source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Infinite%20difference%20method | In mathematics, infinite difference methods are numerical methods for solving differential equations by approximating them with difference equations, in which infinite differences approximate the derivatives.
See also
Infinite element method
Finite difference
Finite difference time domain
References
Simulation of ion transfer under conditions of natural convection by the finite difference method
.
Genetic Algorithm and Numerical Solution
Finite differences
Numerical differential equations |
https://en.wikipedia.org/wiki/Composite%20cross%20population | A composite cross population (CCP) is created by crossing a number of plants from different lines, and subsequently bulking seeds from the resulting offspring. This makes a CCP a population of plants with a lot of inherent genetic diversity, in contrast to monocultures where all plants are clones and homozygous at all loci (fully inbred). In recent years CCPs have been proposed as a way to create modern landraces of wheat, barley and oats. Research is done to explore whether they are better suited for organic farming than the modern cultivars.
They are suited for participatory breeding of crops, which is in contrast to cultivars owned by big breeding companies.
The idea of using CCPs in plant breeding was published in 1956 based on the barley composite cross devised by Harry Harlan and Mary Martini in 1929. Yield data for 4 different populations for 8–28 years were presented in the article and after 8–15 years of repeated breeding under natural selection, the populations out-yielded the reference cultivar.
Stages
Creating a CCP involves three steps: initiation, multiplication and mixture. The population then goes into the maintenance phase.
Initiation
A number of lines, generally 7-30, with interesting properties, such as yield or baking quality, are selected and all possible crosses of them are done. If many lines of different genetic background are used, a huge amount of genetic diversity will be present.
Multiplication
Seeds from crosses are sown out and harvested separately for a growing season or two until enough seeds are available.
Mixture
All seeds are mixed in equal portions to produce the first CCP generation.
Maintenance
The population is grown repeatedly and possibly changes due to natural selection. Each year seeds are saved after harvest, and used as seed for the next growing season. Plants that are successful under the prevailing growing conditions will give more seeds and contribute more to the next generation, compared to less successful plan |
https://en.wikipedia.org/wiki/GoMeta | GoMeta is an American software company headquartered in San Diego. The company was founded by Dmitry Shapiro, Sean Thielen, and Jonathan Miller in September 2016. GoMeta's Koji platform lets non-technical individuals create and publish mini apps, progressive web applications that run on all devices and operating systems, and embed inside of social networks and messengers.
Previously, GoMeta created Metaverse Studio, a drag and drop editor for creating Augmented Reality (AR) experiences. The company suspended support for Metaverse Studio in 2019.
Overview
GoMeta's Koji platform is a browser-based low-code development platform for creating web applications. Independent developers publish templates for apps and games and users remix those templates to create new applications. Alongside the underlying application code, users have access to low-code visual abstractions, including tools that allow easy manipulation of 3D models, sounds, and images. These visual abstractions are defined by the template creator in the original application bundle.
Koji applications are full-stack web applications, and often include complex functionality like leaderboards, databases, realtime multiplayer, and calls to third-party APIs.
GoMeta’s earlier platform, Metaverse Studio, is a web application that allows users to create interactive Augmented Reality experiences without any coding. Using Metaverse Studio, users can build AR experiences that incorporate technologies such as GPS, iBeacons, 3D objects, 360-degree video, photo filters, and digital coupons, in addition to commonly used features of programming like logic, probability, collection of user input, and session management.
History
GoMeta came to media attention in 2016 with a series of Augmented Reality scavenger hunts created in Metaverse Studio. Participants followed clues in the Metaverse App that were tied to real-world locations, and the winners of the scavenger hunts received cash prizes.
In 2016, GoMeta raised $3 mil |
https://en.wikipedia.org/wiki/Chondrometer | A chondrometer is a measuring instrument designed to determine the bulk density of grain. Grain density is measured in kilograms per hectolitre (Imp. pounds per bushel). It is thus also referred to as the hectolitre mass.
Purpose
Density is a guide to wheat quality and determines the price and the space required to store and transport the crop.
Description
A chondrometer consists of a filling hopper, a measuring container, a straightedge, a weighing instrument. The filling hopper allows the grain to fall into the measuring container in a reproducible pattern as several measurements are taken, and all readings need to be within a strict degree of accuracy. The measuring cylinder has flat top edge to it can levelled using the straightedge (a strickle) to give a set volume. Today, the measuring instrument can be a set of digital scales with an accuracy greater than 0.1 g, though in the past it was a steelyard balance with the measuring cylinder hooking directly onto the scales.
Calculation
Bulk Density (kg/hL)= Mass of Grain Captured (in kg) /Volume of measuring container (in L) x 100
The measuring container will usually be 1L or 0.5L to make the calculations easy.
References
External links
How to Measure Test Weight of Grain - YouTube
Measuring instruments |
https://en.wikipedia.org/wiki/La%20Tribune%20de%20l%27art | La Tribune de l'art (The Art Tribune) is a French online magazine on art history and western heritage from the Middle Ages to the 1930s. It was set up on 7 April 2003 by Didier Rykner, art historian and former agronomist. In 2008, the magazine's editor-in-chief received the La Demeure historique prize in the "journalist's prize, written press — internet" category. In 2021, the magazine will have 4,000 subscribers, a turnover of 320,000 euros and four employees.
References
External links
2003 establishments in France
Cultural magazines
French-language magazines
Magazines established in 2003
Online magazines
Magazines published in Paris |
https://en.wikipedia.org/wiki/Oscheius | Oscheius is a genus of nematode.
O. tipulae is a satellite developmental genetic model organism used to study vulva formation.
In phylogenetic studies, based on the analysis of sequences of three nuclear genes, Oscheius groups with Caenorhabditis species and the Diploscapter, Protorhabditis and Prodontorhabditis 'Protorhabditis' group, all included in the 'Eurhabditis' group of Rhabditidae genera.
References
External links
Rhabditidae
Rhabditida genera
Model organisms |
https://en.wikipedia.org/wiki/Login.gov | Login.gov is a single sign-on solution for US government websites. It enables users to log in to services from numerous government agencies using the same username and password. Login.gov was jointly developed by 18F and the US Digital Service. The initiative was announced in a blog post in May 2016 and the new system was launched in April 2017 as a replacement for Connect.Gov.
Further reading
See also
NSTIC
GOV.UK Verify
External links
References
Identity management systems
Federated identity
E-government in the United States |
https://en.wikipedia.org/wiki/Municipal%20castings | Municipal castings refers to many products, including: access hatches; ballast screens; benches (iron or steel); bollards; cast bases; cast iron hinged hatches, square and rectangular; cast iron riser rings; catch basin inlet; cleanout/monument boxes; construction covers and frames; curb and corner guards; curb openings; detectable warning plates; downspout shoes (boot, inlet); drainage grates, frames and curb inlets; inlets; junction boxes; lampposts; manhole covers, rings and frames, risers; meter boxes; service boxes; steel hinged hatches, square and rectangular; steel riser rings; trash receptacles; tree grates; tree guards; trench grates; and valve boxes, covers and risers.
These products are covered by the Buy America Act of 1982. "By law, American-made municipal castings must be used in many federal, state and local-level public works infrastructure projects that are funded or financed with U.S. taxpayer dollars".
The Buy America Act states that transportation infrastructure projects must be built with iron, steel, and manufactured products in the United States. This relates to highways, bridges, airports, and tunnels funded by federal grants. There are severe penalties for not following the Buy America laws.
The Municipal Castings Association is an organization made up of the following American manufacturers: Charlotte Pipe and Foundry Company, D&L Foundry and Supply, US Foundry, EBAA Iron, EJ, McWane, Neenah Foundry, and Spring City. They are dedicated advocates ensuring that all applicable federal, state, and local laws and specifications are followed for infrastructure projects in the United States.
Municipal castings also have to follow the country-of-origin marking requirement laws. Every casting of foreign origin entering the United States has to be marked legibly with the English name. There is a special marking law for municipal castings that states they must be marked on the top surface of the casting, visible once the product is installed in |
https://en.wikipedia.org/wiki/Human%20rights%20and%20encryption | Human rights applied to encryption are a concept of freedom of expression, where encryption is a technical resource in the implementation of basic human rights.
With the evolution of the digital age, the application of freedom of speech has become more controversial as new technologies and restrictions arose, along with governmental and commercial interests. From a human rights perspective, there is a growing awareness that encryption is a core component in realizing a free, open, and trustworthy Internet.
Human rights are moral principles or norms, that describe certain standards of human behaviour, that are regularly protected as legal rights in municipal and international law. They are commonly understood as inalienable, fundamental rights "to which a person is inherently entitled simply because they are a human being". Those rights are "inherent in all human beings" regardless of their nationality, location, language, religion, ethnic origin, or any other status. They are applicable everywhere, at every time and are universal. They are egalitarian in the sense that they are the same for everyone.
Cryptography is a long-standing subject in the field of mathematics and computer science. It can generally be defined as "the protection of information and computation using mathematical techniques." In the OECD Guidelines, encryption and cryptography are defined as follows: "Encryption" refers to the transformation of data by the use of cryptography to produce unintelligible data (encrypted data) to ensure its confidentiality. "Cryptography" refers to the discipline, that embodies principles, means, and methods for the transformation of data to hide its information content, establish its authenticity, prevent its undetected modification, prevent its repudiation, and prevent its unauthorized use. Encryption and cryptography are often used synonymously, although "cryptography" has a broader technical meaning. For example, a digital signature is "cryptography", but not |
https://en.wikipedia.org/wiki/Nanowire%20lasers | Semiconductor nanowire lasers are nano-scaled lasers that can be embedded on chips and constitute an advance for computing and information processing applications. Nanowire lasers are coherent light sources (single mode optical waveguides) as any other laser device, with the advantage of operating at the nanoscale. Built by molecular beam epitaxy, nanowire lasers offer the possibility for direct integration on silicon, and the construction of optical interconnects and data communication at the chip scale. Nanowire lasers are built from III–V semiconductor heterostructures. Their unique 1D configuration and high refractive index allow for low optical loss and recirculation in the active nanowire core region. This enables subwavelength laser sizes of only a few hundred nanometers. Nanowires are Fabry–Perot resonator cavities defined by the end facets of the wire, therefore they do not require polishing or cleaving for high-reflectivity facets as in conventional lasers.
Properties
Nanowire lasers can be grown site-selectively on Si/SOI wafers with conventional MBE techniques, allowing for pristine structural quality without defects. Nanowire lasers using the group-III nitride and ZnO materials systems have been demonstrated to emit in the visible and ultraviolet, however infrared at the 1.3–1.55 μm is important for telecommunication bands. Lasing at those wavelengths has been achieved by removing the nanowire from the silicon substrate. Nanowire lasers have shown pulse durations down to <1ps, and enable repetition rates greater than 200 GHz. Also, nanowire lasers have shown to store the phase information of a pulse over 30ps when excited with subsequent pulse pairs. Mode locked lasers at the nano-scale are therefore feasible with such configurations.
See also
Semiconductor lasers
Nanowires
Molecular Beam Epitaxy
Nanolaser
References
Nanoelectronics
Semiconductors
Nanowire |
https://en.wikipedia.org/wiki/Neom | Neom (styled NEOM; , ) is a new urban area planned by the Kingdom of Saudi Arabia to be built in its northwestern Tabuk Province. The site is north of the Red Sea, east of Egypt across the Gulf of Aqaba and south of Jordan. The total planned area of Neom is . The city's plans include multiple regions, including a floating industrial complex, global trade hub, tourist resorts and a linear city powered by renewable energy sources. It was launched by Saudi Crown Prince and Prime Minister Mohammed bin Salman.
Developers intend for the majority of the city to be completed by 2039. Experts have expressed skepticism about the ambitions of the megaproject. Saudi Arabia originally aimed to complete major parts of the project by 2020, with an expansion completed in 2025, but then fell behind schedule. By July 2022, only two buildings had been constructed, and most of the project area remained bare desert.
The project's estimated cost exceeds $500 billion. On January 29, 2019, the Saudi government announced that it had established a closed joint-stock company named Neom. The company is wholly owned by the Public Investment Fund and is solely dedicated to developing the economic zone of Neom.
Etymology
The name "Neom" is a portmanteau. The first three letters form the Ancient Greek prefix νέο Neo- meaning "new". The fourth letter, M, is the first letter of Crown Prince Mohammed bin Salman's name, as well as the first letter of the Arabic word for "future" (, ).
History
Salman announced plans for the city at the Future Investment Initiative conference in Riyadh on October 24, 2017. He said that it would operate independently from the “existing governmental framework” with its own tax and labour laws and an "autonomous judicial system." Egypt announced in 2018 that it would contribute some land to the Neom project.
Klaus Kleinfeld was announced by Salman as the inaugural director for the Neom project upon its launch. In 2018, Kleinfeld signed Gladstone Place Partners LLC to |
https://en.wikipedia.org/wiki/Seascape%20ecology | Seascape ecology is a scientific discipline that deals with the causes and ecological consequences of spatial pattern in the marine environment, drawing heavily on conceptual and analytical frameworks developed in terrestrial landscape ecology.
Overview
Seascape ecology, the application of landscape ecology concepts to the marine environment has been slowly emerging since the 1970s, yielding new ecological insights and showing growing potential to support the development of ecologically meaningful science-based management practices. For marine systems, the application of landscape ecology came about through a recognition that many of the concepts developed in the theory of island biogeography and the study of patch dynamics (precursors to modern landscape ecology) could be applicable to a range of marine environments from plankton patches to patch reefs, inter-tidal mussel beds and seagrass meadows.
Progress in the ecological understanding of spatial patterning was not confined to shallow seafloor environments. For the open ocean, advances in ocean observing systems since the 1970s have allowed scientists to map, classify, quantify and track dynamic spatial structure in the form of eddies, surface roughness, currents, runoff plumes, ice, temperature fronts and plankton patches using oceanographic technologies – a theme increasingly referred to as pelagic seascape ecology. Subsurface structures too, such as internal waves, thermoclines, haloclines, boundary layers and stratification resulting in distinct layering of organisms, is increasingly being mapped and modelled in multiple dimensions.
Like landscape ecologists, seascape ecologists are interested in the spatially explicit geometry of patterns and the relationships between pattern, ecological processes and environmental change. A central tenet in landscape ecology is that patch context matters, where local conditions are influenced by attributes of the surroundings. For instance, the physical arrangement o |
https://en.wikipedia.org/wiki/BioCompute%20Object | The BioCompute Object (BCO) project is a community-driven initiative to build a framework for standardizing and sharing computations and analyses generated from High-throughput sequencing (HTS -- also referred to as next-generation sequencing or massively parallel sequencing). The project has since been standardized as IEEE 2791-2020, and the project files are maintained in an open source repository. The July 22nd, 2020 edition of the Federal Register announced that the FDA now supports the use of BioCompute (officially known as IEEE 2791-2020) in regulatory submissions, and the inclusion of the standard in the Data Standards Catalog for the submission of HTS data in NDAs, ANDAs, BLAs, and INDs to CBER, CDER, and CFSAN.
Originally started as a collaborative contract between the George Washington University and the Food and Drug Administration, the project has grown to include over 20 universities, biotechnology companies, public-private partnerships and pharmaceutical companies including Seven Bridges and Harvard Medical School. The BCO aims to ease the exchange of HTS workflows between various organizations, such as the FDA, pharmaceutical companies, contract research organizations, bioinformatic platform providers, and academic researchers. Due to the sensitive nature of regulatory filings, few direct references to material can be published. However, the project is currently funded to train FDA Reviewers and administrators to read and interpret BCOs, and currently has 4 publications either submitted or nearly submitted.
Background
One of the biggest challenges in bioinformatics is documenting and sharing scientific workflows in such a way that the computation and its results can be peer-reviewed or reliably reproduced. Bioinformatic pipelines typically use multiple pieces of software, each of which typically has multiple versions available, multiple input parameters, multiple outputs, and possibly platform-specific configurations. As with experimental paramete |
https://en.wikipedia.org/wiki/Opus%20Magnum | Opus Magnum is a puzzle-based programming game developed by Zachtronics. It was released for Microsoft Windows, Linux, and Mac in December 2017, following about two months of early access. In the game, the player must assemble a series of machines using various tools and program them to complete alchemy-related tasks. The player can advance with any working solution to each problem, but is challenged through leaderboards to produce a machine that does the task in the shortest time, with the lowest cost of materials, and/or the smallest occupied area. Opus Magnum is based on The Codex of Alchemical Engineering, one of the earliest Flash games made by Zach Barth prior to establishing Zachtronics.
Gameplay
Opus Magnum has the player take the role of an alchemist to create required products by manipulating atoms of base alchemy elements (the classic elements as well as the metals of antiquity) through a device they construct within a transmutation engine. The engine is represented as a hex grid which the player arranges various manipulation tools and transmutation spaces on. Manipulators are mechanical arms that rotate around a pivot point, pick up and drop atoms, and rotate structures it currently has picked up, with optional variants that can extend and retract the arm, and/or travel along a track path. Transmutation spaces can create a bond, destroy a bond, transform a basic element into "salt", or upgrade base metals into higher ones using quicksilver. Manipulation parts have a cost to them, though the player is not limited to a total number of manipulation elements, cost, or space the device takes up in crafting their solution.
After placing manipulators, the player must then provide each manipulator a set of commands that take atoms from input spaces and drop the proper completed material into the target output space; an early puzzle demonstrates how one turns lead into gold. Manipulators can have individual programs, and each run simultaneously once the machin |
https://en.wikipedia.org/wiki/ROCA%20vulnerability | The ROCA vulnerability is a cryptographic weakness that allows the private key of a key pair to be recovered from the public key in keys generated by devices with the vulnerability. "ROCA" is an acronym for "Return of Coppersmith's attack". The vulnerability has been given the identifier .
The vulnerability arises from a problem with an approach to RSA key generation used in vulnerable versions of a software library, RSALib, provided by Infineon Technologies, and incorporated into many smart cards, Trusted Platform Module (TPM), and Hardware Security Modules (HSM) implementations, including YubiKey 4 tokens, often used to generate PGP keys. Keys of lengths 512, 1024, and 2048 bits generated using these versions of the Infineon library are vulnerable to a practical ROCA attack. The research team that discovered the attack (all with Masaryk University and led by Matúš Nemec and Marek Sýs) estimate that it affected around one-quarter of all current TPM devices globally. Millions of smart cards are believed to be affected.
The team informed Infineon of the RSALib problem in February 2017, but withheld public notice until mid-October, citing responsible disclosure. At that time they announced the attack and provided a tool to test public keys for vulnerability. They published the details of the attack in November.
Technical details
Generating an RSA key involves selecting two large randomly-generated prime numbers, a process that can be time-consuming, particularly on small devices, such as smart cards. In addition to being primes, the numbers should have certain other properties for best security. The vulnerable RSALib selection process quickly creates primes of the desired type by only testing for primality numbers of the form:
where is the product of the first n successive primes (2, 3, 5, 7, 11, 13,...), and n is a constant that only depends on the desired key size. The security is based on the secret constants and . The ROCA attack exploits this particular fo |
https://en.wikipedia.org/wiki/Pindar%20Van%20Arman | Pindar Van Arman is an American artist and roboticist based in Washington, D.C. His art focuses on designing painting robots that explore the differences between human and computational creativity. Since his first system in 2005, he has built multiple artificially creative robots, including CrowdPainter, bitPaintr, and CloudPainter. His robotic systems typically paint with a brush on stretched canvas and have recently begun to concentrate on creative portraiture.
His work with CloudPainter was awarded First Place in Robot Art 2018, an annual AI and robotics art competition. Judges of the contest noted that "CloudPainter was able to paint evocative portraits with varying degrees of abstraction."
Van Arman graduated from Ohio Wesleyan University in 1996 and went on to get his Masters from the Corcoran School of the Arts and Design at George Washington University in 2010.
References
Year of birth missing (living people)
Living people
American artists
Artificial intelligence art
Ohio Wesleyan University alumni
Corcoran School of the Arts and Design alumni |
https://en.wikipedia.org/wiki/Population%20biology | The term population biology has been used with different meanings.
In 1971 Edward O. Wilson et al. used the term in the sense of applying mathematical models to population genetics, community ecology, and population dynamics. Alan Hastings used the term in 1997 as the title of his book on the mathematics used in population dynamics. The name was also used for a course given at UC Davis in the late 2010s, which describes it as an interdisciplinary field combining the areas of ecology and evolutionary biology. The course includes mathematics, statistics, ecology, genetics, and systematics. Numerous types of organisms are studied.
The journal Theoretical Population Biology is published.
See also
References
External links
The Theory of Ecological Communities
Evolutionary biology
Ecology
Population |
https://en.wikipedia.org/wiki/Lottery%20competition | Lottery competition in ecology is a model for how organisms compete. It was first used to describe competition in coral reef fish. Under lottery competition, many offspring compete for a small number of sites (e.g., many fry competing for a few territories, or many seedlings competing for a few treefall gaps). Under lottery competition, one individual is chosen randomly to "win" that site (typically becoming an adult soon after), and the "losers" typically die off. Thus, in an analogy to a lottery or raffle, every individual has an equal chance of winning (like every ticket has an equal chance of being chosen), and therefore more abundant species are proportionately more likely to win (just as an individual who buys more tickets is more likely to win).
Some models generalize this idea by weighting some individuals who are more likely to be chosen (by analogy, this would be like some tickets counting as two tickets instead of one). When a population is below carrying capacity, e.g. due to ecological disturbance, then producing twice as many individuals is not identical to producing individuals twice as likely to win; the two specialized groups can coexist in a competition-colonization trade-off.
Lottery competition has been used to in understanding many key ideas in ecology, including the storage effect (species coexist because they are affected differently by environmental variation) and neutral theory (species diversity is maintained because species are competitively equivalent, and extinction rates are slow enough to be offset by speciation and dispersal events).
References
Ecology |
https://en.wikipedia.org/wiki/Tensor%20representation | In mathematics, the tensor representations of the general linear group are those that are obtained by taking finitely many tensor products of the fundamental representation and its dual. The irreducible factors of such a representation are also called tensor representations, and can be obtained by applying Schur functors (associated to Young tableaux). These coincide with the rational representations of the general linear group.
More generally, a matrix group is any subgroup of the general linear group. A tensor representation of a matrix group is any representation that is contained in a tensor representation of the general linear group. For example, the orthogonal group O(n) admits a tensor representation on the space of all trace-free symmetric tensors of order two. For orthogonal groups, the tensor representations are contrasted with the spin representations.
The classical groups, like the symplectic group, have the property that all finite-dimensional representations are tensor representations (by Weyl's construction), while other representations (like the metaplectic representation) exist in infinite dimensions.
References
, chapters 9 and 10.
Bargmann, V., & Todorov, I. T. (1977). Spaces of analytic functions on a complex cone as carriers for the symmetric tensor representations of SO(n). Journal of Mathematical Physics, 18(6), 1141–1148.
Tensors |
https://en.wikipedia.org/wiki/Sergey%20Kitaev | Sergey Kitaev (Russian: Сергей Владимирович Китаев; born 1 January 1975 in Ulan-Ude) is a Professor of Mathematics at the University of Strathclyde, Glasgow, Scotland.
He obtained his Ph.D. in mathematics from the University of Gothenburg in 2003 under the supervision of Einar Steingrímsson.
Kitaev's research interests concern aspects of combinatorics and graph theory.
Contributions
Kitaev is best known for his book Patterns in permutations and words (2011), an introduction to the field of permutation patterns.
He is also the author (with Vadim Lozin) of Words and graphs (2015) on the theory of word-representable graphs which he pioneered.
Kitaev has written over 120 research articles in mathematics.
Of particular note is his work generalizing vincular patterns to having partially ordered entries, a classification (with Anders Claesson) of bijections between 321- and 132-avoiding permutations, and a solution (with Steve Seif) of the word problem for the Perkins semigroup, as well as his work on word-representable graphs.
Selected publications
External links
Sergey Kitaev's page at the University of Strathclyde
References
Combinatorialists
21st-century Russian mathematicians
Academics of the University of Strathclyde
University of Gothenburg alumni
Novosibirsk State University alumni
1975 births
Living people |
https://en.wikipedia.org/wiki/Orbit%20capacity | In mathematics, orbit capacity of a subset of a topological dynamical system may be thought of heuristically as a “topological dynamical probability measure” of the subset. More precisely, its value for a set is a tight upper bound for the normalized number of visits of orbits in this set.
Definition
A topological dynamical system consists of a compact Hausdorff topological space X and a homeomorphism . Let be a set. Lindenstrauss introduced the definition of orbit capacity:
Here, is the membership function for the set . That is if and is zero otherwise.
Properties
Obviously, one has . By convention, topological dynamical systems do not come equipped with a measure; the orbit capacity can be thought of as defining one, in a "natural" way. It is not a true measure, it is only sub-additive:
Orbit capacity is sub-additive:
For a closed set C,
where MT(X) is the collection of T-invariant probability measures on X.
Small sets
When , is called small. These sets occur in the definition of the small boundary property.
References
Topological dynamics |
https://en.wikipedia.org/wiki/Google%20Pay%20%28payment%20method%29 | Google Pay (formerly Android Pay) is a mobile payment service developed by Google to power in-app, online, and in-person contactless purchases on mobile devices, enabling users to make payments with Android phones, tablets, or watches. Users can authenticate via a PIN, passcode, or biometrics such as 3D face scanning or fingerprint recognition.
, it is currently available in 71 countries.
Service
Google Pay uses near-field communication (NFC) to transmit card information facilitating funds transfer to the retailer. It replaces the credit or debit card chip and PIN or magnetic stripe transaction at point-of-sale terminals by allowing the user to upload these in Google Wallet. It is similar to contactless payments already used in many countries, with the addition of two-factor authentication. The service lets Android devices wirelessly communicate with point of sale systems using a near field communication (NFC) antenna and host-based card emulation (HCE).
When the user makes a payment to a merchant, Google Pay does not send the actual payment card number. Instead, it generates a virtual account number representing the user's account information.
Google Pay requires that a screen lock be set on the phone or watch. It has no card limit.
Users can add payment cards to the service by taking a photo of the card, or by entering the card information manually. To pay at points of sale, users hold their authenticated device to the point of sale system. The service has smart-authentication, allowing the system to detect when the device is considered secure (for instance if unlocked in the last five minutes) and challenge if necessary for unlock information.
Technology
Google Pay uses the EMV Payment Tokenization Specification.
The service keeps customer payment information private from the retailer by replacing the customer's credit or debit card Funding Primary Account Number (FPAN) with a tokenized Device Primary Account Number (DPAN) and creates a "dynamic security |
https://en.wikipedia.org/wiki/David%20Bevan%20%28mathematician%29 | David Bevan is an English mathematician, computer scientist and software developer.
He is known for Bevan's theorem, which gives the asymptotic enumeration of grid classes of permutations and for his work on enumerating the class of permutations avoiding the pattern 1324.
He is also known for devising weighted reference counting, an approach to computer memory management that is suitable for use in distributed systems.
Work and research
Bevan is a lecturer in combinatorics in the department of Mathematics and Statistics at the University of Strathclyde.
He has degrees in mathematics and computer science from the University of Oxford and a degree in theology from the London School of Theology. He received his PhD in mathematics from The Open University in 2015; his thesis, On the growth of permutation classes, was supervised by Robert Brignall.
In 1987, as a research scientist at GEC's Hirst Research Centre in Wembley, he developed an approach to computer memory management, called weighted reference counting, that is suitable for use in distributed systems.
During the 1990s, while working for the Summer Institute of Linguistics in Papua New Guinea, he developed a computer program, called FindPhone, that was widely used by field linguists to analyse phonetic data in order to understand the phonology of minority languages.
While employed by Pitney Bowes, he was a major contributor to the development of the FreeType text rendering library.
Bevan's mathematical research has concerned areas of enumerative combinatorics, particularly in relation to permutation classes.
He established that the growth rate of a monotone grid class of permutations is equal to the square of the spectral radius of a related bipartite graph.
He has also determined bounds on the growth rate of
the class of permutations avoiding the pattern 1324.
In the Acknowledgements sections of his journal articles, he often includes the Latin phrase
Soli Deo gloria.
Selected publications
External links |
https://en.wikipedia.org/wiki/Small%20boundary%20property | In mathematics, the small boundary property is a property of certain topological dynamical systems. It is dynamical analog of the inductive definition of Lebesgue covering dimension zero.
Definition
Consider the category of topological dynamical system (system in short) consisting of a compact metric space and a homeomorphism . A set is called small if it has vanishing orbit capacity, i.e., . This is equivalent to: where denotes the collection of -invariant measures on .
The system is said to have the small boundary property (SBP) if has a basis of open sets whose boundaries are small, i.e., for all .
Can one always lower topological entropy?
Small sets were introduced by Michael Shub and Benjamin Weiss while investigating the question "can one always lower topological entropy?" Quoting from their article:
"For measure theoretic entropy, it is well known and quite easy to see that a positive entropy transformation always has factors of smaller entropy. Indeed the factor generated by a two-set partition with one of the sets having very small measure will always have small entropy. It is our purpose here to treat the analogous question for topological entropy... We will exclude the trivial factor, where it reduces to one point."
Recall that a system is called a factor of , alternatively is called an extension of , if there exists a continuous surjective mapping which is eqvuivariant, i.e. for all .
Thus Shub and Weiss asked: Given a system and , can one find a non-trivial factor so that ?
Recall that a system is called minimal if it has no proper non-empty closed -invariant subsets. It is called infinite if .
Lindenstrauss introduced SBP and proved:
Theorem: Let be an extension of an infinite minimal system. The following are equivalent:
has the small-boundary property.
, where denotes mean dimension.
For every , , there exists a factor so and .
where is an inverse limit of systems with finite topological entropy for all .
La |
https://en.wikipedia.org/wiki/Micro-80 | The Micro-80 () was the first do-it-yourself home computer in the Soviet Union.
Overview
Schematics and information were published in the local DIY electronic magazine Radio in 1983. It was complex, using an KR580VM80A-based system (a clone of the Intel 8080) which contained about 200 ICs. This system gained low popularity, but set a precedent in getting the attention of hobbyists for DIY computers, and later other DIY computers were published by Radio and other DIY magazines.
History of creation
The creation of the Micro-80 prototype began in 1978, when a package from the Kiev NPO Kristall arrived at the Moscow Institute of Electronic Machine Building (MIEM) by mistake. There were microcircuits in that package. Soon, MIEM specialists figured out that this was a domestic analogue of the i8080 microprocessor and peripheral controllers and decided to create their own PC.
In 1979, the first sample of a microcomputer was launched. As in the first Western microcomputers, a terminal connected via a serial interface was used as a display device and keyboard, in this case the Videoton-340. There was also a punched tape reader FS-1500. 4 KB RAM was made on K565RU2 microcircuits with a 1K×1 organization (later the RAM was increased by another 8 KB). Initially, there was no ROM at all, and when the computer was turned on cold (as in one of the first American microcomputers Altair 8800 of 1975), it was necessary to manually enter the program for loading the block from punched tape with toggle switches. When i2708 chips (UV-ROM 1K×8) became available some time after the computer was running, they were used to store the ROM-BIOS and the monitor, eliminating the need to constantly load them from punched tape.
Popov developed a text video adapter that works on a conventional household TV and a keyboard read through the PPA KR580VV55, which eliminated the bulky industrial terminal. After a data storage system based on a cassette recorder was developed, in 1980 a prototype of a |
https://en.wikipedia.org/wiki/Specialist%20%28computer%29 | The Specialist () is a DIY computer designed in Soviet Union. Its description was published in Modelist-Konstructor (), a magazine for scale model builders in 1987. It was the first such publication in a magazine not oriented on electronics.
Overview
The original construction was developed by a professional technical school teacher two years earlier. It was much more advanced than previous DIY computers, because it had a higher graphical image resolution (384x256) and a "transparent" video system, which did not slow down the CPU when both the CPU and the video system tried to access the RAM simultaneously. It gained limited popularity with hobbyists, though some factories produced DIY kits (Lik for example).
Technical specifications
CPU: KR580VM80A (Intel 8080A clone) clocked at 2 MHz.
RAM: 32 or 48 KiB.
ROM: 2 KiB, expandable to 12 KiB. ROM contains monitor firmware.
Video: monochrome graphics mode. The image resolution is 384 × 256 pixels. Text can be displayed using 64 columns × 25 rows of characters. Images for the upper case Cyrillic and Latin characters in KOI-7 N2 encoding are built in the Monitor ROM.
Storage media: cassette tape. The recording format is compatible with the one used in Radio-86RK.
Keyboard: membrane type, 72 keys. The keyboard matrix is attached via programmable peripheral interface chip KR580VV55 (Intel 8255 clone) and scanned by CPU.
References
Soviet computer systems |
https://en.wikipedia.org/wiki/UT-88 | The UT-88 () is a DIY educational computer designed in the Soviet Union. Its description was published in YT dlya umelykh ruk (Young technical designer for skilled hands, ) — a supplement to Yunij Technik (Young technical designer, ) magazine in 1989. It was intended for building by school children of extracurricular hobby groups at Pioneers Palaces.
Description
At the time of publication, there were several DIY computers: Micro-80, Radio-86RK, and Specialist. The main feature of UT-88 was the possibility to build a computer in stages while getting a workable construction at each step. This approach made it easier to build by less skilled hobbyists.
The minimal configuration of the computer includes a power supply, CPU, 1 KiB of ROM and 1 KiB of RAM, 6 seven-segment displays, a 17-key keyboard, and a tape interface. This computer can be used as a scientific calculator.
Full configuration adds a display module with a TV interface, a full keyboard, and a 64 KiB dynamic RAM module.
References
Soviet computer systems |
https://en.wikipedia.org/wiki/Orion-128 | The Orion-128 () is a DIY computer designed in Soviet Union. It was featured in the Radio magazine in 1990, other materials for the computer were published until 1996. It was the last Intel 8080-based DIY computer in Russia.
Overview
The Orion-128 used the same concepts as the Specialist and had similar specifications, with both advances and flaws. It gained more popularity because it was supported by a more popular magazine. In the early 1990s the computer was produced industrially at the Livny pilot plant of machine graphics means in Oryol Oblast. Much of the software for the Orion-128 was ported by hobbyists from the Specialist and the ZX Spectrum.
Technical specifications
CPU: KR580VM80A (Intel 8080A clone) clocked at 2.5 MHz.
RAM: 128 KiB in original version, expandable to 256 KiB. A bank switching scheme was used.
ROM: 2 KiB contains monitor firmware
Video: three graphics modes with the same image resolution 384 × 256 pixels. Text can be displayed using 64 columns × 25 rows of characters. Images for the upper case Cyrillic and Latin characters in KOI-7 N2 encoding are built in the Monitor ROM. List of graphics modes includes:
monochrome mode (two color palettes available: black and green, yellow and blue)
4 color mode (each pixel has its own color, two palettes available)
16 color mode (each group of 8 horizontal pixels can use one of 16 foreground colors and one of 16 background colors)
Storage media: cassette tape, ROM drive (a special board containing a set of ROM chips). In later years a floppy disk controller and an ATA hard disk controller were developed
Keyboard: 67 keys. The keyboard matrix is attached via programmable peripheral interface chip KR580VV55 (Intel 8255 clone) and scanned by CPU
Peculiarities
"Orion" is partially compatible with "Radio-86RK" in terms of keyboard, standard ROM subroutines and data storage format on the cassette, and with another amateur radio computer, "Specialist" in terms of graphic screen format. Apparently, |
https://en.wikipedia.org/wiki/EURO%20Journal%20on%20Computational%20Optimization | The EURO Journal on Computational Optimization (EJCO) is a peer-reviewed academic journal that was established in 2012 and is now published by Elsevier.
It is an official journal of the Association of European Operational Research Societies, promoting the use of computers for the solution of optimization problems. Coverage includes both methodological contributions and innovative applications, typically validated through convincing computational experiments.
The editor-in-chief is
Immanuel Bomze.
Past Editor-in-Chief:
Martine Labbé (2012-2020).
Abstracting and indexing
The journal is abstracted and indexed in the following databases:
EBSCO Information Services
Emerging Sources Citation Index
Google Scholar
International Abstracts in Operations Research
Mathematical Reviews
OCLC
Research Papers in Economics
Scopus
Summon by ProQuest
Zentralblatt Math
External links
Operations research
English-language journals
Academic journals established in 2012 |
https://en.wikipedia.org/wiki/Distributed%20point%20function | In cryptography, a distributed point function is a cryptographic primitive that allows two distributed processes to share a piece of information, and compute functions of their shared information, without revealing the information itself to either process. It is a form of secret sharing.
Given any two values and one can define a point function (a variant of the Kronecker delta function) by
That is, it is zero everywhere except at , where its value is .
A distributed point function consists of a family of functions , parameterized by keys , and a method for deriving two keys and from any two input values and , such that for all ,
where denotes the bitwise exclusive or of the two function values. However, given only one of these two keys, the values of for that key should be indistinguishable from random.
It is known how to construct an efficient distributed point function from another cryptographic primitive, a one-way function.
In the other direction, if a distributed point function is known, then it is possible to perform private information retrieval.
As a simplified example of this, it is possible to test whether a key belongs to replicated distributed database without revealing to the database servers (unless they collude with each other) which key was sought. To find the key in the database, create a distributed point function for and send the resulting two keys and to two different servers holding copies of the database. Each copy applies its function or to all the keys in its copy of the database, and returns the exclusive or of the results. The two returned values will differ if belongs to the database, and will be equal otherwise.
References
Cryptographic primitives |
https://en.wikipedia.org/wiki/Meow%20Wars | The Meow Wars were an early example of a flame war sent over Usenet which began in 1996 and ended circa 1998. Its participants were known as "Meowers". The war was characterized by posters from one newsgroup "crapflooding", or posting a large volume of nonsense messages, to swamp on-topic communication in other groups. Ultimately, the flame war affected many boards, with Roisin Kiberd writing in Motherboard, a division of Vice, that esoteric Internet vocabulary was created as a result of the Meow Wars.
The wars began when some Harvard students, who had "colonized" an abandoned newsgroup for fans of Karl Malden, , and were using it as a community newsgroup for such posts about daily student life, jokingly suggested harassing members of the Beavis and Butthead fan group , would be a good idea. One of the students — who was actually using a Boston University address, since he was an alumnus — announced the plan on Usenet on January 9, 1996.
The original "Meowers" were denizens of the newsgroup, who responded to the "invasion" by adopting a "scorched earth" policy of rendering the newsgroup unusable. They began including the word "meow" in their posts in a reference to a karl-malden user with the initials CAT; the "meow" itself was a reference to Henrietta Pussycat, a character from Mr. Rogers' Neighborhood.
Once the Harvard students abandoned alt.fan.karl-malden.nose, it became the Meowers' base of operations for what they called their "Usenet Performance Art". The Harvard students retreated to a private news server. After taking over the Meowers decided to expand their campaign of operations, and spread throughout the alt.* hierarchy, to the so-called "Big 8" groups, and out to the wider Internet. The invasion and disruption of various groups lasted for over one year.
Escalation
As the Meowers spilled over into more newsgroups, some experienced Usenetters placed the word "meow" and names of commonly seen Meowers into personal filters known as killfiles. This w |
https://en.wikipedia.org/wiki/IMA%20Journal%20of%20Applied%20Mathematics | The IMA Journal of Applied Mathematics is a publication of Oxford University Press on behalf of the Institute of Mathematics and its Applications. Created in 1965, the Journal covers topics related to the application of mathematics.
References
External links
Journal homepage
Submission website
Institute of Mathematics and its Applications
Oxford University Press academic journals
Mathematics journals
Academic journals established in 1965
Bimonthly journals
Hybrid open access journals |
https://en.wikipedia.org/wiki/M-PHY | M-PHY is a high speed data communications physical layer protocol standard developed by the MIPI Alliance, PHY Working group, and targeted at the needs of mobile multimedia devices. The specification's details are proprietary to MIPI member organizations, but a substantial body of knowledge can be assembled from open sources. A number of industry standard settings bodies have incorporated M-PHY into their specifications including Mobile PCI Express, Universal Flash Storage, and as the physical layer for SuperSpeed InterChip USB.
To support high speed, M-PHY is generally transmitted using differential signaling over impedance controlled traces between components. When use on a single circuit card, the use of electrical termination may be optional. Options to extend its range could include operation over a short flexible flat cable, and M-PHY was designed to support optical media converters allowing extended distance between transmitters and receivers, and reducing concerns with electromagnetic interference.
Applications
M-PHY (like its predecessor D-PHY) is intended to be used in high-speed point-to-point communications, for example video Camera Serial Interfaces. The CSI-2 interface was based on D-PHY (or C-PHY), while the newer CSI-3 interface is based on M-PHY. M-PHY was designed to supplant D-PHY in many applications, but this is expected to take a number of years.
The M-PHY the physical layer is also used in a number of different high-speed emergent industry standards, DigRF (High speed radio interface), MIPI LLI (Low latency memory interconnect for multi-processors systems), and one possible physical layer for the UniPro protocol stack.
Signaling speed and gears
M-PHY supports a scalable variety of signaling speeds, ranging from 10 kbit/s to over 11.6 Gbit/s per lane. This is accomplished using two different major signaling/speed modes, a simple low-speed (using PWM) mode and high speed (using 8b10b). Communications goes on in bursts, and the design of b |
https://en.wikipedia.org/wiki/Joseph%20Weisbecker | Joseph A. Weisbecker (September 4, 1932 – November 15, 1990) was an early microprocessor and microcomputer researcher, as well as a gifted writer and designer of toys and games. He was a recipient of the David Sarnoff award for outstanding technical achievement, recipient of IEEE Computer magazine's "Best Paper" award, as well as several RCA lab awards for his work.
His designs include the RCA 1800 and 1802 processors, the 1861 "Pixie" graphics chip, the RCA Microtutor, the COSMAC ELF, RCA Studio II, and COSMAC VIP computers. His daughter Joyce Weisbecker took to programming his prototypes, becoming the first female video game designer in the process, using his language called CHIP-8.
Early career
Professionally, Weisbecker began working with digital logic and computer systems in 1951. It was also his hobby, however, and even his early work is marked by designs that are intended for educational or hobbyist use. These include a hobby tic-tac-toe computer built from relays in 1951, grade school educational aids built using lights and switches in 1955, and the Think-a-Dot, an inexpensive game to teach basic computer concepts in 1964.
As a staff engineer at RCA, he performed advanced development research on LSI circuits as well as development of new product lines based on those circuits and other RCA products.
Microprocessors
In 1970 and 1971, Weisbecker developed a new 8 bit architecture computer system. This work preceded the release of the 4004 by competitor Intel. He built a demonstration home computer powered by the 1802 called FRED (Flexible Recreational and Educational Device) that utilized cassette tape for storage and a television for display. Subsequent to the success of the 4004, RCA released Weisbecker's work as the COSMAC 1801R and 1801U using its CMOS process in 1975. In 1976 the two 1801 ICs were integrated into a single chip, the 1802.
In the time between 1971 and the production release of the 1800 series processor, Weisbecker developed a range o |
https://en.wikipedia.org/wiki/Simulation%20governance | Simulation governance is a managerial function concerned with assurance of reliability of information generated by numerical simulation. The term was introduced in 2011 and specific technical requirements were addressed from the perspective of mechanical design in 2012. Its strategic importance was addressed in 2015. At the 2017 NAFEMS World Congress in Stockholm simulation governance was identified as the first of eight “big issues” in numerical simulation.
Simulation governance is concerned with (a) selection and adoption of the best available simulation technology, (b) formulation of mathematical models, (c) management of experimental data, (d) data and solution verification procedures, and (e) revision of mathematical models in the light of new information collected from physical experiments and field observations.
Plans for simulation governance have to be formulated to fit the mission of each organization or department within an organization: In the terminology of structural and mechanical engineering, typical missions are:
Application of established rules of design and certification: Given the allowable value defined in a design rule , show that .
Formulation of design rules (typically for new materials or material systems): What is ? This involves the interpretation of results from coupon tests and component tests.
Condition-based maintenance (typically of high-value assets): Given a detected flaw, what is the probability that failure will occur after load cycles?
Structural analysis of large structures (such as airframes, marine structures, automobiles under crash conditions).
Note that items 1 to 3 require strength analysis where the quantities of interest are related to the first derivatives of the displacement field. Item 4 refers to structural analysis where the quantities of interest are force-displacement relations or accelerations (as in crash dynamics). This distinction is important because in strength analysis errors associated wi |
https://en.wikipedia.org/wiki/Dr.%20Duke%27s%20Phytochemical%20and%20Ethnobotanical%20Databases | Dr. Duke's Phytochemical and Ethnobotanical Databases is an online database developed by James A. Duke at the USDA.
The databases report species, phytochemicals, and biological activity, as well as ethnobotanical uses.
The current Phytochemical and Ethnobotanical databases facilitate plant, chemical, bioactivity, and ethnobotany searches. A large number of plants and their chemical profiles are covered, and data are structured to support browsing and searching in several user-focused ways. For example, users can
get a list of chemicals and activities for a specific plant of interest, using either its scientific or common name
download a list of chemicals and their known activities in PDF or spreadsheet form
find plants with chemicals known for a specific biological activity
display a list of chemicals with their LD toxicity data
find plants with potential cancer-preventing activity
display a list of plants for a given ethnobotanical use
find out which plants have the highest levels of a specific chemical
References to the supporting scientific publications are provided for each specific result. Also included are links to nutritional databases, plants and cancer treatments and other plant-related databases.
The content of the database is licensed under the Creative Commons CC0 public domain.
External links
Dr. Duke's Phytochemical and Ethnobotanical Databases
References
(dataset) U.S. Department of Agriculture, Agricultural Research Service. 1992-2016. Dr. Duke's Phytochemical and Ethnobotanical Databases. Home Page, http://phytochem.nal.usda.gov/
Biology websites
Biodiversity databases
Online databases
Taxonomy (biology) |
https://en.wikipedia.org/wiki/BBC%20Player | BBC Player is an authenticated multi-genre subscription video on demand service operated by BBC Studios, formerly BBC Worldwide, for the Asia market. It is available online and as an app.
The service debuted in Singapore in summer 2016 to StarHub subscribers, in Malaysia in March 2017 with Telekom Malaysia, in Poland in June 2022 with Canal+, and most recently in Taiwan in August 2023 with Taiwan Mobile myVideo.
BBC Player offers curated content from BBC global brands – BBC Earth, BBC First, BBC Lifestyle, CBeebies and BBC World News. Although not available to watch on linear TV in Asia, BBC Brit is available to watch on BBC Player.
The most popular British programmes are available through the service, including Top Gear, Doctor Who, The Great British Bake Off and Sherlock.
References
Media players
Internet television channels
Streaming media systems
BBC |
https://en.wikipedia.org/wiki/Ekonomist%20%28magazine%29 | Ekonomist is a Montenegrin online magazine, founded in 2014 in Podgorica. Ekonomist'''s primary focus is Montenegrin and world events, finances, business and economy. It aims at promoting good business practice and developing entrepreneurial awareness, as an important aspect of economic growth. Ekonomist'' is also the only FinTech portal in Montenegro, thus representing a platform for business and technology themes. In addition to national and world news, it features interviews, opinions, and career advice. Editor in chief is Ljiljana Premović.
History
Ekonomist was founded in 2014 in Podgorica, Montenegro. The magazine was established with the goal of providing accurate and objective news and analysis related to Montenegro's economy, business, and finance sectors. The magazine is published in Montenegrin and offers articles on a range of topics, including market trends, financial analysis, and policy developments. In addition to its online platform, the magazine has also published several print editions. Over the years, Ekonomist has become a leading source of economic news and analysis in Montenegro, and currently rank the 3rd best finance magazine.
Sources
External links
Official website
Business magazines
Magazines established in 2014
Mass media in Podgorica
Magazines published in Montenegro
Online magazines |
https://en.wikipedia.org/wiki/RCF%20audio | RCF S.p.A. (formerly Radio Cine Forniture - R.C.F. S.r.l.) is a widely recognized Italian manufacturer of high performance audio products including power amplifiers, loudspeakers, digital mixers and digital signal processors (DSP).
History
RCF is an Italian audio products manufacturer founded in 1949 in Reggio Emilia. The first products sold were microphones and electroacoustic transducers (loudspeakers). In the late ’60s, concert sound was going electric, and many loudspeaker pioneers were searching for high-powered devices to use in their designs. RCF was one of the first European OEM suppliers for international brands, thanks to the experience built on high power transducers. After a few years, thanks to the in-depth know-how in loudspeaker technology, RCF began to develop and produce sound reinforcement systems under the same brand.
The introduction of the ART Series, in 1996, has established RCF among the few global manufacturers of active loudspeakers. The TT+ High Definition - Touring and Theater series equipped with DSP, introduced in 2004, and the RDNet Networked Management technology, gained RCF full recognition in the professional audio market. Since 2017, all DSP active speakers incorporate FiRPHASE technology, which allows achieving a 0° linear phase playback. RCF is the first audio manufacturer to have a complete catalogue of 0° phase-compatible sound systems including line arrays.
RCF gave its name to the RCF Arena, the largest permanent outdoor concert arena in Europe.
Professional Audio Systems
ART 3/4/7/9 - Portable Speakers
Nx Series - Professional Speakers with Wood Cabinet
D-Line & HDL - Professional Portable Speakers
EVOX - Column Array Portable Speakers
Max Series - Hi Performance Speakers for Entertainment
Sub Series
Analog Mixer series
Digital Mixer series
TT+ Audio - High Performance Touring & Install Systems for large-size, high quality applications
Studio Monitoring AYRA PRO / MYTHO / Iconica headphones
System Integration |
https://en.wikipedia.org/wiki/System%20Module | System Modules (originally known as System Building Blocks; the name was changed around 1961) are a DEC modular digital logic family which preceded the later FLIP CHIPs. They connect to the units they are plugged into via a set of 22 gold-plated discrete pins along one edge.
They use transistor inverter circuits, with the transistors operating saturated, to avoid dependence on tight tolerances; they use -3V and 0V as logic levels. Intended for prototyping as well as production, they include design features intended to avoid damage. They are provided with design advice which includes loading rules and wiring instructions.
They were available in several compatible speed lines:
4000-Series: the second series, nominally 500 KHz, but some 1 MHz
1000-Series: the original series, nominally 5 MHz
6000-Series: higher speeds, nominally 10 Mhz
8000-Series: very high speeds, nominally 30MHz
In addition, special modules were available for purposes such as Input/Output (I/O) converters (to standard internal voltages), bus drivers, lamp and solenoid drivers, A/D conversion, relays, core memory drivers, etc.
Larger assemblies which are part of the same family provide core memory testing devices. There are also power supplies, mounting panels with slots for the modules, cabinets to hold groups of mounting panels, indicator light panels, etc.
References
Citations
Sources
External links
DEC Building Block Logic manual from the Computer History Museum, dated September 1960
Digital Logic Handbook, Third Edition, dated March 1961.
New Module Accessories, dated February 1964
30 Megacycle Modules, dated September 1964
System Modules, dated 1968.
DEC hardware |
https://en.wikipedia.org/wiki/Bare%20machine%20computing | Bare Machine Computing (BMC) is a computer architecture based on bare machines. In the BMC paradigm, applications run without the support of any operating system (OS) or centralized kernel i.e., no intermediary software is loaded on the bare machine prior to running applications. The applications, which are called bare machine applications or simply BMC applications, do not use any persistent storage or a hard disk, and instead are stored on detachable mass storage such as a USB flash drive. A BMC program consists of a single application or a small set of applications (application suite) that runs as a single executable within one address space. BMC applications have direct access to the necessary hardware resources. They are self-contained, self-managed and self-controlled entities that boot, load and run without using any other software components or external software. BMC applications have inherent security due to their design. There are no OS-related vulnerabilities, and each application only contains the necessary (minimal) functionality. There is no privileged mode in a BMC system since applications only run in user mode. Also, application code is statically compiled-there is no means to dynamically alter BMC program flow during execution.
History
In the early days of computing, computer applications directly communicated to the hardware and there was no operating system. As applications grew larger encompassing various domains, OSes were invented. They served as middleware providing hardware abstractions to applications. OSes have grown immensely in their size and complexity resulting in attempts to reduce OS overhead and improve performance including Microkernel, Exokernel, Tiny-OS, OS-Kit, Palacios and Kitten, IO_Lite, bare-metal Linux, IBM-Libra and other lean kernels. In addition to the above approaches, in embedded systems such as smart phones, a small and dedicated portion of an OS and a given set of applications are closely integrated with the hardw |
https://en.wikipedia.org/wiki/FT8 | FT8 or Franke & Taylor 8 is a frequency shift keying digital mode of radio communication used by amateur radio operators worldwide. Following release on June 29, 2017, by its creators Joe Taylor, K1JT, and Steve Franke, K9AN, along with the software package WSJT, FT8 was adopted rapidly and, in little over two years, it became the most popular digital mode recorded by automatic spotting networks such as PSK Reporter. FT8DMC is the most important club dedicated to this mode of digital communication.
Introduction
FT8 is a popular form of digital weak signal communication used primarily by amateur radio operators to communicate on amateur radio bands with a majority of traffic occurring on the HF amateur bands. The mode offers operators the ability to communicate in unfavorable environments such as during low sun spot numbers, high RF noise, or during low power operations. With advances in signal processing technology FT8 is able to decode signals with a signal to noise ratio as low as −20 dB in a 2500 Hz bandwidth, which is significantly lower than CW or SSB transmissions.
Operation
FT8 sends 77 information bits in 15-second cycles with 12.64 seconds of transmission time and 2.36 seconds of decode time for a user data rate of 6.09 bits/sec. Source encoding gives an effective throughput of about 5 words per minute. The required SNR in a 2500 Hz bandwidth is −21 dB, so the corresponding Eb/N0 is 10 log10(2500/6.09) = 26.1 dB greater, or −21 dB + 26.1 = 5.1 dB. The mode requires the sending and receiving computers to be synchronised so, while manual time setting is possible, most users make use of automatic online time servers using NTP or by receiving broadcast time signals from the GPS to ensure their transmissions fall in the proper windows.
Each FT8 transmission can support up to 13 text characters, coded using forward error correction to ensure proper transmission and decoding despite common radio effects such as fading, noise, interference, poor propagation, lo |
https://en.wikipedia.org/wiki/Radiosynthesis%20%28metabolism%29 | Radiosynthesis is the theorized capture and metabolism, by living organisms, of energy from ionizing radiation, analogously to photosynthesis. Metabolism of ionizing radiation was theorized as early as 1956 by the Russian microbiologist S. I. Kuznetsov.
Beginning in the 1990s, researchers at the Chernobyl Nuclear Power Plant uncovered some 200 species of apparently radiotrophic fungi containing the pigment melanin on the walls of the reactor room and in the surrounding soil. Such "melanized" fungi have also been discovered in nutrient-poor, high-altitude areas which are exposed to high levels of ultraviolet radiation.
Following the Russian results, an American team at the Albert Einstein College of Medicine of Yeshiva University in New York began experimenting with radiation exposure of melanin and melanized fungi. They found that ionizing radiation increased the ability of melanin to support an important metabolic reaction, and that Cryptococcus neoformans fungi grew three times faster than normal. Microbiologist Ekaterina Dadachova suggested such fungi could serve as a food supply and source of radiation protection for interplanetary astronauts, who would be exposed to cosmic rays.
In 2014, the American research group was awarded a patent for a method of enhancing the growth of microorganisms through increasing melanin content. The inventors of this process claimed their fungi were employing radiosynthesis, and hypothesized that radiosynthesis may have played a role in early life on Earth, by allowing melanized fungi to act as autotrophs.
From October 2018 through March 2019, NASA conducted an experiment aboard the International Space Station to study radiotrophic fungi as a potential radiation barrier to the harmful radiation in space. Radiotrophic fungi have many possible applications on Earth as well, potentially including a disposal method for nuclear waste or use as high-altitude biofuel or a nutrition source.
References
Radiobiology
Biochemistry
Photo |
https://en.wikipedia.org/wiki/ARCore | ARCore, also known as Google Play Services for AR, is a software development kit developed by Google that allows for augmented reality applications to be built.
ARCore uses three key technologies to integrate virtual content with the real world as seen through the camera of a smartphone or tablet:
Six degrees of freedom allows the phone to understand and track its position relative to the world.
Environmental understanding allows the phone to detect the size and location of flat horizontal surfaces like the ground or a coffee table.
Light estimation allows the phone to estimate the environment's current lighting conditions.
ARCore has been integrated into a multitude of devices.
References
External links
Google software
Software development kits
Computer-related introductions in 2018
3D imaging
Augmented reality |
https://en.wikipedia.org/wiki/Tesla%20Roadster%20%28second%20generation%29 | The Tesla Roadster is an upcoming battery electric four-seater sports car to be built by Tesla, Inc. The company has said that it will be capable of accelerating from 0 to 60 mph in 1.9 seconds. The Roadster is the successor to Tesla's first production car, the 2008 Roadster.
Tesla CEO Elon Musk has said that the Roadster should ship in 2024. Musk said in a tweet that higher-performance trim levels will be available beyond the base specifications, including a SpaceX package that would "include ~10 small rocket cold air thrusters arranged seamlessly around the car" which would supposedly allow for dramatic improvements in "acceleration, top speed, braking & cornering" such as a claimed 1.1 second 0–60 mph (0–97 km/h) time.
Overview
History
In 2011, at the end of the production run of the original Tesla Roadster, Elon Musk suggested that a new version of the Roadster, without the Lotus chassis, would return to production by 2014. The new Roadster was first teased in 2014. At the time, it was also referred to as the Tesla Model R.
In 2015, Musk suggested a new Roadster, capable of faster acceleration. A tweet by Elon Musk in December 2016 reconfirmed a second Roadster was in the works, but still "some years away". The second Roadster was designed by Franz von Holzhausen.
A prototype of the Roadster was shown in a surprise moment at the end of the Tesla Semi event on November 16, 2017, with an announced availability in the year 2020 at the starting price of US$200,000. Musk explained the concept as: "The point of doing this is to give a hardcore smackdown to gasoline cars. Driving a gasoline sports car is going to feel like a steam engine with a side of quiche." Test rides were given at the event for those who immediately paid the first $5,000 of a $50,000 deposit to pre-order the vehicle. Additional information followed after the teaser, such as the various world-record speeds Tesla said it will break.
In June 2018, Elon Musk revealed a potential feature called |
https://en.wikipedia.org/wiki/OpenFrame | OpenFrame is a mainframe rehosting solution developed by TmaxSoft that aims to help customers move existing mainframe assets to the cloud quickly and with minimal risk. It replaces legacy CICS/IMS/JES mainframe engines and shifts business applications written in legacy code like COBOL and PL/I to Linux. This allows reduced licensing costs compared to the mainframe.
It also includes a test tool which helps users determine if the migration will preserve functionality without additional adjustments.
The current version of OpenFrame is 7.0, which was first released in Japan in September, 2015. The previous version, OpenFrame 6.0 was released in the U.S. market in 2009.
Mainframe Migration
Organizations that run on mainframes tend to have difficulty with costs and agility. Rehosting is one approach an organization may take to migrate their mainframe operations to the cloud, with other options including batch-job migration and full re-engineering. With the rehosting option, the entire mainframe is emulated on the cloud so that the end-user experience is essentially unchanged.
Compatibility
OpenFrame advertises the following components can be migrated and continue working without modification, provided they run on open systems components such as Linux:
Compilers
COBOL
PL/I
Assembler
Datasets
Flat files
GDGs
VSAM
Databases
IMS
DB2
IDMS
Oracle
Online Systems
CICS
Batch Systems
JES
JCL
Notable Users
Kela
Kela, the Finnish government agency in charge of the nation's social security programs, used OpenFrame to rehost its mainframe. The agency had estimated that the rising costs of maintaining a mainframe would become prohibitive in the near future, and saw a shortage of IT professionals skilled in working in a mainframe environment. As a result, Kela was able to lift over 10 million lines of code to the rehosted environment and reduce the cost of system maintenance. Since the rehosted iteration was functionally similar to the mainframe system, Kela |
https://en.wikipedia.org/wiki/Envelope%20%28category%20theory%29 | In :Category theory and related fields of mathematics, an envelope is a construction that generalizes the operations of "exterior completion", like completion of a locally convex space, or Stone–Čech compactification of a topological space. A dual construction is called refinement.
Definition
Suppose is a category, an object in , and and two classes of morphisms in . The definition of an envelope of in the class with respect to the class consists of two steps.
A morphism in is called an extension of the object in the class of morphisms with respect to the class of morphisms , if , and for any morphism from the class there exists a unique morphism in such that .
An extension of the object in the class of morphisms with respect to the class of morphisms is called an envelope of in with respect to , if for any other extension (of in with respect to ) there is a unique morphism in such that . The object is also called an envelope of in with respect to .
Notations:
In a special case when is a class of all morphisms whose ranges belong to a given class of objects in it is convenient to replace with in the notations (and in the terms):
Similarly, if is a class of all morphisms whose ranges belong to a given class of objects in it is convenient to replace with in the notations (and in the terms):
For example, one can speak about an envelope of in the class of objects with respect to the class of objects :
Nets of epimorphisms and functoriality
Suppose that to each object in a category it is assigned a subset in the class
of all epimorphisms of the category , going from , and the following three requirements are fulfilled:
for each object the set is non-empty and is directed to the left with respect to the pre-order inherited from
for each object the covariant system of morphisms generated by
has a colimit in , called the local limit in ;
for each morphism and for each element there are an ele |
https://en.wikipedia.org/wiki/IPv4%20shared%20address%20space | In order to ensure proper working of carrier-grade NAT (CGN), and, by doing so, alleviating the demand for the last remaining IPv4 addresses, a size IPv4 address block was assigned by Internet Assigned Numbers Authority (IANA) to be used as shared address space.
This block of addresses is specifically meant to be used by Internet service providers (or ISPs) that implement carrier-grade NAT, to connect their customer-premises equipment (CPE) to their core routers.
Instead of using unique addresses from the rapidly depleting pool of available globally unique IPv4 addresses, ISPs use addresses in for this purpose. Because the network between CPEs and the ISP's routers is private to each ISP, all ISPs may share this block of addresses.
Background
If an ISP deploys a CGN and uses private Internet address space (networks , , ) to connect their customers, there is a risk that customer equipment using an internal network in the same range will stop working. The reason is that routing will not work if the same address ranges are used on both the private and public sides of a customer’s network address translation (NAT) equipment. Normal packet flow can therefore be disrupted and the customer effectively cut off the Internet, unless the customer chooses another private address range that does not conflict with the range selected by their ISP.
This prompted some ISPs to develop policy within American Registry for Internet Numbers (ARIN) to allocate new private address space for CGNs. ARIN, however, deferred to the Internet Engineering Task Force (IETF) before implementing the policy, indicating that the matter was not typical allocation but a reservation for technical purposes.
In 2012, the IETF defined a Shared Address Space for use in ISP CGN deployments and NAT devices that can handle the same addresses occurring both on inbound and outbound interfaces. ARIN returned space to the IANA as needed for this allocation and "The allocated address block is ".
Transition to |
https://en.wikipedia.org/wiki/Juku%20E5101 | Juku E5101 was a personal computer targeted at Estonian schools which was released in 1988. The computer had monochrome display, a mouse and basic LAN capabilities, it ran CP/M 2.2 based EKDOS and had a Soviet Intel 8080A clone KR580VM80A for CPU.
Juku E5101 was developed by and the Institute of Cybernetics of the Academy of Sciences of Estonia, test batch of 100 was produced in cooperation with factory in 1986. The computer initially used tape recorder as storage and was reported as first computer in USSR to have mouse attached. In a multibus (Soviet I41) compatible expansion slot one could also connect 32 KiB memory expansion cards or ROM cartridges.
Juku E5104 production of which started in December 1988 was upgraded to use dual 5.25 inch diskette drive and drivers for printers. Despite relabelling it to "intellectual terminal for real-time system E5104", the label presented on main unit remained E5101.
During first two years of serial production around 2000 Jukus were produced and last batch of 500 was ordered by Estonian Ministry of Education in 1992. Altogether 3000 Jukus were produced at Narva, plant (from Russian "Балтиец", Baltiyets), 2500 of them for school use.
In 1991 many, if not all, bigger (at least 100 pupils) Estonian schools had a computer classroom that was furnished with those machines and Epson LX800 printers.
Although the production was delayed four years and computers delivered were technologically outdated, Jukus did enable Estonia to "gain a head start in mass school computerization" by providing early access to computers and a standardized study environment. Despite conceived lack of end user skills and the shortage of computer professionals, there were schools having dedicated teachers and students themselves writing software for Jukus during extra hours at computer class, often convincing schools to lend computers home for summer vacation.
In general tens of thousands students got their first computing experience with Juku "much |
https://en.wikipedia.org/wiki/Catherine%20Yan | Catherine Huafei Yan () is a professor of mathematics at Texas A&M University interested in algebraic combinatorics.
Education and career
Yan earned a bachelor's degree from Peking University in 1993.
She was a student of Gian-Carlo Rota at the Massachusetts Institute of Technology, where she earned her Ph.D. in 1997 with a dissertation on The Theory of Commuting Boolean Algebras.
After working for two years as a Courant Instructor at New York University, she joined Texas A&M in 1999, with a three-year hiatus as Chern Professor at the Center of Combinatorics, Nankai University, from 2005 to 2008.
Book
With her advisor and Joseph Kung, she is an author of Combinatorics: The Rota Way (Cambridge University Press, 2009). The book provides an exposition of the areas of combinatorics of interest to Rota, unified through an algebraic framework, and lists many open research problems in this area.
Recognition
Yan won a Sloan Research Fellowship in 2001.
She was elected to the 2018 class of fellows of the American Mathematical Society "for contributions to combinatorics and discrete geometry".
References
External links
Home page
Year of birth missing (living people)
Living people
21st-century American mathematicians
Chinese women mathematicians
Combinatorialists
International Mathematical Olympiad participants
High School Affiliated to Renmin University of China alumni
Peking University alumni
Massachusetts Institute of Technology School of Science alumni
New York University faculty
Texas A&M University faculty
Academic staff of Nankai University
Sloan Research Fellows
Fellows of the American Mathematical Society
Place of birth missing (living people)
Nationality missing
21st-century women mathematicians |
https://en.wikipedia.org/wiki/History%20of%20computing%20in%20the%20Soviet%20Union | The history of computing in the Soviet Union began in the late 1940s, when the country began to develop its Small Electronic Calculating Machine (MESM) at the Kiev Institute of Electrotechnology in Feofaniya. Initial ideological opposition to cybernetics in the Soviet Union was overcome by a Khrushchev era policy that encouraged computer production.
By the early 1970s, the uncoordinated work of competing government ministries had left the Soviet computer industry in disarray. Due to lack of common standards for peripherals and lack of digital storage capacity the Soviet Union's technology significantly lagged behind the West's semiconductor industry. The Soviet government decided to abandon development of original computer designs and encouraged cloning of existing Western systems (e.g. the 1801 CPU series was scrapped in favor of the PDP-11 ISA by the early 1980s).
Soviet industry was unable to mass-produce computers to acceptable quality standards and locally manufactured copies of Western hardware were unreliable. As personal computers spread to industries and offices in the West, the Soviet Union's technological lag increased.
Nearly all Soviet computer manufacturers ceased operations after the breakup of the Soviet Union. A few companies that survived into 1990s used foreign components and never achieved large production volumes.
History
Early history
In 1936, an analog computer known as a water integrator was designed by Vladimir Lukyanov. It was the world's first computer for solving partial differential equations.
The Soviet Union began to develop digital computers after World War II. A universally programmable electronic computer was created by a team of scientists directed by Sergey Lebedev at the Kiev Institute of Electrotechnology in Feofaniya. The computer, known as MESM (), became operational in 1950. By some authors it was also depicted as the first such computer in continental Europe, even though the Zuse Z4 and the Swedish BARK preceded it. Th |
https://en.wikipedia.org/wiki/DataCore | DataCore, also known as DataCore Software, is a developer of software-defined storage based in Fort Lauderdale, Florida, United States. The company is a pioneer in the development of SAN virtualization technology, and offers software-defined storage solutions across core data center, edge and cloud environments.
History
DataCore was founded in Fort Lauderdale in February 1998 by George Teixeira and Ziya Aral, co-workers at parallel computing company Encore Computer. The premise behind the company was to allow network operators to purchase commodity disk drives, external storage arrays or SAN disk drive arrays, and treat them all as virtual disks of networked, block-access storage. This storage was controlled using DataCore software.
They were joined by 10 other former Encore colleagues, and they all worked without pay until January 1999, when the company secured its first funding round, of $8 million.
In 2000, the company had a $35 million Series C funding round.
In 2006, seeing an exodus of venture funding, company employees mortgaged their homes to keep the business going, until 2008 when a US$30 million round of funding stabilized company finances.
In 2011, the company launched SANsymphony-V, an upgrade to its storage virtualization software offering faster performance.
In April 2014, the company released version 10 of its SANsymphony product.
In March 2015, DataCore partnered with Chinese technology vendor Huawei to run SANsymphony-V software on Huawei's FusionServer to create virtual storage networks.
In 2016, the company's SANsymphony-V software was reported to have set new price performance records based on testing done by Redwood City, California-based non-profit testing company Storage Performance Council using their SPC-1 storage performance benchmark. The results led to complaints from multiple vendors, who claimed that storing all the "test" data in cache made the results unfair. One of the three SPC-1 benchmark results was later withdrawn.
In M |
https://en.wikipedia.org/wiki/Lattice%20and%20bridged-T%20equalizers | Lattice and bridged-T equalizers are circuits which are used to correct for the amplitude and/or phase errors of a network or transmission line. Usually, the aim is to achieve an overall system performance with a flat amplitude response and constant delay over a prescribed frequency range, by the addition of an equalizer.
In the past, designers have used a variety of techniques to realize their equalizer circuits. These include the method of complementary networks; the method of straight line asymptotes; using a purpose built test-jig; the use of standard circuit building blocks,; or with the aid of computer programs. In addition, trial and error methods have been found to be surprisingly effective, when performed by an experienced designer.
In video or audio channels, equalization results in waveforms that are transmitted with less degradation and have sharper transient edges with reduced overshoots (ringing) than before. In other applications, such as CATV distribution systems or frequency multiplexed telephone signals where multiple carrier signals are being passed, the aim is to equalize the transmission line so that those signals have much the same amplitude. The lattice and bridged-T circuits are favoured for passive equalizers because they can be configured as constant-resistance networks such as the Zobel network, as pointed out by Zobel and later by Bode.
The single word description “equalizer” is commonly used when the main purpose of the network is to correct the amplitude response of a system, even though some beneficial phase correction may also be achieved at same time. When phase correction is the main concern, the more explicit term "phase equalizer" or "phase corrector" is used. (In this case, the circuit is usually an all-pass network which does not alter the amplitude response at all such as the lattice phase equalizer).
When equalizing a balanced transmission line, the lattice is the best circuit configuration to use, wh |
https://en.wikipedia.org/wiki/Quirks%20%28board%20game%29 | Quirks is a 1980 board game published by Eon Products.
Gameplay
The game components are a 108 cards printed on thin cardstock representing characteristics of animals and plants, and a game board, also printed on thin cardstock. The object of the game is to build three viable organisms called "quirks" from two or three of the cards.
Reception
In the February 1981 edition of The Space Gamer (No. 36), Forrest Johnson liked Quirks, saying, "This is a good family game."
Ian Livingston reviewed Quirks for White Dwarf #24, giving it an overall rating of 9 out of 10, and stated that "All in all it is totally absurd but great fun and Eon Products must be congratulated for coming up with another ace."
In the May 1981 edition of Ares (Issue 8), Eric Goldberg found the most serious flaw in the game was an ever-diminishing replay value as players either consciously or subconsciously memorized the card values. "Quirks.. is fun only for a limited number of times. The game is quite good until that point of diminishing returns is reached."
Games magazine included Quirks in their "Top 100 Games of 1981", praising it as a "lighthearted game" involving "weird creatures and plants".
In the December 1993 edition of Dragon (Issue 200), Allen Varney gave a thumbs down to the game. "One big flaw, I think, is that [the game] never identifies players with the animals they're evolving. Instead they're unspecified creature-makers who look down on these beasts and foliage from above. Quirks would involve me a lot more by evolving me — making me the creature who needs to emerge victorious in a niche. Deciding whether to eat plants or animals, or if I should ditch my wings in favor of an electric sting — that sounds like fun."
Reviews
Jeux & Stratégie #17
References
Biology-themed board games
Board games introduced in 1980 |
https://en.wikipedia.org/wiki/Haptik | Haptik is an Indian enterprise conversational AI platform founded in August 2013, and acquired by Reliance Industries Limited in 2019. The company develops technology to enable enterprises to build conversational AI systems that allow users to converse with applications and electronic devices in free-format, natural language, using speech or text. The company has been accorded numerous accolades including the Frost & Sullivan Award, NASSCOM's Al Game Changer Award, and serves Fortune 500 brands globally in industries such as financial, insurance, healthcare, technology and communications.
History
Haptik was founded by Aakrit Vaish and Swapan Rajdev, in August 2013. The company launched its first product Haptik app in March 2014, which is a chat-based personal assistant which lets its users get things done for Android and iOS platforms in India. By September 2014, the platform added 125 chat experts who helped users with their queries.
Over time the company upgraded it into a complete conversational commerce app. The app received 2 million downloads and 15 million installations.
In August 2015, Dan Roth joined Haptik's board of advisers who helped scale the platform's Natural language processing (NLP). In the same year, Haptik was appointed as the official personal assistant of Mumbai City FC. It also provided a customer support chatbot to SwipeTelecom.
In November 2017, the company launched a full-scale enterprise-level bot management platform including an analytics dashboard.
In 2019, Haptik launched a voice bot for one of the largest food chains in the world, allowing its customers to place orders using Alexa. It also helps users find the nearest outlet of the food chain and provides information on product availability on a real-time basis.
In March 2019, the Government of Maharashtra signed a partnership pact with Haptik to develop a chatbot for its Aaple Sarkar platform. The bot provides conversational access to information regarding 1,400 services managed |
https://en.wikipedia.org/wiki/Dell%20EMC%20Data%20Domain | Dell EMC Data Domain was Dell EMC’s data deduplication storage system. Development began with the founding of Data Domain, and continued since that company’s acquisition by EMC Corporation (and EMC’s later merger with Dell to form Dell EMC).
History
The technology started in a separate company, which was then acquired and re-branded twice.
Data Domain Corporation
The Data Domain Corporation was founded by Kai Li, Ben Zhu, and Brian Biles in 2001 as a company specializing in target-based data deduplication products for disk-based backup.
Hugo Patterson joined as chief architect 3 months after initial funding.
The company started operations in a series of venture capital offices around Palo Alto, California, pre-funding at U.S. Venture Partners, where Zhu was an entrepreneur in residence (EIR), then at New Enterprise Associates (NEA), where Li was an EIR, and post-funding at Greylock Partners.
NEA and Greylock provided Series A funding in 2002.
The first product revenue was realized in the beginning of 2004.
Funding, IPO and Acquisition
NEA and Greylock led the company’s $9.3 million Series A funding round in 2002. Sutter Hill Ventures led its $17 million Series B funding round in 2003, joined again by NEA and Greylock. Through 2005, the three companies invested a total of $40 million in Data Domain.
The company had their initial public offering on June 27, 2007, with a total market capitalization of $776.5 million, above its forecast range despite years of losses. This put the stock price at $15 per share, above the forecasted range of $11.50 to $13.50. The company’s market capitalization was $776.5 million at the time of the IPO. It was listed on Nasdaq with symbol DDUP.
EMC Data Domain
In May 2009, NetApp announced it would acquire Data Domain for about $1.5 billion. In June 2009, EMC Corporation announced their intention to acquire Data Domain Corp for $2.4 billion, outbidding the previous offer. In July, the two companies agreed to the acquisition. Pos |
https://en.wikipedia.org/wiki/Lightwood%27s%20law | Lightwood's law is the principle that, in medicine, bacterial infections will tend to localise while viral infections will tend to spread. This is based on the observation that while bacterial sepsis tends, despite affecting the whole body, to have a clear site of origin or 'focus', the opposite may be true of viral infections. There may be multiple sites across the body which are affected including dermatological manifestations, respiratory symptoms and gastrointestinal symptoms.
This principle is by no means infallible and in clinical practice a variety of diagnostic tests are used to distinguish between bacterial and viral infections.
References
Medical terminology
Microbiology
Eponyms
Adages |
https://en.wikipedia.org/wiki/ZipBooks | ZipBooks is free online accounting software company based in American Fork, Utah. The cloud-based software is an accounting and bookkeeping tool that helps business owners process credit cards, track finances, and send invoices, among other features.
History
ZipBooks was founded by Tim Chaves in June 2015, backed by venture capital firm Peak Ventures. The company secured an additional $2 million of funding in July 2016, and in 2017 it was awarded a $100,000 economic grant by the Utah Governor's Office of Economic Development Technology Commercialization and Innovation Program.
Products
ZipBooks' core modules are invoicing, transactions, bills, reporting, time tracking, contacts, and payroll. Accrual accounting was added in 2017.
The application is available on G Suite, iOS, Slack, and as a web application.
Reception
Computerworld compared ZipBooks favorably with other accounting software. PC Magazine praised its user experience, but stated it lacked "a lot of features that competing sites offer".
See also
Comparison of accounting software
Double-entry bookkeeping system
Software as a service
Time tracking software
Web application
References
Accounting software
Cloud applications
Cross-platform software
Proprietary software
Software companies based in Utah
Software companies established in 2015
Time-tracking software
Web applications
Software companies of the United States
2017 establishments in Utah |
https://en.wikipedia.org/wiki/Neuman%E2%80%93S%C3%A1ndor%20mean | In mathematics of special functions, the Neuman–Sándor mean M, of two positive and unequal numbers a and b, is defined as:
This mean interpolates the inequality of the unweighted arithmetic mean A = (a + b)/2) and of the second Seiffert mean T defined as:
so that A < M < T.
The M(a,b) mean, introduced by Edward Neuman and József Sándor, has recently been the subject of intensive research and many remarkable inequalities for this mean can be found in the literature. Several authors obtained sharp and optimal bounds for the Neuman–Sándor mean. Neuman and others utilized this mean to study other bivariate means and inequalities.
See also
Mean
Arithmetic mean
Geometric mean
Stolarsky mean
Identric mean
Means in Mathematical Analysis
References
Means
Special functions |
https://en.wikipedia.org/wiki/Info-metrics | Info-metrics is an interdisciplinary approach to scientific modeling, inference and efficient information processing. It is the science of modeling, reasoning, and drawing inferences under conditions of noisy and limited information. From the point of view of the sciences, this framework is at the intersection of information theory, statistical methods of inference, applied mathematics, computer science, econometrics, complexity theory, decision analysis, modeling, and the philosophy of science.
Info-metrics provides a constrained optimization framework to tackle under-determined or ill-posed problems – problems where there is not sufficient information for finding a unique solution. Such problems are very common across all sciences: available information is incomplete, limited, noisy and uncertain. Info-metrics is useful for modelling, information processing, theory building, and inference problems across the scientific spectrum. The info-metrics framework can also be used to test hypotheses about competing theories or causal mechanisms.
History
Info-metrics evolved from the classical maximum entropy formalism, which is based on the work of Shannon. Early contributions were mostly in the natural and mathematical/statistical sciences. Since the mid 1980s and especially in the mid 1990s the maximum entropy approach was generalized and extended to handle a larger class of problems in the social and behavioral sciences, especially for complex problems and data. The word ‘info-metrics’ was coined in 2009 by Amos Golan, right before the interdisciplinary Info-Metrics Institute was inaugurated.
Preliminary definitions
Consider a random variable that can result in one of K distinct outcomes. The probability of each outcome is for . Thus, is a K-dimensional probability distribution defined for such that and . Define the informational content of a single outcome to be (e.g., Shannon). Observing an outcome at the tails of the distribution (a rare event |
https://en.wikipedia.org/wiki/Internetmuseum | Internetmuseum is a Swedish digital museum opened in 2014. In June 2016 Internetmuseum was inducted to The Association of Swedish Museums (Riksförbundet Sveriges museer) as the first entirely digital museum.
Internetmuseum is run by the independent organization The Internet Foundation in Sweden (Internetstiftelsen i Sverige) and features a mix of technology, politics, and internet culture. The ambition of the museum is to spread knowledge of the Swedish history of Internet and to preserve the digital heritage.
The museum retains websites of certain historical interest such as all websites from Sweden's first commercial ISP Swipnet.
References
External links
Internetmuseums website
Museums established in 2014
Technology museums
Virtual museums
Museums in Sweden
2014 establishments in Sweden |
https://en.wikipedia.org/wiki/Corps%20of%20Military%20Topographers%20of%20the%20Russian%20Imperial%20Army | The Corps of Military Topographers of the Russian Imperial Army was a branch of the Imperial Russian Army with a long history dating back to the early 18th century.
History
The Corps of Military Topographers was established in 1822 in order to centralize the carrying out of cartographic surveys on the territory of the Russian Empire under the leadership of the Military Topographic Depot. Its predecessor was the Quartermaster Unit that Peter the Great had organized in order to provide topographic support to the Imperial Russian Army in 1702.
Following the October 1917 Revolution the corps continued to exist initially under the same name until 1923, when it was renamed as the Military Topographic Service (Военно-Топографическую Службу) of the Red Army.
See also
Russian Hydrographic Service
Literature
Dolgov E.I., Sergeev S.V. Military Topographers of the Russian Army. - M .: ZAO "CDiPress", 2001 ISBN 5844300068
References
Geodesy
Topography
Cartography organizations |
https://en.wikipedia.org/wiki/Keycloak | Keycloak is an open source software product to allow single sign-on with identity and access management aimed at modern applications and services. this WildFly community project is under the stewardship of Red Hat who use it as the upstream project for their RH-SSO product.
History
The first production release of Keycloak was in September 2014, with development having started about a year earlier. In 2016 Red Hat switched the RH SSO product from being based on the PicketLink framework to being based on the Keycloak upstream Project. This followed a merging of the PicketLink codebase into Keycloak.
To some extent Keycloak can now also be considered a replacement of the Red Hat JBoss SSO open source product which was previously superseded by PicketLink. JBoss.org is redirecting the old jbosssso subsite to the Keycloak website. The JBoss name is a registered trademark and Red Hat moved its upstream open source projects names to avoid using JBoss, JBoss AS to Wildfly being a more commonly recognized example.
Features
The features of Keycloak include:
User registration
Social login
Single sign-on/sign-off across all applications belonging to the same realm
Two-factor authentication
LDAP integration
Kerberos broker
Multitenancy with per-realm customizable skin
Custom extensions to extend the core functionality
Components
There are two main components of Keycloak:
Keycloak server, including the API and graphical interface.
Keycloak application adapter: a set of libraries to call the server.
See also
Single sign-on (SSO)
OpenAM
Kerberos (protocol)
Identity management
List of single sign-on implementations
Red Hat Single Sign-On
References
External links
Official website
Free Keycloak tutorials
Computer security software
Java enterprise platform
Federated identity
Java (programming language) software |
https://en.wikipedia.org/wiki/ONTAP | ONTAP or Data ONTAP or Clustered Data ONTAP (cDOT) or Data ONTAP 7-Mode is NetApp's proprietary operating system used in storage disk arrays such as NetApp FAS and AFF, ONTAP Select, and Cloud Volumes ONTAP. With the release of version 9.0, NetApp decided to simplify the Data ONTAP name and removed the word "Data" from it, and remove the 7-Mode image, therefore, ONTAP 9 is the successor of Clustered Data ONTAP 8.
ONTAP includes code from BSD Net/2 and 4.4BSD-Lite, Spinnaker Networks technology, and other operating systems.
ONTAP originally only supported NFS, but later added support for SMB, iSCSI, and Fibre Channel Protocol (including Fibre Channel over Ethernet and FC-NVMe). On June 16, 2006, NetApp released two variants of Data ONTAP, namely Data ONTAP 7G and, with nearly a complete rewrite, Data ONTAP GX. Data ONTAP GX was based on grid technology acquired from Spinnaker Networks. In 2010 these software product lines merged into one OS - Data ONTAP 8, which folded Data ONTAP 7G onto the Data ONTAP GX cluster platform.
Data ONTAP 8 includes two distinct operating modes held on a single firmware image. The modes are called ONTAP 7-Mode and ONTAP Cluster-Mode. The last supported version of ONTAP 7-Mode issued by NetApp was version 8.2.5. All subsequent versions of ONTAP (version 8.3 and onwards) have only one operating mode - ONTAP Cluster-Mode.
NetApp storage arrays use highly customized hardware and the proprietary ONTAP operating system, both originally designed by NetApp founders David Hitz and James Lau specifically for storage-serving purposes. ONTAP is NetApp's internal operating system, specially optimized for storage functions at both high and low levels. The original version of ONTAP had a proprietary non-UNIX kernel and a TCP/IP stack, networking commands, and low-level startup code from BSD. The version descended from Data ONTAP GX boots from FreeBSD as a stand-alone kernel-space module and uses some functions of FreeBSD (for example, it uses a comm |
https://en.wikipedia.org/wiki/Colony%20hybridization | Colony hybridization is a method of selecting bacterial colonies with desired genes through a straightforward cloning and transfer process. The genes of interest have been added to a bacterial plasmid previously through recombination, allowing genes from other organisms to be analyzed within a bacterial colony. The overall process involves a transfer of genetic material from one medium to another, typically using nitrocellulose filter paper, with the intended goal of identifying and isolating a specific gene. Radiographed RNA is used to find the desired sequence within the new bacterial colony and essentially "light it up" so that the sequence can be identified for transfer. The most common purpose of colony hybridization is to verify that a certain DNA sequence was able to successfully enter into a new cell, meaning that the cells being analyzed through this method are the result of recombination between a specific piece of DNA and a bacterial plasmid. This method was discovered by Michael Grunstein and David S. Hogness.
Methods
Colony hybridization begins with a desire to extract a segment of DNA containing a specific gene, such as a gene that conveys antibiotic resistance. A specific piece of DNA is removed from its respective cell culture and inserted into a bacterial plasmid via a process known as recombination. These bacterial plasmids are cultured on a nutrient agar plate, leading to the formation of bacterial colonies, some of which ideally continue to contain the gene of interest. A nitrocellulose filter is then washed three times with distilled water, placed in between absorbent sheets, and heated at high temperatures to kill bacteria or other microorganism. This filter, which has a pore size of .45 μm, undergoes these processes to ensure that there is no contamination during the transfer, thus allowing for accuracy in results. The bacterial colonies are then symmetrically replicated onto the nitrocellulose filter by direct contact. At this point, the cel |
https://en.wikipedia.org/wiki/Rainway | Rainway was a remote desktop video game streaming service for Microsoft Windows. It allowed users to stream locally installed applications to other devices over a WLAN or internet connection. The initial beta version launched on January 20, 2018. Version 1.0 of the software launched on January 31, 2019. In April 2021, the company announced a partnership with Microsoft to implement their streaming technology into Xbox Cloud Gaming. On October 26, 2022, founder Andrew Sampson announced the service was shutting down.
Compatibility
Rainway is compatible with games purchased from Steam, Origin, Battle.net, itch.io, GOG.com and Uplay. The service can run in web browsers and is also compatible with iOS and Android mobile phones. The iOS version of the app was limited to only local network streaming, as a result of Apple's attitude towards game streaming apps. Rainway released a client version for Xbox One consoles in January 2020, though it was removed from the store just a month later.
History
Rainway was announced in March 2017. The announcement was made on the official website for Ulterius, another streaming service worked on by founder Andrew Sampson which used similar technologies, but focused on desktop remote access rather than game streaming. Rainway did not gain significant attention until April, when it announced its plan to support the then-newly released Nintendo Switch console. During E3 2017, Rainway announced that the Rainway beta would launch on November 25. The release of the beta was later delayed again, to January 20, 2018.
In August 2018, Rainway closed its seed round, having raised $1.5 million in seed funding from GoAhead Ventures. The software left beta on January 31, 2019, with the release of version 1.0.
Later in 2019, David Perry (former CEO of Gaikai) and Jon Kimmich joined the company's advisory board, as it closed another $3.5 million round of funding. Investors included Bullpen Capital, Madrona Venture Group, GoAhead Ventures, and Bill M |
https://en.wikipedia.org/wiki/Pujiang%20line | The Pujiang line of Shanghai Metro () is an automated, driverless, rubber-tired Shanghai Metro line in the town of Pujiang in the Shanghainese district of Minhang. It was originally conceived as phase 3 of Shanghai Metro line 8, but afterwards was constructed as a separate line, connecting with line 8 at its southern terminus, Shendu Highway. The line opened for passenger trial operations on March 31, 2018. It is the first automated, driverless people mover line in the Shanghai Metro, and has 6 stations with a total length of . The people mover was expected to carry 73,000 passengers a day. The line is colored grey on system maps.
The line is operated by Shanghai Keolis Public Transport Operation & Management Co. Ltd. (), a joint venture owned by Keolis and Shanghai Shentong Metro Group for at least five years after opening.
History
Stations
Service routes
Important stations
- Passengers can interchange to line 8.
Future expansion
There are no plans to extend the line.
Station name change
On June 9, 2013, the Aerospace Museum was renamed (before Pujiang line began serving the station).
Headways
<onlyinclude>
Technology
Signalling
The entire operation of the new line is remotely controlled from a central dispatch room. Trains operate using the Cityflo 650 communications-based train control (CBTC) from CRRC Puzhen Bombardier Transportation Systems Limited, a joint venture between Bombardier and CRRC Nanjing Puzhen Co., Ltd. The automatic trains had initially six staff members working at each APM station, but the operator hopes to reduce that to one or two.
Rolling stock
The Pujiang line uses rubber-tyred Bombardier Innovia APM 300 trains. The trains have 4 cars each, totaling in length, with capacity for 566 passengers per train. There are large windows at each end of the train allowing passengers to look out the front and rear. The small trains with rubber tires running on concrete tracks allow for turning radii as tight as to be negotiated, c |
https://en.wikipedia.org/wiki/Judy%20Green%20%28mathematician%29 | Judith (Judy) Green (born 1943) is an American logician and historian of mathematics who studies women in mathematics. She is a founding member of the Association for Women in Mathematics; she has also served as its vice president, and as the vice president of the American Association of University Professors.
Education and career
Green earned her bachelor's degree at Cornell University.
She completed a master's degree at Yale University,
and a Ph.D. at the University of Maryland, College Park.
Her dissertation, supervised by Carol Karp and finished in 1972, was
Consistency Properties for Uncountable Finite-Quantifier Languages.
Green was elected an AMS Member at Large in 1975 and served for three years until 1977. She belonged to the faculty of Rutgers University before moving to Marymount University in 1989. After retiring from Marymount in 2007, she became a volunteer at the National Museum of American History.
Book
With Jeanne LaDuke, she wrote Pioneering Women in American Mathematics: The Pre-1940 PhD’s (American Mathematical Society and London Mathematical Society, 2009). This was a biographical study of the first women in the U.S. to earn doctorates in mathematics.
Recognition
She is part of the 2019 class of fellows of the Association for Women in Mathematics.
References
1943 births
Place of birth missing (living people)
Living people
20th-century American mathematicians
American women mathematicians
Mathematical logicians
Women logicians
American historians of mathematics
Cornell University alumni
Yale University alumni
University of Maryland, College Park alumni
Rutgers University faculty
Marymount University faculty
Fellows of the Association for Women in Mathematics
20th-century women mathematicians
20th-century American women
21st-century American women |
https://en.wikipedia.org/wiki/Trans%2Ccis-2%2C6-Nonadienal | trans,cis-2,6-Nonadienal is an organic compound that is classified as a doubly unsaturated derivative of nonanal. The molecule consists of a α,β-unsaturated aldehyde with an isolated alkene group. The compound has attracted attention as the essence of cucumbers, but it is also found in bread crust and freshly cut watermelon.
Biosynthesis
Isotopic labeling has indicated that nonadienal is formed from α-linolenic acid. Such reactions are typically catalyzed by hydroperoxide lyases.
See also
2-Nonenal - another potent odorant in cucumber
References
Fatty aldehydes
Flavors |
https://en.wikipedia.org/wiki/Wi-Fi%20over%20Coax | Wi-Fi over Coax is a technology for extending and distributing Wi-Fi signals via coaxial cables. As an in-building wireless solution, Wi-Fi over Coax can make use of existing or new cabling with native impedance of 50 Ω shared by a Wi-Fi access point, cabling run, and antenna. Coaxial cables with characteristic impedance of 75 Ω, such as RG-6 cables used for in-building television distribution, can also be used by incorporating impedance converters. As part of a distributed antenna system, Wi-Fi over Coax can connect multiple floors of a home or office via power dividers and zoned antennas either passively or via amplifiers, potentially eliminating the need for multiple access points.
Range
By avoiding signal attenuation caused by obstructions and free-space path loss, Wi-Fi over Coax can increase Wi-Fi coverage beyond the minimum receiver sensitivity attainable by Wi-Fi over the air alone. While the Wi-Fi signal from a radio chain with 23 dBm transmit power may be attenuated by 10...15 dB when passing through a concrete wall, the corresponding attenuation for Wi-Fi over Coax may be limited to the specific cable assembly loss for the width of the wall. As expressed by the minimum acceptable received signal strength indication (RSSI) for the client device, maximum range via Wi-Fi over coax varies based on transmit power of the access point radio chain, the wireless LAN (WLAN) frequency or frequencies being transmitted, the type and length of the cabling run, assembly loss caused by the specific connectors used, and antenna gain. When using 23 dBm of transmit power from an access point radio chain, a Wi-Fi signal at channel 1 (2412 MHz) may be transmitted over of RG-6 cabling with a maximum RSSI of −9.9 dBm, or over of LMR-900-DB cabling with a maximum RSSI of −13.5 dBm.
Applications
As with distributed antenna systems deployed by mobile network operators, Wi-Fi over Coax allows client devices at various antenna locations to connect to a single network, with fro |
https://en.wikipedia.org/wiki/Sweat%20allergy | A sweat allergy is the exacerbation of atopic dermatitis associated with an elevated body temperature and resulting increases in the production of sweat. It appears as small reddish welts that become visible in response to increased temperature and resulting production of sweat. It can affect all ages. Sweating can trigger intense itching or cholinergic urticaria. The protein MGL_1304 secreted by mycobiota (fungi) present on the skin such as Malassezia globosa acts as a histamine or antigen. People can be desensitized using their own samples of sweat that have been purified that contains small amounts of the allergen. The allergy is not due to the sweat itself but instead to an allergy-producing protein secreted by bacteria found on the skin.
Cholinergic urticaria (CU) is one of the physical urticaria (hives) which is provoked during sweating events such as exercise, bathing, staying in a heated environment, or emotional stress. The hives produced are typically smaller than classic hives and are generally shorter-lasting.
Multiple subtypes have been elucidated, each of which require distinct treatment.
Tannic acid has been found to suppress the allergic response, along with showering.
See also
Miliaria
Exercise-induced anaphylaxis
Idiopathic pure sudomotor failure
Hypohidrosis
Fabry disease
Allergy
Food allergy
List of allergens
Tree nut allergy
Cholinergic urticaria
References
Allergology
Dermatitis
Immunology |
https://en.wikipedia.org/wiki/RNase%20H-dependent%20PCR | RNase H-dependent PCR (rhPCR) is a modification of the standard PCR technique. In rhPCR, the primers are designed with a removable amplification block on the 3’ end. Amplification of the blocked primer is dependent on the cleavage activity of a hyperthermophilic archaeal Type II RNase H enzyme during hybridization to the complementary target sequence. This RNase H enzyme possesses several useful characteristics that enhance the PCR. First, it has very little enzymatic activity at low temperature, enabling a “hot start PCR” without modifications to the DNA polymerase. Second, the cleavage efficiency of the enzyme is reduced in the presence of mismatches near the RNA residue. This allows for reduced primer dimer formation, detection of alternative splicing variants, ability to perform multiplex PCR with higher numbers of PCR primers, and the ability to detect single-nucleotide polymorphisms.
Principle
rhPCR primers consist of three sections. 1) The 5’ DNA section, equivalent in length and melting temperature (Tm) requirements to a standard PCR primer, is extended after cleavage by the RNase HII enzyme. 2) A single RNA base provides the cleavage site for the RNase HII. 3) A short 3’ extension of four or five bases followed by a blocker (usually a short, non-extendable molecule like a propanediol) prevents extension by a DNA polymerase until removal. A rhPCR reaction begins with the primers and template free in solution (Figure 1). While free in solution, these primers are not deblocked by the RNase HII enzyme, as they must be in an RNA:DNA heteroduplex with the template to be cleaved. Once bound to the template, the rhPCR primers are cleaved by the thermostable RNase HII enzyme. This removes the block, allowing for the DNA polymerase to extend off of the primers. The cycling of the PCR reaction continues the process. rhPCR primers are designed so that after cleavage by the RNase H2 enzyme, the Tm of the primers are still greater than the annealing te |
https://en.wikipedia.org/wiki/IEEE%20Transactions%20on%20Molecular%2C%20Biological%20and%20Multi-Scale%20Communications | The IEEE Transactions on Molecular, Biological and Multi-Scale Communications is a quarterly peer-reviewed scientific journal published by the Institute of Electrical and Electronics Engineers IEEE Communications Society covering research on molecular and biological signal processing. It was established in 2015.
The first editor-in-chief was Dr. Urbashi Mitra from University of Southern California from 2015 to 2018. Currently, Dr. Chan-Byoung Chae from Yonsei University, Korea is the editor-in-chief of the journal.
References
External links
Engineering journals
IEEE academic journals
Quarterly journals
Academic journals established in 2015
English-language journals |
https://en.wikipedia.org/wiki/Affinity%20capture | Affinity capture is a technique in molecular biology used to isolate desired compounds based on their chemical properties and a solid substrate. Commonly, plates out of solid materials such as glass are coated with various reagents to allow for covalent bonding of a capturing molecule such as an antibody. Afterwards, a solvent containing a desired compound for isolation is poured onto the plate, and the compound binds to the receptors on the plate (hence the capturing of the compound). Washing the plate and removing the desired compound completes the purification process.
Applications
Affinity capture has been used to isolate proteins by means of binding a peptide sequence to the solid substrate, thus allowing for protein capture. The process has also been examined for potential automation, but the unique circumstances for any given experiment may impede reproducibility.
References
Molecular biology techniques |
https://en.wikipedia.org/wiki/OPNsense |
OPNsense is an open source, FreeBSD-based firewall and routing software developed by Deciso, a company in the Netherlands that makes hardware and sells support packages for OPNsense. It is a fork of pfSense, which in turn was forked from m0n0wall built on FreeBSD. It was launched in January 2015. When m0n0wall closed down in February 2015 its creator, Manuel Kasper, referred its developer community to OPNsense.
OPNsense has a web-based interface and can be used on the x86-64 platform. Along with acting as a firewall, it has traffic shaping, load balancing, and virtual private network capabilities, and others can be added via plugins. OPNsense offers next-generation firewall capabilities utilizing Zenarmor, a NGFW plugin developed by OPNsense partner Sunny Valley Networks.
History
In November 2017, a World Intellectual Property Organization panel found that Netgate, the copyright holder of pfSense, used the domain opnsense.com in bad faith to discredit OPNsense, and obligated Netgate to transfer domain ownership to Deciso.
See also
Comparison of firewalls
List of router and firewall distributions
References
Further reading
Jack Wallen (18 April, 2019) "How to install the OPNsense Firewall/Router distribution". TechRepublic.
External links
2015 software
BSD software
Firewall software
Free routing software
Free software
FreeBSD
Gateway/routing/firewall distribution
Open-source movement
Operating system distributions bootable from read-only media
Products introduced in 2015
Routers (computing)
Wireless access points |
https://en.wikipedia.org/wiki/Nvidia%20NVDEC | Nvidia NVDEC (formerly known as NVCUVID) is a feature in its graphics cards that performs video decoding, offloading this compute-intensive task from the CPU.
It is accompanied by NVENC for video encoding in Nvidia's Video Codec SDK.
Technology
NVDEC can offload video decoding to full fixed-function decoding hardware (Nvidia PureVideo), or (partially) decode via CUDA software running on the GPU, if fixed-function hardware is not available.
Depending on the GPU architecture, the following codecs are supported:
MPEG-2
VC-1
H.264 (AVC)
H.265 (HEVC)
VP8
VP9
AV1
Versions
NVCUVID was originally distributed as part of the Nvidia CUDA Toolkit. Later, it was renamed to NVDEC and moved to the Nvidia Video Codec SDK.
Operating system support
NVDEC is available for Windows and Linux operating systems. As NVDEC is a proprietary API (as opposed to the open-source VDPAU API), it is only supported by the proprietary Nvidia driver on Linux.
Application and library support
Gstreamer has supported NVDEC since 2017.
FFmpeg has supported NVDEC since 2017.
mpv has supported NVDEC since 2017 by the use of FFmpeg.
GPU support
HW accelerated decode and encode are supported on Nvidia GeForce, Quadro, Tesla, and GRID products with Fermi or newer generation GPUs.
See also
AMD Video Core Next, AMD's equivalent SIP core since 2018
AMD Unified Video Decoder, AMD's equivalent SIP core up to 2017
Intel Quick Sync Video, Intel's equivalent SIP core
List of Nvidia graphics processing units
Qualcomm Hexagon
Nvidia NVENC
References
External links
NVIDIA VIDEO CODEC SDK
Nvidia IP cores
Video acceleration
Video compression and decompression ASIC
Hardware_acceleration |
https://en.wikipedia.org/wiki/Primate%20Conservation%20%28journal%29 | Primate Conservation is a journal published by the IUCN Species Survival Commission's Primate Specialist Group about the world's primates. First published as a mimeographed newsletter in 1981, the journal today publishes conservation research and papers on primate species, particularly status surveys and studies on distribution and ecology. Besides these regular papers, the journal has also been a significant place for primatologists to publish descriptions of new primate species in Primate Conservation.
New primate species descriptions
From South America, this includes the Caquetá titi (Callicebus caquetensis) described in 2010 and the Madidi titi (Plecturocebus aureipalatii, Syn.: Callicebus aureipalatii). From the island of Madagascar, new lemur species scientifically described in the pages of the journal include the Montagne d'Ambre dwarf lemur or Andy Sabin's dwarf lemur (Cheirogaleus andysabini), the Ankarana dwarf lemur (Cheirogaleus shethi), and two new species of mouse lemurs (Microcebus).
References
Conservation biology
Environmental science journals
IUCN commissions
Primatology journals |
https://en.wikipedia.org/wiki/Andy%20and%20Bill%27s%20law | Andy and Bill's law is a statement that new software will always consume any increase in computing power that new hardware can provide. The law originates from a humorous one-liner told in the 1990s during computing conferences: "what Andy giveth, Bill taketh away." The phrase is a riff upon the business strategies of former Intel CEO Andy Grove and former Microsoft CEO Bill Gates. Intel and Microsoft had entered into a lucrative partnership in the 1980s through to the 1990s, and the standard chipsets in Microsoft Windows were Intel brand. Despite the profit Intel gained from the deal, Grove felt that Gates was not making full use of the powerful capabilities of Intel chips, and that he was in fact refusing to upgrade his software to achieve optimum hardware performance. Grove's frustration with the dominance of Microsoft software over Intel hardware became public, which spawned the humorous catchphrase; and, later, the law.
See also
Jevons paradox
Moore's law
Wirth%27s law
References
Computer architecture statements |
https://en.wikipedia.org/wiki/Alan%20Woodward%20%28computer%20scientist%29 | Alan Woodward is a British computer scientist at the University of Surrey. He is a specialist in computer security and a core member of the Surrey Centre for Cyber Security.
He studied physics as an undergraduate student and conducted research in signal processing as a postgraduate student. Both of these were at the University of Southampton.
He has worked in government service, business as well as academia.
In addition to his academic qualifications, his practical accomplishments have resulted in him being elected Fellow of the Institute of Physics, a Chartered Physicist, Chartered IT Practitioner, Chartered Engineer, Fellow of the British Computer Society, a EUR ING, and Fellow of the Royal Statistical Society.
References
External links
https://www.linkedin.com/in/woodwardalan/
https://www.profwoodward.org/
British computer scientists
Internet security
Alumni of the University of Southampton
Academics of the University of Surrey
Fellows of the Royal Statistical Society
Fellows of the British Computer Society
Living people
1962 births
InfoSec Twitter |
https://en.wikipedia.org/wiki/Human%20information%20interaction | Human-information interaction or HII is the formal term for information behavior research in archival science; the term was invented by Nahum Gershon in 1995. HII is not transferable from analog to digital research because nonprofessional researchers greatly emphasize the need for further elaboration of context and scope finding aid elements. Researchers in HII take on many tasks, including helping to design information systems from a biological perspective that conform to the requirements of different segments of society, along with other behaviour intended to improve interaction between humans and information systems. HII is generally considered to be multi-disciplinary as different disciplines have different viewpoints on these interactions and their consequences. HII is considered especially important due to humanity's dependence on information and the technology needed to access it.
References
Information theory
Information science
Interdisciplinary subfields |
https://en.wikipedia.org/wiki/Euplotidium | Euplotidium is a genus of ciliates. Species form symbiotic relations with bacteria in structures named Epixenosomes.
References
Hypotrichea
Ciliate genera
Symbiosis |
https://en.wikipedia.org/wiki/Cray%20XC50 | The Cray XC50 is a massively parallel multiprocessor supercomputer manufactured by Cray. The machine can support Intel Xeon processors, as well as Cavium ThunderX2 processors, Xeon Phi processors and NVIDIA Tesla P100 GPUs. The processors are connected by Cray's proprietary "Aries" interconnect, in a dragonfly network topology. The XC50 is an evolution of the XC40, with the main difference being the support of Tesla P100 processors and the use of Cray software release CLE 6 or 7.
Deployed Cray XC50 systems
India
Indian Institute of Technology, Bombay (IITB) has deployed a Cray XC50 system named Spacetime with a peak performance of 1 petaflops coupled with Cray ClusterStor L300 Lustre storage system.
Japan
The Japanese National Institutes for Quantum and Radiological Science and Technology has deployed on 2018 26th July a XC50 to support the ITER fusion project. At deployment, it will not be as fast as the Swiss Piz Daint computer; however, it is predicted as one of the top 30 supercomputers in the world, and the fastest available to fusion researchers.
The Japan Meteorological Agency is planning to deploy 2 Cray XC50s to help with weather forecasting. The systems will be deployed with the assistance of Cray and Hitachi.
The Center for Computational Astrophysics at the National Astronomical Observatory of Japan have deployed a XC50 named ATERUI II, named after a Japanese chief. It has 40,200 Xeon cores, with a peak performance of 3.087 petaflops.
The Railway Technical Research Institute (RTRI) will install five XC50 cabinets and a 720 TB Cray ClusterStor L300 for storage to gain insights on rail transportation. This is their third Cray machine after acquiring an XC30 and CS300, both in 2013.
Yokohama City University has selected the air-cooled XC50-AC for life sciences research.
New Zealand
New Zealand Science Infrastructure (NeSI) is deploying a XC50 at their High Performance Computing Facility in Wellington.
South Korea
The Institute for Basic Scie |
https://en.wikipedia.org/wiki/Local%20Computer%20Networks%20Conference | The Local Computer Networks Conference (LCN) is an annual international academic conference organized by the IEEE Computer Society. The first LCN was held in 1976, with the full name of "Conference on Experiments in New Approaches to Local Computer Networking". The second meeting in 1977 was called the "Conference on 'A Second Look at Local Computer Networking'" before it changed its name to "Third Conference on Local Computer Networks" in 1978. After that the conference was simply called LCN. The IEEE Technical Committee on Computer Communications has sponsored the LCN since 1979.
LCN has grown to be a premier conference on theoretical and practical aspects of computer networking and is ranked as an A conference according to the CORE Rankings Portal in 2017.
History of the Conference
Historical Events
The conference celebrated its 40th anniversary 2015 in Clearwater Beach, Florida where Robert Metcalfe (founder of 3COM and co-inventor of the Ethernet network technology) gave the keynote speech and held a panel session with Harvey Freeman (President of the IEEE Communications Society 2017), Howard Salwen ("father of the token ring" and founder of Proteon), and Peter Martini (Director of Institute Fraunhofer FKIE).
References
Telecommunication conferences
IEEE conferences
Computer networking conferences |
https://en.wikipedia.org/wiki/Glossary%20of%20representation%20theory | This is a glossary of representation theory in mathematics.
The term "module" is often used synonymously for a representation; for the module-theoretic terminology, see also glossary of module theory.
See also Glossary of Lie groups and Lie algebras, list of representation theory topics and :Category:Representation theory.
Notations: We write . Thus, for example, a one-representation (i.e., a character) of a group G is of the form .
A
B
C
D
E
F
G
H
I
J
K
L
M
O
P
Q
R
S
T
U
V
W
Y
Z
Notes
References
Theodor Bröcker and Tammo tom Dieck, Representations of compact Lie groups, Graduate Texts in Mathematics 98, Springer-Verlag, Berlin, 1995.
Claudio Procesi (2007) Lie Groups: an approach through invariants and representation, Springer, .
N. Wallach, Real Reductive Groups, 2 vols., Academic Press 1988,
Further reading
M. Duflo et M. Vergne, La formule de Plancherel des groupes de Lie semi-simples réels, in “Representations of Lie Groups;” Kyoto, Hiroshima (1986), Advanced Studies in Pure Mathematics 14, 1988.
External links
https://math.stanford.edu/~bump/
Representation theory
Wikipedia glossaries using description lists |
https://en.wikipedia.org/wiki/Physical%20oncology | Physical oncology (PO) is defined as the study of the role of mechanical signals in a cancerous tumor. The mechanical signals can be forces, pressures ("pull", "push" and "shear" designating the forces / pressures that push, pull or are tangential). If we generalize we will speak of "stress field" and "stress tensor".
A cancerous tumor (or "solid tumor" in the jargon of oncologists to differentiate them from hematological malignancies) is an organ consisting of two tissues: in the center the cancerous tumor proper and around the ExtraCellular Matrix (ECM), sometimes called stroma, chorion or connective tissue. The concept of connective tissue is interesting because it defines a tissue that travels the entire organism (except the brain) and is a preferred transmitter of mechanical signals. But for the cancer organ - isolated from this connective system - we prefer the term ECM.
The cancerous tissue is derived from a normal tissue of the body: breast cancer arises from a cancerous transformation of the normal mammary glandular tissue. It looks more or less like the original tissue: it is said that it is more or less differentiated; poorly differentiated it has a microscopic appearance that is far from normal tissue and is then "poorly prognostic", will make more metastases and will be more difficult to treat.
We are only considering cancers derived from "epithelia", that is to say the tissue that covers the organs in their interfaces with air, liquids ... or the outside world. Epithelial cells are contiguous and polarized. More than 90% of cancers (breast, prostate, colon / rectum, bronchi, pancreas, etc.) arise from these epithelia after a long process of cancerization.
Both tissues of the cancer organ
The ECM
ECM is a mixture of cells (immune, fibroblasts, etc.) dispersed in proteins, most of them collagen. It surrounds the tumor.
It is analogous to connective tissue and basal membrane, which is a local condensation, located below normal epithelia. This conne |
https://en.wikipedia.org/wiki/State%20microbe | A state microbe is a microorganism used as an official state symbol. Several U.S. states have honored microorganisms by nominating them to become official state symbols. The first state to declare an Official State Microbe is Oregon which chose Saccharomyces cerevisiae (brewer's or baker's yeast) as the Official Microbe of the State of Oregon in 2013 for its significance to the craft beer industry in Oregon. One of the first proponents of State Microbes was microbiologist Moselio Schaechter, who, in 2010, commented on Official Microbes for the American Society for Microbiology's blog "Small Things Considered" as well as on National Public Radio's "All Things Considered".
Wisconsin 2009: Lactococcus lactis, proposed, not passed
In November 2009, Assembly Bill 556 that proposed designating Lactococcus lactis as Wisconsin state microbe was introduced by Representatives Hebl, Vruwink, Williams, Pasch, Danou, and Fields; it was cosponsored by Senator Taylor. Although the bill passed the Assembly 56 to 41, It was not acted on by the Senate. The proposed AB 556 simply stated that Lactococcus lactis is the State Microbe and should be included in the Wisconsin Blue Book, an almanac containing information on the state of Wisconsin, published by Wisconsin's Legislative Reference Bureau.Lactococcus lactis was proposed as the State Microbe because of its crucial contribution to the cheese industry in Wisconsin. Wisconsin is the largest cheese producer in the United States, producing 3.1 billion pounds of cheese, 26% of all cheese in the US, in more than 600 varieties (2017 data).
Lactococcus lactis is vital for manufacturing cheeses such as Cheddar, Colby, cottage cheese, cream cheese, Camembert, Roquefort, and Brie, as well as other dairy products like cultured butter, buttermilk, sour cream, and kefir. It may also be used for vegetable fermentations such as cucumber pickles and sauerkraut.
Hawaii 2013-14: Flavobacterium akiainvivens and/or Aliivibrio fischeri
In January 2 |
https://en.wikipedia.org/wiki/Controlled%20Access%20Protection%20Profile | The Controlled Access Protection Profile, also known as CAPP, is a Common Criteria security profile that specifies a set of functional and assurance requirements for information technology products. Software and systems that conform to CAPP standards provide access controls that are capable of enforcing access limitations on individual users and data objects. CAPP-conformant products also provide an audit capability which records the security-relevant events which occur within the system.
CAPP is intended for the protection of software and systems where users are assumed to be non-hostile and well-managed, requiring protection primarily against threats of inadvertent or casual attempts to breach the security protections. It is not intended to be applicable to circumstances in which protection is required against determined attempts by hostile and well-funded attackers. It does not fully address the threats posed by malicious system development or administrative personnel, who generally have a higher level of access. The CAPP was derived from the requirements of the C2 class of the U.S. Department of Defense Trusted Computer System Evaluation Criteria and the material upon which those requirements are based.
Computer security models |
https://en.wikipedia.org/wiki/Bitmain | Bitmain Technologies Ltd., is a privately owned company headquartered in Beijing, China, that designs application-specific integrated circuit (ASIC) chips for bitcoin mining.
History
It was founded by Micree Zhan and Jihan Wu in 2013. Prior to founding Bitmain, Zhan was running DivaIP, a startup that allowed users to stream television to a computer screen via a set-top box, and Wu was a financial analyst and private equity fund manager.
By 2018 it had become the world's largest designer of application-specific integrated circuit (ASIC) chips for bitcoin mining. The company also operates BTC.com and Antpool, historically two of the largest mining pools for bitcoin. In an effort to boost Bitcoin Cash (BCH) prices, Antpool "burned" 12% of the BCH they mined by sending them to irrecoverable addresses. Bitmain was reportedly profitable in early 2018, with a net profit of $742.7 million in the first half of 2018, and negative operating cash flow. TechCrunch reported that unsold inventory ballooned to one billion dollars in the second quarter of 2018. Bitmain's first product was the Antminer S1 which is an ASIC Bitcoin miner making 180 gigahashes per second (GH/s) while using 80200 watts of power. Bitmain as of 2018 had 11 mining farms operating in China. Bitmain was involved in the 2018 Bitcoin Cash split, siding with Bitcoin Cash ABC alongside Roger Ver. In December 2018 the company laid off about half of its 3000 staff. The company has since closed its offices in Israel and the Netherlands, while significantly downsizing its Texas mining operation. In February 2019, Bitmain had lost "about $500 million" in the third quarter of 2018. Bitmain issued a statement saying "the rumors are not true and we will make announcements in due course."
In June 2021, suspended spot delivery of sales of machines globally aiming to support local prices following Beijing's crackdown.
Bitmain's attempts at initial public offering
In June 2018, Wu told Bloomberg that Bitmain was conside |
https://en.wikipedia.org/wiki/Uptane | Uptane is a Linux Foundation / Joint Development Foundation hosted software framework designed to ensure that valid, current software updates are installed in adversarial environments. It establishes a process of checks and balances on these electronic control units (ECUs) that can ensure the authenticity of incoming software updates. Uptane is designed for "compromise-resilience," or to limit the impact of a compromised repository, an insider attack, a leaked signing key, or similar attacks. It can be incorporated into most existing software update technologies, but offers particular support for over-the-air programming or OTA programming strategies originating from The Update Framework.
History
Uptane was developed by a team of engineers at New York University Tandon School of Engineering in Brooklyn, NY, the University of Michigan Transportation Research Institute in Ann Arbor, MI, and the Southwest Research Institute in San Antonio, TX. It was developed as open source software under a grant from the U.S. Department of Homeland Security.
In 2018, the Uptane Alliance, a non-profit organization, was formed under the aegis of IEEE-ISTO to oversee the first formal release of a standard. The first standard volume, entitled IEEE-ISTO 6100.1.0.0 Uptane Standard for Design and Implementation, was released on July 31, 2019. Uptane was recognized in 2017 by Popular Science as one of that year’s top security innovations.
As of 2020, multiple implementations of Uptane are available, both through open source projects such as the Linux Foundation’s Automotive Grade Linux, and through third party commercial suppliers, such as Advanced Telematic Systems (ATS), now part of Here Technologies, and Airbiquity. There is also a reference implementation meant to aid adopters implementing Uptane.
References
External links
Uptane website
Further reading
Proceedings of 14th Embedded Security in Cars Conference (16-17 November 2016) Kuppusamy,T.K., Brown, A., Awwad, S., McCoy, D., |
https://en.wikipedia.org/wiki/Mycorrhiza%20helper%20bacteria | Mycorrhiza helper bacteria (MHB) are a group of organisms that form symbiotic associations with both ectomycorrhiza and arbuscular mycorrhiza. MHBs are diverse and belong to a wide variety of bacterial phyla including both Gram-negative and Gram-positive bacteria. Some of the most common MHBs observed in studies belong to the phylas Pseudomonas and Streptomyces. MHBs have been seen to have extremely specific interactions with their fungal hosts at times, but this specificity is lost with plants. MHBs enhance mycorrhizal function, growth, nutrient uptake to the fungus and plant, improve soil conductance, aid against certain pathogens, and help promote defense mechanisms. These bacteria are naturally present in the soil, and form these complex interactions with fungi as plant root development starts to take shape. The mechanisms through which these interactions take shape are not well-understood and needs further study.
Taxonomy
MHBs consist of a diverse group of bacteria, often gram-negative and gram-positive bacteria. Most of the bacteria are associated with both ectomycorrhiza and arbuscular mycorrhiza, but some show specificity to a particular type of fungus. The common phyla that MHB belong to will be addressed in the following sections, as well as common genera.
Pseudomonadota
The Pseudomonadota (formerly Proteobacteria) are a large and diverse group of gram-negative bacteria containing five classes. Pseudomonas is in the gammaproteobacteria class. Specific bacteria within this genus are strongly associated as being MHBs in the rhizosphere of both ectomycorrhiza and arbuscular mycorrhiza. Pseudomonas fluorescens has been examined in several studies to understand how they work in benefiting the mycorrhiza and plant. In one study, they found that the bacteria helped ectomycorrhizal fungi promote a symbiotic relationship with the plant by examining an increase in formation of mycorrhiza when Pseudomonas fluorescens was applied to the soil. Some bacteria improve |
https://en.wikipedia.org/wiki/Data%20preservation | Data preservation is the act of conserving and maintaining both the safety and integrity of data. Preservation is done through formal activities that are governed by policies, regulations and strategies directed towards protecting and prolonging the existence and authenticity of data and its metadata. Data can be described as the elements or units in which knowledge and information is created,
and metadata are the summarizing subsets of the elements of data; or the data about the data. The main goal of data preservation is to protect data from being lost or destroyed and to contribute to the reuse and progression of the data.
History
Most historical data collected over time has been lost or destroyed. War and natural disasters combined with the lack of materials and necessary practices to preserve and protect data has caused this. Usually, only the most important data sets were saved, such as government records and statistics, legal contracts and economic transactions. Scientific research and doctoral theses data have mostly been destroyed from improper storage and lack of data preservation awareness and execution. Over time, data preservation has evolved and has generated importance and awareness. We now have many different ways to preserve data and many different important organizations involved in doing so.
The first digital data preservation storage solutions appeared in the 1950s, which were usually flat or hierarchically structured. While there were still issues with these solutions, it made storing data much cheaper, and more easily accessible. In the 1970s relational databases as well as spreadsheets appeared. Relational data bases structure data into tables using structured query languages which made them more efficient than the preceding storage solutions, and spreadsheets hold high volumes of numeric data which can be applied to these relational databases to produce derivative data. More recently, non-relational (non-structured query language) databa |
https://en.wikipedia.org/wiki/Inertial%20audio%20effects%20controller | An inertial audio effects controller is an electronic device that senses changes in acceleration, angular velocity and/or a magnetic field, and relays those changes to an effects controller. Transmitting the sensed data can be done via wired or wireless methods. To be of use the effects controller must be connected to an effect unit so that an effect can be modulated, or connected to a MIDI controller or musical keyboard. The Wah-Wah effect is a classic example of effect modulation.
An inertial audio effects controller can be compared with a traditional expression pedal to explain what it does. An inertial effects controller uses an inertial sensor to detect user directed changes, whereas a traditional expression pedal uses an electrically resistive element to detect changes. There are some advantages and disadvantages between the two. The main advantages of inertial control versus a traditional foot pedal, are an increased range of dynamic motion, remote control, finer modulation precision and software enabled features such as motion triggered ADSR envelopes and bi-directional motion control. The main disadvantages are the requirement for a power source and a more complicated setup.
Due to their functional similarity with traditional expression pedals, they have been given the informal name, 'Expression box'.
Availability
Conceivably any or all of the inertial sensors (accelerometer, gyroscope, magnetometer), could be used for effect modulation. However, currently the only commercially available products use acceleration sensing only or acceleration combined with angular velocity, as sensed by a gyroscope.
Future
Inertial control of an audio device, wired or wireless, is a relatively recent and growing trend as technology advances have reduced pricing and size as well as improved usability and performance of the core components. Specifically the core components are an inertial device called a Mirco- Electro-Mechanical-System (MEMs), a microcontroller, and for |
https://en.wikipedia.org/wiki/Ultimate%20Chicken%20Horse | Ultimate Chicken Horse is a multiplayer competitive platform video game developed and published by Canadian studio Clever Endeavour Games. It was released for Microsoft Windows on 4 March 2016, PlayStation 4 and Xbox One in December 2017, and Nintendo Switch on 25 September 2018.
Gameplay
Ultimate Chicken Horse is a platform video game where players assume the role of one of various animals. The goal of each game is to score points by building a platform level one piece at a time (per player) and race each other to a flag on the other side of the level. Players add obstacles designed to challenge their opponents, while also making sure they themselves can handle their handiwork. If nobody reaches the goal, or if everybody does, nobody gets any points. Points are awarded each round for various achievements, such as reaching the goal first, or setting a successful trap. The winner of the match is the player who reaches a set number of points or has the most points after a set number of rounds. Each round is estimated to last a minute.
The PC, Nintendo Switch, Xbox and PlayStation versions of the game support cross-play online.
Development
The concept for Ultimate Chicken Horse emerged in September 2014 during a game jam. Developer Richard Atlas stated in an interview with Gamasutra that he was in the process of forming Clever Endeavour Games when it came about. The final team included personnel who had previously worked on games such as Gardenarium and Rimworld.
Ultimate Chicken Horse was primarily built in the Unity engine.
Reception
The PlayStation 4 version of Ultimate Chicken Horse received "generally favorable" reviews, according to review aggregator Metacritic. The Escapist said the game "does everything it tries to do very well, but a few quibbles keep it from greatness," and recommended "a better guiding hand for stage building, especially for new players".
References
External links
2016 video games
Multiplayer video games
Nintendo Switch games
Plat |
https://en.wikipedia.org/wiki/Twitching%20motility | Twitching motility is a form of crawling bacterial motility used to move over surfaces. Twitching is mediated by the activity of hair-like filaments called type IV pili which extend from the cell's exterior, bind to surrounding solid substrates, and retract, pulling the cell forwards in a manner similar to the action of a grappling hook. The name twitching motility is derived from the characteristic jerky and irregular motions of individual cells when viewed under the microscope. It has been observed in many bacterial species, but is most well studied in Pseudomonas aeruginosa, Neisseria gonorrhoeae and Myxococcus xanthus. Active movement mediated by the twitching system has been shown to be an important component of the pathogenic mechanisms of several species.
Mechanisms
Pilus structure
The type IV pilus complex consists of both the pilus itself and the machinery required for its construction and motor activity. The pilus filament is largely composed of the PilA protein, with more uncommon minor pilins at the tip. These are thought to play a role in initiation of pilus construction. Under normal conditions, the pilin subunits are arranged as a helix with five subunits in each turn, but pili under tension are able to stretch and rearrange their subunits into a second configuration with around subunits per turn.
Three subcomplexes form the apparatus responsible for assembling and retracting the type IV pili. The core of this machinery is the motor subcomplex, consisting of the PilC protein and the cytosolic ATPases PilB and PilT. These ATPases drive pilus extension or retraction respectively, depending on which of the two is currently bound to the pilus complex. Surrounding the motor complex is the alignment subcomplex, formed from the PilM, PilN, PilO and PilP proteins. These proteins form a bridge between the inner and outer membranes and create a link between the inner membrane motor subcomplex and the outer membrane secretion subcomplex. This consists of a |
https://en.wikipedia.org/wiki/Algorithmic%20bias | Algorithmic bias describes systematic and repeatable errors in a computer system that create "unfair" outcomes, such as "privileging" one category over another in ways different from the intended function of the algorithm.
For mapping this to ideas in statistical learning, it is ```extremely important``` to note that the "bias" here is typically the ```variance``` in the bias-variance trade off in machine learning. So it is actually the opposite of real machine learning bias. It is variance, the model is over-fitting the data or data generation process. In situations where there was no training data and or no consistent learning, then the "algorithmic bias" is simply a measure of deviation according to some score.
Bias can emerge from many factors, including but not limited to the design of the algorithm or the unintended or unanticipated use or decisions relating to the way data is coded, collected, selected or used to train the algorithm. For example, algorithmic bias has been observed in search engine results and social media platforms. This bias can have impacts ranging from inadvertent privacy violations to reinforcing social biases of race, gender, sexuality, and ethnicity. The study of algorithmic bias is most concerned with algorithms that reflect "systematic and unfair" discrimination. This bias has only recently been addressed in legal frameworks, such as the European Union's General Data Protection Regulation (2018) and the proposed Artificial Intelligence Act (2021).
As algorithms expand their ability to organize society, politics, institutions, and behavior, sociologists have become concerned with the ways in which unanticipated output and manipulation of data can impact the physical world. Because algorithms are often considered to be neutral and unbiased, they can inaccurately project greater authority than human expertise (in part due to the psychological phenomenon of automation bias), and in some cases, reliance on algorithms can displace human |
https://en.wikipedia.org/wiki/Superiorization | Superiorization is an iterative method for constrained optimization. It is used for improving the efficacy of an iterative method whose convergence is resilient to certain kinds of perturbations. Such perturbations are designed to "force" the perturbed algorithm to produce more useful results for the intended application than the ones that are produced by the original iterative algorithm. The perturbed algorithm is called the superiorized version of the original unperturbed algorithm. If the original algorithm is computationally efficient and useful in terms of the target application and if the perturbations are inexpensive to calculate, the method may be used to steer iterates without additional computation cost.
Areas of application
The superiorization methodology is very general and has been used successfully in many important practical applications, such as iterative reconstruction of images from their projections, single-photon emission computed tomography, radiation therapy and nondestructive testing, just to name a few. A special issue of the journal Inverse Problems is devoted to superiorization, both theory and applications.
Objective function reduction and relation with constrained optimization
An important case of superiorization is when the original algorithm is "feasibility-seeking" (in the sense that it strives to find some point in a feasible region that is compatible with a family of constraints) and the perturbations that are introduced into the original iterative algorithm aim at reducing (not necessarily minimizing) a given merit function. In this case, superiorization has a unique place in optimization theory and practice.
Many constrained optimization methods are based on methods for unconstrained optimization that are adapted to deal with constraints. Such is, for example, the class of projected gradient methods wherein the unconstrained minimization inner step "leads" the process and a projection onto the whole constraints set (the feasi |
https://en.wikipedia.org/wiki/Basics%20of%20blue%20flower%20colouration | Blue flower colour was always associated with something unusual and desired. Blue roses especially were assumed to be a dream that cannot be realised. Blue colour in flower petals is caused by anthocyanins, which are members of flavonoid class metabolites. We can diversify three main classes of anthocyanin pigments: cyaniding type (two hydroxyl groups in the B-ring) responsible for red coloration, pelargonidin type (one hydroxyl group in the B-ring) responsible for orange colour and delphinidin type (three hydroxyl groups in the B-ring) responsible for violet/blue flower and fruits coloration. The main difference in the structure of listed anthocyanins type is the number of hydroxyl groups in the B-ring of the anthocyanin. Nevertheless, in the monomeric state anthocyanins never show blue colour in the weak acidic and neutral pH. The mechanism of blue colour formation are very complicated in most cases, presence of delphinidin type pigments is not sufficient, great role play also the pH and the formation of complexes of anthocyanins with flavones and metal ions.
Mechanisms
Self-association is correlated with the anthocyanin concentration. When concentration is higher we can observe change in the absorbance maximum and increase of colour intensity. Molecules of anthocyanins associate together what results in stronger and darker colour.
Co-pigmentation stabilizes and gives protection to anthocyanins in the complexes. Co-pigments are colourless or have slightly yellow colour. Co-pigments usually are flavonoids (flavones, flavonols, flavanons, flavanols), other polyphenols, alkaloids, amino acids or organic acids. The most efficient co-pigments are flavonols like rutin or quercetin and phenolic acids like sinapic acid or ferulic acid. Association of co-pigment with anthocyanin causes bathochromic effect, shift in absorption maximum to higher wavelength, in result we can observe change of the colour from red to blue. This phenomenon is also called bluing effect. We can |
https://en.wikipedia.org/wiki/Histamine%20intolerance | Histamine intolerance, sometimes called histaminosis, is an over-accumulation of dietary histamine in the human body. Histamine intolerance is sometimes informally called an allergy; however, the intolerance is technically caused by the gradual accumulation of extracellular histamine due to an imbalance.
Roughly 1% of the population has histamine intolerance; of those, 80% are middle-aged.
General
The imbalance in histamine intolerance is between the synthesis and selective release of histamine from certain granulocytes (i.e., mast cells and basophils), versus the breakdown of histamine by the enzymes which metabolize it, such as diamine oxidase (DAO) and histamine N-methyltransferase (HNMT).
In contrast, allergic reactions involving an immediate allergic response to an allergen are caused by anaphylactic degranulation, which is the abrupt and explosive release of "pre-formed mediators", including histamine, from mast cells and basophils throughout the body.
Symptoms
Possible symptoms after ingestion of histamine-rich food include:
Skin rash, hives, eczema, itching
Headache, flushing, migraine, dizziness
Narrowed or runny nose, difficulty breathing, bronchial asthma, sore throat
Bloating, diarrhea, constipation, nausea / vomiting, abdominal pain, stomach sticking, heartburn
High blood pressure (hypertension), tachycardia, cardiac arrhythmias, low blood pressure (hypotension)
Menstrual disorders (dysmenorrhea), cystitis, urethritis and mucosal irritation of female genitalia
Water retention (edema), bone marrow edema (BME), joint pain
Fatigue, seasickness, tiredness, sleep disorders
Confusion, nervousness, depressive moods
Metabolism
In the human body, histamine is metabolized extracellularly by the enzyme diamine oxidase (DAO), and intracellularly by histamine N-methyltransferase (HNMT) and aldehyde oxidases (AOX1). In histamine intolerance, the activity of DAO is limited, and histamine taken up by the diet and formed in the body is only partially |
https://en.wikipedia.org/wiki/Religious%20Orders%20Study | The Religious Orders Study conducted at the Rush Alzheimer's Disease Center at Rush University in Chicago is a research project begun in 1994 exploring the effects of aging on the brain. More than 1,000 nuns, priests, and other religious professionals are participating across the United States. The study is finding that cognitive exercise including social activities and learning new skills has a protective effect on brain health and the onset of dementia, while negative psychological factors like anxiety and clinical depression are correlated with cognitive decline.
The Religious Orders Study follows the earlier Nun Study.
Initial funding was provided by the National Institute on Aging in 1993.
References
Neuroscience projects
Alzheimer's disease
Cohort studies
Rush Medical College
1994 establishments in the United States
Pathology |
https://en.wikipedia.org/wiki/Diffeomorphometry | Diffeomorphometry is the metric study of imagery, shape and form in the discipline of computational anatomy (CA) in medical imaging. The study of images in computational anatomy rely on high-dimensional diffeomorphism groups which generate orbits of the form , in which images can be dense scalar magnetic resonance or computed axial tomography images. For deformable shapes these are the collection of manifolds , points, curves and surfaces. The diffeomorphisms move the images and shapes through the orbit according to which are defined as the group actions of computational anatomy.
The orbit of shapes and forms is made into a metric space by inducing a metric on the group of diffeomorphisms. The study of metrics on groups of diffeomorphisms and the study of metrics between manifolds and surfaces has been an area of significant investigation. In Computational anatomy, the diffeomorphometry metric measures how close and far two shapes or images are from each other. Informally, the metric is constructed by defining a flow of diffeomorphisms which connect the group elements from one to another, so for then . The metric between two coordinate systems or diffeomorphisms is then the shortest length or geodesic flow connecting them. The metric on the space associated to the geodesics is given by. The metrics on the orbits are inherited from the metric induced on the diffeomorphism group.
The group is thusly made into a smooth Riemannian manifold with Riemannian metric associated to the tangent spaces at all . The Riemannian metric satisfies at every point of the manifold there is an inner product inducing the norm on the tangent space that varies smoothly across .
Oftentimes, the familiar Euclidean metric is not directly applicable because the patterns of shapes and images don't form a vector space. In the Riemannian orbit model of Computational anatomy, diffeomorphisms acting on the forms don't act linearly. There are many ways to define metrics, an |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.