source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/Shirley%20Murdock
|
Shirley Murdock (born May 22, 1957) is an American R&B singer-songwriter, who is best known for her 1986 R&B hit single "As We Lay" and for her vocals on Zapp and Roger's hit single "Computer Love". Her lead vocal special guest appearance with Smooth Jazz artist Ben Tankard, climbed to #1 Gospel and #20 on Billboard Top 200 on WOW Gospel 2006 and is certified Gold. Their collaboration of the Lionel Richie song "Jesus Is Love" is one of the most played songs on Sirius XM Radio gospel channel for eight years since its initial release.
Career
Murdock started out singing gospel music in her native Toledo. Singer/musician Roger Troutman hired Murdock as a backing singer for his family's band Zapp, which had several hits on Warner Bros. (and its Reprise Records imprint). Based on this success, Troutman began recording tracks with Murdock and lead singer Sugarfoot of the Ohio Players, among others, at his Dayton-based recording studio, Troutman Sound Labs. Murdock and Troutman's first chart single was a Warner Bros. single issued as Roger (featuring Shirley Murdock), "Girl, Cut It Out", which charted at number 79 R&B in early 1985.
Murdock signed with Elektra Records and released "No More", written by Shirley Murdock and Gregory Jackson (Cincinnati, Ohio funk keyboardist and member of Zapp), which made it to number 24 R&B in early 1986. Then came her signature hit, "As We Lay", written by Zapp's Larry Troutman and keyboardist Billy Beck (of the Ohio Players). The tender, melancholy ballad made it to the R&B Top Ten in 1986 and peaked at number 23 pop and number 21 on the adult contemporary chart in early 1987. Her debut album went gold, also helped along by the follow-up hits "Go on Without You" and "Be Free." She also released albums in 1988 (A Woman's Point of View) and 1991 (Let There Be Love!). In early 2000, Murdock toured in the inspirational/gospel play Be Careful What You Pray For with Cuba Gooding, Sr. and David Peaston.
Murdock released Home, her gospel-music debut album, in 2002 on T.D. Jakes' Dexterity Sounds record label. She made her acting debut in the movie Sweating in the Spirit. Most recently, Murdock has signed with Tyscot Records and released her most recent album in March 2007.
In 2009, Murdock collaborated with Teena Marie on the song "Soldier", from Marie's album Congo Square. She also appeared in the 2009 stage play A Mother's Prayer, with Johnny Gill, Robin Givens, and Jermaine Crawford. She also appeared in "A Mother's Love" a stage play produced by Kandi Burruss and Todd Tucker in 2014.
Discography
Studio albums
Live albums
Compilation albums
Singles
References
External links
Shirley Murdock official website
1957 births
Musicians from Toledo, Ohio
Living people
20th-century African-American women singers
American gospel singers
American rhythm and blues singers
Singers from Ohio
Elektra Records artists
Zapp (band) members
21st-century American women singers
Ballad musicians
21st-century American singers
21st-cen
|
https://en.wikipedia.org/wiki/Peltarion%20Synapse
|
Synapse is a component-based development environment for neural networks and adaptive systems. Created by Peltarion, Synapse allows data mining, statistical analysis, visualization, preprocessing, design and training of neural networks and adaptive systems and the deployment of them. It utilizes a plug-in based architecture making it a general platform for signal processing. The first version of the product was released in May 2006.
Platform
Due to its plug in-based design, the usage of Synapse can be very general. Synapse is based on the Microsoft .NET framework and all Synapse components are also .NET components. Although Peltarion has yet to release an official API for the Synapse platform, user made components are emerging, some of them being original, demonstrating the openness of the platform.
Features
The development cycle in Synapse is based on the canonical data mining cycle. A notable difference however is that in Synapse that cycle is not linear, but supports an iterative approach where the user can freely move between the steps. Synapse features four different operating modes that make up the development cycle.
Preprocessing
The preprocessing mode is for data mining and data preparation. In this mode the user can import, visualize, explore and transform data in a variety of ways. Data is imported through the use of format components. The standard release includes format components for reading and writing data from CSV (text) files, SQL databases, images and XML. The imported data can be visualized through visualizer components and filters can be applied to the data. The filter components range from simple data rearrangement to more advanced FFT and outlier removal filters.
The visualizers include a variety of plots and grids, which can be interconnected and branched out to perform complex data mining tasks.
Design
In design mode components are linked to construct a topology. Linked components enable a signal flow creating a pipe filter machine. When a signal is set on a component, it filters the signal in some way and the filtered signal can then be piped to the next component in the linked chain of components that form the topology. The components can be either static or adaptive. Besides regular filters, they can be sources or sinks (like plots or data loggers). The standard distribution of synapse comes with a variety of components, ranging from simple neural network components such as weight layers and function layers, to whole neural networks such as self-organizing maps and more complex static elements like for instance the fuzzy logic component. The control system is chosen and configured in design mode as well.
Training
The training mode is used for training (adapting) the system, or more generally to start the control system that regulates the information flow. It is visually similar to design mode and the same components are displayed. As the components have support for context sensitive displays, they can have a diff
|
https://en.wikipedia.org/wiki/SCSI%20connector
|
A SCSI connector ( ) is used to connect computer parts that use a system called SCSI to communicate with each other. Generally, two connectors, designated male and female, plug together to form a connection which allows two components, such as a computer and a disk drive, to communicate with each other. SCSI connectors can be electrical connectors or optical connectors. There have been a large variety of SCSI connectors in use at one time or another in the computer industry. Twenty-five years of evolution and three major revisions of the standards resulted in requirements for Parallel SCSI connectors that could handle an 8, 16 or 32 bit wide bus running at 5, 10 or 20 megatransfer/s, with conventional or differential signaling. Serial SCSI added another three transport types, each with one or more connector types. Manufacturers have frequently chosen connectors based on factors of size, cost, or convenience at the expense of compatibility.
SCSI makes use of cables to connect devices. In a typical example, a socket on a computer motherboard would have one end of a cable plugged into it, while the other end of the cable plugged into a disk drive or other device. Some cables have different types of connectors on them, and some cables can have as many as 16 connectors (allowing 16 devices to be wired together). Different types of connectors may be used for devices inside a computer cabinet, than for external devices such as scanners or external disk drives.
Nomenclature
Many connector designations consist of an abbreviation for the connector family, followed by a number indicating the number of pins. For example, "CN36" (also written "CN-36" or "CN 36") would be a 36-pin Centronics-style connector. For some connectors (such as the D-subminiature family) use of the hyphen or space is more common, for others (like the "DD50") less so.
Parallel SCSI
Parallel SCSI (SCSI Parallel Interface SPI) allows for attachment of up to 8 devices (8-bit Narrow SCSI) or 16 devices (16-bit Wide SCSI) to the SCSI bus. The SCSI Host controller takes up one slot on the SCSI bus, which limits the number of devices allowed on the bus to 7 or 15 devices respectively. SCSI Host Controllers may have multiple SCSI buses (e.g. Adaptec AHA-2940) to allow more SCSI devices to be attached.
Internal
IDC header
Early generations of SCSI hard drive assemblies generally had two connectors (power and communication). Some very early 16-bit units used two data connectors, with three connectors in total. The power connector was typically the same 4-pin female Molex connector used in many other internal computer devices. The communication connectors on the drives were usually a 50 (for 8-bit SCSI) or 68 pin male (for 16-bit SCSI) "IDC header" which has two rows of pins, 0.1 inches apart. This connector has no retaining screws to secure the connectors together, and ribbon cables are both inconveniently wide and somewhat delicate, so this connector style was primarily used for connec
|
https://en.wikipedia.org/wiki/INFOCOM
|
INFOCOM may refer to:
Infocom, a software company
IEEE Conference on Computer Communications, a computer science conference
|
https://en.wikipedia.org/wiki/Cyber%20Stadium%20Series%E2%80%94Base%20Wars
|
Cyber Stadium Series—Base Wars is a baseball video game for the Nintendo Entertainment System (NES).
Developed by Konami for the NES, and published by Ultra Games, Cyber Stadium Series—Base Wars was released in May or June 1991 in the United States; the game did not receive a European release. A baseball video game for one or two players, the ROM cartridge features the ability to save games, whether playing either an individual game or the ten-game pennant race.
Plot and gameplay
In a 24th century where baseball team owners are dissatisfied overpaying their players (e.g. per year for a lifetime .250 hitter), they have replaced the athletes with armed robots; there are four models of robot to choose from, each optimally suited for specific baseball positions. One of the game's innovations is where upon force plays, the two opposing players fight for possession of the base; another is the ability to upgrade robots' abilities between pennant games. If a team loses three robots in a game (to destruction from incremental damage), they forfeit the game.
Reception
In 1991, across its four 1–5 metrics of "graphics and sound", "play control", "challenge", and "theme and fun", Nintendo Power gave Base Wars an average score of 3.275 (3.6, 3.0, 2.9, and 3.6 respectively). Entertainment Weekly Bob Strauss rated the game a primarily penalizing Base Wars for playing too much like a typical baseball video game and not leaning enough into its science-fiction potential. Electronic Gaming Monthly four reviewers averaged a 7.75/10 rating for the game, positively comparing it to Cyberball and noting its multiplayer mode, variety, and polish. As of February 1992, Funco was offering to customers selling a copy of Base Wars.
Twelve years after the game's release, HonestGamers gave a score of 3/5, while after a further eleven years, Game Informer placed the "super bizarre, but in all the best ways" game as their number-two weirdest sports game. In 2014, Allgame's 2.5/5-star review—penned by Skyler Miller—was lukewarm, dismissing the combat aspect and describing fielding as "nearly impossible due to a screen that scrolls too slowly to keep up with fast-moving balls".
References
1991 video games
baseball video games
fantasy sports video games
Konami games
Nintendo Entertainment System games
science fiction video games
video games about robots
|
https://en.wikipedia.org/wiki/Bend%20Her
|
"Bend Her" is the thirteenth episode in the fourth season of the American animated television series Futurama, and the 67th episode of the series overall. It originally aired on the Fox network in the United States on July 20, 2003. In the episode, Bender changes into a female robot and adopts the name Coilette.
Plot
While attending the Earth 3004 Olympic Games with the crew to see Hermes compete in the limbo event, Bender feels he should compete as well. However, feeling emasculated by the large male Olympic bending robots, he decides to pose as a fembot in order to compete. Competing as Coilette, he easily beats the female competitors, winning five gold medals. However, the medalists are called in for gender testing prior to the awards ceremony. Desperate, Bender has Professor Farnsworth give him a sex change, turning him into an authentic fembot.
Coilette is invited to go on a late night talk show. Also appearing on the show is robot actor Calculon, who falls for Coilette instantly. The two start dating, which Coilette confides to the crew she is doing for the fame and valuable gifts Calculon sends her. Calculon proposes to Coilette. She accepts, scheming to get half his money with a divorce settlement.
However, moved by Calculon's deep professions of love, Coilette finds that though she does not want to be his wife, she also does not want to hurt him with a divorce, and even openly weeps while telling the crew this. Professor Farnsworth concludes that Coilette's new emotionalism is due to her new female hormones taking over. Leela offers to help Coilette out under the condition that she reverse her sex change. She reasons that though there is no way for Coilette to get out of her predicament without hurting Calculon, a soap opera parting will hurt him least. At the wedding, Coilette, Leela, Zoidberg and Fry stage an elaborate scene that fakes Coilette's death. As promised, Bender returns to his male persona, and claims not to have been changed at all by the experience. However, under his breath he bids Calculon an emotional goodbye.
Production
The opening scene at the Olympics was changed following the September 11 attacks. Several brief shots of various country representatives, including countries related to the terrorist attacks, were removed because the writing team did not want viewers to think that the episode was referencing the attacks. Similar minor changes were made to some other episodes in season four.
This episode was considered somewhat easier to animate than others because there were fewer spaceship scenes.
Reception
In a review from 2015, Zack Handlen from The A.V. Club stated "I don’t like the idea of trying to reduce art, no matter how vulgar or clumsy, to something we have to set against a checklist of appropriate viewpoints", although going on to criticize the episode for "gags that all seem to be based on tediously dated notions", for "basic assumptions about how men and women behave that are neither interesting no
|
https://en.wikipedia.org/wiki/Compact%20Pro
|
Compact Pro is a software data compression utility for archiving and compressing files on the Apple Macintosh platform. It was a major competitor to StuffIt in the early 1990s, producing smaller archives in less time, able to create self-extracting archives without the use of an external program, as well as being distributed via shareware which greatly helped its popularity. A PC version was also available, ExtractorPC. Neither program is actively supported.
History
When it was introduced in the early 1990s, Compact Pro (originally known as "Compactor") competed against StuffIt, which had been suffering from neglect after its original developer moved on to other projects. Compact Pro sported a clean interface and a variety of new features which quickly made it a favorite among the digerati. It quickly drove StuffIt from the leadership position and became very popular on BBS systems.
StuffIt 3.0 fought back with an even more powerful compression algorithm, a shareware version called StuffIt Lite with most of the same features, and the freeware StuffIt Expander which could decompress StuffIt archives and Compact Pro archives. Compact Pro never really regained its momentum after the release of StuffIt Expander. It maintained a niche among loyal users and as a preparation tool for Cyclos's "Smaller Installer" delivery package (which was notably used by Ambrosia Software), but disappeared from the market by the late 1990s.
Compact Pro also served as the inspiration for ZipIt, a PKZip-compatible archiver that was expressly designed to look and work like Compact Pro.
Features
Like most archiver systems, Compact Pro's primary purpose was to package up and compress files for transmission, then extract them again on the other side of the link. Unlike most systems, Compact Pro used a non-modal Mac-like UI that was widely lauded in the press.
Some of the more notable features included the ability to extract everything from an archive by double-clicking on it in the Finder with the key held down, and automatically recognizing and converting BinHex formatted files back into native format without a separate step. Compact Pro also featured an easy-to-use system for splitting files into parts to fit on floppy disks, a feature that most archivers implemented in an external program, if at all. An odd, but oft-used, feature was the ability to include images and notes that would display when the archive was opened, using the same basic mechanism as TeachText.
Compact Pro also included the ability to produce self-extracting archives. Although this was becoming common in archivers at the time, its particular implementation was notable because the extractor "stub" code was quite small at about 13 kB (compared to StuffIt at 38 kB). In an era of 14400 bit/s modems, this was a worthwhile savings. Many considered even this to be too large to bother with, and there were a number of small third-party utilities to strip the stub off from an existing archive. Compact Pro
|
https://en.wikipedia.org/wiki/Heat%20map
|
A heat map (or heatmap) is a 2-dimensional data visualization technique that represents the magnitude of individual values within a dataset as a color. The variation in color may be by hue or intensity.
"Heat map" is a relatively new term, but the practice of shading matrices has existed for over a century.
History
Heat maps originated in 2D displays of the values in a data matrix. Larger values were represented by small dark gray or black squares (pixels) and smaller values by lighter squares. Toussaint Loua (1873) used a shading matrix to visualize social statistics across the districts of Paris. Sneath (1957) displayed the results of a cluster analysis by permuting the rows and the columns of a matrix to place similar values near each other according to the clustering. Jacques Bertin used a similar representation to display data that conformed to a Guttman scale. The idea for joining cluster trees to the rows and columns of the data matrix originated with Robert Ling in 1973. Ling used overstruck printer characters to represent different shades of gray, one character-width per pixel. Leland Wilkinson developed the first computer program in 1994 (SYSTAT) to produce cluster heat maps with high-resolution color graphics. The Eisen et al. display shown in the figure is a replication of the earlier SYSTAT design.
Software designer Cormac Kinney trademarked the term 'heat map' in 1991 to describe a 2D display depicting financial market information. The company that acquired Kinney's invention in 2003 unintentionally allowed the trademark to lapse.
Types
There are two main type of heat maps: spatial, and grid.
A spatial heat map displays the magnitude of a spatial phenomena as color, usually cast over a map. In the image labeled “Spatial Heat Map Example,” temperature is displayed by color range across a map of the world. Color ranges from blue (cold) to red (hot).
A grid heat map displays magnitude as color in a two-dimensional matrix, with each dimension representing a category of trait and the color representing the magnitude of some measurement on the combined traits from each of the two categories. For example, one dimension might represent year, and the other dimension might represent month, and the value measured might be temperature. This heat map would show how temperature changed over the years in each month. Grid heat maps are further categorized into two different types of matrices: clustered, and correlogram.
Clustered heat map: The example of the monthly temperature by year is a clustered heat map.
Correlogram: A correlogram is a clustered heat map that has the same trait for each axis in order to display how the traits in the set of traits interact with each other. The correlogram is a triangle instead of a square because the combination of A-B is the same as the combination of B-A and so does not need to be expressed twice.
In a grid heat map, colors are presented in a grid of a fixed size, with every cell in the grid
|
https://en.wikipedia.org/wiki/Schenck%20v.%20Pro-Choice%20Network%20of%20Western%20New%20York
|
Schenck v. Pro-Choice Network of Western New York, 519 U.S. 357 (1997), was a case heard before the United States Supreme Court related to legal protection of access to abortion. The question before the court was whether the First Amendment was violated by placing an injunction on protesters outside abortion clinics. The court ruled in a 6–3 decision that "floating buffer zones" preventing protesters approaching people entering or leaving the clinics were unconstitutional, though "fixed buffer zones" around the clinics themselves remained constitutional. The Court's upholding the fixed buffer was the most important aspect of the ruling, because it was a common feature of injunctions nationwide.
Paul Schenck challenged a Federal District Court injunction that restricted "sidewalk counselors" from approaching abortion clinic patients and others with Bibles, tracts and anti-abortion messages. Because these protesters often violently harassed and intimidated patients and staff or prevented them from entering the clinic, the Court upheld the fixed buffer zone around the clinics, although it struck down the floating buffer zone around individuals because its indefinite and movable nature made it difficult to administer and risked overly restricting free speech.
See also
List of United States Supreme Court cases, volume 519
List of United States Supreme Court cases
Lists of United States Supreme Court cases by volume
References
Further reading
External links
PBS NewsHour: "Drawing the Line"
United States Supreme Court cases
United States abortion case law
1997 in United States case law
United States Free Speech Clause case law
United States Supreme Court cases of the Rehnquist Court
|
https://en.wikipedia.org/wiki/AppleSingle%20and%20AppleDouble%20formats
|
AppleSingle Format and AppleDouble Format are file formats developed by Apple Computer to store Mac OS "dual-forked" files on the Unix filesystem being used in A/UX, the Macintosh platform's first Unix-like operating system. AppleSingle combined both file forks and the related Finder meta-file information into a single file, whereas AppleDouble stored them as two separate files. Support for the formats was later added to Unix software such as NFS and MAE, but they saw little use outside this small market.
AppleSingle is similar in concept to the more popular MacBinary format, in that the resource and data forks are combined with a header containing the Finder information. In fact, the format is so similar, it seemed there was no reason why Apple did not simply use MacBinary instead, which by that point was widely known and used. Some not-so-obvious reasons are explained in an Internet Draft. The format was later assigned the MIME type .
AppleDouble leaves the data fork in its original format, allowing it to be edited by normal Unix utilities. The resource fork and Finder information, both proprietary and lacking editors under Unix, were combined into a second file. A MIME type was also assigned to AppleDouble, . For sending to an AppleDouble un-aware system, the file was generally encoded using Base64, as opposed to being converted to AppleSingle.
Usage
Before Mac OS X, AppleSingle and Double had little presence in the Mac market, due largely to the small market share of A/UX. Nevertheless, they did force various file compression vendors to add support for the formats, and confuse future MacBinary versions.
Mac OS X revived the use of AppleDouble; on file systems such as NFS and WebDAV that do not natively support resource forks, Finder information, or extended attributes, that information is stored in AppleDouble format, with the second file having a name generated by prepending "._" to the name of the first file (thus, this information acts as a hidden file when viewed from a non-Apple Unix-based operating system). The files are sometimes moved to a separate directory called . Metadata separation is also done in the OS X 10.3+ Finder Zip compression and the command line utility, with a copy of the AppleDouble metadata stored in a directory.
Manipulation
Unwanted "._" files can be removed using dot_clean -m on Mac OS X. Doing so also merges AppleDouble metadata with the corresponding files. AppleDouble files can be manually created through creative abuse of (which is AppleDouble-aware) and (which is not).
On other systems, the command and a Perl script called can be used to view AppleDouble data. Both are part of Netatalk.
The macOS system provides a set of library functions that allows for packing and unpacking AppleSingle and AppleDouble files in C.
References
External links
AppleSingle and AppleDouble format internals – from the original A/UX documentation
RFC 1740 - MIME Encapsulation of Macintosh files – documents AppleS
|
https://en.wikipedia.org/wiki/Galaksija%20BASIC
|
Galaksija BASIC was the BASIC interpreter of the Galaksija build-it-yourself home computer from Yugoslavia. While being partially based on code taken from TRS-80 Level 1 BASIC, which the creator believed to have been a Microsoft BASIC, the extensive modifications of Galaksija BASIC—such as to include rudimentary array support, video generation code (as the CPU itself did it in absence of dedicated video circuitry) and generally improvements to the programming language—is said to have left not much more than flow-control and floating point code remaining from the original.
The core implementation of the interpreter was fully contained in the 4 KiB ROM "A" or "1". The computer's original mainboard had a reserved slot for an extension ROM "B" or "2" that added more commands and features such as a built-in Zilog Z80 assembler.
ROM "A"/"1" symbols and keywords
The core implementation, in ROM "A" or "1", contained 3 special symbols and 32 keywords:
begins a comment (equivalent of standard BASIC REM command)
Equivalent of standard BASIC DATA statement
prefix for hex numbers
Allocates an array of strings, like DIM, but can allocate only array with name A$
serves as PEEK when used as a function (e.g. PRINT BYTE(11123)) and POKE when used as a command (e.g. BYTE 11123,123).
Calls BASIC subroutine as GOSUB in most other BASICs (e.g. CALL 100+4*X)
converts an ASCII numeric code into a corresponding character (string)
draws (command) or inspects (function) a pixel at given coordinates (0<=x<=63, 0<=y<=47).
displays the clock or time controlled by content of Y$ variable. Not in standard ROM
causes specified program line to be edited
standard part of IF-ELSE construct (Galaksija did not use THEN)
compare alphanumeric values X$ and Y$
standard FOR loop
standard GOTO command
equivalent of standard BASIC CLS command - clears the screen
protects n characters from the top of the screen from being scrolled away
standard part of IF-ELSE construct (Galaksija did not use THEN)
user entry of variable
a function that returns the greatest integer value equal to or lesser than n
test whether a particular keyboard key is pressed
lists the program. Optional numeric argument specifies the first line number to begin listing with.
returns memory consumption data (need details here)
clears the current BASIC program
clears BASIC program and moves beginning of BASIC area
standard terminator of FOR loop
loads a program from tape
loads program to different address
Returns address of the variable
Printing numeric or string expression.
Return from BASIC subroutine
function (takes no arguments) that returns a random number between 0 and 1.
runs (executes) BASIC program. Optional numeric argument specifies the line number to begin execution with.
saves a program to tape. Optional two arguments specify memory range to be saved (need details here).
standard part of FOR loop
stops exe
|
https://en.wikipedia.org/wiki/Data%20classification%20%28data%20management%29
|
In the field of data management, data classification as a part of the Information Lifecycle Management (ILM) process can be defined as a tool for categorization of data to enable/help organizations to effectively answer the following questions:
What data types are available?
Where are certain data located?
What access levels are implemented?
What protection level is implemented and does it adhere to compliance regulations?
When implemented it provides a bridge between IT professionals and process or application owners. IT staff are informed about the data value and management (usually application owners) understands better which part of the data centre needs to be invested in to keep operations running effectively. This can be of particular importance in risk management, legal discovery, and compliance with government regulations. Data classification is typically a manual process; however, there are many tools from different vendors that can help gather information about the data.
Data classification needs to take into account the following:
Regulatory requirements
Strategic or proprietary worth
Organization specific policies
Ethical and privacy considerations
Contractual agreements
How to start process of data classification?
Note that this classification structure is written from a Data Management perspective and therefore has a focus for text and text convertible binary data sources. Images, videos, and audio files are highly structured formats built for industry standard API's and do not readily fit within the classification scheme outlined below.
Evaluation and a division of the various data applications and data into their respective categories is needed to start the data classification process. For example, the process may look like:
Relational or Tabular data (around 15% of non audio/video data)
Generally describes proprietary data which can be accessible only through application or application programming interfaces (API).
Applications that produce structured data are usually database applications.
This type of data usually brings complex procedures of data evaluation and migration between the storage tiers.
To ensure adequate quality standards, the classification process has to be monitored by subject matter experts.
Semi-structured or Poly-structured data (all other non-audio/video data that does not conform to a system or platform defined Relational or Tabular form).
Generally describes data files that have a dynamic or non-relational semantic structure (e.g. documents, XML, JSON, Device or System Log output, Sensor Output, etc.).
Relatively simple process of data classification is criteria assignment.
Simple process of data migration between assigned segments of predefined storage tiers.
There are different types of data classification used. Please note that this designation is entirely orthogonal to the application-centric designation outlined above. Regardless of structure inherited from application, data may be of a
|
https://en.wikipedia.org/wiki/INSP%20%28TV%20network%29
|
INSP (formerly The Inspiration Network; the initialism is sounded out letter-by-letter) is an American digital cable television network that features primarily westerns (both shows and movies) and is headquartered in Indian Land, South Carolina - a suburb of Charlotte, North Carolina.
Between 1991 and 2010, INSP was a non-profit ministry focused network. In October 2010, it was re-branded and launched as a socially conservative, commercial-supported family entertainment network (over time becoming centered around westerns), and has Nielsen C3 ratings status. As of 2021, more than 60 million households receive INSP.
History
INSP was founded in 1978 as the PTL Television Network, a religious television network founded by Christian televangelists Jim Bakker and his wife, Tammy Faye Bakker. The network was the flagship channel for their daily Christian variety program, The PTL Club. The network later became known as the PTL Satellite Network and finally PTL – The Inspirational Network.
In 1990, after Jim Bakker resigned, the PTL Television network filed for bankruptcy. Morris Cerullo World Evangelism eventually purchased the network from the United States Bankruptcy Court in Columbia, South Carolina. Morris’ son, David, was later named CEO of the network. David Cerullo remains as its CEO.
In October 2010, the network announced a major re-branding with an added emphasis on family programming. Along with the re-branding came a new logo, tagline and name change from Inspiration to INSP. At the end of 2021, Variety reported that INSP's household viewers were up 1,171% since 2010.
In 2022, INSP changed its logo to include a cowboy hat to emphasize the growing success of its western-based shows and films. Prior to the logo change, INSP had also introduced the tagline, “Heroes Live Here.” Its focus on western-based programming is said to be the reason behind its continued ratings success, with primetime viewing growing 17% on the previous year.
On March 30, 2022, it was announced that INSP via Imagicomm Communications would enter the broadcasting business by purchasing 18 stations in 12 markets from Cox Media Group, namely KYMA in Yuma, Arizona; KIEM and KVIQ-LD in Eureka, California; KPVI in Idaho Falls, Idaho; KLAX in Alexandria, Louisiana; WABG, WNBD and WXVT in Greenwood, Mississippi; WICZ in Binghamton, New York; WSYT in Syracuse, New York; KOKI and KMYT in Tulsa, Oklahoma; KMVU and KFBI-LD in Medford, Oregon; WHBQ in Memphis, Tennessee; KAYU in Spokane, Washington; and KCYU-LD and KFFX in Yakima, Washington for an undisclosed price to help them comply with regulatory requirements related to a proposed merger with Tegna and Standard Media. The sale was completed on August 1.
Cowboy Way Channel
In May 2022, INSP launched the Cowboy Way Channel, an Internet streaming service aimed at younger viewers. Named for INSP's original series, The Cowboy Way: Alabama, the channel features other original series and Western- and outdoor-themed movies.
Progr
|
https://en.wikipedia.org/wiki/Download%20%28disambiguation%29
|
Download is transferring a file to or from another computer.
Download may also refer to:
Download (band), a band with Cevin Key and Phil Western
"Download" (song), a 2009 song by rapper Lil' Kim
Download (TV series), an Australian television series
Download (game show), a 2000–2002 Australian children's game show for Nine Network
Download Festival, a British rock festival
Download.com, the world's largest Internet download directory website
Download!, a former Nokia application store
Download The True Story of the Internet, a documentary television series about Internet history
Downloaded (Battlestar Galactica), a 2006 Battlestar Galactica Season 2 episode
Downloaded (film), a 2013 documentary film
Decommissioned highway, when a highway is "downloaded" to a municipality as a local road
File sharing, the uploading and downloading of files over a distributed peer network
Music download, the transferral of music from an Internet-facing computer or website to a user's local desktop computer
|
https://en.wikipedia.org/wiki/Upload%20%28disambiguation%29
|
Upload can mean:
Upload, transferring a file to or from another computer. See also File transfer and File sharing.
Mind uploading, the hypothetical transfer of a human mind into a computer by brain emulation
Upload (TV series), an American science fiction comedy web television series premiered on May 1, 2020.
Upload, Inc. (formerly UploadVR, Inc.) was an American virtual reality-focused technology and media company based in Marina del Rey, California.
|
https://en.wikipedia.org/wiki/Digital%20integration
|
Digital integration is the idea that data or information on any given electronic device can be read or manipulated by another device using a standard format. From the digital culture perspective, on the other hand, it is defined as an organization drive to leverage the broad capabilities and vast efficiencies of digital technology and media in order to provide consumers relevance and value. It is also employed in digital governance and could refer to the inter-agency cooperation and intergovernmental collaboration across units at multiple levels of government. The phenomenon is considered a basic megatrend in the so-called knowledge civilization.
Applications
Cell phone calendar to public digital calendar (online calendar)
In this example, a user has a cell phone with a calendar, as well as a calendar on the Internet. Digital Integration would allow the user to synchronize the two, and the following features could result:
The user could plan events and have other users notified.
If the Public Digital Calendar is integral with a Blog, then the user could write about the event in it.
Product Development
Digital integration is now considered a part of product development. For instance, modeling systems aims for the digital integration of the product development chain. It is also entailed in the digital automation of product design and credited for the 30 to 45 percent increase in productivity as part of the range of digital tools employed to augment project performance.
Building services integration for energy management and building control
A home owner or commercial building manager could utilize digital integration products to connect intelligent services within a built environment.
An intruder detection or access control system could be used in conjunction with light level sensors to turn lights on and off. So when you walk into a dark room the lights turn on (if you are allowed to be there) and when you leave they turn off behind you, thus making energy savings by preventing lights from being left on.
The same techniques could be used to control HVAC (Heating Ventilation and Air Conditioning) systems.
Home owners and commercial building managers can use Web based digital integration to control and manage services within their buildings via a web browser interface. The intelligent controllers in Air Conditioning units for example may be "Web Enabled" using digital integration solutions and products.
There is a growing market for these products. Many of the control systems used for security, lighting, HVAC and Fire detection do not conform to any communications protocol standard, so often interface software is used to convert the different languages into a common standard for the building or wide area network.
Some control systems are now being supplied with communications ports that conform to recognized standards such as BACnet, LonTalk or Ethernet many more provide interfaces to and from their own specialised control networks.
|
https://en.wikipedia.org/wiki/Superbook%20%281981%20TV%20series%29
|
, also known as , is a Christian anime television series from the early 1980s, initially produced at Tatsunoko Productions and TV Tokyo in Japan in conjunction with the Christian Broadcasting Network in the United States.
The series chronicled the events of the Bible's Old and New Testaments in its 52-episode run. The first 26 episodes aired from October 1, 1981, to March 25, 1982, followed by a second season called with 26 episodes from April 4, 1983, to September 26, 1983. Between both series in the first run was the companion series The Flying House.
Overview
Superbook (Anime Oyako Gekijo), begins at the home of a young boy named Christopher "Chris" Peeper, who discovers the ancient Bible named Superbook that can speak and send him, his friend Joy and his clockwork toy figure named Gizmo the Crusader Robot back in time during the events of the Old and New Testaments. The second series, Superbook II: In Search for Ruffles and Return to the 20th Century (Pasokon Travel Tanteidan), takes place two years after the first series, where Superbook falls onto a computer, giving anybody the ability to see into the past from Christopher's home via the monitor. Ruffles, his poodle, has managed to get lost in time, prompting Gizmo and Christopher's little brother (re-written as his cousin in the English dub), Uriah "Uri" Peeper, to search for Ruffles. While Chris and Joy keep watch and control of the computer from the present, Gizmo and Uri experience the stories from the Old Testament solely.
Cast and characters
(voiced by Masako Sugaya in Japanese, Billie Lou Watt in English): The main hero of the series, who is Professor Peeper's son and Gizmo's former owner.
(voiced by Katsue Miwa in Japanese, Sonia Owens in English): Chris's next-door neighbor and best friend.
(voiced by Hiroshi Masuoka in Japanese, Helena van Koert and Billie Lou Watt in English): The name of 2 characters, depending on the season. In the 1st season, he is Chris's advanced toy figure who can become a real-life robot. In the second season, Gizmo became a real-life sized robot built by Uri's father.
(voiced by Runa Akiyama in Japanese, Helena van Koert in English): Chris's little brother (cousin in the English dub) and Gizmo's current owner.
(voiced by Fumio Matsuoka in Japanese, Ray Owens in English): An archaeologist and Chris's father.
(voiced by Kumiko Takizawa in Japanese, Sonia Owens in English): Chris's mother.
Ruffles ( Kikyomu in Japanese): Chris and Uri's pet Yorkshire Terrier.
(voiced by Koji Totani in Japanese, Ray Owens in English): An ancient Bible that takes Chris, Joy, Gizmo and Uri back to the Old and New Testament eras.
Episodes
Season 1 (1981–1982)
Season 2 (1983)
VHS/DVD releases
Superbook Series I and Series II were released on various VHS volumes by Tyndale Entertainment. The entire series was available over 26 VHS Volumes. Superbook was released for the first time on DVD late 2005 to early 2006. The three DVD volumes features 4 episodes eac
|
https://en.wikipedia.org/wiki/Mark%20Beretta
|
Mark Beretta (born 16 June 1966) is an Australian journalist, best known as a sports reporter on Seven Network program Sunrise.
In July 2008, Beretta began presenting Seven Early News sport alongside Natalie Barr at 5.30 am, which leads into Sunrise, where he is still the sports presenter. Beretta joined with Tom Williams to host Rexona Australia's Greatest Athlete, in 2010. In 2011, he again hosted the show, this time alongside dual international Wendell Sailor.
Sunrise
Beretta formerly co-hosted Sunrise with current Nine News presenter Georgie Gardner from 2000 to 2002. From mid-2002 to 2004, he moved to presenting the sport on Seven News Sydney. In mid-2004, he was replaced by Sports Tonight presenter Matthew White; he subsequently moved to Sunrise where he was appointed sports presenter.
Beretta hosted the coverage of the 1998 Nagano, 2000 Sydney and 2002 Salt Lake City Olympic Games, as well as the 2002 Manchester Commonwealth Games.
In 2006, Beretta was the host of Seven Network's quiz show, The Master, which ran for only one episode on a Wednesday night at 8:30 pm before being burnt off in a Monday night timeslot during the 2006–07non-ratings season.
From 2007 until 2014, Beretta was part of the Seven Network's V8 Supercar commentary team, working alongside Matthew White, Neil Crompton, Mark Skaife and Mark Larkham. Beretta returned to commentary in 2021 when Seven resumed coverage of the championship from previous broadcaster Network 10.
Beretta is also a fill in presenter on The Morning Show and Weekend Sunrise, and a fill-in sport presenter on Seven News in Sydney. In 2013, Beretta hosted Seven's coverage of the Australian Open.
Publication
In October 2010, Beretta released his book The Riders - Australia's Motorcycle Champions through publisher HarperCollins. The Riders offers an insider's view of the world of motorcycle racing, with a collection of stories on 24 of Australia's greatest motorbike champions.
In October 2022, Beretta released the book 'Mark Beretta's Greatest Moments in Australian Sport' with Neil Cardigan, through publisher Affirm Press.
Personal life
Beretta has two children.
Since 2010, Mark has regularly taken part in the Tour de Cure bike ride from Sydney to Mooloolaba over ten days, to raise money to help find a cure for cancer. In 2011, he was appointed to the board of Tour De Cure.
In 2019, Beretta joined the Australian Army Reserves.
In October 2023, Beretta separated from partner Rachel.
Recognition and awards
Beretta was awarded the Medal of the Order of Australia in the 2021 Queen's Birthday Honours, for "service to the community through charitable organisations".
References
External links
Elite Sports profile
1966 births
Australian sports broadcasters
Seven News presenters
Living people
Australian people of Italian descent
Journalists from Sydney
People from Geelong
Motorsport announcers
Recipients of the Medal of the Order of Australia
Swinburne University of Technology alumni
|
https://en.wikipedia.org/wiki/Stupid%20sort
|
Stupid sort may refer to:
Bogosort, based on the generate and test paradigm
Gnome sort, similar to insertion sort
Sorting algorithms
|
https://en.wikipedia.org/wiki/WTIG
|
WTIG is an AM radio station in Massillon, Ohio operating on 990 kHz and featuring sports talk programming from ESPN Radio. The station is an affiliate of the Cincinnati Reds, Cincinnati Bengals, and the Columbus Blue Jackets radio networks.
History
WTIG was granted its license from the FCC in 1957. The original studios were located on the second floor of a building just a half block south of the town square, which later suffered a fire. The studios were immediately moved to the Massillon Motel, located on Lincoln Way East in downtown Massillon.(then route 30). Due to space limitations the studios were then moved to occupy a portion of the 2nd floor of the Massillon Building on the square (intersection of N. Erie St. and Lincoln Way, now Route 172) in downtown Massillon. In the mid-1990s the station ownership eventually moved the studios to the station's transmitter facilities on Karen Avenue NW as a cost-saving measure.
In its heyday, WTIG was a Top 40 station as "Tiger Radio," and was still playing blocks of music well into the 1990s. Because of its FCC Class D status and lower power and directional pattern south (to protect a Canadian licensee of the same frequency) WTIG does not cover areas north but concentrates on the Canton-Massillon area and surrounding townships. The programming for the past 20 years has been Sports, and affiliation with ESPN using the promotional name "ESPN 990." In addition to local sports, they carry Cincinnati Bengals football and Cincinnati Reds baseball.
External links
WTIG website
Sports radio stations in the United States
TIG
|
https://en.wikipedia.org/wiki/SketchUp
|
SketchUp is a suite of subscription products that include SketchUp Pro Desktop, a 3D modeling computer-aided design (CAD) program for a broad range of drawing and design applications — including architectural, interior design, industrial and product design, landscape architecture, civil and mechanical engineering, theater, film and video game development.
Owned by Trimble Inc., the program is currently available as a web-based application, SketchUp Free, and three paid subscriptions, SketchUp Shop, SketchUp Pro, and SketchUp Studio, each with increasing functionality.
The program includes drawing layout functionality, surface rendering in different "styles", and enables placement of its models within Google Earth.
History
@Last Software
SketchUp was developed by startup company @Last Software of Boulder, Colorado, co-founded in 1999 by Brad Schell and Joe Esch. SketchUp was created in August 2000 as a 3D content creation tool and was envisioned as a software program for design professionals. The program won a Community Choice Award at its first tradeshow in 2000. The first macOS release of SketchUp won a "Best of Show" at Macworld in 2002.
Google
Google acquired @Last Software on March 14, 2006, attracted by @Last Software's work developing a plugin for Google Earth. On January 9, 2007, Google announced Google SketchUp 6, a free downloadable version of SketchUp, including integrated tools for uploading content to Google Earth and to the Google 3D Warehouse.
Google SketchUp Pro 6 introduced a beta version of Google SketchUp LayOut which includes 2D vector tools and page layout tools allowing presentations to be produced without the need for a separate presentation program.
On November 17, 2008, SketchUp 7 was released with integration of SketchUp's Component Browser with Google 3D Warehouse, LayOut 2 and dynamic components that respond to scaling.
On September 1, 2010, SketchUp 8 was released with model geolocation with Google Maps and Building Maker integration. Mac OS X Tiger was no longer supported. SketchUp version 8 use under Wine has been rated "Gold". Geolocation information is always stored in the KMZ file. The building designs themselves are saved in SKP.
Trimble
Trimble Navigation (now Trimble Inc.) acquired SketchUp from Google on June 1, 2012 for an undisclosed sum. In 2013, SketchUp 2013 was released. A new site was provided, Extension Warehouse, hosting plugins and extensions for SketchUp.
Subscriptions
SketchUp comes in the following subscription options:
Studio
Everything in the pro plus professional rendering via Chaos' V-Ray for SketchUp and point cloud import and management via Trimble's Scan Essentials.
Pro
SketchUp Pro subscription includes the eponymous desktop 3D modeler, plus importers and exporters to common 2D and 3D formats, access to SketchUp's repository of pre-built 3D models (3D Warehouse), access to its extension library (Extension Warehouse), access to LayOut (2D documentation software) and S
|
https://en.wikipedia.org/wiki/Atmospheric%20dispersion%20modeling
|
Atmospheric dispersion modeling is the mathematical simulation of how air pollutants disperse in the ambient atmosphere. It is performed with computer programs that include algorithms to solve the mathematical equations that govern the pollutant dispersion. The dispersion models are used to estimate the downwind ambient concentration of air pollutants or toxins emitted from sources such as industrial plants, vehicular traffic or accidental chemical releases. They can also be used to predict future concentrations under specific scenarios (i.e. changes in emission sources). Therefore, they are the dominant type of model used in air quality policy making. They are most useful for pollutants that are dispersed over large distances and that may react in the atmosphere. For pollutants that have a very high spatio-temporal variability (i.e. have very steep distance to source decay such as black carbon) and for epidemiological studies statistical land-use regression models are also used.
Dispersion models are important to governmental agencies tasked with protecting and managing the ambient air quality. The models are typically employed to determine whether existing or proposed new industrial facilities are or will be in compliance with the National Ambient Air Quality Standards (NAAQS) in the United States and other nations. The models also serve to assist in the design of effective control strategies to reduce emissions of harmful air pollutants. During the late 1960s, the Air Pollution Control Office of the U.S. EPA initiated research projects that would lead to the development of models for the use by urban and transportation planners. A major and significant application of a roadway dispersion model that resulted from such research was applied to the Spadina Expressway of Canada in 1971.
Air dispersion models are also used by public safety responders and emergency management personnel for emergency planning of accidental chemical releases. Models are used to determine the consequences of accidental releases of hazardous or toxic materials, Accidental releases may result in fires, spills or explosions that involve hazardous materials, such as chemicals or radionuclides. The results of dispersion modeling, using worst case accidental release source terms and meteorological conditions, can provide an estimate of location impacted areas, ambient concentrations, and be used to determine protective actions appropriate in the event a release occurs. Appropriate protective actions may include evacuation or shelter in place for persons in the downwind direction. At industrial facilities, this type of consequence assessment or emergency planning is required under the U.S. Clean Air Act (CAA) codified in Part 68 of Title 40 of the Code of Federal Regulations.
The dispersion models vary depending on the mathematics used to develop the model, but all require the input of data that may include:
Meteorological conditions such as wind speed and direction, the a
|
https://en.wikipedia.org/wiki/Delessite
|
Delessite is a mineral variety, a magnesium-rich form of chamosite which is a member of the chlorite group. Delessite has the chemical formula .
References
Mindat with location data
Phyllosilicates
|
https://en.wikipedia.org/wiki/System%20Global%20Area
|
In the database management systems developed by the Oracle Corporation, the System Global Area (SGA) forms the part of the system memory (RAM) shared by all the processes belonging to a single Oracle database instance. The SGA contains all information necessary for the instance operation.
Components
In general, the SGA consists of the following:
buffer cache: holds copies of data blocks read from datafiles
dictionary cache: holds information about data dictionary tables, such as information about account, datafile, segment, extent, table and privileges
redo log buffer: contains information about database transactions, both committed and uncommitted, in preparation for writing to online redo log files
shared pool: holds the dictionary or row cache, the library cache, cursor definitions and shared SQL.
Java pool: holds information for parsing Java statements.
large pool: including the User Global Area (UGA))
stream pool:this is remote connectivity for the database.
Configuration
From Oracle Database version 10g, Automatic Memory Management (AMM) allows simplified and dynamic configuration of the SGA.
Granules
In the Oracle DBMS, the Oracle server allocates the system global area (SGA) in granule units at the time of instance startup. During the startup, each component acquires as many granules as it requires. The SGA can be said to consist of linked granules. The granule size depends on the database version and sometimes on the operating system. In Oracle 9i and earlier, it is 4 MB if the SGA size is less than 128 MB, and 16 MB otherwise. For later releases, it is typically 4 MB if the SGA size is less than 1 GB, and 16 MB otherwise. There must be at least 3 granules in the SGA: one for the Database Buffer Cache, one for the Shared Pool Area and one for the Redo Log Buffer. It is possible to retrieve information about the current granule size at any time by querying the dynamic view V$SGAINFO.
See also
Program Global Area (PGA)
Further reading
Memory Architecture
References
Oracle software
.
|
https://en.wikipedia.org/wiki/Qualcomm%20Atheros
|
Qualcomm Atheros is a developer of semiconductor chips for network communications, particularly wireless chipsets. The company was founded under the name T-Span Systems in 1998 by experts in signal processing and VLSI design from Stanford University, the University of California, Berkeley, and private industry. The company was renamed Atheros Communications in 2000 and it completed an initial public offering in February 2004, trading on the NASDAQ under the symbol ATHR.
On January 5, 2011, it was announced that Qualcomm had agreed to a takeover of the company for a valuation of US$3.7 billion. When the acquisition was completed on May 24, 2011, Atheros became a subsidiary of Qualcomm operating under the name Qualcomm Atheros.
Qualcomm Atheros chipsets for the IEEE 802.11 standard of wireless networking are used by over 30 different wireless device manufacturers.
History
T-Span Systems was co-founded in 1998 by Teresa Meng, professor of engineering at Stanford University and John L. Hennessy, provost at the time and then president of Stanford University through 2016.
The company's first office was a converted house on Encina Avenue, Palo Alto, adjacent to a car wash and Town & Country Village.
In September 1999, the company moved to an office at 3145 Porter Drive, Building A, Palo Alto.
In 2000, T-Span Systems was renamed Atheros Communications and the company moved to a larger office at 529 Almanor Avenue, Sunnyvale. Atheros publicly demonstrated its inaugural chipset, the world's first WLAN implemented in CMOS technology and the first high-speed 802.11a 5 GHz technology.
In 2002, Atheros announced a dual-band wireless product, the AR5001X 802.11a/b.
In 2002, Craig H. Barratt joined Atheros as vice president and in March 2003 became CEO.
In 2003, the company shipped its 10-millionth wireless chip.
In 2004, Atheros unveiled a number of products, including the first video chipset for mainstream HDTV-quality wireless connectivity.
In 2004, Atheros disclosed its Super-G compression protocol to double the performance of 802.11/g. This was a major event in this history of the company and drove a great deal of sales and growth.
In 2005, Atheros introduced the industry's first MIMO-enabled WLAN chip, as well as the ROCm family for mobile handsets and portable consumer electronics.
In 2006, Atheros announced its XSPAN product line, which featured a single-chip, triple-radio for 802.11n. In this same year, they began to collaborate with Qualcomm on a product for CDMA and WCDMA-enabled handsets.
In 2008, Atheros announced the Align 1-stream 802.11n product line for PCs and networking equipment.
In 2010, Atheros shipped its 500-millionth WLAN chipset and 100-millionth Align 1-stream chipset. They released the first HomePlug AV chipset with a 500 Mbit/s PHY rate.
IPO
On February 12, 2004, Atheros completed its initial public offering on the NASDAQ exchange trading under the symbol ATHR. Shares opened at per share with 9 million offered. Prices
|
https://en.wikipedia.org/wiki/Lucas%E2%80%93Kanade%20method
|
In computer vision, the Lucas–Kanade method is a widely used differential method for optical flow estimation developed by Bruce D. Lucas and Takeo Kanade. It assumes that the flow is essentially constant in a local neighbourhood of the pixel under consideration, and solves the basic optical flow equations for all the pixels in that neighbourhood, by the least squares criterion.
By combining information from several nearby pixels, the Lucas–Kanade method can often resolve the inherent ambiguity of the optical flow equation. It is also less sensitive to image noise than point-wise methods. On the other hand, since it is a purely local method, it cannot provide flow information in the interior of uniform regions of the image.
Concept
The Lucas–Kanade method assumes that the displacement of the image contents between two nearby instants (frames) is small and approximately constant within a neighborhood of the point under consideration. Thus the optical flow equation can be assumed to hold for all pixels within a window centered at . Namely, the local image flow (velocity) vector must satisfy
where are the pixels inside the window, and are the partial derivatives of the image with respect to position and time , evaluated at the point and at the current time.
These equations can be written in matrix form , where
This system has more equations than unknowns and thus it is usually over-determined. The Lucas–Kanade method obtains a compromise solution by the least squares principle. Namely, it solves the system
or
where is the transpose of matrix . That is, it computes
where the central matrix in the equation is an Inverse matrix. The sums are running from to .
The matrix is often called the structure tensor of the image at the point .
Weighted window
The plain least squares solution above gives the same importance to all pixels in the window. In practice it is usually better to give more weight to the pixels that are closer to the central pixel . For that, one uses the weighted version of the least squares equation,
or
where is an diagonal matrix containing the weights to be assigned to the equation of pixel . That is, it computes
The weight is usually set to a Gaussian function of the distance between and .
Use conditions and techniques
In order for equation to be solvable, should be invertible, or 's eigenvalues satisfy . To avoid noise issue, usually is required to not be too small. Also, if is too large, this means that the point is on an edge, and this method suffers from the aperture problem. So for this method to work properly, the condition is that and are large enough and have similar magnitude. This condition is also the one for Corner detection. This observation shows that one can easily tell which pixel is suitable for the Lucas–Kanade method to work on by inspecting a single image.
One main assumption for this method is that the motion is small (less than 1 pixel between two images for example).
|
https://en.wikipedia.org/wiki/Green%20Drinks
|
Green Drinks is an informal networking event where environmentally minded people meet over drinks. Started in London in 1989, by Edwin Datschefski, Paul Scott, Ian Grant and Yorick Benjamin, it has spread to 51 cities in the United Kingdom, 400 in the U.S. and many more in Canada, Germany, Poland, Sweden, the Netherlands, Japan, Singapore, Kuala Lumpur, Hong Kong, Manila, New Zealand, Australia, Argentina, Chile, Puerto Rico and Lebanon. As of March 2011, 770 Green Drink Chapters have been established worldwide.
The New York City Chapter was founded by Margaret Lydecker in July 2002 and is the largest global chapter with 14,000+ members. The December 2007 Holiday Party, marked the largest Green Drinks event in New York City to date with a 1000+ person record attendance, which was covered by CNN. Green Drinks NYC has an average attendance of 400 people held at different venues around Manhattan and has been a driver for connectivity, community, collaboration and change within the environmental sector in New York City and beyond. The 2009 Green Drinks Holiday Event, featured Dr. Sylvia Earle, world-renowned oceanographer, scientist and TED prize winner.
Lydecker has made significant contributions to the growth and expansion of Green Drinks chapters around the world personally helping to start or influence 200+ chapters including a chapter in Kabul, Afghanistan and is the USA point person for Green Drinks.
As of 15 February 2008, Melbourne, Australia holds the record for the world's biggest Green Drinks. Over 1700 people attended an event held on the first evening of the city's 2008 Sustainable Living Festival.
In December 2008, the Organizer for the Green Drinks Hawaii events added a social networking site for all the Green Drinks attendees worldwide.
See also
Café Scientifique
Conservation movement
Environmentalism
Environmental protection
References
External links
Green Drinks
International environmental organizations
Environment and society
|
https://en.wikipedia.org/wiki/Warringah%20Freeway
|
Warringah Freeway is a divided freeway in Sydney, New South Wales that is part of the Sydney Orbital Network. The primary function of the freeway is to provide an alternative high-grade route from the Sydney Harbour Tunnel and Bradfield Highway at Milsons Point to the A8 and Gore Hill Freeway. The freeway reduces traffic demands on Pacific Highway throughout Sydney's Lower North Shore, bypassing and , and provides a vital link to access most of the suburbs in Sydney and is also a major route to the north, south, east and west of the central business district.
Route
Warringah Freeway commences at the interchange with Gore Hill Freeway and Willoughby Road in Naremburn and heads in a southeasterly direction as a six-lane, dual-carriageway road, curving to a southward direction through Cammeray, slowly expanding to 10 lanes across multiple carriageways after the Brook Street exit, and to 16 lanes across the whole corridor for a short distance before the North Sydney northbound onramp. While a number of its inner carriageways were built to allow reversible traffic flows, today only the inner west carriageway is reversible, with the inner east carriageway feeding the Sydney Harbour Tunnel southbound. All carriageways were previously widened by utilising space from the former breakdown lane, and repositioning the existing lanes.
The arrangement is now mostly 4x3x3x3 through the section with the switchable carriageway, with variations in the width of the outer carriageways as ramps enter and exit the freeway. In 2007, major changes to the Military Road overpass have occurred with an extra three ramps added, and two extra lanes on the connecting Gore Hill Freeway at the northern end (part of the Lane Cove Tunnel project). The overpass where these five ramps originate has been widened for an attempt to channel all the traffic.
The carriageway change over process was automated around 1990, with moveable barriers and overhead signage directing traffic onto the correct lanes. The changeover occurs when the Harbour Bridge needs either 5 or 6 lanes southbound (the default is 4 each way). There can only ever be a maximum of 5 lanes northbound off the bridge, with the extra lane feeding into a spare lane on the inner west carriageway. Changeover times are around 06:30 and 09:00 Monday to Friday.
Almost all entry and exit ramps on the freeway are controlled by traffic signals. Most of the ramps are of sufficient length to avoid any delays to through traffic, with the exception of Military Road. The arrangement for accessing the Harbour bridge (for access to the city and western suburbs) southbound can be confusing for anyone unfamiliar with the road, with a choice of either competing with traffic approaching the Sydney Harbour Tunnel via the two lanes at the inner eastern carriageway or having to cross the Bus Lane; traffic improved when the toll collection points (for southbound traffic) became electronic only.
History
Planning for the construction of the
|
https://en.wikipedia.org/wiki/Ivory%20Tower%20%281998%20film%29
|
Ivory Tower is a 1998 American drama film about young people trying to enter the computer industry in Silicon Valley. The film was directed by Darin Ferriola, and stars Michael Ironside, Patrick Van Horn, Kari Wührer, and James Wilder.
Synopsis
Anthony is in charge of launching a new product, however his views on life and work are challenged by a new boss willing to do whatever it takes to succeed.
Cast
Jack Janda as Ahmad
Patrick Van Horn as Anthony Daytona
James Wilder as Jarvis Cone
Michael Greene as Walter Felice
Brian Reddy as Bob Martell
Kari Wuhrer as Karen Clay
Ian Buchanan as Andy Pallack
Keith Coogan as Russ Dyerson
Michael Ironside as Marshall Wallace
Richard Cody as Stephen
Garrett Wang as Mark
Gina Mari as Tammy
Lisa Stahl as Carol
Roger Clinton as Tim Cartridge
Production
Ferriola wrote the script with the film's investors in mind, after researching the likes and dislikes of potential funders. He received a budget of $700,000 with which to create the movie, which he also produced and directed. This marked Ferriola's directorial debut and the first film released through his production company One-Tu-Three Prods. Pic.
Reception
External links
1998 films
1998 drama films
American drama films
1990s English-language films
1990s American films
English-language drama films
|
https://en.wikipedia.org/wiki/Melbourne%20tram%20route%2011
|
Melbourne tram route 11 is operated by Yarra Trams on the Melbourne tram network from West Preston to Victoria Harbour. The route is operated out of Preston depot with E class trams.
History
Route 11 was first allocated to the line between West Preston and the City (Collins Street) on 25 July 1937. Prior to this, it was first allocated to East Preston and St Kilda Beach via Holden Street and Swanston Street on 21 November 1929. Then, it was allocated to the Holden Street Shuttle following the electrification of the Brunswick Street cable line. However, since single-truck trams without number boxes were used on this line, the route number was never displayed. The electrification of the South Melbourne cable tram line on 25 July 1937 enabled through-running on Collins Street. Route 11 ran from West Preston to the city, but some services would continue as route 10 south to South Melbourne Beach (later St Kilda - Fitzroy Street).
Following the elimination of shared-depot routes, route 10 was discontinued on 30 April 1995. However, in August 2000, the West Preston to St Kilda - Fitzroy Street recommenced and was allocated route 112, which operated on weekdays. Following this, Route 11 became a weekend only service, and later became a peak-hour only service. On 27 July 2014, route 11 became a full-time service following the cessation of route 112, and the establishment of route 12.
The origin of route 11 mainly consists of the North Fitzroy cable tram line and the West Preston line built by the Fitzroy, Northcote & Preston Tramways Trust (FNPTT). The North Fitzroy cable line was opened on 2 October 1886 by the Melbourne Tramway & Omnibus Company. The section between Spencer Street (Stop 1) and St Vincent's Plaza (Stop 12) was first electrified on 15 September 1929. The rest of the North Fitzroy cable line was electrified on 26 October 1930. Meanwhile, the FNPTT constructed the line between Holden Street (Stop 24) and Regent Street (Stop 47). Due to delays with available FNPTT rollingstock among other issues, the line couldn't open until the Melbourne & Metropolitan Tramways Board took over. The line eventually opened on 1 April 1920. On 3 July 1953, the West Preston terminus was extended to the north side of the intersection to clear the intersection.
Initially, the line to West Preston was single track north of the Miller Street/St Georges Road intersection (near Stop 34). It was duplicated in stages. On 28 June 1927, the line from Gilbert Road (near Stop 37) and Preston Workshops was duplicated. A few months later on 22 August 1927, this was further extended to Bell Street (Stop 40). It was further duplicated to Jacka Street (Stop 45) on 28 March 1928. The last remaining section of single track to the Regent Street terminus was duplicated on 19 November 1952.
On 18 November 2002, a tram line was constructed to Collins Street West along the Collins Street extension, and routes 11, 31 and 42 were extended to the end of the extension. From 28 June
|
https://en.wikipedia.org/wiki/PackIt
|
PackIt is a software data compression utility for archiving and compressing files on the Apple Macintosh platform. It was the first such program to see widespread use on the Mac, and most Mac software archives accepted uploads only in PackIt format for some time. StuffIt, introduced in the summer of 1987, offered much improved compression, and PackIt quickly disappeared.
PackIt was written by Harry Chesley to support an online magazine he was writing for at the time, MacDeveloper. To distribute code and sample applications, he needed to archive a number of files into one for transmission. In the original version this was done in a simple manner, simply placing the Finder file information, data fork and resource fork, if present, in a single stream and placing the resulting "block" in the archive. No compression was used, the program was purely an archiver, similar to the Unix tar utility in concept. Like tar, the format did not include an archive header of any sort. To extract the nth file, PackIt had to read past all of the n-1 files first.
PackIt II was released in early 1986 and added Huffman encoding. However the encoding was applied after the file had already been "grouped" together, meaning that the compressor had to work on the file as a whole, or not at all. Since Mac files often consisted of text in the data fork and binary data in the resource fork, compressing these separately and then joining them together would likely offer better compression overall. PackIt III, released in mid-1986, added DES encryption. According to Chesley this option was not widely used, but nevertheless PackIt III became the de facto standard compression/archiving system on the Mac through this period. In December 1986 he joined Apple Computer, and work on PackIt ended.
In comparison, StuffIt supported the newer LZW-type compression system and compressed the data and resource forks separately. This led to significantly better compression ratios on almost all files. The files were then stored with a single universal header, allowing the program to quickly list the archive contents, as well as uncompress a single file, without having to "scan" through the archive. This made StuffIt much easier and faster to use in practice.
Archives created with PackIt used the file extension. File extensions are not normally needed on the Mac, but were commonly used on archives because they would typically be stored on some other system that would require them (PC's for instance). These files were generally stored in MacBinary format on such machines, however, making the extension somewhat superfluous. Later versions of PackIt would recognize a MacBinary header if it had been left on, and strip it off automatically.
References
E-mail with the author
External links
PackIt - Harry Chesley's "home page" for PackIt, including source code
UnPackIt source code
Archive Formats and Data - contains a section on the PackIt header format
macutils, converts between different Macinto
|
https://en.wikipedia.org/wiki/Windows%20Native%20API
|
The Native API is a lightweight application programming interface (API) used by Windows NT and user mode applications. This API is used in the early stages of Windows NT startup process, when other components and APIs are still unavailable. Therefore, a few Windows components, such as the Client/Server Runtime Subsystem (CSRSS), are implemented using the Native API. The Native API is also used by subroutines such as those in kernel32.dll that implement the Windows API, the API based on which most of the Windows components are created.
Most of the Native API calls are implemented in ntoskrnl.exe and are exposed to user mode by ntdll.dll. The entry point of ntdll.dll is LdrInitializeThunk. Native API calls are handled by the kernel via the System Service Descriptor Table (SSDT).
Function groups
The Native API comprises many functions. They include C runtime functions that are needed for a very basic C runtime execution, such as strlen(), sprintf(), memcpy() and floor(). Other common procedures like malloc(), printf(), scanf() are missing (the first because it does not specify a heap to allocate memory from and the second and third because they use the console, accessed only via KERNEL32.DLL). The vast majority of other Native API routines, by convention, have a 2 or 3 letter prefix, which is:
Nt or Zw are system calls declared in ntdll.dll and ntoskrnl.exe. When called from ntdll.dll in user mode, these groups are almost exactly the same; they execute an interrupt into kernel mode and call the equivalent function in ntoskrnl.exe via the SSDT. When calling the functions directly in ntoskrnl.exe (only possible in kernel mode), the Zw variants ensure kernel mode, whereas the Nt variants do not. The Zw prefix does not stand for anything.
Rtl is the second largest group of ntdll calls. These comprise the (extended) C Run-Time Library, which includes many utility functions that can be used by native applications, yet don't directly involve kernel support.
Csr are client-server functions that are used to communicate with the Win32 subsystem process, csrss.exe (csrss stands for client/server runtime sub-system).
Dbg are debugging functions such as a software breakpoint.
Ki are upcalls from kernel mode for events like APC dispatching.
Ldr are loader functions for PE file handling and starting of new processes.
Nls for National Language Support (similar to code pages).
Pfx for prefix handling.
Tp for threadpool handling.
user32.dll and gdi32.dll include several other calls that execute an interrupt into kernel mode. These were not part of the original Windows NT design, as can be seen in Windows NT 3.5. However, due to performance issues of hardware of that age, it was decided to move the graphics subsystem into kernel mode. As such, system call in the range of 0x1000-0x1FFF are satisfied by win32k.sys (instead of ntoskrnl.exe as done for 0-0x0FFF), and are declared in user32.dll and gdi32.dll. These functions have the NtUser and NtGdi prefix (
|
https://en.wikipedia.org/wiki/Midnight%20Resistance
|
is a side-scrolling run and gun game produced by Data East and released in arcades in 1989. Midnight Resistance is set in a dystopian future where the player controls a member of a resistance movement who goes on a mission to rescue his kidnapped family from a drug kingpin.
It was ported to the Sega Mega Drive in 1991 as Data East's first video game for the console. The game was also adapted by Ocean Software to home computers.
Plot
In the arcade version, two nameless brothers are on a mission to rescue their family from an entity known as King Crimson.
In the Sega Genesis/Mega Drive version, the main character is Johnny Ford who is a member of an operative group who shuts down drug cartels in South America. After completing his last mission, Johnny returned home only to find it in shambles, and he sees a note in which King Crimson kidnapped his entire family. The reason for the abduction is that Johnny's father, Malcolm Ford, was developing a serum which could help people break their addictions to all narcotics. Since the government is unable to help Johnny, he sets off on his own to rescue his family and destroy King Crimson's empire of evil for good.
Gameplay
Midnight Resistance uses play mechanics and controls similar to that of the Contra series, and can be played by up to two players simultaneously (except Sega Mega Drive/Genesis). The main distinguishing feature is the inclusion of a rotatable joystick similar to the one used in Ikari Warriors, in addition to the traditional set of shoot and jump buttons, allowing the player to adjust his character's aim in one of eight directions by rotating the joystick clockwise or counter-clockwise. This allows the player to keep their aim in one direction while moving in another, even while crawling or jumping.
The power-up system is similar to the one featured in Heavy Barrel (a previous Data East game), in which the player collect keys after defeating certain enemy soldiers (each player can possess up to six keys at a time). At the end of each stage the player will enter a weapon storage room in which various new weapons and other power-ups can be released from their lockers depending on the number of keys in the player's possession. When the player loses a life, he will drop all the weapons and keys he has in his possession and they can only be recovered if they do not fall off-screen.
The two types of weapons that can be purchased in the weapon stores are special guns that will replace the player's default rifle (or whatever other special weapon he may be currently wielding) and backpack weapons that are launched by pushing the joystick up while pressing the shoot button. Both types of weapons have limited ammunition and when the player's special gun runs out of ammo, he will revert to the default rifle. Additional ammo for the player's current weapon can be purchased in stores as well when available. Other power-ups includes a "supercharge" upgrade that improves the firepower of the player
|
https://en.wikipedia.org/wiki/JC%20Whitney
|
JC Whitney is a retailer of aftermarket automotive parts and accessories. It was acquired by CarParts.com (formerly U.S. Auto Parts Network, Inc.), a publicly traded American online provider of aftermarket auto parts in 2010. In July 2020, JC Whitney was merged into CarParts.com.
History
JC Whitney began in 1915 as The Warshawsky Company, a scrap metal yard on the South Side of Chicago. The company's founder was Lithuanian immigrant Israel Warshawsky. Throughout World War I, Warshawsky bought failed auto manufacturers and added new parts to his inventory. The Warshawky Company continued to grow, even during the Great Depression. The company closed its Chicago location and opened a new location in LaSalle, Illinois, in 1997.
In 1934, Israel's son Roy joined his father at the company after graduating from the University of Chicago. Roy proposed expanding from the Chicago area with a nationwide catalog and placed an ad in Popular Mechanics for sixty dollars. The ad offered readers a "giant auto parts catalog" for 25¢. Response to the ad was huge.
Roy took charge after his father's death in 1943. He continued to grow the business through World War II, always developing new strategies in response to changing customer needs. Roy retired in 1991.
On June 26, 2002, The Riverside Company acquired JC Whitney. In 2007, The Riverside Company created Whitney Automotive Group, which owned other companies such as CarParts.com, StylinTrucks.com, and AllBikeSupershop.com. On August 17, 2010, JCWhitney (along with the rest of Whitney Automotive Group) was acquired by U.S. Auto Parts for $27.5 million.
In July 2020, JC Whitney was merged into CarParts.com. JC Whitney will also launch a new line of accessories for Jeep and truck owners on its new website.
LaSalle, Illinois, location
The LaSalle, Illinois, facility contains the expansive distribution center. The facility had been a public retail outlet center until August 2019; the area has been repurposed to expand the distribution center. This facility is also affiliated with Carparts.com.
As recently as May 2020, the company's customer service was handled in the Philippines. The LaSalle call center and the Independence, Ohio call centers have both been closed. Parent company CarParts.com has also closed its Carson, California distribution facility and added distribution centers in Chesapeake, Virginia (opened 2016), and Las Vegas, Nevada (opened in 2019).
External links
JC Whitney Online
References
Automotive part retailers of the United States
American companies established in 1915
Retail companies established in 1915
Motorcycling retailers
1915 establishments in Illinois
|
https://en.wikipedia.org/wiki/Experimental%20software%20engineering
|
Experimental software engineering involves running experiments on the processes and procedures involved in the creation of software systems, with the intent that the data be used as the basis of theories about the processes involved in software engineering (theory backed by data is a fundamental tenet of the scientific method). A number of research groups primarily use empirical and experimental techniques.
The term empirical software engineering emphasizes the use of empirical studies of all kinds to accumulate knowledge. Methods used include experiments, case studies, surveys, and using whatever data is available.
Empirical software engineering research
In a keynote at the International Symposium on Empirical Software Engineering and Measurement Prof. Wohlin recommended ten commitments that the research community should follow to increase the relevance and impact of empirical software engineering research. However, at the same conference Dr. Ali effectively argued that solely following these will not be enough and we need to do more than just show the evidence substantiating the claimed benefits of our interventions but instead what is required for practical relevance and potential impact is the evidence for cost-effectiveness.
The International Software Engineering Research Network (ISERN) is a global community of research groups who are active in experimental software engineering. Its purpose is to advance the practice of and foster university and industry collaborations within experimental software engineering. ISERN holds annual meetings in conjunction with the International Symposium on Empirical Software Engineering and Measurement (ESEM) conference.
References
Bibliography
Victor Basili, Richard W. Selby, David H. Hutchens, "Experimentation in Software Engineering", IEEE Transactions on Software Engineering, Vol. SE-12, No.7, July 1986
Basili, V.; Rombach, D.; Schneider, K.; Kitchenham, B.; Pfahl, D.; Selby, R. (Eds.),Empirical Software Engineering Issues. Critical Assessment and Future Directions, Springer-Verlag, 2007, .
Barry Boehm, Hans Dieter Rombach, and Marvin V. Zelkowitz (eds.), Foundations of Empirical Software Engineering — The Legacy of Victor R. Basili, Springer-Verlag, 2005, .
Jones, D. Evidence-based Software Engineering based on the publicly available data, 2020,
H. Dieter Rombach, Victor R. Basili and Richard W. Selby (eds.), [Experimental Software Engineering Issues: Critical Assessment and Future Directions], Springer-Verlag, 1993, .
Software engineering folklore
Software engineering
|
https://en.wikipedia.org/wiki/Additive%20increase/multiplicative%20decrease
|
The additive-increase/multiplicative-decrease (AIMD) algorithm is a feedback control algorithm best known for its use in TCP congestion control. AIMD combines linear growth of the congestion window when there is no congestion with an exponential reduction when congestion is detected. Multiple flows using AIMD congestion control will eventually converge to an equal usage of a shared link. The related schemes of multiplicative-increase/multiplicative-decrease (MIMD) and additive-increase/additive-decrease (AIAD) do not reach stability.
Algorithm
The approach taken is to increase the transmission rate (window size), probing for usable bandwidth, until loss occurs. The policy of additive increase may, for instance, increase the congestion window by a fixed amount every round-trip time. When congestion is detected, the transmitter decreases the transmission rate by a multiplicative factor; for example, cut the congestion window in half after loss. The result is a saw-tooth behavior that represents the process of bandwidth probing.
AIMD requires a binary congestion signal. Most frequently, packet loss serves as the signal; the multiplicative decrease is triggered when a timeout or an acknowledgement message indicates a packet lost. It is also possible for in-network switches/routers to mark congestion (without discarding packets) as in Explicit Congestion Notification (ECN).
Mathematical Formula
Let be the congestion window size indicating the amount of data in flight during time slot , () be the additive increase parameter, and () be the multiplicative decrease factor.
In TCP, after slow start, the additive increase parameter is typically one MSS (maximum segment size) per round-trip time, and the multiplicative decrease factor is typically 1/2.
Protocols
AIMD congestion avoidance is or was used in:
Transmission Control Protocol (TCP)
Scalable TCP (STCP)
OSI Transport Class 4
DCCP (in some modes)
DECnet
In nature
AIMD has been found to be utilized by diverse biological systems, including for regulating foraging of harvester ant colonies, maintaining cell-size homeostasis, and for synaptic learning and adaptation in neural circuits.
References
Flow control (data)
|
https://en.wikipedia.org/wiki/Opportunity%20International
|
Opportunity International is a 501(c)(3) nonprofit organization chartered in the United States. Through a network of 47 program and support partners, Opportunity International provides small business loans, savings, insurance and training to more than 14 million people in the developing world. It has clients in more than 20 countries and works with fundraising partners in the United States, Australia, Canada, Germany, Switzerland, Singapore, Hong Kong and the United Kingdom. Opportunity International has 501(c)(3) status as a tax-exempt charitable organization in the United States under the US Internal Revenue Code (Employer Identification Number: 54-0907624).
History
In 1971, Al Whittaker left his job as president of Bristol Myers International Corporation in America to found the Institute for International Development Incorporated (IIDI), a micro-enterprise organization. Barry Harper, IIDI's first Executive Director, and development officer Dan Swanson together oversaw establishment of IDII offices in Colombia, Peru, Honduras, Kenya, the Dominican Republic and Indonesia.
Australian philanthropist David Bussau founded Maranatha Trust and began administering loans in Indonesia in 1977. In 1979, he joined IDII as the director of the Indonesia office and began expanding IDII's work in Asia.
In 1988, the two merged their efforts under the name Opportunity International.
In 1991, a group of women supporting Opportunity International called the Women's Opportunity Network created a group-lending methodology called the Trust Group in which groups would be responsible for their peers and hold them accountable for repayment. Opportunity began testing this group lending and Trust Group method in the Philippines in 1992, and in the same year, they began to focus on serving entrepreneurs at even more extreme levels of poverty.
Realizing that no one group can tackle the issues of poverty alone, Opportunity began developing partners - independent, self-governing organizations with similar motivations - in countries and regions around the world. In 1998, Opportunity formalized these partnerships into the Opportunity International Network - a group of partners that now includes 47 entities in over 20 countries.
In 2000, Opportunity began building a series of permanent and mobile banks to reach more remote areas of countries and attempt to serve those that had previously lacked access to financial services. These formal financial institutions (FFIs) took the form of commercial banks, development banks or credit unions that could accept deposits, borrow money and/or accept investments.
In 2002, Opportunity International developed and founded MicroEnsure, a microinsurance entity providing weather-indexed crop insurance, affordable health insurance, and protection against other risks. MicroEnsure was the world's first microinsurance intermediary and received a generous grant from the Bill & Melinda Gates Foundation in 2008. MicroEnsure spun off from Opportun
|
https://en.wikipedia.org/wiki/Entrance%20facility
|
In telecommunications, Entrance facility refers to the entrance to a building for both public and private network service cables (including antenna transmission lines, where applicable), including the entrance point at the building wall or floor, and continuing to the entrance room or entrance space.
Entrance facilities are the transmission facilities (typically wires or cables) that connect competitive LECs’ networks with incumbent LECs’ networks.
Computer networking
|
https://en.wikipedia.org/wiki/Special%20Interest%20Group%20on%20Design%20Automation
|
SIGDA, Association for Computing Machinery's Special Interest Group on Design Automation, is a professional development organization for the Electronic Design Automation (EDA) community. SIGDA is organized and operated exclusively for educational, scientific, and technical purposes in electronic design automation. SIGDA's bylaws were approved in 1969, following the charter of SIC (Special Interest Committee) in Design Automation in 1965.
The mission of SIGDA and its activities includes collecting and disseminating information in design automation through a newsletter and other publications; organizing sessions at conferences sponsored by ACM; sponsoring conferences, symposia, and workshops; organizing projects and working groups for education, research, and development; serving as a source of technical information for the Council and subunits of the ACM; and representing the opinions and expertise of the membership on matters of technical interest to SIGDA or ACM.
SIGDA sponsors or co-sponsors several conferences and symposia, while supporting numerous professional development programs addressing the needs of EDA students, researchers, and engineers. SIGDA was a pioneer in electronic publishing of conference and symposia proceedings, long before the wide availability of digital libraries made available by major professional organizations. SIGDA volunteers also pioneered several educational initiatives that have enabled the participance of many students and researchers to major events in EDA and Computer Aided Design (CAD).
SIGDA Chairs
Yiran Chen, Duke University (2021–present)
Xiaobo Sharon Hu, University of Notre Dame (2018–2021)
Vijaykrishnan Narayanan, The Pennsylvania State University (2015–2018)
Naehyuck Chang, KAIST (2012–2015)
Patrick Madden, SUNY (2009–2012)
Diana Marculescu, University of Texas at Austin (2006–2009)
References
External links
SIGDA webpage
SIGDA professional development programmes
SIGDA publications of proceedings
SIGDA newsletter
SIGDA events
Organizations established in 1965
Association for Computing Machinery Special Interest Groups
|
https://en.wikipedia.org/wiki/Zork%20Anthology
|
The Zork Anthology is a video game compilation published in 1994 by Activision for the PC. A version compatible with modern computers was published in 2011 by digital distribution platform GOG.
Contents
The Zork Anthology contains the following games:
Reception Next Generation reviewed the compilation, rating it three stars out of five, and stated that "Zork Anthology'' is an enchantingly nostalgic as well as a welcome return to the past".
References
1994 video games
Activision video game compilations
Classic Mac OS games
DOS games
Video games developed in the United States
Windows games
Zork
|
https://en.wikipedia.org/wiki/List%20of%20Case%20Closed%20episodes%20%28seasons%201%E2%80%9315%29
|
Although Cartoon Network stopped ordering episodes, Funimation continued to dub the series direct-to-DVD and episodes 1–4 and 53–83 were released on eleven DVD volumes released between August 24, 2004 and July 26, 2005. Funimation then redesigned its DVD volumes and episodes 1–52 were released in eight DVD volumes between February 21, 2006 and May 29, 2007. The series was later released in five seasonal DVD boxes between July 22, 2008 and May 12, 2009 containing 130 episodes in total. The seasonal boxes were then re-released as a part of Funimation's Viridian Edition line between July 14, 2009 and March 23, 2010. Then they were re-released as part of Funimation's Super Amazing Value Edition (S.A.V.E.) line on July 23, 2013.
Seasons overview
These "seasons" are based on the Japanese DVDs released by Shogakukan starting on October 25, 2000. (see Home media release section) In Japan, Case Closed runs continuously on TV with very few weeks off.
Episode list
Season 1: 1996
Season 2: 1996–1997
Season 3: 1997
Season 4: 1997–1998
Season 5: 1998–1999
Season 6: 1999
Season 7: 1999–2000
Season 8: 2000–2001
Season 9: 2001
Season 10: 2001–2002
Season 11: 2002–2003
Season 12: 2003–2004
Season 13: 2004–2005
Season 14: 2005–2006
Season 15: 2006–2007
Home media release
Region 2
The Region 2 DVD compilations of the Detective Conan anime are released by Shogakukan and grouped by parts.
Region 1
The Region 1 DVD compilations of the Case Closed anime are released by Funimation Entertainment. Although Cartoon Network stopped ordering episodes, Funimation continued to dub the series direct-to-DVD and episodes 1–4 and 53–83 were released eleven DVD volumes released between August 24, 2004 and July 26, 2005. Funimation then redesigned its DVD volumes and episodes 1–52 were released in eight DVD volumes between February 21, 2006 and May 29, 2007. The series was later released in five seasonal DVD boxes between July 22, 2008 and May 12, 2009 containing 130 episodes in total. The seasonal boxes were then re-released as a part of Funimation's Viridian Edition line between July 14, 2009 and March 23, 2010.
Notes
The episode's numbering as followed in Japan
The episode's numbering as followed by Funimation Entertainment
The episodes were aired as a single hour long episode in Japan
The episodes were aired as a single two-hour long episode in Japan
The episodes were aired as a single two-hour and thirty minutes long episode in Japan
These episodes are part of the second season of Case Closed
These episodes are part of the third season of Case Closed
These episodes are part of the fourth season of Case Closed
These episodes are part of the fifth season of Case Closed
References
General
Specific
External links
Lists of television episodes
|
https://en.wikipedia.org/wiki/Tajikistan%20Support%20Project
|
The Tajikistan Support Project (TSP) Foundation (TSP), founded in 1999, is a small Dutch foundation that aims to support health care organisations in Tajikistan with knowledge and network building, small transportations of goods and financial support.
External links
Official website
Healthcare in Tajikistan
Health charities in the Netherlands
Development charities based in the Netherlands
Foreign charities operating in Tajikistan
|
https://en.wikipedia.org/wiki/Session%20poisoning
|
Session poisoning (also referred to as "session data pollution" and "session modification") is a method to exploit insufficient input validation within a server application. Typically a server application that is vulnerable to this type of exploit will copy user input into session variables.
The underlying vulnerability is a state management problem: shared state, race condition, ambiguity in use or plain unprotected modifications of state values.
Session poisoning has been demonstrated in server environments where different, non-malicious applications (scripts) share the same session states but where usage differ, causing ambiguity and race conditions.
Session poisoning has been demonstrated in scenarios where attacker is able to introduce malicious scripts into the server environment, which is possible if attacker and victim share a web host.
Origins
Session poisoning was first discussed as a (potentially new) vulnerability class in the Full disclosure mailing list. Alla Bezroutchko inquired if "Session data pollution vulnerabilities in web applications" was a new problem in January 2006. However, this was an old vulnerability previously noted by others: "this is a classic state management issue" - Yvan Boily; "This is not new" - /someone.
Earlier examples of these vulnerabilities can be found in major security resources/archives such as Bugtraq, e.g.
July 2001, Serious security hole in Mambo Site Server version 3.0.X by Ismael Peinado Palomo of reverseonline.com
September 2005, PHP Session modification by unknown (from uw-team) and adam_i
Session pollution has also been covered in some articles, such as PHP Session Security, Przemek Sobstel, 2007.
Attack examples
Trivial attack scenario
An example code vulnerable to this problem is:
Session("Login") = Request("login")
Session("Username") = Request("username")
Which is subject to trivial attacks such as
vulnerable.asp?login=YES&username=Mary
This problem could exist in software where
User submits username / password to logon.asp
If password for Mary checks out, logon.asp forwards to vulnerable.asp?login=YES&username=Mary
The problem is that vulnerable.asp is designed on the assumption that the page is only accessed in a non-malicious way. Anyone who realizes how the script is designed, is able to craft an HTTP request which sets the logon user arbitrarily.
Exploiting ambiguous or dual use of same session variable
Alla Bezroutchko discusses a scenario where $_SESSION['login'] is used for two different purposes.
In the login scripts, the session variable stores "This user is logged on".
In the password reset scripts, the session variable stores "this user wants his password reset".
A race condition was demonstrated, in which the reset scripts could be exploited to change the logged on user arbitrarily.
Exploiting scripts allowing writes to arbitrary session variables
Alla Bezroutchko discusses examples observed in development forums, which allows writing to arbitrary session vari
|
https://en.wikipedia.org/wiki/Anonym.OS
|
Anonym.OS was a Live CD operating system based on OpenBSD 3.8 with strong encryption and anonymization tools. The goal of the project was to provide secure, anonymous web browsing access to everyday users. The operating system was OpenBSD 3.8, although many packages have been added to facilitate its goal. It used Fluxbox as its window manager.
The project was discontinued after the release of Beta 4 (2006).
Distributed
Designed, created and distributed by kaos.theory/security.research.
Legacy
Although this specific project is no longer updated, its successors are Incognito OS (discontinued in 2008) and FreeSBIE.
See also
Comparison of BSD operating systems
Security-focused operating system
References
External links
Anonym.OS's SourceForge website
Anonym.OS at DistroWatch
OpenBSD
Operating system distributions bootable from read-only media
Privacy software
Tor (anonymity network)
|
https://en.wikipedia.org/wiki/National%20Grid
|
National Grid or National grid may refer to:
Power transmission
Electrical grid, an interconnected network for delivering electricity
National Grid (Great Britain), the electricity transmission network of Great Britain
National Grid plc, a utilities company based in the UK that also operates in the northeastern United States
National Grid (India), the electricity transmission network of India
National Grid (Malaysia), the electricity transmission network of Malaysia
National Grid (New Zealand), the electricity transmission network of New Zealand
Geosurvey
National grid reference system, a national geographical coordinate system for mapping
Ordnance Survey National Grid, used in Great Britain
Irish national grid reference system
United States National Grid
Other uses
National Grid for Learning, a former government funded educational program in the UK
See also
Power Grid Corporation of India
State Grid Corporation of China
|
https://en.wikipedia.org/wiki/Ontario%20%28computer%20virus%29
|
Ontario is a family of computer viruses, named after its point of isolation, the Canadian province of Ontario. This family of computer virus consists of Ontario.1024, Ontario.512 and Ontario.2048. The first variant Ontario.512 was discovered in July 1990. Because Ontario.1024 was also discovered in Ontario, it is likely that both viruses originate from within the province. By the Ontario.2048 variant, the author had adopted "Ontario" as the family's name and even included the name "Ontario-3" in the virus code.
Ontario.512
Infection
Ontario.512 is an encrypting DOS file infector. Upon the execution of an infected .COM, .EXE or .OVL file, Ontario.512 goes memory resident and infects files of these times upon being opened. COMMAND.COM is infected using a special routine. Infected files will increase either 512 bytes (COM files) or between 512 and 1,023 bytes (EXE and OVL files). Some systems with larger file sectors may display increases of greater than 1,023 bytes for infected files of these types.
Symptoms
Ontario.512 primarily only infects files, so there is no one significant symptom. The two main symptoms are:
An increase in size of infected COM files of 512 bytes.
An increase in size of infected EXE and OVL files of between 512 and 1,023 bytes, and even greater on some systems.
Systems thoroughly infected by Ontario.512 may suffer from increasing file corruption and other hard drive problems over time.
Unspecified printer problems have been observed with the Ontario family, although most of these observations have related to Ontario.1024, not Ontario.512. It is unknown what specific problems these are, and if they affect Ontario.512.
The increase in COM file size in conjunction with EXE and OVL file increases is a very good guideline when determining Ontario.512 infection, although file length changes are common among virtually every file infector.
Prevalence
The WildList , an organisation tracking computer viruses, never reported Ontario.512 as being in the field. However, Ontario.1024 was included on the list for a period of time. It is unclear whether Ontario.512 was discovered in the field, or off a BBS out of Toronto, where Ontario.2048 was posted.
Ontario.1024
Ontario.1024 is a computer virus, discovered in October 1991, over a year after the isolation of the first Ontario virus, Ontario.512. Relative to Ontario.512, most additions involve making the virus harder to detect.
Infection
Ontario.1024 is an encrypting, stealth DOS file infector. Upon the execution of an infected .COM or .EXE file, Ontario.1024 goes memory resident and infects files of these types upon being opened. COMMAND.COM is infected using a special routine. Infected files will increase in size by 1,024 bytes. However, when Ontario.1024 is in memory, no increase in file size will be observed due to the virus' stealthing. Unlike Ontario.512, it will not infect .OVL files.
Symptoms
Ontario.1024 is the least readily identified version of the Ontari
|
https://en.wikipedia.org/wiki/Peter%20Hendy
|
Peter Gerard Hendy, Baron Hendy of Richmond Hill, (born 19 March 1953), is a British transport executive and politician. He is the current chairman of Network Rail and was formerly the Commissioner of Transport for London.
Education
Hendy was educated at Latymer Upper School and the University of Leeds, where he graduated in Economics and Geography in 1975.
Career
London Transport
Hendy started his career in the public transport industry in 1975 as a London Transport graduate trainee. He moved up the career ladder, eventually taking on the role of managing director of CentreWest London Buses Ltd in 1989, managing it under London Transport ownership.
First Bus
In 1994, he led CentreWest through a management buyout with staff involvement, and subsequent expansion. After the takeover of CentreWest by FirstGroup in 1997, Hendy became Deputy Director UK Bus for FirstGroup, responsible for bus operations in London and southern England, bus development, and the operation of Croydon Tramlink. He also became a director of New World First Bus in Hong Kong.
Transport for London
In 2001, he was appointed to the position of managing director of Surface Transport for Transport for London (TfL), under Ken Livingstone's mayoralty of London. During this period, bus ridership in London grew substantially. On 1 February 2006, he took up the position of Commissioner of Transport for London. He continued in post after the election of Boris Johnson as Mayor of London in 2008.
During the London 2012 Summer Olympic and Paralympic Games, Hendy chaired the 2012 Games Transport Board, which worked with LOCOG, transport operators, local authorities and others to ensure transportation of athletes, officials, staff, media and spectators across London. He was subsequently knighted for his work at the Games.
In July 2015, Hendy left the position of Commissioner, replaced on an interim basis by Mike Brown (the Managing Director of London Underground and London Rail).
Network Rail
In July 2015 he was appointed chair of Network Rail by the then Secretary of State for Transport, Patrick McLoughlin. In June 2023, he was reappointed to the role to serve for a further two years.
Other appointments
Between 2013 and 2015, Hendy was the chairman of International Association of Public Transport.
In July 2017 he was appointed chair of the London Legacy Development Corporation, by the Mayor of London Sadiq Khan, which is developing the Queen Elizabeth Olympic Park.
In July 2019 he was appointed by the then Prime Minister Theresa May as a trustee of the Science Museum Group which incorporates the National Railway Museum in York. Hendy is also an independent trustee of the London Transport Museum. In March 2023, Hendy was appointed chairman of the Heritage Railway Association.
In June 2020, he was appointed chair of the Union Connectivity Review. The terms of reference were published 3 October 2020. It was published November 2021.
Honours
Hendy was appointed Commander of the
|
https://en.wikipedia.org/wiki/Costar
|
Costar may refer to:
COmputer STored Ambulatory Record (COSTAR)
Corrective Optics Space Telescope Axial Replacement (COSTAR)
CoStar Group provider of commercial real estate information, marketing and analytic services
Co–Star, a social network based on astrology
|
https://en.wikipedia.org/wiki/Opto%2022
|
Opto 22 is a manufacturing company specializing in hardware and software products for industrial automation, remote monitoring, and data acquisition. The company is based in Southern California and sells solid state relays and Ethernet-based input/output systems and controllers. It is based in Temecula, California.
History
Opto 22 was founded in 1974 as a manufacturer of solid state relays. The company soon expanded its offerings to include a variety of computer-based industrial automation, remote monitoring, and data acquisition products. In 1978, Opto 22 developed the first computer-based plug-in I/O modules, and created the Yellow-Black-White-Red color scheme used to identify digital AC input, digital AC output, digital DC input, and digital DC output modules respectively.
In 1982, the company created Optomux, a serial-based I/O system using the ASCII protocol. The following year, with the introduction of the personal computer prompting a shift in the automation industry to PC-based control, Opto 22 developed what was to be the first in a series of software packages for designing control strategies on a PC using flowcharts. This provided a new alternative to the more popular ladder logic programming model. Later, Opto 22 introduced the mistic controller, which had many of the same features and functionality of a modern programmable logic controller.
Opto 22 markets the SNAP brand of Ethernet products, including industrial processors, controllers, I/O racks and modules, software and accessories. In 2007 the company introduced the SNAP PAC System, adding higher powered controllers with redundant Ethernet communications, new programming and human machine interface development software, higher density I/O modules, database connectivity tools and software that simulated the SNAP PAC controller hardware. The result was a suite of control system components, suitable for simple cell control or complex, distributed control architectures.
References
External links
Company website
Automation organizations
Temecula, California
|
https://en.wikipedia.org/wiki/Confluence%20%28abstract%20rewriting%29
|
In computer science, confluence is a property of rewriting systems, describing which terms in such a system can be rewritten in more than one way, to yield the same result. This article describes the properties in the most abstract setting of an abstract rewriting system.
Motivating examples
The usual rules of elementary arithmetic form an abstract rewriting system.
For example, the expression (11 + 9) × (2 + 4) can be evaluated starting either at the left or at the right parentheses;
however, in both cases the same result is eventually obtained.
If every arithmetic expression evaluates to the same result regardless of reduction strategy, the arithmetic rewriting system is said to be ground-confluent. Arithmetic rewriting systems may be confluent or only ground-confluent depending on details of the rewriting system.
A second, more abstract example is obtained from the following proof of each group element equalling the inverse of its inverse:
This proof starts from the given group axioms A1–A3, and establishes five propositions R4, R6, R10, R11, and R12, each of them using some earlier ones, and R12 being the main theorem. Some of the proofs require non-obvious, or even creative, steps, like applying axiom A2 in reverse, thereby rewriting "1" to "a−1 ⋅ a" in the first step of R6's proof. One of the historical motivations to develop the theory of term rewriting was to avoid the need for such steps, which are difficult to find by an inexperienced human, let alone by a computer program .
If a term rewriting system is confluent and terminating, a straightforward method exists to prove equality between two expressions (also known as terms) s and t:
Starting with s, apply equalities from left to right as long as possible, eventually obtaining a term s′.
Obtain from t a term t′ in a similar way.
If both terms s′ and t′ literally agree, then s and t are proven equal.
More importantly, if they disagree, then s and t cannot be equal.
That is, any two terms s and t that can be proven equal at all can be done so by that method.
The success of that method does not depend on a certain sophisticated order in which to apply rewrite rules, as confluence ensures that any sequence of rule applications will eventually lead to the same result (while the termination property ensures that any sequence will eventually reach an end at all). Therefore, if a confluent and terminating term rewriting system can be provided for some equational theory,
not a tinge of creativity is required to perform proofs of term equality; that task hence becomes amenable to computer programs. Modern approaches handle more general abstract rewriting systems rather than term rewriting systems; the latter are a special case of the former.
General case and theory
A rewriting system can be expressed as a directed graph in which nodes represent expressions and edges represent rewrites. So, for example, if the expression a can be rewritten into b, then we say that b is a reduct
|
https://en.wikipedia.org/wiki/Tagged%20pointer
|
In computer science, a tagged pointer is a pointer (concretely a memory address) with additional data associated with it, such as an indirection bit or reference count. This additional data is often "folded" into the pointer, meaning stored inline in the data representing the address, taking advantage of certain properties of memory addressing. The name comes from "tagged architecture" systems, which reserved bits at the hardware level to indicate the significance of each word; the additional data is called a "tag" or "tags", though strictly speaking "tag" refers to data specifying a type, not other data; however, the usage "tagged pointer" is ubiquitous.
Folding tags into the pointer
There are various techniques for folding tags into a pointer.
Most architectures are byte-addressable (the smallest addressable unit is a byte), but certain types of data will often be aligned to the size of the data, often a word or multiple thereof. This discrepancy leaves a few of the least significant bits of the pointer unused, which can be used for tags – most often as a bit field (each bit a separate tag) – as long as code that uses the pointer masks out these bits before accessing memory. E.g., on a 32-bit architecture (for both addresses and word size), a word is 32 bits = 4 bytes, so word-aligned addresses are always a multiple of 4, hence end in 00, leaving the last 2 bits available; while on a 64-bit architecture, a word is 64 bits = 8 bytes, so word-aligned addresses end in 000, leaving the last 3 bits available. In cases where data is aligned at a multiple of word size, further bits are available. In case of word-addressable architectures, word-aligned data does not leave any bits available, as there is no discrepancy between alignment and addressing, but data aligned at a multiple of word size does.
Conversely, in some operating systems, virtual addresses are narrower than the overall architecture width, which leaves the most significant bits available for tags; this can be combined with the previous technique in case of aligned addresses. This is particularly the case on 64-bit architectures, as 64 bits of address space are far above the data requirements of all but the largest applications, and thus many practical 64-bit processors have narrower addresses. Note that the virtual address width may be narrower than the physical address width, which in turn may be narrower than the architecture width; for tagging of pointers in user space, the virtual address space provided by the operating system (in turn provided by the memory management unit) is the relevant width. In fact, some processors specifically forbid use of such tagged pointers at the processor level, notably x86-64, which requires the use of canonical form addresses by the operating system, with most significant bits all 0s or all 1s.
Lastly, the virtual memory system in most modern operating systems reserves a block of logical memory around address 0 as unusable. This means that, for e
|
https://en.wikipedia.org/wiki/Portability
|
Portability may refer to:
Portability (social security), the portability of social security benefits
Porting, the ability of a computer program to be ported from one system to another in computer science
Software portability, the portability of a piece of software to multiple platforms
Telephone number portability (disambiguation) keeping one telephone number while switching one's account to another telephony provider
Portlet, user interface software components that are managed and displayed in a web portal
Portability of the estate tax exclusion amount regarding Estate tax in the United States
See also
Portable (disambiguation)
|
https://en.wikipedia.org/wiki/Esmas.com
|
esmas.com was the portal of Televisa, the largest Mexican television network and the world's largest producer of Spanish language media.
The website was registered under Comercio Mas and was launched by Grupo Televisa in 2000. Previously, the official website of Televisa was televisa.com. As of 2022, the website redirects to Televisa's news website, Noticieros Televisa.
Website description
This website hosted the official webpages of all of the programs it produced and the site was included at the end of the credits of every show. The content of esmas.com was entirely in Spanish. The domain name esmas.com was also used for the e-mail addresses for the television shows and their staff members.
Services
The sites offer a shopping, dating, classifieds, fanclubs sites as well as horoscopes, chatrooms, chats with celebrities, e-mail, bulletin boards, promotions, video galleries, photo galleries and polls.
In 2004, Esmas launched Esmas Móvil a service through which mobile phone users can receive information about entertainment 24 hours a day. Users can also download wallpapers for their phones. In 2005, the service was expanded to the United States, Ecuador and Chile.
Sections
Deportes – Sports powered by Televisa Deportes
Futbol – Football (soccer)
Espectáculos – Showbusiness
Noticieros – News powered by Noticieros Televisa
Niños – Children
Mujer – Women
Salud – Health
Telenovelas – Telenovelas
See also
univision.com of Univisión in the United States
terra.com of Terra Networks in Spain
External links
esmas.com
Netvibes
DejavuChat.com
Web portals
Televisa
Spanish-language websites
Mexican entertainment websites
Internet properties established in 2000
2000 establishments in Mexico
es:Esmas
pt:Televisa#Esmas
|
https://en.wikipedia.org/wiki/THINK%20C
|
Think C (stylized as THINK C; formerly Lightspeed C) is an extension of the C programming language for the classic Mac OS developed by Think Technologies, released first in mid-1986. THINK was founded by Andrew Singer, Frank Sinton & Mel Conway. The firm was later acquired by Symantec Corporation and the product continued to be developed by the original author, Michael Kahl. Versions 3 and later were essentially a subset of C++ and supported basic object-oriented programming (OOP) concepts such as single inheritance, and extensions to the C standard that conformed more closely to the needs of Mac OS programming. After version 6, the OOP facilities were expanded to a full C++ implementation, and the product was rebranded Symantec C++ starting version 7, then under development by different authors. Version 8 brought support for compiling to PowerPC.
Think C, and later Symantec C++, featured a class library and framework for Mac programming called the Think Class Library (TCL), which was used extensively for Macintosh application development.
The Lightspeed and Think C integrated development environment (IDE) influenced other such environments, though considered not as advanced as that belonging to Think Pascal, its sister language product. It was considered the standard environment when Macintosh Programmer's Workshop (MPW) was considered an overpriced niche product, and most Macintosh products were developed in it for many years. This changed with transition of the Mac from the Motorola 68000 (68K) to the PowerPC central processing unit (CPU). Symantec was roughly a year late in delivering a version for PowerPC, and was widely seen as having fallen behind, and competitor Metrowerks' product CodeWarrior took control of the market.
Despite the decline in popularity of their IDE, Symantec was eventually chosen by Apple to provide next-generation C/C++ compilers for MPW in the form of Sc/Scpp for 68K alongside MrC/MrCpp for PowerPC. These remained Apple's standard compilers until the arrival of Mac OS X replaced them with the GNU Compiler Collection (GCC). Symantec subsequently exited the developer tool business.
THINK Reference
THINK Reference was a proprietary documentation database and browser developed by Symantec for programmers on the classic Mac OS platform. It was included with the THINK C development environment sold by Symantec, and previously included with THINK Pascal. It contained a hypertext version of Apple Computer's Macintosh Toolbox API specifications, along with illustrative code samples.
THINK Reference was discontinued in 1994.
Reception
Bruce F. Webster of BYTE named Lightspeed C product of the month for September 1986. While criticizing the documentation as its "single greatest weakness", Webster stated that Lightspeed C would be the choice if he had to select one compiler for the Macintosh. BYTE in 1989 listed Lightspeed C as among the "Distinction" winners of the Byte Awards, stating that it "wins our respect because of
|
https://en.wikipedia.org/wiki/Buletin%20Siang
|
Buletin Siang (lit. Daytime Bulletin) was the first daytime newscast ever produced by an Indonesian private television network. It was launched on 25 August 1993 on the privately owned RCTI television network in Indonesia. The program was also carried by RCTI's then sister network, SCTV.
On 9 February 2009, all news programs on RCTI were renamed under the revamped Seputar Indonesia brand, now called Satu Seputar Indonesia (One Around Indonesia), at which point Buletin Siang was renamed Seputar Indonesia Siang.
Logos
The Buletin Siang logo was originally a purple square containing the words BULETIN SIANG and an orange circle with a narrow triangle. This logo was used from 24 August 1993 until 31 July 1999.
From 1 August 1999 until 31 July 2003 the Buletin Siang logo was a blue and white circle surrounding a narrow blue triangle.
From 1 August 2003 until 31 July 2006 the Buletin Siang logo used 3D graphics.
On 1 August 2006, the logo was changed to that of Seputar Indonesia, which was used until 9 February 2009.
Segments
Buletin Wanita (1993–2006)
Wajah (1993–2006)
Anchors
Gustav Aulia
Dentamira Kusuma
Chrysanti Suwarso
Fauziah Dasuki
Ratna Komala
Atika Suri
Desi Anwar
Dana Iswara
Zsa Zsa Yusharyahya
Aiman Witjaksono
Putra Nababan
Isyana Bagoes Oka
See also
Nuansa Pagi
Buletin Malam
Indonesian television news shows
1993 Indonesian television series debuts
1990s Indonesian television series
2000s Indonesian television series
2009 Indonesian television series endings
RCTI original programming
SCTV (TV network) original programming
|
https://en.wikipedia.org/wiki/A%20Taste%20of%20Freedom
|
"A Taste of Freedom" is the fifth episode in the fourth season of the American animated television series Futurama, and the 59th episode of the series overall. It first aired on the Fox network in the United States on December 22, 2002. The episode was directed by James Purdum and written by Eric Horsted. The plot centers on Zoidberg's experience with the concept of freedom on Earth.
Plot
The crew celebrates Freedom Day, a day where one can do anything they want, regardless of the consequences. Dr. Zoidberg seems passionate about the holiday, as he loves the idea of freedom, something he did not have on his home planet Decapod 10. At the big Freedom Day celebration in Washington, D.C., Earth President Richard Nixon's head unveils the Earth flag, the "Old Freebie", to celebrate the spirit of the holiday but the flag is eaten by Zoidberg. Zoidberg feels this is an expression of his freedom on Freedom Day; however, the rest of the crowd sees him as a traitor. Zoidberg is chased around town and takes cover in his planet's embassy.
Zoidberg is put on trial and the crew hires lawyer Old Man Waterfall to represent him. Zoidberg is found guilty and sentenced to death when he refuses to apologize publicly. After Earth's army storms the Decapodian embassy to seize Zoidberg, the Decapodian ambassador to Earth summons the Decapodian military to retaliate. The Decapodian army easily defeats Earth's defense forces and Earth is enslaved by the crustacean extraterrestrials.
Later, Fry, Leela, Bender, Zapp Brannigan, and Kif, deciding the time has come to fight back, steal a heat-seeking missile from a museum exhibit and launch it toward the Decopodians’ newly constructed Mobile Oppression Palace. However, the palace is "cold-blooded", like the Decapodians themselves, and the palace continues its destructive rampage. It eventually crushes Old Man Waterfall for standing in its way, whom Zoidberg respected for defending him when no one else would. Zoidberg then lights a flag on fire. This shocks and angers the other citizens, but Zoidberg explains that he does so in order to preserve the freedom that the flag represents and throws it toward the Mobile Oppression Palace, attracting the missile and thus destroying the palace. Zoidberg is declared a hero and is honored by Nixon at a ceremony, where he unveils a new Earth flag, out of which Zoidberg is allowed to take a bite. Zoidberg concludes that Earth, not Decapod 10, is now his true home planet.
Reception
The A.V. Clubs Zack Handlen gave the episode a B+, saying: "There’s a fundamental shallowness to “A Taste Of Freedom” which is at once useful for the comedy (because delving into the issues never distracts from the jokes), and disappointing in the story. The episode takes the most predictable stance on its premise—eating the flag is not something you should be arrested for—and then doesn’t offer much variation outside of a series of escalating incidents. That makes for a diverting half hour that occasionall
|
https://en.wikipedia.org/wiki/Samantha%20Armytage
|
Samantha Armytage (born 4 September 1976) is an Australian journalist and television presenter.
Armytage was previously co-host of the Seven Network's breakfast television program Sunrise from 2013 to 2021 alongside David Koch. She also previously co-hosted Weekend Sunrise and presented Seven's 4.30 News.
Early life
Armytage was born to Mac and Elizabeth Armytage. She grew up on Bolaro Station, a sheep property near Adaminaby in New South Wales, where her father was the station manager. Armytage is a direct descendant of George Armytage, a pioneer British settler in Australia who was involved in an attack on local Aboriginal people. She has a younger brother, Charlie.
She attended boarding school at Kincoppal-Rose Bay in Sydney starting from Year Nine and then studied at Charles Sturt University.
Career
Armytage began her media career at WIN Television in Canberra in 1999, as a news reporter and presenter in Canberra. Following this she joined Sky News Australia in 2002 where she was chief political reporter.
Seven Network
In 2003, Armytage joined the Seven Network after being noticed by the network executives while covering the 2003 Canberra Bushfires.
In December 2004, Armytage landed her first major presenting role, filling-in as presenter on Seven News Sydney over the Summer non-ratings period. Following the non-ratings period she had stints presenting Seven Morning News, the national late news updates, and filling in as presenter of Seven News Sydney. Throughout 2005 and 2006, Armytage was a regular fill-in presenter for Chris Bath on Seven News Sydney.
In October 2006, Armytage replaced Mike Amor as presenter of Seven 4.30 News. She had replaced Rebecca Maddern as presenter when the network moved production from Melbourne to Sydney.
In 2011, Armytage was a contestant on Dancing With The Stars and continued to file reports for Sunday Night, while also being a regular fill-in presenter on Sunrise, Today Tonight and The Morning Show.
In 2014, Armytage presented the makeover reality show Bringing Sexy Back, which was cancelled after one season due to low ratings.
In October 2021, the Seven Network announced that Armytage will take part in Seven's race day coverage and appear as a special guest on the reality show The Farmer Wants a Wife when it returns in 2022.
In February 2023, the Seven Network announced that Armytage will host the new season of The Farmer Wants a Wife.
Sunrise and Weekend Sunrise
In June 2007, Armytage was appointed co-host of Weekend Sunrise alongside Andrew O'Keefe, replacing Lisa Wilkinson who moved to Today on the Nine Network.
In June 2013, Armytage was announced as the replacement for Sunrise co-host Melissa Doyle; she began her position that September.
On 8 March 2021, Armytage announced her resignation from Sunrise, to spend more time with her family. Her final show was on 11 March 2021.
Other
In 2017, Armytage joined News Corp Australia lifestyle magazine Stellar as a columnist.
In collaboration
|
https://en.wikipedia.org/wiki/CDC%201604
|
The CDC 1604 was a 48-bit computer designed and manufactured by Seymour Cray and his team at the Control Data Corporation (CDC). The 1604 is known as one of the first commercially successful transistorized computers. (The IBM 7090 was delivered earlier, in November 1959.) Legend has it that the 1604 designation was chosen by adding CDC's first street address (501 Park Avenue) to Cray's former project, the ERA-UNIVAC 1103.
A cut-down 24-bit version, designated the CDC 924, was shortly thereafter produced, and delivered to NASA.
The first 1604 was delivered to the U.S. Navy Post Graduate School in January 1960 for JOVIAL applications supporting major Fleet Operations Control Centers primarily for weather prediction in Hawaii, London, and Norfolk, Virginia. By 1964, over 50 systems were built. The CDC 3600, which added five op codes, succeeded the 1604, and "was largely compatible" with it.
One of the 1604s was shipped to the Pentagon to DASA (Defense Atomic Support Agency) and used during the Cuban missile crises to predict possible strikes by the Soviet Union against the United States.
A 12-bit minicomputer, called the CDC 160, was often used as an I/O processor in 1604 systems. A stand-alone version of the 160 called the CDC 160-A was arguably the first minicomputer.
Architecture
Memory in the CDC 1604 consisted of 32K 48-bit words of magnetic core memory with a cycle time of 6.4 microseconds. It was organized as two banks of 16K words each, with odd addresses in one bank and even addresses in the other. The two banks were phased 3.2 microseconds apart, so average effective memory access time was 4.8 microseconds. The computer executed about 100,000 operations per second.
Each 48-bit word contained two 24-bit instructions. The instruction format was 6-3-15: six bits for the operation code, three bits for a "designator" (index register for memory access instructions, condition for jump (branch) instructions) and fifteen bits for a memory address (or shift count, for shift instructions).
The CPU contained a 48-bit accumulator (A), a 48-bit Auxiliary Arithmetic register (Q), a 15-bit program counter (P), and six 15-bit index registers (1-6). The Q register was usually used in conjunction with A for forming a double-length register AQ or QA, participating with A in multiplication, division and logical product (masking) operations, and temporary storage of A's contents while using A for another operation.
Internal integer representation used ones' complement arithmetic. Internal floating point format was 1-11-36: one bit of sign, eleven bits of offset (biased) binary exponent, and thirty-six bits of binary significand.
The most-significant three bits of the accumulator were converted from digital to analog and connected to a tube audio amplifier contained in the console. This facility could be used to program audio alerts for the computer operator, or to generate music. Those familiar with the inner workings of the software could ofte
|
https://en.wikipedia.org/wiki/Weird%20Science%20%28TV%20series%29
|
Weird Science is an American television sitcom, based on John Hughes' 1985 film of the same title, that aired on the USA Network from March 5, 1994, to April 11, 1997. Six previously unaired, "lost" episodes aired on the Sci-Fi Channel from July 11 to 25, 1998.
Plot
The series follows the adventures of Gary Wallace (John Mallory Asher) and Wyatt Donnelly (Michael Manasseri), two socially inept high-school students in a fictional California town. Together, using Wyatt's computer, they try to create a computer simulation of a perfect woman in order to practice communicating with girls. However, a freak lightning storm brings her to life, creating Lisa (Vanessa Angel), a gorgeous genius with the powers of a "magic genie".
In the pilot episode, Gary claims that creating Lisa is possible because he "saw it in a John Hughes movie", referring to the original Weird Science film.
Cast
John Mallory Asher replaces Anthony Michael Hall in the role of Gary Wallace. Like his film counterpart, Gary is a poor student and a slacker, always looking for shortcuts to get what he wants (usually to impress girls). Gary is a nice guy and nerdy. Sometimes he is successful with women. His father, Al (Jeff Doucette) is a mechanic and tow-truck driver. His mother Emily is played by Joyce Bulifant, Asher's real life mother.
Michael Manasseri replaces Ilan Mitchell-Smith in the role of Wyatt Donnelly. Wyatt's wealthy parents are usually out of town, leaving him and his older brother Chett alone in the house. Most stories have him as the more cautious member of the group, more reluctant than Gary to use Lisa's magic. A few more seasons, he was more dependent and more excited for Lisa to help them out. Just like Gary, they are labeled as nerds and outsiders. He is more popular with girls than Gary, and several episodes feature Gary being interested in a girl who likes Wyatt instead.
Vanessa Angel replaces Kelly LeBrock in the role of Lisa. She describes herself as a "magic genie", able to grant the boys' wishes, though she does this out of choice rather than duty and is free to deny them any wish she does not want to grant. Once she grants a wish, Lisa is unable to reverse it, no matter how badly it turns out; however, most of her spells wear off after an indeterminate amount of time. Other than those basic rules, the limits of her powers are never clearly defined, and she seems to get more or less powerful depending on what a particular episode's plot requires. Although she is physically manifested, she is apparently still a program running on Wyatt's computer, and she ceases to appear if the computer is switched off. She is addicted to Chunky Monkey ice cream. She is more like the big sister or mother figure of the series to the boys.
Lee Tergesen replaces Bill Paxton in the role of Chester "Chett" Donnelly. Chett is a military school graduate who turned down his commission, claiming that he did not want to be sent overseas to work for "Third-World slackers"; he liv
|
https://en.wikipedia.org/wiki/Computer%20configuration
|
In communications or computer systems, a configuration of a system refers to the arrangement of each of its functional units, according to their nature, number and chief characteristics. Often, configuration pertains to the choice of hardware, software, firmware, and documentation. Along with its architecture, the configuration of a computer system affects both its function and performance
See also
Auto-configuration
Configuration management - In multiple disciplines, a practice for managing change
Software configuration management
Configuration file - In software, a data resource used for program initialization
Configure script (computing)
Configurator
Settings (Windows)
References
Federal Standard 1037C
External links
Elektra Initiative for Linux configurations
|
https://en.wikipedia.org/wiki/System%20deployment
|
The deployment of a mechanical device, electrical system, computer program, etc., is its assembly or transformation from a packaged form to an operational working state.
Deployment implies moving a product from a temporary or development state to a permanent or desired state.
See also
IT infrastructure deployment
Development
Innovation
Product life-cycle theory
Software deployment
References
Systems engineering
|
https://en.wikipedia.org/wiki/Doug%20Stephan
|
Doug Stephan is an American radio talk show personality who independently syndicates and hosts several national syndicated radio shows for USA Radio Network.
Radio Programs
Doug Stephan's "Good Day" is a morning talk radio program airing live Monday through Friday from 6 am until 9 am ET, featuring a fast paced format covering a variety of topics.
Stephan also hosts "The Talk Radio Countdown Show," "Good Day Health Show," and "American Family Farmer."
Doug Stephan, born November 5, 1946, began his career in radio as a deejay in the early 1960s in Tiffin, Ohio and thereafter decided to become a talk radio show host. He broadcasts from his home in Framingham, Massachusetts, where he operates a dairy farm, Eastleigh Farm.
Other ventures
Stephan's company Tiffin Broadcasting, LLC owned WTTF (1600 kHz, W227BJ 93.3 MHz) in Tiffin, Ohio, the same station where he began his broadcasting career. In late 2008, Stephan announced his intention to donate WTTF to his alma mater Heidelberg College; Heidelberg declined to acquire the station, and it was instead sold to Anthony Paradiso, a business partner of Stephan's, in 2014.
His company Viva Communications formerly owned WSDE AM, 1190 kHz in Cobleskill, New York. WSDE, whose call sign comes from Stephan's initials, remains an affiliate of Stephan's "Good Day" program.
References
External links
1946 births
American radio DJs
Farmers from Massachusetts
American radio executives
American talk radio hosts
Heidelberg University (Ohio) alumni
Living people
People from Framingham, Massachusetts
People from Tiffin, Ohio
|
https://en.wikipedia.org/wiki/Reorder%20tone
|
The reorder tone, also known as the fast busy tone, or the congestion tone, or all trunks busy (ATB) tone is an audible call progress tone in the public switched telephone network (PSTN) that is
returned to a calling party to indicate that the call cannot be processed through the network.
The tone characteristics vary by country or telephone administrations. In North America it is a dual-frequency tone of 620 Hz and 480 Hz interrupted 120 times per minute at a cadence of 0.25 seconds on, 0.25 off, i.e., two beeps per second.
In EU countries and those following ETSI (European Telecommunication Standards Institute) recommendations, the cadence is the same as North America, i.e. 0.25s on / 0.25s off, but with a 425 Hz tone.
The UK reorder tone uses a 400 Hz tone with a cadence of 0.4 seconds on, 0.35 seconds off, 0.225 seconds on, 0.525 seconds off. In some instances the Number Unobtainable Tone may be used instead. This is a continuous, uninterrupted 400 Hz tone.
The signal is used to indicate that the destination is unreachable, either because all circuits (trunks) are busy, the called number is out of service, the call is unroutable, or sometimes that an invalid code has been dialed. A PBX also often indicates an invalid extension, while dialing an invalid telephone number on the PSTN usually results in playing the triple special information tone and a recorded announcement.
Some European networks may return the reorder tone as a generic error signal for invalid or incorrect numbers or where a particular call type is not supported or has been barred.
Some switches, notably in Europe where open dial plans are used, analyse a number as it's dialled, and may even return a reorder tone before the complete number is dialled if the initial sequence of digits are invalid.
Many telephone companies in North America and in the United Kingdom play the reorder tone after the reading of a recorded announcement explaining the reason of call failure.
The reorder tone is sometimes confused with the busy signal because they use the same frequencies and differ only in that the busy signal's beeping sounds have a slower cadence than those of the reorder tone.
References
Telephony signals
|
https://en.wikipedia.org/wiki/OneHalf
|
OneHalf is a DOS-based polymorphic computer virus (hybrid boot and file infector) discovered in October 1994. It is also known as Slovak Bomber, Freelove or Explosion-II. It infects the master boot record (MBR) of the hard disk, and any files with extensions .COM, .SCR and .EXE. However, it will not infect files that have SCAN, CLEAN, FINDVIRU, GUARD, NOD, VSAFE, MSAV or CHKDSK in the name.
It is also known as one of the first viruses to implement a technique of "patchy infection", introduced in Bomber.
OneHalf has about 20 different variants, all with functionally similar behaviour.
Payload
OneHalf is known for its peculiar payload: at every boot, it encrypts two unencrypted cylinders of the user's hard disk, but then temporarily decrypts them when they are accessed. This makes sure the user does not notice that their hard disk is being encrypted like this, and lets the encryption continue further. It also hides the real MBR from programs on the computer, to make detection harder. The encryption is done by bitwise XORing by a randomly generated key, which can be decrypted simply by XORing with the same bit stream again. Once the virus has encrypted half of the disk, and/or on the 4th, 8th, 10th, 14th, 18th, 20th, 24th, 28th and 30th of any month and under some other conditions, the virus will display the message: Dis is one half.
<p>Press any key to continue ...
Removal
OneHalf's unique payload makes removal harder: simply removing the virus and cleaning the MBR will leave the data encrypted, requiring backups to restore it. As such, special tools are needed to decrypt the hard disk before removing the virus. One such tool was developed for SAC (Slovak Antivirus Center) to do this job.
References
External links
One_Half: The Lieutenant Commander
Boot viruses
DOS file viruses
Hacking in the 1990s
|
https://en.wikipedia.org/wiki/Bomber%20%28computer%20virus%29
|
Bomber (also known as Commander Bomber) is a DOS polymorphic memory resident computer virus, known for its technique of "patchy infection". This method of infection is very similar to that which is utilised by the OneHalf computer virus.
Contrary to the usual method of infecting executables (which is to append virus body to the executable and to change the entry point), it inserts several fragments ("patches") of its code in random places inside the file. These fragments transfer control to each other using various mechanisms.
The method of infection makes the detection of the virus difficult by anti-virus programs, and it means that they would have to scan the file in its entirety in order to detect the virus.
The size of the Bomber executable is approximately 4096 bytes and contains the following text:
COMMANDER BOMBER WAS HERE
[DAME] [DAME]
External links
www.f-secure.com
DOS file viruses
|
https://en.wikipedia.org/wiki/Putrajaya%E2%80%93Cyberjaya%20Expressway
|
Putrajaya–Cyberjaya Expressway, Federal Route 29, is a major expressway in Klang Valley, Malaysia. The 21.2 km (13.2 mi) expressway connects Serdang interchange on Damansara–Puchong Expressway to Kuala Lumpur International Airport (KLIA) in Sepang. It was named after the two sides of the MSC cities, Putrajaya and Cyberjaya.
Route background
The kilometre marker for the expressway is a continuation from the E11 Damansara–Puchong Expressway; therefore, the Putrajaya–Cyberjaya Expressway assumes the same Kilometre Zero as the Damansara–Puchong Expressway.
History
The road used to be known as the 15 state road from Puchong to Dengkil. Construction began in 1997 and was divided into four phases. The first phase was from the Damansara–Puchong Expressway to the Persiaran Utara interchange, the second from Persiaran Utara to Dengkil, the third from Dengkil to Sepang and the fourth from Sepang to Kuala Lumpur International Airport (KLIA). Phase 1 was completed in 1999, phase 2 in 2001 and phase 3 in 2006. Meanwhile, phase 4, connecting Sepang to KLIA, is expected to be completed in 2009.
Motorcycle lanes
There have been criticisms on the state of the expressway. Compared to other expressways, there are many hazards along certain stretches such as broken street lamps and dangerously uneven road surface. Most motorcyclists avoided using the designated lanes due to untrimmed tree branches jutting out into the lane, sand on the road, unlit tunnels and flooding.
Features
Motorcycle lane
The first future federal highway on Multimedia Super Corridor
Arch bridge at major interchanges along the highway
Widest highway and interchange
Highway with ERL railway line
Highway between Putrajaya and Cyberjaya
Dengkil Lake Bridge
At most sections, the Federal Route 29 was built under the JKR R5 road standard, allowing maximum speed limit of up to 90 km/h.
Driving conditions on this expressway can be hazardous, with unlit street lights, twisted guard rails and poorly maintained road surface.
List of interchanges
References
Highways in Malaysia
Expressways and highways in the Klang Valley
Malaysian Federal Roads
Sepang District
Roads in Selangor
|
https://en.wikipedia.org/wiki/Web%20ranking
|
Web ranking may refer to:
Alexa web ranking system
Compete.com, web ranking analysis based on United States traffic
Google PageRank, link analysis algorithm
Webometrics Ranking of World Universities, Ranking Web of World Universities
|
https://en.wikipedia.org/wiki/Crimes%20of%20the%20Hot
|
"Crimes of the Hot" is the eighth episode in the fourth season of the American animated television series Futurama, and the 62nd episode of the series overall. It originally aired on the Fox network in the United States on November 10, 2002. The episode was written by Aaron Ehasz and directed by Peter Avanzino. Al Gore guest stars as his own preserved head in a jar, his second appearance in the series. The episode tackles the topic of global warming as the Planet Express crew is sent to retrieve Earth's yearly ice supply in order to keep the planet cool. When they are unable to retrieve the ice, the Earth is forced to search for other ways to solve their global warming problem. In 2003, the episode was nominated for an Environmental Media Award.
Plot
On Earth, the days are getting hotter and hotter. The crew, looking for an explanation, watch an old movie about global warming. The film explains a temporary solution for global warming was found by dropping a mountainous slab of ice into the ocean on a regular basis to cool it. The Planet Express crew is assigned the task of gathering a new slab of ice to drop in the ocean.
The crew goes to Halley's Comet, but finds that it is out of ice. With no ice left, the world's top scientists are called to a conference in Kyoto, Japan. Ogden Wernstrom uses a giant mirror to deflect 40% of the sun's rays, but a stray asteroid causes it to reflect the rays into a highly destructive beam. Professor Farnsworth reveals that robots, with their high-pollution emissions, are the cause of the crisis. The scientists, led by Wernstrom, decide to destroy all the robots on Earth.
Meanwhile, Bender is moved to tears after witnessing a news report on the migration of turtles due to the heat and decides to rescue one from Holland. When questioned by the crew Bender says he has many things in common with the turtle. He claims that both have a tough outer shell but a rich inner life. More importantly, he also confides the inability to get up if he falls directly on his back. Earth President Richard Nixon's head organizes a party for the unsuspecting robots on the remote Galapagos Islands, where he plans to destroy the entire robot population with an electromagnetic blast from an orbiting EMP cannon made from Wernstrom's mirror. Bender, who was at the meeting of scientists and thus knows of the plan, decides, for the sake of the turtles, that he will accept his fate and attend the party.
At the party, Bender is overheard saying that all the robots are doomed, causing panic. Farnsworth arrives with Fry and Leela and delivers a solution to the robots; every last one needs to blast their exhaust vents at the same time, straight up in the sky, in order to push the Earth farther from the Sun, thus cooling the Earth and causing the EMP cannon to miss its target. During the panic Bender and the turtle are knocked onto their backs and cannot get up, leaving not enough exhaust to move the Earth. As Bender is lamenting his fate, t
|
https://en.wikipedia.org/wiki/Linux%20Security%20Modules
|
Linux Security Modules (LSM) is a framework allowing the Linux kernel to support without bias a variety of computer security models. LSM is licensed under the terms of the GNU General Public License and is a standard part of the Linux kernel since Linux 2.6. AppArmor, SELinux, Smack, and TOMOYO Linux are the currently approved security modules in the official kernel.
Design
LSM was designed in order to answer all the requirements for successfully implementing a mandatory access control module, while imposing the fewest possible changes to the Linux kernel. LSM avoids the approach of system call interposition used by Systrace because it doesn't scale to multiprocessor kernels and is subject to TOCTTOU (race) attacks. Instead, LSM inserts "hooks" (upcalls to the module) at every point in the kernel where a user-level system-call is about to result with an access to an important internal kernel-object like inodes and task control blocks.
LSM is narrowly scoped to solve the problem of access control, while not imposing a large and complex change-patch on the mainstream kernel. It isn't intended to be a general "hook" or "upcall" mechanism, nor does it support Operating system-level virtualization.
LSM's access-control goal is very closely related to the problem of system auditing, but is subtly different. Auditing requires that every attempt at access be recorded. LSM cannot deliver this, because it would require a great many more hooks, in order to detect cases where the kernel "short circuits" failing system-calls and returns an error code before getting near significant objects.
The LSM design is described in the paper Linux Security Modules: General Security Support for the Linux Kernel presented at USENIX Security 2002. At the same conference was the paper Using CQUAL for Static Analysis of Authorization Hook Placement which studied automatic static analysis of the kernel code to verify that all of the necessary hooks have actually been inserted into the Linux kernel.
Adoption
AppArmor
SELinux
Smack
TOMOYO
Landlock
History
At the 2001 Linux Kernel Summit, the NSA proposed that SELinux be included in Linux 2.5. Linus Torvalds rejected SELinux at that time, because he observed that there are many different security projects in development, and since they all differ, the security community has not yet formed consensus on the ultimate security model. Instead, Linus charged the security community to "make it a module".
In response, Crispin Cowan proposed LSM: an interface for the Linux kernel that provides sufficient "hooks" (upcalls) from within the Linux kernel to a loadable module so as to allow the module to enforce mandatory access controls. Development of LSM over the next two years was conducted by the LSM community, including substantial contributions from the Immunix Corporation, the NSA, McAfee, IBM, Silicon Graphics, and many independent contributors. LSM was ultimately accepted into the Linux kernel mainstream and was included
|
https://en.wikipedia.org/wiki/DiskDoubler
|
DiskDoubler (DD) is a data compression utility for compressing files on the Apple Macintosh platform. Unlike most such programs, which compresses numerous files into a single archive for transmission, DiskDoubler is intended to compress single files "in place" to save space on the drive. When such a file is opened, DiskDoubler decompresses the file before handing it off to the application for use. A later addition, AutoDoubler, adds background compression, finding and compressing files automatically when the computer was idle.
DiskDoubler was created by Terry Morse and Lloyd Chambers, fellow employees at a small software firm that went out of business in 1989. Chambers had already released a version of the Unix Compress utility on the Mac as MacCompress, and while working on another "real" project, Chambers wrote DiskDoubler in his spare time. When demonstrating their new product at a local Mac store, they noticed that it was DiskDoubler that got all of the attention. It was first shown publicly at the San Francisco MacWorld Expo in April 1990 (normally in January, but delayed that year) and by the end of the show had sold 500 copies. By the summer they were selling 1000 copies a month.
Realizing they needed real marketing muscle, they approached Symantec, who agreed to include it in their Symantec Utilities for Macintosh (SUM) package for a pittance. Unimpressed by the offer, they instead asked Guy Kawasaki to front them a $25,000 development loan, raised a similar amount on their own, and formed Salient Software. After four months sales were over $50,000 a month. When System 7 shipped in June 1991 sales took off, as the new system was rather hungry for drive space. The company was eventually sold to Fifth Generation Systems in 1992. They also repackaged it in a suite as SuperDoubler 4.0, including AutoDoubler, DiskDoubler, and a file-copy speedup known as CopyDoubler. For some time, DiskDoubler was the second-best selling product on the Mac, second only to After Dark, the popular screen saver. Fifth Generation was later sold, somewhat ironically, to Symantec, who re-released it as a fat binary as Norton DiskDoubler Pro 1.1. Symantec "sat" on the product and it slowly disappeared over the next year.
DiskDoubler concentrated on speed, originally supporting only a single variety of the LZ78 compression algorithm used in Compress/MacCompress to avoid having to try different settings. Nevertheless, the compression results were quite reasonable, notably on text files. Better yet, DiskDoubler was extremely fast, generally twice as fast as StuffIt, and 50% faster than Compact Pro, the two main archivers in use on the Mac in the 1990s. DiskDoubler also had the capability of decompressing StuffIt and PackIt files, which it did much faster than those programs could. Over the years DiskDoubler eventually ended up with four different algorithms, typically using the fastest compressor, DD1, for a first pass, and then running the most effective, DD3+, when
|
https://en.wikipedia.org/wiki/Semantic%20mapper
|
A semantic mapper is tool or service that aids in the transformation of data elements from one namespace into another namespace. A semantic mapper is an essential component of a semantic broker and one tool that is enabled by the Semantic Web technologies.
Essentially the problems arising in semantic mapping are the same as in data mapping for data integration purposes, with the difference that here the semantic relationships are made explicit through the use of semantic nets or ontologies which play the role of data dictionaries in data mapping.
Structure
A semantic mapper must have access to three data sets:
List of data elements in source namespace
List of data elements in destination namespace
List of semantic equivalent statements between source and destination (e.g. owl:equivalentClass, owl:equivalentProperty or owl:sameAs in OWL).
A semantic mapper processes on a list of data elements in the source namespace. The semantic mapper will successively translate the data elements from the source namespace to the destination namespace. The mapping does not necessarily need to be a one-to-one mapping. Some data elements may map to several data elements in the destination.
Some semantic mappers are static in that they will do a one-time data transforms. Others will generate an executable program to repeatedly perform this transform. The output of this program may be any transformation system such as XSLT, a Java program or a program in some other procedural language.
See also
Data model
Data wrangling
Enterprise application integration
Mediation
Ontology matching
Semantic heterogeneity
Semantic integration
Semantic translation
Semantic unification
References
Ontologies & the Semantic Web for Semantic Interoperability Leo Obrst
Semantic Web
Data mapping
|
https://en.wikipedia.org/wiki/Semantic%20broker
|
A semantic broker is a computer service that automatically provides semantic mapper services. A semantic broker is frequently part of a semantic middleware system that leverage semantic equivalence statements. To qualify as a semantic broker product a system must be able to automatically extract data from a message and use semantic equivalence statements to transform this into another namespace.
See also
Intelligent agent
Information systems
Semantic Web
|
https://en.wikipedia.org/wiki/CD%20USA
|
CD USA, which debuted in 2006, was an American music television show which aired exclusively on DirecTV's Audience (then The 101) network in the United States. The show was an American version of CD:UK, a similarly themed music show on ITV in the UK. Its hosts were John Wynn, Becky Baeling, and Jonathan Redford. Malikha Mallette also did occasional New York City interviews.
The show was also broadcast in Southeast Asia on the Channel V music network.
Specials
On December 31, 2006, CD USA presented its first live special, a 4½ hour concert titled America's Party: Live from Fremont Street Las Vegas on CD USA. Appearing artists in that special included All American Rejects, Rock Star Supernova, OK GO, Five for Fighting, Chicago and Smash Mouth.
Artists who have performed on CD USA
10 Years - Wasteland, Paralyzing Kings
Thirty Seconds to Mars - The Story
Aly & AJ - Rush, Something More
Army of Anyone - It Doesn't Seem to Matter
Ashlee Simpson - L. O. V. E.
The 88 - Hide Another Mistake
Bow Wow - Fresh Azimiz
Brooke Hogan (with Paul Wall)
Buckcherry - Crazy Bitch, Everything, Next 2 You
Busta Rhymes - Touch It
Butch Walker & The Let's Go Out Tonites - Bethamphedamine
Cartel - Honestly
Cary Brothers - Ride
Cherish - Do It to It
Cheyenne Kimball - Hanging On
Chicago
Chingy - Pullin' Me Back
Chris Brown - Run It!
Christina Milian – Say I
Clear Static - Out of Control
Cute Is What We Aim For - Curse of Curves
Damone - Out Here All Night
Dan Band - Rock You Hard This Christmas
Daniel Powter - Bad Day
Danity Kane - Show Stopper
Dem Franchise Boyz - I Think They Like Me
E-40 - U And Dat (with T-Pain)
Eighteen Visions - Victim
Evans Blue - Cold (But I'm Still Here), Over
Fall Out Boy - Sugar, We're Goin Down
Family Force 5 - Love Addict, Kountry Gentleman
Five for Fighting
Flipsyde - Someday
Flyleaf - Fully Alive
Fort Minor - Where'd You Go, Remember the Name
Frankie J - Priceless, That Girl
The Game - One Blood
Godsmack - Speak, Shine Down
Goo Goo Dolls
Gym Class Heroes - Cupid's Chokehold, The Queen and I
Hawthorne Heights - Pens and Needles, Saying Sorry
Head Automatica- Graduation Day
Hellogoodbye - Here (In Your Arms)
Hinder - Lips of an Angel
Holly Brook - Giving it Up for You
Hoobastank - Inside of You, The First of Me*
Ill Niño- This is War
Jack's Mannequin- The Mixed Tape
Jagged Edge - Stunnas
James Blunt - You're Beautiful (from UK studios)
Jamie Kennedy and Stu Stone - Circle Circle Dot Dot, 1964
Jesse McCartney - Right Where You Want Me
Jeannie Ortega - Crowded
JoJo - Too Little Too Late, This Time
Jonas Brothers - Mandy, 6 Minutes
Kelly Clarkson - Walk Away
Kevin Federline - Lose Control
Korn - Coming Undone
KT Tunstall - Black Horse and the Cherry Tree, Suddenly I See
LeToya Luckett - Torn, She Don't
Lifehouse - Blind
Mariah Carey feat. Jermaine Dupri - Get Your Number
Matisyahu - King Without A Crown
Mario Vazquez - Gallery
McFly - I've Got You, 5 Colours in Her Hair, Obviously
MercyMe - So Long Self
Mis-Teeq - Scandalous
Missy Higgins - Sc
|
https://en.wikipedia.org/wiki/Travelers%20Aid%20International
|
Travelers Aid International is a global network that serves as a human services support system worldwide by facilitating interactions between social service agencies, airports, train stations, and other transit hubs in order to help children and adults who become stranded while traveling or are in distress or at risk of harm as a result of travel.
History
The Travelers Aid movement began in St. Louis, Missouri, under the leadership of Mayor Bryan Mullanphy. Its purpose was to provide assistance to American pioneers and new immigrants who became stranded on their journeys. At the time of his death in 1851, Mullanphy left a bequest of a half million dollars in his will to help "aid travelers going west."
By the 20th century, Travelers Aid Societies had sprung up in major cities across the country. The programs protected stranded travelers, especially women and children, from others who would use, abuse, or victimize them. The primary fear was that young women travelers, native born and immigrant alike, would be kidnapped and turned into "white slaves" (defined as white women forced into prostitution). Therefore, Travelers Aid Societies, most notably the Travelers Aid Society of New York, provided social work to vulnerable travelers at train stations and piers in order to prevent their falling victim to the white slave trade and related vices. Although many of the Travelers Aid programs were started by religious communities, services were often provided regardless of beliefs. It is the oldest non-religious social welfare organization in the United States.
The founder of the Travelers Aid Society of New York (TAS-NY), Grace Hoadley Dodge, had hoped to unite other Travelers Aid Societies to form a national association, but she died in 1914 before this could be accomplished. Due primarily to the efforts of TAS-NY General Secretary Orin Clarkson Baker, national unification was finally accomplished in 1917. This national association provided a "chain of service", with one agency helping another when intercity transportation of a client was required. Travelers Aid was one of the original "United Service Organizations" (USO) that provided assistance to traveling service men and women, operating 175 troop transit lounges. Today, Travelers Aid responds to the specific needs of the community. Although each member agency shares the original service of assisting stranded travelers, many Travelers Aid agencies provide shelter for the homeless, transitional housing, job training, counseling, local transportation assistance, and other programs.
Similar organizations were founded in other countries; in Great Britain and many other countries it is spelled as "Travellers' Aid Society", and originally was closely associated with the YWCA.
See also
Travelers Aid Family Services of Boston
L. M. Gillespie (Travelers Aid Society worker)
Mary D. Diehl (Travelers Aid Society worker)
References
Further reading
External links
Travelers Aid International
|
https://en.wikipedia.org/wiki/Corby%20railway%20station
|
Corby railway station, owned by Network Rail and managed by East Midlands Railway, is in Corby, Northamptonshire, England. The current station, opened on 23 February 2009, replaces an earlier one dating from 1879, first closed on 18 April 1966 but reopened between 1987 and 1990.
Plans for the current station, opposite the original, were approved in late 2007. It opened with just one daily train each way on Mondays to Fridays. The full current service of hourly trains to and from London began on 27 April 2009, after East Midlands Trains had taken delivery of the additional trains needed for its implementation.
History
The Midland Railway opened Corby station in 1879. It was on the Nottingham direct line of the Midland Railway between and , serving Corby, and , instead of , and Loughborough. The station was initially named "Weldon and Corby" to avoid confusion with Corby Glen station in Lincolnshire, which closed in 1959. British Railways (BR) withdrew passenger services from all stations on the Oakham to Kettering Line, including Corby, in May 1967. For some decades, Corby was one of the largest towns in Europe without a railway station (claimed as the largest in an episode of Series C of BBC TV show QI in 2005).
BR kept the Oakham to Kettering line through Corby open for freight and as a diversionary route. It reduced the southern end of the line, from Glendon Junction (near Kettering) to Corby, to single track in 1986 after the closure of the town's steel works saw freight traffic levels decline. On 13 April 1987, a passenger service of 11 shuttle trains daily between Corby and , usually operated by a single DMU, was reintroduced with local council subsidy. More than 100,000 people used the service within the first 12 months and an extension to Leicester was proposed. However, the service became unreliable and the council withdrew its subsidy, leading Network Southeast to withdraw the service on 2 June 1990.
Reopening
Proposals
The East Midlands Branch of the independent campaign group Railfuture proposed that the Kettering – Corby line should be included in a cross-country – service, but this was not implemented. In 2001, Midland Mainline, the rail operator of the Midland Main Line franchise, decided against building a new station for Corby. In 2003, Corby's urban regeneration company, Catalyst Corby, announced plans to build a new station by 2011.
In June 2006, the Department for Transport (DfT) told prospective bidders for the new East Midlands rail franchise (combining Midland Main Line services from London and the eastern section of the Central Trains network) that they would have to include in their tenders a price for a service to a new station in Corby. The DfT's East Midlands rail franchise consultation noted that Corby had been targeted for substantial housing growth over the course of the franchise and the provision of a station would be in line with the Sustainable Communities Plan. A new service could be created as an
|
https://en.wikipedia.org/wiki/Svat%20Soucek
|
Svat Soucek (full name Svatopluk Souček) is a compiler and author of works in relation to Central Asia, and Central Asian studies. He was born in Prague, Czech Republic. He has a PhD in Turkish and Arabic studies from Columbia University. He worked in the Oriental Division of the New York Public Library, and as a professor of history at Princeton University, specialising in historical cartography. His works include Piri Reis and Turkish Mapmaking After Columbus (1996), A History of Inner Asia (2000), The Persian Gulf: Its Past and Present (2008), and The History of the Maritime Wars of the Turks (2012).
References
Further reading
Living people
Year of birth missing (living people)
Central Asian studies scholars
21st-century Czech historians
21st-century American historians
21st-century American male writers
American male non-fiction writers
|
https://en.wikipedia.org/wiki/Mongoose-V
|
The Mongoose-V 32-bit microprocessor for spacecraft onboard computer applications is a radiation-hardened and expanded 10–15 MHz version of the MIPS R3000 CPU. Mongoose-V was developed by Synova of Melbourne, Florida, USA, with support from the NASA Goddard Space Flight Center.
The Mongoose-V processor first flew on NASA's Earth Observing-1 (EO-1) satellite launched in November 2000 where it functioned as the main flight computer. A second Mongoose-V controlled the satellite's solid-state data recorder.
The Mongoose-V requires 5 volts and is packaged into a 256-pin ceramic quad flatpack (CQFP).
Examples of spacecraft that use the Mongoose-V include:
Earth Observing-1 (EO-1)
NASA's Microwave Anisotropy Probe (MAP), launched in June 2001, carried a Mongoose-V flight computer similar to that on EO-1.
NASA's Space Technology 5 series of microsatellites
CONTOUR
TIMED
Pluto probe New Horizons
See also
RAD750 Power PC
LEON
ERC32
Radiation hardening
Communications survivability
Faraday cage
Institute for Space and Defense Electronics, Vanderbilt University
Mars Reconnaissance Orbiter
MESSENGER Mercury probe
Mars rovers
TEMPEST
References
External links
Mongoose-V product page at Synova's website
Avionics computers
MIPS implementations
Radiation-hardened microprocessors
New Horizons
|
https://en.wikipedia.org/wiki/INP
|
INP may stand for:
INP (database), an early database system developed at the University of California, Berkeley
Integrated National Police, a forerunner of the Philippine National Police
Illinois Newspaper Project
Industry and Business Party (Industri- og Næringspartiet), a Norwegian political party
Budker Institute of Nuclear Physics
National Polytechnic Institutes (France) ()
Peruvian Navy (ICAO air service code: INP), see List of airline codes (P)
Iñapari language (ISO 639 language code: inp)
Indium phosphide (InP)
InPage (file extension: .inp) a word processor and page layout program
EPANET (file extension: .inp) a geographic information system for modelling water distribution systems
Ice nucleaction particle
See also
INP10, a protein
1-NP (disambiguation)
INPS (disambiguation)
IPN (disambiguation)
NP (disambiguation)
LNP (disambiguation)
nip (disambiguation)
NPI (disambiguation)
PNI (disambiguation)
Pin (disambiguation)
|
https://en.wikipedia.org/wiki/Q7
|
Q7 may refer to:
Media
Q... (TV series) by Spike Milligan on the BBC; "Q7" refers to the third series
Technology
AN/FSQ-7, the IBM vacuum tube computer for the SAGE air-defense system, where "Q7" was the commonly used nickname
Qseven, a formfactor for industrial PC-boards
Transportation
Audi Q7, a German full-size SUV
Changhe Q7, a Chinese mid-size SUV
French submarine Farfadet (Q7)
LNER Class Q7, a class of British 0-8-0 steam locomotives
Q7 (New York City bus)
Other
Q7 Wind Farm, an offshore wind farm in the Netherlands, now renamed to Princess Amalia Wind Farm
Quran 7, the 7th chapter of the Islamic Holy book
See also
7Q (disambiguation)
|
https://en.wikipedia.org/wiki/Capability%20Immaturity%20Model
|
Capability Immaturity Model (CIMM) in software engineering is a parody acronym, a semi-serious effort to provide a contrast to the Capability Maturity Model (CMM). The Capability Maturity Model is a five point scale of capability in an organization, ranging from random processes at level 1 to fully defined, managed and optimized processes at level 5. The ability of an organization to carry out its mission on time and within budget is claimed to improve as the CMM level increases.
The "Capability Im-Maturity Model" asserts that organizations can and do occupy levels below CMM level 1. An original article by Capt. Tom Schorsch USAF as part of a graduate project at the Air Force Institute of Technology provides the definitions for CIMM. He cites Prof. Anthony Finkelstein's ACM paper as an inspiration. The article describes situations that arise in dysfunctional organizations. Such situations are reportedly common in organizations of all kinds undertaking software development, i.e. they are really characterizations of the management of specific projects, since they can occur even in organizations with positive CMM levels.
Kik Piney, citing the original authors, later adapted the model to a somewhat satirical version that attracted a number of followers who felt that it was quite true to their experience.
Capability Immaturity Model levels
Finkelstein defined levels 0 (foolish), -1 (stupid) and -2 (lunatic). Schorsch changed the names and added level -3. Piney's structure, truer to the original, uses the terms incompetent, obstructive, antagonistic and psychotic.
0 : Negligent
The organization pays lip service, often with excessive fanfare, to implementing engineering processes, but lacks the will to carry through the necessary effort. Whereas CMM level 1 assumes eventual success in producing work, CIMM level 0 organizations generally fail to produce any product, or do so by abandoning regular procedures in favor of Crash programs.
-1 : Obstructive
Processes, however inappropriate and ineffective, are implemented with rigor and tend to obstruct work. Adherence to process is the measure of success in a Level -1 organization. Any actual creation of viable product is incidental. The quality of any product is not assessed, presumably on the assumption that such assessment is unnecessary since if the proper process is followed, high quality is guaranteed. This is the most common level achieved by most organizations that pursue CMM ratings.
However, Level -1 organizations believe fervently in following defined procedures, but lacking the will to measure the effectiveness of the procedures they rarely succeed at their basic task of creating work. Unfortunately, this behavior is inherent in the CMMI evaluation process. Since many government agencies will only award contracts over a certain monetary value to organizations that can pass a CMMI-3 or higher SCAMPI appraisal, management may be willing to accept inefficiencies to win these lucrative
|
https://en.wikipedia.org/wiki/Oxygen%20Project
|
The Oxygen Project is a project created to give a visual refresh to KDE Plasma Workspaces.
It consists of a set of computer icons, a window decoration for KWin, widget toolkit themes for GTK and Qt, two themes for Plasma Workspaces, and a TrueType font family.
The Oxygen theme set was used by default for Plasma Workspaces in most Linux distributions, like Fedora, Kubuntu, and openSUSE.
History
The original purpose was to create a new set of icons but expanded to include a new theme, which included a new cursor, widget and window theme, and sounds. It represents a break with the cartoonish look of previous K Desktop Environment 3 graphics and iconsets, adopting a more photo-realistic style. One of the overall goals of Oxygen was to provide a nice looking desktop that did not distract the user, so the icons and themes use a desaturated color palette. The name Oxygen came from a joke between the developers that they wanted to ”bring a breath of fresh air to the desktop”.
Oxygen Fonts
On the Oxygen Font sub-project was announced. The first release – version 0.1 – was done a month later. The 0.2 release from included refinements and added a monospace font.
Standardization
The Oxygen Project aims to offer standard icons, guidelines and a style guide. It builds on the freedesktop.org Standard Icon Naming Specification and Standard Icon Theme, allowing consistency across applications. There is an ongoing effort for supporting these specifications in different desktops, and by different icon sets and themes, such as the Tango Desktop Project.
People
Nuno Pinheiro (current coordinator)
David Vignoni (founder)
Kenneth Wimer (founder)
See also
Tango Desktop Project – developers of a public domain icon set
Breeze Project – breeze, breeze Debian package
References
Computer icons
Free software projects
KDE
KDE Platform
|
https://en.wikipedia.org/wiki/Rheinbahn
|
Rheinbahn is a public transport operator operating in Düsseldorf, Meerbusch and Kreis Mettmann. Its network consists of the Düsseldorf Stadtbahn, a network of 11 Stadtbahn (light rail) lines which are integrated in the Rhine-Ruhr Stadtbahn network, as well as Düsseldorf's tram system and 92 bus lines. The total rail network length was in 2021. In 2004, Rheinbahn transported 690,000 passengers per day.
Areas served
Two Stadtbahn lines are former light railway lines and connect to the cities of Duisburg (D-Bahn, U79) and Krefeld via Meerbusch (K-Bahn, U70/U76).
The neighbouring city of Neuss is connected to the Rheinbahn network by Stadtbahn line U75 and tram line 709. The neighbouring city of Ratingen is connected by Stadtbahn line U72.
Rheinbahn's bus lines cover Düsseldorf, Meerbusch and most parts of Kreis Mettmann.
Organisation
Rheinbahn is a member of the Verkehrsverbund Rhein-Ruhr (VRR), the public transport association covering the area of the Rhine-Ruhr megalopolis.
Lifetime contracts issue
Between 1980 and 2001, Rheinbahn issued employment contracts which failed to set an end for the salary payments, resulting in these employees receiving their salaries until their deaths. Although the company indicated that it was attempting to resolve this contractual oversight amicably, this strategy relied entirely on the agreement and goodwill of each employee, as the contracts were considered legally watertight. As of 2019, 37 of these contracts were still in active effect. Rheinbahn spokesman Georg Schumacher stated that over 100 such contracts had been issued in total.
According to the Munich-based tabloid TZ, several of these contracts are for senior managers who earn in the region of €8,000 per month.
See also
List of rapid transit systems
Düsseldorf Stadtbahn
Trams in Düsseldorf
References
External links
Home page, in German and English
Network map (PDF), from the Verkehrsverbund Rhein-Ruhr
Public transport operators of Germany
Tram transport in Germany
Companies based in Düsseldorf
Transport in Düsseldorf
|
https://en.wikipedia.org/wiki/Buzz%21
|
Buzz! is a series of video games originated by Sleepydog Ltd., developed by Relentless Software and published by Sony Computer Entertainment for the PlayStation 2, PlayStation 3 and PlayStation Portable consoles. They are quiz games that see the players answering trivia questions while competing in the fictional game show Buzz!. Created specifically with multi-player party gaming in mind, the series launched in October 2005 and to date comprises 18 games; including 13 in the Buzz! series and five Buzz! Junior titles. The series made the transition to the PlayStation 3 with Buzz!: Quiz TV in 2008. The sixteenth game in the series Buzz!: Brain of the UK was released in March 2009. The latest Buzz! game is Buzz!: The Ultimate Music Quiz which was released in October 2010.
In 2006 the second game in the Buzz series, Buzz!: The BIG Quiz, won the BAFTA award for Best Casual and Social game. Buzz!: Quiz TV has been nominated in the Best Social Game and Best Multiplayer Game categories for the 2009 BAFTA video game awards. The series has sold over 10 million copies.
As with most TV quiz shows the winner of the game is the player with the most points. The show uses a multi-round format with most games in the series featuring eight individual rounds. The exact rounds vary from game-to-game and more information about the rounds can be found in the individual articles. Each game is hosted by the titular Buzz (voiced by Jason Donovan in the English versions)
The games are played with buzzers – a set of four simple controllers that consist of four coloured answer buttons and a red buzzer. These are intended to replicate the buzzers often seen on TV quiz shows. The buzzers plug into a USB port and the game allows use of either one or two sets of buzzers allowing up to eight players in certain games. The games are usually marketed in two versions, a pack containing both game and buzzers for new purchasers or a game only version for players who already own a set of buzzers.
In January 2008 California-based Buzztime Entertainment filed a legal suit, in the Southern District of California, against Sony Computer Entertainment Europe alleging that Sony had violated several of its trademarks. The suit accused Sony of a "malicious, fraudulent, knowing, wilful, and deliberate" violation of its trademarks. In the suit Buzztime is seeking the recall and destruction of all infringing products and is asking the court for actual damages, punitive damages, legal fees and an order to the US Patent and Trademark Office not to register Sony's pending Buzz trademarks. The case was eventually settled out of court in favour of Sony.
Buzz! series
The series was launched in October 2005 with Buzz!: The Music Quiz, which was followed by a general knowledge version Buzz!: The BIG Quiz. The alternation between specialist subject and general knowledge continued for the next three games in the series; the sports based Buzz!: The Sports Quiz was followed by another general knowled
|
https://en.wikipedia.org/wiki/Tier%202
|
Tier 2 may refer to:
Tier 2 capital, constituents of a bank's capital requirement
Tier 2 network, a type of Internet service provider
Scaled Composites Tier Two, a human spaceflight program
Tier 2 in the First COVID-19 tier regulations in England, the middle level
Tier 2 in the Second COVID-19 tier regulations in England
Tier II, a data center standard
Tier II, in United States vehicle emission standards
See also
Two-tier healthcare
Multitier architecture
WTA Tier II tournaments, Women's Tennis Association tennis second-level tournaments
Three-tier system (disambiguation)
Tier 1 (disambiguation)
Tier 3 (disambiguation)
Tier 4 (disambiguation)
Tier II+, a remotely-piloted, surveillance aircraft
|
https://en.wikipedia.org/wiki/FROSTBURG
|
FROSTBURG was a Connection Machine 5 (CM-5) massively parallel supercomputer used by the US National Security Agency (NSA) to perform higher-level mathematical calculations. The CM-5 was built by the Thinking Machines Corporation, based in Cambridge, Massachusetts, at a cost of US$25 million. The system was installed at NSA in 1991, and operated until 1997. It was the first massively parallel processing computer bought by NSA, originally containing 256 processing nodes. The system was upgraded in 1993 with another 256 nodes, for a total of 512 nodes. The system had a total of 500 billion 32-bit words (≈ 2 terabytes) of storage, 2.5 billion words (≈ 10 gigabytes) of memory, and could perform at a theoretical maximum 65.5 gigaFLOPS. The operating system CMost was based on Unix, but optimized for parallel processing.
FROSTBURG is now on display at the National Cryptologic Museum.
See also
HARVEST
Cryptanalytic computer
References
External links
Another photograph of FROSTBURG by Declan McCullagh
Cryptanalytic devices
Supercomputers
|
https://en.wikipedia.org/wiki/Maxim%20Integrated
|
Maxim Integrated, a subsidiary of Analog Devices, designs, manufactures, and sells analog and mixed-signal integrated circuits for the automotive, industrial, communications, consumer, and computing markets. Maxim's product portfolio includes power and battery management ICs, sensors, analog ICs, interface ICs, communications solutions, digital ICs, embedded security, and microcontrollers. The company is headquartered in San Jose, California, and has design centers, manufacturing facilities, and sales offices worldwide.
History
Maxim was founded in April 1983. The founding team included Jack Gifford, a semiconductor industry pioneer since the 1960s; Fred Beck, an IC sales and distribution pioneer; Dave Bingham, General Electric’s Scientist of the Year in 1982; Steve Combs, a pioneer in wafer technologies and manufacturing; Lee Evans, also a pioneer in CMOS analog microchip design and General Electric’s Scientist of the Year in 1982; Dave Fullagar, inventor of the first internally compensated operational amplifier circuit; Roger Fuller, a pioneer in CMOS microchip design; Rich Hood, development director for some of the first microprocessor-controlled semiconductor test systems; and Dick Wilenken, who is acknowledged as the father of key analog switch and multiplexer technologies.
Based on a two-page business plan, they obtained US$9 million in venture capital financing to establish the company.
In its first year, the company developed 24 second source products.
In 1985, the company introduced the MAX600.
Maxim recorded its first profitable fiscal year in 1987, with the help of the MAX232.
In 1988, the company became a public company via an initial public offering.
In 1989, the company purchased its first wafer fabrication facility, in Sunnyvale, California, from bankrupt Saratoga Semiconductor for only $5-million.
In 1994, the company acquired the integrated circuits division of Tektronix, based in Beaverton, Oregon, giving it high-speed bipolar processes for wireless RF and fiber-optic products.
In 1997, the company acquired a wafer fab in San Jose, California from IC Works for $42 million.
In April 2001, the company acquired Dallas Semiconductor in Dallas, Texas in a stock transaction, to gain expertise in digital and mixed-signal CMOS design, as well as an additional wafer fab.
In October 2003, the company acquired a submicrometre CMOS fab from Philips in San Antonio, Texas for $40 million to ramp up capacity and support processes down to the 0.25-micrometre level.
In May 2007, the company acquired an 0.18-micrometre fab from Atmel in Irving, Texas, for $38 million, approximately doubling fab capacity. In August 2007, it acquired Vitesse Semiconductor’s Storage Products Division in Colorado Springs, Colorado, adding Serial ATA (SATA), Serial Attached SCSI (SAS), and enclosure-management products to Maxim’s product portfolio.
From October 2007 to October 2008, Maxim's common stock was delisted from the Nasdaq Stock Exchange due to t
|
https://en.wikipedia.org/wiki/Brian%20Reid%20%28computer%20scientist%29
|
Brian Keith Reid (born 1949) is an American computer scientist. He developed an early use of a markup language in his 1980 doctoral dissertation. His other principal interest has been computer networking and the development of the Internet.
Education
Reid received his B.S. in physics from the University of Maryland, College Park in 1970, and then worked in industry for five years before entering graduate school at Carnegie Mellon University, where he was awarded a PhD in computer science in 1980.
His dissertation research developed the Scribe word processing system, for which he received the Association for Computing Machinery's Grace Murray Hopper Award in 1982.
Reid presented a paper describing Scribe in the same conference session in 1981 in which Charles Goldfarb presented Generalized Markup Language (GML), the immediate predecessor of SGML.
Career
From 1980–1987, he was an assistant professor of electrical engineering at Stanford University in the computer systems laboratory.
There he was a recipient of the Presidential Young Investigator Award in 1984, working along with other new faculty such as John L. Hennessy, David R. Cheriton, and Mark Horowitz.
Along with faculty such as Susan Owicki, Forest Baskett, and James H. Clark, his research concerned the connection of Stanford to the Internet, and the development of the SUN workstation.
As the Stanford University Network attracted attacks, he became interested in possible network defenses.
He left Stanford in 1987, he was immediately hired by the Digital Equipment Corporation, first in the Western Research Laboratory (DEC WRL) under Forest Baskett in Palo Alto, California. Reid and Paul Vixie developed one of the first connections between a corporate network and the Internet, known as "Gatekeeper" after the character in the Ghostbusters film. The protection techniques developed evolved into what is now called a network firewall.
Some early Internet attackers (such as Kevin Mitnick) would impersonate Reid in telephone calls in attempts to gain trust.
He experimented with electronic publishing with his USENET Cookbook project. In 1987, he and John Gilmore created the alt.* hierarchy on Usenet. He also created and ran the "USENET readership report", which sampled the reading habits of volunteer news readers, tried to extrapolate them across the entire population of the USENET, and reported them monthly to the news.lists newsgroup.
From 1986 thru 1995, Reid produced a variety of maps of the USENET in PostScript, showing both its geographical reach and its volumes of traffic flow.
In 1995 he became director of his own group, the Network Systems Laboratory (DEC NSL).
The DEC NSL developed one of the largest Internet exchange points as the Internet became available for commercial use in the 1990s.
One of his employees was Anita Borg, who founded the group Systers and the Grace Hopper Celebration of Women in Computing while at NSL.
DEC NSL and WRL developed AltaVista, one of the first w
|
https://en.wikipedia.org/wiki/Session%20fixation
|
In computer network security, session fixation attacks attempt to exploit the vulnerability of a system that allows one person to fixate (find or set) another person's session identifier. Most session fixation attacks are web based, and most rely on session identifiers being accepted from URLs (query string) or POST data.
Attack scenarios
Alice has an account at the bank http://unsafe.example.com/
Mallory intends to target Alice's money from her bank.
Alice has a reasonable level of trust in Mallory, and will visit links Mallory sends her.
A simple attack scenario
Straightforward scenario:
Mallory has determined that http://unsafe.example.com/ accepts any session identifier, accepts session identifiers from query strings and has no security validation. http://unsafe.example.com/ is thus not secure.
Mallory sends Alice an e-mail: "Hey, check this out, there is a cool new account summary feature on our bank, http://unsafe.example.com/?SID=I_WILL_KNOW_THE_SID". Mallory is trying to fixate the SID to I_WILL_KNOW_THE_SID.
Alice is interested and visits http://unsafe.example.com/?SID=I_WILL_KNOW_THE_SID. The usual log-on screen pops up, and Alice logs on.
Mallory visits http://unsafe.example.com/?SID=I_WILL_KNOW_THE_SID and now has unlimited access to Alice's account.
Attack using server generated SID
A misconception is that if a server only accepts server-generated session identifiers, it is safe from fixation. This is false.
Scenario:
Mallory visits http://vulnerable.example.com/ and checks which SID is returned. For example, the server may respond: Set-Cookie: SID=0D6441FEA4496C2.
Mallory is now able to send Alice an e-mail: "Check out this new cool feature on our bank, http://vulnerable.example.com/?SID=0D6441FEA4496C2."
Alice logs on, with fixated session identifier SID=0D6441FEA4496C2.
Mallory visits http://vulnerable.example.com/?SID=0D6441FEA4496C2 and now has unlimited access to Alice's account.
Attacks using cross-subdomain cookie
This type of attack is similar to a cross-site cookie attack except that, it does not rely on the vulnerability of the user's browser. Rather, it relies on the fact that wildcard cookies can be set by a subdomain and, that those cookies may affect other subdomains.
Scenario:
A web site www.example.com hands out subdomains to untrusted third parties
One such party, Mallory, who now controls evil.example.com, lures Alice to his site
A visit to evil.example.com sets a session cookie with the domain .example.com on Alice's browser
When Alice visits www.example.com this cookie will be sent with the request and Alice will have the session specified by Mallory's cookie.
If Alice now logs on, Mallory can use her account.
When this attack is complete, Mallory can gain access to www.example.com as Alice.
It is not essential that a user login to exploit session fixation attacks and, although these unauthenticated attacks are not constrained to cross-sub-domain cookie attacks, the implications of
|
https://en.wikipedia.org/wiki/TK%20Telekom
|
TK Telekom (formerly Telekomunikacja Kolejowa) is a Polish telecommunications company, operated jointly by Netia and the PKP Group.
It is responsible for telecommunications and data transmission for the Polish railways and also serves a number of other companies outside the PKP Group and individual clients. Because of the nature of the services it provides, TK Telekom has been designated by Poland as a company of special strategic interest. In 2015, Polish telecommunications company Netia acquired 100% of the share capital of TK Telekom.
The company was founded in 2001 following the division of the national rail operator Polskie Koleje Państwowe into several dozen separate companies in order to satisfy European Union requirements.
See also
Transportation in Poland
List of railway companies
Polish locomotives designation
References
Railway companies of Poland
PKP Group companies
Telecommunications companies of Poland
Polish Limited Liability Companies
|
https://en.wikipedia.org/wiki/PGE%20Energetyka%20Kolejowa
|
PGE Energetyka Kolejowa S.A., until 2023 PKP Energetyka S.A. is the cross-country electricity distributor to the Polish railway network and other business customers. It also provides nationwide maintenance and emergency response services to the railway network, operates fuel stations for diesel locomotives and is active in electricity and gas reselling. It owns 20,000 km of distribution network and operates a fleet of highly specialised trains and rail equipment across Poland.
It was created in 2001 as the result of the division of Polskie Koleje Państwowe (Poland's state-owned railway company) into several dozen companies to prepare the ground for privatisation in line with advice that the Polish government had received from the World Bank.
PKP Group originally planned to privatise PKP Energetyka in 2011, and sold it to CVC Capital Partners for 1.965 billion PLN (~525 million USD) in September 2015.
In late 2022, it was reported that the Polish PiS government might buy back PKP Energetyka from CVC Capital Partners. On 28 December 2022, PGE Polska Grupa Energetyczna signed a preliminary agreement with the CVC Fund to purchase 100% of shares in PKPE Holding sp. z o.o. which owns 100% of shares in PKP Energetyka S.A. On 3 April 2023, PGE Polska Grupa Energetyczna acquired from the CVC Fund 100% of shares in PKPE Holding sp. z o.o. thus closing the purchase transaction of PKP Energetyka S.A. On 4 April 2023, the company's name was changed from PKP Energetyka to PGE Energetyka Kolejowa.
See also
Transportation in Poland
List of railway companies
Polish locomotives designation
PKP Group
References
Railway companies of Poland
PKP Group companies
Energy companies of Poland
|
https://en.wikipedia.org/wiki/Sphingosyl%20phosphatide
|
Sphingosyl phosphatide refers to a lipid containing phosphorus and a long-chain base.
References
Cyberlipid Center – sphingosylphosphatides
Phospholipids
|
https://en.wikipedia.org/wiki/Chernoff%20face
|
Chernoff faces, invented by applied mathematician, statistician and physicist Herman Chernoff in 1973, display multivariate data in the shape of a human face. The individual parts, such as eyes, ears, mouth and nose represent values of the variables by their shape, size, placement and orientation. The idea behind using faces is that humans easily recognize faces and notice small changes without difficulty. Chernoff faces handle each variable differently. Because the features of the faces vary in perceived importance, the way in which variables are mapped to the features should be carefully chosen (e.g. eye size and eyebrow-slant have been found to carry significant weight).
Detail
Chernoff faces themselves can be plotted on a standard X–Y graph; the faces can be positioned X–Y based on the two most important variables, and then the faces themselves represent the rest of the dimensions for each item. Edward Tufte, presenting such a diagram, says that this kind of Chernoff-face graph would "reduce well, maintaining legibility even with individual areas of 0.05 square inches as shown ... with cartoon faces and even numbers becoming data measures, we would appear to have reached the limit of graphical economy of presentation, imagination, and let it be admitted, eccentricity".
Extensions
Asymmetrical faces
In 1981, Bernhard Flury and Hans Riedwyl suggested "asymmetrical" Chernoff faces; since a face has vertical symmetry (around the y axis), the left side of the face is identical to the right and is basically wasted space – a point also made by Tufte. One could have the 18 variables that specify the left be one set of data, but use a different set of data for the right side of the face, allowing one face to depict 35 different measurements. They present results showing that such asymmetrical faces are useful in visualizing databases of identical twins, for example, and are useful in grouping as pairs of Chernoff faces would be.
Chernoff fish
In Visualizing Financial Data (2016, ), Julie Rodriguez and Piotr Kaczmarek use "Chernoff fish", where various parts of a cartoon fish are used to encode different financial details.
In literature
In Peter Watts' novel Blindsight (2006), a transhuman character is seen using a variant of Chernoff faces. This is explained by the character as a more efficient method of representing data, as a large portion of the human brain is devoted to facial recognition.
In the sci-fi short story "Degrees of Freedom" by Karl Schroeder, Chernoff faces make a prominent appearances as a future technology, supporting the communication of aggregate sentiment and perspective.
References
Other sources
Further reading
"Facial Representation of Multivariate Data", David L. Huff, Vijay Mahajan and William C. Black. Journal of Marketing, Vol. 45, No. 4 (Autumn, 1981), pp. 53–59.Published by: American Marketing Association
"FACES-A FORTRAN Program for Generating Chernoff-Type Faces on a Line Printer", Danny W. Turner and F. Euge
|
https://en.wikipedia.org/wiki/Intelligent%20tutoring%20system
|
An intelligent tutoring system (ITS) is a computer system that aims to provide immediate and customized instruction or feedback to learners, usually without requiring intervention from a human teacher. ITSs have the common goal of enabling learning in a meaningful and effective manner by using a variety of computing technologies. There are many examples of ITSs being used in both formal education and professional settings in which they have demonstrated their capabilities and limitations. There is a close relationship between intelligent tutoring, cognitive learning theories and design; and there is ongoing research to improve the effectiveness of ITS. An ITS typically aims to replicate the demonstrated benefits of one-to-one, personalized tutoring, in contexts where students would otherwise have access to one-to-many instruction from a single teacher (e.g., classroom lectures), or no teacher at all (e.g., online homework). ITSs are often designed with the goal of providing access to high quality education to each and every student.
History
Early mechanical systems
The possibility of intelligent machines has been discussed for centuries. Blaise Pascal created the first calculating machine capable of mathematical functions in the 17th century simply called Pascal's Calculator. At this time the mathematician and philosopher Gottfried Wilhelm Leibniz envisioned machines capable of reasoning and applying rules of logic to settle disputes. These early works inspired later developments.
The concept of intelligent machines for instructional use date back as early as 1924, when Sidney Pressey of Ohio State University created a mechanical teaching machine to instruct students without a human teacher. His machine resembled closely a typewriter with several keys and a window that provided the learner with questions. The Pressey Machine allowed user input and provided immediate feedback by recording their score on a counter.
Pressey was influenced by Edward L. Thorndike, a learning theorist and educational psychologist at the Columbia University Teachers' College of the late 19th and early 20th centuries. Thorndike posited laws for maximizing learning. Thorndike's laws included the law of effect, the law of exercise, and the law of recency. By later standards, Pressey's teaching and testing machine would not be considered intelligent as it was mechanically run and was based on one question and answer at a time, but it set an early precedent for future projects.
By the 1950s and 1960s, new perspectives on learning were emerging. Burrhus Frederic "B.F." Skinner at Harvard University did not agree with Thorndike's learning theory of connectionism or Pressey's teaching machine. Rather, Skinner was a behaviorist who believed that learners should construct their answers and not rely on recognition. He too, constructed a teaching machine with an incremental mechanical system that would reward students for correct responses to questions.
Early electr
|
https://en.wikipedia.org/wiki/KDEN-TV
|
KDEN-TV (channel 25) is a television station licensed to Longmont, Colorado, United States, serving as the Denver area outlet for the Spanish-language network Telemundo. Owned and operated by NBCUniversal's Telemundo Station Group, KDEN-TV maintains studios at the Comcast Media Center on East Dry Creek Road in Centennial, and its transmitter is located in rural southwestern Weld County (east of Frederick).
History
The station first signed on the air on March 31, 1997. Founded by locally owned Longmont Broadcasting, KDEN originally operated as an independent station. On January 19, 2006, Longmont Broadcasting sold KDEN to NBC Universal, making the second television station in the Denver market to have been an owned-and-operated station under NBC ownership—after KCNC-TV (channel 4, now a CBS owned-and-operated station), which was owned by the network from 1986 to 1995, the company's 17th Spanish-language television station and the third network O&O in the market overall (alongside KCNC and KDVR (channel 31), which Fox would eventually sell in 2008).
Channel 25 became the market's Telemundo owned-and-operated station on March 6, Before moving to KDEN, Telemundo programming was seen in Denver on low-power stations KMAS-LP (channel 63) and KSBS-LP (channel 47), which both served as repeaters of KMAS-TV (channel 24) in Steamboat Springs; after NBC Universal purchased KDEN, it donated the KMAS-TV license and transmitter facility to Rocky Mountain PBS, which changed its call letters to KRMZ, while KSBS-LP was sold to Denver Digital Television (NBC retained KMAS-LP, which moved to channel 33 in 2008, was converted to digital station KMAS-LD in 2012, and remained a repeater of KDEN-TV until its license was cancelled on December 6, 2019).
Newscasts
KDEN-TV presently broadcasts five hours of locally produced newscasts each week (with one hour each weekday); the station does not broadcast local newscasts on Saturdays or Sundays. Upon affiliating with Telemundo, KDEN aired locally produced news cut-ins during the national evening newscasts Noticiero Telemundo and Noticiero Telemundo Internacional; the inserts were discontinued late that year as a result of budget cutbacks imposed by NBC Universal.
On July 29, 2011, KDEN announced a news share agreement with NBC affiliate KUSA (channel 9) to produce Spanish-language newscasts for the station. The half-hour newscasts, airing at 5:30 and 10:00 p.m. weeknights and branded as Noticiero Telemundo Denver/9News en Español, debuted on October 3, 2011, and utilize a separate on-air staff that is exclusive to the KDEN broadcasts; the programs are produced out of a secondary set at KUSA's studio facility on East Speer Boulevard, and have been broadcast in high-definition from their launch.
On October 20, 2014, KDEN added a 4:30 p.m. newscast and moved its 5:30 show to 5:00 p.m. In July 2015, the station began producing its own newscasts from the Comcast Media Center in Centennial, retaining a content partnership with
|
https://en.wikipedia.org/wiki/Montana%20Television%20Network
|
The Montana Television Network (MTN) is a statewide network of CBS affiliates in the U.S. state of Montana. It also includes one NBC station. All but one of these stations are owned by the E. W. Scripps Company. In addition, MTN owns the Montana Ag Network, which provides farm and ranch reports on television.
Established in 1969 in its current form by Montana broadcasting pioneer Joe Sample, MTN was originally conceived as a way to unify Montanans and connect the state's comparatively isolated population centers. Between 1971 and 1986, the MTN stations aired hybrid local/network newscasts that consisted of sections of statewide and local news; this approach was abandoned in favor of producing separate local newscasts in each city. All of the stations became exclusive CBS affiliates in 1984 and air the same syndicated programming. MTN operated under split ownership from 1986 to 1994, when the Billings station was reunited with the rest of the network. Expansions in local news in Kalispell and Bozeman, as well as a full entrance into the Helena market and later the purchase of its established commercial station, have grown the network over the last 20 years.
History
Skyline Network
The predecessor to MTN was the Skyline Network, which began in 1958. It included KOOK-TV in Billings, KXLF-TV in Butte and its satellite KXLJ-TV in Helena, and KFBB-TV in Great Falls, as well as two Idaho properties, KID-TV in Idaho Falls and KLIX-TV in Twin Falls. The network was organized by the owners of KXLF, KID-TV, and KMVT. It provided network programming from the three commercial stations in Salt Lake City to southern and eastern Idaho Montana on a series of microwave links; a related company, Skyline Advertisers Sales, provided ad sales services for all of the stations. The stations had varied network affiliations; KXLF-TV, a primary outlet of CBS since 1958, refused to carry the 1962 World Series from NBC in part because doing so would deny any network programs to KFBB in Great Falls, which was not affiliated with NBC.
KXLJ exited the network in 1960, leaving it without a node in the capital. A year later, Sample purchased KXLF-TV. In 1969, Sample bought Great Falls's other station, KRTV, which had replaced KFBB in Skyline.
Foundation of MTN
A combination of affiliation and ownership changes at the various Skyline outlets led to the network dissolving on September 30, 1969. Sample then merged the three stations owned by his Garryowen Corporation-KOOK-TV, KRTV, and KXLF-TV-into the Montana Television Network. The next year, KPAX-TV began in Missoula as a satellite of KXLF-TV. In 1972, Sample sold KOOK radio, and KOOK-TV became KTVQ.
Sample believed that the presentation of regional news could serve as a major unifier in Montana, a rural state with widely separated population centers. He hoped that, by presenting the major stories from around the state, viewers would be able to agree on important issues. In 1971, MTN instituted a network newscast, which wa
|
https://en.wikipedia.org/wiki/ATN%20Aastha%20TV
|
ATN Aastha is a Canadian exempt Category B Hindi language specialty channel owned by Asian Television Network (ATN).
ATN Aastha broadcasts religious and spiritual programming in Hindi, Gujarati, and English, focusing mainly on the teachings and principles of Hinduism. Programming includes discourses, devotional music, meditation and yoga techniques, coverage of religious festivals, and ancient Indian scientific practices such as ayurveda. Programming is primarily sourced from Aastha International, an Indian-based television channel, in addition to Canadian content.
History
In April 2005, ATN was granted approval from the Canadian Radio-television and Telecommunications Commission (CRTC) to launch a television channel called ATN - South Asian Devotional Music & Discourse Channel, described as "a national ethnic Category 2 pay television programming undertaking devoted to religious programming presented in South Asian languages."
The channel launched on October 19, 2005 as ATN Aastha.
On September 13, 2012, the CRTC approved Asian Television Network's request to convert ATN Aastha from a licensed Category B specialty service to an exempted Cat. B third language service.
References
External links
Religious television networks in Canada
Television channels and stations established in 2005
Digital cable television networks in Canada
Indian diaspora mass media
Hindi-language television in Canada
South Asian television in Canada
|
https://en.wikipedia.org/wiki/BBC%20Two%20Northern%20Ireland
|
BBC Two Northern Ireland () is a Northern Irish free-to-air television channel owned and operated by BBC Northern Ireland as a variation of the BBC Two network. It is broadcast via digital terrestrial transmitters and from the SES Astra 2E satellite (transponder 48) at the 28.2° East orbital position.
Presentation
The channel was branded onscreen as 'BBC Two NI' from October 2006 until February 2007, though not referred to as such by continuity announcers. Unique idents for Northern Ireland featuring the robotic figure 2 were used during this time, showing the Giant's Causeway and the feature eating an Ulster Fry.
Programming
Unlike BBC Two in the rest of the UK, the channel broadcasts regular news and regional weather updates between programmes. Programmes on the service have included the following:
The Children's
First Stop
Hearts and Minds
The John Daly Show
BBC Sport NI at the Milk Cup
Sky High
Chasing the Dollar
Spotlight
Children's programmes
Sesame Tree (Originated from BBC Northern Ireland)
Pingu (Originated from the BBC)
What's New, Scooby-Doo? (US import from Cartoon Network)
Shaun the Sheep (From sister network CBBC)
Bernard (South Korea import from EBS)
Brum (Originated from the BBC)
Teletubbies (Originated from the BBC)
Arthur (US import from PBS)
The Simpsons (US import from FOX)
Charlie and Lola (From sister network CBeebies)
Barnaby Bear (Also known as Colargol)
Availability
BBC Two Northern Ireland can be seen on all television platforms on channel 2, or 102 in Northern Ireland, depending on the system and in other areas of the UK via satellite and on some other digital television platforms and in most areas of the Republic of Ireland on satellite, cable and some other digital television receivers. Programming shown on BBC Two Northern Ireland can be watched again across the UK after transmission on the BBC iPlayer service.
Until 28 October 2006, there were two separate services – 'BBC Two Northern Ireland"', an analogue-only service, referred to as "BBC Two", both in idents and continuity, and a digital-only opt-out, 'BBC Two NI', (the successor to BBC Choice Northern Ireland) which carried extra regional programming and continuity between 6pm and midnight. This has all now ended and the two Northern Ireland services have been merged.
External links
1966 establishments in Northern Ireland
BBC television channels in the United Kingdom
Television channels and stations established in 1966
Television in Northern Ireland
Television stations in Ireland
BBC Northern Ireland
|
https://en.wikipedia.org/wiki/Tracking%20and%20data%20relay%20satellite
|
A tracking and data relay satellite (TDRS) is a type of communications satellite that forms part of the Tracking and Data Relay Satellite System (TDRSS) used by NASA and other United States government agencies for communications to and from independent "User Platforms" such as satellites, balloons, aircraft, the International Space Station, and remote bases like the Amundsen-Scott South Pole Station. This system was designed to replace an existing worldwide network of ground stations that had supported all of NASA's crewed flight missions and uncrewed satellites in low-Earth orbits. The primary system design goal was to increase the amount of time that these spacecraft were in communication with the ground and improve the amount of data that could be transferred. These TDRSS satellites are all designed and built to be launched to and function in geosynchronous orbit, above the surface of the Earth.
The first seven TDRSS satellites were built by the TRW corporation. The three later versions have been manufactured by the Boeing corporation's Satellite Systems division. Thirteen satellites have been launched; however, one was destroyed in the Challenger disaster. TDRS-1 was decommissioned in October 2009. TDRS-4 was decommissioned in December 2011. Ten TDRSS satellites are currently in service. All of the TDRSS satellites have been managed by NASA's Goddard Space Flight Center. The contract for TDRS versions L & K was awarded to Boeing on December 20, 2007. On November 30, 2011, NASA announced the decision to order an additional third-generation TDRS satellite, TDRS M.
Operations
The first tracking and data relay satellite was launched in 1983 on the Space Shuttle Challenger's first flight, STS-6. The Boeing-built Inertial Upper Stage that was to take the satellite from Challenger's orbit to its ultimate geosynchronous orbit suffered a failure that caused it not to deliver the TDRS to the correct orbit. As a result, it was necessary to command the satellite to use its onboard rocket thrusters to move it into its correct orbit. This expenditure of fuel reduced its capability to remain in a geostationary orbit; by late 1997 the orbit had changed to the point that the satellite was able to see the South Pole, and an uplink/downlink station was installed at Amundsen–Scott South Pole Station in January 1998; TDRS-1 was an important communication uplink for Antarctic research until 2009.
The second tracking and data relay satellite was destroyed along with Challenger shortly after launch during the STS-51-L mission in January 1986. The next five TRW-built TDRSS satellites were successfully launched on other Space Shuttles. Three follow-up Boeing-built satellites were launched by Atlas rockets in 2000 and 2002. A NASA Press Release summarized the capabilities of the system as a whole:
"Working solo, TDRS-1 provided more communication coverage, in support of the September 1983 Shuttle mission, than the entire network of NASA tracking stations had pro
|
https://en.wikipedia.org/wiki/MODTRAN
|
MODTRAN (MODerate resolution atmospheric TRANsmission) is a computer program designed to model atmospheric propagation of electromagnetic radiation for the 100-50,000 cm−1 (0.2 to 100 µm) spectral range. This covers the spectrum from middle ultraviolet to visible light to far infrared.
The most recently released version of the code, MODTRAN6, provides a spectral resolution of 0.2 cm−1 using its 0.1 cm−1 band model algorithm.
Some aspects of MODTRAN are patented by Spectral Sciences, Inc. and the US Air Force, who have shared development responsibility for the code and related radiation transfer science collaboratively since 1987. The acronym MODTRAN was registered as a trademark of the US Government, represented by the US Air Force, in 2008.
All MODTRAN code development and maintenance is currently performed by Spectral Sciences while the Air Force handles code validation and verification. MODTRAN6 may be obtained from Spectral Sciences, Inc.
MODTRAN is written entirely in FORTRAN. MODTRAN6 adds support for JSON formatted input files, along with a graphical user interface that enables users to load existing cases, interactively enter or modify inputs, save their JSON formatted input files, run MODTRAN6, and graphically view the newly generated spectral output data. Third parties, including Ontar, have also developed graphical user interfaces for MODTRAN in order to facilitate user interaction and ease of use.
See also
HITRAN - a compilation of spectroscopic parameters
List of atmospheric radiative transfer codes
SMARTS - Simple Model of the Atmospheric Radiative Transfer of Sunshine
External links
MODTRAN web site
USAF patent 5884226
USAF patent 7433806
Google scholar papers on MODTRAN
Main Page Air Force Site
Electromagnetic radiation
Fortran libraries
Atmospheric radiative transfer codes
|
https://en.wikipedia.org/wiki/Yellowstone%20Public%20Radio
|
Yellowstone Public Radio is a public radio regional network based in Billings, Montana with transmitters covering most of Montana, as well as northern Wyoming and eastern Idaho. It is operated by Montana State University Billings. It airs a mix of programming from National Public Radio, classical music and jazz.
History
The network's first station, KEMC in Billings, signed on in 1972 as a 10-watt station owned by what was then Eastern Montana College. It boosted its power to 24,500 watts in 1978. It gradually transitioned from a college radio station to a more professional operation. This culminated in 1984, when it hired a professional station manager and joined National Public Radio, becoming the state's second NPR member. Over the next decade, it boosted its signal to 100,000 watts, and built a network of translators and repeaters across Montana, and now has one of the largest geographical coverage areas in the entire NPR system. Shortly after EMC merged with the Montana State University System, KEMC rebranded itself Yellowstone Public Radio, reflecting that its coverage area spanned across most of the area around Yellowstone National Park. In the same year, its home since 1983, a three-story house west of campus, was renamed the Joseph L. Sample Studios in honor of the Montana broadcasting pioneer.
Stations and translators
Yellowstone Public Radio is broadcast by twelve full-power stations. The network is also relayed by an additional 28 translators to widen its broadcast area.
Notes:
References
External links
Yellowstone Public Radio
Billings metropolitan area
Montana State University Billings
NPR member networks
1972 establishments in Montana
American radio networks
Radio broadcasting companies of the United States
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.