source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Uruk%20GNU/Linux | Uruk GNU/Linux-libre is a PureOS-based Linux distribution. The name Uruk is an Iraqi city that states its Iraqi origin.
Uruk GNU/Linux 1.0 was released on 13 April 2016 and it ships with the most common software for popular tasks.
Features
Uruk uses Linux-libre kernel for the system and MATE desktop environment for its graphical interfaces.
One of the special features of Uruk is the ability to run various types of package managers at ease (including GNU Guix, urpmi, pacman, dnf). It implements simple one-line command to do that, that use a program named Package Managers Simulator to simulate the commands of popular package managers.
Version history
See also
Parabola GNU/Linux-libre
Linux-libre
References
External links
Uruk Project on SourceForge.net
Operating system distributions bootable from read-only media
X86-64 Linux distributions
Free software only Linux distributions
Linux distributions |
https://en.wikipedia.org/wiki/North%20East%20Asian%20Mathematics%20Competition | The North East Asian Mathematics Competition (NEAMC) is a three-stage mathematics competition in North East Asia.
It is a qualifying competition by Eunoia Ventures for invitation to the Finals of the World Mathematics Championships.
General information
The location of the NEAMC changes annually. There are now at least two venues held annually ).
The Senior level is open to all youths in Grade 12 (Year 13) or below, the Junior level is open to Grade 9 (Year 10) or below, and the Prime Plus level is open to Grade 7 (Year 8) or below.
The competition
History
NEAMC is a three-day event for school students located in North East Asia,. Participants work alone and in teams, as well as listen to mathematician guest speakers.
NEAMC was organised in February 2014 by Malcolm Coad of Nanjing International School, China. Haese Mathematics are partners of the event since conception
Format
NEAMC competitions have:
Three days of engagement
Six skills categories for prizes
The best sum ranking across all rounds win
School teams engage within the Communication skills rounds.
The Collaboration skills rounds are in buddy teams of three (teams with random teammates).
The Challenge are skills rounds undertaken as individuals.
Three skills rounds are (subject specific skills and procedures) knowledge based, three are (plan and execute) strategy focused and three depend upon (new and imaginative ideas) creativity.
So each strategy, creative and knowledge skill category is engaged in alone, in school teams and in buddy teams.
Prizes
All participants receive a transcript of relative attainment in each of the rounds.
The highest ranked individuals in each category receive medals.
The highest ranked individuals across all rounds receive medals.
The best ranked school team across all rounds receive the NEAMC Senior or Junior Cup.
Results
Past team winners
2017 – Seoul International School, S Korea
2016 – North London Collegiate School Jeju, South Korea
2015 – Seou |
https://en.wikipedia.org/wiki/Karun%20Thapa | Karun Thapa (Nepali: करुण थापा) born on 23 March 1965) is a Nepali IT expert, film editor, 3D animator, trainer, a well-known lyricist and Ghazal writer. Karun is known for his technological contribution to Nepali IT and media industry. He has contributed by introducing Devanagari fonts in computers, introducing AVID Digital Film Editing system in Nepal and introducing 3D animation in Nepal.
Early life and education
Karun Thapa was born in 1965 (BS 2022) in Beni to a Hindu family. Karun studied till class 3 in his village school called Dhaulagiri School. He stood first in Myagdi district in a scholarship exam, got scholarship and went to Budhanilkantha School in Kathmandu. After completing high school from Budhanilkantha School, Karun went to Amrit Science College (ASCOL) to complete his intermediate in science and graduation in Computer Science from Priyadarshini College.
Career
Karun Thapa started his career a software developer and a computer trainer. He started making business software for hotels, banks, business companies, etc. and started a computer training institute in 1988.
Thapa was the first person to develop Nepali (Devanagari) font on Apple IIe and Apple Macintosh computers. UNESCO nominated Thapa to participate in the Asian Federation of Natural Language Processing (AIT, Bangkok) 1992 and the Asia Pacific Regional Seminar on Information Technology and Newspaper Publishing in Madras (from 11–14 April 1995) in recognition to the font development done by him. He also developed Limbu (Srijunga) Script and Rai (Wambule Script) in 1994. He is mentioned in the history section in a book called History, Culture and Customs of Sikkim (J. R. Subba). Thapa introduced 3D animation in Nepal and he is the first 3D animator in Nepal.
Karun Introduced AVID film editing and digital cinema in Nepal.
Filmography
Awards
Winner
Achievements
Honours
Served as Jury Member
Jury Member for the following
References
External links
Thapa, Karun
1965 births
Nep |
https://en.wikipedia.org/wiki/Society%20for%20Experimental%20Biology%20and%20Medicine | The Society for Experimental Biology and Medicine (abbreviated SEBM) is a nonprofit scientific society dedicated to promoting research in the biomedical sciences.
Founding
The SEBM was founded in 1903, after Samuel J. Meltzer proposed founding a society dedicated to experimental biology and medicine. Meltzer then teamed up with Graham Lusk to invite eight New York scientists to a conference at Lusk's home, where they discussed the possibility of founding a biomedical society. At the conference, the attendees uniformly agreed to appoint a committee for a permanent society.
Journal
The SEBM's official journal is Experimental Biology and Medicine, published by SAGE Publications. It was founded in 1904 as the Proceedings of the Society for Experimental Biology and Medicine, and obtained its current name in 2001.
References
External links
Non-profit organizations based in Washington, D.C.
Organizations established in 1903
Biology organizations
1903 establishments in New York (state)
Medical associations based in the United States |
https://en.wikipedia.org/wiki/Philco%20computers | Philco was one of the pioneers of transistorized computers. After the company developed the surface barrier transistor, which was much faster than previous point-contact types, it was awarded contracts for military and government computers. Commercialized derivatives of some of these designs became successful business and scientific computers. The TRANSAC (Transistor Automatic Computer) Model S-1000 was released as a scientific computer. The TRANSAC S-2000 mainframe computer system was first produced in 1958, and a family of compatible machines, with increasing performance, was released over the next several years.
However, the mainframe computer market was dominated by IBM. Other companies could not deploy resources for development, customer support and marketing on the scale that IBM could afford, making competition in this segment difficult after the introduction of the IBM 360 family. Philco went bankrupt and was purchased in 1961 by Ford Motor Company, but the computer division carried on until the Philco division of Ford exited the computer business in 1963. The Ford company maintained one Philco mainframe in use until 1981.
The surface-barrier transistor
The surface-barrier transistor developed by Philco in 1953 had a much higher frequency response than the original point-contact transistors. The transistor was made of a thin crystal of germanium, which was electrolytically etched with pits on either side forming a very thin base region, on the order of 5 micrometers. Philco's process for etching was United States patent number 2,885,571. Philco surface-barrier transistors were used in TX-0, and in early models of what would become the DEC PDP product line. Although relatively fast, the small size of the devices limited their power to circuits operating at a few tens of milliwatts.
Military and government
Between 1955 and 1957, Philco built transistor computers for use in aircraft, models C-1000, C-1100, and C-1102, intended for airborne real-tim |
https://en.wikipedia.org/wiki/Host-directed%20therapeutics | Host-directed therapeutics, also called host targeted therapeutics, act via a host-mediated response to pathogens rather than acting directly on the pathogen, like traditional antibiotics. They can change the local environment in which the pathogen exists to make it less favorable for the pathogen to live and/or grow. With these therapies, pathogen killing, e.g.bactericidal effects, will likely only occur when it is co-delivered with a traditional agent that acts directly on the pathogen, such as an antibiotic, antifungal, or antiparasitic agent. Several antiviral agents are host-directed therapeutics, and simply slow the virus progression rather than kill the virus. Host-directed therapeutics may limit pathogen proliferation, e.g., have bacteriostatic effects. Certain agents also have the ability to reduce bacterial load by enhancing host cell responses even in the absence of traditional antimicrobial agents.
Types
Immunomodulatory
Intracellular pathogens often reside in immune cells like macrophages. These pathogens can be obligate or facultative intracellular pathogens. Changing the innate immune response of these host-cells can alter the pathogen's ability to live inside the cell. Many of these immunomodulatory host-directed therapies are adjuvants or pathogen-associated molecular patterns. They can include Toll-like receptors (TLRs), NOD-like receptors (NLRs), C-type lectin receptors (CLRs), mannose receptor (MR), dendritic cell-specific intracellular adhesion molecule 3 (ICAM3)-grabbing nonintegrin (DC-SIGN), complement receptors, Fc receptors, and DNA sensors (e.g., STING). Epithelial cells also host pathogens, like Salmonella enterica. These immunomodulatory agents can also alter the epithelial cell environments, since they also have a role in innate signalling.
Enhanced host cell function
Autophagy modulators are one type of method to enhance host cell functions. Pathogens like Mycobacterium tuberculosis (MTB), will be degraded in the autophagos |
https://en.wikipedia.org/wiki/Maths%20Pathway | Maths Pathway is an online educational website based in Melbourne, used in Australian schools to teach mathematics. It differs from traditional mathematics, as it is set up in a modular format, with students working on individual pieces of learning on a computer and worksheet. These tests are read on a laptop, and written on paper.
History
Maths Pathway was created in 2015 by Richard Wilson and Justin Matthys, who were concerned about a student decline in mathematics skills. The development started as a small website headquartered in a shed in Matthys' lawn. According to the website, it is featured in over 250 schools and used by 57,000 students.
Features
Maths Pathway uses a modular format where students select their work based on what proficiency level they are at, as opposed to every student completing the same tasks. Students are then required to be tested on what they have learned every fortnight. To use Maths Pathway, schools must pay a hefty fee for each student.
Criticism
Maths Pathway has been criticised for the ease at which students can cheat, doable by simply clicking to check your answer, leading to students not learning the modules that the software believes that they have learnt. At the beginning of 2023, in an effort to stop cheating, Maths Pathway launched a large update, which added Entrance Tickets, to review maths before you learn it, Exit Tickets, to prove that you learnt the module, and added a timer requiring questions to be answered after 5 seconds, to "ensure" that the student writes down their working, however this does not work as well as thought, as the student can still skip through modules, just slower.
References
External links
Educational math software
Australian companies established in 2015
Internet properties established in 2015
Australian educational websites
Online companies of Australia
Privately held companies of Australia
Companies based in Melbourne
Education companies of Australia
B Lab-certified corporations in |
https://en.wikipedia.org/wiki/Hope%20for%20Haiti%20Now | Hope for Haiti Now: A Global Benefit for Earthquake Relief was a charity telethon held on January 22, 2010, from 8 p.m. to 10 p.m. Eastern Standard Time (January 23, 2010 from 1 a.m. to 3 a.m. UTC). The telethon was the most widely distributed telethon in history. The event was broadcast from Studio 36 at CBS Television City in Los Angeles, Kaufman Astoria Studios in Queens, New York and a private club, The Hospital, in London. There were also live reports from Haiti.
Initial plans for the telethon were announced by MTV Networks on January 15, 2010, three days after the 2010 Haiti earthquake struck on January 12 that is assumed to have claimed the lives of about 200,000 people. The event was one of a number of humanitarian responses to the earthquake. Processing of the telethon's donations was in the hands of the Entertainment Industry Foundation. The telethon was patterned after the form begun with the 2001 America: A Tribute to Heroes program and continued with the 2005 Shelter from the Storm: A Concert for the Gulf Coast.
Funds raised by the telethon and from the sale of an accompanying album and video, which was immediately made available for pre-order on iTunes, were distributed to seven non-profit organizations doing relief work in Haiti.
Recipients
Funds were distributed to the following organizations with humanitarian operations in Haiti:
The Clinton Bush Haiti Fund
United Nations World Food Programme
Oxfam America
Partners In Health
Red Cross
UNICEF
Yéle Haiti Foundation
In 2012 The New York Times reported that a forensic audit conducted by the New York Attorney General's office found that much of the money distributed to the Yéle Haiti organization from the telethon was retained by founder Wyclef Jean and his associates for their own benefit.
Audience and proceeds raised
The event drew an estimated audience of 83 million viewers in the United States between the initial broadcast and web and mobile streams throughout the weekend.
On January 23, |
https://en.wikipedia.org/wiki/OMNI%20Entertainment%20System | The OMNI Entertainment System was an electronic stand-alone game system produced by the MB Electronics division of the Milton Bradley Company, released in 1980.
Function
The system played primarily trivia question games from 8-track tape cartridges. The game system was entirely self-contained with its own Monaural speaker and four 2-character seven segment displays to show points as well as when the game required input.
Up to four players each interacted with the game with a row of 11 electronic buttons. Buttons were primarily labelled 0-9 with the final button showing an asterisk-like symbol as an Enter key. Each button was also labelled with colors in rainbow order from yellow, to red, to blue, to green, as well as with clusters of letters. Button zero on the left doubled as a "Go" button.
The system heavily leveraged the audio format of the 8-track tape cartridge for gameplay, but additionally included binary encoded data containing information on scoring and the correct answers on non-audible channels, making the OMNI a programmable system. The system could freely change between playing audio (or reading data) from either the left or right audio channel. The system could also play regular music 8-track cartridges, although not in stereo.
Gameplay
Each 8-track tape contained four game programs, and the system featured a channel selector dial on the top to choose which program to play. After inserting a tape and adjusting volume via a slider on top next to the channel selector, each player participating would need to press enter. Subsequently, players would be asked questions played back from the tape. Players would then be asked to answer as quickly as possible (indicated by dashes on the display), by selecting the correct colour, number, or spelling out a word and pressing Enter; this would cause the tape to advance forward and reveal the correct answer. Players were then awarded typically between 1 and 4 points, with the first player usually receiving an |
https://en.wikipedia.org/wiki/Stomatophyta | The Stomatophyta are a proposed sister branch of the Marchantiophyta (Liverworts), together forming the Embryophyta. The Stomatophyta consist of the Bryophyta (Moss), and the remainder of the Embryophyta, including the Anthocerotophyta (Hornsworts). The word stomatophyta means plant with stoma.
An updated phylogeny of Embryophyta based on the work by Novíkov & Barabaš-Krasni 2015 with plant taxon authors from Anderson, Anderson & Cleal 2007 and some clade names from Pelletier 2012 and Lecointre, et al.
References
Plants |
https://en.wikipedia.org/wiki/David%20A.%20Klarner | David Anthony Klarner (October 10, 1940March 20, 1999) was an American mathematician, author, and educator. He is known for his work in combinatorial enumeration, polyominoes, and box-packing.
Klarner was a friend and correspondent of mathematics popularizer Martin Gardner and frequently made contributions to Gardner's Mathematical Games column in Scientific American. He edited a book honoring Gardner on the occasion of his 65th birthday. Gardner in turn dedicated his twelfth collection of mathematical games columns to Klarner.
Beginning in 1969 Klarner made significant contributions to the theory of combinatorial enumeration, especially focusing on polyominoes and box-packing. Working with Ronald L. Rivest he found upper bounds on the number of n-ominoes. Klarner's Theorem is the statement that an m by n rectangle can be packed with 1-by-x rectangles if and only if x divides one of m and n.
He has also published important results in group theory and number theory, in particular working on the Collatz conjecture (sometimes called the 3x + 1 problem). The Klarner-Rado Sequence is named after Klarner and Richard Rado.
Biography
Klarner was born in Fort Bragg, California, and spent his childhood in Napa, California. He married Kara Lynn Klarner in 1961. Their son Carl Eoin Klarner was born on April 21, 1969.
Klarner did his undergraduate work at Humboldt State University (1960–63), got his Ph.D. at the University of Alberta (1963–66), and did post-doctoral work at McMaster University in Hamilton, Ontario (1966–68). He also did post-doctoral work at Eindhoven University of Technology in the Netherlands (1968-1970), at the University of Reading in England working with Richard Rado (1970–71), and at Stanford University (1971–73). He served as an assistant professor at Binghamton University (1973–79) and was a visiting professor at Humboldt State University in California (1979–80). He returned to Eindhoven as a professor (1980–81), and to Binghamton (1981–82). F |
https://en.wikipedia.org/wiki/FSC%20Millport | FSC Millport, run by the Field Studies Council, is located on the island of Great Cumbrae in the Firth of Clyde, Scotland. The field centre was formerly known as the University Marine Biological Station Millport (UMBSM), a higher education institute run by the University of London in partnership with Glasgow University but was closed due to the withdrawal of higher education funding in 2013. FSC reopened the centre in 2014 and continues to host and teach university, school and college groups and to support and host research students from all over the world, whilst also extending its educational reach and providing a variety of courses in natural history and outdoor environmental activities for adult learners and families to enjoy. The centre is a very popular conference venue hosting many international events. The Robertson Museum and Aquarium (named after the founder of the original Marine Station, David Robertson) is open to visitors between March and November. The centre also functions as a Meteorological Office Weather Station and Admiralty Tide Monitor.
History
The Ark, an 84 ft lighter originally moored in the flooded Granton quarry, was fitted out as a floating laboratory by the father of modern oceanography, Sir John Murray. This boat was brought to Port Loy on the Isle of Cumbrae in 1885 and formed the beginnings of the Scottish Marine Station. She attracted a stream of distinguished scientists, drawn by the richness of the fauna and flora of the Firth of Clyde, but gradually fell into disuse after the opening of the Millport Marine Station, and on the night of 20 January 1900 was completely destroyed by a great storm.
In 1894 a committee headed by amateur naturalist David Robertson began to build a marine station on the Isle of Cumbrae and took over the Ark. Sadly David Robertson died before completion of the centre, but in 1897 Millport Marine Biological Station (MMBS) was opened by Sir John Murray. Despite many struggles during its first few decades, |
https://en.wikipedia.org/wiki/Advanced%20Innovation%20Design%20Approach | Advanced Innovation Design Approach (AIDA) is a holistic approach for enhancing the innovative and competitive capabilities of industrial companies. The name Advanced Innovation Design Approach (AIDA) was proposed in the research project "Innovation Process 4.0" run at the University of Applied Sciences Offenburg, Germany in co-operation with 10 German industrial companies in 2015–2019.
AIDA can be considered as a pioneering mindset, an individually adaptable range of strong innovation techniques such as comprehensive front-end innovation process, advanced innovation methods, best tools and methods of the theory of inventive problem solving TRIZ, organisational measures for accelerating innovation, IT-solutions for Computer-Aided Innovation, and other tools for new product development, elaborated in the recent decade in the industry and academia.
Initially the AIDA has been conceptualised as a systemic approach including analysis, optimizations and further development of the innovation process and promoting the innovation climate in industrial companies. The innovation process with self-configuration, self-optimization, self-diagnostics and intelligent information processing and communication, is understood as a holistic system comprising following typical phases with feedback loops and simultaneous auxiliary or follow-up processes: uncovering of solution-neutral customer needs, technology and market trends, identification of the needs and problems with high market potential and formulation of the innovation tasks and strategy, systematic idea generation and problem solving, evaluation and enhancement of solution ideas, creation of innovation concepts based on solution ideas, evaluation of the innovation concepts as well as implementation, validation and market launch of chosen innovation concepts.
The Advanced Innovation Design Approach was refined and further developed for the application in the field of process engineering in the context of the EU research proj |
https://en.wikipedia.org/wiki/Stilbonematinae | Stilbonematinae is a subfamily of the nematode worm family Desmodoridae that is notable for its symbiosis with sulfur-oxidizing bacteria.
Systematics
Stilbonematinae Chitwood, 1936 belongs to the family Desmodoridae in the order Desmodorida. Nine genera have been described.
Adelphos Ott, 1997
Catanema Cobb, 1920
Centonema Leduc, 2013
Eubostrichus Greeff, 1869
Laxus Cobb, 1894
Leptonemella Cobb, 1920
Parabostrichus Tchesunov et al. 2012
Robbea Gerlach, 1956
Squanema Gerlach, 1963
Stilbonema Cobb, 1920
Description
Stilbonematines can be up to 10 mm long, with a club-like head. The worms are completely covered in a coat of ectosymbiotic sulfur-oxidizing bacteria except for the anterior region. The presence of the bacteria, which often contain intracellular inclusions of elemental sulfur, gives the worms a bright white appearance under incident light. They have small mouths and buccal cavities, and short pharynges. Many species have multicellular sensory-glandular organs in longitudinal rows along the length of the body, which secrete mucus that the bacterial symbionts are embedded in.
Stilbonematines are found in the meiofaunal habitat in marine environments. Another group of meiofaunal nematodes with sulfur-oxidizing symbionts is the genus Astomonema, although in Astomonema the bacteria are endo- rather than ectosymbionts.
Symbiosis with sulfur-oxidizing bacteria
The bacterial symbionts of stilbonematines are of different shapes and sizes, ranging from small coccoid cells to elongate crescent-like cells, but each host species has only a single morphological type associated with it. The bacterial symbionts of stilbonematines are closely related to the sulfur-oxidizing symbionts of gutless phallodriline oligochaete worms: these bacteria were all descended from a single ancestor, and each host species has its own specific bacterial species.
The bacterial symbionts are chemosynthetic, gaining energy by oxidizing sulfide from the environment, and producin |
https://en.wikipedia.org/wiki/Elizabeth%20Langdon%20Williams | Elizabeth Langdon Williams (February 8, 1879 in Putnam, Connecticut – 1981 in Enfield, New Hampshire) was an American human computer and astronomer whose work helped lead to the discovery of Pluto, or Planet X.
Personal life and education
Elizabeth Langdon Williams was born to Elizabeth Brigham and Louis M. Williams on February 8, 1879 in Putnam, Connecticut. She was the twin of Robert Longfellow Williams, and the older sister of Henry Trumbell Williams and Ursula Louise Williams. She graduated from MIT with a degree in physics in 1903 as one of their earliest female graduates, and was the first woman to play an honor part during graduation. She read part of her thesis, "An analytical study of the Fresnel wave-surface" at the ceremony, and was said to have widely impressed all in attendance. She was at the top of her class and said to be ambidextrous, writing cursive with her right hand and print with her left hand. In 1922, Williams married George Hall Hamilton, another astronomer who was born in London on June 30, 1884 and educated at Cambridge. He worked at the Lowell Observatory in Flagstaff, Arizona, where he met Williams, from 1917 to 1922.
Career
Williams was hired by Percival Lowell in 1905 to work from his State Street office in Boston. She initially edited publications for Lowell until she was asked to be a human computer for his Planet X research that began in 1910.
Planet X
Lowell hypothesized that a proposed Planet X affected the orbits of the known planets Neptune and Uranus. Williams' role in the Planet X project was that of head human computer, performing mathematical calculations on where Lowell should search for an unknown object and its size based on the differences in the orbits of Neptune and Uranus. Her calculations led to predictions for the location of the unknown planet, but Lowell died in 1916 and the project was discontinued. In the late 1920s, however, the project was resumed and Clyde Tombaugh was hired to lead it. Tombaugh used |
https://en.wikipedia.org/wiki/Laser%2050 | The Laser 50 is an educational portable computer sold by Vtech that ran the BASIC programming language. It was released in 1984.
Specifications
The Laser 50 used a Zilog Z80 central processing unit running at 3.5 MHz, 2 kB to 18 kB of RAM, a 12 kB ROM, and a 80x7 dots LCD screen.
Microcomputers |
https://en.wikipedia.org/wiki/Astomonema | Astomonema is a genus of nematode worms in the family Siphonolaimidae. They lack a mouth or conventional digestive tract, but contain symbiotic sulfur-oxidizing bacteria that serve as their primary food source. They live in the marine interstitial habitat.
Systematics
The genus was first described in 1982 from specimens collected at the coast of North Carolina. It belongs to the subfamily Astomonematinae within the family Siphonolaimidae, along with another genus Parastomonema; both these genera have reduced digestive systems and paired ovaries. Five species of Astomonema have been described.
Astomonema jenneri Ott, Rieger, Rieger & Enderes, 1982
Astomonema obscura (Boucher & Helléouët, 1977)
Astomonema otti Vidakovic & Boucher, 1987
Astomonema southwardorum Austen, Warwick & Ryan, 1993
Astomonema brevicauda (Vitiello, 1971) Vidakovik & Boucher, 1987 (taxon inquirendum)
Description
Worms of the type species Astomonema jenneri are long and slender, with a maximum body diameter of 25.5 to 30 µm, but body length between 4.6 to 16.3 mm. Astomonema and the related genus Parastomonema are distinguished from other members of the family Siphonolaimidae by their lack of a mouth, highly reduced pharynx, and modified midgut that contains prokaryotic symbionts. Features that they share with other Siphonolaimidae include the overall body shape (long, slender and cylindrical, only slightly tapered at the front), conspicuous amphidial glands, large nerve ring, lack of setae on the body, and ability to heal wounds readily when the body is injured or broken.
Symbiosis with bacteria
Although nematodes in this genus lack a conventional gut, they have a chain of long, thin, and slender cells that run down the center of the body. These cells are interpreted as a rudimentary or highly-modified gut wall, and they have few organelles besides nuclei and mitochondria. This central layer of cells contains symbiotic bacteria, which are intracellular in A. jenneri but extracellular |
https://en.wikipedia.org/wiki/Artifact%20%28video%20game%29 | Artifact is a 2018 digital collectible card game developed and published by Valve for Windows, macOS, and Linux. It focuses on online player-versus-player battles and is based on the universe of Dota 2, a multiplayer online battle arena game by Valve. Artifact was designed by Magic: The Gathering creator Richard Garfield.
While Artifact gameplay and drafting mechanics received praise, it was criticized for its high learning curve and monetization model, which some saw as pay-to-win. It saw a 95% decline in players within two months of its release, with only around a hundred concurrent players by mid-2019. Valve was surprised by the response, describing it as the largest discrepancy between their expectations for a game and the outcome.
Valve reworked the game as Artifact 2.0, altering several features, including removing the need to buy or trade cards with money. It was tested through a closed beta starting in March 2020. A year later, Valve announced that it had ceased development of the game, citing a lack of player interest, and made both versions of the game freeware. The original Artifact was renamed Artifact Classic and Artifact 2.0 was renamed Artifact Foundry.
Gameplay
Artifact is a digital collectible card game in which players build a deck of collectable cards purchased on the Steam Marketplace to defeat an opponent in one-on-one battles. It features many elements from the multiplayer online battle arena game Dota 2, also developed by Valve. Unlike most collectible card games, it features three "lanes" guarded by a tower at the end, with each lane existing as an independent board. The victor is the first player to either destroy a structure called the Ancient, which appears after a tower has been destroyed, or the first to destroy two towers in total. As with Dota 2, Artifact focuses on online player versus player matchmaking; it has no single-player mode beyond a tutorial mode against an AI opponent.
Each deck contains at least 40 cards, with a tota |
https://en.wikipedia.org/wiki/Push%20on%20green | Push On Green is a process for automatically updating production software systems in a safe and controlled manner. Push on green processes are intended to keep production systems up and running with minimal manual effort and minimal user-visible downtime.
References
Software development process |
https://en.wikipedia.org/wiki/Cubical%20complex | In mathematics, a cubical complex (also called cubical set and Cartesian complex) is a set composed of points, line segments, squares, cubes, and their n-dimensional counterparts. They are used analogously to simplicial complexes and CW complexes in the computation of the homology of topological spaces.
Definitions
An elementary interval is a subset of the form
for some . An elementary cube is the finite product of elementary intervals, i.e.
where are elementary intervals. Equivalently, an elementary cube is any translate of a unit cube embedded in Euclidean space (for some with ). A set is a cubical complex (or cubical set) if it can be written as a union of elementary cubes (or possibly, is homeomorphic to such a set).
Related terminology
Elementary intervals of length 0 (containing a single point) are called degenerate, while those of length 1 are nondegenerate. The dimension of a cube is the number of nondegenerate intervals in , denoted . The dimension of a cubical complex is the largest dimension of any cube in .
If and are elementary cubes and , then is a face of . If is a face of and , then is a proper face of . If is a face of and , then is a facet or primary face of .
Algebraic topology
In algebraic topology, cubical complexes are often useful for concrete calculations. In particular, there is a definition of homology for cubical complexes that coincides with the singular homology, but is computable.
See also
Simplicial complex
Simplicial homology
Abstract cell complex
References
Cubes
Topological spaces
Algebraic topology
Computational topology |
https://en.wikipedia.org/wiki/Setapp | Setapp is a subscription-based service for macOS and iOS applications released by the Ukrainian software company MacPaw in 2017. It provides access to a growing collection of software from different developers for a fixed monthly fee. App categories cover productivity, lifestyle, web development, Mac maintenance, creativity, writing, education, and personal finance. There are over 190 apps in the Setapp subscription and 1 million users.
History
Setapp launched in beta in November 2016, and was officially released in January 2017. In June 2017, Setapp reported having 10,000 subscribers worldwide, mainly in the United States but with growing audiences in the United Kingdom, Germany, and France. By November of that year, there were more than 200,000 trial users testing the service.
In November 2019, Setapp launched Setapp for Teams, a service adjusted for teams' and organizations' use.
Setapp launched an iOS version in August 2020.
Business model
Setapp introduced a subscription model for software usage akin to streaming services like Spotify and Netflix. Instead of paying a single price for a standalone application, users can use all the apps in the collection for a single monthly fee.
The philosophy behind the initiative was to give users preselected, ready-to-use software that covers both generic and job-specific tasks. Applications on Setapp are automatically updated and contain no in-app purchases or advertisements.
The main part of the revenue generated by Setapp is divided between app developers based on app usage.
System requirements
macOS version:
El Capitan 10.11 (minimum) (current version 3.1.1 requires minimum Sierra 10.12; El Capitan 10.11 requires downloading 1.18.9 from the Internet Archive)
Sierra 10.12 and later (recommended; required to install iOS apps)
iOS apps have individual minimum requirements
500 MB of free space for initial installation
Internet connection to install separate apps
Awards and recognition
Finalist at the 21st a |
https://en.wikipedia.org/wiki/Oxford%20Dictionary%20of%20Biology | Oxford Dictionary of Biology (often abbreviated to ODB) is a multiple editions dictionary published by the English Oxford University Press. With more than 5,500 entries, it contains comprehensive information in English on topics relating to biology, biophysics, and biochemistry. The first edition was published in 1985 as A Concise Dictionary of Biology. The seventh edition, A Dictionary of Biology, was published in 2015 and it was edited by Robert Hine and Elizabeth Martin.
Robert Hine studied at King's College London and University of Aberdeen and since 1984 he has contributed to numerous journals and books.
Digital and on-line availability
The sixth and seventh editions of the ODB are available online for members of subscribed institutions and for subscribed individuals via Oxford Reference.
Editions
The first edition of Oxford Dictionary of Biology was first published in 1985 and the seventh edition in 2015.
References
External links
Oxford Reference Online
2015 non-fiction books
Oxford dictionaries
Biology books
Biology terminology |
https://en.wikipedia.org/wiki/Breakthrough%20curve | A breakthrough curve in adsorption is the course of the effluent adsorptive concentration at the outlet of a fixed bed adsorber. Breakthrough curves are important for adsorptive separation technologies and for the characterization of porous materials.
Importance
Since almost all adsorptive separation processes are dynamic -meaning, that they are running under flow - testing porous materials for those applications for their separation performance has to be tested under flow as well. Since separation processes run with mixtures of different components, measuring several breakthrough curves results in thermodynamic mixture equilibria - mixture sorption isotherms, that are hardly accessible with static manometric sorption characterization. This enables the determination of sorption selectivities in gaseous and liquid phase.
The determination of breakthrough curves is the foundation of many other processes, like the pressure swing adsorption. Within this process, the loading of one adsorber is equivalent to a breakthrough experiment.
Measurement
A fixed bed of porous materials (e.g. activated carbons and zeolites) is pressurized and purged with a carrier gas. After becoming stationary one or more adsorptives are added to the carrier gas, resulting in a step-wise change of the inlet concentration. This is in contrast to chromatographic separation processes, where pulse-wise changes of the inlet concentrations are used. The course of the adsorptive concentrations at the outlet of the fixed bed are monitored.
Results
Integration of the area above the entire breakthrough curve gives the maximum loading of the adsorptive material. Additionally, the duration of the breakthrough experiment until a certain threshold of the adsorptive concentration at the outlet can be measured, which enables the calculation of a technically usable sorption capacity. Up to this time, the quality of the product stream can be maintained. The shape of the breakthrough curves contains informat |
https://en.wikipedia.org/wiki/Filecoin | Filecoin (⨎) is an open-source, public cryptocurrency and digital payment system intended to be a blockchain-based cooperative digital storage and data retrieval method. It is made by Protocol Labs and shares some ideas from InterPlanetary File System allowing users to rent unused hard drive space. A blockchain mechanism is used to register the deals. Filecoin is an open protocol and backed by a blockchain that records commitments made by the network’s participants, with transactions made using FIL, the blockchain's native currency. The blockchain is based on both proof-of-replication and proof-of-spacetime.
History
The project was launched in August 2017, and raised over $200 million within 30 minutes.
Philanthropy
In April 2021, the Filecoin Foundation donated 50,000 filecoins worth $10,000,000 to the Internet Archive. In addition, Internet Archive's founder Brewster Kahle and director of partnerships Wendy Hanamura joined the boards of advisors of Filecoin and the Filecoin Foundation for the Decentralized Web.
Network total storage power
As of July 2023, the total storage capacity was 22 EiB, and total data stored was 1.1 EiB.
See also
Distributed data store
References
External links
Decentralized cloud computing
2017 software
Cloud applications
Cryptocurrency projects
Data synchronization
Distributed data storage
File hosting for Windows
Peer-to-peer computing |
https://en.wikipedia.org/wiki/Van%20Genuchten%E2%80%93Gupta%20model | The Van Genuchten–Gupta model is an inverted S-curve applicable to crop yield and soil salinity relations. It is named after Martinus Theodore van Genuchten and Satyandra K. Gupta's work from the 1990s.
Equation
The mathematical expression is:
where Y is the yield, Ym is the maximum yield of the model, C is salt concentration of the soil, C50 is the C value at 50% yield, and P is an exponent to be found by optimization and maximizing the model's goodness of fit to the data.
In the figure: Ym = 3.1, C50 = 12.4, P = 3.75
Alternative one
As an alternative, the logistic S-function can be used.
The mathematical expression is:
where:
with Y being the yield, Yn the minimum Y, Ym the maximum Y, X the salt concentration of the soil, while A, B and C are constants to be determined by optimization and maximizing the model's goodness of fit to the data.
If the minimum Yn=0 then the expression can be simplified to:
In the figure: Ym = 3.43, Yn = 0.47, A = 0.112, B = -3.16, C = 1.42.
Alternative two
The third degree or cubic regression also offers a useful alternative.
The equation reads:
with Y the yield, X the salt concentration of the soil, while A, B, C and D are constants to be determined by the regression.
In the figure: A = 0.0017, B = 0.0604, C=0.3874, D = 2.3788. These values were calculated with Microsoft Excel
The curvature is more pronounced than in the other models.
See also
Maas–Hoffman model
References
Soil science
Mathematical modeling
Crops |
https://en.wikipedia.org/wiki/Maas%E2%80%93Hoffman%20model | The Maas–Hoffman model is a mathematical tool to characterize the relation between crop production and soil salinity. It describes the crop response by a broken line of which the first part is horizontal and the second is sloping downward. The breakpoint (Pb) or threshold is also called tolerance because up to that point the yield is unaffected by the salinity, so the salt is tolerated, while at greater salinity values the crops are affected negatively and the yield goes down.
Mathematics
Mathematically the two lines are represented by the equations:
where Y is the crop production or yield, C is the maximum yield, X is the soil salinity, A is the slope (regression coefficient) of the descending line, and B is the regression constant of that line.
In the example of the figure: C = 1.2, A = —0.10, Pb = 7.0
The value of Pb is to be found by regression analysis and optimization so that the goodness of fit of the data to the model is maximum.
The Maas–Hoffman model is used in crop tolerance to seawater.
Inverted model
For growth factors, like the depth of the watertable, that affect crop production negatively at low values while there is no effect at high values, the inverted Maas–Hoffman model can be used.
See also
Van Genuchten–Gupta model
References
Mathematical modeling
Crops
Soil science |
https://en.wikipedia.org/wiki/Nubia%20Technology | Nubia Technology is a Chinese smartphone manufacturer headquartered in Shenzhen, Guangdong. Originally established as a wholly owned subsidiary of ZTE in 2012, it became an independent company in 2015 and received a significant investment from Suning Holdings Group and Suning Commerce Group in 2016. ZTE reduced its stake in Nubia to 49.9% in 2017, officially meaning Nubia was no longer considered a subsidiary of ZTE, but more of an associate company.
In February 2016 Nubia became a sponsor of Jiangsu Suning F.C. for a reported .
The company hired footballer Cristiano Ronaldo to promote the mobile phone of the company in May 2016.
In 2017, China Daily reported that Nubia would build a factory in Nanchang, Jiangxi Province.
In April 2018, Nubia Technology launched a gaming sub-brand, named REDMAGIC (红魔). REDMAGIC announced its new 5G compatible device REDMAGIC 5G on March 12, 2020, in Shanghai. REDMAGIC is known for being the first smartphone brand to put cooling fans inside their phones. The company also unveiled a partnership with Chinese esport team Royal Never Give Up, to further expand its brand among esport enthusiasts.
On April 13, 2020, the company unveiled a brand new logo as well as its new brand vision.
In March 2022, Nubia unveiled the first gaming phone featuring an under-display camera technology, the REDMAGIC 7 Pro.
Products
Smartphone
RedMagic sub-brand
Nubia
References
External links
Manufacturing companies based in Shenzhen
Mobile phone companies of China
Mobile phone manufacturers
Electronics companies of China
Chinese brands
Flexible displays |
https://en.wikipedia.org/wiki/Brando%20Huang | Brando Huang (; born 22 March 1981) is a Taiwanese actor and television host.
Career
Born in Huwei, Yunlin, Huang is originally an engineer at Hsinchu Science and Industrial Park, but had an interest in performing since young. Discovered by comedian Hsu Hsiao-shun, Huang started out by making numerous appearances in television shows where he is known for impersonating famous personalities such as the comedian Kang Kang and musician Wu Bai.
Huang's first acting role was in the series Your Home is My Home, and he has appeared in several films and television series since, including Monga, Monga Yao Hui, Partners in Crime and At Cafe 6. In 2015, he earned a Golden Bell Award nomination for his role in the television film Let the Sunshine In.
Filmography
Television series
Film
Variety show
Music video appearances
Awards and nominations
References
External links
1981 births
Living people
People from Yunlin County
21st-century Taiwanese male actors
Taiwanese male film actors
Taiwanese male television actors
Taiwanese television presenters
Taiwanese engineers
Electronics engineers |
https://en.wikipedia.org/wiki/Anderson%20Jacobson | Anderson Jacobson, also known for a time as CXR Anderson Jacobson and today as CXR Networks, is a vendor of communications equipment. Anderson Jacobson was an early manufacturer of acoustic modems and was spun off from SRI International (then the Stanford Research Institute). In the 1970s and 1980s, the company manufactured modems, some intended for consumers. The company was acquired by CXR Telecom in 1988, at which time The Times was following Anderson Jacobson's earnings reports. The flow of new products continued.
Today the company is a privately owned communication equipment vendor supplying products to Telecom Carriers, Service Providers, and the Defense, Transport and Utility markets. The company is headquartered in Abondant, France.
History
Anderson Jacobson was primarily a California-based manufacturer of acoustic coupler modems, but they also manufactured printing terminals designed to replace
teletypes.
Modems
Anderson Jacobson began early in 1967 as a manufacturer of one of the first acoustic data couplers. This technical advancement was a step beyond directly wiring to phone lines. By 1973, the company had
acoustic coupler products that transmitted at 150, 300 and 1200 baud.
Terminals
Some of their terminals were CRTs and others were Printer/Keyboard devices.
Historical Table of Anderson Jacobson terminals
Among the terminals that were marketed by Anderson Jacobson are:
CXR
After the merger, industrial references varied, including "Anderson Jacobson (CXR)"
CXR was purchased by Emrise Corporation an international manufacturer of defense and aerospace electronic devices and subsystems and telecommunications equipment. and, in 2016 sold for 690,000 British pounds to its former chairman/CEO.
CXR, described as "manufactures network telecommunications equipment," was still operating as of 2017, albeit not in the areas for which AJ had begun in 1967.
See also
SRI International
List of SRI International spin-offs
References
External links
AJ/CXR |
https://en.wikipedia.org/wiki/Jib%20%28crane%29 | A jib or jib arm is the horizontal or near-horizontal beam used in many types of crane to support the load clear of the main support. An archaic spelling is gib.
Usually jib arms are attached to a vertical mast or tower or sometimes to an inclined boom. In other jib-less designs such as derricks, the load is hung directly from a boom which is often anomalously called a jib.
A camera jib or jib arm in cinematography is a small crane that holds nothing but the camera.
References
Mechanical engineering |
https://en.wikipedia.org/wiki/Babylon.js | Babylon.js is a real time 3D engine using a JavaScript library for displaying 3D graphics in a web browser via HTML5. The source code is available on GitHub and distributed under the Apache License 2.0.
History and progress
It was initially released in 2013 under Microsoft Public License having been developed by two Microsoft employees. David Catuhe created the 3D game engine and was helped by David Rousset (VR, Gamepad and IndexedDB support) mostly in their free time as a side-project. They were also helped by artist Michel Rousseau who contributed several 3D scenes. It is based on an earlier game engine for Silverlight's WPF based 3D system.
Catuhe's side-project then became his full-time job, and his team's primary focus.
In 2015, it was presented at the WebGL Conference in Paris. As of 2018, it has more than 190 contributors and following its promotion and application in games, including one by Ubisoft. Its use has developed into a variety of fields such as:
virtual worlds
crime data visualization
education in medicine
fashion avatars
managing Kinect on the web
military training
modelling historic sites
Product design
RDF graphs
urban underground infrastructure modelling
Technical description
The source code is written in TypeScript and then compiled into a JavaScript version. The JavaScript version is available to end users via NPM or CDN who then code their projects in JavaScript accessing the engine's API. The Babylon.js 3D engine and user code is natively interpreted by all the web browser supporting the HTML5 standard and WebGL to undertake the 3D rendering.
Modeling methodology
The 3D modeling process used is that of polygon modeling with triangular faces to be represented by shell models. Limited use of constructive solid geometry is possible though only as a transitional method to create the union, subtraction and intersection of shell models. Once created models are rendered on an HTML 5 canvas element using a shader program which determi |
https://en.wikipedia.org/wiki/Kindle%20File%20Format | Kindle File Format is a proprietary e-book file format created by Amazon.com that can be downloaded and read on devices like smartphones, tablets, computers, or e-readers that have Amazon's Kindle app. E-book files in the Kindle File Format originally had the filename extension .azw; version 8 (KF8) introduced HTML5 & CSS3 features and have the .azw3 extension, and version 10 introduced a new typesetting and layout engine featuring hyphens, kerning, & ligatures and have the .kfx extension.
History
Kindle devices and apps are designed to use Amazon's e-book formats: AZW that is based on Mobipocket; in fourth generation and later Kindles, AZW3, also called KF8; and in seventh generation and later Kindles, KFX. When uploaded via the Send to Kindle service Kindles now support the EPUB file format used by many other e-book readers. Similar to EPUB, Amazon's file formats are intended for reflowable, richly formatted e-book content and support DRM restrictions, but unlike EPUB, they are proprietary formats. AZW files debuted with the first Amazon Kindle in 2007.
Software such as the free and open source Calibre, Amazon's KindleGen, and the email based Send-to-Kindle service are available to convert e-books into supported Kindle file formats. Kindle devices can also display some generic document formats such as plain text (TXT) and Portable Document Format (PDF) files; however, reflowing is not supported for these file types.
In late 2011, the Kindle Fire introduced "Kindle Format 8" (KF8), also known as AZW3 file format. AZW3 supports a subset of HTML5 and CSS3 features, while acting as a container for a backwards-compatible MOBI content document.
In August 2015, all the Kindle e-readers released within the previous two years were updated with a new typesetting and layout engine that adds hyphens, kerning and ligatures to the text; e-books that support this engine require the use of the "Kindle Format 10" (KFX) file format. E-books that support the enhanced typesettin |
https://en.wikipedia.org/wiki/The%20Flintstones%20%281988%20video%20game%29 | The Flintstones is a 1988 video game based on the 1960s television series The Flintstones. The game was developed by Teque Software Development and published by Grandslam Entertainments. The game was released in Europe in 1988, for Amiga, Amstrad CPC, Atari ST, Commodore 64, MSX, and ZX Spectrum. A version for the Sega Master System was released in 1991.
Gameplay
Each version of The Flintstones features identical gameplay. The game contains four levels. The story begins with Fred Flintstone finishing work at a rock quarry and exclaiming "Yabba dabba doo!" which is the game's only spoken line of dialogue, achieved through speech synthesis. For the remainder of the game, character interactions are done through speech balloons.
Fred wants to bowl with Barney Rubble at a bowling alley, but Fred's wife, Wilma, tells him that he must paint their living room first for the arrival of her mother. Playing as Fred, the player must paint the room while also preventing his young daughter, Pebbles, from scribbling on the walls. The player's paintbrush is a squirrel. When stopping Pebbles, the squirrel sometimes runs away and must be captured.
In the second level, Fred must race to the bowling alley while avoiding rocks on the road. Hitting a rock results in the vehicle losing a wheel, requiring the player to search for a replacement and get back on the road. The third level is played as a bowling game between Fred and Barney, with the two players taking turns. In the final level, Fred returns home and discovers that Pebbles is missing from the house. He finds her climbing a construction site and competes against Barney to rescue her, while avoiding nuts and bolts.
A practice mode allows the player to explore each area. A rendition of the theme music from the television series was created by Ben Daglish, and is present throughout the game, except for the ZX Spectrum version.
Reception
The Games Machine criticized the bowling level for "the long-winded restacking of the pins |
https://en.wikipedia.org/wiki/Police%20body%20camera | In policing equipment, a police body camera or 'wearable camera', also known as body worn video (BWV), 'body-worn camera' (BWC), or body camera, is a wearable audio, video, or photographic recording system used by police to record events in which law enforcement officers are involved, from the perspective of the officer wearing it. They are typically worn on the torso of the body, pinned on the officer's uniform. Police body cameras are often similar to body cameras used by civilians, firefighters, or the military, but are designed to address specific requirements related to law enforcement. Body cameras were first worn by police in the United Kingdom in 2005, and have since been adopted by numerous police departments and forces worldwide.
Definition
Device
Body cameras are used by law enforcement to record their interactions with the public, or gather video evidence at crime scenes. There are numerous suppliers across the globe. Current body cameras are much lighter and smaller than the first experiments with wearable cameras as early as the late 1990s. There are several types of body cameras made by different manufacturers. Each camera basically serves the same purpose, yet some function in slightly different ways than others or have to be worn in a specific way. Some are meant to be mounted on the chest or shoulder, while others are attached to glasses or may be worn in a function similar to a headband or on a helmet.
The various needs and budgets of police departments have led to a wide range of body camera equipment to be offered in recent years. Body camera manufacturers have constantly looked for technical innovations to improve their products. Many body cameras offer specific features like HD quality, infrared, night vision, fisheye lenses, or varying degrees of view. Other features specific to law enforcement are implemented in the hardware to integrate the bodycameras with other devices or wearables. Another example are automatic triggers that start t |
https://en.wikipedia.org/wiki/Journal%20of%20Mathematical%20Analysis%20and%20Applications | The Journal of Mathematical Analysis and Applications is an academic journal in mathematics, specializing in mathematical analysis and related topics in applied mathematics. It was founded in 1960, as part of a series of new journals on areas of mathematics published by Academic Press, and is now published by Elsevier. For most years since 1997 it has been ranked by SCImago Journal Rank as among the top 50% of journals in its topic areas.
References
Elsevier academic journals
Mathematics journals
Mathematical analysis |
https://en.wikipedia.org/wiki/Quillette | Quillette () is an online magazine founded by Australian journalist Claire Lehmann. The magazine primarily focuses on science, technology, news, culture, and politics. It also has a podcast, hosted by Jon Kay.
Quillette was created in 2015 to focus on scientific topics, but has come to focus on coverage of political and cultural issues concerning freedom of speech and identity politics. It has been described as libertarian-leaning, and "the right wing's highly influential answer to Slate".
History
Quillette was founded in October 2015 in Sydney, Australia, by Claire Lehmann.
It is named after the French word "quillette" which means a withy cutting planted so that it takes root—used here as a metaphor for an essay. Lehmann stated that Quillette was created with the aim of "setting up a space where we could critique the blank slate orthodoxy" – a theory of human development which assumes individuals are largely products of nurture, not nature – but that it "naturally evolved into a place where people critique other aspects of what they see as left-wing orthodoxy".
In August 2017, Quillette published an article in which five academics expressed support for James Damore, author of the "Google's Ideological Echo Chamber" memo. According to Politico, Quillette website crashed because of the popularity of the article. Lehmann was told by her tech staff the cause may have been a DDoS attack. In its profile of Quillette, Politico reported that Lehmann knew about the grievance studies affair before it was first reported in October 2018. In response, Quillette again published comments from five like-minded academics.
In May 2019, Quillette published an article that alleged connections between antifa activists and national-level reporters who cover the far-right based on the accounts these reporters followed on Twitter. Alexander Reid Ross and another journalist who were mentioned in the article said that they and other journalists received death threats after the claims |
https://en.wikipedia.org/wiki/Type%201%20regulatory%20T%20cell | Type 1 regulatory cells or Tr1 (TR1) cells are a class of regulatory T cells participating in peripheral immunity as a subsets of CD4+ T cells. Tr1 cells regulate tolerance towards antigens of any origin. Tr1 cells are self or non-self antigen specific and their key role is to induce and maintain peripheral tolerance and suppress tissue inflammation in autoimmunity and graft vs. host disease.
Characterization and surface molecules
The specific cell-surface markers for Tr1 cells in humans and mice are CD4+ CD49b+LAG-3+ CD226+ from which LAG-3+ and CD49b+ are indispensable. LAG-3 is a membrane protein on Tr1 cells that negatively regulates TCR-mediated signal transduction in cells. LAG-3 activates dendritic cells (DCs) and enhances the antigen-specific T-cell response which is necessary for Tr1 cells antigen specificity. CD49b belongs to the integrin family and is a receptor for many (extracellular) matrix and non-matrix molecules. CD49b provides only little contribution to the differentiation and function of Tr1 cells.
They characteristically produce high levels of IL-10, IFN-γ, IL-5 and also TGF- β but neither IL-4 nor IL-2. Production of IL-10 is also much more rapid than its production by other T-helper cell types.
Tr1 cells do not constitutively express FOXP3 but only transiently, upon their activation and in smaller amounts than CD25+ FOXP3+ regulatory cells. FOXP3 is not required for Tr1 induction, nor for its function. They also express repressor of GATA-3 (ROG), while CD25+ FOXP3+ regulatory cells do not. ROG then downregulates GATA-3, a characteristic transcription factor for Th2 cells.
Tr1 cells express high levels of regulatory factors, such as glucocorticoid-induced tumor necrosis factor receptor (GITR), OX40 (CD134), and tumor-necrosis factor receptor (TNFRSF9). Resting human Tr1 cells express Th1 associated chemokine receptors CXCR3 and CCR5, and Th2-associated CCR3, CCR4 and CCR8. Upon activation, Tr1 cells migrate preferentially in response to |
https://en.wikipedia.org/wiki/Spiroligomer | Spiroligomer molecules (also known as bis-peptides) are synthetic oligomers made by coupling pairs of bis-amino acids into a fused ring system. Spiroligomer molecules are rich in stereochemistry and functionality because of the variety of bis-amino acids that are capable of being incorporated during synthesis. Due to the rigidity of the fused ring system, the three-dimensional shape of a spiroligomer molecule – as well as the display of any functional groups – can be predicted, allowing for molecular modeling and dynamics.
Synthesis
Spiroligomer molecules are synthesized in a step-wise approach by adding a single bis-amino acid at each stage of the synthesis. This stepwise elongation allows for complete control of the stereochemistry, as any bis-amino acid can be incorporated to allow for elongation; or any mono-amino acid can be added to terminate a chain. This can be accomplished using either solution-phase or solid-phase reactions. The original synthesis of spiroligomer molecule allowed for functionalization on the ends of the oligomers, but it did not allow for the incorporation of functionality on the interior diketopiperazine (DKP) nitrogens. Much work has been done to allow for the functionalization of the entire Spiroligomer molecule, as opposed to just the ends. By exploiting a neighboring group effect, Spiroligomer molecule can be synthesized with a variety of functional groups along the length of the molecule.
Structure
Spiroligomer molecules can be synthesized in any direction, and between any pair of bis-amino acids.
Spiroligomer diketopiperazines can be created between either end of a bis-amino acid.
Spiroligomer molecules are known to be conformationally rigid, due to the fused-ring backbone.
Chemical characteristics
Spiroligomer molecules are peptidomimetics, completely resistant to proteases, and not likely to raise an immune response.
Uses
Spiroligomer molecules have been utilized for a variety of applications which include catalysis, prote |
https://en.wikipedia.org/wiki/Infectious%20tolerance | Infectious tolerance is a term referring to a phenomenon where a tolerance-inducing state is transferred from one cell population to another. It can be induced in many ways; although it is often artificially induced, it is a natural in vivo process. A number of research deal with the development of a strategy utilizing this phenomenon in transplantation immunology. The goal is to achieve long-term tolerance of the transplant through short-term therapy.
History
The term "infectious tolerance" was originally used by Gershon and Kondo in 1970 for suppression of naive lymphocyte populations by cells with regulatory function and for the ability to transfer a state of unresponsiveness from one animal to another. Gershon and Kondo discovered that T cells can not only amplify but also diminish immune responses. The T cell population causing this down-regulation was called suppressor T cells and was intensively studied for the following years (nowadays they are called regulatory T cells and are again a very attractive for research). These and other research in the 1970s showed greater complexity of immune regulation, unfortunately these experiments were largely disregarded, as methodological difficulties prevented clear evidence. Later developed new tolerogenic strategies have provided strong evidence to re-evaluate the phenomenon of T cell mediated suppression, in particular the use of non-depleting anti-CD4 monoclonal antibodies, demonstrating that neither thymus nor clonal deletion is necessary to induce tolerance. In 1989 was successfully induced classical transplantation tolerance to skin grafts in adult mice using antibodies blocking T cell coreceptors in CD4+ populations. Later was shown that the effect of monoclonal antibodies is formation of regulatory T lymphocytes. It has been shown that transfer of tolerance to other recipients can be made without further manipulation and that this tolerance transfer depends only on CD4+ T-lymphocytes. Because second-generation |
https://en.wikipedia.org/wiki/Configuration%20space%20%28mathematics%29 | In mathematics, a configuration space is a construction closely related to state spaces or phase spaces in physics. In physics, these are used to describe the state of a whole system as a single point in a high-dimensional space. In mathematics, they are used to describe assignments of a collection of points to positions in a topological space. More specifically, configuration spaces in mathematics are particular examples of configuration spaces in physics in the particular case of several non-colliding particles.
Definition
For a topological space and a positive integer , let be the Cartesian product of copies of , equipped with the product topology. The nth (ordered) configuration space of is the set of n-tuples of pairwise distinct points in :
This space is generally endowed with the subspace topology from the inclusion of into . It is also sometimes denoted , , or .
There is a natural action of the symmetric group on the points in given by
This action gives rise to the th unordered configuration space of ,
which is the orbit space of that action. The intuition is that this action "forgets the names of the points". The unordered configuration space is sometimes denoted , , or . The collection of unordered configuration spaces over all is the Ran space, and comes with a natural topology.
Alternative formulations
For a topological space and a finite set , the configuration space of with particles labeled by is
For , define . Then the th configuration space of X is , and is denoted simply .
Examples
The space of ordered configuration of two points in is homeomorphic to the product of the Euclidean 3-space with a circle, i.e. .
More generally, the configuration space of two points in is homotopy equivalent to the sphere .
The configuration space of points in is the classifying space of the th braid group (see below).
Connection to braid groups
The -strand braid group on a connected topological space is
the fundamental group |
https://en.wikipedia.org/wiki/CloudMinds | CloudMinds is an operator of cloud-based systems for cognitive robotics.
History
CloudMinds was founded in 2015 and is backed by SoftBank, Foxconn, Walden Venture Investments, and Keytone Ventures. CloudMinds has developed research in smart devices, robot control, high-speed security networks, and cloud intelligence integration. CloudMinds developed the Mobile Intranet Cloud Services (MCS) based on these technologies in order to increase the information security of the cloud robot remote control. The technology has been applied in the fields of finance, medicine, the military, public safety, and large-scale manufacturing.
U.S. sanctions
In May 2020, CloudMinds was added to the Bureau of Industry and Security's Entity List due to U.S. national security concerns.
References
External links
Companies based in Beijing
Companies based in San Francisco
Robotics companies of China
Robotics companies of the United States
Cloud computing
Technology companies established in 2015
Chinese companies established in 2015
American companies established in 2015
2015 establishments in California |
https://en.wikipedia.org/wiki/International%20Union%20of%20Game%20Biologists | The International Union of Game Biologists (IUGB) is a non-profit organisation with international membership. It has its legal domicile in Cernier, Switzerland. Bylaws were signed in Moscow in 2009.
The organization aims to promote the improvement of knowledge about game biology and related fields of study such as animal population management and habitat conservation. To reach this aim, a conference has taken place every two years since 1954.
Historical development
The first meeting took place at the International Exhibition of Hunting and Game Fishing in Düsseldorf under the supervision of Fritz Nüsslein on October 16 and 17, 1954, at the suggestion of Harry Frank. A free association called "Internationaler Ring der Jagdwissenschaftler" was born. A second 1955 meeting was held in Graz, later congresses every second year. At the suggestion of H. M. Thamdrup it was supervised by a committee, later by the presidents of the old, new, and planned congress. The proceedings of the first and the second meeting were published in the Zeitschrift für Jagdwissenschaft and led to the creation of that journal, which later became the European Journal of Wildlife Research. Since Aarhus, 1957, the congress proceedings have been edited by the organiser of the meeting.
References
Biology organizations |
https://en.wikipedia.org/wiki/EURO%20Journal%20on%20Transportation%20and%20Logistics | The EURO Journal on Transportation and Logistics (EJTL) is a peer-reviewed academic journal in operations research that was established in 2011 and is now published by Elsevier. It is an official journal of the Association of European Operational Research Societies, promoting the use of mathematics in general, and operations research in particular, in the context of transportation and logistics.
The editor-in-chief is
Dominique Feillet.
Past Editor-in-Chief:
Michel Bierlaire (2011-2019).
Abstracting and indexing
The journal is abstracted and indexed in the following databases:
EBSCO Information Services
Emerging Sources Citation Index
Google Scholar
International Abstracts in Operations Research
OCLC
Research Papers in Economics
Scopus
Summon by ProQuest
Transportation Research International Documentation (TRID) of Transportation Research Board
External links
Operations research
English-language journals
Academic journals established in 2011
Transportation journals |
https://en.wikipedia.org/wiki/Equativ | Equativ (formerly known as Smart AdServer) is a French advertising technology company. Created in 2001 as part of Aufeminin, it was bought by private-equity fund Cathay Capital in 2015, and then by private-equity fund Capital Croissance for a secondary LBO in 2021. It operates mostly in the US, Europe, Latin America and Asia.
History
Equativ was created in 2001 by aufeminin.com in order to manage advertisements on the publisher's websites. It became an independent company within the same group in 2005, then expanded locally and internationally
Axel Springer, the largest digital publishing house in Europe, bought AuFeminin in 2007. Following that take-over, Equativ expanded into Europe, Latin America and the United States. In 2015, Axel Springer sold the company to private equity fund Cathay Capital for 37 million €. In 2021 private equity fund Capital Croissance became the new majority shareholder of the company for a secondary LBO, in a bid to accelerate the development of the company in the United States and in connected TV.
The company operates an adserver, an SSP and a DSP and specializes in solutions for Advanced TV and premium publishers. As of 2023, the company operates on 4 continents with a management team split between Paris, New York and London.
In February 2023, Equativ is bought by Private Equity fund Bridgepoint Group, in a transaction valued "at more than €300m".
Acquisitions
In 2019, Equativ acquired LiquidM, a global Demand Side Platform (DSP) based in Berlin.
In 2021, Equativ acquired DynAdmic, a Cookie-Free CTV and Video Advertising Platform providing Managed DSP services.
In 2022, Equativ acquired Nowtilus, a German Advanced TV specialist.
See also
Supply-side platform
Real-Time Bidding
References
Online advertising services and affiliate networks
Technology companies established in 2001
Companies based in Paris |
https://en.wikipedia.org/wiki/Azure%20Stream%20Analytics | Microsoft Azure Stream Analytics is a serverless scalable complex event processing engine by Microsoft that enables users to develop and run real-time analytics on multiple streams of data from sources such as devices, sensors, web sites, social media, and other applications. Users can set up alerts to detect anomalies, predict trends, trigger necessary workflows when certain conditions are observed, and make data available to other downstream applications and services for presentation, archiving, or further analysis.
Query Language
Users can author real-time analytics using a simple declarative SQL-like language with embedded support for temporal logic. Callouts to custom code with JavaScript user defined functions extend the streaming logic written in SQL. Callouts to Azure Machine Learning helps with predictive scoring on streaming data.
Scalability
Azure Stream Analytics is a serverless job service on Azure that eliminates the need for infrastructure, servers, virtual machines, or managed clusters. Users only pay for the processing used for the running jobs.
IoT applications
Azure Stream Analytics integrates with Azure IoT Hub to enable real-time analytics on data from IoT devices and applications.
Real-time Dashboards
Users can build real-time dashboards with Power BI for a live command and control view. Real-time dashboards help transform live data into actionable and insightful visuals.
Data Input Sources
Stream Analytics supports three different types of input sources - Azure Event Hubs, Azure IoT Hubs, and Azure Blob Storage. Additionally, stream analytics supports Azure Blob storage as the input reference data to help augment fast moving event data streams with static data.
Stream analytics supports a wide variety of output targets. Support for Power BI allows for real-time dashboarding. Event Hub, Service bus topics and queues help trigger downstream workflows. Support for Azure Table Storage, Azure SQL Databases, Azure SQL Data Warehouse, A |
https://en.wikipedia.org/wiki/Minimal%20algebra | Minimal algebra is an important concept in tame congruence theory, a theory that has been developed by Ralph McKenzie and David Hobby.
Definition
A minimal algebra is a finite algebra with more than one element, in which every non-constant unary polynomial is a permutation on its domain.
Classification
A polynomial of an algebra is a composition of its basic operations, -ary operations and the projections. Two algebras are called polynomially equivalent if they have the same universe and precisely the same polynomial operations. A minimal algebra falls into one of the following types (P. P. Pálfy)
is of type , or unary type, iff , where denotes the universe of , denotes the set of all polynomials of an algebra and is a subgroup of the symmetric group over .
is of type , or affine type, iff is polynomially equivalent to a vector space.
is of type , or Boolean type, iff is polynomially equivalent to a two-element Boolean algebra.
is of type , or lattice type, iff is polynomially equivalent to a two-element lattice.
is of type , or semilattice type, iff is polynomially equivalent to a two-element semilattice.
References
Algebra |
https://en.wikipedia.org/wiki/The%20Digital%20Standard | The Digital Standard is a technical standard which offers product testing criteria for software and Smart devices. Consumers or manufacturers can use the standards to evaluate the extent to which a product protects various digital rights including consumer privacy, information security, freedom of speech, and product ownership. A consortium of organizations including Consumer Reports, Disconnect Mobile, Ranking Digital Rights, The Cyber Independent Testing Lab, and Aspiration presented the standard in March 2017.
Using the standard
The intended use for the standard is to encourage any consumer or manufacturer to evaluate and discuss the impact which any product's digital features have on individuals and society. Since the standard is a list of questions, anyone can answer the questions for any product to generate an evaluation. Supporters of the standard argue that the answers to the questions should either be obvious or the manufacturers should voluntarily disclose the answers. Goals of the standard include setting consumer expectations for how products should protect them, communicating acceptable practices to manufacturers, and encouraging conversations about what sorts of product behavior are either beneficial or harmful to the consumers who use them.
Evaluation criteria
The digital standard makes 4 assertions about digital rights:
manufacturers should provide information security with their products
manufacturers should provide Internet privacy with their products
manufacturers should design products for consumer ownership
manufacturers should be ethical and accountable for whatever impact their products have
From the foundation of these assertions, the digital standard claims that good products will have the following characteristics:
user can see and know whatever data the product collects
users can export any data they have contributed
user owns the product
user information secure from intrusion and hacking
product default is for maximum privacy
user ca |
https://en.wikipedia.org/wiki/Tissue%20nanotransfection | Tissue nanotransfection (TNT) is an electroporation-based technique capable of gene and drug cargo delivery or transfection at the nanoscale. Furthermore, TNT is a scaffold-less tissue engineering (TE) technique that can be considered cell-only or tissue inducing depending on cellular or tissue level applications. The transfection method makes use of nanochannels to deliver cargo to tissues topically.
History
Cargo delivery methods rely on carriers, for example nanoparticles, viral vectors, or physical approaches such as gene guns, microinjection, or electroporation The various methods can be limited by size constraints or their ability to efficiently deliver cargo without damaging tissue. Electroporation is a physical method which harnesses an electric field to open pores in the normally semi-permeable cell membrane through which cargo can enter. In this process, the charges can be used to drive cargo in a specific direction.
Bulk electroporation (BEP) is the most conventional electroporation method. Benefits come in the form of high throughput and minimal set-up times. The downside of BEP is that the cell membrane experiences an uneven distribution of the electric field and many membranes receive irreversible damage from which they can no longer close, thus leading to low cell viability.
Attempts have been made to miniaturize electroporation such as microelectroporation (MEP) and nanochannel electroporation (NEP) which uses electroporation approached to deliver cargo through micro/nanochannels respectively. These techniques have shown to have higher efficiency of delivery, increased uniform transfection, and increased cell viability compared to BEP.
Technique
Tissue nanotransfection uses custom fabricated nanochannel arrays for nanoscale delivery of genetic cargo directly onto the surface of the skin. The postage stamp-sized chip is placed directly on the skin and an electric current is induced lasting for milliseconds to deliver the gene cargo with preci |
https://en.wikipedia.org/wiki/Th%209%20cell | In cell biology, TH9 cells (T helper type 9 cells, CD4+IL-9+IL-13−IFNγ − ) are a sub-population of CD4+T cells that produce interleukin-9 (IL-9). They play a role in defense against helminth infections, in allergic responses, in autoimmunity, and tumor suppression.
Characterization
TH9 cells are characterized by their cell surface expression of CD4 and CCR6 and the lack of CCR4. Additionally, they are defined by their high secretion of interleukin‑9. Besides IL-9, TH9 cells also produce IL-10 and IL-21. However, their functions in TH9 cells are still unclear.
Differentation
Th9 cells can differentiate either from naive T lymphocytes or by a shift from TH2 cells. There are numbers of cytokines, transcription factors and other molecules, that have a role in TH9 differentiation.
Cytokines in differentiation
Cytokines play a major role in development of TH9 cells. There are many cytokines impacting differentiation of TH9 cells and their production of IL-9 but IL-4 and TGF-β are indispensable for their development and polarization.
IL-4 and TGF-β are necessary for naive T lymphocytes to differentiate into TH9 cells. while TGF-β alone can switch TH2 cells into TH9 cells.
IL-2 is critical for interleukin-9 production by TH9 cells.
IL-1 may induce IL-9 in some cases, and IL-33 is able to induce IL-9 in T cells generally. Generally IL-1 family members enhance expression of Il9 gene.
IL-25 also induces IL-9 production in vivo.
Development of TH9 cells requires a balanced cytokines signaling for its establishment. All mentioned cytokines then signal through specific transcription factors, which are later on required for a TH9 polarization.
Transcription factors in differentiation
STAT6, IRF4, GATA3 are absolutely required for TH9 cell development and other such as PU.1, BATF, NF-κB, NFAT1, STAT5, AP-1 contribute to TH9 sub-population commitment and to IL-9 production.
STAT6 is activated by signaling through IL-4 receptor. Once activated, phosphorylated STAT6 |
https://en.wikipedia.org/wiki/Christian%20Hamel | Christian Hamel (4 October 1955 – 15 August 2017) was a French Professor at the Institute for Neurosciences of Montpellier, Hôpital Saint Eloi (INM) research unit INSERM 583 of the University. He studied transduction, integration and disorders of sensory and motor systems with the ultimate goal of finding treatments for degeneration of the retina and optic nerve.
Hamel discovered and described in 1993 the RPE65 protein. Retinal pigment epithelium-specific 65 kDa protein is an enzyme in the vertebral visual pigment. The next year he mapped the RPE65 gene to human chromosome 1 (mouse chromosome 3) and refined it to 1p31 by fluorescence in situ hybridization. His research interests were to find the causes of inherited diseases of the retina and optic nerve.
References
1955 births
2017 deaths
French medical researchers
Genetic engineering
Engineering |
https://en.wikipedia.org/wiki/Safety%20of%20magnetic%20resonance%20imaging | Magnetic resonance imaging (MRI) is in general a safe technique, although injuries may occur as a result of failed safety procedures or human error. During the last 150 years, thousands of papers focusing on the effects or side effects of magnetic or radiofrequency fields have been published. They can be categorized as incidental and physiological. Contraindications to MRI include most cochlear implants and cardiac pacemakers, shrapnel and metallic foreign bodies in the eyes. The safety of MRI during the first trimester of pregnancy is uncertain, but it may be preferable to other options. Since MRI does not use any ionizing radiation, its use generally is favored in preference to CT when either modality could yield the same information. (In certain cases, MRI is not preferred as it may be more expensive, time-consuming and claustrophobia-exacerbating.)
Structure and certification
In an effort to standardize the roles and responsibilities of MRI professionals, an international consensus document, written and endorsed by major MRI and medical physics professional societies from around the globe, has been published formally. The document outlines specific responsibilities for the following positions:
MR Medical Director / Research Director (MRMD) – This individual is the supervising physician who has oversight responsibility for the safe use of MRI services.
MR Safety Officer (MRSO) – Roughly analogous to a radiation safety officer, the MRSO acts on behalf of, and on the instruction of, the MRMD to execute safety procedures and practices at the point of care.
MR Safety Expert (MRSE) – This individual serves in a consulting role to both the MRMD and MRSO, assisting in the investigation of safety questions that may include the need for extrapolation, interpolation, or quantification to approximate the risk of a specific study.
The American Board of Magnetic Resonance Safety (ABMRS) provides testing and board certification for each of the three positions, MRMD, MRSO, |
https://en.wikipedia.org/wiki/Is%20Genesis%20History%3F | Is Genesis History? is a 2017 American Christian film by Thomas Purifoy Jr. that promotes the pseudoscientific notion of Young Earth creationism, a form of creation science built on beliefs that contradict established scientific facts regarding the origin of the Universe, the age of the Earth and universe, the origin of the Solar System, and the origin and evolution of life. The film suggests the Earth was created in six days of 24-hours each in opposition to day-age creationism, and also advocates the Genesis biblical narratives of Adam and Eve, the fall, the global flood, and the tower of Babel. It grossed $2.6 million in theatres and $3.3 million in video sales.
Production
The film was written, directed, and produced by Thomas Purifoy Jr., who said he was inspired to make it after his daughter watched the Bill Nye–Ken Ham debate in 2014 and began asking him questions about the creation–evolution controversy. Del Tackett, the creator of Focus on the Family's "The Truth Project", narrates the film. Interviewing thirteen creationists, the narrator of the film argues that Genesis portrays real historical events. Other speakers include creationists George Grant, Paul Nelson, Marcus R. Ross, Andrew A. Snelling, and Kurt Wise, and also Larry Vardiman in the film's bonus features.
Release history
Is Genesis History? was released into American theaters on Thursday, February 23, 2017. It was shown in 704 theaters and grossed $1.8 million in one night. Over 143,000 people saw the film that night, and its box office earnings were the highest of any film in theaters in the United States that night. The film was shown again in theaters on March 2 and 7, 2017, in the United States, and also in Canada on March 14, 2017. The film went on to earn a total box office of $2.6 million, after the encore showings. The film was re-released in around 850 theaters for an anniversary showing on February 22, 2018, with a bonus scene of Wheaton College students touring the Ark Encounter, |
https://en.wikipedia.org/wiki/PureOS | PureOS is a Linux distribution focusing on privacy and security, using the GNOME or KDE Plasma desktop environment. It is maintained by Purism for use in the company's Librem laptop computers as well as the Librem 5 smartphone.
PureOS is designed to include only free software, and is included in the list of Free Linux distributions published by the Free Software Foundation.
PureOS is a Debian-based Linux distribution, merging open-source software packages from the Debian “testing” main archive using a hybrid point release and rolling release model. The default web browser in PureOS is GNOME Web. The default search engine is DuckDuckGo.
See also
GNU Free System Distribution Guidelines
List of Linux distributions based on Debian testing
branch
References
External links
ARM operating systems
Debian-based distributions
Free mobile software
Free software only Linux distributions
GNOME Mobile
Linux distributions
Mobile Linux
Mobile operating systems
Mobile/desktop convergence
Rolling Release Linux distributions |
https://en.wikipedia.org/wiki/Drainage%20tunnel | A drainage tunnel, called an emissary in ancient contexts, is a tunnel or channel created to drain water, often from a stagnant or variable-depth body of water. It typically leads to a lower stream or river, or to a location where a pumping station can be economically run. Drainage tunnels have frequently been constructed to drain mining districts or to serve drainage districts.
Etymology
Emissary comes from Latin emissarium, from ex and mittere 'to send out'.
Ancient world
The most remarkable emissaries carry off the waters of lakes surrounded by hills.
In ancient Greece, the waters of Lake Copais were drained into the Cephisus; they were partly natural and partly artificial. In 480 BC, Phaeax built drains at Agrigentum in Sicily: they were admired for their sheer size, although the workmanship was crude.
The ancient Romans excelled in the construction of emissaries, as in all their hydraulic works, and remains are extant showing that lakes Trasimeno, Albano and Nemi were all drained by means of emissaries. The case of Lake Fucino is remarkable in two ways: the attempt to drain it was one of the rare failures of Roman engineering, and the emissary is now completely above ground and open to inspection. Julius Caesar is said to have first conceived the idea of this stupendous undertaking (Suet. Jul. 44); with the tunnels that bring his name, Claudius inaugurated what was to have been a complete drainage scheme (Tac. Ann. xii.57), but the water level dropped by just 4 meters and stabilized, leaving the lake very much there. Hadrian tried it again, but failed; and it was not until 1878 that Lake Fucino was finally drained.
The initial text of this section was an abridgment from Smith's Dictionary of Greek and Roman Antiquities (1875 edition, public domain).
Modern examples
Modern examples of drainage tunnels include the Emisor Oriente Tunnel near Mexico City as well as the Tunnel and Reservoir Plan in Chicago.
See also
Storm drain
External links
Emissarium, |
https://en.wikipedia.org/wiki/Marina%20Halac | Marina Halac (born November 17, 1979) is a professor of economics at Yale University. She is also an associate editor of Econometrica and a member of the editorial board of the American Economic Review. She was the 2016 recipient of the Elaine Bennett Research Prize, which is awarded biennially by the American Economic Association to recognize outstanding research by a woman. She received this award within the first seven years after completing her PhD in economics from the University of California, Berkeley. In 2017, she was named one of the "Best 40 under 40 Business School Professors" by Poets and Quants. She was a recipient of the George S. Eccles Research Award in 2017, which is awarded to the author of the best book or writings on economics that bridge theory and practice, as determined by top members of the Columbia Business School faculty and alumni.
Halac was born and raised in Buenos Aires and studied economics at the University of CEMA, Argentina from 1998 to 2001. Here, her professors encouraged her to pursue an advanced economics degree in the United States. Following her graduation in 2001, she and her husband, Guillermo Noguera, became research assistants at the World Bank in Washington, D.C., and then both earned doctoral degrees in economics at the University of California at Berkeley.
Her research focuses on theoretical models of how to optimally delegate decision making, such as optimal rules for firms that need to delegate investment decisions to managers with competing incentives, problems of how to motivate experimentation and innovation, the design of fiscal rules to constrain government spending, and the role of reputation in maintaining productivity, addressing strategic uncertainty with incentives and information, and inflation targeting under political pressure. Her work on relational contracting, which studies how best to design contracts in a principal-agent setting where the value of the relationship is not mutually known, suggests |
https://en.wikipedia.org/wiki/Modal%20fallacy | The formal fallacy or the modal fallacy is a special type of fallacy that occurs in modal logic. It is the fallacy of placing a proposition in the wrong modal scope, most commonly confusing the scope of what is necessarily true. A statement is considered necessarily true if and only if it is impossible for the statement to be untrue and that there is no situation that would cause the statement to be false. Some philosophers further argue that a necessarily true statement must be true in all possible worlds.
In modal logic, a proposition can be necessarily true or false (denoted and , respectively), meaning that it is logically necessary that it is true or false; or it could be possibly true or false (denoted and ), meaning that it is true or false, but it is not logically necessary that it is so: its truth or falseness is contingent. The modal fallacy occurs when there is a confusion of the distinction between the two.
Description
In modal logic, there is an important distinction between what is logically necessary to be true and what is true but not logically necessary to be so. One common form is replacing with . In the first statement, is true given but is not logically necessary to be so.
A common example in everyday life might be the following:
Mickey Mouse is the President of the United States.
The President is at least 35 years old.
Thus, Mickey Mouse is necessarily 35 years or older.
Why is this false?
The conclusion is false, since, even though Mickey Mouse is over 35 years old, there is no logical necessity for him to be. Even though it is certainly true in this world, a possible world can exist in which Mickey Mouse is not yet 35 years old. If instead of adding a stipulation of necessity, the argument just concluded that Mickey Mouse is 35 or older, it would be valid.
Norman Swartz gave the following example of how the modal fallacy can lead one to conclude that the future is already set, regardless of one's decisions; this is based on the |
https://en.wikipedia.org/wiki/Tudor%20Ratiu | Tudor Stefan Rațiu (born March 18, 1950 in Timișoara) is a Romanian-American mathematician who has made contributions to geometric mechanics and dynamical systems theory.
Education
His father, Mircea Ratiu, an engineer, was the younger brother of Ion Rațiu, a well-known Romanian politician, while his mother, Rodica Bucur, was a piano professor at the Conservatory of Music in Timișoara. Ratiu did his undergraduate studies at the University of Timișoara, completing his B.Sc. in 1973 and his M.S. in 1974.
After moving to the United States, he completed his Ph.D. degree at the University of California, Berkeley in 1980; his dissertation, written under the supervision of Jerrold E. Marsden, was titled Euler-Poisson Equations on Lie Algebras.
Career
From 1980 to 1983 he was a T. H. Hildebrandt Research Assistant Professor at the University of Michigan, after which he became an Associate Professor of Mathematics at the University of Arizona. In 1987 he moved to the University of California, Santa Cruz, where he became a Professor of Mathematics in 1988.
In 1998 Ratiu moved to the École Polytechnique Fédérale de Lausanne, where he was a professor until 2015. In 2014–15, he was a Professor of Mathematics at the Skolkovo Institute of Science and Technology in Russia. Since 2016 he is a professor at Shanghai Jiao Tong University in China.
Ratiu received a Sloan Research Fellowship in 1980, and he became a fellow of the American Mathematical Society in 2012.
Publications
References
External links
1950 births
Living people
Scientists from Timișoara
20th-century Romanian mathematicians
21st-century Romanian mathematicians
Politehnica University of Timișoara alumni
University of California, Berkeley alumni
University of Michigan faculty
University of Arizona faculty
University of California, Santa Cruz faculty
Academic staff of the École Polytechnique Fédérale de Lausanne
Academic staff of Shanghai Jiao Tong University
Dynamical systems theorists
Fellows of the America |
https://en.wikipedia.org/wiki/Contralateral%20brain | The contralateral organization of the forebrain (Latin: contra‚ against; latus‚ side; lateral‚ sided) is the property that the hemispheres of the cerebrum and the thalamus represent mainly the contralateral side of the body. Consequently, the left side of the forebrain mostly represents the right side of the body, and the right side of the brain primarily represents the left side of the body. The contralateral organization involves both executive and sensory functions (e.g., a left-sided brain lesion may cause a right-sided hemiplegia). The contralateral organization is only present in vertebrates.
According to the current theory, the forebrain is twisted about the long axis of the body, so that not only the left and right sides, but also dorsal and ventral sides, are interchanged (see also ).
Anatomy
Anatomically, the contralateral organization is manifested by major decussations (based upon the Latin notation for ten, 'deca,' as an uppercase 'X') and chiasmas (after the Greek uppercase letter 'Χ,' chi). A decussation denotes a crossing of bundles of axonal fibres inside the central nervous system. As a result of such decussations: The efferent connections of the cerebrum to the basal ganglia, the cerebellum and the spine are crossed; and the afferent connections from the spine, the cerebellum and the pons to the thalamus are crossed. Thus, motor, somatosensory, auditory, and visual primary regions in the forebrain predominantly represent the contralateral side of the body.
Two of the cranial nerves show chiasmas: (1) the chiasm of the optic tract (i.e., cranial nerve II), which originates from the eyes and inserts on the optic tectum of the midbrain; and (2) the trochlear nerve (i.e., cranial nerve IV), which originates in the ventral midbrain and innervates one of the six muscles that rotate the eye (i.e., the superior oblique muscle).
The contralateral organization is incomplete
Although the forebrain of all vertebrates shows a contralateral organizati |
https://en.wikipedia.org/wiki/Single-Chip%20Module | A single-chip module (SCM) is a chip package with only one die. Contrasts with multi-chip modules, where multiple dies are placed on a chip package.
See also
System in a package (SIP)
Hybrid integrated circuit
Chip carrier Chip packaging and package types list
Multi-chip module (MCM)
References
Semiconductor packages |
https://en.wikipedia.org/wiki/Keynes%E2%80%93Ramsey%20rule | In macroeconomics, the Keynes–Ramsey rule is a necessary condition for the optimality of intertemporal consumption choice. Usually it is expressed as a differential equation relating the rate of change of consumption with interest rates, time preference, and (intertemporal) elasticity of substitution. If derived from a basic Ramsey–Cass–Koopmans model, the Keynes–Ramsey rule may look like
where is consumption and its change over time (in Newton notation), is the discount rate, is the real interest rate, and is the (intertemporal) elasticity of substitution.
The Keynes–Ramsey rule is named after Frank P. Ramsey, who derived it in 1928, and his mentor John Maynard Keynes, who provided an economic interpretation.
Mathematically, the Keynes–Ramsey rule is a necessary first-order condition for an optimal control problem, also known as an Euler–Lagrange equation.
See also
Ramsey–Cass–Koopmans model
References
Further reading
Economic growth
Intertemporal economics
Mathematical optimization |
https://en.wikipedia.org/wiki/Math%20Prize%20for%20Girls | The Advantage Testing Foundation Math Prize for Girls, often referred to as The Math Prize for Girls, is an annual mathematics competition open to female high school students from the United States and Canada. The competition offers the world’s largest single monetary math prize in a math contest for young women. In 2017, the First-Place prize was $46,000 (split equally amongst the three-way tie for first) with another $9,000 divided among the remaining finalists. Girls may win a maximum of $100,000 by participating in the competition over multiple years. Organized each year by the Advantage Testing Foundation, the competition is considered to be the preeminent female math competition for young women in North America.
The single-day annual contest is open to female high-school students in 12th grade or below, from the United States and Canada who have attained a qualifying score on the American Mathematics Competitions Exams, specifically the AMC 10 or AMC 12 given in February each year. Up to 300 participants are then selected each year for the competition. Participants must complete 20 short-answer problems in geometry, algebra, trigonometry, and other math topics in 150 minutes. The exams are then reviewed by a panel of judges, who award cash prizes to the top-scoring participants.
History
The competition was founded in 2009 by Arun Alagappan and Dr. Ravi Boppana in an effort to inspire the next generation of female mathematicians and create a community of young women who share a passion for math. Boppana, the competition’s cofounder and Director, said in a statement that "the Math Prize was created to debunk gender stereotypes, and to support young women who see higher-level mathematics as a pursuit that is challenging, fun, and incredibly rewarding.” The first two years of the competition were held at NYU, and since 2011, the competition has been held annually at MIT in Cambridge, Massachusetts.
Winners
The annual first-place winners of The Math Priz |
https://en.wikipedia.org/wiki/Classical%20Electrodynamics%20%28book%29 | Classical Electrodynamics is a textbook written by theoretical particle and nuclear physicist John David Jackson. The book originated as lecture notes that Jackson prepared for teaching graduate-level electromagnetism first at McGill University and then at the University of Illinois at Urbana-Champaign. Intended for graduate students, and often known as Jackson for short, it has been a standard reference on its subject since its first publication in 1962.
The book is notorious for the difficulty of its problems, and its tendency to treat non-obvious conclusions as self-evident. A 2006 survey by the American Physical Society (APS) revealed that 76 out of the 80 U.S. physics departments surveyed require all first-year graduate students to complete a course using the third edition of this book.
Overview
Advanced topics treated in the first edition include magnetohydrodynamics, plasma physics, the vector form of Kirchhoff's diffraction theory, special relativity, and radiation emitted by moving and colliding charges. Jackson's choice of these topics is aimed at students interested in theoretical physics in general and nuclear and high-energy physics in particular. The necessary mathematical methods include vector calculus, ordinary and partial differential equations, Fourier series, and some special functions (the Bessel functions and Legendre polynomials).
In the second edition, some new topics were added, including the Stokes parameters, the Kramers–Kronig dispersion relations, and the Sommerfeld–Brillouin problem. The two chapters on special relativity were rewritten entirely, with the basic results of relativistic kinematics being moved to the problems and replaced by a discussion on the electromagnetic Lagrangian. Materials on transition and collision radiation and multipole fields were modified. 117 new problems were added.
While the previous two editions use Gaussian units, the third uses SI units, albeit for the first ten chapters only. Jackson wrote that th |
https://en.wikipedia.org/wiki/Plane%20of%20polarization | For light and other electromagnetic radiation, the plane of polarization is the plane spanned by the direction of propagation and either the electric vector or the magnetic vector, depending on the convention. It can be defined for polarized light, remains fixed in space for linearly-polarized light, and undergoes axial rotation for circularly-polarized light.
Unfortunately the two conventions are contradictory. As originally defined by Étienne-Louis Malus in 1811, the plane of polarization coincided (although this was not known at the time) with the plane containing the direction of propagation and the magnetic vector. In modern literature, the term plane of polarization, if it is used at all, is likely to mean the plane containing the direction of propagation and the electric vector, because the electric field has the greater propensity to interact with matter.
For waves in a birefringent (doubly-refractive) crystal, under the old definition, one must also specify whether the direction of propagation means the ray direction (Poynting vector) or the wave-normal direction, because these directions generally differ and are both perpendicular to the magnetic vector (Fig.1). Malus, as an adherent of the corpuscular theory of light, could only choose the ray direction. But Augustin-Jean Fresnel, in his successful effort to explain double refraction under the wave theory (1822 onward), found it more useful to choose the wave-normal direction, with the result that the supposed vibrations of the medium were then consistently perpendicular to the plane of polarization. In an isotropic medium such as air, the ray and wave-normal directions are the same, and Fresnel's modification makes no difference.
Fresnel also admitted that, had he not felt constrained by the received terminology, it would have been more natural to define the plane of polarization as the plane containing the vibrations and the direction of propagation. That plane, which became known as the plane of vib |
https://en.wikipedia.org/wiki/Constantin%20Philipsen | Lauritz Carl Constantin Philipsen (1 December 1859 in Copenhagen; died 23 August 1925 Copenhagen) is credited as one of the founders of the Cinema of Denmark.
Biography
Philipsen, a photographer toured Scandinavian nations from 1898 with his magic lantern He eventually sold his photography business to enter the emerging world of cinema on a full-time basis.
Philipsen opened Denmark's first viable cinema the 158 seat Kosmorama in 1904 in Copenhagen He opened 26 more Kosmorama Cinemas in Denmark between 1905 and 1906. Though the majority of cinemas seated at most 300-400 people, Philipsen opened the large Palace Cinema seating 2500 and using a 30 piece orchestra in to former site of Copenhagen's Grand Central Railway station
In addition to owning cinemas Philipsen began producing his own films from 1909.
Legacy
His son Preben Philipsen (1910–2005) named his Constantin Film company after his father.
Notes
External links
Danish film producers
1859 births
1925 deaths
Burials at the Garrison Cemetery, Copenhagen |
https://en.wikipedia.org/wiki/EZCast | EZCast is a line of digital media players, built by Actions Microelectronics, that allows users to mirror media content from smart devices, including mobile devices, personal computers, and project to high-definition televisions.
History
The first generation of EZCast was developed in 2013, shipped 1 million units within a year, and accumulated more than 2 million EZCast app users worldwide. The latest device in the family, called EZCast 4K, was launched in November 2016 which supports 4K HEVC video streaming.
EZCast technology is built into a dongle that interacts with EZCast app to stream content from smart devices, and it works across Android, ChromeOS, iOS, macOS, Windows and Windows Phone.
EZCast SDK has been released to enable third party development on Android and iOS.
In 2018 became possible to voice control EZCast 2 and EZCast 4K devices using Google Assistant.
References
Electronics companies of Taiwan
Wireless display technologies |
https://en.wikipedia.org/wiki/Enrollment%20over%20Secure%20Transport | The Enrollment over Secure Transport, or EST is a cryptographic protocol that describes an X.509 certificate management protocol targeting public key infrastructure (PKI) clients that need to acquire client certificates and associated certificate authority (CA) certificates. EST is described in . EST has been put forward as a replacement for SCEP, being easier to implement on devices already having an HTTPS stack. EST uses HTTPS as transport and leverages TLS for many of its security attributes. EST has described standardized URLs and uses the well-known Uniform Resource Identifiers (URIs) definition codified in .
Operations
EST has a following set of operations:
Usage example
The basic functions of EST were designed to be easy to use and although not a REST API, it can be used in a REST-like manner using simple tools such as OpenSSL and cURL.
A simple command to make initial enrollment with a pre-generated PKCS#10 Certificate Signing Request (stored as device.b64), using one of the authentication mechanisms (username:password) specified in EST is:
The issued certificate, returned as a Base64 encoded PKCS#7 message, is stored as device-p7.b64.
See also
Certificate Management Protocol (CMP)
Certificate Management over CMS (CMC)
Simple Certificate Enrollment Protocol (SCEP)
Automated Certificate Management Environment (ACME)
References
, official specification
Implementations
The library libest is a client and server implementation of EST.
Bouncy Castle API offers EST API library for Java.
DigiCert IoT Trust Manager is a server implementation of EST.
EJBCA, a CA software, implements a subset of the EST functions.
Evertrust Horizon implements .
Entrust CA PKIs support EST functions
Sectigo Certificate Manager implements .
The strongSwan pki --est tool is a client implementation of EST.
Public key infrastructure
Cryptographic protocols
Computer security
Internet Standards |
https://en.wikipedia.org/wiki/Phase%20shift%20torque%20measurement | Phase shift torque measurement is carried out by a torquemeter that uses a shaft connected between rotating machines such as a turbine and compressor or jet engine under test and a dynamometer. A gear at each end of the shaft is surrounded by a coil. The gear produces a sine wave in the coil's eddy current magnetic field. Under no load the waves are in line with each other, as a load is applied to the shaft the waves shift out of phase with each other. Using Young's modulus calculations for the stiffness of the material the load or torque through the shaft can be measured highly accurately at speeds up to 150,000 rpm and torque up to 400,000 Nm.
Torque
Measurement
Dynamometers
Mechanical engineering |
https://en.wikipedia.org/wiki/Axial%20twist%20theory | The axial twist theory (aka axial twist hypothesis) is a scientific theory put forward to explain a range of unusual aspects of the body plan of vertebrates (including humans). It proposes that the rostral part of the head is "turned around" regarding the rest of the body. This end-part consists of the face (eyes, nose, and mouth) as well as part of the brain (cerebrum and thalamus). According to the theory, the vertebrate body has a left-handed chirality.
The theory gives a phenomenal explanation and addresses how and when the twist between the end of the head and the rest of the body develops. It addresses the possible evolutionary history. The goal is to make testable predictions. For example, the theory predicted the aurofacial asymmetry, which was then found empirically.
Explained phenomena include:
Contralateral organization of the brain
Left-sided orientation of the heart
Asymmetric position of the gastrointestinal tract, the liver, and the pancreas
Optic chiasm
chiasm of the trochlear nerve
Non-crossed olfactory tract
Aurofacial asymmetry
Yakovlevian torque
Asymmetry of the thoracal vertebra
According to the axial twist developmental model, the anterior part of the head turns against the rest of the body, except for the inner organs. Due to this twist, the forebrain and face are turned around such that left and right, but also anterior and posterior are flipped in the adult vertebrate. There are some popular science videos and podcasts on the topic.
History
The idea of a twist responded to severe inconsistencies in the prevailing scientific hypotheses to explain the contralateral organization of the forebrain (cerebrum and thalamus). Briefly, the visual map theory by Santiago Ramón y Cajal proposes that the optic chiasm restores the retinal image on the visual cortex, but the loop of the optic radiation destroys this potential repair again, so there is no such consistency. The parcellation theory proposes that an increasing brain size can conse |
https://en.wikipedia.org/wiki/Olech%20theorem | In dynamical systems theory, the Olech theorem establishes sufficient conditions for global asymptotic stability of a two-equation system of non-linear differential equations. The result was established by Czesław Olech in 1963, based on joint work with Philip Hartman.
Theorem
The differential equations , , where , for which is an equilibrium point, is uniformly globally asymptotically stable if:
(a) the trace of the Jacobian matrix is negative, for all ,
(b) the Jacobian determinant is positive, for all , and
(c) the system is coupled everywhere with either
References
Theorems in dynamical systems
Stability theory |
https://en.wikipedia.org/wiki/Supermicro | Super Micro Computer, Inc., dba Supermicro, is an information technology company based in San Jose, California. It has manufacturing operations in the Silicon Valley, the Netherlands and at its Science and Technology Park in Taiwan. Founded on November 1, 1993, Supermicro is one of the largest producers of high-performance and high-efficiency servers. It also provides server management softwares, and storage systems for various markets, including enterprise data centers, cloud computing, artificial intelligence, 5G and edge computing.
Supermicro's stock trades under the ticker symbol SMCI on the Nasdaq exchange. Its fiscal year 2023 revenues were $7.1 billion and employs over 5,000 globally.
History
In 1993, Supermicro began as a 5 person operation run by Charles Liang alongside his wife and company treasurer, Chiu-Chu Liu, known as Sara. Prior to founding Supermicro, Liang earned a B.S. in Electrical Engineering from the National Taiwan University of Science and Technology and a M.S. in Electrical Engineering from the University of Texas at Arlington. Liang holds several patents for server technology and was previously the president and chief design engineer of Micro Center Computer, a motherboard design and manufacturing company, from July 1991 to August 1993.
International expansion, initial public offering
In 1996, the company opened a manufacturing subsidiary, Ablecom, in Taiwan, which is run by Charles's brother, Steve Liang and Bill Liang. Charles Liang and his wife own close to 31 percent of Ablecom, while Steve Liang and other members of the family own close to 50 percent. In 1998, Supermicro opened a subsidiary in the Netherlands.
In 2006, Supermicro pleaded guilty to a felony charge and paid a $150,000 fine due to a violation of a United States embargo against the sale of computer systems to Iran. In a plea agreement, it was acknowledged that Supermicro became aware of the investigation in February 2004 and set up an export-control program that same |
https://en.wikipedia.org/wiki/Parallel%20force%20system | In mechanical engineering, a parallel force system is a situation in which two forces of equal magnitude act in the same direction within the same plane, with the counter force in the middle. An example of this is a see saw. The children are applying the two forces at the ends, and the fulcrum in the middle gives the counter force to maintain the see saw in neutral position. Another example are the major vertical forces on an airplane in flight (see image at right).
References
Force
Classical mechanics
Mechanics
Mechanical engineering |
https://en.wikipedia.org/wiki/Solid%20phase%20sequencing | The principle of solid phase DNA sequencing was described in 1989 based on binding of biotinylated DNA to streptavidin-coated magnetic beads and elution of single DNA strands selectively using alkali. The method allowed robotic applications suitable for clinical sequencing, but the magnetic handling has also found frequent use in many molecular applications, including sample handling for DNA diagnostics. The use of solid phase methods for DNA handling is now frequently used as an integrated part of many of the next generation DNA sequencing methods, as well as numerous molecular diagnostics applications.
References
Biotechnology |
https://en.wikipedia.org/wiki/Transitional%20B%20cell | Transitional B cells are B cells at an intermediate stage in their development between bone marrow immature cells and mature B cells in the spleen. Primary B cell development takes place in the bone marrow, where immature B cells must generate a functional B cell receptor (BCR) and overcome negative selection induced by reactivity with autoantigens. Transitional cells can be found in the bone marrow, peripheral blood, and spleen, and only a fraction of the immature B cells that survive after the transitional stage become mature B cells in secondary lymphoid organs such as the spleen.
Characteristic of transitional cells
The term "transitional B cell" was first used in 1995 for cells that are developmentally intermediate between immature bone marrow B lineage cells and fully mature naïve B cells in the peripheral blood and secondary lymphoid tissues, found in mice. In humans, it is postulated that the transitional cells, after leaving the bone marrow, are subjected to peripheral checks to prevent the production of autoantibodies. Transitional B cells that survive selection against autoreactivity develop eventually into naive B cells. Given the fact that only a small fraction of immature B cells survive the transition to the mature naive stage, the transitional B cell compartment is widely believed to represent a key negative selection checkpoint for autoreactive B cells. All transitional B cells are high in heat-stable antigen (HSA, CD24) relative to their mature counterparts and express the phenotypic surface markers AA4.
T1 and T2
There are two transitional stages for the B cells in mouse, T1 and T2, with the T1 stage occurring from its migration from the bone marrow to its entry into the spleen, and the T2 stage occurring within the spleen where they developed into mature B cells. As in the mouse, human transitional cells can be found in the bone marrow, peripheral blood, and spleen. However, in contrast to the nuanced models proposed in the mouse, thus far |
https://en.wikipedia.org/wiki/Permuted%20congruential%20generator | A permuted congruential generator (PCG) is a pseudorandom number generation algorithm developed in 2014 by Dr. M.E. O'Neill which applies an output permutation function to improve the statistical properties of a modulo-2n linear congruential generator. It achieves excellent statistical performance with small and fast code, and small state size.
A PCG differs from a classical linear congruential generator (LCG) in three ways:
the LCG modulus and state is larger, usually twice the size of the desired output,
it uses a power-of-2 modulus, which results in a particularly efficient implementation with a full period generator and unbiased output bits, and
the state is not output directly, but rather the most significant bits of the state are used to select a bitwise rotation or shift which is applied to the state to produce the output.
It is the variable rotation which eliminates the problem of a short period in the low-order bits that power-of-2 LCGs suffer from.
Variants
The PCG family includes a number of variants. The core LCG is defined for widths from 8 to 128 bits, although only 64 and 128 bits are recommended for practical use; smaller sizes are for statistical tests of the technique.
The additive constant in the LCG can be varied to produce different streams. The constant is an arbitrary odd integer, so it does not need to be stored explicitly; the address of the state variable itself (with the low bit set) can be used.
There are several different output transformations defined. All perform well, but some have a larger margin than others. They are built from the following components:
RR: A random (input-dependent) rotation, with output half the size of input. Given a 2b-bit input word, the top b−1 bits are used for the rotate amount, the next-most-significant 2b−1 bits are rotated right and used as the output, and the low 2b−1+1−b bits are discarded.
RS: A random (input-dependent) shift, for cases where rotates are more expensive. Again, the out |
https://en.wikipedia.org/wiki/Computational%20imaging | Computational imaging is the process of indirectly forming images from measurements using algorithms that rely on a significant amount of computing. In contrast to traditional imaging, computational imaging systems involve a tight integration of the sensing system and the computation in order to form the images of interest. The ubiquitous availability of fast computing platforms (such as multi-core CPUs and GPUs), the advances in algorithms and modern sensing hardware is resulting in imaging systems with significantly enhanced capabilities. Computational Imaging systems cover a broad range of applications include computational microscopy, tomographic imaging, MRI, ultrasound imaging, computational photography, Synthetic Aperture Radar (SAR), seismic imaging etc. The integration of the sensing and the computation in computational imaging systems allows for accessing information which was otherwise not possible. For example:
A single X-ray image does not reveal the precise location of fracture, but a CT scan which works by combining multiple X-ray images can determine the precise location of one in 3D
A typical camera image cannot image around corners. However, by designing a set-up that involves sending fast pulses of light, recording the received signal and using an algorithm, researchers have demonstrated the first steps in building such a system.
Computational imaging systems also enable system designers to overcome some hardware limitations of optics and sensors (resolution, noise etc.) by overcoming challenges in the computing domain. Some examples of such systems include coherent diffractive imaging, coded-aperture imaging and image super-resolution.
Computational imaging differs from image processing in a sense that the primary goal of the former is to reconstruct human-recognizable images from measured data via algorithms while the latter is to process already-recognizable images (that may be not sufficient in quality) to improve the quality |
https://en.wikipedia.org/wiki/Yasodara%20C%C3%B3rdova | Yasodara Córdova (born 1980), also known as Yaso, is an activist, coder, designer and researcher. Her work has focused on technologies to improve the democratic process, using open data, online identity, and privacy approaches. She is currently a research fellow at the Digital Harvard Kennedy School, and affiliate to the Berkman Klein Center at Harvard. She has been part of several Ministries in Brazil, the United Nations and the W3C. As an activist, she is co-founder and advisor of multiple initiatives around Internet hacktivism.
Career
Córdova studied Industrial Design at the Federal University of Brasilia, completed an MBA at the Fundação Getúlio Vargas and earned a MPA at Harvard Kennedy School in 2022. She is a self taught developer. Since 2006, she worked in the Brazilian public news agency Agência Brasil, first as datavis designer and developer, later as product and then project manager. Her team managed to make the agency a reference for new ways of information interaction, using hypervideo tutorials, newsgames and citizen journalism. Her team won two consecutive times the Vladimir Herzog Award, for human rights and Journalism in Brazil, in the categories Internet (webdocumentary "Nação Palmares") and Cultural Illiteracy (series of articles "O Analfabetismo, a exclusão pelas letras"). She also participated in three other works ("Terra Invadida", "Terra Dividida", "Usinas do Rio Madeira: problema ou solução") that were finalists in the Caixa award of social journalism editions of 2007 and 2008.
In the subsequent period, from a position in the United Nations' UNESCO, Córdova developed and pushed forward several public participation processes within several Ministries in the Brazil Government led by the Workers' Party. In the Secretariat of Digital Culture at the Ministry of Culture, she developed software for the public consultations of the Brazilian Civil Rights Framework for the Internet and for The Copyright Law reform. At the same Secretariat she worked |
https://en.wikipedia.org/wiki/Lou%20van%20den%20Dries | Laurentius Petrus Dignus "Lou" van den Dries (born May 26, 1951) is a Dutch mathematician working in model theory. He is a professor emeritus of mathematics at the University of Illinois at Urbana–Champaign.
Education
Van den Dries began his undergraduate studies in 1969 at Utrecht University, and in 1978 completed his PhD there under the supervision of Dirk van Dalen with a dissertation entitled Model Theory of Fields.
Career and research
Van den Dries was a member of the Institute for Advanced Study in the 1982–1983 academic year. He joined the faculty of the University of Illinois at Urbana–Champaign in 1986 and became a professor in its Center for Advanced Study in 1998. In 2021, van den Dries retired and became a professor emeritus.
Van den Dries is most known for his seminal work in o-minimality, but he has also made contributions to the model theory of -adic fields, valued fields, and finite fields, and to the study of transseries. With Alex Wilkie, he improved Gromov's theorem on groups of polynomial growth using nonstandard methods.
Van den Dries was an invited speaker at the International Congress of Mathematicians in 1990 and 2018, and delivered the Tarski Lectures at the University of California, Berkeley in 2017.
Awards and honours
Van den Dries has been a corresponding member of the Royal Netherlands Academy of Arts and Sciences since 1993. He was awarded the Shoenfield Prize from the Association for Symbolic Logic in 2016 for his chapter "Lectures on the Model Theory of Valued Fields" in Model Theory in Algebra, Analysis and Arithmetic, edited by Dugald Macpherson and Carlo Toffalori. Van den Dries was jointly awarded the 2018 Karp Prize with Matthias Aschenbrenner and Joris van der Hoeven "for their work in model theory, especially on asymptotic differential algebra and the model theory of transseries".
Ethics training
Since 2004, employees of the state of Illinois, including University of Illinois faculty, are required by the State Officials an |
https://en.wikipedia.org/wiki/Pre-topological%20order | In the field of computer science, a pre-topological order or pre-topological ordering of a directed graph is a linear ordering of its vertices such that if there is a directed path from vertex u to vertex v and v comes before u in the ordering, then there is also a directed path from vertex v to vertex u.
If the graph is a directed acyclic graph (DAG), topological orderings are pre-topological orderings and vice versa. In other cases, any pre-topological ordering gives a partial order.
References
Graph algorithms
Sorting algorithms
Directed graphs |
https://en.wikipedia.org/wiki/Verve%20International | Verve International is a Nigerian Pan-African and multinational financial technology and payment card brand owned by Interswitch Group.
History
Verve was founded in 2009, as a subsidiary of Interswitch. In 2013, it became an autonomous business entity in a restructuring exercise.
In 2005 the Central Bank of Nigeria (CBN) issued a mandate to the Nigerian payment industry that operators should migrate from magnetic strip to EMV chip and PIN platform by 2009. The CBN migration policy was adopted to phase out the magnetic strip when the technology became susceptible to fraudulent transactions. It initially issued six million cards in partnership with several Nigerian banks.
Verve offers card products in Nigeria. In 2013, Verve was reported to have "over 20 million cards in circulation and access over 119,631 points of sale terminals, 11,287 ATMs and over 1,000 online merchants."
In March 2013, Discover Financial Services partnered with Interswitch, which enabled the acceptance of Verve Cards across the Discover global network, covering 185 countries and territories as at the time of the agreement. The alliance also allowed acceptance of Discover and Diners Club International (DCI) Cards at Interswitch-enabled ATM and point-of-sale (POS) terminals for purchases in Nigeria.
A media report in 2015 said "Verve is issued by 40 banks in Africa with more than 30 million payment tokens in circulation." In October same year, Verve launched its entry into the East African payment market with strategic partnership with Kenya Commercial Bank (KCB) "to expand Verve Card acceptance and payment services in six key East African markets", namely: Kenya, Tanzania, Burundi, South Sudan, Rwanda and Uganda.
See also
Financial Technology
Online payment system
References
Online payments
Nigerian brands
Technology companies of Nigeria
Electronic funds transfer
Payment service providers
Multinational companies based in Lagos
Corporate subsidiaries |
https://en.wikipedia.org/wiki/Charles%20Proxy | Charles Web Debugging Proxy is a cross-platform HTTP debugging proxy server application written in Java. It enables the user to view HTTP, HTTPS, HTTP/2 and enabled TCP port traffic accessed from, to, or via the local computer. This includes requests and responses including HTTP headers and metadata (e.g. cookies, caching and encoding information) with functionality targeted at assisting developers analyze connections and messaging.
Features
Network message analysis – Charles shows full messaging sources of all HTTP and similar TCP-based communications that pass via its proxy port.
XML, JSON, SOAP interpretation – structured viewers that translate the raw HTTP content into a tree format for analysis.
HTML, CSS, JavaScript viewers – providing marked-up/formatted/unminified text content display
SSL debugging – allowing decryption of encrypted data to review/troubleshoot the transmitted content.
Bandwidth throttling – to simulate slower internet speeds by slowing down bandwidth/speed and introducing latency, for example to simulate a slower 3G connection.
Flash development aids – including Action Message Format (AMF) content analysis.
Debugging HTTP connections from mobile devices – providing a proxy between an iOS or Android device and a remote site, to debug HTTP connections and behavior that only occur on devices, including debugging video streaming issues, airplay issues, etc. that cannot be tested in the iOS simulator.
Remote file debugging – ability to swap out a remote file for a local file to aid debugging a remote site without requiring access to the server files.
Debugging aids – such as repeating URL post requests to test server changes, adding breakpoints, or editing request variables.
Validation function – ability to right-click any proxy request, and provide validation feedback using the W3C Markup Validation Service, useful for content the W3C service otherwise cannot access directly.
Browser support
Charles will autoconfigure for use on t |
https://en.wikipedia.org/wiki/Cryptocurrency%20wallet | A cryptocurrency wallet is a device, physical medium, program or a service which stores the public and/or private keys for cryptocurrency transactions. In addition to this basic function of storing the keys, a cryptocurrency wallet more often offers the functionality of encrypting and/or signing information. Signing can for example result in executing a smart contract, a cryptocurrency transaction (see "bitcoin transaction" image), identification, or legally signing a 'document' (see "application form" image).
History
In 2008 bitcoin was introduced as the first cryptocurrency following the principle outlined by Satoshi Nakamoto in the paper “Bitcoin: A Peer-to-Peer Electronic Cash System.” The project was described as an electronic payment system using cryptographic proof instead of trust. It also mentioned using cryptographic proof to verify and record transactions on a blockchain.
Technology
Private and public key generation
A cryptocurrency wallet works by a theoretical or random number being generated and used with a length that depends on the algorithm size of the cryptocurrency's technology requirements. The number is converted to a private key using the specific requirements of the cryptocurrency cryptography algorithm requirement. A public key is then generated from the private key using whichever cryptographic algorithm is required. The private key is used by the owner to access and send cryptocurrency and is private to the owner, whereas the public key is to be shared to any third party to receive cryptocurrency.
Up to this stage no computer or electronic device is required and all key pairs can be mathematically derived and written down by hand. The private key and public key pair (known as an address) are not known by the blockchain or anyone else. The blockchain will only record the transaction of the public address when cryptocurrency is sent to it, thus recording in the blockchain ledger the transaction of the public address.
Duplicate private |
https://en.wikipedia.org/wiki/Tree%20grate | A tree grate is a metallic grating installed at the same level with the pavement around a tree that allows the soil underneath to stay uncompacted and the pedestrians to walk near the tree without stepping on the soil.
Grate slots allow tree roots to absorb air, sunlight, and water, meanwhile its soil is protected from pedestrian traffic impact. Tree grates create a protective barrier, providing uncompacted soil and development space for tree roots. They also serve as a decorative element along ceremonial streets, matching a street's design style and personality.
References
Trees in the Urban Landscape: Site Assessment, Design, and Installation, Peter J. Trowbridge, Nina L. Bassuk, John Wiley & Sons, 2004, page 91
Site Furnishings: A Complete Guide to the Planning, Selection and Use of Landscape Furniture and Amenities, Bill Main, Gail Greet Hannah, John Wiley & Sons, 2010, page 159
External links
http://www.dictionaryofconstruction.com/definition/tree-grate.html
Tree grates in "The ultimate manhole covers web site"
Pavements
Pedestrian infrastructure |
https://en.wikipedia.org/wiki/Hooked%20%28app%29 | Hooked is a mobile application where users create and read chat fiction, short pieces of fiction told in the format of text messages between fictional characters. The app was released in September 2015 and was developed by Telepathic Inc.
Features
Hooked is a freemium smartphone app that allows users to write or read short stories made up of text messages between characters. CEO Prerna Gupta described the app as "books for the Snapchat generation" or "Twitter for fiction." As of March 2019, the app had more than 40 million active users.
The stories are written by a mix of professional authors and crowd-sourced participants. The most popular genres are suspense and horror. The stories usually lack literary elements like character arcs, are simply written and are intended to be suspenseful or addicting. Each piece of fiction on the app is approximately 1,000 to 1,300 words long and can be read in about five minutes. Some longer stories are told in "chapters" and a 32,000-word thriller called Dark Matter was released in 2018.
The app provides a certain number of text messages for free, then delays the next text message by 15 minutes unless the user pays for a subscription. Prior to 2020, the app offered a three-day free trial and then required users to pay. According to Gupta, the app was intended to get the younger generation to read more without getting distracted. Most users of the app are between 13 and 24 years-old.
History
The Hooked app was first released in September 2015. Initially, Hooked featured about 200 stories that were written by professional authors selected by the app developers. The following year, Telepathic Inc. released Hooked 2.0, which allowed users of the app to create and share their own short stories. By mid-2016, the app had 700 stories written by professional authors and 9,000 stories written by users.
Hooked had 1.8 million downloads by 2016 and 20 million download as of 2017, which generated $6.5 million in revenue. The respons |
https://en.wikipedia.org/wiki/Angle%20bracket%20%28fastener%29 | An angle bracket or angle brace or angle cleat is an L-shaped fastener used to join two parts generally at a 90 degree angle. It is typically made of metal but it can also be made of wood or plastic. The metallic angle brackets feature holes in them for screws. Its typical use is to join a wooden shelf to a wall or to join two furniture parts together.
Retailers also use names like corner brace, corner bracket brace, shelf bracket, or L bracket.
When the holes are enlarged for allowing adjustments, the name is angle stretcher plates or angle shrinkage.
Types
There are different sizes available, varying in length, width and angle.
See also
Shelf supports have many variations, including angle brackets
Fasteners
Furniture components |
https://en.wikipedia.org/wiki/Milk%20fat%20globule%20membrane | Milk fat globule membrane (MFGM) is a complex and unique structure composed primarily of lipids and proteins that surrounds milk fat globule secreted from the milk producing cells of humans and other mammals. It is a source of multiple bioactive compounds, including phospholipids, glycolipids, glycoproteins, and carbohydrates that have important functional roles within the brain and gut.
Preclinical studies have demonstrated effects of MFGM-derived bioactive components on brain structure and function, intestinal development, and immune defense. Similarly, pediatric clinical trials have reported beneficial effects on cognitive and immune outcomes. In populations ranging from premature infants to preschool-age children, dietary supplementation with MFGM or its components has been associated with improvements in cognition and behavior, gut and oral bacterial composition, fever incidence, and infectious outcomes including diarrhea and otitis media.
MFGM may also play a role in supporting cardiovascular health by modulating cholesterol and fat uptake. Clinical trials in adult populations have shown that MFGM could positively affect markers associated with cardiovascular disease including lowering serum cholesterol and triacylglycerol levels as well as blood pressure.
Origin
MFGM secretion process in milk
Milk lipids are secreted in a unique manner by lactocytes, which are specialized epithelial cells within the alveoli of the lactating mammary gland.
The process takes place in multiple stages. First, fat synthesized within the endoplasmic reticulum accumulates in droplets between the inner and outer phospholipid monolayers of the endoplasmic reticulum membrane. As these droplets increase in size, the two monolayers separate further and eventually pinch off. This leads to the surrounding of the droplet in a phospholipid monolayer that allows it to disperse within the aqueous cytoplasm. In the next stage, lipid droplets then migrate to the apical surface of the cell, |
https://en.wikipedia.org/wiki/Big%20data%20ethics | Big data ethics also known as simply data ethics refers to systemizing, defending, and recommending concepts of right and wrong conduct in relation to data, in particular personal data. Since the dawn of the Internet the sheer quantity and quality of data has dramatically increased and is continuing to do so exponentially. Big data describes this large amount of data that is so voluminous and complex that traditional data processing application software is inadequate to deal with them. Recent innovations in medical research and healthcare, such as high-throughput genome sequencing, high-resolution imaging, electronic medical patient records and a plethora of internet-connected health devices have triggered a data deluge that will reach the exabyte range in the near future. Data ethics is of increasing relevance as the quantity of data increases because of the scale of the impact.
Big data ethics are different from information ethics because the focus of information ethics is more concerned with issues of intellectual property and concerns relating to librarians, archivists, and information professionals, while big data ethics is more concerned with collectors and disseminators of structured or unstructured data such as data brokers, governments, and large corporations. However, since artificial intelligence or machine learning systems are regularly built using big data sets, the discussions surrounding data ethics are often intertwined with those in the ethics of artificial intelligence. More recently, issues of big data ethics have also been researched in relation with other areas of technology and science ethics, including ethics in mathematics and engineering ethics, as many areas of applied mathematics and engineering use increasingly large data sets.
Principles
Data ethics is concerned with the following principles:
Ownership - Individuals own their own data
Transaction transparency - If an individual's personal data is used, they should have transparen |
https://en.wikipedia.org/wiki/Identity%20provider%20%28SAML%29 | A SAML identity provider is a system entity that issues authentication assertions in conjunction with a single sign-on (SSO) profile of the Security Assertion Markup Language (SAML).
In the SAML domain model, a SAML authority is any system entity that issues SAML assertions. Two important examples of SAML authorities are the authentication authority and the attribute authority.
Definition
A SAML authentication authority is a system entity that produces SAML authentication assertions. Likewise a SAML attribute authority is a system entity that produces SAML attribute assertions.
A SAML authentication authority that participates in one or more SSO Profiles of SAML is called a SAML identity provider (or simply identity provider if the domain is understood). For example, an authentication authority that participates in SAML Web Browser SSO is an identity provider that performs the following essential tasks:
receives a SAML authentication request from a relying on party via a web browser
authenticates the browser user principal
responds to the relying party with a SAML authentication assertion for the principal
In the previous example, the relying on party that receives and accepts the authentication assertion is called a SAML service provider.
A given SAML identity provider is described by an <md:IDPSSODescriptor> element defined by the SAML metadata schema. Likewise, a SAML service provider is described by an <md:SPSSODescriptor> metadata element.
In addition to an authentication assertion, a SAML identity provider may also include an attribute assertion in the response. In that case, the identity provider functions as both an authentication authority and an attribute authority.
See also
Identity provider
Security Assertion Markup Language (SAML)
SAML service provider
SAML-based products and services
References
XML-based standards
Federated identity |
https://en.wikipedia.org/wiki/Service%20provider%20%28SAML%29 | A SAML service provider is a system entity that receives and accepts authentication assertions in conjunction with a single sign-on (SSO) profile of the Security Assertion Markup Language (SAML).
In the SAML domain model, a SAML relying party is any system entity that receives and accepts information from another system entity. Of particular interest is a SAML relying party that receives and accepts a SAML assertion issued by a SAML authority.
An important type of SAML authority is the SAML identity provider, a system entity that issues authentication assertions in conjunction with an SSO profile of SAML. A relying party that consumes such assertions is called a SAML service provider (or simply service provider if the domain is understood). Thus a SAML service provider is a system entity that receives and accepts an authentication assertion issued by a SAML identity provider.
See also
Security Assertion Markup Language (SAML)
SAML identity provider
SAML-based products and services
References
XML-based standards
Federated identity
Computer access control |
https://en.wikipedia.org/wiki/Health%20information-seeking%20behaviour | Health information-seeking behaviour (HISB), also known as health information seeking, health seeking behaviour or health information behaviour, refers to a series interaction that reduce uncertainty regarding health status, but also to construct a social and personal sense of health. HISB is a key strategy for many people to understand their health problems and to cope with illness. Recently, thanks to the development of the technologies and networks, people have a trend of seeking health information on the Internet. Particularly, when it comes to the following scenarios, people tend to carry out online HISB:
Encountering health issues
Received conflicting information
The cause is relevant to known people (such as family members and friends)
Out of curiosity
See also
Health literacy
References
Health care
Information theory
Health informatics
Patient advocacy |
https://en.wikipedia.org/wiki/CERT%20Coding%20Standards | The SEI CERT Coding Standards are software coding standards developed by the CERT Coordination Center to improve the safety, reliability, and security of software systems. Individual standards are offered for C, C++, Java, Android OS, and Perl.
Guidelines in the CERT C Secure Coding Standard are cross-referenced with several other standards including Common Weakness Enumeration (CWE) entries and MISRA.
See also
Common Vulnerabilities and Exposures
National Vulnerability Database
References
External links
CERT home page
2016 SEI CERT C Coding Standard
2016 SEI CERT C++ Coding Standard
Computer standards
C (programming language)
Carnegie Mellon University software
Computer network security |
https://en.wikipedia.org/wiki/Quantum%20Computing%20Since%20Democritus | Quantum Computing Since Democritus is a 2013 book on quantum information science written by Scott Aaronson. It is loosely based on a course Aaronson taught at the University of Waterloo, Canada, the lecture notes for which are available online.
Contents
Aaronson has stated that he intends the book to be at the same level as Leonard Susskind's The Theoretical Minimum or Roger Penrose's The Road to Reality; Physics Today compared it to George Gamow's One Two Three... Infinity. The book covers everything from computer science to mathematics to quantum mechanics and quantum computing, starting, as the title indicates, with Democritus.
Author
Scott Aaronson is a professor of theoretical computer science at the University of Texas at Austin. He was previously a member of faculty at MIT.
Reception
Michael Nielsen called the book "a beautiful synthesis of what we know", while Seth Lloyd praised it as "lucid", describing Aaronson as a "tornado of intellectual activity".
The Journal of the American Mathematical Society considered it to have "much insight, wisdom, and fun", but conceded that it "is not for everyone'.
References
Quantum computing
Quantum information theory
2013 non-fiction books
Popular science books |
https://en.wikipedia.org/wiki/Tooth%20and%20Tail | Tooth and Tail is a real-time strategy video game developed and published by indie development team Pocketwatch Games, the company behind Monaco: What's Yours Is Mine. Tooth and Tail was released in September 2017 for Windows, MacOS, Linux and PlayStation 4.
The game is set in a society of anthropomorphic animals during a time of severe food shortages, resulting in the uprising of political parties with differing ideologies regarding the acquisition of food. The gameplay consists of single-player and multiplayer modes and supports gamepads and keyboard and mouse arrangements. Players begin by choosing six units out of a pool of twenty to use during the match. Once each player has chosen, the goal is to destroy the enemy's resources through building structures and creating units. Each player controls a commander rather than having a top-down view.
Development of Tooth and Tail began towards the end of development for Monaco. Various real-time strategy (RTS) games were prototyped before the game, then titled Armada, was announced in March 2014. The premise was to create an RTS game without micromanagement or the necessity of high quantities of actions per minute. From the outset, the game was designed to work well on both gamepads and keyboard-and-mouse setups. In August 2014, the game's title was changed to Lead to Fire before being finally changed to Tooth and Tail, a reference to the tooth-to-tail ratio, in August 2015. Before its official release, the game's developers proposed a launch on Steam's Early Access platform, though this did not occur.
The game was positively received and won two awards in 2016; "Best Character Design" at Intel Level Up and tied with Giant Cop for "Guest's Pick" at Media Indie Exchange. The single-player mode was not praised as highly as the multiplayer modes; reviewers said the difficulty spikes impaired enjoyment. Many comparisons with other games and media were made; mostly with the novel series Redwall and the novella Animal Farm |
https://en.wikipedia.org/wiki/Federated%20Wireless | Federated Wireless is an American-based wireless communications company headquartered in Arlington County, Virginia. The company is "commercializing CBRS spectrum for 4G and 5G wireless systems".
Federated was founded in 2012 by Jeffrey H. Reed, Charles Clancy, Robert McGwier and Joseph Mitola, who subsequently co-applied for a number of patents relating to the operation of shared spectrum for wireless networks. The company was created to develop technology to enable the operation of Citizens Broadband Radio Service (CBRS), and is "backed by communications industry stalwarts" such as Charter Communications, American Tower Corporation and Arris. Iyad Tarazi, who had left an executive position at Sprint Corporation in a March 2014 restructuring, joined the company as CEO in September 2014. Federated Wireless, a subsidiary of Allied Minds, provides innovative cloud-based wireless infrastructure solutions to extend the access of carrier networks.
In late 2013, Federated Wireless was one of four organizations named as new members by the Wireless Innovation Forum, along with Google, Nordia Soft and the research organization Idaho National Laboratory. The company also supports implementation of a "fully functional [Spectrum Access System] (SAS), capable of managing the proposed three-tier framework" for CBRS spectrum sharing.
In August 2016, Federated Wireless, along with Google, Nokia, Intel, Qualcomm and Ruckus Wireless, launched the CBRS Alliance to "foster the ecosystem" around the 3.5 GHz band. Federated Wireless is on the CBRS Alliance board of directors, with director Sarosh Vesuna as the organization's treasurer. The company has worked closely with others in the broadband communications space "to develop standards and equipment to bring the idea to life". In September 2017, Federated Wireless launched its Spectrum Controller. In April 2018, Verizon Communications announced that it was working with companies including Federated "on system testing across the 3.5G |
https://en.wikipedia.org/wiki/Shelf%20support | A shelf support is a fastener used to hang a shelf on the wall.
Types of shelf supports:
L-shaped shelf supports are named shelf bracket and they are a subset of angle brackets
Cabinet shelf support, wardrobe shelf support, shelf pin, shelf support peg, shelf support push, plug-in shelf support - when used in a wardrobe or cabinet
The 32 mm system on frameless cabinets using 5 mm diameter studs spaced 32 mm apart
Fasteners
Furniture components |
https://en.wikipedia.org/wiki/Cirac%E2%80%93Zoller%20controlled-NOT%20gate | The Cirac–Zoller controlled-NOT gate is an implementation of the controlled-NOT (CNOT) quantum logic gate using cold trapped ions that was proposed by Ignacio Cirac and Peter Zoller in 1995 and represents the central ingredient of the Cirac–Zoller proposal for a trapped-ion quantum computer. The key idea of the Cirac–Zoller proposal is to mediate the interaction between the two qubits through the joint motion of the complete chain of trapped ions.
The quantum CNOT gate acts on two qubits and can entangle them. It forms part of the standard universal set of gates, meaning that any gate (unitary transformation) on the -qubit Hilbert space can be approximated to arbitrary precision by a sequence of gates from the universal set.
The Cirac–Zoller gate was experimentally first realized in 2003 (in slightly modified form) at the University of Innsbruck, Austria by Ferdinand Schmidt-Kaler and coworkers in the group of Rainer Blatt using two calcium ions.
Procedure
The qubits on which the Cirac–Zoller gate operates are represented by two internal states, ground state and excited state (called in the following g and e) of trapped ions. An additional auxiliary excited state a is used to implement the gate. Due to their mutual Coulomb repulsion the ions line up in a linear chain. The ions are cooled to their collective ground state, so that the quantization of the motion of the chain becomes relevant. The proposal assumes that each ion can be individually addressed by laser pulses. Both the transitions "" and "" can be driven by choosing different laser polarizations. For each transition, one can distinguish two kinds of such pulses. Those on resonance with the transition and those that are detuned from the respective transition by an energy difference that corresponds to the energy of a single quantum of motion of the ion chain. The former are called direct pulses, the latter sideband pulses. The proposal uses red sideband pulses (that have less energy than corresponds t |
https://en.wikipedia.org/wiki/Mathematical%20Methods%20of%20Classical%20Mechanics | Mathematical Methods of Classical Mechanics is a textbook by mathematician Vladimir I. Arnold. It was originally written in Russian, and later translated into English by A. Weinstein and K. Vogtmann. It is aimed at graduate students.
Russian original and translations
The original Russian first edition Математические методы классической механики was published in 1974 by Наука. A second edition was published in 1979, and a third in 1989. The book has since been translated into a number of other languages, including French, German, Japanese and Mandarin.
Reviews
The Bulletin of the American Mathematical Society said, "The [book] under review [...] written by a distinguished mathematician [...is one of] the first textbooks [to] successfully to present to students of mathematics and physics, [sic] classical mechanics in a modern setting."
A book review in the journal Celestial Mechanics said, "In summary, the author has succeeded in producing a mathematical synthesis of the science of dynamics. The book is well presented and beautifully translated [...] Arnold's book is pure poetry; one does not simply read it, one enjoys it."
See also
List of textbooks in classical and quantum mechanics
References
Bibliography
1974 non-fiction books
Classical mechanics
Graduate Texts in Mathematics
Physics textbooks |
https://en.wikipedia.org/wiki/Sniffing%20attack | Sniffing attack in context of network security, corresponds to theft or interception of data by capturing the network traffic using a packet sniffer (an application aimed at capturing network packets). When data is transmitted across networks, if the data packets are not encrypted, the data within the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and gain information to eventually cause the network to crash or to become corrupted, or read the communications happening across the network.
General
Sniffing attacks can be compared to tapping of phone wires and get to know about the conversation, and for this reason, it is also referred as wiretapping applied to computer networks. Using sniffing tools, attackers can sniff sensitive information from a network, including email (SMTP, POP, IMAP), web (HTTP), FTP (Telnet authentication, FTP Passwords, SMB, NFS) and many more types of network traffic. The packet sniffer usually sniffs the network data without making any modifications in the network's packets. Packet sniffers can just watch, display, and log the traffic, and this information can be accessed by the attacker.
Prevention
To prevent networks from sniffing attacks, organizations and individual users should keep away from applications that are using insecure protocols, like basic HTTP authentication, File Transfer Protocol (FTP), and Telnet. Instead, secure protocols such as HTTPS, Secure File Transfer Protocol (SFTP), and Secure Shell (SSH) should be preferred. In case there is a necessity for using any insecure protocol in any application, all the data transmission should be encrypted. If required, VPN (Virtual Private Networks) can be used to provide secure access to users.
See also
Cloud computing security
Cyber security standards
Data loss prevention software
Network Security Toolkit
Wireless security
References
Computer network security |
https://en.wikipedia.org/wiki/QuintessenceLabs | QuintessenceLabs Pty Ltd. (or QuintessenceLabs) is a cybersecurity company headquartered in Canberra, Australia with offices in San Jose, California. QuintessenceLabs produces encryption key and policy management products that conform to the Key Management Interoperability Protocol (KMIP), as well as a hardware random number generator, development of a quantum key distribution (QKD) system, and other encryption solutions that include automatic key zeroization.
The company was founded in 2008 by Dr Vikram Sharma, following research on quantum technology conducted at The Australian National University by Sharma, Thomas Symul, Andrew Lance and Ping Koy Lam.
Westpac Group, a major investor, extended two rounds of funding to QuintessenceLabs in 2015 and 2017, respectively.
In July 2017, QuintessenceLabs received a grant of AU$3.26M from the Australian Department of Defence's Innovation Hub to develop a free-space quantum key distribution system.
References
External links
Company website
Quantum key to unbreakable cryptography
First Look: QuintessenceLabs Trusted Security Foundation (TSF)
Prime Minister Malcolm Turnbull’s Address to SINET61
The random number generator powered by the quantum 'crackle in the universe’
KMIP Implementations known to the KMIP TC
The Future of Cybersecurity Is in High-Speed Quantum Encryption
IBM warns of instant breaking of encryption by quantum computers
Time to invest in skills for quantum computing revolution
Quantum cryptography
Software companies of Australia
Random number generation |
https://en.wikipedia.org/wiki/Technology%20of%20the%20New%20York%20City%20Subway | Since the late 20th century, the Metropolitan Transportation Authority has started several projects to maintain and improve the New York City Subway. Some of these projects, such as subway line automation, proposed platform screen doors, the FASTRACK maintenance program, and infrastructural improvements proposed in 2015–2019 Capital Program, contribute toward improving the system's efficiency. Others, such as train-arrival "countdown clocks", "Help Point" station intercoms, "On the Go! Travel Station" passenger kiosks, wireless and cellular network connections in stations, MetroCard fare payment alternatives, and digital ads, are meant to benefit individual passengers. Yet others, including the various methods of subway construction, do not directly impact the passenger interface, but are used to make subway operations efficient.
In the mid-1990s, it started converting the BMT Canarsie Line to use communications-based train control, using a moving block signal system that allowed more trains to use the tracks and thus increasing passenger capacity. After the Canarsie Line tests were successful, the MTA expanded the automation program in the 2000s and 2010s to include other lines. This led to a 2017 proposal to install platform screen doors in one Canarsie Line station. Additionally, as part of another program called FASTRACK, the MTA started closing certain lines during weekday nights in 2012, with each of the lines closing overnight for a week in order to allow workers to clean these lines without being hindered by train movements. The program was expanded beyond Manhattan the next year after noticing how efficient the FASTRACK program was compared to previous service diversions. In 2015, the MTA announced a wide-ranging improvement program as part of the 2015–2019 Capital Program. Thirty stations would be extensively rebuilt under the Enhanced Station Initiative, and new R211 subway cars would be able to fit more passengers.
The MTA has also started some project |
https://en.wikipedia.org/wiki/David%20L.%20Dill | David Lansing Dill (born January 8, 1957) is a computer scientist and academic noted for contributions to formal verification, electronic voting security, and computational systems biology.
In 2013, Dill was elected as a member into the National Academy of Engineering for the development of techniques to verify hardware, software, and electronic voting systems.
He is the Donald E. Knuth Professor, Emeritus, in the School of Engineering and Professor, Emeritus, of Computer Science at Stanford University.
Biography
Dill received an S.B. degree in Computer Science and Electrical Engineering from the Massachusetts Institute of Technology, Cambridge, MA, in 1979, an M.S. degree in Computer Science from Carnegie-Mellon University, Pittsburgh, PA, in 1982, and a Ph.D. degree in Computer Science in 1987, also from Carnegie-Mellon University. After receiving his Ph.D., he joined the faculty of the computer science department at Stanford University, Stanford, CA. He became an associate professor in 1994 and a full professor in 2000. In 2016 he became the first recipient of the Donald E. Knuth Professorship, an endowed chair in the Stanford University School of Engineering. From July 1995 to September 1996, he was Chief Scientist at 0-In Design Automation (acquired by Mentor Graphics in 2004), and, from 2016 to 2017, he was Chief Scientist at LocusPoint Networks, LLC. He is currently a Lead Researcher working on blockchain infrastructure at Novi Financial (a subsidiary of Meta).
Work
Dill's interests include asynchronous circuit design, software and hardware verification, automatic theorem proving, electronic voting security, and computational systems biology.
His Ph.D. dissertation was an important contribution to asynchronous circuit verification and was published by MIT Press in 1989.
He contributed to the development of symbolic model checking, helping to improve the scalability of the technique.
Soon after arriving at Stanford, Dill and his students developed |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.