source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/Abstract%20type
|
In programming languages, an abstract type (also known as existential types) is a type in a nominative type system that cannot be instantiated directly; by contrast, a concrete type be instantiated directly. Instantiation of an abstract type can occur only indirectly, via a concrete subtype.
An abstract type may provide no implementation, or an incomplete implementation. In some languages, abstract types with no implementation (rather than an incomplete implementation) are known as protocols, interfaces, signatures, or class types. In class-based object-oriented programming, abstract types are implemented as abstract classes (also known as abstract base classes), and concrete types as concrete classes. In generic programming, the analogous notion is a concept, which similarly specifies syntax and semantics, but does not require a subtype relationship: two unrelated types may satisfy the same concept.
Often, abstract types will have one or more implementations provided separately, for example, in the form of concrete subtypes that be instantiated. In object-oriented programming, an abstract class may include abstract methods or abstract properties that are shared by its subclasses. Other names for language features that are (or may be) used to implement abstract types include traits, mixins, flavors, roles, or type classes.
Creation
Abstract classes can be created, signified, or simulated in several ways:
By use of the explicit keyword in the class definition, as in Java, D or C#.
By including, in the class definition, one or more abstract methods (called pure virtual functions in C++), which the class is declared to accept as part of its protocol, but for which no implementation is provided.
By inheriting from an abstract type, and not overriding all missing features necessary to complete the class definition. In other words, a child type that does not implement all abstract methods from its parent becomes abstract itself.
In many dynamically typed languages such as Smalltalk, any class that sends a particular method to this, but does not implement that method, can be considered abstract. (However, in many such languages, like Objective-C, the error is not detected until the class is used, and the message returns results in an exception error message such as "Does not recognize selector: xxx" as - [NSObject doesNotRecognizeSelector:(SEL)selector] is invoked upon detection of an unimplemented method).
Examples
Java
By default, all methods in all classes are concrete, unless the abstract keyword is used. An abstract class may include abstract methods, which have no implementation.
By default, all methods in all interfaces are abstract, unless the default keyword is used.
The default keyword can be used to specify a concrete method in an interface.
//By default, all methods in all classes are concrete, unless the abstract keyword is used.
public abstract class Demo {
// An abstract class may include abstract methods, which have
|
https://en.wikipedia.org/wiki/Trait%20%28computer%20programming%29
|
In computer programming, a trait is a concept used in programming languages which represents a set of methods that can be used to extend the functionality of a class.
Rationale
In object-oriented programming, behavior is sometimes shared between classes which are not related to each other. For example, many unrelated classes may have methods to serialize objects to JSON. Historically, there have been several approaches to solve this without duplicating the code in every class needing the behavior. Other approaches include multiple inheritance and mixins, but these have drawbacks: the behavior of the code may unexpectedly change if the order in which the mixins are applied is altered, or if new methods are added to the parent classes or mixins.
Traits solve these problems by allowing classes to use the trait and get the desired behavior. If a class uses more than one trait, the order in which the traits are used does not matter. The methods provided by the traits have direct access to the data of the class.
Characteristics
Traits combine aspects of protocols (interfaces) and mixins. Like an interface, a trait defines one or more method signatures, of which implementing classes must provide implementations. Like a mixin, a trait provides additional behavior for the implementing class.
In case of a naming collision between methods provided by different traits, the programmer must explicitly disambiguate which one of those methods will be used in the class; thus manually solving the diamond problem of multiple inheritance. This is different from other composition methods in object-oriented programming, where conflicting names are automatically resolved by scoping rules.
Operations which can be performed with traits include:
symmetric sum: an operation that merges two disjoint traits to create a new trait
override (or asymmetric sum): an operation that forms a new trait by adding methods to an existing trait, possibly overriding some of its methods
alias: an operation that creates a new trait by adding a new name for an existing method
exclusion: an operation that forms a new trait by removing a method from an existing trait. (Combining this with the alias operation yields a shallow rename operation).
If a method is excluded from a trait, that method must be provided by the class that consumes the trait, or by a parent class of that class. This is because the methods provided by the trait might call the excluded method.
Trait composition is commutative (i.e. given traits A and B, A + B is equivalent to B + A) and associative (i.e. given traits A, B, and C, (A + B) + C is equivalent to A + (B + C)).
Limitations
While traits offer significant advantages over many alternatives, they do have their own limitations.
Required methods
If a trait requires the consuming class to provide certain methods, the trait cannot know if those methods are semantically equivalent to the trait's needs. For some dynamic languages, such as Perl, the required m
|
https://en.wikipedia.org/wiki/ATCA
|
ATCA may refer to:
Atça, a town in Turkey
Advanced Telecommunications Computing Architecture, a specification for communications equipment
Aid to the civil authority, military aid to the civil power
Alien Tort Claims Act, a U.S. statue on jurisdiction
All Tripura Chess Association, an Indian organisation
American Theatre Critics Association
Association of Turkish Cypriots Abroad
Australia Telescope Compact Array, a radio telescope in New South Wales
|
https://en.wikipedia.org/wiki/MXP
|
MXP may refer to:
In computing and telecommunications:
MXP (computing), a protocol in online gaming
Metropolitan Exchange Point, a major point-to-point location in computer networking, including:
Boston MXP
Other uses:
Milan Malpensa Airport, in Milan, Italy (IATA code)
Methoxphenidine, a dissociative drug
Mexican peso, before 1993 (obsolete ISO 4217 code)
Tlahuitoltepec Mixe, a language spoken in Mexico (ISO 639-3 code)
|
https://en.wikipedia.org/wiki/Calculator%20%28disambiguation%29
|
A calculator (in contemporary usage) is an electronic hand-held device that performs mathematical computations.
Calculator may also refer to:
Calculator (software), a computer program that performs mathematical computations
Calculator (Windows), a computer program in Microsoft Windows
Calculator (Apple), a basic calculator application bundled with Apple devices
Calculator (Nintendo Switch), a paid application available for Nintendo Switch
Mechanical calculator, a calculating device used from the 1700s to the mid-1900s
Mental calculator, a person who performs calculations in their head
Calculator (character), DC Comics villain
Oxford Calculators, a group of 14th-century philosophers
Calculator (band), an American emo band
Richard Swineshead, English mathematician whose popular name was Calculator
|
https://en.wikipedia.org/wiki/Steven%20Collins
|
Steven Collins is a computer scientist who has founded and acted as CTO of several companies in the area of computer graphics and video games. Formerly a professor of computer graphics in the Department of Computer Science in Trinity College, Dublin, was co-manager of the GV2 Research Group. Born in Dundalk, County Louth, his interests in computing began with the Commodore 64 where he single-handedly developed and released the games Badlands and Herobotix.
He is also a co-founder of Havok, a company which provides physics simulation software for computer games and films. The company was sold to Intel in September 2007 for €76M.
In 2005, he was recognized by PC Gamer magazine as being one of the top 50 game industry influencers of that year.
In 2007, Collins started the MSc in Interactive Entertainment Technology course in Trinity College Dublin, where he acts as course director and lectures in real-time rendering. He is quoted as saying that the course was started in order to educate the "future captains of industry" in reference to the games industry. Both Collins and Hugh Reynolds were awarded the Trinity College Dublin Innovation Award for 2007, for their work in co-founding Havok. In March 2008, Collins and Reynolds co-founded "Kore Virtual Machines", a company dedicated to designing computer gaming virtual machines, using the Lua programming language. In October 2007, Kore was purchased by Havok and integrated into their software suite as Havok Script. Collins is currently Chief Technology Officer of King Digital Entertainment, a leading mobile game publisher.
References
External links
Havok.com
Kore.net
Interview with Collins from Team Xbox
Year of birth missing (living people)
Living people
Irish computer scientists
Irish computer programmers
Academics of Trinity College Dublin
Alumni of Trinity College Dublin
People from Dundalk
Scientists from County Louth
Businesspeople from County Louth
|
https://en.wikipedia.org/wiki/The%20Byte%20Works
|
The Byte Works, founded and run by Mike Westerfield, was a key player in the history of developer tools for Apple II computers. Its first product, the ORCA/M assembler (Object Relocatable Code Assembler for Microcomputers, and also MACRO spelled backwards), developed jointly by Westerfield and Phil Montoya, was a powerful assembly language development environment, complete with a Unix-style shell, which ran on 8-bit Apple II computers.
However, The Byte Works came into its own when Apple Computer was developing the Apple IIGS computer. In need of developer tools, they contacted The Byte Works and came to an agreement by which The Byte Works would develop the official developer tool suite for the Apple IIgs -- the Apple Programmer's Workshop (APW). This tool suite eventually would include an assembler as well as a C compiler.
The Byte Works was also able to distribute its own developer tool suite, based on the same code as APW. The ORCA/M assembler came first, followed by ORCA/Pascal, ORCA/C, and several other languages, including ORCA/Modula-2 and ORCA/Integer BASIC.
The Byte Works did produce software other than developer tools, although tools were their mainstay. The Quick Click Calc spreadsheet was an excellent spreadsheet for the Apple IIgs, although it arrived on the scene too late to have any major impact on the market.
An easy-to-use and very powerful BASIC interpreter called GSoft BASIC was also eventually released in the mid-1990s. With the ability to communicate with the Apple IIgs Toolbox, it could be used to produce powerful software with a minimum of effort.
The Byte Works ceased development of Apple II software in 2000 and licensed its entire product line to Syndicomm, which continues to publish its extensive library to this day. In 2015, this license was extended to Juiced.GS.
References
External links
Opus )(: The Software - Juiced.GS, ''is The Byte Works' collection of every Apple II program ever released under the Byte Works label that's 35 commercial applications and 16 unreleased applications!..
Defunct software companies of the United States
Software companies disestablished in 2000
|
https://en.wikipedia.org/wiki/Juiced.GS
|
Juiced.GS is a print magazine/newsletter for Apple II computer users. Although the name implies a focus on the Apple , its coverage encompasses all Apple II systems. It is the longest-running Apple II publication and, since 1999, the only Apple II publication still in print .
The 20-page magazine/newsletter (with the occasional 24- or 28-page special edition) is published quarterly and is mailed to subscribers around the world. Each issue covers the latest Apple II news including new products and event coverage. There are also frequent product reviews, how-to articles, and technical articles covering programming and even hardware design. Each year's third issue features a cover photo of the staff, taken at KansasFest, and includes extensive coverage of the premiere annual Apple II event.
The publication is available as subscription-only, delivered to subscribers via postal mail, though free sample issues are available on the magazine's web site. Juiced.GS subscriptions are annual, currently costing US $20 per calendar year in the United States, $25 in Canada and Mexico and $28 elsewhere in the world. Its 25th annual volume is being published in 2020.
The Juiced.GS domain name could be considered a domain hack.
History
Juiced.GS was founded in 1996 by Max Jones, a senior newspaper editor and devout Apple II enthusiast. What mainly sparked the idea and incentive for creating Juiced.GS was the (then) recent demise of one of the few remaining Apple II printed publications at the time, GS+ Magazine, and he wanted to fill the void. He knew that the Apple was a very capable machine, and wanted to push its limits by publishing a professional grade publication with it. The name "Juiced.GS" is derived from one of Max's friends, who upon seeing Max and knowing of his decked out Apple system, loaded with peripherals, exclaimed "There's the guy with the juiced GS!"
In 2002, Syndicomm, the founding company of Apple II online resource A2Central , took over the publication while retaining the original staff of writers. Max Jones became (and remains as) editor emeritus, while Ryan Suenaga became editor. In 2006, Suenaga moved on to other endeavors, promoting then-associate editor Ken Gagne to the position of editor-in-chief, beginning with Juiced.GS'''s 11th annual volume. At KansasFest 2007, Gagne and Shepherd jointly announced that Gagne would take over publishing duties as well, effective immediately. Juiced.GS'' is now published by Gamebits, a sole proprietorship of Gagne's.
See also
List of publications and periodicals devoted to the Apple II
References
External links
Computer magazines published in the United States
Quarterly magazines published in the United States
Apple II periodicals
Magazines established in 1996
Magazines published in Massachusetts
|
https://en.wikipedia.org/wiki/KansasFest
|
KansasFest (also known as KFest) is an annual event for Apple II computer enthusiasts. Held every July at Rockhurst University in Kansas City, Missouri, KansasFest typically lasts five days and features presentations from Apple II experts and pioneers, as well as games, fun events, after-hours hallway chatter, late-night (or all-night) runs out to movies or restaurants, and more. A number of important new products have been released at KansasFest or developed through collaborations between individuals who likely would not have gotten together. Some of the most notable have been the introduction of the LANceGS Ethernet Card, and the Marinetti TCP/IP stack for the Apple IIGS.
Due to COVID-19, the 32nd and 33rd annual KansasFests were virtual-only, held July 24–25, 2020, and July 23–24, 2021, respectively. The 34th annual KansasFest is currently planned to be held July 18–23, 2023, at Rockhurst University.
History and organization
Resource Central
Vendor fairs were part of the earliest days of the microcomputer revolution. The Apple II had its debut at the first West Coast Computer Faire in April 1977. The popularity of this faire spawned other similar computer events elsewhere in the country. In the early 1980s, some of these vendor fairs became more computer-specific. For the Apple II computer, it began with AppleFest '81, sponsored by the Apple group in the Boston Computer Society. These festivals spread to be held in various places in the country, and Apple Computer became involved, even to the point of sending executives to give keynote addresses, and holding sessions for developers.
After the introduction of the Apple III, Lisa and Macintosh computers, Apple II users and developers were feeling increasingly isolated and ignored by Apple Computer. Tom Weishaar had started a newsletter, Open-Apple (later renamed to A2-Central) about the Apple II, and in it he provided information about the computer, how to use it, product reviews, and more. With time, he created a company named Resource Central to oversee the newsletter and other products available to sell to subscribers. Frustrated by Apple's diminishing emphasis on the Apple II, Weishaar planned a developer's conference that would specifically focus on the Apple II and Apple IIGS. The first event was held in July 1989, and was called the A2-Central Developer Conference, billed as a chance to "meet the people who will make the Apple II's future".
The conference brought together programmers, hardware developers, and Apple sent out a number of members of its Apple II group to participate in the meeting. What made it different from many similar meetings was the way in which the accommodations were handled. Resource Central, which was based in Overland Park, Kansas, arranged for the meeting and housing for many of the attendees at Avila College, a Catholic institution located in Kansas City, Missouri, not far from Overland Park. One of the unanticipated effects of this arrangement was that the
|
https://en.wikipedia.org/wiki/Australian%20Defence%20Air%20Traffic%20System
|
Australian Defence Air Traffic System (ADATS) is the hardware and software system used by the Royal Australian Air Force for Air Traffic Control services. It is a computer based system, which serves as an aid to Air Traffic Controllers. It does not control aircraft, but gives the user a display of information about an aircraft's position and associated information. It also handles communications and other information exchanges.
It is one of two systems in Australia, the other being The Australian Advanced Air Traffic System (TAAATS), which is used by Airservices Australia (civilians)
References
See also
Australian Air Traffic Control
The Australian Advanced Air Traffic System
Royal Australian Air Force
Military equipment of the Royal Australian Air Force
Air traffic control in Australia
Military air traffic control
|
https://en.wikipedia.org/wiki/Vic%20Eliason
|
Victor Carl "Vic" Eliason (May 14, 1936 – December 5, 2015) was an American evangelical clergyman who founded the VCY America Radio Network, a conservative Christian broadcasting ministry, based in Milwaukee, along with Milwaukee television station WVCY-TV.
Early life
Victor Carl Eliason was born on May 14, 1936 in Fort Dodge, Iowa, the son of lay preacher, Oscar C. Eliason, who served with the Swedish Baptist Church and the Assemblies of God, and Norma Olson (born 1911). Eliason attended Open Bible College, in Des Moines, Iowa. After serving as an associate pastor in Des Moines, Iowa, Eliason was ordained in a non-denominational church, in October 1957.
Career
In 1959 Eliason and his wife, Freda (born February 13, 1935), moved to Milwaukee, Wisconsin. In 1960, Eliason became interim director of the Milwaukee, Wisconsin chapter of Youth for Christ. In May 1961 the organization went on the air with Voice of Christian Youth, a 30-minute youth-oriented radio show over WBON-FM in Milwaukee. Soon after the ministry had expanded to a full broadcast day, resulting in 1970 in VCY purchasing WBON for $315,000 and renaming it WVCY-FM.
In 1973, Eliason led the Milwaukee Youth for Christ chapter out of the national organization, renaming it "Voice of Christian Youth." Now known as VCY America, it is a Christian broadcasting ministry based in Milwaukee. VCY currently oversees 15-20 stations mostly across the Upper Midwest, depending on the source, not including its Internet site or a 24-hour-a-day, seven days a week, television station in Milwaukee, which is WVCY-TV, launched in 1983, as well as several "translator" and "satellator" stations. VCY America also provides programming via satellite to stations around the country. The ministry is funded through listeners' and supporters' donations.
Eliason was a prominent on-air personality for the network, with duties including being one of the regular hosts for the network's morning public affairs program, VCY Today and the afternoon news program, Crosstalk. Eliason also provided the voiceovers for the network's overnight music program, Music 'Til Dawn, which features "mostly conservative, ministry-oriented inspirational music", where tunes are interspersed with verses from the Bible and commentary.
In 1978, Eliason established the Voice of Christian Youth school, a private Christian K-12 School at 3434 W. Kilbourn Avenue, Milwaukee. In the early 1990s, the Voice of Christian Youth School merged with Faith Christian Academy and the name of the school was formally changed to Badger State Baptist School, and was relocated to 1170 W. Windlake Ave, Milwaukee.
In 1983, Eliason started WVCY-TV on Channel 30 in Milwaukee. In September 1994, the WVCY-TV board rejected a purchase offer of $10 million from CBS as part of that network's attempt to find a new station in the market (CBS eventually affiliated with WDJT-TV).
Crosstalk
In 1976 Eliason started Crosstalk, a radio talk show he hosted. Even as other hosts jo
|
https://en.wikipedia.org/wiki/Hoosier%20Hill
|
Hoosier Hill is the highest natural point in the U.S. state of Indiana with a claimed elevation of above sea level. Hoosier Hill's claimed elevation is based on SRTM digital elevation data which is now considered to be outdated. Using newer elevation tools such as USGS's 3DEP, the top of Hoosier Hill is closer to above sea level. Hoosier Hill is in the rural area of Franklin Township, Wayne County to the northwest of Bethel. The nearest intersection to the high point is Elliot Road and County Line Road. The nearest major landmark is Interstate 70 and Richmond to the south.
Hoosier Hill sits on private property owned by Kim E. Goble. The high point sits in a forested area surrounded by farmland. In 2005, an Eagle Scout candidate named Kyle Cummings (Troop 820 from Lakeside Park, Kentucky), in cooperation with the property owner, built a trail, sign and picnic area at the high point.
Geologically, the hill sits in the Dearborn Upland, an area of high terrain in southeast Indiana that sits on top of the geologic structure known as the Cincinnati Arch. However, Hoosier Hill is located in a portion of the upland buried underneath glacial debris known as the Tipton Till Plain. As a result, while the average elevation of this upland region is 1100±100 feet above sea level, the topographic relief is gentle where the "hill" is no more than 30 feet higher than the surrounding landscape of gently rolling farmland. While the high topography seen at Brown County State Park, which sits in the Norman Upland in south central Indiana, can be mistaken to be a high point (where relief is 400–500 feet from valley to hilltop), the elevations of hilltops ranges from 800 to 1050 feet.
A.H. Marshall was the first person to successfully climb each U.S. state highpoint. He completed the task in 1936 after standing atop Hoosier Hill.
According to the local government, the wooden sign with the words, "INDIANA'S HIGHEST POINT" would frequently be stolen, so in 2016 the wooden sign was permanently replaced by an engraved boulder.
See also
Outline of Indiana
Index of Indiana-related articles
List of U.S. states by elevation
Sand Hill, Indiana's second highest named point
Weed Patch Hill, Indiana's third highest named point
References
External links
Hills of Indiana
Landforms of Wayne County, Indiana
Highest points of U.S. states
|
https://en.wikipedia.org/wiki/Gomaespuma
|
Gomaespuma was a Spanish radio show, hosted for 15 years by Juan Luis Cano and Guillermo Fesser. The program was cast through the years in several nationwide networks of Spain. It began in Antena 3 Radio in May 1992. It became one of the most popular morning shows in the 90's on M-80 Radio and it saw the last days in Onda Cero Radio in July 2007, when the last program was broadcast.
Gomaespuma organises the "Flamenco pa tos" festival, the most important Flamenco festival in Spain and also directs a foundation of the same name. The festival's proceeds help children in need in Managua.
Presenters
Pay attention to the pedals: Luis Montoro
Cinema: Cándida Villar
Corresponsal en Paris: Rubén Amón
Corresponsal USA: Gina Fox
Mister García: Claro García
Interviews: Juan Luis y Guillermo
"Flamenco pa' tos": José Manuel Gamboa y Juan Verdú
The guide of the "Michelines": Juan Carlos Orlando
The B face: Carlos Cano
The musical "croqueta": Santi Alcanda
The woman that I love: Curra Fernández
Books: Mar de Tejeda
News: Esmeralda Velasco
Gomaespuma with: José Manuel Lapeña
Gomaespumino: Juan Luis and Guillermo
Health for the biggest: Alfonso del Álamo
Other Shows
Cooking with Josechu Letón
Gomaespuma of Success
Military Gomaespuma
Regional Gomaespuma
"Supernotición que te cagas"
Characters
These characters appeared on television and radio (marionettes). Most of these names contain puns, e.g. "Chema Pamundi" ("Chema" is colloquial for name "José María") sounds like "mapamundi" ("World map").
Armando Adistancia
Borja Món de York
Candida
Chema Pamundi
Don Eusebio
Don Francisco Rupto
Don Gun
Don Jesús Tituto
El niño del paquete
Estela Gartija
Gustavo de Básica
Padre Palomino
Peláez
Books
20 Years With Gomaespuma
There is Not More Family Than One Family
Great Misfortunes of the History of Spain
The Father Says No
The "Michelines" guide
When God Presses, He Drowns a Lot (Guillermo Fesser)
Hincaíto (Juan Luis Cano)
The Legs are Not of the Body (Juan Luis Cano)
Trades Guide of Gomaespuma (Guillermo Fesser, Juan Luis Cano and Jose Manuel Lapeña)
A Bullfighter's Pass (Juan Luis Cano y Ruben Amón)
External links
These links are in Spanish
Web of Gomaespuma
Web of Onda Cero
Web of the Gomaespuma Foundation
History of Gomaespuma )
Videos Gomaespuma
Notes
Spanish radio programs
|
https://en.wikipedia.org/wiki/Rapid%20Reload
|
Rapid Reload, known in Japan as , is a run and gun video game developed by Media.Vision and published by Sony Computer Entertainment for the PlayStation in both Japan and Europe in 1995. The game was re-released on the PlayStation Network in Japan in 2007 and in Asia in 2010.
Gameplay
The gameplay of Rapid Reload is often compared to the Treasure game Gunstar Heroes. The players choose to play as either male character Axel or female character Ruka through the game's six levels.
The player can switch between four different weapons with a normal machine pistol, flamethrower, homing laser, and multi-directional cannons. The characters each have their own set of four weapons, totaling the weapons in the game to eight. Also available is a grappling hook that will latch onto any wall or ceiling. The player cannot be harmed while the player uses the hook. The player can also aim their weapons in any direction by holding R2 on the controller. The player can also throw their enemies in any direction, similar to how players Red and Blue can in Gunstar Heroes.
The unique feature in Rapid Reload/Gunners Heaven is the point system. Points are dropped after the player destroys enemies. When the player collects these items, the counter on the top screen rises and eventually will count down. As the player collects more points, their shots from the weapons will become more powerful than the ordinary shots. Occasionally, the player can find a booster item that temporarily increases the player's weapon strength to unbelievable heights, making the player annihilate any enemy easily. Unfortunately, the timer is unforgiving, and the player has a very short time using the booster item.
The game has six stages and during the stages, there is one or two sub-bosses and the one true boss.
Plot
Upon hearing the legend of the treasure known as the Valkiry, treasure hunters Axel Sonics (voiced by Kazuki Yao) and Ruka Hetfield (voiced by Noriko Hidaka) embark on an adventurous quest to find the legendary stone. However, unknown to Axel and Ruka at the start, there is also a terrorist organization known as the Pumpkin Heads searching for the Valkiry, determined to use the stone for world domination.
In a race to reach the stone first, Axel and Ruka fight their way through the Pumpkin Heads' army of elite soldiers along several locations, destroying each of the three top captains and eventually reaching their hideout, where they confront the Master, who already has the Valkiry in her possession. Using the Valkiry to power herself, the Master engages Axel and Ruka in a decisive, final battle, but is eventually destroyed and the Valkiry is freed.
The ending differs for each character: if Axel defeats the Master, he is joined by Ruka, who in her excitement takes the Valkiry and runs off, with the weary Axel only barely managing to keep up with her; if Ruka defeats the Master, she accidentally drops the Valkiry and it shatters, and in her frustration, she vows never to hunt
|
https://en.wikipedia.org/wiki/Enel
|
Enel S.p.A. is an Italian multinational manufacturer and distributor of electricity and gas, as well as an artificial intelligence company. Enel, which originally stood for Ente nazionale per l'energia elettrica (National Electricity Board), was first established as a public body at the end of 1962, and then transformed into a limited company in 1992. In 1999, following the liberalisation of the electricity market in Italy, Enel was privatised. The Italian state, through the Ministry of Economy and Finance, is the main shareholder, with 23.6% of the share capital as of 1 April 2016.
Enel is the 90th largest company in the world by revenue, with 140 billion in 2022. As of 2018, Enel is also the second largest power company in the world by revenue after the State Grid Corporation of China. The company is quoted on the FTSE MIB index on the Milan Stock Exchange.
History
1898–1962: Towards a national policy for electricity
In 1898, the production of electricity in Italy was 100 GWh, and had a value of over $56 billion by 1960. The majority of the electricity was produced by regional private companies, or by companies linked to other industrial bodies, that were both local and regional, by exploiting the specific characteristics of the territory: its hydrogeological resources.
The state subsidised the construction of power stations and other necessary construction work in a territory in order to increase the production of electricity. In 1961, the state-regulated distribution with unified national tariffs set on the basis of equal consumption classes (through the Equalisation Fund for the Electricity Sector), and by requiring power companies to provide access to electricity for everyone.
In 1962, the government institutionalised the Entity for electricity with the aim of making electricity a means for the development of the country and in order to define a national policy for electricity based on the experiences of other countries such as France and the United Kingdom.
1962: Establishment of the National Electricity Board
At the beginning of 1962, the Fanfani IV Cabinet committed the government to put together a proposal for the unification of the national electricity system within three months of the parliament passing a confidence motion.
During the Chamber of Deputies assembly of 26 June 1962, the government presented a bill that sanctioned the principles and procedures for the establishment of the Ente Nazionale per l'energia Elettrica (E.N.EL).
According to the bill, Enel was going to acquire all assets of companies producing, processing, transmitting, and distributing electricity, with the exception of self-producers—companies that produced more than 70% of their electricity for other production processes—(the same exception was later applied to municipal authorities), and of small businesses that did not produce more than 10 million kilowatt hours per year.
Procedures to assess the value of the acquired companies were defined, and it
|
https://en.wikipedia.org/wiki/Back-to-back%20user%20agent
|
A back-to-back user agent (B2BUA) is a logical network element in Session Initiation Protocol (SIP) applications. SIP is a signaling protocol for managing multimedia Voice over Internet Protocol (VoIP) telephone calls. A back-to-back user agent operates between both end points of a communications session and divides the communication channel into two call legs, and mediates all SIP signaling between the endpoints of the session, from establishment to termination. As all control messages for each call flow through the B2BUA, a service provider may implement value-added features available during the call.
In the originating call leg, the B2BUA acts as a user agent server (UAS) and processes the request as a user agent client (UAC) to the destination end, handling the signaling between end points back-to-back. A B2BUA maintains complete state for the calls it handles. Each side of a B2BUA operates as a standard SIP user agent network element as specified in .
In addition to call management, a B2BUA may provide billing services, internetworking for protocol conversions, and hiding of network-internal topology and information.
B2BUAs are often implemented in media gateways to bridge the media streams, in addition to the signaling path, for full control over the session.
A signaling gateway, part of a session border controller, is an example of a B2BUA.
Call flow diagram
B2BUA
Alice Server Bob
| | | |
| INVITE F1 | | |
|------------------->| | |
| 100 Trying F2 | | |
|<-------------------| | INVITE F3 |
| | |------------------->|
| | | 100 Trying F4 |
| | |<-------------------|
| | | 180 Ringing F5 |
| 180 Ringing F6 | |<-------------------|
|<-------------------| | |
| | | 200 OK F7 |
| 200 OK F8 | |<-------------------|
|<-------------------| | ACK F9 |
| ACK F10 | |------------------->|
|------------------->| | |
| RTP Media | | RTP Media |
|<==================>| |<==================>|
| BYE F11 | | |
|------------------->| | BYE F12 |
| 200 OK F13 | |------------------->|
|<-------------------| | 200 OK F14 |
| | |<-------------------|
| | | |
See also
Real-time Transport Protocol
References
Voice over IP
Telephony
cs:IMS
fr:IP Multimedia Subsystem
ru:B2BUA
|
https://en.wikipedia.org/wiki/OpenOSPFD
|
OpenOSPFD is an ISC licensed implementation of the Open Shortest Path First Protocol. It is a network routing software suite which allows ordinary general purpose computers to be used as routers exchanging routes with other computer systems speaking the OSPF protocol.
OpenOSPFD was developed by Esben Nørby and Claudio Jeker, for the OpenBSD project. It is a companion daemon of OpenBGPD. The software was developed as an alternative to packages such as Quagga, a routing software suite which is licensed under the GPL. OpenOSPFD is developed on OpenBSD, and ports exist for FreeBSD and NetBSD.
Goals
The design goals of OpenOSPF include being secure (non-exploitable), reliable, lean and easy to use. The configuration language is intended to be both powerful and easy enough for most users.
External links
openospfd for FreeBSD
OpenOSPFd and FreeBSD
Routing with OpenBSD using OpenOSPFD and OpenBGPD - Paper (pdf) by Claudio Jeker (2006)
OpenOSPF Presentation - by Claudio Jeker
BSD software
OSPFD
Free routing software
OpenBSD software using the ISC license
|
https://en.wikipedia.org/wiki/This%20%28computer%20programming%29
|
this, self, and Me are keywords used in some computer programming languages to refer to the object, class, or other entity of which the currently running code is a part. The entity referred to by these keywords thus depends on the execution context (such as which object is having its method called). Different programming languages use these keywords in slightly different ways. In languages where a keyword like "this" is mandatory, the keyword is the only way to access data and methods stored in the current object. Where optional, they can disambiguate variables and functions with the same name.
Object-oriented programming
In many object-oriented programming languages, this (also called self or Me) is a variable that is used in instance methods to refer to the object on which they are working. The first OO language, SIMULA 67, used this to explicitly reference the local object. C++ and languages which derive in style from it (such as Java, C#, D, and PHP) also generally use this. Smalltalk and others, such as Object Pascal, Perl, Python, Ruby, Rust, Objective-C, DataFlex and Swift, use self. Microsoft's Visual Basic uses Me.
The concept is similar in all languages: this is usually an immutable reference or pointer which refers to the current object; the current object often being the code that acts as 'parent' or 'invocant' to the property, method, sub-routine or function that contains the this keyword. After an object is properly constructed, or instantiated, this is always a valid reference. Some languages require it explicitly; others use lexical scoping to use it implicitly to make symbols within their class visible. Or alternatively, the current object referred to by this may be an independent code object that has called the function or method containing the keyword this. Such a thing happens, for example, when a JavaScript event handler attached to an HTML tag in a web page calls a function containing the keyword this stored in the global space outside the document object; in that context, this will refer to the page element within the document object, not the enclosing window object.
In some languages, for example C++, Java, and Raku this or self is a keyword, and the variable automatically exists in instance methods. In others, for example Python, Rust, and Perl 5, the first parameter of an instance method is such a reference. It needs to be specified explicitly. In Python and Perl, the parameter need not necessarily be named this or self; it can be named freely by the programmer like any other parameter. However, by informal convention, the first parameter of an instance method in Perl or Python is named self. Rust requires the self object to be called &self or self, depending on whether the invoked function borrows the invocant, or moves it in, respectively.
Static methods in C++ or Java are not associated with instances but classes, and so cannot use this, because there is no object. In other languages, such as Ruby, Smalltalk
|
https://en.wikipedia.org/wiki/British%20Computer%20Society%20Young%20Professionals%20Group
|
The British Computer Society Young Professionals Group (YPG) was formed in 1986 (although, its roots date back to around 1983) to provide representation and support to younger members of the IT profession. Today the group is one of the largest and arguably one of the most influential young professionals groups in the UK, with over 26,000 members. The group organises events and provides services from lectures and debates to networking evenings, various competitions, college bursaries and awards.
Whilst support is provided from the British Computer Society, the group's leadership is run primarily by volunteers from the younger membership of the British Computer Society which form the YPG's executive committee and network of regional representatives.
Young IT Practitioner of the Year
The YPG judges, promotes and awards the Young IT Practitioner of the Year Award along with naming annual British Computer Society Medal Winners. This underlines one of the YPG's key roles to nurture and applaud individual ingenuity and entrepreneurial success that have made the British IT industry a leading global player. The awards mark the vital contribution made by young people to the IT profession.
Former winners of the award
2010 — Meri Williams, Procter & Gamble
2009 — Jacques Erasmus, Prevx
2008 — Sarah Christie, Procter & Gamble
2007 — Travers Powell, Vocalink
2006 — Saqib Shaikh, Microsoft Corporation
2005 — Andrew McAnulla, BTL Group Ltd
2004 — Karen Elizabeth Petrie, NASA
2003 — James Bailey, Eclipse Internet
Former medal winners
2010
Adam Thompson, IBM UK Ltd
Dominic Green, Microsoft
2009
Luke Claughton, Micheldever Tyre Services Ltd
Riyaz Patel, Yorkshire Water
2008
Victoria O'Reilly, Allianz Insurance plc
Luke Robison, IBM UK Ltd
2007
Kate Scott, Premier Inn - Whitbread Group plc
Chris Dale, IBM UK Ltd.
2006
Paul Cheek, TeamSpirit Software Ltd
Mark Alexander, Graham Technology Plc
Iain McGinniss, Graham Technology Plc
2005
Verity Wiscarson, IBM UK Ltd.
Graham Marwick, IBM UK Ltd.
Steven Henderson, Royal Bank of Scotland Group
2004
Nicolas Eggleton, The Pensions Trust
Lee Englestone, AstraZeneca
Keith Sutcliffe, Steptronik UK
2003
Richard Clayton, B Mason & Sons
Steven Henderson, Royal Bank of Scotland Group
David Hewitt, James Hamilton Group
SkillCentre
The YPG run an event series called 'YPG SkillCentre' these events tend to help attendees still in the earlier stages of their career explore and develop skill areas that are typically untaught and/or neglected in the IT industry, such as advice on body language and tips on how to negotiate a pay rise. The series established by YPG Chairman, Andrew Brown in 2003, has since trained hundreds of IT professionals.
Past events have included popular speakers such as the author of the Naked Leader, David Tayor, Chris Croft and Craig Goldblatt.
ProNetworking
ProNetworking is an event series established by YPG Chairman, Christopher Moxon in 2006 an expansion to the YPG Sk
|
https://en.wikipedia.org/wiki/Electronic%20navigational%20chart
|
An electronic navigational chart (ENC) is an official database created by a national hydrographic office for use with an Electronic Chart Display and Information System (ECDIS). ECDIS and ENCs are the primary means of electronic navigation on cargo ships.
Inland Electronic Chart Display and Information System are similar systems used for navigation of inland water.
ENC
An Electronic Navigational Chart (ENC) is a digital representation of a real-world geographical area for the purpose of Marine navigation.
Real-world objects and areas of navigational significance, or to a lesser degree - informational significance, are portrayed through Raster facsimiles of traditional paper charts; or more commonly through vector images, which are able to scale their relative position and size to meet a Mariner's Selected Viewing Scale (MSVS) displayed through an ECDIS.
All Navigational charts must meet the requirements set out in the Safety of Lives At Sea (SOLAS) Convention.
To meet these requirements, ENC's created and published by a Hydrographic Authority must conform to the internationally recognised standards stated in the publications set out by the International Hydrographic Organization (IHO). Presently the S-57 Standard is the only ENC standard which meets SOLAS chart carriage requirements. The IHO and it's parent body the International Maritime Organisation (IMO) have begun a transition to a new suite of standards that is targeted to exist as a unified, interactive suite of products and standards within the S-100 Universal Hydrographic Data Model. Within this model an updated standard for the production and publishing of ENCs is under development; The S-101 product specification.
At present Hydrographic Authorities must only produce and publish data to the S-57 product specification, from here that published data can be certified as an ENC. Only ENCs can be used within ECDIS to meet the International Maritime Organization (IMO) performance standard for ECDIS.
ENCs are available for wholesale distribution to chart agents and resellers from Regional Electronic Navigational Chart Centres (RENCs). The RENCs are not-for-profit organizations made up of ENC-producer countries. RENCs independently check each ENC submitted by the contributing countries to ensure that they conform to the relevant IHO standards. The RENCs also act collectively as one-stop wholesalers of most of the world's ENCs.
IHO Publication S-63 developed by the IHO Data Protection Scheme Working Group is used to encrypt and digitally sign ENC data. Chart data is captured based on standards stated in IHO Publication S-57, and is displayed according to a display standard set out in IHO Publication S-52 to ensure consistency of data rendering between different systems.
IMO adopted compulsory carriage of ECDIS and ENCs on new high speed craft from 1 July 2010 and progressively for other craft from 2012 to 2018.
ECDIS
An Electronic Chart Display and Information System (ECDIS) is a ge
|
https://en.wikipedia.org/wiki/Infomed
|
Infomed is the Cuban health portal and the network of people and institutions that share the purpose of facilitating the access to the health information in Cuba.
History
Infomed started in 1992 as a project to interconnect the information centers and the medical libraries in Cuba, and it is today a network with national reach. The project has received awards and international recognition, in particular the Stockholm Challenge Award in 2002.
It is a network of people and institutions that share the purpose of facilitating access to information and knowledge to improve the health of the Cuban people and other people of the World, by intensive and creative use of the information and communication technologies.
The first international steps of this network were participating in a project of the Pan-American Health Organization and the National Library of Medicine of the USA to access MEDLINE with the help of e-mail through the project BITNIS. The network started as an initiative of the Medical Sciences Information National Center, that was founded in 1965 to take care of the information needs of doctors and other health workers.
A characteristic of the project has been the use of the information and communication technologies with a social vision and with the developments of local capabilities. It was the first national network in utilizing the Linux operating system in all its servers for the development of national content and adequate services to its health system. Since 1994 it has placed the complete texts of the Cuban medical magazines in internet and encouraged the development of specialized sites in the most diverse subjects of the medical sciences and public health.
It provides the users with an opportune and efficient access to quality scientific and technical information assistance, administration, education and research in health, turning them in active producers of information and knowledge. It offers content and services with high aggregate value and ruled by quality standards with the goal of offering to the user the necessary information to satisfy his or her needs.
Development
The network has tens of thousands of users in Cuba and its portal is visited by many users from around the world. The network is composed of libraries and units of information that cover all health areas in the country. It has worked with the model of at least one library in each area of health.
The Virtual Library of Health, (BVS in Spanish)] that is part of the Virtual Libraries of Health of Latin America and the Caribbean; promoted by BIREME, that is the Health Information Center of Latin America and Caribbean, based in São Paulo, Brazil, the Pan-American Health Organization and the World Health Organization. It also has the Cuban Virtual University of Health, a virtual convention center, sites of medical specialties and many other services, such as, directories, bibliographic data bases, health statistics, a collection of lectures and presentat
|
https://en.wikipedia.org/wiki/Ready...%20Set...%20Cook%21
|
Ready... Set... Cook! is a cooking game show that debuted on the Food Network in the US on October 2, 1995. The show's format was based upon the UK series Ready Steady Cook, and originally hosted by television personality Robin Young.
Hosts
Young hosted through September 27, 1996. The following Monday, she was replaced by another TV personality, Sissy Biggers. In 2000, Biggers was replaced by UK Ready Steady Cook presenter Ainsley Harriott.
Gameplay
Two well-known chefs (usually representing their restaurants) along with two members of the studio audience (one per chef) competed as teams to prepare the best meal. One was called "Red Tomatoes", the other "Green Peppers". The contestants were then each given $10.00 to spend on whatever they wanted for the chefs to prepare for a meal.
The teams were given 20 minutes (later reduced to 18 minutes) to make a meal using the ingredients they had and the usual items found in a kitchen pantry. The host would meanwhile move back and forth between the teams to ask questions about the meals being produced.
When time ran out, each team explained the dish they had prepared, after which the audience would vote by holding cards (one per audience member, a tomato on one side and a green pepper on the other) to show which team's meal they liked best. The team with the higher number of votes won the game, with both contestants winning kitchen appliances and/or cookware.
References
External links
1990s American cooking television series
2000s American cooking television series
1990s American game shows
2000s American game shows
Food Network original programming
Cooking competitions in the United States
American television series based on British television series
1995 American television series debuts
2001 American television series endings
|
https://en.wikipedia.org/wiki/Gradius%20IV
|
Gradius IV (known as in Japan) is the fourth arcade installment in a series of scrolling shooter video games developed by Konami Computer Entertainment Tokyo. It was preceded by Gradius III, released in 1989, although spinoffs had been released prior to it such as Gradius Gaiden. This title brings a considerable graphical upgrade, particularly with the use of colored lighting. In addition, there have been several additions and removals to the vaulted weapons system; specifically, the edit mode has been removed and an online ranking system was added.
Gameplay
The core gameplay of Gradius IV remains relatively unchanged. However, several changes were made on the weapons system in the transition from Gradius III. First of all, the edit mode has been completely eliminated, as are the "Snake Option" (s.option), the "Reduce" shield type, and the seventh powerup category. The seventh powerup category was the one that was labeled "!" and would produce detrimental results, such as reducing the speed or eliminating the weapons of the ship.
In this game there are a total of six configurations, the first four of which are migrated from Gradius II. The two new configurations are as follows:
Configuration 5: The missile mode is a vertical mine that is released above and below the ship. After a short delay, the mines explode, yielding a large explosion. The double mode is the standard 45-degree angle split. The laser mode is a thin armor-piercing round that can penetrate multiple enemies.
Configuration 6: The missile mode is the flying torpedo, which produces two missiles that fly forward in front of the ship. The double mode is the tailgun, seen in other configurations. The laser is the twin laser seen in Gradius III.
Development and release
Gradius IV was the creation of Konami designers Ashida Hiroyuki, known for his work on Gradius II and Detana!! TwinBee, and Yoro Daisuke, who assisted with production of Bishi Bashi Champion. Daisuke felt that the game was his first "important" video game project as it was the first video game he was involved in from the start of production, which he claims made development a difficult endeavor. The team often drew their ideas on a whiteboard, which was used as a reference during work. Development was pressured as the team wanted to make a Gradius game worthy of having the name "IV"; Yoro recalls that the production staff felt indifferent with many of its mechanics, with some having pride in them and others wishing they had been done differently. Ashida joined the project as director, which was met with a somewhat negative reaction from employees working on it.
One of the team's biggest ideas was the stage designs, as they wanted them to feel fresh and new, as well as being distinct from previous Gradius titles. The project's theme was "interactive", signaling that levels should be engaging and react based on the player's movement and actions. As the first game in the series to use 3D graphics, the team focused to
|
https://en.wikipedia.org/wiki/Digital%20humanities
|
Digital humanities (DH) is an area of scholarly activity at the intersection of computing or digital technologies and the disciplines of the humanities. It includes the systematic use of digital resources in the humanities, as well as the analysis of their application. DH can be defined as new ways of doing scholarship that involve collaborative, transdisciplinary, and computationally engaged research, teaching, and publishing. It brings digital tools and methods to the study of the humanities with the recognition that the printed word is no longer the main medium for knowledge production and distribution.
By producing and using new applications and techniques, DH makes new kinds of teaching possible, while at the same time studying and critiquing how these impact cultural heritage and digital culture. DH is also applied in research. Thus, a distinctive feature of DH is its cultivation of a two-way relationship between the humanities and the digital: the field both employs technology in the pursuit of humanities research and subjects technology to humanistic questioning and interrogation, often simultaneously.
Definition
The definition of the digital humanities is being continually formulated by scholars and practitioners. Since the field is constantly growing and changing, specific definitions can quickly become outdated or unnecessarily limit future potential. The second volume of Debates in the Digital Humanities (2016) acknowledges the difficulty in defining the field: "Along with the digital archives, quantitative analyses, and tool-building projects that once characterized the field, DH now encompasses a wide range of methods and practices: visualizations of large image sets, 3D modeling of historical artifacts, 'born digital' dissertations, hashtag activism and the analysis thereof, alternate reality games, mobile makerspaces, and more. In what has been called 'big tent' DH, it can at times be difficult to determine with any specificity what, precisely, digital humanities work entails."
Historically, the digital humanities developed out of humanities computing and has become associated with other fields, such as humanistic computing, social computing, and media studies. In concrete terms, the digital humanities embraces a variety of topics, from curating online collections of primary sources (primarily textual) to the data mining of large cultural data sets to topic modeling. Digital humanities incorporates both digitized (remediated) and born-digital materials and combines the methodologies from traditional humanities disciplines (such as rhetoric, history, philosophy, linguistics, literature, art, archaeology, music, and cultural studies) and social sciences, with tools provided by computing (such as hypertext, hypermedia, data visualisation, information retrieval, data mining, statistics, text mining, digital mapping), and digital publishing. Related subfields of digital humanities have emerged like software studies, platform studie
|
https://en.wikipedia.org/wiki/Doctor%20Cyber
|
Doctor Cyber is a fictional character appearing in DC Comics publications and related media, commonly as a recurring adversary of the superhero Wonder Woman. She first appeared late in the Silver Age of Comics in 1968's Wonder Woman (volume 1) #179, written by Dennis O'Neil and illustrated by Mike Sekowsky and Dick Giordano.
In her Silver Age appearances, Dr. Cyber was the brilliant head of a vast global criminal network. Beautiful, vain and possibly British or of Asian descent (or both), she initially blended aspects of the femme fatale and dragon lady character tropes. Subsequent Bronze Age appearances incorporated science fiction elements: after her face was disfigured in an accident, Dr. Cyber donned an eerie muzzle-mask and a technologically advanced exoskeleton. These cybernetic enhancements increased her physical strength, and gave her the ability to absorb energy, as well as to redirect it by firing blasts from her hands. Despite the resulting upgrades to her power, Dr. Cyber's disfigurement also wrought a mounting emotional instability: she became obsessed with recapturing her beauty by transferring her mind into Wonder Woman's body, a project she attempted several times with the help of her operative Doctor Moon.
After DC Comics rebooted its continuity in 1985 (a publication event known as the Crisis on Infinite Earths), Wonder Woman, her supporting cast and foes were re-imagined. Though originally absent from this revised mythos, Doctor Cyber would be reintroduced to the DC Comics canon in 2002, not in a Wonder Woman comic, but in issue #1 of Kurt Busiek and Tom Gummett's The Power Company, as the first arch-nemesis of the eponymous super-team. In DC's post-Rebirth era, the character would be reimagined as a powerful artificial intelligence with the memory and blithe personality of Dr. Adrianna Anderson, the deceased research and business partner of Wonder Woman's adversary Veronica Cale.
Fictional character biography
Pre-Crisis
Doctor Cyber was the beautiful and commanding presence behind a global criminal network around the same time when Wonder Woman had relinquished her powers when her fellow Amazons retreated into another dimension. Prior to Cyber's first encounter with the depowered Amazon, her henchmen plundered the monastery of I Ching for the gems and precious metals within and slaughtered the resisting monks. Colonel Steve Trevor unsuccessfully attempted to infiltrate Cyber's network, but learned of their plot: to create chaos within the US government by sending bombs inside toys to the children of Congressmen. This plot was actually a ruse to divert attention from a London jewel heist, foiled by Wonder Woman and I Ching. Doctor Cyber escaped only to resurface in Hong Kong several weeks later.
In Hong Kong, Doctor Cyber's plan was to destroy the city and blackmail the world with a series of devices that could create earthquakes. Cyber lured the non-powered Diana Prince to the Asian city hoping to entice her into joining
|
https://en.wikipedia.org/wiki/Interface%20%28Java%29
|
An interface in the Java programming language is an abstract type that is used to declare a behavior that classes must implement. They are similar to protocols. Interfaces are declared using the interface keyword, and may only contain method signature and constant declarations (variable declarations that are declared to be both static and final). All methods of an Interface do not contain implementation (method bodies) as of all versions below Java 8. Starting with Java 8, default and static methods may have implementation in the interface definition. Then, in Java 9, private and private static methods were added. At present, a Java interface can have up to six different types.
Interfaces cannot be instantiated, but rather are implemented. A class that implements an interface must implement all of the non-default methods described in the interface, or be an abstract class. Object references in Java may be specified to be of an interface type; in each case, they must either be null, or be bound to an object that implements the interface.
One benefit of using interfaces is that they simulate multiple inheritance. All classes in Java must have exactly one base class, the only exception being (the root class of the Java type system); multiple inheritance of classes is not allowed. However, an interface may inherit multiple interfaces and a class may implement multiple interfaces.
Overview
Interfaces are used to encode similarities which the classes of various types share, but do not necessarily constitute a class relationship. For instance, a human and a parrot can both whistle; however, it would not make sense to represent Humans and Parrots as subclasses of a Whistler class. Rather they most likely be subclasses of an Animal class (likely with intermediate classes), but both would implement the Whistler interface.
Another use of interfaces is being able to use an object without knowing its type of class, but rather only that it implements a certain interface. For instance, if one were annoyed by a whistling noise, one may not know whether it is a human or a parrot, because all that could be determined is that a whistler is whistling. The call whistler.whistle() will call the implemented method whistle of object whistler no matter what class it has, provided it implements Whistler. In a more practical example, a sorting algorithm may expect an object of type . Thus, without knowing the specific type, it knows that objects of that type can somehow be sorted.
For example:
interface Bounceable {
double pi = 3.1415;
void setBounce(); // Note the semicolon
// Interface methods are public, abstract and never final.
// Think of them as prototypes only; no implementations are allowed.
}
An interface:
declares only method headers and public constants.
cannot be instantiated.
can be implemented by a class.
cannot extend a class.
can extend several other interfaces.
Usage
Defining an in
|
https://en.wikipedia.org/wiki/Nominative%20and%20structural%20type%20systems
|
Nominative and structural type systems are:
Nominative type system
Structural type system
The differences between nominative and structural type systems are discussed in:
Type system
Subtyping
Data types
Type theory
|
https://en.wikipedia.org/wiki/Caremark
|
Caremark Limited is a home care services network of franchises specialising in both private-pay and state-funded home care. It was founded by Kevin Lewis, Chief Executive, in 2005 and is based in Worthing.
History
Lewis established a care home in Brighton in 1987. After the passing of the National Health Service and Community Care Act 1990 he saw opportunities to provide care to people in their own homes with an independent company which could be publicly financed by local authorities.
In 2020 the business had 128 offices and employed about 6000 people. Most of the offices are in the UK, with 12 in Ireland, one in Malta and one in India. The Indian office, in Cochin provides free care in a home for 180 people who have been ‘abandoned’.
In April 2020 the business was looking to recruit 3000 extra staff in the UK because of demand caused by the COVID-19 pandemic in the United Kingdom. One of the staff from Guildford and Woking was gifted a free tank of petrol and a round of applause. It is also actively recruiting in Ireland.
In 2022 it had more than 7,000 remote caregivers in 115 franchise offices.
Services
Services can include carers who live in the client's own home.
In 2021 Caremark Gloucestershire started trials of ‘Genie’, a voice-activated robot which provides free video calling, welfare video monitoring with alerts, entertainment and access to online shopping and remote medical support for older people. It enables their customers to speak to and see their friends and family.
Influence
Noorina Boodhooa, who owns the franchise in the London Borough of Barnet, and is also senior clinical site manager at the Royal London Hospital met with Boris Johnson in December 2019 to discuss long-term funding solutions and improving hospital-to-home transfers.
Criticism and awards
The Bradford franchise, which was providing care for 159 people, was rated inadequate by the Care Quality Commission in 2019 and placed in special measures after a high number of safeguarding alerts. The Plymouth franchise got an ‘Outstanding’ rating from the CQC in April 2019.
Two staff from the Huddersfield franchise were nominated for the Great British Care Awards in 2019.
See also
Private healthcare in the United Kingdom
References
External links
Companies based in West Sussex
Social care in the United Kingdom
Elderly care
Franchises
Health care companies of England
|
https://en.wikipedia.org/wiki/Panzer%20General%20II
|
Panzer General II is a computer wargame by Strategic Simulations, Inc. Released October 15, 1997, Panzer General II is the sixth SSI game in the Panzer General series and the first in the "Living Battlefield" series. It takes place during World War II, covering events from the Spanish Civil War in 1938 to hypothetical battles in 1946. In the April 2000 issue of the magazine PC Gamer, it was voted the 44th best computer game of all time, and the highest rating in the Panzer General series. The game was re-released in 2010 on GOG.com.
Gameplay
The game of Panzer General II is divided into scenarios, each representing a specific battle. All are played on a hex map, which is divided up into hexagons that represent between one and two kilometers. At the beginning of the game, the entire map is revealed to the player, but enemy units are covered by fog of war and are not visible.
Each hex is assigned one of thirteen terrain types that penalize or assist the movement of units. Mountain, city, and forest types block line of sight. The game also features four kinds of capturable hexes marked by a flag indicating the country owning it: ownership, designating a player's ownership of a city, town or other important feature; supply, allowing unit deployment; victory, indicating critical cities or objectives; and victory-supply, combining victory and supply. The objective is to defeat an enemy by capturing all of their victory hexes in a specified number of turns.
The player attacks enemies and captures hexes by moving units, which approximately represent a battalion, regiment or squadron. There are eight types of units, each with different properties: Infantry, Tank, Anti-Tank, Recon, Air Defense, Fighter, Artillery, and Bomber. Each unit is assigned a numerical value to represent its movement (in hexes); its line of sight (in hexes); its attack abilities against armored targets, unarmored targets, ships, and airplanes; its defense against ranged, close, and air attacks; as well as values for initiative and remaining ammunition and fuel. The final value, health, is represented by a number, usually 1 to 10. When attacking or defending, the unit receives experience points based on the amount of damage inflicted to its enemy (also some points are received when damage is caused by the enemy). Each 100 experience points correspond to one experience level (a value ranging from 0 to 5). When attaining a higher level, the unit may also receive a famous leader, granting it some special abilities. The in-game currency used to measure unit buy and upgrade costs is called "prestige". It is gained by capturing scenario objectives or as a reward for a quick and decisive victory.
The standard game contains many real-life scenarios; however, similarly to other games of the series, players will be able to play some hypothetical scenarios if they perform exceptionally in their command career. For example, Germany can invade and capture the British Isles by capturing Wind
|
https://en.wikipedia.org/wiki/Dopamine%20%28film%29
|
Dopamine is a 2003 romantic comedy-drama film written and directed by Mark Decena.
Plot
Rand is a computer animator, who has created an artificial intelligence creature designed to interact with children and teach them responsibility. When his prototype is forced into practice at a school, Rand encounters Sarah, a teacher he was inexplicably drawn to, at his favorite bar one fateful evening. Sparks fly between them, but fundamental differences in their approaches to love and relationships slow them down to a halt.
Cast
John Livingston as Rand
Sabrina Lloyd as Sarah
Bruno Campos as Winston
Rueben Grundy as Johnson
Kathleen Antonia as Tammy
Nicole Wilder as Machiko
William Windom as Rand's father
Dennis Yen as Toru
Natalie Decena in the womb
Reception
Critical response
On Rotten Tomatoes it has a 52% rating based on 52 reviews. On Metacritic it has a score of 52 out of 100 based on 23 reviews, indicating "mixed or average reviews".
Awards
Won the Alfred P. Sloan Prize at the 2003 Sundance Film Festival
Nomination for Grand Jury Prize at the 2003 Sundance Film Festival.
References
External links
2003 films
2003 independent films
2003 romantic comedy-drama films
American romantic comedy-drama films
Alfred P. Sloan Prize winners
Films about artificial intelligence
Films set in San Francisco
Films set in the San Francisco Bay Area
Films shot in San Francisco
American independent films
Sundance Film Festival award-winning films
2000s English-language films
2000s American films
|
https://en.wikipedia.org/wiki/Canadian%20Network%20for%20International%20Surgery
|
The Canadian Network for International Surgery (CNIS) is a non-profit organization that promotes the delivery of essential surgical care to underprivileged people in low-income countries. Its objective is also to reduce death and disability caused by any disturbances in normal functioning of the mind or the body that would require surgery. The CNIS emphasizes education in surgical work and techniques. It also works in surgical development and research.
The CNIS was federally incorporated in August 1995 and is managed by an eight- to nine-member board of directors with representation from all over Canada. It has a nationwide membership of physicians, surgeons, and others. The CNIS office is located in Vancouver, British Columbia with satellite office(s) in Africa.
Activities
The CNIS has described itself as having a "4-pronged approach" to aid. This includes the development, delivery and adaptation of Essential Surgical Skills (ESS) and Basic Surgical Skills (BSS) courses, work in injury prevention, the exchange of surgical information and work in public engagement.
ESS and BSS Courses
The CNIS is engaged with academic departments or professional associations in the southern hemisphere; one reason why the CNIS was founded was to develop northern infrastructure in order to make Canadian surgeons more effective in an international situation.
Delivery of Essential Surgical Skills includes 5-day workshops in which clinicians who are not surgeons are taught basic surgical interventions and life-saving skills. The BSS course is a 2-day workshop, with topics that include lymph node biopsy, tendon
repair, and blood vessel anastomosis. The BSS course is an example of training that was developed at the request of an African learning institution.
Injury Prevention
According to the World Health Organization, injuries and violence account for 9% of global mortality. Two-thirds of deaths due to injury occur in the developing world. It has been argued that injury prevention in low-income countries is an under-scrutinized field.
One of the CNIS's primary concerns is injury and, from that, injury-risk reduction. Reducing injury would reduce the need for surgery, while improving access to surgery for residents of low-income countries would improve their overall health. The CNIS has established injury control centers with local governments.
Surgical Information
Through the Surgical Information Program, the CNIS supports medical school and hospital libraries in Africa by sending new or recent surgical/medical books and journals. The CNIS also funds two African students' and one Canadian student's research scholarship at the Injury Control Centre - Uganda (ICC-U). With the help of the Canadian Journal of Surgery, the CNIS provides editorial support to the Association of Surgeons of East and Central Africa Journal of Surgery.
Public Engagement
The CNIS has acted across Canada through its Public Engagement Program, which publicizes the need for access to
|
https://en.wikipedia.org/wiki/William%20Genovese
|
William Genovese is a former greyhat hacker turned security professional, who goes by the alias illwill.
History
In the early 2000s, Genovese was a former figure in a loose-knit group of computer hackers who called themselves illmob. illmob.org, that was a security community website ran by Genovese, which, at the time, had many high-profile incidents related to it.
Genovese now works as a private security consultant involved in the computer security industry, doing penetration testing, phishing, OSINT threat intel, mitigation. He is also a contributor to the Metasploit project.
Website controversy
In 2003, Genovese's website was the first to release 0day code that exploited the MS03-026 Windows RPC vulnerability, which was later used by unknown hackers to create variants of the W32/Blaster Worm. In response, Genovese released a tool he coded to remove the worm from infected Windows PC's.
In 2004 federal authorities charged Genovese with Theft of a Trade Secret (US Code Title 18, section 1832), for selling the incomplete WindowsNT/2000 Microsoft source code to Microsoft investigators and federal agents, even though the code sold was already widely distributed on the Internet prior to his sale. Authorities used an obscure law enacted under the Economic Espionage Act of 1996, which had been traditionally
adjudicated through private civil litigation.
In 2005, the illmob.org site had posted leaked images and phone book from Paris Hilton's T-Mobile Sidekick phone that were obtained from a fellow hacker. Reportedly, the data was obtained by social engineering and exploiting a vulnerability in a BEA WebLogic Server database function that allowed an attacker to remotely read or replace any file on a system by feeding it a specially-crafted web request. BEA produced a patch for the bug in March 2003 which T-Mobile failed to apply.
The website was also mentioned in news articles, in connection with Fred Durst's sex tape leak which was stolen from his personal email account.
Hackerspace
From 2010 until his resignation in 2016, Genovese co-founded, and was a board member of a 501(3)(c) non-profit Hackerspace in Connecticut called NESIT, which he helped the local community by offering free classes on various network security topics, personal internet safety, reverse engineering, embedded electronic projects, 3-D Printing, and design. He helped build a virtualized pen-testing lab with a large server farm donation from a pharmaceutical company, where users can simulate attacking and penetrating machines in a safe lab environment.
Consulting
Since 2008, Genovese has reinvented himself as a security consultant, public speaker, and teacher. He does security consulting and performs penetration testing services for worldwide companies . He was also a co-founder and speaker at security conferences eXcon and BSides Connecticut (BSidesCT) in 2011, 2014, 2016, 2017, and 2018. In 2015 he was a panelist at DEF CON 23 in Las Vegas for a charity fundraiser to
|
https://en.wikipedia.org/wiki/XML%20Protocol
|
The XML Protocol ("XMLP") is a standard being developed by the W3C XML Protocol Working Group to the following guidelines, outlined in the group's charter:
An envelope for encapsulating XML data to be transferred in an interoperable manner that allows for distributed extensibility.
A convention for the content of the envelope when used for RPC (Remote Procedure Call) applications. The protocol aspects of this should be coordinated closely with the IETF and make an effort to leverage any work they are doing, see below for details.
A mechanism for serializing data representing non-syntactic data models such as object graphs and directed labeled graphs, based on the data types of XML Schema.
A mechanism for using HTTP transport in the context of an XML Protocol. This does not mean that HTTP is the only transport mechanism that can be used for the technologies developed, nor that support for HTTP transport is mandatory. This component merely addresses the fact that HTTP transport is expected to be widely used, and so should be addressed by this Working Group. There will be coordination with the Internet Engineering Task Force (IETF). (See Blocks Extensible Exchange Protocol)
Further, the protocol developed must meet the following requirements, as per the working group's charter:
The envelope and the serialization mechanisms developed by the Working Group may not preclude any programming model nor assume any particular mode of communication between peers.
Focus must be put on simplicity and modularity and must support the kind of extensibility actually seen on the Web. In particular, it must support distributed extensibility where the communicating parties do not have a priori knowledge of each other.
See also
XML
Internet Engineering Task Force
Head–body pattern
External links
XML Protocol Working Group Charter
XML Protocol Working Group
XML
|
https://en.wikipedia.org/wiki/Kimber%20Rickabaugh
|
Kimber Rickabaugh of RickMill Productions (founded 1991), along with her partner Paul Miller, is a veteran producer responsible for numerous television shows for Comedy Central, HBO and other networks. After starting at NBC in New York, she next was under contract with Dick Clark Productions until she went freelance as a producer in 1986, where she produced HBO's first LIVE Comedy Special. In 1986 she married Gene Crowe, a technical director and design engineer and co owner of Greene Crowe & Co. inc. Rickabaugh and Crowe have worked together a few times on shows such as George Lopez, The Whoopi Goldberg Show, and The Earth Day Special. Rickabaugh formed RickMill Productions in 1991 with Paul Miller, who also directs, and the team continues to be active producers of comedy and variety series and specials. She produced, to name a few, all of the George Carlin HBO specials, for Dave Chappelle, Whoopi Goldberg, Howie Mandel, Lewis Black, MTV and multiple specials and series yearly. RickMill Productions produced 15 seasons of "Comedy Central Presents" series. RickMill also has an ongoing relationship with Kathy Griffin. The relationship with Kathy Griffin started in 2010, producing all her stand-up specials for BRAVO. Kathy Griffin set an unprecedented feat of 4 one-hour specials in 2011. RickMill produced all Kathy's specials in 2012 and 2013 where Kathy set a new record for the most televised comedy specials surpassing George Carlin's record.
External links
RickMill Productions website
Comedy Central press article
SwanShadow Thinks Out Loud
Living people
Year of birth missing (living people)
American television producers
American women television producers
21st-century American women
|
https://en.wikipedia.org/wiki/PBE
|
PBE may refer to:
Population balance equation
Potential buoyant energy or convective available potential energy (CAPE)
Programming by example, in computing
Password-based encryption
Protective Breathing Equipment, smoke hoods on aircraft
Phi Beta Epsilon, an MIT fraternity
Prosopography of the Byzantine Empire
|
https://en.wikipedia.org/wiki/List%20of%20Telemundo%20affiliates%20%28table%29
|
Telemundo is an American broadcast television television network owned by the Telemundo Television Group division of NBCUniversal, which was launched in 1984 as NetSpan. , the network currently has 18 owned-and-operated stations, and current affiliation agreements with 65 other television stations. Telemundo maintains a national cable network feed that is distributed directly to cable, satellite and IPTV providers in various media markets not listed in this article, as an alternative method of distribution in areas without either the availability or the demand for a locally based owned-and-operated or affiliate station.
This article is a listing of current, pending and former Telemundo-affiliated stations in the United States and U.S. possessions (including subchannel affiliates, satellite stations and select low-power translators), with outlets owned by its parent company's broadcast television subsidiary Telemundo Station Group separated from privately owned affiliates, and arranged in alphabetical order by city of license and/or Designated Market Area. There are links to and articles on each of the broadcast stations, describing their histories, local programming and technical information, such as broadcast frequencies.
The station's virtual (PSIP) channel number follows the call letters. For the table for the owned-and-operated outlets, the number in parentheses that follows is the station's actual digital channel number; the digital channel number is listed as a separate column in the list of private affiliates. The article also includes a list of its former affiliate stations, which is also based on the station's city of license or market, and denotes the years in which the station served as a Telemundo affiliate as well as the current status of the corresponding channel that carried the network.
Owned-and-operated stations
Stations are listed alphabetically by state and city of license.
Notes:
1) Two boldface asterisks appearing following a station's call letters (**) indicate a station that was an original Telemundo-owned station either from the network's inception as NetSpan in 1984 or as part of the relaunch as Telemundo in 1987;
2) This list does not include NBCUniversal-owned stations affiliated with NBC; individual lists are available in the articles List of NBC television affiliates (table) and List of NBC television affiliates (by U.S. state).
Telemundo-affiliated stations
United States
Former affiliates
Notes and references
Station notes
References
Telemundo
|
https://en.wikipedia.org/wiki/GNU%20Fortran
|
GNU Fortran (GFortran) is an implementation of the Fortran programming language in the GNU Compiler Collection (GCC), an open-source and free software project maintained in the open-source programmer community under the umbrella of the GNU Project. It is the successor to previous compiler versions in the suite, such as g77.
History
As of July 2020, GFortran had almost fully implemented Fortran 2008, and about 20% of Fortran 2018. It supports the OpenMP multi-platform shared memory multiprocessing, up to its latest version (4.5). GFortran is also compatible with most language extensions and compilation options supported by g77, and many other popular extensions of the Fortran language.
Since GCC version 4.0.0, released in April 2005, GFortran has replaced the older g77 compiler. The new Fortran front-end for GCC was rewritten from scratch, after the principal author and maintainer of g77, Craig Burley, decided in 2001 to stop working on the g77 front end. GFortran forked off from g95 in January 2003, which itself started in early 2000. The two codebases have "significantly diverged" according to GCC developers, and g95 is not maintained anymore since 2013. Since 2010 the front-end, like the rest of the GCC project, has been migrated to C++, where it was previously written in C. Development of the compiler by volunteer users continues and each new version of GCC incorporates better support for the latest language standards and bug fixes.
See also
Cray pointer
Quadruple precision scientific notation
References
External links
GFortran on the GCC Wiki
The GFortran page of the Fortran Wiki.
OpenMP in gfortran information web page
Fortran compilers
Free compilers and interpreters
Fortran
|
https://en.wikipedia.org/wiki/Ntoskrnl.exe
|
ntoskrnl.exe (short for Windows NT operating system kernel executable), also known as the kernel image, contains the kernel and executive layers of the Microsoft Windows NT kernel, and is responsible for hardware abstraction, process handling, and memory management. In addition to the kernel and executive mentioned earlier, it contains the cache manager, security reference monitor, memory manager, scheduler (Dispatcher), and blue screen of death (the prose and portions of the code).
Overview
x86 versions of ntoskrnl.exe depend on bootvid.dll, hal.dll and kdcom.dll (x64 variants of ntoskrnl.exe have these dlls embed into the kernel to increase performance). However, it is not a native application. In other words, it is not linked against ntdll.dll. Instead, ntoskrnl.exe containing a standard "start" entry point that calls the architecture-independent kernel initialization function. Because it requires a static copy of the C Runtime objects, the executable is usually about 10 MB in size.
In Windows XP and earlier, the Windows installation source ships four kernel image files to support uniprocessor systems, symmetric multiprocessor (SMP) systems, CPUs with PAE, and CPUs without PAE. Windows setup decides whether the system is uniprocessor or multiprocessor, then, installs both the PAE and non-PAE variants of the kernel image for the decided kind. On a multiprocessor system, Setup installs ntkrnlmp.exe and ntkrpamp.exe but renames them to ntoskrnl.exe and ntkrnlpa.exe respectively.
Starting with Windows Vista, Microsoft began unifying the kernel images as multi-core CPUs took to the market and PAE became mandatory.
Routines in ntoskrnl use prefixes on their names to indicate in which component of ntoskrnl they are defined.
Since not all functions are being exported by the kernel, function prefixes ending in i or p (such as Mi, Obp, Iop) are internal and not supposed to be accessed by the user. These functions contain the core code and implements important checks, such as for vulnerabilities, missing arguments and exception handling.
The following table lists some of them.
Initialization
When the kernel receives control, it gets a struct-type pointer from bootloader. The pointer's destination contains information about the hardware, the path to the Windows Registry file, kernel parameters containing boot preferences or options that change the behavior of the kernel, path of the files loaded by the bootloader (SYSTEM Registry hive, nls for character encoding conversion, and vga font). The definition of this structure can be retrieved by using the kernel debugger or downloading it from the Microsoft symbol database.
In the x86 architecture, the kernel receives the system already in protected mode, with the GDT, IDT and TSS ready. But since it does not know the address of each one, it has to load them one by one to fill the PCR structure.
The main entry point of ntoskrnl.exe performs some system dependent initialization then calls a system
|
https://en.wikipedia.org/wiki/Million%20Dollar%20Abie
|
"Million Dollar Abie" is the sixteenth episode of the seventeenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on April 2, 2006. This is the first episode to have a parody title of the film Million Dollar Baby, with the second being "Million Dollar Maybe" in season 21.
Plot
When it is announced that the commissioner of pro football Bud Armstrong wants to expand the league, Homer leads the charge to get the new franchise in Springfield. At first his family does not think he can do it, but Homer manages to put forth a surprisingly strong package for the Springfield Meltdowns and the new park, named the
Duff Beer Krusty Burger Buzz Cola Costington's Department Store Kwik-E-Mart Stupid Flanders Park.
The commissioner narrows down the choice of the two cities to either Springfield or Los Angeles. L.A. puts forth an anti-Springfield video hosted by Rob Reiner and features a song sung by celebrity impersonators that ends with them singing "Springfield Blows". All the owners decide that Springfield is the lesser of two evils (it does not hurt that the Rich Texan owns slums in Springfield and another owner snaps that she did not kill her husband and seize his team just to put a team in Los Angeles) and the Commissioner awards the new team to Springfield. The town gets "Meltmania" and "Downs syndrome", quickly builds Homer's new park, paints the town in the team colours (orange and purple) and changes all of the street names to football-related names (e.g. Two-Point Conversion Avenue, Off-Season Knee Surgery Blvd).
On the day when Springfield is officially announced as the new team, Commissioner Armstrong gets confused by all of the new street names and gets lost. He stops for directions at the Simpsons' house and is greeted by Grampa Simpson, who welcomes him in as he is busy watching Maggie. However, Grampa is watching a TV program about undercover burglars who act just as the Commissioner did (asking for a telephone and a bathroom and, sometimes, taking pictures of the children of the house - he was looking at one with Bart and Lisa when attacked), and sneaks up behind Armstrong and knocks him unconscious with a golf club. The rest of the family arrives home, disappointed that the commissioner did not show and is shocked to find him tied up in their living room. The commissioner furiously declares that neither he nor the League will ever return to Springfield, ending the Meltdowns' history before it began. Homer then gets angry at Grampa, not only for costing the town the entire team, but also for losing track of Maggie.
The entire town hates Grampa for his actions, and the expensive stadium has to be used for farmers' markets, with even his dentures refusing to smile at him. Grampa is depressed and decides to seek out a doctor called Dr. Egoyan who will help him commit suicide with a suicide booth called a "diePod". The doctor tells Grampa to reconsider, and Grampa decid
|
https://en.wikipedia.org/wiki/Panos%20Network
|
The Panos Network (originally called Panos Institute) is a network of independent non-governmental institutes working "to ensure that information is effectively used to foster public debate, pluralism and democracy" (see Communication for Development).
There are currently six member institutes: Panos Caribbean, Panos Europe, Panos West Africa, Panos Eastern Africa, Panos Southern Africa and Panos South Asia. The member institutes participate in a global network, through which they work on common themes. Jon Tinker also founded Panos Institutes in London, Paris, Washington, Budapest and Canada.
Globally and regionally, Panos Network works with media and other information actors to enable developing countries to shape and communicate their own development agendas through informed public debate. They particularly focus on amplifying the voices of poor and marginalised people.
The name Panos may have some connection with the ancient Greek word phanos (φανός), which means torch. Influences may also be found from the Nepali word panas, which is a lamp lit when people gather round to discuss important issues.
Origins
The first institute, based in London, was founded in 1986 by journalist Jon Tinker. Tinker had been working with the International Institute for Environment and Development (IIED), where he ran the Earthscan programme, focused on providing unbiased, scientific data to journalists covering environmental issues. Tinker identified the need to develop resources helpful in providing information and data on a range of issues that directly affect the most marginalized voices in the developing world, to help those voices be heard, and help bridge the communications' divide. Between 1991 and 2004, Jon Tinker also founded Panos Institutes in Paris, Washington D.C., Budapest and Vancouver, Canada.
The organisation's first major project was for Swedish International Development Cooperation Agency (Sida), producing studies on the sustainability of Nordic aid programmes, written by journalists based in the recipient countries.
Panos subsequently followed that method, having reports written by people from the developing world. Jon Tinker described this as, "Providing authentic Southern voices on Southern issues".
Since its inception, Panos has run a number of programmes relating to issues affecting developing countries. These include an environment programme, a media development programme, an AIDS/HIV programme and an oral testimony programme. It was one of the first non-governmental organisations to highlight HIV/AIDS as a development issue, producing a dossier in 1986 entitled AIDS and the Third World.
Panos Pictures, a photo agency, was founded and partly owned by Panos London. Panos London ceased its activities in 2013.
Panos Institute Southern Africa
The Panos Institute Southern Africa (PSAf) is a regional communication for development non-governmental organization (NGO), with offices in Zambia, Mozambique and South Africa. PSAf promot
|
https://en.wikipedia.org/wiki/JOONE
|
JOONE (Java Object Oriented Neural Engine) is a component based neural network framework built in Java.
Features
Joone consists of a component-based architecture based on linkable components that can be extended to build new learning algorithms and neural networks architectures.
Components are plug-in code modules that are linked to produce an information flow. New components can be added and reused. Beyond simulation, Joone also has to some extent multi-platform deployment capabilities.
Joone has a GUI Editor to graphically create and test any neural network, and a distributed training environment that allows for neural networks to be trained on multiple remote machines.
Comparison
As of 2010, Joone, Encog and Neuroph are the major free component based neural network development environment available for the Java platform. Unlike the two other (commercial) systems that are in existence, Synapse and NeuroSolutions, it is written in Java and has direct cross-platform support. A limited number of components exist and the graphical development environment is rudimentary so it has significantly fewer features than its commercial counterparts.
Joone can be considered to be more of a neural network framework than a full integrated development environment. Unlike its commercial counterparts, it has a strong focus on code-based development of neural networks rather than visual construction.
While in theory Joone can be used to construct a wider array of adaptive systems (including those with non-adaptive elements), its focus is on backpropagation based neural networks.
See also
Artificial neural network
Neural network software
Encog: another neural network programmed in Java
External links
sourceforge download page for joone
Neural network software
Free software programmed in Java (programming language)
|
https://en.wikipedia.org/wiki/MDB%20Tools
|
The MDB tools project is an open source effort to create a set of software libraries and utilities to manipulate files in the proprietary JET 3, 4 and 5 database formats (used by Microsoft Access.).
Version 0.7 was released in June 2012.
Jet 5 is only available on the GitHub master branch.
The MDB tools include Gnome MDB Viewer (gmdb2), a desktop tool for viewing MDB databases on Linux. Kexi (visual database applications creator) uses MDB tools for importing MDB databases. For Mac OS X there are three proprietary applications named MDB Explorer, MDB Viewer and MDBLite that also provides a graphical front end to the MDB tools library.
There is a Java port of the MDB tools library named Jackcess. Jackcess adds write support for Access versions 2000+, but has read-only support for Access 97. It seems to be under active development as of 2020.
UCanAccess is an open source pure Java JDBC Driver implementation which allows Java developers and jdbc client programs to read/write MDB and ACCDB files.
External links
MDB Tools project homepage
Github page for MDB Tools
Jackcess project homepage
Free software programmed in C
Free database management systems
|
https://en.wikipedia.org/wiki/Taint%20checking
|
Taint checking is a feature in some computer programming languages, such as Perl, Ruby or Ballerina designed to increase security by preventing malicious users from executing commands on a host computer. Taint checks highlight specific security risks primarily associated with web sites which are attacked using techniques such as SQL injection or buffer overflow attack approaches.
Overview
The concept behind taint checking is that any variable that can be modified by an outside user (for example a variable set by a field in a web form) poses a potential security risk. If that variable is used in an expression that sets a second variable, that second variable is now also suspicious. The taint checking tool can then proceed variable by variable forming a list of variables which are potentially influenced by outside input. If any of these variables is used to execute dangerous commands (such as direct commands to a SQL database or the host computer operating system), the taint checker warns that the program is using a potentially dangerous tainted variable. The computer programmer can then redesign the program to erect a safe wall around the dangerous input.
Taint checking may be viewed as a conservative approximation of the full verification of non-interference or the more general concept of secure information flow. Because information flow in a system cannot be verified by examining a single execution trace of that system, the results of taint analysis will necessarily reflect approximate information regarding the information flow characteristics of the system to which it is applied.
Example
The following dangerous Perl code opens a large SQL injection vulnerability by not checking the value of the $name variable:
#!/usr/bin/perl
my $name = $cgi->param("name"); # Get the name from the browser
...
$dbh->{TaintIn} = 1;
$dbh->execute("SELECT * FROM users WHERE name = '$name';"); # Execute an SQL query
If taint checking is turned on, Perl would refuse to run the command and exit with an error message, because a tainted variable is being used in a SQL query. Without taint checking, a user could enter foo'; DROP TABLE users --, thereby running a command that deletes the entire database table. Much safer would be to encode the tainted value of $name to a SQL string literal and use the result in the SQL query, guaranteeing that no dangerous command embedded in $name will be evaluated. Another way to achieve that is to use a prepared statement to sanitize all variable input for a query.
One thing to note is that Perl DBI requires one to set the TaintIn attribute of a database handle as well as enabling taint mode to check one's SQL strings.
History
Perl supported tainting in setuid scripts from at least version 3.0 (released in 1989), though it was not until version 5.0 (released in 1994) that the -T switch was introduced integrating tainting into a single runtime.
In 1996, Netscape implemented data tainting for JavaScript in Netscape Navigat
|
https://en.wikipedia.org/wiki/Hybrid%20neural%20network
|
The term hybrid neural network can have two meanings:
Biological neural networks interacting with artificial neuronal models, and
Artificial neural networks with a symbolic part (or, conversely, symbolic computations with a connectionist part).
As for the first meaning, the artificial neurons and synapses in hybrid networks can be digital or analog. For the digital variant voltage clamps are used to monitor the membrane potential of neurons, to computationally simulate artificial neurons and synapses and to stimulate biological neurons by inducing synaptic. For the analog variant, specially designed electronic circuits connect to a network of living neurons through electrodes.
As for the second meaning, incorporating elements of symbolic computation and artificial neural networks into one model was an attempt to combine the advantages of both paradigms while avoiding the shortcomings. Symbolic representations have advantages with respect to explicit, direct control, fast initial coding, dynamic variable binding and knowledge abstraction. Representations of artificial neural networks, on the other hand, show advantages for biological plausibility, learning, robustness (fault-tolerant processing and graceful decay), and generalization to similar input. Since the early 1990s many attempts have been made to reconcile the two approaches.
References
Biological and artificial neurons
Connecting symbolic and connectionist approaches
See also
Connectionism vs. Computationalism debate
Artificial neural networks
Neural circuits
|
https://en.wikipedia.org/wiki/Network%20media
|
Network media refers to the communication channels used to interconnect nodes on a computer network. Typical examples of network media include copper coaxial cable, copper twisted pair cables and fiber-optic cables used in wired networks, and radio waves used in wireless data communications networks.
See also
Networking cable
Structured cabling
Further reading
Communication_circuits
|
https://en.wikipedia.org/wiki/Private%20IP
|
PIP in telecommunications and datacommunications stands for Private Internet Protocol or Private IP. PIP refers to connectivity into a private extranet network which by its design emulates the functioning of the Internet. Specifically, the Internet uses a routing protocol called border gateway protocol (BGP), as do most Multiprotocol Label Switching (MPLS) networks. With this design, there is an ambiguity to the route that a packet can take while traversing the network. Whereas the Internet is a public offering, MPLS PIP networks are private. This lends a known, often used, and comfortable network design model for private implementation.
Private IP removes the need for antiquated Frame Relay networks, and even more antiquated point-to-point networks, with the service provider able to offer a private extranet to its customer at an affordable pricepoint.
References
Network protocols
|
https://en.wikipedia.org/wiki/9%20%282005%20film%29
|
9 is a 2005 computer-animated science fiction short film created by Shane Acker as a student project at the UCLA Animation Workshop. Tim Burton saw the film and later produced a feature-length adaptation also titled 9 (2009), directed by Acker and distributed by Focus Features. The film was presented at the Indianapolis International Film Festival. It was nominated for an Academy Award for Best Animated Short Film, although it did win a Student Academy Award for Best Animation. It was released on April 21, 2005.
Plot
9 is a sentient rag doll who appears to be the last of his kind, living in the ruins of a decaying, post-apocalyptic Earth. Hunting 9 relentlessly is the Cat Beast, a mechanical monster wearing a cat's skull for a head. It appears to be guided by a small glowing talisman which it holds in its claws. Sitting quietly, 9 stares into the mirrored surface of his own strange talisman and has a flashback.
In the flashback, 9 searches the ruins with his mentor, 5, a one-eyed rag doll. The Cat Beast attacks the pair and consequently kills 5 by sucking his soul out from his mouth and 9 escapes.
9 is woken from the memory by the warning green glow of the mirrored talisman. The Cat Beast chases 9 into a building and reveals that it has not only taken the other rag dolls' souls, but also wears their numbered skins like a garment. Eventually, it falls into 9's trap and falls to its death.
9 salvages the skins of the other rag dolls and prepares them to be ceremonially burned. As he looks sadly at the skin of 5, the two talismans begin to glow. 9 realizes that they are two halves of a whole and puts them together. A beam of green light erupts from the united talisman, and the spirits of the eight slain rag dolls 1, 2, 3, 4, 5, 6, 7 and 8 emerge, returning to their rag doll skins to be at peace. Before disappearing, 5's soul turns to 9 and nods in approval.
In the morning, 9 walks off into the wasteland, leaving the empty talisman behind in the sand.
Themes and motifs
Humanity and machines: Director Shane Acker has openly rejected the analysis of 9 being a "human vs. machine" narrative, saying instead: "It's not just man against machine, because our heroes are machines, as well... but it's the humanity within the machine, tempering the machine with morality... empathy... compassion."
Commonalities of humans: The characters' lack of verbal speech and near-identical appearances were intended to highlight the innate ways that every person is alike with only certain individual aspects that set us apart. This contributes to the similarities between the rag dolls and humans.
Humans and nature: Acker has said that the "post-human" setting of the film is the result of a man-made apocalypse, but nature has inevitably reclaimed the world. In this way, nature is inseparable from mankind.
Production
9 was originally supposed to last three minutes, but was later extended to ten. It was meant to be a stop-motion film, but was later made using CGI. The 2
|
https://en.wikipedia.org/wiki/Cheekah%20Bow%20Bow%20%28That%20Computer%20Song%29
|
"Cheekah Bow Bow (That Computer Song)" is a song by Dutch Eurodance group the Vengaboys. It was released as their eighth United Kingdom single, and their ninth overall. The song charted at number 19 in the United Kingdom (their first single not to achieve a Top 10 placing there). The song was a moderate hit elsewhere in Europe peaking in the Top 40 of several countries.
The single was officially credited to the Vengaboys ft. Cheekah, referring to the animated computer in the music video, which performs the lyrics (all of which are related to computer terminology, but feature some tongue-in-cheek sexual innuendo: e.g. "The way you used your joystick / Has really made my mouse click". However, in the second part of the song, the lyrics portray sexually transmitted diseases once again using computer terminology e.g. "The way you used your joystick / Has really made me feel sick" and "The doctor checked my hard drive / A virus in my archive / My disc was not protected / and now I am infected").
Track listing
"Cheekah Bow Bow (That Computer Song) (Hit Radio Mix)"
"Cheekah Bow Bow (That Computer Song) (Xxl)"
"Cheekah Bow Bow (That Computer Song) (Transa Remix Vocal)"
"Cheekah Bow Bow (That Computer Song) (Dillon & Dickins Remix Vocal)"
"Cheekah Bow Bow (That Computer Song) (Pulsedriver Remix Vocal)"
"Cheekah Bow Bow (That Computer Song) (Dillion & Dickins Remix Instrumental)"
"Cheekah Bow Bow (That Computer Song) (Hit Radio Mix Clean Version)"
"Cheekah Bow Bow (That Computer Song) (Video)"
Charts
References
2000 singles
Vengaboys songs
2000 songs
EMI Records singles
Songs written by Wessel van Diepen
Songs written by Dennis van den Driesschen
|
https://en.wikipedia.org/wiki/Loopback%20device
|
Loopback device may refer to:
Loopback, related to electronic communication interfaces
Loop device, a pseudo-device in Unix-like operating systems
|
https://en.wikipedia.org/wiki/Autosave
|
Autosave is a saving function in many computer applications and video games which automatically saves the current changes or progress in the program or game, intending to prevent data loss should the user be otherwise prevented from doing so manually by a crash, freeze or user error. Autosaving is typically done either in predetermined intervals or before, during, and after a complex editing task is begun.
Application software
It has traditionally been seen as a feature to protect documents in an application or system failure (crash), and autosave backups are often purged whenever the user finishes their work. An alternative paradigm is to have all changes saved continuously (as with pen and paper) and all versions of a document available for review. This would remove the need for saving documents entirely. There are challenges to implementation at the file, application and operating system levels.
For example, in Microsoft Office, this option is called AutoRecover and, by default, saves the document every ten minutes in the temporary file directory. Restarting an Office program after crashing prompts the user to save the last recovered version. However, this does not protect users who mistakenly click "No" when asked to save their changes if Excel closes normally (except for Office 2013 and later). Autosave also syncs documents to OneDrive when editing normally.
Mac OS 10.7 Lion added an autosave feature that is available to some applications, and works in conjunction with Time Machine-like functionality to periodically save all versions of a document. This eliminates the need for any manual saving, as well as providing versioning support through the same system. A version is saved every five minutes, during any extended periods of idle time, or when the user uses "Save a version," which replaces the former "Save" menu item and takes its Command-S shortcut. Saves are made on snapshots of the document data and occur in a separate thread, so the user is never paused during this process. Applications need to be updated to take advantage of this functionality, and a number of Apple's built-in programs were updated with the release. Autosave cannot be disabled in Lion.
One of the first implementation of this feature appears in the text editor Elvis.
Video games
Autosave is common in video games. Many video games have an autosave feature that saves progress during a session. For example, in an adventure game, it may autosave after completing a level or mission, or in fighting games, it might save after winning a match. Such points are called savepoints; sometimes the distinction from a checkpoint is blurred. Some games use autosave as the only method of saving data, and the player must complete a set amount of the game before saving takes place. Still another use of autosaving is as an anti-cheating device; for example, in every Mega Man Battle Network sequel, the chip trader machines autosave upon giving out a new battle chip so the player ca
|
https://en.wikipedia.org/wiki/Meinolf%20Sellmann
|
Meinolf Sellmann, born in Holzminden, Germany, computer scientist, best known for algorithmic research, with a special focus on self-improving algorithms, automatic algorithm configuration and algorithm portfolios based on artificial intelligence, combinatorial optimization, and the hybridization thereof.
He received a doctorate degree (Dr. rer. nat.) in 2002 from Paderborn University (Germany) and is now CTO of InsideOpt, an optimization company he founded in 2021. Prior to this current engagement he was Director for Network Optimization at Shopify, Lab Director for machine learning and knowledge discovery at the global research center of General Electric, held a position as senior manager for data curation in the cognitive computing department at IBM Research, Assistant Professor at Brown University, and Postdoctoral Scholar at Cornell University.
His honors include the Prize of the Faculty of the University of Paderborn (Germany) for his doctoral thesis, an NSF Career Award in 2007, two Gold Medals at the SAT Competition 2011, a winning Solver at the 2012 SAT Challenge, two Gold Medals at the SAT Competition 2013, seventeen winning solvers at the 2013-2016 MaxSAT Evaluations, and two first places at the 2021 AI for TSP Competition.
He also received IBM Outstanding Technical Innovation Awards in 2013 and 2014, an A-level Business Accomplishment 2015, and won the Shopify Fulfillment Network Sharktank competition in 2021. He was invited Keynote Speaker at Gecco 2022, Anziam 2017, Techkriti 2017, Optimization Days 2017, OR 2017, AAAI 2015 and served on the IEEE technical board for emerging technologies (2012-2015), the AAAI education board (since 2016), as Program Chair of IAAI 2021 and IAAI 2022, Cluster Chair on the Future of Computing at Informs 2017, Conference Chair of CP 2007, conference-wide Workshop Chair of AAAI 2008, and as Program Chair of CPAIOR 2013 and LION 2016 and 2023.
References
IBM Research page
MaxSAT Evaluations (look for ISAC and dsat-wpm)
2016 MaxSAT Evaluation (look for dsat-wpm)
AI4TSP Competition (winning solvers Convexers and RiseUp)
Year of birth missing (living people)
Living people
German computer scientists
Paderborn University alumni
|
https://en.wikipedia.org/wiki/Snoldelev%20Stone
|
The Snoldelev Stone, listed as DR 248 in the Rundata catalog, is a 9th-century runestone that was originally located at Snoldelev, Ramsø, Denmark.
Description
The Snoldelev Stone, which is in height, is decorated with painted scratches depicting a design of three drinking horns interlocking as incomplete Borromean rings (similar to the Diane de Poitiers three crescents emblem). The stone was first noted in 1810 and was turned over to the national Antiquities Commission in 1811. The runestone is now housed at the National Museum of Denmark in Copenhagen, Denmark.
The inscription on the Snoldelev Stone shows an early version of the Younger Futhark. Like the late Elder Futhark Björketorp Runestone, it uses an a-rune which has the same form as the h-rune has in the long-branch version of the younger futhark. This a-rune is transliterated with a capital A below. The Snoldelev runestone also retains the elder futhark haglaz rune () for the h-phoneme and this is represented by capital H in the transliteration below. Another feature from the elder futhark is the use of the ansuz rune (ᚨ) which is here specifically used to symbolize a long nasal a, often transcribed as "á" which is similar but not identical to its Scandinavian descendant "å". The last character in the runic text is damaged, but is clearly a , and represents the first use of this rune for an 'm' in Denmark. The text is arranged in two lines of different sizes. It has been suggested that this may have been done in imitation of Merovingian or Carolingian manuscripts, which have the first line in long slender characters with the following lines in shorter, stubbier text.
The inscription states that Gunnvaldr is a Þulʀ, which signifies some office or rank, perhaps a priest or a skald, compare Old Norse þula meaning "litany." It is related to the later Norse Þulr, a position described as being a wise man or sage associated with Scandinavian chieftains and royalty. The translation offered by the Rundata project suggests reciter. The location Salhaugar in the text has been identified as referring to the modern town Salløv, which was in the vicinity of the original site of the runestone. The literal translation of the Old Norse Salhøgum combines sal "hall" with hörgar "mounds," to form "on the hall mounds," suggesting a place with a room where official meetings took place.
Inscription
Runes
Transliteration of the runes into Latin characters
kun'uAlts| |stAin ' sunaʀ ' ruHalts ' þulaʀ ' o salHauku(m)
Transcription into Runic Danish
Gunwalds sten, sonaʀ Roalds, þulaʀ á Salhøgum.
Translation in English
Gunnvaldr's stone, Hróaldr's son, thyle of Salhaugar.
Gallery
References
External links
Inscriptions from the second period (Viking period), 750-1025 , presentation by Moltke
Runestones in Denmark
Swastika
9th-century artifacts
|
https://en.wikipedia.org/wiki/IBM%20Advanced%20Peer-to-Peer%20Networking
|
IBM Advanced Peer-to-Peer Networking (APPN) is an extension to the Systems Network Architecture (SNA) "that allows large and small computers to communicate as peers across local and wide-area networks."
Goals and features
The goals of APPN were:
Provide effective routing for SNA traffic
Allow sessions to be established without the involvement of a central computer
Reduce the requirements to predict resource use
Provide prioritization within SNA traffic
Support both legacy and APPN traffic
To meet these goals it includes features such as these:
distributed network control
dynamic exchange of network topology information to foster ease of connection, reconfiguration, and route selection
dynamic definition of network resources
automated resource registration and directory lookup.
History
APPN was defined around 1986, and was meant to complement IBM's Systems Network Architecture. It was designed as a simplification, but it turned out to be significantly complex, in particular in migration situations.
APPN was originally meant to be a "DECNET killer", but DEC actually died before APPN was completed. APPN has been largely superseded by TCP/IP (Internet).
APPN evolved to include a more efficient data routing layer which was called High Performance Routing (HPR). HPR was made available across a range of enterprise corporation networking products in the late 1990s, but today is typically used only within IBM's z/OS environments as a replacement for legacy SNA networks. It seems to be still widely used within UDP tunnels, this technology is known as Enterprise Extender.
APPN should not be confused with the similarly named APPC (Advanced Program-to-Program Communication). APPN manages communication between machines, including routing, and operates at the transport and network layers. By contrast, APPC manages communication between programs, operating at the application and presentation layers.
APPN has nothing to do with peer-to-peer file sharing software such as Bittorrent or emule. The designation peer-to-peer in the case of APPN refers to its independence from a central point of control, similar to the way that a FireWire PC connection allows a video camera to talk directly to a disk drive on the FireWire network.
Components
An APPN network can be composed of up to five types of nodes:
In VTAM, APPN nodes are defined as PU 2.1.
Device support
APPN is supported on a variety of IBM and non-IBM "intelligent" devices and software. It is available on mainframes, AS/400, System/36, OS/2 via Communications Server, Cisco equipment, and Microsoft Host Integration Services (HIS) for Windows.
References
Advanced Peer-to-Peer Networking
Network protocols
Advanced Peer-to-Peer Networking
|
https://en.wikipedia.org/wiki/Fragmentation%20%28computing%29
|
In computer storage, fragmentation is a phenomenon in which storage space, main storage or secondary storage, is used inefficiently, reducing capacity or performance and often both. The exact consequences of fragmentation depend on the specific system of storage allocation in use and the particular form of fragmentation. In many cases, fragmentation leads to storage space being "wasted", and in that case the term also refers to the wasted space itself.
Basic principle
In main memory fragmentation, when a computer program requests blocks of memory from the computer system, the blocks are allocated in chunks. When the computer program is finished with a chunk, it can free it back to the system, making it available to later be allocated again to another or the same program. The size and the amount of time a chunk is held by a program varies. During its lifespan, a computer program can request and free many chunks of memory.
When a program is started, the free memory areas are long and contiguous. Over time and with use, the long contiguous regions become fragmented into smaller and smaller contiguous areas. Eventually, it may become impossible for the program to obtain large contiguous chunks of memory.
Types
There are three different but related forms of fragmentation: external fragmentation, internal fragmentation, and data fragmentation, which can be present in isolation or conjunction. Fragmentation is often accepted in return for improvements in speed or simplicity. Analogous phenomena occur for other resources such as processors; see below.
Internal fragmentation
Memory paging creates internal fragmentation because an entire page frame will be allocated whether or not that much storage is needed.
Due to the rules governing memory allocation, more computer memory is sometimes allocated than is needed. For example, memory can only be provided to programs in chunks (usually a multiple of 4 bytes), and as a result if a program requests perhaps 29
bytes, it will actually get a chunk of 32 bytes. When this happens, the excess memory goes to waste. In this scenario, the unusable memory is contained within an allocated region. This arrangement, termed fixed partitions, suffers from inefficient memory use - any process, no matter how small, occupies an entire partition. This waste is called internal fragmentation.
Unlike other types of fragmentation, internal fragmentation is difficult to reclaim; usually the best way to remove it is with a design change. For example, in dynamic memory allocation, memory pools drastically cut internal fragmentation by spreading the space overhead over a larger number of objects.
External fragmentation
External fragmentation arises when free memory is separated into small blocks and is interspersed by allocated memory. It is a weakness of certain storage allocation algorithms, when they fail to order memory used by programs efficiently. The result is that, although free storage is available, it is effectively un
|
https://en.wikipedia.org/wiki/Tim%20Larkin
|
Tim Larkin is a composer and sound designer for Valve. Previously the audio director for Cyan Worlds, who produced the Myst series of computer games. Before working at Valve, he worked at Cyan, working as a sound designer for Riven, and as a composer for realMyst, Uru: Ages Beyond Myst and Myst V: End of Ages.
He has 23 years experience in the game audio industry. He started in the game industry working as a composer/sound designer for Broderbund. He created sound design for Riven while working there and was later hired at Cyan to work on realMyst and Uru. Tim still performs session work regularly as a trumpet player as well as doing freelance sound design and composition outside Cyan. He created music and sound design for titles such as Middle-earth, The Incredibles, Pariah, The Lord of the Rings, and Prince of Persia. He won the Academy Award for sound design at the 75th Academy Awards for his work on the Sony Imageworks animated short film, The ChubbChubbs!. In the 2000s, Larkin was hired by Valve and worked on a number of their games, including Team Fortress 2, Portal, Portal 2, Counter-Strike: Global Offensive, Dota 2, and Artifact.
Tim's experience in the music industry includes live performances as a trumpet player with artists Natalie Cole, Ella Fitzgerald, James Brown, Mel Tormé, Sheila E and Huey Lewis. He recorded on record albums for Ice-T and as a solo artist for Avenue Jazz. He worked on HBO's The Rat Pack, White Mile and Floundering. He has done the trumpet work for the documentaries National Geographic's Lost Fleet of Guadalcanal, Pearl Harbor and The White House, and American Experience documentaries on Galileo and the Wright Brothers.
URU
Urus music was composed by Tim Larkin, who had started his career at game publisher Brøderbund, and lobbied hard to be included on Rivens development team. Larkin worked on creating different sound effects for Riven and was chosen to score Uru after composer and Myst co-creator Robyn Miller left Cyan in early 1998. The music for the game was collected as a soundtrack, Uru Music, that was released in 2003.
Larkin chose the instrumentation for each track based on the various digital environments in the game. When the player is in the game's representation of New Mexico, for example, Larkin used a resonator guitar and flutes, creating what he called something "indigenous to a southwest type of feel that's very contemporary". In other areas Larkin described the game's music as being "less typical than you would find in most games" because of the exotic landscape the developers had created. To create contemporary and exotic types of music in the game, Larkin employed a combination of real and synthesized instruments. Sometimes Larkin replaced synthesized performances with those of real musicians, as in the track "Gallery Theme", where a synthesized vocal part was eventually discarded in favor of soprano Tasha Koontz. To create an exotic feel, Larkin used a group of Maasai tribesmen's chanting,
|
https://en.wikipedia.org/wiki/Minimalism%20%28disambiguation%29
|
Minimalism is a movement in visual arts, music, and other media that began in post–World War II Western art.
Minimalism may also refer to:
Minimalism (computing), a philosophy of programming and configuring computers
Minimalism (philosophy), a theory that truth does not provide useful information beyond the proposition or sentence
Minimalism (syntax), a theory of natural language syntax developed by Noam Chomsky in the 1990s
Minimalism (technical communication), a theory of task-oriented and user-centered instruction and documentation
Minimalism (visual arts), art movement to expose the essence, essentials or identity of a subject through eliminating all non-essential forms, features or concepts
Minimalist music, a form of art music that employs limited or minimal musical materials
Judicial minimalism, a philosophy in United States constitutional law
Biblical minimalism, a movement or trend in biblical scholarship holding that the Bible is not reliable evidence for history, and that "Israel" is a problematic subject for historical study
Simple living, voluntary practices to simplify one's lifestyle by reducing one's possessions
See also
, or containing
Minimal (disambiguation)
Minimisation (disambiguation)
Concision
|
https://en.wikipedia.org/wiki/Rocky%20King%20Detective
|
Rocky King Detective (also known as Inside Detective) is an American action/crime drama series that was broadcast live on the DuMont Television Network on Sundays at 9pm ET for most of its run. The series ran for six seasons, from January 7, 1950, to December 26, 1954. From January 7, 1950, to July 22, 1950, the series was broadcast on Saturdays at 8:30pm ET, and from September 8, 1950, to March 9, 1951, it was broadcast on Fridays at 9:30pm ET, until moving to Sundays.
When the series began in 1950 it was seen on nine DuMont stations, and budget limitations forced its star, Roscoe Karns to change in the men’s restroom. In 1953 it was shown on 45 stations and, after moving production to DuMont’s new Tele-Center, Karns obtained his own dressing room. The series became one of DuMont’s most popular shows, lasting nearly to the end of DuMont’s operations.
Overview
Each episode begins with Roscoe Karns, as the title character, walking down a long hallway towards the camera, as the announcer says “Rocky King, chief of homicide of the Metropolitan Police Force in an exciting fight against crime.” During the first three seasons Earl Hammond portrayed King's partner, Detective Sgt. Lane. During the final two seasons, Karns' real life son Todd portrayed King's partner Detective Hart. Rounding out the cast was Grace Carney as Mabel King.
As an economy measure Carney was heard, but never seen, as the wife of Detective King. DuMont always suffered from limited funds, and in an early episode Carney was asked to play both the detective’s wife and a woman connected to the crime being investigated. Since the thirty-minute series was broadcast live there wasn’t time for Carney to change her clothing and make-up, so she spoke her Mabel lines offscreen. The audience enjoyed the novelty of a character that was never seen, and so Carney continued to speak her lines out of camera range.
The series tried to show an accurate depiction of police work. Detective King and his assistants sometimes missed clues, or failed to arrest suspects in a timely manner, but the audience appreciated that the characters were depicted as being fallible. Roscoe Karnes had met a few detectives, and tried to model his role after them. He stated “The cops I’ve met like Rocky because the show doesn’t ridicule them.”
The series blended dramatic police investigation with humorous banter between Rocky and his wife Mabel; banter which often pertained to their son, Junior. Mabel said foolish things, and nagged her husband, but it was shown that the couple cared for each other. Each episode ended with Rocky calling his wife to say he would soon be home, then he looked at the camera and remarked “Wonderful girl, that Mabel.” Roscoe Karns wrote much of the dialogue between Rocky and Mabel.
Episode status
Of hundreds of Rocky King Detective episodes 38 kinescope copies are archived at the UCLA Film and Television Archive, but 11 of those episodes are marked as being Non-circulating Safety Stor
|
https://en.wikipedia.org/wiki/Infrared%20Processing%20and%20Analysis%20Center
|
The Infrared Processing and Analysis Center (IPAC) provides science operations, data management, data archives and community support for astronomy and planetary science missions. IPAC has a historical emphasis on infrared-submillimeter astronomy and exoplanet science. IPAC has supported NASA, NSF and privately funded projects and missions. It is located on the campus of the California Institute of Technology in Pasadena, California.
IPAC was established in 1986 to provide support for the joint European-American orbiting infrared telescope, the Infrared Astronomical Satellite, or IRAS. The IRAS mission performed an unbiased, sensitive all-sky survey at 12, 25, 60 and 100 µm during 1983. After the mission ended, IPAC started the Infrared Science Archive (IRSA) to make the data available to anyone who needed it.
Later, NASA designated IPAC as the U.S. science support center for the European Infrared Space Observatory (ISO), which ceased operations in 1998. About that same time, IPAC was designated as the science center for the Space Infrared Telescope Facility (SIRTF) -- renamed the Spitzer Space Telescope after launch. IPAC also assumed the lead role in various other infrared space missions, including the Wide-field Infrared Explorer (WIRE) and the Midcourse Space Experiment (MSX). IPAC also expanded its support to include ground-based missions with the assumption of science support responsibilities for the Two-Micron All-Sky Survey (2MASS), a near-infrared survey of the entire sky conducted by twin observatories in the Northern and Southern hemispheres.
In 1999, IPAC formed an interferometry science center, originally called the Michelson Science Center (MSC) after interferometry pioneer Albert A. Michelson. MSC was renamed the NASA Exoplanet Science Institute (NExScI) in 2008.
Today, the greater IPAC includes the Spitzer Science Center, the NASA Exoplanet Science Institute and the NASA Herschel Science Center. In 2014, NASA established the Euclid NASA Science Center at IPAC (ENSCI) in order to support US-based investigations using Euclid data. The combined efforts of these centers support more than a dozen science missions and archives. IPAC is also a participating organization in the Virtual Astronomical Observatory (VAO).
References
External links
IPAC official Web site
NExScI official Web site
SSC official Web site
NHSC official Web site
Infrared Science Archive official Web site
NASA Exoplanet Archive official Web site
NASA Extragalactic Database official Web site
Wide-field Infrared Survey Explorer official Web site
Virtual Astronomical Observatory official Web site
Montage Image Mosaic Software official Web site
Euclid NASA Science Center at IPAC official Web site
Aperture Photometry Tool official Web site
California Institute of Technology
|
https://en.wikipedia.org/wiki/Navis%20Logistics%20Network
|
Navis Logistics Network (NLN) is the former parent company of Navis Pack & Ship, based in Denver, Colorado. The company formerly franchised Navis Pack & Ship (NP&S) and Handle With Care Packaging Store (HWCPS) shipping centers.
History
NLN was founded in 1980 as a single, company-owned retail store operating under the Handle With Care Packaging Store name and began franchising in 1984 until it sold the HWCPS brand to Annex Brands, Inc. in late 2007.
In 2002, Navis opened a new franchise, Navis Pack & Ship Center, based on its original franchise only operating in a warehouse and specializing in difficult-to-ship and valuable items. Many of these items were fragile, large, awkward or valuable in size. The company trademarked FLAV to represent serving these items. Navis franchises use well known shipping and freight services, such as United Parcel Service, FedEx and Yellow.
In January, 2011, sold the Navis Pack & Ship brand to Annex Brands, Inc., headquartered in San Diego. Annex Brands also franchises other brands in the packing/shipping industry: PostalAnnex+, AIM Mail Centers, Handle With Care Packaging Store, Sunshine Pack & Ship, and Annex Copy Center.
References
External links
Official Website
Moving & Storage
Franchises
Companies based in Denver
Packaging companies of the United States
Logistics companies of the United States
Transportation companies based in Colorado
|
https://en.wikipedia.org/wiki/ARTV%20%28Chilean%20TV%20channel%29
|
ARTV is a private owned cable TV channel of Chile. It mostly airs cultural programming, such as the popular TV shows Endogao, Muchachas, and Caracas.
See also List of Chilean television channels
References
External links
Official website Last retrieved on October 15, 2012
Television networks in Chile
ARTV
Spanish-language television stations
Television channels and stations established in 1992
Companies based in Santiago
|
https://en.wikipedia.org/wiki/4G%20%28disambiguation%29
|
4G is a generation of standards for mobile telecommunication.
4G may also refer to:
4G or 4GL, a fourth-generation programming language
4G (film), an upcoming Indian film
4G, the production code for the 1975 Doctor Who serial Pyramids of Mars
See also
G4 (disambiguation)
3G (disambiguation)
5G (disambiguation)
|
https://en.wikipedia.org/wiki/DirectDraw%20Surface
|
The DirectDraw Surface container file format (uses the filename extension DDS), is a Microsoft format for storing data compressed with the previously proprietary S3 Texture Compression (S3TC) algorithm, which can be decompressed in hardware by GPUs. This makes the format useful for storing graphical textures and cubic environment maps as a data file, both compressed and uncompressed. The file extension for this data format is '.dds'.
History
This format was introduced with DirectX 7.0. In DirectX 8.0, support for volume textures was added. With Direct3D 10, the file format was extended to allow an array of textures to be included, as well as support for new Direct3D 10.x and 11 texture formats.
Initial DDS support landed in GIMP 2.10.10 released on April 4, 2019.
See also
DirectX
Direct3D
DirectDraw
DXTn (S3 Texture Compression)
References
External links
Programming Guide for DDS
Example .dds loader in C++
NVIDIA Texture Tools
DDS Converter
DDSTextureLoader
List of DDS Formats
Draw Surface DirectDraw Surface
Graphics file formats
|
https://en.wikipedia.org/wiki/Pervasive%20Software
|
Pervasive Software was a company that developed software including database management systems and extract, transform and load tools. Pervasive Data Integrator and Pervasive Data Profiler are integration products, and the Pervasive PSQL relational database management system is its primary data storage product. These embeddable data management products deliver integration between corporate data, third-party applications and custom software.
Pervasive Software was headquartered in Austin, Texas, and sold its products with partners in other countries.
The company is involved in cloud computing through DataSolutions and its DataCloud offering along with its long-standing relationship with salesforce.com. It was acquired by Actian Corp. in April 2013.
History
Pervasive started in 1982 as SoftCraft developing the database management system technology Btrieve. Acquired by Novell in 1987, in January 1994 Pervasive spun out as Btrieve Technologies. The company name was changed to Pervasive Software in June 1996. Their initial public offering in 1997 raised $18.6 million.
Ron R. Harris was chief executive and founder Nancy R. Woodward was chairman of the board of directors (the other co-founder was her husband Douglas Woodward). Its shares were listed on the Nasdaq exchange under symbol PVSW.
Its database product was announced in 1999 as Pervasive.SQL version 7, and later renamed PSQL. PSQL implemented the atomicity, consistency, isolation, durability properties known as ACID using a relational database model.
In August 2003, Pervasive agreed to acquire Data Junction Corporation, makers of data and application integration tools renamed Pervasive Data Integrator, for about $51.7 million in cash and stock shares. Data Junction, founded in 1984, was a privately held company also headquartered in Austin. The merger closed in December 2003.
Pervasive also acquired business-to-business data interchange service Channelinx in August 2009. Based in Greenville, South Carolina, it continued operating under the name Pervasive Business Xchange.
In February 2011, Pervasive announced version 5 of DataRush, which included integration with the MapReduce programming model of Apache Hadoop.
In 2013, Pervasive Software was acquired by Actian Corporation for $161.9 million. Actian had initially made offers in August 2012 starting at $154 million 30% higher than its shares traded at the time, and raised its price in November. Pervasive agreed to the deal in January 2013, and it closed in April.
Products
PSQL
Pervasive PSQL, also known as Pervasive.PSQL or simply PSQL (originally Btrieve) is a DBMS for embedded applications. There were four editions of Pervasive PSQL: PSQL Client, PSQL Workgroup, PSQL Server, and PSQL Vx Server.
PSQL Client is designed for use with PSQL Server and PSQL Vx Server in a client-server network.
PSQL Workgroup edition is intended for single- and multi-engine configurations with up to five users.
PSQL Server edition is intended for conf
|
https://en.wikipedia.org/wiki/List%20of%20awards%20and%20nominations%20received%20by%20The%20Simpsons
|
The Simpsons is an American animated sitcom that debuted on December 17, 1989, on the Fox network. The show is the longest-running prime time scripted television series in the United States. It has won many different awards, including 34
Emmy awards, 34 Annie Awards, nine Environmental Media Awards, twelve Writers Guild of America Awards, six Genesis Awards, eight People's Choice Awards, three British Comedy Awards, among other awards. Episodes of the show have won 11 Emmys in the Primetime Emmy Award for Outstanding Animated Program (For Programming less than One Hour) category. However, The Simpsons has never been nominated for Outstanding Comedy Series, although the show was submitted in the category in 1993 and 1994. James L. Brooks, an executive producer on the show, won eleven Emmys for The Simpsons as well as ten for other shows and holds the record for most Primetime Emmys won by a single person, with 21, The Simpsons was the first animated series to be given a Peabody Award, won a second Peabody in 2020, and in 2000 the Simpson family was awarded a star on the Hollywood Walk of Fame. As of 2022, The Simpsons have received a total of 100 Emmy nominations.
The Simpsons Movie, released in 2007, was nominated for several major awards, including a Golden Globe Award, while The Longest Daycare, a short film released in 2012, became the franchise's first production to be nominated for an Academy Award.
The Simpsons also holds two world records from the Guinness World Records: Longest-Running Primetime Animated Television Series and Most Guest Stars Featured in a Television Series.
Awards for The Simpsons
Annie Awards
First awarded in 1972, the Annie Awards are given exclusively to animated programs. The Simpsons has won 34 Annies, including 12 straight in the Best Animated Television Production category and winning in 2015 and 2016 for Best General Audience Animated TV/Broadcast Production.
* denotes nominated works with awards pending presentation and announcement
British Comedy Awards
The Simpsons has won three British Comedy Awards. Matt Groening also won a special award for Outstanding Contribution to Comedy in 2004.
Primetime Emmy Awards
The Simpsons has won 34 Primetime Emmy Awards in four categories, but has been nominated for 78 awards in nine different categories. Two of these nominations were for "Simpsons Roasting on an Open Fire", which was nominated in 1990 as a separate cartoon because officially it is considered a TV special and not a part of the series, however it is included in these statistics. The show's best year was 1992, when it won six Emmys, all for Outstanding Voice-Over Performance. Until 2009, the Outstanding Voice-Over Performance Emmy was awarded by a committee, so there were no nominations.
The Simpsons has been nominated for Primetime Emmy Award for Outstanding Animated Program (For Programming less than One Hour) every year except 1993, 1994 and 2014. 1993 marked the first year that the producers of The
|
https://en.wikipedia.org/wiki/Olympus%20mju
|
The Olympus mju (Greek letter μ[mju:], Olympus Stylus in North America) is a series of compact film and digital cameras manufactured by Olympus.
Models
Digital (MetaData for Camera Model is listed after U.S. model nomenclature)
Olympus mju 300 (Stylus 300, 3.2 megapixels)
Olympus mju 400 (Stylus 400, 4.0 megapixels) also known as μ-30 DIGITAL (from 2004)
Olympus mju 410 (Stylus 410, 4.0 megapixels)
Olympus mju 500 (Stylus 500, 5.0 megapixels)
Olympus mju 600 (Stylus 600, 6.0 megapixels)
Olympus mju 710 (Stylus 710, 7.1 megapixels)
Olympus mju 720 SW (Stylus 720 SW, 7.1 megapixels) u720SW,S720SW
Olympus mju 725 (Stylus 725, 7.1 megapixels) New Model as of Oct 2006
Olympus mju 730 (Stylus 730, 7.1 megapixels)
Olympus mju 740 (Stylus 740, 7.1 megapixels)
Olympus mju 750 (Stylus 750, 7.1 megapixels)
Olympus mju 800 (Stylus 800, 8.0 megapixels)
Olympus mju 810 (Stylus 810, 8.0 megapixels)
Olympus mju 1000 (Stylus 1000, 10.0 megapixels)
Olympus mju 1010 (Stylus 1010, 10.1 megapixels)
Olympus mju 1020 (Stylus 1020, 10.1 megapixels)
Olympus mju 1030 SW (Stylus 1030 SW, 10.1 megapixels) (Olympus μ 1030 SW)
Olympus mju 1040 (Stylus 1040, 10.1 megapixels)
Olympus mju 1200 (Stylus 1200, 12.0 megapixels)
Film
Olympus mju, (Stylus in North America), 1991
Olympus mju Stylus QD (in North America)
Olympus mju Zoom 105 (Stylus Zoom 105), 1996
Olympus mju II, (Stylus Epic), 1997
Olympus mju II Zoom (Stylus Epic Zoom 80), 1998
Olympus mju Zoom 115 QD (Stylus Epic Zoom 115 QD, 1997)
Olympus mju Zoom 140 (Stylus Zoom 140, 1998)
Olympus mju Zoom Wide 80 (Stylus Zoom Wide 80)
Olympus mju Zoom 105 (Stylus Zoom 105)
Olympus mju III Wide 100 (Stylus 100 Wide)
Olympus mju III 120 (Stylus III 120)
Olympus mju III 150 (Stylus III 150)
Olympus mju II 170VF (Stylus Epic Zoom 170 QD)
Olympus mju Zoom 105 (Stylus Select 105)
References
External links
Camera-wiki
Olympus History
μ
μ
|
https://en.wikipedia.org/wiki/Students%20for%20a%20Free%20Tibet
|
Students For a Free Tibet (SFT) is a global grassroots network of students and activists working in solidarity with the Tibetan people for human rights and freedom. The group uses education, advocacy, and nonviolent direct action with the goal of achieving Tibetan independence. SFT advocates self-determination for Tibet because of Tibet's historical status as well as opposing the Chinese government's violation of the Tibetan people's human rights, cultural heritage, environment, language and religion.
History
Students for a Free Tibet (SFT) was founded in 1994 by pro-independence Tibetans, supporters, and students in New York City to use the influence of youth in order to press for human rights and independence in Tibet. Initially, SFT's activities were focused on raising awareness amongst fellow students and young people on campuses and at events such as the 1994 Lollapalooza music tour. Students for a Free Tibet's profile and membership grew with the advent of the Tibetan Freedom Concerts, which provided a vehicle for youth involvement in the Tibetan independence movement.
Currently, SFT is an international network of more than 650 chapters at universities, colleges, high schools, and communities in over 100 countries. SFT's International Headquarters remains in New York City. There are also a few satellite offices and organizing hubs; SFT Canada has an office in Toronto, Ontario, SFT India has an office in Dharamsala, India, and SFT UK has an office in London.
Programs
SFT's campaigns focus on three areas: political, economic, and human rights. SFT's political campaigns are focused on generally advocating for Tibetan independence by pressuring both Chinese officials as well as SFT members' government representatives. SFT is well known for high-profile protests against Chinese dignitaries when they visit foreign countries. SFT's human rights campaigns are focused on improving the situation for Tibetans in Tibet by advocating for increased freedoms and rights, and for the release of political prisoners and dissidents. But its website maintains, "When we say 'Free Tibet' we don't just mean, 'Make things better in Tibet.' We mean 'Free the nation of Tibet from Chinese occupation.'"
The stated long-term goal for SFT's economic campaign is to make Tibet "too costly for the Chinese government to maintain." One such campaign, held in conjunction with other organizations which promote regime change in China, urged consumers not to buy products "made in China". The American media commented on the extreme difficulty of such an endeavor; a commentator from the Christian Science Monitor expressed her belief that "the solutions to those concerns and others lie in turning toward China, rather than away."
Students for a Free Tibet's "Leadership Training" is focused on developing representatives for the Tibetan independence movement. Part of this is the annual "Free Tibet! Action Camp" at which dozens of young people gather for a week-long activism trai
|
https://en.wikipedia.org/wiki/Magnificent%20Obsessions
|
Magnificent Obsessions is a Canadian documentary TV series that ran in 2002 and 2003 on the Life Network. The series ran in six-parts. It was shot on location in Canada, England, Romania and the Netherlands. The series told the stories of six people with obsessive fixations ranging from investigating the Sasquatch, building the world's most elaborate sandcastles and studying Dracula.
The series was directed by Shereen Jerret in Winnipeg, Manitoba, Canada.
2000s Canadian documentary television series
|
https://en.wikipedia.org/wiki/Cronosoft
|
Cronosoft is a UK-based non-profit software publisher established in 2002, by Simon Ullyatt which manufactures and markets games and utility software for a range of mainly 8-bit computers that are considered "retro" or commercially obsolete.
Cronosoft's plan was to produce games on real media (usually cassette tape) and market them via their website, and through user enthusiasts groups.
History
Cronosoft was formed in late 2002 as a result of little software being released for older 8-bit computers. The last major commercial releases and magazine support for systems such as the ZX Spectrum and Commodore 64 ceasing around 1993.
Its first release, Egghead in Space (the third Egghead game in the series, the first in the series being published by Crash magazine in the UK), was written and developed by Jonathan Cauldwell, and released on cassette format for the ZX Spectrum in 2003
Since the beginning, Cronosoft has increased its range of software to include titles, not only for the ZX Spectrum, but also for the Commodore 64, VIC-20, Amstrad CPC, ZX81, ZX80, Dragon 32, and even the Mattel Aquarius. Popular titles include Platform Game Designer, Astro Nell, Quantum Gardening, Glove, LumASCII and Code Zero. More recent releases have included Quadron by Cosmium, and Sokobaarn, popular but very different games for the ZX Spectrum.
Cronosoft's plan is to expand its range to cover even more obscure home computers like the TRS-80 Color Computer, Oric, Sord M5, and TI-99/4A. Of the 100+ titles released as of 2020, more than half are for the ZX Spectrum, ZX80, and ZX81. The next most popular format is the VIC-20.
Cronosoft has been featured in several mainstream computer magazines, including Retro Gamer, GamesTM and Micro Mart, and regularly exhibits at computer shows across the United Kingdom, and has in the past included CGE UK, ORSAM and RETRO BALL. Cronosoft has been referenced by the BBC, The Guardian newspaper, The Independent Newspaper, and has been featured in the movie Memoirs of a Spectrum Addict.
References
External links
Video game companies of the United Kingdom
Software companies of the United Kingdom
Video game companies established in 2002
2002 establishments in the United Kingdom
|
https://en.wikipedia.org/wiki/WFXB
|
WFXB (channel 43) is a television station licensed to Myrtle Beach, South Carolina, United States, serving the Grand Strand and Pee Dee regions of South Carolina as an affiliate of the Fox network. Owned by Bahakel Communications, the station maintains studios on Huger Street in Myrtle Beach, west of Myrtle Beach International Airport, with an advertising sales office on East Evans Street in Florence; its transmitter is located on Grices Ferry Court near US 76 east of Mullins.
Established as a Christian independent station under the call sign WGSE in 1984, the station gradually became a more secular outlet; in 1996, it was sold and obtained the Fox affiliation for the market. In addition to Fox network programming, the station produces several local talk and news shows and airs additional news programming produced for it by local CBS affiliate WBTW.
History
Channel 43 began broadcasting as independent station WGSE, the first TV station in Myrtle Beach, on July 5, 1984. It was owned by Carolina Christian Broadcasting of Greenville, owner of WGGS-TV in that city. Its lineup consisted of religious programs, both national and regional (such as Niteline from WGGS), as well as family-friendly secular shows and content from the short-lived Prime of Life Network, targeting seniors. The station's early years were far from a financial success. In 1987, a cable channel switch moved WGSE to a higher position and resulted in a "crisis" for the station. It was entirely subsidized by money from WGGS-TV and bank loans; operations manager and news director Jim Rizutti admitted in 1988, "It would not be an overstatement to say we've lost our shirt down here."
Beginning in 1991, the station slowly added more secular programs, as well as Charlotte Hornets basketball. WGSE became a charter WB affiliate on January 11, 1995.
With viewership never supporting the station adequately, Carolina Christian Broadcasting sold WGSE to James McGregor Everett in 1996. Religious programming was cut back that fall from a third to 12 percent of channel 43's broadcast day, with some CCB-produced programming remaining as part of the sale agreement. Everett also pursued the Fox affiliation for the market. Two years prior, WWMB-TV channel 21, a new station licensed to Florence, had gone so far as to have a verbal agreement with the network, which instead opted to use WSFX-TV out of Wilmington, North Carolina (and owned by James Everett's father, Robinson O. Everett), to cover the Grand Strand; Fox had even helped WWMB pick syndicated programming with a view to moving there. However, Fox's desire to use an independent business instead of WWMB, whose operations were managed by ABC affiliate WPDE-TV, steered the network to channel 43. Beginning on November 10, 1996, channel 43 became the Fox affiliate for Florence and Myrtle Beach; With this, the station changed its call letters to the current WFXB. Florence–Myrtle Beach had been the only area of South Carolina, and one of the few in th
|
https://en.wikipedia.org/wiki/WZRB
|
WZRB (channel 47) is a television station in Columbia, South Carolina, United States, airing programming from the Ion Television network. Owned and operated by the Ion Media subsidiary of the E. W. Scripps Company, the station maintains offices and transmitter facilities on Cushman Drive (near US 1) on the northeast side of Columbia.
History
Early history
The station first signed on the air on January 1, 2005, as the sixth commercial television station to sign on the air in the Columbia television market. Founded by St. Louis-based Roberts Broadcasting, it originally operated as a UPN affiliate. Prior to WZRB's sign-on, Sumter-licensed WB affiliate WBHQ (channel 63, now WKTC) carried UPN programming on a secondary basis, airing its prime time schedule on a two-hour delay. UPN programming was not available at all in the Columbia market for a few months after WBHQ dropped its secondary affiliation with UPN in August 2004.
On January 24, 2006, the Warner Bros. unit of Time Warner and CBS Corporation announced that the two companies would shut down The WB and UPN and combine the networks' respective programming to create a new "fifth" network called The CW. WZRB became Columbia's CW affiliate when the network launched on September 18, 2006; WKTC took the MyNetworkTV affiliation, and joined that network when it launched two weeks earlier on September 5.
Sale to Gary Chapman and switch to Ion
On December 2, 2013, Roberts filed an application with the Federal Communications Commission (FCC) to sell WZRB to Radiant Light Ministries, a subsidiary of religious broadcaster Tri-State Christian Television; however, on December 11, the United States bankruptcy court gave initial approval for a plan by Roberts' creditors to instead transfer WZRB and its sister stations, WRBU in St. Louis and WAZE-LP in Evansville, Indiana, to a trust overseen by former LIN Media CEO Gary Chapman with Ion Media Networks (a creditor in Roberts' Chapter 11 bankruptcy proceedings) as its beneficiary, with Roberts' attorney subsequently stating that Ion would purchase the three stations.
On February 10, 2014, WZRB became an Ion affiliate, carry the network's programming for the majority of its broadcast day, resulting in the removal of WZRB's syndicated programming inventory in the process. For the first month of its tenure as an Ion O&O, CW programming—including primetime shows—continued to air on the station as a secondary affiliation, pre-empting one hour of Ion's daytime lineup and the first two hours of its primetime schedule (although the Vortexx children's block on Saturday mornings, was aired one hour earlier than the network's recommended timeslot nationwide, at 6:00 a.m. in order to accommodate Ion programming that started at 11:00 a.m.). This was a departure from the standard Ion programming structure (in which stations carry only Ion programming with limited to no local content and no acquired programming outside of that offered by the network); as a result, it mark
|
https://en.wikipedia.org/wiki/WACH
|
WACH (channel 57) is a television station in Columbia, South Carolina, United States, affiliated with the Fox network. Owned by Sinclair Broadcast Group, the station maintains studios on Pickens Street in downtown Columbia, and its transmitter is located on Rush Road (southeast of I-20) in rural southwestern Kershaw County.
History
WCCT-TV
After several false starts dating back to 1980, the station first signed on the air on September 1, 1981 as WCCT-TV (for Carolina Christian Television). It was founded by Carolina Christian Broadcasting, which also owned WGGS-TV (channel 16) in Greenville. It was the first independent station in Columbia, and the first completely new commercial station in the Midlands since WIS-TV signed on in 1953. ABC affiliate WOLO-TV operates under a license dating from earlier in 1953; it went off the air in 1956 and returned in 1961.
The station's original studios were located on Sunset Boulevard (US 378) in West Columbia. Initially, it ran religious programming for most of the broadcast day, such as The 700 Club and The PTL Club, and televangelist programs from Richard Roberts and Jimmy Swaggart. It also carried WGGS' locally produced Christian program, Niteline. WCCT eventually began producing its own local version of the show. The rest of the day was taken up by secular syndicated programming, including cartoons, classic sitcoms, westerns, and hunting and sports programs. However, its programming policy was very conservative so as not to offend the sensibilities of its mostly fundamentalist and Pentecostal viewership. Notably, it refused to run any programming that contained profanity, violence or sexual content.
As a Fox affiliate
On June 11, 1988, the station was sold to FCVS Communications. On the day FCVS closed on its purchase of channel 57, it changed the call letters to WACH (the WCCT-TV calls are presently used by a CW-affiliated station in Waterbury, Connecticut, serving the Hartford–New Haven market) and relaunched it as the market's Fox affiliate, branding as "WACH-TV 57" (pronounced as "Watch TV 57"). For the first two years of Fox's existence, Columbia residents were only able to see the network's programming via its Washington, D.C. owned-and-operated station WTTG, which had been available on area cable systems for many years. That station continued to be available on Columbia's two major cable providers, Wometco and TCI, for several years afterward.
FCVS significantly upgraded the station's programming, adding somewhat racier programming to the schedule. At first, WACH kept Christian-oriented religious programming on weekdays from 9:00 a.m. to noon and from midnight to 2:00 a.m. per an agreement with Carolina Christian Broadcasting. It also agreed to continue producing and airing Niteline for an hour a day for five years. The program was dropped from the schedule by 1993, along with most of the religious programs. WACH eventually changed its branding to "WACH Fox 57" in the 1990s.
Ownership change
|
https://en.wikipedia.org/wiki/CJLL-FM
|
CJLL-FM is a Canadian radio station, which broadcasts multilingual community programming at 97.9 FM in Ottawa, Ontario, with studios located on Wellington Street West in Ottawa, while its transmitter is located in downtown Ottawa. Although CJLL has a very different call sign than its Toronto sibling stations CHIN and CHIN-FM, it shares their branding as CHIN Ottawa.
History
On October 4, 2001, the CRTC approved the application by CHIN Radio/TV International, the owner of the multilingual stations CHIN and CHIN-FM in Toronto, for a broadcasting licence for a specialty FM ethnic radio station in the National Capital Region at 97.9 MHz. The station was launched in 2003 out of studios at 30 Murray Street in the ByWard Market neighborhood, which later became home to the Philippine Embassy in Ottawa.
CJLL airs programming in over 20 languages, serving up to 40 different cultural communities. Mornings feature programming primarily in Arabic and Italian, while Spanish and Chinese (Cantonese & Mandarin) programming airs in the evenings. On evenings and weekends CHIN airs programming in Caribbean, Dutch, German, Greek, Gujarati, Haitian, Hindi, Hungarian, Korean, Persian, Portuguese, Punjabi, Romanian, Russian, Ukrainian and Urdu languages.
References
External links
CHIN Radio Ottawa main web page - https://www.chinradio.com/ottawa
Jll
Jll
Radio stations established in 2003
China Radio International
2003 establishments in Ontario
|
https://en.wikipedia.org/wiki/CHLO%20%28AM%29
|
CHLO (530 kHz) is a commercial AM radio station in Brampton, Ontario, serving Greater Toronto. It is owned by Evanov Communications and broadcasts a multilingual format. Most programming is Punjabi with other languages of South Asia. Some Italian, German, Croatian, Tagalog, Bulgarian, and Spanish language shows are heard on weekends. CHLO's radio studios and offices are on Dundas Street West in the Eatonville neighbourhood of Toronto.
By day, CHLO transmits with 1,000 watts non-directional; due to restrictions placed on the frequency by international treaty, it reduces power at night to 250 watts. The transmitter is on Sixth Line in Halton Hills. CHLO is one of only a few commercial radio stations in North America broadcasting on 530 AM.
History
The station signed on the air on . It originally broadcast on 1090 kHz as CFJB, a daytimer owned by broadcaster Fen Job. Job was killed in a car crash in 1956, and the station was sold by his estate to CHIC Ltd. in 1959, adopting the new callsign CHIC the following year.
In the 1960s, Alekos Columbos hosted a 90-minute Greek radio show on Saturdays and Klaas Mulenar preached in Dutch on Sundays, as the station incorporated more ethnic broadcasts into its schedule. In 1961, the owners also launched an FM station, CHIC-FM on 102.1 MHz.
In 1964, CHIC became a full-time broadcaster, moving to 790 AM. From 1966 to 1969, it tried a new twist in an era where almost all radio voices were male. It launched an all-female disc jockey format using the slogan "Where The Girls Are." Regular newscasts and some other features continued to be voiced by men.
In 1977, the FM station adopted the new call sign CFNY-FM.
In 1979, the stations' owner went into receivership. The stations were subsequently acquired by Civitas Corp., the owner of CJMS in Montreal. Civitas became Mutual Communications in 1980, and CHIC adopted the new callsign CKMW. Mutual subsequently sold CKMW to Patrick Hurley, who incorporated as CKMW Radio Ltd., in 1983; CFNY was sold to Selkirk Communications.
As CKMW, the AM station adopted its current multilingual format, and ownership of CKMW Radio was transferred to Evanov in 1985.
The station adopted the new call sign CIAO in 1987, and moved to its current frequency in 1991 after CJFT in Fort Erie converted to the FM band. In January 2019, it adopted its current call sign of CHLO.
HD Radio
On June 8, 2021, CHLO became the first AM station in Canada to transition to HD Radio on the AM band.
References
External links
AM 530
CHLO history - Canadian Communications Foundation
HLO
Mass media in Brampton
HLO
HLO
Radio stations established in 1953
1953 establishments in Ontario
HD Radio stations
Indo-Canadian culture
Asian-Canadian culture in Ontario
Indian diaspora mass media
Punjabi-language radio stations
|
https://en.wikipedia.org/wiki/State%20Highway%201%20%28New%20Zealand%29
|
State Highway 1 (SH 1) is the longest and most significant road in the New Zealand road network, running the length of both main islands. It appears on road maps as SH 1 and on road signs as a white number 1 on a red shield, but it has the official designations SH 1N in the North Island, SH 1S in the South Island.
SH 1 is long, in the North Island and in the South Island. Since 2010 new roads have reduced the length from . For the majority of its length it is a two-lane single carriageway, with at-grade intersections and property accesses, in both rural and urban areas. These sections have some passing lanes. Around of SH 1 is of motorway or expressway standard : in the North Island and in the South Island.
Route
North Island (SH 1N)
SH 1 starts at Cape Reinga, at the northwestern tip of the Aupōuri Peninsula, and since April 2010 has been sealed (mainly with either chipseal or asphalt) for its entire length. From Waitiki Landing south of Cape Reinga, SH 1 travels down the central-eastern side of the peninsula to Kaitaia, New Zealand's northernmost town, then travels through a new piece of road in the Mangamuka Gorge before turning south-east across the Northland Peninsula on to Kawakawa in the Bay of Islands where the roadway is shared by the Bay of Islands Vintage Railway track, and then south to the city of Whangārei, the largest urban area in Northland.
SH 1 then skirts the south-western Whangārei Harbour, nearing the coast briefly at Ruakākā, before proceeding down to wind through the Brynderwyn Hills before approaching the upper reaches of the Kaipara Harbour. The highway crosses into the Auckland Region, and passes through Wellsford and Warkworth, again heading for the east coast.
Just north of Warkworth, the road widens to a four-lane motorway known as Ara Tuhono, Puhoi to Warkworth motorway. In the Moir Hill section, the road widens to 6 lanes with the addition of crawler lanes on the uphill sections.
Near Puhoi, on the Hibiscus Coast, SH 1 becomes the Auckland Northern Motorway. This section of the motorway is an automated toll road. At Orewa, the motorway becomes toll-free, crossing farmland to the North Shore of Auckland. The road crosses through suburbs to the Waitematā Harbour, which it briefly follows before crossing it by the Auckland Harbour Bridge. The motorway comes off the bridge into Auckland's city centre, and forms its western boundary as SH 1 proceeds to the Central Motorway Junction.
At this junction, SH 1 becomes the Auckland Southern Motorway, and, after sweeping around the southern end of central Auckland, proceeds in a south-easterly direction. The motorway continues in a broadly southeast direction across the Auckland isthmus, then through Manukau and Papakura to the top of the Bombay Hills, just short of the Auckland/Waikato boundary.
At Bombay, SH 1 becomes the Waikato Expressway, a four-lane dual-carriageway expressway. The expressway takes the highway down the Bombay Hills to Mercer, where SH 1 m
|
https://en.wikipedia.org/wiki/Arcada%20Software
|
Arcada Software, Inc., was a former American computer software company, that was based in California.
History
The company was formed in early 1994 by the merger of Conner Software (the software division of Conner Peripherals) in Lake Mary, Florida; and Astora Software (formerly Quest Development Corporation) in San Luis Obispo, California.
Conner Software owned the Backup Exec brand of backup software, while Quest owned the source code behind Symantec Corporation’s Norton Antivirus Backup for the DOS, Windows, and Macintosh computing platforms of the time.
In 1995, Arcada Software acquired the Sytron division of Rexon, to become a leader in the OS/2 market as well.
The Chief Executive Officer of Arcada Software was entrepreneur Kevin Azzouz, also the founder and President of Quest Development Corporation.
Fate
Arcada’s sales revenues grew exponentially over its two-year lifespan, until was acquired by Seagate Technologies in 1996.
Seagate then spun it and the other software companies it had acquired up to that time off into a wholly owned subsidiary called Seagate Software.
See also
NTBackup
References
Defunct software companies of the United States
Software companies based in California
Software companies established in 1994
Software companies disestablished in 1996
1994 establishments in California
1996 disestablishments in California
Defunct companies based in California
|
https://en.wikipedia.org/wiki/Autotype
|
Autotype is a function in some computer applications or programs, typically those containing forms, which fills in a field once you have typed in the first few letters. Most of the time, such as in a web browser, the entries that appear in the list depend on the form's name, so as to not propose street names in a last name field or vice versa.
Background
Autotype can also refer to automatically determining a peripheral's configuration or a program's variables.
Autotype is defined as a "true representation of the original" (see O.E.D).
The term autotype was coined in the late 19th century and referred to a process for making photographic prints using a carbon process. Many autotype prints were produced and the process was popular well into the 20th century, particularly since autotype prints are very long lasting (it is said that an autotype could last up to 500 years without fading).
Autotype may also refer to halftone printing. The term may also apply to the Autotype Company, founded in London in 1868 as the "Autotype Fine Art Company", which was one of the pioneers in the carbon print and autotype reproduction process and which still exists as a supplier of coated films. Autotype is now part of the Platform Speciality Products group of companies.
See also
Autotype (printing)
Autocomplete
Autofill
Context sensitive user interface
Combo box
References
External links
PCMag Encyclopedia entry
Text editor features
Non-impact printing
|
https://en.wikipedia.org/wiki/Autofill
|
Autofill is a function found in some computer applications or programs, typically those containing forms, which prefills a field automatically and can save a user time.
A web browser's autofill feature is used to fill out forms with previously entered values, or a predetermined value. This feature is commonly used to fill in login credentials.
Description
Autofill is frequently found in web browsers, used to fill in web forms automatically. When a user inputs data into a form and subsequently submits it, the web browser will often save the form's contents by default.
However, when a password field is detected, the web browser will typically ask the user for explicit confirmation before saving the password in its password store, often secured with a built-in password manager to allow the use of a "master password" before credentials can be autofilled.
Most of the time, such as in Internet Explorer and Google Toolbar, the entries depend on the form field's name, so as to not enter street names in a last name field or vice versa. For this use, proposed names for such form fields, in earlier HTML 5 specifications this RFC is no longer referenced, thus leaving the selection of names up to each browser's implementation.
Certain web browsers such as Opera automatically autofill credit card information and addresses.
In HTML
An individual webpage may enable or disable browser autofill by default. This is done in HTML with the autocomplete attribute in a <form> element or its corresponding form elements.
<!-- Autocomplete turned off by default -->
<form autocomplete="off">
<!-- This form element has autocomplete turned on -->
<input name="username" autocomplete="on">
<!-- While this one inherits its parent form's value -->
<input name="password" type="password">
</form>
Phishing
It has been shown that the autofill feature of modern browsers can be exploited in a phishing attack with the use of hidden form fields, which allows personal information such as the user's phone number to be collected.
See also
Autocomplete
Autocorrect
References
External links
PCMag Encyclopedia entry
The autofill section of the HTML 5.2 specification
Web browsers
|
https://en.wikipedia.org/wiki/Creators%20of%20Intense%20Art
|
This article details the artscene group, Cia. For information regarding the warez group CiA see List of warez groups
Creators of Intense Art, or Cia was an underground computer artscene group that primarily released ANSI, ASCII, and high resolution artwork from 1993 to 2001. Along with iCE and ACiD, Cia was one of the most active, and longest lasting groups on the artscene.
History
Creators of Intense Art was founded during the summer of 1993 by a collective of ANSI artists and demo coders. Like other artscene groups at the time, members communicated primarily through the use of dial up bulletin board systems. The senior staff positions constantly changed hands during Cia's eight-year run, and it was ANSI artist Andrew Bell, under the pseudonym of Napalm, that kept the group on track . Though Napalm drifted in and out of the "president" position, he was always recognized as the head of Cia.
Not unlike the rivalry between iCE and ACiD, there was highly visible competition between Cia and the members of artscene group Blade.
The 21st century was met with declining interest among Cia members, and the underground computer artscene in general. In early 2001, Napalm quietly disbanded Cia and its members pursued other artistic projects.
Releases
Cia members were responsible for works of literature, artwork, music, and software. Content was released monthly in the form of an artpack, referred to as a "conspiracy". 77 conspiracies were released by Cia, with 72 currently available for download on the internet. Conspiracies were packaged with zip compression and included a monthly memberlist and newsletter.
Beginning with the 73rd release, conspiracies consisted strictly of high resolution artwork, and included HTML files with the artwork embedded.
Conspiracies
Image viewer
Wiretap, a DOS mode multi format viewer.
Image editor
Ciadraw, a DOS mode ANSI, ASCII and ADF editor.
External links
Dark Domain The ACiD Artpacks Archive on DVD (), contains all available Cia Conspiracies.
The unofficial Creators of Intense Art beanie
Artscene groups
|
https://en.wikipedia.org/wiki/Girls%20Just%20Want%20to%20Have%20Sums
|
"Girls Just Want to Have Sums" is the nineteenth episode of the seventeenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on April 30, 2006. In this episode, a new school principal decides to segregating boys and girls classes, and Lisa is dissatisfied with the New Age-based girls maths class. So, she disguiseds herself as a boy called Jake Boyman to infiltrate the boys' classroom to be admitted to the actual maths class, and Bart mistakes his camouflaged sister as a new friend.
Plot
The Simpsons see a performance of Stab-a-Lot: The Itchy and Scratchy Musical. Juliana Kellner, the show's director and former student of Springfield Elementary School, greets the reception along with Principal Skinner, who acknowledges Juliana's straight A's at the school but attributes her "B or two" in math to being a girl. Skinner's attempts to defend himself make the situation worse, and he is beaten by the Itchy and Scratchy puppeteers.
The next day, the teachers of Springfield Elementary stage a protest outside the school. Skinner holds a conference to address the protest. Nothing he says or does appease the women, and he eventually collapses from exhaustion. Superintendent Chalmers introduces a new principal, Melanie Upfoot, whilst Skinner is demoted to serving as Groundskeeper Willie's assistant. Upfoot segregates the school across gender lines and Lisa initially looks forward to the all-girls school, but discovers Upfoot's math lessons are New Age. Lisa infiltrates the boys' school, where actual math is being taught. Lisa disguises herself as a boy named Jake Boyman and attends the boys' school, where she gets nicknamed "Toilet". After Lisa inadvertently gets into a fight with Nelson, Bart vows to help her blend into the boys' school.
Lisa is accepted by the boys, and is recognized for her performance in math. She then reveals her true identity. Bart claims she only did well because she learned to think like a boy. In response, she throws her award at him, and is shocked at her violent behavior. Lisa ends her speech by saying how proud she is of her feminism and her intelligence.
Awards
Matt Selman was nominated for a Writers Guild of America Award for Outstanding Writing in Animation at the 59th Writers Guild of America Awards for his script to this episode.
See also
Sex segregation
"Math class is tough!" --Teen Talk Barbie
Social Justice Warrior
References
External links
The Simpsons (season 17) episodes
2006 American television episodes
Cross-dressing in television
Television episodes about sexism
|
https://en.wikipedia.org/wiki/The%20Mook%2C%20the%20Chef%2C%20the%20Wife%20and%20Her%20Homer
|
"The Mook, the Chef, the Wife and Her Homer" is the first episode of the eighteenth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on September 10, 2006. In the episode, Fat Tony is put out of commission by a rival family, and Homer and Bart take over the Springfield Mafia.
The episode was written by Bill Odenkirk and directed by Michael Marcantel. Metallica guest star as themselves, while Michael Imperioli and Joe Pantoliano guest star as Fat Tony's enemies, Dante Jr. and Dante, respectively. In its original broadcast, "The Mook, the Chef, the Wife and Her Homer" was watched by around 11.5 million people and received a 5.3 Nielsen rating. This episode is unavailable for streaming on Disney+ in Singapore.
Plot
After Bart humiliates him in front of Metallica, Otto spanks him, leading to his suspension. With this, Marge has to drive carpool to several of Bart and Lisa's classmates, including Michael, the son of Fat Tony. News of Michael's family spreads, and everyone tries to keep their distance from him. However, Lisa chooses to befriend Michael and discovers that he is a talented cook who dreams of being a chef, rather than going into the family business of "waste management".
When Fat Tony takes a turn driving the children home from school, they find themselves attacked by the Calabresi family, although Fat Tony manages to elude them. Michael then invites the Simpson family over for dinner, but the Calabresis show up unexpectedly for a sit-down. When soufflés are served to the mobsters, they are at first impressed, but the Calabresis go on to mock Michael after he reveals that he was the one who made them. Fat Tony admonishes Michael for making him look weak in front of his enemies before he is suddenly gunned down by an attack helicopter, leaving him comatose.
With no leadership, Johnny Tightlips urges a reluctant Michael to step up as boss, but Homer and Bart volunteer in his place. They then proceed to handle Fat Tony's business, extorting Moe and Krusty, as well as taking several luxury items for themselves. Eventually, Michael notices how the power is corrupting Homer and Bart and seeks to put an end to it.
Michael invites the Calabresis to the Simpsons' house for dinner, where he concedes defeat and states that he is out of the family business. They applaud his decision, but end up choking and dying over their meals. Marge discovers the food had been poisoned, and although Michael appears remorseful, Lisa finds out it was intentional. After Fat Tony congratulates Michael for taking down their enemies, Lisa asks Michael why he did not tell Fat Tony it was all an accident. He then bluntly tells her to never ask him about his business.
Production
The title is a reference to The Cook, the Thief, His Wife and Her Lover. Homer says the greatest mob film of all time was Shark Tale. The 2004 animated film took its general storyline from The Godfather although it transf
|
https://en.wikipedia.org/wiki/Enterprise%20content%20integration
|
Enterprise content integration (ECI) is a marketing buzzword for middleware software technology, often used within large organizations, that connects together various types of computer systems that manage documents and digital content.
ECI systems often work in tandem with other technologies such as enterprise content management, document management, groupware, and records management.
It takes a decentralized approach in order to manage content from various resources. ECI implementations exist on a tier above the organization's existing software and provide wide-ranging search, indexing, and access functions.
Functions
ECI systems, in particular, and Unified Information Access systems in general, attempt to address the growing trend of the recognition that so-called “unstructured content,” such as a series of documents, can be important and can contribute to business development. Their other important function lies in their ability to increase the efficiency with which organizations can retrieve data by providing a single channel to access a wide variety of storage locations.
Enterprise content integration aims to answer a number of needs in today's organizations:
Migrating content (documents and images) from one system to another
Synchronizing part or all the content between two or more content repositories
Searching for documents across all content repositories
Offering a single point of access to all documents and content of the organization
Publishing or pushing this content to other systems (enterprise portals, websites)
Features
ECI functions through the use of a metadata catalog that contains records regarding data throughout the enterprise in order to enable users to seek, browse, locate, and retrieve the necessary information. ECI metadata catalogs are able to collect data from a wide array of sources, including digital asset management systems, file and web servers, and individual users’ PCs. Vendors sometimes refer to this sort of decentralized content management as a virtual repository or a virtual file system.
In addition to gathering data for the metadata catalog, some ECI systems are able to connect to the resources offered by a computer system directly through an interface such as an API. These types of connections are often referred to as adapters, connectors, or content bridges by ECI vendors.
ECI systems can also offer automated aggregation, packaging, and distribution of indexed content through administrator-configurable channels, which allows flexible reporting and powerful analytic capabilities across a wide array of data sources. ECI administrators can design the system by specifying rules for the way indexed content should be packaged as well as how and to whom the content should be delivered. To accomplish these goals, some ECI systems are able to integrate with other computer systems such as publishing systems and format converters, often through web service interfaces.
Vendors
A number of vendors have pro
|
https://en.wikipedia.org/wiki/Lyndon%20word
|
In mathematics, in the areas of combinatorics and computer science, a Lyndon word is a nonempty string that is strictly smaller in lexicographic order than all of its rotations. Lyndon words are named after mathematician Roger Lyndon, who investigated them in 1954, calling them standard lexicographic sequences. Anatoly Shirshov introduced Lyndon words in 1953 calling them regular words. Lyndon words are a special case of Hall words; almost all properties of Lyndon words are shared by Hall words.
Definitions
Several equivalent definitions exist.
A -ary Lyndon word of length is an -character string over an alphabet of size , and which is the unique minimum element in the lexicographical ordering in the multiset of all its rotations. Being the singularly smallest rotation implies that a Lyndon word differs from any of its non-trivial rotations, and is therefore aperiodic.
Alternately, a word is a Lyndon word if and only if it is nonempty and lexicographically strictly smaller than any of its proper suffixes, that is for all nonempty words such that and is nonempty.
Another characterisation is the following: A Lyndon word has the property that it is nonempty and, whenever it is split into two nonempty substrings, the left substring is always lexicographically less than the right substring. That is, if is a Lyndon word, and is any factorization into two substrings, with and understood to be non-empty, then . This definition implies that a string of length is a Lyndon word if and only if there exist Lyndon words and such that and . Although there may be more than one choice of and with this property, there is a particular choice, called the standard factorization, in which is as long as possible.
Enumeration
The Lyndon words over the two-symbol binary alphabet {0,1}, sorted by length and then lexicographically within each length class, form an infinite sequence that begins
0, 1, 01, 001, 011, 0001, 0011, 0111, 00001, 00011, 00101, 00111, 01011, 01111, ...
The first string that does not belong to this sequence, "00", is omitted because it is periodic (it consists of two repetitions of the substring "0"); the second omitted string, "10", is aperiodic but is not minimal in its permutation class as it can be cyclically permuted to the smaller string "01".
The empty string also meets the definition of a Lyndon word of length zero. The numbers of binary Lyndon words of each length, starting with length zero, form the integer sequence
1, 2, 1, 2, 3, 6, 9, 18, 30, 56, 99, 186, 335, ...
Lyndon words correspond to aperiodic necklace class representatives and can thus be counted with Moreau's necklace-counting function.
Generation
provides an efficient algorithm for listing the Lyndon words of length at most with a given alphabet size in lexicographic order. If is one of the words in the sequence, then the next word after can be found by the following steps:
Repeat the symbols from to form a new word of length exactly , where
|
https://en.wikipedia.org/wiki/Deutsch%20limit
|
The Deutsch limit is an aphorism about the information density of visual programming languages originated by L. Peter Deutsch that states:
The problem with visual programming is that you can’t have more than 50 visual primitives on the screen at the same time.
The term was made up by Fred Lakin, after Deutsch made the following comment at a talk on visual programming by Scott Kim and Warren Robinett: "Well, this is all fine and well, but the problem with visual programming languages is that you can't have more than 50 visual primitives on the screen at the same time. How are you going to write an operating system?"
The primitives in a visual language are the separate graphical elements used to build a program, and having more of them available at the same time allows the programmer to read more information. This limit is sometimes cited as an example of the advantage of textual over visual languages, pointing out the greater information density of text, and posing a difficulty in scaling the language.
However, criticisms of the limit include that it is not clear whether a similar limit also exists in textual programming languages; and that the limit could be overcome by applying modularity to visual programming as is commonly done in textual programming.
See also
Cognitive dimensions of notations
Conway's law
References
External links
Parsons and Cranshaw commentary on Deutsch Limit in "Patterns of Visual Programming"
Baeza-Yates's commentary on Visual Programming
Computer programming
Adages
Computer programming folklore
Software engineering folklore
Programming principles
Visual programming languages
|
https://en.wikipedia.org/wiki/India%20Today%20%28TV%20channel%29
|
India Today (formerly Headlines Today) is a 24-hour English language television news channel based in Noida, Uttar Pradesh that carries news, current affairs and business programming in India. The channel is owned by TV Today Network Ltd, which is a part of Living Media.
History
The channel was launched in 2003 as a sister channel of the Hindi Aaj Tak news channel. It is one of the four news channels from the TV Today Network stable, the others being Aaj Tak, Tez and Delhi Aaj Tak. Alok Verma was brought in as the Executive Producer to successfully launch TV Today group's foray into the English news channel category. It aired and produced the animated political cartoon "So Sorry": each episode satirizes recent events in the news featuring extremely dramatized versions of said events and hyper-caricaturized versions of political figures including Narendra Modi, Xi Jinping and Joe Biden. Media watchers flagged the channel for unethical use of footage in September 2015 and sexist content.
In October 2020, India Today named in FIR filed by Mumbai police in Fake TRP Ratings Scandal. India Today was fined Rupees 5 Lakh, for Viewership Manipulation, by BARC. India Today admitted to being fined for viewership malpractice. Bombay High Court directs TV Today Network to Pay 5 lakh fine imposed by BARC
Associated journalists
Rahul Kanwal - Executive Director
Rajdeep Sardesai - Consulting Editor
Gaurav C Sawant - Executive Editor
Shiv Aroor - Consulting Editor
Anchors include Preeti Choudhry, Shiv Aroor, Gaurav Sawant, Chaiti Narula , Nabila Jamal, Akshita Nandagopal
Awards
India Today and its brother channel Aaj Tak has won numerous awards over the years at the Indian Television Academy (ITA) Awards, and the Exchange4media News Broadcasting (ENBA) Awards.
See also
India Today
References
External links
Television channels and stations established in 2003
24-hour television news channels in India
India Today Group
English-language television stations in India
Mass media in Delhi
Mass media in Uttar Pradesh
Television stations in New Delhi
Television channels based in Noida
Television stations in Uttar Pradesh
hi:इण्डिया टुडे (टीवी चैनल)
|
https://en.wikipedia.org/wiki/Transfer%20learning
|
Transfer learning (TL) is a technique in machine learning (ML) in which knowledge learned from a task is re-used in order to boost performance on a related task. For example, for image classification, knowledge gained while learning to recognize cars could be applied when trying to recognize trucks. This topic is related to the psychological literature on transfer of learning, although practical ties between the two fields are limited. Reusing/transferring information from previously learned tasks to new tasks has the potential to significantly improve learning efficiency.
History
In 1976, Bozinovski and Fulgosi published a paper addressing transfer learning in neural network training. The paper gives a mathematical and geometrical model of the topic. In 1981, a report considered the application of transfer learning to a dataset of images representing letters of computer terminals, experimentally demonstrating positive and negative transfer learning.
In 1993, Pratt formulated the discriminability-based transfer (DBT) algorithm.
In 1997, Pratt and Thrun guest-edited a special issue of Machine Learning devoted to transfer learning, and by 1998, the field had advanced to include multi-task learning, along with more formal theoretical foundations. Learning to Learn, edited by Thrun and Pratt, is a 1998 review of the subject.
Transfer learning has been applied in cognitive science. Pratt guest-edited an issue of Connection Science on reuse of neural networks through transfer in 1996.
Ng said in his NIPS 2016 tutorial that TL would become the next driver of machine learning commercial success after supervised learning.
In the 2020 paper, "Rethinking Pre-Training and self-training", Zoph et al. reported that pre-training can hurt accuracy, and advocate self-training instead.
Applications
Algorithms are available for transfer learning in Markov logic networks and Bayesian networks. Transfer learning has been applied to cancer subtype discovery, building utilization, general game playing, text classification, digit recognition, medical imaging and spam filtering.
In 2020 it was discovered that, due to their similar physical natures, transfer learning is possible between electromyographic (EMG) signals from the muscles and classifying the behaviors of electroencephalographic (EEG) brainwaves, from the gesture recognition domain to the mental state recognition domain. It was noted that this relationship worked in both directions, showing that electroencephalographic can likewise be used to classify EMG. The experiments noted that the accuracy of neural networks and convolutional neural networks were improved through transfer learning both prior to any learning (compared to standard random weight distribution) and at the end of the learning process (asymptote). That is, results are improved by exposure to another domain. Moreover, the end-user of a pre-trained model can change the structure of fully-connected layers to improve performance.
Softwar
|
https://en.wikipedia.org/wiki/History%20of%20Microsoft%20Flight%20Simulator
|
Microsoft Flight Simulator began as a set of articles on computer graphics, written by Bruce Artwick throughout 1976, about flight simulation using 3-D graphics. When the editor of the magazine told Artwick that subscribers were interested in purchasing such a program, Artwick founded Sublogic Corporation to commercialize his ideas. At first the new company sold flight simulators through mail order, but that changed in January 1979 with the release of Flight Simulator (FS) for the Apple II. They soon followed this up with versions for other systems and from there it evolved into a long-running series of computer flight simulators.
Sublogic flight simulators
First generation (Apple II and TRS-80)
− January 1979 for Apple II
− January 1980 for TRS-80
Second generation (Tandy Color Computer 3, Apple II, Commodore 64, and Atari 8-bit)
− December 1983 for Apple II
− June 1984 for Commodore 64
− October 1984 for Atari 8-bit family
− Sometime in 1987 for CoCo 3
Third generation (Amiga, Atari ST, and Macintosh)
− March 1986 for Apple Macintosh
− November 1986 for Amiga and Atari ST
In 1984, Amiga Corporation asked Artwick to port Flight Simulator for its forthcoming computer, but Commodore's purchase of Amiga temporarily ended the relationship. Sublogic instead finished a Macintosh version, released by Microsoft, then resumed work on the Amiga and Atari ST versions.
Although still called Flight Simulator II, the Amiga and Atari ST versions compare favorably with Microsoft Flight Simulator 3.0. Notable features included a windowing system allowing multiple simultaneous 3d views - including exterior views of the aircraft itself - and (on the Amiga and Atari ST) modem play.
Info gave the Amiga version five out of five, describing it as the "finest incarnation". Praising the "superb" graphics, the magazine advised to "BEGIN your game collection with this one!"
Microsoft Flight Simulator
Flight Simulator 1.0
− Released in November 1982
Flight Simulator 2.0
− Released in 1984
In 1984, Microsoft released their version 2 for IBM PCs. This version made small improvements to the original version, including the graphics and a more precise simulation in general. It added joystick and mouse input, as well as support for RGB monitors (4-color CGA graphics), the IBM PCjr, and (in later versions) Hercules graphics, and LCD displays for laptops. The new simulator expanded the scenery coverage to include a model of the entire United States, although the airports were limited to the same areas as in Flight Simulator 1.
Over the next year or two, compatibility with Sublogic Scenery Disks was provided, gradually covering the whole U.S. (including Hawaii), Japan, and part of Europe.
Flight Simulator 3.0
− Released in mid-1988
Microsoft Flight Simulator 3 improved the flight experience by adding additional aircraft and airports to the simulated area found in Flight Simulator 2, as well as improved high-res (EGA) graphics, and other features lifted from the Am
|
https://en.wikipedia.org/wiki/Dark%20Illustrated
|
Digital Artists of a Rare Kind, later known as Dark Illustrated, or simply Dark was an underground computer artscene group that primarily released ANSI, ASCII, and high resolution artwork from 1994 to 1999. Though the organization did not operate as long as ACiD, iCE, or CiA, Dark was a very influential and critically successful group. Dark was especially popular with Canadian ANSI artists, who made up a large portion of the member base.
Releases
Dark's monthly artpacks, referred to as "collections", were organized a bit differently than other artscene groups. While the naming scheme for the collections was the common "month/year" format (i.e. for Dark Collection 02/95, or February 1995), Dark titled the digital artwork files themselves in a unique manner.
Dark chose not to follow the traditional "two character" artist abbreviation format, where the first two characters of an 8.3 filename are reserved for artist initials, followed by a dash, then a five character title. Instead the first five characters were reserved for the artist's name, followed by a dash, then a two digit number representing how many pieces the artist had released for the year. In addition, Dark, not unlike artscene groups such as Cia and iCE, used a shortened version of their group name as the file suffix for ANSI files. In this case, became .
Dark was also the only artscene group to release annual "best of" compilations.
Collections
Dark Collection #01 (first collection)
Dark Collection #44 Disk A (final collection)
Dark Collection #44 Disk B
Dark Collection #44 Disk C
Annual "Best of" Compilations
Dark Best of 1994
Dark Best of 1995
Dark Best of 1996
Dark Best of 1997
Dark Best of 1998
External links
Dark Domain The ACiD Artpacks Archive on DVD (), contains all available Dark Collections.
darkillustrated.org Dark Illustrated's home on the internet. Very outdated. (offline)
Dark Illustrated Legacy: A Decadent Recollection. (offline)
1994 establishments in Canada
Artscene groups
1999 disestablishments in Canada
|
https://en.wikipedia.org/wiki/Star%20Saga
|
Star Saga is a series of video games which combine a computerized game arbiter with a game board and books of printed text. The games blend aspects of paper gamebooks with role-playing video games. They were released for MS-DOS and the Apple II.
Games
Star Saga: One - Beyond The Boundary, released in 1988, was the first in a short-lived series of science fiction adventure/role-playing games by Masterplay Publishing.
The second title, Star Saga: Two - The Clathran Menace was the sequel, released in 1989.
Although Star Saga was to be released as a trilogy, Masterplay went out of business before the third game was released, leaving only Star Saga: One - Beyond the Boundary and Star Saga: Two - The Clathran Menace.
Description
As well as the computer software (which acts as a "game master" or moderator for the game), Star Saga ships with a large color fold-out map, six colored tokens that players use to move around the map, and thirteen booklets containing a total of 888 numbered passages of text. Due to the high volume of text, the oversized game box weighs in at over 3 pounds. The second title expands the number of booklets to fourteen, with over 50,000 individual paragraphs.
At the beginning of the game, up to six players choose which character to play as from six sealed character profiles. Both single and multiplayer hotseat options are available, with players interacting both directly (e.g., by trading goods) and indirectly with one another over the course of the game. Each character has a different background story and motivating goals, and players are encouraged to keep these secret from each other. All players begin with a non-upgraded starship which can move between points on the galactic map.
When playing Star Saga, each player physically plots his or her moves on the map, then enters these movements and other desired actions into the Star Saga computer program. In response to the entered commands, the program determines the results, updates the character's statistics and inventory, and directs the player to read one or more text passages from the accompanying booklets. Upon reading the section(s), the player discovers the consequences of his or her actions, as well as any new information which has been gleaned. In some cases, the actual results of a turn will be quite different from those planned, due to events such as interception by hostile forces. Although the large amount of reading slows gameplay, the text is broken out into multiple booklets so that players can (usually) be simultaneously reading from separate sources. Over a number of turns, each player slowly progresses through the game, discovering what lies at each unlabeled planet on the map and otherwise uncovering the mysteries of the galaxy.
The game master software, while lacking any sort of graphical display, is nonetheless relatively advanced for the time period. The software carefully maintains the game state, keeping players honest and preventing them from atte
|
https://en.wikipedia.org/wiki/Major%20Churches%20Network
|
The Major Churches Network, founded in 1991 as the Greater Churches Network, is a group of Church of England parish churches defined as having exceptional significance, being physically very large (over 1000m2 footprint), listed as Grade I, II* (or exceptionally II), open to visitors daily, having a role or roles beyond those of a typical parish church, and making a considerable civic, cultural, and economic contribution to their community.
These buildings are often former monastic properties which became parish churches after the English Reformation, or civic parish churches built at a time of great wealth.
the Church of England designates 312 churches as Major Parish Churches, which are thus eligible to join the Major Churches Network.
Greater Churches Network
The Greater Churches Network was founded in 1991 as a self-help organisation within the Church of England. It aimed to provide help and mutual support to its member churches in dealing with the special problems of running a "cathedral-like" church with the organisation and financial structure of a parish church. The group met every two years in conference to share ideas. These Greater Churches were defined as "non-cathedral churches which, by virtue of their great age, size, historical, architectural, or ecclesiastical importance, display many of the characteristics of a cathedral", and those which " fulfil a role which is additional to that of a normal parish church". At its disbanding in 2019 there were 55 churches within the Greater Churches Network.
Refounding
In May 2019, a meeting of the Greater Churches Network took a decision to rename the group as the Major Churches Network, and to adopt a new constitution. The Greater Churches Network was therefore formally closed, and the new Major Churches Network was formed, and its inaugural general meeting took place.
The change was made in response to a study commissioned into Major Parish Churches under the auspices of the Church Buildings Council, the official body with overall responsibility for the Church of England parish churches and chapels, together with Historic England and the National Lottery Heritage Fund. This resulted in the appointment of a Cathedrals and Major Churches Officer within the CBC, and the identification of around 300 churches in England which met certain agreed criteria. These define a Major Parish Church as having exceptional significance, being physically very large (over 1000m2 footprint), listed as Grade I, II* (or exceptionally II), open to visitors daily, having a role or roles beyond those of a typical parish church, and making a considerable civic, cultural, and economic contribution to their community. All churches recognised as Major Churches by the CBC are eligible to join the Major Churches Network.
Several of these buildings are former monastic properties that were converted to parish church use after the English Reformation; others are large parish churches built at a time of great wealth.
|
https://en.wikipedia.org/wiki/OpenAjax%20Alliance
|
The OpenAjax Alliance is an industry group dedicated to the set of technologies and web programming techniques known as Ajax.
Membership in the OpenAjax Alliance consists of vendors, open source projects, and companies that utilize Ajax in their web technologies. The organization was established by Ajax companies and open source projects to address issues that require collaboration among the various organizations involved in creating and using Ajax products and technologies. The alliance does not collect dues or maintain a staff, so all of its activities are the result of voluntary contributions from its 100+ member organizations.
The organization's target audience is web developers and IT professionals who want to utilize Ajax technologies to create web applications with interactive user interfaces.
The alliance's technical focus is on achieving interoperability across different Ajax products and technologies. Interoperability allows customers to integrate Ajax technologies from various providers.
The OpenAjax Alliance engages in educational and communication initiatives, such as posting web pages and white papers on its website, maintaining a wiki, email lists, and issuing press releases.
History and Termination of Formal Operations
In late 2005, under the leadership of IBM, companies came together to discuss how to ensure that Ajax reaches its full potential as the industry standard application platform based on open technologies. These initial discussions led to the announcement of the "OpenAjax Initiative" on Feb. 1, 2006, with participation from 15 original companies including BEA, Borland, the Dojo Foundation, Eclipse Foundation, Google, IBM, Laszlo Systems, Mozilla Corporation, Novell, Openwave Systems, Oracle, Red Hat, Yahoo, Zend, and Zimbra.
Between February 1 and May 15, 2006, an additional 15 organizations joined "OpenAjax", and the group of 30 companies held a two-day kickoff meeting in San Francisco to establish their plans. During the meeting, the decision was made to form the OpenAjax Alliance, define its mission, agree on an interim organizational process, and establish its activities.
The participating companies then developed a governance model through a Members Agreement and began executing their marketing/educational and technical initiatives. The alliance's website and white paper were launched in September 2006. In October 2006, the alliance elected its first Steering Committee. By December 2006, the alliance released its first technical product, the OpenAjax Hub, with a draft specification and reference open-source implementation. The OpenAjax Hub integrated a dozen Ajax toolkits on a trial basis as part of the alliance's initial OpenAjax InteropFest.
As of May 2008, the organization had over 100 member organizations, including major companies such as IBM, Microsoft, Google, Adobe, and Sun, as well as Ajax suppliers like the Dojo Foundation, Laszlo Systems, Nexaweb, Tibco, Zimbra, and a few individual members.
I
|
https://en.wikipedia.org/wiki/Dumfries%20railway%20station
|
Dumfries railway station serves the town of Dumfries in Dumfries and Galloway, Scotland. It is located on the Glasgow South Western Line. The station is owned by Network Rail and managed by ScotRail who provide all passenger train services. It is staffed on a part-time basis throughout the week.
History
Opened by the Glasgow, Dumfries and Carlisle Railway in 1848, the line serving it was extended northwards to Kilmarnock and Glasgow two years later (the GD&CR became part of the Glasgow and South Western Railway at the same time). It subsequently became the junction for branches to Castle Douglas and Stranraer (opened between 1859 and 1861), (opened in 1863 and taken over in 1865 by the Caledonian Railway) and latterly to Moniaive (Cairn Valley Railway, opened in 1905). All of these later lines have now closed (the Port Road to Stranraer being the last to go in June 1965), leaving only the original G&SWR main line open to serve the town. The Beeching Axe cutting the Castle Douglas and Dumfries Railway and Portpatrick and Wigtownshire Railway has resulted in adverse mileage to connect Stranraer with a longer line via Kilmarnock and Ayr. The journey by railway and ferry via Stranraer to Larne Harbour or since the line closed to the Port of Belfast is much longer.
Historic Scotland have designated the station and separately the adjacent station hotel as category B listed buildings.
Carnation built an evaporated milk factory in Dumfries that opened in 1935, eventually constructing three units producing tin cans, evaporated milk and latterly Coffeemate. The original factory had private siding access to the station's goods yard, which gave access for milk trains to the facility, in both delivering raw product as well as distribution to London. Milk trains stopped in the mid-1970s. The United States parent company was bought by Nestle in 1985, after which a decline in the facility began. CoffeeMate production ceased in 2000, after which the site was fully redeveloped as an industrial estate.
Future
In 2023 it was confirmed that step-free access to both platforms would be added.
In fiction
The station features in the novel The Thirty-Nine Steps (1915) by John Buchan. Richard Hannay, fleeing from German secret agents, travels from London St Pancras to Galloway, changing trains at Dumfries. In 1939, T.S. Eliot included Dumfries in his Old Possum's Book of Practical Cats. Skimbleshanks, the Railway Cat, speaks with the police at Dumfries Station during the night.
Services
ScotRail
The service from the station is somewhat infrequent with trains running to different patterns during the day, these are as follows:
On Monday to Saturdays, There is a regular hourly service southbound to/from Carlisle with extra trains running at peak times, There is 9 trains per day northbound to Kilmarnock and Glasgow which run every 2 hours. On Sundays, There is a 2 hourly service southbound to Carlisle(5 in total) but a very limited service of 2 trains per day north
|
https://en.wikipedia.org/wiki/WTVK%20%28TV%29
|
WTVK (channel 59) is a television station licensed to Oswego, Illinois, United States, serving the Chicago television market and primarily airing paid programming from Corner Store TV. Owned by Venture Technologies Group, it is a sister station to WRME-LD (channel 33). WTVK's transmitter is located in Deer Park Township near Starved Rock State Park (in LaSalle County).
Due to WTVK's VHF signal and transmitter location, the station only provides rimshot coverage of Chicago's western and southwestern suburbs, but its broadcast range extends into parts of the Peoria–Bloomington, Rockford and Quad Cities markets. To address the shortfall in coverage in Chicago, WTVK is simulcast on translator WCHU-LD in Oakwood Hills. The station also operates a digital replacement translator on UHF channel 18, licensed to Pekin (with transmitter on High Point Lane near East Peoria).
History
Originally licensed to Peoria as WAOE, the station signed on the air on July 5, 1999 as a UPN affiliate and aired an analog signal on UHF channel 59. Its studios were located on Fulton Street in downtown Peoria. In its early months, the station broadcast at a low power; WAOE's signal would be upgraded in early 2000, allowing AT&T Cable to add the station to its lineup on February 22. Before WAOE's launch, then-ABC affiliate WHOI (channel 19) had a secondary affiliation with UPN.
On January 24, 2006, The WB and UPN announced the two networks would end broadcasting and merge to form The CW. On February 22, News Corporation announced it would start up another new network called MyNetworkTV. It was made public on March 15 that WAOE would become the market's MyNetworkTV outlet. Meanwhile, cable-only WB affiliate WBPE (operated by WHOI) became the area's CW station. In order to offer non-cable viewers access to The CW, WHOI added a new second digital subchannel to simulcast the new network. WAOE would officially join MyNetworkTV on September 5 while WHOI-DT2 started offering The CW 13 days later on the 18th.
On December 1, 2008, the station shut down its analog signal on UHF channel 59 and became digital-exclusive.
Until the end of 2014, WAOE was operated through a joint sales agreement by Granite Broadcasting, then-owner of NBC affiliate WEEK-TV (channel 25). It shared facilities with that station and WHOI (which was operated by WEEK-TV through a separate joint sales and shared services agreement). The Springfield Road studios of WEEK-TV and WHOI once handled some internal operations (such as the maintenance of programming logs) of another Four Seasons Broadcasting station, WBQD-LP (now WQAD-DT3); however, that station was actually controlled through a local marketing agreement with the Quad Cities' ABC affiliate WQAD-TV (owned at the time by Local TV; now owned by Tegna Inc.), and most of its operations were run from WQAD's studios in Moline. Quincy Newspapers announced on February 11, 2014 that it would acquire WEEK-TV from Granite Broadcasting. Quincy planned on continuing to
|
https://en.wikipedia.org/wiki/Science%20and%20Development%20Network
|
SciDev.Net is a not-for-profit organisation that produces news, views and analysis about science and technology in the context of global development. It primarily engages with development professionals, policymakers, researchers, the media and the informed public.
The organisation was founded in 2001 in response to the significant gap in scientific knowledge between rich and poor countries and with the understanding that “those who stand to benefit the most from modern science and technology are also those with the least access to information about it". SciDev.Net seeks to redress this imbalance via its free-to-access website, regional networks and specialist workshops.
SciDev.Net aims to help individuals and organisations apply evidence and insights from science and technology to decision-making in order to have a positive impact on equitable and sustainable development and poverty reduction.
The global edition is based in London and there are six regional desks based in Latin America & Caribbean (Spanish), Middle East and North and West Africa (Arabic), South Asia, South-East Asia & Pacific, Sub-Saharan Africa (English and French).
SciDev.Net is a company limited by guarantee and a registered charity in England and Wales (registered charity number 1089590).
Website
The SciDev.Net website is made up of a global and six regional editions. SciDev.Net publishes in four languages: English, Spanish, French and Arabic. Content includes: News, Analysis, Multimedia, Practical Guides, Learning Series reports, Opinions editorials, Spotlights and Data Visualisations.
News: SciDev.Net's news coverage is at the heart of its website and articles are added daily. Freelance journalists throughout the developing world write much of this material and work closely with a team of editors to ensure timely and accurate coverage of breaking news.
Analysis blogs: SciDev.Net analysis blogs focus on vulnerable or marginalised groups who tend to be neglected in mainstream development journalism. They aim to bridge the gap between science and development and provide an analysis of how each can inform the other. SciDev.Net analysis blogs include:
Focus on Gender
Focus on Disability
Focus on Migration Focus on Poverty
Focus on Private Sector
View on Disability
View on Gender
View on Migration
View on Private sector
View on Poverty
Opinions: SciDev.Net opinion pieces are exclusive contributions from the world’s leading experts in science and international development. SciDev.Net has published exclusive contributions from figures such as Calestous Juma, Paul Boateng, Mark Lynas, Gordon Conway and Mariéme Jamme.
Multimedia: SciDev.Net produces original multimedia content such as videos, podcasts, photo essays, image galleries and audio-video slideshows.
Practical guides: Written by experts in their field, practical guides help readers strengthen and learn new skills. These guides:
Provide expert advice for journalists to sharpen their skills and improve t
|
https://en.wikipedia.org/wiki/Firewall%20pinhole
|
In computer networking, a firewall pinhole is a port that is not protected by a firewall to allow a particular application to gain access to a service on a host in the network protected by the firewall.
Leaving ports open in firewall configurations exposes the protected system to potentially malicious abuse. A fully closed firewall prevents applications from accessing services on the other side of the firewall. For protection, the mechanism for opening a pinhole in the firewall should implement user validation and authorization.
For firewalls performing a network address translation (NAT) function, the mapping between the external {IP address, port} socket and the internal {IP address, port} socket is often called a pinhole.
Pinholes can be created manually or programmatically. They can be temporary, created dynamically for a specific duration such as for a dynamic connection, or permanent, such as for signaling functions.
Firewalls sometimes automatically close pinholes after a period of time (typically a few minutes) to minimize the security exposure. Applications that require a pinhole to be kept open often need to generate artificial traffic through the pinhole in order to cause the firewall to restart its timer.
See also
Port forwarding
Port triggering
NAT hole punching
NAT traversal
TCP hole punching
UDP hole punching
ICMP hole punching
Port Control Protocol (PCP)
NAT Port Mapping Protocol (NAT-PMP)
Internet Gateway Device Protocol (UPnP IGD)
Computer network security
|
https://en.wikipedia.org/wiki/WAVM
|
WAVM (91.7 FM) is a high school radio station broadcasting from Maynard High School in Maynard, Massachusetts. Station programming provides the local area with news and church service broadcasts among other types of programming. Founded in 1973, WAVM has aided the careers of several of the school's successful alumni.
Controversy
Long-time faculty administrator and station founder, teacher Joseph Magno, was arrested and charged with sexual assault in January 2006. Magno died in January 2007 of an apparent heart attack, just before his trial could begin.
FCC licensing of frequency 91.7
For several years WAVM petitioned the Federal Communications Commission to increase the power of its signal from 10 watts to 500 watts. Per FCC regulations, and a tentative decision, the station's frequency had become available for bidding from other broadcasting companies, one of those companies being Living Proof Inc., a Christian broadcasting network headquartered in California that distributes programming to its affiliates via satellite, with minimal local programming.
Another interested party was University of Massachusetts Boston, operator of the WUMB network of radio stations. WAVM entered into an agreement with WUMB to jointly own the frequency and their partnership had appealed the FCC's decision.
Congressional Representative Marty Meehan and Senators John Kerry and Ted Kennedy have all contributed their support to WAVM in the form of letters to the FCC, and the station's plight had attracted national attention.
Eventually, The FCC reached a decision involving all parties, having asked them to come to an agreement. WAVM has increased power from 10 to 500 watts and maintains its partnership with WUMB under a share-time agreement. WUMB's license for 91.7 was assigned the call sign WUMG. Both stations will use the same transmitter facilities located behind Maynard High School, however each will have their own license. Living Proof Inc. of California assigned their permit for 91.7 to Horizon Christian Fellowship on June 30, 2010. Their competing application, while still on 91.7, employs a very directional transmitting antenna to protect the signal from WAVM & WUMG's. The competing station, WTYN, signed in January 2012
Telethon
Every year WAVM hosts a telethon which donates money to those in need in the areas getting the Beacon newspaper. Taking place over one weekend in December, this is a 40-hour event, meaning that there are students working every hour of the night and day. There are normally six- seven telethon hosts, who stay up for the full forty hours.
Tech crew: The tech crew in the Beacon Santa Telethon are hand selected by captains and the administration in WAVM. The tech crew is a group of highly trained individuals who coordinate the technical setup of the telethon, often getting more in-depth and intricate with the inner workings in the studio and auditorium. The group consists of 20-30 members varying on the year and is led by Trained Capt
|
https://en.wikipedia.org/wiki/Buddhist%20Peace%20Fellowship
|
The Buddhist Peace Fellowship (BPF) is a nonsectarian international network of engaged Buddhists participating in various forms of non-violent social activism and environmentalism. The non-profit BPF is an affiliate of the international Fellowship of Reconciliation working toward global disarmament and peace, helping individuals suffering under governmental tyranny in places such as Burma, Bangladesh, Tibet and Vietnam. Headquartered in Oakland, California, BPF was incorporated in 1978 in Hawaii by Robert Baker Aitken, his wife Anne Hopkins Aitken, Nelson Foster, Ryo Imamura and others. Shortly after other notable individuals joined, including Gary Snyder, Alfred Bloom, Joanna Macy, and Jack Kornfield. Generally speaking, the BPF has a tendency to approach social issues from a left-wing perspective and, while the fellowship is nonsectarian, the majority of its members are practitioners of Zen Buddhism.
BPF is led by Interim Director Sarwang Parikh and a national board of five individuals.
About
The Buddhist Peace Fellowship is a grassroots movement established in 1978 by Robert Baker Aitken and Anne Hopkins Aitken, along with Nelson Foster and others, on the front porch of their Maui Zendo in Hawaii. Sitting around a table, the assembled group discussed nuclear weapons and militarism within the United States in the years following the Vietnam War, finding that these issues must be addressed with compassion from a Buddhist perspective in order to bring about peace. Original members were centered primarily in Hawaii or the San Francisco Bay Area, and by 1979 the group had roughly fifty members. To stay connected, the group formulated a newsletter spearheaded by Nelson Foster which evolved into Turning Wheel—the quarterly magazine published by the BPF. Today, Turning Wheel Media is an online home for activists and thinkers, writers and readers, a place to bring Buddhist teachings into conversation with the world. By the late 1980s the association had hundreds of members, and the headquarters had moved to office space in Berkeley, California. During this time much of their work was geared toward human rights efforts in areas of the world such as Cambodia, Vietnam and Bangladesh, working particularly hard at freeing Buddhist prisoners of the Unified Buddhist Church of Vietnam. This period in BPF history also was marked by the hiring of a coordinator and the development of national chapters.
BPF went through a turbulent period after longtime executive director Alan Senauke left at the end of 2001. After two executive directors who served less than a year and a period of no clear leadership, board member Maia Duerr was asked to lead the organisation in 2004. During her three-year tenure, the BPF stabilised its finances, and considerable effort were made to bolster its nationwide outreach and include chapters in decision-making processes. Also during this period, Duerr led two "Buddhist Peace Delegations" to Washington, D.C., to call for an end to war
|
https://en.wikipedia.org/wiki/Ken%20Lightner
|
Ken Lightner is a game designer with experience in multiple fields. His primary area of expertise is in computer games.
Career
Ken Lightner is the founder of Holistic Design. He co-designed a tabletop miniatures game with Chris Wiese called Noble Armada (1998), a spaceship combat game compatible with Fading Suns. While Andrew Greenberg was directing video game development, Lightner was head of programming. Lightner created more game lines specifically for d20 System publication, including military adventures set in the modern world such as Afghanistan (2002). Among his more notable successes with Holistic include Battles of Destiny, Hammer of the Gods, Final Liberation, Machiavelli the Prince, Merchant Prince II, Emperor of the Fading Suns, and Mall Tycoon. He also worked heavily on a computer game called Noble Armada that never materialized. He has worked as a third-party developer for very large companies such as Mindscape, Take Two Interactive, Red Storm, MicroProse, and Segasoft. Mall Tycoon was arguably his largest game, which sold extremely well. The Merchant Prince series was highly critically acclaimed.
He was the line developer for their Real-Life Roleplaying series covering d20 Afghanistan, d20 Columbia, d20 Somalia and the d20 FBI. He also contributed heavily towards the flagship rpg product Holistic Design produced Fadings Suns, being the principal author of the military supplement Legions of the Empire. He also worked in conjunction with Chris Wiese to design the miniature based game Carnage and Noble Armada (upon which the aforementioned Computer Game was based). He also contributed fiction to the Book of All Flesh by Eden Studios.
After Holistic's RPG lines shut down production in 2003, Lightner co-founded the computer game company Blue Heat Games. This new company specializes in cell phone games, and some of his credits with them include MLB Baseball 2004, NHL Hockey and Sega Snowboarding. He has also had a short story published in an anthology produced by Eden Studios, Inc.
See also
Merchant Prince (series)
References
External links
Ken Lightner at MobyGames
Official Holistic Design website
Blue Heat Games
Dragon Con Biography
Eden Studios - All Flesh Must be Eaten
Siegecon - Biography
Living people
Role-playing game designers
Video game programmers
Year of birth missing (living people)
|
https://en.wikipedia.org/wiki/Gothenburg%20tram%20network
|
The Gothenburg tramway network () is part of the public transport system organised by Göteborgs Spårvägar, controlled by Västtrafik in the Swedish city of Gothenburg. The system's approximately of single track — making it the largest tram network in Northern Europe — is used by around 200 trams , which serve twelve day-time and five night-time lines with a combined line length of 190 km. These figures are expected to increase when the second stage of Kringen (short for Kollektivringen, the public transport ring) is finished. The trams perform about 2,000 trips and cover 30,000 km per day. In 2018, 131 million journeys were made (with changes counting as a new journey).
History
The first tram line in Gothenburg was started in 1879 by the English company Gothenburg Tramway Ltd. This was a horse-drawn tramway, which stretched from Brunnsparken to Stigbergsliden. The city of Gothenburg bought the tramway in 1900, and introduced electrically powered trams only two years later when Sigfrid Edström led the electrification of the trams. During the next 40 years, the tram system was heavily expanded, reaching outside the city borders by 1907, and Hisingen in 1940.
In the 1960s, plans for converting the tram system to an underground rapid transit system were created, and the new tram sections to the Tynnered, Angered, Bergsjön and Länsmansgården suburbs were built free from level crossings and partly in tunnels to make a future conversion to underground standards easier. However, after further investigation, it was concluded that it would be too expensive to dig the necessary tunnels under the city centre, as the foundation of the city is partially made up of clay.
When Sweden's switch to right-hand traffic in 1967 made existing unidirectional trams obsolete, Gothenburg was one of only two cities in Sweden to maintain its city-centre tramway, the other such network to survive being the Norrköping tramway.
The expansion of the net through the Kringen is gradually and step by step creating a tramway ring around the city centre. In 1999 the first step was started, which most notably included the 1050 m long Chalmers tunnel which was opened for traffic in 2002, connecting the Chalmers station with the Korsvägen hub. The second and third steps are currently in the planning stage.
Since 2010, the previously used magnetic stripe cards have been replaced with RFID cards. Ticket machines taking coins and credit cards have also been installed on the trams, along with a text message system where tickets may be purchased with mobile phones. From about 2019, a phone app has become the leading mode of ticket purchase.
Lines
Most tram lines pass through Brunnsparken, which is effectively the central hub of public transport in Gothenburg. The exceptions are lines 8 and 14. The Central Station is also a major stop, especially because it is the nearest stop not only for train passengers but also passengers coming from the neighbouring Nils Ericson Terminal, where co
|
https://en.wikipedia.org/wiki/First%20Data
|
First Data Corporation is a financial services company headquartered in Atlanta, Georgia, United States. The company's STAR Network provides nationwide domestic debit acceptance at more than 2 million retail POS, ATM, and at online outlets for nearly a third of all U.S. debit cards.
First Data has six million merchants, the largest in the payments industry. The company handles 45% of all US credit and debit transactions, including handling prepaid gift card processing for many US brands such as Starbucks. It processes around 2,800 transactions per second and $2.2 trillion in card transactions annually, with an 80% market share in gas and groceries in 2014. First Data's SpendTrend Report is frequently used by national news networks such as WSJ, USA Today, ESPN, The New York Times, Vox Media, and Bloomberg.
On January 16, 2019, Fiserv announced a deal to acquire First Data in an all-stock deal with equity value of $22 billion. Fiserv completed the acquisition of First Data on Monday, July 29, 2019.
History
In 1969, the Mid-America Bankcard Association (MABA) was formed in Omaha, Nebraska, as a non-profit bankcard processing cooperative. First Data Resources (FDR) was founded in Omaha, Nebraska in June 1971 by Perry "Bill" Esping, along with Mike Liddy and Jack Weekly. It started off by providing processing services to the Mid-America Bankcard Association (MABA). In 1976, First Data became the first processor of Visa and MasterCard bank-issued credit cards. In 1980, American Express Information Services Corporation (ISC) bought 80% of First Data. The remaining 20% was purchased in 5% increments each subsequent year until June 1983. First Data Corporation was incorporated on April 7, 1989.
First Data Corporation was spun off from American Express and went public in 1992. In 1995, the company merged with First Financial Management Corp. (FFMC) and was then organized into three major business units serving card issuers, merchants, and consumers. Western Union became part of First Data as a result of the merger with FFMC.
Expansion
From 2001 through 2005, a period of expansion occurred as First Data acquired companies around the globe and in the US, including, in 2001, the acquisition of PaySys International and their VisionPLUS Payment Software System. VisionPLUS was followed by a $6.6 billion merger with Concord EFS, Inc. in 2004, which added the STAR Network and PIN-based debit acceptance at more than 1.9 million ATM and retail locations. Additional acquisitions and strategic relationships included GovOne, eONEGlobal, Paymap, Inc., and Taxware. Nevertheless, First Data eventually divested, closed down, or absorbed these businesses.
On January 26, 2006, First Data announced its intention to spin off Western Union into an independent publicly traded company through a tax-free spin-off of 100% of Western Union to First Data shareholders. The spin off occurred as planned on September 29, 2006.
On April 2, 2007, it was announced that KKR had enter
|
https://en.wikipedia.org/wiki/ReFLEX
|
ReFLEX is a wireless protocol developed by Motorola, used for two-way paging, messaging, and low-bandwidth data. It is based on the FLEX one-way paging protocol, adding capabilities for multiple forward channels, multiple return channels, and roaming. It originally came in two variants, ReFLEX25 and ReFLEX50. ReFLEX50 was originally developed to support a messaging service launched by MTEL in the mid 1990s, while ReFLEX25 was developed several years later to provide an upgrade path for traditional one-way paging carriers. The 50 and 25 signified 50 kHz and 25kHz channel spacing, although in reality both variants supported flexible channel configurations. The two variants were unified into a single protocol with version 2.7, which was released simply as ReFLEX 2.7. Devices compliant with ReFLEX 2.7 are backwards compatible with both ReFLEX25 and ReFLEX50 networks, with several new features to improve roaming, performance, and interoperability between different networks. ReFLEX systems support forward channel speeds of 1600, 3200, and 6400 bits per second, and return channel speeds of 800, 1600, 6400, and 9600 bits per second. Like FLEX, ReFLEX is synchronous, based on 1.875 second frames and 4-level FSK modulation.
The Motorola PageWriter released in 1996 was one of the first devices to use the ReFLEX network protocol. Although ReFLEX now has limited viability in the commercial market, it is finding new uses in Automatic Meter Reading, public safety, and low cost/bandwidth M2M applications.
See also
DataTAC
Mobitex
Communication Linking Protocol
References
External links
Two Way Paging Article
Article
Skytel ReFLEX Two-Way Paging Service Provider
Mobile technology
Radio paging
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.