debuted on October 26, 2018. In March 2021, Godfrey announced her departure from the soap; she last appeared on March 29. On January 7, 2022, it was announced that Godfrey would be reprising her role, with her returning to air on January 18. Storylines Sarah is born to Neil Curtis and Maggie Horton. She was conceived through artificial insemination and was believed to be the daughter of Evan Whyland. It is not until she was a teen that they find out her father was Neil. To Sarah, Mickey Horton, Maggie's first husband, is her main father figure, as Mickey raised and loved Sarah as if she were his own blood. Evan gives up his legal rights when Sarah is an infant, but Mickey never adopts her. Sarah leaves town with her sister, Melissa, in 1991. They settle in Nashville, and Sarah is mentioned to have returned in 2010 for Mickey's funeral. In 2018, Sarah, now a doctor, returns to Salem engaged to Rex Brady, and becomes entangled in the short-lived custody battle of Holly Jonas. Sarah breaks up with Rex when she discovers that he cheated on her with Mimi Lockhart, who comes to town with his baby, Emily Lockhart. Rex later admits to sleeping with Sarah's paternal half-sister Noelle, and a furious Sarah seeks revenge by looking to Rex's brother Eric Brady for comfort, but feels rejected when he turns her down. She leaves and sleeps with Xander Kiriakis. She once again becomes engaged to Rex, and later marries him, only for the relationship to end months later as Sarah secretly has feelings for Eric. Upon the return of Nicole Walker, Eric and Sarah end their relationship. Soon after, Sarah discovers she is pregnant with Eric's child; a year later, it was discovered that after giving birth to a stillborn daughter, Xander orchestrated a swap of Sarah's baby for Kristen DiMera (Stacy Haiduk)'s daughter with Brady Black (Eric Martsolf). She gets engaged to Xander, but when the truth comes out about the baby swap, she breaks up with him. They later reconcile, but on the eve of her wedding, Sarah sees Kristen —who has escaped from prison — and in an act of desperation, Kristen ties her up and steals her identity to frame her as a cheater by lying to Rex that "Sarah" is still in love with him. References External links Sarah Horton at Soap Central Sarah Horton at S
https://en.wikipedia.org/wiki/Internews
Internews Network, now Internews, is a 501(c)(3) organization incorporated in California, formed in 1982. It was founded by David M. Hoffman, Kim Spencer, and Evelyn Messinger. The president and CEO is Jeanne Bourgault. Internews Europe is an independent media development organization, based in London, United Kingdom and relying mainly on European funding. Internews Europe is chaired by Mark Stephens. One of the organization's first projects was a series of Spacebridges that connected the U.S. and Soviet Union by satellite, a program that culminated with a TV series named "Capital to Capital" that aired on ABC and won an Emmy Award in 1988. In early 2015, Internews Network and Internews Europe began to integrate more closely and operate cooperatively with independent boards of directors. Overview According to their mission statement, "Internews is a nonprofit that supports independent media in 100 countries — from radio stations in refugee camps, to hyper-local news outlets, to filmmakers and technologists. Internews trains journalists and digital rights activists, tackles disinformation, and offers business expertise to help media outlets thrive financially. For 40 years, it has helped partners reach millions of people with trustworthy information that saves lives, improves livelihoods, and holds institutions accountable." According to Internews' 2021 990 form, the organization is primarily supported by the US and European governments, with additional support from foundations and individuals. Funders have included the AOL-Time Warner Foundation, the Beagle Foundation, the Carnegie Corporation of New York, and others. Criminal investigations In April 2007 Russian police raided the office of the Educated Media Foundation, a section of Internews which trains journalists and fosters an independent media, as part of an investigation into its president, Manana Aslamazyan, who was accused of bringing too much cash into Russia from a visit to France. Russia's Constitutional Court ruled on May 26, 2008, that charges against Manana Aslamazyan were illegal. In line with the ruling, Russia’s Interior Ministry dropped the charges and a warrant for Aslamazyan’s arrest. Internews Center for Innovation & Learning Based in Washington, D.C., and operating globally, The Internews Center for Innovation & Learning experiments with various approaches to communication from around the world. The center intends to capturing the technological discoveries of field offices to enrich the knowledge base of the international development community as a whole. Internews' current Media Map project is the main feature of the center. In partnership with the World Bank Institute and the Brookings Institution and supported by the Bill & Melinda Gates Foundation, the Media Map project analyzes and publishes data on the interrelations between information access and outcomes in democracy and governance, economic growth, poverty reduction, human rights, gender equality, and h
https://en.wikipedia.org/wiki/Channel%202
Channel 2 or TV 2 may refer to: Television networks, channels and stations Channel 2 (Iran), operated by Islamic Republic of Iran Broadcasting Channel 2 (Israel), a commercial television station , entertainment and music television in Latvia Channel 2 (Syria), a terrestrial broadcaster TV 2 (Denmark), a publicly owned station TV2 (Hungarian TV channel), a commercial station TV2 (Malaysian TV network), a government-operated network TV 2 (Norway), a commercial station TV2 (Virgin Islands), a CBS-affiliated cable channel Castilla–La Mancha TV 2, Spain France 2, a public television channel in France La 2 (Spanish TV channel), a Spanish television channel operated by RTVE 2DF (TV), a public television channel in Germany Yle TV2, a Finnish television channel operated by Yle ABC2, a national public television channel in Australia América 2 or Canal 2, a commercial station in Buenos Aires, Argentina BBC Two, a public television channel in the United Kingdom bTV Action or TV2, a commercial station in Bulgaria Canal+ 2, a subscription television channel in Spain Canal Nou Dos, a channel in Spain which broadcasts in Valencian CHEX-TV-2, a privately owned station in Durham Region, Ontario, Canada Conexión TV Canal 2, a privately owned station in Costa Rica Channel 2 (El Salvador), a television channel owned by Telecorporación Salvadoreña. DZMV-TV, commonly known as Channel 2, the flagship television station of the Advanced Media Broadcasting System in the Philippines, formerly DWWX-TV of ABS-CBN Frecuencia Latina or Frecuencia 2, a commercial televisión station in Lima, Perú Kanal 2, a privately owned station in Estonia KBS2, an entertainment channel in South Korea Noticias PY, formerly Red Guarani, a Paraguayan free-to-air television channel NPO 2, a public television channel in the Nederlands, formerly known as TV2 TVN (Panamanian TV network), a commercial television station in Panama Rai 2, a public television channel in Italy RTÉ2, a public television channel in Ireland RTP2 or TV2, a public broadcast station in Portugal SABC 2 or TV2, a state-owned channel in South Africa Stöð 2, a privately owned station in Iceland SVT2, until 1996 TV2, second television channel of Sveriges Television in Sweden Televicentro (Canal 2), a nationwide terrestrial channel in Nicaragua Tele Antillas Canal 2, a privately owned station in the Dominican Republic Telecanal, a private television channel Teve2, a commercial station in Turkey owned by Doğan Media Group, formerly known as TV2 TVNZ 2 (formerly TV2), New Zealand Unitel Bolivia a commercial television station in Bolivia Las Estrellas, a Mexican commercial television network assigned virtual channel 2 nationwide WCBS-TV Channel 2, a CBS-affiliated station in New York. United States Other uses TV-2 (band), a Danish pop-rock group TV 2 Group, Norwegian media company Train Valley 2, a 2018 video game sometimes referred to as TV2 Lockheed TV-2 Seastar, an American jet trainer aircraft 2channel, a Japanese Internet foru
https://en.wikipedia.org/wiki/Very%20minimum%20shift%20keying
Very minimum shift keying, or VMSK, modulation, is one of several ultra-narrow-band modulation (UNBM) methods indeterminately claimed to send high-speed digital data through very low bandwidth (or narrowband) channels. VMSK is a type of phase-shift keying, not related to minimum shift keying. Claims versus analysis VMSK was introduced in 1998 as a cellular telephone modulating method. Hardware was sent to and tested by Vodafone, Sprint and AT&T. The method was reported on favorably by William C.Y. Lee, V.P. of Vodafone Airtouch, in "Lee's Essentials of Wireless Communications", McGraw Hill 2001. There have been individuals who have made an analysis based on positive group delay filters that claim the method does not work; however, VMSK, like all ultra-narrow band modulation methods uses negative- or zero-delay filters. Walker claims that with VMSK, "Efficiencies up to 15 bits/s/Hz are now being achieved in usable hardware with C/N ratios better than that obtainable using FM, BPSK or QPSK." Analysis by third parties (Karn and Tomasic) have concluded that "no ultra narrow band modulation (UNBM) method, which includes very minimum shift keying (VMSK) and VPSK, can have substantially greater efficiency than conventional methods." On a spectrum analyzer, a VMSK signal looks narrow. However, the actual bandwidth required to avoid interference is much wider. One analyst says "the spectral efficiency claims being made for VMSK are hogwash", regardless of the filter used. Personalities VMSK is promoted primarily by H. R. Walker, owner of the "Welcome to the Ultra Narrowband Club" website, and author of several papers and publications on the arguments. Mr. Walker has written about his ideas in telecommunications sector publications such as Microwaves & RF, as well as in a co-authored book chapter. Legal issues It was reported in 2000 that "AlphaCom Communications holds patent rights to the non-Nyquist filters and other aspects of VMSK and VMSK/2 technology. The company claimed to have secured these rights as a result of a contract with H.R. Walker, doing business as Pegasus Data Systems, to purchase the patents and fund further R&D. AlphaCom defaulted on the contract and a legal dispute over ownership arose. A 2003 Securities and Exchange Commission charge against AlphaCom and its principals alleges that "defendants raised these funds by falsely representing that AlphaCom owned exclusive rights to novel Internet technologies, Network Utilities (NU) and Very Minimal Shift Keying (VMSK), that were supposed to increase Internet downloading speeds and the speed of access to the Internet. Many of these claims could not be supported." In order to avoid further legal costs, Walker agreed to surrender the ownership of the VMSK patents US 5,930,303 and US 6,748,022 to AlphaCom in return for AlphaCom making no further claims against Walker or Pegasus regarding any newer methods. The special near zero group delay filters required are claimed by Walker to b
https://en.wikipedia.org/wiki/Hammertime
Hammertime is a 2009 American reality TV series that chronicles the daily life of rapper MC Hammer. The show debuted June 14, 2009 on the A&E Network and was produced by 3Ball Productions. The title is derived from a lyric in Hammer's 1990 hit single "U Can't Touch This" ("Stop! Hammer time!"). The show features Hammer and his family—his wife Stephanie; their children Bobby, Jeremiah, Sammy, Sarah, Stanley Jr., and A'keiba; his nephew Jamaris and cousin Marvin "Bigg Marv" Grant—living in their large ranch-style house in Tracy, California. The series premiere averaged a middling 1.123 million viewers, placing it outside A&E's top fifteen shows for the week. The show was canceled after just one season and eleven episodes. Reviews were mixed to negative. The New York Times wrote, "Like Snoop Dogg's Father Hood or Run's House, Hammertime goes into race-politics overload to prove that black rappers can be top-grade family men ascribing to yuppie values." According to Richard Huff of the New York Daily News, the show was "inoffensive, but it's also emotionless ... [and] leaves viewers feeling like they've wasted their time." Brian Lowry of Variety wrote, "Hammertime continues the trend ... of celebrities demonstrating how their lives are as boring as everybody else’s." On July 30, 2009, Grant was arrested after being accused of rape by a woman he had met online. The charges were dropped in 2010. Episodes Shaping Up Daddy Daycare On The Road Again That's A Bet! Moving Forward Vegas Baby! Home Cookin Lost Episode Giving Back Family Vacation Love is in the Air References External links Hammertime on TVGuide.com A&E (TV network) original programming MC Hammer 2009 American television series debuts 2000s American reality television series 2009 American television series endings English-language television shows
https://en.wikipedia.org/wiki/Monitor%20mode
Monitor mode, or RFMON (Radio Frequency MONitor) mode, allows a computer with a wireless network interface controller (WNIC) to monitor all traffic received on a wireless channel. Unlike promiscuous mode, which is also used for packet sniffing, monitor mode allows packets to be captured without having to associate with an access point or ad hoc network first. Monitor mode only applies to wireless networks, while promiscuous mode can be used on both wired and wireless networks. Monitor mode is one of the eight modes that 802.11 wireless adapter can operate in: Master (acting as an access point), Managed (client, also known as station), Ad hoc, Repeater, Mesh, Wi-Fi Direct, TDLS and Monitor mode. Uses Uses for monitor mode include: geographical packet analysis, observing of widespread traffic and acquiring knowledge of Wi-Fi technology through hands-on experience. It is especially useful for auditing unsecure channels (such as those protected with WEP). Monitor mode can also be used to help design Wi-Fi networks. For a given area and channel, the number of Wi-Fi devices currently being used can be discovered. This helps to create a better Wi-Fi network that reduces interference with other Wi-Fi devices by choosing the least used Wi-Fi channels. Software such as KisMAC or Kismet, in combination with packet analyzers that can read pcap files, provide a user interface for passive wireless network monitoring. Limitations Usually the wireless adapter is unable to transmit in monitor mode and is restricted to a single wireless channel, though this is dependent on the wireless adapter's driver, its firmware, and features of its chipset. Also, in monitor mode the adapter does not check to see if the cyclic redundancy check (CRC) values are correct for packets captured, so some captured packets may be corrupted. Operating system support The Microsoft Windows Network Driver Interface Specification (NDIS) API has supported extensions for monitor mode since NDIS version 6, first available in Windows Vista. NDIS 6 supports exposing 802.11 frames to the upper protocol levels, while previous versions only exposed fake Ethernet frames translated from the 802.11 frames. Monitor mode support in NDIS 6 is an optional feature and may or may not be implemented in the client adapter driver. The implementation details and compliance with the NDIS specifications vary from vendor to vendor. In many cases, monitor mode support is not properly implemented by the vendor. For example, Ralink drivers report incorrect dBm readings and Realtek drivers do not include trailing 4-byte CRC values. For versions of Windows prior to Windows Vista, some packet analyzer applications such as Wildpackets' OmniPeek and TamoSoft's CommView for WiFi provide their own device drivers to support monitor mode. Linux's interfaces for 802.11 drivers support monitor mode and many drivers offer that support. STA drivers (Ralink, Broadcom) and every other manufacturer’s provided driver does
https://en.wikipedia.org/wiki/Precompiled%20header
In computer programming, a precompiled header (PCH) is a (C or C++) header file that is compiled into an intermediate form that is faster to process for the compiler. Usage of precompiled headers may significantly reduce compilation time, especially when applied to large header files, header files that include many other header files, or header files that are included in many translation units. Rationale In the C and C++ programming languages, a header file is a file whose text may be automatically included in another source file by the C preprocessor by the use of a preprocessor directive in the source file. Header files can sometimes contain very large amounts of source code (for instance, the header files windows.h and Cocoa/Cocoa.h on Microsoft Windows and OS X, respectively). This is especially true with the advent of large "header" libraries that make extensive use of templates, like the Eigen math library and Boost C++ libraries. They are written almost entirely as header files that the user #includes, rather than being linked at runtime. Thus, each time the user compiles their program, the user is essentially recompiling numerous header libraries as well. (These would be precompiled into shared objects or dynamic link libraries in non "header" libraries.) To reduce compilation times, some compilers allow header files to be compiled into a form that is faster for the compiler to process. This intermediate form is known as a precompiled header, and is commonly held in a file named with the extension .pch or similar, such as .gch under the GNU Compiler Collection. Usage For example, given a C++ file source.cpp that includes header.hpp: //header.hpp ... //source.cpp #include "header.hpp" ... When compiling source.cpp for the first time with the precompiled header feature turned on, the compiler will generate a precompiled header, header.pch. The next time, if the timestamp of this header did not change, the compiler can skip the compilation phase relating to header.hpp and instead use header.pch directly. Common implementations Microsoft Visual C and C++ Microsoft Visual C++ (version 6.0 and newer) can precompile any code, not just headers. It can do this in two ways: either precompiling all code up to a file whose name matches the /Ycfilename option or (when /Yc is specified without any filename) precompiling all code up to the first occurrence of #pragma hdrstop in the code The precompiled output is saved in a file named after the filename given to the /Yc option, with a .pch extension, or in a file named according to the name supplied by the /Fpfilename option. The /Yu option, subordinate to the /Yc option if used together, causes the compiler to make use of already precompiled code from such a file. pch.h (named stdafx.h before Visual Studio 2017) is a file generated by the Microsoft Visual Studio IDE wizard, that describes both standard system and project specific include files that are used frequently but hardly ever chang
https://en.wikipedia.org/wiki/WSYM-TV
WSYM-TV (channel 47) is a television station in Lansing, Michigan, United States, affiliated with Fox and MyNetworkTV. Owned by the E. W. Scripps Company, the station has studios on West Saint Joseph Street (along I-496) in downtown Lansing, and its transmitter is located in Hamlin Township along M-50/M-99/South Clinton Trail. History WSYM signed on for the first time on December 1, 1982, as WFSL-TV. It was owned by Lansing businessman Joel Ferguson and his company, F&S Development Company, and aired an analog signal on channel 47. WFSL was the first new commercial station in the area since WILX-TV signed-on 23 years earlier. Conventional wisdom suggested it should have debuted as an ABC affiliate. Lansing was one of the largest markets in the nation that still didn't have full service from all three major networks. Indeed, Lansing had been large enough to support three full network affiliates since the 1960s. However, after all attempts to land an ABC affiliation failed, it signed on as an independent. Flint's WJRT-TV (channel 12) had long been the default ABC affiliate in Lansing, since it covered the immediate area with an adequate signal. During its pre-sign-on test pattern, an on-screen crawl thanked numerous people and companies for their help including "All the people who said 'No way will that station get on-the-air by December 1st.'" WFSL was a typical UHF independent airing syndicated cartoons, game shows, movies, and off-network sitcoms. For a time, the station also simulcast the ABC game show Family Feud and soap opera The Edge of Night from eventual sister station WXYZ-TV in Detroit in hopes of eventually landing a full-time ABC affiliation. Ferguson sold the station to the Journal Company, then the broadcast arm of the Milwaukee Journal, in 1985, as the second broadcast asset for that company outside of Milwaukee. The new owners changed the call sign to WSYM-TV—an acronym meaning "We Say Yes to Michigan", in reference to the "Yes Michigan!" tourism campaign of the 1980s from the Michigan Economic Development Corporation (the station still uses that phrase as part of its on-air imaging today). The call letters once belonged to a ship but that registration was canceled by the United States Coast Guard to allow channel 47 to use them. Five years later, Ferguson used the proceeds from the sale of this station to start Lansing's first ABC affiliate, WLAJ. WSYM affiliated with Fox in 1990. Previously, Detroit's WKBD served as the "fourth" network's default affiliate in Lansing; it had been available on cable in Lansing for decades. Some parts of the market could also receive Fox from WXMI in Grand Rapids and WSMH in Flint. WSYM is also part of the Detroit Lions Television Network which airs Detroit Lions pre-season games and the syndicated Ford Lions Report during the regular season. It airs Lions games during the regular season as part of the NFL on Fox contract. The Detroit Tigers also appear on this station during Fox Saturday Bas
https://en.wikipedia.org/wiki/Sunsite
SunSITE (Sun Software, Information & Technology Exchange) is a network of Internet servers providing archives of information, software and other publicly available resources. The project, started in the early 1990s, is run by a number of universities worldwide and was initially co-sponsored by Sun Microsystems. The more notable SunSITEs include: SunSITE Canada, operated by University of British Columbia = Found Without Content - 2022.04.28 SunSITE Central Europe, operated by RWTH Aachen, Germany Sun SITE Central Europe Workshop Proceedings (CEUR-WS.org) Free Open-Access SunSITE Poland, operated by ICM, University of Warsaw Some former SunSITEs: SunSITE Chile SunSITE Czech Republic, operated by School of Computer Science, Charles University, Prague = Server Not Found - 2022.04.28 SunSITE Denmark, now running as dotsrc.org Open Source Hosting SunSITE Mexico = Blank Page - 2022.04.28 SunSITE North Carolina, operated by University of North Carolina at Chapel Hill, now running as Ibiblio SunSITE RedIris (Spain), operated by Spanish National Research Network = Server Not Found - 2022.04.28 SunSITE Singapore, operated by National University of Singapore = Blank Page - 2022.04.28 SunSITE Switzerland, operated by SWITCH Information Technology Services, now running as SWITCHmirror SunSITE Tennessee operated by University of Tennessee, Knoxville = Server Not Found - 2022.04.28 SunSITE Thailand operated by Assumption University, Bangkok = Server Not Found - 2022.04.28 University of Alberta SunSITE, now running as the University of Alberta Digital Object Repository (UADORe) No longer in operation: SunSITE Austria , operated by University of Vienna SunSITE Argentina, operated by Universidad de Buenos Aires. Berkeley Digital Library SunSITE, University of California, Berkeley Libraries SunSITE Hungary, run by Institute of Mathematics, University of Debrecen SunSITE Indonesia, operated by Faculty of Computer Science, University of Indonesia, Jakarta SunSITE Japan SunSITE South Africa, operated by University of Witwatersrand, Johannesburg SunSITE UK, operated by Imperial College Department of Computing. Academic computer network organizations Servers (computing) Sun Microsystems
https://en.wikipedia.org/wiki/Autosan
Autosan Sp. z o.o. is a Polish bus and coach manufacturer. The company is located in Sanok, Poland. Its sales network includes European (also non-EU countries), African and Asian countries. Currently it produces approximately 300 buses a year. History The company was founded in 1832 by Walenty Lipiński and Mateusz Beksiński as a boilermaker's plant. The history of the factory changed depending on domestic and European economic situations. At the beginning of its activity, the factory produced devices and equipment for the oil mining, distillery and brewing industries. It later added transportation to its range and by 1894 it had become Poland's most important manufacturer of rail coaches and freight cars, tramcars and other high-capacity vehicles, while continuing to produce their initial output of boilers and other related devices. Later, even more variety of product was added, including cisterns, cranes, dredgers, road rollers, steel lifeboats, steel bridge constructions and casting articles. In 1926, Autosan launched its first lot of buses mounted on Lancia chassis. Activities were interrupted during World War II but resumed in 1950. In 1973, a new family of buses is launched - the H9 bus, with the engine mounted at the rear. It would be followed in 1984 by the high-capacity H10 model. In September 2013 the Court of Krosno declared the factory bankrupt. In a statement issued at the time it was explained that it was impossible to continue financing the restructuring. A few days later Sobiesław Zasada Group, which owned the company, sold a package of shares in Autosan to Gregory Tarnawa for one Polish zloty. Trade unionists from the factory picketed in front of the former owner, Sobiesław Zasada Group, in Kraków, demanding payment of arrears of salary for several months. The company is still operational. Since 2001, the company has developed and produced components for rail vehicles, especially the bodies of railcars and trams. Products Buses Current models Tourist coaches Autosan A0808T Gemini Autosan A1112T Ramzes Intercity buses Autosan A0808T Gemini Autosan A0909L Tramp 2 (Autosan Scamp) Autosan A1010T Lider 3 Autosan A1012T Lider Autosan Eurolider 9 Autosan Eurolider 12 Autosan Eurolider 13 Autosan Lider 9 eco Autosan Lider 9 eco2 Autosan A8V Wetlina (Autosan Osprey) Local buses Autosan A1010T Lider 10 Autosan H7-20MB Solina Autosan Sancity 9LE Autosan Eurolider 13LE Autosan Eurolider 15LE City buses (low-floor and low-entry buses) Sancity 9LE Sancity 10LF Sancity 12LE Sancity 12LF Sancity 18LF Autosan A8V Wetlina City (Autosan Osprey) School buses Autosan A0909S Smyk Autosan A1012T Eagle RHD Special buses, prison vans Autosan A1010T DW Autosan H7-10ZK Police buses for military squads Autosan H7-10I Historical buses Tourist coaches Autosan A404T Cezar Autosan A1112T San Autosan A1112T Sanman Intercity buses Autosan H6-10 Melon Autosan A0909L Tramp Autosan H7-10 Traper Autosan H9-xx Au
https://en.wikipedia.org/wiki/New%20Hampshire%20Public%20Radio
New Hampshire Public Radio (NHPR) is the National Public Radio member network serving the state of New Hampshire. NHPR is based in Concord and operates eight transmitters and six translators covering nearly the whole state, as well as portions of Massachusetts, Vermont and Maine. The network airs NPR news and talk shows on weekdays and a mix of cultural and music programs on weekends. NHPR's news staff of 21 is one of the largest in the state and is the only statewide source of radio news. History and listenership NHPR's original station, WEVO, signed on from Concord on August 4, 1981. It was originally known as "Granite State Public Radio," after New Hampshire's state nickname. Prior to its sign-on, New Hampshire was one of the few states in New England without a clear signal from an NPR station. WEVO had 500 members at its start. Over several years the station grew in size. In 1991, the newly renamed NHPR began broadcasting 24 hours a day, seven days a week. Between 1992 and 2011, six other stations joined the network. In 1995 NHPR launched The Exchange, hosted by former NPR reporter Laura Knoy. Until 2000, NHPR broadcast a mix of NPR news and classical music. However, in 2000 it switched its weekday schedule to all news and talk. In spring 2007 NHPR had a weekly audience of 161,100 listeners and about 16,000 contributing members. It had an annual budget of $4.5 million, with contributions from listeners, local businesses, grants and funding from the Corporation for Public Broadcasting. Contributions from listeners and businesses in New Hampshire make up more than 90 percent of NHPR's revenue. NHPR does not receive funding from the state of New Hampshire. In 2014, NHPR bought WCNH, a classical music station. Since WCNH operates at only 190 watts, it is simulcast on WEVO's second HD channel. In 2017, NHPR reported over 190,000 weekly listeners and 200,000 monthly unique website viewers. Stations Notes: Translators Programming At first, NHPR broadcast a mixed format of news and information programming from NPR during drive times, and music mid-days, evenings, and overnights. As has been the case with most other NPR member stations over the past decade and a half, the network dropped music programming (except for a handful of weekend features) by 2001 to carry news and information programming around the clock. Local staff produces three hours each day of newscasts and feature reports on local New Hampshire news and two daily interview programs. The Exchange, hosted by Laura Knoy, was a one-hour morning news and public affairs call-in show. Word of Mouth, hosted by Justine Paradis, was a one-hour midday general topics interview show. NHPR also locally produces The Folk Show, a live show featuring performances by local musicians, on Sunday evenings and hosted by Kate McNally. NHPR broadcasts the major daily news programs produced by NPR, including Morning Edition and All Things Considered. The statewide network also broadcasts programm
https://en.wikipedia.org/wiki/Side%20Pocket
is a pocket billiards simulation released as an arcade video game by Data East in 1986. It was ported to the Nintendo Entertainment System and Game Boy, while an enhanced remake was later released on the Sega Genesis, Super Nintendo Entertainment System, and Game Gear. The game spawned two sequels, as well as arcade spin-off series titled Pocket Gal. G-Mode owns the intellectual property rights to the Side Pocket series, and licenses these games globally. Gameplay The primary play mode, called "Pocket Game", is a straight pool game set within a limited number of lives; the player must achieve a predetermined score to advance through four or five levels, each with increasing number of balls. The player earns points by potting balls, potting balls on consecutive shots, and potting balls in numerical order. On occasion, a flashing star appear in a pocket, and if the player pots a ball into that pocket in the same shot, a bonus will be awarded in the form of points, extra lives or a bonus round. One life is lost if the player or fails to pot a ball in two consecutive shots. In the two-player mode, the player can choose between Pocket Game or 9-Ball Game. In two-player Pocket Game, the game plays similarly, except the two players take turns and there are no lives; if one player misses or scratches, control of the ball simply changes to the other player. In 9-Ball Game, each player has three lives and one life is lost if a is committed. However, the lives will be restored if the player makes a legal shot on the next turn. In the Game Boy and Game Gear version, there is also an additional practice mode, which is essentially a single-player version of 9-Ball Game. A variety of trick shot challenges are also available to the player(s), to earn additional points or extra life, requiring the player pot all balls into select pockets using a single shot. The player may put various spins on the ball, such as left and right , and perform and . The Genesis and SNES versions features a photo-realistic representation of the player characters. The characters are a homage to the 1986 billiards-themed film The Color of Money; with the characters bearing resemblance to Vincent Lauria (played by Tom Cruise) and Fast Eddie (played by Paul Newman), the two main characters from the film. Ports Side Pocket was ported to the Nintendo Entertainment System and Game Boy. The NES version plays almost identical to the arcade version, but the Pocket Game mode features 4 levels and the player starts with 5 lives, as opposed to 2. The NES version also introduce four different rack configuration that become standard in later versions, whereas the arcade version only feature six-ball and nine-ball racks. The Game Boy version of Side Pocket is a slight modification from the NES version, featuring a smaller playing field (to compensate with Game Boy's screen), new set of soundtrack and a different screen layout. Like in NES version, the Pocket Game mode features 4 leve
https://en.wikipedia.org/wiki/Grind%20Session
Grind Session is a skateboarding video game developed by Shaba Games and published by Sony Computer Entertainment for the PlayStation. It was released on May 23, 2000 in North America and in August 2000 in Europe. Gameplay Grind Session features six professional skaters and nine hidden characters. The player also has the ability to choose between four custom skaters, and edit their tricks and names. Reception The game received favorable reviews according to the review aggregation website GameRankings. Nearly six months after the game's release, however, Daniel Erickson of NextGen said, "If you've already played out Tony Hawk's Pro Skater, go pick up Street Sk8er 2. At least that plays differently." The game was a runner-up for GameSpots annual "Best Game Music" and "Best Sports Game (Alternative)" awards among console games, both of which went to Chrono Cross and Tony Hawk's Pro Skater 2. It was also a runner-up for the "Best Extreme Sports Game" award at the Official U.S. PlayStation Magazine 2000 Editors' Awards, which went to SSX. Notes References External links 2000 video games PlayStation (console) games PlayStation (console)-only games Skateboarding video games Sony Interactive Entertainment games Video games developed in the United States
https://en.wikipedia.org/wiki/Luke%20Darcy
Luke Darcy (born 12 July 1975) is a former Australian rules footballer who played with the Western Bulldogs in the Australian Football League (AFL) and now works for the Seven Network and Triple M covering the AFL and the Olympics. Early life Luke Darcy was born in Adelaide, South Australia, the son of David Darcy, who had played with Footscray (as the Western Bulldogs were then called) and played for and coached South Adelaide in the South Australian National Football League (SANFL). David, originally a Victorian, moved his family to Adelaide where Luke attended Rostrevor College. AFL career Luke Darcy started his career with South Adelaide before his recruitment by the Bulldogs in 1993. Debuting in 1994, Darcy became known as one of the Bulldogs' most successful ruckmen/forwards. In 2001 he took out the Bulldogs' Best and Fairest award, the Charles Sutton Medal, and continued to play well in the following seasons. in 2002 Darcy and the Brisbane Lions's Michael Voss were the first players to be awarded the Leigh Matthews Trophy as the AFL Players Association's Most Valuable Player (MVP)1. In 2004 he was the Western Bulldogs's leading goalkicker. In a 2005 match against Geelong, Darcy suffered a season-ending knee injury when he twisted it, depriving the Bulldogs of a quality tall-forward option, something they missed during the year. On 20 December 2005 during the final pre-season training session before the Christmas holidays, Darcy re-injured the ACL during a fall which dislocated his knee, which meant that he would miss the entire 2006 season. The Bulldogs finished the season in eighth place, the first time the club had made the finals in six years. He had been part of a Bulldogs casualty list that included four ACL injuries during the season (up until only the Round 9 mark). During his time on the sidelines, he provided special comments for Network Ten's AFL coverage, and continued to do so after his playing retirement which he announced on 2 August 2007, the end of the 2007 AFL season. Darcy was officially added to Network Ten's AFL commentary team in 2007 (despite still playing football until the end of that season) and remained an Expert Commentator right up until the end of the 2011 AFL season, when the network lost broadcasting rights.. Statistics |- |- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 1994 |style="text-align:center;"| | 40 || 1 || 0 || 0 || 0 || 2 || 2 || 0 || 1 || 0.0 || 0.0 || 0.0 || 2.0 || 2.0 || 0.0 || 1.0 |- ! scope="row" style="text-align:center" | 1995 |style="text-align:center;"| | 14 || 3 || 0 || 1 || 10 || 5 || 15 || 4 || 2 || 0.0 || 0.3 || 3.3 || 1.7 || 5.0 || 1.3 || 0.7 |- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 1996 |style="text-align:center;"| | 14 || 20 || 12 || 8 || 160 || 78 || 238 || 92 || 15 || 0.6 || 0.4 || 8.0 || 3.9 || 11.9 || 4.6 || 0.8 |- ! scope="row" style="text-align:center" | 1997 |style="text-align:center;"| | 14 || 23 ||
https://en.wikipedia.org/wiki/Color%20BASIC
Color BASIC is the implementation of Microsoft BASIC that is included in the ROM of the Tandy/Radio Shack TRS-80 Color Computers manufactured between 1980 and 1991. BASIC (Beginner's All-purpose Symbolic Instruction Code) is a high level language with simple syntax that makes it easy to write simple programs. Color BASIC is interpreted, that is, decoded as it is run. Background The nucleus of Color BASIC was Microsoft BASIC-69 which Tandy licensed from Microsoft. Color BASIC 1.0 was released with the original 4k TRS-80 Color Computer in 1980. It resides on 8k bytes of ROM, and is responsible for all 'housekeeping' duties on the system. This includes hardware initialization, memory management, interrupt processing, etc. Like most implementations of BASIC, each line of code starts with a line number and consists of one or more statements with variables and operators. 16k of memory is required for the next level of BASIC, Extended Color BASIC. ("ECB") Extended BASIC is required for the floppy disk controller, which then gives you Disk Extended Color BASIC. ("DECB") Emulators of the Color Computers running this interpreter and the others are available for modern computers, some of which require a "snapshot" file of the physical machine. Variables Color BASIC understands one type of numeric variable and string variables. Variable names in Color BASIC have the first two characters significant. The first character of the variable name must be a letter. The second can be either a letter or number. String variables are indicated by adding a dollar sign ($) after the variable name. Examples A=5 A$="THIS IS A STRING" K7=10 BB$="HELLO!" ZZ=1.54 Numeric variables have only one type, a binary floating point implementation. Each numeric variable uses 5 bytes of memory and can be in the range from -1E+38 up to 1E+37. Unlike most implementations of Microsoft BASIC, Color BASIC requires the user to reserve space for string variables via the CLEAR statement. Multidimensional arrays are also supported with both numeric and string variables. In the case of an array, the element address is enclosed with a parenthesis: A(1)=1 A$(1)="BOOKS" Multiple dimensions are separated by commas A(1,3)=4 A$(2,2)="XYZ123" Operators and Symbols Color BASIC provides several operators for both mathematic and, to a lesser extent, string operations. + can be used to concatenate strings or for mathematical addition - is used for subtraction * is used for multiplication / is used for division Parenthesis ( ) are used to override mathematical order of operation AND is used for logical 'and' operations OR is used for logical 'or' operations NOT is used for logical 'not' operations For testing, the following operators are used: = is equal to > is greater than < is less than >= is greater than or equal to (also => is acceptable) <= is less than or equal to (also =< is acceptable) <> is not equal to (also >< is acceptable) Other symbols used in BASIC: " " indicates string data i
https://en.wikipedia.org/wiki/APF-MP1000
The APF Microcomputer System is a second generation 8-bit cartridge-based home video game console released in October 1978 by APF Electronics Inc. with six cartridges. The console is often referred to M-1000 or MP-1000, which are the two model numbers of the console. The APF-MP1000 comes built-in with the game Rocket Patrol. The APF-MP1000 is a part of the APF Imagination Machine. The APF-MP1000 and the APF Imagination Machine were developed in part by the noted engineer Ed Smith. It is the successor to the APF TV Fun line of first generation consoles. Technical specifications CPU: Motorola 6800 (8 bit) @ 0.895 MHz (3.579 MHz oscillator divided by 4) RAM: 1 KB Video Display Controller: MC6847 Palette : 8 colors Resolutions: 256×192×4 / 128×192×8 Power Supply: 7.5 V AC 0.8 A or 12 V DC 0.5 A Cartridge list References Further reading "APF MP-1000 Game Console Programming" APF MP-1000 page at Old-Computers.com museum Ed Smith And The Imagination Machine: The Untold Story Of A Black Video Game Pioneer (Benj Edwards, FastCompany, 2016) Benj Edwards Presents Vintage Computing and Gaming - Adventures in Classic Technology. Blog posts. Video Game Console Library TheGameConsole.com APF-*1000/IM – Guides and FAQs by GameFAQs (Updated: 06/09/2001) - APF-M1000, APF-MP1000 & Imagination Machine FAQ (Backup copy of above at Console Database) APF M1000 Video Game System Review by THE NORTHEAST OHIO VIDEO HUNTER (August 1, 2013) Home video game consoles Discontinued video game consoles Second-generation video game consoles Products introduced in 1978 68xx-based computers
https://en.wikipedia.org/wiki/Middlebox
A middlebox is a computer networking device that transforms, inspects, filters, and manipulates traffic for purposes other than packet forwarding. Examples of middleboxes include firewalls, network address translators (NATs), load balancers, and deep packet inspection (DPI) devices. UCLA computer science professor Lixia Zhang coined the term middlebox in 1999. Usage Middleboxes are widely deployed across both private and public networks. Dedicated middlebox hardware is widely deployed in enterprise networks to improve network security and performance, however, even home network routers often have integrated firewall, NAT, or other middlebox functionality. One 2017 study counting more than 1,000 deployments in autonomous systems, in both directions of traffic flows, and across a wide range networks, including mobile operators and data center networks. Examples The following are examples of commonly deployed middleboxes: Firewalls filter traffic based on a set of predefined security rules defined by a network administrator. IP firewalls reject packets "based purely on fields in the IP and transport headers (e.g., disallow incoming traffic to certain port numbers, disallow any traffic to certain subnets etc.)" Other types of firewalls may use more complex rulesets, including those that inspect traffic at the session or application layer. Intrusion detection systems (IDSs) monitor traffic and collect data for offline analysis for security anomalies. Unlike firewalls, IDSs do not filter packets in real time, as they are capable of more complex inspection and must decide whether to accept or reject each packet as it arrives. Network address translators (NATs) replace the source and/or destination IP addresses of packets that traverse them. Typically, NATs are deployed to allow multiple end hosts to share a single IP address: hosts "behind" the NAT are assigned a private IP address and their packets destined to the public Internet traverse a NAT, which replaces their internal private address with a shared public address. These are widely used by cellular network providers to manage scarce resources. WAN optimizers improve bandwidth consumption and perceived latency between endpoints. Typically deployed in large enterprises, WAN optimizers are deployed near both sending and receiving endpoints of communication; the devices then coordinate to cache and compress traffic that traverses the Internet. Load balancers provide one point of entry to a service, but forward traffic flows to one or more hosts that actually provide the service. Cellular networks use middleboxes to ensure scarce network resources are used efficiently as well as to protect client devices. Criticism and challenges Middleboxes have generated technical challenges for application development and have incurred "scorn" and "dismay" in the network architecture community for violating the end-to-end principle of computer system design. Application interference Some middleboxes
https://en.wikipedia.org/wiki/Cyber%20Monday
Cyber Monday is a marketing term for e-commerce transactions on the Monday after Thanksgiving in the United States. It was created by retailers to encourage people to shop online. The term was coined by Ellen Davis of the National Retail Federation and Scott Silverman, and made its debut on November 28, 2005, in a Shop.org press release entitled Cyber Monday' Quickly Becoming One of the Biggest Online Shopping Days of the Year". Cyber Monday takes place the Monday after Thanksgiving; the date falls between November 26 and December 2, depending on the year. Cyber Monday has become the online equivalent to Black Friday and offers a way for smaller retail websites to compete with larger chains. Since its inception, it has become an international marketing term used by online retailers around the world. According to the Shop.org/Bizrate Research 2005 eHoliday Mood Study, "77 percent of online retailers said that their sales increased substantially on the Monday after Thanksgiving, a trend that is driving serious online discounts and promotions on Cyber Monday this year (2005)". In 2017, Cyber Monday online sales grew to a record of $6.59 billion, compared with $2.98 billion in 2015, and $2.65 billion in 2014. However, the average order value was $128, down slightly from 2014's $160. The Cyber Monday on November 30, 2020 was the biggest online shopping day in U.S. history with a total of $10.7 billion in online spending. History The term "Cyber Monday" was coined by Ellen Davis, and was first used within the ecommerce community during the 2005 holiday season. According to Scott Silverman, the head of Shop.org, the term was coined based on 2004 research showing "one of the biggest online shopping days of the year" was the Monday after Thanksgiving (12th-biggest day historically). Retailers also noted the most significant shopping period was December 5 through 15 of the previous year. In late November 2005, The New York Times reported: "The name Cyber Monday grew out of the observation that millions of otherwise productive working Americans, fresh off a Thanksgiving weekend of window shopping, were returning to high-speed Internet connections at work Monday and buying what they liked." At the time, a lot of people had slow Internet at home. The idea for having such a holiday was created by Tony Valado, in 2003 while working at 1800Flowers.com, and coined "White Wednesday" to be the day before Thanksgiving for online retailers. Argentina According to Argentine press and marked a tenfold growth in users taking advantage of online sales over the previous year. Australia Beginning at 7 pm AEDT on November 20 in 2012, Australian online retailers decided to hold a similar event for the first time, dubbed "Click Frenzy". Many websites immediately crashed, went offline, or had major server issues, including the Click Frenzy promotion website. David Jones, a major retailer, ran a competing sale dubbed 'Christmas Frenzy' on the same date. Belgium In Be
https://en.wikipedia.org/wiki/Advanced%20Programmable%20Interrupt%20Controller
In computing, Intel's Advanced Programmable Interrupt Controller (APIC) is a family of interrupt controllers. As its name suggests, the APIC is more advanced than Intel's 8259 Programmable Interrupt Controller (PIC), particularly enabling the construction of multiprocessor systems. It is one of several architectural designs intended to solve interrupt routing efficiency issues in multiprocessor computer systems. The APIC is a split architecture design, with a local component (LAPIC) usually integrated into the processor itself, and an optional I/O APIC on a system bus. The first APIC was the 82489DX it was a discrete chip that functioned both as local and I/O APIC. The 82489DX enabled construction of symmetric multiprocessor (SMP) systems with the Intel 486 and early Pentium processors; for example, the reference two-way 486 SMP system used three 82489DX chips, two as local APICs and one as I/O APIC. Starting with the P54C processor, the local APIC functionality was integrated into the Intel processors' silicon. The first dedicated I/O APIC was the Intel 82093AA, which was intended for PIIX3-based systems. Overview There are two components in the Intel APIC system, the local APIC (LAPIC) and the I/O APIC. There is one LAPIC in each CPU in the system. In the very first implementation (82489DX), the LAPIC was a discrete circuit, as opposed to its later implementation in Intel processors' silicon. There is typically one I/O APIC for each peripheral bus in the system. In original system designs, LAPICs and I/O APICs were connected by a dedicated APIC bus. Newer systems use the system bus for communication between all APIC components. Each APIC, whether a discrete chip or integrated in a CPU, has a version register containing a four-bit version number for its specific APIC implementation. For example, the 82489DX has an APIC version number of 0, while version 1 was assigned to the first generation of local APICs integrated in the Pentium 90 and 100 processors. In systems containing an 8259 PIC, the 8259 may be connected to the LAPIC in the system's bootstrap processor (BSP), one of the system's I/O APICs, or both. Logically, however, the 8259 is only connected once at any given time. Discrete APIC The first-generation Intel APIC chip, the 82489DX, which was meant to be used with Intel 80486 and early Pentium processors, is actually an external local and I/O APIC in one circuit. The Intel MP 1.4 specification refers to it as "discrete APIC" in contrast with the "integrated APIC" found in most of the Pentium processors. The 82489DX had 16 interrupt lines; it also had a quirk that it could lose some ISA interrupts. In a multiprocessor 486 system, each CPU had to be paired with its own 82489DX; additionally a supplementary 82489DX had to be used as I/O APIC. The 82489DX could not emulate the 8259A (XT-PIC) so these also had to be included as physical chips for backwards compatibility. The 82489DX was a packaged as a 132-pin PQFP. Integrated local
https://en.wikipedia.org/wiki/Camputers%20Lynx
The Lynx was an 8-bit British home computer that was first released in early 1983 as a 48 kB model. Several models were available with 48 kB, 96 kB or 128 kB RAM. It was possible to reach 192 kB with RAM expansions on board. John Shireff designed the hardware and Davis Jansons the firmware. The machine was based around a Z80A CPU clocked at 4 MHz (6 MHz for the 128/192 kB models) and featured a Motorola 6845 as video controller. It was possible to run CP/M with the optional 5.25" floppy disk-drive on the 96 kB and 128 kB models. The machine was quite advanced for its time. A 48k machine cost £225, a 96k machine £299 and a 128k machine £345. When compared to its competitors, such as the ZX Spectrum and the Oric 1, it was also fairly highly priced. Camputers rebranded and relaunched each machine on several occasions, with the 48k machine renamed the Leisure, and the 128k machine renamed as the Laureate. The machine had very little software available, and survived only until Camputers ceased trading in June 1984. It is believed that approximately 30,000 Camputers Lynx units were sold worldwide. Anston Technology took over in November 1984 and a re-launch was planned but never happened. In June 1986, Anston sold everything - hardware, design rights and thousands of cassettes - to the National Lynx User Group. The group planned to produce a Super-Lynx but was too busy supplying spares and technical information to owners of existing models, and the project never came into being. Unique features of this computer (compared to other home computers at the time) includes: All numbers were floating point BCD numbers (even line numbers). The computer always ran in "high" resolution graphics mode (256x252 pixels in eight colours) using 6 times 10 pixels characters. Only a few bytes of graphic memory could be manipulated during the horizontal sync period, and thus graphics were extremely slow compared to most other computers. Up to 192 kB of RAM and 20 kB of ROM (16 kB on the smallest model) on a 16 bit address bus was implemented using special hardware. As a consequence, certain RAM areas shadowed by ROM could only be used for data storage and the video memory had a green and alternative green bank that could be switched by a hardware register. For sound it had a simple (6 bit) DAC. A comparator was included to serve as an ADC (primarily used for reading from tape drives). Compared to, for example, the Commodore 64, the BASIC was more extensive and faster and resolution of graphics was better; but computer games on the other hand suffered from the special implementation and lack of hardware for sound and sprites. The software library for this machine is limited, at around 120 titles. Reception After seeing a preview of the Camputers Lynx at the Personal Computer World Show, BYTE in January 1983 stated that it "offers more computing power for the money than any other machine I saw there". Computing Today in June 1983 criticized the manual as "put
https://en.wikipedia.org/wiki/Scala%20%28programming%20language%29
Scala ( ) is a strong statically typed high-level general-purpose programming language that is supporting both object-oriented programming and functional programming. Designed to be concise, many of Scala's design decisions are aimed to address criticisms of Java. Scala source code can be compiled to Java bytecode and run on a Java virtual machine (JVM). Scala can also be compiled to JavaScript to run in a browser, or directly to a native executable. On the JVM Scala provides language interoperability with Java so that libraries written in either language may be referenced directly in Scala or Java code. Like Java, Scala is object-oriented, and uses a syntax termed curly-brace which is similar to the language C. Since Scala 3, there is also an option to use the off-side rule (indenting) to structure blocks, and its use is advised. Martin Odersky has said that this turned out to be the most productive change introduced in Scala 3. Unlike Java, Scala has many features of functional programming languages (like Scheme, Standard ML, and Haskell), including currying, immutability, lazy evaluation, and pattern matching. It also has an advanced type system supporting algebraic data types, covariance and contravariance, higher-order types (but not higher-rank types), anonymous types, operator overloading, optional parameters, named parameters, raw strings, and an experimental exception-only version of algebraic effects that can be seen as a more powerful version of Java's checked exceptions. The name Scala is a portmanteau of scalable and language, signifying that it is designed to grow with the demands of its users. History The design of Scala started in 2001 at the École Polytechnique Fédérale de Lausanne (EPFL) (in Lausanne, Switzerland) by Martin Odersky. It followed on from work on Funnel, a programming language combining ideas from functional programming and Petri nets. Odersky formerly worked on Generic Java, and javac, Sun's Java compiler. After an internal release in late 2003, Scala was released publicly in early 2004 on the Java platform, A second version (v2.0) followed in March 2006. On 17 January 2011, the Scala team won a five-year research grant of over €2.3 million from the European Research Council. On 12 May 2011, Odersky and collaborators launched Typesafe Inc. (later renamed Lightbend Inc.), a company to provide commercial support, training, and services for Scala. Typesafe received a $3 million investment in 2011 from Greylock Partners. Platforms and license Scala runs on the Java platform (Java virtual machine) and is compatible with existing Java programs. As Android applications are typically written in Java and translated from Java bytecode into Dalvik bytecode (which may be further translated to native machine code during installation) when packaged, Scala's Java compatibility makes it well-suited to Android development, more so when a functional approach is preferred. The reference Scala software distribution, includi
https://en.wikipedia.org/wiki/StreamCast%20Networks
StreamCast Networks, Inc., was an American corporation, specializing in peer-to-peer software. Formerly named MusicCity, it created Morpheus, which was one of the first major peer-to-peer Internet applications. StreamCast was a defendant in the MGM v. Grokster case, in which the U.S. Supreme Court unanimously ruled that StreamCast could be sued for inducing copyright infringement for acts taken in the course of marketing file sharing software. On May 22, 2006, StreamCast Networks filed a lawsuit against eBay in hopes of stopping the distribution of its Skype software. StreamCast claims that the rights for Skype as well as the FastTrack technology were unrightfully taken away from it. On April 22, 2008, StreamCast Networks filed for Chapter 7 bankruptcy; all employees were laid off and Morpheus became no longer available for download. References Defunct online companies of the United States Companies that filed for Chapter 7 bankruptcy in 2008 Companies that have filed for Chapter 7 bankruptcy
https://en.wikipedia.org/wiki/Irma%20board
Irma board, originally spelled IRMA board, refers to a brand of coaxial interface cards for PCs and Macintosh computers used to enable 3270 emulator programs to connect to IBM mainframe computers. IRMA boards were used to connect PCs and Macs to IBM 3274 terminal controllers. IRMA boards supported both Control Unit Terminal (CUT) and Distributed Function Terminal (DFT) mode, although the later required additional software–DFT mode supported multiple simultaneous mainframe sessions. IRMA boards were invented by Technical Analysis Corp. (TAC), acquired by Digital Communications Associates, Inc. (DCA) who manufactured and marketed the Irma products from 1982 on. DCA of Alpharetta, Georgia, was acquired in 1994 by Attachmate of Bellevue, Washington. A board with all the capabilities of that which would eventually be called IRMA was originally developed in-house by Amdahl Corp in 1977, but it was not actively marketed by Amdahl. See also IBM 3270 PC Avatar Technologies, Inc. (née 3R Computers), makers of the Mac Mainframe line of products allowing IBM 3270 emulation on the Macintosh SE and II Terminal emulator References Mainframe computers Computer-related introductions in 1982
https://en.wikipedia.org/wiki/Obstack
In the C programming language, Obstack is a memory-management GNU extension to the C standard library. An "obstack" is a "stack" of "objects" (data items) which is dynamically managed. It implements a region-based memory management scheme. Obstack code typically provides C macros which take care of memory allocation and management for the user. Basically, obstacks are used as a form of memory management which can be more efficient and less difficult to implement than malloc/free in several situations. For example, say one needs to set up a stack for handling data items whose number grows for a while and then reach a final form; such a stack could be defined in obstack.h. Freeing allocated objects Once the object is allocated a new chunk of memory in obstack it must be freed after its use. Functions and macros The interfaces for using obstacks may be defined either as functions or as macros, depending on the compiler. The obstack facility works with all C compilers. In an old-fashioned non-ISO C compiler, all the obstack functions are actually defined only as macros. You can call these macros like functions, but you cannot use them in any other way. For example, you cannot take their address. Calling the macros requires a special precaution: namely, the first operand (the obstack pointer) should not contain any side effects, because it may be computed more than once. In ISO C, each obstack function has both a macro definition and a function definition. The function definition is used if the macro substitution fails. An ordinary call uses the macro definition by default, but you can request the function definition instead by writing the function name in parentheses, as shown here: char *x; void *(*funcp)(); x = obstack_alloc(obptr, size); /* Use the macro. */ x = (obstack_alloc) (obptr, size); /* Call the function. */ funcp = obstack_alloc; /* Take the address of the function. */ This is the same situation that exists in ISO C for the standard library functions. Growing objects Since the memory chunks in an obstack are used sequentially, it is possible to build up an object by adding data of size 'bytes' at the end of it. This technique of step by step building up of an object is termed as 'growing an object'. References External links Obstacks - The GNU C Library Abstract data types GNU Project
https://en.wikipedia.org/wiki/Tony%20Tebby
Tony Tebby is a computer programmer and the designer of Qdos, the computer operating system used in the Sinclair QL personal computer, while working as an engineer at Sinclair Research in the early 1980s. He left Sinclair Research in 1984 in protest at the premature launch of the QL, and formed QJUMP Ltd., a software house specializing in system software and utilities for the QL, based in Rampton, Cambridgeshire, England. Prior to this, he worked at the Philips Research Laboratories in Redhill, Surrey where he worked on realtime image processing, using electronic hardware rather than software. At that time, software would have been either a batch program on the PRL mainframe computer or, within the departmental laboratory, the Commodore PET. Among the software developed by QJUMP was SuperToolkit II, a collection of extensions to Qdos and SuperBASIC; a Qdos floppy disk driver which became the de facto standard for the various third-party floppy disk interfaces sold for the QL; and the QJUMP Pointer Environment, which extended the primitive display windowing facility of Qdos into something approaching a full GUI. Tebby also received a commission to write a Qdos-like operating system for the Atari ST; this was called SMS2. Tebby later moved to Le Grand-Pressigny, France, but continued his involvement in the QL user community. In the early 1990s, he developed SMSQ, a new Qdos-compatible OS, based on SMS2, for the Miracle Systems QXL, a QL emulator card for PCs. An enhanced version of SMSQ was ported to the Atari ST and various other QL emulators, being renamed SMSQ/E. He has also worked on Stella, an embedded operating system for 68000-series and ColdFire processors. References Computer programmers Sinclair Research Living people Year of birth missing (living people)
https://en.wikipedia.org/wiki/UFluids%40Home
μFluids@Home is a computer simulation of two-phase flow behavior in microgravity and microfluidics problems at Purdue University, using the Surface Evolver program. About The project's purpose is to develop better methods for the management of liquid rocket propellants in microgravity, and to investigate two-phase flow in microelectromechanical systems, taking into account factors like surface tension. Systems can then be designed that use electrowetting, channel geometry, and hydrophobic or hydrophilic coatings to allow the smooth passage of fluids. Such systems would include compact medical devices, biosensors, and fuel cells, to name a few. Computing platform μFluids@Home uses the BOINC volunteer computing platform. Application notes There is no screensaver. Work unit CPU times are generally less than 20 hours. Work units average in size around 500 kB. You must run many work units to get levels of credit comparable to SETI@home or climateprediction.net BOINC projects. References External links Website archive Science in society Free science software Volunteer computing projects
https://en.wikipedia.org/wiki/Rosetta%40home
Rosetta@home is a volunteer computing project researching protein structure prediction on the Berkeley Open Infrastructure for Network Computing (BOINC) platform, run by the Baker lab. Rosetta@home aims to predict protein–protein docking and design new proteins with the help of about fifty-five thousand active volunteered computers processing at over 487,946 GigaFLOPS on average as of September 19, 2020. Foldit, a Rosetta@home videogame, aims to reach these goals with a crowdsourcing approach. Though much of the project is oriented toward basic research to improve the accuracy and robustness of proteomics methods, Rosetta@home also does applied research on malaria, Alzheimer's disease, and other pathologies. Like all BOINC projects, Rosetta@home uses idle computer processing resources from volunteers' computers to perform calculations on individual workunits. Completed results are sent to a central project server where they are validated and assimilated into project databases. The project is cross-platform, and runs on a wide variety of hardware configurations. Users can view the progress of their individual protein structure prediction on the Rosetta@home screensaver. In addition to disease-related research, the Rosetta@home network serves as a testing framework for new methods in structural bioinformatics. Such methods are then used in other Rosetta-based applications, like RosettaDock or the Human Proteome Folding Project and the Microbiome Immunity Project, after being sufficiently developed and proven stable on Rosetta@home's large and diverse set of volunteer computers. Two especially important tests for the new methods developed in Rosetta@home are the Critical Assessment of Techniques for Protein Structure Prediction (CASP) and Critical Assessment of Prediction of Interactions (CAPRI) experiments, biennial experiments which evaluate the state of the art in protein structure prediction and protein–protein docking prediction, respectively. Rosetta consistently ranks among the foremost docking predictors, and is one of the best tertiary structure predictors available. With an influx of new users looking to participate in the fight against the COVID-19 pandemic, caused by SARS-CoV-2, Rosetta@home has increased its computing power up to 1.7 PetaFlops as of March 28, 2020. On September 9, 2020, Rosetta@home researchers published a paper describing 10 potent antiviral candidates against SARS-CoV-2. Rosetta@home contributed to this research and these antiviral candidates are heading towards Phase 1 clinical trials, which may begin in early 2022. According to the Rosetta@home team, Rosetta volunteers contributed to the development of a nanoparticle vaccine. This vaccine has been licensed and is known as the IVX-411 by Icosavax, which began a Phase I/II clinical trial in June 2021, and GBP510 which is being developed by SK Bioscience and is already approved for a Phase III clinical trial in South Korea. NL-201, a cancer drug candidate that
https://en.wikipedia.org/wiki/The%20Lattice%20Project
The Lattice Project was a volunteer computing project that combined computing resources, Grid middleware, specialized scientific application software and web services into a comprehensive Grid computing system for scientific analysis. It ran the Genetic Algorithm for Rapid Likelihood Inference (GARLI) software to determine the relationships between different genetic samples. A major aspect of the project makes use of the Berkeley Open Infrastructure for Network Computing (BOINC) platform. The Lattice Project maintained a separate BOINC web site, but the site is dead as of this writing, causing this project to shut down because BOINC depends on this website to get setup information to set this project up on its clients. References External links The Lattice Project website archive Science in society Free science software Volunteer computing projects
https://en.wikipedia.org/wiki/Sober%20%28computer%20worm%29
The Sober worm is a family of computer worms that was discovered on October 24, 2003. Like many worms, Sober sends itself as an e-mail attachment, fake webpages, fake pop-up ads, and fake advertisements. The Sober worms must be unpacked and run by the user. Upon execution, Sober copies itself to one of several files in the Windows directory, depending on the variant. It then adds appropriate keys to the Windows registry, along with a few empty files in the Windows directory. These empty files are used to deactivate previous Sober variants. Sober is written in Visual Basic and only runs on the Microsoft Windows platform. Known variants Sober.L Sober.T Sober.X Sober.Y Sober.Z Aliases CME-681 WORM_SOBER.AG W32/Sober-{X-Z} Win32.Sober.W Win32.Sober.O Sober.Y (not a variant, but another name for Sober.X, often used by F-Secure) S32/Sober@MMIM681 W32/Sober.AA@mm Affected platforms Microsoft Windows family Windows 95 Windows 98 Windows NT Windows Me Windows 2000 Windows XP Windows Server 2003 Actions Infection The Sober worms must be unpacked and run by the user. Upon execution, Sober copies itself to one of the following files in the Windows directory: - antiv.exe csrss.exe driver.exe driverini.exe drv.exe explorer.exe filexe.exe hlp16.exe lssas.exe qname.exe services.exe smss.exe spoole.exe swchost.exe syshost.exe systemchk.exe systemini.exe winchk.exe winlog32.exe winreg.exe It then adds appropriate keys to the Windows registry to ensure activation on Windows startup, along with a few empty files in the Windows directory. These empty files are used to deactivate previous Sober variants. Spread Sober can e-mail itself to all addresses in a user's e-mail address book. It spreads via e-mail using its own SMTP engine. Deactivation of security software Sober can deactivate several popular antivirus software packages, as well as Microsoft AntiSpyware and HijackThis. Outbreaks October 24, 2003 – First discovery March 3, 2005 – Sober.L November 14, 2005 – Sober.T November 15, 2005 – Sober.X 21 November 2005 outbreak E-mails containing the Sober X worm were sent around the Internet disguised as an e-mail from either the Federal Bureau of Investigation or the Central Intelligence Agency, both organizations of the United States government. The e-mail claimed that the recipient had been caught visiting illegal websites, and asked the user to open an attachment to answer some questions. Once the infected attachment was opened a variety of system-damaging events occurred: anti-virus and other security measures were disabled, as well as the ability to access websites for assistance; furthermore, contacts in the user's address book were sent an identical e-mail. It is also suspected that Sober.X functions as spyware by stealing personal information about the infected user. MessageLabs, a computer security company, caught at least three million copies within 24 hours after the breakout, and McAfee, another system security resea
https://en.wikipedia.org/wiki/PrimeGrid
PrimeGrid is a volunteer computing project that searches for very large (up to world-record size) prime numbers whilst also aiming to solve long-standing mathematical conjectures. It uses the Berkeley Open Infrastructure for Network Computing (BOINC) platform. PrimeGrid offers a number of subprojects for prime-number sieving and discovery. Some of these are available through the BOINC client, others through the PRPNet client. Some of the work is manual, i.e. it requires manually starting work units and uploading results. Different subprojects may run on different operating systems, and may have executables for CPUs, GPUs, or both; while running the Lucas–Lehmer–Riesel test, CPUs with Advanced Vector Extensions and Fused Multiply-Add instruction sets will yield the fastest results for non-GPU accelerated workloads. PrimeGrid awards badges to users in recognition of achieving certain defined levels of credit for work done. The badges have no intrinsic value but are valued by many as a sign of achievement. The issuing of badges should also benefit PrimeGrid by evening out the participation in the less popular sub projects. The easiest of the badges can often be obtained in less than a day by a single computer, whereas the most challenging badges will require far more time and computing power. History PrimeGrid started in June 2005 under the name Message@home and tried to decipher text fragments hashed with MD5. Message@home was a test to port the BOINC scheduler to Perl to obtain greater portability. After a while the project attempted the RSA factoring challenge trying to factor RSA-640. After RSA-640 was factored by an outside team in November 2005, the project moved on to RSA-768. With the chance to succeed too small, it discarded the RSA challenges, was renamed to PrimeGrid, and started generating a list of the first prime numbers. At 210,000,000,000 the primegen subproject was stopped. In June 2006, dialog started with Riesel Sieve to bring their project to the BOINC community. PrimeGrid provided PerlBOINC support and Riesel Sieve was successful in implementing their sieve as well as a prime finding (LLR) application. With collaboration from Riesel Sieve, PrimeGrid was able to implement the LLR application in partnership with another prime finding project, Twin Prime Search (TPS). In November 2006, the TPS LLR application was officially released at PrimeGrid. Less than two months later, January 2007, the record twin was found by the original manual project. TPS has since been completed, while the search for Sophie Germain primes continues. In the summer of 2007, the Cullen and Woodall prime searches were launched. In the Fall, more prime searches were added through partnerships with the Prime Sierpinski Problem and 3*2^n-1 Search projects. Additionally, two sieves were added: the Prime Sierpinski Problem combined sieve which includes supporting the Seventeen or Bust sieve and the combined Cullen/Woodall sieve. In the fall of the same year
https://en.wikipedia.org/wiki/SZTAKI%20Desktop%20Grid
SZTAKI Desktop Grid (SzDG) was a BOINC project located in Hungary run by the Computer and Automation Research Institute (SZTAKI) of the Hungarian Academy of Sciences. It closed on June 21, 2018. SZTAKI Desktop Grid was initiated in early 2005 and had its public launch on 26 May 2005. The aim of the initiative was to help the Public Resource Computing model to spread via the BOINC platform in Hungary. In 2005 the level of participation in BOINC among volunteers in Hungary was very low, but the main problem was that there wasn’t any Hungary-based, open project that would use volunteer computing. The Laboratory of Parallel and Distributed Computing of the Institute created SzDG as the first public Hungarian desktop grid. It is open to host distributed research applications for any research institute in Hungary or around the world. Local SZTAKI Desktop Grid During the setup of SzDG the staff of the laboratory identified the security problems with BOINC that render the idea of Public Research Computing undesirable among enterprise communities. To overcome these security issues (e.g. companies unwilling to let any information be sent out to public domains) the laboratory is offering a freely available local package of the BOINC software. Wrapped in a Debian package, it only requires a single computer with the Debian operating system to create a desktop grid server in a local environment. Scientific Research SzDG is an online architecture, run by the Laboratory of Parallel and Distributed Systems. The staff of the laboratory maintains the system, which is open for any scientific research (see the section on DC-API to get an idea of the characteristics of suitable applications) seeking immense computing power. SzDG currently hosts one mathematical project. BinSYS Project Project BinSYS was established by the Department of Computer Algebra of Eötvös Loránd University was to find generalized binary number systems up to dimension 11. The program finds binary number systems and outputs a list of characteristic polynomials that are likely to be number system bases. The list is processed by another program and the final result is then a complete list of binary number systems in a fixed dimension. In beta phase, the project started by investigating the 10th dimension, which entailed the processing of ninety thousand matrices, of which a total of 383 pieces seemed to be worthy of further inspection. The DC-API The Distributed Computing API (DC-API) was created by the laboratory to help the developers of distributed applications to overcome the difficulties of program development. The API hides the idiosyncrasies of BOINC, allowing developers to focus on their own research tasks. The API comes prepacked in a Debian package, available freely from the official website indicated below. The DC-API allows integration with applications on several grid environments. BOINC infrastructure Using the Berkeley Open Infrastructure for Network Computing (BOIN
https://en.wikipedia.org/wiki/Cell%20Computing
Cell Computing was volunteer computing project that was operated by NTT Data to perform biomedical research. It used the Berkeley Open Infrastructure for Network Computing (BOINC) platform; however, it was initially launched using the United Devices Grid MP platform in 2002. The project ended in 2008 due to lack of popularity. References External links Announce for project ending Science in society Volunteer computing projects Health informatics Projects established in 2002 2008 disestablishments
https://en.wikipedia.org/wiki/Astropulse
Astropulse is a volunteer computing project to search for primordial black holes, pulsars, and extraterrestrial intelligence (ETI). Volunteer resources are harnessed through Berkeley Open Infrastructure for Network Computing (BOINC) platform. In 1999, the Space Sciences Laboratory launched SETI@home, which would rely on massively parallel computation on desktop computers scattered around the world. SETI@home utilizes recorded data from the Arecibo radio telescope and searches for narrow-bandwidth radio signals from space, signifying the presence of extraterrestrial technology. It was soon recognized that this same data might be scoured for other signals of value to the astronomy and physics community. Development For about 6 years, Astropulse existed in an experimental beta testing phase not available to the general community. In July 2008, Astropulse was integrated into SETI@home, so that the massive network of SETI participants could also contribute to the search for other astronomical signals of value. Astropulse also makes contributions to the search for ET: first, project proponents believe it may identify a different type of ET signal not identified by the original SETI@Home algorithm; second, proponents believe it may create additional support for SETI by providing a second possible concrete result from the overall search project. Final development of Astropulse has been a two-part endeavor. The first step was to complete the Astropulse C++ core that can successfully identify a target pulse. Upon completion of that program, the team created a trial dataset that contained a hidden pulse, which the completed program successfully found, thus confirming the ability of the Astropulse core to successfully identify target pulses. Since July 2008, research has focused on a series of refinements to the beta version which are then rolled out to the full universe of SETI participants. At the programming level, developers first seek to assure that new versions are compatible with a variety of platforms, after which the refined version is optimized for greater speed. As of April, 2009, Astropulse is testing beta version 5.05. The future of the project depends on extended funding to SETI@home. The BOINC idea is to divide (split) large blocks of data into smaller units, each of which can be distributed to individual participating work stations. To this end, the project then began to embed the Astropulse core into the SETI beta client and began to distribute real data, split into Astropulse work units, to a team of beta testers. The challenge has been to assure that the Astropulse core will work seamlessly on a broad array of operating systems. Current research focuses on implementing algorithm refinements that eliminate or reduce false positives. Scientific research Astropulse searches for both single pulses and regularly repeating pulses. This experiment represents a new strategy for SETI, postulating microsecond timescale pulses as opposed to
https://en.wikipedia.org/wiki/XHIMT-TDT
XHIMT-TDT (virtual channel 7) is the flagship station and namesake of Mexico's Azteca 7 network, located in Mexico City. History XHIMT came to air on May 15, 1985, as part of Imevisión's relaunch of the Televisión de la República Mexicana network into a full-fledged national network comparable to its existing Canal 13 network. It took over TRM's transmitter network, with 99 repeater stations serving 72% of the population. The new Red Nacional 7 (7 National Network) was positioned as targeting the working class and rural areas, while Red Nacional 13, based from XHDF, targeted a more middle- and upper-class audience. The insertion of a channel 7 into Mexico City required a shuffle of frequencies in neighboring areas, with stations in Mexico City, Toluca and on Altzomoni moving to accommodate the last VHF station in the nation's capital. From 1990 to 1993, Imevisión consolidated the programming of the channel 7 and 13 networks; this ended when both were privatized and Televisión Azteca was formed. Digital television Digital subchannels The station's digital channel is multiplexed: On March 20, 2017, Azteca Noticias, an all-news channel, was replaced with the new A+ local service. Azteca Noticias moved to XHTVM-TDT 40.2. Analog-to-digital conversion In 2007, TV Azteca began testing its HD channel, but with different programming to analog. The HD channel had films, documentaries and some series, along with the news and a select few Azteca HD productions (such as soccer games). This, however, was not permitted under the digital television transition which required that digital companions carry the same programs as their analog counterparts. In 2010, XHIMT-TDT began transmitting a direct Azteca 7 HD feed. 4:3 programs were stretched to fill the 16:9 space. On December 17, 2015, at 12:00 a.m., XHIMT analog channel 7 ceased broadcasts, as part of the federally mandated transition from analog to digital television. Repeaters XHIMT-TDT has eight direct repeaters: |- |- |- |- |- |- |- |} Programming Prime time References Azteca 7 transmitters Television stations in Mexico City Spanish-language television stations in Mexico Television channels and stations established in 1985 1985 establishments in Mexico
https://en.wikipedia.org/wiki/Golden%20Gate%20Biosphere%20Network
The Golden Gate Biosphere Network (GGBN or the Network) is a voluntary coalition of federal, state, and local government agencies, nonprofit organizations, universities, and private partners within the Golden Gate Biosphere region (along the western portion of the San Francisco Bay Area). The Network works towards protecting the biosphere region's biodiversity and conserving its natural resources to maintain the quality of life for people within the region. The Network has been part of the UNESCO Man and Biosphere Programme since 1988 and is part of the US Biosphere Network and EuroMAB.  It is recognized by UNESCO due to the significant biodiversity of the region, as well as the Network's efforts to demonstrate and promote a balanced relationship between humans and the biosphere. The Network periodically submits reports to UNESCO on current land-management issues related to the region's biodiversity and its connection to people. Recent efforts have focused on outreach to potential collaborators and promoting research on biodiversity and climate change adaptation. About the Golden Gate Biosphere Network The Golden Gate Biosphere Network aims to collaboratively steward interaction between humans and the environment. Originally recognized by UNESCO in 1988 for its significant ecological and cultural diversity, a 2017 periodic review brought renewed interest to the Golden Gate Biosphere Network and also expanded the boundaries of the GGB region by more than 26,000 square miles. In the years since, the Network has focused on expanding its collaborative partnerships in order to better connect the agencies, organizations, and non-profits of the region in an effort to more efficiently steward the natural resources of the region. As of 2021, the Network is made up of 20 partners representing multiple jurisdictions and sectors of the region: Audubon Canyon Ranch UC Davis, Bodega Marine Reserve Jasper Ridge Biological Preserve Cordell Bank National Marine Sanctuary Greater Farallones National Marine Sanctuary Farallon Islands National Wildlife Refuge Golden Gate National Recreation Area Fort Point National Historic Site Muir Woods National Monument Point Reyes National Seashore Marin Municipal Water District Mount Tamalpais State Park Samuel P. Taylor State Park Tomales Bay State Park Pepperwood Preserve Presidio Trust San Francisco Public Utilities Commission Peninsula Watershed Golden Gate National Parks Conservancy Point Blue Conservation National Park Service Regional Office (Interior Regions 8, 9, 10, 12) Biosphere Regions As recognized by the UNESCO Man and the Biosphere Programme, there are currently 738 biosphere regions in 134 countries around the world. Regions are recognized for containing a mosaic of ecological systems representative of major biogeographic regions, significant biodiversity, and their ability to explore and demonstrate approaches to sustainable development at the regional scale. Biosphere regions serve
https://en.wikipedia.org/wiki/High-speed%20multimedia%20radio
High-speed multimedia radio (HSMM) is the implementation of high-speed wireless TCP/IP data networks over amateur radio frequency allocations using commercial off-the-shelf (COTS) hardware such as 802.11 Wi-Fi access points. This is possible because the 802.11 unlicensed frequency bands partially overlap with amateur radio bands and ISM bands in many countries. Only licensed amateur radio operators may legally use amplifiers and high-gain antennas within amateur radio frequencies to increase the power and coverage of an 802.11 signal. Basics The idea behind this implementation is to modify commercial 802.11 equipment for use on licensed Amateur Radio frequencies. The main frequency bands being used for these networks are: 900 MHz (33 cm), 2.4 GHz (13 cm), 3.4 GHz (9 cm), and 5.8 GHz (5 cm). Since the unlicensed 802.11 or Wi-Fi frequency bands overlap with amateur frequencies, only custom firmware is needed to access these licensed frequencies. Such networks can be used for emergency communications for disaster relief operations as well as in everyday amateur radio communications (hobby/social). Capabilities HSMM can support most of the traffic that the Internet currently does, including video chat, voice, instant messaging, email, the Web (HTTP), file transfer (FTP), and forums. The only differences being that with HSMM, such services are community instead of commercially implemented and it is mostly wireless. HSMM can even be connected to the Internet and used for web surfing, although because of the FCC regulations on permitted content, this is done only when directly used for ham radio activities (under Part 97). Using high gain directional antennas and amplifiers, reliable long-distance wireless links over many miles are possible and only limited by propagation and the radio horizon. Bandwidths and Speeds HSMM networks most-often use professional hardware with narrower channel bandwidths such as 5 or 10 MHz to help increase range. It is common for networks to use channel -2 with a 5 MHz bandwidth. For long-range links extending outside of metropolitan areas 802.11b DSSS modulations or 802.11ah (900 MHz) equipment can be used, further increasing range at the cost of speed. - DSSS is 10 watts max PEP in USA - DSSS is 10 watts max PEP in USA US / FCC Frequencies and channels The following is a list of the 802.11 channels that overlap into an amateur radio band under the FCC in the United States. Note that the 5 cm amateur band extends from 5.65 to 5.925 GHz, so that there are many frequencies outside the Part 15 ISM/UNII block used for 802.11a. Many commercial grade 802.11a access points can also operate in between the normal channels by using 5 MHz channel spacing instead of the standard 20 MHz channel spacing. 802.11a channels 132, 136 and 140 are only available for unlicensed use in ETSI regions. Channels and frequencies marked in should not be used. * must use 5/10Mhz bandwidth Acronyms Used: (amateur radio) (ISM) (Radar) Ch
https://en.wikipedia.org/wiki/Double%20descent
In statistics and machine learning, double descent is the phenomenon where a statistical model with a small number of parameters and a model with an extremely large number of parameters have a small error, but a model whose number of parameters is about the same as the number of data points used to train the model will have a large error. It was discovered around 2018 when researchers were trying to reconcile the bias-variance tradeoff in classical statistics, which states that having too many parameters will yield an extremely large error, with the 2010s empirical observation of machine learning practitioners that the larger models are, the better they work. The scaling behavior of double descent has been found to follow a broken neural scaling law functional form. References Further reading External links Model selection Machine learning Statistical classification
https://en.wikipedia.org/wiki/Phred
Phred may refer to: Phred (software), a computer program used in molecular biology Phred quality score, a term used in molecular biology Phred (Doonesbury), a character from the comic strip Doonesbury Phred on Your Head Show, a children's television show The URL with Phred Show, a spin-off of the above See also Fred (disambiguation)
https://en.wikipedia.org/wiki/Mimio
Mimio is a brand name of a line of technology products aimed at the education market. The primary products were originally focused around computer whiteboard interactive teaching devices. MimioCapture devices also allow users to capture all of the ink strokes that are written on the whiteboard. When used in conjunction with a video projector it turns the ordinary whiteboard surface into a fully interactive whiteboard. The product line has been dramatically expanded in the last two years as described in the "Hardware Products" and "Software Products" sections below. The product line was originally designed by Virtual Ink. On October 4, 2006 Newell Rubbermaid acquired the Mimio interactive whiteboard (iWB) product line. On July 15, 2013, SkyView Capital acquired the Mimio hardware and software product lines. History The first Mimio was introduced in 1997. In November 2008, a Graphics tablet called Mimio Pad was launched under the Mimio brand. It comes with the most popular Mimio studio functions pre-programmed for ease of use. It uses 2.4 GHz wireless technology and has a range of 12m. In June, 2010, the brand changed to DYMO/Mimio Interactive Teaching Technologies. At the same time, the company introduced five new products at the ISTE(International Society for Technology in Education) 2010 conference in Denver, CO. The new product line, the MimioClassroom(tm) family of products, included a redesign of the prior mimio Xi bar. It is called the MimioTeach(tm) interactive system, and turns any dry-erase board into an interactive whiteboard. In addition, DYMO/Mimio introduced the MimioVote(tm) assessment system, MimioView(tm) document camera, and MimioCapture(tm) ink recording system. All of the MimioClassroom products are powered by MimioStudio software. On March 9, 2011, DYMO/Mimio ITT acquired Headsprout, a provider of adaptive instructional lessons. The acquisition further strengthened the DYMO/Mimio portfolio of innovative and integrated hardware, software, and services. The official announcement was made publicly on March 15, 2011. In June, 2012, the brand changed back to Mimio. At that time, Mimio launched the new MimioReading comprehension suite, based on the original Headsprout Reading Comprehension product. MimioReading builds on the individualized computer instruction of Headsprout Reading Comprehension by adding complementary lessons for group instruction at the whiteboard, as well as a MimioStudio software license and iPad app. At the beginning of 2015, Mimio had the following classroom technology products: MimioTeach; MimioProjector 280, 280I and 280T; MimioDisplay 550T, 650T, 700T, and 840T; MimioBoard 780T and 870T; MimioCapture3; MimioPad2; MimioView 340H; MimioVote32; MimioStudio Notebook software and MimioMobile app. On Feb. 29, 2016 the Mimio education suite was acquired by the Boxlight Corporation, a manufacturer of classroom technology that was to that point best-known as a top brand for interactive displays and p
https://en.wikipedia.org/wiki/OAG%20%28company%29
OAG is a global travel data provider with headquarters in the UK. The company was founded in 1929 and is operated in the USA, Singapore, Japan, Lithuania and China. It has a large network of flight information data including schedules, flight status, connection times, and industry references such as airport codes. Early history The "Official Aviation Guide of the Airways" was first published in February 1929 in the United States, listing 35 airlines offering a total of 300 flights. After the Guide was taken over by a rival publication in 1948, the September issue carried the OAG title for the first time. OAG was founded in Chicago, but moved to the suburb of Oak Brook, Illinois, in 1968. The "ABC World Airways Guide" containing maps and tips for travellers was first published in the UK in 1946. The integration of the ABC and OAG brands occurred following the acquisition of OAG Inc. in 1993 by Reed Elsevier which already owned ABC International. OAG had acquired SRDS, an ad rate information company from Macmillan Inc., a sister Maxwell company, in 1992; Reed Elsevier sold SRDS to a buyout firm in 1994. In August 1996, all products from the combined ABC and OAG businesses were rebranded as OAG. In 1958, advances in computer technology enabled flight schedules to be sorted and presented by city pair, instead of under separate sections for each airline timetable. This Quick Reference Edition initially included North American flights; starting in 1962 a separate International Quick Reference Edition covered the rest of the world. The two Timetable Editions continued in the traditional format for several more years; the last Worldwide Timetable Edition was in March 1969. In the late 1960s and early 1970s, the OAG Quick Reference Editions began integrating computer-generated connecting flight information and tariff data, both also arranged by city-pair and merged with the flight information. In 1962, OAG began providing data to the first computer reservation systems and produced its first customised timetable for airlines. That year, it was acquired by Dun & Bradstreet. In 1970, OAG published its Pocket Flight Guide; it is still published today, in four regional versions. OAG participated in the development of the IATA Standard Schedules Information Manual (SSIM) for the interchange of airline schedules data. This was established in 1972 and is still the primary source of protocols and formats for the global airline industry. The OAG Electronic Edition was launched in 1983 and contained both flight and fare information. It was distributed through more than 20 system operators including Compuserve, Dow Jones and Viewtron. Additional databases (weather, arrival/departure information) were added in 1988. That year, Dun & Bradstreet sold OAG to Maxwell Communications. The company produced the industry's first PC-based travel planning tool on CD-ROM in 1991, which was bundled with a plug-in CD drive, as those were rare at the time. OAG launched an analyti
https://en.wikipedia.org/wiki/The%20Father%2C%20the%20Son%2C%20and%20the%20Holy%20Fonz
"The Father, the Son, and the Holy Fonz" is the 18th episode of the fourth season of the American animated television series Family Guy. It originally aired on the Fox network in the United States on December 18, 2005. The episode follows Peter's decision to find a new religion for himself. After several failed attempts, he chooses the one man who has always been there for him, Fonzie, and starts the First United Church of the Fonz. The episode was written by Danny Smith and directed by James Purdum. It received mostly positive reviews from critics for its storyline and many cultural references. According to Nielsen ratings, it was viewed in 8.26 million homes in its original airing in the United States. The episode featured guest performances by Paula Abdul, Tom Bosley, Gary Cole, Charles Durning, Sherman Hemsley, Phil LaMarr, Sherry Romito, Marion Ross, Amir Talai, Fred Tatasciore, Sarah Utterback and Wally Wingert, along with several recurring guest voice actors for the series. Plot Peter's devout Catholic father, Francis, visits Quahog. Upon arrival, he insists that Stewie be baptized as a Catholic. After visiting a church with Peter and Stewie, Francis is informed that the holy water is tainted and he will have to wait. Francis is in disbelief, and baptizes Stewie himself. Stewie soon becomes unwell and is informed by a doctor that he must be quarantined and kept in a germ-free environment for the time being until his immune system's strength recovers. Lois discovers that Francis coaxed Peter into having Stewie baptized without her knowledge, and tells Peter to choose his own religious beliefs and not allow himself to be a slave to his father's religion. Peter initially converts to Mormonism to take advantage of polygamy, but then discovers that Mormons cannot drink alcohol. He then tries Jehovah's Witnesses and attempts door-to-door preaching. However, when he finds someone who is actually interested in hearing what he has to say, he realizes he has no idea what to teach them. As a last resort, Peter tries Hinduism but gets himself kicked out after tackling the guru to the floor, believing the red dot on his head to be a laser spot from a sniper rifle. Unable to find a religion suited to him, Peter decides to create his own religion, based on Happy Days, calling his newly founded church the "First United Church of the Fonz". To the Griffins' (mainly Lois') surprise, many people turn up for the first worship service, much to the annoyance of Brian, who dislikes the idea that Peter is a religious leader. In order to stop Peter from continuing his new religion, Brian joins forces with Francis to find a way to deter people from worshiping the Fonz. Three actorsserving as representatives from other religionsshow up to the services of the Church of the Fonz. The first, Sherman Hemsley, informs people that he has formed the Church of George Jefferson (from All in the Family and The Jeffersons) and a good portion of the congregation leaves with
https://en.wikipedia.org/wiki/List%20of%20common%20resolutions
This article lists computer monitor screen resolutions that are defined by standards or in common use. Most of them use certain preferred numbers. Computer graphics Pixel aspect ratio (PAR) The horizontal to vertical ratio of each pixel. Storage aspect ratio (SAR) The horizontal to vertical ratio of solely the number of pixels in each direction. Display aspect ratio (DAR) The combination (which occurs by multiplication) of both the pixel aspect ratio and storage aspect ratio giving the aspect ratio as experienced by the viewer. Television and media For television, the display aspect ratio (DAR) is shown, not the storage aspect ratio (SAR); analog television does not have well-defined pixels, while several digital television standards have non-square pixels. Analog systems Digital standards Many of these resolutions are also used for video files that are not broadcast. These may also use other aspect ratios by cropping otherwise black bars at the top and bottom which result from cinema aspect ratios greater than , such as 1.85 or 2.35 through 2.40 (dubbed "Cinemascope", "" etc.), while the standard horizontal resolution, e.g. 1920 pixels, is usually kept. The vertical resolution is usually a multiple of 8 or 16 pixels due to most video codecs processing pixels on such sized blocks. A widescreen FHD video can be for a ratio or for roughly , for instance. Films The below distinguish SAR (aspect ratio of pixel dimensions), DAR (aspect ratio of displayed image dimensions), and the corresponding PAR (aspect ratio of individual pixels), though it currently contains some errors (inconsistencies), as flagged. Video conferencing CCTV 960H is a resolution used in analog CCTV equipment. 960H represents the number of horizontal pixels in a video signal transmitted from a camera or received by a DVR (Digital Video Recorder). The resolution of 960H depends on whether the equipment is PAL or NTSC based: 960H represents 960 x 576 (PAL) or 960 x 480 (NTSC) pixels. 960H represents an increase in pixels of some 30% over standard D1 resolution, which is 720 x 576 pixels (PAL), or 720 x 480 pixels (NTSC). The increased resolution over D1 comes as a result of a longer horizontal scan. The difference is that whilst D1 has a 4:3 aspect ratio 960H has a 16:9 widescreen aspect ratio. The extra pixels are used to form the increased area to the sides of the D1 image. The pixel density of 960H is identical to standard D1 resolution so it does not give any improvement in image quality, merely a wider aspect ratio. Alternative analog video transport technologies carrying higher resolutions than 960H include HD-TVI, HDCVI, and AHD. Notes References Further reading External links Interactive Visualization : Screen Resolutions Resolutions for Common Aspect Ratios Resolutions Display resolutions
https://en.wikipedia.org/wiki/NetApp%20FAS
A NetApp FAS is a computer storage product by NetApp running the ONTAP operating system; the terms ONTAP, AFF, ASA, FAS are often used as synonyms. "Filer" is also used as a synonym although this is not an official name. There are three types of FAS systems: Hybrid, All-Flash, and All SAN Array: NetApp proprietary custom-build hardware appliances with HDD or SSD drives called hybrid Fabric-Attached Storage (or simply FAS) NetApp proprietary custom-build hardware appliances with only SSD drives and optimized ONTAP for low latency called ALL-Flash FAS (or simply AFF) All SAN Array build on top of AFF platform, and provide only SAN-based data protocol connectivity. ONTAP can serve storage over a network using file-based protocols such as NFS and SMB, also block-based protocols, such as the SCSI over the Fibre Channel Protocol on a Fibre Channel network, Fibre Channel over Ethernet (FCoE), iSCSI, and FC-NVMe transport layer. ONTAP-based systems that can serve both SAN and NAS protocols called Unified ONTAP, AFF systems with ASA identity called All-SAN. NetApp storage systems running ONTAP implement their physical storage in large disk arrays. While most large-storage systems are implemented with commodity computers with an operating system such as Microsoft Windows Server, VxWorks or tuned Linux, ONTAP-based hardware appliances use highly customized hardware and the proprietary Data ONTAP operating system with WAFL file system, all originally designed by NetApp founders David Hitz and James Lau specifically for storage-serving purposes. ONTAP is NetApp's internal operating system, specially optimized for storage functions at high and low levels. It boots from FreeBSD as a stand-alone kernel-space module and uses some functions of FreeBSD (command interpreter and drivers stack, for example). All NetApp ONTAP-based hardware appliances have battery-backed non-volatile random access memory or NVDIMM, referred to as NVRAM or NVDIMM, which allows them to commit writes to stable storage more quickly than traditional systems with only volatile memory. Early storage systems connected to external disk enclosures via parallel SCSI, while modern models () use fibre channel and SAS (Serial Attach SCSI) SCSI transport protocols. The disk enclosures (shelves) use fibre channel hard disk drives, as well as parallel ATA, serial ATA and Serial attached SCSI. Starting with AFF A800 NVRAM PCI card no longer used for NVLOGs, it was replaced with NVDIMM memory directly connected to the memory bus. Implementers often organize two storage systems in a high-availability cluster with a private high-speed link, either Fibre Channel, InfiniBand, 10 Gigabit Ethernet, 40 Gigabit Ethernet or 100 Gigabit Ethernet. One can additionally group such clusters together under a single namespace when running in the "cluster mode" of the Data ONTAP 8 operating system. Internal architecture Modern NetApp FAS, AFF or ASA system consist of customized computers with Intel processor
https://en.wikipedia.org/wiki/NetWare%20Loadable%20Module
A NetWare Loadable Module (NLM) is a loadable kernel module (a binary code module) that can be loaded into Novell's NetWare operating system. NLMs can implement hardware drivers, server functions (e.g. clustering), applications (e.g. GroupWise), system libraries or utilities. NLMs were supported beginning with the Intel 80386-based NetWare version 3.x. Prior versions of NetWare had a monolithic kernel, and significant hardware or functionality changes required re-linking the kernel from object modules. Due to stability issues with early third-party NLMs, they never became popular for server application programming, with few exceptions like antivirus programs, backup programs and certain database products. Functionality Upon loading, a NLM requests resources, such as memory and process threads, from the NetWare kernel. The NetWare kernel tracks such requests, and can identify memory and other resources assigned to a specific NLM. NLMs may auto-load other NLMs upon which they themselves depend. NLMs may register commands with the NetWare kernel, extending the command vocabulary available at the NetWare console prompt. When properly coded, NLMs can be re-entrant, allowing multiple instances of the same code to be loaded and run. Programming issues Initially, Novell published a development toolkit for NLM programming including kernel API documentation and a C compiler (Watcom), but third-party support for the NLM executable function was very limited. In early NetWare versions (prior to v4.x), all processes were executed in the kernel address space, without specific memory protection. It was therefore possible for bugs in NLMs to overwrite the kernel's or other NLM's address space and ultimately crash the server — in the mainframe-derived Novell terminology, this was known as an ABEND or ABnormal END. Moreover, NetWare used a non-preemptive, or cooperative, multitasking model, meaning that an NLM was required to yield to the kernel regularly. An NLM executing an infinite loop, for example, could therefore not be stopped. In NetWare v4.x, Novell introduced a limited form of memory protection, which was extended to Protected Address Spaces in NetWare v5.x. Through these mechanisms, properly-coded NLMs can be loaded into their own address space, and mis-behaving NLMs can be prevented from compromising the kernel integrity. Compilers Official compilers that produce NLMs are: Watcom C/C++ compiler / OpenWatcom Metrowerks CodeWarrior for NetWare EPC C/C++ Novell NLMLINK.EXE NLM development is also possible with GNU cc and binutils. More details are available in NetWare Loadable Module Programming HOWTO by Martin Hinner. Client-side NLMs with NIOS Announcing it in March 1995, Novell introduced a new 32-bit DOS/Windows NetWare client (Client 32 based on ODI32/NIOS) in 1996, replacing the former 16-bit client based on ODI/VLM. Its NIOS component (NetWare I/O Subsystem) used techniques similar to DPMS to relocate and run NLMs in protected mod
https://en.wikipedia.org/wiki/Transnational%20feminist%20network
A transnational feminist network (TFN) is a network of women's groups who work together for women's rights at both a national and transnational level. They emerged in the mid-1980s as a response to structural adjustment and neoliberal policies, guided by ideas categorized as global feminism. TNF's are composed of representatives from a variety of NGO's from around the globe. These representatives then come together at conferences, such as the United Nations World Conference on Women and The NGO Forum in China. Globalization TFNs are similar to non-governmental organizations (NGOs) but while NGOs work at a local and national level, TFNs create coalitions across borders. Globalization affects women worldwide in adverse ways and TFNs emerged in response to these effects. Feminism is best understand as a global phenomenon as it is a product of transnational dialogues and disagreements. As mentioned by Myra Ferree and Aili Tripp "Globalization has facilitated the emergence of feminism as a goal in a wide variety of issue advocacy at the transnational level" (Ferree & Tripp 12). According to Johanna Brenner in her article Transnational Feminism and the Struggle for Global Justice: “Economic insecurity and impoverishment, exposure to toxics, degradation of water, high infant and maternal mortality rates, forced migration, increased hours spent in paid and unpaid work are only some of the of women’s burdens worldwide” Brenner also states that “[t]hird world governments are male-dominated, often inefficient, plagued by cronyism, and sometimes corrupt; and the pressures of structural adjustment programs imposed on them by the International Monetary Fund (IMF) and the World Bank have certainly aggravated these tendencies” (Brenner 78). Programs like Structural Adjustment Programs (SAPs) are part of the package of globalization that is presented to other countries; and while such programs are portrayed as being valuable to improve the status of a country, they result in creating worse situations for the peoples of a country. Aims of TFNs Transnational Feminist Networks can be divided into different categories based on their goals. Some of these include Advocacy for Women's Human Rights, Peace, Anti-militarism, Conflict Resolution, Ending Violence Against Women and Reproductive and Health Rights. Response to Globalization Women's groups form in response to the negative effects of globalization and TFNs emerge when these women's groups come together to resolve shared issues. These groups work with one another across borders and they recognize their differences but also discover their similarities and form strong coalition's bases on these similarities. In describing a conference held by the International Network of Women’s Studies Journals, Tahera Aftab relayed that “the objective of the INWSJ conference was to set up a network for interdisciplinary feminist and women’s studies journals with a focus on the development and inclusion of a transnational
https://en.wikipedia.org/wiki/Meadow%20%28programming%29
Meadow is an open source programming project to port the popular GNU Emacs text editor for UNIX-based operating systems to Microsoft Windows with some added functions. The name comes from the phrase "Multilingual enhancement to GNU Emacs with ADvantages Over Windows". Versions Version 1 series, based on Emacs v.21 (current stable release Ver.1.15) Version 2 series, based on Emacs v.22 (17 January 2004 current 2.00 pre-release) Version 3 series, based on Emacs v.22 (Development release) Installation Meadow utilizes Netinstaller, similar to the one used for Cygwin installation. This allows users to install Meadow in the way the user wanted, making it easier to get started with Meadow. Emacs
https://en.wikipedia.org/wiki/Programmable%20interval%20timer
In computing and in embedded systems, a programmable interval timer (PIT) is a counter that generates an output signal when it reaches a programmed count. The output signal may trigger an interrupt. Common features PITs may be one-shot or periodic. One-shot timers will signal only once and then stop counting. Periodic timers signal every time they reach a specific value and then restart, thus producing a signal at periodic intervals. Periodic timers are typically used to invoke activities that must be performed at regular intervals. Counters are usually programmed with fixed intervals that determine how long the counter will count before it will output a signal. IBM PC compatible The Intel 8253 PIT was the original timing device used on IBM PC compatibles. It used a 1.193182 MHz clock signal (one third of the color burst frequency used by NTSC, one twelfth of the system clock crystal oscillator, therefore one quarter of the 4.77 MHz CPU clock) and contains three timers. Timer 0 is used by Microsoft Windows (uniprocessor) and Linux as a system timer, timer 1 was historically used for dynamic random access memory refreshes and timer 2 for the PC speaker. The LAPIC in newer Intel systems offers a higher-resolution (one microsecond) timer. This is used in preference to the PIT timer in Linux kernels starting with 2.6.18. See also High Precision Event Timer Monostable multivibrator NE555 References External links http://www.luxford.com/high-performance-windows-timers https://stackoverflow.com/questions/10567214/what-are-linux-local-timer-interrupts Timing on the PC family under DOS IBM PC compatibles Digital electronics
https://en.wikipedia.org/wiki/Fast%20folding%20algorithm
In signal processing, the fast folding algorithm (Staelin, 1969) is an efficient algorithm for the detection of approximately-periodic events within time series data. It computes superpositions of the signal modulo various window sizes simultaneously. The FFA is best known for its use in the detection of pulsars, as popularised by SETI@home and Astropulse. It was also used by the Breakthrough Listen Initiative during their 2023 Investigation for Periodic Spectral Signals campaign. See also Pulsar References External links The search for unknown pulsars Signal processing
https://en.wikipedia.org/wiki/Demis%20Hassabis
Demis Hassabis (born 27 July 1976) is a British artificial intelligence researcher and entrepreneur. In his early career he was a video game AI programmer and designer, and an expert board games player. He is the chief executive officer and co-founder of DeepMind and Isomorphic Labs, and a UK Government AI Advisor. Early life and education Hassabis was born to a Greek Cypriot father and a Chinese Singaporean mother and grew up in North London. A child prodigy in chess from the age of 4, Hassabis reached master standard at the age of 13 with an Elo rating of 2300 and captained many of the England junior chess teams. He represented the University of Cambridge in the Oxford-Cambridge varsity chess matches of 1995, 1996 and 1997, winning a half blue. Hassabis was briefly home-schooled by his parents, during which time he bought his first computer, a ZX Spectrum 48K funded from chess winnings, and taught himself how to program from books. He went on to be educated at Christ's College, Finchley, a state-funded comprehensive school in East Finchley, North London. He completed his A-levels and scholarship level exams two years early at the ages of 15 and 16 respectively. Bullfrog Asked by Cambridge University to take a gap year due to his young age, Hassabis began his computer games career at Bullfrog Productions, first level designing on Syndicate, and then at 17 co-designing and lead programming on the 1994 game Theme Park, with the games designer Peter Molyneux. Theme Park, a simulation video game, sold several million copies and inspired a whole genre of simulation sandbox games. He earned enough from his gap year to pay his own way through university. University of Cambridge Hassabis then left Bullfrog to study at Queens' College, Cambridge, where he completed the Computer Science Tripos and graduated in 1997 with a Double First from the University of Cambridge. Career and research Lionhead After graduating from Cambridge, Hassabis worked at Lionhead Studios. Games designer Peter Molyneux, with whom Hassabis had worked at Bullfrog Productions, had recently founded the company. At Lionhead, Hassabis worked as lead AI programmer on the 2001 "god" game Black & White. Elixir Studios Hassabis left Lionhead in 1998 to found Elixir Studios, a London-based independent games developer, signing publishing deals with Eidos Interactive, Vivendi Universal and Microsoft. In addition to managing the company, Hassabis served as executive designer of the BAFTA-nominated games Republic: The Revolution and Evil Genius. The release of Elixir's first game, Republic: The Revolution, a highly ambitious and unusual political simulation game, was delayed due to its huge scope, which involved an AI simulation of the workings of an entire fictional country. The final game was reduced from its original vision and greeted with lukewarm reviews, receiving a Metacritic score of 62/100. Evil Genius, a tongue-in-cheek Bond villain simulator, fared much better with a score
https://en.wikipedia.org/wiki/Render%20layers
When creating computer-generated imagery, final scenes appearing in movies and television productions are usually produced by rendering more than one "layer" or "pass," which are multiple images designed to be put together through digital compositing to form a completed frame. Rendering in passes is based on a traditions in motion control photography which predate CGI. As an example, for a visual effects shot, a camera could be programmed to move past a physical model of a spaceship in one pass to film the fully lit beauty pass of the ship, and then to repeat exactly the same camera move passing the ship again to photograph additional elements such as the illuminated windows in the ship or its thrusters. Once all of the passes were filmed, they could then be optically printed together to form a completed shot. The terms render layers and render passes are sometimes used interchangeably. However, rendering in layers refers specifically to separating different objects into separate images, such as a layer each for foreground characters, sets, distant landscape, and sky. On the other hand, rendering in passes refers to separating out different aspects of the scene, such as shadows, highlights, or reflections, into separate images. References Computer graphics
https://en.wikipedia.org/wiki/Bart%20After%20Dark
"Bart After Dark" is the fifth episode of the eighth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on November 24, 1996. After accidentally breaking a stone gargoyle at a local house, Bart is forced to work there as punishment. He assumes it will be boring work, but is surprised when he learns that it is actually a burlesque house. Marge is horrified when she learns of the burlesque house, and resolves to have it shut down. The episode was directed by Dominic Polcino and written by Richard Appel. It won an Emmy Award for "Outstanding Music and Lyrics" for the song "We Put the Spring in Springfield". Plot An oil tanker runs aground, spilling millions of gallons of oil on Baby Seal Beach. Lisa begs Marge to help celebrities scrub oil tar from shorebirds and sea mammals. Marge, Lisa and Maggie drive to the beach, leaving Bart and Homer home alone. Soon the house becomes a filthy mess, so Bart goes outside to play with his friends. Milhouse's toy airplane crashes atop the roof of a Gothic house. While Bart is retrieving it, he accidentally falls, destroying a stone gargoyle. Belle, the owner of the house, grabs Bart by the ear and takes him home, much to his friends' horror. At the Simpson home, Belle demands that Homer punish Bart for trespassing on her property. Homer balks until Belle threatens to come back and speak with Marge if he won't discipline Bart. Homer forces Bart to perform chores for Belle at the Maison Derrière, which the boy soon learns is a burlesque house. Bart does his job with enthusiasm and becomes indispensable to Belle. Marge and Lisa arrive at the beach, but discover that cleaning beach tar from animals is a task reserved only for celebrities. Instead, they are put to work scrubbing rocks, a job they soon abandon to return home. After Homer learns the truth about the burlesque house, he does nothing to stop Bart from working there. Principal Skinner visits the house and sees Bart is the door greeter. He reports it to the Lovejoys and the Flanderses, who confront Homer about Bart's workplace. As Homer crows that he has no problem with Bart working at a burlesque house, Marge returns home unexpectedly and is upset to learn this. Marge asks Belle to close the house, but Belle refuses, saying it is a part of Springfield. Marge presses the matter at a town meeting and shows slides of several prominent citizens leaving the Maison Derrière. Marge's campaign convinces the town to form a mob to destroy the house. The mob arrives at the house and starts smashing property. Homer tries to stop the mob's rampage by singing a musical number, accompanied by Belle and her burlesque dancers. The townfolk join in singing and are persuaded to let the house stay. However, Marge arrives with a bulldozer, having missed the song. As she starts a song about her stance on the house, she accidentally puts the bulldozer in drive and destroys a wing of the Maison. She a
https://en.wikipedia.org/wiki/The%20One%20with%20Barry%20and%20Mindy%27s%20Wedding
"The One with Barry and Mindy's Wedding" is the twenty-fourth and final episode of Friends second season. It first aired on the NBC network in the United States on May 16, 1996. Plot Joey is up for a role in a movie directed by Warren Beatty. The role calls for him to kiss another man – something Joey has trouble doing. At first he asks the girls to kiss him and let him know if he is really a bad kisser; Phoebe agrees on grounds that she had already kissed Joey once before. Phoebe judges that Joey has a firm and tender kiss and she would recommend him to a friend. Monica suggests that Joey has a problem kissing men, and which makes him very uncomfortable. He tries to get Ross and Chandler to help him, but with little success. Ross finally relents and surprises Joey with a kiss. Joey then reveals that they had already picked someone else for the role but thanks Ross for helping out. Rachel reluctantly agrees to be maid of honor at her ex-fiancé Barry's wedding, but inadvertently steals the couple's thunder when she walks up the aisle with her dress tucked into her orange panties. She is even angrier to find out that when she dumped Barry at the altar, his parents told everyone that she ran away because she was insane because she had syphilis. Rachel is about to leave, but stops when she learns that Barry was betting on her to leave before 9:45. She tells Barry that she promised herself she would make it through at least one of his weddings. She then sings "Copacabana" at the wedding, a song she was unable to perform at high school. Monica is anxious to find out what the future has in store for her and Richard. They talk, and realise they want different things in life. Monica wants to have children of her own, but Richard does not want to have any more kids. Later, Richard says he will have kids with her if that is what Monica wants, but she tells him that she cannot have kids with someone who does not really want them, and they reluctantly agree to break up. Chandler has met a woman online – they chat late into the night. Things go well until she reveals that she is married and that her husband is cheating on her. At Phoebe's urging, Chandler decides to look past that. They agree to meet in person at Central Perk – and his online girlfriend turns out to be Janice. The two immediately get back together, much to the others' chagrin. Production The sub-plot where Joey has to kiss a man was originally intended to be a story about Joey auditioning for the role of an uncircumcised man. The rest of the group then came up with various ways of making him look the part. The story was changed on the advice of network censors, who thought it was tasteless but it was later used in "The One with Ross and Monica's Cousin". Trivia In this episode Joel, the best-man and friend of Rachel at the wedding, is portrayed by acclaimed producer Peter Spears, winner of 1 Academy Award and candidated for many multiple awards for his production of the blockbuster hit
https://en.wikipedia.org/wiki/Multifactor%20dimensionality%20reduction
Multifactor dimensionality reduction (MDR) is a statistical approach, also used in machine learning automatic approaches, for detecting and characterizing combinations of attributes or independent variables that interact to influence a dependent or class variable. MDR was designed specifically to identify nonadditive interactions among discrete variables that influence a binary outcome and is considered a nonparametric and model-free alternative to traditional statistical methods such as logistic regression. The basis of the MDR method is a constructive induction or feature engineering algorithm that converts two or more variables or attributes to a single attribute. This process of constructing a new attribute changes the representation space of the data. The end goal is to create or discover a representation that facilitates the detection of nonlinear or nonadditive interactions among the attributes such that prediction of the class variable is improved over that of the original representation of the data. Illustrative example Consider the following simple example using the exclusive OR (XOR) function. XOR is a logical operator that is commonly used in data mining and machine learning as an example of a function that is not linearly separable. The table below represents a simple dataset where the relationship between the attributes (X1 and X2) and the class variable (Y) is defined by the XOR function such that Y = X1 XOR X2. Table 1 A machine learning algorithm would need to discover or approximate the XOR function in order to accurately predict Y using information about X1 and X2. An alternative strategy would be to first change the representation of the data using constructive induction to facilitate predictive modeling. The MDR algorithm would change the representation of the data (X1 and X2) in the following manner. MDR starts by selecting two attributes. In this simple example, X1 and X2 are selected. Each combination of values for X1 and X2 are examined and the number of times Y=1 and/or Y=0 is counted. In this simple example, Y=1 occurs zero times and Y=0 occurs once for the combination of X1=0 and X2=0. With MDR, the ratio of these counts is computed and compared to a fixed threshold. Here, the ratio of counts is 0/1 which is less than our fixed threshold of 1. Since 0/1 < 1 we encode a new attribute (Z) as a 0. When the ratio is greater than one we encode Z as a 1. This process is repeated for all unique combinations of values for X1 and X2. Table 2 illustrates our new transformation of the data. Table 2 The machine learning algorithm now has much less work to do to find a good predictive function. In fact, in this very simple example, the function Y = Z has a classification accuracy of 1. A nice feature of constructive induction methods such as MDR is the ability to use any data mining or machine learning method to analyze the new representation of the data. Decision trees, neural networks, or a naive Bayes clas
https://en.wikipedia.org/wiki/Lists%20of%20Apple%20software
Lists of Apple software cover different types of software written by Apple Inc. or for Apple computers. They include: Apple II List of Apple II application software List of Apple II games List of Apple IIGS games Mac List of Mac games List of Mac software List of Mac software published by Microsoft List of old Macintosh software Mobile List of iPod games List of iOS games List of free and open-source iOS applications
https://en.wikipedia.org/wiki/The%20Last%20of%20the%20Red%20Hat%20Mamas
"The Last of the Red Hat Mamas" is the seventh episode of the seventeenth season of the American animated television series The Simpsons. It originally aired on the Fox Network in the United States on November 27, 2005. In the episode, Marge befriends a group of women called the Cheery Red Tomatoes, while Milhouse tutors Lisa in Italian. Lily Tomlin guest stars as the voice of Tammy, the leader of the group. "The Last of the Red Hat Mamas" was the second highest rated of the season with 11.5 million viewers. Plot At Mayor Quimby's Easter egg hunt, Homer gets into a fight with the Easter Bunny mascot. Marge takes a tour of the mayor's mansion, and she and her friends are embarrassed by Homer's antics. That night, Homer feels guilty and unsuccessfully tries to find Marge new friends. Going for a walk, Marge meets a group of women called the Cheery Red Tomatoes (a parody of the Red Hat Society). She befriends the leader, Tammy, and is inducted into the group. Marge learns that the Cheery Red Tomatoes plan to steal Faberge eggs from Mr. Burns's mansion, after he ruined their fundraiser by backing out on a promised donation. She goes along with this to stay in the group, while Homer finds the heist plans and follows Marge. He mistakenly alerts the police on his way over, who catch the Cheery Red Tomatoes stealing the eggs. They flee the mansion seemingly empty-handed, but Marge reveals that she has hidden one egg in her hair, allowing the Cheery Red Tomatoes to replace the money Burns did not donate. They agree to go their separate ways and stay safe, while Homer reassures Marge that she will always have him as a special friend. Meanwhile, Lisa seeks summer opportunities and decides on studying abroad in Rome. The only requirement Lisa has not met is to speak fluent Italian, so she hires a tutor, who turns out to be Milhouse. To Lisa's surprise, Milhouse is fluent in Italian from having spent summers with his abusive xenophobic Italian grandmother, who beat him for speaking English (because an American WWII soldier left her pregnant with Milhouse's uncle). Lisa enjoys the special time spent during her lessons and learning Italian culture, and begins to like Milhouse more, but soon comes across Milhouse tutoring another girl in the same way he taught her. Lisa berates him in perfect Italian, chasing him with a stick in the same manner his grandmother did. Reception "The Last of the Red Hat Mamas" was the second highest rated of the season with 11.5 million viewers. See also List of Easter television episodes References External links The Simpsons (season 17) episodes 2005 American television episodes it:Episodi de I Simpson (diciassettesima stagione)#Le allegre comari di Rossor
https://en.wikipedia.org/wiki/List%20of%20Jewish%20American%20computer%20scientists
This is a list of notable Jewish American computer scientists. For other Jewish Americans, see Lists of Jewish Americans. Hal Abelson, artificial intelligence Leonard Adleman, RSA cryptography, DNA computing, Turing Award (2002) Adi Shamir, RSA cryptography, DNA computing, Turing Award (2002) Paul Baran, Polish-born engineer; co-invented packet switching Lenore and Manuel Blum (Turing Award (1995)), Venezuelan-American computer scientist; computational complexity, parents of Avrim Blum (Co-training) Dan Bricklin, creator of the original spreadsheet Sergey Brin, co-founder of Google Danny Cohen, Israeli-American Internet pioneer; first to run a visual flight simulator across the ARPANet Robert Fano, Italian-American information theorist Ed Feigenbaum, artificial intelligence, Turing Award (1994) William F. Friedman, cryptologist Herbert Gelernter, father of Unabomber victim David Gelernter;artificial intelligence Richard D. Gitlin, co-inventor of the digital subscriber line (DSL) Adele Goldberg, Smalltalk design team Shafi Goldwasser, Israeli-American cryptographer; Turing Award (2013) Philip Greenspun, web applications Frank Heart, co-designed the first routing computer for the ARPANET, the forerunner of the internet Martin Hellman, public key cryptography, co-inventor of the Diffie–Hellman key exchange protocol, Turing Award (2015) Douglas Hofstadter, author of Gödel, Escher, Bach and other publications (half Jewish) Bob Kahn, co-invented TCP and IP, Presidential Medal of Freedom, Turing Award (2004) Richard M. Karp, computational complexity, Turing Award (1985) John Kemeny, Hungarian-born co-developer of BASIC Leonard Kleinrock, packet switching John Klensin, i18n, SMTP, MIME Solomon Kullback, cryptographer Ray Kurzweil, OCR, speech recognition Jaron Lanier, virtual reality pioneer Leonid Levin, Soviet Ukraine-born computer scientist; computational complexity, Knuth Prize (2012) Barbara Liskov (born Huberman), first woman to be granted a doctorate in computer science in the United States; Turing Award (2008) Udi Manber, Israeli-American computer scientist; agrep, GLIMPSE, suffix array, search engines John McCarthy, artificial intelligence, LISP programming language, Turing Award (1971) Jack Minker, database logic Marvin Minsky, artificial intelligence, neural nets, Turing Award (1969); co-founder of MIT's AI laboratory John von Neumann (born Neumann János Lajos), Hungarian-American computer scientist, mathematician and economist Seymour Papert, South African-born co-inventor — with Wally Feurzeig and Cynthia Solomon — of the Logo programming language Judea Pearl, Israeli-American AI scientist; developer of Bayesian networks; father of Daniel Pearl, who was kidnapped and later beheaded by rebels in Pakistan Alan J. Perlis, compilers, Turing Award (1966) Frank Rosenblatt, invented an artificial intelligence program called "Perceptrons" (1960) Radia Perlman, inventor of the Spanning Tree Protocol Azriel R
https://en.wikipedia.org/wiki/John%20Quarterman
John S. Quarterman (born April 27, 1954) is an American author and longtime Internet participant. He wrote one of the classic books about networking prior to the commercialization of the Internet. He has also written about risk management. Biography Quarterman grew up in the Bemiss community, near Valdosta, Georgia, US. He first used the ARPANET in 1974 while attending Harvard, and worked on UNIX ARPANET software at BBN (the original prime contractor on the ARPANET) from 1977 to 1981. He was twice elected to the board of directors of the USENIX Association, a professional association related to the UNIX operating system. While on that board, he was instrumental in its vote in 1987 to approve the first funding received by UUNET, which, along with PSINet, became one of the first two commercial Internet Service Providers (ISPs). He co-founded the first Internet consulting firm in Texas (TIC) in 1986, and co-founded one of the first ISPs in Austin (Zilker Internet Park, since sold to Jump Point). He was a founder of TISPA, the Texas ISP Association. He was a founder and Chief Technology Officer of Matrix NetSystems Inc., established as Matrix Information and Directory Services (MIDS) in 1990. At Matrix, Quarterman published the first maps of the whole Internet; conducted the first Internet Demographic Survey and started the first continuing series of performance data about the entire Internet in 1993, on the web since 1995 in the Internet Weather Report, and also visible as Internet Average, plus comparisons of ISPs visible as ISP Ratings. Matrix NetSystems, which had also been known as Matrix.Net, Inc., merged with Alignment Software, Inc. in April, 2003, briefly becoming Xaffire Inc., before Keynote Systems, Inc. acquired Xaffire's Austin operations in December 2003, and private equity firm Thoma Bravo merged Keynote, which it had acquired in 2013, into Dynatrace. Inter@ctive Week listed John Quarterman as one of the 25 Unsung Heroes of the Internet in 1998, saying ..."As president of [MIDS], Quarterman, 43, is to Net demographics what The Gallup Organization is to opinion polls." Internet World interviewed Quarterman at length with a full-page picture in its June 1996 issue, as Surveyors of Cyberspace. On September 21, 2006, Quarterman served as a panelist with Hank Hultquist and Michele Chaboudy at a joint meeting of the IEEE Central Texas Section and Communications and Signal Processing Chapters titled "Network Neutrality: Altruism or Capitalism" at St. Edward's University in Austin, Texas. He also organized a November 2, 2006, panel on Net Neutrality for EFF-Austin, featuring Quarterman and Hank Hultquist, Michael Hathaway, and Austin Bay. Major works The Design and Implementation of the 4.3BSD UNIX Operating System, Addison-Wesley, January 1989, , Co-author with Samuel J. Leffler, Marshall K. McKusick, Michael J. Karels (describing a system which has been very influential on the TCP/IP protocols). The Matrix: Computer Networks and
https://en.wikipedia.org/wiki/Mary%20Lou%20Jepsen
Mary Lou Jepsen (born 1965) is a technical executive and inventor in the fields of display, imaging, and computer hardware. Her contributions have had worldwide adoption in head-mounted display, HDTV, laptop computers, and projector products; she was the technical force behind a generation of low-cost computing, and innovative consumer and medical imaging technologies. She was named one of the hundred most influential people in the world by Time Magazine (Time 100), was named in 2013 to CNN's top 10 thinkers in science and technology for her work in display innovation, and she has over 200 patents published or issued. She was the co-founder and first chief technology officer of One Laptop per Child (OLPC), and later founded Pixel Qi in Taipei, Taiwan, focused on the design and manufacture of displays. She founded and led two moonshots at Google X, reporting to Sergey Brin, and was an executive at Facebook / Oculus VR, leading an effort to advance virtual reality. In 2016 she founded OpenWater, a startup working on fMRI-type imaging of the body using holographic, infrared techniques. Early life and education Jepsen studied Studio Art and Electrical Engineering at Brown University. She received a Master of Science in Holography from the MIT Media Lab, and then returned to Brown to receive a Ph.D. in Optical Sciences. Career Her PhD work combined theoretical coupled-wave analysis with lab work, in which she created large-scale, embossed surface-relief diffraction gratings with liquid crystal-filled grooves with high diffraction efficiency in un-polarized illumination. She has created some of the largest ambient displays ever. In Cologne, Germany she built a holographic replica of pre-existing buildings in the city's historic district and created a holographic display encompassing a city block. She also demonstrated that it was technically feasible – but agreed it was culturally unacceptable – to project TV images on the moon's surface. From 2003 until the end of 2004, she was the chief technology officer of Intel’s Display Division. In 2016 she joined the board of directors of Lear Corporation, a leading maker of automotive electronics and seating. MIT Media Lab and OLPC In 2005 Jepsen joined the faculty of the MIT Media Lab as a professor with a tenure-track position. Here she started the Nomadic Displays Group, and co-created the first holographic video system in the world in 1989, where the interference structure of the hologram was computed at video rates, and shown on her hand-made display. This system inspired a new subfield of holographic video and received numerous awards. Working with Nicholas Negroponte, she simultaneously co-founded One Laptop per Child, a $100 computer, the lowest-power laptop ever made. As of 2013, millions of units have shipped to children in the developing world and revenues are beyond the billion dollar mark. There are deployments in over 50 countries and in more than 25 different languages. For the entir
https://en.wikipedia.org/wiki/Midnight%20Rescue%21
Midnight Rescue! is an educational and entertainment hybrid computer game created by The Learning Company in 1989 for Windows and Macintosh PCs. The program is designed to help strengthen the reading and critical thinking skills of children grades three to five. Midnight Rescue is a side-scrolling adventure game whose objective is to prevent a school from disappearing by midnight by deducing Morty Maxwell's hiding place. To do this, the player must roam the halls of Shady Glen School and piece together clues received by reading articles and correctly answering questions about them. The game contains a plethora of articles ranging from fictional character diary entries to excerpts from famous works of literature. The game is part of several of the Learning Company's later releases including their "Super Solvers Super Learning Collection" and "Super Solvers Reading Ages 9–12". In 1995, the game was re-released on CD-ROM. Gameplay Midnight Rescue! is a side-scrolling educational game whose objective is to stop Morty Maxwell (also known as the Master of Mischief), a common antagonist of The Learning Company's Super Solvers series and Treasure series, from using his robots to paint the school invisible by midnight. To do this, the player must deduce which of the robots he is hiding in by comparing photographs taken of robots to clues obtained by reading passages left around the school and answering questions about them within nine minutes. During the course of the game, the player will be attacked by Morty's robot henchmen (Buffo, Lectro, Pogo, Rollo, and Turbo), who take the forms of types of paintbrushes. When they appear they will either attempt to crash into the player or launch projectiles like marbles or pies at him. This will cause the player to lose either time (45 seconds) or film (one per crash). If the player uses his camera to take a picture of the robot before this happens, however, the robot will run away and the player will learn characteristics about that robot. These photos hold information that can be used to identify the robot that Morty is hiding in. When the player has all four clues and photographs of each robot, he must decide which robot he thinks the Master of Mischief is hiding in. The player must compare the clues gathered from answered questions to photographs that reveal characteristics about the robots. If the player correctly guesses the robot the Master of Mischief is in, he gets a bonus score based on film and time remaining. This will be added to the total lifetime score. If the player guesses incorrectly or fails to gather enough information by midnight, one of the robots will cover the player with invisible paint and the player loses the game. Losing a game does not affect the lifetime score. Each time the player completes the game, his lifetime score increases (although in the 1995 version, the player receives the points they earned if they guess wrong). At certain score amounts, the player will advance a r
https://en.wikipedia.org/wiki/Vehicular%20communication%20systems
Vehicular communication systems are computer networks in which vehicles and roadside units are the communicating nodes, providing each other with information, such as safety warnings and traffic information. They can be effective in avoiding accidents and traffic congestion. Both types of nodes are dedicated short-range communications (DSRC) devices. DSRC works in 5.9 GHz band with bandwidth of 75 MHz and approximate range of . Vehicular communications is usually developed as a part of intelligent transportation systems (ITS). History The beginnings of vehicular communications go back to the 1970s. Work began on projects such as Electronic Route Guidance System (ERGS) and CACS in the United States and Japan respectively. While the term Inter-Vehicle Communications (IVC) began to circulate in the early 1980s. Various media were used before the standardization activities began, such as lasers, infrared, and radio waves. The PATH project in the United States between 1986 and 1997 was an important breakthrough in vehicular communications projects. Projects related to vehicular communications in Europe were launched with the PROMETHEUS project between 1986 and 1995. Numerous subsequent projects have been implemented all over the world such as the Advanced Safety Vehicle (ASV) program, CHAUFFEUR I and II, FleetNet, CarTALK 2000, etc. In the early 2000s, the term Vehicular Ad Hoc Network (VANET) was introduced as an application of the principles of Mobile Ad-Hoc Networks (MANETs) to the vehicular field. The terms VANET and IVC do not differ and are used interchangeably to refer to communications between vehicles with or without reliance on roadside infrastructure, although some have argued that IVC refers to direct V2V connections only. Many projects have appeared in EU, Japan, USA and other parts of the world for example, ETC, SAFESPOT, PReVENT, COMeSafety, NoW, IVI. Several terms have been used to refer to vehicular communications. These acronyms differ from each other either in historical context, technology used, standard, or country (vehicle telematics, DSRC, WAVE, VANET, IoV, 802.11p, ITS-G5, V2X). Currently, cellular based on 3GPP-Release 16 and WiFi based on IEEE 802.11p have proven to be potential communication technologies enabling connected vehicles. However, this does not negate that other technologies for example, VLC, ZigBee, WiMAX, microwave, mmWave are still a vehicular communication research area. Many organizations and governmental agencies are concerned with issuing standards and regulation for vehicular communication (ASTM, IEEE, ETSI, SAE, 3GPP, ARIB, TTC, TTA, CCSA, ITU, 5GAA, ITS America, ERTICO, ITS Asia-Pacific). 3GPP is working on standards and specifications for cellular-based V2X communications, while IEEE is working through the study group Next Generation V2X (NGV) on the issuance of the standard 802.11bd. Safety benefits The main motivation for vehicular communication systems is safety and eliminating the excessive
https://en.wikipedia.org/wiki/QFX
QFX is an image editing computer program developed by Ron Scott, a Texan photographer and software engineer. The first version was released in 1990. At the time of its release, QFX was one of the most feature-rich image editing applications available on the PC platform (DOS, later Windows). It was the software of choice for digital artists and image postproduction studios in the times when 1024x768 truecolor graphics were a luxury, far before Photoshop could have been considered a serious professional tool. Its clean interface and clever workflow helped build a devoted user base, some of whom continue using it, despite QFXs being long ago eclipsed in features and users by Photoshop. History The first version of QFX was released around 1990. It ran on PCs equipped with AT&T Truevision AT Vista and Targa ISA bus framebuffer graphics cards. Low end Targa cards were limited to 8 bits, but most were 24 bit with a hardware alpha channel; Vista cards were 24 bit, and capable of greater than video resolution. All could capture RGB video. Early versions of QFX had no brushes; the program was used for image processing and color correction, rather than image creation, providing basic filters (blur, noise, glow etc.) that were a collection of MS-DOS programs that could be run from the command line and included in batch files. This functionality continued with all Targa and Vista versions of the program, and allowed operation on images with a resolution far greater than the graphics display device. Later Windows releases introduced an internal scripting facility that pre-dated Photoshop's actions by many years. The early version ran on both Intel and DEC Alpha processors. The program was popular with PC-based computer animators, who would often use QFX tools to composite multiple image layers for single-frame output to a video recorder or film recorder. In 1991 the new version called Hires QFX priced around US$3500, provided additional features including brushes and expanded support for large image files. In that time the alternatives for professional digital image editing were over-200k-and-more-USD dedicated workstations like Quantel's Paintbox, Crossfield or Barco Creator software running on expensive SGI Power series multiprocessor boxes. QFX was one of the first multiprocessor optimized graphics programs. When running on dual processor systems, it would split the image in two, running half on each processor. Could use "all memory" without use of "memory manages" (QMM per example) through Motherboard's BIOS, when DOS can not handle more of 16MB!, and let user set the undo levels up to 999 years before others (aka; Photoshop) keep just one undo. Allow use customs icons for customs scripts! The boom of DTP and the rapid advances in PC hardware in the mid-1990s changed the market for graphics software. Photoshop, windows oriented, less technical and cheaper solution for anybody proved to be a winning approach. QFX continued adding new features inclu
https://en.wikipedia.org/wiki/GEP
GEP may refer to: Gene expression programming Giant Electric Pea, a British music label Gifted Education Programme (Singapore) Global Environmental Politics, a scholarly journal Global Entrepreneur Programme, of the UK government Good engineering practice Growth elasticity of poverty Good Epidemiological Practices Generation expansion planning, in power engineering
https://en.wikipedia.org/wiki/APC%20%28magazine%29
APC (formerly known as Australian Personal Computer) is a computer magazine in Australia. It is published monthly and comes with a cover-mounted DVD of software. It is published by Future Australia. The tagline on the front of the magazine is "high performance personal computing" which APC uses as its point of distinction from other computing publications in Australia, such as PC User which targets beginner-medium users, and Atomic which targets gamers and modders. APC was first published in May 1980 by Sean Howard and is the longest running computer-magazine in Australia. The magazine also has a website, which publishes daily technology news, separate to what's in the printed magazine, with very few exceptions. The magazine was bought from Bauer Media Group in 2013 by Future. Future subsequently incorporated PC & Tech Authority into APC after acquiring it (along with other computing assets) from nextmedia in 2018. Cover disc APC has a cover-mounted DVD each month containing a variety of software, which typically includes sample code, programs demonstrated in the magazine's Workshop pages, instructional videos, trial versions of new software and game releases and three to four "full-working versions" of programs that are no longer current editions. APC first included a cover CD on its September 1996 issue. On its December 2004 issue, APC switched to DVD instead of CD and was the first IT publication in Australia to do so. It is currently edited and produced by Peter Dockrill, who has worked on it since April 2008. References External links 1980 establishments in Australia ACP magazine titles Computer magazines published in Australia Monthly magazines published in Australia Magazines established in 1980 Magazines published in Sydney
https://en.wikipedia.org/wiki/Muf%20%28disambiguation%29
muf is a London collaborative of artists and architects. MUF or muf may also refer to: MUF (programming language), "Multi-User Forth" Main Uralian Fault, in the Ural Mountains of Russia Maximum usable frequency, a term used for radio transmissions Moderata Ungdomsförbundet, or Moderate Youth League, Sweden Manchester United Football Ground railway station, UK, station code IATA code for Muting Airport, Indonesia Muslim United Front, Kashmiri political coalition Material unaccounted for, a discrepancy in an inventory of nuclear material Zdenko Muf (born 1971), a Serbian football manager See also Muff (disambiguation)
https://en.wikipedia.org/wiki/EMC%20NetWorker
EMC NetWorker (formerly Legato NetWorker) is an enterprise-level data protection software product from Dell EMC that unifies and automates backup to tape, disk-based, and flash-based storage media across physical and virtual environments for granular and disaster recovery. Description Cross-platform support is provided for Linux, Windows, macOS, NetWare, OpenVMS and Unix environments. Deduplication of backup data is provided by integration with Dell EMC Data Domain products. A central NetWorker server manages backup clients and NetWorker storage nodes that access the backup media. Platforms supported by the core NetWorker server are: AIX, HP-UX PA-RISC and Itanium, Linux (fully featured on x86, x86-64, Itanium, client only on PowerPC and IBM Z), macOS (client only), Solaris SPARC and x64, SGI IRIX (client only), Tru64 and Windows. The Java based NetWorker Management Console (NMC) software, which is bundled with the NetWorker distribution, provides a user interface for functions such as client configuration, policy settings, schedules, monitoring, reports, and daily operations for deduplicated and non-deduplicated backups. The core NetWorker software backs up client file systems and operating system environment. Add-on database and application modules provide backup services for products such as Oracle, DB2, SAP, Lotus, Informix, and Sybase, as well as Microsoft Exchange Server, SharePoint, and SQL Server. Client backup data can be sent to a remote NetWorker storage node or stored on a locally attached device by the use of a dedicated storage node. Additionally, NetWorker supports Client Direct backups allowing clients to back up directly to shared devices bypassing the storage node processes. NetWorker Snapshot Management automates the generation of point-in-time data snapshots and cloning on supported storage arrays such as EMC VNX, XtremIO, and Symmetrix. The NDMP module can be used for client-less backups of NAS Filers like Isilon, EMC VNX or Netapp. VMware virtual machines can be directly backed up either by installing the NetWorker client on the virtual machine or through the NetWorker VMware Protection to perform application consistent image and filesystem backups. NetWorker also supports backup and recovery of Microsoft Windows Server and Hyper-V virtual servers by using the Volume Shadow Copy Services interface. This support protects the parent and child partitions (guests) as well as applications running within the virtual machines. History Legato Systems, Inc., the original developer of NetWorker, was founded in 1988 by four individuals who worked together at Sun Microsystems: Jon Kepecs, Bob Lyon, Joe Moran and Russell Sandberg. NetWorker for UNIX was first introduced in 1990. The company, located in Palo Alto, California, had its initial public offering in July 1995. Although a relatively modest number of 2 million shares, it was considered run-up to the dot-com bubble. Litigation in 2002 alleged that Legato inflated its re
https://en.wikipedia.org/wiki/Diameter%20Credit-Control%20Application
Diameter Credit-Control Application is a networking protocol for Diameter application used to implement real-time credit-control for a variety of end user services. It is an IETF standard first defined in RFC 4006, and updated in RFC 8506. Purpose The purpose of the diameter credit control application is to provide a framework for real-time charging, primarily meant for the communication between gateways/control-points and the back-end account/balance systems (typically an Online Charging System). The application specifies methods for: Quota management (Reserve, Reauthorize, Abandon) Simple Debit/Credit Balance checks Price inquiries The diameter credit control application does not specify which type units are bought/used and which items are charged. This is left to the service context that has to be specified separately, as is some of the semantics. Examples of units used/bought: Time Upload/Download bytes SMS (Text Messages) Examples of items charged: Money Points Units (e.g. if the balance is kept in the same units as what is being used) Diameter credit control also specifies how to handle the fairly complex issue of multiple unit types used/charged against a single user balance. For instance, a user may pay for both online time and download bytes but has only a single account balance. Session-based charging A session-based credit control process uses several interrogations which may include first, intermediate and last interrogation. During interrogation money is reserved from the user account. Session-based charging is typically used for scenarios where the charged units are continuously consumed, e.g. charging for bytes upload/download. Event-based charging An event-based credit control process uses events as charging mechanism. Event-based charging is typically used when units are not continuously consumed, e.g. a user sending an MMS. Command Codes In order to support Credit Control via Diameter, there are two Diameter messages, the CCR (Credit Control Request) and the CCA (Credit Control Answer). Command Code for CCR/CCA is 272, as defined in RFC 4006 For quota management the client sends CCR to the server requesting units and reporting consumption. The server grants units and charges the user. For simple debit/credit the client sends a CCR asking the server to credit/debit the user's account. For price inquiries the client ask the server what the price for a unit is, and the server responds with the price. Message flows The message flows are in general driven by the control-point asking for units and the server granting them. The message may also be generated by other diameter applications, such as NASREQ (RFC4005) for sessions that are time/usage-limited. The following diagram shows a simplified message flow for a session using quota grants. The client starts by requesting 10 units from the server. The server verifies that the user/subscriber has enough balance for it. In this example the server grants the cl
https://en.wikipedia.org/wiki/The%20Clerks%20of%20Christ%20Church
The Clerks of Christ Church are a religious music group from Christ Church, Oxford. It was founded in 2001 in response to a popular demand for a group providing flexible programming for a variety of occasions. Its intention was to perform a total spectrum of vocal music; Sacred music from all eras (particularly Renaissance), and secular music from mediaeval rounds, through to madrigals, folk song arrangements, romantic part songs, spirituals, comic songs and close harmony arrangements of pop songs and the American songbook. The Clerks of Christ Church serves as a welcome opportunity to explore alternative and often neglected areas of the choral repertoire. All members of the group are (or have at some time been) members of Christ Church Cathedral Choir, but have performed with other consorts including The Sixteen, Tenebrae, Huelgas Ensemble, European Voices, The Clerks Group, Cardinall's Musick and The Gabrielli Consort. The Clerks of Christ Church have performed in venues as far apart as Christ Church, Oxford, and Christchurch, New Zealand (where they toured in 2002, 2003 and 2004); as various as Le Manoir aux Quat' Saisons (Raymond Blanc's restaurant and hotel) and Dorchester and Douai Abbeys; as well as performing for the memorial service of Lord Jenkins, the Chancellor of the University of Oxford, and in the presence of The Rt. Hon. Tony Blair M.P. In July 2004 The Clerks of Christ Church made their film debut in Sir Richard Eyre's Stage Beauty, starring Billy Crudup and Claire Danes. The group's debut disc, In Pace, was released in 2004. The Clerks of Christ Church have now signed exclusively for SOMM Records. A Garland of the Elizabethan is their first disc since signing, and will be followed by a disc celebrating the quincentenary of Thomas Tallis' birth, the music being Tallis' contribution to the 1575 publication Cantiones Sacrae. External links The Clerks of Christ Church official website English choirs Musical groups established in 2001 2001 establishments in England
https://en.wikipedia.org/wiki/Ape%20Escape
Ape Escape is a series of video games developed primarily by Japan Studio and published by Sony Computer Entertainment, starting with Ape Escape for PlayStation in 1999. The series incorporates ape-related humour, unique gameplay, and a wide variety of pop culture references. The first game in the series is the first game to have made the DualShock or Dual Analog controller mandatory. History The game was developed in 1998 under the name Sarugetchu, and was the first game to explicitly require the DualShock controller. The game was a success, going Platinum, entering the Greatest Hits series in the US, and entered the "Best Of" releases in Japan. It was reviewed positively, and was compared to games such as Super Mario 64. Ape Escape 2001 was released in 2001. It is the first game in the series to have been developed for PlayStation 2. The next year, Ape Escape 2 was developed by Sony and published in Japan in 2002 and in Europe and North America in 2003. In 2003, SCEI worked on a multiplayer party game and the sequel to Piposaru 2001. Ape Escape: Pumped & Primed was released in Japan through Sony Computer Entertainment Inc. and the US through Ubisoft in 2004. Ape Escape: On the Loose, a remake of the original game was released globally as one of the launch games for the PlayStation Portable. In 2005, Ape Academy (also known as Ape Escape Academy) was released for the PlayStation Portable. Eye Toy: Monkey Mania was a party game inspired by Mario Party which was only released in Europe and Japan. In mid-2005, Ape Escape 3 was released to positive critical reception. After the release of Ape Escape 3, Sony Computer Entertainment Europe showed interest in publishing Ape Academy 2 and Ape Escape: Million Monkeys; however, Sony Computer Entertainment America showed more interest in developing its own game. Ape Academy 2 was released in 2006 for the PlayStation Portable to mixed success and sold very well in Japan, entering the "Best of" category, but failed to perform well in Europe, due to Sony focusing on Million Monkeys. Million Monkeys was released in Japan in July 2006, making it the last official PlayStation 2 game in the series. The game was planned to be released in the United Kingdom in late 2006, but the game was postponed and later canceled. Its impact in Japan led to the inclusion of its iteration of series protagonist Spike in PlayStation All-Stars Battle Royale in 2012. In late 2006, PipoRacer was released in Japan for PlayStation Portable. In 2008, Japan Studio and h.a.n.d. developed Ape Escape: SaruSaru Big Mission. Both titles were never released outside Japan. In 2006, Sony placed an advertisement in a Famitsu magazine with interest in hiring staff for an upcoming game. It contains a picture with four monkeys, with the first holding up Ape Escape, the second holding up Ape Escape 2, the third holding up Ape Escape 3 and the fourth holding a cover with "?". The fourth entry was in development, but is still unreleased. A tweet b
https://en.wikipedia.org/wiki/Dimension%20%28data%20warehouse%29
A dimension is a structure that categorizes facts and measures in order to enable users to answer business questions. Commonly used dimensions are people, products, place and time. (Note: People and time sometimes are not modeled as dimensions.) In a data warehouse, dimensions provide structured labeling information to otherwise unordered numeric measures. The dimension is a data set composed of individual, non-overlapping data elements. The primary functions of dimensions are threefold: to provide filtering, grouping and labelling. These functions are often described as "slice and dice". A common data warehouse example involves sales as the measure, with customer and product as dimensions. In each sale a customer buys a product. The data can be sliced by removing all customers except for a group under study, and then diced by grouping by product. A dimensional data element is similar to a categorical variable in statistics. Typically dimensions in a data warehouse are organized internally into one or more hierarchies. "Date" is a common dimension, with several possible hierarchies: "Days (are grouped into) Months (which are grouped into) Years", "Days (are grouped into) Weeks (which are grouped into) Years" "Days (are grouped into) Months (which are grouped into) Quarters (which are grouped into) Years" etc. Types Slowly changing dimensions A slowly changing dimension is a set of data attributes that change slowly over a period of time rather than changing regularly e.g. address or name. These attributes can change over a period of time and that will get combined as a slowly changing dimension. These dimension can be classified in types: Type 0 (Retain original): Attributes never change. No history. Type 1 (Overwrite): Old values are overwritten with new values for attribute. No history. Type 2 (Add new row): A new row is created with either a start date / end date or a version for a new value. This creates history. Type 3 (Add new attribute): A new column is created for a new value. History is limited to the number of columns designated for storing historical data. Type 4 (Add history table): One table keeps the current value, while the history is saved in a second table. Type 5 (Combined Approach 1 + 4): Combination of type 1 and type 4. History is created through a second history table. Type 6 (Combined Approach 1 + 2 + 3): Combination of type 1, type 2 and type 3. History is created through separate row and attributes. Type 7 (Hybrid Approach): Both surrogate and natural key are used. Conformed dimension A conformed dimension is a set of data attributes that have been physically referenced in multiple database tables using the same key value to refer to the same structure, attributes, domain values, definitions and concepts. A conformed dimension cuts across many facts. Dimensions are conformed when they are either exactly the same (including keys) or one is a proper subset of the other. Most important, the row header
https://en.wikipedia.org/wiki/ALTRAN
ALTRAN (ALgebraic TRANslator) is a programming language for the formal manipulation of rational functions of several variables with integer coefficients. It was developed at Bell Labs in 1960s. ALTRAN is a FORTRAN version of ALPAK rational algebra package, and “can be thought of as a variant of FORTRAN with the addition of an extra declaration, the ‘algebraic’ type declaration.” Although ALTRAN is written in ANSI FORTRAN, nevertheless there exist differences in FORTRAN implementations. ALTRAN handles machine dependencies through the use of a macro processor called M6. ALTRAN should not be confused with the ALGOL to FORTRAN Translator, called Altran, that "converts Extended Algol programs into Fortran IV." History ALPAK, written in 1964, originally consisted of a set of subroutines for FORTRAN written in assembly language. These subroutines were themselves rewritten in FORTRAN for ALTRAN. An early version of ALTRAN was developed by M. Douglas McIlroy and W. Stanley Brown in the middle 1960s. However, soon after the completion of their ALTRAN translator, the IBM 7094 computers, on which ALPAK and ALTRAN were reliant, began to be phased out in favor of newer machines. This led to development of a more advanced ALTRAN language and implementation developed by Brown, Andrew D. Hall, Stephen C. Johnson, Dennis M. Ritchie, and Stuart I. Feldman, which was highly portable. The translator was implemented by Ritchie, the interpreter by Hall, the run-time rational function and polynomial routines by Feldman, Hall, and Johnson, and the I/O routines by Johnson. Later, Feldman and Julia Ho added a rational expression evaluation package that generated accurate and efficient FORTRAN subroutines for the numerical evaluation of symbolic expressions produced by ALTRAN. In 1979, ALTRAN was ported to the Control Data Corporation 6600 and Cyber 176 computers at the Air Force Weapons Laboratory. They found that "ALTRAN is about 15 times faster than FORMAC in a PL/I environment, and it is at least 12 times faster than REDUCE." It was also observed that ALTRAN was able to quickly solve problems which neither FORMAC nor REDUCE could handle on the given hardware or in reasonable time. Sample program PROCEDURE MAIN # SIMPLE EXAMPLE OF USE OF FTNOUT LONG ALGEBRAIC (X:10,Y:10) F ALTRAN FTNOUT OPTS(201,72) # FTNOUT REQUIRES A LINE LENGTH OF 72 F = EXPAND( (X+2*Y+1000000)**3 ) WRITE F # PRINT F WRITE (25) " FUNCTION F(X,Y)" "C EXAMPLE PROG WRITTEN WITH FTNOUT." , F , " RETURN"™, " END" # WE HAVE WRITTEN A SIMPLE PROGRAM ON UNIT 25, NOW WE INVOKE FTNOUT TO # THIS ALTRAN OUTPUT TO LEGAL FORTRAN. FTNOUT END Operations References W.S. Brown, "A language and system for symbolic algebra on a digital computer", SYMSAC '66 Proceedings of the first ACM symposium on Symbolic and algebraic manipulation, p. 501- 540, January 1966. W.S. Brown, ALTRAN User's Manual (2nd ed.), Bell L
https://en.wikipedia.org/wiki/Measure%20%28data%20warehouse%29
In a data warehouse, a measure is a property on which calculations (e.g., sum, count, average, minimum, maximum) can be made. A measure can either be categorical, algebraic or holistic. Example For example, if a retail store sold a specific product, the quantity and prices of each item sold could be added or averaged to find the total number of items sold or the total or average price of the goods sold. Use of ISO representation terms When entering data into a metadata registry such as ISO/IEC 11179, representation terms such as number, value and measure are typically used as measures. See also Data warehouse Dimension (data warehouse) References Kimball, Ralph et al. (1998); The Data Warehouse Lifecycle Toolkit, p17. Pub. Wiley. . Kimball, Ralph (1996); The Data Warehouse Toolkit, p100. Pub. Wiley. . Han, Jiawei Pei, Jian Tong, Hanghang. (2023). Data Mining Concepts and Techniques (4th Edition) - 3.2.4 Measures: Categorization and Computation. (pp. 105). Elsevier. Data warehousing Metadata
https://en.wikipedia.org/wiki/New%20England%20Cable%20News
New England Cable News (NECN) is a regional 24-hour cable news television network owned and operated by NBCUniversal (as part of the NBCUniversal Owned Television Stations division, both ultimately owned by Comcast) serving the New England region of the United States. It focuses on regional news, though in some low priority timeslots, paid programming and programming from WNBC such as Talk Stoop and Open House are seen. NECN, along with NBC owned and operated WBTS-CD (channel 15), Telemundo O&O WNEU (channel 60), and NBC Sports Boston, are based at the NBCU Boston Media Center on B Street in Needham, Massachusetts. NECN also operates several news bureaus in the New England area, including Manchester, New Hampshire; Hartford, Connecticut; Worcester, Massachusetts; Portland, Maine; Providence, Rhode Island; and Burlington, Vermont. New England Cable News maintains a remote camera in the television studio of Suffolk University in downtown Boston. New England Cable News is available across New England in 3.7 million homes and produces several original programs. Overview NECN was launched March 2, 1992, as a joint partnership between Continental Cablevision (now part of Comcast) and the Hearst Corporation. On June 18, 2009, Hearst sold its stake in NECN to Comcast, which began to operate it as a division of the Comcast Sports Group and Comcast SportsNet. When Hearst owned a stake in NECN, it used the resources of several New England stations owned and operated by Hearst Television to assist in news coverage of the region. The Hearst stations include Boston ABC affiliate WCVB-TV (early in NECN's existence, the network rebroadcast WCVB's 6:00 p.m. newscast at 8:00 p.m., an arrangement discontinued in 1998); New Hampshire's ABC affiliate WMUR-TV; ABC affiliate WMTW in Portland (NECN and WMTW both maintained bureaus in the Time and Temperature Building in downtown Portland, though the operations were physically separate and NECN used its own news vehicles in Maine); and WPTZ and WNNE, Vermont's two NBC affiliates. Other partnerships NECN maintained in its early years included WGGB-TV in Springfield, Massachusetts, WGME-TV in Portland (prior to Hearst's 2004 purchase of WMTW), WTNH in New Haven, Connecticut, WPRI-TV in Providence, Rhode Island, and The Boston Globe. Before its merger into the NBC Owned Television Stations, NECN was a training ground for local news reporters. Some of the better-known reporters who got their start at NECN include ABC's Dan Harris, CNN's Suzanne Malveaux, and CNBC's Maya Kulycky. Several of Boston's current television reporters and anchors also began at NECN. Conversely, NECN has also employed some of the long-lived veterans of the Boston television market, including R. D. Sahl, Tom Ellis and Chet Curtis. In addition to its cable production operations, NECN began to produce a 10:00 p.m. newscast for Boston Fox affiliate WFXT, known as Fox 25 News at 10:00 on September 7, 1993. Shortly after Fox Television Stations bough