source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/1S
1S or 1s may refer to: 1s electron, in an atomic orbital Sabre (computer system)'s IATA code 1S, a series of Toyota S engines SSH 1S (WA); see Washington State Route 502, Washington State Route 503 See also Shilling Second Ones (disambiguation) S1 (disambiguation)
https://en.wikipedia.org/wiki/Unconventional%20computing
Unconventional computing is computing by any of a wide range of new or unusual methods. It is also known as alternative computing. The term unconventional computation was coined by Cristian S. Calude and John Casti and used at the First International Conference on Unconventional Models of Computation in 1998. Background The general theory of computation allows for a variety of models. Computing technology first developed using mechanical systems and then evolved into the use of electronic devices. Other fields of modern physics provide additional avenues for development. Computational model Computational models use computer programs to simulate and study complex systems using an algorithmic or mechanistic approach. They are commonly used to study complex nonlinear systems for which simple analytical solutions are not readily available. Experimentation with the model is done by adjusting parameters in the computer and studying the differences in the outcome. Operation theories of the model can be derived/deduced from these computational experiments. Examples of computational models include weather forecasting models, earth simulator models, flight simulator models, molecular protein folding models, and neural network models. Mechanical computing Historically, mechanical computers were used in industry before the advent of the transistor. Mechanical computers retain some interest today both in research and as analogue computers. Some mechanical computers have a theoretical or didactic relevance, such as billiard-ball computers, while hydraulic ones like the MONIAC or the Water integrator were used effectively. While some are actually simulated, others are not. No attempt is made to build a functioning computer through the mechanical collisions of billiard balls. The domino computer is another theoretically interesting mechanical computing scheme. Analog computing An analog computer is a type of computer that uses analog signals, which are continuous physical quantities, to model and solve problems. These signals can be electrical, mechanical, or hydraulic in nature. Analog computers were widely used in scientific and industrial applications, and were often faster than digital computers at the time. However, they started to become obsolete in the 1950s and 1960s and are now mostly used in specific applications such as aircraft flight simulators and teaching control systems in universities. Examples of analog computing devices include slide rules, nomograms, and complex mechanisms for process control and protective relays. The Antikythera mechanism, a mechanical device that calculates the positions of planets and the Moon, and the planimeter, a mechanical integrator for calculating the area of an arbitrary 2D shape, are also examples of analog computing. Electronic digital computers Most modern computers are electronic computers with the Von Neumann architecture based on digital electronics, with extensive integration made possible fol
https://en.wikipedia.org/wiki/3B
3B or 3-B may refer to: Third baseman Triple (baseball) 3B Computers, a range of computers produced by AT&T during the 1980s 3B Junior, a department of the Japanese entertainment company Stardust Promotion 3B Lab, a Japanese popular music group Three Bs, a designation for three well-known classical composers may refer to: See also B3 (disambiguation)
https://en.wikipedia.org/wiki/Non-silicon%20robot
Non-silicon robots are robotic systems that include no traditional computers, integrated digital or analog solid state devices, or other solid-state electronic devices. The term non-silicon robot is often used to describe a robot that has some autonomous abilities. As a simple example, a non-silicon mobile robot could consist of a platform base with drive wheels and steering system connected to a series of mechanical switches arranged around the exterior of the robot so that when the robot collides with an object the switches are triggered so that it reverses direction. One of the most important areas of non-silicon robotics includes molecular and nano-scale machines. History Any robotic system that was built before the advent of modern electronics could be considered a non-silicon robot. Automation has been a significant component of industry for over 150 years and pre-transistor control systems of the 1930s and 1940s were fairly sophisticated. These control methods are largely forgotten. Such systems use pneumatic, mechanical and electric control systems. With some notable early exceptions (W. Grey Walter), in the modern era, non-silicon robots have been mainly confined to obscure research and purely teleoperated robots and have received relatively little attention. However, this is changing with the development of non-traditional computing technologies such as molecular computing (unconventional computing and non-silicon computing). Journals and conferences International Journal of Unconventional Computing Unconventional Computing From Utopian to Genuine Unconventional Computers -
https://en.wikipedia.org/wiki/Rythme%20FM
Rythme FM is a network of French-language adult contemporary FM radio stations broadcasting in most major markets of Quebec. The network was created and owned by Cogeco. History The brand "Rythme FM" was introduced in January 1999 at CFGL-FM in the Montreal market, and the network was created after Cogeco received new licences in other markets in 2002 and 2003. CFGL-FM is the most-listened to French-language station in North America. The Rythme FM network is in direct competition against Rouge FM; both networks offer a very similar product, with Rouge FM having a marginally hot AC-leaning sound compared to Rythme FM, which leans somewhat more towards oldies/classic hits. On April 30, 2010, Cogeco announced it would purchase Corus Quebec's radio stations. The sale was approved by the CRTC on December 17, 2010; one of the conditions, however, stipulated that Rythme FM outlet CJEC-FM in Quebec City must be sold to another party by December 2011. On November 9, 2011, it was announced that Cogeco would sell CJEC-FM, as well as CFEL-FM, to Leclerc Communication Inc., a company owned by Quebec City businessman Jacques Leclerc, owner of Laura Secord Chocolates and Biscuits Leclerc. Following Leclerc's takeover of CJEC-FM, that station continued to carry Rythme FM's branding and networked programming until May 21, 2012, when it dropped its branding and programming in favour of its own programming, relaunched on June 20, 2012 as WKND 91.9. As Cogeco opted to leave its other stations in Quebec City, CFOM-FM and CJMF-FM, as they are for the short term, it leaves the Quebec City area without a Rythme FM affiliate. On August 16, 2011, CIME-FM in Saint-Jérôme became part of Rythme FM network and added programming from Rythme FM and also adopted imaging and slogan of Rythme FM, but kept its CIME branding. On August 25, 2014, following an agreement with RNC Media, CHLX-FM Gatineau became an affiliate of Rythme FM, adopting its branding, becoming the first non-Cogeco station to affiliate with that network (other than CJEC-FM). This will follow on March 9, 2015 with the rebranding of RNC-owned CHOA-FM in Rouyn-Noranda, expanding the Rythme FM network to the Abitibi-Témiscamingue region; ironically, CHOA-FM was once an affiliate of Rythme FM's competitor, RockDétente (now Rouge FM), before rebranding to Couleur FM in the mid-2000s. On November 26, 2014, it was announced that Attraction Radio stations CKRS-FM (later reassigned CILM-FM) 98.3 and CKGS-FM 105.5 in Saguenay will join the Rythme FM network beginning February 9, 2015; this followed the CRTC's approval to increase the amount of music hours for CKRS. This would bring the Rythme FM affiliate and branding to every major market in Quebec, except Quebec City. On August 22, 2016, CIME-FM, which adopted Rythme FM's logo styling (but not its name) and some of its programming, left the Rythme network and adopted a new slogan: "La Couleur Musicale des Laurentides". The CIME branding would expand to CJLA-FM
https://en.wikipedia.org/wiki/Kaj%20Busch
Kaj (Bushy) Busch is an Australian sports fishing writer and television personality who has appeared in many of Rex Hunt's Fishing Adventure programs on the Seven Network. He is saltwater editor of the Fly Life magazine, a columnist for NSW Fishing monthly, a regular presenter of the ABC Radio's "Gone Fishin" show and a prolific writer, photographer and guest speaker with a high profile throughout Australia and New Zealand. He has also written feature articles and columns for a dozen or more magazines and is the author of a successful book entitled Fishing the Sapphire Coast of NSW. References Australian television presenters Living people Australian radio personalities Australian fishers Australian columnists Year of birth missing (living people)
https://en.wikipedia.org/wiki/Simple%20Kid
Simple Kid, real-name Kieran Macfeely, is an Irish-born solo musical artist. History Simple Kid's approach to recording involved recording to an 8-track cassette player then fed into his computer where he applied more modern techniques to create finished songs. He mixed and mastered the tracks on albums 1 and 2 on his own equipment. His style of remixing and sampling has been compared to Fatboy Slim's, although Simple Kid used his own recordings as sources. More often his sound is compared to the similarly eclectic and deliberately ramshackle Beck. Simple Kid's influences included folk, country (he prominently featured banjos and slide guitar in his work), glam rock (particularly T. Rex) and late 1960s big pop arrangements of records, such as The Beatles's White Album. Before becoming Simple Kid, MacFeely was a member of The Young Offenders. Forming when he was 17, the band was composed of a group of friends from Cork, Ireland. The group attempted to release an album in America but met with failure and broke up. Television appearances included Later... with Jools Holland, Late Night with Conan O'Brien, The Late Late Show and Other Voices on RTÉ. He was also the subject of a Channel 4 (4 Play) short documentary and appeared on TFI Friday with The Young Offenders. His first album was also promoted extensively in the US by DJ Nic Harcourt on KCRW's daily radio program Morning Becomes Eclectic. His second album, 2, was released by Country Gentleman Recordings in October 2006 in the UK, and by Yep Roc Records in August 2007 in the U.S. 2 was included in Mojo Magazine'''s top 50 albums of the year, was CD of the week in The Times culture section and had positive reviews in the NME, The Guardian, Time Out and the Independent on Sunday. Rolling Stone also featured Simple Kid as a breakthrough act for 2007. The track "Lil' King Kong" from two was featured in a Saturn automobile advertisement in the US, as well as in an advertisement in the UK for the mobile phone operator Orange. "Lil' King Kong" also featured in the film, Jumper in 2008. In early 2011, it was announced on the artist's official website that there would be no further music nor tours by Simple Kid. Despite this announcement, a new Simple Kid single, The Road, appeared for sale in Spring 2012. An unreleased track "Snakes and Ladders" is archived on BBC Sounds it was recorded in 2013 for BBCs Radio 4 series "Forever Young" and details the trials and tribulations of balancing professional musicianship with the prospect of raising a family. The song is a duet with his pregnant wife; "Put your hand on my belly, I think we're getting ready for a family home". Kieran Macfeely lives in Hastings and works at college level in music education at Bexhill Academy. In December 2018 Simple Kid started to release new music again. Song titles include Lost in Space (The Forgotten Man), The End Of America, I Think We're Gonna Be Good Friends, Nobel Prize, The Only Child, If You Could Talk to Yo
https://en.wikipedia.org/wiki/Corus%20Qu%C3%A9bec
Corus Québec, until May 2005 Radiomédia, was a French-language Canadian news/talk radio network serving most of Quebec. The network and most of its affiliates were owned by Toronto-based Corus Entertainment. Stations The network had four co-flagships: CFOM-FM 102.9 in Quebec City for Souvenirs Garantis Classic hits programming CHMP-FM 98.5 in Montreal (officially licensed to Longueuil) for talk programming CKAC 730 AM in Montreal for sports talk CINF 690 AM Montreal for all-news radio Other stations included: CFEL-FM 102.1 in Lévis CIME-FM 103.9 in Saint-Jérôme CJRC-FM 104.7 in Gatineau CHLT-FM 107.7 in Sherbrooke CHLN-FM 106.9 in Trois-Rivières On February 5, 2009, it was announced that these four stations would introduce a classic hits music format similar to the one currently used at CFOM-FM 102.9 in Quebec City, effective March 28. However, according to the Canadian Radio-television and Telecommunications Commission (CRTC) website, Corus intends to continue to operate those stations under a news/talk format for CRTC regulatory purposes, as the new music programming will air only from 10 a.m. to 4 p.m. weekdays and 9 a.m. to 6 p.m. on weekends. Stations not owned and operated by Corus Entertainment can also be affiliates, such as CKRS-FM 98.3 in Saguenay, CFYX-FM 93.3 in Rimouski, CHNC-FM 107.1 in New Carlisle and CFGT-FM 104.5 in Alma. CHRC 800 AM in Quebec City was previously part of the Corus Québec network, but the station was sold in 2008 by Corus to a group of local businessmen; it no longer has any links with Corus. CKRS-FM was sold in November 2010 to a local group, Radio Saguenay; it is unknown if any Corus Québec programming still airs on that station. Creation of Radiomédia The Radiomédia network was created to succeed to the now-defunct Télémédia and Radiomutuel networks, which merged on September 30, 1994. This merger resulted in six AM stations closing in Quebec on that very same day at 6 p.m. (Eastern Daylight Time), and is referred to in Quebec radio circles as "le vendredi noir" ("Black Friday"). The six AM stations closed were : CJMS 1280 AM in Montreal (Radiomutuel) CJRP 1060 AM in Quebec City (Radiomutuel) CKCH 970 AM in Gatineau (Télémédia) CJRS 1510 AM in Sherbrooke (Radiomutuel) CJTR 1140 AM in Trois-Rivières (Radiomutuel) CJMT 1420 AM in Chicoutimi (Télémédia) In each case, the station with the best signal remained open and the other one was closed. While in most markets the station that remained open was also both the oldest and the more successful according to recent BBM ratings, this was not the case everywhere—CJTR in Trois-Rivières had recently surpassed CHLN in ratings for the first time in many years, and CKCH in Gatineau (opened in 1933) had much more of a history than CJRC, which opened only in 1968. The Radiomédia network, along with CKAC in Montreal and CHRC in Quebec City, were now owned in equal shares by Telemedia and Radiomutuel. Telemedia retained full ownership of CHLT in Sherbrooke and CHL
https://en.wikipedia.org/wiki/Steve%20Starling
Steve (Starlo) Starling is an Australian sports fishing writer and television personality who has appeared in many of Rex Hunt's Fishing Adventure programs on the Seven Network. He has published twenty books on the subject of angling, as well as thousands of magazine articles. Starlo has scripted and presented many instructional videos and DVDs, and been a Researcher and on-screen presenter for a number of Australian angling and outdoor television programs. Starlo is also an occasional guest on various radio angling chat shows and a regular on ABC Radio's "Big Fish". External links Steve Starling Home Page 1959 births Living people Australian television presenters Australian radio personalities Australian fishers
https://en.wikipedia.org/wiki/KMSS-TV
KMSS-TV (channel 33) is a television station in Shreveport, Louisiana, United States, affiliated with the Fox network. It is owned by Mission Broadcasting, which maintains a shared services agreement (SSA) with Nexstar Media Group, owner of Texarkana, Texas–licensed NBC affiliate KTAL-TV (channel 6) and MyNetworkTV affiliate KSHV-TV (channel 45), for the provision of certain services. The stations share studios on North Market Street and Deer Park Road in northeast Shreveport, while KMSS-TV's transmitter is located southeast of Mooringsport. History Early history The UHF channel 33 allocation was contested between seven groups that competed for approval by the Federal Communications Commission (FCC) to be the holder of the construction permit to build and license to operate a new television station on the first commercial UHF allocation to be assigned to Shreveport. The initial application to broadcast over the frequency was filed on June 12, 1982, when Poughkeepsie, New York-based Great Central Communications (owned by brothers and radio station owners Saul Dresner and Alfred Dresner, in partnership with minority owner Milton Aninger) applied with the FCC to obtain the construction permit and license. Washington, D.C.-based Media South Broadcasting Corp. (a subsidiary of Multi Media Communications and owned by Raymond A. Goudreau, Martin E. Firestone and John A. Fergie) filed a separate license application for channel 33 three weeks later on July 6. Five additional prospective applicants filed for the channel 33 permit on September 9: Minden-based Drew & Kemmerly (a five-person partnership led by majority owners Jean T. Drew and David Kemmerly, who were the only applicants seeking to license the allocation to nearby Bossier City), Shreveport-based Godfrey & Associates (a family-led group owned by Glynn Godfrey, Patricia Godfrey and Kirk Godfrey, whose brother, Wesley Godfrey, was minority owner of radio station KDKS-FM [102.1, now licensed to nearby Blanchard] in Benton), Pacoima, California-based Seattle Community TV Network Inc. (owned by Rosa Ware and Titilola Payne), Cleveland, Tennessee-based Shreveport Metro Communications 33 Ltd. (owned by Farrell B. Jones and Evelyn S. Lane), and Atlanta-based Shreveport TV Co. (owned by James H. Thornton and Ramon Diaz). On December 7, 1984, administrative law judge Byron E. Harrison – who oversaw the dispute over the UHF channel 33 construction permit – granted a motion for resolving disqualifying issues levied against Media South Communications as well as a joint settlement agreement request and applications dismissals by Shreveport Metro Communications 33 Ltd, Godfrey & Associates, and Shreveport Television Co. with prejudice. The decision also granted a merger between Great Southern TV Broadcasting (owned by Joseph D. Waggoner and Grey Teekell, whose separate application as existed prior to the merger was dismissed with prejudice) and Media South Broadcasting, whose amended application for chann
https://en.wikipedia.org/wiki/FFT%20%28disambiguation%29
A fast Fourier transform is a numerical algorithm used in signal processing. FFT may also refer to: Games Final Fantasy Tactics, a video game A Fistful of TOWs, a miniatures wargame Fédération Française de Tarot, the French tarot federation Sport Fédération Française de Tennis, the French Tennis Federation Firefighters Upsala CK, a Swedish cycling team Football Federation Tasmania, a football organisation in Australia Four Four Two (4-4-2), a football formation FourFourTwo, a football magazine FourFourTwo (TV series), an Asian football TV series 4-4-2, a band formed to record the song "Come on England" for the England football team for the Euro 2004 championship Tajikistan Football Federation (Tajik: ) Science and technology 2,1-fructan:2,1-fructan 1-fructosyltransferase Faculty of Food Technology, Latvia University of Agriculture Final-Form Text, part of IBM's Document Control Architecture Future Fibre Technologies, an Australian fibre optic company Faecal (or fecal) flotation test, a method used in veterinary parasitology to detect helminth eggs in faecal samples United States aviation Frontier Airlines Capital City Airport (Kentucky) Other uses See also Finite Fourier transform (disambiguation)
https://en.wikipedia.org/wiki/KSHV-TV
KSHV-TV (channel 45) is a television station in Shreveport, Louisiana, United States, affiliated with MyNetworkTV. It is owned by Nexstar Media Group alongside Texarkana, Texas–licensed NBC affiliate KTAL-TV (channel 6); Nexstar also provides certain services to Fox affiliate KMSS-TV (channel 33) under a shared services agreement (SSA) with Mission Broadcasting. The stations share studios on North Market Street and Deer Park Road in northeast Shreveport, while KSHV-TV's transmitter is located southeast of Mooringsport. History Early history The UHF channel 45 allocation in Shreveport was contested between three groups that competed for the Federal Communications Commission (FCC)'s approval of a construction permit to build and license to operate a new television station. Word of Life Ministries Inc. – a non-stock arm of the Word of Life Center, a nondenominational church on West 70th Street/Meriwether Road (near LA 3132) in southwestern Shreveport that was managed by founding church co-pastor Sam Carr – filed the initial application on October 29, 1986. On September 3, 1987, Word of Life Ministries reached a settlement agreement with the second applicant for the license, Media Communications, Inc., which agreed to dismiss its license application. Three months later on December 9, an application by the third applicant for UHF channel 45, Shreveport-based Godfrey & Associates, was dismissed with prejudice by Joseph Chachkin, the administrative law judge appointed in its dispute over the construction permit with Word of Life, for failure to prosecute; this resulted in the FCC granting the permit to Word of Life. The station signed on the air on April 15, 1994, as KWLB (for "Word of Life Broadcasting"). operating as an independent station. It mostly aired religious programs, family-oriented shows and cartoons. In March 1995, Lafayette-based White Knight Broadcasting (owned by media executive Sheldon Galloway) purchased the station from Word of Life Ministries for $3.8 million; the sale received FCC approval on May 9, 1995. After switching from its religious programming, the station added general entertainment programming in June 1995. On August 1, 1995, Lafayette-based Associated Broadcasters Inc. (later renamed Communications Corporation of America) – which had purchased KMSS-TV in March 1994 – entered into a joint sales and shared services agreements with White Knight, under which Associated/KMSS would provide programming, advertising and other administrative services for channel 45. The station – which had changed its callsign to KSHV (in reference to its city of license, Shreveport) on July 26 (and added the -TV suffix on June 29, 2009) – subsequently relocated its operations from the Word of Life Center into KMSS's original studio facilities on Jewella Avenue (between Claiborne Avenue and Ninock Street) in western Shreveport. (The KWLB call letters are currently used by a radio station on 93.1 FM in Red Oak, Oklahoma.) Both KSHV and KMSS po
https://en.wikipedia.org/wiki/Business%20intelligence%20software
Business intelligence software is a type of application software designed to retrieve, analyze, transform and report data for business intelligence. The applications generally read data that has been previously stored, often - though not necessarily - in a data warehouse or data mart. History Development of business intelligence software The first comprehensive business intelligence systems were developed by IBM and Siebel (currently acquired by Oracle) in the period between 1970 and 1990. At the same time, small developer teams were emerging with attractive ideas, and pushing out some of the products companies still use nowadays. In 1988, specialists and vendors organized a Multiway Data Analysis Consortium in Rome, where they considered making data management and analytics more efficient, and foremost available to smaller and financially restricted businesses. By 2000, there were many professional reporting systems and analytic programs, some owned by top performing software producers in the United States of America. Cloud-hosted business intelligence software In the years after 2000, business intelligence software producers became interested in producing universally applicable BI systems which don’t require expensive installation, and could hence be considered by smaller and midmarket businesses which could not afford on premise maintenance. These aspirations emerged in parallel with the cloud hosting trend, which is how most vendors came to develop independent systems with unrestricted access to information. From 2006 onwards, the positive effects of cloud-stored information and data management transformed itself to a completely mobile-affectioned one, mostly to the benefit of decentralized and remote teams looking to tweak data or gain full visibility over it out of office. As a response to the large success of fully optimized uni-browser versions, vendors have recently begun releasing mobile-specific product applications for both Android and iOS users. Cloud-hosted data analytics made it possible for companies to categorize and process large volumes of data, which is how we can currently speak of unlimited visualization, and intelligent decision making. Types The key general categories of business intelligence applications are: Spreadsheets Reporting and querying software: applications that extract, sort, summarize, and present selected data Online analytical processing (OLAP) Digital dashboards Data mining Business activity monitoring Data warehouse Local information systems Data cleansing Except for spreadsheets, these tools are provided as standalone applications, suites of applications, components of Enterprise resource planning systems, application programming interfaces or as components of software targeted to a specific industry. The tools are sometimes packaged into data warehouse appliances. Open source free products Apache Hive, hosted by the Apache Software Foundation BIRT Project, by the Eclipse Foundation
https://en.wikipedia.org/wiki/KNMT
KNMT (channel 24) is a religious television station in Portland, Oregon, United States, owned and operated by the Trinity Broadcasting Network (TBN). The station's transmitter is located in the Sylvan-Highlands section of the city, near the West Hills of Portland. KNMT's studios, once located on Northeast 74th Avenue in Portland, were sold to a developer to become low income housing. History KNMT was founded on June 7, 1985, and began broadcasting operations on November 16, 1989; it was Portland's first full-power, full-service religious broadcast station. The station primarily carries programming from the TBN satellite feed, but also produces and broadcasts locally produced programs such as the religious program Northwest Praise the Lord (a local version of TBN's flagship program Praise the Lord) and the public affairs show Northwest Focus. The station was formerly owned by National Minority Television (hence its call letters), a de facto subsidiary of TBN that was used by the network to circumvent the Federal Communications Commission (FCC)'s television station ownership restrictions. While TBN founder Paul Crouch was NMTV's president, one of its directors was African American and the other was Latino, which met the FCC's definition of a "minority-controlled" firm. In mid-2008, the station and its NMTV sisters came directly under TBN ownership. As of 2019, only KNMT-DT1 and the satellite feed of Enlace are carried by Comcast locally. Subchannels The station's digital signal remained on its pre-transition UHF channel 45 (although it was originally slated to move its digital signal to UHF channel 24), using PSIP to display the station's virtual channel as its former UHF analog channel 24. References External links Trinity Broadcasting Network affiliates Television channels and stations established in 1989 NMT 1989 establishments in Oregon
https://en.wikipedia.org/wiki/Biomodeling
Biomodeling may refer to: Mathematical Biology - the scientific discipline of building advanced mathematical models of biochemical systems thanks to advances in computer power and quantitative methods. Biomedical modeling - the process of building complex 3D models of body parts through a computer imaging process which allows for perfectly shaped acrylic or titanium inserts to be constructed to replace broken bones or other body parts. BioModels Database - an online database of annotated open biological models, written in Systems Biology Markup Language (SBML)
https://en.wikipedia.org/wiki/Biocybernetics
Biocybernetics is the application of cybernetics to biological science disciplines such as neurology and multicellular systems. Biocybernetics plays a major role in systems biology, seeking to integrate different levels of information to understand how biological systems function. The field of cybernetics itself has origins in biological disciplines such as neurophysiology. Biocybernetics is an abstract science and is a fundamental part of theoretical biology, based upon the principles of systemics. Biocybernetics is a psychological study that aims to understand how the human body functions as a biological system and performs complex mental functions like thought processing, motion, and maintaining homeostasis.(PsychologyDictionary.org)Within this field, many distinct qualities allow for different distinctions  within the cybernetic groups such as humans and insects such as beehives and ants. Humans work together but they also have individual thoughts that allow them to act on their own, while worker bees follow the commands of the queen bee.  (Seeley, 1989). Although humans often work together, they can also separate from the group and think for themselves.(Gackenbach, J. 2007) A unique example of this within the human sector of biocybernetics would be in society during the colonization period, when Great Britain established their colonies in North America and Australia. Many of the traits and qualities of the mother country were inherited by the colonies, as well as niche qualities that were unique to them based on their areas like language and personality—similar vines and grasses, where the parent plant produces offshoots, spreading from the core.  Once the shoots grow their roots and get separated from the mother plant, they will survive independently and be considered their plant. Society is more closely related to plants than to animals since, like plants, there is no distinct separation between parent and offspring. The branching of society is more similar to plant reproduction than to animal reproduction. Humans are a k- selected species that typically have fewer offspring that they nurture for longer periods than r -selected species. It could be argued that when Britain created colonies in regions like North America and Australia, these colonies, once they became independent, should be seen as offspring of British society. Like all children, the colonies inherited many characteristics, such as language, customs and technologies, from their parents, but still developed their own personality. This form of reproduction is most similar to the type of vegetative reproduction used by many plants, such as vines and grasses, where the parent plant produces offshoots, spreading ever further from the core. When such a shoot, once it has produced its own roots, gets separated from the mother plant, it will survive independently and define a new plant. Thus, the growth of society is more like that of plants than like that of the higher animals that
https://en.wikipedia.org/wiki/Camp%20Ramah
Camp Ramah () is a network of Jewish summer camps affiliated with the Conservative Movement. The camps operate in the United States, Canada, and Israel. All Ramah camps serve kosher food and are Shabbat-observant. History During the 1940s, the Jewish Theological Seminary established Camp Ramah as a tool for furthering Jewish education. The founders, including Rabbi Ralph Simon of Chicago, envisioned an informal camp setting where Jewish youth would reconnect with the synagogue and Jewish tradition, and a new cadre of American-born Jewish leadership could be cultivated. The founders of Ramah camps were inspired by Camp Massad and Camp Cejwin. The first camp opened in Conover, Wisconsin in 1947. The program was drawn up by Moshe Davis and Sylvia Ettenberg of the JTS Teachers' Institute. In October 2007, Ettenberg was awarded Pras Ramah (the Ramah Prize) as part of Ramah's 60th anniversary celebrations. Many of the early staff were ex-Camp Massad people and JTS students. In 1950, the second Ramah camp opened in the Poconos and in 1953, the third Ramah camp opened in Connecticut (this camp was later moved to Massachusetts). In addition to typical summer camp activities, Ramah camps offer an educational program focusing on Judaism, Zionism, and Hebrew-language instruction on different levels. Camp Ramah offers sleep-away camps with an option to stay for either two, four, or eight weeks, day camps with busing, an Israel summer tour program for teenagers, a day camp in Jerusalem for American and Israeli children, and a variety of high school programs in Israel. In addition to its university-aged American counselors, specialists and educators, the staff of each camp is joined by a corps of emissaries from Israel known as the "mishlachat/מישלחת". Educational impact A Trinity College researcher, Ariella Keysar, documented a significant impact of Ramah on college students: She found that Ramah graduates were three times more likely to date only Jews, four times more likely to attend synagogue services, and three times as likely as the general Jewish population to spend significant time in Israel. According to the Jewish Agency for Israel, Camp Ramah "is not just a camp, it’s a lifestyle." Among North American olim, one finds communities of former Americans who attended Camp Ramah and reconnected later in life. Many spiritual leaders, social justice advocates, educators, and community board members in North America trace their strong Jewish values and commitment to Judaism to their summers at Ramah. An educational initiative by Camp Ramah produced Siddur Lev Yisrael, one of the only Conservative siddurim without an English translation. This is done in support of Ramah's educational mission to emphasize and spread the use of Hebrew. Overnight camps Camp Ramah in the Berkshires Camp Ramah in the Berkshires (Wingdale, New York) is located on Lake Ellis, 90 minutes north of New York City by car. It opened in 1964 and serves the metropolitan New York
https://en.wikipedia.org/wiki/CFGQ-FM
CFGQ-FM (107.3 FM, QR Calgary) is a radio station in Calgary, Alberta. Owned by Corus Entertainment, it simulcasts the news/talk programming of AM sister station CHQR (AM 770). CFGQ's studios are located on 17th Ave SW near Westbrook Mall, while its transmitter is located at 85th Street Southwest and Old Banff Coach Road in western Calgary. As of Winter 2020, CFGQ is the 7th-most-listened-to radio station in the Calgary market according to a PPM data report released by Numeris. History The station was launched on April 15, 1982, as CKIK-FM, and first broadcast an adult album rock format. Throughout the 1980s and much of the 1990s, CKIK (known on-air as 107 KIK FM and later as Rock 107) played a variety of rock formats. Early in its history, the station encountered financial difficulties, which were alleviated in 1985, when Harvey Glatt, Ottawa music impresario and founder of CHEZ-FM, acquired a 75% interest in the station, which he held until 1995. In September 1997, CKIK flipped to CHR/Top 40 as Power 107. In January 2002, it flipped to hot adult contemporary as The Peak 107.3. In 2004, the station returned to a rock format as classic rock as Q107, after which it adopted its current call letters. In 2007, Terry DiMonte, formerly associated with CHOM-FM in Montreal, joined CFGQ as its morning host. In December 2011, Terry DiMonte left CFGQ, returning to CHOM in Montreal. In August 2019, the station replaced its morning show with Willy in the Morning from sister station CFMI-FM. On December 16, 2022, it was reported that CFGQ would launch a new format on January 9, 2023, with CFGQ's remaining local personalities (including afternoon hosts "Tarzan Dan" Freeman and Cam Sullivan) announcing the end of their respective shows. On January 9, 2023, the station flipped to news/talk as an FM simulcast of CHQR, with both stations collectively rebranded as "QR Calgary". That spring, following inquiries by the Canadian Radio-television and Telecommunications Commission (CRTC) regarding whether the simulcast complies with broadcasting regulations, Corus filed a set of applications with the CRTC to formalize the simulcast by re-designating CFGQ as the originating station of the news/talk format under a specialty FM licence, revoking CHQR's AM licence, and repurposing the current CHQR facility as an AM rebroadcaster of CFGQ. Rebroadcasters CFGQ also has an FM transmitter in Banff (CFGQ-FM-2), which broadcasts at 100.1 MHz with an effective radiated power of 92 watts. Previous logo References External links QR Calgary CFGQ-FM history - Canadian Communications Foundation Fgq Fgq Fgq Radio stations established in 1982 1982 establishments in Alberta
https://en.wikipedia.org/wiki/Oracle%20RAC
In database computing, Oracle Real Application Clusters (RAC) — an option for the Oracle Database software produced by Oracle Corporation and introduced in 2001 with Oracle9i — provides software for clustering and high availability in Oracle database environments. Oracle Corporation includes RAC with the Enterprise Edition, provided the nodes are clustered using Oracle Clusterware. Functionality Oracle RAC allows multiple computers to run Oracle RDBMS software simultaneously while accessing a single database, thus providing clustering. In a non-RAC Oracle database, a single instance accesses a single database. The database consists of a collection of data files, control files, and redo logs located on disk. The instance comprises the collection of Oracle-related memory and background processes that run on a computer system. In an Oracle RAC environment, 2 or more instances concurrently access a single database. This allows an application or user to connect to either computer and have access to a single coordinated set of data. The instances are connected with each other through an "Interconnect" which enables all the instances to be in sync in accessing the data. Aims The main aim of Oracle RAC is to implement a clustered database to provide performance, scalability and resilience & high availability of data at instance level. Implementation Oracle RAC depends on the infrastructure component Oracle Clusterware to coordinate multiple servers and their sharing of data storage. The FAN (Fast Application Notification) technology detects down-states. RAC administrators can use the srvctl tool to manage RAC configurations, Cache Fusion Prior to Oracle 9, network-clustered Oracle databases used a storage device as the data-transfer medium (meaning that one node would write a data block to disk and another node would read that data from the same disk), which had the inherent disadvantage of lackluster performance. Oracle 9i addressed this issue: RAC uses a dedicated network connection for communications internal to the cluster. Since all computers/instances in a RAC access the same database, the overall system must guarantee the coordination of data changes on different computers such that whenever a computer queries data, it receives the current version — even if another computer recently modified that data. Oracle RAC refers to this functionality as Cache Fusion. Cache Fusion involves the ability of Oracle RAC to "fuse" the in-memory data cached physically separately on each computer into a single, global cache. Networking The Oracle Grid Naming Service (GNS) handles name resolution in the cluster registry. Diagnostics The Trace File Analyzer (TFA) aids in collecting RAC diagnostic data. Versions Oracle Real Application Clusters 12c Release 1 Enterprise Edition. Oracle Real Application Clusters One Node (RAC One Node) applies RAC to single-node installations running Oracle Database 11g Release 2 Enterprise Edition. Evolution Relative t
https://en.wikipedia.org/wiki/Middlemore%20railway%20station
Middlemore railway station is on the Southern Line and Eastern Line of the Auckland railway network in New Zealand. The station has side platforms on the northbound and southbound lines connected by a pedestrian level crossing at the south end of the platforms. Access to the station is via Hospital Road: it is next to Middlemore Hospital. Upgrade In September 2007, Counties Manukau District Health Board, ARTNL and ARTA opened a new railway footbridge and staff walkway at the station. The footbridge provides safer access to Middlemore Hospital from the staff carpark. Services Auckland One Rail, on behalf of Auckland Transport, operates suburban services to Britomart, Manukau, Papakura and Pukekohe via Middlemore. The typical weekday off-peak timetable is: 6 tph to Britomart, consisting of: 3 tph via Glen Innes (Eastern Line) 3 tph via Penrose and Newmarket (Southern Line) 3 tph to Manukau 3 tph to Papakura Bus routes 314 and 321 serve Middlemore Station. See also List of Auckland railway stations References Rail transport in Auckland Railway stations in New Zealand Railway stations in New Zealand opened in the 1940s
https://en.wikipedia.org/wiki/Puhinui%20railway%20station
Puhinui railway station is a station of the Auckland rail network and is located in Papatoetoe, Auckland, New Zealand. Passenger services on the Eastern Line and Southern Line use the station. It is accessed from Puhinui Road from both sides of the tracks via a pedestrian bridge located at the site of a former level crossing (Puhinui Road itself now crosses on a bridge approximately 120m north of the pedestrian bridge). This is the nearest public transport access to the main cemetery for South Auckland; Manukau cemetery at 361 Puhinui Road, Wiri. South of this station, Eastern Line and Southern Line services diverge, the Eastern onto the Manukau Branch which terminates at Manukau. The Southern continues south via Homai toward Papakura. History The station was opened on 29 June 1925 for passengers. Goods services closed on 12 May 1958. Originally, the name Cambria was suggested for the railway station. Services Auckland One Rail, on behalf of Auckland Transport, operates suburban services to Britomart, Manukau, Papakura and Pukekohe via Puhinui. The typical weekday off-peak timetable is: 6 trains per hour (tph) to Britomart, consisting of: 3 tph via Glen Innes (Eastern Line) 3 tph via Penrose and Newmarket (Southern Line) 3 tph to Manukau 3 tph to Papakura Puhinui Station is served by bus route AirportLink. Bus-rail interchange An eastward line from the airport to Botany Downs has also been proposed with a new interchange at Puhinui railway station, planned to be built in two stages, the first of which is said to be an early deliverable component of the Airport to Botany rapid transit line. The redeveloped $69 million Puhinui Station interchange had a public open day on 24 July 2021, with train services resuming on 26 July 2021. This encompasses a new at-grade bus/rail interchange and enhanced station. Buses will still use the existing local road (Bridge Street) to cross the railway line to/from Manukau, along with local traffic. The second phase provides a rapid transit overbridge across the railway line to provide a more direct and bespoke rapid transit connection. The new rapid transit link will integrate with the new interchange station on the overbridge. The first stage is estimated to cost $59 million to construct. The line will also go through Manukau railway station before ending in Botany. See also List of Auckland railway stations References Rail transport in Auckland Railway stations in New Zealand Buildings and structures in Auckland Railway stations opened in 1925 1925 establishments in New Zealand Ōtara-Papatoetoe Local Board Area Railway stations in New Zealand opened in the 1920s Railway stations in New Zealand opened in the 2020s
https://en.wikipedia.org/wiki/Herman%20Lukoff
Herman Lukoff (May 2, 1923 – September 24, 1979) was a computer pioneer and fellow of the IEEE. Formative years Lukoff was born in Philadelphia, Pennsylvania to Aaron and Anna (Slemovitz) Lukoff. He graduated from the Moore School of Electrical Engineering at the University of Pennsylvania in 1943. While at the Moore School, he helped to develop the ENIAC and EDVAC computers. Lukoff subsequently followed ENIAC co-inventors J. Presper Eckert and John W. Mauchly to their newly formed Electronic Control Company, which became Eckert-Mauchly Computer Corporation, and then became part of Remington Rand in 1950 and Sperry Corporation in 1955. He also assisted Eckert and Mauchly with the development of the UNIVAC computer and was chief engineer of the UNIVAC LARC from 1955 to 1961. He stayed with the company until his death. Death and interment Lukoff died of leukemia on September 24, 1979, at Bryn Mawr Hospital in Bryn Mawr, Pennsylvania. At the time of his death, he lived in Fort Washington. Interred at Shalom Memorial Park in Huntingdon Valley, Pennsylvania, he was survived by his wife, Shirley Rosner Lukoff; his three sons, Arthur, Barry, and Andrew; and his daughter, Carol. Publications Lukoff's memoir, From Dits to Bits, details his experiences as a first-hand observer of the birth of the computer industry. References Further reading https://archives.upenn.edu/collections/finding-aid/upt50l694 http://doi.ieeecomputersociety.org/10.1109/MAHC.1980.10030 http://www.smartcomputing.com/editorial/dictionary/detail.asp?guid=&searchtype=1&DicID=17591&RefType=Encyclopedia People in information technology Scientists from Philadelphia 1923 births 1979 deaths University of Pennsylvania School of Engineering and Applied Science alumni American computer scientists Deaths from cancer in Pennsylvania
https://en.wikipedia.org/wiki/Plua
Plua is a port of the programming language Lua 5.0.3, along with a small IDE, for the Palm Computing platform. Lua is a programming language designed at TeCGraf, the Computer Graphics Technology Group of PUC-Rio, Brazil. Plua includes some extensions to Lua to better support the Palm platform. Development has ceased on Plua, and the latest stable version of Plua 2.0 can only be downloaded from a discussion board. The prior version, Plua 1.1, is a port of Lua 4.0. The extensions differ somewhat between versions. The new version is thus sometimes called Plua 2 to avoid confusion. Language resources Plua has some special functions, or extensions, to support the Palm platform, including: Graphical user interface (GUI) components, defined by position: buttons, checkboxes, etc. Direct plotting of graphics based on vertex information: lines, circles, etc. Can work with streams, databases or computer files on memory cards. Supports communication via infrared and serial ports. Rudimentary sprite engine. Sample code, Plua 1 The compiler and interpreter is approximately 150 KB, and the compiled helloworldApp.prc shown below is approximately 2 KB. The classic hello world program (in the old version) can be written as follows: -- HelloWorld.lua ptitle("Hello World") print ("Hello, world!") pevent() This text will be saved as a normal memo in the Palm, and executed by tapping the "Run" button in the IDE. Alternatively, the program can be compiled into a PRC (Palm OS Program File, which is executable on any Palm Platform, provided that the runtime program is present) from the same IDE. A breakdown of the program: Line #1: The double dashes define the above line as a comment. All Plua memo files must be defined as such before it can be run or compiled in Plua. Line #2: Defines the title at the top of the page. Line #3: Prints the message "Hello, world!" onscreen under the title bar. Line #4: The above command pauses the execution of the programs and waits for any interaction from the user. These include button taps, character input, or the push of a hard button. Sample code, Plua 2 The equivalent program with the new extensions can be written as follows: -- HelloWorld.lua gui.title 'Hello world' print 'Hello world!' gui.event(ioPending) A breakdown of the program: The first line comment is the same as before, but the rest is a little different. Line #2: The gui.title function defines the title at the top of the page. Parentheses are optional for a Lua function call with a single string argument (and also for a single table constructor). String literals may be either single-quoted or double-quoted. Line #3: Prints the message "Hello, world!" onscreen under the title bar. If the optional parentheses and double quotes had been used (and they could have been), this line would be identical to the first version. Line #4: The above command pauses the execution of the programs and waits for any interaction from the user. The a
https://en.wikipedia.org/wiki/Wing%20Commander%20II%3A%20Vengeance%20of%20the%20Kilrathi
Wing Commander II: Vengeance of the Kilrathi is the first sequel in Chris Roberts' Wing Commander science fiction space combat simulator franchise of computer games, produced by Origin Systems. Released in 1991, Wing Commander II retains much of the first game's core conventions: an interstellar war between the Terran Confederation and the felinoid warrior race called the Kilrathi, multiple allies as wingmen, and a wide variety of ships on both sides of the war. However, WCII places a greater emphasis on storytelling, providing various sprite-animated cutscenes and some of the industry's first examples of voice acting. The storyline is also somewhat less open-ended: the game's campaign tree is much more structured and the player character can no longer be promoted or awarded medals. Wingmen can no longer be killed during normal gameplay; when their fighters are damaged beyond repair, they eject (though some die in scripted sequences). Finally, because the story is a direct sequel to WC, many Kilrathi ships have names similar to the WC ships they replace (for instance, the "Sartha" replaces the "Salthi", and the Confederation uses an upgraded version of the Rapier medium fighter). Expansion packs Special Operations 1 and 2, were released in 1991 and 1992, respectively, and a stand-alone spin-off, Wing Commander Academy, in 1993. Origin also released a Speech Accessory Pack, which upgraded WCII with pre-recorded voice acting. A port for the SNES by Fujisankei Communications International was announced for May 1995, but never released. A Sega Genesis version was also planned but never released. Gameplay Gameplay of Wing Commander II is similar to the first Wing Commander game: a space flight simulation game, with the player piloting a ship, completing missions, and engaging enemy ships of various capabilities. There will generally be an AI-controlled wingman which the player can give orders to. The graphics, audio, and AI were improved for Wing Commander II, along with new ships and weapons, and animated cut-scenes featured voice acting. Like the first Wing Commander, missions will generally include multiple objectives. But the mission tree is much more structured and less open-ended: the game can proceed even if the objectives in the "winning" path are failed as long as the protagonist survives, but the player must successfully complete the missions in the "losing" path for the game to continue. Also, the player character can no longer be promoted or awarded medals. Wingmen can also no longer be killed during normal gameplay, and they eject when their fighters are damaged beyond repair (although some do die in some of the scripted cut-scenes). Plot Wing Commander II The year is 2655. The TCS Tiger's Claw, pride of the Terran Confederation's fleet, is on campaign in the Enigma sector, near the Kilrathi sector headquarters, the K'tithrak Mang starbase. In a sudden attack, it is lost with all hands, save a few pilots who had been transferr
https://en.wikipedia.org/wiki/GTV%20%28Indonesian%20TV%20network%29
PT Global Informasi Bermutu, operating as GTV, which is an initialism derived from its previous name, Global TV, is an Indonesian free-to-air television network. It was launched on 8 October 2002. Originally a music television channel as MTV broadcaster in Indonesia and Asia, GTV shifted its focus to general entertainment programming targeting young adults. Currently the network airs news, soap opera, reality and game shows, along with Nickelodeon animation series and anime making up its programming schedule. It is owned by Media Nusantara Citra (MNC), which also owns RCTI, MNCTV and iNews. History Global TV was originally established on 22 March 1999 by joint-venture of formerly government-backed Islamic association ICMI and The International Islamic Forum for Science, Technology and Human Resource (IIFTIHAR) under the name Global IIFTIHAR Broadcasting and company name PT Global Investasi Bermutu. The network was intended for Islamic dawah, as well as education, technology, news, sports and human development programming - it would become the first Islamic-oriented of its kind in Indonesia (the first Islamic-oriented television station later hold by Bandung-based local station MQTV in 2006). Global TV obtained a broadcast license on 25 October 1999 on Habibie administration. Bimantara Citra acquired Global TV ownership with its subsidiary PT Panca Andika Mandiri (then renamed to MNC Media) as new owner in 2001 and changed the company's name to PT Global Informasi Bermutu and thus replacing SCTV as RCTI's new sister network. Global TV began trial broadcast on 8 October 2001 in Jakarta. During trial broadcast, Global TV aired many foreign music video with Dewi Rezer, the music video shown on Global TV during trial broadcast such as Kylie Minogue "In Your Eyes", Creed "My Sacrifice", OutKast "Ms. Jackson" and Brandy "What About Us?". On 7 March 2002, Global TV and MTV Asia began partnership to broadcasting MTV Indonesia, after previously aired on ANteve was stopped due to financial crisis. MTV officially started on Global TV from 1 April 2002 with programs such as MTV Land, MTV Most Wanted, MTV Alternative Nation, MTV WOW, MTV Classic, MTV Asia Hitlist and MTV Ampuh, during that, Global TV use TVG name on their logo with grey color (later blue and green color added on 1 June 2002). On 1 May 2002, MTV officially launched on Global TV while still trial broadcast. Global TV expanded broadcasts into 5 cities (Bandung, Yogyakarta, Surabaya, Medan and Palembang) in August 2002 with 15 hours transmission programs from 09:00 to 24:00 WIB, on 1 October 2002, the block was expanded into 17 hours transmission programs from 07:00 to 24:00 WIB. On 8 October 2002, Global TV officially launched as music television channel in Indonesia and Asia as a MTV broadcaster with commenced 24-hours around the clock transmission broadcasts with music and programs from Indonesia, Asia and its sister network in United States, it also become the world first free-to-ai
https://en.wikipedia.org/wiki/Milano%20Rogoredo%20railway%20station
Milano Rogoredo is a railway station in Milan, Italy. It is one of the key nodes of the Milan suburban railway service as the southern gate of the Milanese urban network. History Early history The station's location was originally (as of 1891) a junction for the old cargo station of Milano Sempione; it became a cargo station itself in 1908. Its function was to serve as the cargo station for the then-autonomous town of Rogoredo, today included in the city administration as part of Milan's southeastern border with San Donato Milanese. Later, in the late 1950s, it was expanded to a passenger station. This step came when the city of Milan started to grow faster and various factories were established in the area, such as the Montedison chemical facility and the Redaelli steel plant. The station grew proportionally with the industrial development of the area. Recent history A modernization of the station was planned in the 1990s, and some reconstruction of the station was carried out including platform roofing. However, in 1995, work was stopped due to costs exceeding the budgeted funds. In 1999, work restarted to add four tracks to allow integration with the Passante railway and the high-speed line, as well as to complete the platform roofing. The importance of this station has increased with the extension of the Milan suburban railway service to Pavia and Lodi, and the new residential district called Santa Giulia. The station is fully operational. The station includes a stop for the Regionale trains from Parma to the Milano Centrale station, and it became possible in August 2009 to change to the S-lines for connections through the Passante into Central Milan and on to Malpensa Airport at Bovisa. Several of Trenitalia's Frecciarossa trains between Milan and Rome stop in Rogoredo, as well as Italo trains of high-speed competitor Nuovo Trasporto Viaggiatori. Since September 2012 a FrecciaClub has taken the place of the previous waiting room. Train services The station is served by the following service(s): High speed services (Frecciarossa) Turin - Milan - Bologna - Florence - Rome - Naples - Salerno High speed services (Italo) Turin - Milan - Bologna - Florence - Rome - Naples - Salerno High speed services (Italo) Turin - Milan - Bologna - Ancona References External links Opening ceremony for the renewed station in 2008 report Official page on Ferrovie dello Stato website Rogoredo Railway stations in Italy opened in 1861 Milan S Lines stations
https://en.wikipedia.org/wiki/The%20One%20Where%20Everybody%20Finds%20Out
"The One Where Everybody Finds Out" is the fourteenth episode of Friends fifth season. It first aired on the NBC network in the United States on February 11, 1999. In the episode, Phoebe Buffay discovers that Monica Geller and Chandler Bing are secretly dating, and decides to "mess" with them by pretending to flirt with Chandler. Meanwhile, Ross Geller learns that "Ugly Naked Guy" is subletting his apartment and applies for it. The episode ends on a cliffhanger, with Ross witnessing Monica and Chandler having sex through a window, which would be resolved in the next episode. At the 51st Primetime Emmy Awards, it received three nominations for Outstanding Directing for a Comedy Series, Outstanding Writing for a Comedy Series and Outstanding Supporting Actress in a Comedy Series. Plot The gang observes that "Ugly Naked Guy", who lives across the street from them, is moving out. Ross (David Schwimmer), who has lived in Joey (Matt LeBlanc) and Chandler's (Matthew Perry) apartment since his botched wedding with Emily, wonders if he should try to get Ugly Naked Guy's apartment. He, Rachel (Jennifer Aniston) and Phoebe (Lisa Kudrow) visit it, and Ross is enthralled, but while he goes for an application, the girls see Chandler and Monica (Courteney Cox) having sex in Monica's apartment. Though initially shocked, Phoebe calms down after Joey and Rachel reveal the two have been together since hooking up at Ross' wedding. Joey, who has been keeping the secret for several months, is relieved that almost everyone knows. However, Rachel and Phoebe want revenge, and decide to mess with the duo by having Phoebe pretend to be attracted to Chandler. Chandler later informs a skeptical Monica that Phoebe was flirting with him. Upon discovering that Ugly Naked Guy is subletting the apartment himself, Ross attempts to bribe him with a basket of mini-muffins. However, many people have bribed him with extravagant gifts such as a pinball machine and a mountain bike. Ross eventually acquires the apartment after he and Ugly Naked Guy share the mini-muffins whilst nude. Monica overhears Phoebe flirting with Chandler, and realizes he was telling the truth. However, she also realizes that Phoebe knows about their relationship and is just trying to mess with them. They confront Joey, who inadvertently reveals Rachel knows as well. Chandler and Monica decide to turn the tables by having Chandler reciprocate Phoebe's advances; to which Rachel and Phoebe realize what the couple are doing and proceed to up the stakes. The game of chicken between the two culminates with Chandler and Phoebe going on a tense date in Chandler and Joey's apartment while Monica hides in the bathroom and Rachel and Joey eavesdrop in the hallway. After Phoebe and Chandler share an awkward kiss, Chandler finally breaks down and reveals he is in love with Monica. Monica reveals that she is also in love with Chandler, shocking Phoebe who thought they were only in a casual relationship. Joey is relieved t
https://en.wikipedia.org/wiki/Gateway%20address
The gateway address (or default gateway) is a router interface connected to the local network that sends packets out of the local network. The gateway has a physical and a logical address. Logical gateway address The gateway operates at the network layer (Layer 3) of the OSI Model. The gateway is used when transmitting packets. When packets are sent over a network, the destination IP address is examined. If the destination IP is outside of the network, then the packet goes to the gateway for transmission outside of the network. The gateway is on the same network as end devices. The gateway address must have the same subnet mask as host devices. Each host on the network uses the same gateway. The gateway should have a static address, as changing the address would cause packets not to be delivered. The gateway is typically assigned either the highest or lowest network address. This is not a requirement, but many organizations use a consistent addressing scheme to facilitate network planning. Physical gateway address The gateway also operates at the data link layer (Layer 2) of the OSI network model. The physical gateway address is called the media access control(MAC) address or burned in address (BIA). The physical address is assigned when the device is manufactured, and cannot be changed. When a frame is sent to a device not on the local network, the gateway's MAC address is used in the frame header. The gateway address must be configured on each host. The network host IP interface binds the gateway address to the MAC address of the physical gateway by broadcasting IP datagrams and caching the MAC address of the reply from the gateway in an ARP table stored on the host. The gateway address may be added manually. On Windows computers, the gateway address is configured using the TCP/IP Properties. The gateway address can be automatically determined using Dynamic Host Configuration Protocol (DHCP). DHCP allows a host to obtain network information from a server. The host contacts the server to obtain an IP address and Default Gateway address. DHCP Servers are normally provided by Internet Service Providers (ISPs). Bad Gateway (502 error) The Bad Gateway 502 error message is a HTTP status code. This occurs when the server was unable to forward the users request, as all queries are forwarded via gateways on the internet. It could mean that the target server has failed to complete the request. Browser errors can also be the cause of a Bad Gateway. See also ARP spoofing References IP addresses
https://en.wikipedia.org/wiki/Robin%20Brown%20%28journalist%29
Robin Brown is a Canadian radio journalist. Best known as host of the series The Inside Track on CBC Radio One, she was more recently heard as a fill-in host on various programs for the network and its Toronto station CBLA. Brown is currently the producer of Windsor Morning, CBC Radio One's local morning program in Windsor. She is the daughter of Harry Brown, a noted CBC Radio personality in the 1960s and 1970s. She is also a cousin of the morning show host at CBC Radio Thunder Bay, Lisa Laco. References Canadian radio sportscasters Living people Year of birth missing (living people) Canadian talk radio hosts CBC Radio hosts Canadian women radio journalists Canadian women radio hosts
https://en.wikipedia.org/wiki/TUN/TAP
In computer networking, TUN and TAP are kernel virtual network devices. Being network devices supported entirely in software, they differ from ordinary network devices which are backed by physical network adapters. The Universal TUN/TAP Driver originated in 2000 as a merger of the corresponding drivers in Solaris, Linux and BSD. The driver continues to be maintained as part of the Linux and FreeBSD kernels. Design Though both are for tunneling purposes, TUN and TAP can't be used together because they transmit and receive packets at different layers of the network stack. TUN, namely network TUNnel, simulates a network layer device and operates in layer 3 carrying IP packets. TAP, namely network TAP, simulates a link layer device and operates in layer 2 carrying Ethernet frames. TUN is used with routing. TAP can be used to create a user space network bridge. Packets sent by an operating system via a TUN/TAP device are delivered to a user space program which attaches itself to the device. A user space program may also pass packets into a TUN/TAP device. In this case the TUN/TAP device delivers (or "injects") these packets to the operating-system network stack thus emulating their reception from an external source. Applications Virtual private networks OpenVPN, Ethernet/IP over TCP/UDP; encrypted, compressed ZeroTier, Ethernet/IP over TCP/UDP; encrypted, compressed, cryptographic addressing scheme FreeLAN, open-source, free, multi-platform IPv4, IPv6 and peer-to-peer VPN software over UDP/IP. n2n, an open source Layer 2 over Layer 3 VPN application which uses a peer-to-peer architecture for network membership and routing Tinc, Ethernet/IPv4/IPv6 over TCP/UDP; encrypted, compressed VTun, Ethernet/IP/serial/Unix pipe over TCP; encrypted, compressed, traffic-shaping OpenSSH coLinux, Ethernet/IP over TCP/UDP Hamachi OpenConnect WireGuard Tailscale vtun Virtual-machine networking Bochs coLinux Hercules (S/390 emulator) Open vSwitch QEMU/KVM User-mode Linux VirtualBox Connecting real machines with network simulation ns-3 GNU Radio NAT TAYGA, a stateless NAT64 implementation for Linux Platforms Platforms with TUN/TAP drivers include: FreeBSD Linux, starting around version 2.1.60 of the Linux kernel mainline iOS (tun driver only) macOS (native support only for TUN (utun)) NetBSD OpenBSD Android Solaris Windows 2000/XP/Vista/7/8/8.1/10 QNX See also Point-to-point (telecommunications) MacVTap References External links Tun/Tap interface tutorial Linux Networking: MAC VLANs and Virtual Ethernets Internet Protocol based network software Virtual private networks Linux drivers Free system software
https://en.wikipedia.org/wiki/SETI%40home%20beta
SETI@home beta, is a hibernating volunteer computing project using the Berkeley Open Infrastructure for Network Computing (BOINC) platform, as a test environment for future SETI@home projects: AstroPulse is a volunteer computing project searching for primordial black holes, pulsars, and ETI. AstroPulse clients have been tested by this project for nearly 6 years. It is already running on SETI@home, testing new GPU/CPU optimized apps and performing other tasks. SETI Southern Hemisphere Search, which is another SETI@home project that was due to join BOINC. It was expected that this project would use a slightly modified version of the SETI enhanced client, as the Parkes Observatory has a feedhorn with more beams than the Arecibo Observatory. Applications Testing 11 Dec 2008, CUDA applications test 3 Jun 2013, SETI@home v7 test 01 Dec 2015 SETI@home v8 test External links References Science in society Free science software Volunteer computing projects Science software for macOS Science software for Linux Science software for Windows Software that uses wxWidgets
https://en.wikipedia.org/wiki/Biocomputing
Biocomputing may refer to: Biological computing, systems of biologically derived molecules that perform computational processes DNA computing, a form of biological computing that uses DNA Bioinformatics, the application of statistics and computer science to the field of molecular biology
https://en.wikipedia.org/wiki/WC1
WC1 can refer to: Warcraft: Orcs and Humans, the first Warcraft computer game WC1, a postcode district in the WC postcode area for central London Wing Commander (video game), the first Wing Commander video game White Collar-1, a blue light photoreceptor in fungi
https://en.wikipedia.org/wiki/EC2
EC2 or EC-2 may refer to: Amazon Elastic Compute Cloud (EC2), a commercial web service for hosting computer applications Cardoen EC-2 mine, an anti-personnel mine Cessna EC-2, a 1930s aircraft EC2, a district in the London EC postcode area EC2-S-C1, U.S. World War II Liberty ships Escadre de Chasse 2, a flight of the French Air Force's Escadron de Chasse 01-002 "Cigognes" Eurocode 2, an alternative name for European reference norm EN 1992 EC2 or ECII, a musical project produced by Mick Ronson Erg Chech 002, a meteorite EC2, a 2019 mixtape by Coi Leray
https://en.wikipedia.org/wiki/Attribute%20domain
In computing, the attribute domain is the set of values allowed in an attribute. For example: Rooms in hotel (1-300) Age (1-99) Married (yes or no) Nationality (Nepalese, Indian, American, or British) Colors (Red, Yellow, Green) For the relational model it is a requirement that each part of a tuple be atomic. The consequence is that each value in the tuple must be of some basic type, like a string or an integer. For the elementary type to be atomic it cannot be broken into more pieces. Alas, the domain is an elementary type, and attribute domain the domain a given attribute belongs to an abstraction belonging to or characteristic of an entity. For example, in SQL, one can create their own domain for an attribute with the command CREATE DOMAIN SSN_TYPE AS CHAR(9) ; The above command says : "Create a datatype SSN_TYPE that is of character type with size 9 " References Type theory Database theory
https://en.wikipedia.org/wiki/E16
E16, E-16, E.16 or E 16 may refer to: Computing The version 0.16 of the Enlightenment window manager Military Aichi E16A, an Imperial Japanese Navy seaplane which saw service during World War II HMS E16, a United Kingdom Royal Navy submarine which saw service during World War I Transportation European route E16 County Route E16 (California), a county route in El Dorado County, California, United States The FAA location identifier for San Martin Airport in San Martin, California The DRG Class E 16, a German electric locomotive Yokohama–Yokosuka Road, an expressway numbered E16 in Japan Other E16, a postcode district in the E postcode area of London E16 is sometimes used to abbreviate Echovirus 16, the cause of Boston exanthem disease Alien of Extraordinary Ability (EB-1A, officially E11 / E16), a special green card for high achieving immigrants in United States.
https://en.wikipedia.org/wiki/List%20of%20statistical%20software
Statistical software are specialized computer programs for analysis in statistics and econometrics. Open-source ADaMSoft – a generalized statistical software with data mining algorithms and methods for data management ADMB – a software suite for non-linear statistical modeling based on C++ which uses automatic differentiation Chronux – for neurobiological time series data DAP – free replacement for SAS Environment for DeveLoping KDD-Applications Supported by Index-Structures (ELKI) a software framework for developing data mining algorithms in Java Epi Info – statistical software for epidemiology developed by Centers for Disease Control and Prevention (CDC). Apache 2 licensed Fityk – nonlinear regression software (GUI and command line) GNU Octave – programming language very similar to MATLAB with statistical features gretl – gnu regression, econometrics and time-series library intrinsic Noise Analyzer (iNA) – For analyzing intrinsic fluctuations in biochemical systems jamovi – A free software alternative to IBM SPSS Statistics JASP – A free software alternative to IBM SPSS Statistics with additional option for Bayesian methods JMulTi – For econometric analysis, specialised in univariate and multivariate time series analysis Just another Gibbs sampler (JAGS) – a program for analyzing Bayesian hierarchical models using Markov chain Monte Carlo developed by Martyn Plummer. It is similar to WinBUGS KNIME – An open source analytics platform built with Java and Eclipse using modular data pipeline workflows LIBSVM – C++ support vector machine libraries mlpack – open-source library for machine learning, exploits C++ language features to provide maximum performance and flexibility while providing a simple and consistent application programming interface (API) Mondrian – data analysis tool using interactive statistical graphics with a link to R Neurophysiological Biomarker Toolbox – Matlab toolbox for data-mining of neurophysiological biomarkers OpenBUGS OpenEpi – A web-based, open-source, operating-independent series of programs for use in epidemiology and statistics based on JavaScript and HTML OpenMx – A package for structural equation modeling running in R (programming language) OpenNN – A software library written in the programming language C++ which implements neural networks, a main area of deep learning research Orange, a data mining, machine learning, and bioinformatics software Pandas – High-performance computing (HPC) data structures and data analysis tools for Python in Python and Cython (statsmodels, scikit-learn) Perl Data Language – Scientific computing with Perl Ploticus – software for generating a variety of graphs from raw data PSPP – A free software alternative to IBM SPSS Statistics R – free implementation of the S (programming language) Programming with Big Data in R (pbdR) – a series of R packages enhanced by SPMD parallelism for big data analysis R Commander – GUI interface for R Rattle GUI – GUI inte
https://en.wikipedia.org/wiki/Hash%20filter
A hash filter creates a hash sum from data, typically e-mail, and compares the sum against other previously defined sums. Depending on the purpose of the filter, the data can then be included or excluded in a function based on whether it matches an existing sum. For example, when a message is received by an e-mail server with a hash filter, the contents of the e-mail is converted into a hash sum. If this sum corresponds to the hash sum of another e-mail which has been categorized as spam, the received e-mail is prevented from being delivered. Spammers attempt to evade this by adding random strings to the text content and random pixel changes ("confetti") to image content (see image spam). See also Bloom filter Hash buster Locality-sensitive hashing References Hash Filter algorithm (SQL Anywhere Server - SQL Usage) at iAnywhere.com Hash functions
https://en.wikipedia.org/wiki/Murdoch%20railway%20station
Murdoch railway station is a railway and bus station on the Transperth network. It is located on the Mandurah line, from Perth station inside the median strip of the Kwinana Freeway serving the suburb of Murdoch. History Murdoch railway station was designed to subsume the existing Murdoch Park 'n' Ride bus station located on the same site. The Park 'n' Ride was closed on 31 January 2007 to facilitate construction of the railway station. The contract for the construction of Murdoch railway station, along with Bull Creek railway station and Canning Bridge railway station, was awarded to John Holland Pty Ltd in November 2004. This contract was the first contract awarded for the construction of stations on the Southern Suburbs Railway project, and it had a value of $32 million. During planning, the station was projected to have 4,980 boardings per day upon opening. Murdoch Station opened along with the rest of the Mandurah line on 23 December 2007. Murdoch is currently the busiest station utilised on the line with extremely high patronage. Services Murdoch Station is served by Transperth Mandurah line services. Platforms Transfers Bus transfers are available on the concourse level. The bus station is situated on a bridge structure extending over the Kwinana Freeway and railway station. Traffic signals at both ends of the bridge include a bus phase. Bus routes Stands 1–6 Stands 7–12 References External links Station map New MetroRail Mandurah line Transperth railway stations Railway stations in Australia opened in 2007 Transperth railway stations in highway medians Transperth bus stations Murdoch, Western Australia
https://en.wikipedia.org/wiki/Hash%20buster
A hash buster is a program which randomly adds characters to data in order to change the data's hash sum. This is typically used to add words to spam e-mails, to bypass hash filters. As the e-mail's hash sum is different from the sum of e-mails previously defined as spam, the e-mail is not considered spam and therefore delivered as if it were a normal message. Hash busters can also be used to randomly add content to any kind of file until the hash sum becomes a certain sum. In e-mail context, this could be used to bypass a filter which only accepts e-mails with a certain sum. Initially spams containing "white noise" from hash busters tended to simply exhibit 'paragraphs' of literally random words, but increasingly these are now appearing somewhat grammatical. See also Cryptographic hash function Bayesian poisoning Locality-sensitive hashing References External links searchCIO.com Definitions Spamming Random text generation
https://en.wikipedia.org/wiki/Lindholm%20amulet
The Lindholm "amulet", listed as DR 261 in Rundata, is a bone piece, carved into the shape of a rib, dated to the 2nd to 4th centuries (the late Roman Iron Age) and has a runic inscription. The Lindholm bone piece is dated between 375CE to 570CE and it is around 17 centimeters long at its longest points. It currently resides at Lund University Historical Museum in Sweden. It was found in 1840 in Skåne, Sweden, while cutting peat from a bog. This cut the bone in half and resulted in the destruction of one rune in the second line of text though most of the artifact remained intact. These runic objects were offered to the water in the bogs, the same is probably true in other regions in lakes and streams, but these objects are more difficult to retrieve. Bogs provide near perfect preservation for of artifacts thanks to the static, murky waters allowing them to rest undisturbed and unreachable for thousands of years. Inscription The inscription reads ekerilazsa[w]ilagazhateka: aaaaaaaazzznn[n]bmuttt:alu: The first line is transcribed into Proto-Norse as either Ek erilaz sa Wilagaz haite'ka or Ek erilaz Sawilagaz haite'ka. This translates to "I am (an) erilaz, I am called the wily" (or "I am called Sawilagaz"). If the word in first line is translated as a name, Sawilagaz means "the one of the Sun (Sowilo)". If the word is translated as "the wily" or "crafty one" or "deceitful one", then it may be related to a byname of Odin or another god. The sequence in the second line contains a "magical" string of runes concluding in alu. The three consecutive Tiwaz runes as an invocation of the god Tiwaz, and the eight Ansuz runes as an invocation or symbolic list of eight gods. Interpretation It is partially due to the formula of the inscription itself which references the way Odin often used to characterize himself as Grimnismal. The word 'erilaR' is frequently found in runic writing as a way to self identify the person carving the rune. The inscription may also be interpreted as “I ‘the eril’ the one who knows magic”. The reason for the rune inscriber to describe himself as crafty or tricky is most likely because he is about to enter a situation in which he will be in need of these qualities in order to be victorious. This gives us some insight into the purpose of the Lindholm amulet and other such historic rune artifacts. The interpretation of the Lindholm amulet is very loose, scholars and archaeologists alike have tried their best to decipher its strange inscriptions but it is likely that the writer either had less logical uses for the inscriptions than conveying a clear message or was not completely literate in the runic alphabet as was often the case with anyone who was not a spiritual leader or a person of great power. Alphabet The writing is of the specific runic alphabet known as Elder Futhark. It is the oldest form of runic writing and was often used by both germanic and northwest germanic tribes to inscribe weapons, amulets and instruments
https://en.wikipedia.org/wiki/Help%20key
A Help key, found in the shape of a dedicated key explicitly labeled , or as another key, typically one of the function keys, on a computer keyboard, is a key which, when pressed, produces information on the screen/display to aid the user in their current task, such as using a specific function in an application program. In the case of a non-dedicated Help key, the location of the key will sometimes vary between different software packages. Most common in computer history, however, is the development of a de facto Help key location for each brand/family of computer, exemplified by the use of F1 on IBM compatible PCs. Apple keyboards On a full-sized Apple keyboard, the help key was labelled simply as , located to the left of the . Where IBM compatible PC keyboards had the , Apple keyboards had the help key instead. As of 2007, new Apple keyboards do not have a help key. In its place, a full-sized Apple keyboard has a instead. Instead of a mechanical help key, the menu bar for most applications contain a Help menu as a matter of convention. Commodore and Amiga keyboards The Commodore 128 had a key in the second block of top row keys. Amiga keyboards had a key, labelled as such, above the arrow keys on the keyboard, and next to a key (where the cluster is on a standard PC keyboard). Atari keyboards The keyboards of the Atari 16- and 32-bit computers had a key above the arrow keys on the keyboard. Atari 8-bit XL and XE series keyboards had dedicated keys, but in the group of differently-styled system keys separated from the rest of the keyboard. Sun Microsystems (Oracle) Most of the Sun Microsystems keyboards have a dedicate "" key in the left top corner (left from the "" key above block of 10 () extra keys. References Computer keys Online help
https://en.wikipedia.org/wiki/ALU
By:Aditi Jha ALU, Alu or alu may refer to: Computing and science Computing Arithmetic logic unit, a digital electronic circuit Biology Alu sequence, a type of short stretch of DNA Arthrobacter luteus, a bacterium Organizations Abraham Lincoln University, Los Angeles, California, USA African Leadership University Alcatel-Lucent, a telecommunications equipment company Amazon Labor Union American Labor Union Army Logistics University, Fort Lee, Virginia, USA Sarajevo Academy of Fine Arts (Bosnian: Akademija likovnih umjetnosti Sarajevo, acronym: ALU) People Andrea Alù, a scientist Jake Alu, professional baseball player Alu (musician), Los Angeles, US Places Villages and boroughs Alu, Ardabil, a village in Iran Alu, Mazandaran, a village in Iran Alu, Estonia, a small borough in Rapla Parish, Rapla County Alu, Pärnu County, a village in Pärnu, Pärnu County, Estonia Volcanoes Alu (Ethiopia) Alu, Sulu, Philippines Other Alû, the Mesopotamian demon of night Alu (runic), in Germanic paganism See also Aloo (disambiguation)
https://en.wikipedia.org/wiki/Hint
Hint and similar may refer to: Hint (musician), musician Jonathan James from Sussex, England Hint (SQL), a feature of the SQL computer language Hint Water, a beverage company from San Francisco, California Aadu Hint (1910–1989), Estonian writer Font hinting, a process for optimizing the rasterization of vectors Hints, Shropshire, a location in England Hints, Staffordshire, a village in Staffordshire, England Motorola Hint QA30, a mobile phone introduced by Motorola Acronyms Hierarchical INTegration, a computer benchmark Nord-Trøndelag University College (Norwegian: Høgskolen i Nord-Trøndelag) Health Information National Trends Survey
https://en.wikipedia.org/wiki/Thunder%20Force%20II
is a scrolling shooter developed by Technosoft. It was first released in Japan on October 15, 1988 for the X68000 computer. A year later, it was ported to the Sega Mega Drive/Genesis game console and released in Japan (under the name Thunder Force II MD), Europe, and the United States. Thunder Force II was one of the six launch titles for the U.S. Genesis release. The Genesis port was later included in Thunder Force Gold Pack Volume 1 for the Sega Saturn. It was also re-released on the Nintendo Switch Online + Expansion Pack on December 16, 2021. It is the second chapter of the Thunder Force series. Gameplay Stages in the game are now split into two formats: the free-directional scrolling, overhead stage format from the previous game (referred to as "top-view stages"), and horizontal forward-scrolling stages (referred to as "side-view" stages) which would become the series mainstay, dropping the former entirely. Each stage begins in the top-view perspective, where the player has to locate the cores of a certain number of major enemy bases and destroy them. After this is accomplished, the stage continues from the side-view perspective, which plays like a traditional horizontal scrolling shooter. After the boss of the side-view sub stage is defeated, the player moves on to the next stage. Building upon its predecessor, Thunder Force II introduced a weapon system that would become the staple for the rest of the series. The player's ship now has default arsenal of weapons which include a twin, forward firing shot (the "Twin" shot), a single forward, and single backward firing shot (the "Back" shot), and a bomb shot in the top-view stages. By collecting certain items, the default weapons can be upgraded to more a powerful level. Also, the player could obtain a certain number of new weapons with various unique abilities by collecting the weapon's corresponding item (the "Hunter", a signature weapon of the series, debuts in this game). Once obtained, the weapons can be switched between at the player's desire, but if the ship is destroyed, all weapons are lost except for the defaults. The top-view and the side-view stages have different sets of weapons; losing weapons in the top-view stages do not affect the weapons equipped in the side-view stages and vice versa. Thunder Force II also introduced the CRAW add-ons; small pods which revolve around the ship. The function of the CRAWs is to block weak incoming bullets, and to provide extra firepower by firing single, normal shots. The player may acquire up to two CRAWs at a time, but will lose them upon ship destruction. Exclusive to this game is an item which temporally increases their orbit speed, making them more likely to block bullets. Plot Taking place soon after Thunder Force, the ORN Empire creates a powerful new battleship, the Plealos (a.k.a. Preareos). Using this battleship, ORN once again attacks the Galaxy Federation. The outcome of the attacks result in the destruction of the Galaxy Federa
https://en.wikipedia.org/wiki/Greek%20wiretapping%20case%202004%E2%80%9305
The Greek wiretapping case of 2004–05, also referred to as Greek Watergate, involved the illegal tapping of more than 100 mobile phones on the Vodafone Greece network belonging mostly to members of the Greek government and top-ranking civil servants. The taps began sometime near the beginning of August 2004 and were removed in March 2005 without discovering the identity of the perpetrators. The phones tapped included those of the Prime Minister Kostas Karamanlis and members of his family, the Mayor of Athens, Dora Bakoyannis, most phones of the top officers at the Ministry of Defense, the Ministry of Foreign Affairs, the Ministry for Public Order, members of the ruling party, ranking members of the opposition Panhellenic Socialist Movement party (PASOK), the Hellenic Navy General Staff, the previous Minister of Defense and one phone of a locally hired Greek American employee of the American Embassy. Phones of Athens-based Arab businessmen were also tapped. Foreign and Greek media have raised United States intelligence agencies as the main suspects. AFP reported that one Greek official stated on background that the likely initial penetration occurred during the run-up to the 2004 Athens Olympics, stating: "it is evident that the wiretaps were organized by foreign intelligence agencies, for security reasons related to the 2004 Olympic Games." The leader of the PASOK socialist opposition George Papandreou said that the Greek government itself had pointed towards the US as responsible for the wiretaps by giving up the zone of listening range, in which the US embassy was included. In 2015, after an investigation lasting 10 years, Greek investigators have found conclusive evidence linking the wiretapping to the US Embassy in Athens. As a result of the investigation, Greek authorities have issued an arrest warrant for a certain William George Basil, a NSA operative from a Greek immigrant background. Exploitation of Vodafone's network The Ericsson switches used by Vodafone Greece were compromised and unauthorized software was installed that made use of legitimate tapping modules, known as "lawful interception", while bypassing the normal monitoring and logging that would take place when a legal tap is set up. This software was eventually found to be installed on four of Vodafone's Ericsson AXE telephone exchanges. In modern mobile telecommunication networks, legal wiretaps, known as lawful interceptions, are performed at the switch. Ericsson AXE telephone exchanges support lawful intercepts via the remote-control equipment subsystem (RES), which carries out the tap, and the interception management system (IMS), software used for initiating addition of the tap to the RES database. In a fully operating lawful interception system the RES and IMS both create logs of all numbers being tapped, allowing system administrators to perform audits in order to find unauthorized taps. To successfully wiretap phone numbers without detection, as the intruders
https://en.wikipedia.org/wiki/Deterministic%20automaton
In computer science, a deterministic automaton is a concept of automata theory where the outcome of a transition from one state to another is determined by the input. A common deterministic automaton is a deterministic finite automaton (DFA) which is a finite state machine where for each pair of state and input symbol there is one and only one transition to a next state. DFAs recognize the set of regular languages and no other languages. A standard way to build a deterministic finite automaton from a nondeterministic finite automaton is the powerset construction. References Automata (computation)
https://en.wikipedia.org/wiki/Design%20Web%20Format
Design Web Format (DWF) is a file format developed by Autodesk for the efficient distribution and communication of rich design data to anyone who needs to view, review, or print design files. Because DWF files are highly compressed, they are smaller and faster to transmit than design files, without the overhead associated with complex CAD drawings (or the management of external links and dependencies). With DWF functionality, publishers of design data can limit the specific design data and plot styles to only what they want recipients to see and can publish multisheet drawing sets from multiple AutoCAD drawings in a single DWF file. They can also publish 3D models from most Autodesk design applications. DWF files are not a replacement for native CAD formats such as AutoCAD drawings (DWG). The sole purpose of DWF is to allow designers, engineers, project managers, and their colleagues to communicate design information and design content to anyone needing to view, review, or print design information – without these team members needing to know AutoCAD or other design software. An Autodesk DWF advocate blog cites as DWF's strengths over alternatives that the files have very high mathematical precision, and contain meta-data for sheets, objects and markup data. Another significant strength is that comments and markup can be reintroduced to, and edited in, some Autodesk products, such as Revit and AutoCAD. The AutoCAD file format (.dwfx) is based on ISO/IEC 29500-2:2008 Open Packaging Conventions. Technology DWF is a file format developed by Autodesk for representing design data in a manner that is independent of the original application software, hardware, and operating system used to create that design data. A DWF file can describe design data containing any combination of text, graphics, and images in a device independent and resolution independent format. These files can be one sheet or multiple sheets, very simple or extremely complex with a rich use of fonts, graphics, color, and images. The format also includes intelligent metadata that captures the design intent of the data being represented. The DWF technology centers on three components: C++ libraries for developers a viewer for project team members who wish to view design data without knowing AutoCAD a writer that allows anyone to create a DWF file from any application DWF Toolkit DWF is an open file format. Autodesk publishes the DWF specification and makes available C++ libraries (not available anymore) for any developer who wants to build applications around the DWF format, with the DWF Toolkit. Furthermore, DWF is based on other industry standards such as ZLIB, XML, and common image formats. DWF files (since version 6.0) are a ZIP-compressed container for the drawing files; despite the first few bytes of the file containing a DWF header, renaming a .dwf file to .zip will allow the component files inside to be viewed with archive compression software. Amongst various XML and
https://en.wikipedia.org/wiki/Killzone%202
Killzone 2 is a 2009 first-person shooter developed by Guerrilla Games and published by Sony Computer Entertainment for the PlayStation 3. It is the second main installment in the Killzone series, following 2004's Killzone. Similar to its predecessor, Killzone 2 takes place in the 24th century and chronicles the war between two human factions; the Vektans, and the Helghast. The game takes place two years after the events of Killzone and follows protagonist Tomas "Sev" Sevchenko as he and his unit battle the Helghast as the Vektans invade Helghan. The protagonist of Killzone and Killzone: Liberation, Cpt./Col. Jan Templar, returns in a supporting role, along with Rico Velasquez. Killzone 2 is played from a first-person view and allows the player to use a variety of weapons. It was released worldwide in February 2009. Killzone 2 was widely anticipated prior to its release. It was critically acclaimed by critics and fans, who praised it as a superior title to the original Killzone. Additional praise was given to the game's visuals, action, multiplayer modes, soundtrack and atmosphere, although criticism was directed at the narrative. The game's critical and commercial success led to a sequel, Killzone 3, which was released in February 2011. The official servers for Killzone 2 and Killzone 3 were shut down in March 2018. However, in 2021, a game preservation group called PSONE restored most of the game's online capability on their own set of servers. Gameplay Campaign The game is presented almost entirely from a first person perspective, aside from vehicular combat. Killzone 2 features a "lean and peek" cover system which allows the player to take cover behind an object and then pop out to fire at enemies. The "lean and peek" mechanic stays in first-person view at all times. It is also possible for the player to pilot vehicles at two points in the game: a tank and an exoskeleton. Many classic weapons and vehicles from previous Killzone installments return, such as the M82-G and the StA-52 LAR. The Sixaxis motion control feature is also utilized in performing certain actions such as turning a valve, arming an explosive charge and sniping. Multiplayer Warzone, the title of the online multiplayer component of Killzone 2 has been developed by Guerrilla Games in conjunction with the game's single-player campaign. The online multiplayer gameplay is class-based, meaning the player can choose a class of character which is specialized for a specific role to better suit the player's needs in battle. There are 7 classes in total, in which the player can mix and match a main and sub ability according to their playing style, and can switch abilities upon death. There are 15 weapons available to the player, most of which cannot be used until the player reaches a certain rank. Two of these weapons are secondary firearms, and a further two weapons, the Boltgun and Flamethrower, are exclusive to the downloadable maps "Suljeva Cliffside" and "Arctower Landing".
https://en.wikipedia.org/wiki/Short-furred%20dasyure
The short-furred dasyure (Murexia longicaudata), also known as the short-haired marsupial mouse, is a member of the order Dasyuromorphia. It was once recognised as the only species in the genus Murexia, but now five species are recognised. It lives in Papua, Indonesia and Papua New Guinea. Conservation status Its population is considered stable, so the species is listed as "Least Concern" by the IUCN. Systematics The short-furred dasyure used to form the genus Murexia together with the broard-striped dasyure. In 2005, Colin Groves divided the genus Murexia into two monotypic genera, Murexia for the short-furred dasyure and Paramurexia for the broad-striped dasyure, based on cladistic analyses. References External links Columbia Encyclopedia entry Dasyuromorphs Mammals of Papua New Guinea Mammals of Western New Guinea Mammals described in 1866 Marsupials of New Guinea
https://en.wikipedia.org/wiki/WPS
WPS may refer to: Computing and telecommunications Wi-Fi Protected Setup, a standard that attempts to automate secure wireless network set up and connection .wps, a file extension (including a list of programs using the extension) WPS Office, an office suite software developed by Kingsoft Nationwide Wireless Priority Service, a system in the United States for prioritizing emergency calls from mobile phones Web Processing Service, a web service interface specification from the Open Geo spatial Consortium WebSphere Process Server, an IBM service-oriented architecture offering Wi-Fi positioning system, a system that calculates the position of a device through nearby Wi-Fi access points Workplace Shell, a user interface of the IBM OS/2 operating system World Programming System, a development environment for the SAS programming language Education in the United States Walker Public Schools, a defunct school system in Columbia County, Arkansas Windermere Preparatory School, a private school in Florida Winchester Public Schools (Connecticut) Winchester Public Schools (Virginia) Winthrop Public Schools (Maine) Woodbury Public Schools, New Jersey Woodland Public Schools, Washington Organizations Canada Windsor Police Service Winnipeg Police Service United Kingdom Workers Party of Scotland, an anti-revisionist political party Women's Police Service, a voluntary organisation United States Western Pipe and Steel Company Wisconsin Physicians Service Insurance Corporation, a not-for-profit health insurer Wisconsin Public Service, a utility company in northern Wisconsin Women's Professional Soccer, an association football league Other uses Welding Procedure Specification West Philippine Sea
https://en.wikipedia.org/wiki/Reputation%20system
Reputation systems are programs or algorithms that allow users to rate each other in online communities in order to build trust through reputation. Some common uses of these systems can be found on E-commerce websites such as eBay, Amazon.com, and Etsy as well as online advice communities such as Stack Exchange. These reputation systems represent a significant trend in "decision support for Internet mediated service provisions". With the popularity of online communities for shopping, advice, and exchange of other important information, reputation systems are becoming vitally important to the online experience. The idea of reputation systems is that even if the consumer can't physically try a product or service, or see the person providing information, that they can be confident in the outcome of the exchange through trust built by recommender systems. Collaborative filtering, used most commonly in recommender systems, are related to reputation systems in that they both collect ratings from members of a community. The core difference between reputation systems and collaborative filtering is the ways in which they use user feedback. In collaborative filtering, the goal is to find similarities between users in order to recommend products to customers. The role of reputation systems, in contrast, is to gather a collective opinion in order to build trust between users of an online community. Types Online Howard Rheingold states that online reputation systems are "computer-based technologies that make it possible to manipulate in new and powerful ways an old and essential human trait". Rheingold says that these systems arose as a result of the need for Internet users to gain trust in the individuals they transact with online. The trait he notes in human groups is that social functions such as gossip "keeps us up to date on who to trust, who other people trust, who is important, and who decides who is important". Internet sites such as eBay and Amazon, he argues, seek to make use of this social trait and are "built around the contributions of millions of customers, enhanced by reputation systems that police the quality of the content and transactions exchanged through the site". Reputation banks The emerging sharing economy increases the importance of trust in peer-to-peer marketplaces and services. Users can build up reputation and trust in individual systems but usually don't have the ability to carry those reputations to other systems. Rachel Botsman and Roo Rogers argue in their book What's Mine is Yours (2010), that "it is only a matter of time before there is some form of network that aggregates reputation capital across multiple forms of Collaborative Consumption". These systems, often referred to as reputation banks, try to give users a platform to manage their reputation capital across multiple systems. Maintaining effective reputation systems The main function of reputation systems is to build a sense of trust among users of online
https://en.wikipedia.org/wiki/Documentary%20Channel%20%28American%20TV%20channel%29
The Documentary Channel was an American digital cable and satellite television network that featured documentary programming. It aired independent documentary films from around the world, including those not released in the United States. The channel (along with Halogen TV) was replaced by Pivot, a channel aimed at young adults between 18 and 34 years old, that was also owned by Participant Media, and debuted on August 1, 2013. Pivot ceased operations on October 31, 2016, folding the former Documentary Channel channel space. Background Documentary Channel launched in January 2006. It was founded by Tom Neff, Oscar nominated and Emmy winning documentarian, and attorney John Forbess. Originally, it was supported in part by WNPT, the Nashville PBS station. Documentary Channel won its first Emmy Award, for Outstanding Documentary, in September 2007, for Shake Hands with the Devil: The Journey of Roméo Dallaire. Documentary Channel's signature series, DocTalk, entered its third season July 1, 2011. DocTalk was a weekly half-hour program featuring filmmakers and their newest documentary film projects and releases. The channel was independently owned and operated until it was purchased by Participant Media in December 2012. Closure In March 2013, Participant Media announced that Documentary Channel and new sister network Halogen TV would merge into one network, and both would relaunch as Pivot, a network focused on 18 to 34 year olds, with elements of programming from both networks. The change was later announced to take place on August 1 of that year. Documentary Channel built up to the launch of Pivot with a countdown clock in the bottom right hand corner of the screen, where the logo normally is, saying "xx Hours xx Minutes until we Pivot", but there was no special programing taking a look back at the channel's history, instead just showing a normal day of programing. At approximately 6 p.m ET on Dish receivers, the channel's EPG name changed from "DOC" to "PIVOT", signifying the change happening overnight, in 12 hours time. At 5:40 a.m ET, the channel's final documentary, 8: The Mormon Proposition, ended. 5 minutes later, the channel's final regularly scheduled program, the channel's original program Doc Talk, began, with the subject being "Full Frame Fest 2". At 5:58 a.m ET, the channel began playing an old style Indian Head test card, and started playing Edward R. Murrow's "Wires and Lights in a Box" speech, talking about how television can help people learn, but only if they accept it. Midway through the speech, in the bottom right, a message said: At 6:00:04 a.m ET, Documentary Channel ended, and Pivot begun, with the final words spoken on the network being "Good night, and good luck." When the successor channel Pivot folded three years later the last program on the network was five consecutive showings of the film Good Night, and Good Luck from 8PM on the 30th onward until the shuttering. The film choice was likely a nod to the final
https://en.wikipedia.org/wiki/QuickTime%20Streaming%20Server
QuickTime Streaming Server (QTSS) is a server or service daemon that was built into Apple's Mac OS X Server until OS X Server 10.6.8. It delivers video and audio on request to users over a computer network, including the Internet. Its primary GUI configuration tool is QTSS Publisher and its web-based administration port is 1220. It also uses port UDP/7100. When used in conjunction with QuickTime Broadcaster, it is possible to deliver live real-time video and audio to multiple users over networks. The protocol used has since been superseded with HTTP Live Streaming used in iOS and Mac OS. See also Darwin Streaming Server Helix Universal Server HTTP Live Streaming Wowza Media Server References External links Streaming Server MacOS-only software made by Apple Inc. Streaming software MacOS Server
https://en.wikipedia.org/wiki/Security%20testing
Security testing is a process intended to detect flaws in the security mechanisms of an information system and as such help enable it to protect data and maintain functionality as intended. Due to the logical limitations of security testing, passing the security testing process is not an indication that no flaws exist or that the system adequately satisfies the security requirements. Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Security testing as a term has a number of different meanings and can be completed in a number of different ways. As such, a Security Taxonomy helps us to understand these different approaches and meanings by providing a base level to work from. Confidentiality A security measure which protects against the disclosure of information to parties other than the intended recipient is by no means the only way of ensuring the security. Integrity Integrity of information refers to protecting information from being modified by unauthorized parties A measure intended to allow the receiver to determine that the information provided by a system is correct. Integrity schemes often use some of the same underlying technologies as confidentiality schemes, but they usually involve adding information to a communication, to form the basis of an algorithmic check, rather than the encoding all of the communication. To check if the correct information is transferred from one application to other. Authentication This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labelling claims to be, or assuring that a computer program is a trusted one. Authorization The process of determining that a requester is allowed to receive a service or perform an operation. Access control is an example of authorization. Availability Assuring information and communications services will be ready for use when expected. Information must be kept available to authorized persons when they need it. Non-repudiation In reference to digital security, non-repudiation means to ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message. Non-repudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message. A sender-id is usually a header transmitted along with message which recognises the message source. Taxonomy Common terms used for the delivery of security testing: Discovery - The purpose of this stage is to identify systems within scope and the services in use. It is not intended to discover vulnerabilities, but version detection may highlight deprecated versions of software / firmwar
https://en.wikipedia.org/wiki/Topology%20table
A topology table is used by routers that route traffic in a network. It consists of all routing tables inside the Autonomous System where the router is positioned. Each router using the routing protocol EIGRP then maintains a topology table for each configured network protocol — all routes learned, that are leading to a destination are found in the topology table. EIGRP must have a reliable connection. The routing table of all routers of an Autonomous System is same. Routing Table
https://en.wikipedia.org/wiki/The%20Huntress%20%28TV%20series%29
The Huntress is an American crime drama television series that aired for one season of 28 episodes on the USA Network, from July 26, 2000 to September 9, 2001. It was developed by Pamela Norris, and based on the 1996 biography of the same name by Christopher Keane about bounty hunter Dottie Thorson, played by Annette O'Toole. Dottie was the widow of bounty hunter Ralph "Papa" Thorson, the subject of the 1980 Steve McQueen film The Hunter. After Ralph's murder, Dottie and their daughter Brandi (Jordana Spiro) team up as bounty hunters. Luis Antonio Ramos, James Remar, and Michael Muhney also star. The series was preceded by a two-hour pilot episode, which aired on USA as a stand-alone television film on March 7, 2000. Plot After she loses her husband to a car bomb, newly widowed Dottie Thorson and her daughter Brandi team up to pick up where her husband Ralph left off, to hunt down criminals that operate above the law. Cast Annette O'Toole as Dottie Thorson Jordana Spiro as Brandi Thorson Luis Antonio Ramos as Ricky Guzman James Remar as Tiny Bellows Michael Muhney as Mark Farrell Episodes Production The pilot was filmed in Salt Lake City, Utah. The series was filmed on location in and around Los Angeles and in Santa Clarita, California. In the pilot, Brandi was played by Aleksa Palladino. For the series, the role was recast with Jordana Spiro. References External links 2000s American crime drama television series 2000 American television series debuts 2001 American television series endings American action television series Television series about families Television series about widowhood Television series by Universal Television Television shows based on biographies Television shows filmed in Los Angeles Television shows filmed in Santa Clarita, California Television shows filmed in Utah USA Network original programming Works about bounty hunters
https://en.wikipedia.org/wiki/Body%20Blows%20Galactic
Body Blows Galactic is a fighting game developed and published by Team17 in 1993 for the Amiga computers. It is a sequel to 1992's Body Blows. Opponents and background graphics from both games were later merged into the compilation release Ultimate Body Blows. Gameplay After winning the global martial arts tournament, Danny and Junior decide to take the universe further and challenge the meanest and toughest in an interplanetary competition to become the ultimate galactic warrior. The gameplay system is the same as in the original Body Blows game. The game features single- and two-player modes, as well as an eight-player tournament mode. There are 12 different playable fighters from six worlds, and no bosses. Development A team of six people developed the game for about nine months. A slightly enhanced version was created for the AGA based Amiga 1200 which has several changes like more colorful backdrops and improved sound effects (by Steven and Gary Nicholas) and music. Reception Body Blows Galactic received mostly favorable reviews. Amiga Computing gave it a score of 93%, stating, "Quite honestly, Body Blows Galactic is the best beat'em up ever to be inserted into the drive of an Amiga." In a special comparison in Amiga Action, the game got a score of 84%, winning or drawing in the category "Atmosphere" and "Two Player Game" against Mortal Kombat and Elfmania. A dissenting review in CU Amiga gave it only a 57%, criticizing unbalanced characters, saying that while Warra, Lazer and Dino are ineffective, the very fast Kai-Ti seems invincible. Other reviews gave the game the ratings 86% in ACAR, 90% in Amiga Dream, 91% in Amiga Force, 88% in Amiga Format, 83% in Amiga Joker, 72% in Amiga Power and 87% in The One. Matt Broughton of The One rated the "lovely in every way" Kai-Ti as the most attractive Amiga fighting game character in a 1995 article. References External links Body Blows Galactic at Lemon Amiga Body Blows Galactic at Amiga Hall of Light 1993 video games Amiga games Amiga 1200 games Amiga-only games Science fiction video games Team17 games Fighting games Video game sequels Video games scored by Allister Brimble Video games developed in the United Kingdom
https://en.wikipedia.org/wiki/CyberARTS
CyberARTS is a multi-disciplinary, integrated six-year arts and technology specialized program which is offered in a number of schools in Toronto for grade 7 to 12 students in Ontario, Canada. The CyberARTS program has been honoured by Maclean's magazine as one of the best programs in Canada. Many international delegates come from the UK, Spain, the United States and China to study the unique model of this program. In addition to learning art, design, and technology, the students are also taught about important skills such as organization, work ethic, presentation skills, professionalism, career building and post-secondary planning. Program creation and location The CyberARTS program was created in 1995 by a group of educators, principals Sharron Forrest, Tito Faria, Jon Mergler, Mike Morey, Linda Newnham, Terry Wensley, Doris Fleming, Katherine Yamashita and Lesley Monette who saw a need for enriched learning through the arts and had a unique vision for digital arts at the [high school and middle school levels. Their purpose was to develop a program for students wanting to specialize in particular subjects within the combined areas of the arts and technology. Art is the foundation of the digital program. Support for the program initially came from the Don Mills Collegiate Institute, Don Mills Middle School, Northview Heights Secondary School and the North York Board of Education's Computers in Education Program. The program had educational partnerships with businesses such as Alias/SGIWavefront, Apple Canada, Kodak Canada, Rogers Communications and Softimage and organizations like the Textile Museum of Canada, the Art Gallery of Ontario, Ontario College of Art & Design, Sheridan College and the University of Waterloo School of Architecture. CyberARTS is offered at the following middle and high schools: Charles H. Best Middle School, Don Mills Collegiate Institute, Don Mills Middle School, Northview Heights Secondary School, Western Technical-Commercial School, Lakeshore Collegiate Institute and Innisdale Secondary School. Structure CyberARTS is an integrated program in which students gain credits in Visual Art, Media Literacy, Communications Technology, Computer Science, Music, Drama, Dance, Media Studies and Co-op. Curriculum in CyberARTS is designed so that the teacher is a facilitator, manager and producer while students take an active role in problem solving the task at hand whether it be creating or publishing children's books' authoring interactive CD-ROMS, organizing a conference or creating a traditional portrait. Each lesson unit in CyberARTS has an integration of at least two of the main CyberARTS subject areas and results in the completion of a major project. Staff and students at both levels work together to expand and improve the knowledge gained by students participating in the projects. The knowledge gained by students on these projects may assist them to make educational and vocational decisions. CyberARTS is also committ
https://en.wikipedia.org/wiki/Maximal%20munch
In computer programming and computer science, "maximal munch" or "longest match" is the principle that when creating some construct, as much of the available input as possible should be consumed. The earliest known use of this term is by R.G.G. Cattell in his PhD thesis on automatic derivation of code generators for compilers. Application For instance, the lexical syntax of many programming languages requires that tokens be built from the maximum possible number of characters from the input stream. This is done to resolve the problem of inherent ambiguity in commonly used regular expressions such as [a-z]+ (one or more lower-case letters). The term is also used in compilers in the instruction selection stage to describe a method of "tiling" — determining how a structured tree representing a program in an intermediate language should be converted into linear machine code. An entire subtree might be converted into just one machine instruction, and the problem is how to split the tree into non-overlapping "tiles", each representing one machine instruction. An effective strategy is simply to make a tile of the largest subtree possible at any given point, which is called "maximal munch". Drawbacks In some situations, "maximal munch" leads to undesirable or unintuitive outcomes. For instance, in the C programming language, the statement x=y/*z; (without any whitespace) will probably lead to a syntax error, since the /* character sequence initiates a (unintended) comment that is either unterminated or terminated by the end token */ of some later, unrelated actual comment (comments in C do not nest). What was actually meant in the statement was to assign to the variable x the result of dividing the value in y by the value obtained by dereferencing pointer z; this would be valid code. It can be stated by making use of whitespace, or using x=y/(*z);. Another example, in C++, uses the "angle bracket" characters < and > in the syntax for template specialization, but two consecutive > characters are interpreted as the right-shift operator >>. Prior to C++11, the following code would produce a parse error, because the right-shift operator token is encountered instead of two right-angle-bracket tokens: std::vector<std::vector<int>> my_mat_11; //Incorrect in C++03, correct in C++11. std::vector<std::vector<int> > my_mat_03; //Correct in either C++03 or C++11. The C++11 standard adopted in August 2011 amended the grammar so that a right-shift token is accepted as synonymous with a pair of right angle brackets (as in Java), which complicates the grammar but allows the continued use of the maximal munch principle. An exception to the maximal munch rule had to be added anyway to deal with the sequence <:: which can appear in templates. In that case, unless the sequence is followed by : or > the character < is interpreted as its own token instead of part of the token <:. Alternatives Programming languages researchers have also responded by replacin
https://en.wikipedia.org/wiki/Apache%20iBATIS
iBATIS is a persistence framework which automates the mapping between SQL databases and objects in Java, .NET, and Ruby on Rails. In Java, the objects are POJOs (Plain Old Java Objects). The mappings are decoupled from the application logic by packaging the SQL statements in XML configuration files. The result is a significant reduction in the amount of code that a developer needs to access a relational database using lower level APIs like JDBC and ODBC. Other persistence frameworks such as Hibernate allow the creation of an object model (in Java, say) by the user, and create and maintain the relational database automatically. iBATIS takes the reverse approach: the developer starts with a SQL database and iBATIS automates the creation of the Java objects. Both approaches have advantages, and iBATIS is a good choice when the developer does not have full control over the SQL database schema. For example, an application may need to access an existing SQL database used by other software, or access a new database whose schema is not fully under the application developer's control, such as when a specialized database design team has created the schema and carefully optimized it for high performance. On May 21, 2010 the development team forked the code creating a new project called MyBatis and making new releases there. As a consequence the Apache iBATIS project became inactive and was moved to the Apache Attic in June 2010. Usage For example, assume there is a database table and a Java class . To read the product record having the key into a new POJO, the following mapping is added into an iBATIS XML mapping file: <select id="getProduct" parameterClass="java.lang.Long" resultClass="com.example.Product"> select PROD_ID as id, PROD_DESC as description from PRODUCT where PROD_ID = #value# </select> A new Java Product object can then be retrieved from the database for product number 123 as follows: Product resultProduct = (Product) sqlMapClient.queryForObject("getProduct", 123); In the mapping file example, #value# refers to the long integer value passed into the query. If the parameter is a Java object, then values from properties on that object can be inserted into the query using a similar # notation. For example, if the parameter class is a com.example.Product which has a property called id, then #value# can be replaced with #id#. The sqlMapClient object is an instance of class com.ibatis.sqlmap.client.SqlMapClient. Availability The founder of iBATIS has publicly stated his dismay with Java 5, but has continued to release new versions of iBATIS for Java. Versions 2.3.1 and 2.3.2 came out in April 2008, and 2.3.3 in July. The framework is currently available in Java, .NET, and Ruby (RBatis) versions. The jBati project is a JavaScript ORM inspired by iBATIS. The Apache iBator tool is closely related: it connects to your database and uses its metadata to generate iBATIS mapping files and
https://en.wikipedia.org/wiki/ISBL
ISBL (Information Systems Base Language) is the relational algebra notation that was invented for PRTV, one of the earliest database management systems to implement E.F. Codd's relational model of data. Example OS = ORDERS * SUPPLIERS LIST OS: NAME="Brooks" % SNAME, ITEM, PRICE See also IBM Business System 12 - An IBM industrial strength relational DBMS influenced by ISBL. It was developed for use by customers of IBM's time-sharing service bureaux in various countries in the early 1980s. External links Sample ISBL usage Query languages
https://en.wikipedia.org/wiki/Rel%20%28DBMS%29
Rel is an open-source true relational database management system that implements a significant portion of Chris Date and Hugh Darwen's Tutorial D query language. Primarily intended for teaching purposes, Rel is written in the Java programming language. References Free database management systems
https://en.wikipedia.org/wiki/Beep
Beep may refer to: Science and technology Beep (sound), a single tone onomatopoeia, generally made by a computer or a machine BEEP, a network protocol framework Beep (locomotive), a locomotive built in 1970 Beep (smart card), contact less card payment scheme in the Philippines initially intended for use in railway stations and some buses. Entertainment Beep (short story), a 1954 novelette by James Blish "Beep" (The Pussycat Dolls song), a 2006 song performed by the Pussycat Dolls "Beep!!", a 2011 song performed by Superfly "Beep" (Bobby Valentino song), a 2008 song performed by Bobby Valentino "Beep", a 2022 song performed by M.I.A. from Mata Beep (video game), a 2011 2D-platforming action and adventure game by Big Fat Alien Beep: A Documentary History of Game Sound, a 2016 documentary by Karen Collins Gemaga, a Japanese video game magazine once known as Beep Other Beep (soft drink), a former Canadian fruit drink Beep test, oxygen uptake measuring multi-stage fitness test Basis point, one part per ten thousand BEEPS, Business Environment and Enterprise Performance Survey Beep, an informal nickname for borough presidents in New York City. See also Beep, beep (disambiguation) BEP (disambiguation) Beeb (disambiguation) Beeper (disambiguation)
https://en.wikipedia.org/wiki/Media%20in%20Goa
Media in Goa refers to the newspapers, magazines, radio stations, cable and television networks and online media in India's smallest state (3700 square kilometres, population 1.6 million). Over the past two-and-half decades, the Goa-linked online media (both in the diaspora and from the region) has also grown. Background Over the years, the media has changed dramatically from its early 20th century beginnings as a battlefield for influential lobbies within the local Catholic society (including caste-based elites, or politically divided groups) which were largely controlled by influential and educated local elites. After the end of Portuguese rule in 1961, new newspapers were set up, which were aligned to the influential local mining lobby. This too has changed in recent years, with some sections of the media becoming more politically aligned, or linked to major business houses both within Goa and its neighbourhood (particularly Maharastra). Media in the 1960s Till 1961, and the end of Portuguese-rule in Goa, Portuguese-language newspapers, including dailies and an eveninger, dominated the local market. There was an end to censorship after the demise of the Portuguese regime, but most of the earlier newspapers (except O Heraldo) shut down during the decade. As an official report put it in 1971: "With the integration of the former Portuguese enclaves in the Indian Union, the people of the territory started enjoying the fundamental rights including the freedom of press guaranteed by the [Indian] Constitution." Around 1961, there were ten newspapers and journals (both daily and of differing periodicity) -- seven in Portuguese, two in Konkani and one in Marathi. However, the situated changed soon. Within the first decade of the change and "their number shot up to 26 in 1965". But, as the official text puts it, "some of them could not obviously sustain the effervescence and the number declined to 19 which are being circulated now [as of 1971]." Languages The most widely read newspapers in Goa tend to be published in the English and Marathi languages, with the widely spoken local language of Konkani not receiving much coverage. Konkani-versus-Marathi linguistic battles have led to rivalry between these two language camps around the 1980s. There is friction between the users of the official Devanagari script and the Roman, or Romi script users of Konkani. Newspapers and magazines English-language newspapers in Goa comprise: O Heraldo (The Herald), Goa's oldest newspaper, formerly a Portuguese language daily owned by the family of Raul Fernandes (Herald Publications Pvt Ltd), a local printing enterprise that grew out of a stationery shop; The Navhind Times, published by the former mining house of the Dempos since 1963; and the Gomantak Times, which changed hands from its earlier owners from the mining house of the Chowgules to the politically linked Pawar family, based in the neighboring state of Maharashtra. In addition to these, The Times of India
https://en.wikipedia.org/wiki/Design%20marker
In software engineering, a design marker is a technique of documenting design choices in source code using the Marker Interface pattern. Marker interfaces have traditionally been limited to those interfaces intended for explicit, runtime verification (normally via instanceof). A design marker is a marker interface used to document a design choice. In Java programs the design choice is documented in the marker interface's Javadoc documentation. Many choices made at software design time cannot be directly expressed in today's implementation languages like C# and Java. These design choices (known by names like Design Pattern, Design Contract, Refactoring, Effective Programming Idioms, Blueprints, etc.) must be implemented via programming and naming conventions, because they go beyond the built-in functionality of production programming languages. The consequences of this limitation conspire over time to erode design investments as well as to promote a false segregation between the designer and implementer mindsets. Two independent proposals recognize these problems and give the same basic strategies for tackling them. Until now, the budding explicit programming movement has been linked to the use of an experimental Java research tool called ELIDE. The Design Markers technique requires only standard Javadoc-like tools to garner many of the benefits of Explicit Programming. See also Design Patterns Marker interface pattern External links Design Markers: Explicit Programming for the rest of us Design Markers home page Explicit Programming manifesto Software design
https://en.wikipedia.org/wiki/Sean%20Lahman
Sean Lahman (born June 9, 1968) (pronounced "lay-men") is an author and journalist. He is currently a reporter for the USA Today Network and Rochester Democrat and Chronicle and frequently makes public appearances to speak about database journalism, data mining and open-source databases. Sports research He is most noted for the Lahman Baseball Database, a collection of baseball statistics for every team and player in Major League history. Starting in 1995, he made this database freely available for download from the Internet, helping to launch a new era of baseball research by making the raw data available to everyone. In addition to fostering research, the Lahman Database also made it possible for baseball simulation games, such as Baseball Mogul and Out of the Park Baseball, to recreate historical seasons from actual baseball history. In the mid-1990s, Lahman created the first online baseball encyclopedia at his Baseball Archive website. He later sold the website to Total Sports and became senior editor for that company's print publishing division. The encyclopedia disappeared from the web when Total Sports declared bankruptcy. It was later reborn as Baseball-Reference.com, and Lahman resurrected the Baseball Archive website as a platform to continue the free distribution of his database. Since 2011, he has worked for the Society for American Baseball Research to coordinate data collection projects, including an effort to build a database for minor league baseball In 2021, Lahman served on a task force that made recommendations on which Black leagues from baseball’s segregated era should be recognized as major leagues. Lahman's efforts to document the statistical history of sports have gone beyond baseball. During the 1990s and 2000s, he edited or contributed to the definitive encyclopedias for baseball, professional football, professional basketball, and tennis. In the late 1990s, Lahman launched the Football Project, an effort to collect, digitize, and distribute play-by-play accounts from NFL games back to 1920. In 2010, he served on a "blue ribbon" panel assembled by NFL Films for the ten-part documentary series called The Top 100: NFL's Greatest Players. He has also appeared as a guest on the MLB Network show "Behind the Seams." Books From 1998 to 2007, Lahman was an editor or contributor to more than a dozen sports encyclopedias , including: three editions of Total Baseball: The Official Encyclopedia of Major League Baseball five editions of the ESPN Baseball Encyclopedia two editions of the ESPN Pro Football Encyclopedia Total Tennis: The Ultimate Tennis Encyclopedia Total Basketball: The Ultimate Basketball Encyclopedia Baseball: The Biographical Encyclopedia In addition to these encyclopedias, Lahman has written several other books on sports history. He created the annual Pro Football Prospectus in 2002 and produced the first three editions in the series. His 2008 book The Pro Football Historical Abstract received the
https://en.wikipedia.org/wiki/List%20of%20West%20Ham%20United%20F.C.%20players
Explanation of List League appearances League appearances and goals should include data for the following league spells, but should not include test or play-off matches: Southern League: 1898–99 to 1914–15 Football League: 1919–20 to 1992–93, 2003–04 to 2004–05, 2011–12 Premier League: 1993–94 to 2002–03, 2005–06 to 2010–11, 2012–13 to present European appearances European appearances and goals should include the data for the following campaigns: UEFA Cup Winners' Cup 1964–65, 1965–66, 1975–76, 1980–81 UEFA Intertoto Cup 1999 UEFA Cup/Europa League 1999–2000, 2006–07, 2015–16, 2016–17, 2021–22, 2023–24 UEFA Europa Conference League 2022–23 Other appearances The figures for other appearances should include the following competitions: Southern League test matches 1898–99 and 1899–1900 Southern Professional Floodlit Cup 1955–56 to 1959–60 Charity Shield 1964, 1975, 1980 Watney Cup 1973–74 Texaco Cup 1974–75 Anglo-Italian League Cup 1975–76 Full Members Cup 1986–87 to 1991–92 Anglo-Italian Cup 1992–93 Football League play-offs 2003–04, 2004–05, 2011–12 List of players Minimum of 100 club appearances to be included Bold indicates player is still with West Ham United Correct as of match played 29 October 2023, vs Everton West Ham United's England Internationals To date, there have been forty-four players represent the senior England team whilst playing for West Ham United. Bold indicates player is still with West Ham United Correct as of match played 17 October 2023, vs Club captains References Full appearance data by player and by match at westhamstats.info West Ham Association football player non-biographical articles
https://en.wikipedia.org/wiki/Montana%20PBS
Montana PBS is the PBS member public television network for the U.S. state of Montana. It is a joint venture between Montana State University (MSU) and the University of Montana (UM). The network is headquartered in the Visual Communications Building on the MSU campus in Bozeman, with a separate studio on the UM campus in Missoula. The network comprises six stations — flagship KUSM-TV (channel 9) in Bozeman and full-power satellites KUFM-TV (channel 11) in Missoula, KBGS-TV (channel 16) in Billings, KUHM-TV (channel 10) in Helena, KUGF-TV (channel 21) in Great Falls and KUKL-TV (channel 46) in Kalispell — and a network of 60 low-power repeaters in Montana. KUSM and KUHM are licensed to MSU, KUFM to UM, and KBGS, KUGF and KUKL to The Board of Regents of the Montana University System. History In 1983, several Gallatin Valley residents led by Nancy Fikkema formed Montanans for Children's Television (MCT) to press for a PBS station in the area. They wanted to give the few residents without access to cable a way to watch public television, especially PBS children's programming. At the time, Montana viewers had to rely on cable or translators for PBS programming. Depending on the location, cable systems in western Montana piped in KSPS-TV in Spokane or KRMA-TV in Denver, while cable systems in eastern and central Montana piped in Prairie Public Television from North Dakota or KUED in Salt Lake City. KRMA–now known as Rocky Mountain PBS–and KSPS still operate translators in Montana. Additionally, some commercial stations in Montana, including KTVQ in Billings and KFBB in Great Falls, carried Sesame Street and may have carried other PBS programs. The University of Utah, owner of KUED, was willing to bring a KUED satellite station to Bozeman if there was enough local support. However, the only viable facilities for such a station were at MSU, and school officials balked at using educational funds for public benefit. With this in mind, MCT published a survey in the Bozeman Chronicle asking if at least 2,000 people were willing to contribute $2 per month for a local public television station. After the survey found there was sufficient public support, KUSM signed on for the first time on October 1, 1984. The transmitter was donated by Montana broadcasting pioneer Joe Sample. MSU didn't have enough funding at the time to support a public television station, and the Gallatin Valley didn't have nearly enough people at the time for viewer-supported public television. Station engineers switched to and from KUED's signal for most PBS programming until 1987, giving MSU time to train its staff and build local financial support. With KUSM's debut, Montana became the last state with an educational station within its borders, 14 years after Mississippi became the last state east of the Mississippi River with its own PBS station. In 1987, KUSM became a full member of PBS. In 1988, KUSM was added to TCI's cable systems in the eastern two-thirds of Montana, from B
https://en.wikipedia.org/wiki/Your%20World%20with%20Neil%20Cavuto
Your World with Neil Cavuto (written on-air as Your World Cavuto), which debuted as The Cavuto Business Report on the network's launch in 1996, is an American television news and business talk program on Fox News Channel currently hosted by Neil Cavuto. Episodes air live at 4 p.m. ET, Monday through Friday. The show focuses on the development of the markets and the day's events with interviews, current event updates, and analysis. The show has been a part of the Fox News program lineup since October 7, 1996, and is the number one cable news broadcast in its time slot. The nightly business wrap seen on most Fox Television Stations late newscasts also carries Your World branding. Prominent guest hosts for Cavuto are Sandra Smith, Charles Payne, David Asman and Edward Lawrence. Production history Hosted by Neil Cavuto, Fox News' business news vice president, the program covers the latest breaking news and business stories of the day, in addition to giving analysis on how the stock market moved through the day. It also covers political stories, such as how political actions may affect the markets. Your World is broadcast live from Studio G at 1211 Avenue of the Americas (also known as the News Corp. Building), New York City. In the past, the program was presented in Studio E. Your World began broadcasting in 720p HD September 28, 2009. This HD conversion was part of FNC's network-wide switch to a 16:9 widescreen format on that day. Also on September 28, 2009, this program (which was one of the last existing weekday programs to convert to HD) debuted a new on-air look, along with new graphics and a then-new program logo. Recurring elements Common Sense - Cavuto gives his point of view on a news story of the day. Generation Hexed - Cavuto sits down with a group of millennials to talk about the economic challenges facing the next generation. Mailing It It - Cavuto reads e-mails and social media posts from the viewers, majority of which are negative. References External links 1990s American television news shows 1996 American television series debuts 2000s American television news shows 2010s American television news shows Business-related television series English-language television shows Fox News original programming
https://en.wikipedia.org/wiki/WONE%20%28AM%29
WONE (980 kHz) is an AM radio station in Dayton, Ohio with a sports format. It carries programming from Fox Sports Radio, as well as The Dan Patrick Show (Dan Patrick was originally an on-air personality on sister station WTUE under his real name, Dan Pugh). Its studios are located just outside downtown Dayton and its transmitter is in Kettering, Ohio. History The station took the air in 1949, licensed to Skyland Broadcasting Corp. It was sold in 1961 to Brush-Moore Newspapers, publisher of the Canton Repository. In 1965 the station was sold to Group One Broadcasting of Akron, owner of WAKR. During the mid-1960s WONE was known as "Channel 98," and it was one of Dayton's two popular Top 40 stations, the other being WING. The format changed to adult contemporary in 1968, when it was called "Charisma Radio" and "The Good Life in Dayton". Sometime thereafter, in early 1969 it switched to country music calling itself "One Country" or "Country-Wide W-1" to remain synonymous with its then-owner Group One. Changes of ownership On September 8, 1986, Group One was dissolved, and the station was sold to DKM Broadcasting. (One year beforehand, Group One obtained permission to place the WONE call sign on WAKR's FM sister station in Akron.) WONE's ownership passed to Stoner Broadcasting on December 9, 1992, to American Radio Systems on September 13, 1993, and to Jacor Communications on October 17, 1997. Modern Country format During most of the station’s years of programming country music, WONE did well in the Dayton market ratings, usually scoring first or second place in ratings among adults 18–49 years of age. The weekday programming lineup for most of the country years started with David G. McFarland in the morning drive time period, followed by Jim Howell in late mornings, John Ross in early afternoons, and Terry Wood (program director) in afternoon drive. The evening show was hosted over the years by Dean Taylor, Ed Riley and Chuck Wheeler. After-midnight shifts and weekends were hosted by Lee Nolan, Jim Lyons and others. Adult standards After 25 years as a country music station, WONE changed from "98 Country" to adult standards, "Dayton's ONE for Original Hits", on November 29, 1994 and acquired Springfield-based former Top 40 giant WIZE (which at the time also aired adult standards) along the way. WIZE would simulcast virtually all of WONE's programming until April 22, 2011, when WIZE broke away to launch a country format aimed specifically at the Springfield region. Switch to sports talk WONE adopted its present sports talk format on December 8, 2003, (as "980 Sports ONE") again competing with WING, then adopted the "Homer" nickname and weekday programming associated with WSAI 1360 AM (now on WCKY 1530 AM) in 2005. This simulcast with WCKY would eventually be severed in 2007, when WONE would start to air local sports talk in the afternoon, as well as clearing Fox Sports Radio in the morning hours (which eventually led to a clearance of Dayton na
https://en.wikipedia.org/wiki/Boolean%20domain
In mathematics and abstract algebra, a Boolean domain is a set consisting of exactly two elements whose interpretations include false and true. In logic, mathematics and theoretical computer science, a Boolean domain is usually written as {0, 1}, or The algebraic structure that naturally builds on a Boolean domain is the Boolean algebra with two elements. The initial object in the category of bounded lattices is a Boolean domain. In computer science, a Boolean variable is a variable that takes values in some Boolean domain. Some programming languages feature reserved words or symbols for the elements of the Boolean domain, for example false and true. However, many programming languages do not have a Boolean datatype in the strict sense. In C or BASIC, for example, falsity is represented by the number 0 and truth is represented by the number 1 or −1, and all variables that can take these values can also take any other numerical values. Generalizations The Boolean domain {0, 1} can be replaced by the unit interval , in which case rather than only taking values 0 or 1, any value between and including 0 and 1 can be assumed. Algebraically, negation (NOT) is replaced with conjunction (AND) is replaced with multiplication (), and disjunction (OR) is defined via De Morgan's law to be . Interpreting these values as logical truth values yields a multi-valued logic, which forms the basis for fuzzy logic and probabilistic logic. In these interpretations, a value is interpreted as the "degree" of truth – to what extent a proposition is true, or the probability that the proposition is true. See also Boolean-valued function GF(2) References Further reading (455 pages) (NB. Contains extended versions of the best manuscripts from the 10th International Workshop on Boolean Problems held at the Technische Universität Bergakademie Freiberg, Germany on 2012-09-19/21.) (480 pages) (NB. Contains extended versions of the best manuscripts from the 11th International Workshop on Boolean Problems held at the Technische Universität Bergakademie Freiberg, Germany on 2014-09-17/19.) (536 pages) (NB. Contains extended versions of the best manuscripts from the 12th International Workshop on Boolean Problems held at the Technische Universität Bergakademie Freiberg, Germany on 2016-09-22/23.) (vii+265+7 pages) (NB. Contains extended versions of the best manuscripts from the 13th International Workshop on Boolean Problems (IWSBP 2018) held in Bremen, Germany on 2018-09-19/21.) (204 pages) (NB. Contains extended versions of the best manuscripts from the 14th International Workshop on Boolean Problems (IWSBP 2020) held virtually on 2020-09-24/25.) Boolean algebra
https://en.wikipedia.org/wiki/Jailbreak%20%28disambiguation%29
Jailbreak, jailbreaking, gaolbreak or gaolbreaking refer to a prison escape. It may also refer to: Computer science Jailbreak (computer science), a jargon expression for (the act of) overcoming limitations in a computer system or device that were deliberately placed there for security, administrative, or marketing reasons: iOS jailbreaking, overriding software limitations on the iPhone, iPod Touch, or iPad Hackintosh, Apple's Macintosh operating system macOS running on unauthorized computer hardware Rooting (Android), on Android phones and tablets PlayStation 3 Jailbreak, on the Sony PlayStation such as a developer firmware to override all system holdbacks Music '74 Jailbreak, a 1984 album by AC/DC "Jailbreak" (AC/DC song), a 1976 song by AC/DC Jailbreak (album), a 1976 album by Thin Lizzy "Jailbreak" (Thin Lizzy song), the title track of the Thin Lizzy album "Jailbreak" (Dev Pandya song), 199 Film and television Gaol Break, a 1936 British film directed by Ralph Ince Gaolbreak, a 1962 British film directed by Francis Searle Jailbreak (1936 film), a 1936 film, starring Barton MacLane and June Travis Jailbreakers, a 1994 television film, starring Shannen Doherty and Antonio Sabàto Jr.. Jailbreak (TV series), a 2000 UK reality television series presented by Craig Charles Prison Break, 2005–2009, an American TV series "Jail Break" (Steven Universe), the 2015 final episode of the first season of the American animated television series Steven Universe Jailbreak (2017 film), a 2017 Cambodian action film, starring Jean-Paul Ly, Tharoth Sam and Céline Tran Other A variant of Tag JailBreak, a 1985 arcade game by Konami Jailbreak (webcomic), part of MS Paint Adventures Jailbreak: Source, a 2007 multiplayer computer game modification of the Source game engine Jailbreak (Roblox game), a 2017 cops and robbers video game on Roblox
https://en.wikipedia.org/wiki/Portable%20object%20%28computing%29
In distributed programming, a portable object is an object which can be accessed through a normal method call while possibly residing in memory on another computer. It is portable in the sense that it moves from machine to machine, irrespective of operating system or computer architecture. This mobility is the end goal of many remote procedure call systems. The advantage of portable objects is that they are easy to use and very expressive, allowing programmers to be completely unaware that objects reside in other locations. Detractors cite this as a fault, as naïve programmers will not expect network-related errors or the unbounded nondeterminism associated with large networks. See also CORBA Common Object Request Broker Architecture, cross-language cross-platform object model Portable Object Adapter part of the CORBA standard D-Bus current open cross-language cross-platform Freedesktop.org Object Model Bonobo deprecated GNOME cross-language Object Model DCOP deprecated KDE interprocess and software componentry communication system KParts KDE component framework XPCOM Mozilla applications cross-platform Component Object Model COM Microsoft Windows only cross-language Object Model DCOM Distributed COM, extension making COM able to work in networks Common Language Infrastructure current .NET cross-language cross-platform Object Model IBM System Object Model SOM, a component system from IBM used in OS/2 Java Beans Java Remote Method Invocation (Java RMI) Internet Communications Engine Language binding Foreign function interface Calling convention Name mangling Application programming interface - API Application Binary Interface - ABI Comparison of application virtual machines SWIG open source automatic interfaces bindings generator from many languages to many languages Distributed computing architecture Object (computer science)
https://en.wikipedia.org/wiki/Any%20Given%20Sunday%20%28TV%20series%29
Any Given Sunday was an Australian television program that aired on the Nine Network between 2005 and 2006. The show was not broadcast in NSW, the ACT or QLD, where The Sunday Roast screened instead. The theme music used during both seasons was "Take Me Out" by Franz Ferdinand. Premise Season 1 At the start of the 2005 Australian Football League season, this one-hour panel show was created to air between the Sunday Footy Show and Nine's Sunday AFL game. The panel consisted of Garry Lyon, James Brayshaw and Sam Newman, and in a way it was a sports wrap show in the vein of Wide World of Sports, however the sports results took a back seat to the humour of Sam Newman and James Brayshaw in particular. Season 2 At the start of 2006, due to Eddie McGuire being appointed CEO of the Nine Network, circumstances meant that the regular team of Brayshaw, Lyon and Newman would be appearing on the revamped Footy Show, meaning that a Sunday-morning show with a similar lineup would be redundant. The show returned in Round 2 of the 2006 season with a different lineup, consisting of comedian Mick Molloy, former swimmer and Nine Network commentator Nicole Livingstone and a rotating third panel member. The first of which was Dermott Brereton. Despite the fact that the show discussed all sorts of sports from around the world, its main focus remained AFL, as it previewed the Sunday matches. It always crossed to a commentator for a live AFL match on Nine. The show was cancelled soon after the 2006 AFL Season. And all three hosts soon moved on the now popular 'Footy Show' now airing on both Thursday and Sunday nights. See also List of Australian television series List of longest-running Australian television series References External links Nine Network original programming Australian rules football television series 2005 Australian television series debuts 2006 Australian television series endings
https://en.wikipedia.org/wiki/Peer-to-peer%20%28disambiguation%29
Peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peer-to-peer may also refer to: Economics Peer-to-peer banking Peer-to-peer carsharing Peer-to-peer lending Peer-to-peer economy, another name for the sharing economy Other uses Peer-to-peer file sharing Social peer-to-peer processes P2P economic system See also P2P (disambiguation) Anonymous P2P systems in which participants remain anonymous Peer production Private peer-to-peer
https://en.wikipedia.org/wiki/Static%20cast
In the C++ programming language, static_cast is an operator that performs an explicit type conversion. Syntax static_cast<type> (object); The type parameter must be a data type to which object can be converted via a known method, whether it be a builtin or a cast. The type can be a reference or an enumerator. All types of conversions that are well-defined and allowed by the compiler are performed using static_cast. The static_cast<> operator can be used for operations such as: converting a pointer of a base class to a pointer of a non-virtual derived class (downcasting); converting numeric data types such as enums to ints or floats. Although static_cast conversions are checked at compile time to prevent obvious incompatibilities, no run-time type checking is performed that would prevent a cast between incompatible data types, such as pointers. A static_cast from a pointer to a class B to a pointer to a derived class D is ill-formed if B is an inaccessible or ambiguous base of D. A static_cast from a pointer of a virtual base class (or a base class of a virtual base class) to a pointer of a derived class is ill-formed. See also dynamic cast reinterpret_cast const_cast References C++ Type theory Articles with underscores in the title
https://en.wikipedia.org/wiki/Community%20Radio%20Network%20%28New%20Zealand%29
The Community Radio Network (CRN) was a network of radio stations based in provincial centres across New Zealand. The network was operated by The Radio Network (TRN). Established in June 1998, each radio station in the network retained its local name and broadcast a live breakfast show from the centre in which it was based and then during the day and overnight would pick up the network feed broadcast from Taupō. (Programme would be fed from Huka Falls Road Taupō to The Radio Network's Auckland Street premises for upload to the Optus Satellite where it was then received in the various markets). The network on-air line up originally included: Mark Bramley (10a - 2p) Aaron Gillions (2p - 7p) Peter Gosney (7p - 12a) In late 1998, the lineup would change to: Mark Bramley (10a - 2p) Scott Armstrong (2p - 7p) (Brian Gentil in 2000) Peter Gosney (7p - 12a) (Corey K and Duncan Allen in 2000) Other voices heard on the network included Geoff Bargas, Rebecca Ali, Nadine Christiansen, Sarah McMullan, Chris Auer, Marke Dickson and Paul Frost. On 1 December 2000, CRN stations joined the Classic Hits programme fed from Cook Street Auckland, also operated by TRN. Where the station had both an FM and AM frequency the FM frequency was usually used to broadcast a localised version of Classic Hits while the AM frequency was used to broadcast Newstalk ZB. CRN as a division of TRN remained, providing creative services, writing and producing commercials for each of the stations. CRN was later renamed to 'The Provincial Group'. Members Radio Waitomo 1ZW - Waitomo (Sold in 2004, ceased broadcasting in 2005) Tokoroa - Radio Forestland Taumarunui - King Country Radio (Ceased broadcasting in 2010) Taupō - Lakeland FM Gisborne - 2ZG / ZGFM Masterton - Radio Wairarapa Wanganui - River City FM Blenheim - Radio Marlborough West Coast - Scenicland FM Ashburton - 3ZE / ZEFM Timaru - South Canterbury's 99FM Oamaru - Radio Waitaki Community radio stations in New Zealand New Zealand radio networks Radio stations established in 1998 Radio stations disestablished in 2000 Defunct radio stations in New Zealand
https://en.wikipedia.org/wiki/Backmarking
In constraint satisfaction, backmarking is a variant of the backtracking algorithm. Backmarking works like backtracking by iteratively evaluating variables in a given order, for example, . It improves over backtracking by maintaining information about the last time a variable was instantiated to a value and information about what changed since then. In particular: for each variable and value , the algorithm records information about the last time has been set to ; in particular, it stores the minimal index such that the assignment to was then inconsistent; for each variable , the algorithm stores some information relative to what changed since the last time it has evaluated ; in particular, it stores the minimal index of a variable that was changed since then. The first information is collected and stored every time the algorithm evaluates a variable to , and is done by simply checking consistency of the current assignments for , for , for , etc. The second information is changed every time another variable is evaluated. In particular, the index of the "maximal unchanged variable since the last evaluation of " is possibly changed every time another variable changes value. Every time an arbitrary variable changes, all variables with are considered in turn. If was their previous associated index, this value is changed to . The data collected this way is used to avoid some consistency checks. In particular, whenever backtracking would set , backmarking compares the two indexes relative to and the pair . Two conditions allow to determine partial consistency or inconsistency without checking with the constraints. If is the minimal index of a variable that changed since the last time was evaluated and is the minimal index such that the evaluation of was consistent the last time has been evaluated to , then: if , the evaluation of is still inconsistent as it was before, as none of these variables changed so far; as a result, no further consistency check is necessary; if , the evaluation is still consistent as it was before; this allows for skipping some consistency checks, but the assignment may still be inconsistent. Contrary to other variants to backtracking, backmarking does not reduce the search space but only possibly reduce the number of constraints that are satisfied by a partial solution. References Constraint programming
https://en.wikipedia.org/wiki/Priests%20for%20Life
Priests for Life (PFL) is an anti-abortion organization based in Titusville, Florida. PFL functions as a network to promote and coordinate anti-abortion activism, especially among Roman Catholic priests and laymen, with the primary strategic goal of ending abortion and euthanasia and to spread the message of the Evangelium vitae encyclical, written by Pope John Paul II. On April 30, 1991, Archbishop John R. Quinn of San Francisco officially approved Priests for Life as a Private Association of the Faithful, a term drawn from the 1983 Code of Canon Law. The organization was later listed in the official Catholic Directory. Priests for Life has formed an international association of Catholics called "Gospel of Life", and has requested the Holy See to grant appropriate status and structure in the Church. Bishop Patrick Zurek of the Diocese of Amarillo stated in 2016 that Priests for Life is a civil institution, not a Catholic organization. History Finances On September 6, 2011, Bishop Patrick Zurek of the Diocese of Amarillo, Texas, limited Frank Pavone to duties within the Diocese of Amarillo because of a protracted disagreement over financial transparency for Pavone's nonprofit Priests for Life and its affiliates – Rachel's Vineyard, which counsels people affected by abortion, and Gospel of Life Ministries, a lay association for Priests for Life. Pavone remained a priest in good standing until 2022, and the bishop did not allege fiscal impropriety, Gospel of Life Ministries lost its tax-exempt status for failure to file required documentation, according to Internal Revenue Service (IRS) records. A Catholic World News analysis of tax returns indicated that between 2006 and 2008, Priests for Life spent less than 63% of its revenues on its programs. It also found that Pavone did not draw any salary from the organization. Charity Navigator awarded Priests for Life one star out of four for financial accountability and transparency. The Better Business Bureau Charity Review lists PFL as "Did Not Disclose" indicating that the "organization either has not responded to written BBB requests for information or has declined to be evaluated in relation to BBB Standards for Charity Accountability." It explained, "without the requested information, it is not possible to determine whether this charity adheres to all of the BBB Standards for Charity Accountability." Upon an appeal filed by Pavone, the Congregation of the Clergy in May 2012 allowed Pavone to minister outside the Diocese of Amarillo, but recognized that he still must obtain specific permission to do so from his bishop. In November 2012, the Congregation of the Clergy decided that since the principal office of Priests for Life was in the archdiocese of New York, the archbishop of New York was the competent authority to exercise vigilance over the association. Pavone subsequently complied with demands to straighten out the group's finances and returned to New York to become accountable to his ho
https://en.wikipedia.org/wiki/Elliotte%20Rusty%20Harold
Elliotte Rusty Harold (born ca. 1960) is an American computer scientist, lecturer and author of several books on Java and XML and the creator of XOM, an open source Java class library for processing XML data. Life and work Harold was born and raised in New Orleans, where his father Elliotte Harold Jr. was working as lawyer. In a bio for an IBM DeveloperWorks article written by Harold, he claimed to have learned 14 computer programming languages, beginning with Fortran and AppleSoft BASIC and extending most recently to Haskell. "Java was probably his eighth language, and the one he's taken farther than any other," the bio states. Harold was an adjunct professor in the Computer Science Department of Polytechnic University of New York. He is the longtime publisher of the Cafe au Lait and Cafe con Leche websites devoted to Java and XML, respectively. He was a contributor to JDOM, a popular open source XML library for Java. At the New York XML SIG in 2002, he unveiled XOM and offered this explanation for its creation: "XOM is based on more than two years' experience with JDOM development, as well as the last year's effort writing Processing XML with Java. While documenting the various APIs I found lots of things to like and not like about all the APIs, and XOM is my effort to synthesize the best features of the existing APIs while eliminating the worst." Selected publications Java Developer's Resource (Prentice Hall, 1996), Java Secrets (Wiley, 1997), JavaBeans: Developing Component Software in Java (John Wiley & Sons, 1997), XML: Extensible Markup Language (Wiley, 1998), Java I/O, First Edition (O'Reilly, 1999), Processing XML with Java : a guide to SAX, DOM, JDOM, JAXP, and TrAX (Addison-Wesley, 2002), Effective XML: 50 specific ways to improve your XML (Addison-Wesley, 2003), The XML Bible (Wiley, 2004), XML in a Nutshell (O'Reilly, 2004), Java Network Programming, Third Edition (O'Reilly, 2004), Java I/O, Second Edition (O'Reilly, 2006), Refactoring HTML: Improving the Design of Existing Web Applications (Addison-Wesley Professional, 2012), Java Network Programming, Fourth Edition (O'Reilly, 2013), References External links Harold's personal homepage Cafe au Lait Java News and Resources Cafe con Leche XML News and Resources XOM Java class library homepage 1960s births Living people Writers from New Orleans
https://en.wikipedia.org/wiki/Procedural%20parameter
In computing, a procedural parameter is a parameter of a procedure that is itself a procedure. This concept is an extremely powerful and versatile programming tool, because it allows programmers to modify certain steps of a library procedure in arbitrarily complicated ways, without having to understand or modify the code of that procedure. This tool is particularly effective and convenient in languages that support local function definitions, such as Pascal and the modern GNU dialect of C. It is even more so when function closures are available. The same functionality (and more) is provided by objects in object oriented programming languages, but at a significantly higher cost. Procedural parameters are somewhat related to the concepts of first-class function and anonymous function, but is distinct from them. These two concepts have more to do with how functions are defined, rather than how they are used. Basic concept In most languages that provide this feature, a procedural parameter f of a subroutine P can be called inside the body of P as if it were an ordinary procedure: procedure P(f): return f(6,3) * f(2,1) When calling the subroutine P, one must give it one argument, that must be some previously defined function compatible with the way P uses its parameter f. For example, if we define procedure plus(x, y): return x + y then we may call P (plus), and the result will be plus(6,3) * plus(2,1) = (6 + 3)*(2 + 1) = 27. On the other hand, if we define procedure quot(u, v): return u/v then the call P (quot) will return quot(6,3)*quot(2,1) = (6/3)*(2/1) = 4. Finally, if we define procedure evil(z) return z + 100 then the call P (evil) will not make much sense, and may be flagged as an error. Syntactic details Some programming languages that have this feature may allow or require a complete type declaration for each procedural parameter f, including the number and type of its arguments, and the type of its result, if any. For example, in the C programming language the example above could be written as int P(int (*f)(int a, int b)) { return f(6,3) * f(2,1); } In principle, the actual function actf that is passed as argument when P is called must be type-compatible with the declared type of the procedure parameter f. This usually means that actf and f must return the same type of result, must have the same number of arguments, and corresponding arguments must have the same type. The names of the arguments need not be the same, however, as shown by the plus and quot examples above. However, some programming languages may be more restrictive or more liberal in this regard. Scoping In languages that allow procedural parameters, the scoping rules are usually defined in such a way that procedural parameters are executed in their native scope. More precisely, suppose that the function actf is passed as argument to P, as its procedural parameter f; and f is then called from inside the body of P. While actf is
https://en.wikipedia.org/wiki/Networker
Networker may refer to: EMC Legato Networker, a computer backup software Networker (train), a family of multiple unit trains which operate on the UK railway system Networker, one of the Non-player characters on My Lego Network
https://en.wikipedia.org/wiki/High%20Definition%20%28radio%20program%29
High Definition was a Canadian radio program, which debuted on February 4, 2006, on the CBC Radio One network. The series, an eight-episode short run series hosted by Don McKellar, examined and analyzed television's role in modern popular culture. It aired in a time slot previously occupied by O'Reilly on Advertising, a program which offered a similar perspective on advertising. CBC Radio One programs Canadian documentary radio programs 2000s Canadian radio programs
https://en.wikipedia.org/wiki/Marc%20Davis
Marc Davis may refer to: Marc Davis (academic), computer science professor Mark Davis (actor) (born 1965), also credited as Marc Davis, British pornography actor Marc Davis (animator) (1913–2000), Walt Disney Studios animator Marc Davis (astronomer) (born 1947), astrophysicist and professor Marc Davis (racing driver) (born 1990), NASCAR driver Marc Davis (runner) (born 1969), American middle-distance runner See also Marcus Davis (born 1973), fighter Marcus Davis (American football), (born 1989), wide receiver Mark Davis (disambiguation)
https://en.wikipedia.org/wiki/Adaptive%20optimization
Adaptive optimization is a technique in computer science that performs dynamic recompilation of portions of a program based on the current execution profile. With a simple implementation, an adaptive optimizer may simply make a trade-off between just-in-time compilation and interpreting instructions. At another level, adaptive optimization may take advantage of local data conditions to optimize away branches and to use inline expansion to decrease the cost of procedure calls. Consider a hypothetical banking application that handles transactions one after another. These transactions may be checks, deposits, and a large number of more obscure transactions. When the program executes, the actual data may consist of clearing tens of thousands of checks without processing a single deposit and without processing a single check with a fraudulent account number. An adaptive optimizer would compile assembly code to optimize for this common case. If the system then started processing tens of thousands of deposits instead, the adaptive optimizer would recompile the assembly code to optimize the new common case. This optimization may include inlining code. Examples of adaptive optimization include HotSpot and HP's Dynamo system. In some systems, notably the Java Virtual Machine, execution over a range of bytecode instructions can be provably reversed. This allows an adaptive optimizer to make risky assumptions about the code. In the above example, the optimizer may assume all transactions are checks and all account numbers are valid. When these assumptions prove incorrect, the adaptive optimizer can 'unwind' to a valid state and then interpret the byte code instructions correctly. See also Profile-guided optimization Hot spot (computer programming) References External links CiteSeer for "Adaptive Optimization in the Jalapeño JVM (2000)" by Matthew Arnold, Stephen Fink, David Grove, Michael Hind, Peter F. Sweeney. Contains links to the full paper in various formats. Compiler optimizations
https://en.wikipedia.org/wiki/Copland
Copland may refer to: Copland (crater), on Mercury Copland (operating system) Copland (surname) Copland River in New Zealand 4532 Copland, an asteroid named after Aaron Copland Aaron Copland, American composer See also Copeland (disambiguation) Cop Land, a 1997 movie starring Sylvester Stallone, Robert De Niro and Harvey Keitel
https://en.wikipedia.org/wiki/Electronic%20data%20capture
An electronic data capture (EDC) system is a computerized system designed for the collection of clinical data in electronic format for use mainly in human clinical trials. EDC replaces the traditional paper-based data collection methodology to streamline data collection and expedite the time to market for drugs and medical devices. EDC solutions are widely adopted by pharmaceutical companies and contract research organizations (CRO). Typically, EDC systems provide: a graphical user interface component for data entry a validation component to check user data a de-identification component to make data less identifiable a reporting tool for analysis of the collected data EDC systems are used by life sciences organizations, broadly defined as the pharmaceutical, medical device and biotechnology industries in all aspects of clinical research, but are particularly beneficial for late-phase (phase III-IV) studies and pharmacovigilance and post-market safety surveillance. EDC can increase data accuracy and decrease the time to collect data for studies of drugs and medical devices. The trade-off that many drug developers encounter with deploying an EDC system to support their drug development is that there is a relatively high start-up process, followed by significant benefits over the duration of the trial. As a result, for an EDC to be economical the saving over the life of the trial must be greater than the set-up costs. This is often aggravated by two conditions: that initial design of the study in EDC does not facilitate the decrease in costs over the life of the study due to poor planning or inexperience with EDC deployment; and initial set-up costs are higher than anticipated due to initial design of the study in EDC due to poor planning or experience with EDC deployment. The net effect is to increase both the cost and risk to the study with insignificant benefits. However, with the maturation of today's EDC solutions, much of the earlier burdens for study design and set-up have been alleviated through technologies that allow for point-and-click, and drag-and-drop design modules. With little to no programming required, and reusability from global libraries and standardized forms such as CDISC's CDASH, deploying EDC can now rival the paper processes in terms of study start-up time. As a result, even the earlier phase studies have begun to adopt EDC technology. History EDC is often cited as having its origins in remote data entry (RDE) software, which surfaced in the life sciences market in the late 1980s and early 1990s. However, its origins might be tracked to a contract research organization known then as Institute for Biological Research and Development (IBRD). Drs. Nichol, Pickering, and Bollert offered "a controlled system for post-marketing surveillance (PMS) of newly approved (NDA) pharmaceutical products," with surveillance data being "entered into an electronic data base on site" at least as early as 1980. Clinical research data—
https://en.wikipedia.org/wiki/Jumbo%20frame
In computer networking, jumbo frames are Ethernet frames with more than 1500 bytes of payload, the limit set by the IEEE 802.3 standard. The payload limit for jumbo frames is variable: while 9000 bytes is the most commonly used limit, smaller and larger limits exist. Many Gigabit Ethernet switches and Gigabit Ethernet network interface controllers and some Fast Ethernet switches and Fast Ethernet network interface cards can support jumbo frames. Inception Each Ethernet frame must be processed as it passes through the network. Processing the contents of a single large frame is preferable to processing the same content broken up into smaller frames, as this makes better use of available CPU time by reducing interrupts. This also minimizes the overhead byte count and reduces the number of frames needing to be processed. This is analogous to physically mailing a packet of papers instead of several single envelopes with one sheet each, saving envelopes and cutting sorting time. Jumbo frames gained initial prominence in 1998, when Alteon WebSystems introduced them in their ACEnic Gigabit Ethernet adapters. Many other vendors also adopted the size; however, jumbo frames are not part of the official IEEE 802.3 Ethernet standard. Adoption Jumbo frames have the potential to reduce overheads and CPU cycles and have a positive effect on end-to-end TCP performance. The presence of jumbo frames may have an adverse effect on network latency, especially on low-bandwidth links. The frame size used by an end-to-end connection is typically limited by the lowest frame size in intermediate links. 802.5 Token Ring can support frames with a 4464-byte MTU, FDDI can transport 4352-byte, ATM 9180-byte and 802.11 can transport 7935-byte MTUs. The IEEE 802.3 Ethernet standard originally mandated support for 1500-byte MTU frames, 1518 byte total frame size (1522 byte with the optional IEEE 802.1Q VLAN/QoS tag). The IEEE 802.3as update grandfathered in multiple common headers, trailers, and encapsulations by creating the concept of an envelope where up to 482 bytes of header and trailer could be included, and the largest IEEE 802.3 supported Ethernet frame became 2000 bytes. The use of 9000 bytes as preferred payload size for jumbo frames arose from discussions within the Joint Engineering Team of Internet2 and the U.S. federal government networks. Their recommendation has been adopted by all other national research and education networks. Manufacturers have in turn adopted 9000 bytes as the conventional MTU size, with a total jumbo frame size of between 9014 and 9022 bytes with ethernet headers included. Most Ethernet equipment can support jumbo frames up to 9216 bytes. IEEE 802.1AB-2009 and IEEE 802.3bc-2009 added LLDP discovery to standard Ethernet for maximum frame length (TLV subtype 4). It allows frame length detection on a port by a two-octet field. As of IEEE 802.3-2015, allowed values are 1518 (only basic frames), 1522 (802.1Q-tagged frames), and 2000 (multi-tag
https://en.wikipedia.org/wiki/Expr
expr is a command line utility on Unix and Unix-like operating systems which evaluates an expression and outputs the corresponding value. It first appeared in Unix v7. The command is available for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities. The command has also been ported to the IBM i operating system. Overview expr evaluates integer or string expressions, including pattern matching regular expressions. Each symbol (operator, value, etc.) in the expression must be given as a separate parameter. Most of the challenge posed in writing expressions is preventing the invoking command line shell from acting on characters intended for expr to process. Syntax Syntax: The operators available for integers: addition, subtraction, multiplication, division and modulus for strings: match a regular expression; in some versions: find a set of characters in a string ("index"), find substring ("substr"), length of string ("length") for either: comparison (equal, not equal, less than, etc.) Example The following is a (non-POSIX-compliant) example involving boolean expressions: expr length "abcdef" "<" 5 "|" 15 - 4 ">" 8 This example outputs "1". This is because length "abcdef" is 6, which is not less than 5 (so the left side of the | returns zero). But 15 minus 4 is 11 and is greater than 8, so the right side is true, which makes the or true, so 1 is the result. The program exit status is zero for this example. For pure arithmetic, it is often more convenient to use bc. For example: echo "3 * 4 + 14 / 2" | bc since it accepts the expression as a single argument. For portable shell programming, use of the "index", "length", "match" and "substr" commands must be avoided; string matching remains possible but it must use the "string : regexp" syntax. See also List of Unix commands References External links expr invocation in GNU coreutils manual GNU Project software Unix programming tools Standard Unix programs Unix SUS2008 utilities IBM i Qshell commands
https://en.wikipedia.org/wiki/The%20Life%20and%20Extraordinary%20Adventures%20of%20Private%20Ivan%20Chonkin
The Life and Extraordinary Adventures of Private Ivan Chonkin (, Zhizn i neobïchaynïe priklyucheniya soldata Ivana Chonkina) is a 1969–2007 novel by Soviet dissident writer Vladimir Voinovich. Voinovich wrote two sequels to the novel Pretender to the Throne: The Further Adventures of Private Ivan Chonkin (, Pretendent na prestol: Novye priklyucheniya soldata Ivana Chonkina), 1979, and A Displaced Person (, Peremyeshyonnoye litso), 2007; together, the trilogy constitutes Voinovich's magnum opus. The first book is set in the Red Army during World War II, satirically exposing the daily absurdities of the totalitarian Soviet regime. It was rejected by Novy Mir, circulated by samizdat, and first printed by an emigre magazine in West Germany, allegedly without author's consent, after which Voinovich was banned from publishing his books in the Soviet Union. Ivan Chonkin, a combination of a Russian folk hero Ivan the Fool and the "Good Soldier" Švejk, is now a widely known figure in Russian popular culture. Plot summary On the eve of World War II, Ivan Chonkin, the most dispensable soldier, is sent to guard a disabled military plane that crash landed on a kolkhoz (collective farm). Forgotten by his command, he earns favors of a nearby kolkhoznik woman Nyura and moves in with her. Nyura's cow eats the patch of experimental tomato-potato hybrids of the local mad genius agronomist Gladyshev, and in a retaliation the latter sends an anonymous note to NKVD that Chonkin is a deserter. When NKVDists come to arrest Chonkin, he, being a Good Soldier, refuses to leave the post, and arrests the NKVDists himself. Only after several days is the fact of missing secret police noticed, and the raion Party leader is told via phone that they have been arrested by "Chonkin and his baba (woman)", which he mishears as "Chonkin and his banda (gang)". A regiment is sent against "Chonkin's gang", but Chonkin successfully fends them off until they use artillery. When a General, named Drynov, incredulously learns that Chonkin single-handedly (with his baba) was holding off the whole regiment, he declares Chonkin a hero and awards him an order taken off his own chest. When the NKVD lieutenant shows the order for Chonkin's arrest, Drynov shrugs and tells them to carry out their duty, at which point Chonkin is arrested and carried off in the back of the truck to the "Right Place", leaving Nyura on her knees on the road weeping after Chonkin as the scene closes. The book ends with the joke on Gladyshev, whose misunderstanding of evolution (that monkeys became man through labor and intelligence) has been thoroughly unsettled by Chonkin's question why horses do not become men if they work harder than men do, finds a note attached to the bottom of a hoof of his dead horse which had earlier disappeared. Supposing the horse had evolved and written the note, he is spooked and crosses himself. Film In 1994, the book was made into a Russian-language film Life and Extraordinary Adventur
https://en.wikipedia.org/wiki/902%20TV
902 TV was a television station in Greece that was supported by the Communist Party of Greece. It featured general entertainment programming and was available throughout Greece. On September 10, 2012, ceased operations due to financial difficulties as well as the high costs involved in converting from analogue to digital. On March 2, 2013, starts broadcasting again via Digea. On 11 August 2013, the television station along with the relevant broadcast license was sold by the party to a private company called A-Horizon Media Ltd, and hence no longer has any affiliation to the party. The station was renamed to Epsilon TV (E TV now Open TV) and broadcasts completely different shows than 902 TV. References External links Official Site Greek-language television stations 1990 establishments in Greece 2013 disestablishments in Greece Television channels and stations established in 1990 Television channels and stations disestablished in 2013 Defunct television channels in Greece
https://en.wikipedia.org/wiki/Smile%20TV%20%28Greece%29
Smile TV is a channel on television in Greece which broadcasts cartoons and other shows for children ages four to eleven. Programming The Last of the Mohicans Sandokan: The Tiger roars again Journey to the West – Legends of the Monkey King Mimi and Mr. Bobo Cloud Trotters Vitaminix Pocket Dragon Adventures Ben 10 Princess of the Nile Els Nimbes Extreme Dinosaurs Horseland Popples Adventures of Sonic the Hedgehog Oggy and the Cockroaches Sabrina: The Animated Series Marsupilami The Adventures of Voopa the Goolash Rabbids Invasion Gormiti Nature Unleashed Kerwhizz Power Rangers Jungle Fury Vipo: Adventures of the Flying Dog Dinofroz Angel's Friends Monster High Pac-Man and the Ghostly Adventures DiMiTRi Dragon Ball Z Digimon Fusion Glitter Force The Adventures of Super Mario Bros. 3 Dennis the Menace Kong: The Animated Series Puppy In My Pocket The Smurfs Rat-A-Tat HeartCatch PreCure! Kaeloo Chloe's Closet Super 4 Co-operations The channel is known for being co-operated with stations that show its whole programming or part of it, under its banner. Vergina TV – sister channel, operating since 1993 in Central Macedonia. Formerly airing cartoons from the lineup of Smile TV, till 2017. NET – showed cartoons from the Smile TV lineup, from 2015 to 2018. Smile+ – sister channel and successor of local Thessalian station Zeus TV. Started operating on October 7, 2016. KRITI TV1 – showing cartoons from the Smile TV lineup. Smile++ – sister channel and successor of local Macedonian station Super TV. Started operating in October 2017, and stopped on April 27, 2018. Smile_ – sister channel and successor of local Thracian station Egnatia TV. Airing cartoons after approval from the National Television Council on March 6, 2017. References External links Smile TV Cyprus Television channels in Greece Mass media in Athens Television channels and stations established in 1999 1999 establishments in Greece Children's television networks Preschool education television networks
https://en.wikipedia.org/wiki/Killzone%203
Killzone 3 is a 2011 first-person shooter video game for the PlayStation 3, developed by Guerrilla Games and published by Sony Computer Entertainment. It is the fourth installment in the Killzone series, the first game in the series to be presented in stereoscopic 3D, and the first to include motion controls using the PlayStation Move. It is a direct sequel to Killzone 2. It was released worldwide in February 2011 to positive reviews. Plot In the climax of Killzone 2, Emperor Scolar Visari is assassinated by ISA forces, triggering a full-scale attack by the Helghan First Army. Overwhelmed, ISA commanders order a full withdrawal, leaving thousands of their own soldiers to die on Helghan. With the Helghast now driven to seek revenge for Visari's death, the survivors must join forces to find a way home. Story After failing to save Visari's life, Sgt. Tomas Sevchenko and Rico Velasquez regroup with Captain Jason Narville outside the imperial palace. With Helghan cruisers preparing to attack their fleet, they are forced to fight their way through the ruins of Pyrrhus, sacrificing most of their remaining armor and manpower in order to reach an extraction point near the edge of the city. Admiral Orlock, commander of the First Army, is pressured by Jorhan Stahl, the chairman of arms manufacturer Stahl Arms, to either ensure the total destruction of the ISA or turn over control of the army to him. Meanwhile, Rico receives a transmission from Jammer, a sniper whose platoon has been cut off by the Helghast. Against Narville's orders, he goes to assist them. The rest of the force attempts to link up with the fleet, but enemy interference leads to several ships being shot down, forcing the remainder to leave without Narville's men. Six months later, Stahl calls for a vote in the Helghan Imperial Senate to remove Orlock for incompetence, but his request is denied. Furious, Stahl ends his company's cooperation with the First Army and organizes his personal guard to hunt down the ISA, who have set up a base in a remote jungle near one of their destroyed cruisers. While working to restore the base's communication uplink, the soldiers learn that the UCN has agreed to a ceasefire with the Helghast, effectively abandoning them. The transmission is intercepted by Stahl's men, who subsequently attack the camp and kill everyone aside from Tomas and Narville, who are taken captive. Rico and Jammer's platoon, now calling themselves the Raiders, ambush the convoy and free Tomas. They carry out several attacks against Helghan facilities in the area, eventually reaching the main campus of Stahl Arms. Learning that Stahl plans to publicly execute Narville, Tomas and Rico don Helghast uniforms and rescue him and his fellow prisoners. Accessing the company's mainframe, they discover that Stahl has built his own armada armed with weapons powered by irradiated Petrusite, powerful enough to tear living organisms apart. Believing himself to be Visari's rightful successor, Stah
https://en.wikipedia.org/wiki/Total%20Living%20Network
Total Living Network (TLN) is a religious broadcasting channel based in Aurora, Illinois. TLN operates two feeds, one for the Chicago metropolitan area and carried mainly on Comcast/Xfinity digital cable systems in that area with a schedule customized for the Central Time Zone, and the other ("TLN West") for the Western United States with a limited number of terrestrial over-the-air affiliates and customized for the Pacific Time Zone. Both feeds carry the same programs, with slight differences in scheduling times. In both feeds, TLN carries lifestyle-oriented Christian televangelism, infomercials, and a limited number of secular lifestyle programs. Programs include: Marriage: For Better For Worse, a show dedicated to helping people restore and refresh their marriages using biblical principles Significant Insights, featuring one-on-one conversations with notable guests Aspiring Women, a women's talk show produced by TLN The DUI Expert, a no-frills, expert discussion on drugs, alcohol and driving hosted by William Pelarenos TLN is also involved in the production of original specials, such as The Da Vinci Code Deception. Much of TLN's programming consists of televangelism from outside providers that are distributed on numerous other televangelism networks, including Enjoying Everyday Life with Joyce Meyer, In Touch Ministries with Charles Stanley, Sid Roth's It's Supernatural!, The 700 Club, Joseph Prince, and numerous others. The network airs a limited amount of syndicated secular programming, including Small Town Big Deal, Real Life 101 (to meet E/I mandates), P. Allen Smith Gardens, Lindner's Fishing Edge and Business First AM. The remainder of the program time is sold to infomercials. TLN's building and Aurora property were purchased by Hobby Lobby in January 2010. Religious television stations in the United States Television stations in Illinois Aurora, Illinois Television channels and stations established in 1985 1985 establishments in Illinois
https://en.wikipedia.org/wiki/Allandale%20railway%20station%2C%20New%20South%20Wales
Allandale is a former railway station in the Maitland local government area. It is on the NSW TrainLink Intercity network, on the Main North Line branch of the Hunter Line. It was temporarily closed in 2002 due to the nearby bridge construction, and permanently closed on 9 September 2005, after railway works by the Australian Rail Track Corporation. There is no sign of the station now. Regional railway stations in New South Wales Maitland, New South Wales Railway stations in the Hunter Region Railway stations in Australia opened in 1869 Railway stations closed in 2005 Main North railway line, New South Wales
https://en.wikipedia.org/wiki/XTR
In cryptography, XTR is an algorithm for public-key encryption. XTR stands for 'ECSTR', which is an abbreviation for Efficient and Compact Subgroup Trace Representation. It is a method to represent elements of a subgroup of a multiplicative group of a finite field. To do so, it uses the trace over to represent elements of a subgroup of . From a security point of view, XTR relies on the difficulty of solving Discrete Logarithm related problems in the full multiplicative group of a finite field. Unlike many cryptographic protocols that are based on the generator of the full multiplicative group of a finite field, XTR uses the generator of a relatively small subgroup of some prime order of a subgroup of . With the right choice of , computing Discrete Logarithms in the group, generated by , is, in general, as hard as it is in and thus cryptographic applications of XTR use arithmetics while achieving full security leading to substantial savings both in communication and computational overhead without compromising security. Some other advantages of XTR are its fast key generation, small key sizes and speed. Fundamentals of XTR XTR uses a subgroup, commonly referred to as XTR subgroup or just XTR group, of a subgroup called XTR supergroup, of the multiplicative group of a finite field with elements. The XTR supergroup is of order , where p is a prime such that a sufficiently large prime q divides . The XTR subgroup has now order q and is, as a subgroup of , a cyclic group with generator g. The following three paragraphs will describe how elements of the XTR supergroup can be represented using an element of instead of an element of and how arithmetic operations take place in instead of in . Arithmetic operations in Let p be a prime such that p ≡ 2 mod 3 and p2 - p + 1 has a sufficiently large prime factor q. Since p2 ≡ 1 mod 3 we see that p generates and thus the third cyclotomic polynomial is irreducible over . It follows that the roots and form an optimal normal basis for over and Considering that p ≡ 2 mod 3 we can reduce the exponents modulo 3 to get The cost of arithmetic operations is now given in the following Lemma labeled Lemma 2.21 in "An overview of the XTR public key system": Lemma Computing xp is done without using multiplication Computing x2 takes two multiplications in Computing xy takes three multiplications in Computing xz-yzp takes four multiplications in . Traces over The trace in XTR is always considered over . In other words, the conjugates of over are and and the trace of is their sum: Note that since Consider now the generator of the XTR subgroup of a prime order . Remember that is a subgroup of the XTR supergroup of order , so . In the following section we will see how to choose and , but for now it is sufficient to assume that . To compute the trace of note that modulo we have and and thus The product of the conjugates of equals , i.e., that has norm 1. The crucial o
https://en.wikipedia.org/wiki/OISC
OISC may refer to: Office of the Immigration Services Commissioner in the United Kingdom Oisc of Kent, an early king of Kent One-instruction set computer
https://en.wikipedia.org/wiki/Request
Request may refer to: a question, a request for information a petition, a formal document demanding something that is submitted to an authority. Request may also refer to: Computing and technology in computer science, a message sent between objects in computer science, a request in Hypertext Transfer Protocol Request TV, a defunct pay-per-view service Requests (software), a Python HTTP library Albums Request (The Awakening album), a 1997 album by South African band The Awakening Request (Juju album), a 2010 cover album by Japanese singer Juju Requests, an album by The Johnson Mountain Boys Requests, a classical album by Victor Borge Requests, a 1964 Parlophone EP by The Beatles; "Long Tall Sally" "I Call Your Name" "Can't Buy Me Love" "You Can't Do That" Requests, a 1965 EP by Pat Carroll Further Requests, the second 1964 Parlophone EP by The Beatles; "She Loves You", "I Want To Hold Your Hand", "Roll Over Beethoven", "Can't Buy Me Love" Requests, an album by Gracie Fields Requests, an album by Jim McDonough Other uses "Requests", a song by Dr. Dre Request (broadcasting), audience interaction in broadcasting ReQuest Dance Crew, a hip hop dance crew from New Zealand See also Request–response
https://en.wikipedia.org/wiki/Mesh%20Computers
PC Peripherals Ltd, trading as MESH Computers, is a private computer company based in London, England. As well as being a manufacturer of personal computers, the company sells peripherals and components through their website. History MESH was founded in 1987. During its first 20 years of business, MESH Computers could only be purchased directly from the manufacturer; however, in November 2006, MESH began to sell through major retailers like Comet Group. MESH Computers has recently opened up a number of new routes to market, including resellers in the UK like Ebuyer. In 2009, Mesh announced the MESH Cute home theatre PC, in a variety of colours for the living room. The BBC created a series of programmes to teach school children about computer technology and advanced production techniques in a modern factory setting and MESH was filmed as one of the examples, alongside Rolls-Royce and Coca-Cola. MESH was the last of the major UK PC manufacturers that still create custom-built PCs for end users. At its peak, the mainstream market was full of local brands like Evesham Technology, Granville Technology (Tiny/Time), Elonex, Opus, Cube Enterprises, MJN and Dan; most of them shut down in the Great Recession. Viglen and RM Plc continued to operate, but specialise in education systems. MESH computers appeared on Watchdog having been accused of having inadequate customer support and services. In the summer of 2010, MESH Computers was voted PC Manufacturer of the Year by both Computer Shopper magazine and the Expert Reviews web site. MESH reviews have been mixed. Administration On 31 May 2011 it was announced that MESH Computers had gone into administration under the law firm MacIntyre Hudson, and that key assets had been bought by components firm PC Peripherals, owned by Reza Jafari. In February 2012, the owner of MESH (and its largest creditor) at the time it went into administration, Mehdi ("Max") Sherafati, was appointed a director of PC Peripherals, effectively regaining control. References External links Mesh Computers website Computer companies of the United Kingdom Computer companies established in 1987 1987 establishments in England Companies that have entered administration in the United Kingdom