source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Vijay%20Vaishnavi
Vijay Kumar Vaishnavi is a noted researcher and scholar in the computer information systems field with contributions mainly in the areas of design science research, software engineering, and data structures & algorithms, authoring over 150 publications including seven books in these and related areas, and co-owning a patent. He is currently Professor Emeritus at the Department of Computer Information Systems, Georgia State University. He is Senior Editor Emeritus of MIS Quarterly and is on the editorial boards of a number of other major journals. His research has been funded by the National Science Foundation (NSF) (through multiple multi-year research grants) as well as by the industry. Education After his early education at National High School, Srinagar, Vaishnavi completed his matriculation at Model Academy, Jammu in 1962 and pre-university course at GM Science College, Jammu, in 1963. He completed his B.E. degree in electrical engineering in 1968 from Regional Engineering College, Srinagar (currently National Institute of Technology, Srinagar). He completed his M.Tech. degree in electrical engineering with major in computer science in 1971, (thesis advisor: Hari V. Sahasrabudhe) and Ph.D. degree in 1975 (dissertation advisor: Sanat K. Basu), both from the Indian Institute of Technology Kanpur. He did his postdoctoral work in computer science with Derick Wood at McMaster University, 1977–79. Professional career Vaishnavi has mainly been on the faculty of Georgia State University and has also held faculty positions at a number of other universities in India, Canada, and the US such as Birla Institute of Technology and Science, Pilani (where he started his career); Indian Institute of Technology Kanpur; Concordia University; and Ohio University. He has conducted the bulk of his research and scholarly work at the Computer Information Systems (CIS) department of Georgia State University; he joined the department as an associate professor in 1981 and became a ful
https://en.wikipedia.org/wiki/Boston%20Society%20of%20Civil%20Engineers
The Boston Society of Civil Engineers, now the Boston Society of Civil Engineers Section of the American Society of Civil Engineers was established in 1848. It claims to be the oldest engineering society in the United States by four years, and has over 4,000 members. According to the ASCE 150th anniversary publication in 2002, the BSCE founding members, including James Laurie met at the U.S. Hotel in Boston on April 26, 1848, four years before the founding of the ASCEA. Laurie became the first president if the ASCEA (which originally included Architects in its name) in 1852. From 1855 - 57, when the American Institute of Architects was formed out of the ASCEA, and until 1867, that organization did little. In 1867, the ASCEA found its five shares of the New York Central Railroad on which enough dividends had accrued and went back into business. References External links American Society of Civil Engineers Engineering societies based in the United States Organizations based in Boston
https://en.wikipedia.org/wiki/Failure%20domain
In computing, a failure domain encompasses a physical or logical section of the computing environment that is negatively affected when a critical device or service experiences problems. To put it another way, failure domains are regions or components of infrastructure that could fail. Each has its own risks and challenges to architect for. The size of a failure domain and its potential impact depends on the device or service that is malfunctioning. For example, a router potentially experiencing problems would generally create a more significant failure domain than a network switch would. Smaller failure domains reduce the risk of disruption over a large section of a network, and eases the troubleshooting process. Redundancy within failure domains is a key approach to help mitigate the risks of failure. For example, technologies like RAID helps mitigate the risks of drive failure by creating multiple data copies. Replication helps to mitigate the risks of server or storage array failure. See also Fault tolerance References Network architecture
https://en.wikipedia.org/wiki/NIST%20Special%20Publication%20800-92
NIST Special Publication 800-92, "Guide to Computer Security Log Management", establishes guidelines and recommendations for securing and managing sensitive log data. The publication was prepared by Karen Kent and Murugiah Souppaya of the National Institute of Science and Technology and published under the SP 800-Series; a repository of best practices for the InfoSec community. Log management is essential to ensuring that computer security records are stored in sufficient detail for an appropriate period of time. Background Effective security event logging and log analysis is a critical component of any comprehensive security program within an organization. It is used to monitor system, network and application activity. It serves as a deterrent for unauthorized activity, as well as provides a means to detect and analyze an attack in order to allow the organization to mitigate or prevent similar attacks in the future. However, security professionals have a significant challenge to determine what events must be logged, where and how long to retain those logs, and how to analyze the enormous amount of information that can be generated. A deficiency in any of these areas can cause an organization to miss signs of unauthorized activity, intrusion, and loss of data, which creates additional risk. Scope NIST SP 800-92 provides a high-level overview and guidance for the planning, development and implementation of an effective security log management strategy. The intended audience for this publication include the general information security (InfoSec) community involved in incident response, system/application/network administration and managers. NIST SP 800-92 defines a log management infrastructure as having 4 major functions: General - log parsing, event filtering and event aggregation; Log Storage - rotation, archival, compression, reduction, normalization, integrity checking; Log Analysis - event correlation, viewing and reporting; Disposal - clearing;
https://en.wikipedia.org/wiki/Robert%20C.%20Martin
Robert Cecil Martin (born 5 December 1952), colloquially called "Uncle Bob", is an American software engineer, instructor, and author. He is most recognized for promoting many software design principles and for being an author and signatory of the influential Agile Manifesto. Martin has authored many books and magazine articles. He was the editor-in-chief of C++ Report magazine and served as the first chairman of the Agile Alliance. Companies In 1991, Martin founded Object Mentor, now defunct, which provided instructor-led training on the extreme programming methodology. , he operated two companies: Uncle Bob Consulting – provides consulting and training services Clean Coders – which provides training videos Software principles and advocacy Martin is a proponent of software craftsmanship, agile software development, and test-driven development. He is credited with coining the SOLID mnemonic, a collection of software principles including "Single Responsibility Principle", "Open-Closed Principle" (invented by Bertrand Meyer.), "Liskov Substitution Principle" (invented by Barbara Liskov,), "Interface Segregation Principle", and "Dependency Inversion Principle". Publications 1995. Designing Object-Oriented C++ Applications Using the Booch Method. Prentice Hall. . 2002. Agile Software Development, Principles, Patterns, and Practices. Pearson. . 2009. Clean Code: A Handbook of Agile Software Craftsmanship. Prentice Hall. . 2011. The Clean Coder: A Code Of Conduct For Professional Programmers. Prentice Hall. . 2017. Clean Architecture: A Craftsman's Guide to Software Structure and Design. Prentice Hall. . 2019. Clean Agile: Back to Basics. Prentice Hall. . 2021. Clean Craftsmanship: Disciplines, Standards, and Ethics. Addison-Wesley Professional. References Living people American software engineers 1952 births Agile software development Software design patterns
https://en.wikipedia.org/wiki/Sca-1
Sca-1 stands for "Stem cells antigen-1" (official gene symbol: Ly6a). It consist of 18-kDa mouse glycosyl phosphatidylinositol-anchored cell surface protein (GPI-AP) of the LY6 gene family. It is the common biological marker used to identify hematopoitic stem cell (HSC) along with other markers. Application of Sca-1 Sca-1 has a regenerative role in cardiac repair: Host cells with specific Sca-1+CD31− markers arise upon myocardial infarction, with evidence of expression of Sca-1 protein. Sca-1 plays a role in hematopoietic progenitor/stem cell lineage fate and c-kit expression. References Biological techniques and tools Genes Human proteins
https://en.wikipedia.org/wiki/Aging%20and%20society
Aging has a significant impact on society. People of different ages and gender tend to differ in many aspects, such as legal and social responsibilities, outlooks on life, and self-perceptions. Young people tend to have fewer legal privileges (if they are below the age of majority), they are more likely to push for political and social change, to develop and adopt new technologies, and to need education. Older people have different requirements from society and government, and frequently have differing values as well, such as for property and pension rights. Older people are also more likely to vote, and in many countries the young are forbidden from voting. Thus, the aged have comparatively more, or at least different, political influence. In different societies, age may be viewed or treated differently. For example, age may be measured starting from conception or from birth, and starting at either age zero or age one. Transitions such as reaching puberty, age of majority, or retirement are often socially significant. The concepts of successful aging and healthy aging refer to both social and physical aspects of the aging process. Cultural variations Arbitrary divisions set to mark periods of life may include: juvenile (via infancy, childhood, preadolescence, adolescence), early adulthood, middle adulthood, and late adulthood. More casual terms may include "teenagers", "tweens", "twentysomething", "thirtysomething", etc. as well as "vicenarian", "tricenarian", "quadragenarian", etc. The age of an adult human is commonly measured in whole years since the day of birth. Fractional years, months or even weeks may be used to describe the age of children and infants for finer resolution. The time of day the birth occurred is not commonly considered. In some cultures, there are other ways to express age. For example, some cultures measure age by counting years including the current year, while others count years without including it. It could be said for the same per
https://en.wikipedia.org/wiki/Mesopredator
A Mesopredator is a predator that occupies a mid-ranking trophic level in a food web. There is no standard definition of a mesopredator, but mesopredators are usually medium-sized carnivorous or omnivorous animals, such as raccoons, foxes, or coyotes. They are often defined by contrast from apex predators or prey in a particular food web. Mesopredators typically prey on smaller animals. Mesopredators vary across different ecosystems. Sometimes, the same species is a mesopredator in one ecosystem and an apex predator in another ecosystem, depending on the composition of that ecosystem. When new species are introduced into an ecosystem, the role of the mesopredator often changes; this can also happen if species are removed. The Mesopredator Release Effect When populations of an apex predator decrease, populations of mesopredators in the area often increase due to decreased competition and conflict with the apex predator. This is known as the mesopredator release effect, which refers to the release of mesopredators from the trophic cascade. These mesopredator outbreaks can lead to declining prey populations, destabilize ecological communities, reduce biodiversity, and can even drive local extinctions. Typically, mesopredators are in competition with apex predators for food and other resources. Apex predators reduce mesopredator populations and change mesopredator behaviors and habitat choices by preying on and intimidating mesopredators. When apex predator populations decline, mesopredators can access hunting and den areas once controlled by the apex predators, essentially assuming the role of an apex predator. However, mesopredators often occupy different ecological niches than the former apex predator and will have different effects on the structure and stability of the ecosystem. Mesopredator outbreaks are becoming more common in fragmented habitats, which are areas where a species' preferred environment is broken up by obstacles. Fragmented habitats can be
https://en.wikipedia.org/wiki/Electro%20sinter%20forging
Electro sinter forging (ESF) is an industrial single electromagnetic pulse sintering technique to rapidly produce a wide range of small components in metals, alloys, intermetallics, semiconductors, and composites. ESF was invented by Alessandro Fais, an Italian metallurgical engineer and scientist. ESF is obtained by inserting loose, binder-less powders into the automatic dosing system, or manually inserted in the mold. The automatic procedure applies a pre-pressure onto the powders to ensure electrical contact; hence, it superimposes an intense electromagnetic pulse with a mechanical pulse. The two pulses last 30 to 100 ms. After a brief holding time, the sintered component is extracted by the lower plunger and pushed out by the extractor to leave room for the next sintering. Each sintering round lasts less than one second, and is carried out entirely in air (even with pyrophoric materials). References Nanotechnology Metallurgical facilities
https://en.wikipedia.org/wiki/Hyperjacking
Hyperjacking is an attack in which a hacker takes malicious control over the hypervisor that creates the virtual environment within a virtual machine (VM) host. The point of the attack is to target the operating system that is below that of the virtual machines so that the attacker's program can run and the applications on the VMs above it will be completely oblivious to its presence. Overview Hyperjacking involves installing a malicious, fake hypervisor that can manage the entire server system. Regular security measures are ineffective because the operating system will not be aware that the machine has been compromised. In hyperjacking, the hypervisor specifically operates in stealth mode and runs beneath the machine, it makes it more difficult to detect and more likely to gain access to computer servers where it can affect the operation of the entire institution or company. If the hacker gains access to the hypervisor, everything that is connected to that server can be manipulated. The hypervisor represents a single point of failure when it comes to the security and protection of sensitive information. For a hyperjacking attack to succeed, an attacker would have to take control of the hypervisor by the following methods: Injecting a rogue hypervisor beneath the original hypervisor Directly obtaining control of the original hypervisor Running a rogue hypervisor on top of an existing hypervisor Mitigation techniques Some basic design features in a virtual environment can help mitigate the risks of hyperjacking: Security management of the hypervisor must be kept separate from regular traffic. This is a more network related measure than hypervisor itself related. Guest operating systems should never have access to the hypervisor. Management tools should not be installed or used from guest OS. Regularly patching the hypervisor. Known attacks As of early 2015, there had not been any report of an actual demonstration of a successful hyperjacking besides "p
https://en.wikipedia.org/wiki/Manufacture%20Modules%20Technologies
Manufacture Modules Technologies Sarl (MMT) is a Swiss company established in Geneva in 2015 which originally specialised in the development and commercialization of "Horological Smartwatch modules", firmware, apps and cloud. Located at Geneva's Skylab high-tech hub, it expanded into the development and manufacturing of "E-Straps" operated with a mobile application. Philippe Fraboulet is the CEO. History In June 2015, Fullpower Technologies and Union Horlogère Suisse (Swiss Watchmakers Corporation) formed MMT as a joint venture, which then launched the MotionX Horological Smartwatch Open Platform for the Swiss watch industry. The initial licensees were Frederique Constant, Alpina and Mondaine, brands owned by Union Horlogère Suisse. Fullpower created and managed the circuit design, firmware, smartphone applications (including sleep activity), as well as the cloud Infrastructure. MMT managed the Swiss watch movement development and production as well as licensing and support. In July 2016, Union Horlogere Holding and MMT were spun-out of the Frédérique Constant Group. Fullpower Technologies' 19.99% share was acquired by Union Horlogere Holding BV, giving it 100% of MMT's shares. Business The company offers firmware, a cloud, manufacturing, service and over-the-air facilities for upgrades. The company also offers its own apps, which bear the label “Swiss Made software”. References Smartwatches Luxury brands Activity trackers Ambient intelligence Internet of things Wearable computers Human–computer interaction Ubiquitous computing Personal digital assistants Mobile computers Watch manufacturing companies of Switzerland Privately held companies of Switzerland
https://en.wikipedia.org/wiki/Cyber%20Resilience%20Review
The Cyber Resilience Review (CRR) is an assessment method developed by the United States Department of Homeland Security (DHS). It is a voluntary examination of operational resilience and cyber security practices offered at no cost by DHS to the operators of critical infrastructure and state, local, tribal, and territorial governments. The CRR has a service-oriented approach, meaning that one of the foundational principles of the CRR is that an organization deploys its assets (people, information, technology, and facilities) to support specific operational missions (or services). The CRR is offered in a facilitated workshop format and as a self-assessment package. The workshop version of the CRR is led by a DHS facilitator at a critical infrastructure facility. The workshop typically takes 6–8 hours to complete and draws on a cross section of personnel from the critical infrastructure organization. All information collected in a facilitated CRR is protected from disclosure by the Protected Critical Infrastructure Information Act of 2002. This information cannot be disclosed through a Freedom of Information Act request, used in civil litigation, or be used for regulatory purposes. The CRR Self-Assessment Package allows an organization to conduct an assessment without the need for direct DHS assistance. It is available for download from the DHS Critical Infrastructure Cyber Community Voluntary Program website. The package includes an automated data answer capture and report generation tool, a facilitation guide, comprehensive explanation of each question, and a crosswalk of CRR practices to the criteria of the National Institute of Standards and Technology (NIST) Cybersecurity Framework. The questions asked in the CRR and the resulting report are the same in both versions of the assessment. DHS partnered with the CERT Division of the Software Engineering Institute at Carnegie Mellon University to design and deploy the CRR. The goals and practices found in the asse
https://en.wikipedia.org/wiki/Biological%20recording
Biological recording is the scientific study of the distribution of living organisms, biological records describe the presence, abundance, associations and changes, both in time and space, of wildlife. There has been a long tradition of biological recording in the United Kingdom dating back to John Ray (1627–1705), Robert Plot (1640–1696) and their contemporaries. Methods The basis of a biological record is the 'four Ws': What: the identification of the organism recorded Where: The locality where the organism was seen When: the date (and time) when the organism was recorded Who: the person or persons making the observation Additionally a variety of additional information is often necessary to increase the value of any biological record, including: How: the method of recording the observation, e.g. pitfall trap or moth trap Result Minute apertures called stomata are seen in the temporary mount of lead peel. Each stomata is enclosed by two kidney-shaped guard cells. These guard cells differ from other epidermal cells in having chloroplast Biological recording in the UK In the UK biological recording is a popular hobby and much is organised by national recording schemes for many taxonomic groups of which almost 90 are registered with the national Biological Records Centre. At a national level biological records are managed by the Biological Records Centre, originally set up at Monks Wood Experimental Station, but now based at Wallingford in Oxfordshire which has operated since 1964 to manage records of the country's biodiversity. Following the CCBR report in 1995 the National Biodiversity Network was established as an ideal. This is overseen by the NBN Trust which is responsible for the NBN Gateway which in May 2016 passed 127 million records. At a local level there are a number of field natural history clubs promoting biological recording, including Essex Field Club and Sandwell Valley Naturalists' Club. On a professional level, most of the UK is covered by a
https://en.wikipedia.org/wiki/3D%20Print%20Canal%20House
The 3D Print Canal House is a three-year, publicly accessible "Research & Design by Doing" project in which an international team of partners from various sectors works together on 3D printing a canal house in Amsterdam. By building the house, all parties research the possibilities of 3D printing architecture and form connections between design, science, culture, building, software, communities and the city. The project serves as both an exhibition of 3D printing technology, as well as a research site into 3D printing architecture. The project is initiated by DUS architects and the site, in Amsterdam North, opened to the public on March 1, 2014. Kamermaker The house is constructed by a fused deposition modeling printer developed by DUS: the Kamermaker ("Room builder"), able to print elements of up to 2.2×2.2×3.5 metres. It is a movable pavilion with the size of a shipping container. The machine itself is 6 meters tall. The Kamermaker can be moved by truck or by ship. See also Construction 3D printing References Canal house Houses in the Netherlands Buildings and structures in Amsterdam 2014 establishments in the Netherlands Building research Building engineering
https://en.wikipedia.org/wiki/Cloudike
Cloudike is an on-premise software product developed by Cloudike Inc., a San Francisco based company. The product enables cloud storage service from inside the customer’s data center & network. Usually, it is used by telco and consumer electronics companies to launch local alternatives to Apple iCloud, Google Drive + Photos + Contacts, Dropbox under their own brand and name. History Cloudike Inc started in 2009 as a developer of Software as a Service platform that grew into a multi-tier cloud service used to build on-premise white-label enterprise data storages for OEMs, Mobile and Internet service providers, consumer electronics distributors and fintech companies. See also Comparison of file hosting services Comparison of online backup services Comparison of file synchronization software References External links Cloudike Official Website Cloud Rendering Service API Azure Cloud Services Cloud applications Data synchronization File sharing software Online backup services File hosting for macOS File hosting for Windows
https://en.wikipedia.org/wiki/Great%20Backyard%20Bird%20Count
The Great Backyard Bird Count (GBBC) is a community science project in ornithology. It is conducted annually in mid-February. The event is supported by the Cornell Lab of Ornithology and the National Audubon Society. During this four-day event, birdwatchers around the world are invited to count and report details of birds in the area in which they live. Data is submitted online via a web interface, and compiled for use in scientific research. The GBBC was the first community science project to collect bird sightings online and display results in near real-time. Overview The GBBC was first launched in 1998 in the US. It is conducted around the second week of February. Since 2013, the event has been observed by international bird watchers, and anyone can now participate in the event. Additional wildlife and conservation institutes around the world have also supported and participated. A number of separate bird watch efforts have been coordinated so as to coincide with the GBBC. In 2015 nearly half of known bird species worldwide were reported. Data collected during the event is subjected to verification by experts, in order to overcome potential shortcomings in the abilities of amateur participants. Data resulting from the event has raised awareness about changes in the population and habitats of common birds. References External links Great Backyard Bird Count official website ebird.org data collating site Bird censuses Ornithological citizen science
https://en.wikipedia.org/wiki/Susan%20McConnell
Susan McConnell is a neurobiologist who studies the development of neural circuits in the mammalian cerebral cortex. She is a professor in the Department of Biology at Stanford University, where she is the Susan B. Ford Professor of Humanities and Sciences, a Bass University Fellow, and a Howard Hughes Medical Institute Professor. She is an elected member of the National Academy of Sciences and the American Academy of Arts and Sciences. Education McConnell graduated with a joint A.B. degree from Harvard College and Radcliffe College in 1980. She did her doctoral work in the research group of Simon LeVay and received her PhD in neurobiology from Harvard University in 1987. She was a postdoctoral fellow in the laboratory of Carla J. Shatz at Stanford University. Research McConnell's research focuses on understanding how neurons in the developing cerebral cortex are produced, differentiated, and connected to form functional circuits. McConnell's research showed that progression through the cell cycle plays a key role in determining the final differentiated state of a neural progenitor cell. McConnell also confirmed the hypothesis that asymmetric cell division, as determined by the orientation of the dividing progenitor's cleavage plane, regulates cortical development. Her work elucidated the first molecular mechanism for this process, showing that asymmetrically inherited Notch proteins determine whether a new daughter cell will differentiate into a neuron or remain a neural progenitor. Her work also showed that developing cortical neurons use a variety of different migratory paths as they move from their birthplace to their final destination in the cortex. This work stood in contrast to a prevailing theory at the time, that all neuronal migration in the cortex was dependent upon radial glia. McConnell's recent work has continued to outline the molecular mechanisms underlying neural differentiation, neuronal migration and axon guidance. Teaching Stanford Universi
https://en.wikipedia.org/wiki/ProgrammableWeb
ProgrammableWeb was an information and news source about the Web as a programmable platform. It is a subsidiary of MuleSoft and has offices in San Francisco, CA. The website publishes a repository of web APIs, mashups, and applications, and has documented over 19,000 open web APIs and thousands of applications. It has been called the "journal of the API economy" by TechCrunch. History ProgrammableWeb was founded in 2005 by John Musser and had documented 1,000 APIs by November 2008. In June 2010, Alcatel-Lucent acquired ProgrammableWeb as part of a move by the company to align themselves closer to the developer community. Alcatel-Lucent was looking to integrate ProgrammableWeb’s API monitoring services and other API related technologies with its own Open API Service and Developer Platform to strengthen its relationship with developers. During ProgrammableWeb’s time with Alcatel-Lucent, they documented over 8,000 APIs. Three years later on April 13, 2013, MuleSoft announced the acquisition of ProgrammableWeb to "become the go-to destination for APIs and Integration”. On February 3, 2023 Mulesoft announced that after 17 years in operation, it had shut down Programmable Web. References External links American technology news websites Mobile software development Web directories 2010 mergers and acquisitions 2013 mergers and acquisitions
https://en.wikipedia.org/wiki/PC1%20cipher
The Amazon Kindle e-book reader DRM system uses the PC1 cipher, also called the Kindle cipher or Pukall cipher 1. History The PC1 cipher was designed by Alexander Pukall in 1991. Successors Caracachs Cipher formerly known as PC3 Cipher was released in 2000. PC4 was released in 2015. It's a block cipher specifically designed for DMR radio communication systems. It uses 253 rounds and the key size can vary from 8 bits to 2112 bits. The block size is 49 bits, the exact size of an AMBE+ DMR voiceframe. References External links The PC1 Encryption Algorithm The PC1 Encryption Algorithm Block ciphers Digital rights management
https://en.wikipedia.org/wiki/7%20Cups
7 Cups (formerly called 7 Cups of Tea) is an online mental health platform that provides counseling and therapy to its users. The online counseling and therapy services are provided by "listeners", who have been trained in active listening, via anonymous text or voice chats. The site features distinct groups for adolescent minors and adults over the age of eighteen. History In July 2013, 7 Cups of Tea (as it was known then), was founded by psychologist Glen Moriarty as a Y Combinator startup. The company later rebranded itself as simply 7 Cups. The company derives its name from the eponymous poem by the 9th-century Chinese poet Lu Tong. References External links Crisis hotlines Y Combinator companies
https://en.wikipedia.org/wiki/DEPBT
DEPBT (3-(diethoxyphosphoryloxy)-1,2,3-benzotriazin-4(3H)-one) is a peptide coupling reagent used in peptide synthesis. It shows remarkable resistance to racemization. Fmoc-Dab(Mtt)-OH, a commercially available amino acid building block for solid-phase peptide synthesis (SPPS), was proven to undergo rapid lactamization, instead of reacting with the N-terminal end of the peptide. Compared with other commercially available coupling reagents, DEPBT has shown superior performance in coupling Fmoc-Dab(Mtt)-OH to the N-terminal end of peptide during SPPS, though the approach was regarded as 'costly and tedious'. See also BOP PyBOP References Peptide coupling reagents Biochemistry Biochemistry methods Reagents for biochemistry Organophosphates Benzotriazines Ethyl esters
https://en.wikipedia.org/wiki/Wallis%20Professor%20of%20Mathematics
The Wallis Professorship of Mathematics is a chair in the Mathematical Institute of the University of Oxford. It was established in 1969 in honour of John Wallis, who was Savilian Professor of Geometry at Oxford from 1649 to 1703. List of Wallis Professors of Mathematics 1969 to 1985: John Kingman 1985 to 1997: Simon Donaldson 1999 to 2022: Terence Lyons 2022 to date: Massimiliano Gubinelli See also List of professorships at the University of Oxford References Mathematics education in the United Kingdom Professorships at the University of Oxford St Anne's College, Oxford Professorships in mathematics 1969 establishments in England
https://en.wikipedia.org/wiki/STEM%20pipeline
The STEM (Science, Technology, Engineering, and Mathematics) pipeline is a critical infrastructure for fostering the development of future scientists, engineers, and problem solvers. It's the educational and career pathway that guides individuals from early childhood through to advanced research and innovation in STEM-related fields. Description The "pipeline" metaphor is based on the idea that having sufficient graduates requires both having sufficient input of students at the beginning of their studies, and retaining these students through completion of their academic program. The STEM pipeline is a key component of workplace diversity and of workforce development that ensures sufficient qualified candidates are available to fill scientific and technical positions. The STEM pipeline was promoted in the United States from the 1970s onwards, as “the push for STEM (science, technology, engineering, and mathematics) education appears to have grown from a concern for the low number of future professionals to fill STEM jobs and careers and economic and educational competitiveness.” Today, this metaphor is commonly used to describe retention problems in STEM fields, called “leaks” in the pipeline. For example, the White House reported in 2012 that 80% of minority groups and women who enroll in a STEM field switch to a non-STEM field or drop out during their undergraduate education. These leaks often vary by field, gender, ethnic and racial identity, socioeconomic background, and other factors, drawing attention to structural inequities involved in STEM education and careers. Current efforts The STEM pipeline concept is a useful tool for programs aiming at increasing the total number of graduates, and is especially important in efforts to increase the number of underrepresented minorities and women in STEM fields. Using STEM methodology, educational policymakers can examine the quantity and retention of students at all stages of the K–12 educational process and beyo
https://en.wikipedia.org/wiki/Nano%20differential%20scanning%20fluorimetry
NanoDSF is a modified differential scanning fluorimetry method to determine protein stability employing intrinsic tryptophan or tyrosine fluorescence. Protein stability is typically addressed by thermal or chemical unfolding experiments. In thermal unfolding experiments, a linear temperature ramp is applied to unfold proteins, whereas chemical unfolding experiments use chemical denaturants in increasing concentrations. The thermal stability of a protein is typically described by the 'melting temperature' or 'Tm', at which 50% of the protein population is unfolded, corresponding to the midpoint of the transition from folded to unfolded. In contrast to conventional DSF methods, nanoDSF uses tryptophan or tyrosine fluorescence to monitor protein unfolding. Both the fluorescence intensity and the fluorescence maximum strongly depends on the close surroundings of the tryptophan. Therefore, the ratio of the fluorescence intensities at 350 nm and 330 nm is suitable to detect any changes in protein structure, for example due to protein unfolding. Its applications include antibody engineering, membrane protein research, quality control and formulation development. NanoDSF has also been utilized to rapidly evaluate the melting points of enzyme libraries for biotechnological applications. Examples for application of nanoDSF The nanoDSF technology was used to confirm on-target binding of BI-3231 to HSD17B13 and to elucidate its uncompetitive mode of inhibition with regards to NAD+. References Further reading Biochemistry methods Protein methods Biophysics Molecular biology Laboratory techniques
https://en.wikipedia.org/wiki/Bhargava%20cube
In mathematics, in number theory, a Bhargava cube (also called Bhargava's cube) is a configuration consisting of eight integers placed at the eight corners of a cube. This configuration was extensively used by Manjul Bhargava, a Canadian-American Fields Medal winning mathematician, to study the composition laws of binary quadratic forms and other such forms. To each pair of opposite faces of a Bhargava cube one can associate an integer binary quadratic form thus getting three binary quadratic forms corresponding to the three pairs of opposite faces of the Bhargava cube. These three quadratic forms all have the same discriminant and Manjul Bhargava proved that their composition in the sense of Gauss is the identity element in the associated group of equivalence classes of primitive binary quadratic forms. (This formulation of Gauss composition was likely first due to Dedekind.) Using this property as the starting point for a theory of composition of binary quadratic forms Manjul Bhargava went on to define fourteen different composition laws using a cube. Integer binary quadratic forms An expression of the form , where a, b and c are fixed integers and x and y are variable integers, is called an integer binary quadratic form. The discriminant of the form is defined as The form is said to be primitive if the coefficients a, b, c are relatively prime. Two forms are said to be equivalent if there exists a transformation with integer coefficients satisfying which transforms to . This relation is indeed an equivalence relation in the set of integer binary quadratic forms and it preserves discriminants and primitivity. Gauss composition of integer binary quadratic forms Let and be two primitive binary quadratic forms having the same discriminant and let the corresponding equivalence classes of forms be and . One can find integers such that The class is uniquely determined by the classes [Q(x, y)] and [Q′(x, y)] and is called the composite of the clas
https://en.wikipedia.org/wiki/Geometric%20phase%20analysis
Geometric phase analysis is a method of digital signal processing used to determine crystallographic quantities such as d-spacing or strain from high-resolution transmission electron microscope images. The analysis needs to be performed using specialized computer program. Principle In geometric phase analysis, crystallographic quantities are not determined at one particular point of the input image. Instead, they are quantified across the whole image resulting in a two-dimensional map of given quantity. Quantities which can be mapped with geometric phase analysis include interplanar distances (d-spacing), strain tensor and displacement vector. Since the calculations are performed in frequential domain, the input image of crystal lattice must be transformed into frequential representation using Fourier transform. From mathematical point of view, the frequential image is a complex matrix with the size equal to the original image. From crystallographic point of view, it can be seen as an artificial diffraction pattern or reciprocal image as it depicts reciprocal lattice. In this representation, the intensity peaks (or power peaks) correspond to the crystallographic planes depicted in the original image. Due to the complex nature of the frequential image, it can be used to calculate amplitude and phase. Together with a vector of one crystallographic plane depicted in the image, the amplitude and phase can be used to generate a 2D map of d-spacing. If two vectors of non-parallel planes are known, the method can be used to generate maps of strain and displacement. Software In order to perform geometric phase analysis, a computer tool is needed. Firstly, because manual evaluation of transforms between spatial and frequential domain would be highly impractical. Secondly, a vector of crystallographic plane is an important input parameter and the analysis is sensitive to the accuracy of its localization. Therefore, the accuracy and repeatability of the analysis can be
https://en.wikipedia.org/wiki/Hybridization%20assay
A hybridization assay comprises any form of quantifiable hybridization i.e. the quantitative annealing of two complementary strands of nucleic acids, known as nucleic acid hybridization. Overview In the context of biochemistry and drug development, a hybridization assay is a type of Ligand Binding Assay (LBA) used to quantify nucleic acids in biological matrices. Hybridization assays can be in solution or on a solid support such as 96-well plates or labelled beads. Hybridization assays involve labelled nucleic acid probes to identify related DNA or RNA molecules (i.e. with significantly high degree of sequence similarity) within a complex mixture of unlabelled nucleic acid molecules. Antisense therapy, siRNA, and other oligonucleotide and nucleic acid based biotherapeutics can be quantified with hybridization assays. Signalling of hybridization methods can be performed using oligonucleotide probes modified in-synthesis with haptens and small molecule ligands which act homologous to the capture and detection antibodies. As with traditional ELISA, conjugates to horse radish peroxidase (HRP) or alkaline phosphatase (AP) can be used as secondary antibodies. Sandwich hybridization assay In the sandwich hybridization ELISA assay format, the antigen ligand and antibodies in ELISA are replaced with a nucleic acid analyte, complementary oligonucleotide capture and detection probes. Generally, in the case of nucleic acid hybridization, monovalent salt concentration and temperature are controlled for hybridization and wash stringency, contrary to a traditional ELISA, where the salt concentration will usually be fixed for the binding and wash steps (i.e. PBS or TBS). Thus, optimal salt concentration in hybridization assays varies dependent upon the length and base composition of the analyte, capture and detection probes. Competitive hybridization assay The competitive hybridization assay is similar to a traditional competitive immunoassay. Like other hybridization assays
https://en.wikipedia.org/wiki/Miscibility%20gap
A miscibility gap is a region in a phase diagram for a mixture of components where the mixture exists as two or more phases – any region of composition of mixtures where the constituents are not completely miscible. The IUPAC Gold Book defines miscibility gap as "Area within the coexistence curve of an isobaric phase diagram (temperature vs composition) or an isothermal phase diagram (pressure vs composition)." A miscibility gap between isostructural phases may be described as the solvus, a term also used to describe the boundary on a phase diagram between a miscibility gap and other phases. Thermodynamically, miscibility gaps indicate a maximum (e.g. of Gibbs energy) in the composition range. Named miscibility gaps A number of miscibility gaps in phase systems are named, including The huttenlocher (found in bytownite, anorthite composition An55-95.), boggild (in labradorite, An39-48 and An53-63.) and peristerite (in oligoclase, ~An5-15.) miscibility gaps in the plagioclase feldspars. A Nishwawa horn, term for a miscibility gap existing when phases with different magnetic properties co-exist in the phase diagram. Miscibility gaps in liquid states can cause spinodal decomposition, commonly referred to as oiling out, as commonly occurs in oil/water mixtures. See also Miscibility Solid solution Incongruent melting References Materials science Phase transitions Geochemistry
https://en.wikipedia.org/wiki/AthenaPlus
AthenaPlus is a CIP best practice network started in March 2013 which aims to facilitate access to networks of cultural heritage, enrich metadata, as well as improve search, retrieval and re-use of Europeana’s content by enhancing multilingual terminology management and the export/publication tool. By the end of the project, AthenaPlus will contribute more than 3.6 millions of metadata records to Europeana, from both public and private sectors, focusing mainly on museums content. In addition to enabling access to cultural heritage, AthenaPlus is also focused on creative use of content, and adapting data to users with different needs by means of tools that support the development of virtual exhibitions, tourist and didactic applications. Movio MOVIO is an open source CMS, a kit of tools, developed within the AthenaPlus project, which enables web content creation. MOVIO has a semantic approach; it can be defined as a SCMS (Semantic Content Management System) as well. It enables building online digital exhibitions targeted to different audiences and aims to enable long term accessibility to the mass of knowledge generated by temporary exhibitions that, for their nature, have a limited life span. The content is shaped using different tools integrated in the software: media archive, ontology builder, storyteller, different types of image galleries, hotspots, maps, timeline, etc. The project was initiated by the Central Institute for the Union Catalogue of the Italian Libraries (ICCU), a body of the Ministry, developed by GruppoMeta, and owing to a grant of the Fondazione Telecom Italia 2011. MOVIO is released under MIT license that allows the widest possible reuse of software. The source code has been published on GitHub. Partners The consortium is composed of 40 partners from 21 member countries: Central Institute for the Union Catalogue of the Italian Libraries (ICCU), Italy (project coordinator) UMA Information Technology GmbH, Austria PACKED Expertisecentrum Digit
https://en.wikipedia.org/wiki/AudioLock
AudioLock is a music-specific anti-piracy service founded in 2010 by former DJ and electronic music producer Ben Rush. AudioLock specialises in the automated removal of infringing music content, using DMCA notices, across search engines Google, Yahoo, Bing and Yandex as well as cyberlockers, torrent sites, Usenet, SoundCloud, YouTube, Dailymotion, file search engines, VK, Facebook, Twitter and other social media sites. Digital watermarking is also used for the sending of promotional copies of the music in digital form to prevent pre-release leaks and detect their origin if distributed. Partnerships and memberships AudioLock is a member of the American Association of Independent Music (A2IM), the Association of Independent Music (AIM) and the Association For Electronic Music (AFEM). It is also partnered with numerous digital service providers, Trade association and distributors including; Traxsource, Believe Digital, Music Publishers Association (MPA) and !K7 Education and Public Speaking AudioLock offer education on the subject of music anti-piracy to the public and the wider music industry through its public speaking engagements and ambassador program. On the BBC In July 2016 AudioLock CEO Ben Rush was interviewed by BBC Radio 1 for its Newsbeat program to provide specialist insight into pirate download stores and their effect on dance music. Also interviewed were Mark Lawrence from the AFEM and Stuart Knight, Director of Toolroom Records. Public appearances AudioLock have been invited to talk about music anti-piracy an numerous notable industry events. These include: XPONorth (Inverness, Scotland June 2016) Brighton Music Conference (Brighton, England 2016) Import.io Data Summit (London, England 2014) Amsterdam Dance Event (Amsterdam 2015) International Music Summit (Ibiza 2015 & 2017) BPM Pro (Birmingham, England 2016) In 2013 AudioLock in conjunction with the Association of Independent Music (AIM) held its first Music Piracy Prevention Forum in Lon
https://en.wikipedia.org/wiki/Finding%20Species
Finding Species, Inc is a US-based non-profit organization founded in 1996 to contribute to the resolution of critical environmental, conservation and biodiversity issues through photography. Finding Species maintained an international program in Ecuador from 2007–2012 to document and photograph the endangered flora and fauna of the rain forest. Currently, the American staff is based in Takoma Park, Maryland, and San Marcos, Texas. History While conducting botanical research at the Bilsa Biological Reserve in Ecuador, botanist Margot Bass realized the importance and value in scientifically photographing the rainforest. Bass continued her work in 1996 in Ecuador's Yasuní National Park, where she and other botanists established Finding Species to document and conserve plant species. The construction of roads and the exploration for oil in Yasuní National Park inspired Finding Species to partner with Scientists Concerned for Yasuní in publishing a report on the biological value of the park. The report included over thirty signature species of wildlife found at Yasuní. This report, as well as the accompanying public relations campaign involving photographs and international outcry, played a crucial role in the government's decision to stop the construction of the road. Resulting from many years of working within the rainforest is Common Trees of Yasuni, a book dedicated to the trees of Yasuni National Park located in Ecuador's Orellana Province. Finding Species was formally incorporated in 2003 as a 501(c)(3) non-profit organization focusing on photography, science and conservation. In 2010, Finding Species collaborated with Telfonica to release Armonia Ecuador, a coffee table book featuring photographs of various ecosystems and species throughout Ecuador. The book was released on March 3, 2011. Finding Species has documented and photographed more than 250 tree species for the Smithsonian Institution, Columbia University and University of Maryland's leaf-recogni
https://en.wikipedia.org/wiki/Win%20rate
In advertising, a win rate is a percentage metric in programmatic media marketing that measures the number of impressions won over the number of impressions bid. Win rates are used to gauge competition in programmatic buys in a second-payer Vickrey auction. High win rates indicate either low competition, aggressive bids in comparison to competitors, or selective inventory. Impacting Win Rates Win rates can vary based on Demand-side platform, as each can generate different numbers in the numerator and the denominator based on how many queries per second the technology can handle and filters out before the auction. Several strategic maneuvers are commonly employed to augment win rates: Elevating Bid Values. Increasing bid amounts enhances the likelihood of securing more impressions, thereby inflating the numerator in the win rate calculation. Strategic Auction Participation. Opting for participation in a reduced number of auctions curtails the denominator, effectively raising the overall win rate. Pre-Bid Optimization. Employing pre-bid solutions allows for a more discerning selection of impressions to bid on, thereby refining the quality of bids and augmenting win rates. Inventory Management. Employing blacklisting or whitelisting of specific inventory segments may potentially influence the denominator by restricting or enabling impressions' eligibility for bidding. Frequency Caps Management. Manipulating frequency caps can impact bid frequency on impressions, thereby affecting the denominator by limiting the count of impressions available for bidding. Increasing the numerator will increase References Auction theory Online advertising
https://en.wikipedia.org/wiki/List%20of%20TRS-80%20and%20Tandy-branded%20computers
Tandy Corporation released several computer product lines starting in 1977, under both TRS-80 and Tandy branding. TRS-80 was a brand associated with several desktop microcomputer lines sold by Tandy Corporation through their Radio Shack stores. It was first used on the original TRS-80 (later known as the Model I), one of the earliest mass-produced personal computers. However, Tandy later used the TRS-80 name on a number of different computer lines, many of which were technically unrelated to (and incompatible with) the original Model I and its replacements. In addition to these, Tandy released a number of computers using the Tandy name itself. Original TRS-80 ("Model I") and its successors Model I The original TRS-80 Micro Computer System (later known as the Model I to distinguish it from successors) was launched in 1977 and- alongside the Apple II and Commodore PET- was one of the earliest mass-produced personal computers. The line won popularity with hobbyists, home users, and small-businesses. The Model I included a full-stroke QWERTY keyboard, floating-point BASIC, a monitor, and a starting price of US$600. By 1979, the TRS-80 had the largest selection of software in the microcomputer market. In July 1980 the mostly-compatible TRS-80 Model III was launched, and the original Model I was discontinued. Model III In July 1980 Tandy released the Model III, a mostly-compatible replacement for the Model I. Its improvements over the Model I included built-in lower case, a better keyboard, elimination of the cable spaghetti, 1500-baud cassette interface, and a faster (2.03 MHz) Z-80 processor. With the introduction of the Model III, Model I production was discontinued as it did not comply with new FCC regulations as of January 1, 1981 regarding electromagnetic interference. The Model III could run about 80% of Model I software, but used an incompatible disk format. It also came with the option of integrated disk drives. Model 4 The successor to the Model II
https://en.wikipedia.org/wiki/FREAK
FREAK ("Factoring RSA Export Keys") is a security exploit of a cryptographic weakness in the SSL/TLS protocols introduced decades earlier for compliance with U.S. cryptography export regulations. These involved limiting exportable software to use only public key pairs with RSA moduli of 512 bits or fewer (so-called RSA_EXPORT keys), with the intention of allowing them to be broken easily by the National Security Agency (NSA), but not by other organizations with lesser computing resources. However, by the early 2010s, increases in computing power meant that they could be broken by anyone with access to relatively modest computing resources using the well-known Number Field Sieve algorithm, using as little as $100 of cloud computing services. Combined with the ability of a man-in-the-middle attack to manipulate the initial cipher suite negotiation between the endpoints in the connection and the fact that the finished hash only depended on the master secret, this meant that a man-in-the-middle attack with only a modest amount of computation could break the security of any website that allowed the use of 512-bit export-grade keys. While the exploit was only discovered in 2015, its underlying vulnerabilities had been present for many years, dating back to the 1990s. Vulnerability The flaw was found by researchers from IMDEA Software Institute, INRIA and Microsoft Research. The FREAK attack in OpenSSL has the identifier . Vulnerable software and devices included Apple's Safari web browser, the default browser in Google's Android operating system, Microsoft's Internet Explorer, and OpenSSL. Microsoft has also stated that its Schannel implementation of transport-layer encryption is vulnerable to a version of the FREAK attack in all versions of Microsoft Windows. The CVE ID for Microsoft's vulnerability in Schannel is . The CVE ID for Apple's vulnerability in Secure Transport is . Sites affected by the vulnerability included the US federal government websites fbi.gov, whi
https://en.wikipedia.org/wiki/Stanford%20DASH
Stanford DASH was a cache coherent multiprocessor developed in the late 1980s by a group led by Anoop Gupta, John L. Hennessy, Mark Horowitz, and Monica S. Lam at Stanford University. It was based on adding a pair of directory boards designed at Stanford to up to 16 SGI IRIS 4D Power Series machines and then cabling the systems in a mesh topology using a Stanford-modified version of the Torus Routing Chip. The boards designed at Stanford implemented a directory-based cache coherence protocol allowing Stanford DASH to support distributed shared memory for up to 64 processors. Stanford DASH was also notable for both supporting and helping to formalize weak memory consistency models, including release consistency. Because Stanford DASH was the first operational machine to include scalable cache coherence, it influenced subsequent computer science research as well as the commercially available SGI Origin 2000. Stanford DASH is included in the 25th anniversary retrospective of selected papers from the International Symposium on Computer Architecture and several computer science books, has been simulated by the University of Edinburgh, and is used as a case study in contemporary computer science classes. References Parallel computing Cluster computing Computers
https://en.wikipedia.org/wiki/525%20lines
525-line (or EIA 525/60) is an American standard-definition television resolution used since July 1, 1941, mainly in the context of analog TV broadcast systems. It consists of a 525-line raster, with 480 lines carrying the visible image at 30 interlaced frames per second. It was eventually adopted by countries using 60 Hz utility frequency as TV broadcasts resumed after World War II. With the introduction of color television in the 1950s, it became associated with the NTSC analog color standard. The system was given their letter designation as CCIR System M in the ITU identification scheme adopted in Stockholm in 1961. A similar 625-line system was adopted by countries using 50 Hz utility frequency. Other systems, like 375-line, 405-line, 441-line and 819-line existed, but became outdated or had limited adoption. The modern standard-definition digital video resolution 480i is equivalent to 525-line and can be used to digitize a TV signal, or to it playback generating a 525-line compatible analog signal. Analog broadcast television standards The following International Telecommunication Union standards use 525-lines: CCIR System J CCIR System M Analog color television systems The following analog television color systems were used in conjunction with the previous standards (identified by a letter after the color system indication): NTSC (NTSC-J and NTSC-M) PAL (PAL-M) SECAM (SECAM-M) Digital video 525-lines is sometimes mentioned when digitizing analog video, or when outputting digital video in an standard definition analog compatible format. 480i, a Standard-definition television digital video mode. NTSC DVD NTSC Video CD Rec. 601, a 1982 standard for encoding interlaced analog video signals in digital video form. D-1, a 1986 SMPTE component digital recording video standard. D-2, a 1988 SMPTE composite digital recording video standard. See also 625 lines 480p References Television technology
https://en.wikipedia.org/wiki/The%20Daily%20Stormer
The Daily Stormer is an American far-right, neo-Nazi, white supremacist, misogynist, Islamophobic, antisemitic, and Holocaust denial commentary and message board website that advocates for a second genocide of Jews. It is part of the alt-right movement. Its editor, Andrew Anglin, founded the outlet on July 4, 2013, as a faster-paced replacement for his previous website Total Fascism, which had focused on his own long-form essays on fascism, race, and antisemitic conspiracy theories. In contrast, The Daily Stormer relies heavily on quoted material with exaggerated headlines. The site is known for its use of Internet memes, which have been likened to the imageboard 4chan and cited as attractions for a younger and more ideologically diverse audience. While some white nationalist authors have praised The Daily Stormers reach, others have taken issue with its content and tone, accusing Anglin of being an agent provocateur, used to discredit true white nationalism. The Daily Stormer orchestrates what it calls the "Troll Army", which is involved in Internet trolling of figures with whom Anglin disagrees politically. In August 2017, after causing outrage by insulting the victim of a car-ramming homicide at the far-right Unite the Right rally, the website was rejected by several domain registrars. In August 2019, the site went offline temporarily when their service provider, BitMitigate, was cut off by their cloud infrastructure provider; the site found another provider. In June 2019, a federal judge ordered Anglin to pay $4.1 million to comedian Dean Obeidallah, whom Anglin had falsely accused of orchestrating the Manchester Arena bombing. In July 2019, a federal magistrate recommended that Anglin pay $14 million to Tanya Gersh, a woman from Whitefish, Montana against whom Anglin had organized a targeted harassment campaign. Management Founder Andrew Anglin was born in 1984, and grew up near Columbus, Ohio. According to both Anglin and his childhood classmates, he was
https://en.wikipedia.org/wiki/Wedge%20bonding
Wedge bonding is a kind of wire bonding which relies by the application of ultrasonic power and force to form bonds. It is a popular method and is commonly used in the semiconductor industry. Semiconductor device fabrication Packaging (microfabrication) Articles containing video clips
https://en.wikipedia.org/wiki/Additive%20state%20decomposition
Additive state decomposition occurs when a system is decomposed into two or more subsystems with the same dimension as that of the original system. A commonly used decomposition in the control field is to decompose a system into two or more lower-order subsystems, called lower-order subsystem decomposition here. In contrast, additive state decomposition is to decompose a system into two or more subsystems with the same dimension as that of the original system. Taking a system for example, it is decomposed into two subsystems: and , where and , respectively. The lower-order subsystem decomposition satisfies By contrast, the additive state decomposition satisfies On a dynamical control system Consider an 'original' system as follows: where . First, a 'primary' system is brought in, having the same dimension as the original system: where From the original system and the primary system, the following 'secondary' system is derived: New variables are defined as follows: Then the secondary system can be further written as follows: From the definition (), it follows The process is shown in this picture: Examples Example 1 In fact, the idea of the additive state decomposition has been implicitly mentioned in existing literature. An existing example is the tracking controller design, which often requires a reference system to derive error dynamics. The reference system (primary system) is assumed to be given as follows: Based on the reference system, the error dynamics (secondary system) are derived as follows: where This is a commonly used step to transform a tracking problem to a stabilization problem when adaptive control is used. Example 2 Consider a class of systems as follows: Choose () as the original system and design the primary system as follows: Then the secondary system is determined by the rule (): By additive state decomposition Since the tracking error can be analyzed by and separately. If and are bounded and s
https://en.wikipedia.org/wiki/CWI-2
CWI-2 (a.k.a. CWI, cp-hu, HUCWI, or HU8CWI2) is a Hungarian code page frequently used in the 1980s and early 1990s. If this code page is erroneously interpreted as code page 437, it will still be fairly readable (e.g. Á in place of Å). Character set The following table shows "CWI-2". Each character is shown with its equivalent Unicode code point. Only the second half is shown, codes less than 128 are identical to code page 437. The Unicode encoding used by recode appears to differ in a number of code points: 9F | U+E01F | HUNGARIAN FLORIN (CWI_9F) E1 | U+03B2 | GREEK SMALL LETTER BETA E6 | U+03BC | GREEK SMALL LETTER MU ED | U+2205 | EMPTY SET F8 | U+2218 | RING OPERATOR F9 | U+00B7 | MIDDLE DOT FA | U+2022 | BULLET Several applications developed in Hungary use almost identical character sets with slight modifications, which include § (U+00A7, SECTION SIGN) at 0x9D and a forint sign (an upper-case F and lower-case t ligated into a single character) at 0x9E or 0xA8. The florin sign was planned to be disunified, but so many encodings have this, it would disrupt many mappings. The forint is usually abbreviated as "Ft"; most Hungarians recognize a lower-case "f" (whether upright or cursive) as meaning fillér, the now-unused subdivision of the forint. Some dot matrix printers of the NEC Pinwriter series, namely the P3200/P3300 (P20/P30), P6200/P6300 (P60/P70), P9300 (P90), P7200/P7300 (P62/P72), P22Q/P32Q, P3800/P3900 (P42Q/P52Q), P1200/P1300 (P2Q/P3Q), P2000 (P2X) and P8000 (P72X), supported the installation of optional font EPROMs. Named "CWI" the optional ROM #7 "Hungaria" included this encoding, invokable via escape sequence ESC R (n) with (n) = 21. CWI-1 The codepage CWI-1 differs only by the position of „Í” (U+00CD, LATIN CAPITAL LETTER I WITH ACUTE) on position 8C instead of 8D and „Ő” (U+0150, LATIN CAPITAL LETTER O WITH DOUBLE ACUTE) on position 8B instead of A7. This codepage is known by Star printers and FreeDOS as Code page 3845. See also Kamenický enco
https://en.wikipedia.org/wiki/Vulkan
Vulkan is a low-overhead, cross-platform API and open standard for 3D graphics and computing. It was originally developed as Mantle by AMD, but was later given to Khronos Group. It was intended to address the shortcomings of OpenGL, and allow developers more control over the GPU. Overview Vulkan targets high-performance real-time 3D-graphics applications, such as video games and interactive media, and highly parallelized computing. Vulkan is intended to offer higher performance and more efficient CPU and GPU usage compared to the older OpenGL and Direct3D 11 APIs. It does so by providing a considerably lower-level API for the application than the older APIs that more closely resembles how modern GPUs work. Vulkan is comparable to Apple's Metal API and Microsoft's Direct3D 12, and is harder to use than the higher-level OpenGL and Direct3D 11 APIs. In addition to its lower CPU usage, Vulkan is designed to allow developers to better distribute work among multiple CPU cores. Vulkan was first announced by the non-profit Khronos Group at GDC 2015. The Vulkan API was initially referred to as the "next generation OpenGL initiative", or "OpenGL next" by Khronos, but use of those names was discontinued when "Vulkan" was announced. Vulkan is derived from and built upon components of AMD's Mantle API, which was donated by AMD to Khronos with the intent of giving Khronos a foundation on which to begin developing a low-level API that they could standardize across the industry. Features Vulkan is intended to provide a variety of advantages over other APIs as well as its predecessor, OpenGL. Vulkan offers lower overhead, more direct control over the GPU, and lower CPU usage. The overall concept and feature set of Vulkan is similar to concepts seen in Mantle and later adopted by Microsoft with Direct3D 12 and Apple with Metal. Intended advantages of Vulkan over previous-generation APIs include the following: Unified API Vulkan provides a single API for both desktop and mo
https://en.wikipedia.org/wiki/Dot%20product%20representation%20of%20a%20graph
A dot product representation of a simple graph is a method of representing a graph using vector spaces and the dot product from linear algebra. Every graph has a dot product representation. Definition Let G be a graph with vertex set V. Let F be a field, and f a function from V to Fk such that xy is an edge of G if and only if f(x)·f(y) ≥ t. This is the dot product representation of G. The number t is called the dot product threshold, and the smallest possible value of k is called the dot product dimension. Properties A threshold graph is a dot product graph with positive t and dot product dimension 1. Every interval graph has dot product dimension at most 2. Every planar graph has dot product dimension at most 4. See also Adjacency matrix References External links Graph theory
https://en.wikipedia.org/wiki/Jack%20Rudloe
Jack Rudloe is a writer, naturalist, and environmental activist from Panacea, Florida, United States, who co-founded Gulf Specimen Marine Laboratory. Biography Jack Rudloe was born in Brooklyn, New York on February 17, 1943. At age 14, he moved to Carrabelle, Florida. His first work, "Experiments With Sensitive Plants, Cassia Nictitans", was published in Scientific American while he was attending Tallahassee's Leon High School. He later enrolled in Florida State University, but left after only two months. According to Rudloe's first book, The Sea Brings Forth, he was asked to leave FSU by the dean, who had decided Rudloe was not college material and advised that he should consider a trade instead. In spite of his premature departure from FSU, Rudloe was hired by marine biologist Dexter M. Easton of Harvard University to collect striped burrfish and bat fish. This launched his independent career as a writer and specimen collector. He was mentored in the early days by John Steinbeck. He founded Gulf Specimen Marine Company in 1963. In 1971, Rudloe married marine biologist Anne Rudloe, and together they founded Gulf Specimen Marine Laboratory in 1980. He has two sons, Sky and Cypress and a grandson Kai. He lives in Panacea, Florida and is semi-retired but still assists at GSML and he continues to write. He is the author/coauthor of nine books, both fiction and nonfiction. Scientific contributions Rudloe has multiple acknowledgements from scientists about his personal contributions to and support of their research efforts in the marine science literature. Rudloe has also written numerous scientific articles, and technical publications himself. Rudloe was involved in early efforts to establish the now successful jellyfish export industry on the East Coast of the US. In 1968 he provided the first specimens of the bryozoan Bugula neritina used by the National Cancer Institute (NCI) to develop the bryostatin family of drugs used for treatment of cancer, HIV, Alzheimer's
https://en.wikipedia.org/wiki/Artin%E2%80%93Tate%20lemma
In algebra, the Artin–Tate lemma, named after Emil Artin and John Tate, states: Let A be a commutative Noetherian ring and commutative algebras over A. If C is of finite type over A and if C is finite over B, then B is of finite type over A. (Here, "of finite type" means "finitely generated algebra" and "finite" means "finitely generated module".) The lemma was introduced by E. Artin and J. Tate in 1951 to give a proof of Hilbert's Nullstellensatz. The lemma is similar to the Eakin–Nagata theorem, which says: if C is finite over B and C is a Noetherian ring, then B is a Noetherian ring. Proof The following proof can be found in Atiyah–MacDonald. Let generate as an -algebra and let generate as a -module. Then we can write with . Then is finite over the -algebra generated by the . Using that and hence is Noetherian, also is finite over . Since is a finitely generated -algebra, also is a finitely generated -algebra. Noetherian necessary Without the assumption that A is Noetherian, the statement of the Artin–Tate lemma is no longer true. Indeed, for any non-Noetherian ring A we can define an A-algebra structure on by declaring . Then for any ideal which is not finitely generated, is not of finite type over A, but all conditions as in the lemma are satisfied. References External links http://commalg.subwiki.org/wiki/Artin-Tate_lemma Theorems about algebras Lemmas in algebra Commutative algebra
https://en.wikipedia.org/wiki/Ring%20learning%20with%20errors
In post-quantum cryptography, ring learning with errors (RLWE) is a computational problem which serves as the foundation of new cryptographic algorithms, such as NewHope, designed to protect against cryptanalysis by quantum computers and also to provide the basis for homomorphic encryption. Public-key cryptography relies on construction of mathematical problems that are believed to be hard to solve if no further information is available, but are easy to solve if some information used in the problem construction is known. Some problems of this sort that are currently used in cryptography are at risk of attack if sufficiently large quantum computers can ever be built, so resistant problems are sought. Homomorphic encryption is a form of encryption that allows computation on ciphertext, such as arithmetic on numeric values stored in an encrypted database. RLWE is more properly called learning with errors over rings and is simply the larger learning with errors (LWE) problem specialized to polynomial rings over finite fields. Because of the presumed difficulty of solving the RLWE problem even on a quantum computer, RLWE based cryptography may form the fundamental base for public-key cryptography in the future just as the integer factorization and discrete logarithm problem have served as the base for public key cryptography since the early 1980s. An important feature of basing cryptography on the ring learning with errors problem is the fact that the solution to the RLWE problem can be used to solve a version of the shortest vector problem (SVP) in a lattice (a polynomial-time reduction from this SVP problem to the RLWE problem has been presented). Background The security of modern cryptography, in particular public-key cryptography, is based on the assumed intractability of solving certain computational problems if the size of the problem is large enough and the instance of the problem to be solved is chosen randomly. The classic example that has been used since
https://en.wikipedia.org/wiki/Data%20Protection%20Act%2C%202012
The Data Protection Act, 2012 (The Act) is legislation enacted by the Parliament of the Republic of Ghana to protect the privacy and personal data of individuals. It regulates the process personal information is acquired, kept, used or disclosed by data controllers and data processors by requiring compliance with certain data protection principles. Non compliance with provisions of the Act may attract either civil liability, or criminal sanctions, or both, depending on the nature of the infraction. The Act also establishes a Data Protection Commission, which is mandated to ensure compliance with its provisions, as well as maintain the Data Protection Register. History The Act was first introduced in the Ghana Parliament in 2010, but was subsequently withdrawn by the then Minister of Communications, Haruna Iddrisu, to be revised. Parliament passed the bill in 2012, which then received Presidential assent on May 10, 2012. The notice of the Act was gazetted on 18 May 2012, and in accordance with Section 99, the Act came into effect on 16 October 2012. Structure The Act is made up of 99 sections that are arranged under various headings, as follows: Key terms Key terms in the Act are defined in the interpretation section, section 96. Unless the context otherwise requires, section 96 provides the following definitions to the notable terms: “data controller” means a person who either alone, jointly with other persons or in common with other persons or as a statutory duty determines the purposes for and the manner in which personal data is processed or is to be processed “data processor” in relation to personal data means any person other than an employee of the data controller who processes the data on behalf of the data controller “data subject” means an individual who is the subject of personal data “foreign data subject” means data subject information regulated by laws of a foreign jurisdiction sent into Ghana from a foreign jurisdiction wholly for processing
https://en.wikipedia.org/wiki/T%C3%BCbingen%20triangle
The Tübingen triangle is, apart from the Penrose rhomb tilings and their variations, a classical candidate to model 5-fold (respectively 10-fold) quasicrystals. The inflation factor is – as in the Penrose case – the golden mean, The prototiles are Robinson triangles, but the relationship is different: The Penrose rhomb tilings are locally derivable from the Tübingen triangle tilings. These tilings were discovered and studied thoroughly by a group in Tübingen, Germany, thus the name. Since the prototiles are mirror symmetric, but their substitutions are not, left-handed and right-handed tiles need to be distinguished. This is indicated by the colours in the substitution rule and the patches of the relevant figures. See also Mathematics and art References Aperiodic tilings
https://en.wikipedia.org/wiki/Rudolf%20Berghammer
Rudolf Berghammer (born 1952 in Oberndorf, Germany) is a German mathematician who works in computer science. Life Rudolf Berghammer worked as an electrician at the Farbwerke Hoechst, Kelheim, from 1966 until 1970. He began studying Mathematics and Computer Science in 1973 at TU München. His academic teachers were Friedrich L. Bauer, Klaus Samelson, Gottfried Tinhofer, and Gunther Schmidt. After obtaining his diploma in 1979, he started working as an assistant mainly to Gunther Schmidt and Friedrich L. Bauer at TU München where he obtained his award-winning Ph.D. in 1984. From 1988 on, he worked as an assistant to Gunther Schmidt at the Faculty for Computer Science of the Universität der Bundeswehr München, where he finally got his habilitation in 1990. Since 1993 he is a professor for Computer-aided Program Development at the Department of Computer Science at the University of Kiel. Work For many years he has served as head of the steering committee of the international RAMiCS conference series (formerly termed RelMiCS). Rudolf Berghammer is known for his work in relational mathematics, or Formal Methods of Programming, Semantics, Relational Methods in Computer Science. He developed the RelView system for the manipulation and visualisation of relations and relational programming. For instance, in 2019 he was coauthor of "Cryptomorphic topological structures: a computational relation algebraic approach". This work relates the classical neighborhood system approach to topology to closure operators, kernel operators, and Aumann contact relations. The formulation of one approach to another is done with calculus of relations. The article notes the contributions of RelView experiments with finite topologies, for instance for a set with seven elements, 9,535,241 topologies are tested. (see § 9). Personal One of his hobbies is mountaineering. In his youth he climbed Ortler or Piz Bernina and other noted summits. He is an active climber spending several days in the a
https://en.wikipedia.org/wiki/Quantum%20heat%20engines%20and%20refrigerators
A quantum heat engine is a device that generates power from the heat flow between hot and cold reservoirs. The operation mechanism of the engine can be described by the laws of quantum mechanics. The first realization of a quantum heat engine was pointed out by Scovil and Schulz-DuBois in 1959, showing the connection of efficiency of the Carnot engine and the 3-level maser. Quantum refrigerators share the structure of quantum heat engines with the purpose of pumping heat from a cold to a hot bath consuming power first suggested by Geusic, Schulz-DuBois, De Grasse and Scovil. When the power is supplied by a laser the process is termed optical pumping or laser cooling, suggested by Wineland and Hänsch. Surprisingly heat engines and refrigerators can operate up to the scale of a single particle thus justifying the need for a quantum theory termed quantum thermodynamics. The 3-level amplifier as a quantum heat engine The three-level-amplifier is the template of a quantum device. It operates by employing a hot and cold bath to maintain population inversion between two energy levels which is used to amplify light by stimulated emission The ground state level (1-g) and the excited level (3-h) are coupled to a hot bath of temperature . The energy gap is . When the population on the levels equilibrate where is the Planck constant and is the Boltzmann constant. The cold bath of temperature couples the ground (1-g) to an intermediate level (2-c) with energy gap . When levels 2-c and 1-g equilibrate then . The device operates as an amplifier when levels (3-h) and (2-c) are coupled to an external field of frequency . For optimal resonance conditions . The efficiency of the amplifier in converting heat to power is the ratio of work output to heat input: . Amplification of the field is possible only for positive gain (population inversion) . This is equivalent to . Inserting this expression into the efficiency formula leads to: where is the Carnot cycle efficien
https://en.wikipedia.org/wiki/Gaseous%20signaling%20molecules
Gaseous signaling molecules are gaseous molecules that are either synthesized internally (endogenously) in the organism, tissue or cell or are received by the organism, tissue or cell from outside (say, from the atmosphere or hydrosphere, as in the case of oxygen) and that are used to transmit chemical signals which induce certain physiological or biochemical changes in the organism, tissue or cell. The term is applied to, for example, oxygen, carbon dioxide, sulfur dioxide, nitrous oxide, hydrogen cyanide, ammonia, methane, hydrogen, ethylene, etc. Select gaseous signaling molecules behave as neurotransmitters and are called gasotransmitters. These include nitric oxide, carbon monoxide, and hydrogen sulfide. Historically, the study of gases and physiological effects was categorized under factitious airs. The biological roles of each of the gaseous signaling molecules are outlined below. Gasotransmitters Gasotransmitters are a class of neurotransmitters. Only three gases are accepted to be classified as gasotransmitters including nitric oxide, carbon monoxide, and hydrogen sulfide. Gaseous Signaling Molecules Oxygen Carbon dioxide Carbon dioxide, CO2, is one of the mediators of local autoregulation of blood supply. If its levels are high, the capillaries expand to allow a greater blood flow to that tissue. Bicarbonate, HCO3−, ions are crucial for regulating blood pH. A person's breathing rate influences the level of CO2 in their blood. Breathing that is too slow or shallow causes respiratory acidosis, while breathing that is too rapid leads to hyperventilation, which can cause respiratory alkalosis. Although the body requires oxygen for metabolism, low oxygen levels normally do not stimulate breathing. Rather, breathing is stimulated by higher carbon dioxide levels. The respiratory centers try to maintain an arterial CO2 pressure of 40 mm Hg. With intentional hyperventilation, the CO2 content of arterial blood may be lowered to 10–20 mm Hg (the oxygen c
https://en.wikipedia.org/wiki/Murray%27s%20Hypocycloidal%20Engine
Murray's Hypocycloidal Engine, now in Thinktank, Birmingham Science Museum, England, was made around 1805 and is the world's third-oldest working steam engine and the oldest working engine with a Tusi couple hypocycloidal straight line mechanism. History Designed by Matthew Murray, and made by Fenton, Murray and Wood of Holbeck, Leeds, it is one of only two of the type to survive; the other is located at The Henry Ford, Michigan, United States. The single-cylinder engine was used by John Bradley & Co of Stourbridge from 1805 until 1931, and by N. Hingley & Sons Ltd of Netherton from 1931 until 1961, when it was acquired by Birmingham City Council for their science museum. Murray patented the hypocycloidal arrangement in 1802. See also Birmingham Museums Trust Rotative beam engine Smethwick Engine – the oldest working engine in the world, also at Thinktank Sun and planet gear Whitbread Engine – the second-oldest working engine; one of the first rotative steam engines Notes References Preserved stationary steam engines Collection of Thinktank, Birmingham 1805 in England 1805 in science Articles containing video clips
https://en.wikipedia.org/wiki/Lie%20algebra%20extension
In the theory of Lie groups, Lie algebras and their representation theory, a Lie algebra extension is an enlargement of a given Lie algebra by another Lie algebra . Extensions arise in several ways. There is the trivial extension obtained by taking a direct sum of two Lie algebras. Other types are the split extension and the central extension. Extensions may arise naturally, for instance, when forming a Lie algebra from projective group representations. Such a Lie algebra will contain central charges. Starting with a polynomial loop algebra over finite-dimensional simple Lie algebra and performing two extensions, a central extension and an extension by a derivation, one obtains a Lie algebra which is isomorphic with an untwisted affine Kac–Moody algebra. Using the centrally extended loop algebra one may construct a current algebra in two spacetime dimensions. The Virasoro algebra is the universal central extension of the Witt algebra. Central extensions are needed in physics, because the symmetry group of a quantized system usually is a central extension of the classical symmetry group, and in the same way the corresponding symmetry Lie algebra of the quantum system is, in general, a central extension of the classical symmetry algebra. Kac–Moody algebras have been conjectured to be symmetry groups of a unified superstring theory. The centrally extended Lie algebras play a dominant role in quantum field theory, particularly in conformal field theory, string theory and in M-theory. A large portion towards the end is devoted to background material for applications of Lie algebra extensions, both in mathematics and in physics, in areas where they are actually useful. A parenthetical link, (background material), is provided where it might be beneficial. History Due to the Lie correspondence, the theory, and consequently the history of Lie algebra extensions, is tightly linked to the theory and history of group extensions. A systematic study of group extensions was
https://en.wikipedia.org/wiki/Woolrich%20Electrical%20Generator
The Woolrich Electrical Generator, now in Thinktank, Birmingham Science Museum, England, is the earliest electrical generator used in an industrial process. Built in February 1844 at the Magneto Works of Thomas Prime and Son, Birmingham, to a design by John Stephen Woolrich (1820–1850), it was used by the firm of Elkingtons for commercial electroplating. Plaque The generator stood for some time in the chapel of Aston Hall, accompanied by a plaque bearing the following inscription: Construction The generator in its surviving form consists of 8 axial bobbins with a magnetic field applied by 4 iron horseshoe magnets. The rectangular frame was made of wood and measured 5 foot 4 inches tall, 6 feet wide, and 2 feet long. The generator was fitted with a commutator, as electroplating requires direct current. John Stephen Woolrich The generator's designer, John Stephen Woolrich, was born in Lichfield, England in late 1820. The second son of John Woolrich (c.1791–1843) and his wife Mary Woolrich (formerly Egginton), he was baptised at St Mary's Church, Lichfield on 6 November 1820. In August 1842 he was granted patent number 9431 for the use of a magneto-electrical machine (instead of batteries) in electroplating, and the use of gold sulphite and silver sulphite as electrolytes. He offered to sell the rights to Elkingtons for the enormous sum of £15,000; they declined, and after some heated correspondence eventually, in May 1845, agreed to pay Woolrich £100 initially and then £400 annually for the rest of the term of the patent. Woolrich later relicensed the patent himself to use in his own Magneto-Plating and Gilding Works in Great Charles Street, Birmingham, and in 1849 was listed as a "chemist & magneto-plater & gilder", residing at 12 James Street, just off St Paul's Square in the Jewellery Quarter. He died at the age of 29 in early 1850, and was buried at St Bartholomew's Church, Edgbaston on 4 March 1850. The elder John Woolrich is listed in the United Kingdom C
https://en.wikipedia.org/wiki/Dandy%20loom
A Dandy loom was a hand loom, that automatically ratchetted the take-up beam. Each time the weaver moved the sley to beat-up the weft, a rachet and pawl mechanism advanced the cloth roller. In 1802 William Ratcliffe of Stockport patented a Dandy loom with a cast-iron frame. It was this type of Dandy loom that was used in the small dandy loom shops. Economics In the mid 1830s, there were about twice as many weavers operating a variety of different handlooms as there were power-looms. The dandy loom increased the productivity of a hand-loom weaver by 50%. The dandy-loom weaver would work in a small workshop and would rent the loom for 10½d a week and in 1825 could expect to earn 5s a week. Timmins has tried to assess the relative importance of the hand-powered branch of the industry on the one hand and of the water- or steam-powered branches on the other. It is difficult: the output of power looms was certainly greater than that of the handlooms, but the handloom weavers produced higher quality cloths with greater profit margins. The weaving trade was only partially mechanised before about 1830, and that even so late as 1850, handloom weavers made up a sizeable minority of the total workforce as late as 1850. References Bibliography Weaving equipment
https://en.wikipedia.org/wiki/Nuprl
Nuprl is a proof development system, providing computer-mediated analysis and proofs of formal mathematical statements, and tools for software verification and optimization. Originally developed in the 1980s by Robert Lee Constable and others, the system is now maintained by the PRL Project at Cornell University. The currently supported version, Nuprl 5, is also known as FDL (Formal Digital Library). Nuprl functions as an automated theorem proving system and can also be used to provide proof assistance. Design Nuprl uses a type system based on Martin-Löf intuitionistic type theory to model mathematical statements in a digital library. Mathematical theories can be constructed and analyzed with a variety of editors, including a graphical user interface, a web-based editor, and an Emacs mode. A variety of evaluators and inference engines can operate on the statements in the library. Translators also allow statements to be manipulated with Java and OCaml programs. The overall system is controlled with a variant of ML. Nuprl 5's architecture is described as "distributed open architecture" and intended primarily to be used as a web service rather than as standalone software. Those interested in using the web service, or migrating theories from older versions of Nuprl, can contact the email address given on the Nuprl System web page. History Nuprl was first released in 1984, and was first described in detail in the book Implementing Mathematics with the Nuprl Proof Development System, published in 1986. Nuprl 2 was the first Unix version. Nuprl 3 provided machine proof for mathematical problems related to Girard's paradox and Higman's lemma. Nuprl 4, the first version developed for the World Wide Web, was used to verify cache coherency protocols and other computer systems. The current system architecture, implemented in Nuprl 5, was first proposed in a 2000 conference paper. A reference manual for Nuprl 5 was published in 2002. Nuprl has been the subject
https://en.wikipedia.org/wiki/FSBI%20Medal
The FSBI Medal is an international fish biology and/or fisheries science prize awarded annually for exceptional advances by a scientist in the earlier stages of his or her career. Medallists have made a significant contribution to the field of fish biology through their achievements in scientific research. The medal is only awarded if a candidate of sufficient quality is nominated. The medal was established by the Fisheries Society of the British Isles (FSBI) to recognize distinction in the field of fish biology and fisheries science, and to raise the profile of the discipline and of the Society in the wider scientific community. Medals are awarded to individuals who have made an outstanding contribution to fish biology and/or fisheries. The FSBI Medal is traditionally awarded in July at the Fisheries Society of the British Isles Annual International Conference. Medallists Source: FSBI 2023 - Rajeev Raghavan 2022 - Amy Deacon 2021 - Christos Ioannou 2020 - Julien Cucherousset 2019 - Shaun Killen 2018 - Aaron McNeil 2017 - Nick Graham 2016 - Stephen Simpson 2015 - Kathryn Elmer 2014 - Darren Croft 2013 - Katherine Sloman 2012 - Robert Arlinghaus 2011 - Ashley Ward 2010 - Iain Barber 2009 - John Pinnegar 2008 - Steven J. Cooke 2007 - David W. Sims 2006 - Victoria Braithwaite 2005 - Jason Link 2004 - Michel Kaiser 2003 - Jens Krause 2002 - Etienne Baras 2001 - Simon Jennings 2000 - John Reynolds 1999 - Neil Metcalfe See also List of biology awards References Fisheries science Biology awards British science and technology awards Awards established in 1999
https://en.wikipedia.org/wiki/Woobi
Woobi, formally known as TokenAds, was a digital marketing company based in Tel Aviv, Israel. It provided in-game advertising services for online games, including supply-side platforms and real-time bidding. The company's technology monetized non-paying users through value-exchange advertising, integrated into gameplay. History Woobi was founded in 2009 under the name TokenAds. Its first product was a monetization solution for Facebook Apps before it began to produce technologies that allowed in-game advertising, monetizing free-to-play games using targeted advertising. In 2009, TokenAds launched a concept to enable local brands to advertise to local audiences, and to provide real-time optimization based on game traits. In 2011, it moved away from integrating ad formats into payment sections in favor of integrating them into gameplay. Later, Woobi launched its cross-game tracking technology aimed at improving user targeting capabilities. This led to its investment in developing wider user-profiling technologies and the release of its cross-data, profiling-based platform in 2013. In 2014, the company submitted a patent for its Dynamic Mindset Advertising (DMA) technology, which was based on an algorithm integrated into free-to-play game loops and the user's gameplay. The DMA-based monetization technology attempted to identify moments where a user was more receptive to engage with brands before their ads were displayed. Between the opportunities in online advertising and its own shift towards branded video advertising strategies, Woobi launched its own supply-side platform and real-time bidding exchange in 2016. The company also used its own buyer-side platform to serve as a gateway to online games for brand advertisers. Between 2014 and 2016, Woobi opened offices in London and New York City. In September 2014, TokenAds rebranded as Woobi. In May 2020, Woobi as well as its official website shut down all operations. Awards and nominations In 2017, Woobi saw r
https://en.wikipedia.org/wiki/HTTP%20Public%20Key%20Pinning
HTTP Public Key Pinning (HPKP) is an obsolete Internet security mechanism delivered via an HTTP header which allows HTTPS websites to resist impersonation by attackers using misissued or otherwise fraudulent digital certificates. A server uses it to deliver to the client (e.g. web browser) a set of hashes of public keys that must appear in the certificate chain of future connections to the same domain name. For example, attackers might compromise a certificate authority, and then mis-issue certificates for a web origin. To combat this risk, the HTTPS web server serves a list of “pinned” public key hashes valid for a given time; on subsequent connections, during that validity time, clients expect the server to use one or more of those public keys in its certificate chain. If it does not, an error message is shown, which cannot be (easily) bypassed by the user. The technique does not pin certificates, but public key hashes. This means that one can use the key pair to get a certificate from any certificate authority, when one has access to the private key. Also the user can pin public keys of root or intermediate certificates (created by certificate authorities), restricting site to certificates issued by the said certificate authority. Due to HPKP mechanism complexity and possibility of accidental misuse (potentially causing a lockout condition by system administrators), in 2017 browsers deprecated HPKP and in 2018 removed its support in favor of Certificate Transparency. Mechanism The server communicates the HPKP policy to the user agent via an HTTP response header field named Public-Key-Pins (or Public-Key-Pins-Report-Only for reporting-only purposes). The HPKP policy specifies hashes of the subject public key info of one of the certificates in the website's authentic X.509 public key certificate chain (and at least one backup key) in pin-sha256 directives, and a period of time during which the user agent shall enforce public key pinning in max-age directive,
https://en.wikipedia.org/wiki/Carlos%20Matheus
Carlos Matheus Silva Santos (born May 1, 1984 in Aracaju) is a Brazilian mathematician working in dynamical systems, analysis and geometry. He currently works at the CNRS, in Paris. He earned his Ph.D. from the Instituto de Matemática Pura e Aplicada (IMPA) in 2004 under the supervision of Marcelo Viana, at the age of 19. Selected publications with G. Forni, and A. Zorich: "Square-tiled cyclic covers", Journal of Modern Dynamics, vol. 5, no. 2, pp. 285–318 (2011). with A. Avila, and J.-C. Yoccoz: "SL(2,R)-invariant probability measures on the moduli spaces of translation surfaces are regular", Geometric and Functional Analysis, vol. 23, no. 6, pp. 1705–1729 (2013). with M. Möller, and J.-C. Yoccoz: "A criterion for the simplicity of the Lyapunov spectrum of square-tiled surfaces", ''Inventiones mathematicae (2014). Further reading Época – Os segredos das ilhas de excelência (by Carlos Rydlewski, in Portuguese) References External links Matheus' home-page at the IMPA Matheus' personal blog "Disquisitiones Mathematicae" Brazilian mathematicians 1984 births Living people People from Aracaju Dynamical systems theorists Mathematical analysts Geometers Instituto Nacional de Matemática Pura e Aplicada alumni Brazilian expatriate academics
https://en.wikipedia.org/wiki/Neville%20theta%20functions
In mathematics, the Neville theta functions, named after Eric Harold Neville, are defined as follows: where: K(m) is the complete elliptic integral of the first kind, , and is the elliptic nome. Note that the functions θp(z,m) are sometimes defined in terms of the nome q(m) and written θp(z,q) (e.g. NIST). The functions may also be written in terms of the τ parameter θp(z|τ) where . Relationship to other functions The Neville theta functions may be expressed in terms of the Jacobi theta functions where . The Neville theta functions are related to the Jacobi elliptic functions. If pq(u,m) is a Jacobi elliptic function (p and q are one of s,c,n,d), then Examples Symmetry Complex 3D plots Implementation NetvilleThetaC[z,m], NevilleThetaD[z,m], NevilleThetaN[z,m], and NevilleThetaS[z,m] are built-in functions of Mathematica. Notes References Special functions Theta functions Elliptic functions Analytic functions
https://en.wikipedia.org/wiki/Social%20in%20the%20City
Social in the City (often styled as SitC), formerly Summer in the City, is an annual three-day multi-genre online video event held in London, dedicated to content creators and community from a range of social media platforms such as YouTube, Twitch, TikTok and Instagram. The first Summer in the City in 2009 was a gathering of YouTubers in the parks of London. In 2016, SitC was acquired by MCM Expo Group as part of their "MCM Central" brand. After SitC 2019 the event was rebranded as Social in the City, the first Winter Edition in December took place at the National Exhibition Centre. History 2009–2011 (London Parks) The first Summer in the City was held in London, as a traditional YouTube gathering. It was organised by vlogger Tom Burns and YouTube musician Dave Bullas, with the support of Liam Dryden and Jazza John. The three-day event was held in the last weekend of August and took place across several of London's Royal Parks. The largest attendance at any point was reportedly 200 people, a mix of YouTube creators and viewers. In its first three years, the event followed the pattern of meeting in parks by day, and moving to a London venue such as The Luminaire for live music performances in the evening. 2012 (The Brewery) Following the rapid growth of the event, the decision was made to hold the fourth Summer in the City at a dedicated venue for its duration; SitC 2012 took place at the Brewery in London from 17 to 19 August. This was the first year the event would introduce official programming, including workshops and Q&As from creators, as well as an official livestream on the event's YouTube channel. The number of prospective attendees at SitC 2012 exceeded the 1,000-person capacity of the venue, inspiring the need to move away from being a free event and introduce ticketing in following years. 2013–2014 (Alexandra Palace) SitC's first official ticketed event and the fifth event overall was held in London's Alexandra Palace, with an increased capacity
https://en.wikipedia.org/wiki/Castelnuovo%27s%20contraction%20theorem
In mathematics, Castelnuovo's contraction theorem is used in the classification theory of algebraic surfaces to construct the minimal model of a given smooth algebraic surface. More precisely, let be a smooth projective surface over and a (−1)-curve on (which means a smooth rational curve of self-intersection number −1), then there exists a morphism from to another smooth projective surface such that the curve has been contracted to one point , and moreover this morphism is an isomorphism outside (i.e., is isomorphic with ). This contraction morphism is sometimes called a blowdown, which is the inverse operation of blowup. The curve is also called an exceptional curve of the first kind. References Algebraic surfaces Theorems in geometry
https://en.wikipedia.org/wiki/Native-language%20identification
Native-language identification (NLI) is the task of determining an author's native language (L1) based only on their writings in a second language (L2). NLI works through identifying language-usage patterns that are common to specific L1 groups and then applying this knowledge to predict the native language of previously unseen texts. This is motivated in part by applications in second-language acquisition, language teaching and forensic linguistics, amongst others. Overview NLI works under the assumption that an author's L1 will dispose them towards particular language production patterns in their L2, as influenced by their native language. This relates to cross-linguistic influence (CLI), a key topic in the field of second-language acquisition (SLA) that analyzes transfer effects from the L1 on later learned languages. Using large-scale English data, NLI methods achieve over 80% accuracy in predicting the native language of texts written by authors from 11 different L1 backgrounds. This can be compared to a baseline of 9% for choosing randomly. Applications Pedagogy and language transfer This identification of L1-specific features has been used to study language transfer effects in second-language acquisition. This is useful for developing pedagogical material, teaching methods, L1-specific instructions and generating learner feedback that is tailored to their native language. Forensic linguistics NLI methods can also be applied in forensic linguistics as a method of performing authorship profiling in order to infer the attributes of an author, including their linguistic background. This is particularly useful in situations where a text, e.g. an anonymous letter, is the key piece of evidence in an investigation and clues about the native language of a writer can help investigators in identifying the source. This has already attracted interest and funding from intelligence agencies. Methodology Natural language processing methods are used to extract and id
https://en.wikipedia.org/wiki/Wireless%20Telephony%20Applications%20Interface
The Wireless Telephone Applications Interface (WTAI) is a protocol used in conjunction with the Wireless Application Protocol (WAP) to allow a phone number to be linked to a web page. References Wireless Application Protocol
https://en.wikipedia.org/wiki/Narcissus%20in%20culture
Narcissi are widely celebrated in art and literature. Commonly called daffodil or jonquil, the plant is associated with a number of themes in different cultures, ranging from death to good fortune. Its early blooms are invoked as a symbol of Spring, and associated religious festivals such as Easter, with the Lent lilies or Easter bells amongst its common names. The appearance of the wild flowers in spring is also associated with festivals in many places. While prized for its ornamental value, there is also an ancient cultural association with death, at least for pure white forms. Historically the narcissus has appeared in written and visual arts since antiquity, being found in graves from Ancient Egypt. In classical Graeco-Roman literature the narcissus is associated with both the myth of the youth who was turned into a flower of that time, and with the Goddess Persephone, snatched into the underworld as she gathered their blooms. Narcissi were said to grow in meadows in the underworld. In these contexts they frequently appear in the poetry of the period from Stasinos to Pliny. In western European culture narcissi and daffodils are among the most celebrated flowers in English literature, from Gower to Day-Lewis, while the best known poem is probably that of Wordsworth. The daffodil is the national flower of Wales, associated with St. David's Day. In the visual arts, narcissi are depicted in three different contexts, mythological, floral art, or landscapes, from mediaeval altar pieces to Salvador Dalí. The narcissus also plays an important part in Eastern cultures from their association with the New year in Chinese culture to symbolising eyes in Islamic art. The word 'Daffodil' has been used widely in popular culture from Dutch cars to Swedish rock bands, while many cancer charities have used it as a fundraising symbol. Symbols The daffodil is the national flower of Wales, where it is traditional to wear a daffodil or a leek on Saint David's Day (March 1). In
https://en.wikipedia.org/wiki/International%20Radio%20Corporation
The International Radio Corporation (IRC) was an American radio receiver manufacturing company based in Ann Arbor, Michigan. It was established in 1931 by Charles Albert Verschoor with financial backing from Ann Arbor mayor William E. Brown, Jr., and a group of local business leaders. IRC manufactured numerous different radios, many bearing the Kadette name, including the first mass-produced AC/DC radio, the first pocket radio, and the first clock radio. Due to the seasonal nature of radio sales, the company attempted to diversify its offerings with a product that would sell well during the summer, eventually settling on a camera that would become the Argus. In 1939, IRC sold its radio-manufacturing business to its former General Sales Manager, W. Keene Jackson, although his new Kadette Radio Corporation only survived for a year before it went defunct. After World War II, International Industries and its International Research division became wholly owned subsidiaries of Argus, Inc., after which point the International name ceased to exist. History Establishment The International Radio Corporation was founded in 1931 in Ann Arbor, Michigan, the creation of Charles Albert Verschoor, who had begun making radios in the 1920s. Described as a "colorful old-time promoter" in a January 1945 Fortune magazine article and as a "go-getting inventor" by Mary Hunt, Verschoor had previous experience in automobile manufacturing as well. The company was initially financed with $10,000 raised by Ann Arbor mayor William E. Brown, Jr., and a group of local business leaders who desired to create a new local company with substantial potential for growth and job creation during the Great Depression. It was based out of a former furniture factory located at 405 Fourth Street on Ann Arbor's west side. Early products and profitability IRC debuted its first radio, the International Duo, on August 7, 1931; it was named for its ability to receive both local longwave and European shortwav
https://en.wikipedia.org/wiki/Row%20hammer
Row hammer (also written as rowhammer) is a security exploit that takes advantage of an unintended and undesirable side effect in dynamic random-access memory (DRAM) in which memory cells interact electrically between themselves by leaking their charges, possibly changing the contents of nearby memory rows that were not addressed in the original memory access. This circumvention of the isolation between DRAM memory cells results from the high cell density in modern DRAM, and can be triggered by specially crafted memory access patterns that rapidly activate the same memory rows numerous times. The row hammer effect has been used in some privilege escalation computer security exploits, and network-based attacks are also theoretically possible. Different hardware-based techniques exist to prevent the row hammer effect from occurring, including required support in some processors and types of DRAM memory modules. Background In dynamic RAM (DRAM), each bit of stored data occupies a separate memory cell that is electrically implemented with one capacitor and one transistor. The charge state of a capacitor (charged or discharged) is what determines whether a DRAM cell stores "1" or "0" as a binary value. Huge numbers of DRAM memory cells are packed into integrated circuits, together with some additional logic that organizes the cells for the purposes of reading, writing, and refreshing the data. Memory cells (blue squares in both illustrations) are further organized into matrices and addressed through rows and columns. A memory address applied to a matrix is broken into the row address and column address, which are processed by the row and column address decoders (in both illustrations, vertical and horizontal green rectangles, respectively). After a row address selects the row for a read operation (the selection is also known as row activation), bits from all cells in the row are transferred into the sense amplifiers that form the row buffer (red squares in both ill
https://en.wikipedia.org/wiki/Senolytic
A senolytic (from the words senescence and -lytic, "destroying") is among a class of small molecules under basic research to determine if they can selectively induce death of senescent cells and improve health in humans. A goal of this research is to discover or develop agents to delay, prevent, alleviate, or reverse age-related diseases. A related concept is "senostatic", which means to suppress senescence. Research Possible senolytic agents are under preliminary research, including some which are in early-stage human trials. The majority of candidate senolytic compounds are repurposed anti-cancer molecules, such as the chemotherapeutic drug dasatinib and the experimental small molecule navitoclax. Soluble urokinase plasminogen activator surface receptor have been found to be highly expressed on senescent cells, leading researchers to use chimeric antigen receptor T cells to eliminate senescent cells in mice. According to reviews, it is thought that senolytics can be administered intermittently while being as effective as continuous administration. This could be an advantage of senolytic drugs and decrease adverse effects, for instance circumventing potential off-target effects. Recently, artificial intelligence has been used to discover new senolytics, resulting in the identification of structurally distinct senolytic compounds with more favorable medicinal chemistry properties than previous senolytic candidates. Senolytic candidates Senomorphics Senolytics eliminate senescent cells whereas senomorphics – with candidates such as Apigenin, Rapamycin and rapalog Everolimus – modulate properties of senescent cells without eliminating them, suppressing phenotypes of senescence, including the SASP. See also Autophagy Biogerontology Geroprotector Hsp90 Immunosenescence Invariant NKT (iNKT) cells Klotho (biology)#Effects on aging Life extension Senescence-associated beta-galactosidase, used as a biomarker Senotherapy Sirtuin-activating compound Uni
https://en.wikipedia.org/wiki/Clearinghouse%20for%20Networked%20Information%20Discovery%20and%20Retrieval
The Clearinghouse for Networked Information Discovery and Retrieval or CNIDR was an organization funded by the U.S. National Science Foundation from 1993 to 1997 and based at the Microelectronics Center of North Carolina (MCNC) in Research Triangle Park. CNIDR was active in the research and development of open source software and open standards, centered on information discovery and retrieval, in the emerging Internet. Among the software developed at CNIDR were Isite, an open source Z39.50 implementation and successor to the free version of WAIS, and Isearch, an open source text retrieval system. CNIDR staff were involved in the development of open standards in the Internet Engineering Task Force, the Z39.50 Implementors Group and Dublin Core. CNIDR collaborated with the U.S. Patent and Trademark Office (USPTO) to develop the USPTO's first Internet-based patent search systems. One of these provided full text searching and images of medical patents related to the research and treatment of HIV/AIDS and issued by the US, Japanese and European patent offices. Another system, known as the US Patent Bibliographic Database, provided searching of "front page" bibliographic information for all US patents since 1976. References Information retrieval organizations Internet Standards Internet protocols Internet search engines Organizations established in 1992
https://en.wikipedia.org/wiki/Logic%20block
In computing, a logic block or configurable logic block (CLB) is a fundamental building block of field-programmable gate array (FPGA) technology. Logic blocks can be configured by the engineer to provide reconfigurable logic gates. Logic blocks are the most common FPGA architecture, and are usually laid out within a logic block array. Logic blocks require I/O pads (to interface with external signals), and routing channels (to interconnect logic blocks). Programmable logic blocks were invented by David W. Page and LuVerne R. Peterson, and defined within their 1985 patents. Applications An application circuit must be mapped into an FPGA with adequate resources. While the number of logic blocks and I/Os required is easily determined from the design, the number of routing tracks needed may vary considerably even among designs with the same amount of logic. For example, a crossbar switch requires much more routing than a systolic array with the same gate count. Since unused routing tracks increase the cost (and decrease the performance) of the part without providing any benefit, FPGA manufacturers try to provide just enough tracks so that most designs that will fit in terms of lookup tables (LUTs) and I/Os can be routed. This is determined by estimates such as those derived from Rent's rule or by experiments with existing designs. FPGAs are also widely used for systems validation including pre-silicon validation, post-silicon validation, and firmware development. This allows chip companies to validate their design before the chip is produced in the factory, reducing the time-to-market. Architecture In general, a logic block consists of a few logic cells (each cell is called an adaptive logic module (ALM), a logic element (LE), slice, etc.). A typical cell consists of a 4-input LUT, a full adder (FA), and a D-type flip-flop (DFF), as shown to the right. The LUTs are in this figure split into two 3-input LUTs. In normal mode those are combined into a 4-input LUT th
https://en.wikipedia.org/wiki/Semigroup%20with%20three%20elements
In abstract algebra, a semigroup with three elements is an object consisting of three elements and an associative operation defined on them. The basic example would be the three integers 0, 1, and −1, together with the operation of multiplication. Multiplication of integers is associative, and the product of any two of these three integers is again one of these three integers. There are 18 inequivalent ways to define an associative operation on three elements: while there are, altogether, a total of 39 = 19683 different binary operations that can be defined, only 113 of these are associative, and many of these are isomorphic or antiisomorphic so that there are essentially only 18 possibilities. One of these is C3, the cyclic group with three elements. The others all have a semigroup with two elements as subsemigroups. In the example above, the set {−1,0,1} under multiplication contains both {0,1} and {−1,1} as subsemigroups (the latter is a subgroup, C2). Six of these are bands, meaning that all three elements are idempotent, so that the product of any element with itself is itself again. Two of these bands are commutative, therefore semilattices (one of them is the three-element totally ordered set, and the other is a three-element semilattice that is not a lattice). The other four come in anti-isomorphic pairs. One of these non-commutative bands results from adjoining an identity element to LO2, the left zero semigroup with two elements (or, dually, to RO2, the right zero semigroup). It is sometimes called the flip-flop monoid, referring to flip-flop circuits used in electronics: the three elements can be described as "set", "reset", and "do nothing". This semigroup occurs in the Krohn–Rhodes decomposition of finite semigroups. The irreducible elements in this decomposition are the finite simple groups plus this three-element semigroup, and its subsemigroups. There are two cyclic semigroups, one described by the equation x4 = x3, which has O2, the null semi
https://en.wikipedia.org/wiki/International%20Journal%20of%20Greenhouse%20Gas%20Control
The International Journal of Greenhouse Gas Control is a monthly peer-reviewed scientific journal covering research on greenhouse gas control. It is published by Elsevier and the editor-in-chief is John Gale. According to the Journal Citation Reports, the journal has a 2020 impact factor of 3.738, References External links Elsevier academic journals Academic journals established in 2007 English-language journals Energy and fuel journals Environmental science journals Monthly journals Climate change and society Climate change journals
https://en.wikipedia.org/wiki/Zeroth%20%28software%29
Zeroth is a platform for brain-inspired computing from Qualcomm. It is based around a (NPU) AI accelerator chip and a software API to interact with the platform. It makes a form of machine learning known as deep learning available to mobile devices. It is used for image and sound processing, including speech recognition. The software operates locally rather than as a cloud application. Mobile chip maker Qualcomm announced in March 2015 that it would bundle the software with its next major mobile device chip, the Snapdragon 820 processor. Applications Qualcomm demonstrated that the system could recognize human faces and gestures that it had seen before and detect and then search for different types of photo scenes. Another potential application is to extend battery life by analyzing phone usage and powering down all or part of its capabilities without affecting the user experience. See also Neuromorphic computing TrueNorth SpiNNaker Vision processing unit, a class of processors aimed at machine vision (including convolutional neural networks, hence overlapping with 'neural processing units') References Qualcomm software Mobile software Data mining and machine learning software Image processing software Speech recognition software AI accelerators
https://en.wikipedia.org/wiki/JASBUG
JASBUG is a security bug disclosed in February 2015 and affecting core components of the Microsoft Windows Operating System. The vulnerability dated back to 2000 and affected all supported editions of Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1. The vulnerability allows hackers to remotely take control of Windows devices that connect to an Active Directory domain. JASBUG is registered in the Common Vulnerabilities and Exposures system as . The Industrial Control Systems Cyber Emergency Response Team, part of the Department of Homeland Security, issued ICS-ALERT-15-041-01, warning control systems owners that they should expedite applying critical JASBUG fixes. Microsoft released two patches, MS15-011 and MS15-014, to address JASBUG on the same day the vulnerability was disclosed. These fixes took Microsoft over a year to develop and deploy due to the complexity of the JASBUG vulnerability. At the time of disclosure, more than 300 million computers were believed to be vulnerable to the exploit. History JASBUG was disclosed to the public by Microsoft as a part of "Patch Tuesday," on February 10, 2015. Background The vulnerability was initially reported to Microsoft in January 2014 by Jeff Schmidt, founder of JAS Global Advisors. After Microsoft publicly announced the security vulnerability, it garnered the name JASBUG in reference to the role JAS Global Advisors played in discovering the exploit. Discovery In 2014, JAS Global Advisors was working on an engagement with the Internet Corporation for Assigned Names and Numbers (ICANN), the organization governing the standards of the Internet, to research potential technical issues surrounding the rollout of new Generic Top Level Domains (gTLDs) on the Internet. While working on the research, JAS Global Advisors, with business partner SimMachines, uncovered the vu
https://en.wikipedia.org/wiki/TeamNote
TeamNote is a mobile-first business communication and collaboration software developed by the Hong Kong based technology company TeamNote Limited. TeamNote is a product that is provided as a solution white label solution to corporations and deployed in a private cloud or an on-premises server. It allows users to send text messages and voice messages, share images, documents, user locations, and other content. It is not available for download on App Store (iOS) or in Google Play. TeamNote adds new users by sending out links or manual deployment. Features TeamNote offers standardized communication features, customizable workflow modules and system integration. The primary features of TeamNote are instant messaging including text and voice, individual and group chat mode, as well as news announcements organized by top management. Also, it offers GPS location tracking, polling or voting, task assignments, photo reporting, sales reporting in chat rooms and share training manual. In addition, TeamNote also has customized features such as form filling, HR tasks, job dispatch, and duty roster. Platforms TeamNote provides Android and iOS mobile apps for end user, and web portal for web clients including end user and superuser. Business Model TeamNote offers subscription business model and claimed to charge US$5 per user per month. The fee would be adjusted accordingly for additional features. A custom rate could be applied if a deeper integration is required. History TeamNote is a product started off its research and development in 2012, under its then-parent company Apptask Limited, a project-led mobile applications development company. TeamNote was originally developed for a Hong Kong local real estate conglomerate as a customized corporate communication app, which inspired its founder Roy Law and the team to develop TeamNote as a product. TeamNote Limited as an independent company was founded in July 2013, after spinning off from its now-sister company Apptask Li
https://en.wikipedia.org/wiki/Spock%20%28testing%20framework%29
Spock is a Java testing framework capable of handling the complete life cycle of a computer program. It was initially created in 2008 by Peter Niederwieser, a software engineer with GradleWare. A second Spock committer is Luke Daley (also with Gradleware), the creator of the popular Geb functional testing framework. See also JUnit, unit testing framework for the Java programming language Mockito, mocking extensions to JUnit TestNG, test framework for Java References Cross-platform software Java development tools Java platform Unit testing frameworks Software using the Apache license
https://en.wikipedia.org/wiki/Cppdepend
CppDepend is a static analysis tool for C/C++ code. This tool supports a large number of code metrics, allows for visualization of dependencies using directed graphs and dependency matrix. The tools also performs code base snapshots comparison, and validation of architectural and quality rules. User-defined rules can be written using LINQ queries. This possibility is named CQLinq. The tool also comes with a large number of predefined CQLinq code rules. Features The main features of CppDepend are: Hundred of Clang diagnostics Support for C++14 Declarative code rule over LINQ query (CQLinq) Dependency Visualization (using dependency graphs, and dependency matrix) Software metrics (CppDepend currently supports 82 code metrics: Cyclomatic complexity; Afferent and Efferent Coupling; Relational Cohesion; Percentage of code covered by tests, etc.) CppDepend can tell you what has been changed between 2 builds New features in v2017.1 Support for Visual Studio 2017 Enhanced Visual Studio Integration Smart Technical Debt Estimation Quality Gates Better Issues Management Dashboard Improvements Default Rules-Set Improvements Enhanced Baseline Experience Report Improvements Code Query Improvements Code Rule through LINQ Query (CQLinq) The tool proposes live code query and code rule through LINQ query. This is one of the innovations of CppDepend. For example: - Classes inherit from a particular class: // classes inherit from a particular class from t in Types where t.IsClass && t.DeriveFrom ("CBase") select t - The 10 most complex methods (Source Code Cyclomatic complexity) // The 10 most complex methods (from m in Methods orderby m.CyclomaticComplexity select new { m, m.CyclomaticComplexity }).Take(10) In addition, the tool proposes a live CQLinq query editor with code completion and embedded documentation. See also Sourcetrail Free Open-Source source code explorer that provide interactive dependency graphs. Design Structure Matrix Software vi
https://en.wikipedia.org/wiki/Projective%20Set%20%28game%29
Projective Set (sometimes shortened to ProSet) is a real-time card game derived from the older game Set. The deck contains cards consisting of colored dots; some cards are laid out on the table and players attempt to find "Sets" among them. The word projective comes from the game's relation to Projective spaces over the finite field with two elements. Projective Set has been studied mathematically as well as played recreationally. It has been a popular game at Canada/USA Mathcamp. Rules A Projective Set card has six binary attributes, or bits, generally represented by colored dots. For each color of dot, each card either has that dot or does not. There is one card for each possible combination of dots except the combination of no dots at all, making cards total. Three cards are said to form a "set" if the total number of dots of each color is either 0 or 2. Similarly, four or more cards form a "set" if the number of dots of each color is an even number. A card and itself could be said to form a two-card set, but as the cards in the deck are all distinct, this does not arise in actual gameplay. Original Version In the original version, as in Set, 12 cards are laid out on the table. The first player to find three cards which form a set and call out "set" takes the three cards. Three new cards are then dealt and the play continues until the deck is depleted. If at any time the players agree there is no set among the cards, three new cards can be dealt, bringing the total number of cards on the table to 15. Other than this, new cards are not dealt out unless the number of cards on the table goes below 12. The game ends when the deck is depleted and no more sets can be found among the cards on the table. The player who captured the most sets is the winner. 7-card Version A variation of the game, more popular than the original, allows sets of any size, rather than just sets of size three. 7 cards are put out on the table at a time, and when a set is found (
https://en.wikipedia.org/wiki/Carotid%E2%80%93Kundalini%20function
The Carotid–Kundalini function is closely associated with Carotid-Kundalini fractals coined by popular science columnist Clifford A. Pickover and it is defined as follows: See also arccos References External links Carotid–Kundalini function Carotid-Kundalini Fractal Explorer Special functions
https://en.wikipedia.org/wiki/National%20Engineering%20Forum
The National Engineering Forum (NEF) is an American movement based on the idea that the U.S. engineering enterprise fuels national security and economic prosperity, but that the nation’s engineers face a series of challenges threatening their profession’s sustainability. The movement is aimed at finding solutions to those challenges, identified by NEF as the 3C’s - capacity, capability and competitiveness: the capacity of technical talent to fill future jobs the engineering workforce’s capability to address 21st century challenges, and competitiveness in a global economy Currently, NEF spotlights American engineers and the 3C’s via its newsletter and website, and acclaims engineering advancements on Twitter. History In 2012, Lockheed Martin launched the National Engineering Forum, and then engaged the Council on Competitiveness and the National Academy of Engineering, which share a common vision for transforming the way we perceive, experience, and prioritize engineering in this country. NEF's initial focus included a five-year regional dialogue tour of key engineering hubs throughout the nation, including: New York; Knoxville, Tennessee; Albuquerque, New Mexico; Los Angeles; Columbus, Ohio; Houston; San Diego; Seattle; Detroit; Raleigh-Durham, North Carolina; Pittsburgh; Chicago; Boston; Atlanta; Phoenix; Madison, Wisconsin; Orlando, Florida; Stillwater, Oklahoma and Greenville, South Carolina. In addition to sharing engineering news and features in its regular newsletter, in 2014 NEF released a report entitled Engineering our Nation's Future. References Building Bridges and Making a Difference Fluid Power Journal (Sept. 21, 2017) Engineer’s Dream Has Wings Fluid Power Journal (May 18, 2017) A Conversation with Jennifer George Fluid Power Journal (Feb. 23, 2017) Building the Future Fluid Power Journal (Jan. 19, 2017) Clemson Elevates Engineering, Brings National Engineering Forum to South Carolina Fluid Power Journal (June 16, 2016) Problem solved
https://en.wikipedia.org/wiki/Hybrizyme
Hybrizyme is a term coined to indicate novel or normally rare gene variants (or alleles) that are associated with hybrid zones, geographic areas where two related taxa (e.g. species or subspecies) meet, mate, and produce hybrid offspring. The hybrizyme phenomenon is widespread and these alleles occur commonly, if not in all hybrid zones. Initially considered to be caused by elevated rates of mutation in hybrids, the most probable hypothesis infers that they are the result of negative (purifying) selection. Namely, in the center of the hybrid zone, negative selection purges alleles against hybrid disadvantage (e.g. hybrid inviability or infertility). Stated differently, any allele that will decrease reproductive isolation is favored and any linked alleles (genetic markers) also increase their frequency by genetic hitchhiking. If the linked alleles used to be rare variants in the parental taxa, they will become more common in the area where the hybrids are formed. Etymology Originally hybrizymes were defined as "unexpected allelic electromorphs associated with hybrid zones", a formal term proposed by renowned conservation geneticist and biogeographer David S. Woodruff in 1988. By suggesting a new definition for a phenomenon that had been previously widely observed Woodruff's interpretation bypasses the etiological connotation of alternative terms and avoids inappropriate context. Namely, previous studies referred to allozymes that were observed at high frequency in hybrid zones, but are absent or rare in parental taxa as "the rare allele phenomenon". These alleles can have increased frequencies up to a point of the allele becoming the most common one in the hybrid zone, rendering the term "the rare allele phenomenon" deceptive. Despite this, these two terms have been used interchangeably in literature. Widespread phenomenon Hybrid populations display the hybrizyme phenomenon by having increased frequencies of certain alleles that are rare or non-existent outside o
https://en.wikipedia.org/wiki/Craig%20Gentry%20%28computer%20scientist%29
Craig Gentry (born 1973) is an American computer scientist working as CTO of TripleBlind. He is best known for his work in cryptography, specifically fully homomorphic encryption. Education In 1993, while studying at Duke University, he became a Putnam Fellow. In 2009, his dissertation, in which he constructed the first Fully Homomorphic Encryption scheme, won the ACM Doctoral Dissertation Award. Career In 2010, he won the ACM Grace Murray Hopper Award for the same work. In 2014, he won a MacArthur Fellowship. Previously, he was a research scientist at the Algorand Foundation and IBM Thomas J. Watson Research Center. References 1973 births Living people MacArthur Fellows Duke University alumni Harvard Law School alumni Stanford University alumni Grace Murray Hopper Award laureates IBM Research computer scientists Putnam Fellows
https://en.wikipedia.org/wiki/Saddlepoint%20approximation%20method
The saddlepoint approximation method, initially proposed by Daniels (1954) is a specific example of the mathematical saddlepoint technique applied to statistics. It provides a highly accurate approximation formula for any PDF or probability mass function of a distribution, based on the moment generating function. There is also a formula for the CDF of the distribution, proposed by Lugannani and Rice (1980). Definition If the moment generating function of a distribution is written as and the cumulant generating function as then the saddlepoint approximation to the PDF of a distribution is defined as: and the saddlepoint approximation to the CDF is defined as: where is the solution to , and . When the distribution is that of a sample mean, Lugannani and Rice's saddlepoint expansion for the cumulative distribution function may be differentiated to obtain Daniels' saddlepoint expansion for the probability density function (Routledge and Tsao, 1997). This result establishes the derivative of a truncated Lugannani and Rice series as an alternative asymptotic approximation for the density function . Unlike the original saddlepoint approximation for , this alternative approximation in general does not need to be renormalized. References Asymptotic analysis Perturbation theory
https://en.wikipedia.org/wiki/LHD%20%28load%2C%20haul%2C%20dump%20machine%29
LHD (load, haul, dump) loaders are similar to conventional front end loaders but developed for the toughest of hard rock mining applications, keeping overall production economy, safety, and reliability in consideration. They are extremely rugged, highly maneuverable, and exceptionally productive. More than 75% of the world's underground metal mines use LHD for handling the muck of their excavations. Constructional details LHDs have powerful prime movers, advanced drive train technology, heavy planetary axles, four-wheel drive, articulated steering, and ergonomic controls. Their narrower, longer, and lower profile make them most suitable for underground application where height and width are limited. As the length is not a limitation in a tunnel and decline, LHD loaders are designed with sufficient length. The length improves axial weight distribution and bucket capacity can be enhanced. The two-part construction with central articulation helps in tracking and maneuverability. In mining, there is a limitation for shifting heavy equipment, and sometimes, an LHD has to be shifted through a shaft while dismantled. Capacity An LHD tramming capacity varies from 1 to 17-25 tonne. Their bucket size varies from 0.8 to 10 m3. Bucket height ranges from 1.8 to 2.5 m. Drives LHDs are available in both diesel and electric versions. The diesel version is easily transportable from one location to another and has diesel engines as power drive of 75 to 150 HP or more. Engines are either water- or air-cooled. LHD with electric motors as drives have a general capacity of 75 to 150 HP. These are operative at a medium voltage of 380 to 550 volts. Flexible trailing cables are provided with a reeling/unreeling facility to feed power. These drives operate hydraulic pumps and hydraulic motors for further operation of the various movements of buckets and vehicle traction and steering. The speed of the vehicle is controlled mechanically. The transmission is controlled by a hydrostatic dri
https://en.wikipedia.org/wiki/Wiener%20connector
In network theory, the Wiener connector is a means of maximizing efficiency in connecting specified "query vertices" in a network. Given a connected, undirected graph and a set of query vertices in a graph, the minimum Wiener connector is an induced subgraph that connects the query vertices and minimizes the sum of shortest path distances among all pairs of vertices in the subgraph. In combinatorial optimization, the minimum Wiener connector problem is the problem of finding the minimum Wiener connector. It can be thought of as a version of the classic Steiner tree problem (one of Karp's 21 NP-complete problems), where instead of minimizing the size of the tree, the objective is to minimize the distances in the subgraph. The minimum Wiener connector was first presented by Ruchansky et al. in 2015. The minimum Wiener connector has applications in many domains where there is a graph structure and an interest in learning about connections between sets of individuals. For example, given a set of patients infected with a viral disease, which other patients should be checked to find the culprit? Or given a set of proteins of interest, which other proteins participate in pathways with them? The Wiener connector was named in honor of chemist Harry Wiener who first introduced the Wiener Index. Problem definition The Wiener index is the sum of shortest path distances in a (sub)graph. Using to denote the shortest path between and , the Wiener index of a (sub)graph , denoted , is defined as . The minimum Wiener connector problem is defined as follows. Given an undirected and unweighted graph with vertex set and edge set and a set of query vertices , find a connector of minimum Wiener index. More formally, the problem is to compute , that is, find a connector that minimizes the sum of shortest paths in . Relationship to Steiner tree The minimum Wiener connector problem is related to the Steiner tree problem. In the former, the objective function in the minimizatio
https://en.wikipedia.org/wiki/Sergei%20Tabachnikov
Sergei Tabachnikov, also spelled Serge, (in born in 1956) is an American mathematician who works in geometry and dynamical systems. He is currently a Professor of Mathematics at Pennsylvania State University. Biography He earned his Ph.D. from Moscow State University in 1987 under the supervision of Dmitry Fuchs and Anatoly Fomenko. He has been living and working in the USA since 1990. From 2013 to 2015 Tabachnikov served as Deputy Director of the Institute for Computational and Experimental Research in Mathematics (ICERM) in Providence, Rhode Island. He is now Emeritus Deputy Director of ICERM. He is a fellow of the American Mathematical Society. He currently serves as Editor in Chief of the journal Experimental Mathematics. A paper on the variability hypothesis by Theodore Hill and Tabachnikov was accepted and retracted by The Mathematical Intelligencer and later The New York Journal of Mathematics (NYJM). There was some controversy over the mathematical model, the peer-review process, and the lack of an official retraction notice from the NYJM. Selected publications References External links Homepage American mathematicians Fellows of the American Mathematical Society 1956 births Living people Moscow State University alumni Dynamical systems theorists Topologists Russian expatriates in the United States Pennsylvania State University faculty
https://en.wikipedia.org/wiki/Griewank%20function
In mathematics, the Griewank function is often used in testing of optimization. It is defined as follows: The following paragraphs display the special cases of first, second and third order Griewank function, and their plots. First-order Griewank function The first order Griewank function has multiple maxima and minima. Let the derivative of Griewank function be zero: Find its roots in the interval [−100..100] by means of numerical method, In the interval [−10000,10000], the Griewank function has 6365 critical points. Second-order Griewank function Third order Griewank function References Special functions
https://en.wikipedia.org/wiki/Human%20interactome
The human interactome is the set of protein–protein interactions (the interactome) that occur in human cells. The sequencing of reference genomes, in particular the Human Genome Project, has revolutionized human genetics, molecular biology, and clinical medicine. Genome-wide association study results have led to the association of genes with most Mendelian disorders, and over 140 000 germline mutations have been associated with at least one genetic disease. However, it became apparent that inherent to these studies is an emphasis on clinical outcome rather than a comprehensive understanding of human disease; indeed to date the most significant contributions of GWAS have been restricted to the “low-hanging fruit” of direct single mutation disorders, prompting a systems biology approach to genomic analysis. The connection between genotype and phenotype (how variation in genotype affects the disease or normal functioning of the cell and the human body) remain elusive, especially in the context of multigenic complex traits and cancer. To assign functional context to genotypic changes, much of recent research efforts have been devoted to the mapping of the networks formed by interactions of cellular and genetic components in humans, as well as how these networks are altered by genetic and somatic disease. Background With the sequencing of the genomes of a diverse array or model organisms, it became clear that the number of genes does not correlate with the human perception of relative organism complexity – the human proteome contains some 20 000 genes, which is smaller than some species such as corn. A statistical approach to calculating the number of interactions in humans gives an estimate of around 650 000, one order of magnitude bigger than Drosophila and 3 times larger than C. Elegans. As of 2008, only about <0.3% of all estimated interactions among human proteins has been identified, although in recent years there has been exponential growth in discovery – as of 2
https://en.wikipedia.org/wiki/Ferrers%20function
In mathematics, Ferrers functions are certain special functions defined in terms of hypergeometric functions. They are named after Norman Macleod Ferrers. Definitions When the order μ and the degree ν are real and x ∈ (-1,1) Ferrers function of the first kind Ferrers function of the second kind See also Legendre function References Special functions
https://en.wikipedia.org/wiki/Ben%20Munk
Benedikt "Ben" Aage Munk (December 3, 1929 – March 13, 2009) was professor of electrical engineering at the ElectroScience Laboratory (ESL) at The Ohio State University (OSU), Columbus, Ohio, US. Munk is best known for his contributions to the field of applied electromagnetic, especially periodic surfaces (also known as metasurfaces) and antenna arrays. He is the author of many papers on periodic surfaces and antennas, as well as two key books. The most significant work are the "Finite Antenna Arrays and FSS" in which he discusses the design of the ultra wide band tightly coupled dipole antenna array and "Frequency Selective Surfaces: Theory and Design". Unlike other antenna books that heavily emphasize theory and mathematics, Munk's approach is based on intuitive understanding and engineering aspects of the subjects. He had contributed two chapters to the third edition of John Kraus' classic book, "Antennas for All Applications", published in 2002. His last book publication is named "Metamaterials: Critique and Alternatives" which was published in 2009 by Wiley. In this books he argues against negative permittivity/permeability meta-materials and cloaking. According to his own words and Vita published alongside his dissertation, Munk graduated from a high school in Denmark in 1948. Afterwards he studied Electrical Engineering at the Technical University of Denmark also known as The Polytechnic Institute of Denmark and obtained master's degree in 1954. From 1954 to 1957 he as s with the Royal Danish Navy as a Lieutenant and antenna/radar engineer. He was an assistant group leader at Rohde and Schwarz in Munich, Germany developing antennas (1957-59). Munk was a chief designer for A/S Nordisk Antenne Fabrik, Denmark and worked with antennas, centralized antenna systems, and filters from 1959-60. From 1960 to 1963, he was a research and development engineer with the Andrew Corporation, Chicago, Illinois, working with antennas. Later on, from 1963-64, he was an anten
https://en.wikipedia.org/wiki/TeslaCrypt
TeslaCrypt was a ransomware trojan. It is now defunct, and its master key was released by the developers. In its early forms, TeslaCrypt targeted game-play data for specific computer games. Newer variants of the malware also affect other file types. In its original, game-player campaign, upon infection the malware searched for 185 file extensions related to 40 different games, which include the Call of Duty series, World of Warcraft, Minecraft and World of Tanks, and encrypted such files. The files targeted involve the save data, player profiles, custom maps and game mods stored on the victim's hard drives. Newer variants of TeslaCrypt were not focused on computer games alone but also encrypted Word, PDF, JPEG and other files. In all cases, the victim would then be prompted to pay a ransom of $500 worth of bitcoins in order to obtain the key to decrypt the files. Although resembling CryptoLocker in form and function, Teslacrypt shares no code with CryptoLocker and was developed independently. The malware infected computers via the Angler Adobe Flash exploit. Even though the ransomware claimed TeslaCrypt used asymmetric encryption, researchers from Cisco's Talos Group found that symmetric encryption was used and developed a decryption tool for it. This "deficiency" was changed in version 2.0, rendering it impossible to decrypt files affected by TeslaCrypt-2.0. By November 2015, security researchers from Kaspersky had been quietly circulating that there was a new weakness in version 2.0, but carefully keeping that knowledge away from the malware developer so that they could not fix the flaw. As of January 2016, a new version 3.0 was discovered that had fixed the flaw. A full behavior report, which shows BehaviorGraphs and ExecutionGraphs was published by JoeSecurity. Shut down In May 2016, the developers of TeslaCrypt shut down the ransomware and released the master decryption key, thus bringing an end to the ransomware. After a few days, ESET released a pub
https://en.wikipedia.org/wiki/Microbial%20dark%20matter
Microbial dark matter comprises the vast majority of microbial organisms (usually bacteria and archaea) that microbiologists are unable to culture in the laboratory, due to lack of knowledge or ability to supply the required growth conditions. Microbial dark matter is unrelated to the dark matter of physics and cosmology, but is so-called for the difficulty in effectively studying it as a result of its inability to be cultured by current methods. It is difficult to estimate its relative magnitude, but the accepted gross estimate is that as little as one percent of microbial species in a given ecological niche are culturable. In recent years, more effort has been directed towards deciphering microbial dark matter by means of recovering genome DNA sequences from environmental samples via culture independent methods such as single cell genomics and metagenomics. These studies have enabled insights into the evolutionary history and the metabolism of the sequenced genomes, providing valuable knowledge required for the cultivation of microbial dark matter lineages. Microbes with highly unusual DNA It has been suggested certain microbial dark matter genetic material could belong to a new (i.e., fourth) domain of life, although other explanations (e.g., viral origin) are also possible. See also Microbial ecology References External links Microbial Dark Matter project site Molecular biology Molecular biology techniques Microbiology
https://en.wikipedia.org/wiki/ZipcodeZoo
ZipcodeZoo was a free, online encyclopedia intended to document all living species and infraspecies known to science. It was compiled from existing databases. It offered one page for each living species, supplementing text with video, sound, and images where available. ZipcodeZoo was integrated into an app called Lookup Life. As of 2019 the site no longer works. ZipcodeZoo was an online database that collected the natural history, classification, species characteristics, conservation biology, and distribution information of thousands of species and infraspecies. It included over 800,000 photographs, 50,000 videos, 160,000 sound clips, and 3.2 million maps describing nearly 3.2 million species and infraspecies. Its content is now only available on the Internet Archive The site and its sister site lookup.life included a number of specialized search functions, such as identifying a bird species from its color, shape and other traits, including where it was seen; or generating a list of plants or animals likely to be found in or near a specific location (a zipcode, state, country, latitude/longitude, etc.). The searches could be restricted to specific taxa, or broad categories like reptiles or fish. A sound trainer could play multiple bird song recordings simultaneously. ZipcodeZoo drew on the Catalogue of Life for its basic species list, the Global Biodiversity Information Facility for its maps, Flickr for many of its photos, YouTube for videos, Xeno-canto for some of its sound recordings, the IUCN for conservation status, and other major sources. All the pages were published under one of the Creative Commons licenses. References Biodiversity databases Biology websites Online encyclopedias Internet properties established in 2004 Taxonomy (biology) Websites which use Wikipedia Encyclopedias of science Defunct websites
https://en.wikipedia.org/wiki/Mathematical%20Pie
Mathematical Pie is a British eight-page magazine published three times a year, and is aimed at mathematics students aged 10 to 14. It contains mathematical facts, puzzles, and challenges intended to aid teaching. It is published by the Mathematical Association, based in Leicester, and the current editor is Wil Ransome. The magazine was created in 1950 by Roland Collins. From May 1956 to May 1967, the publication carried the first 10,022 digits of decimal expansion of pi across the bottom of each page of successive issues. References External links Collection of issues 1-102 Student magazines published in the United Kingdom Education magazines Magazines established in 1950 Mathematics magazines Mass media in Leicester Triannual magazines published in the United Kingdom
https://en.wikipedia.org/wiki/Epiphytic%20bacteria
Epiphytic bacteria are bacteria which live non-parasitically on the surface of a plant on various organs such as the leaves, roots, flowers, buds, seeds and fruit. In current studies it has been determined that epiphytic bacteria generally don't harm the plant, but promote the formation of ice crystals. Some produce an auxin hormone which promotes plant growth and plays a role in the life cycle of the bacteria. Different bacteria prefer different plants and different plant organs depending on the organ's nutritional content, and depending on the bacteria's colonization system which is controlled by the host plant. Bacteria which live on leaves are referred to as phyllobacteria, and bacteria which live on the root system are referred to as rhizabacteria. They adhere to the plant surface forms as 1-cluster 2- individual bacterial cell 3- biofilm . The age of the organ also affects the epiphytic bacteria population and characteristics and has a role in the inhibition of phytopathogen on plant. Epiphytic bacteria found in the marine environment have a role in the nitrogen cycle. Species There are diverse species of epiphytic bacteria. An incomplete list: Citrobacter youngae Bacillus thuringiensis Enterobacter soli Bacillus tequilensis Bacillus aryabhattai Pantoea eucalypti Pseudomonas palleroniana Serratia nematodiphila Stenotrophomonas maltophilia Pseudomonas mosselii Pseudomonas putida Lysinibacillus xylanilyticus Enterobacter asburiae Acinetobacter johnsonii Pseudomonas macerans Classification Many epiphytic bacteria are rod-shaped, and classified as either gram negative or gram positive, pigmented or non-pigmented, fermentative or non-fermentative . Non-pigmented epiphytic bacteria have high a GC content in their genome, a characteristic which protects the bacteria from the ultraviolet rays of the sun. Because of this, these bacteria have special nutritional requirements. Current studies on epiphytic bacteria are underway for biotechnological applications
https://en.wikipedia.org/wiki/Army%20Chief%20Information%20Officer/G-6
In September 2020, the Army realigned the previously consolidated CIO/G-6 function into two separate roles, CIO and Deputy Chief of Staff, G-6, that report to the secretary of the Army and chief of staff of the Army, respectively. The realignment came after several months of planning and coordination. Lt. Gen. John Morrison was nominated to the Senate for promotion and assignment as the G-6 and confirmed, assuming that position in August 2020. The Department of the Army appointed Raj Iyer to serve as the chief information officer in November 2020. The United States Army chief information officer/G-6 (CIO/G-6) previously was a dual role, reporting both to the secretary of the Army as CIO, and also to the chief of staff of the Army as G-6. The roles were realigned in 2020. As CIO Report directly to the secretary of the Army Set strategic direction and objectives for LandWarNet Supervise Army command, control, communications, computers, and IT (C4IT) Manage enterprise IT architecture Direct delivery of C4IT in support of warfighting and enterprise requirements Assess and ensure compliance of IT security and national security systems As G-6 Advise chief of staff of the Army on planning, fielding, and execution of C4IT worldwide Army operations Develop and execute the plan for the Global Enterprise Network Implement Army information assurance Supervise C4IT, Signal support, Information security, Force structure and equipping activities in support of warfighting operations Oversee management of the Signal forces Planned realignment On June 11, 2020, the Army announced that the two roles of CIO and Deputy Chief of Staff, G-6 (DCS, G-6) would be realigned no later than August 31, 2020, with separate individuals responsible for each position. With the realignment: CIO core functions will be policy, governance, and oversight. Focus areas include: Information Environment, Cybersecurity, Enterprise Architecture, and Data Policy/Oversight/Governance, Enterprise Architecture
https://en.wikipedia.org/wiki/Threat%20Intelligence%20Platform
Threat Intelligence Platform (TIP) is an emerging technology discipline that helps organizations aggregate, correlate, and analyze threat data from multiple sources in real time to support defensive actions. TIPs have evolved to address the growing amount of data generated by a variety of internal and external resources (such as system logs and threat intelligence feeds) and help security teams identify the threats that are relevant to their organization. By importing threat data from multiple sources and formats, correlating that data, and then exporting it into an organization’s existing security systems or ticketing systems, a TIP automates proactive threat management and mitigation. A true TIP differs from typical enterprise security products in that it is a system that can be programmed by outside developers, in particular, users of the platform. TIPs can also use APIs to gather data to generate configuration analysis, Whois information, reverse IP lookup, website content analysis, name servers, and SSL certificates. Traditional approach to enterprise security The traditional approach to enterprise security involves security teams using a variety of processes and tools to conduct incident response, network defense, and threat analysis. Integration between these teams and sharing of threat data is often a manual process that relies on email, spreadsheets, or a portal ticketing system. This approach does not scale as the team and enterprise grows and the number of threats and events increases. With attack sources changing by the minute, hour, and day, scalability and efficiency is difficult. The tools used by large Security Operations Centers (SOCs), for example, produce hundreds of millions of events per day, from endpoint and network alerts to log events, making it difficult to filter down to a manageable number of suspicious events for triage. Threat intelligence platforms Threat intelligence platforms make it possible for organizations to gain an advantag
https://en.wikipedia.org/wiki/ETC%20Group%20%28eco-justice%29
The Action Group on Erosion, Technology, and Concentration (ETC), is an international organization dedicated to "the conservation and sustainable advancement of cultural and ecological diversity and human rights." 'ETC' is intended to be pronounced "et cetera." ETC often publishes opinions on scientific research by its staff and board members in topics including community and regional planning, ecology and evolutionary biology, and political science. History The ETC Group, formerly known as Rural Advancement Foundation International (RAFI) until September 1, 2001, has roots tracing back to the National Sharecroppers Fund established during the 1930s. The Fund, initiated by Eleanor Roosevelt and others, aimed to alleviate the challenges faced by predominantly black tenant farmers in the United States. In the early 1970s, Pat Mooney, Hope Shand, and Cary Fowler initiated work on seed-related issues under the auspices of the Rural Advancement Foundation. Over time, they established an international branch focused on advocating for farmers' rights in the global south. RAFI was a pioneer in civil society research, critiques, and advocacy related to farmers' rights and seed monopoly laws. The organization opposed the adoption of genetic engineering in agriculture, patents on life, biopiracy (a term coined by RAFI), and emerging life science technologies such as terminator technology, genomic technologies, and nanotechnology. RAFI played a crucial role in advocating for and influencing UN recognition of farmers' rights and the establishment of the International Treaty on Plant Genetic Resources for Food and Agriculture. In order to secure nonprofit status in the United States, RAFI conducted a name change contest on their website in early 2001, eventually selecting the name ETC Group (etcetera) after considering numerous suggestions from the public. Geoengineering The organization, has actively advocated against geo-engineering, as demonstrated through their "Hands
https://en.wikipedia.org/wiki/5-orthoplex%20honeycomb
In the geometry of hyperbolic 5-space, the 5-orthoplex honeycomb is one of five paracompact regular space-filling tessellations (or honeycombs). It is called paracompact because it has infinite vertex figures, with all vertices as ideal points at infinity. With Schläfli symbol {3,3,3,4,3}, it has three 5-orthoplexes around each cell. It is dual to the 24-cell honeycomb honeycomb. Related honeycombs It is related to the regular Euclidean 4-space 16-cell honeycomb, {3,3,4,3}, with 16-cell (4-orthoplex) facets, and the regular 4-polytope 24-cell, {3,4,3} with octahedral (3-orthoplex) cell, and cube {4,3}, with (2-orthoplex) square faces. See also List of regular polytopes References Coxeter, Regular Polytopes, 3rd. ed., Dover Publications, 1973. . (Tables I and II: Regular polytopes and honeycombs, pp. 294–296) Coxeter, The Beauty of Geometry: Twelve Essays, Dover Publications, 1999 (Chapter 10: Regular honeycombs in hyperbolic space, Summary tables II,III,IV,V, p212-213) Honeycombs (geometry)
https://en.wikipedia.org/wiki/24-cell%20honeycomb%20honeycomb
In the geometry of hyperbolic 5-space, the 24-cell honeycomb honeycomb is one of five paracompact regular space-filling tessellations (or honeycombs). It is called paracompact because it has infinite facets, whose vertices exist on 4-horospheres and converge to a single ideal point at infinity. With Schläfli symbol {3,4,3,3,3}, it has three 24-cell honeycombs around each cell. It is dual to the 5-orthoplex honeycomb. Related honeycombs It is related to the regular Euclidean 4-space 24-cell honeycomb, {3,4,3,3}, and the hyperbolic 5-space order-4 24-cell honeycomb honeycomb. See also List of regular polytopes References Coxeter, Regular Polytopes, 3rd. ed., Dover Publications, 1973. . (Tables I and II: Regular polytopes and honeycombs, pp. 294–296) Coxeter, The Beauty of Geometry: Twelve Essays, Dover Publications, 1999 (Chapter 10: Regular honeycombs in hyperbolic space, Summary tables II,III,IV,V, p212-213) Honeycombs (geometry)