source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/KGHD-LD
KGHD-LD (channel 6) is a low-power television station in Las Vegas, Nevada, United States. The station is owned by Obidia Porras. KGHD-LD is operated as a hybrid radio/TV station. The TV portion broadcasts in the ATSC 3.0 (NextGen TV) standard and airs programming from Diya TV. The radio station is broadcast at 87.75 MHz. History KGHD began operations in 2002 as K67HK (channel 67) in St. George, Utah. It was built by the Trinity Broadcasting Network and broadcast TBN programs with 1.3 kW ERP. In early 2010, K67HK was bought by Obidia Porras of Victorville, California; Porras operates KUHD-LP and other "franken-FMs" that use VHF analog channel 6. Needing to vacate the 700 MHz band, K67HK moved to channel 6. Porras then moved the channel from a transmitter site near Interstate 15 and Brigham Road to West Mountain Peak, and in 2010, K67HK became KGHD-LP. KGHD embarked on a piecemeal relocation down I-15 to Las Vegas, starting with a September 2010 move to a facility near Overton, Nevada. Not long after, KGHD went off the air due to a malfunctioning generator. The generator had provided the only source of electrical service to the transmitter, leaving few solutions for the problem aside from finding a new home. KGHD filed once more to move in 2011 to a site at Apex, on I-15 northeast of Las Vegas, but its final move came in 2013, to Black Mountain—the main television and radio transmitter site in Las Vegas—as the Apex site's air conditioner had ceased to function properly and jeopardized the transmitter equipment. Once it was resituated, KGHD's first radio programming was a grupera format known as "La Primera"; during this time, Humberto Luna hosted the station's morning show, and the station (which, as a TV station, was required to broadcast video) aired a 30-minute video loop. After a period of silence which began in summer of 2015, KGHD returned in May 2016 as "La Raza" with a similar format. In 2020, the station changed names and operators, becoming "Fiesta 87.7
https://en.wikipedia.org/wiki/Markovian%20Parallax%20Denigrate
Markovian Parallax Denigrate is a series of hundreds of messages posted to Usenet in 1996. The messages, which appear to be gibberish, were all posted with the subject line "Markovian parallax denigrate". The posts are often mentioned in conjunction with other bizarre and/or unsolved internet mysteries, such as Sad Satan, Cicada 3301, the Publius Enigma, and Unfavorable Semicircle. In 2012, Kevin Morris of The Daily Dot satirically referred to the messages as "the Internet’s oldest and weirdest mystery". In 2016, Susan Lindauer was mistakenly identified as a possible source of these posts; when contacted, she denied being the author. The Daily Dot article covering the event states that an e-mail account belonging to a University of Wisconsin at Stevens Point student coincidentally named Susan Lindauer was spoofed to cover the identity of the poster. Proposed explanations for the texts include an early experimental chat bot or text generator, an internet troll or prankster posting forum spam, or a programmer experimenting with Markov chains. A later article on the subject published by The A.V. Club proposes the event only became a mystery due to later media coverage, having not been widely reported prior to the 2012 Daily Dot article. The same article notes that YouTuber Barely Sociable made a video about this topic in 2020, opining that the messages were most likely simple spam with no hidden message. Example This seemingly nonsensical message was posted to the board "alt.religion.christian.boston-church" in 1996: See also List of famous ciphertexts Numbers station Webdriver Torso References Usenet Works of unknown authorship Internet mysteries 1996 works
https://en.wikipedia.org/wiki/Quantum%20machine%20learning
Quantum machine learning is the integration of quantum algorithms within machine learning programs. The most common use of the term refers to machine learning algorithms for the analysis of classical data executed on a quantum computer, i.e. quantum-enhanced machine learning. While machine learning algorithms are used to compute immense quantities of data, quantum machine learning utilizes qubits and quantum operations or specialized quantum systems to improve computational speed and data storage done by algorithms in a program. This includes hybrid methods that involve both classical and quantum processing, where computationally difficult subroutines are outsourced to a quantum device. These routines can be more complex in nature and executed faster on a quantum computer. Furthermore, quantum algorithms can be used to analyze quantum states instead of classical data. Beyond quantum computing, the term "quantum machine learning" is also associated with classical machine learning methods applied to data generated from quantum experiments (i.e. machine learning of quantum systems), such as learning the phase transitions of a quantum system or creating new quantum experiments. Quantum machine learning also extends to a branch of research that explores methodological and structural similarities between certain physical systems and learning systems, in particular neural networks. For example, some mathematical and numerical techniques from quantum physics are applicable to classical deep learning and vice versa. Furthermore, researchers investigate more abstract notions of learning theory with respect to quantum information, sometimes referred to as "quantum learning theory". Machine learning with quantum computers Quantum-enhanced machine learning refers to quantum algorithms that solve tasks in machine learning, thereby improving and often expediting classical machine learning techniques. Such algorithms typically require one to encode the given classical dat
https://en.wikipedia.org/wiki/Robocasting
Robocasting (also known as robotic material extrusion) is an additive manufacturing technique analogous to Direct Ink Writing and other extrusion-based 3D-printing techniques in which a filament of a paste-like material is extruded from a small nozzle while the nozzle is moved across a platform. The object is thus built by printing the required shape layer by layer. The technique was first developed in the United States in 1996 as a method to allow geometrically complex ceramic green bodies to be produced by additive manufacturing. In robocasting, a 3D CAD model is divided up into layers in a similar manner to other additive manufacturing techniques. The material (typically a ceramic slurry) is then extruded through a small nozzle as the nozzle's position is controlled, drawing out the shape of each layer of the CAD model. The material exits the nozzle in a liquid-like state but retains its shape immediately, exploiting the rheological property of shear thinning. It is distinct from fused deposition modelling as it does not rely on the solidification or drying to retain its shape after extrusion. Process Robocasting begins with a software process. One method is importing an STL file and slicing that shape into layers of similar thickness to the nozzle diameter. The part is produced by extruding a continuous filament of material in the shape required to fill the first layer. Next, either the stage is moved down or the nozzle is moved up and the next layer is deposited in the required pattern. This is repeated until the 3D part is complete. Numerically controlled mechanisms are typically used to move the nozzle in a calculated tool-path generated by a computer-aided manufacturing (CAM) software package. Stepper motors or servo motors are usually employed to move the nozzle with precision as fine as nanometers. The part is typically very fragile and soft at this point. Drying, debinding and sintering usually follow to give the part the desired mechanical properties.
https://en.wikipedia.org/wiki/Mobile%20location%20analytics
Mobile location analytics (MLA) is a type of customer intelligence and refers to technology for retailers, including developing aggregate reports used to reduce waiting times at checkouts, improving store layouts, and understanding consumer shopping patterns. The reports are generated by recognizing the Wi-Fi or Bluetooth addresses of cell phones as they interact with store networks. By seeing the movement of devices, retailers can gather data that will help them optimize such things as floor plan layouts, advertisement placement and checkout lane staffing. MLA products work by capturing a device's MAC address, the unique 12-digit number that is assigned to a specific hardware device. This number can be detected by Wi-Fi or Bluetooth sensors. There are separate MAC addresses for Wi-Fi and Bluetooth. Beacons are also used for MLA purposes and they work with Bluetooth. Through this technology, they are also able to send push notifications. Recently companies started using the combination of Wi-Fi and Bluetooth to improve accuracy and reliability of the MLA devices. The technology works as people walk through stores; the tracking companies find their wireless signal and assign the device a random number. They monitor that number as it moves across the screen and analyze patterns in the data. Characteristics Because of the use of the automatically transmitted MAC address, the customers need not be logged into the shops' Wi-Fi or website. This feature is highlighted in the alternative term "offline tracking" (as opposed to online tracking) that is sometimes used for "MLA" e.g. in Germany. Uses A number of industries can benefit from MLA services including retail, real estate, energy, insurance, manufacturing, healthcare, government, planning, and public safety. For example, retail businesses can compare sales revenue and evaluate marketing campaign effectiveness. Businesses can determine where to open stores and distribute their products. MLA is also beneficial fo
https://en.wikipedia.org/wiki/Maria%20Wonenburger
María Josefa Wonenburger Planells (Montrove, Oleiros, Galicia, July 17, 1927 – A Coruña, June 14, 2014) was a Galician mathematician who did research in the United States and Canada. She is known for her work on group theory. She was the first Spaniard to obtain a Fulbright scholarship for doctoral studies in mathematics. Biography Wonenburger's father's family was Alsatian and her mother's family was from Valencia. She had a passion for mathematics from an early age, though her parents wanted her to study engineering so that she could participate in the family business, a foundry. After completing her undergraduate studies at the Universidad Central de Madrid, now known as Complutense University of Madrid, she began her doctoral work there. A Fulbright scholar, her studies took her to Yale University where she completed her Ph.D. in 1957 under Nathan Jacobson. She returned to Spain three years later with a scholarship to Instituto de Matemáticas Jorge Juan del CSIC. At the end of the grant, she moved to Canada where her first PhD student was Robert Moody. In 1966, she moved to the United States to teach at the University of Buffalo, and the following year, in 1967, she received a permanent post as a professor at the University of Indiana, where she remained until 1983. Because of her mother's illness, she returned to La Coruña in 1983, and remained away from the academic world, except some sporadic collaboration with institutions such as AGAPEMA. Her research mainly focused on group theory and the theory of Lie algebras. She studied the orthogonal group and its corresponding projective group. She directed eight doctoral theses; in addition to Moody, her students included Stephen Berman, Bette Warren, Edward George Gibson, and Richard Lawrence Marcuson. In 2010, the Galician government and University of A Coruña established the María Josefa Wonenburger Planells Prize in her honor. The award recognizes women with achievements in science and technology. References
https://en.wikipedia.org/wiki/Reduced%20level
In surveying, reduced level (RL) refers to equating elevations of survey points with reference to a common assumed vertical datum. It is a vertical distance between survey point and adopted datum surface. Thus, it is considered as the base elevation which is used as reference to reckon heights or depths of other important places. Reduced here means equating and level means elevations. Datum may be a real or imaginary location with a nominated elevation of straight zero. Datum used The most common and convenient datum which is internationally accepted is mean sea level. Countries take their nearby sea levels as datum planes for calculations of reduced levels. For example, Pakistan takes sea near Karachi as its datum while India takes sea near Mumbai as its datum for calculation of reduced levels. The term reduced level is denoted shortly by 'RL'. National survey departments of each country determine RLs of significantly important locations or points. These points are called permanent benchmarks and this survey process is known as Great Trigonometrical Surveying (GTS). The permanent benchmarks act as reference points for determining RLs of other locations in a particular country. Instruments The instruments used to determine reduced level include: Optical levelling instruments like automatic level, Y level, dumpy level, or Coke's reversible level Levelling staff Tripod stand RL calculation RL of a survey point can be determined by two methods: Height of instrument method Rise and fall method Significance For drainage of water under gravity a suitable slope is required. Thus, roads are built in the fashion that their RL's on sides are comparatively smaller than the RL at the mid-span of the road. This ensures proper drainage of water from roads. For construction of buildings, roads, and dams, a horizontal levelled surface is required. So, at construction sites, RLs of different points are obtained. The ground surface is then being levelled to the RL, which i
https://en.wikipedia.org/wiki/GPANG
GPANG (Korean: 지팡) was a 3D mobile game service introduced in 2004 by the Korean provider KTF. This service allowed subscribers to access a downloadable game portal and play advanced 3D mobile games, including MMOs. KTF's GPANG competed with SK Telecom's own 3D mobile game service called GXG. On June 1 2009, GPANG ceased to exist. Compatible devices LG KV3600 (2005) Samsung SPH-G1000 (2005) Samsung SPH-B3200 (2006) Games 72 released games are known to exist, with 1 unreleased game. See also GXG N-Gage References External links GPANG Website New World MMO Store Mobile software Online video game services Mobile software distribution platforms
https://en.wikipedia.org/wiki/POODLE
POODLE (which stands for "Padding Oracle On Downgraded Legacy Encryption") is a security vulnerability which takes advantage of the fallback to SSL 3.0. If attackers successfully exploit this vulnerability, on average, they only need to make 256 SSL 3.0 requests to reveal one byte of encrypted messages. Bodo Möller, Thai Duong and Krzysztof Kotowicz from the Google Security Team discovered this vulnerability; they disclosed the vulnerability publicly on October 14, 2014 (despite the paper being dated "September 2014" ). On December 8, 2014 a variation of the POODLE vulnerability that affected TLS was announced. The CVE-ID associated with the original POODLE attack is . F5 Networks filed for as well, see POODLE attack against TLS section below. Prevention To mitigate the POODLE attack, one approach is to completely disable SSL 3.0 on the client side and the server side. However, some old clients and servers do not support TLS 1.0 and above. Thus, the authors of the paper on POODLE attacks also encourage browser and server implementation of TLS_FALLBACK_SCSV, which will make downgrade attacks impossible. Another mitigation is to implement "anti-POODLE record splitting". It splits the records into several parts and ensures none of them can be attacked. However the problem of the splitting is that, though valid according to the specification, it may also cause compatibility issues due to problems in server-side implementations. A full list of browser versions and levels of vulnerability to different attacks (including POODLE) can be found in the article Transport Layer Security. Opera 25 implemented this mitigation in addition to TLS_FALLBACK_SCSV. Google's Chrome browser and their servers had already supported TLS_FALLBACK_SCSV. Google stated in October 2014 it was planning to remove SSL 3.0 support from their products completely within a few months. Fallback to SSL 3.0 has been disabled in Chrome 39, released in November 2014. SSL 3.0 has been disabled by def
https://en.wikipedia.org/wiki/Effector-triggered%20immunity
Effector-triggered immunity (ETI) is one of the pathways, along with the Pattern-Triggered Immunity (PTI) pathway, by which the innate immune system recognises pathogenic organisms and elicits a protective immune response. ETI is elicited when an effector protein secreted by a pathogen into the host cell is successfully recognised by the host. Alternatively, effector-triggered susceptibility (ETS) can occur if an effector protein is able to block the immune response triggered by Pattern Recognition Receptors (PRR) and evade immunity, allowing the pathogen to propagate in the host. ETI was first identified in plants but has also been identified in animal cells. The basis of the ETI model lies in the gene-for-gene resistance hypothesis proposed by Harold Henry Flor in 1942. Flor proposed that plants may express resistance (R) proteins that recognise avirulence (Avr) proteins from pathogens, thus making them resistant to pathogen invasion. His hypothesis has since been confirmed by the identification of multiple Avr-R gene pairs. Some Avr proteins are direct ligands for receptors encoded by the R genes, such as the Leu-rich repeat receptors (LRRs). Other Avr proteins, called effectors, act to modify host proteins and those modifications that are sensed by R proteins on the host plant side to initiate effector-triggered immunity. References Immune system process
https://en.wikipedia.org/wiki/Shelter%202
Shelter 2 is an open world survival video game developed by Might and Delight for Windows, Mac OS X, and Linux. The game is a sequel to 2013's Shelter. It was released on March 9, 2015 and, like its predecessor, was made available on Steam as a digital download. Gameplay In Shelter 2 the player controls a mother lynx, looking after her kittens by keeping them fed and safe from danger. The game aimed to contain new types of movement compared to the original, a bigger variety of prey, and a larger open world which changes during the four seasons. Additional instructions are available to the player such as instructing the cubs to drink from a river. The player must make sure the cubs are safely back in the family's den at night time and the seasons affect what food and water is available. The game starts with the mother lynx pregnant and preparing a den. The player is able to name each of the kittens, and those which survive a playthrough are playable as the next generation of the family tree. Development In March 2014 Might and Delight announced the development of Shelter 2, releasing a teaser trailer and setting a release date of Autumn 2014. The game was delayed to March 9, 2015 in October 2014 after the developers announced a different game would be released first, The Blue Flamingo. Reception GameSpot awarded Shelter 2 a score of 6 out of 10, saying that it "has the right spirit, the right ideas, and it is once again hamstrung by its inability to go the extra, needed mile to do them justice". Destructoid was more critical, awarding it 3 out of 10 and saying "something went wrong somewhere along the line." Expansions Shelter 2: Mountains was released on 25 August 2015. It adds a whole new area, with new dangers that you can turn off in the main menu. New dangers include the fox, eagle, forest fire, and bear. The mountains are located north of the den area. References 2015 video games Biological simulation video games Linux games Open-world video games Mac
https://en.wikipedia.org/wiki/Nexus%20Player
The Nexus Player was a digital media player co-developed by Google, Intel and Asus. It was the second media player in the Google Nexus family of consumer devices. Originally running the Android 5.0 ("Lollipop") operating system, it was the first device to employ the Android TV platform. The Nexus player supports Google Cast, the feature for selecting and controlling media playback on a television that was first introduced by Chromecast. Sales of the Nexus Player were discontinued in May 2016, and product support ended in March 2018. History The Nexus Player was unveiled on October 15, 2014, and made available for pre-order two days later on the Google Play Store for $99, and later made available for purchase at retail stores in the US. On May 24, 2016, Google discontinued direct sales of the Nexus Player. In May 2017, Google announced that Google Assistant was coming to the Nexus Player later in the year. In November 2017, the device was updated with the Google Assistant feature through the monthly security update. In March 2018, Google confirmed that the Nexus Player would not receive Android 9 Pie and that security updates had also ended for the device. In August 2018, Android Headlines reported that some Nexus Player were facing an issue where they became inoperable. Hardware It is powered by a 1.8 GHz quad-core Intel Atom Z3560 processor with 1 GB of LPDDR3 RAM and 8 GB of internal eMMC storage. Remote control The Nexus Player comes bundled with a Bluetooth remote control, with a direction pad & middle enter button, a back, home and play/pause button. It also features a button to activate the Google Search application to search for content by speaking through the remote's built-in microphone. The device can also be controlled by any Android smartphone with Google Play services. The app also features a Wear OS counterpart to allow remote input from compatible smartwatches. Features The Nexus Player and Android TV allows consumers to use an HDTV set to p
https://en.wikipedia.org/wiki/Spot%20test%20%28lichen%29
A spot test in lichenology is a spot analysis used to help identify lichens. It is performed by placing a drop of a chemical on different parts of the lichen and noting the colour change (or lack thereof) associated with application of the chemical. The tests are routinely encountered in dichotomous keys for lichen species, and they take advantage of the wide array of lichen products produced by lichens and their uniqueness among taxa. As such, spot tests reveal the presence or absence of chemicals in various parts of a lichen. They were first proposed by the botanist William Nylander in 1866. Three common spot tests use either 10% aqueous KOH solution (K test), saturated aqueous solution of bleaching powder or calcium hypochlorite (C test), or 5% alcoholic p-phenylenediamine solution (P test). The colour changes occur due to presence of particular secondary metabolites in the lichen. There are several other less frequently used spot tests of more limited use that are employed in specific situations, such as to distinguish between certain species. Tests Four spot tests are used most commonly to help with lichen identification. K test The reagent for the K test is an aqueous solution of potassium hydroxide (KOH) (10–25%), or, in the absence of KOH, a 10% aqueous solution of sodium hydroxide (NaOH, lye), which provides nearly identical results. A 10% solution of KOH will retain its effectiveness for about 6 months to a year. The test depends on salt formation and required the presence of at least one acidic functional group in the molecule. Lichen compounds that contain a quinone as part of their structure will produce a dark red to violet colour. Example compounds include the pigments that are anthraquinones, naphthoquinones, and terphenylquinones. Yellow to red colours are produced with the K test and some depsides (including atranorin and thamnolic acid), and many β-orcinol depsidones. In contrast, xanthones, pulvinic acid derivatives, and usnic acid do not hav
https://en.wikipedia.org/wiki/Nicolson%20pavement
Nicolson pavement, alternatively spelled "Nicholson" and denominated wooden block pavement and wood block pavement, is a road surface material consisting of wooden blocks. Samuel Nicolson invented it in the mid-19th century. Wooden block pavement has since become unfavored because of its poor surface quality and high cost of maintenance. History Wood block pavement may have originated in Russia in the 14th century, but it gained prominence in the 1820s and 1830s as a road building alternative to the irregularly surfaced cobblestone streets common during that era. Wood block was also favored because stone was scarce and wood was abundant. Additionally, horse traffic reportedly made less noise on wood-surfaced streets. However, the drawbacks of Nicolson pavement include slippery surfaces when wet or icy, and the tendency of the blocks to rot, decay, and heave due to moisture seeping between the blocks. For example, the 1910 Great Flood of Paris caused substantial damage to inundated streets when the wood blocks floated and became dislodged. When treated with creosote, wood block pavement would last longer, but the creosoted pavement had a noticeable unpleasant smell. Nicolson pavement was the focus of a Supreme Court case, City of Elizabeth v. American Nicholson Pavement Co. which held that while the public use of an invention more than one year prior to the inventor's application for a patent normally causes the inventor to lose his right to a patent, there is an exception to this rule for public uses for experimental purposes. Remnants Remnants of Nicolson pavement still exist in several cities across the US. Touted as the only remaining wooden street in the US, Roslyn Place in Pittsburgh, Pennsylvania, is completely paved in wooden blocks. In addition, patches of creosoted wooden block pavement are still visible in an alley along 10th street between Olive and Locust Streets in St. Louis, Missouri, and at least three other alleys in Chicago, Illinois, still re
https://en.wikipedia.org/wiki/List%20of%20SDN%20controller%20software
Software-defined networking (SDN) is a marketing term which refers to software to configure and operate computer networks (especially data center networks) through a centralized software controller that dictates how the network behaves. The core of this new paradigm is the SDN controller. There are typically two sets of SDN controllers: SDN controllers for the network function virtualization (NFV) of a datacenter, SDN controllers for managing the programmable switches of a network. In case of SDN controllers for the NFV Infrastructure of a datacenter, they are mostly designed to provide some policy and centralized managements for the Openstack Neutron networking layer that will provide inter-working between the virtual ports created by Nova. The technology of SDN controllers is to manage the Linux kernel features made of L3 IP routing, Linux bridges, iptables or ebtables, network namespaces and Open vSwitch. Open and community-driven initiatives Some promotional links to be removed: Beacon Faucet lighty-core Cherry NOX/POX ONOS Open vSwitch Tungsten OpenDaylight (controller baseline project, upon which many other controllers are built) OpenKilda Project Calico Floodlight RUNOS Ryu Controller The Fast Data Project vneio/sdnc Vendor Specific Initiatives lighty.io by PANTHEON.tech Nuage Virtualized Services Controller (VSC) by Nokia SEL-5056 by Schweitzer Engineering Laboratories VortiQa Open Network Director by Freescale Semiconductor References Configuration management Lists of software
https://en.wikipedia.org/wiki/LearnedLeague
LearnedLeague is a web-based, invitation-only global quiz league operated by Seattle-based software engineer Shayne Bushfield under the pseudonym "Thorsten A. Integrity". As of August 2023, it has over 28,000 members worldwide. Structure Players are organized into leagues with nonspecific geographic designations like "Central" and "Frontier". Players in each league are then sorted into "rundles" based on past performance (all first-time players begin in special rookie rundles). A promotion-and-relegation system is used: a player can move up to higher rundles by finishing at or near the top of a lower one, or move down to lower rundles by finishing at or near the bottom of an upper one. The top players in each league compete annually for the title of LearnedLeague Champion. Gameplay Regular season Each calendar year is divided into four seasons. Each season includes 25 match days—essentially one per U.S. business day. Players are paired against each other each day during the season and compete in a six-question trivia match, with questions from 18 categories ranging from world history, science, and geography to lifestyle, food/drink, and television. Each player attempts to answer as many questions correctly as possible ("offense") and assigns point values to each question ("defense"). Players must assign one question a value of 3 points, two questions values of 2 points, two questions values of 1 point, and one question a value of 0 points (allowing a maximum score per player of 9 points). A player's opponent will get the assigned point value if they answer correctly. Since the past performance of all players based on subject matter is openly available, defense is an important factor in gameplay. Answers must be submitted by 10 PM Pacific Time. Results from the previous day along with the new set of questions are released each Match Day by midnight Pacific time. MiniLeagues and One-Days Special Between regular seasons, a number of optional multiday and single-day
https://en.wikipedia.org/wiki/Derivative%20of%20the%20exponential%20map
In the theory of Lie groups, the exponential map is a map from the Lie algebra of a Lie group into . In case is a matrix Lie group, the exponential map reduces to the matrix exponential. The exponential map, denoted , is analytic and has as such a derivative , where is a path in the Lie algebra, and a closely related differential . The formula for was first proved by Friedrich Schur (1891). It was later elaborated by Henri Poincaré (1899) in the context of the problem of expressing Lie group multiplication using Lie algebraic terms. It is also sometimes known as Duhamel's formula. The formula is important both in pure and applied mathematics. It enters into proofs of theorems such as the Baker–Campbell–Hausdorff formula, and it is used frequently in physics for example in quantum field theory, as in the Magnus expansion in perturbation theory, and in lattice gauge theory. Throughout, the notations and will be used interchangeably to denote the exponential given an argument, except when, where as noted, the notations have dedicated distinct meanings. The calculus-style notation is preferred here for better readability in equations. On the other hand, the -style is sometimes more convenient for inline equations, and is necessary on the rare occasions when there is a real distinction to be made. Statement The derivative of the exponential map is given by Explanation To compute the differential of at , , the standard recipe is employed. With the result follows immediately from . In particular, is the identity because (since is a vector space) and . Proof The proof given below assumes a matrix Lie group. This means that the exponential mapping from the Lie algebra to the matrix Lie group is given by the usual power series, i.e. matrix exponentiation. The conclusion of the proof still holds in the general case, provided each occurrence of is correctly interpreted. See comments on the general case below. The outline of proof makes use of the tech
https://en.wikipedia.org/wiki/Construction%20contract
A construction contract is a mutual or legally binding agreement between two parties based on policies and conditions recorded in document form. The two parties involved are one or more property owners and one or more contractors. The owner, often referred to as the 'employer' or the 'client', has full authority to decide what type of contract should be used for a specific development to be constructed and to set out the legally-binding terms and conditions in a contractual agreement. A construction contract is an important document as it outlines the scope of work, risks, duration, duties, deliverables and legal rights of both the contractor and the owner. Types There are three main types of construction contract, identified according to the mechanism for calculating the sum due to be paid by the employer: lump sum contracts, re-measurement contracts and cost-reimbursable contracts. The different types vary primarily with regard to who takes the risks involved, which party has to pay for the cost over runs, and which party can keep the savings if the project costs are less than the estimated costs. Other types of contract and descriptions of contractual purpose include: Commercial contract Domestic building contract Percentage rate contract Item rate contract or Unit price contract Lump sum and scheduled contract Cost plus fixed fee contract Cost plus percentage of cost contract Subcontract agreement Special contracts Lump sum contract Under a lump sum contract, an owner agrees to pay a contractor a specified lump sum after the completion of work without a cost breakdown. After work is complete, no detailed measurement is required. Lump sum and scheduled contract In lump sum contract the complete work as per plan and specifications is carried out by contractor for certain fixed amount as per agreement. The owner provides required information and contractor charges certain amount. This contract is suitable when the number of items are limited or when it is
https://en.wikipedia.org/wiki/Highway%20Safety%20Manual
The Highway Safety Manual (HSM) is a publication of the American Association of State Highway Transportation Officials. It contains concepts, guidelines, and computational procedures for predicting the safety performance of various highway facilities. The HSM was published in 2010 and is divided into four sections: Part A – Introduction, Human Factors, and Fundamentals of Safety; Part B – Roadway Safety Management Process; Part C – Predictive Methods; and Part D – Crash Modification Factors. See also Highway Capacity Manual Transportation Research Board American Association of State Highway and Transportation Officials References External links FHWA Office of Safety Highway Safety Manual page http://safety.fhwa.dot.gov/hsm/ Crash Modification Factor Clearing House http://www.cmfclearinghouse.org/ Road transportation in the United States Road traffic management
https://en.wikipedia.org/wiki/TV%20gateway
A TV gateway (also called network TV tuner) is a television headend to a network UPnP router that receives live digital video broadcast (DVB) MPEG transport streams (channels) from terrestrial aerials, satellite dishes, or cable feeds and converts them into IP streams for distribution over an IP network. TV gateways allow users to stream broadcast live TV content to connected devices on the IP network, including tablets, smartphones, computers, gaming consoles and smart tvs. They also allow multiple users to watch and record different channels at the same time. The device offers multi-platform, multi-screen broadcast television with rich live TV content and high quality HD channels. Digital TV signals used in TV gateways Most TV gateways support free-to-air (FTA) television services found in many countries. These include services such as Freeview and Freesat in the United Kingdom, TNT in France and TDT in Spain, and basic cable packages in Germany, Switzerland, Austria, and others. A few TV gateways also support third party conditional access modules (CAMs) for premium pay TV channels, which are transmitted by using a CAM CI card provided by the broadcasters or by third party manufacturers to access their TV service. Uses While many first-generation TV gateways support only one channel or a limited number of channels, modern TV gateways provide multiple TV tuners that can process several channels simultaneously. The more channels a TV gateway provides the more users it can service at the same time. Modern TV gateways also allow users to record TV programs to a USB flash drive, or external hard disk and in some cases, shared folders or network attached storage (NAS). Electronic program guide An electronic program guide (EPG) is like a traditional TV listing magazine but available online or on a TV service like aerial, satellite or cable. It allows viewers to find out what shows will air and search for programs they’d like to watch. EPG's also allow users to
https://en.wikipedia.org/wiki/Symmetry%20breaking%20of%20escaping%20ants
Symmetry breaking of escaping ants is a herd behavior phenomenon observed when ants are constrained to a cell with two equidistant exits and then sprayed with an insect repellent. The ants tend to crowd one door more while trying to escape (i.e., there is a symmetry breaking in their escape behavior), thereby decreasing evacuation efficiency. Description This phenomenon arises in experiments where worker ants are enclosed in circular cells with a glass cover in such a way that they can only move in two dimensions (i.e., ants cannot pass over one other). The cell has two exits located symmetrically relative to its center. The experiments consisted of two different sets of trials. In the first set of trials, both exits were opened at the same time, letting the ants escape. After 30 repetitions, one door was used 13.666% more than the other. In the second set of trials, the configuration was identical, but a few seconds before opening the doors, a dose of 50 µL of insect repellent was injected into the cell at its center through a small hole in the glass cover. After 30 repetitions, one door was used 38.3% more than the other. History Inspired by earlier computer simulations that predicted a symmetry-breaking phenomenon when panicked humans escape from a room with two equivalent exits, a team of researchers led by E. Altschuler carried out the two experiments described above, which revealed the symmetry-breaking effect in the leafcutter ant Atta insular in the presence of insect repellent. Another team of researchers led by Geng Li investigated the influence of the ant group's density on the symmetry breaking. They used the red imported fire ant to repeat the experiment with different amounts of ants. The results show that symmetry breaking is high at low densities of ants, but decreases beyond a certain point in the density of ants. In other words, when density is low, the ant group produces a collective escaping behavior, while at high density, their behavior i
https://en.wikipedia.org/wiki/Verdun%20%28video%20game%29
Verdun is a squad-based multiplayer first-person shooter video game set during World War I. It was released on 28 April 2015 on Steam, after more than a year in Steam Early Access. It was released for PlayStation 4 on 30 August 2016. An Xbox One version was released on 8 March 2017. A sequel to Verdun, Tannenberg, was released into Steam Early Access on 16 November 2017, and left Early Access for a full release on 13 February 2019. The game released for PlayStation 5 and Xbox Series X/S on 15 June 2021 with higher resolution and better texture quality. Verdun is inspired by the 1916 Battle of Verdun in France. The game includes historically accurate World War I weapons, authentic uniforms and equipment, detailed injury and gore modeling, and maps based on the real battlefields of the Western Front. The game runs on the Unity engine and was developed by independent studios M2H and Blackmill Games. Gameplay Verdun is a realistic, tactical squad based game set in the trenches of World War I that can be played with up to 64 players (with 32 on each side). Squads typically consist of 4 players, each with a unique role that is also typically made up of a squad leader called an NCO, and three roles dependent on the nation and type of squad selected. Squads can level up by helping the team, i. e. killing enemies, capturing sectors etc. gaining bonus abilities and upgrades on their preexisting abilities like accuracy, suppression etc. The NCO may rename the squad and change its type. NCOs can call in support abilities like artillery barrages, creeping barrages, white phosphorus attacks, smoke screens and mortar shells. They can also call in more passive abilities to enhance the abilities of their squadmates, like ones helping them resist enemy suppression or enemy recon more effectively. NCOs can typically carry a self-loading pistol or revolver and melee weapons such as sabres and trench clubs. Other members of the squad typically use plenty of bolt-action rifles, plen
https://en.wikipedia.org/wiki/Ground%20carriage
An aircraft ground carriage (also "ground power assisted takeoff and landing concept") is a landing gear system connected to the ground, on which aircraft can take off and land without their aircraft-installed landing gear. The technical feasibility of the ground carriage is being investigated by two research groups. In 2013, IATA included the technology into their "Technology Roadmap"; Airbus pursues the concept as part of its "Future by Airbus” strategy. Advantages and functionality The aircraft-installed landing gear and related structures and systems account for 6 to 15 per cent of the empty weight of an aircraft, but it is only required on the ground for takeoff and landing as well as for taxiing and parking. During cruise flight, it is carried along as unused ballast. An aircraft without landing gear could therefore require 8 to 20 per cent less fuel in flight. Furthermore, landing gears are one of the most expensive aircraft systems and complex in operation and maintenance. Finally, less noise is emitted when the drag of the undercarriage is omitted during approach and the engines are switched off while taxiing on ground. A ground carriage provides the means for an aircraft to takeoff and land without carrying an own aircraft-installed landing gear. Instead, the aircraft is equipped with much lighter interfaces, which connect to the ground carriage. Every airport approached by aircraft without landing gear must operate at least one ground carriage. In addition, alternate airports must be available if an airport is closed due to bad weather or a system failure. For emergency landings outside of runways, unsuitable flooring or unpaved ground cannot absorb the high wheel loads. Therefore, the landing gear of heavy long-haul aircraft in emergency landing on unsuitable ground is often not extended, since it would otherwise sink into ground first and then bend or break off. Related Concepts The precursor of the aircraft ground carriage is the jettisonable or
https://en.wikipedia.org/wiki/LuneOS
LuneOS is a mobile operating system (OS) based on the Linux kernel and currently developed by WebOS Ports community. With a user interface based on direct manipulation, LuneOS is designed primarily for touchscreen mobile devices such as smartphones and tablet computers. The OS uses touch inputs that loosely correspond to real-world actions, like swiping, tapping, pinching, and reverse pinching to manipulate on-screen objects, and a virtual keyboard. LuneOS is the open source successor for Palm/HP webOS where the user interface is rebuilt from scratch by using the latest technologies available (Qt 5.15.0 / QML, Qt WebEngine, etc). It is not intended to compete with iPhone or Android on features. All devices can have a LuneOS port if they have a CyanogenMod / LineageOS ROM available that works. LuneOS uses the minimal Android System Image that is created using Halium which in turn is based upon CyanogenMod / LineageOS. Currently, the system is still in alpha, with some internal hardware not supported and some applications still buggy. It can be updated without a reinstall. It has the feel of the webOS formerly used on Palm and HP hardware, including a cards-based multitasking system and Universal Search. It has been described as "a niche mobile operating system maintained by enthusiasts". Release schedule See also Enyo Access Linux Platform Ubuntu Touch - Linux Ubuntu for smartphones and tablets. References External links LuneOS Forums 2014 software ARM operating systems Free mobile software Mobile Linux Mobile operating systems Smartphone operating systems Software using the Apache license
https://en.wikipedia.org/wiki/Klee%20diagram
Klee diagrams, named for their resemblance to paintings by Paul Klee, are false-colour maps that represent a way of assembling and viewing large genomic datasets. Contemporary research has produced genomic databases for an enormous range of life forms, inviting insights into the genetic basis of biodiversity. Indicator vectors are used to depict nucleotide sequences. This technique produces correlation matrices or Klee diagrams. Researchers Lawrence Sirovich, Mark Y. Stoeckle and Yu Zhang (2010) used their improved algorithm on a set of some 17000 DNA barcode sequences from 12 disparate animal taxa, finding that indicator vectors were a viable taxonomic tool, and that discontinuities corresponded with taxonomic divisions. External links Klee diagram References DNA Genomics Nucleotides Phylogenetics
https://en.wikipedia.org/wiki/Dial-Office%20IP-PBX
Dial-Office IP-PBX is a SIP-based IP-PBX business phone system, first released in 2003 by Canadian telecommunications software provider Dialexia. The software allows users to connect multiple phones (e.g., extensions, ring groups, etc.), share lines among several phones and implement business PBX telephone phone features such as voicemail, caller ID, call forwarding & call recording into their system. Dial-Office is also suitable for multi-office connections, connecting branches which are geographically distant from each other. Dialexia Communications, Inc. released the latest version of Dial-Office IP-PBX (4.1) in 2013. On June 3, 2014, the company's development team announced in a client newsletter that support for Dial-Office versions 3.9 and earlier would cease effective September 1, 2014. SIP Compliance Dial-Office IP-PBX includes a built-in SIP server and is fully SIP-compliant), ensuring that it has the highest level of interoperability with other SIP devices and services. Critical reception Overall, Dial-Office IP-PBX has enjoyed a positive critical reception since its initial release. In 2009, Billerica Public Schools manager Mark Bishop explained that the Dial-Office solution was the most comprehensive among the IP-PBX options they evaluated. "In less than a few weeks, and at one of the lowest cost per extension in the district school, we were able to get a complete infrastructure setup. From DID management, CPE Auto-provisioning, customer Web interface we were able to focus on adding new extensions and relying on Dial-Office to deliver the rest," said Bishop. On May 21, 2014, Dial-Office was named runner-up in the IP-PBX Servers category of WindowsNetworking.com 2013-14 Readers' Choice Awards. References External links Dialexia Communications, Inc. Official Page Dial-Office IP-PBX product page Dial-Office IP-PBX product presentation Telecommunications companies of Canada VoIP companies VoIP software
https://en.wikipedia.org/wiki/Hilbert%E2%80%93Bernays%20paradox
The Hilbert–Bernays paradox is a distinctive paradox belonging to the family of the paradoxes of reference (like Berry's paradox). It is named after David Hilbert and Paul Bernays. History The paradox appears in Hilbert and Bernays' Grundlagen der Mathematik and is used by them to show that a sufficiently strong consistent theory cannot contain its own reference functor. Although it has gone largely unnoticed in the course of the 20th century, it has recently been rediscovered and appreciated for the distinctive difficulties it presents. Formulation Just as the semantic property of truth seems to be governed by the naive schema: (T) The sentence ′P′ is true if and only if P (where single quotes refer to the linguistic expression inside the quotes), the semantic property of reference seems to be governed by the naive schema: (R) If a exists, the referent of the name ′a′ is identical with a Consider however a name h for (natural) numbers satisfying: (H) h is identical with ′(the referent of h) +1′ Suppose that, for some number n: (1) The referent of h is identical with n Then, surely, the referent of h exists, and so does (the referent of h)+1. By (R), it then follows that: (2) The referent of ′(the referent of h)+1′ is identical with (the referent of h)+1 and so, by (H) and the principle of indiscernibility of identicals, it is the case that: (3) The referent of h is identical with (the referent of h)+1 But, again by indiscernibility of identicals, (1) and (3) yield: (4) The referent of h is identical with n +1 and, by transitivity of identity, (1) together with (4) yields: (5) n is identical with n+1 But (5) is absurd, since no number is identical with its successor. Solutions Since every sufficiently strong theory will have to accept something like (H), absurdity can only be avoided either by rejecting the principle of naive reference (R) or by rejecting classical logic (which validates the reasoning from (R) and (H) to absurdity). On the firs
https://en.wikipedia.org/wiki/BBC%20Genome%20Project
The BBC Genome Project is an online searchable database of programme listings initially based upon the contents of the Radio Times from the first issue in 1923 to 2009. Television listings from post-2009 can be accessed via the BBC Programmes site. History Prior BBC Genome is not the first online searchable database. In April 2006, they gave the public access to Infax – their only electronic programme database at the time. It contained around 900,000 entries but not every programme ever broadcast, and it ceased operation in December 2007. The front page of the website is still available to see via the Internet Archive. After Infax ceased, a message on the website said that it would be incorporating in the information into individual programme pages. In 2012, Infax was replaced by the database Fabric but this is only for internal use within the BBC. Radio Times In December 2012, the BBC completed a digitisation exercise, scanning the listings from Radio Times of all BBC's programmes from 1923 to 2009 from an entire run of about 4,500 copies of the magazine. They identified around five million programmes involving 8.5 million actors, presenters, writers and technical staff. BBC Genome was released for public use on 15 October 2014. The listings are as published in advance, and so do not include late changes or cancellations which were reflected on Infax. However, they do include huge numbers of early radio and television broadcasts, and "DJ shows" from BBC Radio 1 and BBC Radio 2 which were rarely kept officially, which were not listed on Infax (which also did not usually include repeats of archived programmes prior to 1976) because they were not in the BBC archives. The issues were scanned at high resolution, producing TIFF images and optical character recognition was then used to turn the text from the page into searchable text on the Genome database. The aim of this project is to allow researchers to be able to find out information easier and to help BBC Arch
https://en.wikipedia.org/wiki/HostDime
HostDime Global Corp is a global data center infrastructure provider offering an array of cloud products including physical bare metal servers, virtualized cloud servers, and colocation services. HostDime's data centers are carrier-neutral facilities in global edge locations. HostDime owns and operates infrastructure and networks in eight countries: the United States, Mexico, Brazil, United Kingdom, Netherlands, India, Colombia, and Hong Kong. Their flagship facility is in Orlando, Florida. History HostDime Global Corp was founded by Manny Vivar and opened its first data center in downtown Orlando, Florida in December 2003 and moved its servers from a New Jersey Colocation facility. The company was bootstrapped and funded with under $50 by Vivar. HostDime's first international location was in João Pessoa, Brazil in 2006. Locations in Mexico, Colombia, and the United Kingdom opened in 2008, with India in 2010, and Netherlands and Hong Kong in 2012. In November 2012, a report by Citizen Lab found that HostDime was among a handful of American companies selling hosting services to the Syrian government in direct opposition of an executive order from President Barack Obama. HostDime stated that the website in question, Syria's Ministry of Religious Affairs, was hosted by a customer who leased a server in their data center. Immediate steps were taken to sever ties from Syria and that matter was quickly resolved. In 2013, HostDime built their first data center build of its own was a 10,000 square foot facility in Guadalajara, Mexico. In 2016, HostDime purchased a 5-acre land parcel fronting I-4 in Orlando metro area, Town of Eatonville. The seven-story building would combine the data company's headquarters and its data center in one structure. On July 14, 2017, HostDime officially opened their data center in João Pessoa, Brazil. The facility was only the second data center in northeast Brazil. The $15 million data center officially became Tier III Design Certified b
https://en.wikipedia.org/wiki/Larry%20Samuelson
Larry Samuelson (born April 2, 1953) is the A. Douglas Melamed Professor of Economics at Yale University and one of the faculty of the Cowles Foundation of Yale University. Samuelson earned his B.A. in economics/political science from the University of Illinois in 1974. He continued on with the University of Illinois for both his master's degree in 1977 and his PhD in 1978—both in economics. He has previously held faculty positions at the University of Florida, Syracuse University, Penn State and the University of Wisconsin. He has made significant contributions to microeconomic theory and game theory. Areas of specialization include the theory of repeated games and the evolutionary foundations of economic behavior. Samuelson has served on the editorial boards of Games and Economic Behavior, the International Journal of Game Theory, Economic Theory, the Journal of Economic Theory, Theoretical Economics, the Journal of Economic Literature, and Econometrica. He has served as a co-editor of Econometrica and the American Economic Review. References External links 1953 births Living people Yale University faculty University of Wisconsin–Madison faculty Pennsylvania State University faculty Syracuse University faculty University of Illinois Urbana-Champaign alumni Fellows of the Econometric Society Game theorists Fellows of the American Academy of Arts and Sciences
https://en.wikipedia.org/wiki/Base%20de%20datos
Base de datos is a collaborative online encyclopedia written in the Spanish language launched on 8 December 2002, currently has more than 14,500 articles on all kinds of topics. Wiki software This website has developed its own wiki software called AngelCode with which users can edit articles without registering. However, registered users can use functions whose use is limited by the user experience and to avoid vandalism and copyright problems. For example, only users who have written a number of articles can upload images and photographs. A difference against other wikis is that the edit history is limited to the last revised edition. Once an edit of Basededatos.com approve an edition, the previous history can not be displayed, and you can not go back to an earlier point. See also Wikipedia Citizendium Baidu Baike (Chinese) Enciclopedia Libre Universal en Español (Spanish) List of online encyclopedias References Online encyclopedias Wiki communities Internet properties established in 2002 Spanish-language websites Spanish online encyclopedias
https://en.wikipedia.org/wiki/Wilf%20equivalence
In the study of permutations and permutation patterns, Wilf equivalence is an equivalence relation on permutation classes. Two permutation classes are Wilf equivalent when they have the same numbers of permutations of each possible length, or equivalently if they have the same generating functions. The equivalence classes for Wilf equivalence are called Wilf classes; they are the combinatorial classes of permutation classes. The counting functions and Wilf equivalences among many specific permutation classes are known. Wilf equivalence may also be described for individual permutations rather than permutation classes. In this context, two permutations are said to be Wilf equivalent if the principal permutation classes formed by forbidding them are Wilf equivalent. References Enumerative combinatorics Permutation patterns Equivalence (mathematics)
https://en.wikipedia.org/wiki/The%20Skeleton%20Crew%20%28book%29
The Skeleton Crew: How Amateur Sleuths Are Solving America's Coldest Cases is a 2014 non-fiction work that was written by Deborah Halber. It was first published on 1 July 2014 by Simon & Schuster and details the phenomenon of citizens creating and using Internet resources to identify unidentified human remains. In the book, Halber gives firsthand accounts of her interactions with amateur web sleuths, the background of websites such as the Doe Network and an exploration of the issue of the unidentified in the American medicolegal system. She discusses the history of the science of identification and the use of the Internet for forensic crowdsourcing. Synopsis The book covers the following topics: An overview of the Department of Justice survey to document the unidentified in America The history and sociology of potters fields The use of forensic reconstructions on public web sites The history of Las Vegas Unidentified, the first official public web site featuring the unidentified The identification of Tent Girl, an unidentified victim discovered in Kentucky in 1968 Ongoing efforts to identify the Lady of the Dunes, an unidentified victim discovered in Provincetown, Mass., in 1974 How DNA analysis methods developed in response to 9/11 subsequently helped identify Jane and John Does Personal stories of web sleuths who became instrumental in cold case identifications A discussion of law enforcement culture in relation to the public The future of forensic crowdsourcing Inspiration In an interview on NPR's On the Media, Halber told the host Brooke Gladstone that her interest in the subject was sparked suddenly. Halber said, "I came across a photo in the Boston Globe — I think it was 2010 — and this woman was just really stunning — sort of auburn hair and these really beautiful eyes and this kind of Mona Lisa smile — and then I realized this wasn't a photograph. It was a reconstruction of a woman who had been brutally murdered in Provincetown, Massac
https://en.wikipedia.org/wiki/Facebook%20real-name%20policy%20controversy
The Facebook real-name policy controversy is a controversy over social networking site Facebook's real-name system, which requires that a person use their legal name when they register an account and configure their user profile. The controversy stems from claims by some users that they are being penalized by Facebook for using their real names, and have suffered adverse consequences as a result. For example, Facebook's naming policies prohibit names that Facebook judges to have too many words, too many capital letters, or first names that consist of initials. Facebook's monitoring software detects and suspends such accounts. These policies prevent some users from having a Facebook account and profile with their real name. As part of their complaint, those who cannot use their real names point out that millions of Facebook accounts use fake yet plausible-sounding names, and even fake and obviously implausible names, because Facebook's software fails to recognize them. Background The social networking website Facebook has maintained the real-name system policy for user profiles. According to Facebook, the real-name policy stems from the position "that way, you always know who you're connecting with. This helps keep our community safe." Likewise per this policy, a "real name" is defined by "your real name as it would be listed on your credit card, driver's license or student ID". In August 2012, Facebook estimated that more than 83 million Facebook accounts are fake accounts. As a result of this revelation, the share price of Facebook dropped below $20. Facebook has asserted that "authentic identity is important to the Facebook experience, and our goal is that every account on Facebook should represent a real person". Affected users Ethnic groups Native Americans Native Americans have been repeatedly targeted due to Facebook's policy. Robin Kills The Enemy, a resident of the Sioux Rosebud reservation in South Dakota, found that when she tried to register her
https://en.wikipedia.org/wiki/User%20onboarding
User onboarding is the process of improving an individual's requirements and success with a product or service. This term is often used in reference to software products, and it can be done in a manual or automated way. It is the process through which new software is designed such that new users are provided and acquire the necessary knowledge, skills, and behaviors in order to become “up and running” and effective users of website, app, or software service. The term originates from the human resources term, onboarding, that refers to the mechanism through which new employees acquire the necessary knowledge, skills, and behaviors in order to become effective organizational members. The goal of user onboarding is to get the users to understand the key principles at the heart of the product and to show them how it will improve their lives. If it can make the point of the product clear and easy to understand the first time a user tries it, have a better chance of gaining excited and engaged customers. Offering a free trial is an example of how you can implement user onboarding. If someone is able to see how the product is useful and exciting to them within a free trial period, it can take them from being a user to a consumer—willing to invest in order to continue their experience. Onboarding techniques Leveraging the right user onboarding techniques based on the specific requirements can be extremely beneficial for businesses. Below are different user onboarding techniques and their classifications. Single sign-on or social login - Ease the login and add less friction with SSO or Social Login. Interactive tutorials, Walkthrough - In-application tutorials that help to onboard new users, highlight features in your application, and also reflect your value proposition faster and easier. Beacons, tooltips - Raise visitors attention by adding beacon to any element on the web page. Checklists - Leverage gamification effect (see Zeigarnik effect) and provide a cle
https://en.wikipedia.org/wiki/Comparison%20of%20free%20blog%20hosting%20services
A number of websites offer free hosting of blogs. The services they offer are compared below. (This list is limited to services that have their own Wikipedia article.) Free blog hosting services See also Comparison of file hosting services Comparison of online backup services References Blog hosting services Companies' terms of service
https://en.wikipedia.org/wiki/Lecanorine%20lichen
A lichen has lecanorine fruiting body parts if they are shaped like a plate with a ring around them, and that ring is made of tissue similar to the main non-fruiting body part of the lichen. The name comes from the name of the lichen genus Lecanora, whose members have such apothecia. If a lichen has lecanorine apothecia, the lichen itself is sometimes described as being lecanorine. References Lichenology
https://en.wikipedia.org/wiki/Cassette%20mutagenesis
Cassette mutagenesis is a type of site-directed mutagenesis that uses a short, double-stranded oligonucleotide sequence (gene cassette) to replace a fragment of target DNA. It uses complementary restriction enzyme digest ends on the target DNA and gene cassette to achieve specificity. It is different from methods that use single oligonucleotide in that a single gene cassette can contain multiple mutations. Unlike many site directed mutagenesis methods, cassette mutagenesis also does not involve primer extension by DNA polymerase. Mechanism First, restriction enzymes are used to cleave near the target sequence on DNA contained in a suitable vector. This step removes the target sequence and everything between the restriction sites. Then, the synthetic double stranded DNA containing the desired mutation and ends that are complementary to the restriction digest ends are ligated in place of the sequence removed. Finally, the resultant construct is sequenced to check that the target sequence contains the intended mutation. Usage The use of synthetic gene cassette allows total control over the type of mutation that can be generated. When studying protein functions, cassette mutagenesis can allow a scientist to change individual amino acids by introducing different codons or omitting codons. By including the SD sequence and the first few codons of a gene, a scientist can easily and dramatically affect the expression level of a protein by altering these regulatory sequences. Limitations To use this method, the sequence of the target sequence and nearby restriction sites must be known. Since restriction enzymes are used, for this method to be useful, the restriction sites flanking the target DNA has to be unique in the gene/vector system so that the gene cassette can be inserted with specificity. The length of the sequence flanked by the restriction sites is also a limiting factor due to the use of synthetic gene cassettes. Advantages Since one gene cassette can contain
https://en.wikipedia.org/wiki/Walkman%20DD%20series
The Walkman DD was an early series in Sony's Walkman line of portable audio cassette players. The "DD" stood for 'disc drive', with the unit's main motor being directly coupled to the 'disc' of the capstan flywheel assembly while lying perpendicular to it within the unit. This feature was later shared with the Walkman Professional series. WM-DD The first model of the series, the WM-DD, was introduced in 1982, and had a solid reputation for performance. Specifications Body dimensions (WxHxD): 79 × 109.2 x 29 mm Weight (with batteries): 290 g Power: 3 V DC, from 2 AA batteries, an AC adapter (AC-39), or from an automobile adapter (DCC-127A, PC-200) Battery life: 4 hours manganese batteries, alkaline batteries 9 hours (AA batteries) Maximum output power: 20 mW +20 mW headphone output Wow and flutter: 0.08% WRMS Frequency response: 40 ~ 12,000 Hz (normal tape), 40 ~ 15,000 Hz (metal cro2 tape) Headphone Accessories: MDR-W5 WM-DD2 The WM-DD2 was introduced in 1984, and appeared to be a WM-DD that was available in same colors and had the addition of Dolby B noise reduction. In marketing terms this is exactly what it was, though technically the change was far from trivial. The innovation that made this change possible was the introduction of miniature Dolby ICs that could run directly from the 3V battery supply without the need for a DC-DC converter (as had to be employed in the WM-7, for example). Even with these devices the changes made between the WM-DD and the WM-DD2 were far reaching and only possible because the printed circuit board was made with track work on both sides. All the user saw, however, was an important extra switch to enable Dolby NR. The next step in the evolution of the Walkman was to add quartz crystal lock to the DD capstan, this appeared in the next model in the series, the WM-DD3. Specifications Body dimensions (WxHxD): 79 × 109 × 29 mm Weight (with batteries): 290 g Power: 3 V DC, from 2 AA batteries, an AC adapter (AC-D2), or from an aut
https://en.wikipedia.org/wiki/Crypto%20Wars
Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencies, especially the National Security Agency (NSA). Export of cryptography from the United States Cold War era In the early days of the Cold War, the U.S. and its allies developed an elaborate series of export control regulations designed to prevent a wide range of Western technology from falling into the hands of others, particularly the Eastern bloc. All export of technology classed as 'critical' required a license. CoCom was organized to coordinate Western export controls. Two types of technology were protected: technology associated only with weapons of war ("munitions") and dual use technology, which also had commercial applications. In the U.S., dual use technology export was controlled by the Department of Commerce, while munitions were controlled by the State Department. Since in the immediate post WWII period the market for cryptography was almost entirely military, the encryption technology (techniques as well as equipment and, after computers became important, crypto software) was included as a Category XIII item into the United States Munitions List. The multinational control of the export of cryptography on the Western side of the cold war divide was done via the mechanisms of CoCom. By the 1960s, however, financial organizations were beginning to require strong commercial encryption on the rapidly growing field of wired money transfer. The U.S. Government's introduction of the Data Encryption Standard in 1975 meant that commercial uses of high quality encryption would become common, and serious problems of export control began to arise. Generally these were dealt with through case-by-case export license request proceedings brought by computer manufacturers, such as IBM, and by their large corporate customers
https://en.wikipedia.org/wiki/Lattice%20light-sheet%20microscopy
Lattice light-sheet microscopy is a modified version of light sheet fluorescence microscopy that increases image acquisition speed while decreasing damage to cells caused by phototoxicity. This is achieved by using a structured light sheet to excite fluorescence in successive planes of a specimen, generating a time series of 3D images which can provide information about dynamic biological processes. It was developed in the early 2010s by a team led by Eric Betzig. According to an interview conducted by The Washington Post, Betzig believes that this development will have a greater impact than the work that earned him the 2014 Nobel Prize in Chemistry for "the development of super-resolution fluorescence microscopy". Setup of Lattice Light-sheet Fluorescence Microscopy Lattice light sheet microscopy is a novel combination of techniques from Light sheet fluorescence microscopy, Bessel beam microscopy, and Super-resolution microscopy (specifically structured illumination microscopy, SIM). In lattice light sheet microscopy, very similarly to light sheet microscopy, the illumination of the sample occurs perpendicular to the image detection. Initially the light sheet is formed by stretching the linearly polarized circular input beam with a pair of cylindrical lenses along the x axis and then compressing it with an additional pair of lenses along the z axis. This modification creates a thin sheet of light that is then projected onto a binary ferroelectric spatial light modulator (SLM). The SLM is a device that spatially varies the waveform of a beam of light. The light that is reflected back from the SLM is used to eliminate unwanted diffraction. Diffraction is eliminated by the transform lens that creates a Fraunhofer diffraction pattern from the reflected light at an opaque mask containing a transparent annulus. Optical lattices are two or three dimensional interference patterns, which here are produced by the transparent annular ring. The mask is conjugate to x
https://en.wikipedia.org/wiki/GitLab
GitLab Inc. is an open-core company that operates GitLab, a DevOps software package that can develop, secure, and operate software. The open source software project was created by Ukrainian developer Dmytro Zaporozhets and Dutch developer Sytse Sijbrandij. In 2018, GitLab Inc. was considered to be the first partly-Ukrainian unicorn. Since its founding, GitLab Inc. has promoted remote work, and is known as one of the largest all-remote companies in the world. GitLab has an estimated 30 million registered users, with 1 million being active licensed users. Overview GitLab Inc. was established in 2014 to continue the development of the open-source code-sharing platform launched in 2011 by Dmytro Zaporozhets. The company's other co-founder Sytse Sijbrandij initially contributed to the project and decided to build a business around it. GitLab offers its platform using a freemium model. Since its founding, GitLab Inc. has been an all-remote company. By 2020, the company employed 1300 people in 65 countries. History The company participated in the Y Combinator seed accelerator Winter 2015 program. By 2015 notable customers included Alibaba Group and IBM. In January 2017, a database administrator accidentally deleted the production database in the aftermath of a cyber attack, causing the loss of a substantial amount of issue and merge request data. The recovery process was live-streamed on YouTube. In April 2018, GitLab Inc. announced integration with Google Kubernetes Engine (GKE) to simplify the process of spinning up a new cluster to deploy applications. In May 2018, GNOME moved to GitLab with over 400 projects and 900 contributors. On August 1, 2018, GitLab Inc. started development of Meltano. On August 11, 2018, GitLab Inc. moved from Microsoft Azure to Google Cloud Platform, making the service inaccessible to users in several regions including: Crimea, Cuba, Iran, North Korea, Sudan, and Syria, due to sanctions imposed by Office of Foreign Assets Contr
https://en.wikipedia.org/wiki/Asset%20health%20management
Asset health management or (AHM) is the field of study which looks at how to manage the "health" of an asset or assets. This often includes methods to establish asset health and effort to decide the appropriate actions to be taken to manage the assets' health. This also includes the discussion of health at end of life to ensure the asset's full life is used efficiently. Asset health management includes many different methods which can sometime overlap in their intended scope and methods. Asset health management has become a difficult field to discuss due to the use of the same acronym to describe multiple different approaches and the use of the same approach with different names. Asset health management can be considered a subset of Asset management Asset health management taxonomy Asset health management consists of multiple strategies and parts but a rough description is given as follows. Asset health diagnostics Methods used to establish the current health of the asset Asset health prognostics Methods used to predict how the health of the asset will change in the future Asset health maintenance see :Category:Maintenance including maintenance, repair, and operations (better referred to as maintenance, repair, and overhaul). These methods are used to keep an asset health, restore health to an asset or through major work restore usable life to an asset. Asset end of life decisions Asset disposal Management of multiple assets There is often also a consideration of additional work done to manage the health of multiple assets within the same framework. Sometimes referred to as Fleet health management and falling within the study of Fleet management. Although it is common to need to manage the health of multiple assets they are not always vehicles and frequently of mixed type. When resources are constrained it is a fascinating management problem to consider how best to manage the health of assets. It is rare that assets can be managed in an unconstrai
https://en.wikipedia.org/wiki/Glass-filled%20polymer
Glass-filled polymer (or glass-filled plastic), is a mouldable composite material. It comprises short glass fibers in a matrix of a polymer material. It is used to manufacture a wide range of structural components by injection or compression moulding. It is an ideal glass alternative that offers flexibility in the part, chemical resistance, shatter resistance and overall better durability. Materials Either thermoplastic or thermosetting polymers may be used. One of the most widely used thermoplastics is a polyamide polymer nylon. The first mouldable composite was Bakelite. This used wood flour fibres in phenolic resin as the thermoset polymer matrix. As the fibres were only short this material had relatively low bulk strength, but still improved surface hardness and good mouldability. A wide range of polymers are now produced in glass-filled varieties, including polyamide (Nylon), acetal homopolymers and copolymers, polyester, polyphenylene oxide (PPO / Noryl), polycarbonate, polyethersulphone Bulk moulding compound is a pre-mixed material of resin and fibres supplied for moulding. Some are thermoplastic or thermosetting, others are chemically cured and are mixed with a catalyst (polyester) or hardener (epoxy) before moulding. Applications Compared to the native polymer, glass-filled materials have improved mechanical properties of rigidity, strength and may also have improved surface hardness. Compared to sheet materials Bulk glass filled materials are considered distinct from fibreglass or fibre-reinforced plastic materials. These use a substrate of fabric sheets made from long fibres, draped to shape in a mould and then impregnated with resin. They are usually moulded into shapes made of large but thin sheets. Filled materials, in contrast, are used for applications that are thicker or of varying section and not usually as large as sheet materials. References Composite materials Polymers Fibre-reinforced polymers
https://en.wikipedia.org/wiki/Romeyn%20Beck%20Hough
Romeyn Beck Hough (1857–1924) was an American physician and botanist best known for creating The American Woods, a 14-volume collection of wood samples from across North America. Life and work Hough acquired an interest in forestry and natural history from his father, Franklin B. Hough, a physician and botanist, who spent much time with his son in the outdoors. He attended Cornell University in Ithaca, New York and studied medicine, later qualifying as a physician like his father. His passion however, was for botany. Hough developed a specialized veneer cutter capable of slicing wood to a thickness of . He started a business cutting and printing flexible, translucent wooden cards "for all fancy and business purposes", and also sold magic lantern and microscope slides made from the thinnest transverse sections. After seeing German botanist Herman von Nördlinger's volumes of European tree cross-sections, Hough was inspired to make his own representing "all of the American woods, or at least the most important". Between 1888 and 1913, Hough published thirteen volumes of The American Woods: exhibited by actual specimens and with copious explanatory text, a collection of wood samples from North American trees, presented as paper-thin cross-sectional slices. To each tree he dedicated a cardboard plate which contained three slices—transverse, radial, and tangential—of the wood, accompanied by information about its botany, habitat and medicinal and commercial uses. The first volume of American Woods, focusing upon trees of Hough's native New York, was available by subscription for five dollars. Hough had originally planned to publish fifteen volumes, which would include samples of all of the important trees found in North America, but he died in 1924 before the full set was completed. A final, fourteenth volume was published in 1928 using samples and notes made by Hough that were compiled by his daughter, Marjorie Galloway Hough. In total, each volume contained at leas
https://en.wikipedia.org/wiki/Clebsch%E2%80%93Gordan%20coefficients%20for%20SU%283%29
In mathematical physics, Clebsch–Gordan coefficients are the expansion coefficients of total angular momentum eigenstates in an uncoupled tensor product basis. Mathematically, they specify the decomposition of the tensor product of two irreducible representations into a direct sum of irreducible representations, where the type and the multiplicities of these irreducible representations are known abstractly. The name derives from the German mathematicians Alfred Clebsch (1833–1872) and Paul Gordan (1837–1912), who encountered an equivalent problem in invariant theory. Generalization to SU(3) of Clebsch–Gordan coefficients is useful because of their utility in characterizing hadronic decays, where a flavor-SU(3) symmetry exists (the eightfold way) that connects the three light quarks: up, down, and strange. The SU(3) group The special unitary group SU is the group of unitary matrices whose determinant is equal to 1. This set is closed under matrix multiplication. All transformations characterized by the special unitary group leave norms unchanged. The symmetry appears in the light quark flavour symmetry (among up, down, and strange quarks) dubbed the Eightfold Way (physics). The same group acts in quantum chromodynamics on the colour quantum numbers of the quarks that form the fundamental (triplet) representation of the group. The group is a subgroup of group , the group of all 3×3 unitary matrices. The unitarity condition imposes nine constraint relations on the total 18 degrees of freedom of a 3×3 complex matrix. Thus, the dimension of the group is 9. Furthermore, multiplying a U by a phase, leaves the norm invariant. Thus can be decomposed into a direct product . Because of this additional constraint, has dimension 8. Generators of the Lie algebra Every unitary matrix can be written in the form where H is hermitian. The elements of can be expressed as where are the 8 linearly independent matrices forming the basis of the Lie algebra of ,
https://en.wikipedia.org/wiki/Schr%C3%B6der%E2%80%93Bernstein%20theorem
In set theory, the Schröder–Bernstein theorem states that, if there exist injective functions and between the sets and , then there exists a bijective function . In terms of the cardinality of the two sets, this classically implies that if and , then ; that is, and are equipotent. This is a useful feature in the ordering of cardinal numbers. The theorem is named after Felix Bernstein and Ernst Schröder. It is also known as the Cantor–Bernstein theorem or Cantor–Schröder–Bernstein theorem, after Georg Cantor, who first published it (albeit without proof). Proof The following proof is attributed to Julius König. Assume without loss of generality that A and B are disjoint. For any a in A or b in B we can form a unique two-sided sequence of elements that are alternately in A and B, by repeatedly applying and to go from A to B and and to go from B to A (where defined; the inverses and are understood as partial functions.) For any particular a, this sequence may terminate to the left or not, at a point where or is not defined. By the fact that and are injective functions, each a in A and b in B is in exactly one such sequence to within identity: if an element occurs in two sequences, all elements to the left and to the right must be the same in both, by the definition of the sequences. Therefore, the sequences form a partition of the (disjoint) union of A and B. Hence it suffices to produce a bijection between the elements of A and B in each of the sequences separately, as follows: Call a sequence an A-stopper if it stops at an element of A, or a B-stopper if it stops at an element of B. Otherwise, call it doubly infinite if all the elements are distinct or cyclic if it repeats. See the picture for examples. For an A-stopper, the function is a bijection between its elements in A and its elements in B. For a B-stopper, the function is a bijection between its elements in B and its elements in A. For a doubly infinite sequence or a cyclic seque
https://en.wikipedia.org/wiki/Client%20certificate
In cryptography, a client certificate is a type of digital certificate that is used by client systems to make authenticated requests to a remote server. Client certificates play a key role in many mutual authentication designs, providing strong assurances of a requester's identity. See also Client-authenticated TLS handshake References Public-key cryptography Key management
https://en.wikipedia.org/wiki/Process%20validation
Process validation is the analysis of data gathered throughout the design and manufacturing of a product in order to confirm that the process can reliably output products of a determined standard. Regulatory authorities like EMA and FDA have published guidelines relating to process validation. The purpose of process validation is to ensure varied inputs lead to consistent and high quality outputs. Process validation is an ongoing process that must be frequently adapted as manufacturing feedback is gathered. End-to-end validation of production processes is essential in determining product quality because quality cannot always be determined by finished-product inspection. Process validation can be broken down into 3 steps: process design (Stage 1a, Stage 1b), process qualification (Stage 2a, Stage 2b), and continued process verification (Stage 3a, Stage 3b). Stage 1: Process Design In this stage, data from the development phase are gathered and analyzed to define the commercial manufacturing process. By understanding the commercial process, a framework for quality specifications can be established and used as the foundation of a control strategy. Process design is the first of three stages of process validation. Data from the development phase is gathered and analyzed to understand end-to-end system processes. These data are used to establish benchmarks for quality and production control. Design of experiment (DOE) Design of experiments is used to discover possible relationships and sources of variation as quickly as possible. A cost-benefit analysis should be conducted to determine if such an operation is necessary. Quality by design (QBD) Quality by design is an approach to pharmaceutical manufacturing that stresses quality should be built into products rather than tested in products; that product quality should be considered at the earliest possible stage rather than at the end of the manufacturing process. Input variables are isolated in order to identify the r
https://en.wikipedia.org/wiki/Glossary%20of%20levelling%20terms
This is a glossary of levelling terms. Levelling is a surveying method used to find relative height, one use of which is to ensure ground is level during construction, for example, when excavating to prepare for laying a foundation for a house. Levelling terms Automatic level – variant of the dumpy level, that makes use of a compensator that ensures that the line of sight remains horizontal once the operator has roughly leveled the instrument. The surveyor sets the instrument up quickly and doesn't have to relevel it carefully each time he sights on a rod on another point. It also reduces the effect of minor settling of the tripod. Three adjustment screws are used to level the instrument. Back sight (BS) – short for "back sight reading", the first staff reading taken by the surveyor after the levelling instrument is set up and levelled. B.S is generally taken on the point of known reduced level as on the benchmark or a change point. Benchmark (surveying) – fixed reference point of known elevation with respect to which RL of other points is determined. Benchmarks can be arbitrary or permanent, the former is used for calculation of reduced levels for small survey works and the latter is used to calculate the elevations of significantly important locations and points. Arbitrary benchmarks are assumed to be equal to 100 meters generally and then the elevations with respect to assumed benchmark is determined. It is commonly practiced by engineering students. For GTS surveys of the country, surveyors use permanent benchmarks to calculate the elevations of different points. Datum surface – reference plane with respect to which RL of the other survey points is determined. The datum surface may be real or imaginary location with a nominated elevation of zero. The commonly used datum is mean sea level. Dumpy level – optical instrument used to establish or check points in the same horizontal plane. It is used in surveying and building with a vertical staff to measur
https://en.wikipedia.org/wiki/Transmission%20line%20loudspeaker
A transmission line loudspeaker is a loudspeaker enclosure design which uses the topology of an acoustic transmission line within the cabinet, compared to the simpler enclosures used by sealed (closed) or ported (bass reflex) designs. Instead of reverberating in a fairly simple damped enclosure, sound from the back of the bass speaker is directed into a long (generally folded) damped pathway within the speaker enclosure, which allows far greater control and use of speaker energy and the resulting sound. Inside a transmission line (TL) loudspeaker is a (usually folded) pathway into which the sound is directed. The pathway is often covered with varying types and depths of absorbent material, and it may vary in size or taper, and may be open or closed at its far end. Used correctly, such a design ensures that undesired resonances and energies, which would otherwise cause undesirable auditory effects, are instead selectively absorbed or reduced ("damped") due to the effects of the duct, or alternatively only emerge from the open end in phase with the sound radiated from the front of the driver, enhancing the output level ("sensitivity") at low frequencies. The transmission line acts as an acoustic waveguide, and the padding both reduces reflection and resonance, and also slows the speed of sound within the cabinet to allow for better tuning. Transmission line loudspeakers designs are more complex to implement, making mass production difficult, but their advantages have led to commercial success for a number of manufacturers such as IMF, TDL, and PMC. As a rule, transmission line speakers tend to have exceptionally high fidelity low frequency response far below that of a typical speaker or subwoofer, reaching into the infrasonic range (British company TDL's studio monitor range from the 1990s quoted their frequency responses as starting from as low as 17 Hz depending upon model with a sensitivity of 87 dB for 1 W @ 1 meter), without the need for a separate enclosure or
https://en.wikipedia.org/wiki/Emilio%20Baiada
Emilio Baiada (January 12, 1914 in Tunis – May 14, 1984 in Modena) was an Italian mathematician. Education and career He studied at the Scuola Normale Superiore in Pisa, where he graduated with highest honors in June 1937 along with Leonida Tonelli, with whom he worked as an assistant from 1938 to 1941, when he left for the war. In 1945 he began to teach analysis, theory of functions, calculus and rational mechanics at the Scuola Normale. In 1948 he obtained a degree in Analysis; his Ph.D. thesis was written under the direction of Tonelli and Marston Morse. In 1949 he moved first to University of Cincinnati, where he worked with scientists like Otto Szász and Charles Napoleon Moore, and then to Princeton University, where he worked with Morse. In 1952 he obtained the chair of analysis of the University of Palermo, where he taught until 1961 before transferring to the University of Modena, where he re-launched the Institute of Mathematics and developed its Library and Mathematical Seminar. Contributions He published more than 60 papers on differential equations, Fourier series and the series expansion of orthonormal functions, topology of varieties, real analysis, calculus of variations and the theory of functions. Recognition Baiada won the Michel prize for the best thesis in Pisa and the Whiting Award in 1940 for "contributions on subjects of calculus of variations". Notes 1984 deaths 1914 births 20th-century Italian mathematicians People from Tunis Scuola Normale Superiore di Pisa alumni Academic staff of the University of Palermo Academic staff of the University of Modena and Reggio Emilia
https://en.wikipedia.org/wiki/Honda%20UNI-CUB
The Honda UNI-CUB is a concept 2-axis self-balancing personal transporter for use in barrier-free indoor environments, and shown at the Osaka Motor Show 2013. History As a successor to the 2009 Honda U3-X, it was demonstrated at the Osaka Motor Show 2013. A launch date has not yet been announced. Design and operation Controlled by weight-shifting, similar manner as that of the Segway PT, the unit is fully self-balancing and can move in any direction, including sideways. There are two wheels, the larger driving wheel for travelling in a forward direction, and a trailing steering wheel at 90 degrees to this one. Both the drive wheel and the steering wheel however are constructed of multiple smaller 'planet' wheels that allow the wheel to be moved laterally. When moving forward the main wheel will be powered and the smaller planet wheels on the steering wheel will rotate to avoid the steering wheel dragging. To turn the steering wheel is rotated. To balance from side to side, or to self-balance laterally, the planet wheels on the drive wheel will be powered appropriately. Measuring 510 x 315 x 620 mm and weighing 25 kg, the UNI-CUB is powered by a lithium-ion battery and has a 6 km/h top speed and 6 km range. The seat height is 620 mm, while footrests are designed to double as support stands. External links UNI-CUB video and information YouTube Image History and gallery of prototypes Details of traction system Video for the song "I Won't Let You Down" by OK Go, in which performers used the UniCub References Personal transporters Japanese inventions Battery electric vehicles Mobility devices One-wheeled balancing robots Honda concept vehicles Robotics at Honda
https://en.wikipedia.org/wiki/Cray%20XC40
The Cray XC40 is a massively parallel multiprocessor supercomputer manufactured by Cray. It consists of Intel Haswell Xeon processors, with optional Nvidia Tesla or Intel Xeon Phi accelerators, connected together by Cray's proprietary "Aries" interconnect, stored in air-cooled or liquid-cooled cabinets. The XC series supercomputers are available with the Cray DataWarp applications I/O accelerator technology. Deployed systems Australia The Pawsey Supercomputing Centre has a 35,712-core XC40 called "Magnus" for general science research. This supercomputer has a processing power of 1.097 petaflops. The Bureau of Meteorology has a 51,840-core XC40 called "Australis" with 276 TB of RAM and a usable storage of 4.3 PB. The supercomputer with a peak performance of 1.6 petaflops provides the operational computing capability for weather, climate, ocean and wave numerical prediction and simulation. Finland National IT center for science CSC computer "Sisu" was completed as XC40 in 2014. It has 40,512 cores with overall peak performance of 1,688 TFlops. Germany High Performance Computing Center, Stuttgart (HLRS) has built a 185,088-core XC40 named "Hazel Hen" with a peak performance of 7420 TFlops. India Supercomputer Education and Research Centre (SERC) at the Indian Institute of Science has an XC40 supercomputer named SahasraT, with 1,376 compute nodes (33,024 Intel Haswell Xeon cores), together with Intel Xeon Phi and NVIDIA K40 GPU accelerators. Pratyush and Mihir are the supercomputers established at Indian Institute of Tropical Meteorology (IITM), Pune and National Center for Medium Range Weather Forecast (NCMRWF) respectively. Pratyush and Mihir are two High Performance Computing (HPC) units. They are located at two government institutes, one being 4.0 PetaFlops unit at IITM, Pune and another 2.8 PetaFlops unit at the National Centre for Medium Range Weather Forecasting (NCMRWF), Noida. Both units and provides a combined output of 6.8 PetaFlops. Japan The
https://en.wikipedia.org/wiki/Southern%20African%20Institute%20of%20Steel%20Construction
The Southern African Institute of Steel Construction (SAISC) is an organization which helps building and construction in South Africa by serving to promote and develop companies providing steel-related products and services to the industry. History The institute was founded on 24 March 1956 when South Africa was still a Union under the Nationalist Government. It was known as the Structural Steel Publicity and Advanced Association Limited. The first meeting of the association took place on 12 September 1956 in Johannesburg in the Barclay Bank building which stood on the corner of Commissioner and Market Streets. The staff consisted on a single engineer offering his services on a part-time with a membership of 18 members. As a result of World War II, the cheapness of concrete enabled it to encroach upon work which until previously had been the domain of the steel industry. The institute was born to rectify this situation. In 1958 the association started to receive copies of publications from Belgium and Luxemburg, and the American Institute of Steel started to send their journal. The association found themselves on the mailing list for Acier-Stahl-Steel a steel-structure based journal in three languages. The board management found this journal to be so informative that it sponsored the circulation of the journal to engineers and architects to promote publicity, something that continued until the demise of the journal. In 1960 the institute employed an engineer, Mr Robert McHalfie-Clarke, on a part-time basis. Scottish and born in 1906 McHalfie-Clarke was a consulting engineer who specialised in structural steel design. Some of his structures including Iscor head office in Pretoria and Newcastle as well as the Norwich Union Building in Pretoria. He was to remain on the scene until 1976 when Dr. Hennie de Clercq took the over the reigns. At the 5th annual general meeting a resolution was placed before members that the name of the company be changed. In 1961, the i
https://en.wikipedia.org/wiki/Lichen%20stromatolite
Lichen stromatolites are laminar calcretes that are proposed as being formed by a sequence of repetitions of induration followed by lichen colonization. Endolithic lichens inhabit areas between grains of rock, chemically and physically weathering that rock, leaving a rind, which is then indurated (hardened), then recolonized. See also Stromatolite References Lichenology Carbonates
https://en.wikipedia.org/wiki/Price%20of%20fairness
In the theory of fair division, the price of fairness (POF) is the ratio of the largest economic welfare attainable by a division to the economic welfare attained by a fair division. The POF is a quantitative measure of the loss of welfare that society has to take in order to guarantee fairness. In general, the POF is defined by the following formula: The exact price varies greatly based on the kind of division, the kind of fairness and the kind of social welfare we are interested in. The most well-studied type of social welfare is utilitarian social welfare, defined as the sum of the (normalized) utilities of all agents. Another type is egalitarian social welfare, defined as the minimum (normalized) utility per agent. Numeric example In this example we focus on the utilitarian price of proportionality, or UPOP. Consider a heterogeneous land-estate that has to be divided among 100 partners, all of whom value it as 100 (or the value is normalized to 100). First, let's look at some extreme cases. The maximum possible utilitarian welfare is 10000. This welfare is attainable only in the very rare case where each partner wants a different part of the land. In a proportional division, each partner receives a value of at least 1, so the utilitarian welfare is at least 100. Upper bound The extreme cases described above already give us a trivial upper bound: UPOP ≤ 10000/100 = 100. But we can get a tighter upper bound. Assume that we have an efficient division of a land-estate to 100 partners, with a utilitarian welfare U. We want to convert it to a proportional division. To do this, we group the partners according to their current value: Partners whose current value is at least 10 are called fortunate . The other partners are called unfortunate. There are two cases: If there are less than 10 fortunate partners, then just discard the current division and make a new proportional division (e.g. using the last diminisher protocol). In a proportional division,
https://en.wikipedia.org/wiki/Megamitochondria
Megamitochondria is extremely large and abnormal shapes of mitochondria seen in hepatocytes in alcoholic liver disease and in nutritional deficiencies. It can be seen in conditions of hypertrophy in cell death. References Robbins Basic Pathology by Kumer et al. Mitochondria Cell biology
https://en.wikipedia.org/wiki/Multidimensional%20signal%20processing
In signal processing, multidimensional signal processing covers all signal processing done using multidimensional signals and systems. While multidimensional signal processing is a subset of signal processing, it is unique in the sense that it deals specifically with data that can only be adequately detailed using more than one dimension. In m-D digital signal processing, useful data is sampled in more than one dimension. Examples of this are image processing and multi-sensor radar detection. Both of these examples use multiple sensors to sample signals and form images based on the manipulation of these multiple signals. Processing in multi-dimension (m-D) requires more complex algorithms, compared to the 1-D case, to handle calculations such as the fast Fourier transform due to more degrees of freedom. In some cases, m-D signals and systems can be simplified into single dimension signal processing methods, if the considered systems are separable. Typically, multidimensional signal processing is directly associated with digital signal processing because its complexity warrants the use of computer modelling and computation. A multidimensional signal is similar to a single dimensional signal as far as manipulations that can be performed, such as sampling, Fourier analysis, and filtering. The actual computations of these manipulations grow with the number of dimensions. Sampling Multidimensional sampling requires different analysis than typical 1-D sampling. Single dimension sampling is executed by selecting points along a continuous line and storing the values of this data stream. In the case of multidimensional sampling, the data is selected utilizing a lattice, which is a "pattern" based on the sampling vectors of the m-D data set. These vectors can be single dimensional or multidimensional depending on the data and the application. Multidimensional sampling is similar to classical sampling as it must adhere to the Nyquist–Shannon sampling theorem. It is affect
https://en.wikipedia.org/wiki/Illumio
Illumio is an American business data center and cloud computing security company. History Illumio was founded in 2013 by Andrew Rubin and P. J. Kirner and is headquartered in Sunnyvale, California, United States. The initial $8 million round of venture capital was led by Andreessen Horowitz. Steve Herrod, former CTO of VMware and managing director of General Catalyst led the company’s $34.5 million round with participation by Formation 8, Data Collective, Salesforce.com CEO Marc Benioff and Yahoo! founder Jerry Yang. BlackRock and Accel a $100 million round with participation from a number of investors including private investors John W. Thompson, Jerry Yang and Marc Benioff as well as previous investors. In September 2019, Illumio was ranked #25 in the Forbes Cloud 100 list. In February 2020, Stowe Australia, Australia's oldest and largest private electrical contractor, selected Illumio to provide security for its data centers across Australia. Technology Illumio’s technology decouples security from the underlying network and hypervisor. This allows for a security approach that works across a variety of computing environments, including private data centers, private clouds, and public clouds. Illumio Adaptive Security Platform (ASP) uses the context (state, relationships, etc.) of workloads (bare-metal and virtual servers, etc.) in the computing environment and keeps security policies intact. Unlike traditional security systems such as firewalls that rely on imperative programming techniques due to static networking constructs, Illumio Adaptive Security Platform is based on declarative programming and computes security in real time. References External links Official website 2013 establishments in California Technology companies based in the San Francisco Bay Area
https://en.wikipedia.org/wiki/Reverse%20roll%20coating
Reverse roll coating is a roll-to-roll coating method for wet coatings. It is distinguished from other roll coating methods by having two reverse-running nips. The metering roll and the applicator roll contra-rotate, with an accurate gap between them. The surface of the applicator roll is loaded with an excess of coating prior to the metering nip, so its surface emerges from the metering nip with a precise thickness of coating equal to the gap. At the application nip, the applicator roll transfers all of this coating to the substrate, by running in the opposite direction to the movement of the substrate, wiping the coating onto the substrate. Reverse roll coating machines demand high specifications in their construction, e.g. for the machining and bearings of the rollers and for highly uniform speed control. This makes them relatively expensive compared to other coating technologies. Unlike many other coating methods, they can however handle coatings with a very wide range of viscosities, from 1 to more than 50000 mPas, and are capable of producing extremely polished finishes on the coatings they apply. They have been produced in a variety of 3-roll and 4-roll configurations. Products that have been manufactured on reverse roll coating machines include magnetic tapes; coated papers; and pressure sensitive tapes. The rise of slot-die coating has tended to eclipse reverse roll coaters as in most if not all cases, the same products can be made on cheaper machinery. References External links Industrial Coatings Coatings Materials science
https://en.wikipedia.org/wiki/HERO%20Hosted%20PBX
HERO Hosted PBX is a SIP-based hosted IP-PBX business phone system, first released in 2008 by Canadian telecommunications software provider Dialexia. The HERO (Hosted Enterprise Remote Office) software allows users to connect multiple phones (e.g., extensions, ring groups, etc.), share lines among several phones and implement business PBX telephone phone features such as voicemail, caller ID, call forwarding & call recording into their virtual PBX. The software is also suitable for multi-office connections, connecting branches which are geographically distant from each other. Dialexia Communications, Inc. released the latest version of HERO Hosted PBX (4.3) in 2013. On June 3, 2014, the Dialexia development team announced in a client newsletter that support for HERO versions 3.9 and earlier would cease effective September 1, 2014. The company advised customers to migrate to a currently-supported operating system in order to receive future security updates & technical support. Software overview HERO Hosted PBX is composed of SIP Proxy, Registrar, and Presence server components that work together to allow real-time communication over IP networks. The software can be administered via web interface and is SIP-compliant), hence interoperable with other SIP devices and services. Other features include: Auto-Attendant IVR, emergency 911 support, integrated billing, cost & statistics reporting, device provisioning and failover and high availability support. In 2009, HERO Hosted PBX was named 'Best Service Provider Solution' by the Technology Marketing Corporation (TMC) at the annual ITEXPO West conference held in Los Angeles. References External links Dialexia Communications, Inc. Official Page HERO Hosted PBX product page HERO Hosted PBX product presentation Telecommunications companies of Canada VoIP companies VoIP software
https://en.wikipedia.org/wiki/Optometer%20%28ophthalmic%20instrument%29
The optometer was a device used for measuring the necessary spherical and/or cylindrical corrections to be prescribed for eyeglasses, from the middle of the 18th century until around 1922, when modern instruments were developed. The term, coined in 1738 by W. Porterfield to describe his Scheiner slit optometer, and used for 200 years to describe many different inventions to measure refractive error of the eye, has completely fallen out of usage today as the task of measuring eyes for spectacles is done with modern instruments, such as the phoropter. "Phoropter" is one of several generic names for modern instruments containing an optometer for each eye (battery of lenses for determination of optical error), combined with prisms and other attachments for measuring binocularity. The term refractor is another such term, and "vision tester" or other descriptive terms are used because "phoroptor", spelled with "-or", is a trademark of one company. Examples of optometers The modern phoropter or refractor In the middle of the 19th century, doctors tested for optical error using single hand-held lenses, held one at a time in front of the patient's eye, or in a trial frame. A wooden case with dozens or hundreds of lenses was held on the doctor's lap, or in a case near the patient's chair, as he or she examined the patient. In the later part of the 19th century, the United States, Germany, France and the UK were actively inventing numerous mechanical optometers, to speed up the process of bringing lenses before the patients' eyes. Various patented or unpatented optometers were sold throughout the later 19th and the start of the 20th centuries, some containing rotating batteries of lenses in various arrangements, usually with the name of the inventor at the front. Around 1910, binocularity was tested using trial frames which sat on the patient's face or on a support bar, with extra testing devices added to the front of the frames, such as Maddox rods, rotating prisms, and
https://en.wikipedia.org/wiki/Megaevolution
Megaevolution describes the most dramatic events in evolution. It is no longer suggested that the evolutionary processes involved are necessarily special, although in some cases they might be. Whereas macroevolution can apply to relatively modest changes that produced diversification of species and genera and are readily compared to microevolution, "megaevolution" is used for great changes. Megaevolution has been extensively debated because it has been seen as a possible objection to Charles Darwin's theory of gradual evolution by natural selection. A list was prepared by John Maynard Smith and Eörs Szathmáry which they called The Major Transitions in Evolution. On the 1999 edition of the list they included: Replicating molecules: change to populations of molecules in protocells Independent replicators leading to chromosomes RNA as gene and enzyme change to DNA genes and protein enzymes Bacterial cells (prokaryotes) leading to cells (eukaryotes) with nuclei and organelles Asexual clones leading to sexual populations Single-celled organisms leading to fungi, plants and animals Solitary individuals leading to colonies with non-reproducing castes (termites, ants & bees) Primate societies leading to human societies with language Some of these topics had been discussed before. Numbers one to six on the list are events which are of huge importance, but about which we know relatively little. All occurred before (and mostly very much before) the fossil record started, or at least before the Phanerozoic eon. Numbers seven and eight on the list are of a different kind from the first six, and have generally not been considered by the other authors. Number four is of a type which is not covered by traditional evolutionary theory, The origin of eukaryotic cells is probably due to symbiosis between prokaryotes. This is a kind of evolution which must be a rare event. The Cambrian radiation example The Cambrian explosion or Cambrian radiation was the relatively rapid appeara
https://en.wikipedia.org/wiki/Translational%20Health%20Science%20and%20Technology%20Institute
Translational Health Science and Technology Institute (THSTI) is a society registered under the Societies Registration Act XXI of 1860. It is also an autonomous institute of the Department of Biotechnology, Ministry of Science and Technology, Government of India. It was set up in 2009 at Gurgaon and is now located in NCR Biotech Science Cluster, Faridabad along with the Regional Center for Biotechnology, Advanced Technology Platforms Center, Small Animal Facility, and Bio-incubator. Envisioned by former secretary of DBT, M. K. Bhan, the centre was created to enable faster transition of lab research to market. Pramod Garg is the executive director of THSTI. THSTI has six intramural centers namely Vaccine & Infectious Disease Research Centre (VIDRC), Pediatric Biology Centre (PBC), Centre for Bio-design & Diagnostics (CBD), Centre for Human Microbial Ecology (CHME), Policy Centre for Biomedical Research (PCBR), and Drug Discovery Research Centre (DDRC). Vaccine & Infectious Disease Research Centre (VIDRC) is engaged in development of technologies pertaining to prophylaxis, treatment and diagnosis of infections caused by JEV, DENV, HIV, Rotavirus, Mycobaterium tuberculosis, HEV. In 2009, HIV Vaccine Translational Research (HVTR) laboratory was established in collaboration with International AIDS Vaccine Initiative, USA for developing efficient immunogens to be used in immunogenic composition against HIV. The laboratory works in collaboration with the US-based Scripps Research Institute, New York-based Weill Cornell Medical College, Amsterdam-based Academic Medical Center, and Johannesburg-based National Institute of Communicable Diseases. In collaboration with Department of Biotechnology, Bharat Biotech International Limited, PATH and CHRD-SAS, VIDRC was also engaged in the phase III randomized, double-blind placebo controlled trial to evaluate the non-interference in the immune response of three doses of ORV 116E (Rotavac) to antigens contained in childhood vaccines
https://en.wikipedia.org/wiki/MobiKwik
MobiKwik is an Indian payment service provider founded in 2009 that provides a mobile phone-based payment system and digital wallet. Customers can add money to an online wallet that can be used for payments. In 2013 the Reserve Bank of India authorized the company's use of the MobiKwik wallet, and in May 2016 the company began providing small loans to consumers as part of its service. In November 2016, the company reported having 1.5 million merchants using its service and a user base of 55 million customers. The company employs over 325 people, operating in three segments including consumer payments, fintech, and payment gateway. Recently, Mobikiwik suspended its e-wallet services from all major crypto exchanges in India from 1 April. History MobiKwik was founded in 2009 by husband and wife team Bipin Preet Singh and Upasana Taku. Singh, a 2002 graduate of IIT Delhi, saw an opportunity to improve mobile recharge options. He seeded the company, developed the website and payment options, and rented office space in Dwarka, Delhi. The initial service was a website with a closed wallet facility, but over the years, MobiKwik extended their service to mobile apps. The company initially partnered with online merchants to make their wallet available as a payment option on e-commerce sites. MobiKwik launched a digital wallet system in 2012 that enabled users to deposit money online to use for bill payments and other features. MobiKwik provides financial services including loan, accident insurance, life insurance, fire insurance, IMPS money transfer, credit card bill payment, mutual funds, and DTH recharge. They also introduced the feature of sending and receiving money via a mobile app. In September 2014, Express Computer reported how MobiKwik was partnering with GoDaddy and other international companies to help them comply with Indian payment regulations. In April 2015, MobiKwik was used by 15 million users and claimed to be adding one million new customers every mont
https://en.wikipedia.org/wiki/Love%20and%20Math
Love and Math is a book about mathematics written by Edward Frenkel which was published in October 2013. It was a New York Times bestseller, and was the 2015 winner of the Euler Book Prize. As of February 2016, it has been published in 16 languages. Reception In a review published in The New York Review of Books, Jim Holt called Love and Math a "winsome new memoir" which is "three things: a Platonic love letter to mathematics; an attempt to give the layman some idea of its most magnificent drama-in-progress; and an autobiographical account, by turns inspiring and droll, of how the author himself came to be a leading player in that drama.” The New York Times review called the book "powerful, passionate and inspiring." Keith Devlin wrote in The Huffington Post: "With every page, I found my mind's eye conjuring up a fictional image of the book's author, writing by candlelight in the depths of the Siberian winter like Omar Sharif's Doctor Zhivago in the David Lean movie adaptation of Pasternak's famous novel. Love and Math is Edward Frenkel's Lara poems... As is true for all the great Russian novels, you will find in Frenkel's tale that one person's individual story of love and overcoming adversity provides both a penetrating lens on society and a revealing mirror into the human mind." Peter Woit, author of Not Even Wrong, wrote in a blog post: The Love of the title is much more about love of mathematics than love of another person, as Frenkel provides a detailed story of what it is like to fall in love with mathematics, then pursue this deeply, ending up doing mathematics at the highest level. References Books about mathematics
https://en.wikipedia.org/wiki/Thomas%27%20cyclically%20symmetric%20attractor
In the dynamical systems theory, Thomas' cyclically symmetric attractor is a 3D strange attractor originally proposed by René Thomas. It has a simple form which is cyclically symmetric in the x,y, and z variables and can be viewed as the trajectory of a frictionally dampened particle moving in a 3D lattice of forces. The simple form has made it a popular example. It is described by the differential equations where is a constant. corresponds to how dissipative the system is, and acts as a bifurcation parameter. For the origin is the single stable equilibrium. At it undergoes a pitchfork bifurcation, splitting into two attractive fixed points. As the parameter is decreased further they undergo a Hopf bifurcation at , creating a stable limit cycle. The limit cycle the undergoes a period doubling cascade and becomes chaotic at . Beyond this the attractor expands, undergoing a series of crises (up to six separate attractors can coexist for certain values). The fractal dimension of the attractor increases towards 3. In the limit the system lacks dissipation and the trajectory ergodically wanders the entire space (with an exception for 1.67%, where it drifts parallel to one of the coordinate axes: this corresponds to quasiperiodic torii). The dynamics has been described as deterministic fractional Brownian motion, and exhibits anomalous diffusion. References Nonlinear systems Dynamical systems Chaotic maps
https://en.wikipedia.org/wiki/Dynamic%20secrets
Dynamic Secrets is a novel key management scheme for secure communications. It was proposed by Sheng Xiao, Weibo Gong, and Don Towsley. The first academic publication had been nominated for INFOCOM 2010 best paper award. Later a monograph was published by Springer to extend this scheme to a framework. Dynamic secrets can be applied to all bi-directional communication systems and some single-directional communication systems to improve their communications security. There are three main benefits: 1. the encryption and authentication keys are rapidly and automatically updated for any pair of communication devices 2. the key update process binds to the communication process and incurs negligible computing and bandwidth cost 3. Use a cloned key in either authentication or encrypted communication is guaranteed to be detected. the detection has no false alarms and does not cost any computing / networking resources. (dynamic secrets automatically break the secure communication when the clone key and the legitimate key co-exist. however, in order to find out who is the attacker, it takes further actions and consumes computing power and network bandwidth.) References Access control Key management
https://en.wikipedia.org/wiki/International%20Partnership%20for%20Hydrogen%20and%20Fuel%20Cells%20in%20the%20Economy
The International Partnership for Hydrogen and Fuel Cells in the Economy (IPHE) is an international collaborative initiative for the development and deployment of hydrogen and fuel cell technologies meant to enable global energy security and other environmental and economic benefits that these technologies can provide. The IPHE membership is open to national governmental entities that have made significant commitments to invest resources in research, development, and demonstration activities to advance hydrogen and fuel cell technologies. Background The IPHE Terms of Reference of November 2003 created a steering committee that governs the overall framework and activities of the IPHE. The mission of the IPHE is to serve as a mechanism to share information among partners to enable the organization and implementation of international research, development, demonstration, and deployment activities related to hydrogen and fuel cell technologies. The organization also provides a forum for sharing information on new policies, common codes, and standards built for the transition to hydrogen and fuel cells in a global economy for energy security and environmental protection. The four strategic priorities that guide the activities of the organization include: Accelerating the market penetration and early adoption of hydrogen and fuel cell technologies and their supporting infrastructure Supporting widespread deployment through policy and regulatory activities Raising the profile with policymakers and the public Monitoring hydrogen, fuel cell and complementary technology developments The two primary working groups within IPHE are the Education Working Group and the Regulations, Codes, and Standards (RCS) Working Group. The Education Working Group focuses on sharing practices and ideas on methods to increase education and outreach activities, including recognition programs such as student awards. The RCS Working Group has focused on many activities related to shari
https://en.wikipedia.org/wiki/SNP%20annotation
Single nucleotide polymorphism annotation (SNP annotation) is the process of predicting the effect or function of an individual SNP using SNP annotation tools. In SNP annotation the biological information is extracted, collected and displayed in a clear form amenable to query. SNP functional annotation is typically performed based on the available information on nucleic acid and protein sequences. Introduction Single nucleotide polymorphisms (SNPs) play an important role in genome wide association studies because they act as primary biomarkers. SNPs are currently the marker of choice due to their large numbers in virtually all populations of individuals. The location of these biomarkers can be tremendously important in terms of predicting functional significance, genetic mapping and population genetics. Each SNP represents a nucleotide change between two individuals at a defined location. SNPs are the most common genetic variant found in all individual with one SNP every 100–300 bp in some species. Since there is a massive number of SNPs on the genome, there is a clear need to prioritize SNPs according to their potential effect in order to expedite genotyping and analysis. Annotating large numbers of SNPs is a difficult and complex process, which need computational methods to handle such a large dataset. Many tools available have been developed for SNP annotation in different organisms: some of them are optimized for use with organisms densely sampled for SNPs (such as humans), but there are currently few tools available that are species non-specific or support non-model organism data. The majority of SNP annotation tools provide computationally predicted putative deleterious effects of SNPs. These tools examine whether a SNP resides in functional genomic regions such as exons, splice sites, or transcription regulatory sites, and predict the potential corresponding functional effects that the SNP may have using a variety of machine-learning approaches. But the t
https://en.wikipedia.org/wiki/Beam%20and%20Warming%20scheme
In numerical mathematics, Beam and Warming scheme or Beam–Warming implicit scheme introduced in 1978 by Richard M. Beam and R. F. Warming, is a second order accurate implicit scheme, mainly used for solving non-linear hyperbolic equations. It is not used much nowadays. Introduction This scheme is a spatially factored, non iterative, ADI scheme and uses implicit Euler to perform the time Integration. The algorithm is in delta-form, linearized through implementation of a Taylor-series. Hence observed as increments of the conserved variables. In this an efficient factored algorithm is obtained by evaluating the spatial cross derivatives explicitly. This allows for direct derivation of scheme and efficient solution using this computational algorithm. The efficiency is because although it is three-time-level scheme, but requires only two time levels of data storage. This results in unconditional stability. It is centered and needs the artificial dissipation operator to guarantee numerical stability. The delta form of the equation produced has the advantageous property of stability (if existing) independent of the size of the time step. The method Consider the inviscid Burgers' equation in one dimension Burgers' equation in conservation form, where : Taylor series expansion The expansion of : This is also known as the trapezoidal formula. Note that for this equation, Tri-diagonal system Resulting tri-diagonal system: This resulted system of linear equations can be solved using the modified tridiagonal matrix algorithm, also known as the Thomas algorithm. Dissipation term Under the condition of shock wave, dissipation term is required for nonlinear hyperbolic equations such as this. This is done to keep the solution under control and maintain convergence of the solution. This term is added explicitly at level to the right hand side. This is always used for successful computation where high-frequency oscillations are observed and must be suppressed.
https://en.wikipedia.org/wiki/Shock%20detector
A shock detector, shock indicator, or impact monitor is a device which indicates whether a physical shock or impact has occurred. These usually have a binary output (go/no-go) and are sometimes called shock overload devices. Shock detectors can be used on shipments of fragile valuable items to indicate whether a potentially damaging drop or impact may have occurred. They are also used in sports helmets to help estimate if a dangerous impact may have occurred. By contrast, a shock data logger is a data acquisition system for analysis and recording of shock pulses. Overview Shocks and impacts are often specified by the peak acceleration expressed in g-s (sometimes called g-forces). The form of the shock pulse and particularly the duration are equally important. For example, a short 1 ms 300 g shock has little damage potential and is not usually of interest but a 20 ms 300 g shock might be critical. Depending on the use, the response to this time sensitivity of a shock detector needs to be matched to the sensitivity of the item it is intended to monitor. The mounting location also affects the response of most shock detectors. A shock on a rigid item such as a sports helmet or a rigid package might respond to a field shock with a jagged shock pulse which, without proper filtering is difficult to characterize. A shock on a cushioned item usually has a smoother shock pulse., and thus more consistent responses from shock detector. Shocks are vector quantities with the direction of the shock being important to the item of interest, Shock detectors also can be highly sensitive to the direction of the input shock. A shock detector can be evaluated: • Separately in a laboratory physical test, perhaps on an instrumented shock machine. • Mounted to its intended item in a testing laboratory with controlled fixturing and controlled input shocks. • In the field with uncontrolled and more highly variable input shocks. Use of proper test methods and Verification a
https://en.wikipedia.org/wiki/Aeromedical%20Biological%20Containment%20System
The Aeromedical Biological Containment System (ABCS) is an aeromedical evacuation capability devised by the U.S. Centers for Disease Control and Prevention (CDC) in collaboration with the U.S. Department of Defense (DoD) and government contractor Phoenix Air between 2007 and 2010. Its purpose is to safely air-transport a highly contagious patient; it comprises a transit isolator (a tent-like plastic structure provided with negative air pressure to prevent escape of airborne-contagious pathogens) and an appropriately configured supporting aircraft. Originally developed to support CDC staff who might become infected while investigating avian flu and SARS in East Asia, it was never used until the 2014 Ebola virus epidemic in West Africa, transporting 36 Ebola patients out of West Africa. History The CDC experienced difficulties and embarrassment relating to safe patient air-transport during an international tuberculosis scare in 2007. Additionally, the memory of the severe acute respiratory syndrome (SARS) epidemic of 2003-2004 and the then-current avian influenza threat (both potentially requiring transport of sick patients back to the U.S. from the Far East) prompted CDC officials to initiate the program that became the ABCS. The Cartersville, Georgia-based military airlift provider Phoenix Air was contracted; the CDC provided medical expertise to the collaboration, while the DoD provided some of the protective technology through its Edgewood Chemical Biological Center. With the anticipated decommissioning of the U.S. Army's Aeromedical Isolation Team (AIT) in December 2010, the need for a new system to support transport of highly contagious patients became even more urgent. By that time, the ABCS had been extensively tested and was certified for its mission by the Federal Aviation Administration (FAA). The U.S. Air Force had also approved it for ferrying military personnel. The dedicated air platform for the ABCS was a 32-year-old Gulfstream III jet that had once
https://en.wikipedia.org/wiki/Automorphic%20Forms%20on%20GL%282%29
Automorphic Forms on GL(2) is a mathematics book by where they rewrite Erich Hecke's theory of modular forms in terms of the representation theory of GL(2) over local fields and adele rings of global fields and prove the Jacquet–Langlands correspondence. A second volume by gives an interpretation of some results by Rankin and Selberg in terms of the representation theory of GL(2) × GL(2). References External links Langlands program Representation theory Mathematics books
https://en.wikipedia.org/wiki/Depsidone
Depsidones (+ "depside" + "one") are chemical compounds that are sometimes found as secondary metabolites in lichens. They are esters that are both depsides and cyclic ethers. An example is norstictic acid. References Biochemistry Carboxylate esters
https://en.wikipedia.org/wiki/Motorola%2068451
The MC68451 is a Motorola (now Freescale) Memory Management Unit (MMU), which was primarily used in conjunction with the Motorola MC68010 microprocessor. The MC68451 supported a 16 MB address space and provided a MC68000 or a MC68010 with support for memory management and protection of memory against unauthorized access. The block size was variable, so it was usually used for segment-based memory management. It supported the mapping of up to 32 memory segments or pages of a variable size from logical to physical addresses. To allow more segments or pages, the simultaneous use of multiple MC68451 MMUs was supported In combination with a MC68010, the MC68451 permitted the realization of virtual memory. With the earlier MC68000, this was not possible due to the way the MC68000 treated memory access errors, i.e. processor state could not always be properly restored after a page fault; two MC68000s would be required, with the main CPU pausing when it got a memory access error, and the other CPU servicing the page fault. The limitation to 32 segment table entries per MMU made systems based on a MC68010 and a MC68451 slow, as they often had to modify the segment table due to its small size. H. Berthold AG used 12 MC68451 MMUs together with their UNOS variant vBertOS. Others (e.g. Sun Microsystems, Convergent Technologies) used their own proprietary MMUs instead of the MC68451. See also Motorola 68851 References 68k architecture 68451
https://en.wikipedia.org/wiki/Interchromatin%20granule
An interchromatin granule is a cluster in the nucleus of a mammal cell which is enriched in pre-mRNA splicing factors. Interchromatin granules are located in the interchromatin regions of the mammalian Cell nuclei. They usually appear as irregularly shaped structures that vary in size and number. They can be observed by immunofluorescence microscopy. Interchromatin granules are structures undergoing constant change, and their components exchange continuously with the nucleoplasm, active transcription sites and other nuclear locations. Research on dynamics of interchromatin granules has provided new insight into the functional organisation of the nucleus and gene expression. Interchromatin granule clusters vary in size anywhere between one and several micrometers in diameter. They are composed of 20–25 nm granules that are connected in a beaded chain fashion appearance by thin fibrils. Interchromatin granule clusters (IGCs) have been proposed to be stockpiles of fully mature snRNPs and other RNA processing components that are ready to be used in the production of mRNA. See also are subnuclear structures that are enriched in pre-messenger RNA splicing factors References Cell biology
https://en.wikipedia.org/wiki/Myrtle%20wreath%20at%20Vergina
Myrtle wreath at Vergina (, Latin: corona Verginae) made of gold myrtle (Myrtus communis) leaves and flowers, is one of the most valuable finds from the antechamber of the royal Macedonian tombs at Vergina, Greece. From the Hellenistic period (300-30 BC), the gold wreath is thought to belong to Meda, the Thracian princess and fifth wife of Philip II of Macedon. Which was theorized by Greek archaeologist Manolis Andronikos, whom excavated the tomb of Philip II, father of Alexander the Great in 1977. This theory today is still in debate on whether this tomb actually belongs to these royals. Meaning and symbolism Myrtle and attire A plant sacred to the goddess Aphrodite, myrtle was a symbol of love. Greeks wore wreaths for special events and received them as athletic prizes and honors. The wreaths were made of gold foil, they were created to be buried with the dead but too fragile to be worn for everyday attire. The myrtle leaves and blossoms on the myrtle wreath were cut from thin sheets of gold, stamped and incised details, and then wired onto the stems. Many that survive today were found in graves. The myrtle wreath After restoration, there are 80 leaves and 112 flowers. The main wreath, from which the small twigs sprouted, consists of a narrow cylindrical rod, whose two ends are flattened by twisting together. The internal diameter of the main tube is 0.18 - 0.16 m. while the external is 0.26 - 0.23 m. The gold myrtle wreath was exposed at Archaeological Museum of Thessaloniki until 1997, when it is moved to Museum of Vergina. References Art of Macedonia (ancient kingdom) Culture of Macedonia (ancient kingdom) Myrtus Headgear Visual motifs Plants in culture
https://en.wikipedia.org/wiki/Sludge
Sludge is a semi-solid slurry that can be produced from a range of industrial processes, from water treatment, wastewater treatment or on-site sanitation systems. For example, it can be produced as a settled suspension obtained from conventional drinking water treatment, as sewage sludge from wastewater treatment processes or as fecal sludge from pit latrines and septic tanks. The term is also sometimes used as a generic term for solids separated from suspension in a liquid; this soupy material usually contains significant quantities of interstitial water (between the solid particles). Sludge can consist of a variety of particles, such as animal manure. Industrial wastewater treatment plants produce solids that are also referred to as sludge. This can be generated from biological or physical-chemical processes. In the activated sludge process for wastewater treatment, the terms "waste activated sludge" and "return activated sludge" are used. In food processing and beverage-making industries, sludge can have high protein content and other nutrients that can be used for beneficial purposes such as animal feed, thereby avoiding disposal at a landfill. References Environmental engineering Sanitation Sewerage
https://en.wikipedia.org/wiki/Psychedelics%20and%20ecology
Researchers have noted the relationship between psychedelics and ecology, particularly in relation to the altered states of consciousness (ASC) produced by psychedelic drugs and the perception of interconnectedness expressed through ecological ideas and themes produced by the psychedelic experience. This is felt through the direct experience of the unity of nature and the environment of which the individual is no longer perceived as separate but intimately connected and embedded inside. Swiss chemist Albert Hofmann, the first person to synthesize LSD, believed that the drug made one aware and sensitive to "the magnificence of nature and of the animal and plant kingdom" and the role of humanity in relation to nature. Stanley Krippner and David Luke have speculated that "the consumption of psychedelic substances leads to an increased concern for nature and ecological issues". As a result, American psychologist Ralph Metzner and several others have argued that psychedelic drug use was the impetus for the modern ecology movement in the late 1960s. Terminology and assessment In the context of the psychedelic experience, the term ecology is used to refer to two concepts: how organisms relate to themselves and their environment and the concept of the political movement that seeks to protect the environment. The psychedelic experience is said to result in the direct realization of the fundamental concept of interconnectedness such as the kind found in ecological relationships. Subjects undergoing an LSD psychedelic therapy session in a controlled, laboratory setting report boundary dissolution and the feeling of unity with nature during a psychedelic peak experience. Vollenweider & Kometer (2010) note that measuring the "feelings of unity with the environment" can now be reliably assessed using the five-dimensional altered states of consciousness rating scale (5D-ASC) of which "oceanic boundlessness" is the primary dimension. Research by Lerner & Lyvers (2006) and S
https://en.wikipedia.org/wiki/Ricochet%20%28software%29
Ricochet or Ricochet IM is a free software, multi-platform, instant messaging software project originally developed by John Brooks and later adopted as the official instant messaging client project of the Invisible.im group. A goal of the Invisible.im group is to help people maintain privacy by developing a "metadata free" instant messaging client. History Originally called Torsion IM, Ricochet was renamed in June 2014. Ricochet is a modern alternative to TorChat, which hasn't been updated in several years, and to Tor Messenger, which is discontinued. On September 17, 2014, it was announced that the Invisible.im group would be working with Brooks on further development of Ricochet in a Wired article by Kim Zetter. Zetter also wrote that Ricochet's future plans included a protocol redesign and file-transfer capabilities. The protocol redesign was implemented in April 2015. In February 2016, Ricochet's developers made public a security audit that had been sponsored by the Open Technology Fund and carried out by the NCC Group in November 2015. The results of the audit were "reasonably positive". The audit identified "multiple areas of improvement" and one vulnerability that could be used to deanonymize users. According to Brooks, the vulnerability has been fixed in the latest release. Technology Ricochet is a decentralized instant messenger, meaning there is no server to connect to and share metadata with. Further, using Tor, Ricochet starts a Tor hidden service locally on a person's computer and can communicate only with other Ricochet users who are also running their own Ricochet-created Tor hidden services. This way, Ricochet communication never leaves the Tor network. A user screen name (example: ) is auto-generated upon first starting Ricochet; the first half of the screen name is the word "ricochet", with the second half being the address of the Tor hidden service. Before two Ricochet users can talk, at least one of them must privately or publicly share their
https://en.wikipedia.org/wiki/Scarborough%20criterion
The Scarborough criterion is used for satisfying convergence of a solution while solving linear equations using an iterative method. Introduction Analytical solutions for certain systems of equations can be difficult or impossible to obtain. A well known example are the Navier-Stokes equations describing the flow of Newtonian fluids. Solutions of such equations can be obtained numerically, at discrete points of the solution domain (e.g. at discrete time points and points in space). Numerical solutions based on the integration of the equations at discrete control volumes of the solution domain (for example the Finite Volume Method) result in a system of algebraic equations, one for each nodal point (corresponding to a particular control volume). These algebraic equations are usually referred to as discretised equations. The Scarborough criterion formulated by Scarborough (1958), can be expressed in terms of the values of the coefficients of the discretised equations: Here is the net coefficient of a random central node P and the summation in the numerator is taken over all the neighbouring nodes. For a one, two and three-dimensional problem there will be two (east & west), four (east, west, south & north), and six (east, west, south north, top & bottom) neighbours for each node, respectively. Comments This is a sufficient condition, not a necessary one. This means that we can get convergence, even if, at times, we violate the criterion. The satisfaction of this criterion ensures that the equations will be converged by at least one iterative method. Gauss–Seidel method If Scarborough criterion is not satisfied then Gauss–Seidel method iterative procedure is not guaranteed to converge a solution. This criterion is a sufficient condition, not a necessary one. If this criterion is satisfied then it means equation will be converged by at least one iterative method. The Scarborough criterion is used as a sufficient condition for convergent iterative method. The fin
https://en.wikipedia.org/wiki/Wolfbox
The Wolfbox is the name for the original passive DI unit, direct box, or DI as invented in the late 1950s by Dr. Edward Wolfrum, PhD, alumnus engineer of Motown, Golden World Records, Terra-Shirma Studios, Metro-Audio Capstan Roller Remote recording, and United Sound Systems in Detroit, Michigan. Used by James Jamerson, Dennis Coffey, Bob Babbit and other The Funk Brothers, the Wolfbox was a key component in the 1960s and 1970s sound of recorded music in the Motown/Detroit scene. Origin According to Wolfrum, the idea for the creation of the device originally came to him out of necessity, from "…Recording bands back then [early 1960s] and the fact that I simply couldn't afford microphones." It was at Detroit's WEXL in 1962 that 16-year-old staff engineer Wolfrum incorporated his newly created passive direct interface box – later known at the "Wolfbox" – as an interface from the high-impedance output of church PA systems to the microphone input of broadcast audio mixers. Recent versions In 2013, a limited-edition run of 25 new Wolfboxes were designed, plotted, supervised & signed by Dr. Wolfrum, in a non-exclusive (unlicensed) agreement with Acme Audio Mfg. Company. Using NOS components and original A-11J and A-12J triad transformers sourced from vintage gear, these new versions found their way to such places as Nashville's Blackbird Studios, London's Abbey Road, and to Blue Note Records President and bassist Don Was. After the 25-unit production, Dr. Wolfrum ended his Acme collaboration and released his schematic of the Wolfbox in 2014 for free public non-commercial use. To date Acme Audio Mfg. Co. produces The Motown DI which uses original OEM Triad transformers. Molybdenum and limited resources The original Wolfboxes relied on vintage A-11J and A-12J Triad transformers (manufactured up to 1974) whose metal structure (i.e. Molybdenum composition) became regulated due to mining and manufacturing toxicity by OSHA and EPA restrictions. References External links
https://en.wikipedia.org/wiki/Productive%20aging
Productive aging refers to activities which older people engage in on a daily basis. Older adults have opportunities and constraints which are related to the productive aging process. The community and society need to develop more options for older adults to choose their way of being engaged in the community and contributing to others. Things such as policy changes and resource commitments are important to promote productive aging. One example of productive aging is retirement which moves older adults from paid forms of productivity to non-paid activities. Many activities can give older adults opportunities and constraints related to the productive aging process. These activities include retirement, employment, economic well-being, leisure, religious participation and spirituality, membership in community associations and volunteerism, education, and political action. Older adults will find many opportunities to engage in activities which contribute to society or follow personal creative activities. References Social Gerontology A Multidisciplinary perspective-ninth edition by Nancy R. Hooyman and H. Asuman Kiyak Gerontology
https://en.wikipedia.org/wiki/Online%20mourning
Online mourning describes grieving on the internet. It represents not a revolution in mourning, but rather a shift in the medium mourners utilize to express their grief and memorialize the deceased. This shift has occurred in tandem with the widespread popularity of social media in the West, a result of which has been the need for users to accept death within an online environment. It is estimated that by 2012, 30 million Facebook users had died. Online mourning does not occur exclusively on social media websites. There are websites such as Memories.net and Legacy.com dedicated to hosting obituaries and capturing the life stories of deceased loved ones. Two distinct types of online mourning have been identified, high-profile cases that draw attention from a broad online community, and profiles posthumously recreated and reframed as a medium to memorialize the deceased. History Since the advent of newspapers, the obituary became a preferred method of memorializing the deceased. Until recently, obituaries were one of the most read sections of the newspaper. As new media technologies such as radio and television were created, the obituary adapted to best reflect capabilities available in the new communication media. Authors Brian Carroll and Katie Landry have argued that the appearance of online mourning reflects a logical progress of mourning via social media networks through use of new media. Changes to the obituary as it adapts over media include an exponential increase in information about the deceased, and the content reaching a wider geographic audience. The occurrence of online mourning presents a new paradigm in the memorialization process by providing interactive, sometimes competitive documents for mourners. Studies of Facebook and Myspace indicate that while the majority of living users visit memorialized profile accounts immediately after learning of an individual’s death, visitation often continues long after, albeit less frequently. There have been so
https://en.wikipedia.org/wiki/AppFlood
AppFlood is a programmatic mobile advertising platform created by PapayaMobile. It was launched in 2012, and in 2014 became the first mobile real-time bidding platform to be engineered and made available in China. History AppFlood was launched in July 2012 by PapayaMobile, a mobile technology company previously known for its social gaming network. By AppFlood's one-year anniversary, it had attracted 4,500 Android users and was delivering 1.3 billion impressions. In April 2014, AppFlood launched a real-time bidding platform, the first to be engineered and made available in China. The company had a stated goal being the leading company bridging China and western countries. By August 2014 AppFlood had sent ads to 400 million mobile devices globally. AppFlood is headquartered in Beijing and has offices in San Francisco and London. References External links Official Website RoUK.ro Online advertising services and affiliate networks Marketing companies established in 2012
https://en.wikipedia.org/wiki/Local%20adaptation
Local adaptation is a mechanism in evolutionary biology whereby a population of organisms evolves to be more well-suited to its local environment than other members of the same species that live elsewhere. Local adaptation requires that different populations of the same species experience different natural selection. For example, if a species lives across a wide range of temperatures, populations from warm areas may have better heat tolerance than populations of the same species that live in the cold part of its geographic range. Definition More formally, a population is said to be locally adapted if organisms in that population have evolved different phenotypes than other populations of the same species, and local phenotypes have higher fitness in their home environment compared to individuals that originate from other locations in the species range. This is sometimes called 'home site advantage'. A stricter definition of local adaptation requires 'reciprocal home site advantage', where for a pair of populations each out performs the other in its home site. This definition requires that local adaptation result in a fitness trade-off, such that adapting to one environment comes at the cost of poorer performance in a different environment. Before 2004, reciprocal transplants sometimes considered populations locally adapted if the population experienced its highest fitness in its home site vs the foreign site (i.e. compared the same population at multiple sites, vs. multiple populations at the same site). This definition of local adaptation has been largely abandoned after Kawecki and Ebert argued convincingly that populations could be adapted to poor-quality sites but still experience higher fitness if moved to a more benign site (right panel of figure). Testing for local adaptation Testing for local adaptation requires measuring the fitness of organisms from one population in both their local environment and in foreign environments. This is often done using tra
https://en.wikipedia.org/wiki/Growth%20curve%20%28statistics%29
The growth curve model in statistics is a specific multivariate linear model, also known as GMANOVA (Generalized Multivariate Analysis-Of-Variance). It generalizes MANOVA by allowing post-matrices, as seen in the definition. Definition Growth curve model: Let X be a p×n random matrix corresponding to the observations, A a p×q within design matrix with q ≤ p, B a q×k parameter matrix, C a k×n between individual design matrix with rank(C) + p ≤ n and let Σ be a positive-definite p×p matrix. Then defines the growth curve model, where A and C are known, B and Σ are unknown, and E is a random matrix distributed as Np,n(0,Ip,n). This differs from standard MANOVA by the addition of C, a "postmatrix". History Many writers have considered the growth curve analysis, among them Wishart (1938), Box (1950) and Rao (1958). Potthoff and Roy in 1964; were the first in analyzing longitudinal data applying GMANOVA models. Applications GMANOVA is frequently used for the analysis of surveys, clinical trials, and agricultural data, as well as more recently in the context of Radar adaptive detection. Other uses In mathematical statistics, growth curves such as those used in biology are often modeled as being continuous stochastic processes, e.g. as being sample paths that almost surely solve stochastic differential equations. Growth curves have been also applied in forecasting market development. When variables are measured with error, a Latent growth modeling SEM can be used. Footnotes References Analysis of variance Statistical forecasting Multivariate time series Ordinary differential equations Exponentials Biostatistics Growth curves
https://en.wikipedia.org/wiki/Continued%20process%20verification
Continued process verification (CPV) is the collection and analysis of end-to-end production components and processes data to ensure product outputs are within predetermined quality limits. In 2011 the Food and Drug Administration published a report outlining best practices regarding business process validation in the pharmaceutical industry. Continued process verification is outlined in this report as the third stage in Process Validation. Its central purpose is to ensure that processes are in a constant state of control, thus ensuring final product quality. Central to effective CPV is a method with which to identify unwanted process inconsistencies in order to execute corrective or preventive measures. Once quality standards are set in place they must be monitored with regular frequency to confirm those parameters are being met. Continued process verification not only helps protect consumers from production faults, but business also see benefits in implementing a CPV program. Should product outputs not match target standards it can be very costly to investigate the problem source without existing CPV data. Vital components of continued process verification An alert system to identify process malfunctions that lead to deviations from quality standards. A framework for gathering and analyzing data of final product quality and process consistency. Analysis should include source materials consistency and manufacturing equipment condition; and data should be collected in a format that allows for long-term trend analysis as well as intra-production quality analysis. Continued review of quality qualification standards and process reliability. Departures from any predetermined standards should be flagged for review by trained personnel and appropriate measures undertaken to restore end-to-end quality standards. Data collection and analysis Crucial in effective CPV implementation is an appropriate data collection procedure. Data must allow for statistical analytic
https://en.wikipedia.org/wiki/Obihai%20Technology
Obihai Technology was a company that manufactures analog telephone adapters that supported Session Initiation Protocol (SIP), XMPP, and Google Voice compatible Internet telephony. Obihai was sold to Polycom in 2018, with Poly and Plantronics sold to HP in 2022. Most items in the former Obihai product line have been either rebranded as Poly or discontinued. History The company, based in California's Silicon Valley, was founded in 2010 by Jan Fandrianto and Sam Sin, the same people who introduced the first analog telephone adaptors as Komodo Technology in the 1990s and formed Sipura Technology in 2002. Both prior companies were acquired by Cisco Systems, in 2000 and 2005 respectively, and integrated into that company's Linksys division. Linksys was sold to Belkin in 2013. In January 2018, Polycom acquired Obihai. Polycom "expects to add more cloud-based capabilities and Analog Terminal Adapter solutions to its solutions portfolio". The deal is expected to close early in the first quarter of 2018. In 2022, Poly was sold onwards to HP. In December 2021, Obahai's consumer-oriented analogue telephone adapter line was discontinued, with support ended in December 2023. This leaves no hardware ATA's from any source available for purchase for use with the Google Voice service. Products Obihai was notable primarily for manufacturing analog telephone adapters that connected standard push-button telephones to the Google Voice service using a wired or wireless broadband Internet connection. As Google's voice over IP service is inexpensive (and, in some cases, was free), hardware that allowed the service to replace conventional landline telephony reduced costs to subscribers. The hardware came in various configurations, including OBi100 (1 x FXS, to connect to one phone), OBi110 (1 FXS + 1 FXO, to connect to one phone and one conventional outside line), OBi200 (1 x FXS, 4x VoIP services, T.38, USB, [wi-fi, BT optional extra]) and OBi202 (2 FXS + LAN with T.38, USB, wi-fi o
https://en.wikipedia.org/wiki/Toric%20stack
In algebraic geometry, a toric stack is a stacky generalization of a toric variety. More precisely, a toric stack is obtained by replacing in the construction of a toric variety a step of taking GIT quotients with that of taking quotient stacks. Consequently, a toric variety is a coarse approximation of a toric stack. A toric orbifold is an example of a toric stack. See also Stanley–Reisner ring References Algebraic geometry
https://en.wikipedia.org/wiki/Calcium%20imaging
Calcium imaging is a microscopy technique to optically measure the calcium (Ca2+) status of an isolated cell, tissue or medium. Calcium imaging takes advantage of calcium indicators, fluorescent molecules that respond to the binding of Ca2+ ions by fluorescence properties. Two main classes of calcium indicators exist: chemical indicators and genetically encoded calcium indicators (GECI). This technique has allowed studies of calcium signalling in a wide variety of cell types. In neurons, electrical activity is always accompanied by an influx of Ca2+ ions. Thus, calcium imaging can be used to monitor the electrical activity in hundreds of neurons in cell culture or in living animals, which has made it possible to dissect the function of neuronal circuits. Chemical indicators Chemical indicators are small molecules that can chelate calcium ions. All these molecules are based on an EGTA homologue called BAPTA, with high selectivity for calcium (Ca2+) ions versus magnesium (Mg2+) ions. This group of indicators includes fura-2, indo-1, fluo-3, fluo-4, Calcium Green-1. These dyes are often used with the chelator carboxyl groups masked as acetoxymethyl esters, in order to render the molecule lipophilic and to allow easy entrance into the cell. Once this form of the indicator is in the cell, cellular esterases will free the carboxyl groups and the indicator will be able to bind calcium. The free acid form of the dyes (i.e. without the acetoxymethyl ester modification) can also be directly injected into cells via a microelectrode or micropipette which removes uncertainties as to the cellular compartment holding the dye (the acetoxymethyl ester can also enter the endoplasmic reticulum and mitochondria). Binding of a Ca2+ ion to a fluorescent indicator molecule leads to either an increase in quantum yield of fluorescence or emission/excitation wavelength shift. Individual chemical Ca2+ fluorescent indicators are utilized for cytosolic calcium measurements in a wide variet
https://en.wikipedia.org/wiki/Table%20of%20neurotransmitter%20actions%20in%20the%20ANS
Circulatory system Heart Blood vessels Other Respiratory system ✱ The bronchioles have no sympathetic innervation, but are instead affected by circulating adrenaline Visual system Digestive system Endocrine system Urinary system Reproductive system Integumentary system References Autonomic nervous system Biology-related lists
https://en.wikipedia.org/wiki/Cantonese%20salted%20fish
Cantonese salted fish (; also known as "salted fish, Chinese style") is a traditional Chinese food originating from Guangdong province. It is a fish preserved or cured with salt, and was a staple food in Guangdong. It historically earned the nickname of the "poor man's food", as its extreme saltiness is useful in adding variety to the simpler rice-based dinners. Cantonese salted fish was revealed to be on the list of Group 1 known carcinogens, but was suspected and studied for its links to cancer as early as the 1960s due to the high incidence of nasopharyngeal cancer, an extremely rare type of nose and head cancer now understood to be linked to a high consumption of this dish. History In the past, large cities like Guangzhou in southern China had large populations without access to any kind of food preservation. To overcome the rotting of room temperature meat, a number of methods became popular, such as canning and salting. The coastal Guangdong province, however, includes fish as a major food source. Thus food preservation efforts focused foremost on fish, and the eventual convergence of these techniques gave rise to the dish. The presence of common salt, sodium chloride, helps to preserve salted fish, through inhibition of bacterial growth. When the solution of salt, or brine, is more concentrated—specifically, has a lower water potential—than the fluid of the fish tissue, osmosis will occur. Water molecules will pass from the fish tissue (higher water potential) into the brine (lower water potential) until the water molecules in these two solutions are evenly distributed. This is known as a hypertonic environment. Most bacteria cannot survive in such an environment, as their cells shrink and normal biological function cannot continue, eventually terminating in lysis. This lends the antiseptic properties, and hence preservational power, of salt. Varieties A wide range of fish species can be prepared as Cantonese salted fish. The most common ones are Eleuther
https://en.wikipedia.org/wiki/Shield%20lichen
Shield lichen is the common name for lichens in either the genus Heterodermia or genus Parmelia. References Fungus common names Lichenology
https://en.wikipedia.org/wiki/Bucket%20chain%20excavator
A bucket chain excavator (BCE) is a piece of heavy equipment used in surface mining and dredging. BCEs use buckets on a revolving chain to remove large quantities of material. They are similar to bucket-wheel excavators and trenchers. Bucket chain excavators remove material from below their plane of movement, which is useful if the pit floor is unstable or underwater. History The first documented use of a bucket chain excavator was in 1859 by Alphonse Couvreux, a French entrepreneur. Several Couvreux BCEs were used in the construction of the Suez Canal. Overview A bucket chain excavator works similarly to a bucket wheel excavator, using a series of buckets to dig into the material before dumping it in the bucket chute and depositing it through a discharge boom. The primary difference is that the buckets are mounted on a flexible chain similarly to a chainsaw blade rather than on a rigid wheel. BCEs are used primarily to excavate material below the vehicle's superstructure while bucket wheel excavators focus primarily on excavating top soil overburden and/or resources. BCEs vary in range and size, although the majority of them are extremely large, with some capable of excavating 14,500 m3/h. The average BCE from Tenova Takraf for example, weighs around 1,150 tons and has a combined length of 58.5 meters, with a 23.5 meter long bucket ladder. The speed of the bucket chain is 1.22 m/s with a digging force of 1,170 kN/m2. BCEs such as the RK 5000 from the Czech Republic weigh up to 5,000 tons. Nevertheless, bucket chain excavators are usually smaller than bucket wheel excavators, dragline excavators or conveyor bridges due to the limitations of excavating materials below the base of the vehicle. Structure The superstructure of a bucket chain excavator is similar to that of a bucket wheel excavator. The primary component of bucket chain excavators is the bucket ladder and the bucket-chain. Unlike the buckets on a BWE, the buckets on the chain face downwards, a
https://en.wikipedia.org/wiki/Point%20of%20care%20medical%20information%20summary
Point of care medical information summaries are defined as "web-based medical compendia specifically designed to deliver predigested, rapidly accessible, comprehensive, periodically updated, and evidence-based information" to healthcare providers. Products BMJ Best Practice DynaMed UpToDate See also Clinical decision support system References Evidence-based medicine Medical databases Medical websites Online databases Health informatics
https://en.wikipedia.org/wiki/Rote%20Liste
The , full name , is a red list of threatened breeds of domestic animal published annually by the Gesellschaft zur Erhaltung alter und gefährdeter Haustierrassen, the German national association for the conservation of historic and endangered domestic animal breeds. History The GEH was founded in Witzenhausen, in Hesse, central Germany, in 1981. In 1987 it established the criteria on which the Rote Liste is based. The list is published annually, and attributes one of four categories of conservation risk to domestic breeds of cattle, dogs, goats, horses, pigs, rabbits and sheep, of chickens, ducks, geese and turkeys, and of bees; listing of domestic pigeon breeds is in preparation. Some breeds from outside Germany are listed separately. The four levels of risk are: I: , extremely endangered II: , seriously endangered III: , endangered , alert The risk level is calculated using a formula that takes into account five criteria: the number of breeding animals or breeding females; the percentage of pure-bred matings; the five-year trend in breed numbers; the number of breeders or herds; and the interval between generations of the animal. The GEH also publishes, in conjunction with the , the German national association of poultry breeders, a separate list of the historic poultry breeds and colour varieties that were raised in Germany before 1930. The same levels of conservation risk are assigned as in the main red list. Endangered breeds In 2014 the breeds listed were: Note See also Rare breed (agriculture) IUCN Red List References Agriculture in Germany Biodiversity Lists of animals by conservation status Sustainable agriculture Rare breed conservation
https://en.wikipedia.org/wiki/8chan
8kun, previously called 8chan, Infinitechan or Infinitychan (stylized as ∞chan), is an imageboard website composed of user-created message boards. An owner moderates each board, with minimal interaction from site administration. The site has been linked to white supremacism, neo-Nazism, the alt-right, racism and antisemitism, hate crimes, and multiple mass shootings. The site has been known to host child pornography; as a result, it was filtered out from Google Search in 2015. Several of the site's boards played an active role in the Gamergate harassment campaign, encouraging Gamergate affiliates to frequent 8chan after 4chan banned the topic. 8chan is the home of the discredited QAnon conspiracy theory. Shortly before the 2019 El Paso shooting, a four-page message justifying the attack was posted to the site, and police have stated that they are "reasonably confident" it was posted by the perpetrator. In the aftermath of the back-to-back mass shootings on August 3 in El Paso and August 4 in Dayton, Ohio, respectively, the site was taken off clearnet on August 5, 2019, when network infrastructure provider Cloudflare stopped providing their content delivery network (CDN) service. Voxility, a web services company that had been renting servers to Epik, the site's new domain registrar, as well as Epik's CDN provider subsidiary BitMitigate, also terminated service. After several attempts to return to clearnet were ultimately stymied by providers denying service to 8chan, the site returned to the clearnet as 8kun in November 2019 through a Russian hosting provider. History 8chan was created in October 2013 by computer programmer Fredrick Brennan. Brennan created the website after observing what he perceived to be rapidly escalating surveillance and a loss of free speech on the Internet. Brennan, who considered the imageboard 4chan to have grown into authoritarianism, described 8chan as a "free-speech-friendly" alternative, and originally conceptualized the site while e