source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/IEC/IEEE%2061850-9-3
IEC/IEEE 61850-9-3 (Power Utility Profile) or PUP is an international standard for precise time distribution and clock synchronization in electrical grids with an accuracy of 1 μs. It supports precise time stamping of voltage and current measurement for differential protection, wide area monitoring and protection, busbar protection and event recording. It can be used to ensure deterministic operation of critical functions in the automation system. It belongs to the IEC 61850 standard suite for communication networks and systems for power utility automation. IEC/IEEE 61850-9-3 is a profile (subset) of IEEE Std 1588 Precision Time Protocol (PTP) when clocks are singly attached. IEC/IEEE 61850-9-3 provides seamless fault tolerance by attaching clocks to duplicated networks paths and by support of simultaneously active redundant master clocks. For this case, the extensions to PTP defined in IEC 62439-3 Annex A apply. Main features IEC/IEEE 61850-9-3 uses the following IEEE Std 1588 options: uses the PTP timescale based on TAI International Atomic Time, also delivers UTC Coordinated Universal Time communicates on Layer 2 over Ethernet (IEEE 802.3) links, either in a Local Area Network or in a Wide Area Network (Metro-Ethernet) measures the link delay by peer-to-peer (Pdelay) message exchange transmits the clock correction indifferently in 1-step (preferred) or in 2-step operates with the default best master clock algorithm, performed by master and by slave clocks Performance IEC/IEEE 61850-9-3 aims at an accuracy of better than 1 μs after crossing 15 bridges with transparent clocks. It assumes that all network elements (bridges, routers, media converters, links) support PTP with a given performance: Grandmaster (GC): 250 ns maximum inaccuracy Transparent Clocks (TC): 50 ns maximum inaccuracy Boundary Clocks (BC): 200 ns maximum inaccuracy Media Converters: 50 ns maximum jitter and 25 ns maximum asymmetry Link asymmetry: 25 ns maximum asymmetr
https://en.wikipedia.org/wiki/Institute%20for%20Genetic%20Engineering%20and%20Biotechnology
Institute for Genetic Engineering and Biotechnology (INGEB) is a Bosnian public research institute, member of Sarajevo University (UNSA), and affiliate center of International Centre for Genetic Engineering and Biotechnology (ICGEB). ICGEB was established as a special project of the United Nations Industrial Development Organization (UNIDO). INGEB was founded under the name "Center for Genetic Engineering and Biotechnology", in 1988. INGEB's headquarters are located in Sarajevo. One of INGEB's most prominent founders was Professor Rifat Hadžiselimović, with the support of the Government of Socialist Republic of Bosnia and Herzegovina, ANUBiH and the biggest B&H economic systems. After the establishment document, INGEB was entrusted with the functions maker, institutional creator and carrier of the overall scientific and professional work in the development of genetic engineering and biotechnology based molecular biology in B&H. In 1993, by a legal act, the Assembly of Republic of Bosnia and Herzegovina, assumed the right of the founder of the institution, at the beginning of the Bosnian War, and later, in 1999, entitled founder of INGEB (as a "public institution that will operate within the University of Sarajevo") took over the Sarajevo Canton. Structure and activities In INGEB, there are following functional units: Laboratory for forensic genetics; Laboratory for human genetics; Laboratory for GMO and food biosafety; Laboratory for molecular genetics of natural resources; Laboratory for bioinformatics and biostatistics, and Laboratory for cytogenetics and genotoxicology. Laboratory for Forensic Genetics Laboratory for forensic genetics provides scientific approach to analysis of samples of different origin. In this laboratory DNA profiling is routinely done for skeletal remains, blood stains (on different materials), hair, semen, controversial traces on cigarette butts, controversial traces under fingernails, in urine etc. Expert activities perform in lab
https://en.wikipedia.org/wiki/Dauntless%20%28video%20game%29
Dauntless is a free-to-play action role-playing game developed by Phoenix Labs and published and distributed by Epic Games. The game initially launched in beta in May 2018 for Microsoft Windows. An early access version launched on May 21, 2019 for PlayStation 4 and Xbox One, including full support for cross-platform play, and was fully released for those platforms on September 26, 2019. A Nintendo Switch version was released on December 10, 2019. Versions for PlayStation 5 and Xbox Series X/S were released on December 2, 2021. Gameplay Dauntless takes place in a fantasy setting, where a cataclysmic event has torn the world apart, releasing monstrous creatures known as Behemoths that prey on the surviving humans. Players take on the role of Slayers to take down Behemoths, collecting loot that they use to craft and upgrade weapons and equipment as to take down larger and more powerful Behemoths. While hunting, the game plays as a third-person action game; the player uses a combo system to attack the creature, while monitoring their own health and stamina gauge. Such hunts can take upwards of twenty minutes of in-game time to complete. The game can be played both as single-player, cooperatively in a party of up to four or in public cooperative instances of up to six people. Development Phoenix Labs was formed by former Riot Games developers Jesse Houston, Sean Bender, and Robin Mayne, and as of January 2017 includes 40 developers formerly from BioWare, Blizzard Entertainment, and Capcom. While a small studio compared to the AAA studios they left, Houston said that they are positioned in a way to offer "a new, unique approach to crafting AAA experiences". Dauntless is the studio's first release. It was heavily inspired, as well as frequently compared to, Capcom's Monster Hunter series, which can see hundreds of hours put into a game by a player; the developers themselves have over a collective 6000 hours in various Monster Hunter titles. Dauntless was also influenced
https://en.wikipedia.org/wiki/RCA%20CDP1861
The RCA CDP1861 was an integrated circuit Video Display Controller, released by the Radio Corporation of America (RCA) in the mid-1970s as a support chip for the RCA 1802 microprocessor. The chip cost in 1977 amounted to less than US$20. History The CDP1861 was manufactured in a low-power CMOS technology, came in a 24-pin DIP (Dual in-line package), and required a minimum of external components to work. In 1802-based microcomputers, the CDP1861 (for the NTSC video format, CDP1864 variant for PAL), used the 1802's built-in DMA controller to display black and white (monochrome) bitmapped graphics on standard TV screens. The CDP1861 was also known as the Pixie graphics system, display, chip, and video generator, especially when used with the COSMAC ELF microcomputer. Other known chip markings for the 1861 are TA10171, TA10171V1 and a TA10171X, which were early designations for "pre-qualification engineering samples" and "preliminary part numbers", although they have been found in production RCA Studio II game consoles and Netronics Elf microcomputers. The CDP1861 was also used in the Telmac 1800 and Oscom Nano microcomputers. Specifications The 1861 chip could display 64 pixels horizontally and 128 pixels vertically, though by reloading the 1802's R0 DMA (direct memory access) register via the required 1802 software controller program and interrupt service routine, the resolution could be reduced to 64×64 or 64×32 to use less memory than the 1024 bytes needed for the highest resolution (with each monochrome pixel occupying one bit) or to display square pixels. A resolution of 64×32 created square pixels and used 256 bytes of memory (2K bits). This was the usual resolution for the Chip-8 game programming system. Since the video graphics frame buffer was often similar or equal in size to the memory size, it was not unusual to display your program/data on the screen allowing you to watch the computer "think" (i.e. process its data). Programs which ran amok and accidenta
https://en.wikipedia.org/wiki/Mock%20trainwreck
In computer science, the term Mock Trainwreck refers to the difficulty of mocking a deeply nested model structure. Mocking is the creation of mock objects which can be used to mimic the behavior of real objects, often because it is hard to test with the real objects. A trainwreck is multiple levels of method calls (called a chain), which each return objects upon which new methods can be called. Deeply nested models go against the Law of Demeter because the property's property must be accessed. The Law of Demeter, also known as the principle of least knowledge is a design guideline to promote loose coupling of data structures that are not closely related, and thus should probably not be coupled together. In addition, this level of coupling can be considered an inappropriate intimacy code smell. Mock trainwrecks should be avoided when possible. This is because not only does it makes it harder to test the code which uses them, but also because they are harder to work with from a design standpoint. In addition, it increases the amount of information an object can access, due to its close relation with other parameters that are not related to its main functionality. Example of a trainwreck If someone wanted to write a test looking for a library that receives public funding, or by its head librarian, he or she might use code like the following: Java assertEqual( l.getHeadLibrarian() .getName().split(" ")[1] , "Smith") assertEqual( l.getFunding().getType() , "public") Ruby l.headLibrarian.name.split(/ +/).last.should == "Smith" l.funding.type.should == "public" To mock up an object that matches the search result, they would have to have mocking code like what follows: Java HeadLibrarian h = mock(HeadLibrarian.class); when(h.getName()).thenReturn("Jane Smith"); Funding f = mock(Funding.class); when(f.getType()).thenReturn("public"); Library l = mock(Library.class); when(l.getHeadLibrarian()).thenReturn(h); when(l.getFunding()).thenRetur
https://en.wikipedia.org/wiki/Xplore%20Technologies
Xplore Technologies is a publicly traded, designer, marketer and manufacturer of rugged tablets. The company was founded in 1996 and is based in Austin, Texas. In 2015, Xplore Technologies purchased assets of Motion Computing making it one of the top companies in the rugged tablet PC market. The company's products are primarily used by field service personnel, factory workers and military personnel. Xplore Technologies products are built to satisfy MIL-STD-810G and HAZLOC compliant ATEX standards, as well as Ingress Protection (IP) ratings. History Xplore Technologies was founded in Ontario, Canada in 1996 and began selling devices in 1998. The company was listed on the Toronto Stock Exchange in June 1998. In 2003, Xplore Technologies announced that it was relocating its corporate headquarters to Austin, Texas. The company filed to change its jurisdiction from Canada to Delaware in 2006. In July 2012, after being traded over-the-counter since leaving the TSX, the company filed for an IPO with the SEC and was listed on the Nasdaq stock exchange. In March 2015, Xplore Technologies raised $12 million when it sold an additional 2 million shares of common stock. In April 2015, the company bought assets of Motion Computing Inc. for $16 million. On July 5, 2018, Zebra Technologies announced its intent to acquire Xplore Technologies for roughly $90 million. References Companies based in Austin, Texas Home computer hardware companies Companies established in 1996
https://en.wikipedia.org/wiki/Robert%20Everist%20Greene
Robert Everist Greene (born 1943) is an American mathematician at UCLA. Greene was an undergraduate at Michigan State University and a Putnam Fellow in 1963. He completed his Ph.D. at the University of California, Berkeley in 1969. His doctoral advisor was Hung-Hsi Wu; his doctoral thesis was titled Isometric Embeddings of Riemannian and Pseudo-Riemannian Manifolds. Bibliography Some of Greene's books and papers are: Function theory of One Complex Variable (Graduate Studies in Mathematics 40) Differential Geometry The Automorphism Groups Of Domains Function Theory On Manifolds Which Possess A Pole Introduction to Topology (with Theodore Gamelin) Several Complex Variables and Complex Geometry References External links 1943 births Living people 20th-century American mathematicians University of California, Berkeley alumni 21st-century American mathematicians Putnam Fellows
https://en.wikipedia.org/wiki/Treatise%20on%20Analysis
Treatise on Analysis is a translation by Ian G. Macdonald of the nine-volume work Éléments d'analyse on mathematical analysis by Jean Dieudonné, and is an expansion of his textbook Foundations of Modern Analysis. It is a successor to the various Cours d'Analyse by Augustin-Louis Cauchy, Camille Jordan, and Édouard Goursat. Contents and publication history Volume I The first volume was originally a stand-alone graduate textbook with a different title. It was first written in English and later translated into French, unlike the other volumes which were first written in French. It has been republished several times and is much more common than the later volumes of the series. The contents include Chapter I: sets Chapter II Real numbers Chapter III Metric spaces Chapter IV The real line Chapter V Normed spaces Chapter VI Hilbert spaces Chapter VII Spaces of continuous functions Chapter VIII Differential calculus (This uses the Cauchy integral rather than the more common Riemann integral of functions.) Chapter IX Analytic functions (of a complex variable) Chapter X Existence theorems (for ordinary differential equations) Chapter XI Elementary spectral theory Volume II The second volume includes Chapter XII Topology and topological algebra Chapter XIII Integration Chapter XIV Integration in locally compact groups Chapter XV Normed algebras and spectral theory Volume III The third volume includes chapter XVI on differential manifolds and chapter XVII on distributions and differential operators. Volume IV The fourth volume includes Chapter XVIII Differential systems Chapter XIX Lie groups Chapter XX Riemannian geometry Volume V Volume V consists of chapter XXI on compact Lie groups. Volume VI Volume VI consists of chapter XXII on harmonic analysis (mostly on locally compact groups) Volume VII Volume VII consists of the first part of chapter XXIII on linear functional equations. This chapter is considerably more advanced than most of the other chapters. Volume VI
https://en.wikipedia.org/wiki/Karl-Georg%20Niebergall
Karl-Georg Niebergall (born 1961) is a German logician and philosopher and professor for logic and philosophy of language at Humboldt University of Berlin. Biography From 1982 Niebergall studied mathematics in Darmstadt. After that he studied logic and philosophy of science under Godehard Link and Matthias Varga von Kibéd at Ludwig Maximilian University of Munich (LMU). Niebergall received his PhD in philosophy from LMU in 1995. His PhD dissertation on ‘The metamathematics of non-axiomatized theories’ was awarded with the Stegmüller award of the German Society for Analytic Philosophy. In 1997 Niebergall was a visiting scholar at Stanford University. From 1998 he was associate professor at the department of philosophy at LMU. In 2002 Niebergall received his Habilitation with a dissertation on ‘The foundations of mathematics. Reducibility and ontology’. Since 2008, Niebergall has been professor for logic and philosophy of language at Humboldt University of Berlin. Research Niebergall’s research has centered on the metamathematics of formal theories related to mereology and infinity. He has also critically engaged with the works of Nelson Goodman, David Hilbert and William W. Tait. Awards Stegmüller award of the German Society for Analytic Philosophy (1997) References External links Karl-Georg Niebergall on HU Berlin department of philosophy page Works by Karl-Georg Niebergall (PhilPapers) 1961 births 20th-century German philosophers 21st-century German philosophers German logicians Philosophers of language Mathematical logicians Ludwig Maximilian University of Munich alumni Academic staff of the Humboldt University of Berlin Living people
https://en.wikipedia.org/wiki/Mass-spring-damper%20model
The mass-spring-damper model consists of discrete mass nodes distributed throughout an object and interconnected via a network of springs and dampers. This model is well-suited for modelling object with complex material properties such as nonlinearity and viscoelasticity. Packages such as MATLAB may be used to run simulations of such models. As well as engineering simulation, these systems have applications in computer graphics and computer animation. Derivation (Single Mass) Deriving the equations of motion for this model is usually done by examining the sum of forces on the mass: By rearranging this equation, we can derive the standard form: where is the undamped natural frequency and is the damping ratio. The homogeneous equation for the mass spring system is: This has the solution: If then is negative, meaning the square root will be negative the solution will have an oscillatory component. See also Numerical methods Soft body dynamics#Spring/mass models Finite element analysis References Classical mechanics Mechanical vibrations
https://en.wikipedia.org/wiki/ND812
The 12-bit ND812, produced by Nuclear Data, Inc., was a commercial minicomputer developed for the scientific computing market. Nuclear Data introduced it in 1970 at a price under $10,000 (). Description The architecture has a simple programmed I/O bus, plus a DMA channel. The programmed I/O bus typically runs low to medium-speed peripherals, such as printers, teletypes, paper tape punches and readers, while DMA is used for cathode ray tube screens with a light pen, analog-to-digital converters, digital-to-analog converters, tape drives, disk drives. The word size, 12 bits, is large enough to handle unsigned integers from 0 to 4095 – wide enough for controlling simple machinery. This is also enough to handle signed numbers from -2048 to +2047. This is higher precision than a slide rule or most analog computers. Twelve bits could also store two six-bit characters (note, six-bit isn't enough for two cases, unlike "fuller" ASCII character set). "ND Code" was one such 6-bit character encoding that included upper-case alphabetic, digit, a subset of punctuation and a few control characters. The ND812's basic configuration has a main memory of 4,096 twelve-bit words with a 2 microsecond cycle time. Memory is expandable to 16K words in 4K word increments. Bits within the word are numbered from most significant bit (bit 11) to least significant bit (bit 0). The programming model consists of four accumulator registers: two main accumulators, J and K, and two sub accumulators, R and S. A rich set of arithmetic and logical operations are provided for the main accumulators and instructions are provided to exchange data between the main and sub accumulators. Conditional execution is provided through "skip" instructions. A condition is tested and the subsequent instruction is either executed or skipped depending on the result of the test. The subsequent instruction is usually a jump instruction when more than one instruction is needed for the case where the test fails.
https://en.wikipedia.org/wiki/Configurable%20mixed-signal%20IC
Configurable Mixed-signal IC (abbreviated as CMIC) is a category of ICs comprising a matrix of analog and digital blocks which are configurable through programmable (OTP) non-volatile memory. The technology, in combination with its design software and development kits, allows immediate prototyping of custom mixed-signal circuits, as well as the integration of multiple discrete components into a single IC to reduce PCB cost, size and assembly issues. See also Field-programmable analog array Programmable system-on-chip References Integrated circuits
https://en.wikipedia.org/wiki/Boundless%20%28video%20game%29
Boundless is a massively multiplayer online sandbox game, developed by Guildford-based studio Wonderstruck Games. It was released through Early access on Steam for Microsoft Windows and OS X on November 13, 2014. It was fully released on September 11, 2018, and features online cross-play across all regions with PlayStation 4. Gameplay Played in either first-person or third-person perspective, players control a customisable avatar around procedurally generated planets, made up of various types and shapes of blocks. Players interact with these blocks and discover ancient technologies to help craft tools, weapons and machines which can then be used to shape the world around them into buildings, vast cities and guilds, and eventually allow players to open warps and portals to other worlds. Players are able to gather resources from their local environment, which are then used to survive and build equipment. Bases are built in the form of Beacons, which reserve an area for a particular player, protecting the land from being mined or otherwise edited by others. Players must also deal with hostile wildlife and survival matters such as hunger to survive in the alien universe of the game. Players are able to explore solo, or to play together in groups. Large groups of players collaborate to build intricate projects or undertake large-scale hunts. Development In July 2014, the game was announced as a goal-funded project under the title of Oort Online. It quickly gained traction with its online audience as a browser-based game and reached its first funding goal in early August 2014. After quickly outgrowing the capabilities of the browser and the scope of the original game, it was decided that Oort Online would appeal to a wider audience under the Steam Greenlight system and was successfully greenlit in September 2014. Oort Online underwent a name change in October 2015 to the current title Boundless. Also in October 2015, it was announced that Boundless had been backed
https://en.wikipedia.org/wiki/Cheong%20%28food%29
Cheong () is a name for various sweetened foods in the form of syrups, marmalades, and fruit preserves. In Korean cuisine, cheong is used as a tea base, as a honey-or-sugar-substitute in cooking, as a condiment, and also as an alternative medicine to treat the common cold and other minor illnesses. Originally, the word cheong () was used to refer to honey in Korean royal court cuisine. The name jocheong (; "crafted honey") was given to mullyeot (liquid-form yeot) and other human-made honey-substitutes. Outside the royal court, honey has been called kkul (), which is the native (non-Sino-Korean) word. Varieties Jocheong (; "crafted honey") or mullyeot (; liquid yeot): rice syrup or more recently also corn syrup Maesil-cheong or Maesilaek (; "plum syrup") Mogwa-cheong (; quince preserve) Mucheong (; radish syrup) Mu-kkul-cheong (; radish and honey syrup) Yuja-cheong (; yuzu marmalade) Saenggang-cheong (; ginger marmalade) Gochu-cheong (; Korean green chili marmalade) Maneul-cheong (; garlic pickle) Yangpa-cheong (; onion marmalade) Odi-cheong (; mulberry marmalade) Omija-cheong (; magnolia berry marmalade) Painaepeul-cheong (; pineapple marmalade) Bae-cheong (; Korean pear marmalade) Bae-doraji-cheong (; Korean pear and bellflower root marmalade) Maesil-cheong Maesil-cheong (, ), also called "plum syrup", is an anti-microbial syrup made by sugaring ripe plums (Prunus mume). In Korean cuisine, maesil-cheong is used as a condiment and sugar substitute. The infusion made by mixing water with maesil-cheong is called maesil-cha (plum tea). It can be made by simply mixing plums and sugar together, and then leaving them for about 100 days. To make syrup, the ratio of sugar to plum should be at least 1:1 to prevent fermentation, by which the liquid may turn into maesil-ju (plum wine). The plums can be removed after 100 days, and the syrup can be consumed right away, or mature for a year or more. Mogwa-cheong Mogwa-cheong ( ), also called "preserved quin
https://en.wikipedia.org/wiki/Association%20Fran%C3%A7aise%20de%20M%C3%A9canique
The Association française de mécanique (AFM), French Association of Mechanics, was created in 1997 by the union of 17 scientific and engineers societies covering the disciplines of mechanics. It was promoted by the High Mechanical Committee (HCM), with the decisive support of the Federation of Mechanical Industries (FIM), the Technical Center of Mechanical Industries (CETIM) and the University Association in Mechanics (AUM) for the academic part. It is a forum for information, exchange and reflection for the mechanical community: business leaders, engineers, technicians, researchers, professors, mechanical experts. Its main objective is to promote activities and achievements in the main fields of mechanics. The AFM's operating mode, through its 19 scientific and technical groups (GST) and Commissions, its transversal thematic groups (GTT), the organization of conferences, congress, publication of newsletters and an indexed international journal Mechanics & Industry, aims at the transfer of knowledge and more particularly promotes the "transfer of technologies" from research to industry. It is also meant to represent French mechanics in front of its foreign counterparts. AFM is the referring partner of the French Ministry of Higher Education and Research for all research activities in Mechanics and in close collaboration with the French National Committee of Mechanics (CNFM) which is the link for France with IUTAM (International Union of theoretical and Applied Mechanics). The AFM organizes every two years a national conference entitled French Congress of Mechanics gathering more than 1000 participants. It is at the initiative of a " Livre blanc de la Mécanique ", which identifies the scientific and technological locks remaining to be lifted in the field. The presidents of Association Française de Mécanique Since 1997, eight presidents have successively headed the association. The current president is Eric Arquis, elected in March 2016. External links Site web
https://en.wikipedia.org/wiki/Dissolving%20views
Dissolving views were a popular type of 19th century magic lantern show exhibiting the gradual transition from one projected image to another. The effect is similar to a dissolve in modern filmmaking. Typical examples had landscapes that dissolved from day to night or from summer to winter. The effect was achieved by aligning the projection of two matching images and slowly diminishing the first image while introducing the second image. The subject and the effect of magic lantern dissolving views is similar to the popular Diorama theatre paintings which originated in Paris in 1822. The terms "dissolving views", "dioramic views", or simply "diorama" were often used interchangeably in 19th century magic lantern playbills. While most dissolving views showed landscapes or architecture in different light, the effect was also used in other ways. For instance, Henry Langdon Childe showed groves changing into cathedrals. Another popular example has a soldier sleeping or daydreaming on the battlefield, with dissolving views displaying several of his dreams about home above his head. Invention The dissolve effect was reportedly invented by phantasmagoria pioneer Paul de Philipsthal while in Ireland in 1804. He thought of using two lanterns to make the spirit of Samuel appear out of a mist in his representation of the Witch of Endor. While working out the desired effect, he got the idea of using the technique with landscapes. Information about De Philipsthal's activities after 1804 is limited, so it remains unclear whether he did incorporate the effect in his shows before other lanternists developed their own versions. Surviving playbills of his shows seem to focus on the exhibition of automata, besides "experiments in optics, aeronautics, hydraulics and pyrotechnics". Some bills do not even mention any optical effects. However, an 1812 newspaper about a London performance indicates that De Philipsthal presented "a series of landscapes (in imitation of moonlight), which inse
https://en.wikipedia.org/wiki/Microbes%20and%20Man
Microbes and Man is a popularising book by the English microbiologist John Postgate FRS on the role of microorganisms in human society, first published in 1969, and still in print in 2017. Critics called it a "classic" and "a pleasure to read". Book Contents The book is structured as follows: 1 Man and microbes 2 Microbiology 3 Microbes in society 4 Interlude: how to handle microbes 5 Microbes in nutrition 6 Microbes in production 7 Deterioration, decay and pollution 8 Disposal and cleaning-up 9 Second interlude: microbiologists and man 10 Microbes in evolution 11 Microbes in the future Illustrations The 4th edition has 32 illustrations, ranging from photographs of microscopic algae, protozoa, fungi, viruses and bacteria, to the macroscopic effects of microbes such as a sulphur-forming lake in Libya and fish killed by bacterial reduction of sulphate in water. Editions 1st edition, Cambridge University Press, 1969 2nd edition, Cambridge University Press, 1986 3rd edition, Cambridge University Press, 1992 4th edition, Cambridge University Press, 2000 The book has been translated into nine languages: Arabic, Chinese, Czech, French, German, Japanese, Polish, Portuguese, and Spanish. Reception The Guardian described the book as "a passionate case for the importance of micro-organisms". In his textbook Essential Microbiology, Stuart Hogg recommends the book to readers who want a general overview of microbes and their uses, stating "there can be no better starting point than John Postgate's classic". New Scientist described the book as "a pleasure to read from first page to last. It is a literal statement. Start to read it and the first page, describing the astonishing dispersion of microbes, from the upper atmosphere to the depths of the sea, will provide any reader with enough wonder and excitement to take them through to the last page and the surface of Venus." The magazine commented that Postgate's "admirable, elegantly written and painlessl
https://en.wikipedia.org/wiki/Tonio%20%28app%29
Tonio is an audio decoding app for mobile devices that allows you to send information inaudibly via radio or TV signals to smartphones. The app was developed by the Austrian company information.io GmbH and initially released in October 2014. Tonio has been awarded with the Austrian Radio Award and with the Austrian Media Future Award. The name Tonio is a neology from “Tone with Information”. Usage Information which the app receives inaudibly via audio signals may include URLs, background information, tickets, coupons and music downloads. The developers have mentioned subtitles for operas as another possible use case. The Austrian marketer of advertisements in movie theaters, Cinecom, is offering the option to add background information to their commercials via the Tonio technology to its customers. The four largest chains of movie theaters in Austria removed their ban on cellphones in response to the new technology. Radio Eins, a public radio station in Berlin, sent URL links inaudibly via Tonio that were mentioned on air. The Austrian public broadcaster ORF is working on a cooperation with Tonio for various programs according to the Austrian business magazine trend as well as the station LoungeFM that intends to complement its radio news with links to the largest Austrian news website DerStandard.at. Tonio has been used for a campaign in movie theaters in April and May 2016, where visitors received trivia questions to the movie shown. Technology Tonio decodes audio information that has been enriched with an inaudible code transmitted from a radio or TV station and translates the code into an URL for example. Therefore, a certain modification of the audio information by the broadcaster is required. In contrast, an acoustic fingerprint is a digital code to characterize sounds and audio recordings with specific acoustic characteristics (e.g. the app Shazam). Those fingerprints must be stored in databases to identify unknown sounds and acoustic signals (e.g. voice
https://en.wikipedia.org/wiki/External%20Development%20Summit
The External Development Summit (XDS) is a three-day event for the video game industry with its first edition held in 2013, and hosted annually in Vancouver, BC, Canada. The summit was established in order to share video game development best practices in the areas of 2D and 3D graphics, Animation, Software Engineering, Audio, Quality Assurance and Localization. Members of the XDS Advisory Committee are responsible for the design and delivery of the event. The event receives hundreds of attendees annually, representing 45 countries in addition to local Vancouver companies. Notable companies that have attended XDS include Microsoft Studios, Sony Interactive Entertainment, Electronic Arts, Activision, Ubisoft and Riot Games. XDS receives international delegations from countries such as Brazil, Costa Rica and the Philippines. The event traditionally consists of presentations, panel discussions, meeting system, business meetings, an expo and social events. XDS hosted its 10th annual event in 2022, hosting 700+ international attendees. XDS 2022 featured a propriety event platform, XDS Connect, which facilitated B2B meetings and a calendar function that helped attendees manage their week. Notable Components Presentations and Panels Presentations and panel discussions make up the educational component of the event. There is a formal submission process for all topics and speakers. The XDS Advisory Committee reviews all submissions and selects finalists for the event program. Past notable speakers have included Peter Moore and Andrea Reimer. Expo Service providers may participate in an expo to create awareness for their offerings. Expo booths are centrally located at the event, and are designed to express the creativity of each exhibiting company. Charitable Donations XDS provides an annual charitable donation to an organization that aligns with the goals and values of the event. 2016: XDS partnered with Simon Fraser University to provide a scholarship award to
https://en.wikipedia.org/wiki/Bang%27s%20theorem%20on%20tetrahedra
In geometry, Bang's theorem on tetrahedra states that, if a sphere is inscribed within a tetrahedron, and segments are drawn from the points of tangency to each vertex on the same face of the tetrahedron, then all four points of tangency have the same triple of angles. In particular, it follows that the 12 triangles into which the segments subdivide the faces of the tetrahedron form congruent pairs across each edge of the tetrahedron. It is named after A. S. Bang, who posed it as a problem in 1897. References Theorems in geometry Euclidean solid geometry
https://en.wikipedia.org/wiki/Precision%20Time%20Protocol%20Industry%20Profile
Industrial automation systems consisting of several distributed controllers need a precise synchronization for commands, events and process data. For instance, motors for newspaper printing are synchronized within some 5 microseconds to ensure that the color pixels in the different cylinders come within 0.1 mm at a paper speed of some 20 m/s. Similar requirements exist in high-power semiconductors (e.g. for converting between AC and DC grids) and in drive-by-wire vehicles (e.g. cars with no mechanical steering wheel). This synchronisation is provided by the communication network, in most cases Industrial Ethernet. Many ad-hoc synchronization schemes exist, so IEEE published a standard Precision Time Protocol IEEE 1588 or "PTP", which allows sub-microsecond synchronization of clocks. PTP is formulated generally, so concrete applications need a stricter profile. In particular, PTP does not specify how the clocks should operate when the network is duplicated for better resilience to failures. The PTP Industrial Profile (PIP) is a standard of the IEC 62439-3 that specifies in its Annex C two Precision Time Protocol IEEE 1588 / IEC 61588 profiles, L3E2E and L2P2P, to synchronize network clocks with an accuracy of 1 μs and provide fault-tolerance against clock failures. The IEC 62439-3 PTP profiles are applicable to most Industrial Ethernet networks, for synchronized drives, robotics, vehicular technology and other applications that require precise time distribution, not necessarily using redundant networks. The IEC 62439-3 profile L2P2P has been adopted as IEC/IEEE 61850-9-3 by the power utility industry to support precise time stamping of voltage and current measurement for differential protection, wide area monitoring and protection, busbar protection and event recording. The IEC 62439-3 PTP profiles can be used to ensure deterministic operation of critical functions in the automation system itself, for instance precise starting of tasks, resource reservatio
https://en.wikipedia.org/wiki/Polish%20Soil%20Classification
The Polish Soil Classification () is a soil classification system used to describe, classify and organize the knowledge about soils in Poland. Overview Presented below the 5th edition of Polish Soil Classification was published by Soil Science Society of Poland in 2011 and was in use to 2019 when 6th edition of Polish Soil Classification was published. Previous ones were published in 1956, 1959, 1974 and 1989, and they, following Dokuchaiev's ideas, were relied mostly on the natural's criteria (quality) like soil forming processes and soil morphological features (4th edition was transient because diagnostic soil horizons appeared there). 5th edition of classification, where it was possible, was built on quantitative criteria, like quantitative described diagnostic horizons, diagnostic materials and diagnostic properties. Soil forming processes are not a part of classification but the relationship between the processes and their morphological effects was taken into account during creating differentiating criteria of diagnostic horizons, materials and properties. The classification derives much of international systems: USDA soil taxonomy (1999) and World Reference Base for Soil Resources - WRB (2006). Polish soil science intellectual tradition has always maintained a balance between genetical-geographic approach (typical for the Russian scientific school) and substantional-geological-petrographic approach (characteristic for Western Europe). Multilateral look at the soil manifested, in all editions of classification, that each soil was described by three types of characteristics: Genetical genesis described by type of soil – based on diagnostic horizons, materials and properties, Geological origin of bedrock described by what might be literally translated as "kind" or "sort" of soil, Soil texture described of what might be literally translated as "class" or "species" of soil. The Polish Soil Classification has a hierarchical construction. Type of soil is
https://en.wikipedia.org/wiki/Live%20single-cell%20imaging
In systems biology, live single-cell imaging is a live-cell imaging technique that combines traditional live-cell imaging and time-lapse microscopy techniques with automated cell tracking and feature extraction, drawing many techniques from high-content screening. It is used to study signalling dynamics and behaviour in populations of individual living cells. Live single-cell studies can reveal key behaviours that would otherwise be masked in population averaging experiments such as western blots. In a live single-cell imaging experiment a fluorescent reporter is introduced into a cell line to measure the levels, localisation or activity of a signalling molecule. Subsequently, a population of cells is imaged over time with careful atmospheric control to maintain viability, and reduce stress upon the cells. Automated cell tracking is then performed upon these time series images, following which filtering and quality control may be performed. Analysis of features describing the fluorescent reporter over time, can then lead to modelling and generation of biological conclusions from which further experimentation can be guided. History The field of live single-cell imaging began with work demonstrating that green fluorescent protein (GFP), found in the jellyfish Aequorea victoria, could be expressed in living organisms. This discovery allowed researches to study the localisation and levels of proteins in living single cells, for example the activity of kinases, and calcium levels, through the use of FRET reporters, as well as numerous other phenotypes. Generally, these early studies focused on the localisation and behaviour of these fluorescently labelled proteins at the subcellular level over short periods of time. However, this changed with pioneering studies looking at the tumour suppressor p53 and the stress and inflammation related protein NF-κB, revealing there levels and localisation respectively to oscillate over periods of several hours. Live single-cell appr
https://en.wikipedia.org/wiki/Crumpling
In geometry and topology, crumpling is the process whereby a sheet of paper or other two-dimensional manifold undergoes disordered deformation to yield a three-dimensional structure comprising a random network of ridges and facets with variable density. The geometry of crumpled structures is the subject of some interest to the mathematical community within the discipline of topology. Crumpled paper balls have been studied and found to exhibit surprisingly complex structures with compressive strength resulting from frictional interactions at locally flat facets between folds. The unusually high compressive strength of crumpled structures relative to their density is of interest in the disciplines of materials science and mechanical engineering. Significance The packing of a sheet by crumpling is a complex phenomenon that depends on material parameters and the packing protocol. Thus the crumpling behaviour of foil, paper and poly-membranes differs significantly and can be interpreted on the basis of material foldability. The high compressive strength exhibited by dense crumple formed cellulose paper is of interest towards impact dissipation applications and has been proposed as an approach to utilising waste paper. From a practical standpoint, crumpled balls of paper are commonly used as toys for domestic cats. References Topology Manifolds Deformation (mechanics) Structural analysis Materials science Mechanical engineering
https://en.wikipedia.org/wiki/WebGPU
WebGPU is the working name for a potential web standard and JavaScript API for accelerated graphics and compute, aiming to provide "modern 3D graphics and computation capabilities". It is developed by the W3C GPU for the Web Community Group with engineers from Apple, Mozilla, Microsoft, Google, and others. Unlike WebGL, WebGPU is not a direct port of any existing native API. It is based on APIs provided by Vulkan, Metal, and Direct3D 12 and is intended to provide high performance across mobile and desktop platforms. Mobile platforms will be limited in creation of objects that will require modern graphics APIs (mentioned above). The first conceptual prototype called NXT was showcased in early 2017 by the Chromium team. The Google Chrome Development Team has named it as a "successor" to the WebGL/2 JavaScript APIs. On April 6, 2023, Google announced that the Chromium and Google Chrome browsers will ship with WebGPU support enabled on ChromeOS devices with Vulkan support, macOS, and Windows devices with Direct3D 12 starting with Chromium/Chrome 113. WebGPU support for other platforms including Linux and Android will be added at a later date. History On June 8, 2016, Google showed "Explicit web graphics API" presentation to the WebGL working group (during the bi-annual face to face meeting). The presentation explored the basic ideas and principles of building a new API to eventually replace WebGL, aka "WebGL Next". On January 24, 2017, Khronos hosted an IP-free meeting dedicated to discussion of "WebGL Next" ideas, collided with WebGL working group meeting in Vancouver. Google team presented the NXT prototype implementing a new API that could run in Chromium with OpenGL, or standalone with OpenGL and Metal. NXT borrowed concepts from all of Vulkan, Direct3D 12, and Metal native APIs. Apple and Mozilla representatives also showed their prototypes built on Safari and Servo correspondingly, both of which closely replicated the Metal API. W3C Working Group On Febru
https://en.wikipedia.org/wiki/Yubo
Yubo (formerly known as Yellow) is a French social networking app developed by TWELVE APP in 2015. It is designed to "meet new people" and "create a sense of community". The app had 60 million users as of 2022. History Yubo was created by Sacha Lazimi, Jérémie Aouate, and Arthur Patora when they were engineering students at CentraleSupélec Graduate school of the Paris-Saclay University and Télécom Paris. Formerly known as Yellow, it was first launched in 2015. According to the founders, the app seeks to create a space for "socializing online" and to "facilitate communication between people all over the world who share mutual interests." In December 2019, the app raised $12.3 million (€11.2 million) in a funding round led by French private equity firms like Iris Capital, Idinvest Partners, Alven, Sweet Capital and Village Global. The funds will be used to develop its technology and expand its global user base. Between 2015 and December 2019, app users have created an estimated 2 billion friendships, along with exchanging more than 10 billion messages and launching 30 million livestreams. In 2019, the startup has generated $10 million in revenue. In 2020, in the context of the COVID-19 pandemic, Yubo recorded a significant rise in use due to quarantined teenagers, with a 550% increase in time spent in video discussion groups. During this period, Yubo doubled the number of new daily signups, which reached 30,000 per day in mid-April. As of October 2020, the app had 40 million users worldwide, 60% of whom are Americans and Canadians. In September 2020, Yubo established its U.S. headquarters in Jacksonville, Florida. At the same time, Yubo opened a new office in London. In November 2020, Yubo carries out a new fundraising, raising $47.5 million (€40 million) from its historical investors and a new entrant, Gaia Capital Partner. The announced objective is in particular to strengthen moderation and develop the Asian market. In addition, Jerry Murdock, co-founder of I
https://en.wikipedia.org/wiki/RoundMe
RoundMe is a virtual tour application which allows users to create, upload and share 360 degree panoramic photos and multimedia content of real spaces, that users could visit virtually using Google Cardboard or any VR headsets. The app is available on the web, iOS and Android. Roundme was positioned as one of the Best New Apps in the iTunes App Store in 58 countries in 2015. Roundme raised a $3 million round led by April Capital in 2015, reportedly by TechCrunch. The company is also hosting spaces for brands including National Library of Belarus and American Airlines. History RoundMe was founded in June 2012 by Konstantin Andreev. It was officially released on June 17, 2014. It is headquartered in Los Angeles, California. Talking to TechCrunch, Konstantin Andreev, CEO said that his goal was to create the best virtual tour experience in the panoramic photography marketplace. See also Giphy Instagram Flickr Vine Bazaart References External links IOS software Android (operating system) software Companies based in Los Angeles Internet properties established in 2014 Photo software Mobile software 2014 software 2015 software Social networking services
https://en.wikipedia.org/wiki/Marchetti%20dilatometer%20test
Marchetti dilatometer test or flat dilatometer, is a type of dilatometer commonly designated by DMT. It was created by Silvano Marchetti (1980) and is one of the most versatile tools for soil characterization, namely loose to medium compacted granular soils and soft to medium clays, or even stiffer if a good reaction system is provided. The main reasons for its usefulness deriving geotechnical parameters are related to the simplicity and the speed of execution, generating continuous data profiles of high accuracy and reproducibility. References Measuring instruments Soil mechanics
https://en.wikipedia.org/wiki/Cisco%20DevNet
Cisco DevNet is Cisco's developer program to help developers and IT professionals who want to write applications and develop integrations with Cisco products, platforms, and APIs. Cisco DevNet includes Cisco's products in software-defined networking, security, cloud, data center, internet of things, collaboration, and open-source software development. The developer.cisco.com site also provides learning and sandbox environments as well as a video series for those trying to learn coding and testing apps. History Cisco has a long history of building a developer community. Cisco began its developer initiatives in 2000 with the Architecture for Voice, Video and Integrated Devices (AVVID). At this time, most developers were focused on creating customizations for the Cisco VoIP phone systems. At some point, the developer focus of the AVVID program grew, and Cisco launched the Cisco Technology Developer Program (CTDP). This evolved into the Cisco Developer Community (CDC) and Cisco Developer Network (CDN) in 2009. This growth extended the number of APIs used to build solutions on Cisco platforms, and included API guides, forums, downloads, and the early version of the sandbox system. As Cisco's need to support developers grew, DevNet was launched in 2014 under leadership of Susie Wee. The new Cisco developer network contains APIs from many of Cisco's technologies, including networking, IoT, collaboration, open source, data center, and others. It also contains learning labs, a sandbox, and a community where developers can share their creations. DevNet also attends and hosts many developer events, such as hackathons and coding camps DevNet holds developer events around the world, including the DevNet Zone at Cisco Live. DevNet held its first DevNet Create developer conference aimed at an application developer and DevOps audience in San Francisco in May 2017. Guy Kawasaki spoke about "The Art of Innovation" during DevNet Create 2018. DevNet Create 2019 returns to the
https://en.wikipedia.org/wiki/List%20of%20amateur%20radio%20software
This is a list of software for amateur radio. Software tools Logging Software Operating systems The Debian project maintains a pure blend that includes ham radio software. The HamBSD project is a variation of OpenBSD. See also Amateur radio station § Computer-control software List of amateur radio modes Software-defined radio References External links DXZone Amateur Radio Software - An exhaustive directory of amateur radio software Software Software Lists of software
https://en.wikipedia.org/wiki/Maximal%20entropy%20random%20walk
Maximal entropy random walk (MERW) is a popular type of biased random walk on a graph, in which transition probabilities are chosen accordingly to the principle of maximum entropy, which says that the probability distribution which best represents the current state of knowledge is the one with largest entropy. While standard random walk chooses for every vertex uniform probability distribution among its outgoing edges, locally maximizing entropy rate, MERW maximizes it globally (average entropy production) by assuming uniform probability distribution among all paths in a given graph. MERW is used in various fields of science. A direct application is choosing probabilities to maximize transmission rate through a constrained channel, analogously to Fibonacci coding. Its properties also made it useful for example in analysis of complex networks, like link prediction, community detection, robust transport over networks and centrality measures. Also in image analysis, for example for detecting visual saliency regions, object localization, tampering detection or tractography problem. Additionally, it recreates some properties of quantum mechanics, suggesting a way to repair the discrepancy between diffusion models and quantum predictions, like Anderson localization. Basic model Consider a graph with vertices, defined by an adjacency matrix : if there is an edge from vertex to , 0 otherwise. For simplicity assume it is an undirected graph, which corresponds to a symmetric ; however, MERW can also be generalized for directed and weighted graphs (for example Boltzmann distribution among paths instead of uniform). We would like to choose a random walk as a Markov process on this graph: for every vertex and its outgoing edge to , choose probability of the walker randomly using this edge after visiting . Formally, find a stochastic matrix (containing the transition probabilities of a Markov chain) such that for all and for all . Assuming this graph is connected
https://en.wikipedia.org/wiki/OpenKeychain
OpenKeychain is a free and open-source mobile app for the Android operating system that provides strong, user-based encryption which is compatible with the OpenPGP standard. This allows users to encrypt, decrypt, sign, and verify signatures for text, emails, and files. The app allows the user to store the public keys of other users with whom they interact, and to encrypt files such that only a specified user can decrypt them. In the same manner, if a file is received from another user and its public keys are saved, the receiver can verify the authenticity of that file and decrypt it if necessary. As of August 2021, it is no longer actively developed. K-9 Mail Support Together with K-9 Mail, it supports end-to-end encrypted emails via the OpenPGP INLINE and PGP/MIME formats. The developers of OpenKeychain and K-9 Mail are trying to change the way user interfaces for email encryption are designed. They propose to remove the ability to create encrypted-only emails and hide the case of signed-only emails. Instead, they focus on end-to-end security that provides confidentiality and authenticity by always encrypting and signing emails together. Reception OpenKeychain is listed on the official OpenPGP homepage and the well-known developer collective Guardian Project recommends it instead of APG to encrypt emails. TechRepublic published an article about it and conclude that "OpenKeychain happens to be one of the easiest encryption tools available for Android (that also happens to best follow OpenPGP standards)." The publisher Heise reviewed it in their c't Android magazine 2016 and discussed OpenKeychain's backup mechanism. The academic community uses OpenKeychain for experimental evaluations: It has been used as an example where cryptographic operations could be executed in a Trusted Execution Environment. Furthermore, modern alternatives for public key fingerprints have been implemented by other researchers. In 2016, the German Federal Office for Information Security
https://en.wikipedia.org/wiki/List%20of%20scattering%20experiments
This is a list of scattering experiments. Specific experiments of historical significance Davisson–Germer experiment Gold foil experiments, performed by Geiger and Marsden for Rutherford which discovered the atomic nucleus Elucidation of the structure of DNA by X-ray crystallography Discovery of the antiproton at the Bevatron Discovery of W and Z bosons at CERN Discovery of the Higgs boson at the Large Hadron Collider MINERνA Types of experiment Optical methods Compton scattering Raman scattering X-ray crystallography Biological small-angle scattering with X-rays, or Small-angle X-ray scattering Static light scattering Dynamic light scattering Polymer scattering with X-rays Neutron-based methods Neutron scattering Biological small-angle scattering with neutrons, or Small-angle neutron scattering Polymer scattering with neutrons Particle accelerators Electrostatic nuclear accelerator Linear induction accelerator Betatron Linear particle accelerator Cyclotron Synchrotron Physics-related lists Physics experiments Chemistry-related lists Biology-related lists
https://en.wikipedia.org/wiki/NeXT%20character%20set
The NeXT character set (often aliased as NeXTSTEP encoding vector, WE8NEXTSTEP or next-multinational) was used by the NeXTSTEP and OPENSTEP operating systems on NeXT workstations beginning in 1988. It is based on Adobe Systems' PostScript (PS) character set aka Adobe Standard Encoding where unused code points were filled up with characters from ISO 8859-1 (Latin 1), although at differing code points. Character set The following table shows the NeXT character set. Each character is shown with a potential Unicode equivalent. Codepoints 00hex (0) to 7Fhex (127) are nearly identical to ASCII. See also Display PostScript (DPS) References NeXT Character sets
https://en.wikipedia.org/wiki/Magic%20polygon
A magic polygon is a polygonal magic graph with integers on its vertices. Perimeter magic polygon A magic polygon, also called a perimeter magic polygon, is a polygon with an integers on its sides that all add up to a magic constant. It is where positive integers (from 1 to N) on a k-sided polygon add up to a constant. Magic polygons are a generalization of other magic shapes such as magic triangles. Magic polygon with a center point Victoria Jakicic and Rachelle Bouchat defined magic polygons as n-sided regular polygons with 2n+1 nodes such that the sum of the three nodes are equal. In their definition, a 3 × 3 magic square can be viewed as a magic 4-gon. There are no magic odd-gons with this definition. Magic polygons and degenerated magic polygons Danniel Dias Augusto and Josimar da Silva defined the magic polygon P(n,k) as a set of vertices of concentric n-gon and a center point. In this definition, magic polygons of Victoria Jakicic and Rachelle Bouchat can be viewed as P(n,2) magic polygons. They also defined degenerated magic polygons. See also Magic square References External links https://udayton.edu/artssciences/academics/mathematics/images_and_files/umd_proceedings_files/2018/Jakicic-journal.pdf Magic shapes
https://en.wikipedia.org/wiki/PostScript%20Standard%20Encoding
The PostScript Standard Encoding (often spelled StandardEncoding, aliased as PostScript) is one of the character sets (or encoding vectors) used by Adobe Systems' PostScript (PS) since 1984 (1982). In 1995, IBM assigned code page 1276 (CCSID 1276) to this character set. NeXT based the character set for its NeXTSTEP and OPENSTEP operating systems on this one. Character set The following table shows the PostScript Standard Encoding. Each character is shown with a potential Unicode equivalent. Codepoints 00hex (0) to 7Fhex (127) are nearly identical to ASCII. (The characters at positions 27hex and 60hex reflect an earlier interpretation of the visual appearance of those ASCII characters than the interpretation that was formalized in Unicode; see .) The upper half of the table contains punctuation and typographic characters, currency symbols, ligatured letters, a selection of modified base letters used in European languages, and a selection of diacritic marks to be used in composing accented letters. See also Display PostScript (DPS) NeXT character set PostScript fonts References Character sets
https://en.wikipedia.org/wiki/The%20Second%20Forty%20Years
The Second Forty Years is a 1946 nonfiction self-help book about aging, by Edward Stieglitz. Stieglitz graduated from Rush Medical College in 1921 and was on the faculty of the University of Chicago from 1923 to 1938. In 1940 a grant was given to support a gerontologist at the United States Public Health Service, and Stieglitz was given the post. His research was also supported by the National Institute of Health. Stieglitz left the post after a year, for personal reasons. The Second Forty Years provides Stieglitz's professional advice for the layman. It describes what can be expected during the aging process and what can be done about it, discussing chronic progressive disorders which require preventative care, sex, the importance of leisure and rest, and so forth. According to Stieglitz, mere longevity is not goal enough, but rather constructive health practices should be undertaken to enhance the quality of life. Regarding menopause, Stieglitz characterized it as a "truly normal phase of living" and decried the "distorted descriptions" of old wives' tales. Newspaper advertisements for The Second Forty Years are probably the source for the popular quotation "It's not the years in your life that count, it's the life in your years", which is commonly misattributed to Abraham Lincoln. References Further reading 1946 non-fiction books Self-help books Gerontology
https://en.wikipedia.org/wiki/Mac%20OS%20Gaelic
Mac OS Gaelic is a character encoding created for the Irish Gaelic language, based on the Welsh Mac OS Celtic encoding but replacing 23 characters with Gaelic characters. It was developed by Michael Everson, and was in his CeltScript fonts and on some fonts included with the Irish localization of Mac OS 6.0.8 and 7.1 and on. Like ISO 8859-14, this codepage represents the Irish Gaelic and Welsh languages. Layout Before Mac OS 8.5, 0x26 mapped to both & (ampersand) and ⁊ (Tironian et, Unicode character U+20A4), which were unified. Before Mac OS 8.5, the character 0xDB mapped to currency sign (¤), Unicode character U+00A4. Before Mac OS 8.5, the character 0xE4 mapped to ‰, Unicode character U+2030. Before Unicode 4.1, the character 0xF0 mapped to ♣ Unicode character U+2663. References Character sets Gaelic Articles with unsupported PUA characters Gaelic
https://en.wikipedia.org/wiki/SMPTE%202059
SMPTE 2059 is a standard from the Society of Motion Picture and Television Engineers (SMPTE) that describes how to synchronize video equipment over an IP network. The standard is based on IEEE 1588-2008. SMPTE 2059 is published in two parts on 9 April 2015: SMPTE 2059-1Defines signal generation based on time information delivered by the IEEE 1588 protocol. SMPTE 2059-2Defines an operating profile for the IEEE protocol optimized to the needs of media synchronization. SMPTE 2059 is an integral part of emerging professional IP video broadcast technology and standards. In May 2016, the Audio Engineering Society published a report describing synchronization interoperability between AES67 and SMPTE 2059-2. Operating parameters References SMPTE standards
https://en.wikipedia.org/wiki/Code%20page%201101
Code page 1101 (CCSID 1101), also known as CP1101, is an IBM code page number assigned to the UK variant of DEC's National Replacement Character Set (NRCS). The 7-bit character set was introduced for DEC's computer terminal systems, starting with the VT200 series in 1983, but is also used by IBM for their DEC emulation. Similar but not identical to the series of ISO 646 character sets, the character set is a close derivation from ASCII with only code point 0x23 differing. Code page layout See also National Replacement Character Set (NRCS) Code page 1013 (similar ISO 646-GB / IR-4 code page) References 1101
https://en.wikipedia.org/wiki/Code%20page%201107
Code page 1107 (CCSID 1107), also known as CP1107, is an IBM code page number assigned to the alternate Denmark/Norway variant of DEC's National Replacement Character Set (NRCS). The 7-bit character set was introduced for DEC's computer terminal systems, starting with the VT200 series in 1983, but is also used by IBM for their DEC emulation. Similar but not identical to the series of ISO 646 character sets, the character set is a close derivation from ASCII with only six code points differing. Code page layout See also Code page 1105 (default Denmark/Norway NRCS) Code page 1016 (similar ISO-646-NO code page) Code page 1017 (similar ISO-646-DK code page) National Replacement Character Set (NRCS) References 1107
https://en.wikipedia.org/wiki/Code%20page%201105
Code page 1105 (CCSID 1105), also known as CP1105, is an IBM code page number assigned to the Denmark/Norway variant of DEC's National Replacement Character Set (NRCS). The 7-bit character set was introduced for DEC's computer terminal systems, starting with the VT200 series in 1983, but is also used by IBM for their DEC emulation. Similar but not identical to the series of ISO 646 character sets, the character set is a close derivation from ASCII with only ten code points differing. Code page layout See also Code page 1107 (alternate Denmark/Norway NRCS) Code page 1017 (similar ISO-646-DK code page) National Replacement Character Set (NRCS) References 1105
https://en.wikipedia.org/wiki/Code%20page%201103
Code page 1103 (CCSID 1103), also known as CP1103, or SF7DEC, is an IBM code page number assigned to the Finnish variant of DEC's National Replacement Character Set (NRCS). The 7-bit character set was introduced for DEC's computer terminal systems, starting with the VT200 series in 1983, but is also used by IBM for their DEC emulation. Similar but not identical to the series of ISO 646 character sets, the character set is a close derivation from ASCII with only nine code points differing. Code page layout See also Code page 1106 (very similar Swedish code page differing only in one code point) Code page 1018 (similar ISO-646-FI / ISO-646-SE / IR-10 code page) National Replacement Character Set (NRCS) References 1103 Finnish language
https://en.wikipedia.org/wiki/Code%20page%201106
Code page 1106 (CCSID 1106), also known as CP1106 or S7DEC, is an IBM code page number assigned to the Swedish variant of DEC's National Replacement Character Set (NRCS). The 7-bit character set was introduced for DEC's computer terminal systems, starting with the VT200 series in 1983, but is also used by IBM for their DEC emulation. Similar but not identical to the series of ISO 646 character sets, the character set is a close derivation from ASCII with only ten code points differing. Code page layout See also Code page 1103 (very similar Finnish code page differing only in one code point) Code page 1018 (similar ISO-646-FI / ISO-646-SE / IR-10 code page) National Replacement Character Set (NRCS) References 1106
https://en.wikipedia.org/wiki/Code%20page%201104
Code page 1104 (CCSID 1104), also known as CP1104, F7DEC, ISO-IR-025 or NF Z 62-010 (1973) is an IBM code page number assigned to the French variant of DEC's National Replacement Character Set (NRCS). The 7-bit character set was introduced for DEC's computer terminal systems, starting with the VT200 series in 1983, but it is also used by IBM for their DEC emulation. ISO-IR-025 was previously also the French variant of ISO 646 (NF Z 62-010), it was superseded by Code page 1010 (NF Z 62-010:1982, ISO-IR-069) in that respect, from which it differs in only one point. It is also a close derivation from ASCII, with only nine code points differing. Code page layout See also Code page 1010 (similar ISO 646-FR code page) Code page 1020 (French-Canadian NRCS) National Replacement Character Set (NRCS) References 1104
https://en.wikipedia.org/wiki/Code%20page%201020
Code page 1020 (CCSID 1020), also known as CP1020, is an IBM code page number assigned to the French-Canadian variant of DEC's National Replacement Character Set (NRCS). The 7-bit character set was introduced for DEC's computer terminal systems, starting with the VT200 series in 1983, but is also used by IBM for their DEC emulation. Similar but not identical to the series of ISO 646 character sets, the character set is a close derivation from ASCII with only ten code points differing. Code page layout See also Code page 1104 (French NRCS) National Replacement Character Set (NRCS) References 1020
https://en.wikipedia.org/wiki/Code%20page%201021
Code page 1021 (CCSID 1021), also known as CP1021 or CH7DEC, is an IBM code page number assigned to the Swiss variant of DEC's National Replacement Character Set (NRCS). The 7-bit character set was introduced for DEC's computer terminal systems, starting with the VT200 series in 1983, but is also used by IBM for their DEC emulation. Similar but not identical to the series of ISO 646 character sets, the character set is a close derivation from ASCII with only twelve code points differing. Code page layout See also National Replacement Character Set (NRCS) References 1021
https://en.wikipedia.org/wiki/Code%20page%201102
Code page 1102 (CCSID 1102), also known as CP1102 or NL7DEC, is an IBM code page number assigned to the Dutch variant of DEC's National Replacement Character Set (NRCS). The 7-bit character set was introduced for DEC's computer terminal systems, starting with the VT200 series in 1983, but is also used by IBM for their DEC emulation. It is called DUTCH by Kermit. Although NL7DEC complies with the ISO 646 invariant layout (and is hence a close derivation from ASCII, with only nine code points differing), it is not ISO646-NL, which is otherwise unrelated (Code page 1019). Code page layout See also National Replacement Character Set (NRCS) Code page 1019 References 1102 Dutch language
https://en.wikipedia.org/wiki/Code%20page%201023
Code page 1023 (CCSID 1023), also known as CP1023 or E7DEC, is an IBM code page number assigned to the Spanish variant of DEC's National Replacement Character Set (NRCS). The 7-bit character set was introduced for DEC's computer terminal systems, starting with the VT200 series in 1983, but is also used by IBM for their DEC emulation. Similar but not identical to the series of ISO 646 character sets, the character set is a close derivation from ASCII with only eight code points differing. Code page layout References 1023
https://en.wikipedia.org/wiki/Code%20page%201287
Code page 1287 (CCSID 1287), also known as CP1287, DEC Greek (8-bit) and EL8DEC, is one of the code pages implemented for the VT220 terminals. It supports the Greek language. Code page layout See also DEC Multinational Character Set (MCS) 8-bit DEC Turkish (Code page 1288) 8-bit DEC Hebrew 8-bit DEC Cyrillic (KOI-8 Cyrillic) 7-bit DEC Greek References 1287 Digital Equipment Corporation
https://en.wikipedia.org/wiki/Code%20page%201288
Code page 1288 (CCSID 1288), also known as CP1288, DEC Turkish (8-bit) and TR8DEC, is one of the code pages implemented for the VT220 terminals. It supports the Turkish language. Code page layout See also DEC Multinational Character Set (MCS) 8-bit DEC Greek (Code page 1287) 8-bit DEC Hebrew 8-bit DEC Cyrillic (KOI-8 Cyrillic) 7-bit DEC Turkish (TR7DEC) References 1288 Digital Equipment Corporation
https://en.wikipedia.org/wiki/Obash
Obash is a bash script obfuscator written in the C programming language. obash encodes and encrypts bash shell scripts into executable binaries much like shc, the project that inspired it, but uses AES-256 encryption and the key and initialization vector are retrieved from the hardware instead of being hard coded into the binary itself. The obash project was started to address some of the issues that affect shc, the main one being able to see the original shell script source by simply issuing ps -ef. Although the objectives are the same, obash shares no code with shc and was built from scratch from the ground up, any code similarities are purely accidental and dictated by the shared objectives. Obash is still a work in progress but the master branch on GitHub generally has usable sources while the testing branch may be in a transition state at any given time. How it works internally Obash takes the input script and AES-256 encrypts it, and also base64 encodes the AES ciphertext so that it can be used to declare an unsigned char array. It then produces an intermediate C file which is basically the interpreter (see interpreter.c), functions, text array containing the ciphertext, the optional key and IV for reusable binaries (not bound to the hardware) and the main. The intermediate C file is then compiled into an executable. The intermediate C file is built in the following manner (see mk_sh_c function in functions.c): includes block from interpreter.h crypted_script variable containing the AES-256 encrypted script encoded via base64 serial and uuid variables (empty if non reusable) functions block from interpreter.h main_body block from interpreter.h See recreate_interpreter_header script for details on how interpreter.h is created from interpreter.c. Key and initialization vector for AES-256 encryption The key and IV are not hard-coded into the binary (unless you decide to build a reusable static binary with the -r flag) but are retrieved each time from
https://en.wikipedia.org/wiki/RedMonk
RedMonk is an industry analyst firm focused on software developers and headquartered in Portland, Maine, United States. It was founded on the premise of the increasing influence of software developers in the technology industry. RedMonk co-founder Stephen O'Grady authored a book on "The New Kingmakers: How Developers Conquered the World" which details this premise and a book on "The Software Paradox: The Rise and Fall of the Commercial Software Market" which considers the changing role of commercial software. RedMonk covers trends in the software industry such as the top-used programming languages. History RedMonk was founded in 2002 by James Governor and Stephen O'Grady. Awards RedMonk co-founder James Governor was awarded the Women in Marketing Equality Advocate award in 2016. RedMonk was highly ranked in a number of categories from the Institute of Industry Analyst Relations in 2008, specifically: Analyst of the year #3: James Governor, RedMonk Analyst firm of the year #4: RedMonk Most relevant #5: RedMonk Most import firm #6: RedMonk See also Industry analyst Software developer References External links Official website Market research companies of the United States Companies based in Portland, Maine 2002 establishments in Maine Software development
https://en.wikipedia.org/wiki/System%20Power%20Management%20Interface
The System Power Management Interface (SPMI) is a high-speed, low-latency, bi-directional, two-wire serial bus suitable for real-time control of voltage and frequency scaled multi-core application processors and its power management of auxiliary components. SPMI obsoletes a number of legacy, custom point-to-point interfaces and provides a low pin count, high-speed control bus for up to 4 master and 16 slave devices. SPMI is specified by the MIPI Alliance (Mobile Industry Process Interface Alliance). References Serial buses Computer standards MIPI Alliance standards
https://en.wikipedia.org/wiki/Confide
Confide is an encrypted instant messaging application for most major operating systems. It was first released in 2013, on iOS, and is known for its self-destructing messaging system that deletes messages immediately after reading. The platform offers both free and paid features for individuals and businesses. In 2017, the news outlet Axios reported that it had gained popularity among, “numerous senior GOP operatives and several members of the Trump administration.” After receiving more media attention, there were concerns about the security of the app, as it is closed source and an independent review by Kudelski Security indicated it may use an older, less secure version of OpenSSL. The app's first full security audit found multiple critical vulnerabilities including impersonating another user by hijacking an account session or by guessing a password, learning the contact details of Confide users, becoming an intermediary in a conversation and decrypting messages, and potentially altering the contents of a message or attachment in transit without first decrypting it. WIRED reported that the encryption in Confide was based on the "PGP standard," and used Transport Layer Security. In January 2018, Confide, Inc. developers announced their newly developed ScreenShieldKit SDK (Software Development Kit) which was originally intended only for the Confide application. The API allows developers to incorporate the same screenshot-proof functionality of Confide into their own applications by simply importing the SDK replacing UITextView and UIImageView – two commonly used iOS development components used to display data to end users. The SDK prevents screenshots by blanking out the data and supports protection from a variety of capture methods including screenshots, screen recordings, screen mirrorings, and even screenshots from Apple's Xcode (the main development platform for iOS). Confide was referred to as an application that was used during communications between an accu
https://en.wikipedia.org/wiki/Genomic%20evolution%20of%20birds
Birds are the group of amniotes with the smallest genomes. Whereas mammal and reptilian genomes range between 1.0 and 8.2 giga base pairs (Gb), bird genomes have sizes between 0.91 Gb (black-chinned hummingbird, Archilochus alexandri) and 1.3 Gb (common ostrich, Struthio camelus). Just as happens to any other living being, bird genomes’ reflect the action of natural selection upon these animals. Their genomes are the basis of their morphology and behaviour. Current features of bird genomes Compared to any other group of tetrapods, birds are the ones that have less repeated elements in their genomes, comprising only 4–10 % of its extent, a rather small number when compared to the 34–52 % that they take up in mammals. Another example of genome reduction in birds is that of short interspersed nuclear elements (SINEs). Their total size has been drastically reduced, averaging only 1.3 mega base pairs (Mb), whereas those of American alligator (Alligator mississippiensis) total an average of 12.6 Mb, and those from the green sea turtle (Chelonia mydas) average 34.9 Mb. These data suggest that the last common ancestor of modern birds already had a reduced number of SINEs. It can also be appreciated that the mean size of introns, intergenic sequences, and even exons is significantly reduced. Mammal and reptilian introns have an average size of 4.3 kb and 3.1 kb respectively, whereas those of birds are only 2.1 kb long. Likewise, gene spacing is 91 kb (average) for mammals and 61 kb for reptiles, but only 49 kb in birds. It is known that similar reductions have also taken place in bats. This fact suggests that genome-size reduction could give advantages for flying animals, such as rapid gene-expression regulation, which is required in powered flight. Some researchers remark that, in fact, bird genomes have undergone successive deletions, ruling out the possibility of genomic expansion in mammals and reptiles. Also, there is no such genomic loss in any vertebrate group as g
https://en.wikipedia.org/wiki/DEC%20Hebrew
The DEC Hebrew character set is an 8-bit character set developed by Digital Equipment Corporation (DEC) to support the Hebrew alphabet. It was derived from DEC's Multinational Character Set (MCS) by removing the existing definitions from code points 192 to 223 and 224 to 250 and replacing code points 251 to 256 by the Hebrew letters. This range corresponds to the Hebrew range of its 7-bit counterpart, but with the high bit set. Since MCS is a predecessor of ISO/IEC 8859-1, DEC Hebrew is similar to ISO/IEC 8859-8 and the Windows code page 1255, that is, many characters in the range 160 to 191 are the same, and the Hebrew letters are at 192 to 250 in all three character sets. Code page layout See also 8-bit DEC Greek (Code page 1287) 8-bit DEC Turkish (Code page 1288) 8-bit DEC Cyrillic (KOI-8 Cyrillic) 7-bit DEC Hebrew (SI 960) References Character sets Digital Equipment Corporation
https://en.wikipedia.org/wiki/Cliqz
Cliqz was a privacy-oriented web browser and search engine developed by Cliqz GmbH and majority-owned by Hubert Burda Media. It was available as a desktop and mobile web browser as well as an extension for Firefox itself. Composition It is a fork of the Firefox web browser with privacy-oriented changes, among which are a crowdsourced anti-tracking mechanism and an in-house search engine embedded within the browser, utilizing its own index of web pages to produce suggestions within the address bar dropdown menu rather than on separate pages. The browser's developers argued that other privacy-focused search engines may still pass the user's IP address to third-party search providers. History In August 2016, Mozilla, the developer of Firefox, made a minority investment in Cliqz. Cliqz planned to eventually monetize the software through a program known as Cliqz Offers, which would deliver sponsored offers to users based on their interests and browsing history. However, these recommendations would be processed locally based on a remote repository of offers, with no personally identifiable data sent to remote servers. On 15 February 2017, Cliqz International GmbH, a wholly-owned subsidiary of Cliqz GmbH, acquired the privacy-oriented browser extension Ghostery. On 29 April 2020, Cliqz announced it will shut down its browser and search engine. Subsequently, the search engine - called Tailcat - was acquired by Brave. As of March 2021, a browser called Ghostery Dawn was reported to be under development. Ghostery Dawn is available for public download in October 2021. Integration with Firefox On 6 October 2017, Mozilla announced a test where approximately 1% of users downloading Firefox in Germany would receive a version with Cliqz software included. The feature provided recommendations directly in the browser's search field. Recommendations included news, weather, sports, and other websites and were based on the user's browsing history and activities. The press relea
https://en.wikipedia.org/wiki/Standard%20Korean%20Language%20Dictionary
Standard Korean Language Dictionary () is a dictionary of the Korean language, published by the National Institute of Korean Language. History The compilation of Standard Korean Language Dictionary was commenced on 1 January 1992, by The National Academy of the Korean Language, the predecessor of the National Institute of Korean Language. The dictionary's first edition was published in three volumes on 9 October 1999, followed by the compact disc released on 9 October 2001. The online dictionary was launched on 9 October 2002, and revised on 9 October 2008. See also Basic Korean Dictionary References 1999 non-fiction books Korean language Korean dictionaries Online dictionaries Standards of South Korea
https://en.wikipedia.org/wiki/Eyeball%20network
Eyeball network is a slang term used by network engineers and architects that refers to an access network whose primary users use the network to “look at things” (browse the Internet, read email, etc.) and consume content, as opposed to a network that may be used primarily to generate its own data, or “content networks/providers”. The term “eyeball network” is often overheard in conversations and seen in articles that discuss peering relationships between other networks, as well as net neutrality issues. An example of an eyeball network would be any given ISP that provides internet connectivity to end-users – The ISP may peer with Google (which is a content provider) where the end users consume content serviced/provided by Google, in this case the ISP is just an “eyeball network” providing a means for the end user to reach Google provided actual content. However, it is to be noted that not all ISPs are eyeball networks, they can be pure transit providers. With Tier 2 networks and lower, they can serve as both an eyeball network and a transit provider, depending on their business model. In the modern day ecosystem where peering is given priority, the lines are blurred between the different types of networks as ultimately any given network must be able to reach every other given network on the internet at large. References Computer engineering Computer networking Slang
https://en.wikipedia.org/wiki/ScyllaDB
ScyllaDB is an open-source distributed NoSQL wide-column data store. It was designed to be compatible with Apache Cassandra while achieving significantly higher throughputs and lower latencies. It supports the same protocols as Cassandra (CQL and Thrift) and the same file formats (SSTable), but is a completely rewritten implementation, using the C++20 language replacing Cassandra's Java, and the Seastar asynchronous programming library replacing classic Linux programming techniques such as threads, shared memory and mapped files. In addition to implementing Cassandra's protocols, ScyllaDB also implements the Amazon DynamoDB API. ScyllaDB uses a sharded design on each node, meaning that each CPU core handles a different subset of data. Cores do not share data, but rather communicate explicitly when they need to. The ScyllaDB authors claim that this design allows ScyllaDB to achieve much better performance on modern NUMA SMP machines, and to scale very well with the number of cores. They have measured as much as 2 million requests per second on a single machine, and also claim that a ScyllaDB cluster can serve as many requests as a Cassandra cluster 10 times its size – and do so with lower latencies. Independent testing has not always been able to confirm such 10-fold throughput improvements, and sometimes measured smaller speedups, such as 2x. A 2017 benchmark from Samsung observed the 10x speedup on high-end machines – the Samsung benchmark reported that ScyllaDB outperformed Cassandra on a cluster of 24-core machines by a margin of 10–37x depending on the YCSB workload. ScyllaDB is available on-premises, on major public cloud providers, or as a DBaaS (ScyllaDB Cloud). History ScyllaDB was started in December 2014 by the startup Cloudius Systems (later renamed ScyllaDB Inc.), previously known for having created OSv. ScyllaDB was released as open source in September 2015, under the AGPL license. Employees of ScyllaDB Inc. remain the primary coders behind Scylla,
https://en.wikipedia.org/wiki/Mac%20OS%20S%C3%A1mi
Mac OS Sámi is a character encoding used on classic Mac OS to represent the Sámi languages and the Finnish Kalo language. While not used in any official Apple product, it has been used in various fonts designed to support Sámi languages under classic Mac OS, including those from Evertype. Each character is shown with its equivalent Unicode code point. Only the second half of the table (code points 128–255) is shown, the first half (code points 0–127) being the same as ASCII. The character 0xDB was previously mapped to the currency sign (¤), Unicode character U+00A4. The character 0xF0 is a solid Apple logo. Apple uses U+F8FF in the Corporate Private Use Area for this logo, but it is usually not supported on non-Apple platforms. References Character sets Sámi
https://en.wikipedia.org/wiki/Intuitive%20Password
Intuitive Password is a proprietary freemium password manager and secure digital wallet that stores users' passwords and confidential data. It was launched in 2013 by the Australian company Intuitive Security Systems. Intuitive Password received mixed reviews. Neil J. Rubeking wrote in PC Magazine in 2013 that Intuitive Password's not having automated password capture like some of its competitors was a significant downside. History The program was developed by an Australian company, Intuitive Security Systems Pty. Ltd., and uses Advanced Encryption Standard-256. It was launched in mid-2013. Product To create a free Intuitive Password account, users supply an email address, a master password, and a self-populated security question and answer. In the program's "Logins category", users can save website, database, and server logins. In the "Accounts category", users can store their credentials for email accounts, instant messaging accounts, and wireless routers. In the "Wallets" category, users can store their credit card information. In the "Licenses" category, users can store credentials for their software and hunting license. In the "Identifications" category, users can store IDs like library cards. Intuitive Password lets clients use two kinds of two-factor authentication. The first factor is a master password. The second factor is either an authentication code sent through text message to a user's cellphone or Google Authenticator. It has configurable options to email users for every log in or to block different countries from logging in. Very confidential information can be protected by a second master password. Intuitive Password permits users to safely share authentication details with others who are using it. For logging in to public computers, users can generate a single-use password for authentication. Features AES-256 encryption Automatic logins and password capturing Password generator Security dashboard Two-factor authentication Auto logout Em
https://en.wikipedia.org/wiki/Muhammad%20M.%20Hussain
Muhammad Mustafa Hussain is an electronics engineer specializing in CMOS technology-enabled low-cost flexible, stretchable and reconfigurable electronic systems. He is a professor in King Abdullah University of Science and Technology. He is the principal investigator (PI) at Integrated Nanotechnology Laboratory, and Integrated Disruptive Electronic Applications (IDEA) Laboratory. He is also the director of the Virtual Fab: vFabLab™ (https://vFabLab.org). Education and career Born and brought up in Dhaka, Bangladesh, Hussain obtained his bachelor's degree in electrical and electronics engineering from the Bangladesh University of Engineering and Technology, in 2000. He completed his master's from University of Southern California in 2002 and joined University of Texas at Austin, where he completed another M.S. and doctoral degrees (December 2005). In 2006, he joined Texas Instruments as an integration engineer to lead the 22 nm node, non-planar, MugFET technology development. In 2008, he joined SEMATECH as the program manager of Novel Emerging Technology Program, where he oversaw CMOS technology development in Austin, Texas, and in Albany, New York. His program was supported by United States Defense Advanced Research Project Agency (DARPA). He joined the King Abdullah University of Science and Technology (KAUST) as a founding faculty in August 2009. Achievements Hussain is the Fellow of IEEE, American Physical Society (APS), Institute of Physics (IOP), UK and Institute of Nanotechnology, UK. He serves as an editor in notable journals such as Applied Nanoscience (Springer-Nature) and IEEE Transactions on Electron Devices. He has been awarded the IEEE Electron Devices Society Distinguished Lecturer award for his teaching skills. His research on saliva based power generation, self-destructible electronics, paper skin, smart thermal patch, paper watch, multidimensional IC (MD-IC), corrugation enabled solar cells and decal electronics have garnered widespread interna
https://en.wikipedia.org/wiki/International%20Plant%20Nutrition%20Colloquium
The International Plant Nutrition Colloquium (IPNC) is an international conference held every four years for the promotion of research within the field of plant nutrition. Prior to 1981, it was known as the International Colloquium on Plant Analysis and Fertiliser Problems. The IPNC is organised by the International Plant Nutrition Council, which "seeks to advance science-based non-commercial research and education in plant nutrition in order to highlight the importance of this scientific field for crop production, food security, human health and sustainable environmental protection". It is considered that the IPNC is the most important international meeting on plant nutrition globally, with more than 800 delegates attending each meeting. The IPNC covers research in the fields of plant mineral nutrition, plant molecular biology, plant genetics, agronomy, horticulture, ecology, environmental sciences, and fertilizer use and production. In honour of Professor Horst Marschner, who was a passionate supporter of students and young researchers, the IPNC has established the Marschner Young Scientist Award for outstanding early-career researchers and PhD students with a potential to become future research leaders. The current President of the International Plant Nutrition Council is Professor Ciro A. Rosolem from the São Paulo State University. The next IPNC is to be held in Iguazu Falls, Brazil, from 22-27 August 2022. Past and future locations for the IPNC: References External links IPNC 2017 Official Website IPNC 2013 Official Website IPNC 2009 Official Website Biology conferences
https://en.wikipedia.org/wiki/Open%20Information%20Security%20Management%20Maturity%20Model
The Open Group Information Security Management Maturity Model (O-ISM3) is a maturity model for managing information security. It aims to ensure that security processes in any organization are implemented so as to operate at a level consistent with that organization’s business requirements. O-ISM3 defines a comprehensive but manageable number of information security processes sufficient for the needs of most organizations, with the relevant security control(s) being identified within each process as an essential subset of that process. History The original motivation behind O-ISM3 development was to narrow the gap between theory and practice for information security management systems, and the trigger was the idea of linking security management and maturity models. O-ISM3 strove to keep clear of a number of pitfalls with previous approaches. The looked at Capability Maturity Model Integration, ISO 9000, COBIT, ITIL, ISO/IEC 27001:2013, and other standards, and found some potential for improvement in several fields, such as linking security to business needs, using a process based approach, providing some additional details (who, what, why) for implementation, and suggesting specific metrics, while preserving compatibility with the most popular IT and security management standards. Availability The Open Group provides the standard free of charge. References Data security Security Information governance Methodology Open Group standards
https://en.wikipedia.org/wiki/Electronic%20Transactions%20on%20Numerical%20Analysis
Electronic Transactions on Numerical Analysis is a peer-reviewed scientific open access journal publishing original research in applied mathematics with the focus on numerical analysis and scientific computing. It is published by the Kent State University and the Johann Radon Institute for Computational and Applied Mathematics (RICAM). Articles for this journal are published in electronic form on the journal's web site. The journal is one of the oldest scientific open access journals in mathematics. The Electronic Transactions on Numerical Analysis were founded in 1992 by Richard S. Varga, Arden Ruttan, and Lothar Reichel (all Kent State University) as a fully open access journal (no fee for reader or authors). The first issue appeared in September 1993. The current editors-in-chief are Lothar Reichel and Ronny Ramlau. Editors-in-chief 1993–2008: Richard S. Varga 1993–1998: Arden Ruttan 2005–2013: Daniel Szyld since 1993: Lothar Reichel since 2010: Ronny Ramlau No-fee open access and copyright Since its foundation, the journal follows an open access policy that allows free access to readers and charges no fee for authors ("diamond open access"). Authors transfer the copyright of published articles to the editors. This publication model is based on the one hand on support of the editing institutions and on donations. On the other hand, the editing process is carried out by volunteers from the scientific community. Abstracting and indexing The journal is abstracted and indexed in the Science Citation Index Expanded Mathematical Reviews, and Zentralblatt MATH. According to the Journal Citation Reports, the journal has a 2015 impact factor of 0.671 (highest 1.261 in 2012) External links Official website (RICAM) Official website (Kent) References Academic journals established in 1992 Mathematics journals Open access journals English-language journals
https://en.wikipedia.org/wiki/Bertram%20Martin%20Wilson
Prof Bertram Martin Wilson FRSE (14 November 1896, London – 18 March 1935, Dundee, Scotland) was an English mathematician, remembered primarily as a co-editor, along with G. H. Hardy and P. V. Seshu Aiyar, of Srinivasa Ramanujan's Collected Papers. (It seems probable that Wilson did not know about Ramanujan's lost notebook, which was probably passed by G. H. Hardy to G. N. Watson some years after Wilson's death.) Life He was born in London on 14 November 1896 the son of Rev Alfred Henry Wilson and his wife, Ellen Elizabeth Vincent. Wilson was educated at King Edward's School, Birmingham and then studied Mathematics at Trinity College, Cambridge, graduating MA. In 1920 he was appointed as a Lecturer in Mathematics at the University of Liverpool, and was promoted to Senior Lecturer in 1926. He remained there for slightly more than thirteen years, working under three professors, Frank Stanton Carey (1860–1928), J. C. Burkhill, and E. C. Titchmarsh. In 1933 Wilson was appointed Professor of Pure and Applied Mathematics at University College, Dundee as successor to John Edward Aloysius Steggall, who retired. Wilson was elected on 5 March 1934 a Fellow of the Royal Society of Edinburgh. His proposers were Sir Edmund Taylor Whittaker, James Hartley Ashworth, Nicholas Lightfoot and Edward Thomas Copson. In 1934 he gave a talk Ramanujan's Note-Books and their Place in Modern Mathematics at the third Colloquium of the Edinburgh Mathematical Society at the University of St Andrews. Wilson died on 18 March 1935 following a brief illness. Family In 1930 he married Margaret Fancourt Mitchell. Subsequent history for Ramanujan's Notebooks G. N. Watson and B. M. Wilson never completed their project of editing Ramanujan's notebooks (not including the "lost" notebook), but Bruce C. Berndt completed their project in a 5-volume publication Ramanujan's Notebooks, Parts I—V. The following quote refers to the three notebooks involved in Watson and Wilson's project: Berndt benefi
https://en.wikipedia.org/wiki/Mac%20OS%20Maltese/Esperanto%20encoding
Mac OS Maltese/Esperanto, called MacOS Esperanto in older sources, is a character encoding for Esperanto, Maltese and Turkish created by Michael Everson on August 15 1997, based on the Mac OS Turkish encoding. It is used in his fonts, but not on official Mac OS fonts. ISO/IEC 8859-3 supports the same languages with a different layout. Layout Each character is shown with its equivalent Unicode code point. Only the second half of the table (code points 128–255) is shown, the first half (code points 0–127) being the same as ASCII. Previously the character 0xF5 mapped to currency sign (¤), Unicode character U+00A4. References Character sets Maltese/Esperanto
https://en.wikipedia.org/wiki/Mask%20generation%20function
A mask generation function (MGF) is a cryptographic primitive similar to a cryptographic hash function except that while a hash function's output has a fixed size, a MGF supports output of a variable length. In this respect, a MGF can be viewed as a extendable-output function (XOF): it can accept input of any length and process it to produce output of any length. Mask generation functions are completely deterministic: for any given input and any desired output length the output is always the same. Definition A mask generation function takes an octet string of variable length and a desired output length as input, and outputs an octet string of the desired length. There may be restrictions on the length of the input and output octet strings, but such bounds are generally very large. Mask generation functions are deterministic; the octet string output is completely determined by the input octet string. The output of a mask generation function should be pseudorandom, that is, if the seed to the function is unknown, it should be infeasible to distinguish the output from a truly random string. Applications Mask generation functions, as generalizations of hash functions, are useful wherever hash functions are. However, use of a MGF is desirable in cases where a fixed-size hash would be inadequate. Examples include generating padding, producing one-time pads or keystreams in symmetric-key encryption, and yielding outputs for pseudorandom number generators. Padding schemes Mask generation functions were first proposed as part of the specification for padding in the RSA-OAEP algorithm. The OAEP algorithm required a cryptographic hash function that could generate an output equal in size to a "data block" whose length was proportional to arbitrarily sized input message. Random number generators NIST Special Publication 800-90A defines a class of cryptographically secure random number generators, one of which is the "Hash DRBG", which uses a hash function with a cou
https://en.wikipedia.org/wiki/Brownout%20%28software%20engineering%29
Brownout in software engineering is a technique that involves disabling certain features of an application. Description Brownout is used to increase the robustness of an application to computing capacity shortage. If too many users are simultaneously accessing an application hosted online, the underlying computing infrastructure may become overloaded, rendering the application unresponsive. Users are likely to abandon the application and switch to competing alternatives, hence incurring long-term revenue loss. To better deal with such a situation, the application can be given brownout capabilities: The application will disable certain features – e.g., an online shop will no longer display recommendations of related products – to avoid overload. Although reducing features generally has a negative impact on the short-term revenue of the application owner, long-term revenue loss can be avoided. The technique is inspired by brownouts in power grids, which consists in reducing the power grid's voltage in case electricity demand exceeds production. Some consumers, such as incandescent light bulbs, will dim – hence originating the term – and draw less power, thus helping match demand with production. Similarly, a brownout application helps match its computing capacity requirements to what is available on the target infrastructure. Brownout complements elasticity. The former can help the application withstand short-term capacity shortage, but does so without changing the capacity available to the application. In contrast, elasticity consists of adding (or removing) capacity to the application, preferably in advance, so as to avoid capacity shortage altogether. The two techniques can be combined; e.g., brownout is triggered when the number of users increases unexpectedly until elasticity can be triggered, the latter usually requiring minutes to show an effect. Brownout is relatively non-intrusive for the developer, for example, it can be implemented as an advice in asp
https://en.wikipedia.org/wiki/Epitranscriptomic%20sequencing
In epitranscriptomic sequencing, most methods focus on either (1) enrichment and purification of the modified RNA molecules before running on the RNA sequencer, or (2) improving or modifying bioinformatics analysis pipelines to call the modification peaks. Most methods have been adapted and optimized for mRNA molecules, except for modified bisulfite sequencing for profiling 5-methylcytidine which was optimized for tRNAs and rRNAs. There are seven major classes of chemical modifications found in RNA molecules: N6-methyladenosine, 2'-O-methylation, N6,2'-O-dimethyladenosine, 5-methylcytidine, 5-hydroxylmethylcytidine, inosine, and pseudouridine. Various sequencing methods have been developed to profile each type of modification. The scale, resolution, sensitivity, and limitations associated with each method and the corresponding bioinformatics tools used will be discussed. Methods for profiling N6-methyladenosine Methylation of adenosine does not affect its ability to base-pair with thymidine or uracil, so N6-methyladenosine (m6A) cannot be detected using standard sequencing or hybridization methods. This modification is marked by the methylation of the adenosine base at the nitrogen-6 position. It is abundantly found in polyA+ mRNA; also found in tRNA, rRNA, snRNA, and long ncRNA. m6A-seq and MeRIP-seq In 2012, the first two methods for m6A sequencing came out that enabled transcriptome-wide profile of m6A in mammalian cells. These two techniques, called m6A-seq and MeRIP-seq (m6A-specific methylated RNA immunoprecipitation), are also the first methods to allow for any type of RNA modification sequencing. These methods were able to detect 10,000 m6A peaks in the mammalian transcriptome; the peaks were found to be enriched in 3’UTR regions, near STOP codons, and within long exons. The two methods were optimized to detect methylation peaks in poly(A)+ mRNA, but the protocol could be adapted to profile any type of RNA. Collected RNA sample is fragmented into ~1
https://en.wikipedia.org/wiki/Fair%20river%20sharing
Fair river sharing is a kind of a fair division problem in which the waters of a river has to be divided among countries located along the river. It differs from other fair division problems in that the resource to be divided—the water—flows in one direction—from upstream countries to downstream countries. To attain any desired division, it may be required to limit the consumption of upstream countries, but this may require to give these countries some monetary compensation. In addition to sharing river water, which is an economic good, it is often required to share river pollution (or the cost of cleaning it), which is an economic bad. River sharing in practice There are 148 rivers in the world flowing through two countries, 30 through three, nine through four and 13 through five or more. Some notable examples are: The Jordan river, whose sources run from upstream Lebanon and Syria to downstream Israel and Jordan. The attempts of Syria to divert the Jordan river, starting in 1965, are cited as one of the reasons for the Six-Day War. Later, in 1994, the Israel–Jordan peace treaty determined a sharing of the waters between Israel and Jordan, by which Jordan receives water per year. The Nile, running from upstream Ethiopia through Sudan to downstream Egypt. There is a long history of disputes over the Nile agreements of 1929 and 1959. The Ganges, running from upstream India to downstream Bangladesh. There was controversy over the operation of the Farakka Barrage. Between Mexico and the United States, there was controversy over the desalination facility in the Morelos Dam. The Mekong runs from China's Yunnan Province to Myanmar, Laos, Thailand, Cambodia, and Vietnam. In 1995, Laos, Thailand, Cambodia, and Vietnam established the Mekong River Commission to assist in the management and coordinated use of the Mekong's resources. In 1996 China and Myanmar became "dialogue partners" of the MRC and the six countries now work together within a cooperative framework.
https://en.wikipedia.org/wiki/Tetrasporaphyte
The tetrasporaphyte is a phase in the life history of algae which bear tetrasporangia. This phase is usually morphologically similar to the gametophyte phase. References Algae
https://en.wikipedia.org/wiki/Penny%20graph
In geometric graph theory, a penny graph is a contact graph of unit circles. It is formed from a collection of unit circles that do not cross each other, by creating a vertex for each circle and an edge for every pair of tangent circles. The circles can be represented physically by pennies, arranged without overlapping on a flat surface, with a vertex for each penny and an edge for each two pennies that touch. Penny graphs have also been called unit coin graphs, because they are the coin graphs formed from unit circles. If each vertex is represented by a point at the center of its circle, then two vertices will be adjacent if and only if their distance is the minimum distance among all pairs of vertices. Therefore, penny graphs have also been called minimum-distance graphs, smallest-distance graphs, or closest-pairs graphs. Similarly, in a mutual nearest neighbor graph that links pairs of points in the plane that are each other's nearest neighbors, each connected component is a penny graph, although edges in different components may have different lengths. Every penny graph is a unit disk graph and a matchstick graph. Like planar graphs more generally, they obey the four color theorem, but this theorem is easier to prove for penny graphs. Testing whether a graph is a penny graph, or finding its maximum independent set, is NP-hard; however, both upper and lower bounds are known for the size of the maximum independent set, higher than the bounds that are possible for arbitrary planar graphs. Properties Number of edges Every vertex in a penny graph has at most six neighboring vertices; here the number six is the kissing number for circles in the plane. However, the pennies on the boundary of the convex hull have fewer neighbors. Counting more precisely this reduction in neighbors for boundary pennies leads to a precise bound on the number of edges in any penny graph: a penny graph with vertices has at most edges. Some penny graphs, formed by arranging the pennies
https://en.wikipedia.org/wiki/Transmembrane%20protein%20255A
Transmembrane protein 255A is a protein that is encoded by the TMEM255A gene. TMEM255A is often referred to as family with sequence similarity 70, member A (FAM70A). The TMEM255A protein is transmembrane and is predicted to be located the nuclear envelope of eukaryote organisms. Gene The TMEM25A gene (often referred to as Family with Sequence Similarity 70 Member A; FAM70A) is located on Xq24, spanning 60,555 base pairs. TMEM255A is flanked by the genes ATPase Na+/K+ transporting family member beta 4 (ATP1B4) and NFKB activating protein pseudogene 1 (NKAPP1). mRNA There are three variants of the transcript seen, where isoform 1 is the longest. The 5’- and 3’- UTRs of the mRNA spans 227 and 2207 base pairs, respectively, and are predicted to contain several stem-loops. The mRNA is 3512 base pairs long and the gene consists of 9 exons. Protein The longest protein encoded for is isoform 1, which spans 349 amino acids, and is predicted to have a molecular weight at 38 kDa and isoelectric point at pH 7.89. Compared to the average vertebrate protein, TMEM255A is rich in aspartic acid, isoleucine, proline and tyrosine, and relatively poor in glutamic acid and lysine. No charge clusters have been found in this protein. The protein is predicted to be post-translationally modified by phosphorylation and glycosylation. The protein is predicted to have four transmembrane domains in the nuclear membrane. The structure of the protein is predicted to be helical in the transmembrane domains. Disulfide bonds are predicted to be found in the region in between transmembrane domains 3 and 4, which indicates that this particular region is located in the nucleoplasm. Expression TMEM255A is predicted to be most abundantly expressed in nerve, brain, testis, ovary, thymus and kidney. The protein is expressed in a variety of tissues, but at relatively moderate levels. Regulation of expression Both the 5' and 3' Untranslated Regions (UTRs) are predicted to consist of several s
https://en.wikipedia.org/wiki/Rachel%20Davidson
Rachel A. Davidson is an American civil engineer and professor in the Disaster Research Center at the University of Delaware. She is known for her research on natural disaster risk modeling, disaster risk management and civil infrastructure systems. She is a winner of the Dorothy Swanson Excellence in Teaching Award and a nominee for the Walter L. Huber Civil Engineering Research Prize. She was the president of Society for Risk Analysis (2010-2011). See also Fire safety References External links Rachel A. Davidson at University of Delaware American civil engineers American structural engineers Living people Members of the United States National Academy of Engineering Stanford University alumni Princeton University alumni University of Delaware faculty Year of birth missing (living people)
https://en.wikipedia.org/wiki/Fileless%20malware
Fileless malware is a variant of computer related malicious software that exists exclusively as a computer memory-based artifact i.e. in RAM. It does not write any part of its activity to the computer's hard drive, thus increasing its ability to evade antivirus software that incorporate file-based whitelisting, signature detection, hardware verification, pattern-analysis, time-stamping, etc., and leaving very little evidence that could be used by digital forensic investigators to identify illegitimate activity. Malware of this type is designed to work in memory, so its existence on the system lasts only until the system is rebooted. Definition Fileless malware is sometimes considered synonymous with in-memory malware as both perform their core functionalities without writing data to disk during the lifetime of their operation. This has led some commentators to claim that this variant strain is nothing new and simply a “redefinition of the well-known term, memory resident virus”, whose pedigree can be traced back to the 1980s with the birth of the Lehigh Virus that was developed by the originator of the term, Fred Cohen, and became influential with his paper on the topic. This synonymy is however incorrect. Although the aforementioned behavioral execution environment is the same, in both cases i.e. both malware variants are executed in system memory, the crucial differentiation is the method of inception and prolongation. Most malware's infection vector involves some writing to the hard disk, in order for it to be executed, whose origin could take the form of an infected file attachment, external media device e.g. USB, peripheral, mobile phone etc., browser drive-by, side-channel etc. Each of the aforementioned methods has to have contact with the host system's hard drive, in some form or another, meaning that even when employing the stealthiest anti-forensic methods, some form of the infected residue will be left on the host media. Fileless malware on the other
https://en.wikipedia.org/wiki/India%20Stack
India Stack refers to the project of creating a unified software platform to bring India's population into the digital age. Its website describes its mission as follows: "India Stack is a set of open APIs that allows governments, businesses, startups and developers to utilize a unique digital Infrastructure to solve India’s hard problems towards presence-less, paperless, and cashless service delivery" Of the four "distinct technology layers" mentioned on the same page, the first, the "Presenceless Layer" is the most controversial as it involves storing biometric data such as fingerprints for every citizen. Since such markers are widely being adopted to enable cashless payment, the issue arises of fraudulent use of biometrics. The other layers are the Paperless Layer, which enables personal records to be associated with one's online identity; the Cashless Layer, a single interface to all national banks and online wallets; and the Consent Layer, which aims to maintain security and control of personal data. India Stack is the largest open API in the world. Since its deployment, India has been organizing hackathons to develop applications for the APIs. India Stack is being implemented in stages, starting with the introduction in 2009 of the Aadhaar "Universal ID" numbers. These are linked to biometrics (fingerprints) and as time goes by, authentication by Aadhaar is required for access to more and more services and subsidies. This raises issues of privacy and surveillance, especially as much of the users' interface is via their mobile phones. The next stages were the introduction of eKYC (electronic Know Your Customer), which enables paperless and rapid verification of address, identity etc., followed by eSign, whereby users attach a legally valid electronic signature to a document, and Unified Payments Interface (UPI) enabling cashless payments, and most recently, DigiLocker, a platform for issuance and verification of documents and certificates. What raised the pr
https://en.wikipedia.org/wiki/LogicLocker
LogicLocker, is a cross-vendor ransomware worm that targets Programmable Logic Controllers (PLCs) used in Industrial Control Systems (ICS). First described in a research paper released by the Georgia Institute of Technology, the malware is capable of hijacking multiple PLCs from various popular vendors. The researchers, using a water treatment plant model, were able to demonstrate the ability to display false readings, shut valves and modify Chlorine release to poisonous levels using a Schneider Modicon M241, Schneider Modicon M221 and an Allen Bradley MicroLogix 1400 PLC. The ransomware is designed to bypass weak authentication mechanisms found in various PLCs and lock out legitimate users while planting a logicbomb into the PLC. As of 14 February 2017, it is noted that there are over 1,400 of the same PLCs used in the proof-of-concept attack that were accessible from the internet as found using Shodan. Attack method The attack method used with LogicLocker employs five stages. Initial infection, Horizontal and Vertical movement, locking, encryption and negotiation. Initial infection can take place through various vulnerability exploits. As ICS devices are typically in an always on state, this gives Cyber-criminals ample time to attempt the compromise of the PLC. PLCs generally do not have strong authentication mechanisms in place to assist in protecting themselves from potential attack. Initial infection could take place through a users clicking of a potentially malicious email attachment. Upon initial infection of the PLC, horizontal or vertical movement can be achieved from the PLC to the corporate network depending on the capabilities of the PLC. The next stage of the attack is locking in which the attacker locks out legitimate users to inhibit or prevent restoration efforts. This can be done through password changes, OEM Locking, over-utilization of PLC resources or changing IP/Ports. These different locking methods offer varying degrees of succe
https://en.wikipedia.org/wiki/PhonePe
PhonePe is an Indian digital payments and financial services company headquartered in Bengaluru, Karnataka, India. PhonePe was founded in December 2015, by Sameer Nigam, Rahul Chari and Burzin Engineer. The PhonePe app, based on the Unified Payments Interface (UPI), went live in August 2016. The PhonePe app is available in 11 Indian languages. Using PhonePe, users can send and receive money, recharge mobile, DTH, data cards, make utility payments, pay at shops, invest in tax saving funds, buy insurance, mutual funds, and digital gold. PhonePe is accepted as a payment option by over 3.5 crore offline and online merchant outlets, constituting 99% of pin codes in the country. The app served more than 10 crore users as of June 2018, processed 500 crore transactions by December 2019, and crossed 10 crore transactions a day in April 2022. It currently has over 44 crore registered users with over 20 crore monthly active users. PhonePe is licensed by the Reserve Bank of India for the issuance and operation of a Semi Closed Prepaid Payment system. History PhonePe was incorporated in December 2015. In April 2016, the company was acquired by Flipkart and as part of the acquisition, the FxMart license was transferred to PhonePe and rebranded as the PhonePe wallet. PhonePe's founder Sameer Nigam was appointed as the CEO of the company. In August 2016, the company partnered with Yes Bank to launch a UPI-based mobile payment app, based on the government-backed UPI platform. Within three months of launch, the app was downloaded by over one crore users. In 2018, PhonePe became the fastest Indian payment app to get a five crore badge on the Google Play Store. The PhonePe app overtook BHIM to become the market leader in UPI transactions in August 2017. In 2022, PhonePe became the first UPI TPAP (Third Party Application Providers) App to allow UPI activation through Aadhaar. A year later, it further expanded its services by launching international UPI payments, allowing Indian
https://en.wikipedia.org/wiki/Glossary%20of%20calculus
Most of the terms listed in Wikipedia glossaries are already defined and explained within Wikipedia itself. However, glossaries like this one are useful for looking up, comparing and reviewing large numbers of terms together. You can help enhance this page by adding new terms or writing definitions for existing ones. This glossary of calculus is a list of definitions about calculus, its sub-disciplines, and related fields. A B C D E F G H I J L M N O P Q R S T U V W See also Outline of calculus Glossary of areas of mathematics Glossary of astronomy Glossary of biology Glossary of botany Glossary of chemistry Glossary of ecology Glossary of engineering Glossary of physics Glossary of probability and statistics References Works cited . . . . Notes C Wikipedia glossaries using description lists
https://en.wikipedia.org/wiki/Macintosh%20Latin%20encoding
Macintosh Latin is an obsolete character encoding which was used by Kermit (which as of 2022 supports Unicode UTF-8, though not UTF-16) to represent text on the Apple Macintosh (but not by standard Mac OS fonts). It is a modification of Mac OS Icelandic to include all characters in ISO/IEC 8859-1, DEC MCS, the PostScript Standard Encoding, and a Dutch ISO 646 variant (with ÿ or ij being a substitute for ij). Although Macintosh Latin is designed to be compatible with the standard Macintosh Mac OS Roman encoding for the shared subset of characters, the two should not be confused. Layout Each character is shown with its equivalent Unicode code point. Only the second half of the table (code points 128–255) is shown, the first half (code points 0–127) being the same as ASCII. See also Macintosh Font X encoding, another Mac OS encoding used by Kermit Footnotes References Character sets Latin
https://en.wikipedia.org/wiki/DG%20International
This is the Data General international character set: The Dasher D210/211 display terminals used the following character sets: References Character sets
https://en.wikipedia.org/wiki/RISC%20OS%20character%20set
The Acorn RISC OS character set was used in the Acorn Archimedes series and subsequent computers from 1987 onwards. It is an extension of ISO/IEC 8859-1, similar to the Windows CP1252 in that many of the added characters are typographical punctuation marks. Code page layout (standard) At 0x83 is a box with another box inside it on the top left-hand corner, meaning "resize window". At 0x84 is a 'bubble-writing' X, meaning "close window". At 0x87 is an unusual character that is a subscript 8 followed by a superscript 7. It is not proposed for Unicode. At 0x88, 0x89, 0x8A, and 0x8B are left, right, up, and down bubble arrows for window scrollbars. The following table shows the RISC OS character set. Each character is shown with a potential Unicode equivalent in the tooltip. Code page layout (Electronic Font Foundry 1.1) The Homerton font, a clone of Helvetica, does not have these characters. EFF, a third-party supplier of RISC OS outline fonts, has a different, but similar character set.This RISC OS Latin-1 character set was used by Electronic Font Foundry. Code page layout (TRC) References Further reading Character sets Acorn Computers RISC OS Computer-related introductions in 1987
https://en.wikipedia.org/wiki/Stanford%20Extended%20ASCII
Stanford Extended ASCII (SEASCII) is a derivation of the 7-bit ASCII character set developed at the Stanford Artificial Intelligence Laboratory (SAIL/SU-AI) in the early 1970s. Not all symbols match ASCII. Carnegie Mellon University, the Massachusetts Institute of Technology, and the University of Southern California also had their own modified versions of ASCII. Character set Each character is given with a potential Unicode equivalent. See also Stanford Artificial Intelligence Laboratory (SAIL/SU-AI) Stanford Artificial Intelligence Language (SAIL) Stanford/ITS character set References Further reading (NB. Shows a table of SEASCII differing in a few code points from that described in RFC 698.) External links SEASCII Computer-related introductions in the 1970s
https://en.wikipedia.org/wiki/Scandiweb
Scandiweb is a Latvian Digital strategy and Web development company specialized in Magento platform. The company was established in 2003 in Latvia by Antons Sapriko. It has offices in the United States, the UK, Sweden, Norway, France and Canada. It provides eCommerce solutions and acts as a strategic partner for IT development focusing on web, mobile, and big data analysis. Their work is primarily centered around Magento but also includes 3rd party integration, OroCRM integration, performance optimization and security services. Partnerships Since October 2016, Scandiweb have been partnering with Oro, Inc., an open-source business application development firm, to create an integrated E-commerce CRM solution based on the synthesis of Magento and Oro’s proprietary OroCRM system. Accolade In December 2016, Scandiweb constructed the world’s largest Rube Goldberg Machine and entered the Guinness Book of World Records. The machine was used to turn on the lights on Riga’s Christmas tree. The Rube Goldberg deployed a chain reaction consisting of 412 mechanical steps, setting in motion a wide assortment of parts such as levers, balls and wheels, as well as items like a coffee machine and a fan. The principle of a Rube Goldberg Machine is to achieve a simple task in the most complicated way possible. References Web development Software companies of Latvia Companies of Latvia
https://en.wikipedia.org/wiki/Leaf%20flushing
Leaf flushing or leaf out is the production of a flush of new leaves typically produced simultaneously on all branches of a bare plant or tree. Young leaves often have less chlorophyll and the leaf flush may be white or red, the latter due to presence of pigments, particularly anthocyanins. Leaf flushing succeeds leaf fall, and is delayed by winter in the temperate zone or by extreme dryness in the tropics. Leaf fall and leaf flushing in tropical deciduous forests can overlap in some species, called leaf-exchanging species, producing new leaves during the same period when old leaves are shed or almost immediately after. Leaf-flushing may be synchronized among trees of a single species or even across species in an area. In the seasonal tropics, leaf flushing phenology may be influenced by herbivory and water stress. Red leaf flush In tropical regions, leaves often flush red when young and in the phase of expansion to mature size. Red flushing is frequent among woody species, reported from 20 to 40% of the woody species in a site in Costa Rica, in 36% of species in Barro Colorado Island, Panama, about 49% of species in Kibale National Park, Uganda, and in 83 of 250 species in Southern Yunnan, China. The red coloration is primarily due to the presence of anthocyanins. Various hypotheses have been advanced to explain red flushing. The herbivore defense hypothesis suggests that the red coloration may make the leaves less likely to be attacked by insects as they are cryptic to herbivores that are blind to the red part of the spectrum. It has also been hypothesised that the anthocyanins may reduce light stress or fungal attacks on leaves. A recent study in tropical forest region of China provides support for the herbivore defense hypothesis, indicating that the red coloration of young leaves protects them from attacks of herbivorous insects through chemical defense as the red leaves have high concentrations of tannins and anthocyanins. References Botany Periodic pheno
https://en.wikipedia.org/wiki/List%20of%20habitats%20of%20principal%20importance%20in%20Wales
Wales is obliged by law to maintain lists of species and habitats of principal importance for biodiversity conservation; the other countries within the UK: Scotland, England and Northern Ireland, have their own laws for this purpose. Public bodies, including local authorities now have a legal duty to have regard to conserving biodiversity in the exercise of their normal functions. In Wales, that obligation originally derived from section 42 of the Natural Environment and Rural Communities (NERC) Act 2006. However, this requirement for Wales has since been superseded by an almost identical requirement enshrined within the Environment (Wales) Act 2016. Selection The habitats that have been designated to be of "principal importance for the purpose of conserving biodiversity" derive from lists originally drawn up for the UK Biodiversity Action Plan (UK BAP). These lists were reviewed in 2007, and the total number of UK BAP habitats increased from 45 to 65, and the number of UK BAP species increased from under 600 to 1,150. From these, the formal list just for Wales (and laid out below) now contains 53 of those 65 habitats. Legal obligations Section 6 of the Environment (Wales) Act 2016 places a legal obligation on public bodies in Wales to 'maintain and enhance biodiversity' whilst carrying out their functions. Section 7 of that Act requires Welsh Ministers to publish and maintain lists of species and types of habitats in Wales that are regarded as of 'principal importance' for the purpose of maintaining and enhancing that biodiversity. This section of the Act replaces the biodiversity duty originally outlined in Section 42 of the NERC Act 2006 for both England and Wales. Significance Awareness of the presence of any priority habitat or priority species identified on these lists is of importance within the local authority planning process when land is considered for development. Along with legally protected species, as well as statutory and non-statutory sites, kno
https://en.wikipedia.org/wiki/StatCrunch
StatCrunch is a web-based statistical software application from Pearson Education. StatCrunch was originally created for use in college statistics courses. As a full-featured statistics package, it is now also used for research and for other statistical analysis purposes. History American statistics professor Webster West created StatCrunch in 1997. Over the next 19 years West assisted by others added many more statistical procedures and graphing capabilities, and made user interface improvements. In 2005, West received two awards for StatCrunch: the CAUSEweb Resource of the Year Award and the MERLOT Classics Award. In 2013, the StatCrunch Java code was rewritten in JavaScript in order to avoid Java browser security problems, and so that it would run on iOS and Android. In 2015, new ways of importing data were added, including importing multi-page data directly from Wikipedia tables and other Web sources, and also importing with drag-and-drop for various data formats. In 2016, StatCrunch was acquired by Pearson Education, which had already been serving as the primary distributor of StatCrunch for several years. Software A StatCrunch license is included with many of Pearson's statistical textbooks. Because StatCrunch is a web application, it works on multiple platforms, including Windows, macOS, iOS, and Android. Data in StatCrunch is represented in a "data table" view, which is similar to a spreadsheet view, but unlike spreadsheets, the cells in a data table can only contain numbers or text. Formulas cannot be stored in these cells. There are many ways to import data into StatCrunch. Data can be typed directly into cells in the data table. Entire blocks of data may be cut-and-pasted into the data table. Text files (.csv, .txt, etc.) and Microsoft Excel files (.xls and .xlsx) can be drag-and-dropped into the data table. Data can be pulled into StatCrunch directly from Wikipedia tables or other Web tables, including multi-page tables. Data can be load
https://en.wikipedia.org/wiki/List%20of%20geodesic%20polyhedra%20and%20Goldberg%20polyhedra
This is a list of selected geodesic polyhedra and Goldberg polyhedra, two infinite classes of polyhedra. Geodesic polyhedra and Goldberg polyhedra are duals of each other. The geodesic and Goldberg polyhedra are parameterized by integers m and n, with and . T is the triangulation number, which is equal to . Icosahedral Octahedral Tetrahedral References Reprinted by Dover 1999 Mathematics-related lists
https://en.wikipedia.org/wiki/G%C3%A9otechnique%20Lecture
The Géotechnique lecture is an biennial lecture on the topic of soil mechanics, organised by the British Geotechnical Association named after its major scientific journal Géotechnique. This should not be confused with the annual BGA Rankine Lecture. List of Géotechnique Lecturers See also Named lectures Rankine Lecture Terzaghi Lecture External links ICE Géotechnique journal British Geotechnical Association References Civil engineering Geotechnical engineering Science lecture series Soil mechanics Biennial events 1989 establishments in the United Kingdom Recurring events established in 1989 British lecture series
https://en.wikipedia.org/wiki/Design%20for%20verification
Design for verification (DfV) is a set of engineering guidelines to aid designers in ensuring right first time manufacturing and assembly of large-scale components. The guidelines were developed as a tool to inform and direct designers during early stage design phases to trade off estimated measurement uncertainty against tolerance, cost, assembly, measurability and product requirements. Background Increased competition in the aerospace market has placed additional demands on aerospace manufacturers to reduce costs, increase product flexibility and improve manufacturing efficiency. There is a knowledge gap within the sphere of digital to physical dimensional verification and on how to successfully achieve dimensional specifications within real-world assembly factories that are subject to varying environmental conditions. The DfV framework is an engineering principle to be used within low rate and high value and complexity manufacturing industries to aid in achieving high productivity in assembly via the effective dimensional verification of large volume structures, during final assembly. The DfV framework has been developed to enable engineers to design and plan the effective dimensional verification of large volume, complex structures in order to reduce failure rates and end-product costs, improve process integrity and efficiency, optimise metrology processes, decrease tooling redundancy and increase product quality and conformance to specification. The theoretical elements of the DfV methods were published in 2016, together with their testing using industrial case studies of representative complexity. The industrial tests published on ScienceDirect proved that by using the new design for verification methods alongside the traditional ‘design for X’ toolbox, the resultant process achieved improved tolerance analysis and synthesis, optimized large volume metrology and assembly processes and more cost-effective tool and jig design. See also Design for assembly
https://en.wikipedia.org/wiki/KOI8-RU
KOI8-RU is an 8-bit character encoding, designed to cover Russian, Ukrainian, and Belarusian which use a Cyrillic alphabet. It is closely related to KOI8-R, which covers Russian and Bulgarian, but replaces ten box drawing characters with five Ukrainian and Belarusian letters Ґ, Є, І, Ї, and Ў in both upper case and lower case. It is even more closely related to KOI8-U, which does not include Ў but otherwise makes the same replacements. The additional letter allocations are matched by KOI8-E, except for Ґ which is added to KOI8-F. In IBM, KOI8-RU is assigned code page/CCSID 1167. KOI8 remains much more commonly used than ISO 8859-5, which never really caught on. Another common Cyrillic character encoding is Windows-1251. In the future, both may eventually give way to Unicode. KOI8 stands for Kod obmena informatsiey, 8 bit () which means "Code for Information Exchange, 8 bit". The KOI8 character sets have the property that the Russian Cyrillic letters are in pseudo-Roman order rather than the natural Cyrillic alphabetical order as in ISO 8859-5. Although this may seem unnatural, it has the useful property that if the eighth bit is stripped, the text can still be read (or at least deciphered) in case-reversed transliteration on an ordinary ASCII terminal. For instance, "Русский Текст" in KOI8-RU becomes rUSSKIJ tEKST ("Russian Text") if the 8th bit is stripped. Character set The following table shows the KOI8-RU encoding. Each character is shown with its equivalent Unicode code point. Although RFC 2319 says that character 0x95 should be U+2219 (∙), it may also be U+2022 (•) to match the bullet character in Windows-1251. Some references have a typo and incorrectly state that character 0xB4 is U+0403, rather than the correct U+0404. This typo is present in Appendix A of RFC 2319 (but the table in the main text of the RFC gives the correct mapping). See also KOI character encodings References External links Character sets
https://en.wikipedia.org/wiki/Presence%20sensing%20device
A presence sensing device (PSD) is a safety device for press brakes and similar metal-bending machines. The device operator often holds the sheet metal work-piece in one place while another portion of the piece is being formed in the die. If a foreign object is detected, the PSD immediately retracts the die or stops the motion of the ram. PSDs protect the operator and other employees in the area. Photoelectric sensors One category of presence sensing devices is Photoelectric Sensors. Light Curtains also fall into this category. Light curtains use many infrared light beams to form a perimeter around machinery. When two or more consecutively adjacent beams are interrupted, a kill-switch stops the machine until the boundary is reset. Light curtains must be placed in front of the work area. This makes it difficult for press brake operators to work on small parts. One cannot help but disrupt the beam. The operator might "mute" the light curtain in order to get the job done. Certain parts of the beam can be muted. For example, muting the front and rear of the beam allows the middle to offer continued protection for the operator. Additionally, it may be necessary to use auxiliary light beams if the operator will reach between the main light beams and the edge of certain machines. Electronic safety device Electronic safety devices use lasers or cameras to sense a foreign object in the vicinity of the press brake. They are less obtrusive than other safety options, which means operators are less opposed to using them. After some contention by the Occupational Safety and Health Administration (OSHA), an electronic safety device can fall under the PSD umbrella. One such device is the Laser Sentry press brake safety device designed by Glen Koedding in 2003. The concept was challenged with OSHA by a competitor almost immediately. OSHA responded by issuing a letter of disapproval stating that the Laser Sentry did not meet the “safe distance” rule. The rule states that a presenc
https://en.wikipedia.org/wiki/European%20Study%20Groups%20with%20Industry
A European Study Group with Industry (ESGI) is usually a week-long meeting where applied mathematicians work on problems presented by industry and research centres. The aim of the meeting is to solve or at least make progress on the problems. The study group concept originated in Oxford, in 1968 (initiated by Leslie Fox and Alan Tayler). Subsequently, the format was adopted in other European countries to form ESGIs. Currently, with a variety of names, they appear in the same or a similar format throughout the world. More specific topics have also formed the subject of focussed meetings, such as the environment, medicine and agriculture. Problems successfully tackled at study groups are discussed in a number of textbooks as well as a collection of case studies, European Success Stories in Industrial Mathematics. A guide for organising and running study groups is provided by the European Consortium for Mathematics in Industry. European Study Group with Industry A European Study Group with Industry or ESGI is a type of workshop where mathematicians work on problems presented by industry representatives. The meetings typically last five days, from Monday to Friday. On the Monday morning the industry representatives present problems of current interest to an audience of applied mathematicians. Subsequently, the mathematicians split into working groups to investigate the suggested topics. On the Friday solutions and results are presented back to the industry representative. After the meeting a report is prepared for the company, detailing the progress made and usually with suggestions for further work or experiments. History The original Study Groups with Industry started in Oxford in 1968. The format provided a method for initiating interaction between universities and private industry which often led to further collaboration, student projects and new fields of research (many advances in the field of free or moving boundary problems are attributed to the industri
https://en.wikipedia.org/wiki/Macfarlane%20Burnet%20Medal%20and%20Lecture
The Macfarlane Burnet Medal and Lecture is a biennial award given by the Australian Academy of Science to recognise outstanding scientific research in the biological sciences. It was established in 1971 and honours the memory of the Nobel laureate Sir Frank Macfarlane Burnet, OM KBE MD FAA FRS, the Australian virologist best known for his contributions to immunology and is the academy's highest award for biological sciences. Prizewinners Source: Australian Academy of Science See also List of biochemistry awards List of biology awards List of prizes named after people References Australian science and technology awards Awards established in 1971 Australian Academy of Science Awards Biochemistry awards Biology awards
https://en.wikipedia.org/wiki/Inner%20source
Inner source is the use of open source software development best practices and the establishment of an open source-like culture within organizations for the development of its non-open-source and/or proprietary software. The term was coined by Tim O'Reilly in 2000 in his column. Motivation Open source is recognized to be capable of delivering high quality software. Furthermore, the open collaboration in open source enables collaboration even between competitors (e.g. ARM and Intel working on Linux kernel on merit-based decisions). Consequently, software developing organizations want to benefit from its outcomes (the software components and tools), but also from the development practices exercised and established in the open source world. Used open source practices Besides several practices established in foundations such as Apache Software Foundation, Linux Foundation, and Eclipse Foundation, InnerSource and open source projects require open collaboration, open communication, and a proper quality assurance. Open collaboration All required development artifacts (e.g. code, documentation, issue tracker, etc.) have to be accessible for all employees of a company leveraging InnerSource. Central software forges are an essential tool for implementing open collaboration. Based on the principles of open collaboration (egalitarian, meritocratic, and self-organizing) every contributor who is willing to help an InnerSource project is typically welcome. Contributions to InnerSource projects are typically judged meritocratically based on the value they bring to the project. Meritocracy can also be enabled by open communication as decisions are discussed publicly. Although an organization does not necessarily become completely self-organizing to adopt InnerSource, InnerSource allows individuals, organizational units, and project communities a higher degree of self-organization. Open communication InnerSource projects and programs rely on open communication to make al
https://en.wikipedia.org/wiki/Alliance%20for%20Biosecurity
The Alliance for Biosecurity is a consortium of companies that develop products to respond to national security threats, including bioterrorism pathogens and emerging infectious diseases. It is headquartered in Washington DC. Background The United States faces risks to national security posed by the danger of bioterrorism or a destabilizing infectious disease pandemic. The vulnerability is considered severe because many of the vaccines and medicines that would be needed to protect people do not currently exist. The Alliance for Biosecurity is a group of pharmaceutical and biotechnology companies that work to create preventive measures and treatments for severe infectious diseases. Within the U.S. federal government, the Biomedical Advanced Research and Development Authority (BARDA) and the Project BioShield Special Reserve Fund (SRF) provide funding to research, develop, and procure a medicines to control epidemics. History The Alliance for Biosecurity was formed in 2005. Its purpose was to build a partnership between government and private sector biotechnology and pharmaceutical companies working in the biodefense space. The Center for Biosecurity, a nonprofit multidisciplinary organization of physicians public health professionals and scientists, was an organizer of the alliance and participates in it. Together, the two groups have provided congressional testimony and authored letters to Congress. In April 2018, the alliance conducted a national poll about biosecurity. Seventy-three percent of the 1,612 Americans polled said they would support a congressional decision to increase funding to address biosecurity needs and capabilities. The poll was conducted, in part, to measure support for biosecurity funding because reauthorization of the Pandemic and All-Hazards Preparedness Act (PAHPA) is due by September 30, 2018. PAHPA is a law that improved the federal government's medical and public health preparedness for national security threats. Examples of threats
https://en.wikipedia.org/wiki/Visual%20Cloud
Visual Cloud is the implementation of visual computing applications that rely on cloud computing architectures, cloud scale processing and storage, and ubiquitous broadband connectivity between connected devices, network edge devices and cloud data centers. It is a model for providing visual computing services to consumers and business users, while allowing service providers to realize the general benefits of cloud computing, such as low cost, elastic scalability, and high availability while providing optimized infrastructure for visual computing application requirements. History and overview The rise of cloud computing was enabled by a convergence of powerful, low-cost computer hardware, high-capacity networks, and advances in hardware virtualization. To satisfy high consumer demand for visually-based entertainment such as video and gaming, as well as online social interaction, service providers began to deploy visually oriented applications in centralized data centers and use distributed content delivery networks to make that content accessible to their users. Mobile consumption of video content in particular makes cloud delivery of video attractive, because remote processing and storage can compensate for the limitations of mobile devices. As much as 75% of the world's mobile data traffic is expected to be video by 2020. The first generation of visual cloud technologies were mostly oriented around streaming media applications. The mid-2000s saw the introduction of professional and user generated video-on-demand services like Netflix and YouTube, multiplayer online games (MOGs) like Call of Duty and massively multiplayer online games (MMOGs) like World of Warcraft. Another common usage of visual cloud that emerged during this timeframe is desktop virtualization based on remote desktop instances that are hosted using cloud infrastructure. As visual cloud technology has become more capable, more demanding usages have begun to emerge, such as the use of visual c