source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Oph-IRS%2048
Oph-IRS 48 is a star surrounded by an extraordinary protoplanetary disk, about 444 light-years from Earth in the constellation of Ophiuchus. The disk has revolutionized the view of planet formation in astronomy. Studies have shown that the millimeter dust particles are gathered in a crescent shape, while the gas (traced by CO molecules) and small dust grains follow a full disk ring structure . The centimeter grains are even more concentrated inside the crescent. This structure is consistent with theoretical predictions of dust trapping. Also the chemical composition has been studied, with molecules like H2CO being present. The dust trap is thought to be conducting the process of planet formation in this young system. References A-type main-sequence stars Vortices
https://en.wikipedia.org/wiki/Domain-validated%20certificate
A domain validated certificate (DV) is an X.509 public key certificate typically used for Transport Layer Security (TLS) where the domain name of the applicant is validated by proving some control over a DNS domain. Domain validated certificates were first distributed by GeoTrust in 2002 before becoming a widely accepted method. Issuing criteria The sole criterion for a domain validated certificate is proof of control over whois records, DNS records file, email or web hosting account of a domain. Typically control over a domain is determined using one of the following: Response to email sent to the email contact in the domain's whois details Response to email sent to a well-known administrative contact in the domain, e.g. (admin@, postmaster@, etc.) Publishing a DNS TXT record Publishing a nonce provided by an automated certificate issuing system A domain validated certificate is distinct from an Extended Validation Certificate in that this is the only requirement for issuing the certificate. In particular, domain validated certificates do not assure that any particular legal entity is connected to the certificate, even if the domain name may imply a particular legal entity controls the domain. User interface As of 2020, all major browsers user interfaces display EV and OV and DV certificates identically, but provide options to query the type of certificate via multiple clicks. Characteristics As the low assurance requirements allow domain validated certificates to be issued quickly without requiring human intervention, domain validated certificates have a number of unique characteristics: Domain validated certificates are used in automated X.509 certificate issuing systems, such as Let's Encrypt. Domain validated certificates are often cheap or free. Domain validated certificates can be generated and validated without any documentation. Most domain validated certificates can be issued instantly (in less than a minute) via special tools which auto
https://en.wikipedia.org/wiki/List%20of%20microbiologists
Major contributions to the science of microbiology (as a discipline in its modern sense) have spanned the time from the mid-17th century month by month to the present day. The following is a list of notable microbiologists who have made significant contributions to the study of microorganisms. Many of those listed have received a Nobel prize for their contributions to the field of microbiology. The others are typically considered historical figures whose work in microbiology had a notable impact in the field. Those microbiologists who currently work in the field have been excluded unless they have received recognition beyond that of being on the faculty in a college or university. Proto-microbiologists Marcus Terentius Varro Avicenna Girolamo Fracastoro Marcello Malpighi Athanasius Kircher Jan Swammerdam Robert Hooke Microbiologists Living Ilan Chet (born 1939), Israeli microbiologist, professor, and President of the Weizmann Institute of Science Pauline Johnson, immunologist Rita R. Colwell, American environmental microbiologist who studied the ecology of cholera, former director of the National Science Foundation and president of the American Society for Microbiology Wayne Nicholson, American biologist based on microbiology and cell biology References Lists of biologists by field Medical lists
https://en.wikipedia.org/wiki/Octant%20projection
The octant projection or octants projection, is a type of map projection proposed the first time, in 1508, by Leonardo da Vinci in his Codex Atlanticus. Leonardo's authorship would be demonstrated by Christopher Tyler, who stated "For those projections dated later than 1508, his drawings should be effectively considered the original precursors." The same page of the Codex contains sketches of eight other projections of the globe (those known in the late fifteenth century) studied by Leonardo, including Ptolemy's conical planisphere projection and Roselli's pseudocylindric projection. Description The octant projection is the first known polyhedral map projection. It is neither conformal nor equal-area. In it, the spherical surface of the earth is divided into eight octants, each flattened into the shape of a Reuleaux triangle bound by circular arcs. If transferred to an elastic support, it would be possible to cover with them the surface of a model of the earth's globe. The eight triangles are oriented in a similar way as per two four-leaf clovers side by side, being the earth poles in the center of each clove. One of the sides of the eight triangles, (the one opposite to the center of the pseudo clover), is one fourth of the equator, the remaining two (those that converge to the center of the pseudo clover), are part of the two meridians that with the equator dissect the globe in the eight octants. Similar projections Projections also based on the Reuleaux triangle were published by: 1549 – Oronce Finé 1556 – Le Testu 1580 – John Dee 1616 – Nicolaas Geelkercken 1894 – Fiorini 1909 – Bernard J. S. Cahill 1916 – Anthiaume 1938 – Uhden 1955 – Keuning 1975 – Cahill–Keyes History of authorship research Although Leonardo's first description of the octant projection has been proved by Tyler, who decided to treat separately Leonardo's projection authorship (1508) from Leonardo's map authorship (1514), the other authors before him treat together the authorship of bo
https://en.wikipedia.org/wiki/Synthetic%20genomes
Synthetic genome is a synthetically built genome whose formation involves either genetic modification on pre-existing life forms or artificial gene synthesis to create new DNA or entire lifeforms. The field that studies synthetic genomes is called synthetic genomics. Recombinant DNA technology Soon after the discovery of restriction endonucleases and ligases, the field of genetics began using these molecular tools to assemble artificial sequences from smaller fragments of synthetic or naturally occurring DNA. The advantage in using the recombinatory approach as opposed to continual DNA synthesis stems from the inverse relationship that exists between synthetic DNA length and percent purity of that synthetic length. In other words, as you synthesize longer sequences, the number of error-containing clones increases due to the inherent error rates of current technologies. Although recombinant DNA technology is more commonly used in the construction of fusion proteins and plasmids, several techniques with larger capacities have emerged, allowing for the construction of entire genomes. Polymerase cycling assembly Polymerase cycling assembly (PCA) uses a series of oligonucleotides (or oligos), approximately 40 to 60 nucleotides long, that altogether constitute both strands of the DNA being synthesized. These oligos are designed such that a single oligo from one strand contains a length of approximately 20 nucleotides at each end that is complementary to sequences of two different oligos on the opposite strand, thereby creating regions of overlap. The entire set is processed through cycles of: (a) hybridization at 60 °C; (b) elongation via Taq polymerase and a standard ligase; and (c) denaturation at 95 °C, forming progressively longer contiguous strands and ultimately resulting in the final genome. PCA was used to generate the first synthetic genome in history, that of the Phi X 174 virus. Gibson assembly method The gibson assembly method, designed by Daniel Gibso
https://en.wikipedia.org/wiki/Leonardo%27s%20world%20map
Leonardo's world map is the name assigned to a unique world map drawn using the "octant projection" and found loosely inserted among a Codex of Leonardo da Vinci preserved in Windsor. It features an early use of the toponym America and incorporates information from the travels of Amerigo Vespucci, published in 1503 and 1505. Additionally, the map depicts the Arctic as an ocean and Antarctica as a continent of about the correct size. The conjecture that the map was drawn by Leonardo himself is not universally accepted by scholars. Richard Henry Major, who first published the map in 1865 and defended its authenticity, dated it around 1514 because Florida is drawn as an island with the name of TERRA FLORIDA. Description Da Vinci developed the concept of dividing the surface of the globe into eight spherical equilateral triangles based on his botanical drawings. Each section of the globe is bounded by the Equator and two meridians separate by 90°. This was the first map of this type. Some critics believe that the existing map was not really an autograph work, since the precision and expertise in the drawing does not reflect the usual high standards of da Vinci. They suggest that it was probably done by a trusted employee or copyist at Leonardo's workshop. Da Vinci's authorship would be demonstrated by Christopher Tyler in his paper entitled "Leonardo da Vinci’s World Map", in which he provides examples of derivative maps in a similar projection to da Vinci's. The map was originally documented by R. H. Major in his work Memoir on a mappemonde by Leonardo da Vinci, the earliest map Being Known hitherto container containing the name of America The eight triangles are configured as two four-leaf clovers side by side, with the earth poles in the center of each clove. One of the sides of the eight triangles (the one opposite the center of the pseudo clover), forms one fourth of the equator, the remaining two (those that converge to the center of the pseudo clover) formi
https://en.wikipedia.org/wiki/Combinatorics%2C%20Probability%20and%20Computing
Combinatorics, Probability and Computing is a peer-reviewed scientific journal in mathematics published by Cambridge University Press. Its editor-in-chief is Béla Bollobás (DPMMS and University of Memphis). History The journal was established by Bollobás in 1992. Fields Medalist Timothy Gowers calls it "a personal favourite" among combinatorics journals and writes that it "maintains a high standard". Content The journal covers combinatorics, probability theory, and theoretical computer science. Currently, it publishes six issues annually. As with other journals from the same publisher, it follows a hybrid green/gold open access policy, in which authors may either place copies of their papers in an institutional repository after a six-month embargo period, or pay an open access charge to make their papers free to read on the journal's website. Abstracting and indexing The journal is abstracted and indexed in: According to the Journal Citation Reports, the journal has a 2014 impact factor of 0.623. Since 2007, it has been ranked by SCImago Journal Rank as a first-quartile journal in four areas: applied mathematics, computational theory, statistics and probability, and theoretical computer science. References External links Combinatorics journals Probability journals Computer science journals Cambridge University Press academic journals Academic journals established in 1992 Bimonthly journals
https://en.wikipedia.org/wiki/Specification%20for%20human%20interface%20for%20semiconductor%20manufacturing%20equipment
This specification is usually called SEMI E95-0200 standard. It was originally published in February 2000, and the latest technical revision is SEMI E95-1101. This standard addresses the area of processing content with the direct intention of developing common software standards, so that problems involving operator training, operation specifications, and efficient development can be resolved more easily. See also Semiconductor Equipment and Materials International Notes Semiconductor device fabrication Technical specifications
https://en.wikipedia.org/wiki/GoGuardian
GoGuardian is an educational technology company founded in 2014 and based in Los Angeles, California. The company's services monitor student activity online, filter content, and alert school officials to possible suicidal or self-harm ideation. Product history GoGuardian was founded in 2014 and is based in Los Angeles, CA. Its feature set includes computer filtering, monitoring, and management, as well as usage analytics, activity flagging, and theft recovery for ChromeOS devices. GoGuardian also offers filtering functionality for third-party tools such as YouTube. On June 2015, GoGuardian reported it was installed in over 1,600 of the estimated 15,000 school districts in the United States. In January 2015, Los Angeles Unified School District (LAUSD) chose GoGuardian to support their 1:1 device rollout program. This provides LAUSD device tracking and grade-level-specific filtering, and facilitates compliance with the Children's Internet Protection Act (CIPA). In September 2015, the company released GoGuardian for Teachers, a tool to monitor student activity and control student learning. In January 2016, GoGuardian announced the launch of Google Classroom integration for GoGuardian for Teachers. In May 2018, GoGuardian was acquired by private equity firm Sumeru Equity Partners and appointed Tony Miller to their board of directors. In August 2018, GoGuardian launched Beacon, a software system installed on school computers that analyzes students' browsing behavior to alert people concerned of students at risk of suicide or self-harm. In November 2020, GoGuardian merged with Pear Deck. Student privacy GoGuardian products allow teachers and administrators to view and snapshot students' computer screens, close and open browser tabs, and see running applications. GoGuardian can collect information about any activity when users are logged onto their accounts, including data originating from a student's webcam, microphone, keyboard, and screen, along with historical
https://en.wikipedia.org/wiki/Name%20resolution%20%28programming%20languages%29
In programming languages, name resolution is the resolution of the tokens within program expressions to the intended program components. Overview Expressions in computer programs reference variables, data types, functions, classes, objects, libraries, packages and other entities by name. In that context, name resolution refers to the association of those not-necessarily-unique names with the intended program entities. The algorithms that determine what those identifiers refer to in specific contexts are part of the language definition. The complexity of these algorithms is influenced by the sophistication of the language. For example, name resolution in assembly language usually involves only a single simple table lookup, while name resolution in C++ is extremely complicated as it involves: namespaces, which make it possible for an identifier to have different meanings depending on its associated namespace; scopes, which make it possible for an identifier to have different meanings at different scope levels, and which involves various scope overriding and hiding rules. At the most basic level name resolution usually attempts to find the binding in the smallest enclosing scope, so that for example local variables supersede global variables; this is called shadowing. visibility rules, which determine whether identifiers from specific namespaces or scopes are visible from the current context; overloading, which makes it possible for an identifier to have different meanings depending on how it is used, even in a single namespace or scope; accessibility, which determines whether identifiers from an otherwise visible scope are actually accessible and participate in the name resolution process. Static versus dynamic In programming languages, name resolution can be performed either at compile time or at runtime. The former is called static name resolution, the latter is called dynamic name resolution. A somewhat common misconception is that dynamic typing implies d
https://en.wikipedia.org/wiki/Name%20resolution%20%28computer%20systems%29
In computer systems, name resolution refers to the retrieval of the underlying numeric values corresponding to computer hostnames, account user names, group names, and other named entities. Computer operating systems commonly employ multiple key/value lists that associate easily remembered names with the integer numbers used to identify users, groups, other computers, hardware devices, and other entities. In that context, name resolution refers to the retrieval of numeric values given the associated names, while Reverse name resolution refers to the opposite process of finding the name(s) associated with specified numeric values: In computer networking, it refers to processes used to obtain the assigned IP addresses needed to communicate with devices whose host or domain names are known. Examples include the Domain Name System (DNS), Network Information Service and Multicast DNS (mDNS). IP addresses for devices on the local segment can in turn be resolved to MAC addresses by invoking the Address Resolution Protocol (ARP). Unix operating systems associate both an alphanumeric name and a user or group ID with each user account or defined group of user names. The GNU C Library provides various operating system facilities that shell commands and other applications can call to resolve such names to the corresponding addresses or IDs, and vice versa. Some Linux distributions use an nsswitch.conf file to specify the order in which multiple resolution services are used to effect such lookups. See also Name server Multicast DNS Name Service Switch Identity resolution Naming collision References Computer libraries
https://en.wikipedia.org/wiki/Alcaligenes%20viscolactis
Alcaligenes viscolactis is a bacterium which can produce ropiness in milk and which can grow in sun tea. References Burkholderiales Food safety
https://en.wikipedia.org/wiki/Rastan%20%28video%20game%29
known as Rastan in North America, is a side-scrolling hack and slash video game released by Taito for arcades in 1987. It was a critical and commercial success and was ported to home platforms. Plot Taking place in a fantasy setting, the story is about Rastan who is presently a ruler of his kingdom narrating his past full of dangerous adventures and his eventual ascension to a kingship. Rastan, who back then was a barbaric knave resorted to banditry and murders to survive through hard times, came upon a chance to slay monsters and save a kingdom of Ceim from the said monsters in exchange of rich rewards. Accepting the deal, Rastan must fight hordes of enemy monsters based on mythical creatures such as chimeras and harpies. Rastan's quest to liberate Ceim from monsters eventually leads to a confrontation against a large fire-breathing red dragon with magical powers enabling it to control other monsters. Rastan was able to destroy the red dragon after a duel and after receiving rich rewards as promised, Rastan sets out to find a new region to establish his own kingdom and to rule it. At the ending of the game, the king Rastan of present reveals that there are many more stories to tell in his ascension to kingship and the whole game was just a minuscule part of his grander tale. Gameplay The controls of Rastan consists of an eight-way joystick, a button for attacking, and a button for jumping. By using the joystick in combination with either button, the player can determine the height of Rastan's jumps, as well as the direction he swings his weapon (including downwards while jumping). The game uses a health gauge system along with limited lives, although certain obstacles (such as falling into a body of water or being crushed by a spiked ceiling) will instantly kill Rastan regardless of how much health he has left. There are a total of six rounds, each consisting of three areas: an outdoor scene, a castle scene and a throne room where the player must confront the
https://en.wikipedia.org/wiki/TvOS
tvOS (formerly known as Apple TV Software) is an operating system developed by Apple Inc. for the Apple TV, a digital media player. In the first-generation Apple TV, Apple TV Software was based on Mac OS X. Starting with the second-generation, it is based on the iOS operating system and has many similar frameworks, technologies, and concepts. The second- and third-generation Apple TV have several built-in applications, but do not support third-party applications. On September 9, 2015, at a media event, Apple announced the fourth generation Apple TV, with support for third-party applications. Apple changed the name of the Apple TV operating system to tvOS, adopting the camel case nomenclature that they were using for their other operating systems, iOS and watchOS. History On October 30, 2015, the fourth generation Apple TV became available, and shipped with tvOS 9.0. On November 9, 2015, tvOS 9.0.1 was released, primarily an update to address minor issues. tvOS 9.1 was released on December 8, 2015 along with OS X 10.11.2, iOS 9.2, and watchOS 2.1. Along with these updates, Apple also updated the Remote apps on iOS and watchOS, allowing for basic remote functionality for the fourth generation Apple TV (previously, said app only worked with past versions of Apple TV). On November 25, 2015, Facebook debuted their SDK for tvOS, allowing applications to log into Facebook, share to Facebook, and use Facebook Analytics in the same way that iOS applications can. On December 2, 2015, Twitter debuted their login authentication service for tvOS – "Digits" – allowing users to log into apps and services with a simple, unique code available online. On June 13, 2016, at WWDC 2016, Apple SVP of Internet Services Eddy Cue announced the next major version of tvOS, tvOS 10. tvOS 10 brought new functionality, such as Siri search enhancements, single sign on for cable subscriptions, a dark mode, and a new Remote application for controlling the Apple TV and was officially released
https://en.wikipedia.org/wiki/Pipe%20marking
Pipe marking is the used to identify the contents, properties and flow direction of fluids in piping. Marking assists personnel to identify the correct pipes for operational, maintenance or emergency response purposes. Pipes are marked by labels, typically color coded, to identify the use, contents and flow direction. Background Pipes are used extensively in commercial and industrial buildings and on industrial plant (e.g. oil refineries) to transfer fluids between items of plant and equipment. Positive identification assists operations personnel to correctly identify plant when carrying out routine or maintenance activities, and for emergency personnel when responding to emergencies. Pipe marking is particularly important for identification where pipes run along pipe racks, through walls and bulkheads and through floors. A range of corporate, national and international codes, standards and regulations are in use around the world. ANSI/ASME Standards In the United States, Occupational Safety and Health Administration regulations recommend following American Society of Mechanical Engineers Standard A13.1-2015 - Scheme for the Identification of Piping Systems. The standard states that labels should be placed where easily viewed by a person standing near the pipe at any of the following points: Valves and flanges. Approximately every to on straight sections. A pipe passes through a wall or floor. Any pipe direction changes, such bends or junctions. 2015 revisions 2015 revisions added oxidizing materials to the existing 'Flammables' classification. The other major change allowed and encouraged labels to incorporate the GHS signal word, hazard pictograms, and hazard statements. This addition helped identify additional dangers when dealing with materials that fit into multiple categories, like hydrogen sulfide, which is both flammable and toxic. IIAR Bulletin #114 In 2014, the International Institute of Ammonia Refrigeration introduced a specialized label
https://en.wikipedia.org/wiki/International%20Workshop%20on%20Operator%20Theory%20and%20its%20Applications
International Workshop on Operator Theory and its Applications (IWOTA) was started in 1981 to bring together mathematicians and engineers working in operator theoretic side of functional analysis and its applications to related fields. These include: Differential equations and Integral equations Complex analysis and Harmonic analysis Linear system and Control theory Mathematical physics Signal processing Numerical analysis The other major branch of operator theory, Operator algebras (C* and von Neumann Algebras), is not heavily represented at IWOTA and has its own conferences. IWOTA gathers leading experts from all over the world for an intense exchange of new results, information and opinions, and for tracing the future developments in the field. The IWOTA meetings provide opportunities for participants (including young researchers) to present their own work in invited and contributed talks, to interact with other researchers from around the globe, and to broaden their knowledge of the field. In addition, IWOTA emphasizes cross-disciplinary interaction among mathematicians, electrical engineers and mathematical physicists. In the even years, the IWOTA workshop is a satellite meeting to the biennial International Symposium on the Mathematical Theory of Networks and Systems (MTNS). From the humble beginnings in the early 80's, the IWOTA workshops grew to become one of the largest continuing conferences attended by the community of researchers in operator theory. History of IWOTA First IWOTA Meeting The International Workshop on Operator Theory and its Applications was started on August 1, 1981, adjacent to the International Symposium on Mathematical Theory of Networks and Systems (MTNS) with goal of exposing operator theorists, even pure theorists, to recent developments in engineering (especially H-infinity methods in control theory) which had a significant intersection with operator theory. Israel Gohberg was the visionary and driving force of IWOTA
https://en.wikipedia.org/wiki/Biotin%20hydrazide
Biotin hydrazide is a biotinyl derivative that can be used as a probe for the determination of protein carbonylation. It readily forms Schiff bases with carbonyl groups. References Reagents for biochemistry Hydrazides
https://en.wikipedia.org/wiki/Prism%20TV
Prism TV is an American IPTV service owned by CenturyLink. It is based on the same technology as the U-verse service deployed by AT&T. History Around the time that Sprint Nextel spun off their landline division to form Embarq, Verizon, and AT&T began work on their own IPTV services to compete with the local cable companies. Embarq was no different, and had started work on a similar service called Embarq TV. Details were scarce, but the service was rumored to have been an IPTV fiber-to-the-node service similar to AT&T's U-verse. The service was going through beta testing when CenturyTel agreed to purchase Embarq to form CenturyLink in 2009. CenturyLink (still known as CenturyTel) began rolling out what was to eventually be known as Prism TV in October 2009 in Jefferson City, Missouri. It adopted the Prism TV name in 2011, based on the Embarq TV infrastructure. Over time, CenturyLink began rolling out Prism TV in markets as they were upgraded from the old copper-based services to fiber-optic communication, eventually offering the service in markets in Arizona, Colorado, Florida, Iowa, Minnesota, Missouri, Nebraska, Nevada, North Carolina, Oregon, Washington, and Wisconsin. Other markets were to follow once their lines were upgraded to be able to carry Prism TV. In the interim, markets that did not offer Prism TV had a triple play option through CenturyLink with DirecTV. Some CenturyLink customers also had Dish Network as their TV provider through CenturyLink under a grandfather clause, as Dish was the legacy provider through CenturyTel and Embarq; CenturyLink switched to DirecTV as part of its acquisition of Qwest, who had partnered with DirecTV. In 2018, CenturyLink stopped offering Prism TV to new customers. Instead, CenturyLink it began promoting DirecTV for new customers. In late 2020, CenturyLink began the process of discontinuing Prism TV completely starting in Minnesota and Nevada. As of March 2021, several other markets have stopped offering the service
https://en.wikipedia.org/wiki/Hazard%20analysis%20and%20risk-based%20preventive%20controls
Hazard analysis and risk-based preventive controls or HARPC is a successor to the Hazard analysis and critical control points (HACCP) food safety system, mandated in the United States by the FDA Food Safety Modernization Act (FSMA) of 2010. Preventive control systems emphasize prevention of hazards before they occur rather than their detection after they occur. The FDA released the rules in the Federal Register from September 2015 onwards. The first release of rules addressed Preventive Controls for Human Food and Preventive Controls for Foods for Animals. The Produce Safety Final Rule, the Foreign Supplier Verification Programs (FSVP) Final Rule and the Accredited Third-Party Certification Final Rule were issued on November 13, 2015. The Sanitary Transportation of Human and Animal Food final rule was issued on April 6, 2016, and the Mitigation Strategies To Protect Food Against Intentional Adulteration (Food Defense) final rule was issued on May 27, 2016. Scope All food companies in the United States that are required to register with the FDA under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002, as well as firms outside the US that export food to the US, must have a written FSMA-compliant Food Safety Plan in place by the deadlines listed below: Very small businesses of less than $1 million in sales per year are exempt, but must provide proof to the FDA of their very small status by January 1, 2016. Businesses subject to Juice HACCP () and Seafood HACCP () are exempt. Businesses subject to the Pasteurized Milk Ordinance; Sept 17, 2018. Small businesses, defined as having fewer than 500 full-time equivalent employees; Sept 17, 2017. All other businesses; Sept 17, 2016. Additionally, for the first time food safety is being extended to pet food and animal feed, with firms being given an extra year to implement Current Good Manufacturing Practices before a Preventive Controls system the following year: Primary Production Farms
https://en.wikipedia.org/wiki/Jumpshare
Jumpshare is a visual communication platform that combines file sharing, screenshot capture, and screen recording in one app. It is available on Windows, MacOS, iOS, and Web app. Jumpshare uses a freemium business model: free accounts are offered with limited storage, while a paid subscription is available with expanded storage and sharing options. History The company was founded by Ghaus Iftikhar in October 2011. Initially, Jumpshare allowed guest users to upload and share files; signing up was later made mandatory. Jumpshare expanded the offering by introducing screenshot capture and video recording tools on August 19, 2015. See also Cloud storage File sharing Comparison of file hosting services Comparison of file sharing applications Comparison of online backup services References External links File sharing services Cross-platform software
https://en.wikipedia.org/wiki/InterPlanetary%20File%20System
The InterPlanetary File System (IPFS) is a protocol, hypermedia and file sharing peer-to-peer network for storing and sharing data in a distributed file system. IPFS uses content-addressing to uniquely identify each file in a global namespace connecting IPFS hosts. IPFS can among others replace the location based hypermedia server protocols http and https to distribute the World Wide Web. Design IPFS allows users to host and receive content in a manner similar to BitTorrent. As opposed to a centrally located server, IPFS is built around a decentralized system of user-operators who hold a portion of the overall data, creating a resilient system of file storage and sharing. Any user in the network can serve a file by its content address, and other peers in the network can find and request that content from any node who has it using a distributed hash table (DHT). In contrast to BitTorrent, IPFS aims to create a single global network. This means that if two users publish a block of data with the same hash, the peers downloading the content from "user 1" will also exchange data with the ones downloading it from "user 2". IPFS aims to replace protocols used for static webpage delivery by using gateways which are accessible with HTTP. Users may choose not to install an IPFS client on their device and instead use a public gateway. A list of these gateways is maintained on the IPFS GitHub page. History IPFS was created by Juan Benet, who later founded Protocol Labs in May 2014. IPFS was launched in an alpha version in February 2015, and by October of the same year was described by TechCrunch as "quickly spreading by word of mouth." Network service provider Cloudflare started using IPFS in 2018 and launched its own gateway in the system in 2022. In March 2020, the Opera browser provided access to the centralized resources of the Unstoppable Domains provider by hosting content in IPFS. Applications Filecoin is an IPFS-based cooperative storage cloud, also auth
https://en.wikipedia.org/wiki/Physical%20biochemistry
Physical biochemistry is a branch of biochemistry that deals with the theory, techniques, and methodology used to study the physical chemistry of biomolecules. It also deals with the mathematical approaches for the analysis of biochemical reaction and the modelling of biological systems. It provides insight into the structure of macromolecules, and how chemical structure influences the physical properties of a biological substance. It involves the use of physics, physical chemistry principles, and methodology to study biological systems. It employs various physical chemistry techniques such as chromatography, spectroscopy, Electrophoresis, X-ray crystallography, electron microscopy, and hydrodynamics. See also Physical chemistry References Biochemistry Mathematical and theoretical biology Physical chemistry
https://en.wikipedia.org/wiki/Schema%20for%20horizontal%20dials
A schema for horizontal dials is a set of instructions used to construct horizontal sundials using compass and straightedge construction techniques, which were widely used in Europe from the late fifteenth century to the late nineteenth century. The common horizontal sundial is a geometric projection of an equatorial sundial onto a horizontal plane. The special properties of the polar-pointing gnomon (axial gnomon) were first known to the Moorish astronomer Abdul Hassan Ali in the early thirteenth century and this led the way to the dial-plates, with which we are familiar, dial plates where the style and hour lines have a common root. Through the centuries artisans have used different methods to markup the hour lines sundials using the methods that were familiar to them, in addition the topic has fascinated mathematicians and become a topic of study. Graphical projection was once commonly taught, though this has been superseded by trigonometry, logarithms, sliderules and computers which made arithmetical calculations increasingly trivial/ Graphical projection was once the mainstream method for laying out a sundial but has been sidelined and is now only of academic interest. The first known document in English describing a schema for graphical projection was published in Scotland in 1440, leading to a series of distinct schema for horizontal dials each with characteristics that suited the target latitude and construction method of the time. Context The art of sundial design is to produce a dial that accurately displays local time. Sundial designers have also been fascinated by the mathematics of the dial and possible new ways of displaying the information. Modern dialling started in the tenth century when Arab astronomers made the great discovery that a gnomon parallel to the Earth's axis will produce sundials whose hour lines show or legal hours on any day of the year: the dial of Ibn al-Shatir in the Umayyad Mosque in Damascus is the oldest dial of this type.
https://en.wikipedia.org/wiki/AMD%20Turbo%20Core
AMD Turbo Core a.k.a. AMD Core Performance Boost (CPB) is a dynamic frequency scaling technology implemented by AMD that allows the processor to dynamically adjust and control the processor operating frequency in certain versions of its processors which allows for increased performance when needed while maintaining lower power and thermal parameters during normal operation. AMD Turbo Core technology has been implemented beginning with the Phenom II X6 microprocessors based on the AMD K10 microarchitecture. AMD Turbo Core is available with some AMD A-Series accelerated processing units. AMD Turbo Core is similar to Intel Turbo Boost, which is another dynamic processor frequency adjustment technology used to increase performance, as well as AMD PowerNow!, which is used to dynamically adjust laptop processor's operating frequencies in order to decrease power consumption (saving battery life), reduce heat, and lower noise. AMD PowerNow! is used to decrease processor frequency, whereas AMD Turbo Core is used to increase processor frequency. Background To decide a processor's clock speed, the processor is stress tested to determine the maximum speed that the processor can run at before the maximum amount of power allowed is reached, which is called thermal design power or TDP. It has been reported that customers would complain that the processors rarely consumed the rated TDP, which meant that most consumers do not come close to the power consumed during maximum stress testing. A parameter called average CPU power (ACP) is used to address this issue. ACP defines the average power expected to be consumed with regular use, whereas TDP gives the maximum power consumed. Power consumed is an important factor when considering thermal limits and determining CPU power dissipation. AMD Turbo Core and similar dynamic processor frequency adjustment technologies take advantage of average power consumed being less than the maximum design limits, allowing frequency (and the
https://en.wikipedia.org/wiki/Mothur
mothur is an open source software package for bioinformatics data processing. The package is frequently used in the analysis of DNA from uncultured microbes. mothur is capable of processing data generated from several DNA sequencing methods including 454 pyrosequencing, Illumina HiSeq and MiSeq, Sanger, PacBio, and IonTorrent. The first release of mothur occurred in 2009. The release of mothur was announced in a publication in the journal Applied and Environmental Microbiology. As of October 26, 2022 the article releasing mothur had been cited by around 15,000 other research studies. External links References Free bioinformatics software Computational biology
https://en.wikipedia.org/wiki/Intermuscular%20coherence
Intermuscular Coherence is a measure to quantify correlations between the activity of two muscles, which is often assessed using electromyography. The correlations in muscle activity are quantified in frequency domain, and therefore referred to as intermuscular coherence. History The synchronisation of motor units of a single muscle in animals and humans are known for decades. The early studies that investigated the relationship of EMG activity used time-domain cross-correlation to quantify common input. The explicit notion of presence of synchrony between motor units of two different muscles was reported at a later time. In the 1990s, coherence analysis was introduced to examine in frequency content of common input. Physiology Intermuscular coherence can be used to investigate the neural circuitry involved in motor control. Correlated muscle activity indicates common input to the motor unit pools of both muscles and reflects shared neural pathways (including cortical, subcortical and spinal) that contribute to muscle activity and movement. The strength of intermuscular coherence is dependent on the relationship between muscles and is generally stronger between muscle pairs that are anatomically and functionally closely related. Intermuscular coherence can therefore be used to identify impairments in motor pathways. See also Corticomuscular coherence Corticocortical coherence References External links Neurspec Toolbox for MATLAB Neuroscience Neurophysiology
https://en.wikipedia.org/wiki/Reaction%20video
A reaction video is a video in which a person or multiple people react to something. Videos showing the emotional reactions of people viewing television series episodes, film trailers and music videos are numerous and popular on video hosting services such as YouTube. The depicted persons may or may not be aware that they are being recorded. In some cases, the video to which people react is shown within the reaction video, allowing the reaction video's viewers to see what is being reacted to. History On television, reaction clips have for a long time been a feature of Japanese variety shows, showing celebrities and tarento reacting to video clips. An evolution of earlier 1970s Japanese TV quiz shows that featured audience participants responding to questions, Fuji Television's Naruhodo! The World in 1981 introduced a format where a panel of celebrities and comedians watched brief videos and answered questions on the video. This eventually evolved into the "waipu" format, where a "waipu box" superimposed on the corner of the screen shows a celebrity or tarento reacting to a video clip. This reaction format is still widely used in Japanese variety shows, where it is the equivalent of a laugh track on American television shows. Online, one of the first viral reaction videos was that of a child reacting to the "Scary Maze Game" prank on YouTube in 2006. Beginning in 2007, reaction videos began to proliferate on the Internet. Among their first topics were reactions to the shock video 2 Girls 1 Cup. By 2011, videos of people recording themselves reacting to film trailers had become a staple of services such as YouTube. The numerous reaction videos for particularly popular or shocking television events, such as the 2013 Game of Thrones episode "The Rains of Castamere", have themselves become the subject of commentary. In 2013, the British TV channel Channel 4 converted the reaction video format into a TV show through Gogglebox. In this reality show, families or groups
https://en.wikipedia.org/wiki/Pretty%20Easy%20privacy
Pretty Easy privacy (p≡p or pEp) is a pluggable data encryption and verification system, that provides automatic cryptographic key management through a set of libraries (providing p≡p adapters for application developers used programming languages and development environments) for written digital communications. Its main goal is to make end-to-end encryption the default in written digital communications for all users in the easiest way possible and on the channels they already make use of, including e-mails, SMS, or other types of messages. It exists as a plugin for Microsoft Outlook and Mozilla Thunderbird as well as a mobile app for Android and iOS. p≡p also works under Microsoft Windows, Unix-like and Mac OS X operating systems. Its cryptographic functionality is handled by an open-source p≡p engine relying on already existing cryptographic implementations in software like GnuPG, a modified version of netpgp (used only in iOS), and (as of p≡p v2.0) GNUnet. In its default configuration, p≡p does not rely on a web of trust or any form of centralized trust infrastructure, but instead lets users verify each other's authenticity by comparing cryptographic fingerprints in the form of natural language strings. Pretty Easy privacy was first released in 2016. Their free and open-source software includes p≡p engine, adapters, apps and add-ons (Including Microsoft Outlook). In March 2021, it was revealed that the company behind p≡p paid for fake reviews for their apps. Design principles Above all, p≡p – supposedly contrary to existing cryptographic solutions – should be easy to install, use, and understand. Furthermore, for their communications, p≡p users do not depend on any specific platform, message transport system (SMS, email, XMPP, etc.), or centrally provided client–server or "cloud" infrastructures: p≡p is fully peer-to-peer by design. Keys are exchanged opportunistically by transferring via email. Enigmail support Enigmail announced its support for the ne
https://en.wikipedia.org/wiki/ZeroNet
ZeroNet is a decentralized web-like network of peer-to-peer users, created by Tamas Kocsis in 2015, programming for the network was based in Budapest, Hungary; is built in Python; and is fully open source. Instead of having an IP address, sites are identified by a public key (specifically a bitcoin address). The private key allows the owner of a site to sign and publish changes, which propagate through the network. Sites can be accessed through an ordinary web browser when using the ZeroNet application, which acts as a local webhost for such pages. In addition to using bitcoin cryptography, ZeroNet uses trackers from the BitTorrent network to negotiate connections between peers. ZeroNet is not anonymous by default, but it supports routing traffic through the Tor network. The ZeroNet website and bittorrent tracker are blocked in mainland China. Despite the censorship, however, it is still possible to access ZeroNet from behind the Great Firewall of China, even over Tor, by bootstrapping over Meek, and connecting to peers directly. There is no way to take down a ZeroNet page which still has seeders, thus making such pages immune to third-party methods of taking them down, including DMCA takedown notices. Hiatus and forks Development has stopped for several months after stable release of v0.7.1 on Github. The zeronet-conservancy fork maintains existing codebase and adds features aimed at gradually migrating to a new p2p network designed from scratch Development of the network The feasibility of peer-to-peer online web-sites had been hypothesised for some time, with The Pirate Bay suggesting they would build a network, as well as BitTorrent Inc. which created the closed-source Project Maelstrom. Sites on ZeroNet are known as "zites" by its users. ZeroNet supports HTML, CSS and JavaScript. Server-side languages like PHP are not supported, although ZeroNet creates and gives API to interact with SQLite databases, their data also distributed (as JSON files) via P
https://en.wikipedia.org/wiki/Robert%20Morris%20%28mathematician%29
Robert (Rob) Morris is a mathematician who works in combinatorics, probability, graph theory and Ramsey theory. He is a researcher at IMPA. In 2015, Morris was awarded the European Prize in Combinatorics for "his profound results in extremal and probabilistic combinatorics particularly for his result on independent sets in hypergraphs which found immediately several applications in additive number theory and combinatorics, such as the solution of old problem of Erdős and for establishing tight bounds for Ramsey numbers, and also on random cellular automata and bootstrap problems in percolation." In 2016, he was one of the winners of the George Pólya Prize. He graduated with a Ph.D. from The University of Memphis in 2006 under the supervision of Béla Bollobás. He was awarded the 2018 Fulkerson Prize. Also in 2018, he was an invited speaker at the International Congress of Mathematicians in Rio de Janeiro. References Probability theorists Year of birth missing (living people) Living people Instituto Nacional de Matemática Pura e Aplicada researchers Combinatorialists
https://en.wikipedia.org/wiki/Spectral%20correlation%20density
The spectral correlation density (SCD), sometimes also called the cyclic spectral density or spectral correlation function, is a function that describes the cross-spectral density of all pairs of frequency-shifted versions of a time-series. The spectral correlation density applies only to cyclostationary processes because stationary processes do not exhibit spectral correlation. Spectral correlation has been used both in signal detection and signal classification. The spectral correlation density is closely related to each of the bilinear time-frequency distributions, but is not considered one of Cohen's class of distributions. Definition The cyclic auto-correlation function of a time-series is calculated as follows: where (*) denotes complex conjugation. By the Wiener–Khinchin theorem [questionable, discuss], the spectral correlation density is then: Estimation methods The SCD is estimated in the digital domain with an arbitrary resolution in frequency and time. There are several estimation methods currently used in practice to efficiently estimate the spectral correlation for use in real-time analysis of signals due to its high computational complexity. Some of the more popular ones are the FFT Accumulation Method (FAM) and the Strip-Spectral Correlation Algorithm. A fast-spectral-correlation (FSC) algorithm has recently been introduced. FFT accumulation method (FAM) This section describes the steps for one to compute the SCD on computers. If with MATLAB or the NumPy library in Python, the steps are rather simple to implement. The FFT accumulation method (FAM) is a digital approach to calculating the SCD. Its input is a large block of IQ samples, and the output is a complex-valued image, the SCD. Let the signal, or block of IQ samples, be a complex valued tensor, or multidimensional array, of shape , where each element is an IQ sample. The first step of the FAM is to break into a matrix of frames of size with overlap. where is the separation betwee
https://en.wikipedia.org/wiki/Elastic%20cloud%20storage
An elastic cloud is a cloud computing offering that provides variable service levels based on changing needs. Elasticity is an attribute that can be applied to most cloud services. It states that the capacity and performance of any given cloud service can expand or contract according to a customer's requirements and that this can potentially be changed automatically as a consequence of some software-driven event or, at worst, can be reconfigured quickly by the customer's infrastructure management team. Elasticity has been described as one of the five main principles of cloud computing by Rosenburg and Mateos in The Cloud at Your Service - Manning 2011. History Cloud computing was first described by Gillet and Kapor in 1996; however, the first practical implementation was a consequence of a strategy to leverage Amazon's excess data center capacity. Amazon and other pioneers of the commercial use of this technology were primarily interested in providing a “public” cloud service, whereby they could offer customers the benefits of using the cloud, particularly the utility-based pricing model benefit. Other suppliers followed suit with a range of cloud-based models all offering elasticity as a core component, but these suppliers were only offering this service as an element of their public cloud service. Due to perceived weaknesses in security, or at least a lack of proven compliance, many organizations, particularly in the financial and public sectors, have been slow adopters of cloud technologies. These wary organizations can achieve some of the benefits of cloud computing by adopting private cloud technologies. An alternative form of the elastic cloud has been offered by vendors such as EMC and IBM, whereby the service is based around an enterprise's own infrastructure but still retains elements of elasticity and the potential to bill by consumption. Description Elasticity in cloud computing is the ability for the organization to adjust its storage requirem
https://en.wikipedia.org/wiki/Mean%20dimension
In mathematics, the mean (topological) dimension of a topological dynamical system is a non-negative extended real number that is a measure of the complexity of the system. Mean dimension was first introduced in 1999 by Gromov. Shortly after it was developed and studied systematically by Lindenstrauss and Weiss. In particular they proved the following key fact: a system with finite topological entropy has zero mean dimension. For various topological dynamical systems with infinite topological entropy, the mean dimension can be calculated or at least bounded from below and above. This allows mean dimension to be used to distinguish between systems with infinite topological entropy. Mean dimension is also related to the problem of embedding topological  dynamical systems in shift spaces (over Euclidean cubes). General definition A topological dynamical system consists of a compact Hausdorff topological space and a continuous self-map . Let denote the collection of open finite covers of . For define its order by An open finite cover refines , denoted , if for every , there is so that . Let Note that in terms of this definition the Lebesgue covering dimension is defined by . Let be open finite covers of . The join of and is the open finite cover by all sets of the form where , . Similarly one can define the join of any finite collection of open covers of . The mean dimension is the non-negative extended real number: where Definition in the metric case If the compact Hausdorff topological space is metrizable and is a compatible metric, an equivalent definition can be given. For , let be the minimal non-negative integer , such that there exists an open finite cover of by sets of diameter less than such that any distinct sets from this cover have empty intersection. Note that in terms of this definition the Lebesgue covering dimension is defined by . Let The mean dimension is the non-negative extended real number: Properties Mean dimension is an
https://en.wikipedia.org/wiki/Directional%20Cubic%20Convolution%20Interpolation
Directional Cubic Convolution Interpolation (DCCI) is an edge-directed image scaling algorithm created by Dengwen Zhou and Xiaoliu Shen. By taking into account the edges in an image, this scaling algorithm reduces artifacts common to other image scaling algorithms. For example, staircase artifacts on diagonal lines and curves are eliminated. The algorithm resizes an image to 2x its original dimensions, minus 1. The algorithm The algorithm works in three main steps: Copy the original pixels to the output image, with gaps between the pixels. Calculate the pixels for the diagonal gaps. Calculate the pixels for the remaining horizontal and vertical gaps. Calculating pixels in diagonal gaps Evaluation of diagonal pixels is done on the original image data in a 4×4 region, with the new pixel that is being calculated in the center, in the gap between the original pixels. This can also be thought of as the 7×7 region in the enlarged image centered on the new pixel to calculate, and the original pixels have already been copied. The algorithm decides one of three cases: Edge in up-right direction — interpolates along down-right direction. Edge in down-right direction — interpolates along up-right direction. Smooth area — interpolates in both directions, then multiples the values by weights. Calculating diagonal edge strength Let d1 be the sum of edges in the up-right direction, and d2 be the sum of edges in the down-right direction. To calculate d1, take the sum of abs(P(X, Y) - P(X - 1, Y + 1)), in the region of X = 1 to 3, and Y = 0 to 2. To calculate d2, take the sum of abs(P(X, Y) - P(X + 1, Y + 1)), in the region of X = 0 to 2, and Y = 0 to 2. Interpolating pixels If (1 + d1) / (1 + d2) > 1.15, then there is an edge in the up-right direction. If (1 + d2) / (1 + d1) > 1.15, then there is an edge in the down-right direction. Otherwise, one is in a smooth area. To avoid division and floating-point operations, this can also be expressed as 100 * (1 + d1)
https://en.wikipedia.org/wiki/Link%20Electronics
Link Electronics Ltd. was a major UK industrial and broadcast television equipment manufacturer and systems integrator in the 1970s and 1980s. The company was founded by John Tanner and David Mann, who began manufacturing television cameras in 1966. Link was known mainly for its range of broadcast television cameras, but was also a manufacturer of outside broadcast (OB) vehicles, including the BBC "Type 5". Link also produced a wide range of ancillary studio equipment, such as distribution amplifiers, measuring sets and test-signal generators. Cameras Link started as an industrial camera manufacturer but soon moved into broadcast equipment when the BBC approached it to develop a successor to the commercially successful EMI 2001, when EMI's own design for the 2001's successor, the 2005, failed to meet expected standards when launched around 1975. The poor performance of this camera, considering its development cost, led to EMI exiting the broadcast camera industry. A similar fate befell Link around 10–15 years later upon the release of the Link 130 (further down this page). Type 100 The Link-NEC 100 was the companion camera to the Type 130 and designed in conjunction with NEC. It had a triax interface unit and could be used stand alone, via a radio link or with a CCU via triax cable. it shared a common architecture with the 130 by using the same 18mm tubes and both where fully automatic for set-up and used the same CCU (Camera Control Unit), OCP (operational Control Unit) and MSU (Master Setup Unit) Type 109 The Type 109 was a broadcast quality black-and-white camera mainly used as a caption scanner or simple telecine. Type 110/111 The 110 was Link's first attempt at a colour broadcast camera and around 200 cameras were manufactured. Styling was based on the EMI 2001 colour camera but at an economical price, including what some claim to be a very flimsy casing that was not of rugged design. The camera consisted of a closed body and an internal lens from a
https://en.wikipedia.org/wiki/Magnetogenetics
Magnetogenetics refers to a biological technique that involves the use of magnetic fields to remotely control cell activity. In most cases, magnetic stimulation is transformed into either force (magneto-mechanical genetics) or heat (magneto-thermal genetics), which depends on the applied magnetic field. Therefore, cells are usually genetically modified to express ion channels that are either mechanically or thermally gated. As such, magnetogenetics is a cellular modulation method that uses a combination of techniques from magnetism and genetics to control activities of individual cells in living tissue – even within freely moving animals and people. This technique is comparable to optogenetics, which is the manipulation of cell behavior using light. In magnetogenetics, magnetic stimulation is used instead of light, a characteristic that allows for a less invasive, less toxic, and wireless modulation of cell activity. Cell activity control is achieved using magnetic compounds such as ferritin or magnetic nanoparticles. These compounds are designed to link to the ion channels that are genetically expressed on specific cells. Control of activity is thus restricted to genetically pre-defined cells and performed in a spatiotemporal-specific manner by magnetic stimulation. History The development of genetic technologies that can modulate cellular processes has greatly contributed to biological research. A representative example is the development of optogenetics, which is a neuromodulation tool kit that involves light-sensitive proteins such as opsins. This progress provided the grounds for a breakthrough in linking the causal relationship between neuronal activity and behavioral outcome. The foremost strength of the genetic toolkits used in neuromodulation is that it can provide either spatially or temporally, or both, precise modulation of the brain nervous system. To date, several technologies are adapted with genetics (e.g. optogenetics, chemogenetics, etc.), an
https://en.wikipedia.org/wiki/McIlvaine%20buffer
McIlvaine buffer is a buffer solution composed of citric acid and disodium hydrogen phosphate, also known as citrate-phosphate buffer. It was introduced in 1921 by the United States agronomist Theodore Clinton McIlvaine (1875–1959) from West Virginia University, and it can be prepared in pH 2.2 to 8 by mixing two stock solutions. Applications McIlvaine buffer can be used to prepare a water-soluble mounting medium when mixed 1:1 with glycerol. Contents Preparation of McIlvaine buffer requires disodium phosphate and citric acid. One liter of 0.2M stock solution of disodium hydroxyphosphate can be prepared by dissolving 28.38g of disodium phosphate in water, and adding a quantity of water sufficient to make one liter. One liter of 0.1M stock solution of citric acid can be prepared by dissolving 19.21g of citric acid in water, and adding a quantity of water sufficient to make one liter. From these stock solutions, McIlvaine buffer can be prepared in accordance with the following table: References Liquids Biochemistry Buffer solutions
https://en.wikipedia.org/wiki/Elements%20CRM%20iOS
Elements CRM iOS is a Mac Customer Relationship Management (Mac CRM) solution built by Ntractive for Apple business using Apple devices. Offered as a Cloud computing subscription-based service, Elements CRM iOS is a universal mobile app for the iPhone and iPad. Elements CRM iOS is an add-on to the Elements CRM desktop app. The iPad CRM version of Elements CRM iOS looks, works and feels like the desktop app. The iPhone CRM app is a limited version of the most important functions of the desktop app. History Ntractive Ntractive is a privately held software development company based in Grand Forks, North Dakota that markets business software to small to medium-sized companies. Established in 2006, the company's sole product is Elements CRM, a customer relationship management application aimed at small businesses that use Mac OS X computers, iPads and iPhones. Elements CRM is a cloud based app that employs a unique site-specific browser to merge OS X desktop and web application functionality. The product was first introduced to the public at a keynote address during Apple's 2007 World Wide Developer's Conference. The official launch of Elements SBM (the product's original name) 1.0 took place at Macworld/iWorld 2009. The product was then renamed Elements CRM and with its 2.0 release was awarded the honor of Apple "Staff Pick" in July, 2009. Methodology Mac CRM Mac Customer Relationship Management (Mac CRM) is an approach to managing a company's interaction with current and future customers on Apple Inc Desktop computers and iOS devices only. Mac CRM solutions are not web-based only applications that use a web browser for interaction. Instead, a Mac CRM is a combination of a cloud based app built with Apple's programming language Objective-C or Swift (programming language). Mac CRMs involve using Apple only devices and technology to organize, automate, and synchronize sales, marketing, customer service, and technical support. References Cloud computing Cloud inf
https://en.wikipedia.org/wiki/Deblurring
Deblurring is the process of removing blurring artifacts from images. Deblurring recovers a sharp image S from a blurred image B, where S is convolved with K (the blur kernel) to generate B. Mathematically, this can be represented as (where * represents convolution). While this process is sometimes known as unblurring, deblurring is the correct technical word. The blur K is typically modeled as point spread function and is convolved with a hypothetical sharp image S to get B, where both the S (which is to be recovered) and the point spread function K are unknown. This is an example of an inverse problem. In almost all cases, there is insufficient information in the blurred image to uniquely determine a plausible original image, making it an ill-posed problem. In addition the blurred image contains additional noise which complicates the task of determining the original image. This is generally solved by the use of a regularization term to attempt to eliminate implausible solutions. This problem is analogous to echo removal in the signal processing domain. Nevertheless, when coherent beam is used for imaging, the point spread function can be modeled mathematically. By proper deconvolution of the point spread function K and the blurred image B, the blurred image B can be deblurred (unblur) and the sharp image S can be recovered. See also Denoising Super-resolution Blind deconvolution Modulation transfer function References Image processing
https://en.wikipedia.org/wiki/Echo%20removal
Echo removal is the process of removing echo and reverberation artifacts from audio signals. The reverberation is typically modeled as the convolution of a (sometimes time-varying) impulse response with a hypothetical clean input signal, where both the clean input signal (which is to be recovered) and the impulse response are unknown. This is an example of an inverse problem. In almost all cases, there is insufficient information in the input signal to uniquely determine a plausible original image, making it an ill-posed problem. This is generally solved by the use of a regularization term to attempt to eliminate implausible solutions. This problem is analogous to deblurring in the image processing domain. See also Echo suppression and cancellation Digital room correction Noise reduction Linear prediction coder Signal processing
https://en.wikipedia.org/wiki/Dark%20data
Dark data is data which is acquired through various computer network operations but not used in any manner to derive insights or for decision making. The ability of an organisation to collect data can exceed the throughput at which it can analyse the data. In some cases the organisation may not even be aware that the data is being collected. IBM estimate that roughly 90 percent of data generated by sensors and analog-to-digital conversions never get used. In an industrial context, dark data can include information gathered by sensors and telematics. Organizations retain dark data for a multitude of reasons, and it is estimated that most companies are only analyzing 1% of their data. Often it is stored for regulatory compliance and record keeping. Some organizations believe that dark data could be useful to them in the future, once they have acquired better analytic and business intelligence technology to process the information. Because storage is inexpensive, storing data is easy. However, storing and securing the data usually entails greater expenses (or even risk) than the potential return profit. In academic discourse, the term dark data was essentially coined by Bryan P. Heidorn. He uses it to describe research data, especially from the long tail of science (the many, small research projects), which are not or no longer available for research because they disappear in a drawer without adequate data management. Without this, the data become dark, and further reasons for this are e.g. missing metadata annotation, missing data management plans and data curators. Analysis The term "dark data" very often refers to data that is not amenable to computer processing. For example, a company might have a great deal of data that exists only as scanned page-images. Even the bare text in such documents is not available without something like Optical character recognition, which can vary greatly in accuracy. Even with OCR, the significance of each part of the data is una
https://en.wikipedia.org/wiki/Vacuum-tube%20computer
A vacuum-tube computer, now termed a first-generation computer, is a computer that uses vacuum tubes for logic circuitry. While the history of mechanical aids to computation goes back centuries, if not millennia, the history of vacuum tube computers is confined to the middle of the 20th century. Lee De Forest invented the triode in 1906. The first example of using vacuum tubes for computation, the Atanasoff–Berry computer, was demonstrated in 1939. Vacuum-tube computers were initially one-of-a-kind designs, but commercial models were introduced in the 1950s and sold in volumes ranging from single digits to thousands of units. By the early 1960s vacuum tube computers were obsolete, superseded by second-generation transistorized computers. Much of what we now consider part of digital computing evolved during the vacuum tube era. Initially, vacuum tube computers performed the same operations as earlier mechanical computers, only at much higher speeds. Gears and mechanical relays operate in milliseconds, whereas vacuum tubes can switch in microseconds. The first departure from what was possible prior to vacuum tubes was the incorporation of large memories that could store thousands of bits of data and randomly access them at high speeds. That, in turn, allowed the storage of machine instructions in the same memory as data—the stored program concept, a breakthrough which today is a hallmark of digital computers. Other innovations included the use of magnetic tape to store large volumes of data in compact form (UNIVAC I) and the introduction of random access secondary storage (IBM RAMAC 305), the direct ancestor of all the hard disk drives we use today. Even computer graphics began during the vacuum tube era with the IBM 740 CRT Data Recorder and the Whirlwind light pen. Programming languages originated in the vacuum tube era, including some still used today such as Fortran & Lisp (IBM 704), Algol (Z22) and COBOL. Operating systems, such as the GM-NAA I/O, also were b
https://en.wikipedia.org/wiki/Enhanced%20privacy%20ID
Enhanced Privacy ID (EPID) is Intel Corporation's recommended algorithm for attestation of a trusted system while preserving privacy. It has been incorporated in several Intel chipsets since 2008 and Intel processors since 2011. At RSAC 2016 Intel disclosed that it has shipped over 2.4B EPID keys since 2008. EPID complies with international standards ISO/IEC 20008 / 20009, and the Trusted Computing Group (TCG) TPM 2.0 for authentication. Intel contributed EPID intellectual property to ISO/IEC under RAND-Z terms. Intel is recommending that EPID become the standard across the industry for use in authentication of devices in the Internet of Things (IoT) and in December 2014 announced that it was licensing the technology to third-party chip makers to broadly enable its use. EPID EPID is an enhancement of the Direct Anonymous Attestation (DAA) algorithm. DAA is a digital signature algorithm supporting anonymity. Unlike traditional digital signature algorithms, in which each entity has a unique public verification key and a unique private signature key, DAA provides a common group public verification key associated with many (typically millions) of unique private signature keys. DAA was created so that a device could prove to an external party what kind of device it is (and optionally what software is running on the device) without needing to provide device identity, i.e., to prove you are an authentic member of a group without revealing which member. EPID enhances DAA by providing an additional utility of being able to revoke a private key given a signature created by that key, even if the key itself is still unknown. Background In 1999 the Pentium III added a Processor Serial Number (PSN) as a way to create identity for security of endpoints on the internet. However, privacy advocates were especially concerned and Intel chose to remove the feature in later versions. Building on improving asymmetric cryptography of the time and group keys, Intel Labs researched an
https://en.wikipedia.org/wiki/SaferSurf
SaferSurf is a software product for anonymous internet surfing. Aside from offering web anonymity, it has several other features, such as a geolocation proxy service bypassing country restrictions. SaferSurf runs centrally on a server and doesn't need a local installation. SaferSurf was created and developed by a team from Nutzwerk, a German software company headquartered in Leipzig developing internet technologies. It obtained the TÜV certification in 2005, 2006, 2007, 2008 and 2009. It was tested for a wide range of viruses and false alarms. Features SaferSurf provides various features: Malware checking: Potentially dangerous online enquiries are rooted via the SaferSurf proxy server that examines all data for malware before they reach the computer. If dangerous or undesirable data are detected, they are removed from the data stream on the internet. Protection of anonymity: SaferSurf calls up the websites on the user's behalf, making it impossible to store the user's IP address. Also, whenever the user goes from one website to another, SaferSurf deletes the referrer information from the data stream. Finally, it provides a list of known "eavesdroppers". Spam and phishing e-mail protection Faster internet access: High-speed servers with 1 Gbit connections. Access to blocked websites: the Unblock Stick lets the user bypass firewalls and other net restrictions without needing administrative rights on the machine. When private mode is set, the internet browser will not store traces of the user's activity. Setting the maximum lifespan of cookies Unblocking videos on YouTube and other media portals: SaferSurf's different proxy locations bypass country restrictions, while the websites maintain their full functionality because of special SSL-Proxy-Server that loads the website directly using an encrypted connection. The geolocation function allows the user to adopt the IP of a specific country. Not storing the user's IP address: That way, even SaferSurf can't
https://en.wikipedia.org/wiki/Litema
Litema, spelled as Ditema in South African Sesotho orthography (pronounced: /ditʼɪːma/; Singular: Tema, Sesotho for "text" or "ploughed land") is a form of Sesotho mural art composed of decorative and symbolic geometric patterns, commonly associated with Sesotho tradition today practised in Lesotho and neighbouring areas of South Africa. Basotho women generate litema on the outer walls and inside of homesteads by means of engraving, painting, relief mouldings and/or mosaic. Typically the geometric patterns are combed or scratched into the wet top layer of fresh clay and dung plaster of the wall, and later painted with earth ochers or, in contemporary times, manufactured paint. Patterns most often mimic ploughed fields through a combed texture, or the patterns refer to plant life, and more occasionally to other aspects of the natural world, such as referring to clan totem animal. Litema are transient; they may desiccate and crumble or be washed away by heavy rain. It is common for women of an entire village to apply litema on such special occasions as a wedding or a religious ceremony. Etymology As Gary van Wyk (1993:84) pointed out in his analysis of the etymology of the Sesotho noun denoting "Sesotho mural art," litema also refers to the associated concepts of "ploughed lands", and the decorative tradition is symbolically linked to cultivation in many ways. It is derived from the verb stem -lema (in the infinitive, ho lema "to cultivate"), which is a reflex of the Proto-Bantu root *-dɪ̀m- "to cultivate (esp. with hoe)". The orthographic in li- (Class 10 noun class prefix for Sesotho nouns) is pronounced [d] in Sesotho since [d] is an allophone of /l/ occurring before the close vowels, /i/ and /u/. The orthographic can have three possible values in Sesotho: /ɪ/, /ɛ/, and /e/. In is pronounced /ɪ/, as per the Proto-Bantu root. Design The litema patterns are characterised by a multi-stage symmetry. Patterns are generally arranged in square cells. A wall to be s
https://en.wikipedia.org/wiki/Veniam
Veniam was a technology startup focused on building large WiFi mesh networks using moving vehicles like city buses or taxis. The company is headquartered in Mountain View, California and was founded in 2012. The Company received 4.9 million dollars in 2014 in a funding round from True Ventures, USV and Cane Investments. Veniam's technology is being used in Porto's city buses with about 230,000 users with onboard units (OBUs) installed on over 600 buses, taxis and garbage trucks. They aim to equip many moving things with wireless hotspots creating a mesh that could be used to build sensors to turn the city smarter.Each vehicle is equipped with a NetRider, a multi network unit with Wi-Fi (802.11p), DSRC, GPS and 4G/LTE connectivity. Veniam was acquired by Nexar in 2022. Company Veniam was founded by João Barros, its CEO, Roy Russell, former Zipcar CTO, Susana Sargento, a professor at the University of Aveiro, and Robin Chase, former CEO of Zipcar and Buzzcar. Products Veniam Platform Awards 2018 named Best Connected Product/Service at TU Automotive 2017 ScaleUp Portugal Award Tech Winner 2017 Telecom Council Spiffy Winner - San Andreas Award for the Most Disruptive Technology 2017 CNBC 50 Disruptors - list of companies whose "innovations are changing the world.” Winner of TU Automotive Best Auto Mobility Product/Service 2016 2016 Best Auto Mobility Product/Service Winner by TU Automotive 2016 CNBC 50 Disruptors - list of companies whose "innovations are revolutionizing the business landscape.” Winner of the “Best New Venture” at the WBA 2015 Wi-Fi Industry Awards Winner of WBA Scale Up Award 2015 for the outstanding innovation and solutions brought to market Winner of the 2015 Red Herring Top 100 Award Winner of the NOS Innovation Award 2015 Winner of the Portuguese Venture Competition “Building Global Innovators” (ISCTE–IUL; MIT Portugal) Most Likely to Succeed Idea within the Cable Industry at CableLabs’ Innovation Showcase Named 2015 Gartner “Cool Vendor”
https://en.wikipedia.org/wiki/StorPool%20Storage
StorPool Storage is a distributed storage software. History StorPool was founded in November 2011 to develop storage software running on standard servers and replacing traditional storage arrays. The company is headquartered in Sofia, Bulgaria and has raised 2 funding rounds so far. Technology StorPool pools direct attached storage (hard disks or SSDs) from standard servers to create a single pool of shared storage. The software is installed on each server in a cluster and combines the performance and capacity of the drives attached to the servers into one global namespace. StorPool has no native Hyper-V or Windows support so far. For now it's not targeting the enterprise market for VMware either, to which StorPool is not natively compatible, though it can run in VMware "with performance degradation," says company CEO. StorPool supports multitude Linux operating system distros. Supported virtualization technologies include KVM, LXC and any other technology compatible with the Linux storage stack. References Storage software Distributed data storage systems
https://en.wikipedia.org/wiki/20-Hydroxyeicosatetraenoic%20acid
20-Hydroxyeicosatetraenoic acid, also known as 20-HETE or 20-hydroxy-5Z,8Z,11Z,14Z-eicosatetraenoic acid, is an eicosanoid metabolite of arachidonic acid that has a wide range of effects on the vascular system including the regulation of vascular tone, blood flow to specific organs, sodium and fluid transport in the kidney, and vascular pathway remodeling. These vascular and kidney effects of 20-HETE have been shown to be responsible for regulating blood pressure and blood flow to specific organs in rodents; genetic and preclinical studies suggest that 20-HETE may similarly regulate blood pressure and contribute to the development of stroke and heart attacks. Additionally the loss of its production appears to be one cause of the human neurological disease, Hereditary spastic paraplegia. Preclinical studies also suggest that the overproduction of 20-HETE may contribute to the progression of certain human cancers, particularly those of the breast. Biosynthesis Production in humans A subset of Cytochrome P450 (CYP450) microsome-bound ω-hydroxylases, the Cytochrome P450 omega hydroxylases, metabolize arachidonic acid to 20-HETE by an omega oxidation reaction. CYP450 enzymes belong to a superfamily which in humans is composed of at least 57 members and in mice at least 120 members. Among this superfamily, certain members of the CYP4A and CYP4F subfamilies in the CYP4 family are considered predominant cytochrome P450 enzymes that are responsible in most tissues for forming 20-HETE and, concurrently, smaller amounts of 19-hydroxy-5Z,8Z,11Z,14Z-eicosatetraenoic acid (19-HETE). However, CYP2U1 may also contribute to the production of these two HETEs and CYP4F8 can metabolize arachidonic acid to 19-HETE while forming little or no 20-HETE. The production of 19-HETE with 20-HETE may be significant since 19(R)-HETE, although not its stereoisomer, 19(S)-HETE, inhibits the action of 20-HETE on vascular endothelial cells. Based on studies analyzing the production of other
https://en.wikipedia.org/wiki/Guaiwei
Guaiwei (), literally "exotic taste" or "strange taste", is a seasoning mixture in Sichuan cuisine of China. Although it is popular in the Sichuan province, it is seldom used outside the region's cuisine, unlike yuxiang, another seasoning mixture of the region. The guaiwei seasoning exists in several forms but can be viewed as the combination of yuxiang and mala seasoning with a high proportion of sesame and sour ingredients. Preparation The ingredients of guaiwei always consists of either some or all of each group of: Sesame: Using either ground sesame, sesame oil, or sesame paste Sour: Using either lemon juice or more traditionally, dark rice vinegar (香醋) Yuxiang Piquant: Using Sichuan peppercorns, occasionally without chilis Savoury: Using soy sauce or salt and less commonly, doubanjiang Sugar Huangjiu (Chinese rice wine) may be used occasionally Preparation of the seasoning mixture can be done cold or hot, with cold mixtures being richer and heavier and hot mixtures lighter in taste. Dishes Dishes that use guaiwei as the main seasoning has the term affixed to its name. For instance: Guàiwèijī (怪味鸡): Chicken braised in guaiwei Guàiwèidǔsī (怪味肚丝): Pork tripe braised in guaiwei Guàiwèiniújiàn (怪味牛腱): Guaiwei beef shank Guàiwèidòu (怪味豆): Guaiwei fava beans, eaten as a snack References Sichuan cuisine Food ingredients
https://en.wikipedia.org/wiki/Yuxiang
Yuxiang () is a famous seasoning mixture in Chinese cuisine, and also refers to the resulting sauce in which meat or vegetables are cooked. It is said to have originated in Sichuan cuisine, and has since spread to other regional Chinese cuisines. Despite the term literally meaning "fish fragrance" in Chinese, yuxiang contains no seafood and is typically not added to seafood. On top of the basic mixture, cooking yuxiang almost always includes the use of sugar, vinegar, doubanjiang, soy sauce, and pickled chili peppers. Preparation Proper preparation of the yuxiang seasoning includes finely minced pao la jiao (pickled chili), white scallion, ginger, and garlic. They are mixed in more-or-less equal portions, though some prefer to include more scallions than ginger and garlic. The mixture is then fried in oil until fragrant. Water, starch, sugar, and vinegar are then added to create a basic sauce. Dishes The sauce is used most often for dishes containing beef, pork, or chicken. It is sometimes used for vegetarian recipes. In fact, Barbara Tropp suggests in The Modern Art of Chinese Cooking that the characters can also be interpreted as meaning "Sichuan-Hunan" (渝湘) flavor. Dishes that use yuxiang as the main seasoning have the term affixed to their name. For instance: Yúxiāngròusī (魚香肉絲): Pork strips stir-fried with yuxiang Yúxiāngqiézi (魚香茄子): Braised eggplants with yuxiang Yúxiāngniúnǎn (魚香牛腩): Beef brisket stewed with yuxiang References External links Example of video recipe for Yu Xiang Sauce Sichuan cuisine Food ingredients
https://en.wikipedia.org/wiki/STM8
The STM8 is an 8-bit microcontroller family by STMicroelectronics. The STM8 microcontrollers use an extended variant of the ST7 microcontroller architecture. STM8 microcontrollers are particularly low cost for a full-featured 8-bit microcontroller. Architecture The STM8 is very similar to the earlier ST7, but is better suited as a target for C due to its 16-bit index registers and stack pointer-relative addressing mode. Although internally a Harvard architecture it has "memory bridge" that creates a unified 24-bit address space, allowing code to execute out of RAM (useful for in-system programming of the flash ROM), and data (such as lookup tables) to be accessed out of ROM. On access the "memory bridge" stalls the CPU if required so that RAM-like write access to the flash ROM is possible. Code execution from the EEPROM is denied and creates a reset event. Random access to data above 64K is limited to special "load far" instructions; most operations' memory operands can access at most 128K (a 16-bit base address plus 16-bit offset). Depending on the device type, the amount of RAM is in the range of 1 to 6 KiB, and the amount of ROM is 4 to 8 KiB (Low density), 16 to 32 KiB (Medium density), or 32 to 96 KiB (High density). It has the same six registers (A, X, Y, SP, PC, CC) as the ST7, but the index registers X and Y have been expanded to 16 bits, and the program counter has been expanded to 24 bits. The accumulator A and the stack pointer remain 8 and 16 bits, respectively. The condition code register has two more defined bits, for a total of seven. There is an overflow flag, and a second interrupt enable bit, allowing four interrupt priority levels. Subfamilies STM8AF automobile STM8AL automobile low-power STM8L low-power STM8S general purpose STM8T touch-sensing STLUX lighting control STNRG Pulse-width modulation-controllers Compiler support The STM8 is supported by the free Small Device C Compiler, the free of charge closed source Cosmic C comp
https://en.wikipedia.org/wiki/Wahoo%20Fitness
Wahoo Fitness is a fitness technology company based in Atlanta. Its CEO is Mike Saturnia. Founded in 2009 by Chip Hawkins, Wahoo Fitness has offices in London, Berlin, Tokyo, Boulder and Brisbane. Wahoo's portfolio of cycling industry products includes the KICKR family of Indoor Cycling Trainers and Accessories, the ELEMNT family of GPS Cycling Computers and sport watches, the TICKR family of Heart Rate Monitors, SPEEDPLAY Advanced Road Pedal systems and the Wahoo SYSTM Training App. Main products Indoor trainers & smart bikes KICKR Direct Drive Smart Trainer KICKR CORE Direct Drive Smart Trainer KICKR SNAP Wheel-On Smart Trainer KICKR BIKE Indoor Smart Bike KICKR ROLLR Smart Trainer GPS cycling computers & smart watches ELEMNT ROAM GPS Bike Computer ELEMNT BOLT GPS Bike Computer ELEMNT RIVAL GPS Multisport Watch Heart rate monitors TICKR Heart Rate Monitor TICKR FIT Heart Rate Armband TICKR X Heart Rate Monitor Cycling sensors RPM Cadence Sensor RPM Speed Sensor RPM Sensor Bundle BLUE SC Speed and Cadence Sensor Indoor training accessories KICKR HEADWIND Smart Fan KICKR CLIMB Indoor Grade Simulator KICKR AXIS Action Feet KICKR Indoor Training Desk KICKR Floormat Pedals POWRLINK ZERO Power Pedal System SPEEDPLAY AERO Stainless Steel Aerodynamic Road Pedals SPEEDPLAY NANO Titanium Road Pedals SPEEDPLAY ZERO Stainless Steel Road Pedals SPEEDPLAY COMP Chromoly Road Pedals Standard Tension Cleat Easy Tension Cleat Training Wahoo SYSTM Training App Acquisitions September 2019 – Pedal manufacturer, Speedplay July 2019 – Indoor training platform, The Sufferfest, later rebranded to Wahoo SYSTM April 2022 – Indoor training platform, RGT (Road Grand Tour) later rebranded to Wahoo RGT Funding and investment 2010 – Private Investment July 2018 – Norwest Equity Partners Q3 2021 – Rhône Group May 17, 2023 – Wahoo announces Wahoo Fitness Founder Buys Company Back from Banks Team sponsorship Wahoo is an official sponsor for: Women's cy
https://en.wikipedia.org/wiki/Rotating%20pocket%20heater
A rotating pocket heater, also called pocket heater or Kinder heater, holds and rotates a substrate during vacuum deposition. During rotation, the substrate is sequentially exposed to more than one environment, for example, heat, oxygen, metal vapor, etc. Rotating pocket heaters has been used in reactive evaporation system to create YBa2Cu3O7 layers on planar semiconductor wafers. Magnesium diboride The illustration on the right shows an example of a pocket heater being used to deposit a layers of magnesium diboride on a substrate. A vertical shaft (32) turns a horizontal disk (30) several hundred rotations per minute (RPM). The illustration shows two of several substrates (14) attached to the underside of the rotating disk. The substrates are attached at their edges, so that most of the undersides of the substrates are exposed to the vapor below. The entire apparatus is enclosed in a chamber kept at low pressure by a vacuum pump. Magnesium diboride (MgB2) is an ionic solid with superconducting properties. Vapor deposition is difficult, because the vapor pressure of magnesium is much higher than boron. The pocket heater solves this problem by providing a separate environment for each material. Spying charge In May 2015, FBI agents arrested Professor Xiaoxing Xi, chairman of Temple University's physics department, accusing him of sharing schematics of a pocket heater with Chinese scientists. The prosecutors dropped all charges in September 2015 after it was shown that they had misconstrued the evidence and Xi has never shared the diagram of the pocket heater with anyone in China. Rotating pocket heater is not a restricted technology and was first invented by German physicists Berberich, Prusseit, and Kinder. Theva Dunnschichttechnik GmbH of Germany holds the patent for pocket heater. References Thin film deposition
https://en.wikipedia.org/wiki/Robert%20Ash%20%28engineer%29
Robert Lafayette Ash is a Professor of Mechanical & Aerospace Engineering and an Eminent Scholar at Old Dominion University in Norfolk, Virginia. Early life and education In 1968, Ash graduated from Tulane University in New Orleans with a PhD in Mechanical and Aerospace Engineering, and in 1963, he graduated from Kansas State University with a Bachelor of Science in Mechanical Engineering. Ash's father-in-law was Lewis Webb Jr., who served as the first president of Old Dominion University. His research interests include vortical flows, non-equilibrium phenomena, space systems, and Mars resources. Publications His most cited papers are: Bushnell, D. M., Hefner, J. N., and Ash, R. L. (1977). "Effect of Compliant Wall Motion on Turbulent Boundary Layers. presented at the I.U.T.A.M. Symposium on Structure of Turbulence and Drag Reduction, Physics of Fluids, 20 (10 part 11), (pp. S31-S58)." (cited 170 times according to Google Scholar) Khorrami, M. R., Malik, M. R., and Ash, R. L. (1989). "Application of Spectral Collocation Techniques to the Stability of Swirling Flows." Journal of Computational Physics, 81, (pp. 206–229).(cited 150 times, according to Google Scholar) Ash, R. L., Dowler, W. L., and Varsi, G. (1978). "Feasibility of Rocket Propellant Production on Mars." Acta Astronautica, 5, (pp. 705–724). (cited 100 times, according to Google Scholar) Groundbreaking for the era published and notable yet, Dr. Ash's In-Situ Resource Utilization (ISRU) paper, authored in 1978 as a visiting Old Dominion University (ODU) Senior Research Scientist at JPL, was the first instance of NASA research into ISRU production of liquid methane-based rocket propellants for a long-duration crewed missions to Mars' surface and return strategy. As initial detailed work of this type, it directly inspired "Mars Direct" and "Mars Semi-Direct" approaches in the following decades, although NASA shifted focus and fiscal resources to LEO and the ISS soon thereafter, versus continuing Mo
https://en.wikipedia.org/wiki/Batter%20%28cooking%29
Batter is a flour mixture with liquid and other ingredients such as sugar, salt and leavening used for cooking. It usually contains more liquid than doughs, which are also mixtures of flour and liquid. Batters are usually a pourable consistency that cannot be kneaded. Batter is most often used for pancakes, light cakes, and as a coating for fried foods. It is also used for a variety of batter breads. The word batter comes from the French word battre, which means to beat, as many batters require vigorous beating or whisking in their preparation. Methods Many batters are made by combining dry flours with liquids such as water, milk or eggs. Batters can also be made by soaking grains in water and grinding them wet. Often a leavening agent such as baking powder is included to aerate and fluff up the batter as it cooks, or the mixture may be naturally fermented for this purpose as well as to add flavour. Carbonated water or another carbonated liquid such as beer may instead be used to aerate the batter in some recipes. Other substitutes for water are wine, or flavored liquors like curaçao, brandy, and maraschino. The viscosity of batter may range from very "heavy" (adhering to an upturned spoon) to "thin" (similar to single cream, enough to pour or drop from a spoon and sometimes called "drop batter"). Heat is applied to the batter, usually by frying, baking or steaming, in order to cook the ingredients and to "set" the batter into a solid form. Batters may be sweet or savoury, often with either sugar or salt being added (sometimes both). Many other flavourings such as herbs, spices, fruits or vegetables may be added to the mixture. Beer batter Beer is a popular ingredient in batters used to coat foods before frying. One reason is that a basic batter can be made from merely flour, beer, and some salt. The purpose of using beer is so the bubbles in the beer will add body and lightness to the batter. Depending on the type and quality of the beer, it may also add colou
https://en.wikipedia.org/wiki/Bacteriolysin
One of the serum substances which is part of the dissolution process of bacteria, the enzymes will promote the dissolution of the bacterial cell wall and cause the death of the bacteria. Bacteriolysin probably functions by deregulating lipoteichoic acid (LTA) in Gram-positive bacteria and phospholipids in Gram-negative bacteria. See also Immune system Immunity Polyclonal response References http://onlinelibrary.wiley.com/doi/10.1034/j.1600-0463.2002.1101101.x/abstract;jsessionid=C40F7DA658C09C4F8491ACD72F89E9B7.f04t04 Immune system Cell biology Bacteriology
https://en.wikipedia.org/wiki/Logic%20of%20graphs
In the mathematical fields of graph theory and finite model theory, the logic of graphs deals with formal specifications of graph properties using sentences of mathematical logic. There are several variations in the types of logical operation that can be used in these sentences. The first-order logic of graphs concerns sentences in which the variables and predicates concern individual vertices and edges of a graph, while monadic second-order graph logic allows quantification over sets of vertices or edges. Logics based on least fixed point operators allow more general predicates over tuples of vertices, but these predicates can only be constructed through fixed-point operators, restricting their power. A sentence may be true for some graphs, and false for others; a graph is said to model , written , if is true of the vertices and adjacency relation of . The algorithmic problem of model checking concerns testing whether a given graph models a given sentence. The algorithmic problem of satisfiability concerns testing whether there exists a graph that models a given sentence. Although both model checking and satisfiability are hard in general, several major algorithmic meta-theorems show that properties expressed in this way can be tested efficiently for important classes of graphs. Other topics of research in the logic of graphs include investigations of the probability that a random graph has a property specified within a particular type of logic, and methods for data compression based on finding logical sentences that are modeled by a unique graph. First order In the first-order logic of graphs, a graph property is expressed as a quantified logical sentence whose variables represent graph vertices, with predicates for equality and adjacency testing. Examples For instance, the condition that a graph does not have any isolated vertices may be expressed by the sentence where the symbol indicates the undirected adjacency relation between two vertices. This sen
https://en.wikipedia.org/wiki/Trethowan%27s%20sign
Trethowan's sign is when Klein's line does not intersect the lateral part of the superior femoral epiphysis on an AP radiograph of the pelvis. Clinical use Trethowan's sign is indicative of a diagnosis of slipped capital femoral epiphysis. See also Southwick angle References External links Musculoskeletal radiographic signs
https://en.wikipedia.org/wiki/Neuro%20biomechanics
Neuro Biomechanics is based upon the research of bioengineering researchers, neuro-surgery, orthopedic surgery and biomechanists. Neuro Biomechanics are utilized by neurosurgeons, orthopedic surgeons and primarily by integrated physical medicine practitioners. Practitioners are focused on aiding people in the restoration of biomechanics of the skeletal system in order to measurably improve nervous system function, health, function, quality of life, reduce pain and the progression of degenerative joint and disc disease. Neuro: of or having to do with the nervous system. Nervous system: An organ system that coordinates the activities of muscles, monitors organs, constructs and processes data received from the senses and initiates actions. The human nervous system coordinates the functions of itself and all organ systems including but not limited to the cardiovascular system, respiratory system, skin, digestive system, immune system, hormonal, metabolic, musculoskeletal, endocrine system, blood and reproductive system. Optimal function of the organism as a whole depends upon the proper function of the nervous system. Biomechanics: (biology, physics) The branch of biophysics that deals with the mechanics of the human or animal body; especially concerned with muscles and the skeleton. The study of biomechanical influences upon nervous system function and load bearing joints. Research: Research on established ideal mechanical models for the human locomotor system. Panjabi MM, Journal of Biomechanics, 1974. A note on defining body parts configurations Gracovetsky S. Spine 1986; The Optimum Spine Yoganandan, Spine 1996 Harrison. Spine 2004 Modeling of the Sagittal Cervical Spine as a Method to Discriminate Hypolordosis: Results of Elliptical and Circular Modeling in 72 Asymptomatic Subjects, 52 Acute Neck Pain Subjects, and 70 Chronic Neck Pain Subjects; Spine 2004 Panjabi et al. Spine 1997 Whiplash produces and S-Shape curve... Harrision DE, JMPT 2003, Increasing
https://en.wikipedia.org/wiki/Stair%20tread
A stair tread is the horizontal portion of a set of stairs on which a person walks. The tread can be composed of wood, metal, plastic, or other materials. In residential settings, treads can be covered in carpeting. Stair treads can come in non-slip varieties, particularly in commercial or industrial locations. Styles of tread There are a number of different styles of tread: Mid flight treads. Straight or flier. A standard oblong shaped tread. used in a straight flight. Diminishing flier. Set into the straight section of flight before a turn, with one end narrower than the other Used to change the pitch of the handrail before a 180º turn. Winder. wider at one end, used to turn the flight. Kite winder. A quadrilateral shaped tread, used in the corner of a turn: hence the kite name. Feature or starting treads. These treads are used to embellish the start of a flight of stairs, they may have either a straight front to them or a commode/curved front to enhance them further. Curtail. An ornate tread that follows the spiral of a volute handrail, the back of the tread will cut into itself and then return along the flight. Bullnose. A straight tread with the front corners rounded off. "D" ends. So called as they look like a D shape attached to the end of the tread. A common style that may be carried up the flight for a number of treads. Tower.The tower feature is a cylindrical addition to the front corner of a tread, intended for setting a newel post onto, the tower may be positioned dependent on the handrail termination. Commode front. The addition of a curve to the front of a tread to create a more decorative feature. USAB & ADA compliance According to the United States Access Board, stair treads in buildings shall have uniform tread depths that are 11 inches, or 280 mm, at minimum. Treads are not permitted to have a slope steeper than 1:48. All stair tread installations must comply with Regulation 302 of the ADA Standards for Accessible Design. The regulation s
https://en.wikipedia.org/wiki/Zvezdelina%20Stankova
Zvezdelina Entcheva Stankova (; born 15 September 1969) is an American mathematician who is a professor of mathematics at Mills College and a teaching professor at the University of California, Berkeley, the founder of the Berkeley Math Circle, and an expert in the combinatorial enumeration of permutations with forbidden patterns. Biography Stankova was born in Ruse, Bulgaria. She began attending the Ruse math circle as a fifth grader in Bulgaria, the same year she learned to solve the Rubik's Cube and began winning regional mathematics competitions. She later wrote of this experience that "if I was not a member of Ruse SMC I would not be able to make such profound achievements in mathematics". She became a student at an elite English-language high school, and competed on the Bulgarian team in the International Mathematical Olympiads in 1987 and 1988, earning silver medals both times. She entered Sofia University but in 1989, as the Iron Curtain was falling, became one of 15 Bulgarian students selected to travel to the US to complete their studies. Stankova studied at Bryn Mawr College, completing bachelor's and master's degrees there in 1992, with Rhonda Hughes as a faculty mentor. While an undergraduate, she participated in a summer research program with Joseph Gallian at the University of Minnesota Duluth, which began her interest in permutation patterns. Next, she went to Harvard University for her doctoral studies, and earned a Ph.D. there in 1997; her dissertation, entitled Moduli of Trigonal Curves, was supervised by Joe Harris. She worked at the University of California, Berkeley as Morrey Assistant Professor of Mathematics before joining the Mills College faculty in 1999, and continues to teach one course per year as a visiting professor at Berkeley. She also serves on the advisory board of the Proof School in San Francisco. Contributions In the theory of permutation patterns, Stankova is known for proving that the permutations with the forbidden patter
https://en.wikipedia.org/wiki/Biogenesis%20of%20lysosome-related%20organelles%20complex%203
BLOC-3 or biogenesis of lysosome-related organelles complex 3 is a ubiquitously expressed multisubunit protein complex. Interactions biogenesis of lysosome-related organelles complex 3 has been shown to interact with Rab9A. Complex Components The identified protein subunits of BLOC-1 include: HPS1, HPS4 References Cell biology
https://en.wikipedia.org/wiki/Anne%20Richards
Dame Anne Helen Richards (born 1964) is the chief executive officer of Fidelity International. Previously, she served as chief investment officer of Aberdeen Asset Management and chief executive officer of M&G Investments. Early career Scottish-born, she was educated at the Royal High School, Edinburgh. Richards began her career with a research fellowship at CERN, after graduating from the University of Edinburgh with a First-Class Honours degree in Electronics and Electrical Engineering. She subsequently worked for Cambridge Consultants, before pursuing further studies in France at INSEAD graduating as MBA. City career Richards worked initially as an analyst with Alliance Capital, before moving to JP Morgan, working in portfolio management, and then moving on to Mercury Asset Management, and later MLIM. In 2002 she took up the post of Chief Investment Officer and Joint Managing Director of Edinburgh Fund Managers plc. When EFM was taken over by Aberdeen Asset Management in 2003, Richards continued in her role as Chief Investment Officer. It was announced in February 2016 that she would be taking over from Michael McLintock as chief executive of M&G Investments from June 2016. In July 2018, it was announced that she would leave M&G Investments, following the merger to become M&G Prudential (and subsequent demerger from Prudential UK), to join Fidelity International as chief executive officer. In 2021, Richards led development of a range of flexible working options at Fidelity International, following the COVID-19 lockdown. Non-executive positions Richards was Vice-Convener of the Court of the University of Edinburgh and is a former director of both the Esure Group plc and the Scottish Chamber Orchestra. She is a member of the US-based Board of Leaders of 2020 Women on Boards, which works to increasing the proportion of women on corporate boards. Richards chaired the CERN and Society Foundation Board from 2015 to at least 2019. Fellowships and honours Dam
https://en.wikipedia.org/wiki/Standard-dynamic-range%20video
Standard-dynamic-range video (SDR video) is a video technology which represents light intensity based on the brightness, contrast and color characteristics and limitations of a cathode ray tube (CRT) display. SDR video is able to represent a video or picture's colors with a maximum luminance around 100 cd/m2, a black level around 0.1 cd/m2 and Rec.709 / sRGB color gamut. It uses the gamma curve as its electro-optical transfer function. The first CRT television sets were manufactured in 1934 and the first color CRT television sets were manufactured in 1954. The term "standard-dynamic-range video" was adopted to distinguish SDR video from high-dynamic-range video (HDR video), a new technology that was developed in the 2010s to overcome SDR's limits. Technical details Transfer function Conventional gamma curves: Opto-electronic transfer function (OETF): Rec. 601 (analog video signals in SD-TV digital video form) Rec. 709 (HD-TV) Rec. 2020 (UHD-TV) sRGB Electro-optical transfer function (EOTF): ITU-R BT.1886 (SDR-TV) sRGB (monitors, printers, World Wide Web) The linear part of the conventional gamma curve was used to limit camera noise in low light video but is no longer needed with high dynamic range (HDR) cameras. An example of a conventional gamma curve would be Rec. 601: ITU-R Recommendation BT.1886 describe the reference EOTF of SDR. It's a gamma curve representing the response of CRT to video signal. It has been published by ITU in 2011. A transfer function that is closer to Weber's law allows for a larger dynamic range, at the same bit depth, than a conventional gamma curve. HDR standards such as hybrid log–gamma (HLG) and SMPTE ST 2084 allow for a larger dynamic range by using a different transfer function. HLG is compatible with SDR displays. Color gamut In some cases the term SDR is also used with a meaning including the standard color gamut (i.e. Rec.709 / sRGB color primaries). HDR uses wide color gamut (WCG) such as Rec. 2020 or DCI-P3 colo
https://en.wikipedia.org/wiki/Infinite%20sites%20model
The Infinite sites model (ISM) is a mathematical model of molecular evolution first proposed by Motoo Kimura in 1969. Like other mutation models, the ISM provides a basis for understanding how mutation develops new alleles in DNA sequences. Using allele frequencies, it allows for the calculation of heterozygosity, or genetic diversity, in a finite population and for the estimation of genetic distances between populations of interest. The assumptions of the ISM are that (1) there are an infinite number of sites where mutations can occur, (2) every new mutation occurs at a novel site, and (3) there is no recombination. The term ‘site’ refers to a single nucleotide base pair. Because every new mutation has to occur at a novel site, there can be no homoplasy, or back-mutation to an allele that previously existed. All identical alleles are identical by descent. The four gamete rule can be applied to the data to ensure that they do not violate the model assumption of no recombination. The mutation rate () can be estimated as follows, where is the number of mutations found within a randomly selected DNA sequence (per generation), is the effective population size. The coefficient is the product of twice the gene copies in individuals of the population; in the case of diploid, biparentally-inherited genes the appropriate coefficient is 4 whereas for uniparental, haploid genes, such as mitochondrial genes, the coefficient would be 2 but applied to the female effective population size which is, for most species, roughly half of . When considering the length of a DNA sequence, the expected number of mutations is calculated as follows Where k is the length of a DNA sequence and is the probability a mutation will occur at a site. Watterson developed an estimator for mutation rate that incorporates the number of segregating sites (Watterson's estimator). One way to think of the ISM is in how it applies to genome evolution. To understand the ISM as it applies to genome evo
https://en.wikipedia.org/wiki/Open%20Bionics
Open Bionics is a UK-based company that develops low-cost, 3D printed bionic arms for amputees with below elbow amputations. Their bionic arms are fully functional with lights, bio feedback vibrations and different functions that allow the user to grab, pinch, high-five, fist bump and thumbs-up. The company is based inside Future Space, co-located with Bristol Robotics Laboratory. The company was founded in 2014 by Joel Gibbard MBE and Samantha Payne MBE. In 2020 Joel Gibbard and Samantha Payne were awarded MBEs for their services to Innovation, Engineering, and Technology. Partnerships In 2015, Disney and Open Bionics announced a partnership to create superhero-themed prosthetics for young amputees. In the same year, the company won the 2015 James Dyson Award in the UK for innovative engineering and Tech4Good's 2015 Accessibility Award. In 2016, it won a Bloomberg Business Innovators award. In January 2019, James Cameron and 20th Century Fox partnered with Open Bionics to give 13-year-old double amputee Tilly Lockey a pair of Alita-inspired bionic Hero Arms for the London premiere of Alita: Battle Angel. Lockey lost both of her hands when she contracted meningococcal septicemia at 15 months of age. In 2020, Open Bionics partnered with gaming company Konami to create 'Venom Snake' Hero Arm covers, which are featured in the 2015 video game Metal Gear Solid V: The Phantom Pain. In 2023, Open Bionics collaborated with Ukraine charity Superhumans Center to fit Ukrainian soldiers with bionic Hero Arms as a result of the ongoing Russian invasion of Ukraine Funding In January 2019, Open Bionics raised Series A funding of $5.9 million. The round was led by Foresight Williams Technology EIS Fund, Ananda Impact Ventures and Downing Ventures, with participation from F1's Williams Advanced Engineering Group among others. References External links Bionics Medical technology companies of the United Kingdom Prosthetic manufacturers Engineering companies of England Comp
https://en.wikipedia.org/wiki/Consortium%20for%20Energy%20Efficiency
The Consortium for Energy Efficiency (CEE) is a nonprofit 501(c)(3) organization that promotes the adoption of energy efficient products and services. CEE specifications are referenced by the United States Department of Energy and by the efficiency programs of many natural gas and electric utilities in the United States and Canada. The organization's Annual Industry Report documents the efficiency industry's US$8 billion in annual expenditures. Activities and funding CEE influences the market for efficient products and services through 17 initiatives covering the residential, commercial and industrial sectors; Product examples include space heating, refrigeration lighting, and industrial water treatment. These initiatives are voluntarily adopted by CEE members—such as utility efficiency programs—to establish common levels for high efficiency equipment. Member organizations implement initiatives through rebates, technical assistance, or other efforts in their service territories, states, or provinces. CEE also publishes Qualified Product Lists of equipment meeting high levels of efficiency performance. Some equipment criteria are specifically cited by US law for energy-related federal tax credits. Since 2000, CEE has conducted the Household ENERGY STAR Survey, identifying the ENERGY STAR program as one of the most recognized brands among US consumers. According to the organization's 2013 IRS Form 990, membership dues represented US$2,533,118 (64%) of annual revenue. CEE received significant additional funding through its partnerships with the US Environmental Protection Agency, the US Department of Energy, and Natural Resources Canada. Founded in 1991, CEE members consist of more than 100 natural gas and electric utilities, 10 efficiency organizations and state agencies, and 4 DOE national laboratories. Annual Industry Report The CEE Annual Industry Report provides funding information and program activities for natural gas and electric demand side management. The
https://en.wikipedia.org/wiki/Algorismus%20%28Norse%20text%29
Algorismus is a short treatise on mathematics, written in Old Icelandic. It is the oldest text on mathematics in a Scandinavian language and survives in the early fourteenth-century manuscript Hauksbók, a large book written and compiled by Icelanders and taken to Norway during the later part of the 13th century by Haukur Erlendsson. It is probably a translation from Latin into Old Norse of some pages included in more ancient books such as Carmen de Algorismo by De Villa Dei of 1200, Liber Abaci by Fibonacci of 1202, and Algorismus Vulgaris by De Sacrobosco of 1230. References Icelandic literature Icelandic manuscripts Mathematics manuscripts Mathematics textbooks Old Norse literature 14th-century books
https://en.wikipedia.org/wiki/Twin%20pattern
In software engineering, the Twin pattern is a software design pattern that allows developers to model multiple inheritance in programming languages that do not support multiple inheritance. This pattern avoids many of the problems with multiple inheritance. Definition Instead of having a single class which is derived from two super-classes, have two separate sub-classes each derived from one of the two super-classes. These two sub-classes are closely coupled, so, both can be viewed as a Twin object having two ends. Applicability The twin pattern can be used: to model multiple inheritance in a language in which multiple inheritance is not supported to avoid some problems of multiple inheritance. Structure There will be two or more parent classes which are used to be inherited. There will be sub-classes each of which is derived from one of the super-classes. The sub-classes are mutually linked via fields, and each sub-class may override the methods inherited from the super-class. New methods and fields are usually declared in one sub-class. The following diagram shows the typical structure of multiple inheritance: The following diagram shows the Twin pattern structure after replacing the previous multiple inheritance structure: Collaborations Each child class is responsible for the protocol inherited from its parent. It handles the messages from this protocol and forwards other messages to its partner class. Clients of the twin pattern reference one of the twin objects directly and the other via its twin field. Clients that rely on the protocols of parent classes communicate with objects of the respective child class. Sample code The following code is a sketched implementation of a computer game board with moving balls. Class for the game board: public class Gameboard extends Canvas { public int width, height; public GameItem firstItem; … } Code sketch for GameItem class: public abstract class GameItem { Gameboard board; int
https://en.wikipedia.org/wiki/Longhurst%20code
Longhurst code refers to a set of geospatial four-letter geocodes for referencing geographic regions in oceanography. The set of 56 geocodes represent biogeochemical provinces that partition the pelagic environment. It is assumed that each province represents a unique set of environmental conditions. They are named after Alan R. Longhurst, the author of "Ecological Geography of the Sea", the textbook in which these codes are defined. These codes have also been used in bioinformatic databases such as IMG to represent sample origins for sequenced microbial genomes, as a supplement to latitude and longitude coordinate metrics. References Geocodes Oceanographical terminology
https://en.wikipedia.org/wiki/Blackboard%20%28design%20pattern%29
In software engineering, the blackboard pattern is a behavioral design pattern that provides a computational framework for the design and implementation of systems that integrate large and diverse specialized modules, and implement complex, non-deterministic control strategies. This pattern was identified by the members of the Hearsay-II project and first applied to speech recognition. Structure The blackboard model defines three main components: blackboard—a structured global memory containing objects from the solution space knowledge sources—specialized modules with their own representation control component—selects, configures and executes modules. Implementation The first step is to design the solution space (i.e. potential solutions) that leads to the blackboard structure. Then, knowledge sources are identified. These two activities are closely related. The next step is to specify the control component; it generally takes the form of a complex scheduler that makes use of a set of domain-specific heuristics to rate the relevance of executable knowledge sources. Applications Usage-domains include: speech recognition vehicle identification and tracking protein structure identification sonar signals interpretation. Consequences The blackboard pattern provides effective solutions for designing and implementing complex systems where heterogeneous modules have to be dynamically combined to solve a problem. This provides non-functional properties such as: reusability changeability robustness. The blackboard pattern allows multiple processes to work closer together on separate threads, polling and reacting when necessary. See also Blackboard system Software design pattern References Software design patterns
https://en.wikipedia.org/wiki/Binding%20properties%20pattern
The binding properties pattern is combining multiple observers to force properties in different objects to be synchronized or coordinated in some way. This pattern was first described as a technique by Victor Porton. This pattern comes under concurrency patterns. Comparison with aspect-oriented implementation As an alternative to the aspect-oriented implementation of mutual properties, property binding can be proposed. In LibPropC++ C++ library it is implemented too. Some weakness in the LibPropC++ (with property binding): Its use is not transparent as it requires to be declared necessary object attributes as properties and appropriate accessor methods must be provided Binding of attributes in LibPropC++ is not designed to replace method calls The library does not maintain an interaction history. Implementation There are two types of binding. One-way binding should be applied when one of the properties is read-only. In other cases, two-way binding must be applied. Infinite loops can be eliminated by blocking the signal, or comparing the assigned value with the property value before assignment, or eliminating unnecessary assignments. Binding properties of different types can be achieved through type conversions. Binding properties with transformations can be achieved through reducing the transformation function to the problem of binding properties, and the function can be imaginary consider as Type Conversions. Resulting context Properties are being kept synchronized automatically. Between library calls they always have the values expressed by the EqualityConstraints. Deficiencies Property changes watching mechanism acquires some resources. Sample code Code sketch for one-way binding may look like as follows: bind_multiple_one_way(src_obj, src_prop, dst_objs[], dst_props[]) { for (i, j) in (dst_objs, dst_props) { bind_properties_one_way(src_obj, src_prop, i, j); } } Two-way binding can be expressed as follows (in C++): // In this pseudo-c
https://en.wikipedia.org/wiki/Coordinate%20systems%20for%20the%20hyperbolic%20plane
In the hyperbolic plane, as in the Euclidean plane, each point can be uniquely identified by two real numbers. Several qualitatively different ways of coordinatizing the plane in hyperbolic geometry are used. This article tries to give an overview of several coordinate systems in use for the two-dimensional hyperbolic plane. In the descriptions below the constant Gaussian curvature of the plane is −1. Sinh, cosh and tanh are hyperbolic functions. Polar coordinate system The polar coordinate system is a two-dimensional coordinate system in which each point on a plane is determined by a distance from a reference point and an angle from a reference direction. The reference point (analogous to the origin of a Cartesian system) is called the pole, and the ray from the pole in the reference direction is the polar axis. The distance from the pole is called the radial coordinate or radius, and the angle is called the angular coordinate, or polar angle. From the hyperbolic law of cosines, we get that the distance between two points given in polar coordinates is The corresponding metric tensor field is: The straight lines are described by equations of the form where r0 and θ0 are the coordinates of the nearest point on the line to the pole. Quadrant model system The Poincaré half-plane model is closely related to a model of the hyperbolic plane in the quadrant Q = {(x,y): x > 0, y > 0}. For such a point the geometric mean and the hyperbolic angle produce a point (u,v) in the upper half-plane. The hyperbolic metric in the quadrant depends on the Poincaré half-plane metric. The motions of the Poincaré model carry over to the quadrant; in particular the left or right shifts of the real axis correspond to hyperbolic rotations of the quadrant. Due to the study of ratios in physics and economics where the quadrant is the universe of discourse, its points are said to be located by hyperbolic coordinates. Cartesian-style coordinate systems In hyperbolic geometry rect
https://en.wikipedia.org/wiki/Mendel%20Lectures
The Mendel Lectures is a series of lectures given by the world's top scientists in genetics, molecular biology, biochemistry, microbiology, medicine and related areas which has been held in the refectory of the Augustian Abbey of St. Thomas in Brno, Czech Republic since May 2003. The lectures were established to celebrate the 50th anniversary of the discovery of the structure of deoxyribonucleic acid (DNA) by James Watson (1928) and Francis Crick (1916-2004). The Mendel Lectures are named in honour of Gregor Johann Mendel (1822-1884), the founder of genetics, who lived and worked in the Augustinian Abbey in Brno 1843-1884. Based on his experiments conducted in the abbey between 1856 and 1863, Mendel established the basic rules of heredity, now referred to as the laws of Mendelian inheritance. The Mendel Lectures are organized by the Masaryk University, the Mendel Museum, and the St. Anne's University Hospital Brno. The twentieth season of the Mendel Lectures is running at present. More than 130 top scientists, including many Nobel Prize winners, have visited Brno to give a Mendel Lecture, for example Tim Hunt, Jack W. Szostak, John Gurdon, Elizabeth Blackburn, Paul Nurse, Venkatraman Ramakrishnan, Günter Blobel, Kurt Wüthrich, Jules A. Hoffmann, Aaron Ciechanover, Ada Yonath, Paul Modrich, Eric F. Wieschaus, Fraser Stoddart, Ben Feringa, Brian K. Kobilka and others. History The first idea of the Mendel Lectures occurred during the international conference ´EMBO Workshop: Genetics after the Genome´ organised by Dieter Schweizer and Kim Nasmyth in 2002. Kim Nasmyth, at the time director of the Research Institute of Molecular Pathology, and his wife Anna Nasmyth, Imma Mautner Markhof from Austria, Jan Motlík of the Academy of Sciences of the Czech Republic and Jiřina Relichová of the Masaryk University prepared and organized the very first series of Mendel Lectures. They named the series „The Road to the DNA“ and focused the lectures on the historical context of gene
https://en.wikipedia.org/wiki/Offshore%20Group%20Newcastle
Offshore Group Newcastle or OGN Group are a British company that fabricate steel in North East England, often for oil platforms. It is Tyneside's largest manufacturing yard. History On 5 February 2016 it appeared in the episode Sea Cities Tyneside of BBC Two series Sea Cities. Also appearing in the programme was the Shields Ferry and the Port of Tyne. It also visited South Shields Marine School, part of South Tyneside College and the oldest marine school in the world, Target of Leif Höegh & Co from Norway, the Great North Run, MS Marina of Oceania Cruises, and the Old Low Light. Political activity The company donated over £100,000 to the Conservative Party during the 2019 United Kingdom general election Structure It is an offshore fabrication yard on the north bank of the River Tyne in Wallsend, near Point Pleasant, opposite the former site of Hebburn Colliery. Products Gas and oil platforms. See also Floating production storage and offloading Severfield, of North Yorkshire, who built the Gateshead Millennium Bridge Wallsend Slipway & Engineering Company :Category:Oil platforms off the United Kingdom References External links OGN Group Offshore Technology Companies based in Newcastle upon Tyne Conservative Party (UK) donors Engineering companies of England North Sea energy Offshore engineering Petroleum industry in the United Kingdom River Tyne Steel companies of the United Kingdom Structural steel Wallsend
https://en.wikipedia.org/wiki/EMonocot
eMonocot was a collaborative global, online, biodiversity information resource provided by a number of botanical organisations to create a database on Monocotyledons. Participating institutions, all in England, included the Royal Botanical Gardens at Kew, the University of Oxford, the Natural History Museum and the Natural Environment Research Council (NERC). Funding of the project, which included information on over 250,000 taxa, was provided through NERC. Taxonomists from around the world contributed data, although the backbone of the resource was the World Checklist of Selected Plant Families. Data was imported and compiled from a large number of international databases and resources. In 2017, Plants of the World Online superseded eMonocot, which built on the project's work. See also Plants of the World Online References External links Developing Tools for Mapping & Identification of Monocotyledons (eMonocot). Biodiversity Institute of Oxford eMonocot – a web taxonomic resource for plants of new scale and depth. RBG Kew eMonocot: The Orders and Families of Monocots UK Research and Innovation Biodiversity Biodiversity databases Databases in England Monocots Natural Environment Research Council
https://en.wikipedia.org/wiki/Global%20Digital%20Mathematics%20Library
The Global Digital Mathematics Library (GDML) is a project organized under the auspices of the International Mathematical Union (IMU) to establish a digital library focused on mathematics. A working group was convened in September 2014, following the 2014 International Congress of Mathematicians, by former IMU President Ingrid Daubechies and Chair Peter J. Olver of the IMU’s Committee on Electronic Information and Communication (CEIC). Currently the working group has eight members, namely: Thierry Bouche, Institut Fourier & Cellule MathDoc, Grenoble, France Bruno Buchberger, RISC, Hagenberg/Linz, Austria Patrick Ion, Mathematical Reviews/AMS, Ann Arbor, MI, US Michael Kohlhase, Jacobs University, Bremen, Germany Jim Pitman, University of California, Berkeley, CA, US Olaf Teschke, zbMATH/FIZ, Berlin, Germany Stephen M. Watt, University of Waterloo, Waterloo, ON, Canada Eric Weisstein, Wolfram Research, McAllen, TX, US Background In the spring of 2014, the Committee on Planning a Global Library of the Mathematical Sciences released a comprehensive study entitled “Developing a 21st Century Global Library for Mathematics Research.” This report states in its Strategic Plan section, “There is a compelling argument that through a combination of machine learning methods and editorial effort by both paid and volunteer editors, a significant portion of the information and knowledge in the global mathematical corpus could be made available to researchers as linked open data through the GDML." Workshop A workshop titled "Semantic Representation of Mathematical Knowledge" was held at the Fields Institute in Toronto during February 3–5, 2016. The goal of the workshop was to lay down the foundations of a prototype semantic representation language for the GDML. The workshop's organizers recognized that the extremely wide scope of mathematics as a whole made it unrealistic to map out the detailed concepts, structures, and operations needed and used in individual mathema
https://en.wikipedia.org/wiki/Apache%20SystemDS
Apache SystemDS (Previously, Apache SystemML) is an open source ML system for the end-to-end data science lifecycle. SystemDS's distinguishing characteristics are: Algorithm customizability via R-like and Python-like languages. Multiple execution modes, including Standalone, Spark Batch, Spark MLContext, Hadoop Batch, and JMLC. Automatic optimization based on data and cluster characteristics to ensure both efficiency and scalability. History SystemML was created in 2010 by researchers at the IBM Almaden Research Center led by IBM Fellow Shivakumar Vaithyanathan. It was observed that data scientists would write machine learning algorithms in languages such as R and Python for small data. When it came time to scale to big data, a systems programmer would be needed to scale the algorithm in a language such as Scala. This process typically involved days or weeks per iteration, and errors would occur translating the algorithms to operate on big data. SystemML seeks to simplify this process. A primary goal of SystemML is to automatically scale an algorithm written in an R-like or Python-like language to operate on big data, generating the same answer without the error-prone, multi-iterative translation approach. On June 15, 2015, at the Spark Summit in San Francisco, Beth Smith, General Manager of IBM Analytics, announced that IBM was open-sourcing SystemML as part of IBM's major commitment to Apache Spark and Spark-related projects. SystemML became publicly available on GitHub on August 27, 2015 and became an Apache Incubator project on November 2, 2015. On May 17, 2017, the Apache Software Foundation Board approved the graduation of Apache SystemML as an Apache Top Level Project. Key technologies The following are some of the technologies built into the SystemDS engine. Compressed Linear Algebra for Large Scale Machine Learning Declarative Machine Learning Language Examples Principal Component Analysis The following code snippet does the Principal compon
https://en.wikipedia.org/wiki/Generalised%20beam%20theory
In structural engineering and mechanical engineering, generalised beam theory (GBT) is a one-dimensional theory used to mathematically model how beams bend and twist under various loads. It is a generalization of classical Euler–Bernoulli beam theory that approximates a beam as an assembly of thin-walled plates that are constrained to deform as a linear combination of specified deformation modes. History Its origin is due to Richard Schardt (1966). Since then many other authors have extended the initial (first-order elastic) GBT formulations developed by Schardt and his co-workers. Many extensions and applications of GBT have been developed by Camotim (Instituto Superior Técnico, University of Lisbon, Portugal) and collaborators, since the beginning of the 21st century. Description The theory can be applied without restrictions to any prismatic thin-walled structural member exhibiting straight or curved axial axis (any loading, any cross-section geometry, any boundary conditions). GBT is in some ways analogous to the finite strip method and can be a more computationally efficient method than modeling a beam with a full 2D or 3D finite element method to predict the member structural behavior. GBT has been widely recognized as an efficient approach to analyzing thin-walled members and structural systems. The efficiency arises mostly from its modal nature – the displacement field is expressed as a linear combination of cross-section deformation modes whose amplitudes vary continuously along the member length (x axis) - see Figures 2-3. Due to GBT assumptions inherent to a thin-walled member, only 3 non-null stress components are considered in the formulations (see Fig. 1). Membrane displacement field (i.e., in the cross-section mid-surface): The GBT modal nature makes it possible to (i) acquire in-depth knowledge on the mechanics of the thin-walled member behaviour and (ii) judiciously exclude, from subsequent similar GBT analyses, those deformation modes f
https://en.wikipedia.org/wiki/Group%20actions%20in%20computational%20anatomy
Group actions are central to Riemannian geometry and defining orbits (control theory). The orbits of computational anatomy consist of anatomical shapes and medical images; the anatomical shapes are submanifolds of differential geometry consisting of points, curves, surfaces and subvolumes,. This generalized the ideas of the more familiar orbits of linear algebra which are linear vector spaces. Medical images are scalar and tensor images from medical imaging. The group actions are used to define models of human shape which accommodate variation. These orbits are deformable templates as originally formulated more abstractly in pattern theory. The orbit model of computational anatomy The central model of human anatomy in computational anatomy is a Groups and group action, a classic formulation from differential geometry. The orbit is called the space of shapes and forms. The space of shapes are denoted , with the group with law of composition ; the action of the group on shapes is denoted , where the action of the group is defined to satisfy The orbit of the template becomes the space of all shapes, . Several group actions in computational anatomy The central group in CA defined on volumes in are the diffeomorphism group which are mappings with 3-components , law of composition of functions , with inverse . Submanifolds: organs, subcortical structures, charts, and immersions For sub-manifolds , parametrized by a chart or immersion , the diffeomorphic action the flow of the position . Scalar images such as MRI, CT, PET Most popular are scalar images, , with action on the right via the inverse. . Oriented tangents on curves, eigenvectors of tensor matrices Many different imaging modalities are being used with various actions. For images such that is a three-dimensional vector then Tensor matrices Cao et al. examined actions for mapping MRI images measured via diffusion tensor imaging and represented via there principle eigenvector. For tensor
https://en.wikipedia.org/wiki/Gradshteyn%20and%20Ryzhik
Gradshteyn and Ryzhik (GR) is the informal name of a comprehensive table of integrals originally compiled by the Russian mathematicians I. S. Gradshteyn and I. M. Ryzhik. Its full title today is Table of Integrals, Series, and Products. Since its first publication in 1943, it was considerably expanded and it soon became a "classic" and highly regarded reference for mathematicians, scientists and engineers. After the deaths of the original authors, the work was maintained and further expanded by other editors. At some stage a German and English dual-language translation became available, followed by Polish, English-only and Japanese versions. After several further editions, the Russian and German-English versions went out of print and have not been updated after the fall of the Iron Curtain, but the English version is still being actively maintained and refined by new editors, and it has recently been retranslated back into Russian as well. Overview One of the valuable characteristics of Gradshteyn and Ryzhik compared to similar compilations is that most listed integrals are referenced. The literature list contains 92 main entries and 140 additional entries (in the eighth English edition). The integrals are classified by numbers, which haven't changed from the fourth Russian up to the seventh English edition (the numbering in older editions as well as in the eighth English edition is not fully compatible). The book does not only contain the integrals, but also lists additional properties and related special functions. It also includes tables for integral transforms. Another advantage of Gradshteyn and Ryzhik compared to computer algebra systems is the fact that all special functions and constants used in the evaluation of the integrals are listed in a registry as well, thereby allowing reverse lookup of integrals based on special functions or constants. On the downsides, Gradshteyn and Ryzhik has become known to contain a relatively high number of typographical e
https://en.wikipedia.org/wiki/Capybara%20%28software%29
Capybara is a web-based test automation software that simulates scenarios for user stories and automates web application testing for behavior-driven software development. It is written in the Ruby programming language. Capybara can mimic actions of real users interacting with web-based applications. It can receive pages, parse the HTML and submit forms. Background and motivation During the software development process (especially in the Agile and Test-driven Development environments), as the size of the tests increase, it becomes difficult to manage tests which are complex and not modular. By extending the human-readable behavior-driven development style of frameworks such as Cucumber and RSpec into the automation code itself, Capybara aims to develop simple web-based automated tests. Anatomy of Capybara Capybara is a Ruby library (also referred to as a gem) that is used with an underlying web-based driver. It consists of a user-friendly DSL (Domain Specific Language) which describe actions that are executed by the underlying web driver. When the page is loaded using the DSL (and underlying web driver), Capybara will attempt to locate the relevant element in the DOM (Document Object Model) and execute an action such as click button, link, etc. Drivers By default, Capybara uses the :rack_test driver which does not have any support for executing JavaScript. Drivers can be switched in Before and After blocks. Some of the web drivers supported by Capybara are mentioned below. RackTest Written in Ruby, Capybara's default driver RackTest does not require a server to be started since it directly interacts with Rack interfaces. Consequently, it can only be used for Rack applications. Selenium Selenium-webdriver, which is mostly used in web-based automation frameworks, is supported by Capybara. Unlike Capybara's default driver, it supports JavaScript, can access HTTP resources outside of application and can also be set up for testing in headless mode which is
https://en.wikipedia.org/wiki/Composite%20entity%20pattern
Composite entity is a Java EE Software design pattern and it is used to model, represent, and manage a set of interrelated persistent objects rather than representing them as individual fine-grained entity beans, and also a composite entity bean represents a graph of objects. Structure There are a number of strategies to implement composite entity pattern. This pattern mainly composites of composite entity, coarse-grained object, and dependent objects. Composite entity component Composite entity is the coarse-grained entity bean which may be the coarse-grained object, or may contain a reference to the coarse-grained object. Coarse-grained object A coarse-grained object is an object with its own life cycle manages its own relationships to other objects. It can be an object contained in the composite entity, or, composite entity itself can be the coarse-grained object which holds dependent objects. Dependent objects It is an object, which can contain other dependent objects (there may be a tree of objects within the composite entity), that depends on the coarse-grained object and has its life cycle managed by the coarse-grained object. Consequences According to Oracle description of the pattern, consequences include eliminating inter-entity relationships, improving manageability by reducing entity beans, improving network performance, reducing database schema dependency, increasing object granularity, facilitating composite transfer object creation and overhead of multi-level dependent object graphs. Drawbacks The fatal drawback is the requirement of bean-managed persistent (BMP) bean. This involves more work for developers, and create some problems as follows: materializing all the data in a coarse-grained entity whenever it is accessed, is unacceptably expensive In Java, implementation of the ejbStore() method needs to be smart enough to avoid issuing all the updates required to persist the entire state of the object, unless the data has changed in all t
https://en.wikipedia.org/wiki/Intercepting%20filter%20pattern
Intercepting Filter is a JavaEE pattern which creates pluggable filters to process common services in a standard manner without requiring changes to core request processing code. The filters intercept incoming requests and outgoing responses, allowing preprocessing and post-processing, and these filters can be added or removed unobtrusively without changing existing code. This pattern applies reusable processing transparently before and after the actual request execution by the front and page controllers. Structure Filter manager, filter chain, filters and target are components of the pattern. Filter manager This manages filter processing and creates the filter chain with the appropriate filters, in the correct order, and initiates processing. Filter chain A Filter Chain is a specific series of filters, composed so as to form a logical chain. Filters These are the individual filters that are mapped to a target and their processing is coordinated by filter chain. Target This is the resource requested by the client. Consequences Following benefits can be considered: Improved reusability: Common code is centralized in pluggable components enhancing reuse. Increased flexibility: Generic common components can be applied and removed declaratively, improving flexibility. Reduced performance can be a concern, as unnecessarily long chains of interceptors and filters may hurt performance. Sample code Sample code implementation for filters with custom filter strategy is given below. Code for implementing a filter - debugging filter: public class DebuggingFilter implements Processor { private Processor target; public DebuggingFilter(Processor myTarget) { target = myTarget; } public void execute(ServletRequest req, ServletResponse res) throws IOException, ServletException { //Do some filter processing here, such as // displaying request parameters target.execute(req, res); } } Code for impl
https://en.wikipedia.org/wiki/Composition%20filters
The composition filters model denotes a modular extension to the conventional object model. It provides a solution for a wide range of problems in the construction of large and complex applications. Most notably, one implementation of composition filters provides an abstraction layer for message-passing systems. Composition filters work by changing the behavior of an object through the manipulation of incoming and outgoing messages. This is done with the help of input and output filters which are controlled by conditions. History and motivation In concurrent and distributed computing, there are many problems such as scattering and tangling of code, which were difficult to handle using traditional object-oriented models. A need arose to develop a new software development model which addressed these concerns and this resulted in the formation of the Aspect-oriented software development paradigm. Several models in this paradigm were developed concurrently, and one of them is the Composition Filters Object Model. The pioneers of this model were Mehmet Aksit and various PhD students (Lodewijk Bergmans, Jan Bosch, Bedir Tekinerdogan) and many MSc. students from the TRESE Group at the University of Twente in the Netherlands. It was based on the Sina language which was developed by Mehmet Aksit in his PhD thesis. Many advancements have been made in the model since then. Design The design of the composition filters model is an extension of the design of the kernel object model. The design consists of two major parts – the kernel or the implementation part, and the outer layer or the interface part. The extensions are made in the interface part to produce the composition filters model from the traditional kernel object model. Implementation part The implementation part or the kernel consists of a single layer with three types of components: Instance variables Methods Conditions It also consists of an encapsulation boundary which separates the implementation and th
https://en.wikipedia.org/wiki/Akai%20AR900
The Akai Professional AR900 is a stereo 16-bit MIDI digital reverb, that could also be controlled by the optional AR900T remote control. It belongs to the "Akai White Series", a family of musical products launched in the last part of the 1980s. It was produced between 1986 and 1989. According to Akai Professional's official 1988-89 Musical Instruments catalog: "The AR900 is a high quality 16-bit digital reverb with 20 preset reverb programs. Numerous variations may be created by adjusting the pre delay and the reverb time settings on the front panel. These variations can then be stored in any of the 79 user memories for a total of 99 programs including the 20 presets. Programs may be selected by MIDI, a foot switch, or the infrared remote control accessory. A dual 7-band programmable graphic EQ can be used independently or in conjunction with the digital reverb to enhance the reverb sounds. The AR900 with its wide selection of useful programs has numerous application in both the studio and on stage." AR900 Features The technical specification of the AR900 are as follows: 8 program algorithms, 12 factory variations provide a selection of simulated ambient environments Independent dual 7-band graphic equalizer (100 Hz, 300 Hz, 600 Hz, 1.5 kHz, 3 kHz, 6 kHz, 10 kHz) Sampling resolution and frequency: 16 bit PCM, 39.0625 kHz Pre delay time: 0.01-210 msec. Reverb time: 1-16 sec. Equalizer section: 7-band 2-channel graphic equalizer. ±12db Frequency response-Dry: 20 Hz~25 kHz, ±3db Frequency response-Effect: 30 Hz~16 kHz, ±2db Connectors: LOOP SEND x2, LOOP RECEIVE x2, REV IN x2, EQ OUT x2 Programs: Standard: 1~8; Factory variations: 9~20; User memories: 21~99 Dimensions: 482.6(W) x 47.7(H) x 300(D)mm (EIA 1U rackmount) Weight: 4 kg According to an article from the French version of Keyboard magazine of September 1989: The AR900 offers a realtime stereo Spectrum Analyzer. An extension of the EQ tool, the analyzer's frequencies are represented graph
https://en.wikipedia.org/wiki/Slime%20Rancher
Slime Rancher is a first-person life simulation adventure video game developed and published by American indie studio Monomi Park. The game was released as an early access title in January 2016, with an official release on Windows, macOS, Linux and Xbox One on August 1, 2017. A PlayStation 4 version was released on August 21, 2018, and a Nintendo Switch version was released on August 11, 2021. A DLC named 'Slime Rancher: Secret Style Pack' was released on June 18, 2019 which added additional cosmetic appearances. A sequel, Slime Rancher 2, was released in early access on September 22, 2022, for Windows and Xbox Series X/S. A feature film adaptation is also in development. Gameplay The game is played in an open world and from a first-person perspective. The player controls a character named Beatrix LeBeau, a rancher who moves to a planet far from Earth called the Far Far Range to live the life of a "slime rancher", which consists of constructing her ranch and exploring the world of the Far Far Range in order to collect, raise, feed, and breed slimes. Slimes are gelatinous living organisms of various sizes and characteristics. To progress she has notes left by the former owner of the ranch that help her on her journey through the Far Far Range. The game's main economic aspect revolves around feeding slimes the appropriate food items so that they produce "plorts", which can then be sold in exchange for Newbucks, which can be used to purchase upgrades to the rancher's equipment or farm buildings. Except for the basic pink slime, slimes will only eat one of the three types of food; fruit, veggie, and meat. Slimes have a favorite food, if they eat this food they will produce double the normal number of plorts. The player moves the character around a variety of environments and can collect slimes, food items, and plorts by sucking them up with their vacuum tool (called a "Vacpack", a portmanteau of vacuum and backpack). They can only store a limited number of items and
https://en.wikipedia.org/wiki/Comma%20code
A comma code is a type of prefix-free code in which a comma, a particular symbol or sequence of symbols, occurs at the end of a code word and never occurs otherwise. This is an intuitive way to express arrays. For example, Fibonacci coding is a comma code in which the comma is 11. 11 and 1011 are valid Fibonacci code words, but 101, 0111, and 11011 are not. Examples Unary coding, in which the comma is 0. This allows NULL values (when the code and comma is a single 0, the value can be taken as a NULL or a 0). Fibonacci coding, in which the comma is 11. All Huffman codes can be converted to comma codes by prepending a 1 to the entire code and using a single 0 as a code and the comma. The definition of word being a number of symbols ending in a comma, the equivalent of a space character. 50% commas in all data axiom – All implied data specifically variable length bijective data can be shown to be consisting of exactly 50% of commas. All scrambled data or suitably curated same-length data exhibits so called implied probability. Such data that can be termed 'generic data' can be analysed using any interleaving unary code as headers where additional bijective bits (equal to the length of the unary code just read) are read as data while the unary code serves as an introduction or header for the data. This header serves as a comma. The data can be read in an interleaving fashion between each bit of the header or in post read fashion when the data is only read after the entire unary header code is read like Chen-Ho encoding. It can be seen by random walk techniques and by statistical summation that all generic data has a header or comma of an average of 2 bits and data of an additional 2 bits (minimum 1). This also allows for an inexpensive base increase algorithm before transmission in non binary communication channels, like base-3 or base-5 communication channels. Where '?' is '1' or '2' for the value of the bijective digit that requires no further process
https://en.wikipedia.org/wiki/National%20Coding%20Week
National Coding Week was founded by former headteacher Richard Rolfe and tech entrepreneur Jordan Love, who was appointed EU Code Week Ambassador for the UK. It took place during the week commencing September 21, 2014 with the aim of helping adults to improve their digital literacy in order to fill the growing skills gap. The week is run by volunteers in hubs, libraries, schools, businesses and NGOs with the intention of supporting adults to learn digital skills including coding. Richard Rolfe and Jordan Love were inspired to create the week when they trained a group of unemployed people in coding skills which eventually led to many of them getting jobs. The EU predicts a significant number of digital jobs being unfilled by 2020 due to a skills shortage. Richard and Jordan saw an opportunity to try to inspire adults to gain the skills necessary to fill the gap. History In 2015 National Coding Week ran from 21 September and spread beyond the UK. The week gained coverage and support in the EU and in the US. A number of prominent business leaders offered support to National Coding Week including Brian Doll VP of GitHub, Prince Andrew, Congressman Kevin McCarthy and Tim Lovejoy. Boris Johnson the Mayor of London stated that “Coding is a language that is increasingly important for both young people and adults to understand, but it can be an intimidating prospect. National Coding Week will help to make whole generations of Brits more comfortable with coding, allowing them to embrace the business opportunities of the future.”. One of the aims of the week was to also encourage women to get involved in coding Martha Lane Fox's drive to bridge the gender gap in tech gave prominence to the week. Over 100 events and 1000 people took part in 2015. Events occurred all over Wales in libraries and hubs and was supported by WEA YMCA Community College Cymru and the Welsh Government Speaking at the launch event in Cardiff Central Library Hub's new digital floor, the Deputy M
https://en.wikipedia.org/wiki/Hyper-converged%20infrastructure
Hyper-converged infrastructure (HCI) is a software-defined IT infrastructure that virtualizes all of the elements of conventional "hardware-defined" systems. HCI includes, at a minimum, virtualized computing (a hypervisor), software-defined storage, and virtualized networking (software-defined networking). HCI typically runs on commercial off-the-shelf (COTS) servers. The primary difference between converged infrastructure and hyperconverged infrastructure is that in HCI both the storage area network and the underlying storage abstractions are implemented virtually in software (at or via the hypervisor) rather than physically in hardware. Because software-defined elements are implemented in the context of the hypervisor, management of all resources can be federated (shared) across all instances of a hyper-converged infrastructure. Description Hyperconvergence evolves away from discrete, software-defined systems that are connected and packaged together toward a purely software-defined environment where all functional elements run on commercial, off-the-shelf (COTS) servers, with the convergence of elements enabled by a hypervisor. HCI systems are usually made up of server systems equipped with direct-attached storage. HCI includes the ability to pool like systems together. All physical data-center resources reside on a single administrative platform for both hardware and software layers. Consolidation of all functional elements at the hypervisor level, together with federated identity management, was promoted to improve data-center inefficiencies and reduce the total cost of ownership (TCO) for data centers. The potential impact of the hyper-converged infrastructure is that companies will no longer need to rely on different compute and storage systems, though it is still too early to prove that it can replace storage arrays in all market segments. It is likely to further simplify management and increase resource-utilization rates where it does apply. See a
https://en.wikipedia.org/wiki/VIPRE
VIPRE Security Group, (also known as VIPRE or VIPRE Security) a brand of Ziff Davis, is a privately held cybersecurity company headquartered in New York. VIPRE develops cybersecurity products focused on endpoint and email security along with advanced threat intelligence applications. VIPRE is based globally with operations in Clearwater, Florida, Washington D.C., Vancouver B.C., Keele, United Kingdom, Dublin, Ireland, Copenhagen, Denmark, Stockholm, Sweden, Amsterdam, Netherlands and in Oslo, Norway. Corporate history The company was originally founded in 1994 as Sunbelt Software, which was acquired in 2010 by GFI Software. In 2013 Sunbelt Software was spun off and renamed to ThreatTrack Security. In 2017 they were concentrating on their VIPRE suite and the company now uses that name. The VIPRE portfolio now encompasses endpoint security, with heritage from original Sunbelt Software anti-virus products, email security, with heritage from the UK company Fusemail, Comendo, StaySecure, WeCloud, iCritical and ElectricMail products that had previously been acquired by j2, and security awareness training via the acquisition of Inspired e-Learning. VIPRE was featured in a PC World Magazine article. In February 2018 it was acquired by j2 Global. Acquisitions References Computer network security
https://en.wikipedia.org/wiki/Algebroid%20function
In mathematics, an algebroid function is a solution of an algebraic equation whose coefficients are analytic functions. So y(z) is an algebroid function if it satisfies where are analytic. If this equation is irreducible then the function is d-valued, and can be defined on a Riemann surface having d sheets. Analytic functions Equations
https://en.wikipedia.org/wiki/Gestigon
Gestigon (stylized as gestigon) is a software development company founded in September 2011, by Sascha Klement, Erhardt Barth, and Thomas Martinetz. The company develops software for gesture control and body tracking based on 3D depth data. , Gestigon is developing augmented reality and automotive solutions for Audi, Renault and Volkswagen. The company is also working on AR/VR headsets as well as consumer electronics and smart home devices. In March 2017, Gestigon was acquired by Valeo, a French automotive supplier. History Sascha Klement worked as a student assistant and Ph.D. student for the professors Thomas Martinetz and Erhardt Barth, who have been developing software solutions based on time-of-flight sensors at the University of Lübeck since 2002. Together they founded Gestigon in 2011 with seed-funding from High-Tech Gründerfonds, Mittelständische Beteiligungsgesellschaft Schleswig-Holstein and local business angels. In March 2012, Moritz von Grotthuss joined the company as advisor and later became CEO, being considered a late-founder. The same month, Gestigon received an Innovation Award at CeBIT 2012, being one of the 15 startups to receive an award out of 276 candidates. In January 2013, Gestigon participated at CES in Las Vegas and, later that year, also at TechCrunch Disrupt in New York City. The next year Visteon and Volkswagen used Gestigon's gestures solutions in their products presented at CES 2014 and CeBIT 2014, where it won the “CeBIT Innovation Award”. Further public displays of Gestigon's technologies include Audi at CES 2015 and CES 2016; Volkswagen and Infineon. Gestigon launched its Virtual Reality solution Carnival at the TechCrunch Disrupt in San Francisco in September 2015, using an Oculus Rift and different depth sensors. The first demo using a mobile device was done at the CES 2015. Gestigon has partnered with several companies that develop hardware solutions, especially depth sensors, to provide sensing solutions. In 2015, Gestig
https://en.wikipedia.org/wiki/Digital%20Post%20Australia
Digital Post Australia was an Australian company which provided a digital postbox service, allowing users to send and receive bills and other letters via a secure platform. The company closed in 2014, citing a lack of demand from consumers and organisations. History The company was established in 2012, initially as a joint venture between Fuji Xerox Document Management Solutions and Computershare. Fuji Xerox subsequently sold its stake to Computershare. Upon its launch, Australia Post launched several rounds of unsuccessful legal action, despite Digital Post Australia being launched prior to any Australia Post digital service. The service was seen as a key competitor to the Digital Mailbox subsequently offered by Australia Post. In 2013, Digital Post Australia had 983 organisations willing to send customers letters via the service. Of the 983, 977 were companies already using Computershare's share registry service. The remaining six were local council in Queensland. Closure In June 2014 the company announced their closure, citing a lack of consumer demand and support from organisations. References Email Defunct technology companies of Australia Telecommunications companies established in 2012 Internet properties established in 2012 Telecommunications companies disestablished in 2014 Internet properties disestablished in 2014 Australian companies disestablished in 2014 Australian companies established in 2012
https://en.wikipedia.org/wiki/3D%20Maze
3D Maze is the name given to a screensaver, created in OpenGL, that was present in Microsoft Windows from Windows 95 until it was discontinued after Windows ME. Overview The maze is randomly generated each time, with the "player" navigating through it in first-person, spawning in front of a floating start button. From there, the maze is automatically traversed using the right-hand rule, which will guarantee the maze will eventually be solved because all of the randomly-generated mazes are simply connected (there are no looping paths). By default, the maze is textured with brick walls, a wooden floor, and an asbestos tile ceiling. Users can customize these textures, swapping them out for animated psychedelic patterns in later versions, or may instead create their own custom textures. As the maze is traversed, several objects can be found inside it, including floating "OpenGL" logos, images of globes on the walls (which is seen on the cover of the OpenGL Programming Guide), and a 2D sprite image of a rat that is also moving through the maze. Additionally, the "player" will encounter rotating polyhedric gray rocks that, when touched, will flip the camera upside down and turn the floor into the ceiling. When this happens, the "player" will traverse the maze following the left wall rather than the right until the exit is found or another gray rock is encountered, flipping the camera right-side up again. The exit to the maze is a floating, translucent smiley face. Upon reaching it, the maze will reset and another will be generated. If the maze is completed and reset while upside down, the next maze may be traversed as if it were upside down, hugging the left wall instead of the right. Users can also enable an overlaid map, which constantly displays the maze using simple vector graphics. On this map, the "player" is represented as a blue triangle, the start as a red triangle, the smiley face as a green triangle, the rocks as rotating white triangles, the OpenGL logos
https://en.wikipedia.org/wiki/Firewalld
firewalld is a firewall management tool for Linux operating systems. It provides firewall features by acting as a front-end for the Linux kernel's netfilter framework. firewalld's current default backend is nftables. Prior to v0.6.0, iptables was the default backend. Through its abstractions, firewalld acts as an alternative to nft and iptables command line programs. The name firewalld adheres to the Unix convention of naming system daemons by appending the letter "d". firewalld is written in Python. It was intended to be ported to C++, but the porting project was abandoned in January 2015. Features firewalld supports both IPv4 and IPv6 networks and can administer separate firewall zones with varying degrees of trust as defined in zone profiles. Administrators can configure Network Manager to automatically switch zone profiles based on known Wi-Fi (wireless) and Ethernet (wired) networks, but firewalld cannot do this on its own. Services and applications can use the D-Bus interface to query and configure the firewall. firewalld supports timed rules, meaning the number of connections (or "hits") to a service can be limited globally. There is no support for hit-counting and subsequent connection rejection per source IP; a common technique deployed to limit the impact of brute-force hacking and distributed denial-of-service attacks. firewalld's command syntax is similar to but more verbose than other iptables front-ends like Ubuntu's Uncomplicated Firewall (ufw). The command-line interface allows managing firewall rulesets for protocol, ports, source and destination; or predefined services by name. Services are defined as XML files containing port- and protocol-mappings, and optionally extra information like specifying subnets and listing required Kernel helper modules. The syntax resembles that of systemd's service files. A simple service file for a web server listening on TCP port 443 might look like this: <?xml version="1.0" encoding="utf-8"?> <service> <s
https://en.wikipedia.org/wiki/Stent-electrode%20recording%20array
Stentrode (Stent-electrode recording array) is a small stent-mounted electrode array permanently implanted into a blood vessel in the brain, without the need for open brain surgery. It is in clinical trials as a brain–computer interface (BCI) for people with paralyzed or missing limbs, who will use their neural signals or thoughts to control external devices, which currently include computer operating systems. The device may ultimately be used to control powered exoskeletons, robotic prosthesis, computers or other devices. The device was conceived by Australian neurologist Thomas Oxley and built by Australian biomedical engineer Nicholas Opie, who have been developing the medical implant since 2010, using sheep for testing. Human trials started in August 2019 with participants that suffer from amyotrophic lateral sclerosis, a type of motor neuron disease. Graeme Felstead was the first person to receive the implant. To date, eight patients have been implanted and are able to wirelessly control an operating system to text, email, shop and bank using direct thought through the Stentrode brain computer interface, marking the first time a brain-computer interface was implanted via the patient's blood vessels, eliminating the need for open brain surgery. The FDA granted breakthrough designation to the device in August 2020. In January 2023, researchers demonstrated that it can record brain activity from a nearby blood vessel and be used to operate a computer with no serious adverse events during the first year in all four patients. Overview Opie began designing the implant in 2010, through Synchron, a company he founded with Oxley and cardiologist Rahul Sharma. The small implant is an electrode array made of platinum electrodes embedded within a nitinol endovascular stent. The device measures about 5 cm long and a maximum of 8 mm in diameter. The implant is capable of two-way communication, meaning it can both sense thoughts and stimulate movement, essentially acting
https://en.wikipedia.org/wiki/NeoPhotonics%20Corporation
NeoPhotonics Corporation is an American public corporation based in San Jose, California. It was founded in 1996. The company develops, manufactures and sells optoelectronic products that transmit, receive and switch high speed digital optical signals for communications networks, These products include transceivers, tunable lasers, high bandwidth receivers, optical semiconductors, photonic integrated circuits, and 100 gigabit per second and above modules." These are each "cost-effective components that handle massive amounts of data at very high speeds". NeoPhotonics products primarily implement coherent technology and include those designed for 100G and beyond data rates, such as at 200G, 400G and 600G, for telecom and datacenter or content provider networks and applications. The company's high speed 100G and beyond coherent products are based on Advanced Hybrid Photonic Integration technology. Applications in coherent transmission use not only amplitude but also phase and polarization to increase data rates tenfold or more over conventional “on-off” transmission protocols. Coherent transmission is also necessary for next-generation flexible and efficient switching of signals individual wavelength without conflict or contention between wavelengths in an optical network, such as Software Defined Networks. Coherent transmission has become the technology of choice for the most advanced high speed telecommunications networks today. Revenues from the company's high speed products have grown rapidly due to the rapid expansion of telecom backbone and content provider networks accommodating increased mobile traffic. Initial adoption of the company's 100G coherent products were in the Long Haul market sector, over the next several years it is expect that growth in 100G and beyond will be mainly driven by adoption of 100G coherent products in the much larger Metro market sector and the datacenter market for large web-scale data network market. NeoPhotonics Corporation
https://en.wikipedia.org/wiki/Google%20OnHub
Google OnHub was a residential wireless router product from Google, Inc. The two variants are manufactured by TP-Link and ASUS. Google's official tagline for the product is "We’re streaming and sharing in new ways our old routers were never built to handle. Meet OnHub, a router from Google that is built for all the ways you use Wi-Fi." In 2016, Google released the Google Wifi router with mesh networking, and combined its functionality and network administration with the OnHub so that OnHub and Google Wifi may both be used interchangeably in mesh networks. Google touts the OnHub router as "easy to use and ready for the future" for its intuitive interface. According to OnHub specifications, both OnHub models are "Weave Ready" and "Bluetooth Smart Ready". The future enablement of these network protocols are possible as OnHub routers have an IEEE 802.15.4 radio antenna and a Bluetooth antenna. However, as of July 2020, the Bluetooth and 802.15.4 functionality have not been enabled. OnHub routers have a dual-core 1.4 GHz CPU, 1GB RAM, and 4GB flash storage. Like Google Wifi, the OnHub creates a single SSID for both the 2.4 GHz and 5 GHz bands to simplify the Wi-Fi experience for the end user. The OnHub will automatically steer devices to connect to the band with the best connection. In December 2021, Google announced that OnHub routers would no longer receive any software or security updates. After January 11, 2023, other features would be disabled like updating the Wi-Fi network settings, adding additional Wi-Fi devices, running speed tests, or using Google Assistant. Product comparison The OnHub router from TP-Link is available in black or blue. The TP-Link router also has a removable exterior shell that is interchangeable other color options to help the OnHub aesthetically fit in various environments. The OnHub router from ASUS is available in Slate Gray. There are also non-aesthetic features unique to each model. The TP-Link model features a "specialized reflec
https://en.wikipedia.org/wiki/Store-passing%20style
Store-passing style is a programming technique that is used to model mutable state without using mutable state. It generally arises in the conversion of imperative programs into purely functional ones. So, for instance, consider this JavaScript program, written in a non-store-passing-style: var lastWasA = false // a treebin represents a binary tree of strings. // a treebin is either // - a string, or // - {l : <treebin>, r: <treebin>} // does an in-order traversal of this tree's // leaves contain an 'a' followed by a 'b'? function aThenB(treebin) { if (typeof(treebin) === "string") { if (treebin === "a") { lastWasA = true; return false; } else if (treebin === "b") { if (lastWasA) { return true; } else { lastWasA = false; return false; } } else { lastWasA = false; return false; } } else { // not a string, must be an internal node: return ((aThenB(treebin.l))||(aThenB(treebin.r))); } } This contains a reference to a global variable. In store-passing style, the value of the global variable (or variables) is passed along to each call, and also returned from each call and threaded through the next call. The code might look like this: function aThenB(treebin, lastWasA) { if (typeof(treebin) === "string") { if (treebin === "a") { return {result: false, lastWasA: true}; } else if (treebin === "b") { if (lastWasA) { return {result: true, lastWasA: false}; } } else { return {result: false, lastWasA: false}; } } else { // not a string, must be an internal node: var leftCall = aThenB(treebin.l, lastWasA); if (leftCall.result) { return {result: true, lastWasA: false} } else { return aThenB(treebin.r, leftCall.lastWasA); } } } Not