source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/Logical%20model
|
Logical model can refer to:
A model in logic, see model theory
In computer science a logical data model
|
https://en.wikipedia.org/wiki/SAPI
|
SAPI may stand for:
Speech Application Programming Interface, an API produced by Microsoft for speech recognition and speech synthesis
Server application programming interface, an API used to interface with web servers such as Apache
Small Arms Protective Insert, a military ballistic protection system
Systém automatického pořizování informací (system for automatic gathering of information): SAPI-1, a computer produced in former Czechoslovakia by Tesla
Network Service Access Point Identifier, an identifier used in GPRS (cellular data) networks.
SaPI, a family of pathogenicity islands found in Staphylococcus aureus
Sapi may refer to:
Sapi Safari Area, included in UNESCO World Heritage Site Mana Pools National Park, Sapi and Chewore Safari Areas
Sapi, a nickname for the name Sapna found in the Hindi language. Usage has been documented in North Eastern Ohio.
Bull in Indonesian, such as in the Karapan sapi event or various dishes in Indonesian cuisine
See also
Sappi, a South African pulp and paper company
|
https://en.wikipedia.org/wiki/Microsoft%20Speech%20API
|
The Speech Application Programming Interface or SAPI is an API developed by Microsoft to allow the use of speech recognition and speech synthesis within Windows applications. To date, a number of versions of the API have been released, which have shipped either as part of a Speech SDK or as part of the Windows OS itself. Applications that use SAPI include Microsoft Office, Microsoft Agent and Microsoft Speech Server.
In general, all versions of the API have been designed such that a software developer can write an application to perform speech recognition and synthesis by using a standard set of interfaces, accessible from a variety of programming languages. In addition, it is possible for a 3rd-party company to produce their own Speech Recognition and Text-To-Speech engines or adapt existing engines to work with SAPI. In principle, as long as these engines conform to the defined interfaces they can be used instead of the Microsoft-supplied engines.
In general, the Speech API is a freely redistributable component which can be shipped with any Windows application that wishes to use speech technology. Many versions (although not all) of the speech recognition and synthesis engines are also freely redistributable.
There have been two main 'families' of the Microsoft Speech API. SAPI versions 1 through 4 are all similar to each other, with extra features in each newer version. SAPI 5, however, was a completely new interface, released in 2000. Since then several sub-versions of this API have been released.
Basic architecture
The Speech API can be viewed as an interface or piece of middleware which sits between applications and speech engines (recognition and synthesis). In SAPI versions 1 to 4, applications could directly communicate with engines. The API included an abstract interface definition which applications and engines conformed to. Applications could also use simplified higher-level objects rather than directly call methods on the engines.
In SAPI 5 however, applications and engines do not directly communicate with each other. Instead, each talks to a runtime component (sapi.dll). There is an API implemented by this component which applications use, and another set of interfaces for engines.
Typically in SAPI 5 applications issue calls through the API (for example to load a recognition grammar; start recognition; or provide text to be synthesized). The sapi.dll runtime component interprets these commands and processes them, where necessary calling on the engine through the engine interfaces (for example, the loading of grammar from a file is done in the runtime, but then the grammar data is passed to the recognition engine to actually use in recognition). The recognition and synthesis engines also generate events while processing (for example, to indicate an utterance has been recognized or to indicate word boundaries in the synthesized speech). These pass in the reverse direction, from the engines, through the runtime DLL, and on to a
|
https://en.wikipedia.org/wiki/Dabba%20%28company%29
|
Dabba is a South African company that is pioneering the establishment of village telcos. It uses wireless technology to provide voice and data services to under-serviced areas. Dabba has developed a distributed community based ownership model that encourages local entrepreneurs to provide telephone services not served by fixed line telcos at affordable prices.
Dabba was founded by Rael Lissoos & Manish Anant in 2004. He uses reprogrammed Wi-Fi routers as base stations, and open source software to build the components of a telecommunications network. Cheap Wi-Fi handsets are used to make calls. Dabba offers free calls in the area covered by the local network, and calls to 'phones on the national networks using pay-as-you-go cards.
The first pilot network is in operation in Orange Farm, Gauteng, a township near Johannesburg. In July 2008, Rael was recognised as the Social Entrepreneur of the Year at the Berlin Forum on Social Entrepreneurship. He says "Wireless networks have traditionally been created top-down; we want to do it bottom-up".
Notes and references
The name of the company "Dabba" is given on person name called "Manish Anant"
External links
Dabba website
Telecommunications companies of South Africa
|
https://en.wikipedia.org/wiki/List%20of%20online%20music%20databases
|
Below is a table of online music databases that are largely free of charge. Many of the sites provide a specialized service or focus on a particular music genre. Some of these operate as an online music store or purchase referral service in some capacity. Among the sites that have information on the largest number of entities are those sites that focus on discographies of composing and performing artists.
Performance rights organisations (PRO) typically have their own databases as per country they represent, in accordance with CISAC, to help domestic artists collect royalties. Information available on these portals include songwriting credits, publishing percentage splits, and alternate titles for different distribution channels. It is one of the most accurate and official types of databases because it involves direct communication between the artists, record labels, distributors, legal teams, publishers and a global governing body regulating PRO's. Many countries that observe copyright have an organisation established, currently there are 119 CISAC members, and they may be not-for-profit. The databases are typically known as 'repertory searches' or 'searching works' and may require an account while others are open to view for free as public including the USA's ASCAP Songview and Ace services, Canada's SOCAN, South Korea's KOMCA, France's SACEM, and Israel's ACUM.
General databases
Music genre specific
Specialized areas
Printed music (sheets) databases
Metadata providers and distributors
Non-functioning databases
See also
Automatic content recognition
Comparison of digital music stores
List of music sharing websites
Comparison of music streaming services
Comparison of online music lockers
List of music software
List of Internet radio stations
List of online digital musical document libraries
Streaming media
Virtual Library of Musicology
References
Music
Databases
|
https://en.wikipedia.org/wiki/Sultan%20Ismail%20Hospital
|
Sultan Ismail Hospital () is a hospital in Taman Mount Austin, Johor Bahru, Johor, Malaysia. The hospital is named in honour of Sultan Ismail of Johor.
The hospital was equipped with a computerised system and all administrative work and transactions would go through the system.
History
In July 2004, part of the hospital was opened but it closed down two months later due to the presence of fungal infection detected in the hospital. It was reopened in February 2006, but in April 2007 structural defects were found which involved replacing parts of the roof.
Since 2007, it has been serving the community in a modern facility, equipped to meet the needs of the ageing population.
It is also now utilised by Newcastle University Medicine Malaysia (NUMed Malaysia) as one of their primary teaching hospitals, with NUMeds own team of doctors working alongside the local hospital team.
Architecture
The hospital was constructed with a cost of MYR500 million.
Transportation
The hospital is accessible by Muafakat Bus route P-106 and Shuttle HSI bus.
See also
List of hospitals in Malaysia
References
External links
Hospital Sultan Ismail Official Website
MOH Hospitals List
2004 establishments in Malaysia
Buildings and structures in Johor Bahru
Hospitals established in 2004
Hospital buildings completed in 2004
Hospitals in Johor
|
https://en.wikipedia.org/wiki/Progress%20%28Rx%20Bandits%20album%29
|
Progress is an album released by Rx Bandits on July 17, 2001 through Drive-Thru Records.
The LP was originally titled Artificial Intelligence and the Fall of Technology.
The album was recorded during a tumultuous time in the band's lineup. Several members had left the band after the recording of Halfway between Here and There, though former saxophonist Noah Gaffney contributed on the song "Anyone But You." Gaffney's position was eventually filled by saxophonist Steve Borth, formerly of East Bay ska-punk band Link 80.
After the departure of James Salamone on bass, the band had many temporary replacements, including Johnny Tsagakis, drummer Chris Tsagakis' younger brother. Joe Troy, a longtime friend of Embree who helped write the song "What If?", eventually joined the band as a permanent bass player.
Steve Choi, formerly of The Chinkees, also became a full member playing guitar and keyboards. Choi had also played keyboards on the demos that the band made for Progress, but when it came time to record, they decided to have Rich Zahniser of The Hippos play on the album, because at the time he was touring with the band. Former Jeffries Fan Club trombonist Chris Colonnier also played with the band at times in the same role as Zahniser. Progress was ranked #207 on the greatest albums in 2001.
Shortly after the release of Progress, Chris Sheets joined as a second trombone player. Not long after that, Rich Balling quit the band.
The album spawned the band's first music video for the song "Analog Boy." The band wouldn't make a second music video for another 5 years, until the title track of 2006's ...And the Battle Begun.
Track listing
All songs written by Matt Embree, except where noted.
" – 0:28" – 0:28
"VCG³" (Rich Balling) – 3:44
"Consequential Apathy" – 2:36
"Analog Boy" – 4:13
"Get" – 2:42
"All the Time" – 3:55
"In All Rwanda's Glory" – 3:35
"Babylon" – 3:20
"Who Would've Thought" – 3:15
"Status" – 3:28
"Anyone But You" (Rich Balling) – 3:03
"Nugget" – 4:59
"Progress" – 3:28
"Nothing Sacred" – 2:58
"Infection" – 6:53
Personnel
Rich Balling – trombone, vocals
Matt Embree – vocals, guitar
James Salomone – bass
Chris Tsagakis – drums
Additional musicians
Kate Carter – violin, viola
Alan Elliot – clavinet
Christopher Fudurich – aural chaos
Noah Gaffney – saxophone
Brad Lindsay – cello
David Vokoun – double bass
Rich Zahniser – Hammond B3, trombone
References
Rx Bandits albums
2001 albums
Drive-Thru Records albums
|
https://en.wikipedia.org/wiki/Asian%20Network%20of%20Major%20Cities%2021
|
Asian Network of Major Cities 21 was a body representing the interests of several of Asia's largest capital cities around common themes of importance, including urban planning, sustainability and crisis management. The organization was advocated by then Tokyo Governor Shintaro Ishihara (1999–2012) and formed by common declaration of those attending a meeting held in Kuala Lumpur in August 2000. Following a review by member cities in 2014, the network was suspended and projects continued under new regional initiatives by Tokyo.
Joint projects
Industry
Promotion of Development of a small to medium-sized Jet Passenger Plane
"Welcome to Asia" Campaign
Promotion of Asian Business and Investment Projects
ICT Initiatives for Urban Development
Development of Affordable, Safe and Fast Mass Housing Technology Project
Environment
Urban and Global Environment Problems
Civil management
Network for Crisis Management
Health
Countermeasures to Combat Infectious Diseases in Asia
Arts and culture
Asian Performing Arts Festival
Women's Social participation
Women's Participation in Society
Human resource development
Youth-to-Youth Program -Creating Enterprising Originals
Staff Capacity Enhancement Program
Plenary Meeting
The First Plenary Meeting (October 2001) – Tokyo
The Second Plenary Meeting (November 2002) – Delhi
The Third Plenary Meeting (November 2003) – Hanoi
The Fourth Plenary Meeting (November 2004) – Jakarta
The Fifth Plenary Meeting (April 2006) – Taipei
The Sixth Plenary Meeting (November 2007) – Manila
The Seventh Plenary Meeting (November 2008) – Kuala Lumpur
The Eighth Plenary Meeting (November 2009) – Bangkok
The Ninth Plenary Meeting (November 2010) – Tokyo
The Tenth Plenary Meeting (October 2011) – Seoul
The Eleventh Plenary Meeting (June 2012) – Singapore
The Twelfth Plenary Meeting (November 2013) – Hanoi
The Thirteenth Plenary Meeting (September 2014) – Tomsk
References
External links
Official site (English version)
Official site of fifth plenary (English)
International conferences
International organizations based in Asia
Lists of cities in Asia
International organizations based in Japan
Organizations established in 2000
|
https://en.wikipedia.org/wiki/IBM%20Z
|
IBM Z is a family name used by IBM for all of its z/Architecture mainframe computers.
In July 2017, with another generation of products, the official family was changed to IBM Z from IBM z Systems; the IBM Z family now includes the newest model, the IBM z16, as well as the z15, the z14, and the z13 (released under the IBM z Systems/IBM System z names), the IBM zEnterprise models (in common use the zEC12 and z196), the IBM System z10 models (in common use the z10 EC), the IBM System z9 models (in common use the z9EC) and IBM eServer zSeries models (in common use refers only to the z900 and z990 generations of mainframe).
Architecture
The zSeries, zEnterprise, System z and IBM Z families were named for their availability – z stands for zero downtime. The systems are built with spare components capable of hot failovers to ensure continuous operations.
The IBM Z family maintains full backward compatibility. In effect, current systems are the direct, lineal descendants of the System/360, announced in 1964, and the System/370 from the 1970s. Many applications written for these systems can still run unmodified on the newest IBM Z system over five decades later.
Virtualization
Virtualization is required by default on IBM Z systems. First layer virtualization is provided by the Processor Resource and System Manager (PR/SM) to deploy one or more Logical Partitions (LPARs). Each LPAR supports a variety of operating systems. A hypervisor called z/VM can also be run as the second layer virtualization in LPARs to create as many virtual machines (VMs) as there are resources assigned to the LPARs to support them. The first layer of IBM Z virtualization (PR/SM) allows a z machine to run a limited number of LPARs (up to 80 on the IBM z13). These can be considered virtual "bare metal" servers because PR/SM allows CPUs to be dedicated to individual LPARs. z/VM LPARs allocated within PR/SM LPARs can run a very large number of virtual machines as long as there are adequate CPU, memory, and I/O resources configured with the system for the desired performance, capacity, and throughput.
IBM Z's PR/SM and hardware attributes allow compute resources to be dynamically changed to meet workload demands. CPU and memory resources can be non-disruptively added to the system and dynamically assigned, recognized, and used by LPARs. I/O resources such as IP and SAN ports can also be added dynamically. They are virtualized and shared across all LPARs. The hardware component that provides this capability is called the Channel Subsystem. Each LPAR can be configured to either "see" or "not see" the virtualized I/O ports to establish desired "shareness" or isolation. This virtualization capability allows significant reduction in I/O resources because of its ability to share them and drive up utilization.
PR/SM on IBM Z has earned Common Criteria Evaluation Assurance Level (EAL) 5+ security certification, and z/VM has earned Common Criteria EAL4+ certification.
The KVM hypervisor
|
https://en.wikipedia.org/wiki/FCurve
|
An FCurve (also written f-curve) is a function curve or the graph of a function. An example of a FCurve is a spline.
In the field of computer animation and especially in animation editors, e.g. Maya, an FCurve is an animation curve with a set of keyframes, which are represented as points, curve segments between keys, and tangents that control how curve segments enter and exit a key. These keys are laid out on a graph that displays their position relative to zero. One can have keys that are either positive or negative values.
This visual graph of keyframes allows one to see the value of the key and its interpolation to the next key, which shows the animation "ease ins" and "ease outs".
Computer animation
|
https://en.wikipedia.org/wiki/BBC%20General%20Forces%20Programme
|
The BBC General Forces Programme was an American style entertainment programming national radio station operating from 27 February 1944 until 31 December 1946.
History
Development
Upon the outbreak of World War II on 1 September 1939, the BBC closed both existing National and Regional radio programmes, combining the two to form a single channel known as the BBC Home Service. The former transmitters of the National Programme continued to broadcast the Home Service until 1940, when the lack of choice and lighter programming for people serving in the British Armed Forces was noted. At that point, some frequencies were given to a new entertainment network, the BBC Forces Programme.
The BBC Forces Programme was replaced when the influx of American soldiers, used to a different style of entertainment programming, had to be catered for in the run up to 'D-Day'. This replacement service was named the General Forces Programme, and was also broadcast on shortwave on the frequencies of the Overseas Service.
Programming
The BBC Forces Programme was launched to appeal directly to those members of the armed services during the Phoney War who were mainly sat in barracks with little to do. Its mixture of drama, comedy, popular music, features, quiz shows and variety was richer and more varied than the former National Programme, although it continued to supply lengthy news bulletins, informational and talk. However, when the American servicemen arrived en masse in 1943 and 1944 as preparation for Operation Overlord, they found even the richer Forces Programme shows to be staid and slow compared with the existing output of the American networks.
In response to appeals from General Dwight Eisenhower, the BBC abolished the Forces Programme and established the General Forces Programme, designed to provide a mixture of programming suitable for American and British audiences and also to appeal to the "Home Front", who research had shown wished to listen to the same output as the forces once fighting had broken out. As well as a large number of American network and Canadian Broadcasting Corporation programmes, the General Forces Programme also offered British programming:
Shipmates Ashore – for the Merchant Navy, starring Evelyn Laye and Doris Hare
Navy Mixture – with Joy Nichols
Forces' Favourites – a record request show which later became Family Favourites
War Office Calling the Army – information and news for servicemen
Strike a Home Note – for Scottish servicemen overseas
Welsh Half Hour
SEAC – a newsletter for the South-East Asian theatre
Hello GIs – a newsletter for Americans in Britain
Mediterranean Merry-Go-Round – made up of Stand Easy for the British Army
Much Binding in the Marsh – for the Royal Air Force
HMS Waterlogged – for the Royal Navy
The General Forces Programme maintained the previous broadcasting hours of the Forces Programme on air each day from 6.30am until 11.00pm.
Closure
After Victory in Europe Day, the British longwave freque
|
https://en.wikipedia.org/wiki/White%20Alice%20Communications%20System
|
The White Alice Communications System (WACS, "White Alice" colloquially) was a United States Air Force telecommunication network with 80 radio stations constructed in Alaska during the Cold War. It used tropospheric scatter for over-the-horizon links and microwave relay for shorter line-of-sight links. Sites were characterized by large parabolic, tropospheric scatter antennas as well as smaller microwave dishes for point-to-point links.
The system connected remote Air Force sites in Alaska, such as Aircraft Control and Warning (AC&W), Distant Early Warning Line (DEW Line) and Ballistic Missile Early Warning System (BMEWS), to command and control facilities and in some cases it was used for civilian phone calls. The network was originally operated by the USAF, but was turned over to RCA for operations after 1969. The opening of satellite communication links in the 1970s made the system obsolete, and in 1979 it was replaced by an RCA satellite link that connected all of the stations to Anchorage.
The network was sold the same year to a civilian operator for telephone calls. The deteriorating condition of the sites led to its shutdown in the 1980s and most of the facilities have since been removed.
Background
Troposcatter
White Alice was conceived in the 1950s when Alaska had only basic telephone communication systems. For example, prior to White Alice only one phone call at a time could be placed from Nome to Fairbanks. Communication improved after White Alice was installed, but even in the mid-1960s, Anchorage residents had to go to one location downtown to place a call to the lower 48.
The Air Force built the White Alice Communications System with numerous support facilities around the state to provide reliable communications to far-flung, isolated, and often rugged locales. Construction began in 1955 and the system was dedicated in 1958. In the end, 71 systems were installed throughout Alaska. White Alice was designed by Western Electric, and civilian contractors maintained it. In 1976, the WACS was leased to RCA Alascom. By the end of the 1970s, most of the system was deactivated.
In the 1950s, the Air Force used two-word code names, and White Alice was the code name selected for the project. It is fairly certain that White was used to indicate the snowy Arctic sites that the system would serve. It is unclear where the term Alice originated. Some sources suggest that Alice is an acronym for Alaska Integrated Communications Enterprise. Other sources suggest that the system would have been named Alice White had there not been an actress with that name at the time. Thus it was reversed to White Alice. It is also possible that the code name White Alice was selected for no particular reason.
Construction
The United States Army Corps of Engineers (USACE), Alaska district surveyed and selected each one of the original sites. It also constructed 11 of the original 31 sites. The selection process required that survey teams test the propagation
|
https://en.wikipedia.org/wiki/JUNET
|
Japan University NETwork (JUNET) was a computer network established by three universities, Tokyo University, Tokyo Institute of Technology and Keio University in October 1984 for test and research purposes. At its height it connected 700 machines. Comparable to the model of the American Usenet, it employed a UUCP implementation over telephone line. JUNET played an important role in the development of the Internet in Japan. It was made obsolete with the development and growing popularity of the WIDE Project, and was discontinued in October 1994.
Size and Growth of the Network
JUNET grew from a few organizations in 1984 to over 250 nodes in 87 organizations by July 1987.
References
External links
The history of the WIDE project
Science and technology in Japan
Internet in Japan
Internet properties established in 1984
Internet properties disestablished in 1994
|
https://en.wikipedia.org/wiki/Freemacs
|
Freemacs is a small, programmable computer text editor for MS-DOS with some degree of compatibility with GNU Emacs. Written by Russ Nelson and later maintained by Jim Hall, Freemacs is currently distributed under the GPL-1.0-only license in the FreeDOS project.
Freemacs' executable binary, in the current 1.6 version, is only ~21k in size. Most features are implemented in MINT (Mint Is Not Trac), whose role is akin to that of Emacs Lisp as used by other implementations of Emacs.
The most recent version of Freemacs is 1.6H, released in 2008. Version 1.6G was released in 1999.
References
External links
Project home page
Emacs
Free text editors
DOS text editors
|
https://en.wikipedia.org/wiki/Anime%20News%20Network
|
Anime News Network (ANN) is a news website that reports on the status of anime, manga, video games, Japanese popular music and other related cultures within North America, Australia, Southeast Asia and Japan. The website offers reviews and other editorial content, forums where readers can discuss current issues and events, and an encyclopedia that contains many anime and manga with information on the staff, cast, theme music, plot summaries, and user ratings.
The website was founded in July 1998 by Justin Sevakis, and operated the magazine Protoculture Addicts from 2005 to 2008. Based in Canada, it has separate versions of its news content aimed toward audiences in five separate regions: the United States and Canada, the United Kingdom and Republic of Ireland, Australia and New Zealand, Southeast Asia, and India.
History
The website was founded by Justin Sevakis in July 1998. In May 2000, CEO Christopher Macdonald joined the website editorial staff, replacing editor-in-chief Isaac Alexander. On June 30, 2002, Anime News Network launched its Encyclopedia, a collaborative database of anime and manga titles also including information about the staff, cast, and companies involved in the production or localization of those titles.
On September 7, 2004, the Sci Fi Channel online newsletter Sci Fi Weekly named ANN the Web Site of the Week. On September 18, 2004, the editorial staff at ANN became formally involved with the anime magazine Protoculture Addicts; the magazine began publishing under ANN's editorial control in January 2005.
In January 2007, ANN launched a separate version for Australian audiences. On July 4, 2008, ANN launched its video platform with a library of anime trailers as well as its own news show ANNtv.
On August 7, 2017, a hacker took control of Anime News Network's domain (animenewsnetwork.com), and compromised some of the site's Twitter accounts, including the personal accounts of ANN's CEO Christopher Macdonald and Executive Editor Zac Bertschy. The site was temporarily live at animenewsnetwork.cc until the staff regained control of the original domain. In an article a few days after the loss of the domain, Macdonald published the full story on how the domain was stolen.
On November 1, 2022, Kadokawa Corporation announced an agreement to acquire a majority of Anime News Network's media business through a new subsidiary Kadokawa World Entertainment. Christopher Macdonald, the president of ANN, was appointed as the publisher of Kadokawa World Entertainment. Macdonald and Bandai Namco Filmworks retain minority shares in the new company.
Features
Anime News Network stories related to anime and manga are researched by the ANN staff. Other contributors, under staff discretion, also contribute news articles.
The website maintains a listing of anime and manga titles, as well as people and companies involved in the production of those titles, which it dubs an "encyclopedia". The site has hosted several regular columns, including a
|
https://en.wikipedia.org/wiki/Atlantic%20Crossing%201
|
Atlantic Crossing 1 (AC-1) is an optical submarine telecommunications cable system linking the United States and three European countries. It transports speech and data traffic between the U.S., the U.K., the Netherlands and Germany. It is one of several transatlantic communications cables. It was operated by American company Level 3 Communications and Irish company Tyco International, until their respective mergers in 2017 and 2016 with other companies.
It has landing points in:
Brookhaven Cable Station, Shirley, New York, United States
Land's End Cable Station, England, United Kingdom
Westerland Cable Station, Schleswig-Holstein, Germany
KPN Telecom cable station, Beverwijk, Netherlands
References
External links
Global Crossing Press Release
Global Crossing Completes Upgrade on Trans-Atlantic Route
VSNL Int. Map (Flash only)
Submarine communications cables in the North Atlantic Ocean
Submarine communications cables in the English Channel
Submarine communications cables in the North Sea
1999 establishments in England
1999 establishments in Germany
1999 establishments in the Netherlands
1999 establishments in New York (state)
|
https://en.wikipedia.org/wiki/KEGG
|
KEGG (Kyoto Encyclopedia of Genes and Genomes) is a collection of databases dealing with genomes, biological pathways, diseases, drugs, and chemical substances. KEGG is utilized for bioinformatics research and education, including data analysis in genomics, metagenomics, metabolomics and other omics studies, modeling and simulation in systems biology, and translational research in drug development.
The KEGG database project was initiated in 1995 by Minoru Kanehisa, professor at the Institute for Chemical Research, Kyoto University, under the then ongoing Japanese Human Genome Program. Foreseeing the need for a computerized resource that can be used for biological interpretation of genome sequence data, he started developing the KEGG PATHWAY database. It is a collection of manually drawn KEGG pathway maps representing experimental knowledge on metabolism and various other functions of the cell and the organism. Each pathway map contains a network of molecular interactions and reactions and is designed to link genes in the genome to gene products (mostly proteins) in the pathway. This has enabled the analysis called KEGG pathway mapping, whereby the gene content in the genome is compared with the KEGG PATHWAY database to examine which pathways and associated functions are likely to be encoded in the genome.
According to the developers, KEGG is a "computer representation" of the biological system. It integrates building blocks and wiring diagrams of the system—more specifically, genetic building blocks of genes and proteins, chemical building blocks of small molecules and reactions, and wiring diagrams of molecular interaction and reaction networks. This concept is realized in the following databases of KEGG, which are categorized into systems, genomic, chemical, and health information.
Systems information
PATHWAY: pathway maps for cellular and organismal functions
MODULE: modules or functional units of genes
BRITE: hierarchical classifications of biological entities
Genomic information
GENOME: complete genomes
GENES: genes and proteins in the complete genomes
ORTHOLOGY: ortholog groups of genes in the complete genomes
Chemical information
COMPOUND, GLYCAN: chemical compounds and glycans
REACTION, RPAIR, RCLASS: chemical reactions
ENZYME: enzyme nomenclature
Health information
DISEASE: human diseases
DRUG: approved drugs
ENVIRON: crude drugs and health-related substances
Databases
Systems information
The KEGG PATHWAY database, the wiring diagram database, is the core of the KEGG resource. It is a collection of pathway maps integrating many entities including genes, proteins, RNAs, chemical compounds, glycans, and chemical reactions, as well as disease genes and drug targets, which are stored as individual entries in the other databases of KEGG. The pathway maps are classified into the following sections:
Metabolism
Genetic information processing (transcription, translation, replication and repair, etc.)
Environmental infor
|
https://en.wikipedia.org/wiki/XSEL
|
XSEL may refer to:
Clipboard_(computing)#X Window_System
XSEL (expert system)
Xinhua Sports & Entertainment
|
https://en.wikipedia.org/wiki/Dipmeter%20Advisor
|
The Dipmeter Advisor was an early expert system developed in the 1980s by Schlumberger with the help of artificial-intelligence workers at MIT to aid in the analysis of data gathered during oil exploration. The Advisor was generally not merely an inference engine and a knowledge base of ~90 rules, but generally was a full-fledged workstation, running on one of Xerox's 1100 Dolphin Lisp machines (or in general on Xerox's "1100 Series Scientific Information Processors" line) and written in INTERLISP-D, with a pattern recognition layer which in turn fed a GUI menu-driven interface. It was developed by a number of people, including Reid G. Smith, James D. Baker, and Robert L. Young.
It was primarily influential not because of any great technical leaps, but rather because it was so successful for Schlumberger's oil divisions and because it was one of the few success stories of the AI bubble to receive wide publicity before the AI winter.
The AI rules of the Dipmeter Advisor were primarily derived from Al Gilreath, a Schlumberger interpretation engineer who developed the "red, green, blue" pattern method of dipmeter interpretation.
Unfortunately this method had limited application in more complex geological environments outside the Gulf Coast, and the Dipmeter Advisor was primarily used within Schlumberger as a graphical display tool to assist interpretation by trained geoscientists, rather than as an AI tool for use by novice interpreters. However, the tool pioneered a new approach to workstation-assisted graphical interpretation of geological information.
References
Other sources
The AI Business: The commercial uses of artificial intelligence, ed. Patrick Winston and Karen A. Prendergast.
"The Dipmeter Advisor: Interpretation of Geological Signals" – Randall Davis, Howard Austin, Ingrid Carlbom, Bud Frawley, Paul Pruchnik, Rich Sneiderman, J. A. Gilreath.
External links
"The design of the Dipmeter Advisor system" -(at the ACM's website)
Petroleum engineering
|
https://en.wikipedia.org/wiki/SIGMOBILE
|
SIGMOBILE is the Association for Computing Machinery's Special Interest Group on Mobility of Systems, Users, Data and Computing, which specializes in the field of mobile computing and wireless networks and wearable computing.
Conceived in early 1995, ACM SIGMOBILE started out as an organization that fostered research in the "field of mobility and tetherless ubiquitous connectivity". It was founded as a provisional SIG on June 13, 1996, gaining permanent status on October 12, 2000. On February 8, 2005, the SIGMOBILE Chapter Program was launched. The NTU Singapore chapter became the first Student Chapter, and the Sydney, Australia Chapter became the first Professional Chapter.
SIGMOBILE sponsors four annual international conferences: MobiCom, the International Conference on Mobile Computing and Networking; MobiHoc, the International Symposium on Mobile Ad Hoc Networking and Computing; MobiSys, the International Conference on Mobile Systems, Applications, and Services; and SenSys, the ACM Conference on Embedded Networked Sensor Systems. SIGMOBILE publishes a quarterly journal, Mobile Computing and Communications Review (MC2R), as well as the annual Proceedings of the conferences and many workshops sponsored by SIGMOBILE such as HotMobile, the International Workshop on Mobile Computing Systems and Applications.
External links
SIGMOBILE
MC2R
MobiCom
MobiHoc
MobiSys
SenSys
HotMobile
Association for Computing Machinery Special Interest Groups
|
https://en.wikipedia.org/wiki/International%20Conference%20on%20Mobile%20Computing%20and%20Networking
|
MobiCom, the International Conference on Mobile Computing and Networking, is a series of annual conferences sponsored by ACM SIGMOBILE dedicated to addressing the challenges in the areas of mobile computing and wireless and mobile networking. Although no rating system for computer networking conferences exists, MobiCom is generally considered to be the best conference in these areas, and it is the fifth highest-impact venue in all of Computer Science. The quality of papers published in this conference is very high. The acceptance rate of MobiCom typically around 10%, meaning that only one tenth of all submitted papers make it through the tough peer review filter.
According to SIGMOBILE, "the MobiCom conference series serves as the premier international forum addressing networks, systems, algorithms, and applications that support the symbiosis of mobile computers and wireless networks. MobiCom is a highly selective conference focusing on all issues in mobile computing and wireless and mobile networking at the link layer and above."
MobiCom Conferences have been held at the following locations:
MobiCom 2020, London, UK, 14-18 September 2020
MobiCom 2019, Los Cabos, Mexico, 21-25 October 2019
MobiCom 2018, New Delhi, India, 29 October-2 November 2018
MobiCom 2017, Snowbird, United States, 16-20 October 2017
MobiCom 2016, New York City, United States, 3–7 October 2016
MobiCom 2015, Paris, France, 7–11 September 2015
MobiCom 2014, Maui, Hawaii, United States, 7–11 September 2014
MobiCom 2013, Miami, Florida, United States, 30 September-4 October 2013
MobiCom 2012, Istanbul, Turkey, 22–26 August 2012
MobiCom 2011, Las Vegas, Nevada, United States, 19–23 September 2011
MobiCom 2010, Chicago, Illinois, United States, 20–24 September 2010
MobiCom 2009, Beijing, China, 20–25 September 2009
MobiCom 2008, San Francisco, California, United States, 13–19 September 2008
MobiCom 2007, Montreal, Quebec, Canada, 9–14 September 2007
MobiCom 2006, Los Angeles, California, United States, 23–29 September 2006
MobiCom 2005, Cologne, Germany, 28 August-2 September 2005
MobiCom 2004, Philadelphia, Pennsylvania, United States, 26 September-1 October 2004
MobiCom 2003, San Diego, California, United States, 14–19 September 2003
MobiCom 2002, Atlanta, Georgia, United States, 23–26 September 2002
MobiCom 2001, Rome, Italy, 16–21 July 2001
MobiCom 2000, Boston, Massachusetts, United States, 6–11 August 2000
MobiCom '99, Seattle, Washington, United States, 15–20 August 1999
MobiCom '98, Dallas, Texas, United States, 25–30 October 1998
MobiCom '97, Budapest, Hungary, 26–30 September 1997
MobiCom '96, Rye, New York, United States, 10–12 November 1996
MobiCom '95, Berkeley, California, United States, 13–15 November 1995
References
External links
SIGMOBILE
MobiCom
Computer networking conferences
|
https://en.wikipedia.org/wiki/Mobile%20Computing%20and%20Communications%20Review
|
Mobile Computing and Communications Review (MC2R) is a peer-reviewed quarterly scientific journal and newsletter published by the ACM SIGMOBILE covering mobile computing and networking. The purpose of the journal is the rapid publication of completed or in-progress technical work, including articles dealing with both research and practice. The journal also covers the status of major international standards in the field, and news of conferences and other events.
The current title is GetMobile
Indexing
As of 2017, it is not indexed by Scopus.
References
External links
Computer science journals
Association for Computing Machinery academic journals
Quarterly journals
English-language journals
Academic journals established in 1997
|
https://en.wikipedia.org/wiki/ATV%20%28Peruvian%20TV%20channel%29
|
ATV (known as Andina de Televisión) is a Peruvian television network founded in 1959 and relaunched in 1983. The network is the flagship property of Grupo ATV, one of Peru's largest media and broadcasting companies.
History
What is known today as ATV started in 1959 with Alfonso Pereyra as its first manager. After unsuccessful attempts to run it in the early 1970s and subsequent political turmoil in Peru, the station was closed; however, it became a TV Perú local station for the capital area.
By 1981, the channel was under new leadership. Carlos Tizón Pacheco, who financed the 1980 presidential campaign of President Fernando Belaúnde Terry, and then-president of local auto firm PROMASA, took over the channel frequency with his firm Andina de Radiodifusión, S.A., with test broadcasting commencing on May 9 the same year. After two years the channel returned to broadcasting on April 18, 1983, with President Terry presiding.
Since then the station has quickly gained a Peruvian audience by showing foreign films and broadcasting dramas, usually from Brazil. Until 1992 the station was known as Canal 9 (Channel 9), after its Lima, Peru VHF frequency, up until 1986 it had only been a local station, with national broadcasting starting only in 1987.
On January 14, 1992, due to the interconnection via satellite at the national level, the then denominated Channel 9 changes its name to ATV (abbreviation of Andina de Televisión).
The station is among the most watched television stations in Peru, often obtaining high ratings from past TV shows such as Magaly TV, a magazine and gossip show hosted by Peruvian journalist Magaly Medina.
ATV HD
In November 2006, the Peruvian Minister of Transports and Communications published in Peru's official newspaper "El Peruano" a decree concerning Digital terrestrial television. In April 2007, ATV started to test their HD channel with American ATSC system on channel 30. Then when Peru adopted ISDB-T years later, ATV began testing ISDB-T broadcasts in the capital in September 2009. ATV's HD signal was officially released on March 31, 2010, 1 day after TV Perú, being the first Peruvian private television network to do that.
Programming
ATV programming is varied and tries to attend to all agrees and cultural groups within Peru. Among their usual programming is a morning show called "Que Tal Mañana!" hosted by Laura Borlini and comedians Fernando Armas and Hernan Vidaurre; soap operas such as Pasion de Gavilanes, El Color del Pecado or El Cuerpo del Deseo; news shows which include the daily "Primera Noticia", ATV Noticias and El Deportivo and the Sunday's Dia D; folkloric shows like Canto Andino; a movie reviews show called De Pelicula; a toddler-oriented programme called "Tu Bebe". It also broadcasts WWE shows RAW and Smackdown and its monthly pay per views. In January 2013, they started to broadcast Pablo Escobar: El Patrón del Mal, followed by El Señor de los Cielos in 2014.
Sports coverage
Association Football
Baske
|
https://en.wikipedia.org/wiki/Linn%20LM-1
|
The Linn LM-1 Drum Computer is a drum machine manufactured by Linn Electronics and released in 1980. It was the first drum machine to use samples of acoustic drums, and one of the first programmable drum machines. Its designer, the American engineer Roger Linn, wanted a machine that would produce more realistic drum sounds and offer more than preset patterns.
The LM-1 became a staple of 1980s pop music and helped establish drum machines as credible tools. It appeared on records by artists including the Human League, Gary Numan, Mecano, Icehouse, Michael Jackson and particularly Prince. The LM-1 was succeeded in 1982 by the LinnDrum.
Development
The LM-1 was designed by the American engineer and guitarist Roger Linn in the late 1970s. Linn was dissatisfied with drum machines available at the time, such as the Roland CR-78, and wanted a machine that did not simply play preset patterns and "sound like crickets".
At the suggestion of the Toto keyboardist Steve Porcaro, Linn recorded samples of real drums to a computer chip. By the late 1970s, the technology required to store and play samples had become small and affordable enough to use in his drum machine. As the samples were stored as digital audio, they would not degrade like those of earlier devices, such as the Chamberlin Rhythmate, which used tape loops.
As per one 1985 interview, Linn confirmed the samples were mostly from session drummer Art Wood, with hand clap sounds from Tom Petty and the Heartbreakers. Linn introduced the shuffle feature after he discovered that his code would record his playing and play it back in perfect sixteenth notes, effectively correcting his timing. To implement swing beats, he delayed the playback of alternate sixteenth notes.
Linn showed his prototype to the pianist Leon Russell, who often used drum machines to record with. He immediately asked to purchase one, and used it to record drums for every track on his 1979 album Life and Love.
Sounds and features
The LM-1 features twelve 8-bit percussion samples, which can be individually tuned: kick, snare, hi-hat, cabasa, tambourine, two toms, two congas, cowbell, claves, and hand claps. Cymbal sounds were not included, due to the cost of long sound samples at the time. Each sound can be tuned, and has its own output to allow processing by external hardware. The LM-1 also introduced features such as "timing correct" (quantization) and "shuffle" (swing), and the ability to chain patterns.
Release
The LM-1 was announced in 1979 and released in 1980 as the first Linn Electronics product. It retailed for $5,500, making it affordable only to wealthy musicians and studios. A flyer for the machine promised that it would provide "real drums at your fingertips". Only 525 were built; Linn sold them by bringing prototypes to showbusiness parties. Early adopters included Peter Gabriel, Fleetwood Mac and Stevie Wonder.
The LM-1 became a staple of 1980s pop music, used by acts including the Human League, Gary Numan, M
|
https://en.wikipedia.org/wiki/Digimon%20Data%20Squad
|
Digimon Data Squad, known in Japan as , is the fifth anime television series in the Digimon franchise, produced by Toei Animation. The series aired in Japan on Fuji TV from April 2006 to March 2007. A standalone film based on the series was released on December 9, 2006.
An English-language version was produced by Studiopolis, in conjunction with Toei Animation USA and Disney Enterprises, Inc., and aired in North America on Toon Disney's Jetix block from October 2007 to November 2008.
Plot
The Digital Accident Tactics Squad (DATS) is a government organization established to maintain the peace between the Real World and the Digital World, transporting any Digimon back to the Digital World. Marcus, a junior high school student, becomes one of the members for the organization. He learns that the Digimon Merukimon is opposing mankind. However, the past is revealed that the scientist Akihiro Kurata was responsible for invading the Digital World. He gained the support of the government to oppose all Digimon species, claiming they were a threat to mankind. When Kurata uses Belphemon, Marcus defeats them. Before dying, Kurata uses a bomb to make the Digital World merge with the human world. While the Digimon BanchoLeomon prevents the collision, Marcus meets King Drasil (Yggdrasil), the supreme ruler who attempts to protect the Digital World by destroying mankind, since they cannot exist in both dimensions. Marcus learns that his father, Spencer, was trapped in the Digital World for ten years, because Drasil possessed Spencer's body and BanchoLeomon kept the latter's soul. After Marcus defeats Drasil, Spencer's soul returns to his body. With both worlds restored, all Digimon partners return to their own world. Five years later, Marcus and his friends embrace their future.
Characters
Main characters
Marcus is a 14-year old, 8th grader junior high school student. He does not wear any goggles unlike any main leader characters in any other Japanese Digimon anime. As a delinquent, he challenges himself to become the strongest street fighter. He is partnered with Agumon. Marcus also appeared in the third and final season of Digimon Fusion.
Partner of Marcus Damon. Has a very big appetite.
Thomas is a 14-year-old teen genius of Japanese and Austrian descent. He comes from a privileged background and his tendency to rely on carefully planned strategies causes him to clash with Marcus at times. He is partnered with Gaomon.
Partner of Thomas H. Norstein
Yoshi is an 18-year-old field agent at DATS. She is partnered with Lalamon.
Partner of Yoshi Fujieda
Keenan is a young boy who goes missing in the Digital World when a lab experiment had gone awry. He grew up with prejudice against humans. He is partnered with Falcomon.
Partner of Keenan Crier.
Recurring characters
Partner of Richard Sampson, later revealed to be Kentaurosmon of the Royal Knights.
He is partnered with Kamemon.
Mother of Marcus and Kristy Damon.
Younger sister of Marcus Damon. She is
|
https://en.wikipedia.org/wiki/Virginia%20Community%20College%20System
|
The Virginia Community College System (VCCS) oversees a network of 23 community colleges in Virginia, which serve residents of Virginia and provide two-year degrees and various specialty training and certifications. In 2006, the Virginia Community College System's annual enrollment rate topped 233,000 students. The VCCS also had an additional 170,000 students in workforce development services and noncredit courses.
In March 2022, the system hired Russell Kavalhuna as its next chancellor.
In June 2022, the board announced that Kavalhuna was no longer taking the job and the system was restarting the search for a new chancellor. Sharon Morrissey, previously the system's vice chancellor for academic and workforce programs, was appointed interim chancellor.
On January 4, 2023, Virginia's Community Colleges announced that David Doré would be the next chancellor of the system. He began his role on April 1, 2023.
Colleges
References
External links
Virginia Community College System home page
Public university systems in the United States
Universities and colleges established in 1966
|
https://en.wikipedia.org/wiki/VAX-11
|
The VAX-11 is a discontinued family of 32-bit superminicomputers, running the Virtual Address eXtension (VAX) instruction set architecture (ISA), developed and manufactured by Digital Equipment Corporation (DEC). Development began in 1976. In addition to being powerful machines in their own right, they also offer the additional ability to run user mode PDP-11 code (thus the -11 in VAX-11), offering an upward compatible path for existing customers.
The first machine in the series, the VAX-11/780, was announced in October 1977. Its former competitors in the minicomputer space, like Data General and Hewlett-Packard, were unable to successfully respond to the introduction and rapid update of the VAX design. DEC followed the VAX-11/780 with the lower-cost 11/750, and the even lower cost 11/730 and 11/725 models in 1982. More powerful models, initially known as the VAX-11/790 and VAX-11/795, were instead rebranded as the VAX 8600 series.
The VAX-11 line was discontinued in 1988, having been supplanted by the MicroVAX family on the low end, and the VAX 8000 family on the high end. The VAX-11/780 is historically one of the most successful and studied computers in history.
VAX-11/780
The VAX-11/780, code-named "Star", was introduced on 25 October 1977 at DEC's Annual Meeting of Shareholders. It is the first computer to implement the VAX architecture. The KA780 central processing unit (CPU) is built from Schottky transistor-transistor logic (TTL) devices and has a 200 ns cycle time (5 MHz) and a 2 KB cache. Memory and I/O are accessed via the Synchronous Backplane Interconnect (SBI).
The CPU is microprogrammed. The microcode is loaded at boot time from a 8” floppy disk controlled by a front end processor, a PDP-11/03, which was is used to run local and remote diagnostics.
The VAX-11/780 originally supported up to 8MB of memory through one or two MS780-C memory controllers, with each controller supporting between 128KB-4MB of memory. The later MS780-E memory controller supports 4MB-64MB of memory, allowing the VAX-11/780 to support up to a total of 128MB of memory. The KA780 has a 29-bit physical address space, allowing it to address a theoretical maximum of 512MB of memory. The memory is constructed from 4 or 16 kbit metal oxide semiconductor (MOS) RAM chips mounted on memory array cards. Each memory controller controls up to 16 array cards. The memory is protected by error correcting code (ECC).
The VAX-11/780 uses the Unibus and Massbus for I/O. Unibus is used for attaching lower-speed peripherals such as terminals and printers and Massbus for higher-speed disk and tape drives. Both buses are provided by adapters that interface the bus to the SBI. All systems come with one Unibus as standard, with up to four supported. Massbus is optional, with up to four supported. The VAX-11/780 also supports Computer Interconnect (CI), a proprietary network to attach disk drives and potentially share them with other VAX computers. This feature can connect VAX
|
https://en.wikipedia.org/wiki/William%20A.%20Martin
|
William Arthur Martin (1938-1981) was a computer scientist from Oklahoma City, Oklahoma.
After graduating from Northwest Classen High School, where he was a state wrestling champion, he attended MIT where he received a bachelor's degree (1960), master's (1962) and a Ph.D. (1967) in electrical engineering under supervision of Marvin Minsky, with a dissertation on Symbolic Mathematical Laboratory. He joined MIT as an assistant professor of electrical engineering in 1968 and was promoted to associate professor in 1972. In 1975, he received tenure. He held a joint appointment at the MIT Sloan School of Management.
His research pulled him towards the Project MAC, which became the Laboratory for Computer Science and the Artificial Intelligence Laboratory, where he researched expert systems.
Martin co-founded the Macsyma project in 1968 and directed it until 1971. Macsyma later became a successful commercial product and is the core of the free Maxima system.
Martin then worked in automatic programming, knowledge representation and natural language processing.
Bibliography
External links
Obituary from Tech Talk
References
1981 deaths
1938 births
People from Oklahoma City
American computer scientists
MIT Sloan School of Management faculty
Lisp (programming language) people
Natural language processing researchers
Computational linguistics researchers
|
https://en.wikipedia.org/wiki/Classic%20Text%20Adventure%20Masterpieces%20of%20Infocom
|
Classic Text Adventure Masterpieces of Infocom is a collection of 33 computer games from interactive fiction pioneer Infocom, and the top 6 winners of the 1995 Interactive Fiction Competition, released in 1996. All 39 games are combined on a single cross-platform CD-ROM, which also includes PDFs of all the Infocom games' instructions, maps, and hint booklets.
Infocom was closed in 1989 by its then-parent company Activision. Still holding the copyright to nearly all the past Infocom titles, Activision bundled them together in this collection, following up the earlier Lost Treasures of Infocom series. The Infocom games included are:
The Interactive Fiction Competition winners included are:
A Change in the Weather
The Magic Toyshop
The Mind Electric
The One That Got Away
Toonesia
Uncle Zebulon's Will
The collection includes all the contents of the two Lost Treasures of Infocom collections except for The Hitchhiker's Guide to the Galaxy and James Clavell's Shōgun. The rights to these two games, based on novels by Douglas Adams and James Clavell, respectively, had reverted to the novels' authors. Unlike the Lost Treasures collections, though, Masterpieces included the adult game Leather Goddesses of Phobos.
Reception
A reviewer for Next Generation scored the compilation a perfect five out of five stars. He praised the "functionally comprehensive" selection of Infocom games and the six Interactive Fiction Competition games, estimated the total playtime at 1,200 hours minimum, and said the gameplay "represents the pinnacle of well written, interactive fiction."
References
External links
Infocom games
1996 video games
DOS games
Classic Mac OS games
Activision video game compilations
Video games developed in the United States
|
https://en.wikipedia.org/wiki/CADUCEUS%20%28expert%20system%29
|
CADUCEUS was a medical expert system, an early type of recommender system - by Harry Pople of the University of Pittsburgh. Finished in the mid-1980s, it was built on the INTERNIST-1 algorithm (1972-1973). In its time, CADUCEUS was described as the "most knowledge-intensive expert system in existence". CADUCEUS eventually could diagnose up to 1000 different diseases.
The knowledge base was built on Pople's years of interviews with Dr. Jack Meyers, one of the top internal medicine diagnosticians and a professor at the University of Pittsburgh. Their motivation was to improve on MYCIN, a recommender which focused on blood-borne infectious bacteria and instead embrace all internal medicine.
While CADUCEUS worked using an inference engine similar to MYCIN's, it made a number of changes. As there can be a number of simultaneous diseases, and data is generally flawed and scarce it incorporated abductive reasoning to deal with the additional complexity of internal disease.
A disease can manifest a set of signs and symptoms, and a manifestation can, in turn, evoke a disease. Relationships between symptoms and diagnosis were ranked from 0 to 5. 5 indicated that the symptom is always associated with the disease, while 0 indicated that the association was ambiguous. An initial list of symptoms entered by the practitioner would be evaluated by the program to suggest possible diseases related to these combinations. These predictions were improved from INTERNIST-I by the use of constrictor relationships.
See also
Internist-I
References
Further reading
"Expert systems: perils and promise", D. G. Bobrow, S. Mittal, M. J. Stefik. Communications of the ACM, pp 880 - 894, issue 9, volume 29, (September 1986)
The AI Business: The commercial uses of artificial intelligence, ed. Patrick Winston and Karen A. Prendergast. 1984.
Medical expert systems
Expert_systems
Medical software
|
https://en.wikipedia.org/wiki/Mailgram
|
A mailgram is a type of telegraphic message which is delivered to the recipient by the
post office. Mailgrams are received at a mailgram center by telephone, teletypewriter service or computer. Each message is placed in a special envelope and dispatched to the local post office for delivery with the mail.
Western Union invented the mailgram in 1970 and registered the trademark "Mailgram". Service via Westar, Western Union's own communications satellite, was introduced in 1974.
The advantage of mailgrams over postal mail is speed and verifiability of transmission. In the late 20th century they were widely used in official notifications and legal transactions. Their advantage over full-rate telegrams was lower cost while still maintaining the look and feel of an important telegram. The mailgram quickly became a widely used medium for business-to-consumer communications.
Although iTelegram still provides a mailgram service in the United States, Western Union discontinued all telegram messaging, including Mailgram, in 2006.
References
External links
iTelegram Mailgram description
Telegrams
History of telecommunications
Western Union
|
https://en.wikipedia.org/wiki/Granville%20Technology%20Group
|
Granville Technology Group Ltd was a British computer retailer and manufacturer based in Simonstone, near Burnley, Lancashire, marketing its products under the brand names Time, Tiny, Colossus, Omega and MJN.
It sold mainly through mail order, though late in its life, the firm added a chain of shops in the United Kingdom that traded as The Computer Shop, and rapidly grew to over 300 stores. The main competitors were PC World, Comet, and Maplin.
Granville Technology Group had 3 manufacturing companies but operated in the same place. The companies were called VMT, GTG and OMT all operated under Granville Technology Group Limited as subsidiaries. VMT was the manufacturing department and GTG was the office part of Granville Technology Group.
History
Formerly known as Time Group, the company was formed in 1994, by Tahir Mohsan.
The manufacturing unit was located at Time Technology Park, in Simonstone. The company produced computers under the Tiny and Time Computers brands, although tracing the ownership of these brands later proved difficult for administrators Grant Thornton due to the group's convoluted and opaque ownership structure.
In the year ending June 2003, the group made profits of £2.5m before tax with a turnover of £207m,. The company went into receivership on 27 July 2005, due to the fall in demand for personal computers. That month, it employed 1,600 people, and was one of the largest retailers of computers in the United Kingdom.
Time UK
Time UK (also known as Time Computers) was the main supplier and manufacturer for GTG. Their products included desktop computers, notebooks, and flat screen televisions. The company supported consumers who purchased Time products from Granville Technology Group Ltd. The company's manufacturing plant and headquarter was based at Simonstone, Lancashire, in the private industrial park, the Time Technology Park, named after its brand.
With a turnover of £750 million during the 1990s, the firm became Britain's largest computer manufacturer, by establishing its market in the United Kingdom, Middle East, and the Far East. It was selling computers through retailers, and a chain of stores, The Computer Shop, which was established by Granville Technology Group.
In 1999, Time offered a "free PC" where customers could obtain a Windows 98 PC for no upfront cost, but were required to sign up to Time's internet service provider for 24 months.
Mohsan subdivided the company into Time Computers and Time Computer Systems, in order to segregate manufacturing and retailing. The company went into administration on 27 July 2005. In March 2006, the brand was rebranded as Time UK.
Time UK television commercials used Leonard Nimoy, of Star Trek fame, who reprised his Mr. Spock character. In August 2000, Time UK handed its advertising account to HHCL & Partners, which saw the end of the adverts featuring Leonard Nimoy.
Lawsuits
In 2000 Time UK sued IBM over supplying Time UK with faulty components but eventually Time UK
|
https://en.wikipedia.org/wiki/CDK%20%28programming%20library%29
|
CDK is a library written in C that provides a collection of widgets for text user interfaces (TUI) development. The widgets wrap ncurses functionality to make writing full screen curses programs faster. Perl and Python bindings are also available.
There are two versions of the library. It was originally written by Mike Glover, introduced as version 4.6 in comp.sources.unix. The other version was extended beginning in May 1999 by Thomas Dickey.
Programs that use CDK
Password Management System A console based password management program
See also
Dialog (software)
References
External links
Application programming interfaces
Free software that uses ncurses
Software using the BSD license
Text user interface libraries
Widget toolkits
|
https://en.wikipedia.org/wiki/Pendatang%20asing
|
"Pendatang asing", "orang pendatang" or "pendatang" is a common Malay phrase used to refer to foreigners or immigrants; "pendatang asing" literally means "foreign comer" or "foreign immigrant". Although most frequently used to refer to foreign immigrants, especially illegal immigrants, pendatang asing has been used by some politicians in Malaysia as pejorative way of addressing non-Bumiputera Malaysians.
Offensive usage
In a Malaysian political context, it is commonly used as a pejorative way of addressing the ethnic Chinese and Indians, who are not Bumiputera of Malaysia.
Pre-independence
During the pre-Independence period, some Straits Chinese began taking an active interest in local politics, especially in Penang, where there was an active Chinese secessionist movement. They identified themselves more with the British than the Malays and were especially angered by references to them as pendatang asing ("aliens"). They avoided both the United Malays National Organisation (UMNO) and the Malaysian Chinese Association (MCA), believing that while UMNO and the Malay extremists were intent on extending Malay privileges and restricting Chinese rights, the MCA was too "selfish", and could not be relied on to protect their interests.
They had already raised their ire in the late 1940s, when the government proposed to amend the Banishment Ordinance — which allowed for the exile of Malayans "implicated in acts of violence" — to permit those born in the Straits Settlements to be banished to their ancestral homeland. This was a revolting idea for most of the Straits Chinese.
They were also uncomfortable about the merger of the Straits Settlements with Malaya, as they did not feel a sense of belonging to what they considered a "Malaya for the Malays", where they were not considered bumiputra ("sons of the soil"). One Straits Chinese leader indignantly declared, "I can claim to be more anak Pulau Pinang [a son of Penang] than 99 per cent of the Malays living here today." The secessionist movement eventually petered out, however, because of the government's stout refusal to entertain the idea of Penang seceding from the Federation.
After Independence
The phrase pendatang asing has strong connotations, and is often used in heated political situations. One such example was the May 13 Incident, where racial rioting in 1969 was triggered by a trading of political insults.
Another example is the prelude to the Ops Lallang in 1987 and the 1988 Malaysian constitutional crisis. In November 1986, MCA Selangor of which MCA's deputy president Lee Kim Sai was its head, passed a resolution in its annual convention to make it an offence to call any of the three major races immigrants or pendatang. The resolution, which stated that Malaysia's three major races originated from other countries and that none of them should brand the others as immigrants and claim themselves to be natives. This was interpreted as challenging the bumiputra status of the Malays, and led
|
https://en.wikipedia.org/wiki/OBD-II%20PIDs
|
OBD-II PIDs (On-board diagnostics Parameter IDs) are codes used to request data from a vehicle, used as a diagnostic tool.
SAE standard J1979 defines many OBD-II PIDs. All on-road vehicles and trucks sold in North America are required to support a subset of these codes, primarily for state mandated emissions inspections. Manufacturers also define additional PIDs specific to their vehicles. Though not mandated, many motorcycles also support OBD-II PIDs.
In 1996, light duty vehicles (less than ) were the first to be mandated followed by medium duty vehicles () in 2005. They are both required to be accessed through a standardized data link connector defined by SAE J1962.
Heavy duty vehicles (greater than ) made after 2010, for sale in the US are allowed to support OBD-II diagnostics through SAE standard J1939-13 (a round diagnostic connector) according to CARB in title 13 CCR 1971.1. Some heavy duty trucks in North America use the SAE J1962 OBD-II diagnostic connector that is common with passenger cars, notably Mack and Volvo Trucks, however they use 29 bit CAN identifiers (unlike 11 bit headers used by passenger cars).
Services / Modes
There are 10 diagnostic services described in the latest OBD-II standard SAE J1979. Before 2002, J1979 referred to these services as "modes". They are as follows:
Vehicle manufacturers are not required to support all services. Each manufacturer may define additional services above #9 (e.g.: service 22 as defined by SAE J2190 for Ford/GM, service 21 for Toyota) for other information e.g. the voltage of the traction battery in a hybrid electric vehicle (HEV).
The nonOBD UDS services start at 0x10 to avoid overlap of ID-range.
Standard PIDs
The table below shows the standard OBD-II PIDs as defined by SAE J1979. The expected response for each PID is given, along with information on how to translate the response into meaningful data. Again, not all vehicles will support all PIDs and there can be manufacturer-defined custom PIDs that are not defined in the OBD-II standard.
Note that services 01 and 02 are basically identical, except that service 01 provides current information, whereas service 02 provides a snapshot of the same data taken at the point when the last diagnostic trouble code was set. The exceptions are PID 01, which is only available in service 01, and PID 02, which is only available in service 02. If service 02 PID 02 returns zero, then there is no snapshot and all other service 02 data is meaningless.
When using Bit-Encoded-Notation, quantities like C4 means bit 4 from data byte C. Each bit is numbered from 0 to 7, so 7 is the most significant bit and 0 is the least significant bit (See below).
Service - Show current data
Service - Show freeze frame data
Service accepts the same PIDs as service , with the same meaning, but information given is from when the freeze frame was created. Note that PID is used to obtain the DTC that triggered the freeze frame.
You have to send the frame number
|
https://en.wikipedia.org/wiki/Comparison%20of%20mail%20servers
|
The comparison of mail servers covers mail transfer agents (MTAs), mail delivery agents, and other computer software that provide e-mail services.
Unix-based mail servers are built using a number of components because a Unix-style environment is, by default, a toolbox operating system. A stock Unix-like server already has internal mail; more traditional ones also come with a full MTA already part of the standard installation. To allow the server to send external emails, an MTA such as Sendmail, Postfix, or Exim is required. Mail is read either through direct access (shell login) or mailbox protocols like POP and IMAP. Unix-based MTA software largely acts to enhance or replace the respective system's native MTA.
Microsoft Windows servers do not natively implement e-mail, thus Windows-based MTAs have to supply all the necessary aspects of e-mail-related functionality.
Feature comparison
Authentication
Antispam features
See also
Comparison of email clients
List of email archive software
List of mail server software
References
Message transfer agents
Mail servers
|
https://en.wikipedia.org/wiki/850th%20Space%20Communications%20Squadron
|
The 850th Space Communications Squadron is an inactive United States Air Force unit. It was a component of the 50th Network Operations Group, 50th Space Wing, Schriever Air Force Base, Colorado. The squadron was activated 1 December 1997 as the 850th Communications Squadron and redesignated the 850th Space Communications Squadron on 1 October 2002. It was inactivated on 31 January 2006, most of its functions and personnel having been incorporated into the 50th Space Communications Squadron.
Mission
The mission of the 850th Space Communications Squadron was to plan, integrate, and maintain command and control, and common user communications and computer systems for satellite navigation, communications, missile warning and space surveillance worldwide.
The squadron was responsible for logistics management, systems maintenance, and integrity of satellite command, control, communications, and computer systems for the Air Force Space Command mission including the $6.2 billion Air Force Satellite Control Network, supporting over 140 Department of Defense satellites. The squadron also provided anomaly resolution, systems integration and configuration control supporting AFSPC, USSTRATCOM, the Secretary of Defense, and the President.
Personnel
Shortly before its inactivation in early 2006, there were approximately 59 military and 22 DoD civilian personnel in the squadron who, along with contractors, provided global sustainment and maintenance to the high frontier in support of the 50th Space Wing's mission.
Lineage
Constituted as the 850th Communications Squadron
Activated on 1 December 1997
Redesignated 850th Space Communications Squadron on 1 October 2002
Inactivated on 31 January 2006
Assignments
50th Communications Group, 1 December 1997
50th Maintenance Group 1 October 2002
50th Communications Group (later 50th Network Operations Group), 1 June 2003 – 31 January 2006
Stations
Schriever Air Force Base, Colorado, 1 December 1997 – 31 January 2006
See also
List of United States Air Force communications squadrons
References
Notes
Communications squadrons of the United States Air Force
Space squadrons of the United States Air Force
Military units and formations in Colorado
|
https://en.wikipedia.org/wiki/Victor%20Shoup
|
Victor Shoup is a computer scientist and mathematician. He obtained a PhD in computer science from the University of Wisconsin–Madison in 1989, and he did his undergraduate work at the University of Wisconsin-Eau Claire. He is a professor at the Courant Institute of Mathematical Sciences at New York University, focusing on algorithm and cryptography courses. He is currently a Principal Research Scientist at DFINITY and has held positions at AT&T Bell Labs, the University of Toronto, Saarland University, and the IBM Zurich Research Laboratory.
Shoup's main research interests and contributions are computer algorithms relating to number theory, algebra, and cryptography. His contributions to these fields include:
The Cramer–Shoup cryptosystem asymmetric encryption algorithm bears his name.
His freely available (under the terms of the GNU GPL) C++ library of number theory algorithms, NTL, is widely used and well regarded for its high performance.
He is the author of a widely used textbook, A Computational Introduction to Number Theory and Algebra, which is freely available online.
He has proved (while at IBM Zurich) a lower bound to the computational complexity for solving the discrete logarithm problem in the generic group model. This is a problem in computational group theory which is of considerable importance to public-key cryptography.
He acted as editor for the ISO 18033-2 standard for public-key cryptography.
One of the primary developers of HElib.
Bibliography
A Computational Introduction to Number Theory and Algebra, 2nd Edition, 2009, Cambridge University Press, ,
References
Courant Institute of Mathematical Sciences faculty
Year of birth missing (living people)
University of Wisconsin–Madison College of Letters and Science alumni
American computer scientists
Theoretical computer scientists
Modern cryptographers
Public-key cryptographers
20th-century American mathematicians
21st-century American mathematicians
Number theorists
IBM employees
Living people
University of Wisconsin–Eau Claire alumni
American cryptographers
|
https://en.wikipedia.org/wiki/Look-ahead%20%28backtracking%29
|
In backtracking algorithms, look ahead is the generic term for a subprocedure that attempts to foresee the effects of choosing a branching variable to evaluate one of its values. The two main aims of look-ahead are to choose a variable to evaluate next and to choose the order of values to assign to it.
Constraint satisfaction
In a general constraint satisfaction problem, every variable can take a value in a domain. A backtracking algorithm therefore iteratively chooses a variable and tests each of its possible values; for each value the algorithm is recursively run. Look ahead is used to check the effects of choosing a given variable to evaluate or to decide the order of values to give to it.
Look ahead techniques
The simpler technique for evaluating the effect of a specific assignment to a variable is called forward checking. Given the current partial solution and a candidate assignment to evaluate, it checks whether another variable can take a consistent value. In other words, it first extends the current partial solution with the tentative value for the considered variable; it then considers every other variable that is still unassigned, and checks whether there exists an evaluation of that is consistent with the extended partial solution. More generally, forward checking determines the values for that are consistent with the extended assignment.
A look-ahead technique that may be more time-consuming but may produce better results is based on arc consistency. Namely, given a partial solution extended with a value for a new variable, it enforces arc consistency for all unassigned variables. In other words, for any unassigned variables, the values that cannot consistently be extended to another variable are removed. The difference between forward checking and arc consistency is that the former only checks a single unassigned variable at time for consistency, while the second also checks pairs of unassigned variables for mutual consistency. The most common way of using look-ahead for solving constraint satisfaction problems is the maintaining arc-consistency (MAC) algorithm.
Two other methods involving arc consistency are full and partial look ahead. They enforce arc consistency, but not for every pair of variables. In particular, full look considers every pair of unassigned variables , and enforces arc consistency between them. This is different than enforcing global arc consistency, which may possibly require a pair of variables to be reconsidered more than once. Instead, once full look ahead has enforced arc consistency between a pair of variables, the pair is not considered any more. Partial look ahead is similar, but a given order of variables is considered, and arc consistency is only enforced once for every pair with .
Look ahead based on arc consistency can also be extended to work with path consistency and general i-consistency or relational arc consistency.
Use of look ahead
The results of look ahead are used to decide the ne
|
https://en.wikipedia.org/wiki/DCIM
|
DCIM may refer to:
DCIM (directory) (digital camera images), a directory name for digital cameras
Data center infrastructure management, the union of information technology and data center facility management disciplines
|
https://en.wikipedia.org/wiki/Adventure%20Gamers
|
Adventure Gamers is a computer game website created by Marek Bronstring in March 1998 dedicated to the genre of adventure games. It publishes reviews and previews of adventure games, as well as opinion articles and interviews with game designers.
The site's reviews have been quoted on many adventure game box covers, and it is listed as a trusted reviewer on CNET's Metacritic and GameRankings. Adventure Gamers was also referenced in the print book Rogue Leaders: The Story of LucasArts.
Adventure Gamers is respected by developers of adventure games. Ragnar Tornquist, the creator of the adventure games The Longest Journey and Dreamfall: The Longest Journey, has stated that the reviews on Adventure Gamers are "very important to [him]". In addition, Straandlooper, the developer of Hector: Badge of Carnage, called Adventure Gamers "one of the foremost and widely respected websites about adventure games".
The Aggie Awards
Every year starting from 2009, Adventure Gamers hosts the Aggie Awards, which award adventure games of the previous year for their merits in several categories from concept, art direction, and story, to the adventure game of the year. The categories are divided in choices made by website staff and by readers. These awards are held in high regard by the companies who receive them, as they are featured on official covers of those games.
See also
Just Adventure
Notes
References
External links
Video game news websites
Internet properties established in 1998
Video game genre websites
|
https://en.wikipedia.org/wiki/IEEE%20802.1ag
|
IEEE 802.1ag is an amendment to the IEEE 802.1Q networking standard which introduces Connectivity Fault Management (CFM). This defines protocols and practices for the operations, administration, and maintenance (OAM) of paths through 802.1 bridges and local area networks (LANs). The final version was approved by the IEEE in 2007.
IEEE 802.1ag is a subset of the earlier ITU-T Recommendation Y.1731, which additionally addresses performance monitoring.
The standard:
Defines maintenance domains, their constituent maintenance points, and the managed objects required to create and administrate them
Defines the relationship between maintenance domains and the services offered by VLAN-aware bridges and provider bridges
Describes the protocols and procedures used by maintenance points to maintain and diagnose connectivity faults within a maintenance domain;
Provides means for future expansion of the capabilities of maintenance points and their protocols
Definitions
The document defines various terms:
Maintenance Domain (MD) Maintenance Domains are management space on a network, typically owned and operated by a single entity. MDs are configured with Names and Levels, where the eight levels range from 0 to 7. A hierarchical relationship exists between domains based on levels. The larger the domain, the higher the level value. Recommended values of levels are as follows:
Customer Domain: Largest (e.g., 7)
Provider Domain: In between (e.g., 3)
Operator Domain: Smallest (e.g., 1)
Maintenance Association (MA) Defined as a "set of MEPs, all of which are configured with the same MAID (Maintenance Association Identifier) and MD Level, each of which is configured with a MEPID unique within that MAID and MD Level, and all of which are configured with the complete list of MEPIDs."
Maintenance association End Point (MEP) Points at the edge of the domain, define the boundary for the domain. A MEP sends and receives CFM frames through the relay function, drops all CFM frames of its level or lower that come from the wire side.
Maintenance domain Intermediate Point (MIP) Points internal to a domain, not at the boundary. CFM frames received from MEPs and other MIPs are cataloged and forwarded, all CFM frames at a lower level are stopped and dropped. MIPs are passive points, respond only when triggered by CFM trace route and loop-back messages.
CFM Protocols
IEEE 802.1ag Ethernet CFM (Connectivity Fault Management) protocols comprise three protocols that work together to help administrators debug Ethernet networks. They are:
Continuity Check Protocol (CCP) "Heartbeating" messages for CFM. The Continuity Check Message (CCM) provides a means to detect connectivity failures in an MA. CCMs are multicast messages. CCMs are confined to a domain (MD). These messages are unidirectional and do not solicit a response. Each MEP transmits a periodic multicast Continuity Check Message inward towards the other MEPs.
Link Trace (LT) Link Trace messages otherwise known as Mac
|
https://en.wikipedia.org/wiki/File%20Compare
|
In computing, fc (File Compare) is a command-line program in DOS, IBM OS/2 and Microsoft Windows operating systems, that compares multiple files and outputs the differences between them. It is similar to the Unix commands comm, cmp and diff.
History
The fc command has been included in Microsoft operating systems since MS-DOS 2.11 (e.g. on the 1984/85 DEC Rainbow release) and is included in all versions of Microsoft Windows. fc has also been included in IBM OS/2 Version 2.0.
DR DOS 6.0 includes an implementation of the command.
The command is also available in FreeDOS. This implementation is licensed under the GPLv2+.
Functionality
fc can compare text files as well as binary files. The latest versions can compare ASCII or Unicode text. The result of comparisons are output to the standard output. The output of fc is intended primarily to be human readable and may be difficult to use in other programs.
See also
Data comparison
comp (command)
List of DOS commands
References
Further reading
External links
fc | Microsoft Docs
Open source FC implementation that comes with MS-DOS v2.0
DOS software
External DOS commands
File comparison tools
Microsoft free software
OS/2 commands
Windows administration
|
https://en.wikipedia.org/wiki/File%20comparison
|
In computing, file comparison is the calculation and display of the differences and similarities between data objects, typically text files such as source code.
The methods, implementations, and results are typically called a diff, after the Unix diff utility. The output may be presented in a graphical user interface or used as part of larger tasks in networks, file systems, or revision control.
Some widely used file comparison programs are diff, cmp, FileMerge, WinMerge, Beyond Compare, and File Compare.
Many text editors and word processors perform file comparison to highlight the changes to a file or document.
Method types
Most file comparison tools find the longest common subsequence between two files. Any data not in the longest common subsequence is presented as a change or an insertion or a deletion.
In 1978, Paul Heckel published an algorithm that identifies most moved blocks of text. This is used in the IBM History Flow tool. Other file comparison programs find block moves.
Some specialized file comparison tools find the longest increasing subsequence between two files. The rsync protocol uses a rolling hash function to compare two files on two distant computers with low communication overhead.
File comparison in word processors is typically at the word level, while comparison in most programming tools is at the line level. Byte or character-level comparison is useful in some specialized applications.
Display
Display of file comparison varies, with the main approaches being either showing two files side-by-side, or showing a single file, with markup showing the changes from one file to the other. In either case, particularly side-by-side viewing, code folding or text folding may be used to hide unchanged portions of the file, only showing the changed portions.
Reasoning
Comparison tools are used for various reasons. When one wishes to compare binary files, byte-level is probably best. But if one wishes to compare text files or computer programs, a side-by-side visual comparison is usually best. This gives the user the chance to decide which file is the preferred one to retain, if the files should be merged to create one containing all the differences, or perhaps to keep them both as-is for later reference, through some form of "versioning" control.
File comparison is an important, and most likely integral, part of file synchronization and backup. In backup methodologies, the issue of data corruption is an important one. Corruption occurs without warning and without one's knowledge; at least usually until too late to recover the missing parts. Usually, the only way to know for sure if a file has become corrupted is when it is next used or opened. Barring that, one must use a comparison tool to at least recognize that a difference has occurred. Therefore, all file sync or backup programs must include file comparison if these programs are to be actually useful and trusted.
Historical uses
Prior to file comparison, machi
|
https://en.wikipedia.org/wiki/Community%20empowerment%20network
|
In the United Kingdom, community empowerment networks (CENs) are networks of a collection of local community, voluntary and third sector organisations and groups, set up by the central government as part of an initiative to foster community involvement in regeneration at a local level. They get together periodically to discuss issues of concern to them in relation to regeneration plans. CENs exist locally across the UK. A CEN forms an important but small part of a Local Strategic Partnership.
Statement from the Improvement and Development Agency's Website idea statement:
See also
Community Empowerment Network
References
Community development
Community empowerment
|
https://en.wikipedia.org/wiki/On-line%20Debugging%20Tool
|
On-line Debugging Tool (ODT) is a family of several debugger programs developed for Digital Equipment Corporation (DEC) hardware. Various operating systems including OS/8, RT-11, RSX-11, and RSTS/E implement ODT, as did the firmware console of all of the LSI-11-family processors including the 11/03, 11/23/24, 11/53, 11/73, and 11/83/84.
The debugger allows access to memory using octal addresses and data. Within the software systems, the debugger accesses the process's address space. DEC's line of PDP-11 processors do not implement virtual memory, from an operating system perspective, but instead work in a fixed address space, which is mapped into a unified view of the program's address space, using an Active Page Register (APR). An APR can map the program's RAM in increments of 4K 16-bit words, to a maximum of 32K. In other words, an APR can map 8 segments of RAM, each limited to 4K. Because of this structure, an APR is able to map a maximum of 32K 16-bit words in RAM. In the case of RSTS/E, this usually means that a Runtime System, or RTS, maps to the upper portion of the address space and a user program resides in the lower portion of the address space. The RTS provides code to support access to the Operating System, on behalf of the user program; the RTS itself stores any of its non-static data in the address space of the user program, because the RTS is typically read-only. The operating system loads a single copy of the RTS and this is mapped to any user program that requires that RTS. The APR is set to map the RTS into the upper portion of the program's address space, in 4 KiB increments. So the BASIC Plus RTS (for the Basic+ Programming Language) typically maps 16 KiB to itself and the user program is mapped, in 4 KiB increments, in the lower 16 KiB. The RT11 RTS occupies 4 KiB, so a user program, like the RT11-based Peripheral Interchange Program (PIP), can expand to a maximum of 28 KiB.
ODT can be used to "patch" binary modules, like an RTS, without requiring the re-compilation of the binary's source.
The firmware console implementation accesses physical memory.
ODT is a non-symbolic debugger and implements similar functionality to Advanced Debugger (adb) on Unix systems.
Console ODT
Console ODT replaces the "lights and switches" console of many of the earlier processors.
Access to console ODT is obtained either from power up (with appropriate power up mode selected), by the execution of a HALT instruction in kernel mode, or by use of the front panel halt switch or button.
Example
@1000/ xxxxxx 112737<LF>
001002 xxxxxx 101<LF>
001004 xxxxxx 177566<LF>
001006 xxxxxx 137<LF>
001010 xxxxxx 1000<CR>
>R7/xxxxxx 1000<CR>
>RS/340
This deposits the program
MOVB 'A', @#177566 ; Move 'A' into console transmit register
JMP @#1000 ; Jump back to start
The deposit to the PC [Program Counter], sets the PC to the start of the program and the deposit to the PSW [Program Status Word] locks out interrupts.
The effect of thi
|
https://en.wikipedia.org/wiki/Computational%20scientist
|
A computational scientist is a person skilled in scientific computing. This person is usually a scientist, a statistician, an applied mathematician, or an engineer who applies high-performance computing and sometimes cloud computing in different ways to advance the state-of-the-art in their respective applied discipline; physics, chemistry, social sciences and so forth. Thus scientific computing has increasingly influenced many areas such as economics, biology, law, and medicine to name a few. Because a computational scientist's work is generally applied to science and other disciplines, they are not necessarily trained in computer science specifically, though concepts of computer science are often used. Computational scientists are typically researchers at academic universities, national labs, or tech companies.
One of the tasks of a computational scientist is to analyze large amounts of data, often from astrophysics or related fields, as these can often generate huge amounts of data. Computational scientists often have to clean up and calibrate the data to a usable form for an effective analysis. Computational scientists are also tasked with creating artificial data through computer models and simulations.
References
Computational science
Computer occupations
Science occupations
Computational fields of study
|
https://en.wikipedia.org/wiki/Longest%20repeated%20substring%20problem
|
In computer science, the longest repeated substring problem is the problem of finding the longest substring of a string that occurs at least twice.
This problem can be solved in linear time and space by building a suffix tree for the string (with a special end-of-string symbol like '$' appended), and finding the deepest internal node in the tree with more than one child. Depth is measured by the number of characters traversed from the root. The string spelled by the edges from the root to such a node is a longest repeated substring. The problem of finding the longest substring with at least occurrences can be solved by first preprocessing the tree to count the number of leaf descendants for each internal node, and then finding the deepest node with at least leaf descendants. To avoid overlapping repeats, you can check that the list of suffix lengths has no consecutive elements with less than prefix-length difference.
In the figure with the string "ATCGATCGA$", the longest substring that repeats at least twice is "ATCGA".
External links
C implementation of Longest Repeated Substring using Suffix Tree
Online Demo: Longest Repeated Substring
Problems on strings
Formal languages
Combinatorics
|
https://en.wikipedia.org/wiki/LZWL
|
LZWL is a syllable-based variant of the character-based LZW compression algorithm that can work with syllables obtained by all algorithms of decomposition into syllables. The algorithm can be used for words too.
Algorithm
Algorithm LZWL can work with syllables obtained by all algorithms of decomposition into syllables. This algorithm can be used for words too.
In the initialization step, the dictionary is filled up with all characters from the alphabet. In each next step, it is searched for the maximal string , which is from the dictionary and matches the prefix of the still non-coded part of the input. The number of phrase is sent to the output. A new phrase is added to the dictionary. This phrase is created by concatenation of string S and the character that follows in the file. The actual input position is moved forward by the length of .
Decoding has only one situation for solving. We can receive the number of phrase, which is not from the dictionary. In this case, that phrase can be created by the concatenation of the last added phrase with its first character.
The syllable-based version uses a list of syllables as an alphabet. In the initialization step, the empty syllable and small syllables from a database of frequent syllables are added to the dictionary. Finding string and coding its number is similar to the character-based version, except that string is a string of syllables. The number of phrase is encoded to the output. The string can be the empty syllable.
If is the empty syllable, then we must get from the file one syllable and encode by methods for coding new syllables. Syllable is added to the dictionary. The position in the file is moved forward by the length of . In the case when S is the empty syllable, the input position is moved forward by the length of .
In adding a phrase to the dictionary there is a difference in the character-based version. The phrase from the next step will be called S1. If and S1 are both non-empty syllables, then a new phrase is added to the dictionary. The new phrase is created by the concatenation of S1 with the first syllable of . This solution has two advantages: The first is that strings are not created from syllables that appear only once. The second advantage is that we cannot receive the decoder number of the phrase that is not from the dictionary.
References
External links
Detailed description
Lossless compression algorithms
|
https://en.wikipedia.org/wiki/Truthy
|
Truthy may refer to:
Truthiness
The truth value of an expression when evaluated as a Boolean data type, for example in
|
https://en.wikipedia.org/wiki/WHP-TV
|
WHP-TV (channel 21) is a television station licensed to Harrisburg, Pennsylvania, United States, serving the Susquehanna Valley region as an affiliate of CBS, MyNetworkTV, and The CW. Owned by the Sinclair Broadcast Group, the station has studios on North 6th Street in the Uptown section of Harrisburg, with the building bisected by the city line for Harrisburg and Susquehanna Township. Through a channel sharing agreement with Lancaster-licensed TBD affiliate WXBU (channel 15, owned by Sinclair partner company Howard Stirk Holdings), the two stations transmit using WHP-TV's spectrum from an antenna on a ridge north of Linglestown Road in Middle Paxton Township (it is co-located with WITF-TV and is distinguishable as the unlit red and white tower; WITF's tower is unpainted and flashes strobes at all times).
History
WHP-TV first signed on the air on July 4, 1953. It was owned by Commonwealth Communications, alongside WHP radio (580 AM and 97.3 FM, now WRVV). The station originally operated from studios located on Locust Street in Harrisburg. It has always been a primary CBS affiliate, though it also carried programming from the DuMont Television Network. The station lost DuMont when that network folded in 1956.
WHP-TV moved from channel 55 to UHF channel 21 in 1961. In 1963, the Federal Communications Commission (FCC) collapsed south central Pennsylvania, previously split between the Harrisburg–York and Lancaster markets, into a single market. Soon afterward, WHP-TV began to share CBS programming with WLYH-TV in Lebanon (channel 15, now WXBU) in Lebanon and WSBA-TV (channel 43) in York as part of the Keystone Network. This arrangement was necessary in the days before cable television, since the newly created market was not only one of the largest east of the Mississippi, but was very mountainous. UHF signals have never traveled very far across large areas or in rugged terrain. Between them, the three stations had about 55 percent signal overlap. WHP-TV began airing separate local programming during off-network hours, while WLYH and WSBA-TV simulcast for virtually the entire broadcast day (though they aired separate newscasts). WLYH and WSBA-TV ran about three-quarters of the CBS schedule, compared to separately programmed and owned WHP. All three stations preempted moderate amounts of CBS programming, but any shows preempted by WLYH and WSBA-TV ran on WHP while shows preempted by WHP would run on WLYH and WSBA-TV. In 1975, the station relocated from its original studio facility on Locust Street to its current location on North 6th Street.
In 1983, Susquehanna Radio Corporation sold WSBA to Mohawk Broadcasting, who broke channel 43 off from the Keystone Network and relaunched it as independent station WPMT (now a Fox affiliate). WHP-TV and WLYH continued as CBS affiliates, now with approximately 75 percent signal overlap. Both stations also stopped the arrangement in which one station ran whatever CBS shows the other declined to air, though they c
|
https://en.wikipedia.org/wiki/AskMoses.com
|
AskMoses.com is a defunct website affiliated with the Chabad Orthodox Jewish movement. Via the site, users could query a database of Judaism-related topics or live chat with a rabbi.
The site's database included topics ranging from Israeli history to sexual mores from an Orthodox Jewish-perspective. Live chats were available in English, Russian, Spanish, French, and Hebrew. The website claimed in 2009 that 30% of visitors were non-Jewish, and most of the Jewish visitors were secular.
In 2001, the website featured 60 rabbis working 24 hours a day, six days a week. The rabbis did not work on Shabbat. The website's budget of $475,000 was funded by donations. In 2009, the site claimed to surpass one million live chats answered by its staff of approximately 45 Los Angeles-based male and female scholars and educators.
See also
Chabad.org
References
External links
AskMoses.com
Chabad organizations
Websites about Jews and Judaism
Chabad-Lubavitch (Hasidic dynasty)
Defunct websites
|
https://en.wikipedia.org/wiki/Silence%20suppression
|
The term silence suppression is used in telephony to describe the process of not transmitting information over the network when one of the parties involved in a telephone call is not speaking, thereby reducing bandwidth usage.
Voice is carried over a digital telephone network by converting the analog signal to a digital signal which is then packetized and sent electronically over the network. The analogue signal is re-created at the receiving end of the network. When one of the parties does not speak, background noise is picked up and sent over the network. This is inefficient as this signal carries no useful information and thus, bandwidth is wasted.
Given that typically only one party in a conversation speaks at any one time, silence suppression can achieve overall bandwidth savings in the order of 50% over the duration of a telephone call. (While both parties may sometimes speak at the same time, there are times when both parties are silent.)
Silence suppression is achieved by recognizing the lack of speech through a speech processing mechanism called voice activity detection (VAD) which dynamically monitors background noise and sets a corresponding speech detection threshold. This technique is also known as speech activity detection (SAD).
A similar principle is used for Discontinuous Reception and discontinuous transmission in GSM mobile telephone systems.
For further bandwidth gains, silence suppression is normally done after echo cancellation.
Drawbacks
Background noise detection may be difficult in some circumstances (relatively low speech level, or relatively high background noise level, for example).
When silence suppression is active, the line appears to have gone dead at the other (egress) end of the call. For this reason, so-called comfort noise needs to be generated to compensate for the lack of background noise. The ingress end must therefore signal the egress end that silence suppression is in effect. For best results, the level of comfort noise being generated on egress should match that of the background noise at the ingress end.
Speech activity detection must occur very quickly, otherwise clipping might occur.
Speech activity detection does not work well on non-speech calls (fax or modem communication, for example).
Thus, silence suppression is generally an optional feature on telephony devices. In some cases, it is automatically turned on based on the characteristics of a call.
See also
Comfort noise
Talkspurt
Voice activity detection
External links
Silence suppression and comfort noise generation (International Engineering Consortium on-line education topic)
Telephony
|
https://en.wikipedia.org/wiki/Evangelische%20Omroep
|
Evangelische Omroep or EO (English: Evangelical Broadcasting) is an Evangelical broadcast television network in Netherlands. It is one of the twelve member-based broadcasting associations contributing to the Netherlands Public Broadcasting system.
History
EO was founded in 1967 by members of Evangelical churches wanting to put more emphasis on evangelism. The network also organizes conferences for young people and families.
Television programs
De Kist
Het Familiediner
Controversies
Documentaries are often edited to reflect EO's creationist convictions. While still being presented as a BBC documentary, The Life of Mammals series was edited to remove material incompatible with young earth creationism, and profanity is regularly edited out of bought-in drama series.
Creationism
The subject of creationism has sparked a number of EO-related controversies. In early 2009, a controversy arose over statements by a leading presenter and former director, Andries Knevel. He considered it possible for a religious person not to believe in the literal interpretation of the biblical creation story (Genesis 1-2). Shortly afterwards Knevel apologized for the highly charged way in which he had made his statements and for the fact that his personal viewpoint could have been interpreted as the official viewpoint of EO.
Arie Boomsma
In 2009 Arie Boomsma, an EO television presenter was suspended for three months after appearing partially undressed in a magazine called L'Homo. Later that year, EO planned to broadcast a new television show called Loopt een man over het water... ("A man walks over the water...") which Boomsma would present. In the show, non-Christian comedians were to be asked to create short sketches about Jesus of Nazareth. The planned show caused so much uproar among EO members that it was cancelled. Soon afterwards Boomsma left EO and joined the Catholic broadcasting association KRO.
Decline in membership
As a result of these and other controversies, the number of subscribing EO members has declined. In March 2010, this led to a member initiative entitled Ik bid en blijf lid (I pray and stay a member) which called upon members of EO to retain their membership and pray that the association will continue to spread God's word in a way that remains true to the Bible.
References
External links
Official site
Dutch public broadcasting organisations
Netherlands Public Broadcasting
Christian organizations established in 1967
Evangelical organizations established in the 20th century
Dutch-language television networks
Evangelical television networks
Television channels and stations established in 1967
|
https://en.wikipedia.org/wiki/List%20of%20free-software%20events
|
The following is a list of computer conferences and other events focused on the development and usage of free and open-source software (FOSS).
General free-software events
Some events with "Linux" in their name are in fact general-purpose free-software events, often because they began as Linux-only events before broadening their focus.
North, Central and South America
FLISOL – Latin American free software install fest held each year in all Latin America the same day, on the last Sunday of April
LibrePlanet – Organized annually by the Free Software Foundation in or around Boston, Massachusetts since 2006
LinuxFest Northwest, held in Bellingham, Washington in the spring since 2000
SouthEast LinuxFest, held annually in June since 2009.
Southern California Linux Expo (SCALE), held in Los Angeles each year since 2002
Europe
Chemnitz Linux Days, held in Chemnitz, Germany since 1999
DevConf.cz, held annually in Brno, Czech Republic since 2009
Fosscomm, held annually in a different Greek city since 2008
FOSDEM, held in Brussels, Belgium every February since 2001
FrOSCon, held in Sankt Augustin (near Bonn), Germany since 2006
Linux Vacation / Eastern Europe, held in Belarus every summer since 2005
End Summer Camp, held in Italy every summer since 2005
Asia and Australia
COSCUP, held annually in Taiwan since 2006
linux.conf.au, held in Australia or New Zealand in the (Southern Hemisphere) summer since 1999
International
Open Source Summit, known before 2017 as "LinuxCon", held several times each year in various continents since 2009
Software Freedom Day, international observance since 2004
Defunct
Africa Source, held in 2004 and 2006
Asia Source, held in 2005, 2007 and 2009
August Penguin, held annually in Israel from 2004 to 2018
FOSS.IN, first known as "Linux Bangalore", held from 2001 to 2012
Fórum Internacional Software Livre (FISL) – International Free Software Forum, held each year in Porto Alegre, Brazil (with 7000+ participants) from 2000 to 2018
Free Software and Open Source Symposium (FSOSS), held at Seneca College, Toronto each October from 2001 to 2018
FSCONS, held every autumn in Gothenburg, Sweden from 2007 to 2019
Libre Software Meeting, French name "Rencontres mondiales du logiciel libre", held every July in France or surrounding countries from 2000 to 2018
Linux Bier Wanderung, informal event held in a different European country every summer from 1999 to 2019
Ontario Linux Fest, held in Toronto, Ontario in the autumn from 2007 to 2009
Open Source Day, conference held annually in Warsaw, Poland from 2008 to 2019
Open Source Developers' Conference (OSDC), held annually in various countries from 2004 to 2015
, a trade show and conference with 10,000 visitors held every year in Paris from 1999 to 2014
O'Reilly Open Source Convention (OSCON), held each summer in the US from 1999 to 2019.
LinuxWorld Conference and Expo, briefly also known as "OpenSource World", from 1998 to 2009
Wizards of OS, held in Berlin every two years from 1999
|
https://en.wikipedia.org/wiki/DB%20Class%20420
|
The Class 420 () is a commuter electric multiple unit train type in service on German S-Bahn networks since 1972. Their use in Munich during the 1972 Summer Olympics earned them the colloquial name (Olympic multiple unit).
Design
Livery variations
Each of the three prototype sets received a different livery. 420 001 had an orange and white livery, 420 002 had a blue and white livery, and 420 003 wine-red and white livery. A public poll over the livery of the S-Bahn trains was held in Frankfurt, Munich and Düsseldorf. Munich received blue trains, Düsseldorf chose orange and Frankfurt also received orange liveried trains due to economic reasons, despite opting for the red livery.
Units used on Munich S-Bahn services to the airport received a light blue livery.
All units still in service were repainted into the traffic-red livery.
Interior
Passenger accommodation consists of transverse seating bays in a 2+2 layout, with longitudinal folding seats at the luggage area in one of the end cars.
420Plus
Between April 2005 and January 2006, two trains (420 400 and 420 416) received an experimental refurbishment at DB Krefeld-Oppum works, and were branded as "420Plus". Changes to the interior included new seating, the addition of air conditioning and windows in the inner car ends, passenger information displays and push-button door openers. Entry into passenger service followed in April 2006.
Technical specifications
Formation
Each unit consists of three cars. The end cars are designated as class 420, and the intermediate cars are designated as class 421. They are equipped with couplers enabling operation of up to three units together.
Car body
The car bodies of the end cars are made out of steel. The intermediate cars have aluminium car bodies. Beginning with the 2. batch units, the car body construction of the end cars was changed from steel to aluminium, in order to save weight.
Electric systems
The electrical equipment was built by AEG, Brown-Boveri, and Siemens. They are the first DB trains that were equipped with thyristor-phase control. Each bogie is fitted with two mixed current commutator motors. The current of the traction motors is controlled steplessly over two asymmetrical semi-controlled rectifier bridges in sequence.
History
Munich
The first unit was presented in Munich on October 30, 1969. Entry into service on the Munich S-Bahn was in May 1972. The last original Munich S-Bahn units were withdrawn in December 2004.
15 refurbished former S-Bahn Stuttgart sets entered service on the Munich S-Bahn network in 2014. 21 further trains are scheduled to enter service in Munich, in order to reduce the shortage of rolling stock due to the refurbishment of Class 423 trains. These former Rhine-Ruhr S-Bahn units will be fitted with Linienzugbeeinflussung (LZB), which enables them to run on the Stammstrecke.
Stuttgart
The trains entered service on the Stuttgart S-Bahn network in 1978.
The last trains (420 450 and 420 461) were withdrawn fr
|
https://en.wikipedia.org/wiki/Shoulder%20surfing%20%28computer%20security%29
|
In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder. Unauthorized users watch the keystrokes inputted on a device or listen to sensitive information being spoken, which is also known as eavesdropping.
Methods and history
This attack can be performed either at close range (by directly looking over the victim's shoulder) or from a longer range with, for example a pair of binoculars or similar hardware. Attackers do not need any technical skills in order to perform this method, and keen observation of victims' surroundings and the typing pattern is sufficient. In the early 1980s, shoulder surfing was practiced near public pay phones to steal calling card digits and make long-distance calls or sell them in the market for cheaper prices than the original purchaser paid. However, the advent of modern-day technologies like hidden cameras and secret microphones makes shoulder surfing easier and gives the attacker more scope to perform long range shoulder surfing. A hidden camera allows the attacker to capture the whole login process and other confidential data of the victim, which ultimately could lead to financial loss or identity theft. Shoulder surfing is more likely to occur in crowded places because it is easier to observe the information without getting the victim's attention.
There are two types of shoulder-surfing attack: direct observation attacks, in which authentication information is obtained by a person who is directly monitoring the authentication sequence, and recording attacks, in which the authentication information is obtained by recording the authentication sequence for later analysis to open the device. Apart from threats to password or PIN entry, shoulder surfing also occurs in daily situations to uncover private content on handheld mobile devices; shoulder surfing visual content was found to leak sensitive information of the user and even private information about third-parties.
Countermeasures
Gaze-based password entry
The basic procedure for gaze-based password entry is similar to normal password entry, except that in place of typing a key or touching the screen, the user looks at each desired character or trigger region in sequence (same as eye typing). The approach can, therefore, be used both with character-based passwords by using an on-screen keyboard and with graphical password schemes as surveyed in. A variety of considerations is important for ensuring usability and security. Eye tracking technology has progressed significantly since its origins in the early 1900s. State of the art eye trackers offers non-encumbering, remote video-based eye tracking with an accuracy of 1˚ of visual angle. Eye trackers are a specialized application of computer vision. A camera is used to monitor the user's eyes. One or more infrared light sources illuminate
|
https://en.wikipedia.org/wiki/AP%20Computer%20Science%20A
|
Advanced Placement (AP) Computer Science A (also known as AP CompSci, AP CompSci A, APCSA, AP Computer Science Applications, or AP Java) is an AP Computer Science course and examination offered by the College Board to high school students as an opportunity to earn college credit for a college-level computer science course. AP Computer Science A is meant to be the equivalent of a first-semester course in computer science. The AP exam currently tests students on their knowledge of Java.
AP Computer Science AB, which was equal to a full year, was discontinued following the May 2009 exam administration.
Course
AP Computer Science emphasizes object-oriented programming methodology with an emphasis on problem solving and algorithm development. It also includes the study of data structures and abstraction, but these topics were not covered to the extent that they were covered in AP Computer Science AB. The Microsoft-sponsored program Technology Education and Literacy in Schools (TEALS) aims to increase the number of students taking AP Computer Science classes.
The units of the exam are as follows:
Case studies and labs
Historically, the AP exam used several programs in its free-response section to test students' knowledge of object-oriented programs without requiring them to develop an entire environment. These programs were called Case Studies.
This practice was discontinued as of the 2014–15 school year and replaced with optional labs that teach concepts.
Case studies (discontinued)
Case studies were used in AP Computer Science curriculum starting in 1994.
Large Integer case study (1994-1999)
The Large Integer case study was in use prior to 2000. It was replaced by the Marine Biology case study.
Marine Biology case study (2000-2007)
The Marine Biology Case Study (MBCS) was a program written in C++ until 2003, then in Java, for use with the A and AB examinations. It served as an example of object-oriented programming (OOP) embedded in a more complicated design project than most students had worked with before.
The case study was designed to allow the College Board to quickly test a student's knowledge of object oriented programming ideas such as inheritance and encapsulation while requiring students to understand how objects such as "the environment", "the fish", and the simulation's control module interact with each other without having to develop the entire environment independently, which would be quite time-consuming. The case study also gives all students taking the AP Computer Science exams with a common experience from which to draw additional test questions.
On each of the exams, at least one free-response question was derived from the case study. There were also five multiple-choice questions that are derived from the case study.
This case study was discontinued from 2007, and was replaced by GridWorld.
GridWorld case study (2008-2014)
GridWorld is a computer program case study written in Java that was used with the AP Computer
|
https://en.wikipedia.org/wiki/Dominic%20Minghella
|
Dominic Minghella (born 1966) is a British television producer and screenwriter. His most successful project has been the creation of the ITV network comedy-drama series Doc Martin, starring Martin Clunes, which began in 2004. The main character's surname, Ellingham, is an anagram of the Minghella family name. Minghella was also the chief writer and show runner of BBC One's 2006 production Robin Hood, produced independently for the BBC by Tiger Aspect Productions.
Family
Dominic Minghella is the brother of Loretta Minghella and the late Anthony Minghella, Max Minghella being his nephew and Hannah Minghella his niece; both of whom work in film. Dominic's son, Dante, appeared on the 2006 Channel 4 programme Child Genius. He read PPE at Merton College, Oxford. His sister Edana Minghella co-wrote four episodes of Doc Martin.
Career
As a child, Minghella starred in the first film his brother Anthony directed, A Little Like Drowning.
He co-wrote the film The Prince and the Pauper in 2000. Minghella was lead writer and executive producer of the BBC One series Robin Hood for the first two seasons, overseeing 26 episodes and several of the place names used in the series were directly taken from place names on his native Isle of Wight. He has also written for Hamish Macbeth, starring Robert Carlyle, and for Boon.
Minghella was producer of the 2012 adaptation of Daphne du Maurier's novel, The Scapegoat, directed by Charles Sturridge and starring Matthew Rhys. He was also show runner for the first series of the American historical drama Knightfall.
In December 2018, as British Prime Minister Theresa May struggled to convince Parliament to support her Brexit agreement with the European Union, Minghella wrote and directed a three-minute political short 'The People's Vote', starring Andy Serkis in a parody of May as the two faces of his Gollum-Sméagol character, alternately coveting her 'precious' exit document and (less strongly) considering her duty to the British people, as support for a further referendum on the divisive issue. The short's credits also include Minghella's children Louise, who is an assistant producer and Dan, who is a script editor.
Personal life
In 2020, Minghella was hospitalised with COVID-19 and was unsure whether he would survive. After a few days of hospitalisation, he was well enough to be discharged.
References
External links
Official website: minghella.com
1966 births
21st-century British screenwriters
21st-century English male writers
Alumni of Merton College, Oxford
British male television writers
Date of birth missing (living people)
Doc Martin
English people of Italian descent
English television writers
English screenwriters
English male screenwriters
Living people
Place of birth missing (living people)
Showrunners
|
https://en.wikipedia.org/wiki/Omega%20language
|
In formal language theory within theoretical computer science, an infinite word is an infinite-length sequence (specifically, an ω-length sequence) of symbols, and an ω-language is a set of infinite words. Here, ω refers to the first ordinal number, the set of natural numbers.
Formal definition
Let Σ be a set of symbols (not necessarily finite). Following the standard definition from formal language theory, Σ* is the set of all finite words over Σ. Every finite word has a length, which is a natural number. Given a word w of length n, w can be viewed as a function from the set {0,1,...,n−1} → Σ, with the value at i giving the symbol at position i. The infinite words, or ω-words, can likewise be viewed as functions from to Σ. The set of all infinite words over Σ is denoted Σω. The set of all finite and infinite words over Σ is sometimes written Σ∞ or Σ≤ω.
Thus an ω-language L over Σ is a subset of Σω.
Operations
Some common operations defined on ω-languages are:
Intersection and union Given ω-languages L and M, both and are ω-languages.
Left concatenation Let L be an ω-language, and K be a language of finite words only. Then K can be concatenated on the left, and only on the left, to L to yield the new ω-language KL.
Omega (infinite iteration) As the notation hints, the operation is the infinite version of the Kleene star operator on finite-length languages. Given a formal language L, Lω is the ω-language of all infinite sequences of words from L; in the functional view, of all functions .
Prefixes Let w be an ω-word. Then the formal language Pref(w) contains every finite prefix of w.
Limit Given a finite-length language L, an ω-word w is in the limit of L if and only if is an infinite set. In other words, for an arbitrarily large natural number n, it is always possible to choose some word in L, whose length is greater than n, and which is a prefix of w. The limit operation on L can be written Lδ or .
Distance between ω-words
The set Σω can be made into a metric space by definition of the metric as:
where |x| is interpreted as "the length of x" (number of symbols in x), and inf is the infimum over sets of real numbers. If then there is no longest prefix x and so . Symmetry is clear. Transitivity follows from the fact that if w and v have a maximal shared prefix of length m and v and u have a maximal shared prefix of length n then the first characters of w and u must be the same so . Hence d is a metric.
Important subclasses
The most widely used subclass of the ω-languages is the set of ω-regular languages, which enjoy the useful property of being recognizable by Büchi automata. Thus the decision problem of ω-regular language membership is decidable using a Büchi automaton, and fairly straightforward to compute.
If the language Σ is the power set of a set (called the "atomic propositions") then the ω-language is a linear time property, which are studied in model checking.
Bibliography
Perrin, D. and Pin, J.-E. "Infi
|
https://en.wikipedia.org/wiki/Clock%20code
|
The clock code is a method of mentally computing the sine of an angle between zero and sixty degrees. Pilots sometimes need to do this to estimate the heading correction due to the wind, and sailors may find it useful to do the same thing to allow for the current due to the tides.
The basic assumption is that for angles up to around 60°, it is adequately accurate to assume that sine(A) = A, when A is expressed as a fraction of 60. Thus, the sine of 30° = 30/60 = 1/2 = 0.5.
The clock code is a further method of visualising fractions of 60, since we are very used to expressing fractions of an hour (60 minutes) when telling the time.
Thus:
10/60 = 1/6 = 0.167 (true sine = 0.1736, error = -4%)
15/60 = 1/4 = 0.25 (0.259, -3.4%)
20/60 = 1/3 = 0.33 (0.342, -3.5%)
30/60 = 1/2 = 0.5 (0.5, 0%)
40/60 = 2/3 = 0.66 (0.643, +2.6%)
45/60 = 3/4 = 0.75 (0.707, +5.7%)
50/60 = 5/6 = 0.8 (0.766, +4.2%)
60/60 = 1/1 = 1.0 (0.866, +13.4%)
The angle is the angle of the wind or tide as it presents itself relative to the ship or aircraft, so if the wind is coming from the left at a relative angle of 30°, we use a sine of 0.5. Once the sine has been estimated, the drift due to wind or tide can be estimated accordingly by resolving the velocity of the wind or tide into a forward component and a sideways component. The sideways component is the windspeed x the sine, and the forward component is (1 - the sine) x windspeed (i.e. the cosine). Naturally we must apply these corrections to our groundspeed in the appropriate direction according to logic - a wind from the left will blow us off course in that direction; a headwind will slow our progress, a tailwind will increase it. Converting this back to a heading correction can be done using the 1 in 60 rule.
For wind angles greater than 60°, it is adequate to assume it's at 90°, i.e. a side wind.
More accurate corrections are done when possible, but in the particular case of a VFR pilot mentally calculating an unexpected diversion, using tables or the E6B slide rule in flight is usually not an option, so the clock code is one method of handling the required calculation without excessive error. In practice the wind strength can only be guessed or based on earlier reports, and the error due to the sine calculation will usually be much less than that due to the wind itself. Fine tuning of the heading can be done en route using the usual methods for doing so.
See also
Air navigation
Navigation
|
https://en.wikipedia.org/wiki/Ensonido
|
Ensonido is a real-time post processing algorithm that allows users to play back MP3 Surround files in standard headphones.
Ensonido was developed by the Fraunhofer Society. It simulates the natural reception of surround sound by the human ear, which usually receives tones from surrounding loudspeakers and from reflections and echoes of the listening room. The out-of-head localization achieved that way increases the listening comfort noticeably in contrast to conventional stereo headphone listening with its in-head localization of all sounds. In version 3.0 of the Fraunhofer IIS MP3 Surround Player, Ensonido is replaced with newer mp3HD
External links
all4mp3.com Software, demos, information, and various mp3 resources
mp3surround.com - Demo content, information and evaluation software
The Register news story
Press Releases
mp3surrounded.com - First Blog in the internet about MP3 Surround-MP3 Surround Samples
Audio codecs
Digital audio
|
https://en.wikipedia.org/wiki/Amtix
|
Amtix (stylized as AMTIX!) is a magazine that originally reviewed Amstrad computer software in the mid-1980s, published monthly by Newsfield Publications Ltd.
Unlike Zzap!64 and CRASH (its more successful sister publications from Newsfield), the original version of Amtix! was relatively short-lived. It ran for 18 issues in total between November 1985 and April 1987, plus a special preview issue (Issue zero) which was given away with Zzap!64 and CRASH.
After issue 18, Amtix! was sold to Database Publications who merged the Amtix! games sections into their own Computing With the Amstrad magazine.
Like Zzap!64 and Crash, Amtix! had very distinctive, comic-style cover art, drawn by Oliver Frey.
In September 2021 the magazine was relaunched as a quarterly A5 publication by Fusion Retro Books under the title AMTIXCPC Micro Action.
References
External links
A list of every game that has been reviewed and/or previewed in AMTIX!
Amtix! covers Scans of Amtix! front covers
Archived Amtix magazines on the Internet Archive
1985 establishments in the United Kingdom
1987 disestablishments in the United Kingdom
Amstrad magazines
Monthly magazines published in the United Kingdom
Video game magazines published in the United Kingdom
Defunct computer magazines published in the United Kingdom
Magazines established in 1985
Magazines disestablished in 1987
|
https://en.wikipedia.org/wiki/Sun-3
|
Sun-3 is a series of UNIX computer workstations and servers produced by Sun Microsystems, launched on September 9, 1985. The Sun-3 series are VMEbus-based systems similar to some of the earlier Sun-2 series, but using the Motorola 68020 microprocessor, in combination with the Motorola 68881 floating-point co-processor (optional on the Sun 3/50) and a proprietary Sun MMU. Sun-3 systems were supported in SunOS versions 3.0 to 4.1.1_U1 and also have current support in NetBSD and Linux.
Sun-3 models
Models are listed in approximately chronological order.
{| class="wikitable"
!Model
!Codename
!CPU board
!CPU MHz
!Max. RAM
!Chassis
|-
| 3/75
| Carrera
| Sun 3004
| 16.67 MHz
| 8 MB
| 2-slot VME (desktop)
|-
| 3/140
| Carrera
| Sun 3004
| 16.67 MHz
| 16 MB
| 3-slot VME (desktop/side)
|-
| 3/160
| Carrera
| Sun 3004
| 16.67 MHz
| 16 MB
| 12-slot VME (deskside)
|-
| 3/180
| Carrera
| Sun 3004
| 16.67 MHz
| 16 MB
| 12-slot VME (rackmount)
|-
| 3/150
| Carrera
| Sun 3004
| 16.67 MHz
| 16 MB
| 6-slot VME (deskside)
|-
| 3/50
| Model 25
| —
| 15.7 MHz
| 4 MB
| "wide Pizza-box" desktop
|-
| 3/110
| Prism
| —
| 16.67 MHz
| 12 MB
| 3-slot VME (desktop/side)
|-
| 3/260
| Sirius
| Sun 3200
| 25 MHz (CPU), 20 MHz (FPU)
| 32 MB
| 12-slot VME (deskside)
|-
| 3/280
| Sirius
| Sun 3200
| 25 MHz (CPU), 20 MHz (FPU)
| 32 MB
| 12-slot VME (rackmount)
|-
| 3/60
| Ferrari
| —
| 20 MHz
| 24 MB
| "wide Pizza-box" desktop
|-
| 3/E
| Polaris
| Sun 3/E
| 20 MHz
| 16 MB
| none (6U VME board)
|}
(Max. RAM sizes may be greater when third-party memory boards are used.)
Keyboard
The Sun Type 3 keyboard is split into three blocks:
special keys
main block
numeric pad
It shipped with Sun-3 systems.
Sun-3x
In 1989, coincident with the launch of the SPARCstation 1, Sun launched three new Sun-3 models, the 3/80, 3/470 and 3/480. Unlike previous Sun-3s, these use a Motorola 68030 processor, 68882 floating-point unit, and the 68030's integral MMU. This 68030-based architecture is called Sun-3x.
{| class="wikitable"
!Model
!Codename
!CPU board
!CPU MHz
!Max. RAM
!Chassis
|-
| 3/80
| Hydra
| -
| 20 MHz
| 16, 40 or 64 MB
| "Pizza-box" desktop
|-
| 3/460
| Pegasus
| Sun 3400
| 33 MHz
| 128 MB
| 12-slot VME (deskside, older design)
|-
| 3/470
| Pegasus
| Sun 3400
| 33 MHz
| 128 MB
| 12-slot VME (deskside, newer design )
|-
| 3/480
| Pegasus
| Sun 3400
| 33 MHz
| 128 MB
| 12-slot VME (rackmount)
|}
Sun 3/260s upgraded with Sun 3400 CPU boards are known as Sun 3/460s.
See also
Sun-1
Sun-2
Sun386i
Sun-4
SPARCstation
References
External links
Sun Microsystems
The Sun Hardware Reference, Part 1
Sun Field Engineer Handbook, 20th edition
Obsolyte!—Fan site for old Unix Workstations, including Sun machines
68k-based computers
Computer-related introductions in 1985
Sun servers
Sun workstations
32-bit computers
|
https://en.wikipedia.org/wiki/Broadcast%20Markup%20Language
|
Broadcast Markup Language, or BML, is an XML-based standard developed by Japan's Association of Radio Industries and Businesses as a data broadcasting specification for digital television broadcasting. It is a data-transmission service allowing text to be displayed on a 1seg TV screen.
The text contains news, sports, weather forecasts, emergency warnings such as Earthquake Early Warning, etc. free of charge. It was finalized in 1999, becoming ARIB STD-B24 Data Coding and Transmission Specification for Digital Broadcasting.
The STD-B24 specification is derived from an early draft of XHTML 1.0 strict, which it extends and alters. Some subset of CSS 1 and 2 is supported, as well as ECMAScript.
Example BML header:
<?xml version="1.0" encoding="EUC-JP" ?>
<!DOCTYPE bml PUBLIC "+//ARIB STD-B24:1999//DTD BML Document//JA" "bml_1_0.dtd">
<?bml bml-version="1.0" ?>
Since version 1.0 in 1999, BML standard has gone through several revisions, and , it is on version 5.0. However, due to a large installed user base of receivers which only support the original 1.0 specification, broadcasters are not able to introduce new features defined in later revisions.
See also
ARIB STD B24 character set
Integrated Services Digital Broadcasting
1seg
Ginga (SBTVD Middleware)
Further reading
Broadcast Markup Language (BML) at OASIS
External links
Official changelog for ARIB STD-B24
STD-B24 and others, List of ARIB Standards in the Field of Broadcasting (ARIB)
Broadcast engineering
Digital television
High-definition television
Industry-specific XML-based standards
Interactive television
ISDB
Satellite television
Japanese inventions
Telecommunications-related introductions in 1999
|
https://en.wikipedia.org/wiki/Leasowe%20railway%20station
|
Leasowe railway station is a station serving the village of Leasowe, in Merseyside, England. It lies on the West Kirby branch of the Wirral Line, part of the Merseyrail network.
Location
The station is in Reeds Lane, on the edge of Moreton and around 500 metres south of the village of Leasowe which is on the north Wirral coast. It is just 1 km east of Moreton station on the same line, and has a Park and ride facility for commuters to Liverpool.
History
Leasowe station was originally opened on the Hoylake Railway in 1870, as Leasowe Crossing without a proper platform, but it closed less than two years later. The station opened again on 5 May 1894, when the line from Bidston (1.5 km to the east) to Moreton was doubled. It was built by the Wirral Railway on their line from Birkenhead Park to West Kirby.
Through electric services to Liverpool Central commenced on 13 March 1938, when the LMS electrified the lines from Birkenhead Park to West Kirby. The service was provided by the then-new LMS electric multiple units. However, on Sunday mornings, the service was provided by the older Mersey Railway electric units, which had until then only run from Liverpool to Birkenhead Park. The platform buildings were replaced in 1938, rebuilt in a similar style to those along the line towards West Kirby, and a footbridge was added. The signal box, used to operate the level crossing and replacing a cabin on the westbound platform, was moved to the opposite side of Reeds Lane and was also improved at the time.
The station did not have a goods yard; it just had two lines straight through. Nonetheless, freight did pass through the station from the nearby Cadbury factory, also in Moreton. The 8-lever signal box was in use until 24 July 1994, and demolished afterwards.
Facilities
The station is staffed, during all opening hours, and has platform CCTV. Each of the two platforms has a waiting room. There is a payphone, booking office and live departure and arrival screens, for passenger information. The station has a free "Park and Ride" car park, with 204 spaces, lighting columns and CCTV to meet Merseytravel's Travelsafe requirements, as well as a cycle rack. There is step-free access, to the booking office and platforms, for wheelchairs and prams.
Services
Current services are every 15 minutes (Monday to Saturday daytime) to West Kirby and Liverpool. At other times, trains operate every 30 minutes. These services are provided by Merseyrail's fleet of Class 507 and Class 508 EMUs.
The station also has a number of connecting Merseytravel bus services.
Gallery
References
Sources
External links
Railway stations in the Metropolitan Borough of Wirral
DfT Category E stations
Former Wirral Railway stations
Railway stations in Great Britain opened in 1870
Railway stations in Great Britain closed in 1872
Railway stations in Great Britain opened in 1894
Railway stations served by Merseyrail
1866 establishments in England
|
https://en.wikipedia.org/wiki/GS%20Caltex%20Cup
|
The GS Caltex Cup (Korean: GS칼텍스배) is a Go competition.
Outline
The GS Caltex Cup replaced the LG Refined Oil Cup. It is organized by the Maeil Business Newspaper, Maeil Broadcasting Network (MBN), and Korea Baduk Association, and sponsored by GS Caltex. It currently has the biggest prize in South Korea. As of 2023, the winner receives 70 million won in prize money, and the runner-up receives 30 million won. The final is a best-of-5. Komi is 6.5 points and the time limit is 10 minutes main time with 3 x 40s byoyomi.
Past winners and runners-up
References
External links
Sensei's Library
Go to Everyone!
Korea Baduk Association (in Korean)
Go competitions in South Korea
GS Group
|
https://en.wikipedia.org/wiki/Computational%20phylogenetics
|
Computational phylogenetics, phylogeny inference, or phylogenetic inference focuses on computational and optimization algorithms, heuristics, and approaches involved in phylogenetic analyses. The goal is to find a phylogenetic tree representing optimal evolutionary ancestry between a set of genes, species, or taxa. Maximum likelihood, parsimony, Bayesian, and minimum evolution are typical optimality criteria used to assess how well a phylogenetic tree topology describes the sequence data. Nearest Neighbour Interchange (NNI), Subtree Prune and Regraft (SPR), and Tree Bisection and Reconnection (TBR), known as tree rearrangements, are deterministic algorithms to search for optimal or the best phylogenetic tree. The space and the landscape of searching for the optimal phylogenetic tree is known as phylogeny search space.
Maximum Likelihood (also likelihood) optimality criterion is the process of finding the tree topology along with its branch lengths that provides the highest probability observing the sequence data, while parsimony optimality criterion is the fewest number of state-evolutionary changes required for a phylogenetic tree to explain the sequence data.
Traditional phylogenetics relies on morphological data obtained by measuring and quantifying the phenotypic properties of representative organisms, while the more recent field of molecular phylogenetics uses nucleotide sequences encoding genes or amino acid sequences encoding proteins as the basis for classification.
Many forms of molecular phylogenetics are closely related to and make extensive use of sequence alignment in constructing and refining phylogenetic trees, which are used to classify the evolutionary relationships between homologous genes represented in the genomes of divergent species. The phylogenetic trees constructed by computational methods are unlikely to perfectly reproduce the evolutionary tree that represents the historical relationships between the species being analyzed. The historical species tree may also differ from the historical tree of an individual homologous gene shared by those species.
Types of phylogenetic trees and networks
Phylogenetic trees generated by computational phylogenetics can be either rooted or unrooted depending on the input data and the algorithm used. A rooted tree is a directed graph that explicitly identifies a most recent common ancestor (MRCA), usually an imputed sequence that is not represented in the input. Genetic distance measures can be used to plot a tree with the input sequences as leaf nodes and their distances from the root proportional to their genetic distance from the hypothesized MRCA. Identification of a root usually requires the inclusion in the input data of at least one "outgroup" known to be only distantly related to the sequences of interest.
By contrast, unrooted trees plot the distances and relationships between input sequences without making assumptions regarding their descent. An unrooted tree can always be p
|
https://en.wikipedia.org/wiki/Hyves
|
Hyves was a social networking site in the Netherlands with mainly Dutch visitors and members, where it competed with sites such as Facebook and MySpace. Hyves was founded in 2004 by Raymond Spanjar and Floris Rost van Tonningen. The service was available in both Dutch and English.
In May 2010 Hyves had more than 10.3 million accounts. These correspond to two thirds of the size of the Dutch population (which stood at over 16 million in 2010), however this included multiple accounts per person and inactive accounts. The number of accounts had grown by over two million as compared to 1.5 years earlier. Hyves could be used free of charge, but there was an option for a paid Premium Membership (called "Gold Membership"). Gold members had access to some extra features, such as the ability to use a wider variety of smilies in their messages and more uploading space for pictures. The creators have said that the basic of a Hyves account will always be free.
In 2013, the social network was officially discontinued, due to the huge decrease in accounts due to the growing popularity of other social networks like Facebook and Twitter in the Netherlands. The site continued as Hyves Games, where members could use their Hyves accounts to play social games.
History
Hyves started in September 2004. The name Hyves was chosen because the desired domain name hives.nl was already taken. The name referred to beehives and the fact that social networks are built the same way.
In May 2006 it became public that the Dutch police was using Hyves as a tool to investigate possible suspects. Only information that is uploaded by suspects is being checked.
On December 13, 2007 Hyves was awarded with the title of "most popular site of the year".
In April 2008, Dutch media tycoon Joop van den Ende took a large interest in Hyves. The intention was to expand abroad and provide mobile services.
Hyves changed its design in July of '09. The site got a new look and feel, described as being more docile and synoptic. The profile picture format was also changed into a standard square shape.
In her Christmas speech of 2009, Queen Beatrix of the Netherlands expressed negative views about online social networks. In response, the founder of Hyves offered her a free account/profile, so that she could experience Hyves herself.
In 2010, it became clear that the fast growth of Hyves was slowing down due to growth of Twitter and Facebook. Therefore, Hyves announced extra measures to leave the competition further behind. These measures were successful, because Hyves welcomed its 10 millionth user in April 2010. Despite the perception that Hyves mostly had young members, the target group ages faster than it rejuvenates. The average age of a member at Hyves is 30 years old. Also, in that same month, Hyves announced "Hyves Payments" and "Hyves Games", which allows users to play games and pay friends through the social network.
Although Facebook was rapidly growing in the Netherlands, in 2010 Hy
|
https://en.wikipedia.org/wiki/Regsvr32
|
In computing, regsvr32 (Register Server) is a command-line utility in Microsoft Windows and ReactOS for registering and unregistering DLLs and ActiveX controls in the operating system Registry. Despite the suffix "32" in the name of the file, there are both 32-bit and 64-bit versions of this utility (with identical names, but in different directories). regsvr32 requires elevated privileges.
To be used with regsvr32, a DLL must export the functions DllRegisterServer and DllUnregisterServer.
The regsvr32 command is comparable to ldconfig in Linux.
Example usage
regsvr32 shmedia.dll for registering a file
regsvr32 shmedia.dll /s for registering a file without the dialog box ( silent )
regsvr32 /u shmedia.dll for unregistering a file
regsvr32 shmedia.dll /u /s for unregistering a file without the dialog box ( silent )
If another copy of shmedia.dll exists in the system search path, regsvr32 may choose that copy instead of the one in the current directory. This problem can usually be solved by specifying a full path (e.g., c:\windows\system32\shmedia.dll) or using the following syntax:
regsvr32 .\shmedia.dll
References
Further reading
External links
Microsoft TechNet Regsvr32 article
Explanation of Regsvr32 Usage and Error Messages
C# Frequently Asked Questions: What is the equivalent to regsvr32 in .NET?
A free graphical user interface for regsvr32.exe
Windows administration
Windows commands
|
https://en.wikipedia.org/wiki/Samuel%20Johnson%20%28disambiguation%29
|
Samuel Johnson (1709–1784) was an English literary figure and compiler of A Dictionary of the English Language; often referred to as "Dr. Johnson."
Samuel, Sammy or Sam Johnson may also refer to:
Arts and letters
Samuel Johnson (dramatist) (1691–1773), author of Hurlothrumbo
Samuel Johnson (American educator) (1696–1772), American colonial intellectual and educator; first president of King's College (now Columbia University)
Samuel Johnson (pamphleteer) (1649–1703), English political writer
Samuel Johnson Jr. (1757–1836), American schoolteacher and lexicographer
Samuel Johnson (Nigerian historian) (1846–1901), Anglican priest and historian of the Yoruba
Business
Samuel Curtis Johnson Sr. (1833–1919), American businessman
Samuel Curtis Johnson Jr. (1928–2004), American businessman
S. Curtis Johnson or Samuel Curtis Johnson, American businessman
Politics
Samuel Ealy Johnson Sr. (1838–1915), American businessman, rancher and presidential grandfather
Samuel Johnson (Michigan politician) (1839–1916), member of the Michigan House of Representatives
Samuel Ealy Johnson Jr. (1877–1937), Texas politician and presidential father
Sam Johnson (Oregon politician) (1911–1984), Oregon businessman, legislator, and philanthropist
Sam Houston Johnson (1914–1978), younger brother of U.S. President Lyndon B. Johnson
Sam Johnson (1930–2020), Texas congressman
I. Sam Johnson (1840–1906), American lawyer and politician from New York
Samuel William Johnson (assemblyman) (1828–1895), American lawyer and politician from New York
Sports
Samuel Johnson (English footballer) (1881–unknown)
Sam Johnson (footballer, born 1901) (1901–1975), English footballer
Sammy Johnson (American football) (born 1952), American football player
Sam Johnson (defensive back, born 1959), American player of Canadian football
Sam Johnson (defensive back, born 1960), American football player
Sam Johnson (wide receiver) (born 1964), American football player
Samuel Johnson (footballer, born 1973), Ghanaian footballer
Samuel Johnson (footballer, born 1984), Guinean footballer
Sam Johnson (footballer, born 1992), English goalkeeper
Sammie Johnson (born 1992), Australian rules football player
Sam Johnson (footballer, born 1993), Liberian footballer
Sam Johnson (rugby union) (born 1993), Australian rugby union player
Other people
Sam Johnson (colonel), United States Air Force colonel and commander, 21st Space Wing
Mingo Jack or Samuel Johnson (1820–1886), jockey, lynching victim from New Jersey
Samuel Johnson (clergyman) (1822–1882), United States clergyman and author
Samuel Johnson (New Zealand editor) (1827–1905), New Zealand printer, newspaper proprietor and editor
Samuel William Johnson (1830–1909), United States agricultural chemist
Samuel Johnson (comedian) (1830–1900), British comedian
Samuel Waite Johnson (1831–1912), English locomotive engineer
Samuel D. Johnson Jr. (1920–2002), United States federal judge
Sammy Johnson (1949–1998), English actor
Samuel
|
https://en.wikipedia.org/wiki/SecurityFocus
|
SecurityFocus was an online computer security news portal and purveyor of information security services. Home to the well-known Bugtraq mailing list, SecurityFocus columnists and writers included former Department of Justice cybercrime prosecutor Mark Rasch, and hacker-turned-journalist Kevin Poulsen.
References
External links
(no longer active)
Internet properties disestablished in 2002
Computer security organizations
Gen Digital acquisitions
|
https://en.wikipedia.org/wiki/Memetic%20algorithm
|
A memetic algorithm (MA) in computer science and operations research, is an extension of the traditional genetic algorithm (GA) or more general evolutionary algorithm (EA). It may provide a sufficiently good solution to an optimization problem. It uses a suitable heuristic or local search technique to improve the quality of solutions generated by the EA and to reduce the likelihood of premature convergence.
Memetic algorithms represent one of the recent growing areas of research in evolutionary computation. The term MA is now widely used as a synergy of evolutionary or any population-based approach with separate individual learning or local improvement procedures for problem search. Quite often, MAs are also referred to in the literature as Baldwinian evolutionary algorithms (EAs), Lamarckian EAs, cultural algorithms, or genetic local search.
Introduction
Inspired by both Darwinian principles of natural evolution and Dawkins' notion of a meme, the term memetic algorithm (MA) was introduced by Pablo Moscato in his technical report in 1989 where he viewed MA as being close to a form of population-based hybrid genetic algorithm (GA) coupled with an individual learning procedure capable of performing local refinements. The metaphorical parallels, on the one hand, to Darwinian evolution and, on the other hand, between memes and domain specific (local search) heuristics are captured within memetic algorithms thus rendering a methodology that balances well between generality and problem specificity. This two-stage nature makes them a special case of dual-phase evolution.
In the context of complex optimization, many different instantiations of memetic algorithms have been reported across a wide range of application domains, in general, converging to high-quality solutions more efficiently than their conventional evolutionary counterparts.
In general, using the ideas of memetics within a computational framework is called memetic computing or memetic computation (MC). With MC, the traits of universal Darwinism are more appropriately captured. Viewed in this perspective, MA is a more constrained notion of MC. More specifically, MA covers one area of MC, in particular dealing with areas of evolutionary algorithms that marry other deterministic refinement techniques for solving optimization problems. MC extends the notion of memes to cover conceptual entities of knowledge-enhanced procedures or representations.
Theoretical Background
The no-free-lunch theorems of optimization and search state that all optimization strategies are equally effective with respect to the set of all optimization problems. Conversely, this means that one can expect the following: The more efficiently an algorithm solves a problem or class of problems, the less general it is and the more problem-specific knowledge it builds on. This insight leads directly to the recommendation to complement generally applicable metaheuristics with application-specific methods or heuristics, whi
|
https://en.wikipedia.org/wiki/Dolev%E2%80%93Yao%20model
|
The Dolev–Yao model, named after its authors Danny Dolev and Andrew Yao, is a formal model used to prove properties of interactive cryptographic protocols.
The network
The network is represented by a set of abstract machines that can exchange messages.
These messages consist of formal terms. These terms reveal some of the internal structure of the messages, but some parts will hopefully remain opaque to the adversary.
The adversary
The adversary in this model can overhear, intercept, and synthesize any message and is only limited by the constraints of the cryptographic methods used. In other words: "the attacker carries the message."
This omnipotence has been very difficult to model, and many threat models simplify it, as has been done for the attacker in ubiquitous computing.
The algebraic model
Cryptographic primitives are modeled by abstract operators. For example, asymmetric encryption for a user is represented by the encryption function and the decryption function . Their main properties are that their composition is the identity function () and that an encrypted message reveals nothing about . Unlike in the real world, the adversary can neither manipulate the encryption's bit representation nor guess the key. The attacker may, however, re-use any messages that have been sent and therefore become known. The attacker can encrypt or decrypt these with any keys he knows, to forge subsequent messages.
A protocol is modeled as a set of sequential runs, alternating between queries (sending a message over the network) and responses (obtaining a message from the network).
Remark
The symbolic nature of the Dolev–Yao model makes it more manageable than computational models and accessible to algebraic methods but potentially less realistic. However, both kinds of models for cryptographic protocols have been related. Also, symbolic models are very well suited to show that a protocol is broken, rather than secure, under the given assumptions about the attackers capabilities.
See also
Security
Cryptographic protocol
References
Computer security
|
https://en.wikipedia.org/wiki/Lemonade%20Stand
|
Lemonade Stand is a business simulation game created in 1973 by Bob Jamison of the Minnesota Educational Computing Consortium (MECC). In it, the player moves through several rounds of running a lemonade stand, beginning each round by making choices dependent on their current amount of money about their stock, prices, and advertising. In each round, the results are randomized based on the player's inputs, as well as affected by random events such as thunderstorms and street closures. Each round ends with a summary of the player's current status, and the game ends after 12 rounds.
In 1979, the game was ported by Charlie Kellner to the Apple II; Apple subsequently included the game with their computers throughout the 1980s. MECC also offered the game for sale as a part of bundles of children's software for Apple computers and Atari 8-bit computers. Kellner's source code was released, and has since been ported to modern computers as a free, open-source game. Reviewers of the game, both contemporary and retroactive, viewed the game as a good primer for children with regard to business and decision-making processes.
Gameplay
The game simulates a child's lemonade stand, where choices made by the player regarding prices, advertising, etc. will determine the success or failure of the enterprise. The game owed its success to offering just enough variables to create a complex challenge for users, while still providing an easy-to-grasp introduction to running a business.
The player is first given a weather report for the day (sunny, cloudy, or hot and dry, each accompanied by a color drawing) and is prompted for three values: the number of glasses of lemonade to make, the number of advertising signs, and the cost of lemonade per glass. The program then gives a report of the earnings for that day. A thunderstorm, sometimes occurring on cloudy days and accompanied by an animation, will void any profits and cause the player to lose any investment for the day. Other random events, such as street closures or the wind blowing away some signs, can also occur. The game ends after 12 rounds, or days. The game can be played either single-player or with up to 30 players (each player is independent and the sales of one do not affect another). The Apple II version included music, with bars from "Singin' in the Rain" during thunderstorms, "Raindrops Keep Fallin' on My Head" on cloudy days, "Call to the Dairy Cows" on sunny days and "Summertime" on hot and dry days. It also added color to the thunderstorm animation.
Development
Lemonade Stand was originally developed by Bob Jamison of the Minnesota Educational Computing Consortium in 1973 for time-shared mainframe computers.
Ports
Charlie Kellner ported the game to the Apple II in February 1979, and Apple included it for free with their computers throughout the 1980s.
Minnesota Educational Computing Consortium sold Lemonade Stand as part of a bundle of seven Apple II games for children for US$25 from MECC. MECC a
|
https://en.wikipedia.org/wiki/BOOTES
|
BOOTES (Burst Observer and Optical Transient Exploring System) is a Global Network of Robotic Astronomical Observatories with seven sites located in Spain (two stations), New Zealand, China, Mexico, South Africa and Chile. While the BOOTES-1 station in Spain is devoted to wide-field astronomy, the additional stations (BOOTES-2 in Spain, BOOTES-3 in New Zealand, BOOTES-4 in China, BOOTES-5 in Mexico, BOOTES-6 in South Africa and BOOTES-7 in Chile) include a similar setup (hardware and software): the 0.6m diameter robotic telescope, the EMCCD camera at the Cassegrain focus and the u'g'r'i'ZY filterset (only the u' filter is lacking in BOOTES-2), which makes the BOOTES Network a unique resource for combining the data from all the instruments worldwide.
The BOOTES Network is managed by Instituto de Astrofísica de Andalucía (IAA) of the Consejo Superior de Investigaciones Cientificas (CSIC) with the strong involvement of the University of Málaga in collaboration with other Spanish and international entities abroad.
The BOOTES Network was fully deployed in 2022, thus becoming the first network of robotic telescopes with sites in all continents. The main goal of the network is to quickly observe transient events within seconds or minutes of being detected by scientific satellites.
BOOTES provides an automated real time response to the detection of Gamma Ray Bursts (GRBs) and other incoming alerts (neutrino sources, gravitational waves, etc.). Error box size depending, it uses wide field cameras (WFC), ultra wide field cameras (UWFC) and narrow field cameras (NFC).
To study GRBs, it is of the utmost importance to perform prompt optical follow-up observations to detect longer wavelength transient emission associated to the GRBs; BOOTES can perform such follow ups. Its scientific objectives include:
Simultaneous and quasi-simultaneous observations of GRB error boxes.
Detection of optical flashes of cosmic origin.
All-sky monitoring with the CASANDRA cameras down to 10th magnitude every 60 seconds.
Monitoring of different types of variable objects (galactic or extragalactic) down to 20th magnitude in order to search for optical variability.
Discovery of comets, meteors, asteroids, variable stars, novae and supernovae.
Its principal investigator is Prof. Alberto J. Castro-Tirado (IAA-CSIC and UMA), who conceived the project at the time of his PhD. studies in Denmark in 1993 and started the deployment of BOOTES in 1998, with the support of the Instituto Nacional de Tecnica Aeroespacial (INTA) within the framework of an international collaboration led by Spain, in order to support the European Space Agency satellite INTEGRAL with ground-based observations. The project also focused on performing rapid follow up observations of events detected by several spacecraft (BATSE, BeppoSAX, RossiXTE, IPN, Hete-2, Swift, and Fermi). Results in the GRB field are multifold:
Pre-detection images: BOOTES sets up upper limits for any possible precursors.
Simultaneous i
|
https://en.wikipedia.org/wiki/Madge%20Networks
|
Madge Networks NV was a networking technology company founded by Robert Madge, and is best known for its work with Token Ring. It was a global leader and pioneer of high-speed networking solutions in the mid-1990s, and also made significant contributions to technologies such as Asynchronous Transfer Mode (ATM) and Ethernet.
The company filed for bankruptcy in April 2003. The operational business of the company is currently trading as Madge Ltd. in the UK. Under a deal with Network Technology PLC, the company acquired the rights and copyright to Madge's products, brand and website, as well as the remaining inventory. The assets will be absorbed by Network Technology PLC subsidiary Ringdale Limited, making them the world's largest supplier of Token Ring technology.
Technology development
Madge Networks was once one of the world's leading suppliers of networking hardware. Headquartered in Wexham, England, Madge Networks developed Token Ring, Ethernet, ATM, ISDN, and other products providing extensive networking solutions. The company's products ranged from ISA/PCI network adapters for personal computers to work group switching hubs, routers, and ISDN backbone carriers. Madge focus was to provide convergence solutions in Ethernet, Token Ring, ISDN, and the then emerging ATM networking technologies. In addition to its Wexham headquarters, Madge operated main offices in Eatontown, New Jersey and San Jose, California, as well as offices in more than 25 countries throughout the world.
Founded in 1986, Madge Networks was a pioneer in the networking market, the emergence of which went on to define internal and external communications among corporations in every industry. Madge Networks was one of the world's leading proponents of Token Ring technology, producing ISA, PCI, and PC card adapters, switches, stacks, and other devices required for its implementation of Token Ring technology.
In the late 1990s Madge Networks had taken a leading role in developing the standards and first implementations of emerging High-Speed Token Ring (HSTR) technology. This newer protocol provided for a dramatic increase in data transmission bandwidth, while remaining compatible with first-generation Token Ring technology.
The sale of their Ethernet technology (LANNET) to Lucent Technologies in July 1998 reduced Madge Networks' presence in the Ethernet market, a rival networking technology to the Token Ring standard. The company tightened focus in the ATM market, emerging video conferencing technology and other ISDN carrier applications. Madge produced switching, routing and WAN-LAN interfacing equipment to facilitate both intracorporate and intercorporate video conferencing. In the ISDN market, the trend to use digital telephone lines to increase data, voice, and video transmission bandwidth, led Madge to develop a line of Edge Switching Nodes (ESNs) and other miscellaneous carrier equipment.
Corporate history
One-time horseback riding instructor, Robert Madge entered
|
https://en.wikipedia.org/wiki/Robert%20Madge%20%28businessman%29
|
Robert Hylton Madge (born 2 April 1952) is a British entrepreneur and technologist.
Career
In the 1980s, he founded and was chairman of Madge Networks, a pioneer of high speed networking technology.
Once he was the President of IDTrack, a European Association for identification and traceability of goods based on technologies such as RFID. He was also the founder of Olzet, a provider of services associated with the implementation of RFID solutions in the food industry.
He was President of the European Association for Secure Identification.
References
1952 births
Living people
British technology company founders
People in information technology
Radio-frequency identification
|
https://en.wikipedia.org/wiki/Jeff%20Eppinger
|
Jeffrey Lee Eppinger (born ca 1960) is an American computer scientist, entrepreneur and Professor of the Practice at the Carnegie Mellon University, School of Computer Science.
Eppinger was a co-founder of Transarc Corporation, which was bought by IBM in 1994.
Eppinger was a student at Carnegie Mellon University where he earned a Bachelor of Science in 1982, a Master of Science in 1987, and a PhD in Computer Science in 1988. His advisors were Alfred Spector and Richard Rashid.
At Carnegie Mellon, Eppinger's dissertation demonstrated the integration of the Mach Operating System's virtual memory with the Camelot Transaction System. This recoverable virtual memory concept was subsequently used to implement the Coda File System.
In 1983, Eppinger won the George E. Forsythe Award for his research in binary search trees.
Eppinger had made empirical studies of their behaviour under random deletions and insertions.
References
External links
Jeff Eppinger's Home
1960s births
Living people
American computer scientists
Carnegie Mellon University alumni
|
https://en.wikipedia.org/wiki/Beehive%20Forum
|
Beehive Forum is a free and open-source forum system using the PHP scripting language and MySQL database software.
The main difference between Beehive and most other forum software is its frame-based interface which lists discussion titles on the left and displays their contents on the right.
Features
Other features which differentiate Beehive from most forums include:
Targeted replies to specific users and/or posts.
Safe HTML posting (malicious code is stripped out), rather than BBCode, via WYSIWYG editor, helper toolbar, or manual typing.
A relationship system, allowing users to ignore users and/or signatures that they dislike.
Powerful forum-wide and per-user word filtering, including a regular expression option.
A flexible polling system, allowing public or private ballot, grouped answers, and different result modes.
A built-in "light mode" that allows basic forum access from PDAs and web-enabled mobilephones.
Beehive is used by the popular UK technology website The Inquirer on the Hermits Cave Message Board.
Security and vulnerabilities
In May 2007, Beehive Forum was selected as one of the most secure forums from a selection of 10 open-source software tested by Dragos Lungu Dot Com.
On 28 November 2007, Nick Bennet and Robert Brown of Symantec Corporation discovered a security flaw related to Beehive's database input handling. The vulnerability could "allow a remote user to execute SQL injection attacks". The flaw affected all versions of the software up to 0.7.1. The Beehive Forum team responded very rapidly with a fix released, in the form of version 0.8 of the software, later that day.
Reviews
Review of Beehive 0.5 by ExtremeTech
Review of Beehive 0.6.3 by Forum Software Reviews
See also
Comparison of Internet forum software
References
External links
Beehive Forum Help Wiki by ManicGeek Tech Portal
Beehive feature list on ForumMatrix.org comparison website
Free Internet forum software
Free software programmed in PHP
Free groupware
|
https://en.wikipedia.org/wiki/CPU%20modes
|
CPU modes (also called processor modes, CPU states, CPU privilege levels and other names) are operating modes for the central processing unit of some computer architectures that place restrictions on the type and scope of operations that can be performed by certain processes being run by the CPU. This design allows the operating system to run with more privileges than application software.
Ideally, only highly trusted kernel code is allowed to execute in the unrestricted mode; everything else (including non-supervisory portions of the operating system) runs in a restricted mode and must use a system call (via interrupt) to request the kernel perform on its behalf any operation that could damage or compromise the system, making it impossible for untrusted programs to alter or damage other programs (or the computing system itself).
In practice, however, system calls take time and can hurt the performance of a computing system, so it is not uncommon for system designers to allow some time-critical software (especially device drivers) to run with full kernel privileges.
Multiple modes can be implemented—allowing a hypervisor to run multiple operating system supervisors beneath it, which is the basic design of many virtual machine systems available today.
Mode types
The unrestricted mode is often called kernel mode, but many other designations exist (master mode, supervisor mode, privileged mode, etc.). Restricted modes are usually referred to as user modes, but are also known by many other names (slave mode, problem state, etc.).
Kernel
In kernel mode, the CPU may perform any operation allowed by its architecture; any instruction may be executed, any I/O operation initiated, any area of memory accessed, and so on. In the other CPU modes, certain restrictions on CPU operations are enforced by the hardware. Typically, certain instructions are not permitted (especially those—including I/O operations—that could alter the global state of the machine), some memory areas cannot be accessed, etc. User-mode capabilities of the CPU are typically a subset of those available in kernel mode, but in some cases, such as hardware emulation of non-native architectures, they may be significantly different from those available in standard kernel mode.
User
Some CPU architectures support multiple user modes, often with a hierarchy of privileges. These architectures are often said to have ring-based security, wherein the hierarchy of privileges resembles a set of concentric rings, with the kernel mode in the center. Multics hardware was the first significant implementation of ring security, but many other hardware platforms have been designed along similar lines, including the Intel 80286 protected mode, and the IA-64 as well, though it is referred to by a different name in these cases.
Mode protection may extend to resources beyond the CPU hardware itself. Hardware registers track the current operating mode of the CPU, but additional virtual-memory registers
|
https://en.wikipedia.org/wiki/Da%20Capo%20II
|
is a Japanese adult visual novel developed by Circus which was first released on May 26, 2006, for Windows computers. It is a part of the ongoing Da Capo series of games by Circus, and is the direct sequel to Circus' previous title Da Capo released in 2002. Da Capo II is described by Circus as a . A fan disc, Da Capo II: Spring Celebration, was released on April 27, 2007, and features springtime stories set after the endings for each of the six Da Capo II heroines. An all-ages consumer port titled Da Capo II: Plus Situation containing additional scenarios was released for the PlayStation 2 in May 2008. The PlayStation 2 version was later ported to PC, titled Da Capo II: Plus Communication and containing the hentai scenes found in the original release, in December 2008.
There have been many drama CDs, and two separate sets of novels and manga created based on the original game. An anime adaptation aired in Japan between October and December 2007 on TV Aichi, and was also broadcast on other networks as well. A second season of the anime aired between April and June 2008; each anime season contained thirteen episodes and were produced by Feel. A sequel set 20 years after the end of Da Capo II, Da Capo III, was released on April 27, 2012.
Gameplay
The gameplay in Da Capo II utilizes the same system used in Da Capo, in which little interaction is required from the player as most of the duration of the game is spent on simply reading the text that will appear on the screen; this text represents either dialogue between the various characters, or the inner thoughts of the protagonist. Every so often, the player will come to a "decision point" where he or she is given the chance to choose from options that are displayed on the screen, typically two to three at a time. During these times, gameplay pauses until a choice is made that furthers the plot in a specific direction, depending on which choice the player makes. The consequences of these decisions varies, in which they may either affect the protagonist, Yoshiyuki's action, or his location. At the beginning of the gameplay, the player will mostly be given choices based on the protagonist's actions, but is soon introduced to choices based on locations and the alarm clock. Choices based on locations are accompanied by an image of a heroine, to allow the choices to be easier. The player may also adjust the protagonist's alarm clock, determining the events which occurs the following morning in the game.
There are six main plot lines that the player will have the chance to experience, one for each of the heroines in the story. In order to view the six plot lines to their entirety, the player will have to replay the game multiple times and choose different choices during the decision points in order to further the plot in an alternate direction. The game is split into three main parts: the first story arc revolves around an upcoming Christmas party, the second arc takes place during the winter holiday b
|
https://en.wikipedia.org/wiki/Boot%20ROM
|
The boot ROM is a type of ROM that is used for booting a computer system. There are two types: a mask boot ROM that cannot be changed afterwards and a boot EEPROM, which can contain an UEFI implementation.
Purpose
Upon power up, hardware usually starts uninitialized. To continue booting, the system may need to read a bootloader from some peripheral device. It is often easier to implement routines for reading from external storage devices in software than in hardware. A boot ROM provides a place to store this initial loading code, at a fixed location immediately available to the processor when execution starts.
Operation
The boot ROM is mapped into memory at a fixed location, and the processor is designed to start executing from this location after reset. Usually, it is placed on the same die as the CPU, but it can also be an external ROM chip, as is common in older systems.
The boot ROM will then initialize the hardware busses and peripherals needed to boot. In some cases the boot ROM is capable of initializing RAM, and in other cases it is up to the bootloader to do that.
At the end of the hardware initialization, the boot ROM will try to load a bootloader from external peripheral(s) (like an eMMC, a microSD card, an external EEPROM, and so on) or through specific protocol(s) on a bus for data transmission (like USB, UART, etc).
In many systems on a chip, the peripherals or buses from which the boot ROM tries to load the bootloader (such as eMMC for embedded bootloader, or external EEPROM for UEFI implementation), and the order in which they are loaded, can be configured. This configuration can be done by blowing some electronic fuses inside the system on a chip to encode that information, or by having specific pins or jumpers of the system on a chip high or low.
Some boot ROMs are capable of checking the digital signature of the bootloader and will refuse to run the bootloader and stop the boot if the signature is not valid or has not been signed with an authorized key. With some boot ROMs the hash of the public key needed to verify the signatures is encoded in electronic fuses inside the system on a chip. Some system on a chip boot ROMs also support a Public key infrastructure and the hash of the certificate authority(CA) public key is encoded in the electronic fuses instead, and the boot ROM will then be able to check if the bootloader is signed by an authorized key by verifying that key with the CA public key (whose hash is encoded in the electronic fuses)..
That feature can then be used to implement security features or used as a hardware root of trust in a Chain of trust, but once configured, users are denied the freedom to replace the bootloader with the one they want. Because of this the feature has raised strong concerns from the free software community.
Just before jumping to the bootloader, some systems on a chip also remove the boot ROM from the memory mapping, while others do not, making it possible to dump the boot ROM f
|
https://en.wikipedia.org/wiki/Al%20Qaeda%20Handbook
|
The Al Qaeda Handbook 1677-T 1D is a computer file found by Police during a search of the Manchester home of Anas al-Liby in 2000. A translation has been provided by the American Federal Bureau of Investigation. Officials state that the document is a manual for how to wage war, and according to the American military, was written by Osama bin Laden's extremist group, al-Qaeda. However, the manual was likely written either by a member of Egyptian Islamic Jihad or al-Gama'a al-Islamiyya; in addition, the mentioned targets in the manual are the rulers of Arab countries, not the West.
Some of the selected translated text from the manual are found on a United States Department of Justice website. (Only some of the manual is provided because it "does not want to aid in educating terrorists or encourage further acts of terrorism".)
The handbook has been repeatedly invoked by American officials when confronted with accusations of detainee abuse or torture.
Contents
The manual was found in a computer file described as "the military series" related to the "Declaration of Jihad."
According to the United States military, the handbook contains 180 pages divided into 18 chapters. It reportedly begins, "The confrontation we are calling for... knows the dialogue of bullets, the ideals of assassination, bombing and destruction, and the diplomacy of the cannon and machine gun."
Excerpts publicly available describe the structure of a military organization whose main mission is the "overthrow of the godless regimes and their replacement with an Islamic regime," and include instructions on counterfeiting and forgery, security measures for undercover activities, and strategies in the case of arrest and indictment.
The handbook provides religious justifications and quotations from the Qur'an throughout.
The military states that the handbook instructs members of Al Qaeda how to lie to captors during interrogation, and falsely claim they are being tortured.
Claims of torture
Department of Defense spokesmen routinely state that Guantanamo captives were trained using the manual. American Defense Secretary Donald Rumsfeld dismissed detainee allegations of torture at Guantanamo, stated that "detainees are trained to lie, they're trained to say they were tortured."
Arrests for downloading manual in England
A student and a researcher at the University of Nottingham, studying extremism, were arrested in 2008 after downloading the Handbook from a U.S. Government site to a University of Nottingham computer. Twenty-six academics at the University signed a petition in protest of the arrests. They were released a week later, but one was subsequently charged with visa irregularities, and the ensuing controversy within the university led to the suspension of the educator teaching the terrorism course.
See also
Management of Savagery
References
Terrorism handbooks and manuals
Works by al-Qaeda
|
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20A%26E
|
The following is a list of television programs formerly or currently broadcast by A&E.
Current programming
Original
Reality
American Justice (1992–2005; 2020–present)
City Confidential (1998–2005; 2021–present)
Cold Case Files (1999–2002; 2006; 2017; 2021–present)
The First 48 (2004–present)
Intervention (2005–present)
Hoarders (2009–13; 2016–present)
After The First 48 (2009–2014; 2020; 2022–present)
Storage Wars (2010–present)
Nightwatch (2015–17; 2021–present)
60 Days In (2016–present)
Zombie House Flipping (2019–present)
Court Cam (2019–present)
Accused: Guilty Or Innocent? (2020–present)
Killer Cases (2020–present)
WWE's Most Wanted Treasures (2021–present)
Triple Digit Flip (2021–present)
Neighborhood Wars (2021–present)
I Survived a Crime (2021–present)
Taking the Stand (2022–present)
Secrets of Playboy (2022-present)
Interrogation Raw (2022–present)
Road Wars (2022–present)
Court Night Live (2022–present)
Inmate to Roommate (2022–present)
Customer Wars (2022-present)
Christmas Wars (2022-present)
24 Hour Flip (2023-present)
Secret Sauce with Todd Graves (2023-present)
Stone Cold Takes on America (2023-present)
Booked: First Day In (2023-present)
Best in Chow (2023-present)
Deliciously Twisted Classics (2023-present)
Secrets of Miss America (2023-present)
My Secret Arrest (2023-present)
Kings of BBQ (2023-present)
Hip Hop Treasures (2023-present)
Secrets of Penthouse (2023-present)
Murder in the 21st (2023-present)
Women on Death Row (2023-present)
Witness to Murder: Digital Evidence (2023-present)
Docuseries
Biography: WWE Legends (2021–present)
WWE Rivals (2022–present)
WWE Smack Talk (2022–present)
Upcoming programming
Buddy Valastro's Cake Dynasty (November 11, 2023)
Legends of the Fork (November 11, 2023)
Former programming
Original programming
Reality
An Evening at the Improv (1982–96)
Pulaski, the TV Detective (1988–90)
Improv Tonite (1989–93)
Caroline's Comedy Hour (1989–95)
Breakfast with the Arts (1991–2007)
Comedy on the Road (1991–94; 1996)
First Flights (1991–93)Investigative Reports (1991–2004)America's Castles (1994–2005)Ancient Mysteries (1994–98)Mysteries of the Bible (1994–98)Live by Request (1996–2004)The Big House (1998)Christianity: The First Two Thousand Years (1998)A&E Top 10 (1999–2000)All Year Round with Katie Brown (2003)Makeover Mamas (2003)Take This Job (2003)Sell This House (2003–11, 2022)Airline (2004–05)Growing Up Gotti (2004–05)Family Plots (2004–05)Find & Design (2004–08)Dog the Bounty Hunter (2004–12)Bearing Witness (2005)Caesar's 24/7 (2005)Criss Angel Mindfreak (2005–10)Random 1 (2005–06)Flip This House (2005–09) Inked (2005–06)Knievel's Wild Ride (2005)Move This House (2005–07)Big Spender (2006)Designing Blind (2006)God or the Girl (2006) Rollergirls (2006)Spying on Myself (2006)Dallas SWAT (2006–07)Driving Force (2006–07)King of Cars (2006–07)Gene Simmons Family Jewels (2006–12)Clean This House (2007)Jackpot Diaries (2007)Sons of Hollywood (2007)Confessions of a Matchmaker (2007–08)The Two
|
https://en.wikipedia.org/wiki/Argus%20%E2%80%93%20Audit%20Record%20Generation%20and%20Utilization%20System
|
Argus – the Audit Record Generation and Utilization System is the first implementation of network flow monitoring, and is an ongoing open source network flow monitor project. Started by Carter Bullard in 1984 at Georgia Tech, and developed for cyber security at Carnegie Mellon University in the early 1990s, Argus has been an important contributor to Internet cyber security technology over its 30 years. .
The Argus Project is focused on developing all aspects of large scale network situational awareness and network audit trail establishment in support of Network Operations (NetOps), Performance and Security Management. Motivated by the telco Call detail record (CDR), Argus attempts to generate network metadata that can be used to perform a large number of network management tasks. Argus is used by many universities, corporations and government entities including US DISA, DoD, DHS, FFRDCs, GLORIAD and is a Top 100 Internet Security Tool. Argus is designed to be a real-time situational awareness system, and its data can be used to track, alarm and alert on wire-line network conditions. The data can also be used to establish a comprehensive audit of all network traffic, as described in the Red Book, US DoD NCSC-TG-005, supplementing traditional Intrusion detection system (IDS) based network security. The audit trail is traditionally used as historical network traffic measurement data for network forensics and Network Behavior Anomaly Detection (NBAD). Argus has been used extensively in cybersecurity, end-to-end performance analysis, and more recently, software-defined networking (SDN) research. Argus has also been a topic in network management standards development. RMON (1995) and IPFIX (2001).
Argus is composed of an advanced comprehensive network flow data generator, the Argus monitor, which processes packets (either capture files or live packet data) and generates detailed network traffic flow status reports of all the flows in the packet stream. Argus monitors all network traffic, data plane, control plane and management plane, not just Internet Protocol (IP) traffic. Argus captures much of the packet dynamics and semantics of each flow, with a great deal of data reduction, so you can store, process, inspect and analyze large amounts of network data efficiently. Argus provides reachability, availability, connectivity, duration, rate, load, good-put, loss, jitter, retransmission (data networks), and delay metrics for all network flows, and captures most attributes that are available from the packet contents, such as Layer 2 addresses, tunnel identifiers (MPLS, GRE, IPsec, etc...), protocol ids, SAP's, hop-count, options, L4 transport identification (RTP detection), host flow control indications, etc... Argus has implemented a number of packet dynamics metrics specifically designed for cyber security. Argus detects human typing behavior in any flow, but of particular interest is key-stroke detection in encrypted SSH tunnels. a
|
https://en.wikipedia.org/wiki/Pararena
|
Pararena is an action computer game for the Apple Macintosh computer originally written in 1990 by John Calhoun and released as shareware. Calhoun previously wrote the Macintosh game Glider.
In 1992, in association with Casady & Greene, Calhoun wrote version 2.0 of Pararena which had 16 color graphics and was then a commercial product.
Gameplay
It is a mouse-controlled ball game where two players compete on hoverboards in a parabolic arena with two "goals" on the sides. The objective is to gain scores by getting the ball into the other player's goal and, on the other hand, to protect one's own goal. The ball can be held for a while by squatting on it (holding the mouse button down) and then thrown to the current direction. If a player is tossed out of the arena still holding the ball, the player is charged with a foul and will respawn in a few seconds. Similarly, if the player throws the ball out of the arena, the player is charged with a foul and the ball will respawn. Each time a player amasses five fouls, the opponent is awarded with a point.
The game is situated in space and the two competing teams are called "Earth" and "Taygete".
Reception
Pararena was reviewed by Matthew Wilber who described the game as "one of the great hits that never was" praising "clean graphics, memorable characters" and "elegantly simple game play".
Legacy
On 27 Jan 2016, the source code, graphics, and sound data for Pararena were released on GitHub with the source code being licensed under the MIT license.
References
External links
The Vintage Mac Museum: Pararena Slideshows
Pararena download at the Macintosh Garden
1990 video games
Casady & Greene games
Classic Mac OS games
Classic Mac OS-only games
Commercial video games with freely available source code
Free software
Single-player video games
Software using the MIT license
Video games developed in the United States
|
https://en.wikipedia.org/wiki/WZDX
|
WZDX (channel 54) is a television station in Huntsville, Alabama, United States, affiliated with Fox and MyNetworkTV. Owned by Tegna Inc., the station maintains studios on North Memorial Parkway (US 72/231/431) in Huntsville, and its transmitter is located on Monte Sano Mountain.
WZDX began broadcasting in April 1985 as the first independent station for the Huntsville area; it became a Fox affiliate in November 1987. Its original owner, Media Central, filed for bankruptcy that year and eventually sold the station in 1990 to a consortium of Citicorp and Milton Grant, marking the latter's return to TV station ownership after a prior bankruptcy. The station started a cable channel that served as the local affiliate of The WB—predecessor to its MyNetworkTV subchannel—in 2001. A local newscast, produced at first out-of-state and then by local ABC affiliate WAAY-TV, began to air in 2008.
The Grant stations were acquired by Nexstar Broadcasting Group in 2013; Nexstar brought local news production in-house by establishing its own newsroom in 2016, and it formed a duopoly in the market by acquiring The CW affiliate WHDF two years later. When Nexstar acquired Tribune Media, owner of Huntsville CBS affiliate WHNT-TV, in 2019, it retained that station and WHDF and spun out WZDX along with other stations to Tegna.
History
Establishment and construction
In 1975, Thomas Barr and James Cleary under the name Pioneer Communications petitioned the Federal Communications Commission (FCC) to add another television channel to the Huntsville area for the purpose of building an independent station. At the time, only four channels were assigned to Huntsville: 19, 25, 31, and 48. The FCC proposed adding channel 54, but two Huntsville stations, WAAY-TV and WYUR-TV, opposed the proposal. In 1977, the FCC suggested inserting channel 54 at Decatur, Alabama, which already had channel 23. However, unlike channel 54, channel 23 could not be used at Monte Sano—the main television transmission site in the region, resulting in low interest.
Channel 54 was ultimately added to Huntsville, but there were no applications on file until C. Michael Norton, an attorney from Nashville, Tennessee, applied for it in September 1981 after seeing it on a list of unused TV allocations. Norton was soon joined by other applicants, with the FCC selecting Community Service Broadcasting, a company owned by John Pauza of Chattanooga, Tennessee, and Joel Katz of Atlanta. Pauza owned Media Central, which specialized in the construction of new independent stations in medium markets.
For two years, Media Central missed a series of deadlines. In February 1983, after being selected for the construction permit, Media Central announced it intended to begin broadcasting that fall. By that fall, the target date had shifted to spring 1984. Issues with locating the station's tower impeded a launch at that time, but in late 1984, channel 54 began to take shape. A tower site was purchased in August, the call
|
https://en.wikipedia.org/wiki/ALPAC
|
ALPAC (Automatic Language Processing Advisory Committee) was a committee of seven scientists led by John R. Pierce, established in 1964 by the United States government in order to evaluate the progress in computational linguistics in general and machine translation in particular. Its report, issued in 1966, gained notoriety for being very skeptical of research done in machine translation so far, and emphasizing the need for basic research in computational linguistics; this eventually caused the U.S. government to reduce its funding of the topic dramatically. This marked the beginning of the first AI Winter.
The ALPAC was set up in April 1964 with John R. Pierce as the chairman.
The committee consisted of:
John R. Pierce, who at the time worked for Bell Telephone Laboratories
John B. Carroll, a psychologist from Harvard University
Eric P. Hamp, a linguist from the University of Chicago
David G. Hays, a Machine Translation researcher from RAND Corporation
Charles F. Hockett, a linguist from Cornell University
Anthony G. Oettinger, a Machine Translation researcher from Harvard University
Alan Perlis, an Artificial Intelligence researcher from Carnegie Institute of Technology
Testimony was heard from:
Paul Garvin of Bunker-Ramo Corporation
Gilbert King of Itek Corporation and previously from IBM
Winfred P. Lehmann from University of Texas
Jules Mersel of Bunker-Ramo Corporation
ALPAC's final recommendations (p. 34) were, therefore, that research should be supported on:
practical methods for evaluation of translations;
means for speeding up the human translation process;
evaluation of quality and cost of various sources of translations;
investigation of the utilization of translations, to guard against production of translations that are never read;
study of delays in the over-all translation process, and means for eliminating them, both in journals and in individual items;
evaluation of the relative speed and cost of various sorts of machine-aided translation;
adaptation of existing mechanized editing and production processes in translation;
the over-all translation process; and
production of adequate reference works for the translator, including the adaptation of glossaries that now exist primarily for automatic dictionary look-up in machine translation
See also
Georgetown-IBM experiment
AN/GSQ-16 ("Automatic Language Translator", system introduced 1959)
History of artificial intelligence
History of machine translation
AI winter
Lighthill Report
References
John R. Pierce, John B. Carroll, et al., Language and Machines — Computers in Translation and Linguistics. ALPAC report, National Academy of Sciences, National Research Council, Washington, DC, 1966.
ALPAC Report , Language and Machines — Computers in Translation and Linguistics. A Report by the Automatic Language Processing Advisory Committee, Washington, DC, 1966
External links
The report accessible on-line
ALPAC: the (in)famous report — summary of the r
|
https://en.wikipedia.org/wiki/Network%20Computer%20Reference%20Profile
|
Network Computer Reference Profile (NC reference profile, NCRP) was a specification for a network computer put forward by Oracle Corporation, endorsed by Sun Microsystems, IBM, Apple Computer, and Netscape, and finalized in 1996.
NC1
The first version of this specification was known as the NC1 Reference Profile.
NCRP specified minimum hardware requirements and software protocols. Among the software requirements were support of IP-based protocols (TCP/IP, FTP, etc.), www standards (HTTP, HTML, Java), email protocols, multimedia file formats, security standards. Operating systems used were NCOS or JavaOS.
The minimum hardware requirements were:
minimum screen resolution of 640 x 480 (VGA) or equivalent
pointing device
text input ability
audio output
Although this initial NC standard was intended to promote the diskless workstation model of computing, it did not preclude computers with additional features, such as the ability to operate either as a diskless workstation or a conventional fat client. Thus, an ordinary personal computer (PC) having all the required features, could technically be classified as a Network Computer; indeed, Sun noted that contemporary PCs did indeed meet the NC reference requirements.
StrongARM
The reference profile was subsequently revised to use the StrongARM processor.
Intel
After a trip by Ellison to Acer Group headquarters in 1996, he realised the importance to industry of having products based on Intel (x86-compatible) processors. NCI president Jerry Baker noted that "nobody [corporate users] had ever heard of the ARM chip".
Options
Many NCs operated via protocols such as BOOTP, DHCP, RARP and NFS.
Both for ISP-bound and LAN-based reference implementation NCs, a smartcard option was available. This allowed user authentication to be performed in a secure manner, with SSL providing transport security. The smartcard also provided minimal local storage for ISP dialup configuration settings. This configuration data was not required for LAN-based NCs.
See also
Network Computer, the brand, created by Oracle, for which the NCRP was the specification
References
Network computer (brand)
Networking standards
|
https://en.wikipedia.org/wiki/Enclosure%20Services%20Interface
|
The Enclosure Services Interface (ESI) is a computer protocol used in SCSI enclosures. This is part of a chain of connections that allows a host computer to communicate with the enclosure to access its power, cooling, and other non-data characteristics. This overall approach is called SCSI attached enclosure services:
The host computer communicates with the disks in the enclosure via a Serial SCSI interface (which may be either FC-AL or SAS). One of the disk devices located in the enclosure is set up to allow SCSI Enclosure Services (SES) communication through a LUN. The disk-drive then communicates with the SES processor in the enclosure via ESI. The data sent over the ESI interface is simply the contents of a SCSI command and the response to that command.
In fault-tolerant enclosures, more than one disk-drive slot has ESI enabled to allow SES communications to continue even after the failure of any of the disk-drives.
ESI electrical interface
The ESI interface was designed to make use of the seven existing "SEL_n" address signals which are used at power-on time for establishing the address (ALPA) of a disk-drive. An extra eighth signal called "-PARALLEL ESI" is used to switch the function of the SEL_n signals.
ESI command sequence
A SCSI Send Diagnostic command or Receive Diagnostic Results command is sent from the host computer to the disk-drive to initiate an SES transfer. The Disk-drive then asserts "-PARALLEL ESI" to begin this sequence of ESI bus phases:
Finally, the disk-drive deasserts "-PARALLEL ESI".
The above sequence is just a simple implementation of a 4-bit wide parallel interface which is used to execute a SCSI transaction. If the CDB is for a Send Diagnostic command then the data is sent to a SCSI diagnostic page in the enclosure. If the CDB is for a SCSI Receive Diagnostic Results command then the data is received from a SCSI diagnostic page. No other CDB types are allowed.
Alternatives to ESI
There are two common alternatives ESI:
Standalone Enclosure Services uses a direct connection which does not require ESI
SSA enclosures use an interface called DSI which is similar to ESI
Specifications
The definition of the ESI protocols is owned by an ANSI committee and defined in their specifications ANSI SFF-8067 and ANSI SFF-8045.
SCSI
|
https://en.wikipedia.org/wiki/Identification%20scheme
|
In metadata, an identification scheme is used to identify unique records in a set.
If a data element is used to identify a record within a data set, the data element uses the Identifier representation term.
An identification scheme should be contrasted with a classification scheme. Classification schemes are used to classify individual records into categories. Many records in a data set may be in a single category.
See also
Classification scheme
Metadata
Representation term
Metadata
|
https://en.wikipedia.org/wiki/Time%20%28metadata%29
|
Under some metadata standards, time is a representation term used to specify a time of day in the ISO 8601 time format.
Note that Time should not be confused with the DateAndTime representation term which requires that both the date and time to be supplied.
Metadata registries that use the time representation term
NIEM
ebXML
GJXDM
See also
metadata
ISO/IEC 11179
Representation term
ISO 8601
Metadata
Representation term
|
https://en.wikipedia.org/wiki/Alt%20code
|
On personal computers with numeric keypads that use Microsoft operating systems, such as Windows, many characters that do not have a dedicated key combination on the keyboard may nevertheless be entered using the Alt code (the Alt numpad input method). This is done by pressing and holding the key, then typing a number on the keyboard's numeric keypad that identifies the character and then releasing .
History and description
MS DOS
On IBM PC compatible personal computers from the 1980s, the BIOS allowed the user to hold down the key and type a decimal number on the keypad. It would place the corresponding code into the keyboard buffer so that it would look (almost) as if the code had been entered by a single keystroke. Applications reading keystrokes from the BIOS would behave according to what action they associate with that code. Some would interpret the code as a command, but often it would be interpreted as an 8-bit character from the current code page that was inserted into the text the user was typing. On the original IBM PC the code page was CP437.
Some Eastern European, Arabic and Asian computers used other hardware code pages, and MS-DOS was able to switch between them at runtime with commands like KEYB, CHCP or MODE. This causes the Alt combinations to produce different characters (as well as changing the display of any previously-entered text in the same manner). A common choice in locales using variants of the Latin alphabet was CP850, which provided more Latin character variants. (There were, however, many more code pages; for a more complete list, see code page).
PC keyboards designed for non-English use included other methods of inserting these characters, such as national keyboard layouts, the AltGr key or dead keys, but the Alt key was the only method of inserting some characters, and the only method that was the same on all machines, so it remained very popular. This input method is emulated by many pieces of software (such as later versions of MS-DOS and Windows) that do not use the BIOS keyboard decoding.
In the ASCII standard, the numbers 0-31 and 127 are assigned to control characters, for instance, code point 7 is typed by . While some (most?) applications would insert a bullet character (code point 7 on code page 437), some would treat this identical to which often was a command for the program.
Typing a number greater than 255 produced the character associated with the remainder after the number is divided by 256.
Windows
The Alt codes had become so well known and memorized by users that Microsoft decided to preserve them, even though it used a new and different set of code pages for Windows, such as CP1252. The old code pages were called OEM code pages; the new ones are called Windows code pages, The familiar Alt+number combinations produced codes from the OEM code page (for example, CP437 in the United States), matching the results from MS-DOS. But prefixing a leading zero (0) to the number (usually meaning
|
https://en.wikipedia.org/wiki/AMPRNet
|
The AMPRNet (AMateur Packet Radio Network) or Network 44 is used in amateur radio for packet radio and digital communications between computer networks managed by amateur radio operators. Like other amateur radio frequency allocations, an IP range of was provided in 1981 for Amateur Radio Digital Communications (a generic term) and self-administered by radio amateurs. In 2001, undocumented and dual-use of as a network telescope began, recording the spread of the Code Red II worm in July 2001. In mid-2019, part of IPv4 range was sold off for conventional use, due to IPv4 address exhaustion.
Amateur Radio Digital Communications (mode)
Beginning on 1 May 1978, the Canadian authorities allowed radio amateurs on the 1.25-meter band (220 MHz) to use packet radio, and later in 1978 announced the "Amateur Digital Radio Operator's Certificate".
Discussion on digital communication amateur radio modes, using the Internet protocol suite and IPv4 addresses followed subsequently.
By 1988, one thousand assignments of address space had been made.
approximately 1% of inbound traffic volume to the network was legitimate radio amateur traffic that could be routed onwards, with the remaining 2‒100 gigabyte per day of Internet background noise being diverted and logged by the University of California San Diego (UCSD) internet telescope for research purposes.
By 2016, the European-based High-speed Amateur-radio Multimedia NETwork (HAMNET) offered a multi-megabit Internet Protocol network with 4,000 nodes, covering central Europe.
History and design
The use of the Internet protocols TCP/IP on amateur (ham) radio occurred early in Internet history, preceding the public Internet by over a decade. In 1981, Hank Magnuski obtained the class A netblock of 16.7 million IP addresses for amateur radio users worldwide. This was prior to Internet flag day (1 January 1983) when the ARPANET Network Control Protocol (NCP) was replaced by the Transmission Control Protocol (TCP). The initial name used by Jon Postel in was the "Amateur Radio Experiment Net".
Originally the amateur link layer protocol AX.25 carried several competing higher level protocols, with TCP/IP a minority due to the complexity of the configuration and the high protocol overhead. Very few systems operated over HF for this reason. One approach for 1,200/9,600-baud VHF/UHF operation emerged as TCP/IP over ROSE (Radio Amateur Telecommunications Society "RATS" Open Systems Environment, based on X.25 CCITT standard). Within just a few years the public Internet made these solutions obsolete. The ROSE system today is maintained by the Open Source FPAC Linux project.
The AMPRNet is connected by wireless links and Internet tunnels. Due to the bandwidth limitations of the radio spectrum, 300 bit/s is normally used on HF, while VHF and UHF links are usually 1,200 bit/s to 9,600 bit/s. Mass-produced Wi-Fi access points equipment on and is now being used on nearby amateur frequencies to provide much faster li
|
https://en.wikipedia.org/wiki/WCFC-CA
|
WCFC-CA, UHF analog channel 51, was a low-powered Total Living Network owned-and-operated television station licensed to Rockford, Illinois, United States.
History
This station started out in 1986 as a low-power satellite station of Chicago's WCFC (channel 38, now WCPX). However, when WCPX was sold to Paxson Communications in 1998, Rockford's Channel 51 became more of a full-fledged station of its own. It was later on that WCFC-CA opened its own studio facility in Rockford. In January 2001, WCFC-CA applied for and was granted a Class A broadcast license. That, in essence, upgraded the broadcasting signal, more than tripling its power.
WCFC and TLN carry selected programs from fellow religious broadcaster, the Trinity Broadcasting Network, and family-based secular programs such as Little House on the Prairie.
TLN goes cable only
On September 30, 2008, TLN relocated on Comcast from analog cable channel 15 to digital cable channel 138, then closed down WCFC-CA; the station cited that this was due to the digital transition, then scheduled for February 2009—this was despite the fact that Class A and low-powered television stations were exempt from the switchover. Following the switch to cable-only service, the station turned in its license to the FCC for cancellation.
"We remain committed to the Rockford market, but the move from broadcast to cable will allow us to make better use of our resources while continuing to provide faith and values programming to Rockford and the surrounding areas," said Jerry Rose, President of TLN. "As an organization, we believe in staying current with technology and appreciate the opportunity to do so with Comcast Digital Cable."
Defunct television stations in the United States
CFC-CA
Television channels and stations established in 1986
1986 establishments in Illinois
Television channels and stations disestablished in 2008
2008 disestablishments in Illinois
CFC-CA
|
https://en.wikipedia.org/wiki/Italian%20Somaliland%20lira
|
The Italian Somaliland lira also called the Somali lira (), was a special version of the Italian lira minted in Italian Somaliland between 1925 and 1926.
Data
The "Italian Somali Lira" replaced the Italian Somaliland rupia at a rate of 8 lire = 1 rupia. Only coins of £5 and £10 were issued, which circulated alongside Italian coins and banknotes. From 1938, banknotes for the Italian East African lira also circulated. The coin circulation officially lasted until 1941.
Coins
In 1925, silver coins in denominations of 5 and 10 lire were issued.
They were slightly larger than the 5 and 10 lire coins introduced in Italy the following year. The issue was approved by the Royal Decree of 18 June 1925, n. 1143, contextually put out over the former "Somalia Rupia". To the reverse there was the Arms of Somalia era: lion passant and three six-pointed stars. The Coat of Arms, between two branches, was crowned. Legends were only in Italian.
Notes
Bibliography
Mauri, Arnaldo (1967). Il mercato del credito in Etiopia, Giuffrè ed. Milano, 1967.
External links
Currencies of "Somalia Italiana" (in Italian)
Currencies of Somalia
Modern obsolete currencies
1925 establishments in the Italian Empire
Lira
|
https://en.wikipedia.org/wiki/Air1
|
Air1 is an American Christian radio network. Owned by the Educational Media Foundation (EMF), a non-profit Christian ministry, it primarily broadcasts contemporary worship music, and is a sister to the EMF's K-Love network.
History
In 1986, KLRD began broadcasting Christian Hit/Rock music from Yucaipa, California, and went by the on-air moniker K-LORD. In 1994, KXRD was started as a sister station to KLRD. In 1995, K-LORD changed its name to "Air1" and began broadcasting via satellite from St. Helens, Oregon. Air1 Radio (formerly K-LORD) was originally launched by K-LOVE founder Bob Anthony Fogal and Jon and Noonie Fuglar.
In 1999, Air1 joined with EMF Broadcasting, and finally in 2002, it moved its headquarters to Rocklin, California. Air1 makes use of broadcast translators to spread the signal across much of the country. As of January 2023, the network lists 143 full powered radio stations and 144 translators of various power levels reaching 45 states. The network's programming is simulcast on over 334 FM stations and translators in 45 U.S. states, American Samoa, Puerto Rico, and the District of Columbia
Air1 began as a Christian rock-formatted radio network with the slogan "The Positive Alternative". Over time, the network evolved into a broad Christian CHR presentation, with the slogan "Positive Hits".
In October 2018, Air1 named Mandy Young, the network's assistant PD and morning co-host, as its new head program director. On January 1, 2019, Air1 re-launched with a focus on contemporary worship music. Although it continues to carry some CCM content, the majority of its playlist now focuses on songs by worship bands, such as Elevation Worship, Hillsong Worship, and Vertical Worship.
List of stations
On-air staff
Current staff
As of January 2023, the on-air staff of Air1 includes morning drive hosts Dan and Michelle (coming from KYMX Sacramento), Careth and Ashton in mid-mornings, CJ and Lauren in the afternoons, Mary in the evenings and program director Mandy Young on Saturdays.
Former staff
Eric Calhoun and Heather Shelley hosted Air1's morning show from April 2015 to November 2018.
Sean Copeland was formerly part of the Sean and Mandy show, which was discontinued on September 29, 2011. Copeland moved to the morning show on Indianapolis adult contemporary station WYXB.
Coppelia Acevedo formerly occupied the midday time slot, and moved to Houston station KSBJ.
Brant Hansen filled the afternoon time slot from 2011 to 2014. He resigned to work with nonprofit Cure International and launch The Brant Hansen Show, a podcast that is syndicated on many Christian radio stations.
Eric Allen co-hosted the "Eric and Mandy Show" in the mornings until February 2015; his co-host Mandy stated he was moving on to "bigger & better things". As of 2015, Eric is working for Cure International as their Radio Marketing Manager.
Brenda Price hosted a mid-day time slot until May 5, 2015, when Air1 stated Brenda was no longer a part of Air1's DJ lineup. N
|
https://en.wikipedia.org/wiki/WDC%2065C51
|
The CMOS W65C51 Asynchronous Communications Interface Adapter (ACIA) provides an easily implemented, program controlled interface between microprocessor based systems and serial communication data sets and modems. It is produced by Western Design Center (WDC) and is a drop-in replacement for the MOS Technology 6551.
The ACIA has an internal baud rate generator, eliminating the need for multiple component support circuits. The transmitter rate can be selected under program control to be 1 of 15 different rates from 50 to 19,200 bits per second, or at 1/16 times an external clock rate. The receiver rate may be selected under program control to be either the Transmitter rate or at 1/16 times the external clock rate. The ACIA has programmable word lengths of 5, 6, 7 or 8 bits; even, odd or no parity 1, 1½ or 2 stop bits.
The ACIA is designed for maximum programmed control from the microprocessor (MPU) to simplify hardware implementation. Three separate registers permit an MPU to easily select the W65C51 operating modes, data checking parameters and determine operational status.
The command register controls parity, receiver echo mode, transmitter interrupt control, the state of the RTS line, receiver interrupt control and the state of the DTR line.
The control register controls the number of stop bits, the word length, receiver clock source and transmit/receive rate.
The status register indicates the status of the IRQ, DSR and DCD lines, transmitter and receiver data Registers, and overrun, framing and parity error conditions.
Transmitter and receiver data Registers are used for temporary data storage by the transmit and receiver circuits, each able to hold one byte.
Known bugs
The N version datasheet has a note regarding the Transmitter Data Register Empty flag:
"The W65C51N loads the Transmitter Data Register (TDR) and Transmitter Shift Register (TSR) at the same time. A delay should be used to insure that the shift register is empty before the TDR/TSR is reloaded. This feature of the W65C51N works different from earlier 6551 designs."
This means the TDRE flag cannot be relied on for flow control.
It has been reported that some W65C51 chips have the TDRE flag stuck high
References
External links
W65C51S Datasheet
W65C51N Datasheet
Input/output integrated circuits
|
https://en.wikipedia.org/wiki/David%20L.%20Tennenhouse
|
David Lawrence Tennenhouse (born c. 1957) is a Canadian–American computer researcher and technology executive.
Life
Tennenhouse was born about 1957 in Ottawa, Canada.
He received a bachelor's and master's degree in electrical engineering from the University of Toronto. In 1989 he completed a PhD at the University of Cambridge under advisor Roger Needham.
His dissertation was Site interconnection and the exchange architecture.
He then joined the faculty of Massachusetts Institute of Technology (MIT).
He was chairman of the Technology and Policy Working Group of the US National Information Infrastructure Task Force at some time point.
In 1996 he became director of the Information Technology Office of the Defense Advanced Research Projects Agency (DARPA), overseeing US government research.
In 1999, he joined Intel as a director of research.
In 2001, he founded what were sometimes called the Intel Research Lablets. One of the projects sponsored was TinyOS.
In February 2006 he became the chief executive officer of A9.com, the search subsidiary of Amazon.com, replacing Udi Manber.
He left Amazon in September 2006. In 2007 he became a partner at the venture capital firm New Venture Partners.
In 2004, he was granted IEEE fellowship for leadership in the development of active networks.
In September 2012 he became vice president for technology policy at Microsoft.
In May 2014 he joined VMware to direct its research.
References
Living people
Year of birth missing (living people)
Businesspeople in information technology
MIT Sloan School of Management faculty
American technology chief executives
University of Toronto alumni
Alumni of the University of Cambridge
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.