source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Symantec%20Workspace%20Virtualization | Symantec Workspace Virtualization (abbreviated as SWV) is an application virtualization solution for Microsoft Windows by Symantec, now known as Symantec Endpoint Virtualization Suite (SEVS).
Originally pioneered by Altiris and based on technology acquired from FSLogic and named Software Virtualization Solution, SWV a... |
https://en.wikipedia.org/wiki/CDJ | A CDJ is a specialized digital music player for DJing. Originally designed to play music from compact discs, many CDJs can play digital music files stored on USB flash drives or SD cards. In typical use, at least two CDJs are plugged into a DJ mixer. CDJs have jog wheels and pitch faders that allow manipulation of the ... |
https://en.wikipedia.org/wiki/Impulse%20noise%20%28acoustics%29 | Impulse noise is a category of (acoustic) noise that includes unwanted, almost instantaneous (thus impulse-like) sharp sounds (like clicks and pops)—typically caused by electromagnetic interference, scratches on disks, gunfire, explosions, and synchronization issues in digital audio. High levels of such a noise (200+ d... |
https://en.wikipedia.org/wiki/Privilege%20revocation%20%28computing%29 | Privilege revocation is the act of an entity giving up some, or all of, the privileges they possess, or some authority taking those (privileged) rights away.
Information theory
Honoring the Principle of least privilege at a granularity provided by the base system such as sandboxing of (to that point successful) attac... |
https://en.wikipedia.org/wiki/Keith%20Diefendorff | Keith Diefendorff is a computer architect and veteran in the microprocessor industry.
Diefendorff is one of the persons that has led the industry in developing RISC processors, both for embedded systems and superscalar high performance systems. He is one of the main designers of the PowerPC family of processors.
Back... |
https://en.wikipedia.org/wiki/Archie%27s%20law | In petrophysics, Archie's law relates the in-situ electrical conductivity (C) of a porous rock to its porosity () and fluid saturation () of the pores:
Here, denotes the porosity, the electrical conductivity of the fluid saturated rock, represents the electrical conductivity of the aqueous solution (fluid or li... |
https://en.wikipedia.org/wiki/Ns%20%28simulator%29 | ns (from network simulator) is a name for a series of discrete event network simulators, specifically ns-1, ns-2, and ns-3. All are discrete-event computer network simulators, primarily used in research and teaching.
History
ns-1
The first version of ns, known as ns-1, was developed at Lawrence Berkeley National Lab... |
https://en.wikipedia.org/wiki/Lemur%20%28input%20device%29 | The Lemur was a highly customizable multi-touch device from French company JazzMutant founded by Yoann Gantch, Pascal Joguet, Guillaume Largillier and Julien Olivier in 2002, which served as a controller for musical devices such as synthesizers and mixing consoles, as well as for other media applications such as video ... |
https://en.wikipedia.org/wiki/GPU%20cluster | A GPU cluster is a computer cluster in which each node is equipped with a Graphics Processing Unit (GPU). By harnessing the computational power of modern GPUs via General-Purpose Computing on Graphics Processing Units (GPGPU), very fast calculations can be performed with a GPU cluster.
Hardware (GPU)
The hardware cl... |
https://en.wikipedia.org/wiki/Line-in%20recording | Line-in recording is a term often used by manufacturers of sound equipment to refer to the capability of a device to record line level audio feeds. Microphone and instrument inputs, by contrast, are designed for devices which require further amplification to be at line-level.
The common 3.5 mm line-in connector has ... |
https://en.wikipedia.org/wiki/Schottky%20group | In mathematics, a Schottky group is a special sort of Kleinian group, first studied by .
Definition
Fix some point p on the Riemann sphere. Each Jordan curve not passing through p divides the Riemann sphere into two pieces, and we call the piece containing p the "exterior" of the curve, and the other piece its "int... |
https://en.wikipedia.org/wiki/Bedlam%20cube | The Bedlam cube is a solid dissection puzzle invented by British puzzle expert Bruce Bedlam.
Design
The puzzle consists of thirteen polycubic pieces: twelve pentacubes and one tetracube. The objective is to assemble these pieces into a 4 x 4 x 4 cube. There are 19,186 distinct ways of doing so, up to rotations and r... |
https://en.wikipedia.org/wiki/Holding%20period%20return | In finance, holding period return (HPR) is the return on an asset or portfolio over the whole period during which it was held. It is one of the simplest and most important measures of investment performance.
HPR is the change in value of an investment, asset or portfolio over a particular period. It is the entire gain... |
https://en.wikipedia.org/wiki/Subclade | In genetics, a subclade is a subgroup of a haplogroup.
Naming convention
Although human mitochondrial DNA (mtDNA) and Y chromosome DNA (Y-DNA) haplogroups and subclades are named in a similar manner, their names belong to completely separate systems.
mtDNA
mtDNA haplogroups are defined by the presence of a series of ... |
https://en.wikipedia.org/wiki/IC%20programming | IC programming is the process of transferring a computer program into an integrated computer circuit. Older types of IC including PROMs and EPROMs and some early programmable logic was typically programmed through parallel busses that used many of the device's pins and basically required inserting the device in a sepa... |
https://en.wikipedia.org/wiki/Schwartz%E2%80%93Bruhat%20function | In mathematics, a Schwartz–Bruhat function, named after Laurent Schwartz and François Bruhat, is a complex valued function on a locally compact abelian group, such as the adeles, that generalizes a Schwartz function on a real vector space. A tempered distribution is defined as a continuous linear functional on the spac... |
https://en.wikipedia.org/wiki/Terrestrial%20animal | Terrestrial animals are animals that live predominantly or entirely on land (e.g. cats, chickens, ants, spiders), as compared with aquatic animals, which live predominantly or entirely in the water (e.g. fish, lobsters, octopuses), and amphibians, which rely on aquatic and terrestrial habitats (e.g. frogs and newts). S... |
https://en.wikipedia.org/wiki/Reservoir%20engineering | Reservoir engineering is a branch of petroleum engineering that applies scientific principles to the fluid flow through a porous medium during the development and production of oil and gas reservoirs so as to obtain a high economic recovery. The working tools of the reservoir engineer are subsurface geology, applied ma... |
https://en.wikipedia.org/wiki/Cytomics | Cytomics is the study of cell biology (cytology) and biochemistry in cellular systems at the single cell level. It combines all the bioinformatic knowledge to attempt to understand the molecular architecture and functionality of the cell system (Cytome). Much of this is achieved by using molecular and microscopic tech... |
https://en.wikipedia.org/wiki/DragonflyTV | DragonflyTV is an Emmy Award-winning science education television series produced by Twin Cities Public Television. The show aired on PBS Kids and PBS Kids Go! from January 19, 2002, to December 20, 2008. It was aimed at ages 9–12. Seasons 1–4 were co-hosted by Michael Brandon Battle and Mariko Nakasone. Seasons 5–7 we... |
https://en.wikipedia.org/wiki/Almen%20strip | An Almen strip is a thin strip of SAE 1070 steel used to quantify the intensity of a shot peening process.
Developed and patented by John O. Almen, the strip was originally supported by 2 knife edges; later improvements see it being supported on 4 small balls. The strip is placed in the chamber in place of the item to... |
https://en.wikipedia.org/wiki/Tap%20converter | The tap converter is a variation on the cycloconverter, invented in 1981 by New York City electrical engineer Melvin Sandler and significantly functionally enhanced in 1982 through 1984 by graduate students Mariusz Wrzesniewski, Bruce David Wilner, and Eddie Fung. Whereas the cycloconverter switches among a variety of ... |
https://en.wikipedia.org/wiki/C-Bus%20%28protocol%29 | C-Bus is a communications protocol based on a seven layer OSI model for home and building automation that can handle cable lengths up to 1000 metres using Cat-5 cable. It is used in Australia, New Zealand, Asia, the Middle East, Russia, United States, South Africa, the UK and other parts of Europe including Greece and... |
https://en.wikipedia.org/wiki/Passive%20radiator%20%28speaker%29 | A speaker enclosure using a passive radiator (PR) usually contains an "active loudspeaker" (or main driver), and a passive radiator (also known as a "drone cone"). The active loudspeaker is a normal driver, and the passive radiator is of similar construction, but without a voice coil and magnet assembly. It is not att... |
https://en.wikipedia.org/wiki/Ramanujan%27s%20sum | In number theory, Ramanujan's sum, usually denoted cq(n), is a function of two positive integer variables q and n defined by the formula
where (a, q) = 1 means that a only takes on values coprime to q.
Srinivasa Ramanujan mentioned the sums in a 1918 paper. In addition to the expansions discussed in this article, ... |
https://en.wikipedia.org/wiki/Vesicular%20transport%20adaptor%20protein | Vesicular transport adaptor proteins are proteins involved in forming complexes that function in the trafficking of molecules from one subcellular location to another. These complexes concentrate the correct cargo molecules in vesicles that bud or extrude off of one organelle and travel to another location, where the c... |
https://en.wikipedia.org/wiki/881%20%28number%29 | 881 (eight hundred [and] eighty-one) is the natural number following 880 and preceding 882.
881 is:
a prime number
a Paid Toll Free telephone number prefix in the USA
the Port of Los Angeles Long Wharf, California State Historic Landmark #881
In astronomy, NGC 881 is an Sc type galaxy in the constellation Cetus.
... |
https://en.wikipedia.org/wiki/Launch%20Vehicle%20Digital%20Computer | The Launch Vehicle Digital Computer (LVDC) was a computer that provided the autopilot for the Saturn V rocket from launch to Earth orbit insertion. Designed and manufactured by IBM's Electronics Systems Center in Owego, New York, it was one of the major components of the Instrument Unit, fitted to the S-IVB stage of th... |
https://en.wikipedia.org/wiki/SimGear | SimGear is a group of libraries, which provide capabilities useful for simulations, visualizations, and even games building.
SimGear is a relatively new project, and while quite a bit of code has been written in conjunction with the FlightGear project, the final interface and arrangements are still evolving.
All the... |
https://en.wikipedia.org/wiki/Perfboard | Perfboard is a material for prototyping electronic circuits. It is a thin, rigid sheet with holes pre-drilled at standard intervals across a grid, usually a square grid of spacing. These holes are ringed by round or square copper pads, though bare boards are also available. Inexpensive perfboard may have pads on only ... |
https://en.wikipedia.org/wiki/Howard%20Johnson%20%28electrical%20engineer%29 | Howard Johnson is an electrical engineer, known for his consulting work and commonly referenced books on the topic of signal integrity, especially for high speed electronic circuit design. He served as the chief technical editor for Fast Ethernet and Gigabit Ethernet standardisation, and was recognized by the IEEE as a... |
https://en.wikipedia.org/wiki/Optiarc | Optiarc is a brand of optical disc drives and solid-state drives. It is owned by a US-based Vinpower Digital, Inc.
Initially Optiarc was established on April 3, 2006 as a joint venture between Sony (55% shares) and NEC (45% shares). The company, named Sony NEC Optiarc, focused on manufacturing optical disk drives prim... |
https://en.wikipedia.org/wiki/Nallatech | Nallatech is a computer hardware and software firm based in Camarillo, California, United States.
The company specializes in field-programmable gate array (FPGA) integrated circuit technology applied in computing. As of 2007 the company's primary markets include defense and high-performance computing. Nallatech was ac... |
https://en.wikipedia.org/wiki/Party%20line%20%28telephony%29 | A party line (multiparty line, shared service line, party wire) is a local loop telephone circuit that is shared by multiple telephone service subscribers.
Party line systems were widely used to provide telephone service, starting with the first commercial switchboards in 1878. A majority of Bell System subscribers in... |
https://en.wikipedia.org/wiki/Claude%20Berge | Claude Jacques Berge (5 June 1926 – 30 June 2002) was a French mathematician, recognized as one of the modern founders of combinatorics and graph theory.
Biography and professional history
Claude Berge's parents were André Berge and Geneviève Fourcade. André Berge (1902–1995) was a physician and psychoanalyst who, in ... |
https://en.wikipedia.org/wiki/Sensitivity%20index | The sensitivity index or discriminability index or detectability index is a dimensionless statistic used in signal detection theory. A higher index indicates that the signal can be more readily detected.
Definition
The discriminability index is the separation between the means of two distributions (typically the signa... |
https://en.wikipedia.org/wiki/SoftEther%20Corporation | SoftEther Corporation is a Japanese software company. It was founded as an industry-academia-government venture in April 2004 by University of Tsukuba students, with the goal to develop the software of the same name, SoftEther VPN. The name indicated that a software emulates an Ethernet.
Related software
SoftEther
Th... |
https://en.wikipedia.org/wiki/Row%20equivalence | In linear algebra, two matrices are row equivalent if one can be changed to the other by a sequence of elementary row operations. Alternatively, two m × n matrices are row equivalent if and only if they have the same row space. The concept is most commonly applied to matrices that represent systems of linear equation... |
https://en.wikipedia.org/wiki/Elementary%20matrix | In mathematics, an elementary matrix is a matrix which differs from the identity matrix by one single elementary row operation. The elementary matrices generate the general linear group when is a field. Left multiplication (pre-multiplication) by an elementary matrix represents elementary row operations, while right ... |
https://en.wikipedia.org/wiki/Sub-loop%20unbundling | In the telephony business, sub-loop unbundling (SLU) is a type of unbundled access whereby a sub-section of the local loop is unbundled. In practice this often means the competitor placing a small street cabinet with a DSLAM, next to a telco local copper aggregation cabinet or serving area interface and using a 'tie ca... |
https://en.wikipedia.org/wiki/Genealogical%20numbering%20systems | Several genealogical numbering systems have been widely adopted for presenting family trees and pedigree charts in text format.
Ascending numbering systems
Ahnentafel
Ahnentafel, also known as the Eytzinger Method, Sosa Method, and Sosa-Stradonitz Method, allows for the numbering of ancestors beginning with a descen... |
https://en.wikipedia.org/wiki/Elasticity%20of%20a%20function | In mathematics, the elasticity or point elasticity of a positive differentiable function f of a positive variable (positive input, positive output) at point a is defined as
or equivalently
It is thus the ratio of the relative (percentage) change in the function's output with respect to the relative change in its inp... |
https://en.wikipedia.org/wiki/Charlieplexing | Charlieplexing (also known as tristate multiplexing, reduced pin-count LED multiplexing, complementary LED drive and crossplexing) is a technique for driving a multiplexed display, keypad or touchscreen, in which relatively few I/O wires from a microcontroller are woven in a diagonally-intersecting pattern to access a ... |
https://en.wikipedia.org/wiki/Microtek | Microtek International Inc. () is a Taiwan-based multinational manufacturer of digital imaging products and other consumer electronics. It produces imaging equipment for medical, biological and industrial fields. It occupies 20 percent of the global imaging market and holds 450 patents worldwide.
It is known for its s... |
https://en.wikipedia.org/wiki/Hardware%20bug | A hardware bug is a defect in the design, manufacture, or operation of computer hardware that causes incorrect operation. It is the counterpart of software bugs which refer to flaws in the code which operates computers, and is the original context in which "bug" was used to refer to such flaws. Intermediate between har... |
https://en.wikipedia.org/wiki/Electronic%20discovery | Electronic discovery (also ediscovery or e-discovery) refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format (often referred to as electronically stored information or ESI). Electronic discovery... |
https://en.wikipedia.org/wiki/Toxic%20food%20environment | A food environment is the "physical presence of food that affects a person’s diet, a person’s proximity to food store locations, the distribution of food stores, food service, and any physical entity by which food may be obtained, or a connected system that allows access to food".
The term toxic food environment was c... |
https://en.wikipedia.org/wiki/Poset%20topology | In mathematics, the poset topology associated to a poset (S, ≤) is the Alexandrov topology (open sets are upper sets) on the poset of finite chains of (S, ≤), ordered by inclusion.
Let V be a set of vertices. An abstract simplicial complex Δ is a set of finite sets of vertices, known as faces , such that
Given a sim... |
https://en.wikipedia.org/wiki/Critical%20security%20parameter | In cryptography, a critical security parameter (CSP) is information that is either user or system defined and is used to operate a cryptography module in processing encryption functions including cryptographic keys and authentication data, such as passwords, the disclosure or modification of which can compromise the se... |
https://en.wikipedia.org/wiki/Core%20Multiplexing%20Technology | Core Multiplexing Technology is a term that appeared in some BIOSes.
Details
A subset of traditional applications are often difficult to parallelize and make use of additional CPU hardware available on the platform, restraining applications to use only one CPU. Core Multiplexing Technology would allow for a process to... |
https://en.wikipedia.org/wiki/Chemical%20computer | A chemical computer, also called a reaction-diffusion computer, Belousov–Zhabotinsky (BZ) computer, or gooware computer, is an unconventional computer based on a semi-solid chemical "soup" where data are represented by varying concentrations of chemicals. The computations are performed by naturally occurring chemical r... |
https://en.wikipedia.org/wiki/ODVA%20%28company%29 | ODVA, Inc. (formerly Open DeviceNet Vendors Association, Inc.) was founded in 1995 and is a global trade and standard development organization whose members are suppliers of devices for industrial automation applications. To qualify for membership in ODVA, applicants must be an entity that makes and sells products usin... |
https://en.wikipedia.org/wiki/Ax%E2%80%93Kochen%20theorem | The Ax–Kochen theorem, named for James Ax and Simon B. Kochen, states that for each positive integer d there is a finite set Yd of prime numbers, such that if p is any prime not in Yd then every homogeneous polynomial of degree d over the p-adic numbers in at least d2 + 1 variables has a nontrivial zero.
The proof of ... |
https://en.wikipedia.org/wiki/Google%20Account | A Google Account is a user account that is required for access, authentication and authorization to certain online Google services. It is also often used as single sign-on for third party services.
Usage
A Google Account is required for Gmail, Google Hangouts, Google Meet and Blogger. Some Google products do not requi... |
https://en.wikipedia.org/wiki/CYP17A1 | Cytochrome P450 17A1 (steroid 17α-monooxygenase, 17α-hydroxylase, 17-alpha-hydroxylase, 17,20-lyase, 17,20-desmolase) is an enzyme of the hydroxylase type that in humans is encoded by the CYP17A1 gene on chromosome 10. It is ubiquitously expressed in many tissues and cell types, including the zona reticularis and zona ... |
https://en.wikipedia.org/wiki/Evolution%20of%20ageing | Enquiry into the evolution of ageing, or aging, aims to explain why a detrimental process such as ageing would evolve, and why there is so much variability in the lifespans of organisms. The classical theories of evolution (mutation accumulation, antagonistic pleiotropy, and disposable soma) suggest that environmental ... |
https://en.wikipedia.org/wiki/Society%20of%20Tribologists%20and%20Lubrication%20Engineers | The Society of Tribologists and Lubrication Engineers (STLE) is an American non-profit technical society for the tribology and lubrication engineering sectors worldwide. Its offices are in Park Ridge, Illinois.
Established in 1944 as the American Society of Lubrication Engineers (ASLE), the STLE is now one of the worl... |
https://en.wikipedia.org/wiki/Instruction%20unit | The instruction unit (I-unit or IU), also called, e.g., instruction fetch unit (IFU), instruction issue unit (IIU), instruction sequencing unit (ISU), in a central processing unit (CPU) is responsible for organizing program instructions to be fetched from memory, and executed, in an appropriate order, and for forwardin... |
https://en.wikipedia.org/wiki/Tetraspanin | Tetraspanins are a family of membrane proteins found in all multicellular eukaryotes also referred to as the transmembrane 4 superfamily (TM4SF) proteins. These proteins have four transmembrane alpha-helices and two extracellular domains, one short (called the small extracellular domain or loop, SED/SEL or EC1) and one... |
https://en.wikipedia.org/wiki/Soft-body%20dynamics | Soft-body dynamics is a field of computer graphics that focuses on visually realistic physical simulations of the motion and properties of deformable objects (or soft bodies). The applications are mostly in video games and films. Unlike in simulation of rigid bodies, the shape of soft bodies can change, meaning that th... |
https://en.wikipedia.org/wiki/Sextic%20equation | In algebra, a sextic (or hexic) polynomial is a polynomial of degree six.
A sextic equation is a polynomial equation of degree six—that is, an equation whose left hand side is a sextic polynomial and whose right hand side is zero. More precisely, it has the form:
where and the coefficients may be integers, rational... |
https://en.wikipedia.org/wiki/Index%20of%20topics%20related%20to%20life%20extension | Following is a list of topics related to life extension:
A
ACE inhibitor
Actuarial escape velocity
Adenosine triphosphate (ATP)
Advanced Cell Technology Corporation
Aerobic exercise
Age-adjusted life expectancy
Ageless
Age-Related Eye Disease Study
Age-Related Macular Degeneration
Aging
Aging and memory
... |
https://en.wikipedia.org/wiki/Apache%20Hadoop | Apache Hadoop () is a collection of open-source software utilities that facilitates using a network of many computers to solve problems involving massive amounts of data and computation. It provides a software framework for distributed storage and processing of big data using the MapReduce programming model. Hadoop was... |
https://en.wikipedia.org/wiki/Protocol-based%20intrusion%20detection%20system | A protocol-based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring and analysis of the protocol in use by the computing system. A PIDS will monitor the dynamic behavior and state of the protocol and will typically consist of a... |
https://en.wikipedia.org/wiki/Crooks%20fluctuation%20theorem | The Crooks fluctuation theorem (CFT), sometimes known as the Crooks equation, is an equation in statistical mechanics that relates the work done on a system during a non-equilibrium transformation to the free energy difference between the final and the initial state of the transformation. During the non-equilibrium tra... |
https://en.wikipedia.org/wiki/Application%20protocol-based%20intrusion%20detection%20system | An application protocol-based intrusion detection system (APIDS) is an intrusion detection system that focuses its monitoring and analysis on a specific application protocol or protocols in use by the computing system.
Overview
An APIDS will monitor the dynamic behavior and state of the protocol and will typically co... |
https://en.wikipedia.org/wiki/Compressed%20file%20library |
A compressed file library (CFL) is designed to work as a virtual file system for programs, especially for video games. By compressing various game resources into one file, it is able to lower the number of file accesses. The resources can also be encrypted in the CFL.
CFL is used by X-Forge, the multi-platform wire... |
https://en.wikipedia.org/wiki/Attack%20surface | The attack surface of a software environment is the sum of the different points (for "attack vectors") where an unauthorized user (the "attacker") can try to enter data to, extract data, control a device or critical software in an environment. Keeping the attack surface as small as possible is a basic security measure.... |
https://en.wikipedia.org/wiki/Open%20Archival%20Information%20System | An Open Archival Information System (or OAIS) is an archive, consisting of an organization of people and systems, that has accepted the responsibility to preserve information and make it available for a Designated Community. The OAIS model can be applied to various archives, e.g., open access, closed, restricted, "dar... |
https://en.wikipedia.org/wiki/Unicode%20symbol | In computing, a Unicode symbol is a Unicode character which is not part of a script used to write a natural language, but is nonetheless available for use as part of a text.
Many of the symbols are drawn from existing character sets or ISO/IEC or other national and international standards. The Unicode Standard states ... |
https://en.wikipedia.org/wiki/Mathematical%20operators%20and%20symbols%20in%20Unicode | The Unicode Standard encodes almost all standard characters used in mathematics.
Unicode Technical Report #25 provides comprehensive information about the character repertoire, their properties, and guidelines for implementation.
Mathematical operators and symbols are in multiple Unicode blocks. Some of these blocks a... |
https://en.wikipedia.org/wiki/Human%20artificial%20chromosome | A human artificial chromosome (HAC) is a microchromosome that can act as a new chromosome in a population of human cells. That is, instead of 46 chromosomes, the cell could have 47 with the 47th being very small, roughly 6–10megabases (Mb) in size instead of 50–250Mb for natural chromosomes, and able to carry new genes... |
https://en.wikipedia.org/wiki/Twinkle%20%28software%29 | Twinkle is a free and open-source application for voice communications over Voice over IP (VoIP) protocol.
Architecture
It is designed for Linux operating systems and uses the Qt toolkit for its graphical user interface. For call signaling it employs the Session Initiation Protocol (SIP). It also features direct IP-to... |
https://en.wikipedia.org/wiki/Subcellular%20localization | The cells of eukaryotic organisms are elaborately subdivided into functionally-distinct membrane-bound compartments. Some major constituents of eukaryotic cells are: extracellular space, plasma membrane, cytoplasm, nucleus, mitochondria, Golgi apparatus, endoplasmic reticulum (ER), peroxisome, vacuoles, cytoskeleton, n... |
https://en.wikipedia.org/wiki/List%20of%20macronutrients | This list is a categorization of the most common food components based on their macronutrients. Macronutrients can refer to the chemical substances that humans consume in the largest quantities (See Nutrient)
Macronutrients that provide energy
There are three principal classes of macronutrients: carbohydrate, protein,... |
https://en.wikipedia.org/wiki/List%20of%20micronutrients | Micronutrients are nutrients such as vitamins and minerals required by organisms in varying quantities throughout life to orchestrate a range of physiological functions to maintain health.
The following is a list of micronutrients.
Minerals
Calcium
Sulfur
Phosphorus
Magnesium
Sodium
Potassium
Iron
Zinc
Trac... |
https://en.wikipedia.org/wiki/Extracellular%20space | Extracellular space refers to the part of a multicellular organism outside the cells, usually taken to be outside the plasma membranes, and occupied by fluid. This is distinguished from intracellular space, which is inside the cells.
The composition of the extracellular space includes metabolites, ions, proteins, and ... |
https://en.wikipedia.org/wiki/PBIST | Programmable Built-In Self-Test (PBIST) is a memory DFT feature that incorporates all the required test systems into the chip itself. The test systems implemented on-chip are as follows:
algorithmic address generator
algorithmic data generator
program storage unit
loop control mechanisms
PBIST was originally adopte... |
https://en.wikipedia.org/wiki/PikeOS | PikeOS is a commercial, hard real-time operating system (RTOS) that offers a separation kernel based hypervisor with multiple logical partition types for many other operating systems (OS), each called a GuestOS, and applications. It enables users to build certifiable smart devices for the Internet of things (IoT) accor... |
https://en.wikipedia.org/wiki/Office%20of%20the%20Chief%20Actuary | The Office of the Chief Actuary is a government agency that has responsibility for actuarial estimates regarding social welfare programs. In Canada, the Office of the Chief Actuary works with the Canada Pension Plan and the Old Age Security Program. In the United States, the Social Security Administration has an Office... |
https://en.wikipedia.org/wiki/CDC%20Kronos | Kronos is an operating system with time-sharing capabilities, written by Control Data Corporation in 1971. Kronos ran on the 60-bit CDC 6000 series mainframe computers and their successors. CDC replaced Kronos with the NOS operating system in the late 1970s, which were succeeded by the NOS/VE operating system in the ... |
https://en.wikipedia.org/wiki/Degree%20of%20a%20polynomial | In mathematics, the degree of a polynomial is the highest of the degrees of the polynomial's monomials (individual terms) with non-zero coefficients. The degree of a term is the sum of the exponents of the variables that appear in it, and thus is a non-negative integer. For a univariate polynomial, the degree of the po... |
https://en.wikipedia.org/wiki/277%20%28number%29 | 277 (two hundred [and] seventy-seven) is the natural number following 276 and preceding 278.
Mathematical properties
277 is the 59th prime number, and is a regular prime.
It is the smallest prime p such that the sum of the inverses of the primes up to p is greater than two.
Since 59 is itself prime, 277 is a super-pri... |
https://en.wikipedia.org/wiki/Drago%20Kolar | Professor Drago Kolar (1932–2000) was a head of the Ceramics Department at the Jozef Stefan Institute (Ljubljana, Slovenia) from 1965 until 1997.
Kolar was one of the world leading scientists in the field of ceramic materials. His main scientific interest was in sintering mechanisms and microstructure development in c... |
https://en.wikipedia.org/wiki/List%20of%20wireless%20community%20networks%20by%20region | Megasurf wireless internet os covering the area.
Africa
DRC
Mesh Bukavu
Pamoja Net
Ghana
Akwapim Community Wireless Network
Somalia
Abaarso
South Africa
Rural Telehealth
Orange Farm:
Zenzeleni:
Home of Compassion
Tanzania
Sengerema Wireless Community Network
Kenya
TunapandaNET Community Network
Tunisi... |
https://en.wikipedia.org/wiki/Not%20Just%20Another%20Bogus%20List | Not Just Another Bogus List (NJABL) was a DNS blacklist.
NJABL maintained a list of known and potential spam sources (open mail relays, open proxies, open form to mail HTTP gateways, dynamic IP pools, and direct spammers) for the purpose of being able to tag or refuse e-mail and thereby block spam from certain sources... |
https://en.wikipedia.org/wiki/Composite%20Blocking%20List | In computer networking, the Composite Blocking List (CBL) is a DNS-based Blackhole List of suspected E-mail spam sending computer infections.
Overview
The CBL takes its source data from very large spamtraps/mail infrastructures, and only lists IPs exhibiting characteristics such as:
Open proxies of various sorts (HTT... |
https://en.wikipedia.org/wiki/International%20Software%20Testing%20Qualifications%20Board | The International Software Testing Qualifications Board (ISTQB) is a software testing certification board that operates internationally. Founded in Edinburgh in November 2002, the ISTQB is a non-profit association legally registered in Belgium.
ISTQB Certified Tester is a standardized qualification for software tester... |
https://en.wikipedia.org/wiki/Virus%20hoax | A computer virus hoax is a message warning the recipients of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipients to forward it to everyone they know, but it can also be in the form of a pop-up window.
Identification
Most hoaxes are sensational in nature and easily iden... |
https://en.wikipedia.org/wiki/Pendulum%20%28mechanics%29 | A pendulum is a body suspended from a fixed support so that it swings freely back and forth under the influence of gravity. When a pendulum is displaced sideways from its resting, equilibrium position, it is subject to a restoring force due to gravity that will accelerate it back toward the equilibrium position. When r... |
https://en.wikipedia.org/wiki/Waffle%20%28BBS%20software%29 | Waffle is a bulletin-board system created by Tom Dell for the Dark Side of the Moon BBS which ran under DOS and later UNIX. The software was unique among DOS BBS software in many ways, including the fact that all of the configuration files were in readable text files, and that it fully supported Usenet and UUCP on the... |
https://en.wikipedia.org/wiki/Landscape%20epidemiology | Landscape epidemiology draws some of its roots from the field of landscape ecology. Just as the discipline of landscape ecology is concerned with analyzing both pattern and process in ecosystems across time and space, landscape epidemiology can be used to analyze both risk patterns and environmental risk factors. This... |
https://en.wikipedia.org/wiki/Secure%20Network | Secure Network is a small offensive security and security research company focusing on Information Security based in Milano, Italy. Besides having notability in Italy, it received international exposure with a research project on Bluetooth security (co-sponsored by F-Secure) codenamed BlueBag, which has been also selec... |
https://en.wikipedia.org/wiki/Curing%20salt | Curing salt is used in meat processing to generate a pinkish shade and to extend shelf life. It is both a color agent and a means to facilitate food preservation as it prevents or slows spoilage by bacteria or fungus. Curing salts are generally a mixture of sodium chloride (table salt) and sodium nitrite, and are used ... |
https://en.wikipedia.org/wiki/Taxonomic%20sequence | Taxonomic sequence (also known as systematic, phyletic or taxonomic order) is a sequence followed in listing of taxa which aids ease of use and roughly reflects the evolutionary relationships among the taxa. Taxonomic sequences can exist for taxa within any rank, that is, a list of families, genera, species can each ha... |
https://en.wikipedia.org/wiki/Regular%20number | Regular numbers are numbers that evenly divide powers of 60 (or, equivalently, powers of 30). Equivalently, they are the numbers whose only prime divisors are 2, 3, and 5. As an example, 602 = 3600 = 48 × 75, so as divisors of a power of 60 both 48 and 75 are regular.
These numbers arise in several areas of mathemati... |
https://en.wikipedia.org/wiki/Divisor%20summatory%20function | In number theory, the divisor summatory function is a function that is a sum over the divisor function. It frequently occurs in the study of the asymptotic behaviour of the Riemann zeta function. The various studies of the behaviour of the divisor function are sometimes called divisor problems.
Definition
The divisor ... |
https://en.wikipedia.org/wiki/D-Grid | The D-Grid Initiative (German Grid Initiative) was a government project to fund computer infrastructure for education and research (e-Science) in Germany. It uses the term grid computing.
D-Grid started September 1, 2005 with six community projects and an integration project (DGI) as well as several partner projects.
... |
https://en.wikipedia.org/wiki/AX%20architecture | AX (Architecture eXtended) was a Japanese computing initiative starting in around 1986 to allow PCs to handle double-byte (DBCS) Japanese text via special hardware chips, whilst allowing compatibility with software written for foreign IBM PCs.
History
The idea was conceived by Kazuhiko Nishi before he resigned his po... |
https://en.wikipedia.org/wiki/National%20Centre%20for%20Food%20Manufacturing | The National Centre for Food Manufacturing (NCFM) is the food science campus of the University of Lincoln, situated on Park Road at Holbeach in the south of the county of Lincolnshire. It offers part-time apprenticeships and distance learning degrees for individuals working in the food industry.
Apprenticeships, Degre... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.