source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/David%20Axmark
|
David Axmark, born 28 May 1962 in Sweden, is one of the founders of MySQL AB and a developer of the free database server, MySQL. He has been involved with MySQL development from its beginning along with the fellow co-founder Michael Widenius. He studied at Uppsala University between 1980 and 1984
David has been involved with free software since 1980 and has said he is committed to developing a successful business model using free open source software. During early 2010 David made a Series A financing for OrangeHRM, "The World's Most Popular Open Source Human Resource Management Software".
David is a director at OrangeHRM.
On 4 December 2012, David Axmark, together with the other MySQL founders, Michael "Monty" Widenius and Allan Larsson, announced the MariaDB Foundation.
References
External links
From Visions to Reality - an interview with David Axmark
http://www.24-7pressrelease.com/press-release/orangehrm-closes-on-series-a-financing-147085.php
Swedish computer programmers
Free software programmers
Living people
1962 births
|
https://en.wikipedia.org/wiki/Purble%20Place
|
Purble Place is a suite of three educational computer games developed by Oberon Media for Windows Vista and Windows 7.
History
Purble Place was publicly introduced in Windows Vista build 5219 along with Chess Titans and Mahjong Titans.
Games
The collection has a single home screen that offers three packs of games: Purble Pairs, Comfy Cakes and Purble Shop.
Purble Pairs
Purble Pairs is a pattern recognition and memory game similar to Concentration. The object is to clear the tableau in the fewest turns. As the skill level progresses, a timer appears, the grid size increases, and more similar pictures are used. The Beginner level has one 5x5 grid, Intermediate has two 6x6 grids, and Advanced has four 8x8 grids to solve per game (shamrocks, hearts, smiley faces or gumdrops). In addition to a jester that automatically finds another match of an exposed card, numerous special pairs are present in the higher levels, such as a card of the cake batter station in Comfy Cakes that shuffles the board when paired, a clock that adds more time to the timer, and a Comfy Cakes chef that automatically finds and matches pairs of cards containing cakes. A Sneak Peek coin bonus allows the player to expose all remaining cards for a couple of seconds, but every card exposed in this way is counted as a turn. This game is not available in Purble Place v0.4, an early version from 2005.
Comfy Cakes
Comfy Cakes is a hand-eye coordination game, the goal being to fill orders in a bakery by assembling a cake to match a given cake specification on a mobile by controlling a conveyor belt that brings the cake to various stations. Elements of the cake include cake pan shapes (square, circular or heart-shaped), flavor of batter (strawberry, chocolate or vanilla), three cake layerings (red, green or white), optional icing (strawberry, chocolate or vanilla), and other decorations (for instance, sugar may be sprinkled on top of the cake, and in rarer cases, flames are applied to iced cakes to create a smooth glaze), and a rotate button in v0.4. If the cake does not match the specification on the television, the player is penalized, and the cake gets thrown away. If the player sends two or three incorrect orders, the game is over. After a certain number of correct orders are shipped in the box, the player wins the game, and the score is tabulated. The final score depends upon the number of cakes baked, the number of incorrect orders sent and the efficiency of the player. At higher levels the specifications become more complex and multiple cakes must be manufactured in parallel on a single conveyor belt. The player makes about five or six (or eight in v0.4) cakes in one of the difficulty levels. When the player does not get the features in the wax paper, the computer tells them the move is disallowed.
Purble Shop
Purble Shop is a code-breaker game. The computer decides the color of up to five features (topper (hair in version 0.4), eyes, nose, mouth and clothes) that are concealed
|
https://en.wikipedia.org/wiki/DELTA%20%28taxonomy%29
|
DELTA (DEscription Language for TAxonomy) is a data format used in taxonomy for recording descriptions of living things. It is designed for computer processing, allowing the generation of identification keys, diagnosis, etc.
It is widely accepted as a standard and many programs using this format are available for various taxonomic tasks.
It was devised by the CSIRO Australian Division of Entomology in 1971 to 2000, with a notable part taken by Dr. Michael J. Dallwitz. More recently, the Atlas of Living Australia (ALA) rewrote the DELTA software in Java so it can run in a Java environment and across multiple operating systems. The software package can now be found at and downloaded from the ALA site.
DELTA System
The DELTA System is a group of integrated programs that are built on the DELTA format. The main program is the DELTA Editor, which provides an interface for creating a matrix of characters for any number taxa. A whole suite of programs can be found and run from within the DELTA editor which allow for the output of an interactive identification key, called Intkey. Other powerful features include the output of natural language descriptions, full diagnoses, and differences among taxa.
References
External links
DELTA for beginners. An introduction into the taxonomy software package DELTA
Taxonomy (biology)
|
https://en.wikipedia.org/wiki/KFVE
|
KFVE (channel 6) is a television station licensed to Kailua-Kona, Hawaii, United States, serving the Hawaiian Islands as an affiliate of the Spanish-language Telemundo network. It is owned by Gray Television alongside CBS affiliate KGMB (channel 5) and NBC affiliate KHNL (channel 13). The stations share studios on Waiakamilo Road in Honolulu's Kapālama neighborhood, while KFVE's transmitter is located near Kalaoa, Hawaii.
KFVE serves a area, and covers an estimated population of 71,400. The station's signal is relayed on satellite station KLEI, channel 21 in Wailuku (owned by Mango Broadcasting and operated by Gray under a local marketing agreement (LMA)), on KHNL's sixth digital subchannel, and on KKAI's second digital subchannel.
History
The station went on the air in 1988 as KVHF, a satellite of Mauna Kea Broadcasting's KMGT channel 26, and changed its call letters to KLEI on March 9, 1992. The station was affiliated with Pax TV/i/Ion (as a satellite of KPXO-TV), and later with The Family Channel in 2011.
On October 19, 2012, KLEI was granted statewide must-carry status on the Oceanic Time Warner Cable (now Spectrum) and Hawaiian Telcom cable services, provided it delivers a good quality signal to the cable television headends.
In late 2017, KLEI dropped its Family Channel affiliation and became Hawaii's first over-the-air affiliate of Spanish-language network Telemundo, filling a void in the market for a Spanish language station that opened up when KHLU-CD (a Univision affiliate) ceased operations in 2016. Shortly after assuming the Telemundo affiliation, KLEI became available on all cable systems in Hawaii for the first time.
On December 3, 2018, the station's call sign changed to KSIX-TV.
On July 8, 2020, Gray Television, owner of Honolulu-based stations KGMB and KHNL and their satellites, agreed to purchase KSIX-TV for $1 million, pending approval of the Federal Communications Commission (FCC). Maui-based satellite KLEI was not included in the sale. The transaction was finalized on September 9. The call letters of KSIX-TV and Hilo's KFVE were switched on November 13.
Subchannel
References
Television channels and stations established in 1988
FVE
1988 establishments in Hawaii
Telemundo network affiliates
Gray Television
|
https://en.wikipedia.org/wiki/Celebrity%20Family%20Feud
|
Celebrity Family Feud is a broadcast network spin-off of the syndicated American game show Family Feud. Like the primetime All-Star Specials aired during the late 1970s and early 1980s by the show's then-network home ABC, the episodes feature celebrities and their real families, or teams of celebrities playing as a 'family' for charity, rather than the regular format of ordinary families playing for cash and prizes.
Since 2015, the series has aired as part of ABC's "Summer Fun & Games" block of primetime game shows.
History
The first incarnation of the spin-off was broadcast in 2008 by NBC as part of a block of summer reality series it branded as All-American Summer. Instead of featuring the host of the syndicated version at the time, John O'Hurley (who was hosting the short-lived Secret Talents of the Stars for CBS), the NBC celebrity version was hosted by Al Roker of NBC's morning show Today. This incarnation only lasted for one season before it was cancelled in March 2009. There were six episodes, with the first episode airing on June 24, 2008 and the last episode airing on July 29, 2008.
On April 9, 2015, ABC announced that it had picked up a new incarnation of Celebrity Family Feud, premiering on June 21, 2015 and hosted by Steve Harvey—the current host of the syndicated version of Family Feud. It marked the first time that any version of Family Feud aired on ABC since the end of the original version hosted by Richard Dawson in June 1985. Unlike the current syndicated version of Feud, which was taped in Atlanta, Georgia from 2011 until 2017 and again since 2020, this version has always been produced in Los Angeles, California, and features the return of Burton Richardson, who announced the show from 1999 to 2010, to the series. On August 4, 2016, ABC renewed Celebrity Family Feud for a fourth season. On August 6, 2017, ABC renewed Celebrity Family Feud for a fifth season and premiered on June 10, 2018. On August 7, 2018, ABC renewed Celebrity Family Feud for a sixth season, which premiered on June 9, 2019. On November 20, 2019, the series was renewed for a seventh season which premiered on May 31, 2020. On March 28, 2021, the series was renewed for an eighth season which premiered on June 6, 2021. On April 1, 2022, the series was renewed for a ninth season, which premiered on July 10, 2022.
On January 11, 2023, the series was renewed for a tenth season, which premiered on July 9, 2023. Season 10 is the first season to air in the 9:00 PM ET hour, as previous seasons aired at 8:00 PM ET.
Under the terms of Fremantle's agreement with ABC, the network has a strict limit on how many episodes of Celebrity Family Feud it can release each season, so as not to compete against Family Feud's regular run in syndication.
Series overview
Format
During the NBC run of Celebrity Family Feud, each episode featured a tournament format with three games. The winners of the two semi-final games played a final game, with the winner advancing to Fast Money.
|
https://en.wikipedia.org/wiki/CNN-News18
|
Cable News Network-News18 (known as CNN-News18 and originally CNN-IBN) is an Indian English-language news television channel founded by Raghav Bahl based in Noida, Uttar Pradesh, India. It is currently co-owned by Network18 Group and Warner Bros. Discovery. CNN provides international coverage for the channel, while Indian Broadcasting Network concentrates on Indian and local reports.
In May 2014, Reliance Industries announced it would be taking over Network18. The move was touted as "the biggest-ever deal in the Indian media space". Reliance Industries already had indirect control of the TV18 network by virtue of investments it made in Network18 starting from January 2012.
History
CNN International only reached the urban population in India. To reach the Indian masses Turner Broadcasting System together with an Indian company, Global Broadcast News (currently TV18 Broadcast Limited), launched the channel in India as CNN-IBN on 18 December 2005. The channel was completely run by TV18 Broadcast Limited, which only used the Cable News Network (CNN) brand name.
Currently, Time Warner's India-specific CNN-News18 is watched by more people than its CNN International sister network, although both channels are in English.
According to Network 18, since its inception, the channel has been reaching out to an average of 45 million households every day.
In 2015, it was announced that a licensing agreement between Turner Broadcasting and Network 18 had not been renewed and would expire in January 2016.
On 1 December 2015, it was announced the brand licensing had been renewed for another term.
On April 18, 2016, at 7:57pm, it was rebranded to CNN-News18, and began using the slogan "On Your Side."
The channel has been accused by activists of supporting the ideology of the ruling Modi government.
Shows
Rolling-news
News18 Headstart: Developing stories of the morning and newsworthy events
8 AM Express and The Morning News: two morning news shows that provides the latest news from around the world aimed at preparing the viewers for the day ahead. Hosted by rotating anchors.
News18: a general news bulletin with live news updates throughout the day
Afternoon Prime: A news review of the stories that made the headlines since morning and provides an overview of what lies ahead for the remainder of the day.
India 360: a 30-minute news bulletin covering national, international, business, sports, crime, and entertainment news in a fast-paced, crisp and concise manner, presented by senior associate editor Arunoday Mukharji. The show replaced News 360 on 24 April 2017. Airing at 8 pm until 6 February 2018, when it was moved to 7:30 pm.
Vantage with Palki Sharma: a prime time news analysis launched by former WION leading anchor Palki Sharma in 2023. broadcast every 9pm on FirstPost, 10pm on CNN-News18
News roundups and debates
Late Night Edition: news bulletin that wraps up the important news of the day, with analyses of their possible impact
News Epicent
|
https://en.wikipedia.org/wiki/TAC-2
|
The Totally Accurate Controller MK2 (TAC-2), manufactured by Suncom Technologies, is an Atari 2600 compatible joystick, commonly used with the Commodore 64 and Amiga computers in the mid to late 1980s. It has two smaller siblings, the Slik Stik and StarFighter, which are built in a similar fashion. The joystick's square base came in two colours, black or cream.
Features:
One 8-way stick (4 digital switches)
Two fire buttons (wired in parallel as button 1; indistinguishable in software)
Technical features:
TAC-2 has no microswitches. Instead, it uses a metal ball that short-circuits contacts around the bottom shaft of the controller.
The fire buttons in the original version work with brass contact plates which tend to become oxidized and thus need care every now and then.
9-pin Atari style connector (DE-9 connector)
The handle is a customized tyre valve (TR-418) with a chrome sleeve, which gives the TAC-2 its special characteristics.
A cost reduced version was released, in which the tyre valve was skipped. Instead, a white rubber gasket held a black plastic tube, the shafted metal ball inside was simply plugged into it (not screwed as the original version), and the brass plates in the buttons were replaced with the wire of the redesigned button return spring. It is mainly recognized by its shiny plastic stick instead of the chrome valve sleeve and deeper red buttons instead of the original orange.
References
External links
The Vintage Joystick Museum
Joysticks
|
https://en.wikipedia.org/wiki/Tools%20for%20Thought
|
Tools for Thought: The History and Future of Mind-Expanding Technology is a work of "retrospective futurism" in which Smart Mobs author Howard Rheingold looked at the history of computing and then attempted to predict what the networked world might look like in the mid-1990s. The book covers the groundbreaking work of thinkers like Alan Turing, John von Neumann, and J.C.R. Licklider, as well as Xerox PARC, Apple Computer, and Microsoft (when Microsoft was "aiming for the hundred-million-dollar category"). Rheingold wrote that the impetus behind Tools for Thought was to understand where "mind-amplifying technology" was going by understanding where it came from.
External links
MIT Press printed a revised edition of "Tools for Thought" in April 2000.
Rheingold.com has the original 1985 text available online.
History of computing
|
https://en.wikipedia.org/wiki/Roger%20Rasheed
|
Roger Rasheed (born 10 March 1969) is a former Australian rules football player, tennis player, tennis coach and tennis commentator with the Seven Network for 12 years. Rasheed is best known as Grand Slam coach of Australian former World No. 1 Lleyton Hewitt, former World No. 6 Gaël Monfils, former World No. 5 Jo-Wilfried Tsonga, former World No. 3 Grigor Dimitrov and through his own website ProTennisCoach.com. In addition, Rasheed is a media personality on Channel Seven and is the founder of the Roger Rasheed Sports Foundation.
Career
Player
Prior to his work as a coach, Rasheed was the youngest ever player to qualify for an Australian Open in 1985 at 16 years of age, a feat eclipsed by Lleyton Hewitt, whom Rasheed later coached. Rasheed also competed in the ATP Challenger Series and won four titles in 1992. He reached number 192 in ATP rankings and number 132 in the doubles rankings in 1992.
Coaching
In Australia, Rasheed is notable as Lleyton Hewitt's coach from 2003 until 2007. During Rasheed's tenure as coach, Hewitt enjoyed significant domestic and international success, including becoming the first Australian in seventeen years to reach the Australian Open final and winning the 2006 Queen's Club Championships. Whilst Hewitt's coach, Rasheed also was the coach of the Australian Davis Cup team in 2006.
Rasheed then coached Gaël Monfils from July 2008 to July 2011 which coincided with Monfils rise in rankings from 38 to 7 in the ATP World Rankings. Since, Rasheed coached Frenchman and former Australian Open finalist Jo-Wilfried Tsonga between October 2012 and 2013. Tsonga achieved considerable success over this period, including defeating Roger Federer in straight sets at the French Open.
Since October 2013, Rasheed agreed to coach Bulgarian Grigor Dimitrov, the most successful Bulgarian male tennis player, both in financial and ranking terms, in history. Dimitrov credited Rasheed for his success in the 2014 Australian Open. Following a run of poor results in 2015, which culminated in a straight-sets defeat to Richard Gasquet at Wimbledon, Rasheed parted ways with Dimitrov.
ProTennisCoach.com
With Paul Annacone, Brad Gilbert and Darren Cahill, Rasheed developed ProTennisCoach.com — a professional and open coaching website launched in 2013.
Media
Rasheed regularly commentated both men's and women's matches in the Australian Open for the Seven Network between 2007 and 2018. In particular, Rasheed was known for his court-side commentary and special analysis.
He now works for the broadcaster Nine Network whilst working for the Tennis Australia world feed in an expert commentary role.
Foundation
In addition, Rasheed has launched the Roger Rasheed Sports Foundation a not for profit organisation which focuses on children's health across socioeconomic and geographic boundaries. Greg Norman is the Foundation's patron. The organisation's first project is developing the Rajah Street Community Reserve in the City of Marion, Adelaide.
Personal l
|
https://en.wikipedia.org/wiki/Type%20enforcement
|
The concept of type enforcement (TE), in the field of information technology, is an access control mechanism for regulating access in computer systems. Implementing TE gives priority to mandatory access control (MAC) over discretionary access control (DAC). Access clearance is first given to a subject (e.g. process) accessing objects (e.g. files, records, messages) based on rules defined in an attached security context. A security context in a domain is defined by a domain security policy. In the Linux security module (LSM) in SELinux, the security context is an extended attribute. Type enforcement implementation is a prerequisite for MAC, and a first step before multilevel security (MLS) or its replacement multi categories security (MCS). It is a complement of role-based access control (RBAC).
Control
Type enforcement implies fine-grained control over the operating system, not only to have control over process execution, but also over domain transition or authorization scheme. This is why it is best implemented as a kernel module, as is the case with SELinux. Using type enforcement is a way to implement the FLASK architecture.
Access
Using type enforcement, users may (as in Microsoft Active Directory) or may not (as in SELinux) be associated with a Kerberos realm, although the original type enforcement model implies so. It is always necessary to define a TE access matrix containing rules about clearance granted to a given security context, or subject's rights over objects according to an authorization scheme.
Security
Practically, type enforcement evaluates a set of rules from the source security context of a subject, against a set of rules from the target security context of the object. A clearance decision occurs depending on the TE access description (matrix). Then, DAC or other access control mechanisms (MLS / MCS, ...) apply.
History
Type enforcement was introduced in the Secure Ada Target architecture in the late 1980s with a full implementation developed in the Logical Coprocessing Kernel (LOCK) system. The Sidewinder Internet Firewall was implemented on a custom version of Unix that incorporated type enforcement.
A variant called domain type enforcement was developed in the Trusted MACH system.
The original type enforcement model stated that labels should be attached to subject and object: a “domain label” for a subject and a “type label” for an object. This implementation mechanism was improved by the FLASK architecture, substituting complex structures and implicit relationship. Also, the original TE access matrix was extended to other structures: lattice-based, history-based, environment-based, policy logic... This is a matter of implementation of TE by the various operating systems. In SELinux, TE implementation does not internally distinguish TE-domain from TE-types. It should be considered a weakness of TE original model to specify detailed implementation aspects such as labels and matrix, especially using the terms “do
|
https://en.wikipedia.org/wiki/Star%20Sports
|
Star Sports refers to several current or former Asian sports networks owned by The Walt Disney Company:
Star Sports (East Asian TV channel)
Star Sports (Indian TV network)
Fox Sports (Southeast Asian TV network)
See also
Star TV (disambiguation)
|
https://en.wikipedia.org/wiki/BLEU
|
BLEU (bilingual evaluation understudy) is an algorithm for evaluating the quality of text which has been machine-translated from one natural language to another. Quality is considered to be the correspondence between a machine's output and that of a human: "the closer a machine translation is to a professional human translation, the better it is" – this is the central idea behind BLEU. Invented at IBM in 2001, BLEU was one of the first metrics to claim a high correlation with human judgements of quality, and remains one of the most popular automated and inexpensive metrics.
Scores are calculated for individual translated segments—generally sentences—by comparing them with a set of good quality reference translations. Those scores are then averaged over the whole corpus to reach an estimate of the translation's overall quality. Intelligibility or grammatical correctness are not taken into account.
BLEU's output is always a number between 0 and 1. This value indicates how similar the candidate text is to the reference texts, with values closer to 1 representing more similar texts. Few human translations will attain a score of 1, since this would indicate that the candidate is identical to one of the reference translations. For this reason, it is not necessary to attain a score of 1. Because there are more opportunities to match, adding additional reference translations will increase the BLEU score.
Mathematical definition
Basic setup
A basic, first attempt at defining the BLEU score would take two arguments: a candidate string and a list of reference strings . The idea is that should be close to 1 when is similar to , and close to 0 if not.
As an analogy, the BLEU score is like a language teacher trying to score the quality of a student translation by checking how closely it follows the reference answers .
Since in natural language processing, one should evaluate a large set of candidate strings, one must generalize the BLEU score to the case where one has a list of M candidate strings (called a "corpus") , and for each candidate string , a list of reference candidate strings .
Given any string , and any integer , we define the set of its n-grams to be Note that it is a set of unique elements, not a multiset allowing redundant elements, so that, for example, .
Given any two strings , define the substring count to be the number of appearances of as a substring of . For example, .
Now, fix a candidate corpus , and reference candidate corpus , where each .
Modified n-gram precision
Define the modified n-gram precision function to be The modified n-gram, which looks complicated, is merely a straightforward generalization of the prototypical case: one candidate sentence and one reference sentence. In this case, it is To work up to this expression, we start with the most obvious n-gram count summation:
This quantity measures how many n-grams in the reference sentence are reproduced by the candidate sentence. Note that we count the n
|
https://en.wikipedia.org/wiki/Society%20of%20Business%20Practitioners
|
The Society of Business Practitioners (SBP) UK, founded in 1956, is a senior examining UK institution providing vocational qualifications in business, computer studies, management and marketing. The Society's Diploma awards attract recognized credits and exemptions from other institutes and educational establishments from the UK, the US and Australia. The Society also has a collaborative credit recognition arrangement with the New Zealand College of Business.
All courses are set, moderated and examined at the undergraduate level. The Society's courses are listed in the UK Learning and Skills Council's (now Skills Funding Agency) Learning Aim Database.
The Society's highest awards leading to a Postgraduate Diploma in Business Administration or the Graduate Diploma in Business and Management, are essentially a British professional qualification. However, in academic terms it may be comparable to a bachelor's degree standard. They lead to a professional designation title of Certified Professional Manager - CPM.
In line with the constant review and update of syllabus content of courses, specialist courses had been developed. These include individualized training programs via the Continuing Professional Development - CPD units specially tailored for the corporate industries. A three-stage information technology course was introduced in 2005. An advanced diploma in accounting program (ADA) examined at the accounting technician level was launched in 2007.
The Society professional membership structure has been revised, to introduce an examinable, work based senior awards assessment program leading to qualifications pegged at the British NQF, National Qualifications Framework levels 4 through 7.
The Society is a member of the National Institute of Adult Continuing Education ( NIACE), and is registered on the UK Register of Learning Providers.
See also
Professional qualifications in the United Kingdom
List of British professional bodies
Professional certification (business)
References
External links
UK website
Asia Pacific Region
British Qualifications Directory
Business Practitioners
Non-profit organisations based in the United Kingdom
|
https://en.wikipedia.org/wiki/Ashlawn%20School
|
Ashlawn School (or simply Ashlawn), is a large partially selective secondary school located in the Hillmorton area of Rugby, Warwickshire, England that specialises in science, computing and leadership. It is one of only five bilateral schools in England for students aged 11–18. Ashlawn is a member of the Transforming Lives Educational Trust (TLET) family of schools.
Ashlawn School was formerly a National Teaching School. It was granted this status in October 2014. These schools were judged to be 'outstanding' by Ofsted. This function has since transferred to the Transforming Lives Educational Trust's Education Improvement Service, who offer Initial Teacher Education for trainee teachers.
In both November 2007 and November 2013, the school was awarded an Ofsted Outstanding rating (the highest rating). Siobhan Evans took over as Principal in January 2019 and inspectors visited again four years later in November 2022. This report awarded the school an Ofsted Inadequate rating (the lowest possible rating).
Ashlawn's 2022 report placed the number of pupils at 1,827, with 398 of those being students in the sixth form.
History
Foundation
Ashlawn School opened its doors in 1952, under the name of Dunsmore School for Girls. The headmistress at the time was Miss Kathleen Hughes, and the school site still stands as Ashlawn’s ‘west’ site. Shortly after, in 1958, Dunsmore School for Boys opened, which was the present ‘east’ site of the school. The headmaster of the boys’ school was Mr Frank Hodgson. The two schools, along with Fareham High School (on Fareham Avenue, Hillmorton) merged to form today’s Ashlawn School in 1985.
Headteachers
1952–1985 (DsG) – Kathleen Hughes
1958–1975 (DsB) – Frank Hodgson
1975–1985 (DsB) – Eric Needham
1985–2008 (Ashlawn) – Peter Rossborough
2008– 2018 (Ashlawn) – Lois Reed
Principals
2019–2022 (Ashlawn) – Siobhan Evans
2023– Present (Ashlawn) – Paul Brockwell (Associate Principal)
Recent history
In 2005 the school was granted Special Science College status, entitling the establishment to government grants for new educational equipment, such as portable tablets with internet access. These are linked to data projectors so that presentations and research can be done online and easily in front of a class. In April 2009 it was also awarded Leadership College status. Both achievements have been commemorated with the construction of monuments: a rainbow coloured piece of modern art (created by a local artist), for the Science College status; and a large text embossed sun, for the Leadership status.
In early 2007 the school received planning permission from Rugby Borough Council to erect a wind turbine at the school. In 2010, a number of Ashlawn's buildings were fitted with solar panels.
In October 2012, work began on a new bespoke expressive arts centre which was completed in mid-2013. The centre is now available out of hours (e.g. the dance studio, drama rooms) marking the school's first building partially dedicat
|
https://en.wikipedia.org/wiki/Alto%20Trek
|
Alto Trek is a computer game, developed by Gene Ball and Rick Rashid for the Xerox Alto while they were graduate students at the University of Rochester during the late 1970s. It is one of the first networked multiplayer games.
Gameplay
Alto Trek is a multiplayer game where each player uses their own Alto workstation to control a starship. The objective of the game is to destroy the enemy without being destroyed. A player can choose between being a Klingon, Romulan, or Terran. The game can be played by one player, but there will be no enemy to destroy.
There is no central server that maintains the game state. Each Alto "multicasts" it's game information on the shared Ethernet that all players must be on. The "multicast" address on which to rendezvous is a function of the number of stellar systems in the game.
Development
The manual for version 2.1 is dated August 1979 and authored by Allen Wells, Bob Baldwin, and Steve Quarterman. It confirms that the game was authored primarily by Ball.
Around 1997, while a vice president at Microsoft, Rashid began to re-implement the game as a way to teach himself to use the DirectX programming API. This resulted in the development of Microsoft Allegiance.
References
External links
Internet Archive - Alto Trek 2.1 manual
1978 video games
Video games based on Star Trek
Xerox Alto games
Video games developed in the United States
|
https://en.wikipedia.org/wiki/Morning%20Glory%20%28TV%20programme%29
|
Morning Glory is the fourth attempt at breakfast television live programming on Channel 4. It was presented by Dermot O'Leary every weekday morning from 8:30–9 am. Due to low ratings, despite having Big Brother's Little Breakfast as a lead in show, it was not renewed.
The show followed on from Celebrity Big Brother 4 which ran in January 2006. The 4 Hero Les Fleurs theme was used to usher in the show. The set was predominantly red with the show's logo displayed animated with birds flying around it. Its aim was to provide entertainment interviews and not news and weather like its previous incarnations.
References
Channel 4 original programming
2006 British television series debuts
2006 British television series endings
Breakfast television in the United Kingdom
|
https://en.wikipedia.org/wiki/RDT
|
RDT may refer to:
Digital technology
Real Data Transport, a proprietary data transport protocol
Remote data transmission, the transmission of data between computers over a medium using a communications protocol
Remote digital terminal, in telecommunications
Reliable Data Transfer, in computer networking
Medicine
Rapid diagnostic test
People
Raúl de Tomás
RealDonaldTrump
Organisations
Rangoon Development Trust
Rosslyn Data Technologies
Royal Danish Theatre
Transport
Radlett railway station (National Rail station code), England
Richard Toll Airport (IATA code)
|
https://en.wikipedia.org/wiki/Normalized%20difference%20vegetation%20index
|
The normalized difference vegetation index (NDVI) is a widely-used metric for quantifying the health and density of vegetation using sensor data. It is calculated from spectrometric data at two specific bands: red and near-infrared. The spectrometric data is usually sourced from remote sensors, such as satellites.
The metric is popular in industry because of its accuracy. It has a high correlation with the true state of vegetation on the ground. The index is easy to interpret: NDVI will be a value between -1 and 1. An area with nothing growing in it will have an NDVI of zero. NDVI will increase in proportion to vegetation growth. An area with dense, healthy vegetation will have an NDVI of one. NDVI values less than 0 suggest a lack of dry land. An ocean will yield an NDVI of -1.
Brief history
The exploration of outer space started in earnest with the launch of Sputnik 1 by the Soviet Union on 4 October 1957. This was the first man-made satellite orbiting the Earth. Subsequent successful launches, both in the Soviet Union (e.g., the Sputnik and Cosmos programs), and in the U.S. (e.g., the Explorer program), quickly led to the design and operation of dedicated meteorological satellites. These are orbiting platforms embarking instruments specially designed to observe the Earth's atmosphere and surface with a view to improve weather forecasting. Starting in 1960, the TIROS series of satellites embarked television cameras and radiometers. This was later (1964 onwards) followed by the Nimbus satellites and the family of Advanced Very High Resolution Radiometer instruments on board the National Oceanic and Atmospheric Administration (NOAA) platforms. The latter measures the reflectance of the planet in red and near-infrared bands, as well as in the thermal infrared. In parallel, NASA developed the Earth Resources Technology Satellite (ERTS), which became the precursor to the Landsat program. These early sensors had minimal spectral resolution, but tended to include bands in the red and near-infrared, which are useful to distinguish vegetation and clouds, amongst other targets.
With the launch of the first ERTS satellite – which was soon to be renamed Landsat 1 – on July 23, 1972 with its MultiSpectral Scanner (MSS) NASA funded a number of investigations to determine its capabilities for Earth remote sensing. One of those early studies was directed toward examining the spring vegetation green-up and subsequent summer and fall dry-down (the so-called “vernal advancement and retrogradation”) throughout the north to south expanse of the Great Plains region of the central U.S. This region covered a wide range of latitudes from the southern tip of Texas to the U.S.-Canada border, which resulted in a wide range of solar zenith angles at the time of the satellite observations.
The researchers for this Great Plains study (PhD student Donald Deering and his advisor Dr. Robert Hass) found that their ability to correlate, or quantify, the biophysical chara
|
https://en.wikipedia.org/wiki/NC%20machine
|
The term NC machine can refer to:
Network computer
Numerical control
For other uses of the abbreviation "NC", see NC (disambiguation).
|
https://en.wikipedia.org/wiki/NCRP
|
NCRP may refer to one of the following:
National Council on Radiation Protection and Measurements, USA
Network Computer Reference Profile
National Committee for Responsive Philanthropy
|
https://en.wikipedia.org/wiki/Nsupdate
|
nsupdate is a computer network maintenance utility used by network administrators to instruct the name server of a DNS zone to update its database. The name server might be local to a domain or, with appropriate authentication and permission provided by DNSSEC, an internet name server.
BIND 8 and later supports this feature.
See also
Daemon (computer software)
External links
nsupdate: Quick and Painless Dynamic DNS
NSUPDATE HOWTO by Stef Caunter, Feb 2003. Updated Jan 28, 2005.
Debian Administration System Administration Tips and Resources
References
Internet Protocol based network software
Domain Name System
|
https://en.wikipedia.org/wiki/DMZ%20%28disambiguation%29
|
DMZ is a demilitarized zone, a buffer zone between military powers.
DMZ may also refer to:
Science and technology
DMZ (computing), a demilitarized zone in network computing
DMZGlobal, a security division of Vodafone
Dimethylzinc, a chemical
Arts and media
Comics
DMZ (comics), an American comic book series
DMZ, a character in the Blood Syndicate universe
Music
DMZ (band), a 1970s Boston punk band
DMZ (DMZ album), 1978
D.M.Z. (Resurrection Band album), 1982
A dubstep record label and clubnight, run by Digital Mystikz
Television
DMZ (miniseries), a miniseries based on the comic book
Other uses
Korean Demilitarized Zone, across the Korean Peninsula
DMZ International Documentary Film Festival, a South Korean documentary film festival
The DMZ (Toronto Metropolitan University), (formerly the Digital Media Zone), Toronto Metropolitan University's business incubator for early-stage technology startups
|
https://en.wikipedia.org/wiki/Inner%20loop%20%28disambiguation%29
|
Inner loop may refer to:
Inner loop in computer programs
Inner Loop (Phoenix), a section of Interstate 10 in downtown Phoenix, Arizona, United States
Inner Loop (Rochester), an expressway around downtown Rochester, New York, United States
Inner Loop (Washington, D.C.), a previously proposed freeway loop in Washington, D.C., United States
Inner–outer directions, where "inner loop" is used to describe the clockwise traveling lanes of a roadway
This usage of "inner loop" is commonly applied to the clockwise roadway of Interstate 495 (Capital Beltway)
Interstate 610 (Texas), the innermost highway loop around the central area of Houston, Texas, United States
A freeway loop in Nashville, Tennessee, that consists of sections of I-24, I-40, and I-65
|
https://en.wikipedia.org/wiki/Hugh%20McGregor%20Ross
|
Hugh McGregor Ross (31 August 1917 – 1 September 2014) was an early pioneer in the history of British computing. He was employed by Ferranti from the mid-1960s, where he worked on the Pegasus thermionic valve computer. He was involved in the standardization of ASCII and ISO 646 and worked closely with Bob Bemer. ASCII was first known in Europe as the Bemer–Ross Code. He was also one of the four main designers of ISO 6937, with Peter Fenwick, Bernard Marti and Loek Zeckendorf. He was one of the principal architects of the Universal Character Set ISO/IEC 10646 when it was first conceived.
Hugh was an expert in the Gospel of Thomas and wrote several books about it. He was a Quaker, and also wrote about George Fox. His working papers on the teachings of Fox are held at Yorkshire Quaker Heritage Project.
Books by Hugh McGregor Ross
George Fox Speaks for Himself: Texts that reveal his personality—many hitherto unpublished. York: William Sessions, 1991.
Говорит сам Джордж Фокс: тексты, раскрывающие его личнотсь (многие публикуются впервые). Отобрано, отредактировано и представлено Хью Мак-Грегором Россом. Ленинград: [s.n.].
The Gospel of Thomas: newly presented to bring out the meaning, with introductions paraphrases and notes. Colchester: The Millrind Press, 1997. . Second edition Element Books, . First edition York: Ebor Press,
Jesus untouched by the Church: His Teachings in the Gospel of Thomas. Calligraphy by John Blamires. York: William Sessions Limited, 1998.
Thirty Essays on the Gospel of Thomas. Cathair na Mart: Evertype, 2008. . 4th edition Watkins Publishing.
George Fox: A Christian mystic. Cathair na Mart: Evertype, 2008.
References
External links
The Gospel of Thomas collection. Hugh McGregor Ross' web site about translation and commentary on the Gospel of Thomas.
1917 births
2014 deaths
English computer scientists
English Quakers
History of computing in the United Kingdom
People involved with Unicode
|
https://en.wikipedia.org/wiki/Libxml2
|
libxml2 is a software library for parsing XML documents. It is also the basis for the libxslt library which processes XSLT-1.0 stylesheets.
Description
Written in the C programming language, libxml2 provides bindings to C++, Ch, XSH, C#, Python, Swift, Kylix/Delphi and other Pascals, Ruby, Perl, Common Lisp, and PHP. It was originally developed for the GNOME project, but can be used outside it. libxml2's code is highly portable since it only depends on standard ANSI C libraries and it is available under the MIT license.
It includes the command-line utility xmllint and an HTML parser.
See also
libxslt (the LibXML2's XSLT module)
XML validation
Comparison of HTML parsers
Expat (library)
Saxon XSLT
Xerces
References
External links
XML::LibXML Perl module
C (programming language) libraries
Free software programmed in C
GNOME libraries
Software using the MIT license
XML parsers
|
https://en.wikipedia.org/wiki/Gateway%20AnyKey
|
The Gateway AnyKey is a programmable PC keyboard that was sold with desktop computers from the Gateway 2000 company roughly from 1990 to 1997. It was manufactured in at least five known versions and incarnations by Tucson, Arizona-based Maxi Switch, now a subsidiary of LiteOn Technology Corporation. The AnyKey is no longer manufactured, with the latest dated model available marked 1997. Maxi Switch, Gateway, and LiteOn currently do not offer any product labeled as or comparable to the AnyKey.
The AnyKey keyboard is easily distinguished from other generic keyboards by an extra double column of F keys on the left side, a unique eight directional arrow key pad as opposed to the traditional inverted T, and a quartet of extra keys directly above the numeric pad that control the programmable aspects of the keyboard. They are labeled “Program Macro”, “Suspend Macro”, “Repeat Rate”, and “Remap”, reading left to right. All versions of the AnyKey are white or very light gray with some keys (notably the programming keys, extra function keys, and arrows) in a darker gray.
Features and construction
The AnyKey is a 124-key PC keyboard, comprising the usual complement of 101 keys as well as 23 additional keys. The keyboard includes 12 extra function keys, four programming keys, and four additional arrow keys for diagonal input, as well as one blank key in the center of the eight way arrow key area that normally acts as a second space bar but can be programmed.
The AnyKey has a fourth indicator light labeled “Program,” located to the right of the Num Lock, Caps Lock, and Scroll Lock lights. Revisions of its design that predate the advent of the “Windows” keyboard have an asterisk (*), backslash (\), or hash (#) in the windows key locations, depending on the intended locale. Since the design of the AnyKey predates the “multimedia PC,” it lacks the additional multimedia keys (play, pause, volume) present on many modern keyboards.
A unique feature of the AnyKey is its hardware programmability. The keyboard contains an internal controller as well as an EEPROM chip that can store user-defined macros. Any key on the keyboard can be programmed to contain a macro of arbitrary length or can be programmed to act like any other key on the keyboard (remapped). This is done on the hardware level inside the keyboard's controller itself. No driver software is required to use the AnyKey’s programming functionality, as the keyboard’s own controller dictates which keypress codes are sent to the attached computer. A utility for MS-DOS exists to quickly remap the entire keyboard to a predefined configuration or save its current configuration to a file, but it is not required to use or program the keyboard. The AnyKey’s EEPROM memory will retain its data even if the keyboard is unplugged indefinitely, so settings and programming aren’t lost if the computer is powered down, unplugged, or if the keyboard is unplugged or moved to a different computer.
The keyboard can be progr
|
https://en.wikipedia.org/wiki/Virtual%20patient
|
The term virtual patient is used to describe interactive computer simulations used in health care education to train students on clinical processes such as making diagnoses and therapeutic decisions. Virtual patients attempt to combine modern technologies and game-based learning to facilitate education, and complement real clinical training. Using virtual patients is increasing in healthcare due to increased demands on healthcare professionals, education of healthcare trainees, and providing learners with a safe practice environment.
There are many formats from which a virtual patient may be chosen, but the overarching principle is that of interactivity. Virtual patients typically have mechanisms where information is parsed out in response to the learners, simulating how patients respond to different treatments. Interactivity can be created with questions, specific decision-making tasks, text composition, etc., and is non-sequential. Most systems provide quantitative and qualitative feedback. In some cases, virtual patients are not full simulations themselves, but are mainly based on paper-based cases; as they do not allow for physical examination or an in-depth medical history of an actual patient. There are certain drawbacks as crucial clinical findings may be missed due to the lack of examining patients in person.
Forms
Virtual patients may take several different forms:
Case Presentation: a review of patient-related cases to reinforce and apply primary medical concepts to real-world situations.
Interactive Patient Scenario: multimedia patient case designed to teach clinical reasoning skills such as diagnostic test ordering and interpretation.
Virtual Patient Game: interactive clinical scenarios that take place in an entirely virtual world designed to practice team training in high-risk situations (e.g. avatars within a virtual health facility).
Virtual Reality Scenarios: virtual reality-based training exercises to teach procedural skills in situations of varying complexities. (e.g. virtual reality surgical simulation).
High Fidelity Software Simulation: computer programs designed to allow the mimicking of human physiological conditions for a variety of clinical scenarios.
High Fidelity Mannikin: realistic, programmable mannikins that can simulate a wide range of clinical scenarios; including simulating cardiac arrest, seizure, etc. complete with simulated, real-time vitals.
Virtual Standardized Patient: an artificially intelligent patient designed with natural language capabilities to assist in training provider-patient communication skills.
Virtual Clinical Trials: Virtual patients to simulate human and/or animal variability (e.g. v-patients.com)
Types of interactions
Several different modes of virtual patient delivery have been defined:
Predetermined scenario [directed mode]
The learner may build up the patient or case data from observations and interactions [blank mode]
The learner may view and appraise or review an existing patient
|
https://en.wikipedia.org/wiki/Factorization%20of%20polynomials
|
In mathematics and computer algebra, factorization of polynomials or polynomial factorization expresses a polynomial with coefficients in a given field or in the integers as the product of irreducible factors with coefficients in the same domain. Polynomial factorization is one of the fundamental components of computer algebra systems.
The first polynomial factorization algorithm was published by Theodor von Schubert in 1793. Leopold Kronecker rediscovered Schubert's algorithm in 1882 and extended it to multivariate polynomials and coefficients in an algebraic extension. But most of the knowledge on this topic is not older than circa 1965 and the first computer algebra systems:
When the long-known finite step algorithms were first put on computers, they turned out to be highly inefficient. The fact that almost any uni- or multivariate polynomial of degree up to 100 and with coefficients of a moderate size (up to 100 bits) can be factored by modern algorithms in a few minutes of computer time indicates how successfully this problem has been attacked during the past fifteen years. (Erich Kaltofen, 1982)
Nowadays, modern algorithms and computers can quickly factor univariate polynomials of degree more than 1000 having coefficients with thousands of digits. For this purpose, even for factoring over the rational numbers and number fields, a fundamental step is a factorization of a polynomial over a finite field.
Formulation of the question
Polynomial rings over the integers or over a field are unique factorization domains. This means that every element of these rings is a product of a constant and a product of irreducible polynomials (those that are not the product of two non-constant polynomials). Moreover, this decomposition is unique up to multiplication of the factors by invertible constants.
Factorization depends on the base field. For example, the fundamental theorem of algebra, which states that every polynomial with complex coefficients has complex roots, implies that a polynomial with integer coefficients can be factored (with root-finding algorithms) into linear factors over the complex field C. Similarly, over the field of reals, the irreducible factors have degree at most two, while there are polynomials of any degree that are irreducible over the field of rationals Q.
The question of polynomial factorization makes sense only for coefficients in a computable field whose every element may be represented in a computer and for which there are algorithms for the arithmetic operations. However, this is not a sufficient condition: Fröhlich and Shepherdson give examples of such fields for which no factorization algorithm can exist.
The fields of coefficients for which factorization algorithms are known include prime fields (that is, the field of the rational number and the fields of the integers modulo a prime number) and their finitely generated field extensions. Integer coefficients are also tractable. Kronecker's classical method is
|
https://en.wikipedia.org/wiki/DMDC
|
DMDC may stand for:
Defense Manpower Data Center, a facility that keeps data on military personnel in the United States.
Dimethyl dicarbonate, a beverage preservative.
Dansk Medicinsk Data Center ApS, a Danish EMR-systems development company
Slang acronym for "Doesn't Matter, Don't Care."
|
https://en.wikipedia.org/wiki/Defense%20Manpower%20Data%20Center
|
The Defense Manpower Data Center (DMDC) serves under the Office of the Secretary of Defense to collate personnel, manpower, training, financial, and other data for the Department of Defense. This data catalogues the history of personnel in the military and their family for purposes of healthcare, retirement funding and other administrative needs. It has offices in Seaside, California and Alexandria, Virginia.
History
DMDC was established in 1974 as the Manpower Research and Data Analysis Center (MARDAC) and made a DoD tenant activity within the U.S. Navy. In 1976, it was made a Field Activity of the Office of the Assistant Secretary of Defense for Manpower & Reserve Affairs (OASD (M&RA)) and renamed the Defense Manpower Data Center (DMDC). One year later, DMDC was transferred to the Defense Logistics Agency (DLA) for administrative support and in 1991 was designated a Defense Support Activity supported by DLA. While the name and the supporting activity have varied over the years, DMDC's primary function has always been to support the information management needs of the Office of the Under Secretary of Defense for Personnel & Readiness (OUSD (P&R)) and its predecessors.
DMDC was established at a time of great turbulence in the Department of Defense. The Vietnam War had just ended, active military forces and military personnel strengths were being reduced significantly, the Total Force Policy was being initiated, and the All-Volunteer Force era had just begun. To manage through this period, OASD (M&RA) established DMDC to collect and maintain accurate, readily available manpower and personnel data.
In October 2016, the Department of Defense launched an anonymous survey conducted by the DMDC to collect testimonies of sexual assault among the US military personnel.
In January 2017, the Department of Defense allowed 16 million discharged veterans to shop online for discounted military exchange products (effective November 2017). The DMDC was put in charge of creating an application to verify veteran's identities online with the database of the United States Department of Veterans Affairs.
In November 2017, different government entities, including the DMDC, gave different numbers regarding the troops in Syria (from 503 to more than 2,000). As a result, in its April 2018 quarterly report, the Pentagon removed the troops numbers in Iraq, Syria and Afghanistan. The DMDC was supposedly «updating their policy for these reports» and committed to provide these numbers retroactively. The next month, the Pentagon declared there were more than 44,000 US troops around the globe that the DMDC could not track precisely. Following up on this issue, the United States Census Bureau declared that the accuracy of the 2020 census was at risk because deployed troops will be counted as residents of the stateside military installations where they're usually stationed (which will give a serious boost of residents in North Carolina, Kentucky, and other states with majo
|
https://en.wikipedia.org/wiki/Woody%20Bledsoe
|
Woodrow Wilson "Woody" Bledsoe (November 12, 1921 – October 4, 1995) was an American mathematician, computer scientist, and prominent educator. He is one of the founders of artificial intelligence (AI), making early contributions in pattern recognition, facial recognition, and automated theorem proving. He continued to make significant contributions to AI throughout his long career.
Beginning in 1966, he worked at the department of mathematics and computer science of the University of Texas at Austin, holding the Peter O'Donnell Jr. Centennial Chair in Computing Science starting in 1987.
Bledsoe joined the Church of Jesus Christ of Latter-day Saints as an adult, and served in the church as a bishop, counselor to the stake presidency, and stake patriarch. He also served as a leader in the Boy Scouts of America. Bledsoe died on October 4, 1995, of amyotrophic lateral sclerosis, more commonly known as ALS or Lou Gehrig's disease.
Works
The n-tuple method (1959) was an early method for learning a pattern recognition program. The basic method is illustrated by the problem of recognizing 36 alphanumerical characters (0-9, a-z).
Let the input be a 10x15 binary image. It is equivalent to a single string with 150 binary letters. Now, randomly partition the 150 binary pixels into 75 pairs. Each pair has 4 possibilities: 00, 01, 10, 11. Now we will define a 300x36 binary matrix as follows:
Let represent the 00-state of the first pair, and similarly for the others. We have 300 such states, each represented in a row. The 36 columns each correspond to one alphanumerical character. The entire binary matrix is arranged as follows:The pattern recognizer is defined by the binary matrix. It is trained by firstsetting all entries to zero, then it is presented with several binary images of each alphanumerical character. For each image, the corresponding entries in the matrix are set to one, and the other entries are unchanged. This is an example of machine learning.
After the training the recognizer, it can be used to recognize new images. First compute the new image's corresponding column vector, then take the dot-product with each column of the binary matrix. The column with the highest dot-product is outputted as the most likely character.
Further reading
Selected publications
References
External links
W.W. Bledsoe's publications at DBLP
W.W. Bledsoe at the chess programming wiki
1921 births
1995 deaths
20th-century American mathematicians
American computer scientists
20th-century American educators
American leaders of the Church of Jesus Christ of Latter-day Saints
Artificial intelligence researchers
Converts to Mormonism
Patriarchs (LDS Church)
People from Maysville, Oklahoma
University of Texas at Austin faculty
Mathematicians from Oklahoma
Latter Day Saints from Oklahoma
Latter Day Saints from Texas
Presidents of the Association for the Advancement of Artificial Intelligence
|
https://en.wikipedia.org/wiki/Eurographics
|
Eurographics is a Europe-wide professional computer graphics association. The association supports its members in advancing the state of the art in computer graphics and related fields such as multimedia, scientific visualization and human–computer interaction.
Overview
Eurographics organizes many events and services, which are open to everyone. Eurgraphics has a broad membership, including researchers & developers, educators & industrialists, users & providers of computer graphics hardware, software, and applications. Eurgraphics organizes venues including the Eurographics Symposium on Rendering and High-Performance Graphics. Eurographics publishes Computer Graphics Forum, a quarterly journal, among others.
Symposiums
Annual Conference
3D Object Retrieval
Computer Animation
EuroVis
EXPRESSIVE
Geometry Processing
Graphics and Cultural Heritage
High-Performance Graphics
Intelligent Cinematography and Editing
Material Appearance Modeling
Parallel Graphics and Visualization
Rendering (EGSR)
Urban Data Modeling and Visualization
Virtual Environments
Visual Computing in Biology and Medicine
Related organizations
ACM SIGGRAPH hosts SIGGRAPH, the world's largest computer graphics conference.
Russian Computer Graphics Society hosts Graphicon, the former Soviet Union's largest computer graphics conference, in cooperation with Eurographics.
References
External links
Eurographics website
Eurographics Digital Library
Eurographics 2019 conference website
Eurographics 2018 conference website
Eurographics 2017 conference website
Eurographics 2016 conference website
Eurographics 2015 conference website
Eurographics 2014 conference website
Eurographics 2013 conference website
Eurographics 2012 conference website
Ke-Sen Huang page contains a directory of Eurographics publications.
Computer graphics organizations
Information technology organizations based in Europe
|
https://en.wikipedia.org/wiki/List%20of%20business%20routes%20of%20the%20Interstate%20Highway%20System
|
The Interstate Highway System of the United States, in addition to being a network of freeways, also includes a number of Business Routes assigned by the American Association of State Highway and Transportation Officials (AASHTO). These routes connect a central or commercial district of a city or town with an Interstate bypass, and are signed with green shields resembling the Interstate Highway shield. The word BUSINESS is used instead of INTERSTATE, and, above the number, where the state name is sometimes included, the word LOOP or SPUR appears. A business loop has both ends as its "parent", while a business spur has a "dangling end", sometimes running from the end of the Interstate to the downtown area.
As the main purpose of these routes are to serve a certain downtown area, Business Interstates are typically routed along surface roads. These routes do not have to meet Interstate Highway standards and are not considered part of the Interstate Highway System. AASHTO does, however, apply similar standards as to new U.S. Highways, requiring a new Business Interstate to meet certain design standards. Business Interstates are also sometimes routed onto freeways that were once designated as mainline Interstates themselves, such as the now-decommissioned Interstate 40 Business in Winston-Salem, North Carolina, and the existing Interstate 80 Business in Sacramento, California.
Business Interstates are most often posted in the western states, across the Great Plains and in Michigan. Eastern states generally did not designate business routes, as most of the Interstates paralleled the original U.S. Highways instead of directly replacing them. With the exception of mountainous areas, this left most of the U.S. Highways in place, or as co-signed routes with the parent Interstate, while the former routes were redesignated as local or frontage roads. In contrast, construction of the Interstate system in the western states often directly overlaid the old U.S. Highway, leaving the former road impassable or as a disconnected route. Exceptions were at cities and towns, where the freeway would shift onto a bypass around them. This often left extant segments of old U.S. Highways in place, with a business route designation applied to them as a motorist aid to and from a business district of collection of motorists services.
Like auxiliary Interstate Highways, Business Interstates can be repeated from state to state along their route. However, unlike auxiliary Interstate Highways, Business Interstates can also be repeated in several locations within the same state.
List
Defunct routes are listed in italics.
Interstate 5
I-5 Bus.—San Ysidro, National City and San Diego, California
I-5 Bus.—San Diego, California
I-5 Bus.—Solana Beach, California
I-5 Bus.—San Clemente, California
I-5 Bus.—Irvine, California
I-5 Bus.—Los Angeles, California
I-5 Bus.–Coalinga, California
I-5 Bus.—Woodland, California
I-5 Bus.—Arbuckle, California
I-5 Bus.—Williams and Maxwel
|
https://en.wikipedia.org/wiki/Deskstar
|
The Deskstar was the name of a product line of computer hard disk drives. It was originally announced by IBM in October 1994. The line was continued by Hitachi when in 2003 it bought IBM's hard disk drive division and renamed it Hitachi Global Storage Technologies. In 2012 Hitachi sold the division to Western Digital who continued the drive product line brand as HGST Deskstar. In 2018 Western Digital began winding down the HGST brand and as of 2020 it is defunct.
The first Deskstar product produced by IBM was the DALA-3540; the last was the 180GXP HGST continued the product line after the acquisition, selling the Deskstar 120GXP and Deskstar 180GXP under the HGST brand for a short time and selling new models thereafter.
The unreliable IBM Deskstar 75GXP product became notorious as the "Deathstar" (only one of at least twenty IBM products in the Deskstar family).
Products
A list of Deskstar models, including all those manufactured by IBM and HGST while under Hitachi's management.
IBM models
HGST models under Hitachi management
HGST models under WD management
The nine current models in production at WD's acquisition of HGST continued to be offered. The Deskstar 7K1000.C was the last model offered by HGST.
IBM Deskstar 75GXP failures
The IBM Deskstar 75GXP (six models ranging in capacity from 15 to 75 GB) became infamous circa 2001 for their reportedly high failure rates, which led to the drives being colloquially referred to as "Deathstar". Due to this, the drives were ranked 18th in PC World's "Worst Tech Products of All Time" feature in 2006. Note the simultaneously announced IBM Deskstar 40GV, a 5400 RPM version of the 7200 RPM 75GXP, did not suffer from the same reported high failure rate.
Lawsuit
Despite failures being reported within the manufacturer warranty period of three years, Michael T. Granito, Jr., an American user of IBM's 75GXP hard drives, filed a class-action lawsuit against IBM on 16 October 2001 for defects in the product causing it to "crash", with both of the drives he had bought having failed within a short time. IBM was found to have misled its customers about the reliability of the drives. Without admitting responsibility, they settled this lawsuit in 2005, agreeing to pay $100 to every user whose Deskstar 75GXP drives had failed. The settlement related to the following family of IBM Deskstar 75GXP HDD models: DTLA 307-015; DTLA 307-020; DTLA 307-030; DTLA 307-045; DTLA 307-060; DTLA 307-075; the Deskstar 40GV was not included in the litigation.
Details
The drives were known for an unusually high rate of head crashes, due to the magnetic coating soon beginning to loosen and sprinkle off from the platters, creating dust in the hard disk array and leading to crashes over large areas of the platters. The combination of two technologies, GMR (Giant Magneto-Resistive) heads on 3.5-inch glass platters, are said to be largely to blame for the issues.
A firmware update introduced wear levelling which avoids the heads d
|
https://en.wikipedia.org/wiki/MAC%20spoofing
|
MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address that is hard-coded on a network interface controller (NIC) cannot be changed. However, many drivers allow the MAC address to be changed. Additionally, there are tools which can make an operating system believe that the NIC has the MAC address of a user's choosing. The process of masking a MAC address is known as MAC spoofing. Essentially, MAC spoofing entails changing a computer's identity, for any reason.
Motivation
Changing the assigned MAC address may allow the user to bypass access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another network device. It may also allow the user to bypass MAC address blacklisting to regain access to a Wi-Fi network. However, MAC spoofing does not work when trying to bypass parental controls if automatic MAC filtering is turned on. MAC spoofing is done for legitimate and illicit purposes alike.
New hardware for existing Internet Service Providers (ISP)
Many ISPs register the client's MAC address for service and billing services. Since MAC addresses are unique and hard-coded on network interface controller (NIC) cards, when the client wants to connect a new device or change an existing one, the ISP will detect different MAC addresses and might not grant Internet access to those new devices. This can be circumvented easily by MAC spoofing, with the client only needing to spoof the new device's MAC address so it appears to be the MAC address that was registered by the ISP. In this case, the client spoofs their MAC address to gain Internet access from multiple devices. While this is generally a legitimate case, MAC spoofing of new devices can be considered illegal if the ISP's user agreement prevents the user from connecting more than one device to their service. Moreover, the client is not the only person who can spoof their MAC address to gain access to the ISP. Computer crackers can gain unauthorized access to the ISP via the same technique. This allows them to gain access to unauthorized services, while being difficult to identify and track as they are using the client's identity. This action is considered an illegitimate and illegal use of MAC spoofing.
This also applies to customer-premises equipment, such as cable and DSL modems. If leased to the customer on a monthly basis, the equipment has a hard-coded MAC address known to the provider's distribution networks, allowing service to be established as long as the customer is not in billing arrears. In cases where the provider allows customers to provide their own equipment (and thus avoid the monthly leasing fee on their bill), the provider sometimes requires that the customer provide the MAC address of their equipment before service is established.
Fulfilling software requirements
Some software can only be installed and run on systems with
|
https://en.wikipedia.org/wiki/ACCESS%20%28Australia%29
|
ACCESS is the youth network of the Australian Institute of International Affairs, a non-government institution dealing with all aspects of Australia's foreign relations and international affairs.
Founded in 2005, ACCESS hosts forums for discussion in the tradition of the Council on Foreign Relations and Chatham House. ACCESS also produces two publications on international affairs: 'Monthly Access', an online monthly publication, and 'Quarterly Access', a more in-depth, quarterly print publication.
Currently, there are ACCESS branches in three Australian cities: Sydney, Melbourne and Canberra.
External links
ACCESS NSW audio and video on iTunes
ACCESS NSW ACCESS (New South Wales)
ACCESS VICTORIA ACCESS (Victoria)
Youth organisations based in Australia
Foreign relations of Australia
|
https://en.wikipedia.org/wiki/Karrabin%20railway%20station
|
Karrabin railway station is located on the Main line in Queensland, Australia. It serves the Ipswich suburb of Karrabin.
Services
Karrabin is served by Citytrain network services from Rosewood to Ipswich. Most services terminate at Ipswich although some peak-hour services continue to Bowen Hills and Caboolture.
Services by platform
References
External links
Karrabin station Queensland Rail
Karrabin station Queensland's Railways on the Internet
[ Karrabin station] Translink travel information
Railway stations in Ipswich City
Main Line railway, Queensland
|
https://en.wikipedia.org/wiki/PC-based%20IBM%20mainframe-compatible%20systems
|
Since the rise of the personal computer in the 1980s, IBM and other vendors have created PC-based IBM-compatible mainframes which are compatible with the larger IBM mainframe computers. For a period of time PC-based mainframe-compatible systems had a lower price and did not require as much electricity or floor space. However, they sacrificed performance and were not as dependable as mainframe-class hardware. These products have been popular with mainframe developers, in education and training settings, for very small companies with non-critical processing, and in certain disaster relief roles (such as field insurance adjustment systems for hurricane relief).
Background
Up until the mid-1990s, mainframes were very large machines that often occupied entire rooms. The rooms were often air conditioned and had special power arrangements to accommodate the three-phase electric power required by the machines. Modern mainframes are now physically comparatively small and require little or no special building arrangements.
System/370
IBM had demonstrated use of a mainframe instruction set in their first desktop computer—the IBM 5100, released in 1975. This product used microcode to execute many of the System/370's processor instructions, so that it could run a slightly modified version of IBM's APL mainframe program interpreter.
In 1980 rumors spread of a new IBM personal computer, perhaps a miniaturized version of the 370. In 1981 the IBM Personal Computer appeared, but it was not based on the System 370 architecture. However, IBM did use their new PC platform to create some exotic combinations with additional hardware that could execute S/370 instructions locally.
Personal Computer XT/370
In October 1983, IBM announced the IBM Personal Computer XT/370. This was essentially a three-in-one product. It could run PC DOS locally, it could also act as 3270 terminal, and finally—its most important distinguishing feature relative to an IBM 3270 PC—was that it could execute S/370 instructions locally.
The XT/370 was an IBM Personal Computer XT (System Unit 5160) with three custom 8-bit cards. The processor card (370PC-P), contained two modified Motorola 68000 chips (which could emulate most S/370 fixed-point instructions and non-floating-point instructions), and an Intel 8087 coprocessor modified to emulate the S/370 floating point instructions. The second card (370PC-M), which connected to the first with a unique card back connector contained 512 KiB of memory. The third card (PC3277-EM), was a 3270 terminal emulator required to download system software from the host mainframe. The XT/370 computer booted into DOS, then ran the VM/PC Control Program. The card's memory space added additional system memory, so the first (motherboard) memory could be used to move data to the expansion card. The expansion memory was dual ported, and provided an additional to the XT Machine bringing the total RAM on the XT side to . The memory arbitrator could bank switch the
|
https://en.wikipedia.org/wiki/World%20Network%20of%20Users%20and%20Survivors%20of%20Psychiatry
|
The World Network of Users and Survivors of Psychiatry (WNUSP) is an international organisation representing, and led by what it terms "survivors of psychiatry". As of 2003, over 70 national organizations were members of WNUSP, based in 30 countries. The network seeks to protect and develop the human rights, disability rights, dignity and self-determination of those labeled 'mentally ill'.
Activities
WNUSP has special consultative status with the United Nations. It contributed to the development of the UN's Convention on the Rights of Persons with Disabilities. WNUSP has produced a manual to help people use it entitled "Implementation Manual for the United Nations Convention on the Rights of Persons with Disabilities", edited by Myra Kovary.
WNUSP joined with other organizations to create the International Disability Caucus, which jointly represented organizations of people with disabilities and allies during the CRPD negotiations. WNUSP was part of the steering committee of the IDC, which maintained a principle of respecting the leadership of diverse constituencies on issues affecting them, and also maintained that the convention should be of equal value to all persons with disabilities irrespective of the type of disability or geographical location. Tina Minkowitz, WNUSP's representative on the IDC steering committee, coordinated the IDC's work on key articles of the CRPD, including those on legal capacity, liberty, torture and ill-treatment and integrity of the person. Since the adoption and entry into force of the CRPD, WNUSP has worked with other organizations in the International Disability Alliance and its CRPD Forum to guide the interpretation and application of the CRPD on these issues.
In 2007 at a Conference held in Dresden on "Coercive Treatment in Psychiatry: A Comprehensive Review", the president and other leaders of the World Psychiatric Association met, following a formal request from the World Health Organization, with several representatives from the user/survivor movement, including Judi Chamberlin (Co-chair of WNUSP), Mary Nettle and Peter Lehmann (Ex-chairs of the European Network of [Ex-] Users and Survivors of Psychiatry), Dorothea Buck (Honorary Chair of the German Federal Organisation of Users and Survivors of Psychiatry, and David Oaks (Director of MindFreedom International).
Salam Gómez and Jolijn Santegoeds are the current Co-Chairpersons of WNUSP.
Current International Representative and former co-chair of WNUSP is Tina Minkowitz, an international advocate and lawyer. She represented WNUSP in the Working Group convened by the UN to produce a draft text of the Convention on the Rights of Persons with Disabilities and contributed to a UN seminar on torture and persons with disabilities that resulted in an important report on the issue by Special Rapporteur on Torture Manfred Nowak in 2008.
History
Since the 1970s, the psychiatric survivors movement has grown from a few scattered self-help groups to a worldwide
|
https://en.wikipedia.org/wiki/SmartTAG
|
SmartTAG (acronym in Malay for Sistem Membayar Automatik Rangkaian Tol or "Toll Network Automatic Payment Systems") is an on-board unit (OBU) vehicle-based device used as an electronic toll collection (ETC) system over long distances (maximum 15 metres) to complement Touch 'n Go, a card-based system. It was first introduced in Malaysia in 1999 and is also used as an Entrance Access Security.
Features
SmartTAG was designed, developed and manufactured by Teras Teknologi Sdn Bhd as an extension of the Touch 'n Go system, initially as a replacement of PLUS TAG. It is being marketed by Touch 'n Go Sdn Bhd (formerly Rangkaian Segar Sdn Bhd).
The intellectual property rights to the SmartTAG belongs to an Austrian company known as EFKON Gmbh. The president of EFKON, Dr Helmut Rieder, was the one who set up a joint venture with UEM to form Infrared Advance Technology Sdn Bhd (IRAT).
The SmartTAG is currently priced at RM130 per unit inclusive of free Touch 'n Go card with RM10 reload value. This is a subsidised price as UEM has to pay royalty to EFKON for each SmartTag assembled by IRAT.
Built on a non-stop Electronic Toll Collection (ETC) philosophy, SmartTAG incorporated infra-red communication that communicated with infra-red transceivers mounted at the ceilings of toll plazas to allow vehicle drivers to drive through SmartTAG dedicated lanes and pay toll without stopping. It is designed to process up to 1,200 vehicles per hour.
History
Prior to the introduction of SmartTAG, several different types of non-stop ETC were already being used in Malaysia:
PLUS TAG for all PLUS (Projek Lebuhraya Utara Selatan) expressways in Klang Valley 1994–1999
Express TAG for Shah Alam Expressway 1996–2004
FasTrak for Damansara–Puchong Expressway and Sprint Expressway 1999–2004
Saga Tag for Cheras–Kajang Expressway 1999–2004
SmartTAG was officially launched on 15 March 1999, phasing out PLUS TAG at over 20 plazas of Projek Lebuhraya Utara-Selatan (PLUS) / North–South Expressway.
In December 2003, Minister of Works, Datuk Seri S Samy Vellu directed the implementation of a single ETC nationwide as a form of standardisation and convenience of use for road users. The directive requires all major toll operators in Malaysia to have a minimum of 2 Touch 'n Go and 1 SmartTAG lanes per direction at every plaza. The directive was gradually implemented by all major toll operators on 1 July 2004 and marked the cessation of other types of non-stop ETCs in Malaysia.
In 2004, SmartTAG expanded as entrance access security for residential areas. It was first (currently only) deployed at Ledang Heights Bungalow Park, in Iskandar Puteri, Johor.
On 8 August 2018, Touch 'n Go discontinued the sales of SmartTAG in favor of RFID-based Touch 'n Go eWallet which started its testing phase on the following month. However, LokaTAG, another authorized aftermarket SmartTAG manufacturer will provide an alternative device that will serves as drop-in replacement for SmartTAG. Unlike SmartTA
|
https://en.wikipedia.org/wiki/Stanford%20Physics%20Information%20Retrieval%20System
|
The Stanford Physics Information Retrieval System (SPIRES) is a database management system developed by Stanford University. It is used by universities, colleges and research institutions. The first website in North America was created to allow remote users access to its database.
History
SPIRES was originally developed at the Stanford Linear Accelerator Center (SLAC) in 1969, from a design based on a 1967 information study of physicists at SLAC. The system was designed as a physics database management system (DBMS) to deal with high-energy-physics preprints. Written in PL/I, SPIRES ran on an IBM System/360.
In the early 1970s, an evaluation of this system resulted in the decision to implement a new system for use by faculty, staff and students at Stanford University. SPIRES was renamed the Stanford Public Information Retrieval System. The new development took place under a National Science Foundation grant headed by Edwin B. Parker, principal investigator. SPIRES joined forces with the BALLOTS project to create a bibliographic citation retrieval system and quickly evolved into a generalized information retrieval and data base management system that could meet the needs of a large and diverse computing community.
SPIRES was rewritten in PL360, a block structured programming language designed explicitly for System/360-compatible hardware. The primary authors were Thomas H. Martin, Dick Guertin and Bill Kiefer. John Schroeder was the manager of the SPIRES project during this early phase of development.
Eventually, BALLOTS split off from SPIRES and the Research Libraries Group adopted SPIRES as its data base engine while providing a graphical interface to its clients. Socrates was a library circulation management system rooted in SPIRES.
SPIRES became the primary database management system for Stanford University business and student services in the 1980s and 1990s. It was also adopted by about two dozen other universities, including installations using the Michigan Terminal System (MTS), and VM/CMS. These universities collaborated through annual meetings of the SPIRES Consortium.
In 2004, SPIRES was migrated off the mainframe onto Unix platforms by means of a System/360 emulator developed by Dick Guertin. The DBMS now runs on Unix, Linux or macOS and is available under Mozilla Public License.
SPIRES High Energy Physics database (SPIRES-HEP)
The SPIRES High Energy Physics database (SPIRES-HEP), installed at Stanford Linear Accelerator Center (SLAC) in the 1970s, became the first website in North America and the first database accessible through the World Wide Web in 1991. It has since expanded into a joint project of SLAC, Fermilab, and DESY, with mirrors hosted at those institutions as well as at the Institute for High Energy Physics (Russia), the University of Durham (UK), the Yukawa Institute for Theoretical Physics at Kyoto University (Japan), and
the Indonesian Institute of Sciences LIPI (Indonesia). This project stores bibli
|
https://en.wikipedia.org/wiki/TADKOM
|
TADKOM / TAktisk Digital KOMunikasjon (English: TADCOM / TActical Digital COMmunication) is an encrypted network used as a carrier for most of the communication for all four branches of the Norwegian military. Most nodes operate on a speed of 2mbit and above. TADKOM is also used to carry signals such as Link-11, Link-11B, Link-16 and Link-22(Future). The system use the X.25 protocol to communicate between the nodes.
TADKOM is classified for Nato Secret and National Secret without any additional encryption devices.
Military radio systems
|
https://en.wikipedia.org/wiki/Multi%20categories%20security
|
Multi categories security (MCS) is an access control method in Security-Enhanced Linux that uses categories attached to objects (files) and granted to subjects (processes, ...) at the operating system level. The implementation in Fedora Core 5 is advisory because there is nothing stopping a process from increasing its access. The eventual aim is to make MCS a hierarchical mandatory access control system. Currently, MCS controls access to files and to ptrace or kill processes. It has not yet decided what level of control it should have over access to directories and other file system objects. It is still evolving.
MCS access controls are applied after the Domain-Type access controls and after regular DAC (Unix permissions). In the default policy of Fedora Core 5, it is possible to manage up to 256 categories (c0 to c255). It is possible to recompile the policy with a much larger number of categories if required.
As part of the Multi-Level Security (MLS) development work applications such as the CUPs print server will understand the MLS sensitivity labels, CUPs will use them to control printing and to label the printed pages according to their sensitivity level. The MCS data is stored and manipulated in the same way as MLS data, therefore any program which is modified for MCS support will also be expected to support MLS. This will increase the number of applications supporting MLS and therefore make it easier to run MLS (which is one of the reasons for developing MCS).
Note that MCS is not a sub-set of MLS, the Bell–LaPadula model is not applied. If a process has a clearance that dominates the classification of a file then it gets both read and write access. For example in a commercial environment you might use categories to map to data from different departments. So you could have c0 for HR data and c1 for Financial data. If a user is running with categories c0 and c1 then they can read HR data and write it to a file labeled for Financial data. In a corporate environment this is usually regarded as acceptable, if a user is trusted with both HR and Financial access then their integrity and skills are trusted to ensure that the data is not mistakenly released to the wrong file. For secret military data this is regarded as unacceptable and the Bell–LaPadula model prevents such accidental or malicious relabeling of data.
References
Linux security software
|
https://en.wikipedia.org/wiki/Shape%20theory
|
Shape theory refers to three different theories:
Shape theory in topology
Shape analysis (disambiguation) in mathematics and computer science
Shape theory of olfaction
|
https://en.wikipedia.org/wiki/EVE%20%28text%20editor%29
|
EVE (introduced as the Extensible VAX Editor, later as the Extensible Versatile Editor) is a flexible text editor that is part of the VMS operating system. EVE is implemented by using the Text Processing Utility (TPU).
The Emacs editor features an EVE emulation (as an add-on).
Editor control
EVE is invoked via:
$ EDIT/TPU filename
Since the EVE editor was designed for use from a VT100 or VT220 terminal, many keyboard conventions introduced for personal computers do not work.
Key Function Definitions
Interactive Key Definitions
To assign a command or function to a key or key combination, use the following procedure:
Enter the EVE command line (using the - key on the numeric keypad or Ctrl-B Ctrl-U)
Enter the Define Key command—as almost everywhere in OpenVMS the text is case insensitive and it is possible to use abbreviations, so entering de k will do
When the EVE command: prompt occurs, enter the name of the command
When the Press the key you want to define: prompt occurs, press the key or key combination which is to call the given command
Key Definitions in a File
EVE upon its start interprets the EVE$INIT.EVE file in the user's current or home directory. When the SYS$LOGIN:EVE$INIT.EVE file contains
DEFINE KEY= Ctrl/F Find
DEFINE KEY= F3 Find Next
DEFINE KEY= F1 Help
DEFINE KEY= F2 Do
the Ctrl-F key would call string search function, the F3 key repeating of the last search, the F1 key would display the list of EVE commands and the F2 key would call the EVE command line.
Features
Automatic journaling facilitates recovering "all or most" of one's editing.
The TWO WINDOWS command allows editing more than one file at a time (split screen).
References
External links
Extensible Versatile Editor Reference Manual, HP OpenVMS Systems Documentation
OpenVMS text editors
|
https://en.wikipedia.org/wiki/SLT
|
SLT may refer to:
Medicine
Selective laser trabeculoplasty, an eye surgery
Speech and language therapy
Technology
Compaq SLT, a laptop computer line of the 1980s and 1990s
Sony SLT camera, a 1990s digital camera type
IBM Solid Logic Technology, a 1960s hybrid integrated circuit design
Sri Lanka Telecom, a telephone company
Transportation
Harriet Alexander Field, an airfield in Colorado, US (IATA code)
Mercedes-Benz SLT-Class, a car model (built 1996–2020)
South Lancs Travel, an English bus operator
Sprinter Lighttrain, a Dutch electric train class (built 2007–2012)
Other uses
Slovenian tolar, defunct currency
Situational leadership theory, of organizations
|
https://en.wikipedia.org/wiki/Spindizzy
|
Spindizzy is an isometric video game released for several 8-bit home computer formats in 1986 by Electric Dreams Software. It combines action and puzzle game elements. Players must navigate a series of screens to explore a landscape suspended in a three-dimensional space. Development was headed by Paul Shirley, who drew inspiration from Ultimate Play the Game games that feature an isometric projection.
The game was successful in the United Kingdom and was well received by the video game press. Reviewers praised its visuals and design, but criticized its audio. Similarities were drawn to Marble Madness, which was released in arcades two years earlier. Spindizzy was followed by a 1990s sequel titled Spindizzy Worlds.
Gameplay
Spindizzy is an action and puzzle game played from an isometric perspective. Players can view the playing field from four angles, and rotate between them. The game takes place in a fictional landscape of interconnected stages suspended in a dimensional space. The player controls a probe called a Gyroscopic Environmental Reconnaissance And Land-Mapping Device (GERALD), via keyboard commands or a joystick. The craft is able to transform between three configurations: a ball, an inverted square pyramid, and a gyroscope, although the difference between each configuration is only visual. Players navigate the probe through the stages to explore the world within a time limit. The time limit can be extended by collecting power jewels scattered through the world and is decreased by falling off a stage. Stages feature ramps, corridors, and other obstacles that hinder the player from quickly traversing them. The game ends when time expires or the world is completely explored.
Development and release
Spindizzy was developed by Paul Shirley of British video game developer Electric Dreams Software. He was primarily inspired by Ultimate Play the Game games that feature an isometric projection, but was also influenced by the gameplay of the 1984 arcade game Marble Madness. Shirley created an interpreted script to generate the game's levels. The script allowed him to design a large number of stages using 11KB of storage. The game was originally released for the Amstrad CPC and later ported to Apple II, Atari 8-bit, Commodore 64 and ZX Spectrum computers. Copies of Spindizzy were promoted as prizes in magazine contests upon its release. American video game company Activision published the game in the United States as part of its "Electric Dreams" series. John Sanderson programmed the Apple II version; Shirley was unaware of the port's existence until the mid-1990s. The company sold Spindizzys compilation rights not long after obtaining them, which reduced the amount of royalties to Shirley and Electric Dreams. Shirley eventually severed the contract with Activision, citing late royalty payments among other actions he disagreed with.
Reception and legacy
Shirley described the game's marketing life as short and attributed that to Activi
|
https://en.wikipedia.org/wiki/Massbus
|
The Massbus is a high-performance computer input/output bus designed in the 1970s by Digital Equipment Corporation (DEC). The architecture development was sponsored by Gordon Bell and John Levy was the principal architect.
The bus was used by Digital to interconnect its highest-performance computers with magnetic disk and magnetic tape storage equipment. The use of a common bus was intended to allow a single controller design to handle multiple peripheral models, and allowed the PDP-10, PDP-11, and VAX computer families to share a common set of peripherals. At the time there were multiple operating systems for each of the 16-bit, 32-bit, and 36-bit computer lines. The 18-bit PDP-15/40 connected to Massbus peripherals via a PDP-11 front end. An engineering goal was to reduce the need for a new driver per peripheral per operating system per computer family. Also, a major technical goal was to place any magnetic technology changes (data separators) into the storage device rather than in the CPU-attached controller. Thus the CPU I/O or memory bus to Massbus adapter needed no changes for multiple generations of storage technology.
A business objective was to provide a subsystem entry price well below that of IBM storage subsystems which used large and expensive controllers unique to each storage technology and processor architecture and were optimized for connecting large numbers of storage devices.
The first Massbus device was the RP04, based on Sperry Univac Information Storage Systems's (ISS) clone of the IBM 3330. Subsequently, DEC offered the RP05 and RP06, based on Memorex's 3330 clone. Memorex modified the IBM compatible interface to DEC requirements and moved the data separator electronics into the drive. DEC designed the rest which was mounted in the "bustle" attached to the drive. This set the pattern for future improvements of disk technology to double density 3330, CDC SMD drives, and then "Winchester" technology. Drives were supplied by ISS/Univac, Memorex, and Control Data. Multiple generations of tape technology and performance were also Massbus connected although the architecture was a Master Massbus drive and slave tape drives. DEC also developed the Massbus RS03/04, a head per track disk drive for high performance swapping. The last Massbus disk drive was the DEC designed RM80 as DEC shifted to internal development of large disks.
Logical implementation
The bus is logically implemented as two separate sections:
An asynchronous control bus used to access memory-mapped I/O registers in the individual storage devices, and
A high-speed, synchronous data bus that is used to carry the actual data transfers between the storage devices and the host bus adapter. The data bus is 18 bits wide plus parity.
Massbus peripherals
Disk
RP04 88 MB Sperry Univac Information Storage Systems pack-loaded (removable) disk drive
RP05/RP06 100/200 MB Memorex 677-51/677-01 pack-loaded (removable) disk drive
The RP04 and RP06 disks wer
|
https://en.wikipedia.org/wiki/Synchronous%20Backplane%20Interconnect
|
The Synchronous Backplane Interconnect (SBI) was the internal processor-memory bus used by early VAX computers manufactured by the Digital Equipment Corporation of Maynard, Massachusetts.
The bus was implemented using Schottky TTL logic levels and allowed multiprocessor operation.
Computer buses
DEC hardware
|
https://en.wikipedia.org/wiki/WU-FTPD
|
WU-FTPD (more fully wuarchive-ftpd, also frequently spelled in lowercase as wu-ftpd) is a free FTP server software (daemon) for Unix-like operating systems.
It was originally written by Chris Myers and Bryan D. O'Connor in Washington University in St. Louis as a replacement of the BSD FTP daemon, for use in the Washington University network, primarily the large wuarchive site. The software eventually evolved to lend itself as a replacement in other mainstream commercial operating systems of the time, including DEC's Ultrix, IBM's AIX and Sun's SunOS and Solaris operating systems. It was also soon ported to other operating systems rooted in open source, such as FreeBSD and Linux.
The software had fallen into disrepair during the mid-1990s until its stewardship was taken over by Stan O. Barber. He released a number of patches, which were named the ACADEM series, named after his company, Academ Consulting Services. After a few years the source code was taken over by Gregory Lundberg who consolidated the ACADEM and other patches and enhanced the software, again through another series of patches called the VR series, named after VRNet, his then company. Around 1999, the project's oversight was provided by a loose group of developers working as the WU-FTPD Development Group, which counted Gregory Lundberg among them. Around 2002, he left the project for personal reasons and it went dormant, with only Kent Landfield of the Landfield Group keeping the website and the CVS repository alive up until 2007. Today, a new series (CC) of unofficial patches was launched to try to bring the software up-to-date, again culling for patches found across the Internet.
BeroFTPD was also an offshoot of WU-FTPD, which saw feature improvements made into the code. The last known release of that software was 1.3.4 before it was merged back into the WU-FTPD codebase yielding wu-ftpd-2.6.0 as a result. BeroFTPD development then ceased.
Up until the early 2000s, it was the most common FTP server software in use, though its use has lessened in recent years due to availability of more feature-rich and easier-to-configure software, and primarily due to its perceived lack of security and the perceived complexity of the source code. In 2001, for example, the Ramen worm used WU-FTPD as one of the possible intrusion mechanisms.
See also
List of FTP server software
References
External links
WU-FTPD Development Group
Archived copy of the defunct WU-FTPD Development Group website page
WU-FTPD CC Patch series
FTP server software
Free file transfer software
Free server software
|
https://en.wikipedia.org/wiki/Attribute%20%28role-playing%20games%29
|
An attribute is a piece of data (a "statistic") that describes to what extent a fictional character in a role-playing game possesses a specific natural, in-born characteristic common to all characters in the game. That piece of data is usually an abstract number or, in some cases, a set of dice. Some games use different terms to refer to an attribute, such as statistic, (primary) characteristic or ability. A number of role-playing games like Fate do not use attributes at all.
The nature of attributes
There is no uniform consensus on what ability scores are, even if many role-playing games have them, but games that use them have a common theme. According to the BBC Cult TV website "All characters have Attributes — basic physical and mental abilities." and in the Pathfinder Roleplaying Game "Each character has six ability scores that represent his character's most basic attributes. They are his raw talent and prowess. While a character rarely rolls a check using just an ability score, these scores, and the modifiers they create, affect nearly every aspect of a character's skills and abilities." In some games, such as older versions of Dungeons & Dragons the attribute is used on its own to determine outcomes, whereas in many games, beginning with Bunnies & Burrows and including more modern versions of D&D, the attribute works with a skill to affect the overall outcome.
Common types of attribute system
There is no standard amongst role-playing games as to which attributes are important for the game, though there is a school of design which says you pick the attributes after you decide what the game is about.
Set attribute systems
Dungeons & Dragons
Dungeons & Dragons used six attributes (there were brief attempts to add a seventh, Comeliness, in Unearthed Arcana and Dragon magazine, but this was short-lived). The six attributes used in D&D are:
"Physical" statistics
Strength - measuring physical power and carrying capacity
Constitution - measuring endurance, stamina and healthiness
Dexterity - measuring agility, balance, coordination and reflexes
"Mental" statistics
Intelligence - measuring deductive reasoning, cognition, knowledge, memory, logic and rationality
Wisdom - measuring self-awareness, common sense, restraint, perception and insight
Charisma - measuring force of personality, persuasiveness, leadership and successful planning
These range from about 3 to 20 (depending on the edition).
The original attribute sequence in D&D was Strength, Intelligence, Wisdom, Constitution, Dexterity, and Charisma in the original 1974 rules. This listed the three "prime requisites" of the character classes before the "general" stats: strength for fighters, intelligence for magic-users, and wisdom for clerics.
The attribute sequence in D&D was changed to Strength, Intelligence, Wisdom, Dexterity, Constitution, and Charisma, sometimes referred to as "SIWDCC". This change was made due to the addition of the thief class, which used dexterity as a pri
|
https://en.wikipedia.org/wiki/FireWire%20camera
|
FireWire cameras use the IEEE 1394 bus standard for the transmission of audio, video and control data. FireWire is Apple Computer's trademark for the IEEE 1283 standard.
FireWire cameras are available in the form of photo cameras and video cameras, which provide image and audio data. A special form of video cameras is used in the domains of industry, medicine, astronomy, microscopy and science. These special cameras do not provide audio data.
Structure
The basic structure of FireWire cameras is based on the following six modules:
Optics
FireWire cameras are based on CCD or CMOS chips. The light-sensitive area, as well as the pixels of these chips, are small. In the case of cameras with integrated optics, we can assume that the optics are adapted to these chips.
However, in the domains of professional, and semi-professional photography, as well as in the domain of special cameras, interchangeable optics are often used. In these cases, a system specialist has to adapt the optics and the chip to the application (see System integration). Besides normal lenses, such interchangeable lenses may be microscopes, endoscopes, telescopes, etc. With the exception of the standard C-mount and CS-mount, the mounts of interchangeable optics are company-specific.
Signal capture
Since the function of a FireWire camera depends upon electrical signals, the module "signal capture" transforms the incident light, as well as the incident sound into electrons. In the case of light, this process is performed by a CCD or CMOS chip. The transformation of the sound is performed by a microphone.
Digitization
The first step of the image's digitization results from the structure of a CCD or CMOS chip. It dissects the image into pixels. If a pixel has collected many photons, it creates a high voltage. Should there only be a few photons, a low voltage is created. "Voltage" is an analog value. Therefore, during the digitization's second step, the voltage has to be transformed into a digital value by an A/D converter. Now the raw digital image is available.
A microphone transforms the sound into a voltage. An A/D converter transforms these analog values into digital ones.
Signal enhancement
The creation of color is based on a color filter, which is located in front of the CCD or CMOS chip. It is red, green or blue and changes its color from pixel to pixel. Therefore, the filter is called a color filter array or, after its inventor, Bayer filter. Using these raw digital images, the module "signal enhancement" creates an image, which meets aesthetic requirements. The same is true for the audio data.
In the final step, the module compresses the image and audio data and outputs them - in the case of video cameras - as a DV data stream. In the case of photo cameras, single images may be output and, if applicable, voice comments as files.
The application domains of industry, medicine, astronomy, microscopy and science often use special monochrome cameras. They forgo any sig
|
https://en.wikipedia.org/wiki/Zmist
|
Zmist (also known as Z0mbie.Mistfall) is a metamorphic computer virus created by the Russian virus writer known as Z0mbie. It was the first virus to use a technique known as "code integration". In the words of Ferrie and Ször:
This virus supports a unique new technique: code integration.
The Mistfall engine contained in it is capable of
decompiling Portable Executable files to [their] smallest
elements, requiring 32 MB of memory. Zmist will insert
itself into the code: it moves code blocks out of the way,
inserts itself, regenerates code and data references, including
relocation information, and rebuilds the executable.
Variants
Zmist.gen!674CD7362358 - discovered in 2012.
ZMist!IK - discovered 2011 - 2012.
Zmist.A - discovered in 2006 - 2007.
See also
Simile, a well-known metamorphic virus
Computer virus
Comparison of computer viruses
References
External links
"Hunting for metamorphic", Metamorphic viruses description by Ször and Ferrie
"Virus.Win32.ZMist.Predetect" by Secure List.
Windows file viruses
|
https://en.wikipedia.org/wiki/List%20of%20ABS-CBN%20original%20programming
|
This is a list of original programming broadcast by ABS-CBN, a Philippine television network. The network is headquartered in ABS-CBN Broadcasting Center, Diliman, Quezon City.
On May 5, 2020, ABS-CBN was issued a cease-and-desist order by the National Telecommunications Commission (NTC) and Solicitor General Jose Calida, after the NTC refused to renew the network's franchise license earlier in February 2020. The franchise license expired on May 4, 2020, and a day later, ABS-CBN officially signed off in the evening. On July 10, 2020, the House Committee on Legislative Franchises of the 18th Congress rejected the franchise renewal of ABS-CBN. As a result, the network was forced to cease operations of some of its divisions and laid off its workers on August 31, 2020.
After shutting down its terrestrial stations, ABS-CBN started distrbuting its shows on Kapamilya Channel, A2Z (DZOE-TV Channel 11 on analog free TV in Manila, DYPR-TV Channel 12 in Tacloban, and Channel 20 on digital TV nationwide), cable, satellite and online platforms. A2Z is a blocktime agreement between ABS-CBN Corporation and ZOE Broadcasting Network.
Original programming
Note: Titles are listed in alphabetical order, followed by the year of debut in parentheses.
News
Bandila (2006–2020)
Kabayan (2010, 2020)
Nescafé Morning News (1987–1989)
News Patrol (2005–2020)
Todo Balita (2008–2010)
TV Patrol (1987–2020)
Umagang Kay Ganda (2007–2020)
The World Tonight (1966–1972, 1986–1999; Weekend Edition, 1987–1996)
Current affairs
Ako Ang Simula (2011–2013)
The Bottomline with Boy Abunda (2009–2020)
Compañero y Compañera (1997–1998)
Damayan (1969–1972)
Dong Puno Live (1995–2000, 2003–2005)
Hoy Gising! (1992–2001)
Hoy Gising! Kapamilya (2004–2005)
The Inside Story (1990–1998)
Kontrobersyal (2003–2006)
Krusada (2010–2013)
Kulilits (2009–2010)
Nagmamahal, Kapamilya (2006–2007)
Usapang Business (1996–1999)
News magazine
Assignment (1995–2001)
Balitang K (1996–2004)
F! (1999–2006)
Failon Ngayon (2009–2020)
G Diaries (2017–2020)
Kuha Mo! (2019–2020)
Magandang Gabi... Bayan (1988–2005)
Mga Kwento ni Marc Logan (2014–2017)
Rated K (2004–2020)
Pareng Partners (2018–2020)
PEP (People, Events and Places) Talk (1986–1990)
Sports Unlimited (1997–2020)
Tatak Pilipino (1990–1995)
Usapang Business (1996–1999)
Wonder Mom (2008–2009)
Documentary
The Correspondents (1998–2010)
Probe (1987–1988; 2005–2009)
S.O.C.O.: Scene of the Crime Operatives (2005–2020)
Trip na Trip (2006–2011)
XXX: Exklusibong, Explosibong, Exposé (2006–2013)
Drama
Anthology
Bayani (1995–2001)
Calvento Files (1995–1998)
Coney Reyes on Camera (1989–1998)
Family Theater (1960–1972)
Flames (1996–2002)
Give Love on Christmas (2014–2015)
I Am KC (2008), starring KC Concepcion. (Aired from March 29, 2008, to April 19, 2008)
Ipaglaban Mo! (2014–2020)
Judy Ann Drama Special (1999–2001)
Kapag May Katwiran, Ipaglaban Mo! (1992–1999)
Love Spell (2006–2008)
Maalaala Mo Kaya (1991–2020)
The Maricel Drama Special (1989–1997)
Maricel Regal D
|
https://en.wikipedia.org/wiki/XSP%20%28software%29
|
XSP is a simple, standalone web server written in C# that hosts ASP.NET's System for Linux and other Unix operating systems. It runs on the Mono runtime for Linux and the .NET Framework runtime, making it usable as a lightweight web server on any platform supporting .NET.
XSP was the original name of the internal project at Microsoft that became ASP.NET. The name pays homage to the original name of what became ASP.NET.
See also
mod_mono
References
Further reading
External links
Mono (software)
.NET programming tools
Microsoft free software
Software using the MS-PL license
Linux-only free software
|
https://en.wikipedia.org/wiki/Log%20probability
|
In probability theory and computer science, a log probability is simply a logarithm of a probability. The use of log probabilities means representing probabilities on a logarithmic scale , instead of the standard unit interval.
Since the probabilities of independent events multiply, and logarithms convert multiplication to addition, log probabilities of independent events add. Log probabilities are thus practical for computations, and have an intuitive interpretation in terms of information theory: the negative of the average log probability is the information entropy of an event. Similarly, likelihoods are often transformed to the log scale, and the corresponding log-likelihood can be interpreted as the degree to which an event supports a statistical model. The log probability is widely used in implementations of computations with probability, and is studied as a concept in its own right in some applications of information theory, such as natural language processing.
Motivation
Representing probabilities in this way has several practical advantages:
Speed. Since multiplication is more expensive than addition, taking the product of a high number of probabilities is often faster if they are represented in log form. (The conversion to log form is expensive, but is only incurred once.) Multiplication arises from calculating the probability that multiple independent events occur: the probability that all independent events of interest occur is the product of all these events' probabilities.
Accuracy. The use of log probabilities improves numerical stability, when the probabilities are very small, because of the way in which computers approximate real numbers.
Simplicity. Many probability distributions have an exponential form. Taking the log of these distributions eliminates the exponential function, unwrapping the exponent. For example, the log probability of the normal distribution's probability density function is instead of . Log probabilities make some mathematical manipulations easier to perform.
Optimization. Since most common probability distributions—notably the exponential family—are only logarithmically concave, and concavity of the objective function plays a key role in the maximization of a function such as probability. Optimizers work better with log probabilities.
Representation issues
The logarithm function is not defined for zero, so log probabilities can only represent non-zero probabilities. Since the logarithm of a number in interval is negative, often the negative log probabilities are used. In that case the log probabilities in the following formulas would be inverted.
Any base can be selected for the logarithm.
Basic manipulations
In this section we would name probabilities in logarithmic space and for short:
The product of probabilities corresponds to addition in logarithmic space.
The sum of probabilities is a bit more involved to compute in logarithmic space, requiring the computation of one ex
|
https://en.wikipedia.org/wiki/NIDS
|
NIDS can refer to:
National Institute for Discovery Science
Network intrusion detection system, a system that tries to detect malicious activity by monitoring network traffic
Neuroleptic-induced deficit syndrome, a clinical syndrome that develops in some patients receiving too high doses of an antipsychotic for too long time
NAS (National Airspace System) Integrated Display System (IDS), a display system used in air traffic control towers and terminal radar approach control
Tyranids, Warhammer 40,000
|
https://en.wikipedia.org/wiki/Whitby%20railway%20station
|
Whitby is a railway station serving the town of Whitby in North Yorkshire, England. It is the southern terminus of the Esk Valley Line from Middlesbrough. The station is owned by Network Rail and services operated by Northern Trains for mainline services and the North Yorkshire Moors Railway for heritage services.
History
Whitby's original railway station stood near to the end of the current platform, in the form of the offices, workshop and carriage shed of the Whitby and Pickering Railway; a single track horse worked line opened throughout in 1836. Its engineer was George Stephenson.
In 1845, the W&P was taken over by the York and North Midland Railway and converted into a double tracked, steam worked line. The Y&NM built the present Whitby station to the design of its architect George Townsend Andrews, who also designed the locomotive shed and the goods shed. Andrews' station included a fine 'Euston Truss' overall roof which was removed by British Railways in 1953 and replaced by the present awnings.
In 1854, the Y&NM helped form the North Eastern Railway, who later added two more platforms to help deal with traffic from the other branch lines that served Whitby; the Esk Valley Line finally opened throughout to a junction at in 1865 while the coast line from opened in 1883 and from Scarborough in 1885. Block signalling replaced the time interval system in 1876 and brought Whitby an unusual three storey signal box to make it high enough to see over the adjacent goods shed.
In 1900, the NER authorised the installation of Tile Maps at 25 of their stations. Whitby is one of nine stations left to have their map still in situ and intact. The other eight are at Beverley, Hartlepool, Middlesbrough, Morpeth, Saltburn, Scarborough, Tynemouth and .
The NER became part of the London and North Eastern Railway at the grouping of the railways in 1923 and the LNER became part of British Railways with the nationalisation of the railways in 1948. The only changes brought to Whitby were in locomotives, rolling stock and signalling; the basic structure remained unchanged.
The station was scheduled to be closed in the 1963 Beeching Report, which recommended the removal of all three lines serving the station. The route to York via Pickering and Malton was closed as scheduled, while the coast lines had gone by 1965. However the Esk Valley Line to Middlesbrough was kept open because of poor road access for replacement buses.
With the closure of all but the Esk Valley Line, Whitby lost almost all of its staff. Over the following years the pickup goods train was withdrawn, the remaining double track as far as was singled and the signal box closed and demolished, as was the goods shed. A run-round loop for excursion trains was retained and was used by the regular NYMR services from 2007 until 2014.
Platforms 3 and 4 were entirely removed and the site sold off, to be occupied by a supermarket. Platform 2 was cut back to what remains of the trainshed and its
|
https://en.wikipedia.org/wiki/CPU%20Wars
|
CPU Wars is an underground comic strip by Charles Andres that circulated around Digital Equipment Corporation and other computer manufacturers starting in 1977. It described a hypothetical invasion of Digital's slightly disguised Maynard, Massachusetts ex-woolen mill headquarters (now located in Barnyard, Mass) by troops from IPM, the Impossible to Program Machine Corporation in a rather-blunt-edged parody of IBM. The humor hinged on the differences in style and culture between the invading forces of IPM and the laid-back employees of the Human Equipment Corporation. For example, even at gunpoint, the employees were unable to lead the invading forces to their leaders because they had no specific leaders as a result their corporation's use of matrix management.
The comic was drawn by a DEC employee, initially anonymous and later self-revealed to be Charles Andres. A compendium of the strips was finally published in 1980.
The most notable trace of the comic is the phrase Eat flaming death, supposedly derived from a famously turgid line in a World War II-era anti-Nazi propaganda comic that ran “Eat flaming death, non-Aryan mongrels!” or something of the sort (however, it is also reported that on the Firesign Theatre's 1975 album In The Next World, You're On Your Own a character won the right to scream “Eat flaming death, fascist media pigs” in the middle of Oscar night on a game show; this may have been an influence). Used in humorously overblown expressions of hostility. “Eat flaming death, EBCDIC users!”
References
External links
Digital Equipment Corporation
History of computing hardware
Underground comix
|
https://en.wikipedia.org/wiki/Central%20Elevated%20Walkway
|
The Central Elevated Walkway is an extensive footbridge network spanning Admiralty, Central and parts of Sheung Wan, near Victoria Harbour in Hong Kong.
The system was built in phases by the Hong Kong Government and various developers, such as Hongkong Land, Jardine Matheson Holdings and Shun Tak Holdings. It has escalators and staircases for access. Parts of it are air-conditioned. There is another system in Admiralty that is currently not connected to the Central system.
History
In the 1970s, Hongkong Land built a footbridge over Connaught Road to facilitate pedestrian access between Connaught Place (today's Jardine House), Swire House (today's Chater House) and the General Post Office. The developer also built many footbridges between its buildings which were under construction.
In the 1980s, after Exchange Square was completed, the government built a footbridge to connect to Hongkong Land's network; it ran west along the harbourfront to connect Central Piers and Shun Tak Centre. Other buildings along Queen's Road Central, such as Standard Chartered Bank Building and Central Tower, were also connected to the system.
In 1993, the Central–Mid-Levels escalator came into operation, and Hang Seng Bank Building was connected.
In 1998, the International Finance Centre and Airport Express Hong Kong station were completed and brought into the network.
After 2000, the government built a bridge between World-Wide House and Exchange Square.
Central system
Coverage
East to: The Landmark, Prince's Building, MTR Hong Kong station, Central station
South to: Hang Seng Bank main branch, Central–Mid-Levels escalator, Soho, Conduit Road
West to: Shun Tak Centre (Sheung Wan), Hong Kong–Macau Ferry Terminal, MTR Sheung Wan station
North to: International Finance Centre, Central Piers, MTR Hong Kong station
Connected buildings
International Finance Centre
City Hall
Jardine House
Exchange Square
General Post Office
World-Wide House
Chater House
Alexandra House
Mandarin Oriental
Prince's Building
9 Queen's Road Central
Bank of East Asia main branch
Standard Chartered Bank Building
The Landmark
Central Building
Central Place
Hang Seng Bank building
Central Market
Harbour Building
Infinitus Plaza
Shun Tak Centre
Admiralty system
Coverage
East to: CITIC Tower, MTR Admiralty station
South to: Hong Kong Park, CITIC Tower
West to: Hutchison House, AIA Central, Cheung Kong Center
North to: City Hall
Connected buildings
Pacific Place
CITIC Tower
United Centre
Admiralty Centre
Queensway Plaza
Far East Finance Centre
Lippo Centre
Queensway Government Offices
Fairmont House
Murray Road Carpark Building
Bank of China Tower
Cheung Kong Center
Hong Kong Park
Three Garden Road
Bank of America Tower
Hutchison House(redevelopment in progress)
AIA Central
External links
Labyrinth in the Air - TV program by Radio Television Hong Kong on the Central Elevated Walkway and the related Central–Mid-Levels Escalators System. (video
|
https://en.wikipedia.org/wiki/WEVD
|
WEVD was an American brokered programming radio station with some news-talk launched in August 1927 by the Socialist Party of America. Making use of the initials of recently deceased party leader Eugene Victor Debs in its call sign (it called itself the "Debs Memorial Station"), the station operated from Woodhaven in the New York City borough of Queens. The station was purchased with a $250,000 radio fund raised by the Socialist Party in its largest fundraising effort of the 1920s and was intended to spread progressive ideas to a mass audience. A number of national trade unions and other institutions aided the Socialists in obtaining the station.
Originally broadcasting at 1220 kHz AM, later on 1300 kHz, for many years on 1330 kHz and finally on 1050 kHz, operation of the station was acquired by the publishing association responsible for producing the Yiddish-language social democratic daily newspaper The Jewish Daily Forward in 1932. An FM station using the same call sign was added during the 1950s. After briefly leaving AM broadcasting in 1979, The Forward swapped its FM frequency for another AM frequency and continued broadcasting as a small ethnic station until divesting itself late in the 1980s.
History
Origins
Radio broadcasting emerged on a mass scale in the United States during the first half of the 1920s, with the number of stations in operation rising from 28 in 1921 to 571 in 1925. A new form of mass media had emerged. Congress passed federal legislation called the Radio Act of 1927 early in that year establishing a Federal Radio Commission (FRC), which was granted power to regulate the emerging industry, granting licenses and assigning broadcasting wavelengths to bring order to a chaotic market.
Under this legislation, broadcasters would not own the right to broadcast at a certain frequency but would rather use what was deemed a public resource for a limited period of time, not to exceed three years. To earn continuation of the privilege of broadcasting over the public airwaves, stations would be forced to demonstrate service to the public interest under the new law.
The Socialist Party of America was in the throes of a membership decline throughout the decade of the 1920s, the communist left wing of the organization having been suspended, expelled or split from the organization beginning with the seminal 1919 Emergency National Convention of the party. Dues-paying membership fell during this period from more than 100,000 to less than 10,000. The party's finances were similarly deeply affected and the organization felt pressed to explore new means of reaching an increasingly apathetic public. At its December 1926 quarterly meeting the governing National Executive Committee of the Socialist Party decided to erect a radio broadcasting station as a memorial to its recently deceased co-founder, Eugene V. Debs, who had died in October of the previous year.
In March 1927 the Socialist Party of America launched a fundraising drive aim
|
https://en.wikipedia.org/wiki/WYMeditor
|
WYMeditor is an open-source WYSIWYM text editor written in the JavaScript programming language for editing content on web pages. It is based on the jQuery JavaScript framework. It differs from other embeddable text editors such as FCKeditor and TinyMCE in that it concentrates on the semantics and meaning of content leaving out visual details. Unlike WYSIWYG editors, it explicitly shows the XHTML structure of content to the user.
Presentation and visual coherence is added using CSS which is either provided prepackaged, or can be customized.
WYMeditor is web server agnostic meaning it can be integrated into web pages built with any server side language.
Although lacking in some areas, WYMeditor statedly has more readable and cleaner source code. The opposite is often said about its competitors.
References
External links
wymeditor.github.com
WYMeditor web site
WYMeditor documentation
WYMeditor Drupal module
WYMeditor extension for Refinery CMS
WYMeditor Django integration
WYMeditor on Ohloh
Free HTML editors
Free text editors
JavaScript-based HTML editors
Drupal
|
https://en.wikipedia.org/wiki/Census%20county%20division
|
A Census County Division (CCD) is a subdivision of a county used by the United States Census Bureau for the purpose of presenting statistical data. A CCD is a relatively permanent statistical area delineated cooperatively by the Census Bureau and state and local government authorities. CCDs are defined in 21 states that do not have well-defined and stable minor civil divisions (MCDs), such as townships, with local governmental purposes, or where the MCDs are deemed to be "unsatisfactory for the collection, presentation, and analysis of census statistics".
CCDs are not governmental units and have no legal or governmental functions. Their boundaries usually follow visible features, such as roads, railroads, streams, power transmission lines, or mountain ridges, and coincide with the boundaries of census tracts. CCDs do not span county lines. Each CCD is given a name based on the name of the largest population center in the area, a prominent geographic feature, the county name, or another well-known local name that identifies its location.
CCDs were first implemented for tabulation of 1950 Census data from the state of Washington. As of the 2010 census, a total of 5,191 CCDs were defined in 20 states.
North Dakota briefly adopted CCDs for the 1970 Census, but soon returned to using MCDs for subsequent censuses. The main reason for abandoning CCDs was financial. As legal units of local government, MCDs could qualify for federal revenue sharing funds, while purely statistical areas like CCDs did not. In 2008, Tennessee changed from using CCDs to using MCDs, leaving 20 states using CCDs as of the 2010 census.
See also
Census-designated place
References
External links
Chapter 8: County Subdivisions (PDF),
U.S. Census Bureau, Geographic Areas Reference Manual
State/County Subdivision Outline Maps, U.S. Census Bureau (Inactive)
United States Census Bureau geography
|
https://en.wikipedia.org/wiki/Telecommunications%20mediation
|
Telecommunications mediation is a process that converts call data to pre-defined layouts that can be imported by a specific billing system or other OSS applications.
Mediation platform
They are often referred to as internet protocol detail records. Mediation also processes event detail records or EDRs that are usually generated by the charging systems or any other network elements. Hence, Mediation platforms can process all xDRs that are generated by any network element, be it CDR, EDR or UDR.
Naming
Billing mediation platforms get their name from their behavior: they "mediate" data between systems. In a typical telephone company scenario, the systems providing data to the mediation platform are network elements, such as telephone switches, and the systems receiving data from the mediation platform perform accounting, auditing, archiving, or bill-generation functions. The mediation system collects, collates and prepares data for consumption by the downstream systems, which often accept data only in a limited set of formats.
Data types
The usage and call detail record datatypes hold data such as NPX, NPA, call duration, peak time flag and call length. Data may be represented in ascii or binary formats. The billing mediation platform typically reads this data and converts it into common normalized format.
Billing systems and all other downstream systems, in turn, converts this data to component [its own] understandable format.
Functionality
Typically a mediation platform is used for the following tasks:
Collection and validation of call detail records
Filtering out of non billing-relevant call detail records
Collating
Correlation of different input sources call detail records
Aggregation of partial call detail records related to the same call
Format change and call detail record normalization
Business transformation of data
In a telecom billing scenario, mediation is the first step after receiving a call detail record. The mediated call detail record files are forwarded to a rating engine, which calculates the charge associated with the call detail records. In today's world, Rating Engines are becoming more necessary for the telecom billing system to be able to meet the growing variant customer needs for different services.
Despite the name, not all of the data transferred via billing mediation platforms is actually used for billing purposes. For instance, the mediation software might generate traffic volume statistics based on the number and origin of the records it processes. Those statistics could then be used for capacity planning, as part of a network monitoring procedure, or for any other business intelligence applications.
At core, mediation involves data transfer between various systems with or without modification of data starting from Network elements to any OSS/BSS systems.
Sophisticated billing mediation software serves end to end functionality for telecom operators. Mediation software performs various operat
|
https://en.wikipedia.org/wiki/Business%20mileage%20reimbursement%20rate
|
The business mileage reimbursement rate is an optional standard mileage rate used in the United States for purposes of computing the allowable business deduction, for Federal income tax purposes under the Internal Revenue Code, at , for the business use of a vehicle. Under the law, the taxpayer for each year is generally entitled to deduct either the actual expense amount, or an amount computed using the standard mileage rate, whichever is greater.
The business mileage reimbursement rate is used by some employers for computing employee reimbursement amounts when an employee operates a motor vehicle not owned by the employer for the employer's business purposes. The General Services Administration (GSA) sets the rate for federal jobs. In general, the GSA rate matches the annual rate set by the IRS, although by law the government employee reimbursement rate cannot exceed the mileage rate set by the IRS for business deductions.
Reimbursement by an employer on a per-mile basis is also used in other countries; it offers a similar simplification to payment of subsistence per diem.
Reimbursement rates since 1991
References
IRS.gov Standard Mileage Rate Overview
IRS Document 463; Form 2106, Internal Revenue Service, U.S. Dept. of the Treasury (for applicable years); IRS Rev. Proc. 2005–78; IRS Rev. Proc. 2006–49; IRS Rev. Proc. 2008–72.
Revenue Procedure 2008–72, I.R.B. 2008–50, November 24, 2008, Internal Revenue Service, U.S. Dep't of the Treasury.
IRS increases mileage rate for remainder of 2022
Internal Revenue Service
Corporate taxation
Accounting terminology
Tax terms
|
https://en.wikipedia.org/wiki/Kelvin%20Hughes
|
Hensoldt UK, formerly Kelvin Hughes, is a British company specialising in the design and manufacture of navigation and surveillance systems and a supplier of navigational data to both the commercial marine and government marketplace.
The company provides radar systems to navies, governments, coastlines, ports and VTS installations as well as radars for land based security and surveillance applications.
Part of Kelvin Hughes' history includes producing the first Type Approved commercial radar in 1947 as well as the first paper chart tracing service in 1971. Modern day products that Kelvin Hughes sell include SharpEye, a solid state radar with clutter management and Doppler processing.
History
The Kelvin connection
The Kelvin connection is based upon the professional relationship between William Thomson (later-Lord Kelvin) (1824–1907), Professor of Natural Philosophy at Glasgow University from 1846–1899 and James White (1824–1884), a Glasgow-based Optical Instrument Maker. White's association with Thomson lasted until he died, but without any legal deeds of co-partnership White bore the financial risks of their working partnership.
James White founded the firm of James White, Optician and Philosophical Instrument Makers in Glasgow in 1850 and was involved in the supply and maintenance of apparatus for Thomson's university laboratory and worked with him on experimental constructions. By 1854, White was producing electrical instruments such as electrometers and electrical balances from Thomson's designs.
William Thomson was appointed a director of the Atlantic Telegraph Company in 1856 and in 1858 was 'electrician' on HMS Agamemnon that laid the first transatlantic telegraph cable. Unfortunately this cable failed soon after it was laid.
In 1857, White entered into a short-lived partnership, White & Barr, with John Barr. The partnership lasted until 1860 when it was dissolved and White reverted to his previous company name of James White. White was declared bankrupt in August 1861, and then discharged four months later.
In 1866 the Great Eastern laid the first successful transatlantic telegraph cable and Thomson was knighted. During this time White was involved in the production of machinery that Thomson had designed to address problems encountered in laying cables at sea, helping to make possible the first transatlantic cable connection. At the same time, he continued to make a whole range of more conventional instruments such as microscopes, telescopes and surveying equipment.
During 1870 White was largely responsible for equipping Sir William's laboratory in the new University premises at Gilmorehill in his capacity as Philosophical Instrument Maker to the University of Glasgow.
In 1874 Sir William investigated the Mariner's compass for a magazine article. This initiated his extensive work on compasses and marine instruments. From 1876 White was producing accurate compasses for metal ships to Sir William's design, and this became an impo
|
https://en.wikipedia.org/wiki/Roads%20in%20the%20United%20Kingdom
|
The United Kingdom has a well developed and extensive network of roads totalling about . Road distances are shown in miles or yards and UK speed limits are indicated in miles per hour (mph) or by the use of the national speed limit (NSL) symbol. Some vehicle categories have various lower maximum limits enforced by speed limiters. A unified numbering system is in place for Great Britain, whilst in Northern Ireland, there is no available explanation for the allocation of road numbers.
The earliest specifically engineered roads were built during the British Iron Age. The road network was expanded during the Roman occupation. Some of these roads still remain to this day. New roads were added in the Middle Ages and from the 17th century onwards. Whilst control has been transferred between local and central bodies, current management and development of the road network is shared between local authorities, the devolved administrations of Scotland, Wales and Northern Ireland, and National Highways in England. Certain aspects of the legal framework remain under the control of the United Kingdom parliament.
Although some roads have much older origins, the network was heavily developed from the 1950s to the mid-1990s to meet the demands of modern traffic. Construction of roads has become increasingly problematic with various opposition groups such as direct action campaigns and environmentalists. There are various ongoing and planned road building projects.
In the UK, road safety policy is part of transport policy. "Transport 2010; The 10 Year Plan" states that the basic principle is that "people travel safely and feel secure whether they are on foot or bicycle, in a car, on a train, or bus, at sea or on a plane".
Road network
The UK has a road network totalling about of paved roads— in Great Britain (England, Scotland and Wales) and in Northern Ireland.
Administration
Responsibility for the road network differs between trunk and non-trunk routes. Trunk roads, which are the most important roads, are administered by National Highways in England, Transport Scotland in Scotland, the North and Mid Wales Trunk Road Agent, and South Wales Trunk Road Agent in Wales. England's of trunk roads account for 33% of all road travel and 50% of lorry travel. Scotland has (about 7% of the total roads in Scotland), accounting for 35% of all road journeys and over 50% of lorry movements. Wales has of trunk roads. In London, Transport for London is responsible for all trunk roads and other major roads, which are part of the Transport for London Road Network. All other roads are the responsibility of the relevant County Council or unitary authority. In Northern Ireland, DfI Roads is responsible for all roads. The pan-British total is .
Whilst generally they are trunk roads, several motorways are the responsibility of local authorities, for example the M275.
Since 2008, location marker posts have appeared on motorways and major A roads in England, situated general
|
https://en.wikipedia.org/wiki/Pcom
|
Pcom or PCOM may refer to:
Pcom Network, an Internet Service Provider based in Tehran Province, Iran
P-Com, a defunct radio-networking manufacturer
Pacific College of Oriental Medicine
Philadelphia College of Osteopathic Medicine, in the United States
Posterior communicating artery, a blood vessel in the brain often referred to as the 'p-com'
Prison Commission (England and Wales)
|
https://en.wikipedia.org/wiki/Apple%20Partition%20Map
|
Apple Partition Map (APM) is a partition scheme used to define the low-level organization of data on disks formatted for use with 68k and PowerPC Macintosh computers. It was introduced with the Macintosh II.
Disks using the Apple Partition Map are divided into logical blocks, with 512 bytes usually belonging to each block. The first block, Block 0, contains an Apple-specific data structure called "Driver Descriptor Map" for the Macintosh Toolbox ROM to load driver updates and patches before loading from a MFS or HFS partition. Because APM allows 32 bits worth of logical blocks, the historical size of an APM formatted disk using small blocks is limited to 2 TiB.
The Apple Partition Map maps out all space used (including the map) and unused (free space) on disk, unlike the minimal x86 master boot record that only accounts for used non-map partitions. This means that every block on the disk (with the exception of the first block, Block 0) belongs to a partition.
Some hybrid disks contain both an ISO 9660 primary volume descriptor and an Apple Partition Map, thus allowing the disc to work on different types of computers, including Apple systems.
Intel-based Macs
For accessing volumes, both APM and GPT partitions can be used in a standard manner with Mac OS X Tiger (10.4) and higher. For starting an operating system, PowerPC-based systems can only boot from APM disks whereas Intel-based systems generally boot from GPT disks. Nevertheless, older Intel-based Macs are able to boot from APM, GPT (GUID Partition Table) and MBR (Master Boot Record, using the BIOS-Emulation called EFI-CSM i.e. the Compatibility Support Module provided by EFI).
Intel-based models that came with Mac OS X Tiger (10.4) or Leopard (10.5) preinstalled had to be able to boot from both APM and GPT disks due to the installation media for these universal versions of Mac OS X, which are APM partitioned in order to remain compatible with PowerPC-based systems. However, the installation of OS X on an Intel-based Mac demands a GPT partitioned disk or will refuse to continue, the same way installation on a PowerPC-based system will demand an APM partitioned destination volume. Cloning an already installed OS X to an APM partition on Intel systems will remain bootable even on 2011 Intel-based Macs. Despite this apparent APM support, Apple never officially supported booting from an internal APM disk on an Intel-based system. The one exception for a universal version of Mac OS X (Tiger or Leopard) is an official Apple document describing how to set up a dual bootable external APM disk for use with PowerPC and Intel.
Layout
Each entry of the partition table is the size of one data block, which is normally 512 bytes. Each partition entry on the table is the size of one block or sector of data. Because the partition table itself is also a partition, the size of this first partition limits the number of entries to the partition table itself.
The normal case is that 64 sectors (64 × 512 =
|
https://en.wikipedia.org/wiki/Isaac%20%28talk%20show%29
|
Isaac is an American TV show hosted by fashion designer and personality Isaac Mizrahi. It was shot in New York City, and aired on the Style Network in the United States. It premiered on December 5, 2005, and ended on May 25, 2007. Segments included man-on-the-street interviews, "Sketches and Answers" and celebrity interviews. He was supported by "Ben and the band" and an on-set coffee bar that served coffee to the most famous guests.
The show package was designed and created by E! On Air Design Art Director, Phil Han with Executive Producer Dione Li and SVP, Creative Director, Ann Epstein-Cohen.
References
External links
Isaac show on Style Network
2000s American television talk shows
2010s American television talk shows
2005 American television series debuts
Style Network original programming
|
https://en.wikipedia.org/wiki/Plaintext-aware%20encryption
|
Plaintext-awareness is a notion of security for public-key encryption. A cryptosystem is plaintext-aware if it is difficult for any efficient algorithm to come up with a valid ciphertext without being aware of the corresponding plaintext.
From a lay point of view, this is a strange property. Normally, a ciphertext is computed by encrypting a plaintext. If a ciphertext is created this way, its creator would be aware, in some sense, of the plaintext. However, many cryptosystems are not plaintext-aware. As an example, consider the RSA cryptosystem without padding. In the RSA cryptosystem, plaintexts and ciphertexts are both values modulo N (the modulus). Therefore, RSA is not plaintext aware: one way of generating a ciphertext without knowing the plaintext is to simply choose a random number modulo N.
In fact, plaintext-awareness is a very strong property. Any cryptosystem that is semantically secure and is plaintext-aware is actually secure against a chosen-ciphertext attack, since any adversary that chooses ciphertexts would already know the plaintexts associated with them.
History
The concept of plaintext-aware encryption was developed by Mihir Bellare and Phillip Rogaway in their paper on optimal asymmetric encryption, as a method to prove that a cryptosystem is chosen-ciphertext secure.
Further research
Limited research on plaintext-aware encryption has been done since Bellare and Rogaway's paper. Although several papers have applied the plaintext-aware technique in proving encryption schemes are chosen-ciphertext secure, only three papers revisit the concept of plaintext-aware encryption itself, both focussed on the definition given by Bellare and Rogaway that inherently require random oracles. Plaintext-aware encryption is known to exist when a public-key infrastructure is assumed.
Also, it has been shown that weaker forms of plaintext-awareness exist under the knowledge of exponent assumption, a non-standard assumption about Diffie-Hellman triples.
Finally a variant of the Cramer Shoup encryption scheme was shown to be fully plaintext aware in the standard model under the knowledge of exponent assumption.
See also
Topics in cryptography
References
Theory of cryptography
|
https://en.wikipedia.org/wiki/Fran%20Rooney
|
Fran Rooney is an Irish businessman, Barrister-At-Law and is Executive Chairman of Healthcare company Blocknubie Limited which supplies solutions in the Blockchain and Artificial Intelligence space. He.also has a strong football background and was CEO of the Football Association of Ireland from 2003 to 2004. He is also a Chartered Accountant and Fellow of the Institute of Chartered Accountants in Ireland.
As CEO of the cryptography and data security company, Baltimore Technologies, Fran took the company from a small operation to a global enterprise with a market cap of $13.6 billion; twice named Ireland’s Company of the Year. Fran was also presented with the 2000 Businessman of the Year by the President of Ireland and 2001 Entrepreneur of the Year by the Bank of Ireland.
Early life
Rooney studied at CBS Westland Row,. Institute of Public Amininistration, Institute of Chartered. Accountants and the Honourable Society of Kinns Inns.. he managed anted this alongside playing Football and acknowledged all things sporting as building his early career.
Football career
He was Chief Executive Officer of the Football Association of Ireland from May 2003 to November 2004.
He took on the role of CEO to bring about change in the running of football because of his passion for the game. Previously he had an active career as a footballer playing for Shamrock Rovers, Home Farm and St Patrick's Athletic and coached football and Gaelic Football teams. He became a football manager managing a number of teams and took on the role the Republic of Ireland women's national football team manager from 1986 to 1992.
Early business career
Higher Executive Officer, Variety of roles in Irish Government Sector.
An Post – Systems Analyst, Responsible for designing, developing and implementing high end computer systems.
National Irish Bank – 1990–1993 General Manager
Meridian – 1993–1994 – Managing Director
Quay Financial Software – 1994–1996 – CEO
Baltimore Technologies
Baltimore Technologies was founded As CEO Fran Rooney developed Baltimore Technologies to a global data security company. He developed products, marketed company and listed on NASDAQ and London Stock Exchange (achieved FTSE 100 status) with a market capitalisation of €13.6 billion, 1,400 employees and offices in 23 cities worldwide.
In 1998 Bill Clinton and Bertie Ahern signed an Electronic Commerce deal using Baltimore's technology. Under Rooney's leadership Baltimore underwent several successful mergers, became a member of the FTSE 100, and was also successfully listed on the NASDAQ. Baltimore Technologies was Company of the Year in 1998 and 2000. In 2000, Mr. Rooney was awarded Businessman of the Year and was presented with his award by the President of Ireland, Mary McAleese. He was Bank of Ireland Entrepreneur of the Year in 2001.
Business career – continued
National Irish Bank – Corporate Banking – Asset Finance – Credit Cards
Vimio – 2004–2005 – Executive Chairman – Successful listin
|
https://en.wikipedia.org/wiki/North%20Auckland%20Line
|
The North Auckland Line (designation NAL) is a major section of New Zealand's national rail network, and is made up of the following parts: the portion of track that runs northward from Westfield Junction to Newmarket Station; from there, westward to Waitakere; from there, northward to Otiria via Whangārei. The first section was opened in 1868 and the line was completed in 1925. The line, or sections of it, have been known at various times as the Kaipara Line, the Waikato-Kaipara Line, the Kaipara Branch and the North Auckland Main Trunk.
North Auckland Line is a designation for the section of track, not a service route. The southernmost portion from Westfield Junction to Newmarket was originally built as part of the North Island Main Trunk railway, with Newmarket serving as the junction of the two lines. The North Island Main Trunk was re-routed in 1930 via the Westfield Deviation through Glen Innes and Panmure. Westfield-Newmarket was then incorporated into the North Auckland Line, and Newmarket-Auckland became the Newmarket Line, which today connects the North Auckland Line to Britomart Transport Centre.
Three passenger lines of Auckland's suburban rail network make use of the North Auckland Line. Southern Line services travel on it between Westfield Junction and Newmarket Station. Onehunga Line services travel on it between Penrose Station and Newmarket Station. Western Line services travel on it between Swanson Station and Newmarket Station.
The North Auckland Line previously continued to Opua in the Bay of Islands, with the section from Otiria to Opua sometimes known as the Opua Branch. It is now owned by the Bay of Islands Vintage Railway but regular operations were suspended in 2001, with resumption on a short section of the line in 2008.
The North Auckland Line was under review as part of KiwiRail's turnaround plan. In 2020, the government announced $109.7 million for upgrades to the line, focussing on rebuilding and lowering the floors of 13 tunnels along the line to enable hi-cube containers. A container terminal is to be built at Otiria.
A new branch line, the Marsden Point Branch, will serve Northport, a deepwater port at Marsden Point, by diverging from the North Auckland Line south of Whangarei at Oakleigh.
In 2023 the NAL was expected to be out of action to at least June after floods in January; (see 2023 Auckland Anniversary Weekend floods), and it was announced that KiwiRail was "progressing" the business case for the new Marsden Branch.
Branch lines
Three branch lines are on the line:
The Onehunga Branch line connects with the North Auckland Line at Penrose and forms part of the route of Onehunga Line suburban passenger train services operating between Britomart and Onehunga via Newmarket.
The Newmarket Line meets the North Auckland Line at Newmarket and provides a connection with Britomart.
Further north, the Dargaville Branch branches off in Waiotira. It is currently mothballed, with a portion in use by a tourist
|
https://en.wikipedia.org/wiki/CBKF-FM
|
CBKF-FM is a Canadian radio station, which broadcasts the programming of Radio-Canada's Ici Radio-Canada Première network on 97.7 FM at Regina, Saskatchewan.
History
The station was launched on April 24, 1975. In 1973, two years prior to the station's launch, the network also purchased two established francophone community radio stations, CFRG in Gravelbourg and CFNS in Saskatoon, and converted them to rebroadcasters of CBKF. The stations were recalled as CBKF-1 and CBKF-2, respectively.
The CFRG calls are now used by a French-language community station in Gravelbourg operating at 93.1 FM.
A community group in Prince Albert, the Société canadienne-française de Prince Albert, held a separate license to rebroadcast CBKF's programming in that city. The 3,000 watt class B community-owned rebroadcaster CKSF-FM 90.1 has gone off the air to be replaced by Ici Radio-Canada Première's CBKF-FM Regina in 2020.
On May 30, 2013, the CRTC approved the CBC's request to increase CBKF-FM's wattage from 13,700 watts to 22,300 watts, with a decrease in the effective height of antenna above average terrain from 153 to 146.2 metres.
Transmitters
On August 7, 2020, the CBC received CRTC approval to add a new FM transmitter at 90.1 MHz Prince Albert to rebroadcast the programming of CBKF-FM in Regina, Saskatchewan. The new transmitter will also replace CKSF-FM at Prince Albert which was previously owned by Société canadienne-française de Prince Albert, a community-owned rebroadcaster of CBKF-FM Regina. The new call sign become CBKF-FM-6.
References
External links
Ici Radio-Canada Première
Bkf
Bkf
Radio stations established in 1975
Fransaskois culture
Bkf
1975 establishments in Saskatchewan
|
https://en.wikipedia.org/wiki/CBK-FM
|
CBK-FM is a Canadian radio station, which broadcasts the programming of the CBC Music network at 96.9 FM in Regina, Saskatchewan.
The station was launched on May 1, 1977. Its studios are at the CBC Regina Broadcast Centre, 2440 Broad Street in Regina, along with CBK and CBKT-DT.
Rebroadcasters
References
External links
BK
BK
Radio stations established in 1977
1977 establishments in Saskatchewan
|
https://en.wikipedia.org/wiki/Rogue%20Galaxy
|
Rogue Galaxy is an action role-playing video game developed by Level-5 and published by Sony Computer Entertainment for the PlayStation 2. The game was released in Japan in December 2005, in North America in January 2007, and in most European countries and Australia in September of the same year. A director's cut of the game was released in Japan in March 2007, which includes all of the added features and improvements made for the North American and European localizations.
The game follows the adventures of Jaster Rogue, a young agricultural worker living on an isolated planet, who becomes involved in a galactic conflict, and learns the fate of the entire galaxy lies in his hands. At the time of its release, Rogue Galaxy was the largest game Level-5 had ever developed, both in terms of the number of staff working on it and the length of production (over three years). Both Level-5 and Sony had strong expectations for the game, hoping it would challenge the RPG market dominance of the Final Fantasy and Dragon Quest franchises.
Rogue Galaxy received generally positive reviews, with critics praising the graphics, range of side quests and scope of the game. Some, however, were critical of the plot and character development. Although the game went on to win several gaming awards, it did not sell as well as had been hoped, failing to meet Sony's expectations of selling one million units.
Gameplay
Rogue Galaxy is an action role-playing game played from a third-person perspective in which the player moves through a continuous environment, with no load time between overworld exploration and combat. Battles occur as random encounters, a la traditional role-playing video games such as Square's Final Fantasy X or Level-5's own Dragon Quest VIII: Journey of the Cursed King. However, unlike such games, which feature turn-based combat, Rogue Galaxy uses a real-time hack and slash combat system in which the player fights with a party of three characters. The player has direct control over only one character, although which character this is can be changed at any time. The two NPCs fight independently of the player character, based on the strategy selected prior to the battle. Available strategies include fighting very aggressively, targeting a specific enemy, or not fighting at all. The strategy can also be changed at any time during the battle. Additionally, the player can issue specific orders to the NPCs during combat, such as having them use an item or activate one of their special abilities. NPC allies will also offer advice to the player character, such as suggesting they perform a special move or use a particular item. The player is given a choice of either ignoring the advice, or picking one of the available options. NPCs will not perform any special moves or use items unless the player tells them to, or has selected a particular strategy prior to the battle.
During combat, each character has an "Action Gauge", which decrease with each action taken. W
|
https://en.wikipedia.org/wiki/WBBW
|
WBBW (1240 AM) is a commercial radio station in Youngstown, Ohio, broadcasting a sports format. The station carries the CBS Sports Radio Network, much of it simulcast with co-owned 96.7 WLLF.
WBBW is one of seven radio stations in the Youngstown market owned by Cumulus Media. The radio studios and offices are in "The Radio Center" in Youngstown. Prior to January 2, 2013, WBBW featured programming from ESPN Radio.
WBBW carries the Mahoning Valley Scrappers in the collegiate summer baseball league. WBBW and WLLF are also the Youngstown affiliates of the Cleveland Browns and the Pittsburgh Pirates.
WBBW has been on the air since February 20, 1949.
References
External links
Sports radio stations in the United States
BBW
Radio stations established in 1949
CBS Sports Radio stations
Cumulus Media radio stations
1949 establishments in Ohio
|
https://en.wikipedia.org/wiki/Children%27s%20Miracle%20Network%20Hospitals
|
Children's Miracle Network Hospitals (CMN Hospitals) (French: Réseau Enfants-Santé (RES)) is a nonprofit organization that raises funds for children's hospitals in the U.S. and Canada. Donations support the health of more than 10 million children each year.
Donations, which go to local hospitals, fund critical life-saving treatments and healthcare services along with research, medical equipment, emotional, and health support during difficult hospital stays, as well as financial assistance. CMN Hospitals funds are unrestricted. Donations are directed to local member hospitals so they can be used where they are needed the most.
The organization, founded in 1983 by Marie Osmond, John Schneider, Mick Shannon, and Joe Lake, is headquartered in Salt Lake City, Utah. The current president and CEO is Teri Nestel. To date, CMN Hospitals has raised more than US$7 billion, which is distributed to a network of 158 hospitals.
History
Children's Miracle Network began as a telethon in 1983. Shannon and Lake conceived the telethon with Schneider and Osmond serving as hosts. The first telethon raised $4.8 million for 22 hospitals. The telethon continued as a major fundraising arm for the organization for many years, and some hospital markets still use it today.
Children's Miracle Network rebranded as Children's Miracle Network Hospitals in the U.S. in 2011. Currently, CMN Hospitals operates the largest network of children's hospitals in both the U.S. and Canada. The organization's member hospitals collectively provide an impressive 32 million treatments each year to children across North America. Most of the organization's funding, totaling $7 billion, has been raised one dollar at a time through the charity's iconic "Miracle Balloon" campaign.
Fundraising
Children's Miracle Network Hospitals raises money each year to support local children's hospitals. CMN Hospitals' fundraising efforts include corporate fundraising campaigns with more than 80 corporate partners and fundraising programs including Dance Marathon, the global Extra Life gaming platform, and Radiothon, which hosts radio fundraisers through radio stations in support of their CMN Hospital.
Corporate fundraising partners include Walmart, Ace Hardware, Sam's Club, Costco Wholesale, Wawa, RE/MAX, IHOP, Credit Unions For Kids, Love's Travel Stops, Costco, CDW, Delta Air Lines, Publix, Rite Aid, Dairy Queen, IHOP, Sigma Chi, Delta Zeta, Domino Sugar, Phi Mu, Speedway LLC, Phi Delta Epsilon, Phi Kappa Theta, Zeta Beta Tau, Sigma Alpha Epsilon, and Marriott International. In 2019, Walmart celebrated $1 billion raised for CMN Hospitals through its partnership with the organization.
Many universities host annual Dance Marathon events to support Children's Miracle Network Hospitals and other local children's hospitals. These events have collectively raised more than $250 million to support CMN Hospitals services, such as the Indiana University Dance Marathon which raised more than $36 million for Riley H
|
https://en.wikipedia.org/wiki/James%20Gillogly
|
James J. Gillogly (born 5 March 1946) is an American computer scientist and cryptographer.
Biography
Early life
His interest in cryptography stems from his boyhood, as did his interest in mathematics. By junior high he was inventing his own ciphers and challenging his father, entomologist Lorin Gillogly, to solve them.
Gillogly wrote a chess-playing program in the Fortran programming language in 1970, and in 1977 he ported the code for "Colossal Cave" from Fortran to C.
Education
He graduated from Carnegie Mellon University in 1978, receiving a Ph.D. in computer science. He was advised by Allen Newell, with his dissertation titled "Performance Analysis of the Technology Chess Program".
Career
Gillogly worked as a computer scientist at RAND, specializing in system design and development, and computer security. He has written several articles about technology and cryptography, is currently the editor of the "Cipher Exchange" column for The Cryptogram, and was president of the American Cryptogram Association.
Gillogly was one of the earliest authors of personal computer software, writing utility programs, games and a computerized cookbook published by the Software Toolworks beginning in 1980.
Cryptanalysis
He is best known for his work solving or debunking some of the world's most famous unsolved codes. In 1980 he wrote a paper on unusual strings in the Beale Ciphers, and he received international media attention for being the first person to publicly solve parts 1-3 on the CIA's Kryptos sculpture in 1999. He also coordinates a large mailing list about the ciphers in the Voynich Manuscript. On the PBS website, they report that he has been called "arguably the best non-government cryptanalyst in the U.S." in the field of classical (historical) cryptosystems.
In 1995 he deciphered a text enciphered by Robert H. Thouless who had hoped the message could prove that the dead could communicate with the living. Gillogly wrote his own software to decipher the text, which was in a variant of the playfair cipher.
Selected articles
Articles by Gillogly at rand.org, 1970–1994
MAX: A FORTRAN Chess Player", 1970, RAND Paper
Exploratory modeling: search through spaces of computational experiments", 1994, RAND Reprint
"The impact of response options and location in a microcomputer interview on drinking drivers' alcohol use self-reports", 1990, Rand Corporation, co-written with Ron D. Hay,s Robert M. Bell, Laural A. Hill, Matthew W. Lewis, Grant N. Marshall, Ronald Nicholas, Gordon Marlatt
"The Technology Chess Program", 1972, Artificial Intelligence, Volume 3, pp. 145–163
Cryptograms from the Crypt
"The Beale Cipher: A Dissenting Opinion", April 1980, Cryptologia, Volume 4, Number 2
"Ciphertext-Only Cryptanalysis of Enigma", October 1995, Cryptologia, Volume 19, Number 4
See also
Cryptanalysis of the Enigma
References
External links
"Solving the Enigma of Kryptos", January 21, 2005, Wired News
"Cracking the Code of a CIA Sculpture", July 1999, Washin
|
https://en.wikipedia.org/wiki/Municipal%20broadband
|
Municipal broadband, sometimes referred to as a "Government-owned Network" or GON, is broadband Internet access offered by public entities. Services are often provided either fully or partially by local governments to residents within certain areas or jurisdictions. Common connection technologies include unlicensed wireless (Wi-Fi, wireless mesh networks), licensed wireless (such as WiMAX), and fiber optic cable. Many cities that previously deployed Wi-Fi based solutions, like Comcast and Charter Spectrum, are switching to municipal broadband. Municipal fiber-to-the-home networks are becoming more prominent because of increased demand for modern audio and video applications, which are increasing bandwidth requirements by 40% per year. Supporters of municipal broadband argue that when cities create their own internet and broadband, customers ultimately get faster internet speeds, lower prices, and better customer service than from internet service providers. The purpose of municipal broadband is to provide internet access to those who cannot afford internet from internet service providers and local governments are increasingly investing in said services for their communities.
Wireless public networks
Wireless public municipal broadband networks avoid unreliable hub and spoke distribution models and use mesh networking instead. This method involves relaying radio signals throughout the whole city via a series of access points or radio transmitters, each of which is connected to at least two other transmitters. Mesh networks provide reliable user connections and are also faster to build and less expensive to run than the hub and spoke configurations. Internet connections can also be secured through the addition of a wireless router to an existing wired connection – a convenient method for Internet access provision in small centralized areas. Although wireless routers are generally reliable, their occasional failure means no Internet availability in that centralized area. This is why companies now use mesh networking in preference to hub and spoke configurations.
Municipalities deploy networks in several ways. The five primary municipal broadband design approaches include:
Full service (e.g., Chattanooga, Tennessee)
Open access (e.g., Utah)
Dark fiber (e.g., Stockholm, Sweden (also open access))
Incremental expansion (e.g., Santa Monica, California)
Private-public partnership (e.g., Westminster, Maryland)
Three basic models for the operation and funding of Wi-Fi networks have emerged:
Networks designed solely for use by municipal services (fire, police, planners, engineers, libraries, etc.). Municipal funds are used to establish and run the network;
Quasi-public networks for use by both municipal services and private users owned by the municipality but operated for profit by private companies ("private hot spots"). Such networks are funded by specially earmarked tax revenues then operated and maintained on a chargeable basis by private se
|
https://en.wikipedia.org/wiki/ICNS
|
ICNS can refer to
Apple Icon Image, uses the extension .icns
A resource in the resource fork used for icon data
The International Conference on Nitride Semiconductors
|
https://en.wikipedia.org/wiki/Jack%20TV
|
Jack TV (capitalized as JACK TV) is an online web portal owned by Solar Entertainment Corporation and based in Mandaluyong, Metro Manila. It was known as a Philippine pay television network mainly offering multi-genre programming from the United States from 2005 until 2020.
History
The network was formed as part a split of the former Solar USA into two differing networks. Scripted and reality programming moved to Jack TV, with the rest of the network's programming moving to C/S (now Solar TV). Jack TV eventually took back some of C/S's programming as it adjusted its schedule. On October 20, 2012, Solar Entertainment launched its secondary channel Jack CITY on BEAM TV, replacing CHASE. The channel was later re-branded as CT, which later left the air in 2017.
On April 10, 2017, Jack TV was dropped by Sky Cable & Destiny Cable, along with Basketball TV, CT, Solar Sports & NBA Premium TV (now defunct) allegedly due to Sky Cable's unpaid carriage fees. It was restored to those systems on April 1, 2019.
Since 2014, Jack TV held its own annual event "MADfest" (Music, Arts and Dance Festival), featuring a mix of OPM and international artists and bands as well as live art installations and merchandise selling.
Closure on pay TV and the transition to digital media
Solar Entertainment announced in late March 2020 that Jack TV would be discontinued due to lack of advertising and redundant programming. Much of its former programming moved to ETC and Solar Sports. The Jack TV website then was maintained as a limited web portal with automated entertainment news to maintain existing trademarks. On most providers, its channel space was replaced by Front Row Channel, an international digital channel of American global entertainment company Jungo TV which airs live music concerts of international music artists.
Program distribution
External links
References
Television networks in the Philippines
Former Solar Entertainment Corporation channels
English-language television stations in the Philippines
Television channels and stations established in 2005
2005 establishments in the Philippines
Television channels and stations disestablished in 2020
2020 disestablishments in the Philippines
Defunct television networks in the Philippines
|
https://en.wikipedia.org/wiki/Lite%20FM%20%28New%20Zealand%29
|
Lite FM was a New Zealand radio station broadcasting in Christchurch on 94.5FM. The station was first started in 1997 by Radio Otago in Dunedin on 90.2 FM, the programme was also networked to Invercargill on 98.0 FM. Programming on the station at this point was mostly voice tracked and on air the station was often called "The Lite FM Network." In 1998 Lite FM began broadcasting in Christchurch when Radio Otago rebranded Easy Listening i94 as Lite FM. Easy Listening i94 was first started in Christchurch in 1994 by C93FM Limited under a franchise agreement with Easy Listening i, Radio Otago purchased C93FM Limited in 1997.
In 1999 Radio Otago was sold to The RadioWorks and the Invercargill and Dunedin stations were replaced with network station Solid Gold. Lite FM continued to broadcast in Christchuch and became part of Radioworks collection of local stations known as LocalWorks.
The station played easy-listening music from the 1970s to present day. The station was rebranded and replaced by The Breeze in 2004 when Radioworks decided to rebrand all their local Easy Listening stations as The Breeze. Today The Breeze in Christchurch remains a live and local station despite other The Breeze stations having their local shows replaced with Auckland-based network shows, However the night show now comes from Auckland.
Radio stations in Christchurch
Radio stations in Dunedin
Defunct radio stations in New Zealand
The Breeze (New Zealand radio station)
Radio stations established in 1997
Radio stations disestablished in 1999
|
https://en.wikipedia.org/wiki/NT-1
|
NT-1 may refer to:
New Standard D-29, a trainer aircraft produced in the US from 1929 to 1930
Network termination 1, a functional grouping of customer-premises equipment in Integrated Services Digital Networks (ISDN)
Mackenzie Highway, abbreviated NT-1
|
https://en.wikipedia.org/wiki/NT1
|
NT1 may refer to:
TFX (TV channel), formerly NT1, a French television channel
Network termination 1 in digital telephony
New Standard D-29, U.S. Navy trainer designated "NT-1"
|
https://en.wikipedia.org/wiki/Okaihau%20Branch
|
The Okaihau Branch, sometimes known as the Kaikohe Branch and rarely the Rangiahua Branch, was a branch line railway that joined the North Auckland Line of the national rail network of New Zealand at Otiria. It was the most northerly line in New Zealand and was intended to run all the way to Kaitaia. It opened to Ōkaihau in 1923 and closed in 1987.
Construction
Proposals for a railway line to Kaitaia and the Far North existed as early as the 1870s, but it was not until 1909 that preliminary surveys were conducted. After the North Auckland Line was linked to and extended over the Opua Branch in 1911, construction progressed in earnest from Otiria towards Kaikohe: initial work had been undertaken in 1910. On 1 May 1914, this section opened. A small amount of further construction took place over the next two years, but World War I meant that no work took place between 1916 and 1919. The resumption of work led to the completion of the line to Ōkaihau on 29 October 1923.
Debate raged over what route to follow to Kaitaia. The proposal was to run from Ōkaihau to Rangiahua, near the Hokianga Harbour, and then either through the Maungataniwha Range, about long with two tunnels; or skirting the range, roughly longer with no tunnels. A 1921 commission did not support work beyond Ōkaihau, but a compromise in 1923 established Rangiahua as the northern terminus and the Public Works Department continued to build northwards, albeit slowly.
Due to the Great Depression construction of the line beyond Ōkaihau was abandoned in 1931. The Rangiahua section was essentially complete: the line wound downhill to the settlement and a station yard complete with platform was built, though the station building itself was not erected. Following a change in government in 1935, a 1936 review of the work beyond Ōkaihau was undertaken, and the decision was made not to extend the line to Kaitaia. The steep route to Rangiahua was not seen as being particularly useful and had been plagued by slips. The line was accordingly terminated in Okaihau, which was on the main State Highway north (SH1). During 1938 and World War II the abandoned trackage was salvaged, sometimes by bullock teams, for use elsewhere, especially the Dargaville Branch.
Stations
The following stations were on the Okaihau Branch, with the distance from Otiria in brackets. The extension to Rangiahua is not included, as it never saw regular service.
Otiria to Kaikohe (Opened 1 May 1914)
Kawiti (5 km)
Cameron's Crossing (7 km)
Ngapipito (10 km)
Rakautao (17 km)
Ngapuhi (22 km)
Kaikohe (26 km)
Kaikohe to Okaihau (Opened 29 October 1923)
Lake Omapere Road Crossing (35 km)
Okaihau (40 km)
A ballast pit was located near Kawiti.
Engine sheds were located at Kaikohe (closed 1930) and Okaihau
Operation
Although Kaikohe has become established as the service centre of the Far North, it failed to generate much rail traffic in the early years of the line. During the first ten months of existence, just 1,500 tons
|
https://en.wikipedia.org/wiki/Hinduja%20Group
|
Hinduja Group is an Indian transnational conglomerate. The group is present in eleven sectors including automotive, oil and specialty chemicals, banking and finance, IT and ITeS, cyber security, healthcare, trading, infrastructure project development, media and entertainment, power, and real estate. The Hinduja brothers have around billion of assets around the world. The Hinduja family has around billion of assets in America. The 2022 net worth of the Hinduja brothers was billion, making them the wealthiest people in the United Kingdom. In May 2023, company patriarch Srichand Hinduja died.
History
The company was founded in 1914 by Parmanand Deepchand Hinduja, who was from a Sindhi family based in India. Initially operating in Shikarpur (in modern-day Pakistan) and Bombay, India, he set up the company's first international operation in Iran in 1919. The headquarters of the group remained in Iran until 1979, when the Islamic Revolution forced it to move to Europe.
Group Chairman Srichand Hinduja and his brother Gopichand, also Co-Chairman, moved to London in 1979 to develop the export business; the third brother Prakash manages the group's operations in Geneva, Switzerland while the youngest brother, Ashok, oversees the Indian interests.
The group employs over 200,000 people and has offices in many major cities around the world including in India. In 2017, Srichand and Gopichand Hinduja were described as the wealthiest men in Britain with an estimated wealth of billion in the Sunday Times Rich List 2017.
In 2015, at The Asian Awards, the Hinduja brothers were honoured with the Business Leader of the Year Award. Ashok Hinduja was felicitated with the ABLF Global Asian Award at the UAE Government-backed Asian Business Leadership Forum in 2017. OneOTT Intertainment Limited (OIL), the Media Vertical arm of Hinduja Group, was awarded the 2019 Innovation Leaders award by Telecomlead.com.
In May 2023, lead Hinduja chair Srichand Hinduja died in London at the age of 87.
Hinduja Group companies
Hinduja Housing Finance Ltd,..
Ashok Leyland
Switch Mobility
Ashok Leyland Foundries – a division of Ashok Leyland, also known as Hinduja Foundries
P.D. Hinduja National Hospital and Medical Research Centre
P.D. Hinduja Sindhi Hospital Bangalore
Hinduja Healthcare Limited
Hinduja Bank (Switzerland) Ltd (formerly Amas Bank)
IndusInd Bank
Hinduja Leyland Finance Ltd
Hinduja Global Solutions Ltd
Hinduja Tech Ltd
GOCL Corporation Ltd
Gulf Oil International Ltd
Gulf Oil Lubricants India Limited
Quaker-Houghton International Ltd
Gulf Oil Middle East Ltd
Hinduja National Power Corporation Ltd
Hinduja Renewables Energy Private Ltd
Hinduja Realty Ventures Ltd
Hinduja Group India Limited
KPB Hinduja College of Commerce
NXTDIGITAL Ltd (formerly Hinduja Ventures Ltd) – includes Nxtdigital Hits, OneOTT iNtertainment Ltd, INE, and INDigital
Cyqurex Systems Private Limited
British Metal Corporation (India) Pvt Ltd
Hinduja Investments and Projec
|
https://en.wikipedia.org/wiki/Sea%20of%20Faith
|
The Sea of Faith Network is an organisation with the stated aim to explore and promote religious faith as a human creation.
History
The Sea of Faith movement started in 1984 as a response to Don Cupitt's book and television series, both titled Sea of Faith. Cupitt was educated in both science and theology at the University of Cambridge in the 1950s, and is a philosopher, theologian, Anglican priest, and former Dean of Emmanuel College, Cambridge. In the book and TV series, he surveyed western thinking about religion and charted a transition from traditional realist religion to the view that religion is simply a human creation.
The name Sea of Faith is taken from Matthew Arnold's nostalgic mid-19th century poem "Dover Beach," in which the poet expresses regret that belief in a supernatural world is slowly slipping away; the "sea of faith" is withdrawing like the ebbing tide.
Following the television series, a small group of radical Christian clergy and laity began meeting to explore how they might promote this new understanding of religious faith. Starting with a mailing list of 143 sympathisers, they organised the first UK conference in 1988. A second conference was held in the following year shortly after which the Sea of Faith Network was officially launched. Annual national conferences have been a key event of the network ever since.
Organisation
The Sea of Faith Network is a loose network rather than a formal religious organisation. It holds national and regional conferences and promotional events each year. There is an active network of local groups who meet regularly for discussion and exploration.
The group's magazine Sofia is published quarterly in the United Kingdom. The group also maintains a web site and an on-line discussion group.
Currently there are national networks in the UK, New Zealand and Australia with scattered membership in the USA, Northern Ireland, South Africa, France and The Netherlands. The world-wide membership, as of 2004, stood at about 2,000. Each national network is run by a steering committee elected from its members.
Beliefs
The organisation has no official creed or statement of belief to which members are required to assent. Its stated aim is to "explore and promote religious faith as a human creation," In this it spans a broad spectrum of faith positions from uncompromising non-realism at one end to critical realism at the other. Some members describe themselves as on the liberal or radical wing of conventional belief (see liberal Christianity) while others choose to call themselves religious or Christian humanists (see humanism). Some even refer to themselves as agnostic, atheist, or simply nontheist (see Christian atheism).
Sea of Faith possesses no religious writings or ceremonies of its own; many members remain active in their own religion (mainly but not exclusively Christian) while others have no religious affiliation at all.
Philosophy
A number of commentators have identified Sea of Faith as clo
|
https://en.wikipedia.org/wiki/Leo%20James%20English
|
Leo James English (August 1907 – 1997) was the Australian compiler and editor of two of among the first most widely used bilingual dictionaries in the Philippines. He was the author of the two companion dictionaries namely, the English–Tagalog Dictionary (1965) and the Tagalog–English Dictionary (1986). English saw the successful completion of his dictionaries that were carried out in the course of his 51 years of religious service in the Philippines. He was a member of the Redemptorists or the Congregation of the Most Holy Redeemer, a religious order that has been engaged in preaching missions using the vernacular language in the Philippines for more than seventy years. English was instrumental in the introduction and revision of the Novena to Our Mother of Perpetual Help.
His dictionaries
The Tagalog–English dictionary contains about 16,000 Tagalog main words, 21,000 derivatives and 30,000 translated sentences that illustrate the use of the words. For some entries, synonyms and explanatory notes are added. The English–Tagalog dictionary contains more than 14,000 main English entries and an addition of 40,000 nuances, each both defined in English and translated into Tagalog, as well as 30,000 exemplifying sentences. Together, they are one of the most exhaustive published collections of the Tagalog language.
The dual dictionaries of English pioneered the launching of many bilingual dictionaries and thesauruses in the Philippines including those authored by the Filipino compiler, Vito C. Santos, namely the Vicassan's Pilipino–English Dictionary and the New Vicassan's English–Pilipino Dictionary (1995). James English acknowledged consulting Vito Santos’s Pilipino–English Dictionary for reference while completing his Tagalog–English Dictionary. Vito C. Santos once worked with English.
English's dictionaries had been influential in the development and propagation of the Filipino language in the Philippines and abroad.
References
External links
Leo James English’s Bilingual Dictionaries
Resources about the Philippines
Tips on Learning Tagalog
Online radio in Tagalog
89th birthday
Leo James English's obituary in the Philippine Journal of Linguistics
Other Philippine dictionaries
An English–Cebuano–Visayan Dictionary by Rodolfo Cabonce, Metro Manila, Philippines: National Book Store, 1983
Ilokano Dictionary by Ernesto Constantino, Honolulu: University of Hawaii Press, 1971
Diksyunaryong Filipino–English by Komisyon sa Wikang Filipino, Pasig, Metro Manila, 1989
JVP English–Filipino Thesaurus-Dictionary, Metro Manila, Mhelle L. Publications, 1988
Vicassan's Pilipino–English Dictionary by Vito C. Santos, Metro Manila, National Book Store, 1988
Tagalog Slang Dictionary by R. David Paul Zorc, Manila, De la Salle University Press, 1993
Lim English–Filipino Filipino–English Dictionary, by Ed Lim, Lulu.com, 2008
1907 births
1997 deaths
20th-century Filipino Roman Catholic priests
Filipino language
Linguists from the Philippines
Tagalog lang
|
https://en.wikipedia.org/wiki/Johnny%20Jupiter
|
Johnny Jupiter is the name of two early American television programs featuring a combination of live action and hand puppets. The first version aired on the DuMont Television Network from March to June 1953. The second version aired on ABC from September 1953 to May 1954.
DuMont version
The original version, broadcast live on the DuMont Television Network Saturday evenings for 30 minutes, from March 21 to June 13, 1953, starred Vaughn Taylor as an elderly janitor, Ernest P. Duckweather, cleaning-up after midnight in a TV studio. Tinkering with a TV set, he somehow made contact with the planet Jupiter, and two of its inhabitants, Johnny Jupiter and his colleague B-12, both of whom were hand puppets voiced by series writer Jerome Coopersmith and Carl Harms. The often sharp humor of the series was based on Duckweather trying to explain and justify earth customs to the natives of Jupiter, who could view them on their own TV sets.
As an example, the program covered the US fad for 3-D movies, which came and went rapidly in 1953. The Jovian natives explain that their own movies were originally in 3-D but rapidly evolved to 7-D before dropping to 1-D, which is the format all Jovians prefer today.
Episode status
Very few kinescopes of the DuMont version of Johnny Jupiter have survived.
ABC version
Another weekly 30-minute version of the series, filmed and sponsored by M&M's Candies, appeared on ABC from September 5, 1953, to May 29, 1954. The concept was completely different from the DuMont version of the series. Wright King, as Duckweather, was now an eager young employee of a TV repair shop; most of each episode consisted of live-action situation comedy involving Duckweather, his boss Horatio Frisby, the boss's daughter Katherine, and one or more guest-stars.
The puppets appeared only when Duckweather needed help or advice; the magic TV set now brought in three Jovian hand puppets: Johnny Jupiter; a cube-headed robot, Major Domo; and a cylinder-headed, glasses-wearing Reject the Robot, all voiced by Gil Mack. On at least one episode Reject's brother Defect appeared (Except for Johnny, the natives of Jupiter were apparently now all robots). The solution to Duckweather's problem generally involved beaming the bumbling Reject to earth, where he was played by new puppeteer Gene (aka Phil) London wearing a large prop robot suit.
Apart from the robot suit, the new series was not geared towards children. The series was canceled after one 39-episode season. In this second series, Jerry Coopersmith was producer and script editor only.
Episode status
Copies of the ABC version of the program have survived and have been released on DVD.
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
References
Bibliography
David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
Alex McNeil, Total Television, Fourth ed
|
https://en.wikipedia.org/wiki/Non-speech%20audio%20input
|
Non-speech audio input is the use of non-speech sounds such as whistling, humming or hissing for entering data or controlling the user interface.
See also
Auditory display for non-speech auditory output
References
Sound technology
|
https://en.wikipedia.org/wiki/British%20Divers%20Marine%20Life%20Rescue
|
British Divers Marine Life Rescue (BDMLR) is a British charity established in 1988 and is a frontline marine mammal response organisation. It utilises a network of trained volunteers around the country to respond to marine mammals potentially in need of assistance via a public 24hr hotline and callout system. The organisation's main areas of operation are in the United Kingdom and its territorial waters; however, the charity has received requests from Canada, the Falkland Islands, Kenya, Ireland, Italy, Kazakhstan, Malta and Abu Dhabi.
BDMLR has developed an Marine Mammal Medic training program and has trained over 20,000 medics worldwide. To complement the Marine Mammal Medic training program, BDMLR has also produced a Marine Mammal Medic Handbook for stranded cetaceans. The organisation specialises primarily in pinniped (seals) and cetacean (porpoises, dolphins and whales) rescue, however they will also respond to stranded sea turtles, sharks, oiled sea birds and large whales entangled at sea.
In 2008 BDMLR received training from the Provincetown Centre for Coastal Studies (PCCS) in Maine in the United States of America, on how to rescue entangled large free swimming whales, and in 2013 adapted these techniques to form the BDMLR Large Whale Disentanglement Team (LWDT).
The organization received media attention in January 2006 due to its response to Willy, a northern bottlenose whale that became disorientated and later stranded after swimming up the River Thames into central London. A large operation began on the morning of Saturday 21 January and lasted until the evening when the whale died prior to being put to sleep by a specialist marine mammal veterinarian due to its poor health.
BDMLR has participated in or led rescue efforts that were launched to save either mass stranded pilot whales or pilot whales in danger of mass stranding at Loch Carnan in South Uist on the Outer Hebrides of Scotland in 2010, at Loch Carnan in South Uist on the Outer Hebrides of Scotland in 2011, at the Kyle of Durness on the North West Corner of the Highlands of Scotland in 2011, at Pittenweem in Fife on the East Coast of Scotland in 2012, at Portmahomack and Dornoch Point on the East Coast of the Highlands of Scotland in 2013 and Staffin Island on the West Coast of Scotland in 2015. In 2018, the BDMLR also took part in monitoring Benny, a beluga whale who had been sighted foraging in the Thames Estuary, and in 2021 managed Wally the walrus during his time at the Isles of Scilly where he unintentionally damaged unmanned dinghies by attempting to haul out on them.
BDMLR opened a purpose-built permanent seal hospital in Cornwall in September 2021. The facility is managed by a vet and supported by volunteer medics to provide care for up to ten seal pups. The centre is also used for trainings.
The charity also supports conservation goals around wildlife disturbance, pollution and climate change. It is a founding member of the Marine Animal Rescue Coalition.
|
https://en.wikipedia.org/wiki/Killzone%3A%20Liberation
|
Killzone: Liberation is a third-person shooter video game developed by Guerrilla Games and published by Sony Computer Entertainment for the PlayStation Portable (PSP). It was originally released on 31 October 2006 in North America. It is a follow-up to Killzone, taking place two months after the original game. Killzone: Liberation is the only PSP installment in the series, and the first of only two for Sony's handheld consoles, the second of which was Killzone: Mercenary for the PlayStation Vita in 2013. An updated version of Liberation was released on 20 June 2023 for the PlayStation 4 and PlayStation 5.
In Killzone: Liberation, players control Templar, a soldier in the ISA (Interplanetary Strategic Alliance) who was the primary protagonist of the previous game, Killzone. Throughout the game, players battle against the Helghast, a group of genetically enhanced soldiers. The game features a single-player campaign that follows Templar as he tries to rescue hostages and gather intelligence on the Helghast. It also includes a multiplayer mode in which players can compete against each other in various game modes.
Killzone: Liberation is known for its strong graphics and gameplay, which build upon the foundations of the original Killzone game. It received generally positive reviews upon release, with many praising its solid controls and engaging story.
Gameplay
This game features a top-down isometric view in contrast to the original Killzone for the PlayStation 2 (PS2), which is a first-person shooter. The resultant game can be seen as a mixture of a shooter and a dungeon crawler.
The player controls Jan Templar, who was the primary protagonist of the original game. He can board and control several vehicles: heavy machine gun turrets, a tank, a hovercraft, and a jetpack. During some levels, a 'buddy' can be ordered around (although some are unarmed). These 'buddies' are normally teammates (Rico and Luger) or people that have to be rescued (the three VIP's in the third mission of the first chapter and Evelyn in the third mission of the fourth chapter).
By collecting various pickups in the form of money cases, the player unlocks new weapons. These can be found in various weapon caches in certain levels. After enough money is amassed, the V2 upgraded weapons become available. The weapons in the caches are converted into the V2 upgraded versions.
The player can unlock upgrades to Templar's abilities by completing challenges within certain limits (such as shooting X number of targets without shooting the 'civilian' targets). These are ranked in bronze, silver, and gold. Upgrades come in the form of carrying more items, hitting harder in close quarters combat, performing actions faster, unlimited ammunition, or upgraded health.
Multiplayer
Infrastructure online multiplayer servers have been shut down since the game's release, though it was widely praised by critics and players. Before servers were shutdown, players could play via ad-hoc. Players coul
|
https://en.wikipedia.org/wiki/Team%20Soho
|
Team Soho (formerly credited as SCEE Internal Development Team or also known as SCEE Studio Soho) was a British first-party video game developer and a studio of Sony Computer Entertainment based in Soho, London.
The company was founded in 1994. The original development staff had little to no experience in the video game industry, with most of them being recent college graduates. They started out with developing NBA ShootOut, the first entry of the NBA ShootOut series, which released in 1996. In 2002, the studio was closed and merged with SCEE Studio Camden (former Psygnosis Camden Studio) to form London Studio. The Team Soho brand was retained for The Getaway: Black Monday.
The Getaway creative director, Brendan McNamara, founded Team Bondi in mid-2003 in Sydney, and had hired several former staff members of Team Soho. After Bondi's closure, he founded Videogames Deluxe.
List of software developed
References
External links
1994 establishments in England
2002 disestablishments in England
2002 mergers and acquisitions
British subsidiaries of foreign companies
Companies based in the City of Westminster
Defunct companies based in London
Defunct video game companies of the United Kingdom
English brands
First-party video game developers
PlayStation Studios
Software companies based in London
Soho, London
Video game companies disestablished in 2002
Video game companies established in 1994
|
https://en.wikipedia.org/wiki/KZ%20Manager
|
KZ Manager is a name shared by many similar resource management computer video games that put the player in the role of a Nazi concentration camp commandant or "manager", where the "resources" to be managed include, depending on the version of the game, prisoners (either Jews, Turks or Gypsies), poison gas supplies, "normal" money and various equipment, as well as "public opinion" on the "productivity" of the camp. The game has been indexed by the German Federal Department for Media Harmful to Young Persons, meaning that it is forbidden to distribute the game in Germany.
Gameplay
The goal of the game is to keep the camp functioning by keeping the "public opinion" or other important resources and gauges over or under a certain threshold. In one version, public opinion rises when the "manager" executes a number of prisoners with Zyklon B. However, ordering said gas costs money, which can be gathered by forcing the prisoners to work.
Spending too much time without a "sufficient" number of executions makes "public satisfaction" drop, and having too few working prisoners will soon drive to a resource shortage, and closing of the camp, thus losing the game. Also, prisoners must be "purchased" by the camp's "manager", and the corpses of the deceased prisoners must be disposed of (the game describes them as "Müllberg", German for "garbage mountain " or "pile of garbage"), an operation which also has an associated cost.
Like other resource management games, this means that ultimately the goal of the game is trying to find an optimal balance and timing between expenses, income, actions and "production goals", although with a highly controversial twist.
History
In 1991, The New York Times reported that KZ Manager was one of about 140 games with similar themes. Austrian newspapers reported that a poll of students in one city found 39 percent knew of the games and 22 percent had encountered them. "KZ" is the German shorthand for concentration camp (Konzentrationslager).
Versions
Each game version was released several times and began to circulate in Austria and Germany during the 1990s, the earliest versions being DOS, text mode games, graphical DOS versions as well as a Windows version titled KZ Manager Millennium. According to a 1991 article written by Linda Rohrbough, an Amiga version has been found to exist. Gameplay and graphics of the Amiga version and its 256 color DOS port were far more advanced than in the original C64 game.
References
External links
New York Times: Video Game Uncovered in Europe Uses Nazi Death Camps as Theme
1990 video games
The Holocaust in popular culture
Amiga games
Commodore 64 games
Construction and management simulation games
DOS games
Video games developed in Austria
Windows games
|
https://en.wikipedia.org/wiki/Technological%20Threat
|
Technological Threat is a 1988 American animated short made by Brian Jennings and Bill Kroyer and was produced by Kroyer Films. It was an example of early computer animation, integrated with traditional animation, and is itself an allegory for the possibilities of combining the two. The robots and backgrounds were drawn based on computer-generated 3D models, while the dogs and wolves were drawn by hand.
Plot
The film takes place in an office staffed by wolves who hand-copy documents using pencils. One of them passes out because of overwork. The bulldog boss pushes a button that carries him through a trapdoor below the worker's desk, and replaces him with a robot that writes faster. Another yawns, and is also dropped through a trapdoor under his desk and replaced by a robot. Three more are eliminating for drinking water, sneezing and injury (one of them desperately plugs his nose with two pencils, but is unable to keep from sneezing, propelling the pencils into another's head). They are replaced by more robots. The remaining worker, madly scribbling away, is shocked to discover that his boss has been replaced by a boss robot. When the latter leaves, the last worker decides to take action, and begins destroying the robots in various cartoony ways (blowing one up with a stick of dynamite, dropping another through its desk trapdoor, yet another by hitting it with different objects, and electrically shocking another into a pile of cinders). As the worker and the one remaining robot are locked in a life-or-death struggle, they see the boss robot threatening to push the trapdoor button. In a sudden instance of cooperating, they shove the trapdoor beneath the boss robot, who falls in. As the two workers peer down the open trapdoor, the remaining worker becomes aware of the opportunity being presented and shoves the robot in thus ending the film with a cigar in his hand and eventually pushing the trapdoor button on the viewer.
Credits
Staff
Producer/Director: Bill Kroyer
Technical Director: Brian Jennings
Character Animation: Greg Vanzo, Rich Moore, Susan Kroyer, Chris Bailey, Rob Minkoff, Alan Smart
Computer Animation: Bill Kroyer
Character Design: Bill Kroyer, Rich Moore, Brian Jennings
Script: Bill Kroyer, Rich Moore, Brian Jennings
Test Camera: Klasky/Csupo, Inc.
Ink & Paint/Production Camera: Hanho Heung-up Co., Ltd.
Production: Kroyer Films
The film's credits give "special thanks to" Brad Bird, Yutaka Fujioka, Mike Giaimo, Masami Hata, Gábor Csupó, and Bill Hedge.
Accolades and legacy
Technological Threat was featured on the VHS and DVD Computer Animation Festival, Vol. 2 and Computer Animation Festival Vol. 3 (renamed Computer Animation Experience in 2001). It also aired in the second third-season episode of Liquid Television, in 1993.
At the 1988 Ottawa International Animation Festival, Technological Threat shared the prize for "Best film under 5 minutes" with Paul Vester's Picnic. It was nominated for the Academy Award for Best A
|
https://en.wikipedia.org/wiki/Internet%20Fibre%20Channel%20Protocol
|
Internet Fibre Channel Protocol (iFCP) is a gateway-to-gateway network protocol standard that provides Fibre Channel fabric functionality to Fibre Channel devices over an IP network. It is officially ratified by the Internet Engineering Task Force. Its most common forms are in 1 Gbit/s, 2 Gbit/s, 4 Gbit/s, 8 Gbit/s, and 10 Gbit/s.
Technical overview
The iFCP protocol enables the implementation of Fibre Channel functionality over an IP network, within which the Fibre Channel switching and routing infrastructure is replaced by IP components and technology. Congestion control, error detection and recovery are provided through the use of TCP (Transmission Control Protocol). The primary objective of iFCP is to allow existing Fibre Channel devices to be networked and interconnected over an IP based network at wire speeds.
The method of address translation defined and the protocol permit Fibre Channel storage devices and host adapters to be attached to an IP-based fabric using transparent gateways.
The iFCP protocol layer's main function is to transport Fibre Channel frame images between Fibre Channel ports attached both locally and remotely. iFCP encapsulates and routes the fibre channel frames that make up each Fibre Channel information unit via a predetermined TCP connection for transport across the IP network when transporting frames to a remote Fibre Channel port.
See also
Fibre Channel over Ethernet (FCoE)
Fibre Channel over IP (FCIP)
Internet SCSI (iSCSI)
References
Ethernet
Fibre Channel
Network protocols
Internet protocols
|
https://en.wikipedia.org/wiki/Pentagon%20road%20network
|
The Pentagon road network is a system of highways, mostly freeways, built by the United States federal government in the early 1940s to serve the Pentagon in northern Virginia. The roads, transferred to the Commonwealth of Virginia in 1964, are now largely state highways. The main part of the network is the Mixing Bowl at Interstate 395 (Shirley Highway) and Route 27 (Washington Boulevard), named because it had major weaving issues with traffic "mixing" between the two roads before it was rebuilt in the early 1970s.
The "Mixing Bowl" nickname is now more commonly used to refer to the Springfield Interchange, where I-395, I-495, and I-95 converge in nearby Springfield.
The Mixing Bowl
The Mixing Bowl originally opened in 1942 as the junction of the Shirley Highway with the connection to the Arlington Memorial Bridge and the connection to Lee Boulevard (now Arlington Boulevard). The western half, towards Lee Boulevard, was a full three-level Y interchange. The eastern half, towards the Memorial Bridge, was missing a ramp to enter the Shirley Highway northeastbound. Just south of the west half was another interchange, a single Y connecting to Arlington Ridge Road.
From 1970 to 1973, as part of a total reconstruction of the Shirley Highway, the interchange was totally rebuilt to eliminate all weaving of traffic, mainly by the use of collector/distributor roads. The former cloverleaf with Hayes Street became a system of ramps to the various roads. The ramp from I-395 south to Route 27 towards the Memorial Bridge was removed, and a pair of ramps at the crossing of Route 27 and Route 110 made some of the ramps at Route 110 (then known as the Jefferson Davis Highway) redundant. Finally, a two-lane reversible HOV roadway was added in the median, becoming a four-lane two-way road from the eastern part of the interchange into Washington. Special ramps to Route 27 towards the Memorial Bridge and to the Pentagon south parking lot (via Eads Street) were provided for HOV traffic.
Roads
Shirley Highway (I-395)
The Henry G. Shirley Memorial Highway was built to take traffic off the Highway Bridge (now the 14th Street Bridge). The first phase, from the bridge to Arlington Ridge Road, was completed in 1942. This began at an existing cloverleaf interchange with the Mount Vernon Memorial Highway and ran southwest, parallel to the existing Jefferson Davis Highway (U.S. Route 1), to a point southeast of the Pentagon. That section included an interchange with Boundary Channel Drive, which served the Pentagon's north parking lot, and a bridge over the Rosslyn Connecting Railroad. US 1 was routed onto it, as the existing US 1 was cut in several places by ramps.
After crossing the Jefferson Davis Highway, where US 1 exited to the south, the Shirley Highway turned west, with an interchange to access the south parking lot. (Hayes Street now crosses under the highway there.) Southwest of the Pentagon, the connection to the Arlington Memorial Bridge (now Route 27) merge
|
https://en.wikipedia.org/wiki/Certified%20ethical%20hacker
|
Certified Ethical Hacker (CEH) is a qualification given by EC-Council and obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools. The code for the CEH exam is 312–50. This certification has now been made a baseline with a progression to the CEH (Practical), launched in March 2018, a test of penetration testing skills in a lab environment where the candidate must demonstrate the ability to apply techniques and use penetration testing tools to compromise various simulated systems within a virtual environment.
Ethical hackers are employed by organizations to penetrate networks and computer systems with the purpose of finding and fixing security vulnerabilities. The EC-Council offers another certification, known as Certified Network Defense Architect (CNDA). This certification is designed for United States Government agencies and is available only to members of selected agencies including some private government contractors, primarily in compliance to DOD Directive 8570.01-M. It is also ANSI accredited and is recognized as a GCHQ Certified Training (GCT).
Examination
Certification is achieved by taking the CEH examination after having either attended training at an Accredited Training Center (ATC), or completed through EC-Council's learning portal, iClass. If a candidate opts to self-study, an application must be filled out and proof submitted of two years of relevant information security work experience. Those without the required two years of information security related work experience can request consideration of educational background. The current version of the CEH is V12, released in September 2022. The exam, which uses the same EC-Council exam code (312-50) as the earlier versions, has 125 multiple-choice questions and a 4-hour time limit.
The EC-Council and various ATCs administer the CEH examination.
Members holding the CEH/CNDA designation (as well as other EC-Council certifications) must seek re-certification under this program every three years, for a minimum of 120 credits.
Critical components
The CEH focuses on the latest malware attacks, the latest hacking tools, and the new emerging attack vectors in cyberspace. It includes hacking challenges at the end of every module and is built 100% in compliance to the NICE 2.0 Framework to ensure a systematic job role mapping.
References
Further reading
Walker, Matt; CEH Certified Ethical Hacker All-In-One Exam Guide, The McGraw-Hill Companies, 2011.
Oriyano, Sean-Philip; CEH: Certified Ethical Hacker Version 8 Study Guide, Sybex Publishing, 2014.
Gregg, Michael; Certified Ethical Hacker Exam Prep, Que Publishing, 2006.
|
https://en.wikipedia.org/wiki/CHIP%20%28programming%20language%29
|
CHIP (Constraint Handling in Prolog) is a constraint logic programming language developed by M. Dincbas, Pascal Van Hentenryck and colleagues in 1985 at the European Computer-Industry Research Centre (ECRC), initially using a Prolog language interface.
It was the first programming language to implement constraint programming over finite domains,
and subsequently to introduce the concept of global constraints.
CHIP V5 is the version developed and marketed by COSYTEC in Paris since 1993 with Prolog, using C, C++, or Prolog language interfaces. The commercially successful ILOG CPLEX solver is also, partly, an offshoot of the ECRC version of CHIP.
References
External links
CHIP - History of Programming Languages (archived version)
Logic programming languages
Constraint logic programming
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.