source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Golo%20%28programming%20language%29 | Golo is computer software, a programming language for the Java virtual machine (JVM). It is simple, with dynamic, weak typing. It was created in 2012 as part of the research activities of the DynaMid group of the Centre of Innovation in Telecommunications and Integration of service (CITI) Laboratory at Institut national des sciences appliquées de Lyon (INSA). It is distributed as free and open-source software under the Eclipse Public License 2.0.
History
It has been built as a showcase on how to build a language runtime with invokedynamic. Golo is largely interoperable with the programming language Java and other JVM languages (e.g., numeric types are boxing classes from java.lang, and collection literals leverage java.util classes), that runs on the JVM.
In June 2015, Golo became an official Eclipse Foundation project. The project was terminated in September 2022.
Technical details
The language features have been initially designed around the abilities of invokedynamic – JSR 292 that appeared in Java SE 7. Golo uses ahead-of-time compilation of bytecode. While the bytecode remains stable over a program execution, the invokedynamic-based reconfigurable call sites support the adaptive dispatch mechanisms put in place for helping the HotSpot just-in-time compiler (JIT) to extract reasonable performance.
Publications
Baptiste Maingret, Frédéric Le Mouël, Julien Ponge, Nicolas Stouls, Jian Cia and Yannick Loiseau. Towards a Decoupled Context-Oriented Programming Language for the Internet of Things. To appear in the 7th International Workshop on Context-Oriented Programming hosted at ECOOP 2015. Prague, Czech Republic. July 2015.
Julien Ponge, Frédéric Le Mouël, Nicolas Stouls, Yannick Loiseau. Opportunities for a Truffle-based Golo Interpreter. Technical report arXiv:1505.06003 (cs.PL) and HAL-INRIA deposit
Julien Ponge, Frédéric Le Mouël and Nicolas Stouls. Golo, a Dynamic, Light and Efficient Language for Post-Invokedynamic JVM. In Procs. of PPPJ'13. Stuttga |
https://en.wikipedia.org/wiki/Emmanuelle%20Charpentier | Emmanuelle Marie Charpentier (; born 11 December 1968) is a French professor and researcher in microbiology, genetics, and biochemistry. As of 2015, she has been a director at the Max Planck Institute for Infection Biology in Berlin. In 2018, she founded an independent research institute, the Max Planck Unit for the Science of Pathogens. In 2020, Charpentier and American biochemist Jennifer Doudna of the University of California, Berkeley, were awarded the Nobel Prize in Chemistry "for the development of a method for genome editing" (through CRISPR). This was the first science Nobel Prize ever won by two women only.
Early life and education
Born in 1968 in Juvisy-sur-Orge in France, Charpentier studied biochemistry, microbiology, and genetics at the Pierre and Marie Curie University (which became the Faculty of Science of Sorbonne University) in Paris. She was a graduate student at the Institut Pasteur from 1992 to 1995 and was awarded a research doctorate. Charpentier's PhD work investigated molecular mechanisms involved in antibiotic resistance. Her paternal grandfather was an Armenian who escaped to France during the Armenian genocide and met his wife in Marseille.
Career and research
Charpentier worked as a university teaching assistant at Pierre and Marie Curie University from 1993 to 1995 and as a postdoctoral fellow at the Institut Pasteur from 1995 to 1996. She moved to the US and worked as a postdoctoral fellow at Rockefeller University in New York from 1996 to 1997. During this time, Charpentier worked in the lab of microbiologist Elaine Tuomanen. Tuomanen's lab investigated how the pathogen Streptococcus pneumoniae utilizes mobile genetic elements to alter its genome. Charpentier also helped to demonstrate how S. pneumoniae develops vancomycin resistance.
Charpentier worked as an assistant research scientist at the New York University Medical Center from 1997 to 1999. There she worked in the lab of Pamela Cowin, a skin-cell biologist interested in |
https://en.wikipedia.org/wiki/Ecosystem%20Functional%20Type | Ecosystem Functional Type (EFT) is an ecological concept to characterize ecosystem functioning. Ecosystem Functional Types are defined as groups of ecosystems or patches of the land surface that share similar dynamics of matter and energy exchanges between the biota and the physical environment. The EFT concept is analogous to the Plant Functional Types (PFTs) concept, but defined at a higher level of the biological organization. As plant species can be grouped according to common functional characteristics, ecosystems can be grouped according to their common functional behavior.
One of the most used approaches to implement this concept has been the identification of EFTs from the satellite-derived dynamics of primary production, an essential and integrative descriptor of ecosystem functioning.
History
In 1992, Soriano and Paruelo proposed the concept of Biozones to identify vegetation units that share ecosystem functional characteristics using time-series of satellite images of spectral vegetation indices. Biozones were later renamed to EFTs by Paruelo et al. (2001), using an equivalent definition and methodology. was one of the first authors that used the term EFT as "aggregated components of ecosystems whose interactions with one another and with the environment produce differences in patterns of ecosystem structure and dynamics". Walker (1997) proposed the use of a similar term, vegetation functional types, for groups of PFTs in sets that constitute the different states of vegetation succession in non-equilibrium ecosystems. The same term was applied by Scholes et al. in a wider sense for those areas having similar ecological attributes, such as PFTs composition, structure, phenology, biomass or productivity. Several studies have applied hierarchy and patch dynamic theories for the definition of ecosystem and landscape functional types at different spatial scales, by scaling-up emergent structural and functional properties from patches to regions. Valentin |
https://en.wikipedia.org/wiki/Paysbuy | Paysbuy is a payment processor and one of Thailand's three major payment service providers. It is a subsidiary of DTAC.
Paysbuy is licensed by the Bank of Thailand to operate an e-money business and is accredited with Trustmark (DBD Verified) by the Department of Business Development, Ministry of Commerce.
History
Paysbuy was founded in 2004 by Aung Kyaw Moe and Suchote Cheewakoseth.
In 2008, DTAC acquired the majority stake in the company. Paysbuy was the first e-wallet service in Thailand and was acquired by Omise in 2017.
See also
PayPal
DTAC
True Money
References
External links
Companies based in Bangkok
Online payments
Financial services companies of Thailand |
https://en.wikipedia.org/wiki/TrueMoney | TrueMoney is a financial technology brand, providing e-payment services in Southeast Asia. In Thailand, the platform includes TrueMoney Wallet, WeCard by MasterCard, TrueMoney Cash Card, Kiosk, Express, Payment Gateway and Remittance.
History
TrueMoney was founded in 2003 as part of True Corporation but now reorganized under Ascend Group in 2014, a spin-off of True Corporation and a subsidiary of Charoen Pokphand Group.
TrueMoney features a remittance service, and has initiated cross-border remittance from Myanmar and Cambodia, to Thailand.
Products
Payment gateway
Stored value card
Electronic bill payment
Cash on delivery
Controlled payment number
Regional expansion
TrueMoney has offices in Thailand, Vietnam, Cambodia, Myanmar, Indonesia and the Philippines. TrueMoney has licenses to operate e-money in almost every Southeast Asian country. As the flagship venture, Thailand's TrueMoney counts Google and Alipay as partner payment platforms.
See also
PayPal
Paysbuy
References
Companies based in Bangkok
Charoen Pokphand
Ascend Group
True Corporation
Online payments
Financial services companies of Thailand
Thai brands |
https://en.wikipedia.org/wiki/Desuspension | In topology, a field within mathematics, desuspension is an operation inverse to suspension.
Definition
In general, given an n-dimensional space , the suspension has dimension n + 1. Thus, the operation of suspension creates a way of moving up in dimension. In the 1950s, to define a way of moving down, mathematicians introduced an inverse operation , called desuspension. Therefore, given an n-dimensional space , the desuspension has dimension n – 1.
In general, .
Reasons
The reasons to introduce desuspension:
Desuspension makes the category of spaces a triangulated category.
If arbitrary coproducts were allowed, desuspension would result in all cohomology functors being representable.
See also
Cone (topology)
Equidimensionality
Join (topology)
References
External links
Desuspension at an Odd Prime
When can you desuspend a homotopy cogroup?
Topology
Homotopy theory |
https://en.wikipedia.org/wiki/Open%20Food%20Facts | Open Food Facts is a free, online and crowdsourced database of food products from around the world licensed under the Open Database License (ODBL) while its artwork—uploaded by contributors—is distributed under a Creative Commons Attribution–Share Alike license.
The project was launched on 19 May 2012 by French programmer Stéphane Gigandet during the Food Revolution Day organized by Jamie Oliver and has won the 2013 Dataconnexions Award from Etalab and the 2015 OKFN Award from Open Knowledge.
In May 2016, its database contained more than 80,000 products from 141 countries. In June 2017, thanks to the growing ecosystem of apps and open data imports from various countries, this number rose to 880,000. In October 2019 OFF passed the 1,000,000 products milestone.
By the 10th anniversary in May 2022, the database already contained 2.3 million products from 182 countries.
Overview
The project gathers information and data on food products from around the world.
For each item, the database stores its generic name, quantity, type of packaging, brand, category, manufacturing or processing locations, countries and stores where the product is sold, list of ingredients, any traces (for allergies, dietary laws or any specific diet), food additives and nutritional information. The nutritional value is calculated using the Nutri-Score.
Each contributor can add or edit food items based on the information explicitly shown on the package. As a result, the GTIN (Global Trade Item Number) embedded in the barcode on the packaging of the product (when available) is generally used as the identifier. Mobile phone applications allow for capturing photos and information that are reprocessed manually by volunteers.
Due to similar mechanisms for modification, extension, or deletion of content and structure, the project is sometimes compared to Wikipedia in the media.
Reuses
The data is reused by various projects on issues related to palm oil, sugar, and location of the producers.
The |
https://en.wikipedia.org/wiki/Porn%20Time | Porn Time was an online streaming application formed from Popcorn Time, for the purpose of viewing pornographic content.
It was released on June 6, 2015 and has since acquired a large user base.
The desktop app was downloaded by 450,000 users in the first week after it launched, overloading the download servers. Torrentfreak quoted the development team saying: “We’re pretty shocked and find it a little hard to believe and amusing in a way. But Porn Time, the Popcorn Time for Porn, became an Internet phenomenon just one week after it went live!”
The country which has the most downloads of Porn Time is the US, followed by France and Brazil. Porn Time was initially released for Windows, Mac and Linux, and is also available for Android devices. According to the team leader, Porn Time was created due to the demand for porn in Popcorn Time.
See also
Popcorn Time
References
External links
2015 software
Free BitTorrent clients
Free media players
Peer-to-peer
Streaming media systems
Streaming software
Video on demand services |
https://en.wikipedia.org/wiki/Automatic%20content%20recognition |
How it works
To start the recognition, a short media clip (audio, video, or both) is selected from within a media file or captured as displayed on a device such as a smart TV. Using techniques such as fingerprinting and watermarking, the selected content is compared by the ACR software with a database of known recorded works. If the fingerprint of the media clip finds a match, the ACR software returns the corresponding metadata regarding the media as well as other associated or recommended content back to the client application for display to the user, or for collection by the device manufacturer or a data aggregator.
Fingerprints and watermarking
Two leading methodologies for audio-based ACR are acoustic fingerprinting and watermarking. Similarly, video fingerprinting is used to facilitate ACR for visual media.
Acoustic fingerprinting generates unique fingerprints from the audio content itself. Fingerprinting techniques are agnostic to content format, codec, bit rate and compression techniques. This makes employment of acoustic fingerprinting possible across various networks and channels and is widely used for interactive TV, second screen application, and content monitoring sectors. Popular apps like Shazam, YouTube, Facebook, Thetake, WeChat and Weibo reportedly use audio fingerprinting methodology to recognize content played from a TV to trigger additional features like votes, lotteries, topics or purchases.
In contrast to fingerprinting, digital watermarking require the inclusion of digital "tags" embedded within the digital content stream prior to distribution. For example, a broadcast encoder might insert a watermark every few seconds that could be used to identify the broadcast channel, program ID, and time stamp. This watermark is normally inaudible or invisible to the users, but is detectable by display devices like phones or tablets which can read the watermarks to identify the content it is playing. Watermarking technology is also utilized in the |
https://en.wikipedia.org/wiki/ESP8266 | The ESP8266 is a low-cost Wi-Fi microchip, with built-in TCP/IP networking software, and microcontroller capability, produced by Espressif Systems in Shanghai, China.
The chip was popularized in the English-speaking maker community in August 2014 via the ESP-01 module, made by a third-party manufacturer Ai-Thinker. This small module allows microcontrollers to connect to a Wi-Fi network and make simple TCP/IP connections using Hayes-style commands. However, at first, there was almost no English-language documentation on the chip and the commands it accepted. The very low price and the fact that there were very few external components on the module, which suggested that it could eventually be very inexpensive in volume, attracted many hackers to explore the module, the chip, and the software on it, as well as to translate the Chinese documentation.
The ESP8285 is a similar chip with a built-in 1 MiB flash memory, allowing the design of single-chip devices capable of connecting via Wi-Fi.
These microcontroller chips have been succeeded by the ESP32 family of devices.
Features
Processor: L106 32-bit RISC microprocessor core based on the Tensilica Diamond Standard 106Micro running at 80 or 160 MHz
Memory:
32 KiB instruction RAM
32 KiB instruction cache RAM
80 KiB user-data RAM
16 KiB ETS system-data RAM
External QSPI flash: up to 16 MiB is supported (512 KiB to 4 MiB typically included)
IEEE 802.11 b/g/n Wi-Fi
Integrated TR switch, balun, LNA, power amplifier and matching network
WEP or WPA/WPA2 authentication, or open networks
17 GPIO pins
Serial Peripheral Interface Bus (SPI)
I²C (software implementation)
I²S interfaces with DMA (sharing pins with GPIO)
UART on dedicated pins, plus a transmit-only UART can be enabled on GPIO2
10-bit ADC (successive approximation ADC)
Pinout of ESP-01
The pinout is as follows for the common ESP-01 module:
GND, Ground (0 V)
GPIO 2, General-purpose input/output No. 2
GPIO 0, General-purpose input/output No. 0
|
https://en.wikipedia.org/wiki/Koch%27s%20triangle | Koch's triangle, named after the German pathologist Walter Koch, is an anatomical area located in the superficial paraseptal endocardium of the right atrium, which its boundaries are the coronary sinus orifice, tendon of Todaro, and septal leaflet of the right atrioventricular valve. It is anatomically significant because the atrioventricular node is located at the apex of the triangle. Also the elements anatomically near to it are the membranous septum and the Eustachian ridge. This triangle ends at the site of the coronary sinus orifice inferiorly and, continuous with the sub-Eustachian pouch. The tendon of Todaro forms the hypotenuse of the triangle and the base is formed by the coronary sinus orifice and the vestibule of the right atrium. Variations in the size of Koch's triangle are common.
References
Further reading
External links
Cardiac anatomy
Human anatomy
Anatomy named for one who described it |
https://en.wikipedia.org/wiki/Grand%20Kingdom | Grand Kingdom is a tactical role-playing video game developed by Monochrome Corporation for the PlayStation 4 and PlayStation Vita. It was published by Spike Chunsoft in Japan in 2015, and NIS America in the West in 2016. Following a mercenary group in the employ of different nations formed in the wake of a collapsed empire, the player engages in turn-based combat while navigating paths on maps similar to a board game. Online competitive asynchronous multiplayer where chosen teams of characters fight for a chosen nation was originally featured, but this ended as servers were shut down by 2019 in the West and 2022 in Japan.
Grand Kingdom began development in 2011 under director Tomohiko Deguchi, a former Vanillaware staff member, using similar design and aesthetic concepts to Grand Knights History (2011). The asynchronous multiplayer was developed to prove its viability in Japan, allowing a casual time investment from players. Manga artist Chizu Hashii designed the characters, who was asked to avoid moe design traits. The music was composed by a team from Basiscape, including Mitsuhiro Kaneda and Masaharu Iwata; it was one of Iwata's last original projects for Basiscape before leaving in 2017.
The game was announced in June 2015, when development was around 65% complete. Single-player downloadable content was released in Japan featuring scenarios around the nations and new player units between 2015 and 2016, all of which were bundled into the Western release. Reception was generally positive, with praise going to its gameplay and art design, though its audio saw some mixed response, and critics were generally indifferent to its narrative.
Gameplay
Grand Kingdom is a tactical role-playing video game (RPG) in which players take on the role of a mercenary commander, who forms squads of fighters to complete missions for the four warring nations of Resonail. The game opens with the player naming the player character and mercenary group. The game is divided between sing |
https://en.wikipedia.org/wiki/Fare%20Thee%20Well%3A%20Celebrating%2050%20Years%20of%20the%20Grateful%20Dead | Fare Thee Well: Celebrating 50 Years of the Grateful Dead was a series of concerts that were performed by most of the surviving members of the Grateful Dead: Bob Weir, Phil Lesh, Bill Kreutzmann and Mickey Hart, joined by Trey Anastasio, Bruce Hornsby and Jeff Chimenti, to celebrate the 50th anniversary of the Grateful Dead. The performances took place at Santa Clara's Levi Stadium on June 27 and 28, 2015 and Chicago's Soldier Field on July 3, 4 and 5, 2015. These performances marked the first time Weir, Lesh, Kreutzmann and Hart had performed together since the Dead's 2009 tour and was publicized as the final time the musicians would all perform together.
Tickets
The three shows in Chicago were initially announced on January 16, 2015 as the only three Fare Thee Well performances. Tickets were first made available through the Grateful Dead's GDSTOO mail order system. Deadheads mailed in more than 60,000 envelopes, requesting a total of more than 360,000 tickets. As a result, only about one in ten requests was fulfilled. On February 28, 2015 when tickets became available on Ticketmaster, over 500,000 people logged on to purchase tickets, which set a new Ticketmaster record for ticket demand for a concert. Following the initial sellout of these concerts, seats were made available behind the stage, and prices on secondary ticket sites such as StubHub averaged $2,000 each.
Due to the high demand for the Chicago concerts, concert promoter Peter Shapiro announced two more concerts in Santa Clara, California on June 27 and 28, 2015. To help prevent scalpers from obtaining tickets for resale to these concerts, tickets were only made available through an online lottery. Tickets to the Santa Clara shows were initially sold at very high prices on StubHub but ended up dropping as low as $19 by the week before the concerts. Prices for the Chicago concerts also fell in the weeks prior to the shows but were still averaging about $200.
The first show in Chicago drew an attendanc |
https://en.wikipedia.org/wiki/Mus%C3%A9e%20protestant | The Musée protestant, created in 2003 by the Fondation pasteur Eugène Bersier, recounts the history of Protestantism in France from the 16th century to the present.
History
In March 1994, The Fédération protestante de France authorized the Fondation pasteur Eugène Bersier to find a new location for its offices in Paris, France. After evolving toward a memorial site and a museum of the Bible and of Protestantism, the project was abandoned.
In 2000, unable to participate in the creation of an actual museum on the history of Protestantism, the Foundation decided, with the Historical Society of French Protestantism, to set up a museum on the Internet: the Virtual Museum of French Protestantism, which seeks to share the specific characteristics of Protestants through the history of Protestantism.
The museum site, which can be visited free of charge, opened in January 2003. It quickly attracted a wide audience, which increased with the offering of English and German versions of the site, thanks to the support of the Île-de-France region and the Ministry of culture.
In 2014, the design and navigation of the site were completely revamped while preserving the existing content.
In 2018, the Museum changed its name and became the Musée protestant (the Protestant Museum).
Content
The Musée protestant offers over a thousand articles, classified into four headings, illustrated by 3,000 images. The articles are augmented with video clips, documents and bibliographic references and are accessible in French, English and German. The articles can also be organized into tours that group these articles by theme in a relevant order, similar to guided tours. On the home page, a time line illustrates the major dates of the history of Protestantism.
The four main headings of the museum are the following:
History,
Key figures,
Themes,
Art – Heritage.
A few exhibits that have been presented by Protestant museums are also offered with specific articles.
Since May 4, 2015, the Mus |
https://en.wikipedia.org/wiki/Fecal%20sludge%20management | Fecal sludge management (FSM) (or faecal sludge management in British English) is the storage, collection, transport, treatment and safe end use or disposal of fecal sludge. Together, the collection, transport, treatment and end use of fecal sludge constitute the "value chain" or "service chain" of fecal sludge management. Fecal sludge is defined very broadly as what accumulates in onsite sanitation systems (e.g. pit latrines, septic tanks and container-based solutions) and specifically is not transported through a sewer. It is composed of human excreta, but also anything else that may go into an onsite containment technology, such as flushwater, cleansing materials (e.g. toilet paper and anal cleansing materials), menstrual hygiene products, grey water (i.e. bathing or kitchen water, including fats, oils and grease), and solid waste. Fecal sludge that is removed from septic tanks is called septage.
It is estimated that one-third of the world’s population is served by onsite sanitation, and that in low-income countries less than 10% of urban areas are served by sewers. In low-income countries, the majority of fecal sludge is discharged untreated into the urban environment, placing a huge burden on public and environmental health. Hence, FSM plays a critical role in safely managed sanitation and the protection of public health. FSM services are provided by a range of formal and informal private sector services providers, local governments, water authorities, and public utilities. This can also result in unreliable services with relatively high costs at the household level.
Fecal sludge collection can be arranged on a scheduled basis or on a call-for-service basis (also known as on-demand, on-request, or non-scheduled services). The collected fecal sludge may be manually or mechanically emptied, and then transported to treatment plants with a vacuum truck, a tank and pump mounted on a flatbed truck, a small tank pulled by a motorcycle, or in containers on a handcart |
https://en.wikipedia.org/wiki/Gauge%20%28software%29 | Gauge is a light weight cross-platform test automation tool. It uses markdown to author test cases and scenarios. Its modular architecture makes it flexible and scalable.
Markdown
Gauge specifications are written in the business language. For example,
Find movies playing near me
===========================
The System Under Test in this example is a web application to find and book movie tickets
Search for movies
-----------------
* Specify location as "Bangalore"
* Search for movie "Star Wars"
* Verify that "INOX" is playing "Star Wars" at "7:30 pm"
Book movie ticket
-----------------
* Sign up with email address <user@example.com>
* Complete the verification
* Select location as "Bangalore", the movie "Star Wars" and "3" seats
* Confirm and pay
* Verify the "e-ticket" has been sent to the registered email.
This Gauge specification describes a feature of the System Under Test. The scenarios Search for movies and Book movie ticket represent a flow in this specification. Steps are executable parts of a specification.
Test Code
Specifications in Markdown abstracts code behind the steps.
For example, the step Specify location as "Bangalore" implementation in Java would look like
// This Method can be written in any java class as long as it is in classpath.
public class StepImplementation {
@Step("Specify location as <location>")
public void helloWorld(String location) {
// Step implementation
}
}
Gauge has Support for writing test code in:
Java
Ruby
C#
The Community contributed language runners are:
JavaScript
Python
Golang
Execution
Gauge tests can be executed from the command line or the supported IDEs.
The default command gauge specs run the tests sequentially.
The command gauge -p specs will execute the tests in Parallel.
Reports
Gauge gives comprehensive test reports that provides the required details of a given run.
IDE support
Gauge's IDE support helps to write and maintain the test suite.
References
External links
Free |
https://en.wikipedia.org/wiki/Carrier%20frequency%20offset | Carrier frequency offset (CFO) is one of many non-ideal conditions that may affect in baseband receiver design. In designing a baseband receiver, we should notice not only the degradation invoked by non-ideal channel and noise, we should also regard RF and analog parts as the main consideration. Those non-idealities include sampling clock offset, IQ imbalance, power amplifier, phase noise and carrier frequency offset nonlinearity.
Carrier frequency offset often occurs when the local oscillator signal for down-conversion in the receiver does not synchronize with the carrier signal contained in the received signal. This phenomenon can be attributed to two important factors: frequency mismatch in the transmitter and the receiver oscillators; and the Doppler effect as the transmitter or the receiver is moving.
When this occurs, the received signal will be shifted in frequency. For an OFDM system, the orthogonality among sub carriers is maintained only if the receiver uses a local oscillation signal that is synchronous with the carrier signal contained in the received signal. Otherwise, mismatch in carrier frequency can result in inter-carrier interference (ICI). The oscillators in the transmitter and the receiver can never be oscillating at identical frequency. Hence, carrier frequency offset always exists even if there is no Doppler effect.
In a standard-compliant communication system, such as the IEEE 802.11 WLAN the oscillator precision tolerance is specified to be less than ±20 ppm, so that CFO is in the range from - 40 ppm to +40 ppm.
Example
If the TX oscillator runs at a frequency that is 20 ppm above the nominal frequency and if the RX oscillator is running at 20 ppm below, then the received baseband signal will have a CFO of 40 ppm. With a carrier frequency of 5.2 GHz in this standard, the CFO is up to ±208 kHz. In addition, if the transmitter or the receiver is moving, the Doppler effect adds some hundreds of hertz in frequency spreading.
Compared to th |
https://en.wikipedia.org/wiki/FlexGen%20Power%20Systems | FlexGen is a United States energy storage technology company. The company is headquartered in Durham, North Carolina and was founded in 2009.
FlexGen is the developer of the FlexGen HybridOS energy management system, which is capable of automating the dispatch of energy storage, renewable, and conventional power generation to provide enhanced capability and lower cost of energy.
FlexGen originally designed energy storage products for the United States Military, these hybrid power systems were sold to the US Marine Corps, US Army, US Navy SEALs, and the Joint Special Operations Forces-Afghanistan. Systems that were fielded in those military branches showed at least 52% reduction in fuel consumption and an 80% reduction in generator runtime.
Venture Capital Funding
On August 3, 2015, FlexGen Power Systems completed a $25.5M Series A venture capital funding round. Led by Denver-based Altira Group, the venture funding round also included investments from General Electric Ventures and Caterpillar Ventures.
On August 25, 2021, it was announced that Apollo Global Management Inc. invested $150M into FlexGen.
References
External links
www.flexgen.com: Official website
Energy storage
Electrical generators
Energy companies of the United States
Technology companies of the United States
Manufacturing companies based in Texas
Companies based in Houston
American companies established in 2009
Energy companies established in 2009
Manufacturing companies established in 2009
Non-renewable resource companies established in 2009
Technology companies established in 2009
2009 establishments in Texas
Petroleum in Texas |
https://en.wikipedia.org/wiki/Intellec | The Intellec computers were a series of early microcomputers Intel produced in the 1970s as a development platform for their processors. The Intellec computers were among the first microcomputers ever sold, predating the Altair 8800 by at least two years.
Introduction
The first series of Intellecs included the Intellec 4 for the 4004, the Intellec 4 Mod 40 for the 4040, the Intellec 8 for the 8008, and the Intellec 8 Mod 80 for the 8080.
The Intellec 4 and 8 were introduced at the June 1973 National Computer Conference in the New York Coliseum. The Intellec computers were sold not to the general public, only to developers, and a very limited number were built. The Intellec 8 retailed for $2,395.
Features
The Intellecs have resident monitors stored in ROMs. They also included an assembler, linker, and debugger, as well as the ability to act as an in-circuit emulator. Additionally, a PL/M compiler, cross-assembler and simulator were available, which allowed writing programs in a higher-level language than assembly. FORTRAN compilers were also available. The Intellec 8 supported a Teletype operating at 110 baud, a high speed punched paper tape reader and a CRT terminal at 1200 baud.
The Intellec 8 is able to address up to 16 K of memory and came with 5 K pre-installed. The Intellec 4 came with 1 K of PROM and 4 K of RAM for instruction memory, as well as 320 4-bit words of data memory, expandable to 2560 words. The Intellec 8 ran with a two-phase clock of 800 kHz, resulting in an instruction cycle time of 12.5 us. The Intellec 4 ran at a slower clock rate of 750 kHz, but had a faster instruction cycle time of 10.8 us. Both systems were available in "Bare Bones" editions, which omitted the front panel, power supply, and completed chassis; instead, it is designed to mount into a rack. Both systems also weighed .
Usage
Intel did not market the Intellec as a general-purpose microcomputer, but rather as a development system. As the first microprocessors were intended |
https://en.wikipedia.org/wiki/MedCity%20%28London%29 | MedCity (London) describes the collaboration between the Mayor of London and the capital's health science centres of three premier academic institutions Imperial College London, King's College London and University College London comprising the London part of the 'golden triangle'. MedCity was launched in 2014 to increase collaboration between Imperial College, King’s College and University College London — the capital’s three main science universities — and promote the broader 'golden triangle' between London, Cambridge and Oxford to investors. This collaboration is supported by HEFCE and London & Partners and works with the life sciences sector across the greater south-east of England.
MedCity is funded by King's Health Partners, Imperial College Academic Health Science Centre, UCL Partners and the Mayor of London.
Main areas of work
MedCity is positioned in the centre of academic research, industry, investors and the London authority to facilitate and enable various services with a focus on providing a front door service, promote the region, develop an entrepreneurial environment and explain the market.
Front door service
MedCity acts as a ‘front door’ for businesses, entrepreneurs, investors and academics to come to when they are confused by the complex environment across the region. MedCity welcomes, directs and supports large pharmaceutical companies to digital entrepreneurs, businesses seeking research collaborations and investors looking for investment and considering setting up new funds. Tightly involved with its partners, MedCity provides signposting and relationship formation within and across the region. MedCity also provides help in finding lab, office, shared or co-located work spaces or for specialist laboratories and equipment as the greater south east offers a wide variety of options.
Promote the region
Promoting the region as a base for life science investment and growth, MedCity is London's life science representative at business, academic a |
https://en.wikipedia.org/wiki/Neoichnology | Neoichnology (Greek néos „new“, íchnos „footprint“, logos „science“) is the science of footprints and traces of extant animals. Thus, it is a counterpart to paleoichnology, which investigates tracks and traces of fossil animals. Neoichnological methods are used in order to study the locomotion and the resulting tracks of both invertebrates and vertebrates. Often these methods are applied in the field of palaeobiology to gain a deeper understanding of fossilized footprints.
Neoichnological methods
Working with living animals
Typically, when working with living animals, a race track is prepared and covered with a substrate, which allows for the production of footprints, i.e. sand of varying moisture content, clay or mud. After preparation, the animal is lured or shooed over the race track. This results in the production of numerous footprints that constitute a complete track. In some cases the animal is filmed during track production in order to subsequently study the impact of the animal's velocity or its behavior on the produced track. This poses an important advantage of working with living animals: changes in speed or direction, resting, slippage or moments of fright become visible in the produced tracks. After track production and prior to reuse, the track can be photographed, drawn or molded. Changes in the experimental setup are possible throughout the experiment, i. e. regulation of the moisture content of the substrate. As an alternative, also tracks of free living animals can be studied in nature (i.e. nearby lakes) and without any special experimental setup. However, without the standardized environment of the lab, matching the tracks with the behavior of the animal during track production is undoubtedly harder.
Working with foot models or severed limbs
Another field of methods is the experimental work done with foot models or severed limbs. With these methods, the natural behavior of the animal is excluded from the analysis. In a typical experimen |
https://en.wikipedia.org/wiki/Stomatol%20Sign | The Stomatol Sign is Sweden's first animated commercial display and the oldest still working. It represents a toothbrush and a toothpaste tube of the Swedish brand Stomatol. It was first erected on November 22, 1909, on the old Katarina Elevator, in the area of Slussenområdet, Stockholm.
References
Brands of toothpaste
Swedish brands
Signage |
https://en.wikipedia.org/wiki/Brivo | Brivo, Inc. is a smart building company providing cloud-based access control and video surveillance products for physical security and internet of things applications.
Executive Leadership
Steve Van Till is an early Brivo hire (initially as CTO) and today serves as CEO. Dean Drako is chairman of the board.
History
Brivo was co-founded in 1999 by Carter Griffin, Tim Ogilvie and Mark Stein. After completing a series A financing round of individual investors, the company secured an investment from IDEO Ventures, whose affiliate IDEO product design became its development partner for Brivo's first product – a last mile delivery solution for unattended and asynchronous delivery of parcels. In 2002, Griffin, Ogilvie and Stein transitioned the company to what became Brivo's primary market with the introduction of Brivo's building access control SaaS platform. In 2002, Brivo introduced cloud-based access control to the physical security market. The physical access control system works with door card readers and similar devices, and locks or unlock things once an individual has been authenticated.
Brivo released the ACS5000 access control system in 2005, with Ethernet and GSM cellular connectivity options. In 2007, Brivo introduced its XML application programming interface (API). In 2017, Brivo introduced the availability of two new door access controllers, the ACS6000 and the ACS300, to complement its existing product lines, as well as integration with the Authentic Mercury open platform.
Brivo introduced its IP door controller (IPDC) in 2011, an Ethernet access control panel in a compact form factor, with power over ethernet and FIPS 140-2 validated encryption. IPDC used standard network cabling to the door. In 2013, Brivo announced Brivo Onair, a cloud-based access control and video surveillance physical security system for businesses that automates facility access from one interface.
As of 2015, Brivo stated its cloud-based access control system serviced more tha |
https://en.wikipedia.org/wiki/ERP%20security | ERP Security is a wide range of measures aimed at protecting Enterprise resource planning (ERP) systems from illicit access ensuring accessibility and integrity of system data. ERP system is a computer software that serves to unify the information intended to manage the organization including Production, Supply Chain Management, Financial Management, Human Resource Management, Customer Relationship Management, Enterprise Performance Management.
Review
ERP system integrates business processes enabling procurement, payment, transport, human resources management, product management, and financial planning.
As ERP system stores confidential information, the Information Systems Audit and Control Association (ISACA) recommends to regularly conduct a comprehensive assessment of ERP system security, checking ERP servers for software vulnerabilities, configuration errors, segregation of duties conflicts, compliance with relevant standards and recommendations, and recommendations of vendors.
Causes for vulnerabilities in ERP systems
Complexity
ERP systems process transactions and implement procedures to ensure that users have different access privileges. There are hundreds of authorization objects in SAP permitting users to perform actions in the system. In case of 200 users of the company, there are approximately 800,000 (100*2*20*200) ways to customize security settings of ERP systems. With the growth of complexity, the possibility of errors and segregation of duties conflicts increases.
Specificity
Vendors fix vulnerabilities on the regular basis since hackers monitor business applications to find and exploit security issues. SAP releases patches monthly on Patch Tuesday, Oracle issues security fixes every quarter in Oracle Critical Patch Update. Business applications are becoming more exposed to the Internet or migrate to the cloud.
Lack of competent specialists
ERP Cybersecurity survey revealed that organizations running ERP systems "lack both awareness and a |
https://en.wikipedia.org/wiki/Project%20Sidekick | Sidekick is a project developed by NASA and Microsoft, started in December 2015 on the International Space Station, which provides virtual assistance to astronauts using Microsoft HoloLens augmented reality glasses.
Functionality
Sidekick has two modes of operation. Remote Expert Mode uses the functionality of the Holographic Skype application—voice and video chat, real-time virtual annotation—to allow a ground operator and space crew member to collaborate directly over what the astronaut sees, with the ground operator able to see the crew member's view in 3D, provide interactive guidance, and draw annotations into the crew member's environment. In Procedure Mode, animated virtual illustrations display on top of objects as a crew member interacts with them. This mode can be used for guidance and instructional purposes in standalone scenarios. Applications include inventory management, in which the system recognizes an inventory item, and can display a path to where the item should be stored. Previously, crew members would rely primarily on printed instructions and voice-based communication when performing complex tasks. The capabilities provided by Sidekick have been promoted as potential enabling features allowing for reduced crew training requirements and increased efficiency in deep space missions in which communication delays can complicate difficult operations.
History
After having performed simulated reduced-gravity testing in its Weightless Wonder C9 aircraft, NASA attempted to launch a pair of HoloLens units aboard the SpaceX CRS-7 launch to the International Space Station on June 28, 2015, but the Falcon 9 rocket carrying the payload exploded at 2 minutes and 19 seconds into the flight. Sidekick was tested at the Aquarius laboratory from late July to early August 2015 as part of the two-week long NASA Extreme Environment Missions Operations 20 expedition, demonstrating its operation in tasks such as equipment checks and setup. HoloLens' hardware was succe |
https://en.wikipedia.org/wiki/IQ%20imbalance | IQ imbalance is a performance-limiting issue in the design of a class of radio receivers known as direct conversion receivers. These translate the received radio frequency (RF, or pass-band) signal directly from the carrier frequency to baseband using a single mixing stage.
Direct conversion receivers contain a local oscillator (LO) which generates both a sine wave at and a copy delayed by 90°. These are individually mixed with the RF signal, producing what are known respectively as the in-phase and quadrature signals, labelled and .
However, in the analog domain, the phase difference is never exactly 90°. Neither is the gain perfectly matched between the parallel sections of circuitry dealing with the two signal paths.
IQ imbalance results from these two imperfections, and is one of the two major drawbacks of direct-conversion receivers compared to traditional superheterodyne receivers. (The other is DC offset.) Their design must include measures to
control IQ imbalance, so as to limit errors in the demodulated signal.
Definition
A direct-conversion receiver uses two quadrature sinusoidal signals to perform the so-called quadrature down-conversion. This process requires shifting the LO signal by 90° to produce a quadrature sinusoidal component, and a matched pair of mixers converting the same input signal with the two versions of the LO. Mismatches between the two LO signals and/or along the two branches of down-conversion mixers, and any following amplifiers, and low-pass filters, cause the quadrature baseband signals to be corrupted, either due to amplitude or phase differences. Suppose the received pass-band signal is identical to the transmitted signal and is given by:where is the transmitted base-band signal. Assume that the gain error is dB and the phase error is degrees. Then we can model such imbalance using mismatched local oscillator output signals:Multiplying the pass-band signal by the two LO signals and passing through a pair of low-pass fil |
https://en.wikipedia.org/wiki/Reference%20Broadcast%20Infrastructure%20Synchronization | The Reference Broadcast Infrastructure Synchronization (RBIS) protocol is a master/slave synchronization protocol. RBIS, as the Reference Broadcast Time Synchronization (RBS), is a receiver/receiver synchronization protocol, as a consequence timestamps used for clock regulation are acquired only on the receiving of synchronization events. RBIS is specifically tailored to be used in IEEE 802.11 Wi-Fi networks configured in infrastructure mode. Such a kind of networks are based on an access point that coordinates the communication between the wireless nodes (i.e., the STAs), and they are very common.
The advantages of RBIS are that it can be directly used with common access points, no modification is required to the STAs (or minor modifications to improve synchronization performance) and a very small overhead is added to the wireless channel (typically a message every 1 second). Moreover, it allows an easily synchronization with an external time source, because it is a master/slave protocol. Its major drawback is that it does not compensate the propagation delay. This fact limits the achievable synchronization quality to a couple of microsecond, which is typically enough for the very majority of the applications, especially for home automation. An example is the connection of wireless speakers to a television.
References
Synchronization
Clocks |
https://en.wikipedia.org/wiki/Wiener%E2%80%93Araya%20graph | The Wiener–Araya graph is, in graph theory, a graph on 42 vertices with 67 edges. It is hypohamiltonian, which means that
it does not itself have a Hamiltonian cycle but every graph formed by removing a single vertex from it is Hamiltonian. It is also planar.
History
Hypohamiltonian graphs were first studied by Sousselier in Problèmes plaisants et délectables (1963).
In 1967, Lindgren built an infinite sequence of hypohamiltonian graphs.
He first cited Gaudin, Herz and Rossi, then Busacker and Saaty
as pioneers on this topic.
From the start, the smallest hypohamiltonian graph is known: the Petersen graph. However, the hunt for the smallest planar hypohamiltonian graph continues. This question was first raised by Václav Chvátal in 1973.
The first candidate answer was provided in 1976 by Carsten Thomassen, who exhibited a 105-vertices construction, the 105-Thomassen graph.
In 1979, Hatzel improved this result with a planar hypohamiltonian graph on 57 vertices : the Hatzel graph.
This bound was lowered in 2007 by the 48-Zamfirescu graph.
In 2009, a graph built by Gábor Wiener and Makoto Araya became (with its 42 vertices) the smallest planar hypohamiltonian graph known.
In their paper, Wiener and Araya conjectured their graph to be optimal arguing that its order (42) appears to be the
answer to The Ultimate Question of Life, the Universe, and Everything from The Hitchhiker's Guide to the Galaxy, a Douglas Adams novel. However, subsequently, smaller planar hypohamiltonian graphs have been discovered.
References
External links
Individual graphs
Planar graphs |
https://en.wikipedia.org/wiki/Two-dimensional%20liquid | A two-dimensional liquid (2D liquid) is a collection of objects constrained to move in a planar or other two-dimensional space in a liquid state.
Relations with 3D liquids
The movement of the particles in a 2D liquid is similar to 3D, but with limited degrees of freedom. E.g. rotational motion can be limited to rotation about only one axis, in contrast to a 3D liquid, where rotation of molecules about two or three axis would be possible.
The same is true for the translational motion. The particles in 2D liquids can move in a 2D plane, whereas the particles is a 3D liquid can move in three directions inside the 3D volume.
Vibrational motion is in most cases not constrained in comparison to 3D.
The relations with other states of aggregation (see below) are also analogously in 2D and 3D.
Relation to other states of aggregation
2D liquids are related to 2D gases. If the density of a 2D liquid is decreased, a 2D gas is formed. This was observed by scanning tunnelling microscopy under ultra-high vacuum (UHV) conditions for molecular adsorbates.
2D liquids are related to 2D solids. If the density of a 2D liquid is increased, the rotational degree of freedom is frozen and a 2D solid is created.
References
Liquids
Non-equilibrium thermodynamics
Statistical mechanics |
https://en.wikipedia.org/wiki/Bloch%27s%20higher%20Chow%20group | In algebraic geometry, Bloch's higher Chow groups, a generalization of Chow group, is a precursor and a basic example of motivic cohomology (for smooth varieties). It was introduced by Spencer Bloch and the basic theory has been developed by Bloch and Marc Levine.
In more precise terms, a theorem of Voevodsky implies: for a smooth scheme X over a field and integers p, q, there is a natural isomorphism
between motivic cohomology groups and higher Chow groups.
Motivation
One of the motivations for higher Chow groups comes from homotopy theory. In particular, if are algebraic cycles in which are rationally equivalent via a cycle , then can be thought of as a path between and , and the higher Chow groups are meant to encode the information of higher homotopy coherence. For example,can be thought of as the homotopy classes of cycles whilecan be thought of as the homotopy classes of homotopies of cycles.
Definition
Let X be a quasi-projective algebraic scheme over a field (“algebraic” means separated and of finite type).
For each integer , define
which is an algebraic analog of a standard q-simplex. For each sequence , the closed subscheme , which is isomorphic to , is called a face of .
For each i, there is the embedding
We write for the group of algebraic i-cycles on X and for the subgroup generated by closed subvarieties that intersect properly with for each face F of .
Since is an effective Cartier divisor, there is the Gysin homomorphism:
,
that (by definition) maps a subvariety V to the intersection
Define the boundary operator which yields the chain complex
Finally, the q-th higher Chow group of X is defined as the q-th homology of the above complex:
(More simply, since is naturally a simplicial abelian group, in view of the Dold–Kan correspondence, higher Chow groups can also be defined as homotopy groups .)
For example, if is a closed subvariety such that the intersections with the faces are proper, then
and this means, by Proposit |
https://en.wikipedia.org/wiki/Dubins%E2%80%93Spanier%20theorems | The Dubins–Spanier theorems are several theorems in the theory of fair cake-cutting. They were published by Lester Dubins and Edwin Spanier in 1961. Although the original motivation for these theorems is fair division, they are in fact general theorems in measure theory.
Setting
There is a set , and a set which is a sigma-algebra of subsets of .
There are partners. Every partner has a personal value measure . This function determines how much each subset of is worth to that partner.
Let a partition of to measurable sets: . Define the matrix as the following matrix:
This matrix contains the valuations of all players to all pieces of the partition.
Let be the collection of all such matrices (for the same value measures, the same , and different partitions):
The Dubins–Spanier theorems deal with the topological properties of .
Statements
If all value measures are countably-additive and nonatomic, then:
is a compact set;
is a convex set.
This was already proved by Dvoretzky, Wald, and Wolfowitz.
Corollaries
Consensus partition
A cake partition to k pieces is called a consensus partition with weights (also called exact division) if:
I.e, there is a consensus among all partners that the value of piece j is exactly .
Suppose, from now on, that are weights whose sum is 1:
and the value measures are normalized such that each partner values the entire cake as exactly 1:
The convexity part of the DS theorem implies that:
If all value measures are countably-additive and nonatomic,
then a consensus partition exists.
PROOF: For every , define a partition as follows:
In the partition , all partners value the -th piece as 1 and all other pieces as 0. Hence, in the matrix , there are ones on the -th column and zeros everywhere else.
By convexity, there is a partition such that:
In that matrix, the -th column contains only the value . This means that, in the partition , all partners value the -th piece as exactly .
Note: this corollary con |
https://en.wikipedia.org/wiki/System%20virtual%20machine | In computing, a system virtual machine is a virtual machine (VM) that provides a complete system platform and supports the execution of a complete operating system (OS). These usually emulate an existing architecture, and are built with the purpose of either providing a platform to run programs where the real hardware is not available for use (for example, executing on otherwise obsolete platforms), or of having multiple instances of virtual machines leading to more efficient use of computing resources, both in terms of energy consumption and cost effectiveness (known as hardware virtualization, the key to a cloud computing environment), or both. A VM was originally defined by Popek and Goldberg as "an efficient, isolated duplicate of a real machine".
System virtual machines
System virtual machine advantages:
Multiple OS environments can co-exist on the same primary hard drive, with a virtual partition that allows sharing of files generated in either the "host" operating system or "guest" virtual environment. Adjunct software installations, wireless connectivity, and remote replication, such as printing and faxing, can be generated in any of the guest or host operating systems. Regardless of the system, all files are stored on the hard drive of the host OS.
Application provisioning, maintenance, high availability and disaster recovery are inherent in the virtual machine software selected.
Can provide emulated hardware environments different from the host's instruction set architecture (ISA), through emulation or by using just-in-time compilation.
The main disadvantages of VMs are:
A virtual machine is less efficient than an actual machine when it accesses the host hard drive indirectly.
When multiple VMs are concurrently running on the hard drive of the actual host, adjunct virtual machines may exhibit a varying and/or unstable performance (speed of execution and malware protection). This depends on the data load imposed on the system by other VMs, unless th |
https://en.wikipedia.org/wiki/Spiral%20wave | Spiral waves are travelling waves that rotate outward from a center in a spiral. They are a feature of many excitable media. Spiral waves have been observed in various biological systems including systems such as heart ventricular fibrillation, retinal spreading depression, Xenopus oocyte calcium waves, and glial calcium waves in cortical tissue culture.
References
Nonlinear systems
Pattern formation
Articles containing video clips |
https://en.wikipedia.org/wiki/Thermal%20integrity%20profiling | Thermal Integrity Profiling (TIP) is a non-destructive testing method used to evaluate the integrity of concrete foundations. It is standardized by ASTM D7949 - Standard Test Methods for Thermal Integrity Profiling of Concrete Deep Foundations.
The testing method was first developed in the mid 1990s at the University of South Florida. It relates the heat generated by curing of cement to the integrity and quality of drilled shafts, augered cast in place (ACIP) piles and other concrete foundations. In general, a shortage of competent concrete (necks or inclusions) is registered by relative cool regions; the presence of extra concrete (over-pour bulging into soft soil strata) is registered by relative warm regions.
Concrete temperatures along the length of the foundation element are sampled throughout the concrete hydration process. TIP analysis is performed at the point of peak temperature, generally 18 to 24hrs post-concreting. Measurements are available relatively soon after pouring (6 to 72 hours),generally before other integrity testing methods such as cross hole sonic logging and low strain integrity testing can be performed.
TIP can be performed using a probe lowered down standard access tubes or by installing embedded thermal wires along the length of the reinforcement cage. Four thermal wires are commonly installed along the steel cage, each 90 degrees from one another, forming a north-east-south-west configuration. If records at a certain depth show regions with cooler temperatures (when compared to the average temperature at that depth), a concrete deficiency or defect may be present. An average temperature at a certain depth that is significantly lower than the average temperatures at other depths may also be indication of a potential problem. It is also possible to estimate the effective area of the foundation, and to assess if the reinforcing cage is properly aligned and centered.
References
Cement
Concrete
Corrosion |
https://en.wikipedia.org/wiki/SpotX | SpotX is a video advertising and monetization platform.
Billions of video ad decisions are transacted through the SpotX platform daily, with ads delivered to over 70 million US households. The company is headquartered north of Denver, Colorado with additional offices worldwide, including Belfast, London, New York, Salt Lake City, San Francisco, Singapore, Sydney, and Tokyo.
History
SpotX was founded as a division of the search engine marketing technologies and services company, Booyah Networks. The company's founders are Michael Shehan (CEO) and Steve Swoboda (COO and CFO).
In March 2007, SpotX, initially SpotXchange, formed a separate company from Booyah that focused on digital video advertising technology. In 2009, SpotX launched targeting tools to help advertisers reach their audiences. In 2010, SpotX launched its real-time bidding solution, which helps companies tailor their bids on an impression-by-impression basis when bidding on in-stream and in-banner video ad inventory.
In July 2016, RTL Group announced its 65% majority stake purchase of SpotX at $144 million and completed its 100% acquisition of the company in October 2017 for $145 million in a deal that valued SpotX at $404 million.
In 2015, SpotXchange rebranded as SpotX. In 2017, SpotX relaunched its website.
In 2020, SpotX made a strategic investment in SpringServe, a supply-side ad server for CTV.
In 2021, SpotX was acquired by Magnite, Inc., the world's largest independent sell-side advertising platform, for $1.17 billion.
References
Online advertising services and affiliate networks |
https://en.wikipedia.org/wiki/AirG%20Inc. | airG Incorporated (airG) is a Canadian software company.
History
AirG was founded and incorporated in April 2000 by Frederick Ghahramani, Vincent Yen, and Bryce Pasechnik. as a mobile entertainment content supplier and was headquartered in Vancouver, British Columbia. The company surpassed 20 million customers in 2007, and in 2014 the company surpassed 100 million customers, representing around 40 countries. In 2010 a study determined airG's weekly media time as one of the top 10 most frequented services on mobile phones in the United States.
Products
Mobile games
airG released AtomicDove, a 'persistent' and 'multiplayer' game, in November 2001. In 2002, AtomicDove generated 100 million minutes of mobile data traffic. The company also developed the multiplayer farming game Big Barn World. Some games were marketed through private networks, while other were marketed internationally.
Mobile chat
The company was one of the first mobile-only social media networks. airG was the provider of the Sprint 'Games Lobby Lounge'. airG ran Conexion Latina, which was for about one million Spanish speaking customers, and created the Boost Hookt social network.
Mobile advertising
airG sold just 2% of its 20+ billion mobile advertising impressions in 2006.
It then began to use interactive polls, and engagement units specifically to customers based on their profile information. The company has also partnered with sports sponsorship companies like Red Bull.
Recognition
In 2001, airG was awarded the BMO Bank of Montreal First Place Prize in their New Ventures B.C. competition. In 2005 airG's founders won the Young Entrepreneur of the Year award from the Business Development Bank of Canada.
References
External links
airG Official website
Canadian entertainment websites
Companies based in Vancouver
Mobile game companies
Video game companies of Canada
Video game companies established in 2000
Mobile software
Mobile telecommunications
Mobile web
Video game development companies |
https://en.wikipedia.org/wiki/SaneBox | SaneBox is an email management software as a service that integrates with IMAP and Exchange Web Services (EWS) email accounts. Its primary function is to filter email messages that it deems unimportant into a folder for later processing.
History
SaneBox is a self-funded company with locations in Boston, Massachusetts, and Venice, California. It was founded by Stuart Roseman in 2010 in response to articles written by Bijan Sabet, Fred Wilson (financier) and Michael Arrington. As an entrepreneur, Roseman previously founded and sold other companies, including Gamesville and Gamelogic. In 2012, SaneBox announced SaneBox for Business in a shift toward becoming more business-to-business focused.
Operation
SaneBox integrates with a user’s email server and analyzes past email usage in order to infer what emails are important. Messages deemed important remain in the inbox, while those deemed unimportant are filtered into a different folder for later reference. The algorithms and filtering are primarily based on the email sender, the subject line and the timestamp. A second type of filtering deletes incoming emails from designated senders, a feature that is intended to serve a similar purpose to unsubscribing from email lists. Other functions of the service including "snoozing," or deferring, emails, and a Dropbox integration that moves email attachments of a certain size into Dropbox and replaces them with the Dropbox link. Similar attachment support is available for Box, EverNote, Google Drive and IBM SmartCloud.
References
Email |
https://en.wikipedia.org/wiki/Interest%20Flooding%20Attack | An Interest Flooding Attack (IFA) is a denial-of-service attack in an Information-centric network (or Content-Centric Networking (CCN) or Named Data Networking (NDN)). An attacker requests existing or non-existing content in order to overload the distribution infrastructure. This can be implemented by sending Interest packets, which are not resolved at all or not resolved fast enough and thus lead to malicious CPU or memory consumption.
This attack was previously denoted an open problem in ICN, only heuristic countermeasures available. In 2016, Aubrey Alston and Tamer Refaei of The MITRE Corporation presented an exact solution to this problem which utilizes an in-packet cryptographic mechanism to remove the ability of high-volume Interest traffic to overload the distribution infrastructure of the network.
References
Denial-of-service attacks
Cyberwarfare
Computer network security |
https://en.wikipedia.org/wiki/The%20Bridges%20Organization | The Bridges Organization is an organization that was founded in Kansas, United States, in 1998 with the goal of promoting interdisciplinary work in mathematics and art. The Bridges Conference is an annual conference on connections between art and mathematics. The conference features papers, educational workshops, an art exhibition, a mathematical poetry reading, and a short movie festival.
List of Bridges conferences
References
External links
1998 establishments in Kansas
Arts organizations established in 1998
Arts organizations based in Kansas
Mathematics organizations
Mathematics and art |
https://en.wikipedia.org/wiki/XFdtd | XFdtd is electromagnetic simulation software with a very wide variety of applications in RF circuit, antenna, military/defense, medical EM, photonics, radar, component, metamaterial, and related fields. It originally stood for X (Window System) Finite Difference Time Domain and was first developed in the mid 1990s by Remcom Incorporated of State College, PA in the United States. XFdtd includes full wave (FDTD), electrostatic, thermal-biological, circuit, and 2D Eigen solver and integrates with PO/MEC, and GTD/UTD method solvers.
See also
Computational electromagnetics
References
3D Electromagnetic Simulation vs. Planar MoM Ich
Finite element software
Electronic design automation software
Electromagnetic simulation software |
https://en.wikipedia.org/wiki/The%20Cactaceae | The Cactaceae is a monograph on plants of the cactus family written by the American botanists Nathaniel Lord Britton and Joseph Nelson Rose and published in multiple volumes between 1919 and 1923. It was landmark study that extensively reorganized cactus taxonomy and is still considered a cornerstone of the field. It was illustrated with drawings and color plates principally by the British botanical artist Mary Emily Eaton as well as with black-and-white photographs.
History
Nathaniel Lord Britton was a Columbia University geology and biology professor who left the university in 1895 to become the founding director of the New York Botanical Garden. Much of his own field work was done in the Caribbean. Joseph Nelson Rose was an authority on several plant families, including parsley (Apiaceae) and cacti (Cactaceae). He had been a plant curator at the Smithsonian since 1896, and while working there he made several field trips to Mexico, collecting specimens for the Smithsonian and for Britton's newly founded New York Botanical Garden. Together, Britton and Rose published many articles on the stonecrop family (Crassulaceae) before embarking in 1904 on research leading towards The Cactaceae. With the support of Douglas T. MacDougal, director of the Carnegie Institution for Science's Desert Botanical Laboratory, the Carnegie Institution agreed to fund the project. Rose took a leave of absence from the Smithsonian to pursue it, and both Rose and Britton were named Carnegie Institution Research Associates in 1912, when more focused work on the project began. Between 1912 and 1916 Rose and Britton did extensive field work, collecting specimens and touring the botanical gardens and notable collections of Europe, the Caribbean, and North, Central, and South America.
In this period, cactus taxonomy was in a disorganized state with only a few very large and heterogeneous genera. Britton and Rose broke these old-style catch-all genera into smaller, more defined genera, ultimat |
https://en.wikipedia.org/wiki/European%20Information%20Technologies%20Certification | The European Information Technologies Certification (EITC) programme is an international professional ICT knowledge and skills certification standard. It is developed and governed by the EITCI Institute, a non-profit organization based in Brussels that provides certification of individuals' knowledge and skills in narrow, specialized single-subject areas of ICT such as office software, computer-aided project management, online collaboration systems, and raster graphics processing.
See also
EITCA programme
EITCI institute
References
External links
EITCI Official Website
EITCI certificate and accreditation validation page
International standards
Computer standards
Cryptography standards
Information technology qualifications
Computer security qualifications
Professional titles and certifications
EITCI certification programmes
Digital divide |
https://en.wikipedia.org/wiki/European%20Information%20Technologies%20Certification%20Academy | European Information Technologies Certification Academy (EITCA) programme is an international professional ICT knowledge and skills certification standard, developed and governed by the EITCI Institute – a non-profit organization based in Brussels, that
provides certification of individuals' knowledge and skills in broad field-oriented areas of ICT expertise such as Computer graphics, Information security etc. The EITCA programmes, referred to as EITCA Academies, include selected sets of several to over a dozen of individual EITC programmes, that together comprise a particular area of qualifications.
EITCA Academies
As of June 2015 the EITCA certification standard includes the following Academies:
See also
EITC programme
EITCI institute
References
External links
EITCI Official Website
EITCI certificate and accreditation validation page
Certification Academy
International standards
Computer standards
Cryptography standards
Information technology qualifications
Computer security qualifications
Professional titles and certifications
EITCI certification programmes
Digital divide |
https://en.wikipedia.org/wiki/Graph-based%20access%20control | Graph-based access control (GBAC) is a declarative way to define access rights, task assignments, recipients and content in information systems. Access rights are granted to objects like files or documents, but also business objects such as an account. GBAC can also be used for the assignment of agents to tasks in workflow environments. Organizations are modeled as a specific kind of semantic graph comprising the organizational units, the roles and functions as well as the human and automatic agents (i.a. persons, machines). The main difference with other approaches such as role-based access control or attribute-based access control is that in GBAC access rights are defined using an organizational query language instead of total enumeration.
History
The foundations of GBAC go back to a research project named CoCoSOrg (Configurable Cooperation System) [] (in English language please see ) at Bamberg University. In CoCoSOrg an organization is represented as a semantic graph and a formal language is used to specify agents and their access rights in a workflow environment. Within the C-Org-Project at Hof University's Institute for Information Systems (iisys), the approach was extended by features like separation of duty, access control in virtual organizations and subject-oriented access control.
Definition
Graph-based access control consists of two building blocks:
A semantic graph modeling an organization
A query language.
Organizational graph
The organizational graph is divided into a type and an instance level. On the instance level there are node types for organizational units, functional units and agents. The basic structure of an organization is defined using so called "structural relations". They define the "is part of"- relations between functional units and organizational units as well as the mapping of agents to functional units. Additionally there are specific relationship types like "deputyship" or "informed_by". These types can be extended by th |
https://en.wikipedia.org/wiki/Monokaryon | A monokaryon is a fungal mycelium or hypha in which each cell contains a single nucleus. It also refers to a mononuclear spore or cell of a fungus that produces a dikaryon in its life cycle.
See also
Dikaryon
References
Mycology |
https://en.wikipedia.org/wiki/Lattice%20model%20%28biophysics%29 | Lattice models in biophysics represent a class of statistical-mechanical models which consider a biological macromacromolecule (such as DNA, protein, actin, etc.) as a lattice of units, each unit being in different states or conformations.
For example, DNA in chromatin can be represented as a one-dimensional lattice, whose elementary units are the nucleotide, base pair or nucleosome. Different states of the unit can be realized either by chemical modifications (e.g. DNA methylation or modifications of DNA-bound histones), or due to quantized internal degrees of freedom (e.g. different angles of the bond joining two neighboring units), or due to binding events involving a given unit (e.g. reversible binding of small ligands or proteins to DNA, or binding/unbinding of two complementary nucleotides in the DNA base pair).
DNA-ligand binding models
DNA double helix melting models
DNA coil-globule / fractal models
References
Further reading
Ewans J. W. (1993). Random and cooperative sequential adsorption. Rev. Mod. Phys., 65, 1281-1329]
Poland D., Scheraga H.A. (1970). Theory of Helix-Coil Transitions in Biopolymers: Statistical Mechanical Theory of Order-disorder Transitions in Biological Macromolecules. Academic Press, 797 pages.
Khokhlov A.R., Grosberg A.Yu. 1997. Statistical Physics of Macromolecules.
Statistical mechanics
Biophysics
Molecular biology
Lattice models |
https://en.wikipedia.org/wiki/Liouvillian%20function | In mathematics, the Liouvillian functions comprise a set of functions including the elementary functions and their repeated integrals. Liouvillian functions can be recursively defined as integrals of other Liouvillian functions.
More explicitly, a Liouvillian function is a function of one variable which is the composition of a finite number of arithmetic operations , exponentials, constants, solutions of algebraic equations (a generalization of nth roots), and antiderivatives. The logarithm function does not need to be explicitly included since it is the integral of .
It follows directly from the definition that the set of Liouvillian functions is closed under arithmetic operations, composition, and integration. It is also closed under differentiation. It is not closed under limits and infinite sums.
Liouvillian functions were introduced by Joseph Liouville in a series of papers from 1833 to 1841.
Examples
All elementary functions are Liouvillian.
Examples of well-known functions which are Liouvillian but not elementary are the nonelementary antiderivatives, for example:
The error function,
The exponential (Ei), logarithmic (Li or li) and Fresnel (S and C) integrals.
All Liouvillian functions are solutions of algebraic differential equations, but not conversely. Examples of functions which are solutions of algebraic differential equations but not Liouvillian include:
the Bessel functions (except special cases);
the hypergeometric functions (except special cases).
Examples of functions which are not solutions of algebraic differential equations and thus not Liouvillian include all transcendentally transcendental functions, such as:
the gamma function;
the zeta function.
See also
References
Further reading
Differential algebra
Computer algebra
Types of functions |
https://en.wikipedia.org/wiki/Cell%20mechanics | Cell mechanics is a sub-field of biophysics that focuses on the mechanical properties and behavior of living cells and how it relates to cell function. It encompasses aspects of cell biophysics, biomechanics, soft matter physics and rheology, mechanobiology and cell biology.
Eukaryotic
Eukaryotic cells are cells that consist of membrane-bound organelles, a membrane-bound nucleus, and more than one linear chromosome. Being much more complex than prokaryotic cells, cells without a true nucleus, eukaryotes must protect its organelles from outside forces.
Plant
Plant cell mechanics combines principles of biomechanics and mechanobiology to investigate the growth and shaping of the plant cells. Plant cells, similar to animal cells, respond to externally applied forces, such as by reorganization of their cytoskeletal network. The presence of a considerably rigid extracellular matrix, the cell wall, however, bestows the plant cells with a set of particular properties. Mainly, the growth of plant cells is controlled by the mechanics and chemical composition of the cell wall. A major part of research in plant cell mechanics is put toward the measurement and modeling of the cell wall mechanics to understand how modification of its composition and mechanical properties affects the cell function, growth and morphogenesis.
Animal
Because animal cells do not have cell walls to protect them like plant cells, they require other specialized structures to sustain external mechanical forces. All animal cells are encased within a cell membrane made of a thin lipid bilayer that protects the cell from exposure to the outside environment. Using receptors composed of protein structures, the cell membrane is able to let selected molecules within the cell. Inside the cell membrane includes the cytoplasm, which contains the cytoskeleton. A network of filamentous proteins including microtubules, intermediate filaments, and actin filaments makes up the cytoskeleton and helps maintain th |
https://en.wikipedia.org/wiki/Plaque%20hybridization | Plaque hybridization is a technique used in Molecular biology for the identification of recombinant phages.
The procedure can also be used for the detection of differentially represented repetitive DNA.
The technique (similar to colony hybridization) involves hybridizing isolated phage DNA to a label probe for the gene of study. This is followed by autoradiography to detect the position of the label.
The plaque hybridization procedure has some advantages over colony hybridization due to the smaller and well defined area of the filter to which the DNA binds.
References
Molecular biology
Molecular biology techniques |
https://en.wikipedia.org/wiki/Aquatic%20Conservation%3A%20Marine%20and%20Freshwater%20Ecosystems | Aquatic Conservation: Marine and Freshwater Ecosystems is a bimonthly peer-reviewed scientific journal published by Wiley-Blackwell. The journal is dedicated to publishing original papers that relate specifically to freshwater, brackish or marine habitats and encouraging work that spans these ecosystems. According to the Journal Citation Reports, the journal has a 2014 impact factor of 2.136.
References
External links
Ecology journals
Conservation biology
English-language journals
Academic journals established in 1991
Wiley-Blackwell academic journals
Bimonthly journals
1991 establishments in the United Kingdom |
https://en.wikipedia.org/wiki/Ultra-processed%20food | Ultra-processed food (UPF) is an industrially formulated edible substance derived from natural food or synthesized from other organic compounds. The resulting products are designed to be highly profitable, convenient, and hyperpalatable, often through food additives such as preservatives, colourings, and flavourings.
The state of research into ultra-processed foods and their effects is evolving rapidly as of 2023. Epidemiological data suggest that consumption of ultra-processed foods is associated with higher risks of certain diseases, including obesity, type 2 diabetes, cardiovascular diseases, and certain types of cancer. Researchers also present ultra-processing as a facet of environmental degradation caused by the food industry.
Definitions
Concerns around food processing have existed since at least the Industrial Revolution. Many critics identified 'processed food' as problematic, and movements such as raw foodism attempted to eschew food processing entirely, but since even basic cookery results in processed food, this concept failed in itself to influence public policy surrounding the epidemiology of obesity.
Michael Pollan's influential book The Omnivore's Dilemma referred to highly processed industrial food as 'edible food-like substances'. Carlos Augusto Monteiro cited Pollan as an influence in coining the term 'ultra-processed food' in a 2009 commentary. Monteiro's team developed the Nova classification for grouping unprocessed and processed foods beginning in 2010, whose definition of ultra-processing has become most widely accepted and has gradually become more refined through successive publications. The identification of ultra-processed foods, as well as the category itself, is a subject of debate among nutrition and public health scientists, and other definitions have been proposed.
A survey of systems for classifying levels of food processing in 2021 identified four 'defining themes':
Extent of change (from natural state);
Nature of change (p |
https://en.wikipedia.org/wiki/Contest%20competition | In ecology, contest competition refers to a situation where available resources, such as food and mates, are utilized only by one or a few individuals, thus preventing development or reproduction of other individuals. It refers to a hypothetical situation in which several individuals stage a contest for which one eventually emerges victorious. Contest competition is the opposite of scramble competition, a situation in which available resources are shared equally among individuals.
As contest competition allows the monopolization of resources, offspring will typically always be produced and survive until adulthood independent of the population size, resulting in stable population dynamics. This is in stark contrast to scramble competition which can result in periodic or chaotic population dynamics. The Beverton–Holt model is often used to represent population dynamics arising from contest competition. This model, and a few other well-known population models, can be explicitly derived from individual-level processes assuming contest competition and a random distribution of individuals among resources.
Contest competition has been observed in a variety of species. In white-faced monkeys, Cebus capucinus, regardless of aggression, avoidance, or sex, higher ranking monkeys had higher energy intake within their group. For female Microcebus murinus groups, if the resource (fruit) could be monopolized, they would compete within their group for it. In a controlled lab experiment with three parasitic wasp species (Dinarmus basalis, Anisopteromalus calandrae, and Heterospilus prosopidis) they found that between the first larvae in the host and the second, the larvae that would win depended on the time between them. There was also a Nicholson–Bailey model made to partially explain the relationship between Heterospilus prosopidis and its host Callosobruchus maculatus.
Fitness gains for the winner of the contest is not always known. For example, in mountain gorillas, Gorilla b |
https://en.wikipedia.org/wiki/ARITH%20Symposium%20on%20Computer%20Arithmetic | The IEEE International Symposium on Computer Arithmetic (ARITH) is a conference in the area of computer arithmetic.
The symposium was established in 1969, initially as three-year event, then as a
biennial event, and, finally, from 2015 as an annual symposium.
ARITH topics span from theoretical aspects and algorithms for operations, to hardware implementations of arithmetic units and applications of computer arithmetic.
ARITH symposia are sponsored by IEEE Computer Society. They have been described as one of "the most prestigious forums for computer arithmetic" by researchers at the National Institute of Standards and Technology, as the main conference forum for new research publications in computer arithmetic by , and as a forum for interacting with the "international community of arithmeticians" by participants Peter Kornerup and David W. Matula.
List of ARITH symposia
References
Computer arithmetic
Computer science conferences
Computer conferences
IEEE conferences |
https://en.wikipedia.org/wiki/Human%20performance%20modeling | Human performance modeling (HPM) is a method of quantifying human behavior, cognition, and processes. It is a tool used by human factors researchers and practitioners for both the analysis of human function and for the development of systems designed for optimal user experience and interaction . It is a complementary approach to other usability testing methods for evaluating the impact of interface features on operator performance.
History
The Human Factors and Ergonomics Society (HFES) formed the Human Performance Modeling Technical Group in 2004. Although a recent discipline, human factors practitioners have been constructing and applying models of human performance since World War II. Notable early examples of human performance models include Paul Fitts' model of aimed motor movement (1954), the choice reaction time models of Hick (1952) and Hyman (1953), and the Swets et al. (1964) work on signal detection. It is suggested that the earliest developments in HPM arose out of the need to quantify human-system feedback for those military systems in development during WWII (see Manual Control Theory below), with continued interest in the development of these models augmented by the cognitive revolution (see Cognition & Memory below).
Human Performance Models
Human performance models predict human behavior in a task, domain, or system. However, these models must be based upon and compared against empirical human-in-the-loop data to ensure that the human performance predictions are correct. As human behavior is inherently complex, simplified representations of interactions are essential to the success of a given model. As no model is able to capture the complete breadth and detail of human performance within a system, domain, or even task, details are abstracted away to these keep models manageable. Although the omission of details is an issue in basic psychological research, it is less of a concern in applied contexts such as those of most concern to the human fac |
https://en.wikipedia.org/wiki/Mitotic%20cell%20rounding | Mitotic cell rounding is a shape change that occurs in most animal cells that undergo mitosis. Cells abandon the spread or elongated shape characteristic of interphase and contract into a spherical morphology during mitosis. The phenomenon is seen both in artificial cultures in vitro and naturally forming tissue in vivo.
Early observations
In 1935, one of the first published accounts of mitotic rounding in live tissue described cell rounding in the pseudostratified epithelium of the mammalian neural tube. Sauer noticed that cells in mitosis rounded up to the apical, or luminal, surface of the columnar epithelium before dividing and returning to their elongated morphology.
Significance
For a long time it was not clear why cells became round in mitosis. Recent studies in the epithelia and epidermis of various organisms, however, show that mitotic cell rounding might serve several important functions.
Firstly, mitotic cell rounding in combination with maintenance of apical cell-cell junctions appears to be necessary for correct mitotic spindle alignment, so that daughter cells divide parallel to the tissue plane, thus sharing apical surface to maintain tissue homeostasis. Failure to achieve this may result in mislocalization of one daughter cell to the basal region on the tissue layer and clearance via apoptotic cell death.
Secondly, mitotic rounding has been proposed to be a driver for morphological events during tissue development. Examples include epithelial invagination of the Drosophila melanogaster tracheal placode and the anisotropic shape and growth of the inner ear lumen in Zebrafish.
Thirdly, mitotic rounding has been shown to be important to generate sufficient space and appropriate geometry for proper mitotic spindle function, which is necessary for timely and accurate progression through mitosis.
Thus, mitotic cell rounding is involved in tissue organization and homeostasis.
Mechanisms
To understand the physical mechanisms of how cells round up in mi |
https://en.wikipedia.org/wiki/QN%20Signals | The QN Signals are Morse code operating signals that were introduced for Amateur radio net operation in 1939 on the Michigan QMN Net to lighten the burdens of net control operators. Originally created by a committee of the Detroit Amateur Radio Association led by Ralph Thetreat, W8FX. Ev Battey W1UE (W4IA-SK), then ARRL assistant communications manager, later printed them in QST.
The QN Signals are defined in ARRL document FSD-218 and listed in the ARRL Operating Manual.
Although these codes are within the Aeronautical Code signals range (QAA–QNZ) and thus conflict with official international Q signals beginning with QN, the ARRL informally queried FCC's legal branch about the conflict. The opinion then of the FCC was that "no difficulty was as long as we continued to use them only in amateur nets."
ARRL QN Signals For CW Net Use
* QN-codes marked with an asterisk (*) are only for use by the Net Control Station.
See also
ACP-131
ARRL
Brevity code
Morse code
National Traffic System
Prosigns for Morse code
Q code
Z code
References
Operating signals
Encodings
Morse code
Amateur radio |
https://en.wikipedia.org/wiki/Endian%20Firewall | Endian Firewall is an open-source router, firewall and gateway security Linux distribution developed by the South Tyrolean company Endian. The product is available as either free software, commercial software with guaranteed support services, or as a hardware appliance (including support services).
Description
Endian Firewall is a Linux security distribution, which is an independent, security management operating system. The system is installed on a PC using a boot CD, and can be operated without a monitor through its online interface or via a keyboard in a command-line interface. The server can be configured via a web interface or the serial interface.
The main task of Endian Firewall is as a gateway, router and firewall, and can act as a proxy for web, email, FTP, SIP and DNS. Up to four different networks (dependent on the number of network cards installed in the host PC) can be managed. Networks are configured through the web interface. With Endian these are differentiated by their color coding:
Red Network: connection to the insecure Internet.
Green Network: Secure intranet, e.g. file server.
Orange Network: Part Safe Demilitarized Zone (DMZ). This includes devices that operate their own server and must be accessible over the Internet, such as Web or FTP servers.
Blue Network: Secure wireless part, here on wireless devices can be connected. Thus, they are separated from the green network, which increases its security.
Endian Firewall includes support for load balancing, which means you can add another connection to the Internet from the red network. Endian Firewall then distributes the network load on both network interface controllers.
License
The software is developed by the Italian Endian Spa from Appiano, South Tyrol and a community of volunteer developers. The license model of Endian provides a commercial version and a free version:
The commercial version can be purchased either as a standalone software (the product is called Endian or simply E |
https://en.wikipedia.org/wiki/Genetics%20of%20infertility | About 10–15% of human couples are infertile, unable to conceive. In approximately in half of these cases, the underlying cause is related to the male. The underlying causative factors in the male infertility can be attributed to environmental toxins, systemic disorders such as, hypothalamic–pituitary disease, testicular cancers and germ-cell aplasia. Genetic factors including aneuploidies and single-gene mutations are also contributed to the male infertility. Patients with nonobstructive azoospermia or oligozoospermia show microdeletions in the long arm of the Y chromosome and/or chromosomal abnormalities, each with the respective frequency of 9.7% and 13%. A large percentage of human male infertility is estimated to be caused by mutations in genes involved in primary or secondary spermatogenesis and sperm quality and function. Single-gene defects are the focus of most research carried out in this field.
NR5A1 mutations are associated with male infertility, suggesting the possibility that these mutations cause the infertility. However, it is possible that these mutations individually have no major effect and only contribute to the male infertility by collaboration with other contributors such as environmental factors and other genomics variants. Vice versa, existence of the other alleles could reduce the phenotypic effects of impaired NR5A1 proteins and attenuate the expression of abnormal phenotypes and manifest male infertility solely.
NR5A1 roles in sex development and related disorders
Nuclear receptor subfamily 5 group A member 1 (NR5A1), also known as SF1 or Ad4BP (MIM 184757), is located on the long arm of chromosome 9 (9q33.3). The NR5A1 is an orphan nuclear receptor that was first identified following the search for a common regulator of the cytochrome P450 steroid hydroxylase enzyme family. This receptor is a pivotal transcriptional regulator of an array of genes involved in reproduction, steroidogenesis and male sexual differentiation and also plays a c |
https://en.wikipedia.org/wiki/Florian%20Brody | Florian Brody is an Austrian/American digital media creator, inventor, writer, public speaker, academic, and global business consultant. He is best known for his contributions to the invention and development of Expanded Books, an early form of E-books, at the Voyager Company, and for his writings and public speaking about digital media innovation and marketing, including TEDx talks in Austria, as well as his 1999 essay "The Medium is the Memory," originally published in MIT Press's The Digital Dialectic: New Essays on New Media, edited by Peter Lunenfeld.
Brody is a certified executive leadership coach, and supports European start-up businesses looking to enter the U.S. market. He served as principal at The Halo Agency from 2013 to 2017.
Career
Digital media innovation
In the late 1980s and early 1990s, Brody was head of the Expanded Books Project at the Voyager Company and was involved in the development and creation of their "expanded books", originally designed to be read on the then-new Apple PowerBook 100. The Voyager Company released their first expanded books on floppy disk for the PowerBook in 1992, and presented them at that year's MacWorld Expo. The books on this original disk were Jurassic Park by Michael Crichton, The Hitchhiker's Guide to the Galaxy by Douglas Adams, and Alice's Adventures in Wonderland by Lewis Carroll. Brody's public statements at the time on the Voyager Company's early expanded books, or 'e-books', were that he believed they were more of an experiment than a definitive 'product', paving the way for future versions of e-books for the next generation of less expensive, more lightweight, and more high-powered portable computers.
Digital evangelism
Brody has spoken about digital media innovation and marketing in both Europe and the US. He has done multiple TEDx talks in Austria.
Business and consultant work
Brody has been a principal partner at The Halo Agency, which provides business consultation to European start-up tech-base |
https://en.wikipedia.org/wiki/Polynomial%20decomposition | In mathematics, a polynomial decomposition expresses a polynomial f as the functional composition of polynomials g and h, where g and h have degree greater than 1; it is an algebraic functional decomposition. Algorithms are known for decomposing univariate polynomials in polynomial time.
Polynomials which are decomposable in this way are composite polynomials; those which are not are indecomposable polynomials or sometimes prime polynomials (not to be confused with irreducible polynomials, which cannot be factored into products of polynomials). The degree of a composite polynomial is always a composite number, the product of the degrees of the composed polynomials.
The rest of this article discusses only univariate polynomials; algorithms also exist for multivariate polynomials of arbitrary degree.
Examples
In the simplest case, one of the polynomials is a monomial. For example,
decomposes into
since
using the ring operator symbol ∘ to denote function composition.
Less trivially,
Uniqueness
A polynomial may have distinct decompositions into indecomposable polynomials where where for some . The restriction in the definition to polynomials of degree greater than one excludes the infinitely many decompositions possible with linear polynomials.
Joseph Ritt proved that , and the degrees of the components are the same up to linear transformations, but possibly in different order; this is Ritt's polynomial decomposition theorem. For example, .
Applications
A polynomial decomposition may enable more efficient evaluation of a polynomial. For example,
can be calculated with 3 multiplications and 3 additions using the decomposition, while Horner's method would require 7 multiplications and 8 additions.
A polynomial decomposition enables calculation of symbolic roots using radicals, even for some irreducible polynomials. This technique is used in many computer algebra systems. For example, using the decomposition
the roots of this irreducible polynomial can b |
https://en.wikipedia.org/wiki/List%20of%20WebGL%20frameworks | Frameworks are available to create WebGL content quickly and easily without building from the ground up.
Note: The following list mixes WebGL libraries with game engines as well as cloud services without any distinctions.
See also
WebGL
List of game engines
References
3D graphics APIs
Cross-platform software
Graphics libraries
Web development |
https://en.wikipedia.org/wiki/Kaby%20Lake | Kaby Lake is Intel's codename for its seventh generation Core microprocessor family announced on August 30, 2016. Like the preceding Skylake, Kaby Lake is produced using a 14 nanometer manufacturing process technology. Breaking with Intel's previous "tick–tock" manufacturing and design model, Kaby Lake represents the optimized step of the newer process–architecture–optimization model. Kaby Lake began shipping to manufacturers and OEMs in the second quarter of 2016, with its desktop chips officially launched in January 2017.
In August 2017, Intel announced Kaby Lake Refresh (Kaby Lake R) marketed as the 8th generation mobile CPUs, breaking the long cycle where architectures matched the corresponding generations of CPUs. Skylake was anticipated to be succeeded by the 10 nanometer Cannon Lake, but it was announced in July 2015 that Cannon Lake had been delayed until the second half of 2017. In the meantime, Intel released a fourth 14 nm generation on October 5, 2017, named Coffee Lake. Cannon Lake would ultimately emerge in 2018, but only a single mobile CPU was released before it was discontinued the following year.
Development history
As with previous Intel processors (such as the 8088, Banias, Dothan, Conroe, Sandy Bridge, Ivy Bridge, and Skylake), Kaby Lake's development was led by Intel's Israeli team, based in Haifa. Intel Israel Development Centers manager Ran Senderovitz said: "When we started out on the project, we were only thinking about basic improvements from the previous generation. But we began looking at things differently with a lot of innovation and determination and we achieved major improvements." He added that the performance of the seventh generation chips was improved by 12% for applications and 19% for Internet use compared with the sixth generation chips. Third-party benchmarks do not confirm these percentages as far as gaming is concerned.
Features
Built on an improved 14 nm process (14FF+), Kaby Lake features faster CPU clock speeds, cl |
https://en.wikipedia.org/wiki/Akshamsaddin | Akshamsaddin (Muhammad Shams al-Din bin Hamzah, ) (1389, Damascus – 16 February 1459, Göynük, Bolu), was an influential Ottoman Sunni Muslim scholar, poet, and mystic saint.
Biography
He was the grandson of Shahab al-Din al-Suhrawardi and a descendant of Abu Bakr al-Siddiq. He was an influential tutor and adviser to Sultan Mehmed the Conqueror. After completing his work with his master Sheikh Hacı Bayram-ı Veli, he founded the Shamsiyya-Bayramiyya Sufi order. He discovered the lost grave of Abu Ayyub al-Ansari (the companion of Muhammad) in Constantinople preceding the Siege of Constantinople.
In addition to his fame in religious sciences and Tasawwuf, Akshemsaddin was popular in the fields of medicine and pharmacology. There is not much reference to how he acquired this knowledge, but the Orientalist Elias John Wilkinson Gibb notes in his work History of Ottoman Poetry that Akshamsaddin learned from Haji Bayram Wali during his years with him. Akshamsaddin was also knowledgeable in the treatment of psychological and spiritual disorders. Akshamsaddin mentioned the microbe in his work Maddat ul-Hayat (The Material of Life) about two centuries prior to Antonie van Leeuwenhoek's discovery through experimentation:
Works
Risalat an-Nuriya
Khall-e Mushkilat
Maqamat-e Awliya
Kitab ut-Tib
Maddat ul-Hayat
References
Abu Ayyub al-Ansari
Abu Bakr
Bayramiye order
Turkish Muslims
15th-century Muslim scholars of Islam
15th-century Muslim theologians
Ottoman Sufis
Turkish Sufis
Sunni Sufis
Sunni Muslim scholars of Islam
15th-century writers from the Ottoman Empire
1389 births
1459 deaths
Microbiology
15th-century poets from the Ottoman Empire
Mehmed the Conqueror
Male poets from the Ottoman Empire
Scientists from the Ottoman Empire |
https://en.wikipedia.org/wiki/Backgammon%20match%20strategy | In backgammon, there are a number of strategies that are distinct to match play as opposed to money play. These differences are most apparent when a player is within a few points of winning the match.
Match format
Backgammon matches are played to a set number of points, ranging from 3 for informal matches to 25 or more for high level tournaments. Traditionally matches are played to an odd number of points, however there is no theoretical reason why a match should not be played to an even number of points.
The doubling cube
As with money play, the doubling cube is used. At the start of each game, the doubling cube is placed on the bar with the number 64 showing; the cube is then said to be "centered, on 1". When the cube is centered, the player about to roll may propose that the game be played for twice the current stakes. Their opponent must either accept ("take") the doubled stakes or resign ("drop" or "pass") the game immediately.
If a player accepts a double, the cube is placed on their side of the board with the corresponding power of two facing upward, to indicate that the right to re-double belongs exclusively to the player who last accepted a double; this player is then said to "own" the cube. A player who drops a double loses the game at the current value of the doubling cube. For example, if the cube is currently at 2 and a player wants to redouble the stakes to put it at 4, the opponent choosing to drop the redouble would concede 2 points to the opponent. There is no limit to the number of redoubles, although once the cube gets large enough further re-cubes won't matter to the outcome of the match and the cube is said to be "dead"; in practice a game is rarely doubled beyond 4 points. If a game is played to completion, the score is determined by the value of the doubling cube, multipled by 2 in the case of a gammon, and by 3 in the case of a backgammon. For example, a player losing a gammon with the cube at 2 would concede 4 points to the opponent.
Th |
https://en.wikipedia.org/wiki/Flying-spot%20store | The flying-spot store was an optical digital memory used in early stored program control components of electronic switching systems.
The flying-spot store used a photographic plate as the store of binary data. Each spot on the plate was an opaque (logical 0) or transparent (logical 1) area that stored one bit. Spots were read and written with an optical mechanism with an access time of ca. one microsecond. The optical system consisted of a cathode ray tube that functioned as a flying-spot scanner, the source of light beams produced on its face and focused onto the photographic plates with a system of lenses. A photomultiplier detected the light beam. The light beam could be split into several components to read multiple plates simultaneously, permitting the formation of a group of bits for each location.
A flying-spot store was the main permanent program and data memory for the first electronic central office installed on a trial basis in Morris, Illinois in 1960. The memory was organized as a set of nine photographic plates and permitted reading two spots per memory address, yielding a word size of 18 bits. For temporary data, the system used a barrier-grid electrostatic storage tube.
See also
1ESS switch
References
Computer memory
Cathode ray tube |
https://en.wikipedia.org/wiki/National%20Cyber%20Security%20Centre%20%28Ireland%29 | The National Cyber Security Centre (NCSC) is a government computer security organisation in Ireland, an operational arm of the Department of the Environment, Climate and Communications. The NCSC was developed in 2013 and formally established by the Irish government in July 2015. It is responsible for Ireland's cyber security, with a primary focus on securing government networks, protecting critical national infrastructure, and assisting businesses and citizens in protecting their own systems. The NCSC incorporates the Computer Security Incident Response Team (CSIRT-IE).
The NCSC is headquartered at 29/31 Adelaide Road, Dublin 2.
Mandate and organisation
The mandate for the NCSC includes;
activities to reduce the vulnerability of critical systems and networks within the state to incidents and cyber-attacks;
effective response when such attacks occur;
responsibility for the protection of critical information infrastructure;
establishing and maintaining cooperative relationships with national and international partners.
Threats identified to Ireland's critical infrastructure and government networks include: lone individuals, activist groups, criminal groups, terrorist groups, and nation states seeking to gather intelligence or to damage or degrade infrastructure. Incidents arising through extreme weather, human error and hardware or software failure also pose significant risks to individuals, businesses and public administration.
Work relating to the National Cyber Security Centre, and any records associated with the security of ICT systems in the state and outside it, are exempt from being disclosed under freedom of information (FOI).
Richard Browne was appointed as the NCSC's director in January 2022, having served as acting director for the previous 18 months.
Computer Security Incident Response Team (CSIRT-IE)
The Computer Security Incident Response Team (CSIRT-IE) was established in late 2011 (prior to the official formation of the NCSC) within the Depa |
https://en.wikipedia.org/wiki/Pulsatile%20secretion | Pulsatile secretion is a biochemical phenomenon observed in a wide variety of cell and tissue types, in which chemical products are secreted in a regular temporal pattern. The most common cellular products observed to be released in this manner are intercellular signaling molecules such as hormones or neurotransmitters. Examples of hormones that are secreted pulsatilely include insulin, thyrotropin, TRH, gonadotropin-releasing hormone (GnRH) and growth hormone (GH). In the nervous system, pulsatility is observed in oscillatory activity from central pattern generators. In the heart, pacemakers are able to work and secrete in a pulsatile manner. A pulsatile secretion pattern is critical to the function of many hormones in order to maintain the delicate homeostatic balance necessary for essential life processes, such as development and reproduction. Variations of the concentration in a certain frequency can be critical to hormone function, as evidenced by the case of GnRH agonists, which cause functional inhibition of the receptor for GnRH due to profound downregulation in response to constant (tonic) stimulation. Pulsatility may function to sensitize target tissues to the hormone of interest and upregulate receptors, leading to improved responses. This heightened response may have served to improve the animal's fitness in its environment and promote its evolutionary retention.
Pulsatile secretion in its various forms is observed in:
Hypothalamic-pituitary-gonadal axis (HPG) related hormones
Glucocorticoids
Insulin
Growth hormone
Parathyroid hormone
Neuroendocrine Pulsatility
Nervous system control over hormone release is based in the hypothalamus, from which the neurons that populate the pariventricular and arcuate nuclei originate. These neurons project to the median eminence, where they secrete releasing hormones into the hypophysial portal system connecting the hypothalamus with the pituitary gland. There, they dictate endocrine function via the four Hyp |
https://en.wikipedia.org/wiki/Rice%20University%20Electrical%20and%20Computer%20Engineering | The Rice University Department of Electrical and Computer Engineering is one of nine academic departments at the George R. Brown School of Engineering at Rice University. Ashutosh Sabharwal is the Department Chair. Originally the Rice Department of Electrical Engineering, it was renamed in 1984 to Electrical and Computer Engineering.
Research
Rice ECE Faculty perform research in the following areas: Computer Engineering; Data Science, Neuroengineering; Photonics, Electronics and Nano-devices, and Systems. Rice has a long history in digital signal processing (DSP) dating back to its inception in the late 1960s.
Computer Engineering faculty have a research focus in analog and mixed-signal design, VLSI signal processing, computer architecture and embedded systems, biosensors and computer vision, and hardware security and storage systems, including applications to education. Biosensors and mobile wireless healthcare are growing application areas in embedded systems research. Smartphones with imaging devices are leading to new areas in computer vision and sensing. In the area of computer architecture, research interests include parallel computing, large-scale storage systems, and resource scheduling for performance and power.
Data Science faculty integrate the foundations, tools and techniques involving data acquisition (sensors and systems), data analytics (machine learning, statistics), data storage and computing infrastructure (GPU/CPU computing, FPGAs, cloud computing, security and privacy) in order to enable meaningful extraction of actionable information from diverse and potentially massive data sources.
Neuroengineering faculty are members of the Rice Center for Neuroengineering, a collaborative effort with Texas Medical Center researchers. They develop technology for treating and diagnosing neural diseases. Current research areas include interrogating neural circuits at the cellular level, analyzing neuronal data in real-time, and manipulating healthy or dise |
https://en.wikipedia.org/wiki/Norton%20%28software%29 | Norton, formerly known as Norton by Symantec, is a brand of Gen Digital (formerly NortonLifeLock) based in Tempe, Arizona. Since being acquired by the Symantec Corporation in 1990, Norton offers a variety of products and services related to digital security, identity protection, and online privacy. In 2014, Norton's parent company Symantec separated their business into two units. One was focused on security and the other was focused on information management; Norton was placed in the unit focused on security. The company originally provided utility software for DOS.
History
Peter Norton Computing, Inc. was a software company founded by Peter Norton. Norton and his company developed various DOS utilities including the Norton Utilities which did not include antivirus features.
In 1990, the company was acquired by Symantec and renamed Peter Norton Consulting Group. Symantec's consumer antivirus and data management utilities are still marketed under the Norton name.
In early 1991, Symantec's Norton Group launched Norton AntiVirus 1.0 for PC and compatible computers. The company updated and diversified its product line until finally combining its offerings into one seamless product, Norton Security.
Products and Services
Norton's products are primarily digital security tools for personal computers, server devices and, more recently, mobile devices.
In the 1990s, Norton provided software to check computer systems for Y2K compliance.
The company's primary product is Norton Security. The software is licensed to individuals, small businesses and enterprises. It includes malware prevention and removal during the subscription period for up to five devices. Other features included in the product are a personal firewall, email spam filtering and phishing protection. The program was released in September 2014, replacing Norton 360, Norton Internet Security, and Norton AntiVirus. A mesh Wi-Fi network is developed by Norton, intended to protect computers inside the network fr |
https://en.wikipedia.org/wiki/Dose-fractionation%20theorem | The dose-fractionation theorem for tomographic imaging is a statement that says the total dose required to achieve statistical significance for each voxel of a computed 3D reconstruction is the same as that required to obtain a single 2D image of that isolated voxel at the same level of statistical significance. Hegerl and Hoppe have pointed out that a statistically significant 3D image can be computed from statistically insignificant projections, as long as the total dose that is distributed among these projections is high enough that it would have resulted in a statistically significant projection, if applied to only one image. The original derivations assumed weak-contrast imaging with additive noise, however, the dose-fractionation theorem was demonstrated using a more complete noise model by Yalisove, Sung, et al.
References
Condensed matter physics
Electron microscopy
Medical imaging
Geometric measurement
X-ray computed tomography
Multidimensional signal processing |
https://en.wikipedia.org/wiki/Crowther%20criterion | The conventional method to evaluate the resolution of a tomography reconstruction is determined by the Crowther criterion.
The minimum number of views, m, to reconstruct a particle of diameter D to a resolution of d (=1/R) is given by
References
Condensed matter physics
Electron microscopy
Medical imaging
Geometric measurement
X-ray computed tomography
Multidimensional signal processing |
https://en.wikipedia.org/wiki/Registration%20Data%20Access%20Protocol | The Registration Data Access Protocol (RDAP) is a computer network communications protocol standardized by a working group at the Internet Engineering Task Force in 2015, after experimental developments and thorough discussions. It is a successor to the WHOIS protocol, used to look up relevant registration data from such Internet resources as domain names, IP addresses, and autonomous system numbers.
While WHOIS essentially retrieves free text, RDAP delivers data in a standard, machine-readable JSON format. In order to accomplish this goal, the output of all operative WHOIS servers was analyzed, taking a census of the labels they used. RDAP designers, many of whom are members of number or name registries, strove to keep the protocol as simple as possible, since complexity was considered one of the reasons why previous attempts, such as CRISP, failed. RDAP is based on RESTful web services, so that error codes, user identification, authentication, and access control can be delivered through HTTP.
The biggest delay in getting RDAP done turned out to be the bootstrap, figuring out where the server is for each top level domain, IP range, or ASN range. IANA agreed to host the bootstrap information in suitable registries, and publish it at a well-known location URLs in JSON format. Those registries started empty and will be gradually populated as registrants of domains and address spaces provide RDAP server information to IANA. For number registries, ARIN set up a public RDAP service which also features a bootstrap URL, similar to what they do for WHOIS. For name registries, ICANN requires RDAP compliance since 2013.
Number resources
RDAP databases for assigned IP numbers are maintained by five Regional Internet registries. ARIN maintains a bootstrap database. Thanks to the standard document format, tasks such as, for example, getting the abuse team address of a given IP number can be accomplished in a fully automated manner.
Name resources
RDAP databases fo |
https://en.wikipedia.org/wiki/Nigerian%20Association%20of%20Mathematical%20Physics | The Nigerian Association of Mathematical Physics is a professional academic association of Nigerian mathematical physicists. The association is governed by its Council, which is chaired by the association's President, according to a set of Statutes and Standing Orders.
Notable members
Professor Awele Maduemezia
Professor Garba Babaji
References
Professional associations based in Nigeria
Mathematical physics |
https://en.wikipedia.org/wiki/Coupon%20%28PWB%29 | A coupon or test coupon is a printed circuit board (PCB) used to test the quality of a printed wiring board (PWB) fabrication process. Test coupons are fabricated on the same panel as the PWBs, typically at the edges. Coupons are then inspected to ensure proper layer alignment, electrical connectivity, and cross sectioned to inspect internal structures. Coupons can be designed custom for a PWB or selected from a vendor library.
Overview
A coupon is designed to include traces and vias with the same dimensions and structures as those of the main PWB. It is standard practice to locate coupons on the edges of a panel, from which multiple PWBs are fabricated, to verify the consistency of plating, etching, and lamination across the whole panel. The use of coupons for testing is a necessary step in accurately and reliably monitoring fabrication quality and consistency.
References
Further reading
https://www.polarinstruments.com/support/si/AP8186.html
https://www.polarinstruments.com/support/cits/AP132.html
https://electronics.stackexchange.com/questions/208856/how-do-i-lay-out-pcb-traces-for-a-given-differential-impedance
https://electronics.stackexchange.com/questions/216015/what-component-does-the-coupon-label-refer-to-in-terms-of-pcbs
Printed circuit board manufacturing
Quality control tools |
https://en.wikipedia.org/wiki/Golgi%20tendon%20organ | The Golgi tendon organ (GTO) (also called Golgi organ, tendon organ, neurotendinous organ or neurotendinous spindle) is a proprioceptor – a type of sensory receptor that senses changes in muscle tension. It lies at the interface between a muscle and its tendon known as the musculotendinous junction also known as the myotendinous junction. It provides the sensory component of the Golgi tendon reflex.
The Golgi tendon organ is one of several eponymous terms named after the Italian physician Camillo Golgi.
Structure
The body of the Golgi tendon organ is made up of braided strands of collagen (intrafusal fasciculi) that are less compact than elsewhere in the tendon and are encapsulated.
The capsule is connected in series (along a single path) with a group of muscle fibers () at one end, and merge into the tendon proper at the other.
Each capsule is about long, has a diameter of about , and is perforated by one or more afferent type Ib sensory nerve fibers (Aɑ fiber), which are large myelinated axons that can conduct nerve impulses very rapidly.
Inside the capsule, the afferent fibers lose their medullary sheaths, branch, intertwine with the collagen fibers, and terminate as flattened leaf-like endings between the collagen strands (see figure).
Function
When the muscle generates force, the sensory terminals are compressed. This stretching deforms the terminals of the Ib afferent axon, opening stretch-sensitive cation channels. As a result, the Ib axon is depolarized and fires nerve impulses that are propagated to the spinal cord. The action potential frequency signals the force being developed by 10-20 extrafusal muscle fibers in the muscle. Average level of activity in a tendon organ population is representative of the whole muscle force.
The Ib sensory feedback generates stretch reflexes and supraspinal responses which control muscle contraction. Ib afferents synapse with interneurons in the spinal cord that also project to the brain cerebellum and cerebral cor |
https://en.wikipedia.org/wiki/CoderDojo | CoderDojo is a global volunteer-led community of free programming workshops for young people (not to be confused with Code Ninjas who is also a coding business that refers to their locations as dojos). The movement is a grassroots organisation with individual clubs (called "Dojos") acting independently. A charity called the CoderDojo Foundation operates out of Dublin, Ireland, and supports the various clubs by providing a central website and other support services. Supporters of CoderDojo believe it is part of the solution to addressing the global shortage of programmers by getting young people more involved with ICT learning. The movement has seen significant growth since its founding. The CoderDojo Foundation estimates 1,250 Dojos spread across 69 countries, with a growth rate of several new Dojos every week.
History
Founded in July 2011 by James Whelton and Bill Liao, the first Dojo took place in NSC Cork, Ireland, on 23 July. James and Bill were self-taught programmers and wanted to create a space where young people could learn code in a social environment. In less than one year, the CoderDojo movement was spread across Ireland and other cities like London in England, and San Francisco in the United States.
In May 2017, Raspberry Pi foundation merged with CoderDojo.
Press Coverage
CoderDojo received positive reviews from newspapers including BBC, CNN, The Guardian, The Irish Times and TechCrunch.
In 2015, Salesforce announced a partnership and a grant of $200,000 to CoderDojo in order to help "support 14 CoderDojo code clubs – or Dojos – globally, with each of them being run by Salesforce.com "champions".
CoderDojo Girls
Many CoderDojo volunteers focus on improving the extreme shortage of women in technology by using specific strategies to engage girls. In particular, challenging the socially accepted idea among young women that the world of the computer sciences is "not for them". Some Dojos have even chosen to run special CoderDojo Girls sessions to en |
https://en.wikipedia.org/wiki/Von%20Foerster%20equation | The McKendrick–von Foerster equation is a linear first-order partial differential equation encountered in several areas of mathematical biology – for example, demography and cell proliferation modeling; it is applied when age structure is an important feature in the mathematical model. It was first presented by Anderson Gray McKendrick in 1926 as a deterministic limit of lattice models applied to epidemiology, and subsequently independently in 1959 by biophysics professor Heinz von Foerster for describing cell cycles.
Mathematical formula
The mathematical formula can be derived from first principles. It reads:where the population density is a function of age and time , and is the death function. When , we have:
It relates that a population ages, and that fact is the only one that influences change in population density; the negative sign shows that time flows in just one direction, that there is no birth and the population is going to die out.
Derivation
Suppose that for a change in time and change in age , the population density is:That is, during a time period the population density decreases by a percentage . Taking a Taylor series expansion to order gives us that:We know that , since the change of age with time is 1. Therefore, after collecting terms, we must have that:
Analytical solution
The von Foerster equation is a continuity equation; it can be solved using the method of characteristics. Another way is by similarity solution; and a third is a numerical approach such as finite differences.
To get the solution, the following boundary conditions should be added:
which states that the initial births should be conserved (see Sharpe–Lotka–McKendrick’s equation for otherwise), and that:
which states that the initial population must be given; then it will evolve according to the partial differential equation.
Similar equations
In Sebastian Aniţa, Viorel Arnăutu, Vincenzo Capasso. An Introduction to Optimal Control Problems in Life Sciences and Eco |
https://en.wikipedia.org/wiki/Electronic%20entropy | Electronic entropy is the entropy of a system attributable to electrons' probabilistic occupation of states. This entropy can take a number of forms. The first form can be termed a density of states based entropy. The Fermi–Dirac distribution implies that each eigenstate of a system, , is occupied with a certain probability, . As the entropy is given by a sum over the probabilities of occupation of those states, there is an entropy associated with the occupation of the various electronic states. In most molecular systems, the energy spacing between the highest occupied molecular orbital and the lowest unoccupied molecular orbital is usually large, and thus the probabilities associated with the occupation of the excited states are small. Therefore, the electronic entropy in molecular systems can safely be neglected. Electronic entropy is thus most relevant for the thermodynamics of condensed phases, where the density of states at the Fermi level can be quite large, and the electronic entropy can thus contribute substantially to thermodynamic behavior. A second form of electronic entropy can be attributed to the configurational entropy associated with localized electrons and holes. This entropy is similar in form to the configurational entropy associated with the mixing of atoms on a lattice.
Electronic entropy can substantially modify phase behavior, as in lithium ion battery electrodes, high temperature superconductors, and some perovskites. It is also the driving force for the coupling of heat and charge transport in thermoelectric materials, via the Onsager reciprocal relations.
From the density of states
General Formulation
The entropy due to a set of states that can be either occupied with probability or empty with probability can be written as:
,
where is Boltzmann constant.
For a continuously distributed set of states as a function of energy, such as the eigenstates in an electronic band structure, the above sum can be written as an integral over the |
https://en.wikipedia.org/wiki/Sleeping%20sickness%20of%20Kalachi%2C%20Kazakhstan | The sleeping sickness of Kalachi, Kazakhstan (with the place or the syndrome sometimes called sleepy hollow) is a conjectured medical condition which causes a person to sleep for days or weeks at a time, together with other symptoms such as hallucinations, nausea, intoxicated behavior, disorientation and memory loss. The phenomenon was only reported in Kalachi and the nearby village of Krasnogorsk. It was first reported in March 2013 and by 2016 had affected about 150 people. The syndrome appeared to be non-communicable. The disease disappeared for some time but re-emerged in 2015, and affected all age groups.
Potential causes of the syndrome were suggested to be carbon monoxide poisoning or contamination of the ground water supply by chemicals used for military operations in the region.
Signs and symptoms
Other than excessive sleep, the disease causes hallucination, nausea and vomiting, and disorientation. Victims of the disease would sometimes act as if they were drunk, would experience memory loss about what they had done and experienced, and would often experience hallucinations like a "snail walking over their face". In a statement, a professor from Tomsk Polytechnic University, Leonid Rikhvanov, of the department of geo-ecology and geo-chemistry, said that radon gas from the mine could be the cause of the symptoms.
The affected people would fall asleep during day-to-day activities and always feel sleepy. As a local nurse described the phenomenon to an RT news crew, "You wake them up, they can speak to you, reply to you, but as soon as you stop talking and ask what bothers them, they just want to sleep, sleep, sleep."
Cause
Kazakh officials gave a report about the disease, stating that heightened levels of carbon monoxide, along with other hydrocarbons due to flooding of an abandoned Soviet-era uranium mine nearby, was causing the syndrome, by spreading through the village's air. Concentration of carbon monoxide and reduced oxygen in the air were concluded |
https://en.wikipedia.org/wiki/Etherington%27s%20reciprocity%20theorem | The Etherington's distance-duality equation is the relationship between the luminosity distance of standard candles and the angular diameter distance. The equation is as follows: , where is the redshift, is the luminosity distance and the angular-diameter distance.
History and derivations
When Ivor Etherington introduced this equation in 1933, he mentioned that this equation was proposed by Tolman as a way to test a cosmological model. Ellis proposed a proof of this equation in the context of Riemannian geometry. A quote from Ellis: "The core of the reciprocity theorem is the fact that many geometric properties are invariant when the roles of the source and observer in astronomical observations are transposed". This statement is fundamental in the derivation of the reciprocity theorem.
Validation from astronomical observations
The Etherington's distance-duality equation has been validated from astronomical observations based on the X-ray surface brightness and the Sunyaev–Zel'dovich effect of galaxy clusters. The reciprocity theorem is considered to be true when photon number is conserved, gravity is described by a metric theory with photons traveling on unique null geodesics. Any violation of the distance duality would be attributed to exotic physics provided that astrophysical effects altering the cosmic distance measurements are well below the statistical errors. For instance, an incorrect modelling of the three-dimensional gas density profile in galaxy clusters may introduce systematic uncertainties in the determination of the cluster angular diameter distance from X-ray and/or SZ observations, thus altering the outcome of the distance-duality test. Similarly, unaccounted extinction from a diffuse dust component in the inter-galactic medium can affect the determination of luminosity distances and cause a violation of the distance-duality relation.
See also
Distance measures (cosmology)
References
Physical quantities |
https://en.wikipedia.org/wiki/Molecular%20vapor%20deposition | Molecular vapor deposition is the gas-phase reaction between surface reactive chemicals and an appropriately receptive surface. Often bi-functional silanes are used in which one termination of the molecule is reactive. For example, a functional chlorosilane (R-Si-Cl3) can react with surface hydroxyl groups (-OH) resulting a radicalized (R) deposition on the surface. The advantage of a gas phase reaction over a comparable liquid phase process is the control of moisture from the ambient environment, which often results in cross polymerization of the silane leading to particulates on the treated surface. Often a heated sub-atmospheric vacuum chamber is used to allow precise control of the reactants and water content. Additionally the gas phase process allows for easy treatment of complex parts since the coverage of the reactant is generally diffusion limited. Microelectromechanical Systems (MEMS) sensors often use molecular vapor deposition as a technique to address stiction and other parasitic issues relative to surface-to-surface interactions.
References
Industrial processes
Thin film deposition |
https://en.wikipedia.org/wiki/ICTACEM | The International Conference on Theoretical, Applied, Computational and Experimental Mechanics (ICTACEM) is a professional organization in the field of Engineering. The ICTACEM was founded by (Late) Prof. P.K. Sinha of Department of Aerospace Engineering, Indian Institute of Technology Kharagpur as Conference on Theoretical applied, Computation and experimental mechanics(CTACEM) in 1998, which was later dignified as ICTACEM in 2001.
The first International conference was held on December 1, 1998.
Since then, the organization has constituted more than 250 committee members and delegates, all over the world.
The conference has been organized every three years since the inaugural in 1998.
The conference is known for addressing a major-scale of renowned Scientist, Astronauts, Researchers and Professors throughout the world.
Conference Themes
ICTACEM 2017 [10]
Fluid Mechanics, Solid Mechanics, Flight Mechanics & Control, Propulsion [11]
References
External links
1998 conferences
International conferences in India
Aerospace engineering organizations
Indian engineering organisations
International professional associations
Professional associations based in India
International conferences |
https://en.wikipedia.org/wiki/Zero%3A%20The%20Biography%20of%20a%20Dangerous%20Idea | Zero: The Biography of a Dangerous Idea is a non-fiction book by American author and journalist Charles Seife. The book was initially released on February 7, 2000, by Viking.
Background
The book offers a comprehensive look at number 0 and its controverting role as one of the great paradoxes of human thought and history since its invention by the ancient Babylonians or the Indian people. Even though zero is a fundamental idea for the modern science, initially the notion of a complete absence got a largely negative, sometimes hostile, treatment by the Western world and Greco-Roman philosophy. Zero won the 2001 PEN/Martha Albrand Award for First Nonfiction Book.
Review
See also
References
External links
Profile on goodreads.com
Popular mathematics books
2000 non-fiction books
Biographical books
Philosophy of mathematics literature |
https://en.wikipedia.org/wiki/User%20behavior%20analytics | User behavior analytics (UBA) or User and Entity Behavior Analytics (UEBA), is the concept of analyzing the behavior of users, subjects, visitors, etc. for a specific purpose. It allows cybersecurity tools to build a profile of each individual's normal activity, by looking at patterns of human behavior, and then highlighting deviations from that profile (or anomalies) that may indicate a potential compromise.
Purpose of UBA
The reason for using UBA, according to Johna Till Johnson from Nemertes Research, is that "security systems provide so much information that it is tough to uncover information that truly indicates a potential for a real attack. Analytics tools help make sense of the vast amount of data that SIEM, IDS/IPS, system logs, and other tools gather. UBA tools use a specialized type of security analytics that focuses on the behavior of systems and the people using them. UBA technology first evolved in the field of marketing, to help companies understand and predict consumer-buying patterns. But as it turns out, UBA can be extraordinarily useful in the security context too."
Distinction between UBA and UEBA
The E in UEBA extends the analysis to include entity activities that take place but that are not necessarily directly linked or tied to a user's specific actions but that can still correlate to a vulnerability, reconnaissance, intrusion breach or exploit occurrence.
The term "UEBA" was coined by Gartner in 2015. UEBA tracks the activity of devices, applications, servers and data. UEBA systems produce more data and provide more complex reporting options than UBA systems.
Difference with EDR
UEBA Tools differ from Endpoint detection and response (EDR) capabilities in that UEBA is an analytic focus on the user whereas EDR has an analytic focus on the endpoint.
See also
Behavioral analytics
Network behavior anomaly detection
User activity monitoring
References
External links
ABC's Of UBA
Software |
https://en.wikipedia.org/wiki/List%20of%20video%20game%20museums | This list of video game museums shows video game museums in the world.
Video game museums
Online video game museums
See also
List of museums
Video game
List of computer museums
References
External links
Internet Arcade – web-based library of arcade (coin-operated) video games from the 1970s through to the 1990s
Software Library: MS-DOS Games
Lists of museums by subject
Virtual museums |
https://en.wikipedia.org/wiki/Warwick%20Tucker | Warwick Tucker is an Australian mathematician at Monash University (previously deputy Chair and Chair at the Department of Mathematics at Uppsala University 2009–2020) who works on dynamical systems, chaos theory and computational mathematics. He is a recipient of the 2002 R. E. Moore Prize, and the 2004 EMS Prize.
Tucker obtained his Ph.D. in 1998 at Uppsala University (thesis: The Lorenz attractor exists) with Lennart Carleson as advisor.
In 2002, Tucker succeeded in solving an important open problem that had been posed by Stephen Smale (the fourteenth problem on Smale's list of problems).
He was an invited speaker at the conference Dynamics, Equations and Applications in Kraków in 2019.
References
External links
Year of birth missing (living people)
Living people
Swedish mathematicians
Dynamical systems theorists
Australian mathematicians
Academic staff of Uppsala University |
https://en.wikipedia.org/wiki/What%20%28ITS%20utility%29 | What (typed as in the prompt) was a small information utility available in the Incompatible Timesharing System. It could provide information about incoming email, bus schedule on the MIT campus, executable source files or answer the user in a humorous manner.
Implementation
was written in the MIDAS assembly language. It can still be used on some of the ITS instances maintained across the web. The last traceable edit of the source code was by Ken L. Harrenstien on 16 May 1988.
Usage examples
Without arguments would print information about inbox status:
*:what
You don't seem to have any recent messages.
:KILL E$J
*
With the argument bus it would print out information about the next few buses leaving from the MIT campus:
*:what bus
It is now 12:50
Bus 83 leaves Central Sq 13:10, 13:30, 13:45, 14:00, ...
Bus 83 leaves Ringworld/Alewife 13:00, 13:20, 13:40, 13:55, ...
:KILL E$J
*
Asked about source for NAME, responded with paths to source files corresponding to NAME:
*:what source for what
UP:SYSENG;
0 WHAT 201 3 +487 11/30/1987 17:33:23 (5/2/2015) KLH
0 WHAT 204 3 +493 5/16/1988 19:13:03 (5/4/2015) KLH
*
Not knowing the answer, it would often resort to humor:
*:what is life
You tell me.
:KILL E$J
*
Finally, displayed some amount of introspection:
*:what is this
It's an all purpose utility program, dummy!
:KILL E$J
*:what are you
I am an omniscient utility program, idiot!
:KILL E$J
*
See also
Incompatible Timesharing System
Dynamic debugging technique
Maclisp
External links
ITS System Documentation
UP: Public ITS system operated by the Update Computer Club at Uppsala University
Website for ITS system hobbyists with much information and documentation
Massachusetts Institute of Technology
Time-sharing operating systems
Utility software |
https://en.wikipedia.org/wiki/Online%20Egyptological%20Bibliography | The Online Egyptological Bibliography (OEB) is an online database of printed publications in the field of Egyptology, published by the Griffith Institute, Oxford.
The OEB is the successor of the Annual Egyptological Bibliography (AEB), which appeared in print until 2001.
Annual Egyptological Bibliography
One of the initial goals of the International Association of Egyptologists (IAE) at its foundation in 1947 was to produce overviews of literature relevant to Egyptology, to aid Egyptological research. Jozef M.A. Janssen, a Dutch Egyptologist at Leiden University, was asked to publish a yearly list of titles with abstracts. The first volume appeared in 1948. Volumes 1 (1947)-30 (1976) were published by Brill, volumes 31 (1977)-35 (1981) by Aris & Phillips Ltd.
After Janssen’s death in 1963, Dutch Egyptologist M.S.G.H. Heerma van Voss assumed the task of AEB Editor-in-Chief, with the help of a number of assistant editors. He was succeeded by Jac. J. Janssen (1967–1978), L.M.J. Zonhoven (1979–1984), and W. Hovestreydt (1984–2008).
In the 1980s, yearly volumes of Preliminary Egyptological Bibliography were also published.
Due to budget cuts at Leiden University, The Netherlands Institute for the Near East (NINO) took responsibility for the AEB in 1992. Volumes 36 (1982)-53 (2001) were published by NINO. Hovestreydt together with H.S. van den Berg developed a digital administration of the bibliographical information, which led to the publication in 2001 of the CD-ROM Egyptological bibliography 1822–1997 (which included the digitized information of C. Beinlich's Bibliographie Altägypten 1822–1947), and the AEB Online website in 2007.
Move to Oxford
Starting from 2009, the AEB was transferred to Oxford and renamed to the Online Egyptological Bibliography. No more print volumes were published. In 2011, the German bibliography Aigyptos was incorporated.
External links
Egyptology
Online databases |
https://en.wikipedia.org/wiki/SolidRun | SolidRun is an Israeli company producing Embedded systems components, mainly mini computers, Single-board computers and computer-on-module devices. It is specially known for the CuBox family of mini-computers, and for producing motherboards and processing components such as the HummingBoard motherboard.
Situated in Acre, Israel, SolidRun develops and manufactures products aimed both for the private entertainment sector, and for companies developing processor based products, notably components of "Internet of Things" technology systems.
Within the scope of the IoT technology, SolidRun's mini computers are aimed to cover the intermediate sphere, between sensors and user devices, and between the larger network or Cloud framework. Within such a network, mini computers or system-on-module devices, act as mediators gathering and processing information from sensors or user devices and communicating with the network - this is also known as Edge computing.
History
SolidRun was founded in 2010 by co-founders Rabeeh Khoury (formally an engineer at Marvell Technology Group) and Kossay Omary. The goal of SolidRun has been to develop, produce and market components aimed for integration with IoT systems.
The company today is situated in Acre in the Northern District of Israel, and headed by Dr. Atai Ziv (CEO).
The major product development line aimed at the consumer market is the CuBox family of mini-computers. The first of which was announced in December 2011, followed by the development of the CuBox-i series, announced in November 2013. The most recent addition to the CuBox line has been the CuBoxTV (announced in December 2014), which has been marketed primarily for the home entertainment market. A further primary product developed by SolidRun is the Hummingboard, an uncased single-board computer, marketed to developers as an integrated processing component.
SolidRun develops all of its products using Open-source software (such as Linux and OpenELEC), identifying itself a |
https://en.wikipedia.org/wiki/Enterprise%20legal%20management | Enterprise legal management (ELM) is a practice management strategy of corporate legal departments, insurance claims departments, and government legal and contract management departments.
ELM developed during the 1990s in response to increased corporate demands for accountability, transparency, and predictability, and employs software to manage internal legal documents and workflows, electronic billing and invoicing, and to guide decision-making through reporting and analytics.
Definitions
Still an evolving term, ELM is a recognized management discipline and a strategic objective of general counsel. Some have argued that ELM falls within the broader category of corporate governance, risk, and compliance (GRC); others maintain that ELM and GRC are separate entities along a continuum.
Separate but related technologies include information governance, electronic discovery, legal hold, contract management, corporate secretary, and board of directors’ communications. ELM software may integrate some or all of these components.
Historical development
Early practice management
Law practice management refers to the business aspect of operating a law firm or in-house legal team. Components include economics, workplace communication and management, ethics, and client service.
Historically, corporate legal spend was considered a “black box” with limited predictability and transparency, making it difficult for corporate legal teams to parse differences of efficiency and cost among outside firms, or to benchmark firm performance against previously hired counsel.
Transition and early adoption
Several factors led to a shift away from traditional, low-technology solutions and toward ELM, most notably the expansion of the Internet during the 1990s and subsequent development of Software as a service (SaaS) platforms. Within legal departments, factors included greater regulatory compliance risk, smaller budgets, and board member demands for greater accountability, predictabilit |
https://en.wikipedia.org/wiki/Eddystone%20%28Google%29 | Eddystone was a Bluetooth Low Energy beacon profile released by Google in July 2015. In December 2018 Google stopped delivering both Eddystone and Physical Web beacon notifications. The Apache 2.0-licensed, cross-platform, and versioned profile contained several frame types, including Eddystone-UID, Eddystone-URL, and Eddystone-TLM. Eddystone-URL was used by the Physical Web project, whereas Eddystone-UID was typically used by native apps on a user's device, including Google's first party apps such as Google Maps.
Background
The format was named after the Eddystone Lighthouse in the UK, motivated by the simplicity of a lighthouse-signal and its one-directional nature.
Technical details
Though similar to the iBeacon profile released by Apple in 2013, Eddystone can be implemented without restriction. Eddystone also contains a telemetry frame (Eddystone-TLM) designed for reporting on a beacon's health, including, for example, battery level. Like other beacon technology, beacons with Eddystone can give devices a better indication of what objects and places are around them. Importantly, beacons do not generally accept connections from other devices, meaning that the beacon itself cannot record what devices are in its vicinity. In many cases, the simplicity of the beacon frame means that an app (for example Google Chrome) is required in order to interpret the beacon's signal.
Nearby Messages is the API that can be used off of this protocol to receive data that is stored within beacons. Differing from iBeacon, Google beacons use not only Bluetooth but also WiFi and near ultrasonic sounds to communicate between devices.
Eddystone has 4 frame types.
Eddystone-UID broadcasts an identifying code that allows apps to retrieve information from app servers. These can be used for indoor location, identification of physical objects, and to interact with apps in any way the developer decides.
Eddystone-EID broadcasts an encrypted rotating identifier in order to increase the sec |
https://en.wikipedia.org/wiki/The%20Art%20of%20Mathematics | The Art of Mathematics (), written by Hong Sung-Dae (), is a series of mathematics textbooks for high school students in South Korea. First published in 1966, it is the best-selling book series in South Korea, with about 46 million copies sold as of 2016. In Jeongeup, North Jeolla Province, the hometown of Hong Sung-Dae, a street is named Suhakjeongseok-gil () in honor of the author.'
Controversy
The similarities with the Japanese Textbook series Chart-Style Math () have caused the author to receive accusations of plagiarism. The chapter division, style of explanation, and formatting are visibly similar between the books. For instance, in the Japanese books, the order of questions are in "Example Questions, Practice Questions, Exercise Questions," while in The Art of Mathematics it is "Example Questions, Similar Questions, Practice Questions". The author Hong has denied all accusations, although he has admitted that the questions in the books were selected from 20 reference books around the world.
Major topics in the 11th edition
Changes in the 11th edition, published 2013-2015, reflect the 2009 revision of South Korea's National Curriculum. Each of the six volumes consist of two versions, one for average students () and one for higher-ability students ().
Mathematics I
Polynomials (다항식 da-hang-sik)
Equations and Inequalities (방정식과 부등식 bang-jeong-sik-gwa boo-deung-sik)
Graphs of Equations (방정식의 그래프 bang-jeong-sik-eui geu-re-pu)
Mathematics II
Sets and Propositions (집합과 명제 jib-hab-gwa myung-jeh)
Functions (함수 ham-soo)
Sequences (수열 soo-yeul)
Exponents and Logarithms (지수와 로그함수 ji-soo-wa lo-geu-ham-soo)
Probability and Statistics
Permutations and Combinations (순열과 조합 soon-yeul-gwa jo-hab)
Probability (확률 hwang-lyul)
Statistics (통계 tong-gye)
Calculus I
Limits of Sequences (수열의 극한 soo-yeul-eui geuk-han)
Limits and Continuity (극한과 연속성 geuk-han-gwa yeon-sok-sung)
Differentiation of Polynomial Functions (다항식의 미분 da-hang-sik-eui mi-boon)
Integration of Polynomial |
https://en.wikipedia.org/wiki/Franklin%27s%20electrostatic%20machine | Franklin's electrostatic machine is a high-voltage static electricity-generating device used by Benjamin Franklin in the mid-18th century for research into electrical phenomena. Its key components are a glass globe which turned on an axis via a crank, a cloth pad in contact with the spinning globe, a set of metal needles to conduct away the charge developed on the globe by its friction with the pad, and a Leyden jara high-voltage capacitorto accumulate the charge. Franklin's experiments with the machine eventually led to new theories about electricity and inventing the lightning rod.
Background
Franklin was not the first to build an electrostatic generator. European scientists developed machines to generate static electricity decades earlier. In 1663, Otto von Guericke generated static electricity with a device that used a sphere of sulfur. Francis Hauksbee developed a more advanced electrostatic generator around 1704 using a glass bulb that had a vacuum. He later replaced the globe with a glass tube of about emptied of air. The glass tube was a less effective static generator than the globe, but it became more popular because it was easier to use.
Machines that generated static electricity with a glass disc were popular and widespread in Europe by 1740. In 1745, German cleric Ewald Georg von Kleist and Dutch scientist Pieter van Musschenbroek discovered independently that the electric charge from these machines could be stored in a Leyden jar, named after the city of Leiden in the Netherlands.
In 1745, Peter Collinson, a businessman from London who corresponded with American and European scientists, donated a German "glass tube" along with instructions how to make static electricity, to Franklin's Library Company of Philadelphia. Collinson was the library's London agent and provided the latest technology news from Europe. Franklin wrote a letter to Collinson on March 28, 1747, thanking him, and saying the tube and instructions had motivated several colleague |
https://en.wikipedia.org/wiki/Miss%20Universe%202016 | Miss Universe 2016 was the 65th Miss Universe pageant, held at the SM Mall of Asia Arena, in Pasay, Metro Manila, Philippines on 30 January 2017. This is the second time in the history of the competition that the pageant skipped an entire year, following the 2014 pageant which was held in January 2015.
At the end of the event, Pia Wurtzbach of the Philippines crowned Iris Mittenaere of France as Miss Universe 2016. This is France's first victory in sixty-three years, and the second victory of the country in the pageant's history.
Contestants from eighty-six countries and territories competed in this year's pageant. The competition featured Steve Harvey as host, and supermodel Ashley Graham as the backstage host. American entertainers Flo Rida and Boyz II Men performed in this year's pageant.
Background
Location and date
The Miss Universe Organization was in talks to host the Miss Universe 2016 competition in the Philippines. Discussions began when Miss Universe 2015 Pia Wurtzbach met with then-Philippine President Rodrigo Duterte. Although Duterte was open to having the pageant hosted by the Philippines, he did not want the government to pay the expense of doing so. About two weeks after the meeting, the Department of Tourism named the Philippines as the host country. According to Miss Universe Organization president Paula Shugart, the Philippines is the organization's top choice for hosting the pageant. However, other countries were being considered, according to a spokesperson for the department.
Despite the statement made by the Department of Tourism, the decision to hold the pageant in the Philippines is not yet final, and over the next few months, the Miss Universe Organization changed its mind several times on the matter. Initial reports did not disclose the reasons for the breakdowns in negotiations, but a report linked the Organization's concerns with Duterte's controversial remarks regarding U.S. President Barack Obama, as well as his plans to separat |
https://en.wikipedia.org/wiki/Sentroller | A sentroller, used in the Internet of things is a sensor, controller or actuator or combination of these three.
Sentrollers in the Internet of things
The current Internet is an Internet of people, based on people communicating with people, using smartphones, tablets, laptops and computers, but this is changing: equipment and devices connected to the Internet (e.g. set-top boxes, cameras, cars) are starting to shift the balance away from people towards things. The future is clearly moving into a direction where the number of things connected to the Internet will overwhelm the number of connected people. Predictions range up to a factor of 100 to 1 or more, and thus the Internet of people will transform into the Internet of things. Thereby, the Internet of things will connect to and communicate directly with other "things", rather than directly with people.
Many of the new things connected to the Internet will be sentrollers, which means they are either actuators, sensors, controllers, or combinations of these three things. One simple example is a home thermostat. A thermostat is a sentroller as it senses the temperature in the home, checks whether the home or room in which the thermostat is monitoring temperature is at the desired temperature, and if not, turns on the heater or the air conditioner. Therefore, a thermostat is a sensor and a controller – a sentroller. No human interaction with the thermostat or the cloud will be necessary for the thermostat to keep the heat in the home at the right level.
In practice, sentrollers absorb and/or produce very limited amounts of information, but connectivity to the internet is essential for their operation. The Internet of things will host the applications that know how to interpret the information provided by sentrollers and what action to be taken. The smarts of the smart home, smart energy, smart buildings, etc. actually reside in the cloud. The sentrollers are the end nodes that will become the majority population o |
https://en.wikipedia.org/wiki/Delpher | Delpher is a website providing full-text Dutch-language digitized historical newspapers, books, journals and copy sheets for radio news broadcasts. The material is provided by libraries, museums and other heritage institutions and is developed and managed by the Royal Library of the Netherlands. Delpher is freely available and includes as of June 2022 in total over 130 million pages from about 2 million newspapers, 900,000 books and 12 million journal pages that date back to the 15th century.
Collections
Books: 900,000 books, from the 17th century onwards
Journals: 12 million journal articles from 1800-2000
Newspapers: about 17 million pages from more than 2 million issues from the Netherlands, Dutch East Indies, Netherlands Antilles and Surinam, from 1618 to 2005. This represents about 15% of the total published newspaper output in the Netherlands in this period.
Typoscripts for radio broadcasts by the Algemeen Nederlands Persbureau (ANP), 1.474.359 million typed sheets from 1937 to 1984.
Notes
External links
Geschiedenis24 tests Delpher; New search system of great value for research, Jurryt van de Vooren on NPO Geschiedenis, 20-11-2013
Van beta naar beter, M. Napolitano en M. Laan, Informatieprofessional 2015-01 (offline)
Dutch digital libraries
Online archives
Scholarly search services |
https://en.wikipedia.org/wiki/Nikolai%20Ivanov%20%28mathematician%29 | Nikolai V. Ivanov (, born 1954) is a Russian mathematician who works on topology, geometry and group theory (particularly, modular Teichmüller groups). He is a professor at Michigan State University.
He obtained his Ph.D. under the guidance of Vladimir Abramovich Rokhlin in 1980 at the Steklov Mathematical Institute.
According to Google Scholar, on 5 July 2020, Ivanov's works had received 2,376 citations and his h-index was 22.
He is a fellow of the American Mathematical Society since 2012.
He is the author of the 1992 book Subgroups of Teichmüller Modular Groups.
Among his contributions to mathematics are his classification of subgroups of surface mapping class groups, and the establishment that surface mapping class groups satisfy the Tits alternative.
Selected publications
"Automorphisms of complexes of curves and of Teichmuller spaces" (1997), International Mathematics Research Notices 14, pp. 651–666.
with John D. McCarthy: "On injective homomorphisms between Teichmüller modular groups I" (1999), Inventiones mathematicae 135 (2), pp. 425–486.
"On the homology stability for Teichmüller modular groups: closed surfaces and twisted coefficients" (1993), Contemporary Mathematics 150, pp. 149–149.
References
External links
N. V. Ivanov website
Ivanov's blog
1954 births
Topologists
Geometers
Living people
Fellows of the American Mathematical Society
Michigan State University faculty
Steklov Institute of Mathematics alumni
20th-century Russian mathematicians
21st-century Russian mathematicians
Soviet mathematicians |
https://en.wikipedia.org/wiki/Soil-adjusted%20vegetation%20index | Empirically derived NDVI products have been shown to be unstable, varying with soil colour, soil moisture, and saturation effects from high density vegetation. In an attempt to improve NDVI, Huete developed a vegetation index that accounted for the differential red and near-infrared extinction through the vegetation canopy. The index is a transformation technique that minimizes soil brightness influences from spectral vegetation indices involving red and near-infrared (NIR) wavelengths.
The index is given as:
where L is a canopy background adjustment factor. An L value of 0.5 in reflectance space was found to minimize soil brightness variations and eliminate the need for additional calibration for different soils.
The transformation was found to nearly eliminate soil-induced variations in vegetation indices.
References
External links
SAVI Derivation from First Principles
SAVI Specifications for Landsat
SAVI vs NDVI Spectral Comparison
Satellite meteorology
Remote sensing
Biogeography |
https://en.wikipedia.org/wiki/Vivado | Vivado Design Suite is a software suite produced by AMD (previously Xilinx) for synthesis and analysis of hardware description language (HDL) designs, superseding Xilinx ISE with additional features for system on a chip development and high-level synthesis. Vivado represents a ground-up rewrite and re-thinking of the entire design flow (compared to ISE).
Like the later versions of ISE, Vivado includes the in-built logic simulator. Vivado also introduces high-level synthesis, with a toolchain that converts C code into programmable logic.
Replacing the 15 year old ISE with Vivado Design Suite took 1000 man-years and cost US$200 million.
Features
Vivado was introduced in April 2012, and is an integrated design environment (IDE) with system-to-IC level tools built on a shared scalable data model and a common debug environment. Vivado includes electronic system level (ESL) design tools for synthesizing and verifying C-based algorithmic IP; standards based packaging of both algorithmic and RTL IP for reuse; standards based IP stitching and systems integration of all types of system building blocks; and the verification of blocks and systems. A free version WebPACK Edition of Vivado provides designers with a limited version of the design environment.
Components
The Vivado High-Level Synthesis compiler enables C, C++ and SystemC programs to be directly targeted into Xilinx devices without the need to manually create RTL. Vivado HLS is widely reviewed to increase developer productivity, and is confirmed to support C++ classes, templates, functions and operator overloading. Vivado 2014.1 introduced support for automatically converting OpenCL kernels to IP for Xilinx devices. OpenCL kernels are programs that execute across various CPU, GPU and FPGA platforms.
The Vivado Simulator is a component of the Vivado Design Suite. It is a compiled-language simulator that supports mixed-language, Tcl scripts, encrypted IP and enhanced verification.
The Vivado IP Integrator allows |
https://en.wikipedia.org/wiki/Peirce%27s%20law | In logic, Peirce's law is named after the philosopher and logician Charles Sanders Peirce. It was taken as an axiom in his first axiomatisation of propositional logic. It can be thought of as the law of excluded middle written in a form that involves only one sort of connective, namely implication.
In propositional calculus, Peirce's law says that ((P→Q)→P)→P. Written out, this means that P must be true if there is a proposition Q such that the truth of P follows from the truth of "if P then Q". In particular, when Q is taken to be a false formula, the law says that if P must be true whenever it implies falsity, then P is true. In this way Peirce's law implies the law of excluded middle.
Peirce's law does not hold in intuitionistic logic or intermediate logics and cannot be deduced from the deduction theorem alone.
Under the Curry–Howard isomorphism, Peirce's law is the type of continuation operators, e.g. call/cc in Scheme.
History
Here is Peirce's own statement of the law:
A fifth icon is required for the principle of excluded middle and other propositions connected with it. One of the simplest formulae of this kind is:
This is hardly axiomatical. That it is true appears as follows. It can only be false by the final consequent x being false while its antecedent (x → y) → x is true. If this is true, either its consequent, x, is true, when the whole formula would be true, or its antecedent x → y is false. But in the last case the antecedent of x → y, that is x, must be true. (Peirce, the Collected Papers 3.384).
Peirce goes on to point out an immediate application of the law:
From the formula just given, we at once get:
where the a is used in such a sense that (x → y) → a means that from (x → y) every proposition follows. With that understanding, the formula states the principle of excluded middle, that from the falsity of the denial of x follows the truth of x. (Peirce, the Collected Papers 3.384).
Warning: ((x→y)→a)→x is not a tautology. How |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.