source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Infinite%20difference%20method
In mathematics, infinite difference methods are numerical methods for solving differential equations by approximating them with difference equations, in which infinite differences approximate the derivatives. See also Infinite element method Finite difference Finite difference time domain References Simulation of ion transfer under conditions of natural convection by the finite difference method . Genetic Algorithm and Numerical Solution Finite differences Numerical differential equations
https://en.wikipedia.org/wiki/Composite%20cross%20population
A composite cross population (CCP) is created by crossing a number of plants from different lines, and subsequently bulking seeds from the resulting offspring. This makes a CCP a population of plants with a lot of inherent genetic diversity, in contrast to monocultures where all plants are clones and homozygous at all loci (fully inbred). In recent years CCPs have been proposed as a way to create modern landraces of wheat, barley and oats. Research is done to explore whether they are better suited for organic farming than the modern cultivars. They are suited for participatory breeding of crops, which is in contrast to cultivars owned by big breeding companies. The idea of using CCPs in plant breeding was published in 1956 based on the barley composite cross devised by Harry Harlan and Mary Martini in 1929. Yield data for 4 different populations for 8–28 years were presented in the article and after 8–15 years of repeated breeding under natural selection, the populations out-yielded the reference cultivar. Stages Creating a CCP involves three steps: initiation, multiplication and mixture. The population then goes into the maintenance phase. Initiation A number of lines, generally 7-30, with interesting properties, such as yield or baking quality, are selected and all possible crosses of them are done. If many lines of different genetic background are used, a huge amount of genetic diversity will be present. Multiplication Seeds from crosses are sown out and harvested separately for a growing season or two until enough seeds are available. Mixture All seeds are mixed in equal portions to produce the first CCP generation. Maintenance The population is grown repeatedly and possibly changes due to natural selection. Each year seeds are saved after harvest, and used as seed for the next growing season. Plants that are successful under the prevailing growing conditions will give more seeds and contribute more to the next generation, compared to less successful plan
https://en.wikipedia.org/wiki/GoMeta
GoMeta is an American software company headquartered in San Diego. The company was founded by Dmitry Shapiro, Sean Thielen, and Jonathan Miller in September 2016. GoMeta's Koji platform lets non-technical individuals create and publish mini apps, progressive web applications that run on all devices and operating systems, and embed inside of social networks and messengers. Previously, GoMeta created Metaverse Studio, a drag and drop editor for creating Augmented Reality (AR) experiences. The company suspended support for Metaverse Studio in 2019. Overview GoMeta's Koji platform is a browser-based low-code development platform for creating web applications. Independent developers publish templates for apps and games and users remix those templates to create new applications. Alongside the underlying application code, users have access to low-code visual abstractions, including tools that allow easy manipulation of 3D models, sounds, and images. These visual abstractions are defined by the template creator in the original application bundle. Koji applications are full-stack web applications, and often include complex functionality like leaderboards, databases, realtime multiplayer, and calls to third-party APIs. GoMeta’s earlier platform, Metaverse Studio, is a web application that allows users to create interactive Augmented Reality experiences without any coding. Using Metaverse Studio, users can build AR experiences that incorporate technologies such as GPS, iBeacons, 3D objects, 360-degree video, photo filters, and digital coupons, in addition to commonly used features of programming like logic, probability, collection of user input, and session management. History GoMeta came to media attention in 2016 with a series of Augmented Reality scavenger hunts created in Metaverse Studio. Participants followed clues in the Metaverse App that were tied to real-world locations, and the winners of the scavenger hunts received cash prizes. In 2016, GoMeta raised $3 mil
https://en.wikipedia.org/wiki/Chondrometer
A chondrometer is a measuring instrument designed to determine the bulk density of grain. Grain density is measured in kilograms per hectolitre (Imp. pounds per bushel). It is thus also referred to as the hectolitre mass. Purpose Density is a guide to wheat quality and determines the price and the space required to store and transport the crop. Description A chondrometer consists of a filling hopper, a measuring container, a straightedge, a weighing instrument. The filling hopper allows the grain to fall into the measuring container in a reproducible pattern as several measurements are taken, and all readings need to be within a strict degree of accuracy. The measuring cylinder has flat top edge to it can levelled using the straightedge (a strickle) to give a set volume. Today, the measuring instrument can be a set of digital scales with an accuracy greater than 0.1 g, though in the past it was a steelyard balance with the measuring cylinder hooking directly onto the scales. Calculation Bulk Density (kg/hL)= Mass of Grain Captured (in kg) /Volume of measuring container (in L) x 100 The measuring container will usually be 1L or 0.5L to make the calculations easy. References External links How to Measure Test Weight of Grain - YouTube Measuring instruments
https://en.wikipedia.org/wiki/La%20Tribune%20de%20l%27art
La Tribune de l'art (The Art Tribune) is a French online magazine on art history and western heritage from the Middle Ages to the 1930s. It was set up on 7 April 2003 by Didier Rykner, art historian and former agronomist. In 2008, the magazine's editor-in-chief received the La Demeure historique prize in the "journalist's prize, written press — internet" category. In 2021, the magazine will have 4,000 subscribers, a turnover of 320,000 euros and four employees. References External links 2003 establishments in France Cultural magazines French-language magazines Magazines established in 2003 Online magazines Magazines published in Paris
https://en.wikipedia.org/wiki/Oscheius
Oscheius is a genus of nematode. O. tipulae is a satellite developmental genetic model organism used to study vulva formation. In phylogenetic studies, based on the analysis of sequences of three nuclear genes, Oscheius groups with Caenorhabditis species and the Diploscapter, Protorhabditis and Prodontorhabditis 'Protorhabditis' group, all included in the 'Eurhabditis' group of Rhabditidae genera. References External links Rhabditidae Rhabditida genera Model organisms
https://en.wikipedia.org/wiki/Login.gov
Login.gov is a single sign-on solution for US government websites. It enables users to log in to services from numerous government agencies using the same username and password. Login.gov was jointly developed by 18F and the US Digital Service. The initiative was announced in a blog post in May 2016 and the new system was launched in April 2017 as a replacement for Connect.Gov. Further reading See also NSTIC GOV.UK Verify External links References Identity management systems Federated identity E-government in the United States
https://en.wikipedia.org/wiki/Municipal%20castings
Municipal castings refers to many products, including: access hatches; ballast screens; benches (iron or steel); bollards; cast bases; cast iron hinged hatches, square and rectangular; cast iron riser rings; catch basin inlet; cleanout/monument boxes; construction covers and frames; curb and corner guards; curb openings; detectable warning plates; downspout shoes (boot, inlet); drainage grates, frames and curb inlets; inlets; junction boxes; lampposts; manhole covers, rings and frames, risers; meter boxes; service boxes; steel hinged hatches, square and rectangular; steel riser rings; trash receptacles; tree grates; tree guards; trench grates; and valve boxes, covers and risers. These products are covered by the Buy America Act of 1982. "By law, American-made municipal castings must be used in many federal, state and local-level public works infrastructure projects that are funded or financed with U.S. taxpayer dollars". The Buy America Act states that transportation infrastructure projects must be built with iron, steel, and manufactured products in the United States. This relates to highways, bridges, airports, and tunnels funded by federal grants. There are severe penalties for not following the Buy America laws. The Municipal Castings Association is an organization made up of the following American manufacturers: Charlotte Pipe and Foundry Company, D&L Foundry and Supply, US Foundry, EBAA Iron, EJ, McWane, Neenah Foundry, and Spring City. They are dedicated advocates ensuring that all applicable federal, state, and local laws and specifications are followed for infrastructure projects in the United States. Municipal castings also have to follow the country-of-origin marking requirement laws. Every casting of foreign origin entering the United States has to be marked legibly with the English name. There is a special marking law for municipal castings that states they must be marked on the top surface of the casting, visible once the product is installed in
https://en.wikipedia.org/wiki/Human%20rights%20and%20encryption
Human rights applied to encryption are a concept of freedom of expression, where encryption is a technical resource in the implementation of basic human rights. With the evolution of the digital age, the application of freedom of speech has become more controversial as new technologies and restrictions arose, along with governmental and commercial interests. From a human rights perspective, there is a growing awareness that encryption is a core component in realizing a free, open, and trustworthy Internet. Human rights are moral principles or norms, that describe certain standards of human behaviour, that are regularly protected as legal rights in municipal and international law. They are commonly understood as inalienable, fundamental rights "to which a person is inherently entitled simply because they are a human being". Those rights are "inherent in all human beings" regardless of their nationality, location, language, religion, ethnic origin, or any other status. They are applicable everywhere, at every time and are universal. They are egalitarian in the sense that they are the same for everyone. Cryptography is a long-standing subject in the field of mathematics and computer science. It can generally be defined as "the protection of information and computation using mathematical techniques." In the OECD Guidelines, encryption and cryptography are defined as follows: "Encryption" refers to the transformation of data by the use of cryptography to produce unintelligible data (encrypted data) to ensure its confidentiality. "Cryptography" refers to the discipline, that embodies principles, means, and methods for the transformation of data to hide its information content, establish its authenticity, prevent its undetected modification, prevent its repudiation, and prevent its unauthorized use. Encryption and cryptography are often used synonymously, although "cryptography" has a broader technical meaning. For example, a digital signature is "cryptography", but not
https://en.wikipedia.org/wiki/Nanowire%20lasers
Semiconductor nanowire lasers are nano-scaled lasers that can be embedded on chips and constitute an advance for computing and information processing applications. Nanowire lasers are coherent light sources (single mode optical waveguides) as any other laser device, with the advantage of operating at the nanoscale. Built by molecular beam epitaxy, nanowire lasers offer the possibility for direct integration on silicon, and the construction of optical interconnects and data communication at the chip scale. Nanowire lasers are built from III–V semiconductor heterostructures. Their unique 1D configuration and high refractive index allow for low optical loss and recirculation in the active nanowire core region. This enables subwavelength laser sizes of only a few hundred nanometers. Nanowires are Fabry–Perot resonator cavities defined by the end facets of the wire, therefore they do not require polishing or cleaving for high-reflectivity facets as in conventional lasers. Properties Nanowire lasers can be grown site-selectively on Si/SOI wafers with conventional MBE techniques, allowing for pristine structural quality without defects. Nanowire lasers using the group-III nitride and ZnO materials systems have been demonstrated to emit in the visible and ultraviolet, however infrared at the 1.3–1.55 μm is important for telecommunication bands. Lasing at those wavelengths has been achieved by removing the nanowire from the silicon substrate. Nanowire lasers have shown pulse durations down to <1ps, and enable repetition rates greater than 200 GHz. Also, nanowire lasers have shown to store the phase information of a pulse over 30ps when excited with subsequent pulse pairs. Mode locked lasers at the nano-scale are therefore feasible with such configurations. See also Semiconductor lasers Nanowires Molecular Beam Epitaxy Nanolaser References Nanoelectronics Semiconductors Nanowire
https://en.wikipedia.org/wiki/Neom
Neom (styled NEOM; , ) is a new urban area planned by the Kingdom of Saudi Arabia to be built in its northwestern Tabuk Province. The site is north of the Red Sea, east of Egypt across the Gulf of Aqaba and south of Jordan. The total planned area of Neom is . The city's plans include multiple regions, including a floating industrial complex, global trade hub, tourist resorts and a linear city powered by renewable energy sources. It was launched by Saudi Crown Prince and Prime Minister Mohammed bin Salman. Developers intend for the majority of the city to be completed by 2039. Experts have expressed skepticism about the ambitions of the megaproject. Saudi Arabia originally aimed to complete major parts of the project by 2020, with an expansion completed in 2025, but then fell behind schedule. By July 2022, only two buildings had been constructed, and most of the project area remained bare desert. The project's estimated cost exceeds $500 billion. On January 29, 2019, the Saudi government announced that it had established a closed joint-stock company named Neom. The company is wholly owned by the Public Investment Fund and is solely dedicated to developing the economic zone of Neom. Etymology The name "Neom" is a portmanteau. The first three letters form the Ancient Greek prefix νέο Neo- meaning "new". The fourth letter, M, is the first letter of Crown Prince Mohammed bin Salman's name, as well as the first letter of the Arabic word for "future" (, ). History Salman announced plans for the city at the Future Investment Initiative conference in Riyadh on October 24, 2017. He said that it would operate independently from the “existing governmental framework” with its own tax and labour laws and an "autonomous judicial system." Egypt announced in 2018 that it would contribute some land to the Neom project. Klaus Kleinfeld was announced by Salman as the inaugural director for the Neom project upon its launch. In 2018, Kleinfeld signed Gladstone Place Partners LLC to
https://en.wikipedia.org/wiki/Seascape%20ecology
Seascape ecology is a scientific discipline that deals with the causes and ecological consequences of spatial pattern in the marine environment, drawing heavily on conceptual and analytical frameworks developed in terrestrial landscape ecology. Overview Seascape ecology, the application of landscape ecology concepts to the marine environment has been slowly emerging since the 1970s, yielding new ecological insights and showing growing potential to support the development of ecologically meaningful science-based management practices. For marine systems, the application of landscape ecology came about through a recognition that many of the concepts developed in the theory of island biogeography and the study of patch dynamics (precursors to modern landscape ecology) could be applicable to a range of marine environments from plankton patches to patch reefs, inter-tidal mussel beds and seagrass meadows. Progress in the ecological understanding of spatial patterning was not confined to shallow seafloor environments. For the open ocean, advances in ocean observing systems since the 1970s have allowed scientists to map, classify, quantify and track dynamic spatial structure in the form of eddies, surface roughness, currents, runoff plumes, ice, temperature fronts and plankton patches using oceanographic technologies – a theme increasingly referred to as pelagic seascape ecology. Subsurface structures too, such as internal waves, thermoclines, haloclines, boundary layers and stratification resulting in distinct layering of organisms, is increasingly being mapped and modelled in multiple dimensions. Like landscape ecologists, seascape ecologists are interested in the spatially explicit geometry of patterns and the relationships between pattern, ecological processes and environmental change. A central tenet in landscape ecology is that patch context matters, where local conditions are influenced by attributes of the surroundings. For instance, the physical arrangement o
https://en.wikipedia.org/wiki/BioCompute%20Object
The BioCompute Object (BCO) project is a community-driven initiative to build a framework for standardizing and sharing computations and analyses generated from High-throughput sequencing (HTS -- also referred to as next-generation sequencing or massively parallel sequencing). The project has since been standardized as IEEE 2791-2020, and the project files are maintained in an open source repository. The July 22nd, 2020 edition of the Federal Register announced that the FDA now supports the use of BioCompute (officially known as IEEE 2791-2020) in regulatory submissions, and the inclusion of the standard in the Data Standards Catalog for the submission of HTS data in NDAs, ANDAs, BLAs, and INDs to CBER, CDER, and CFSAN. Originally started as a collaborative contract between the George Washington University and the Food and Drug Administration, the project has grown to include over 20 universities, biotechnology companies, public-private partnerships and pharmaceutical companies including Seven Bridges and Harvard Medical School. The BCO aims to ease the exchange of HTS workflows between various organizations, such as the FDA, pharmaceutical companies, contract research organizations, bioinformatic platform providers, and academic researchers. Due to the sensitive nature of regulatory filings, few direct references to material can be published. However, the project is currently funded to train FDA Reviewers and administrators to read and interpret BCOs, and currently has 4 publications either submitted or nearly submitted. Background One of the biggest challenges in bioinformatics is documenting and sharing scientific workflows in such a way that the computation and its results can be peer-reviewed or reliably reproduced. Bioinformatic pipelines typically use multiple pieces of software, each of which typically has multiple versions available, multiple input parameters, multiple outputs, and possibly platform-specific configurations. As with experimental paramete
https://en.wikipedia.org/wiki/Opus%20Magnum
Opus Magnum is a puzzle-based programming game developed by Zachtronics. It was released for Microsoft Windows, Linux, and Mac in December 2017, following about two months of early access. In the game, the player must assemble a series of machines using various tools and program them to complete alchemy-related tasks. The player can advance with any working solution to each problem, but is challenged through leaderboards to produce a machine that does the task in the shortest time, with the lowest cost of materials, and/or the smallest occupied area. Opus Magnum is based on The Codex of Alchemical Engineering, one of the earliest Flash games made by Zach Barth prior to establishing Zachtronics. Gameplay Opus Magnum has the player take the role of an alchemist to create required products by manipulating atoms of base alchemy elements (the classic elements as well as the metals of antiquity) through a device they construct within a transmutation engine. The engine is represented as a hex grid which the player arranges various manipulation tools and transmutation spaces on. Manipulators are mechanical arms that rotate around a pivot point, pick up and drop atoms, and rotate structures it currently has picked up, with optional variants that can extend and retract the arm, and/or travel along a track path. Transmutation spaces can create a bond, destroy a bond, transform a basic element into "salt", or upgrade base metals into higher ones using quicksilver. Manipulation parts have a cost to them, though the player is not limited to a total number of manipulation elements, cost, or space the device takes up in crafting their solution. After placing manipulators, the player must then provide each manipulator a set of commands that take atoms from input spaces and drop the proper completed material into the target output space; an early puzzle demonstrates how one turns lead into gold. Manipulators can have individual programs, and each run simultaneously once the machin
https://en.wikipedia.org/wiki/ROCA%20vulnerability
The ROCA vulnerability is a cryptographic weakness that allows the private key of a key pair to be recovered from the public key in keys generated by devices with the vulnerability. "ROCA" is an acronym for "Return of Coppersmith's attack". The vulnerability has been given the identifier . The vulnerability arises from a problem with an approach to RSA key generation used in vulnerable versions of a software library, RSALib, provided by Infineon Technologies, and incorporated into many smart cards, Trusted Platform Module (TPM), and Hardware Security Modules (HSM) implementations, including YubiKey 4 tokens, often used to generate PGP keys. Keys of lengths 512, 1024, and 2048 bits generated using these versions of the Infineon library are vulnerable to a practical ROCA attack. The research team that discovered the attack (all with Masaryk University and led by Matúš Nemec and Marek Sýs) estimate that it affected around one-quarter of all current TPM devices globally. Millions of smart cards are believed to be affected. The team informed Infineon of the RSALib problem in February 2017, but withheld public notice until mid-October, citing responsible disclosure. At that time they announced the attack and provided a tool to test public keys for vulnerability. They published the details of the attack in November. Technical details Generating an RSA key involves selecting two large randomly-generated prime numbers, a process that can be time-consuming, particularly on small devices, such as smart cards. In addition to being primes, the numbers should have certain other properties for best security. The vulnerable RSALib selection process quickly creates primes of the desired type by only testing for primality numbers of the form: where is the product of the first n successive primes (2, 3, 5, 7, 11, 13,...), and n is a constant that only depends on the desired key size. The security is based on the secret constants and . The ROCA attack exploits this particular fo
https://en.wikipedia.org/wiki/Pindar%20Van%20Arman
Pindar Van Arman is an American artist and roboticist based in Washington, D.C. His art focuses on designing painting robots that explore the differences between human and computational creativity. Since his first system in 2005, he has built multiple artificially creative robots, including CrowdPainter, bitPaintr, and CloudPainter. His robotic systems typically paint with a brush on stretched canvas and have recently begun to concentrate on creative portraiture. His work with CloudPainter was awarded First Place in Robot Art 2018, an annual AI and robotics art competition. Judges of the contest noted that "CloudPainter was able to paint evocative portraits with varying degrees of abstraction." Van Arman graduated from Ohio Wesleyan University in 1996 and went on to get his Masters from the Corcoran School of the Arts and Design at George Washington University in 2010. References Year of birth missing (living people) Living people American artists Artificial intelligence art Ohio Wesleyan University alumni Corcoran School of the Arts and Design alumni
https://en.wikipedia.org/wiki/Population%20biology
The term population biology has been used with different meanings. In 1971 Edward O. Wilson et al. used the term in the sense of applying mathematical models to population genetics, community ecology, and population dynamics. Alan Hastings used the term in 1997 as the title of his book on the mathematics used in population dynamics. The name was also used for a course given at UC Davis in the late 2010s, which describes it as an interdisciplinary field combining the areas of ecology and evolutionary biology. The course includes mathematics, statistics, ecology, genetics, and systematics. Numerous types of organisms are studied. The journal Theoretical Population Biology is published. See also References External links The Theory of Ecological Communities Evolutionary biology Ecology Population
https://en.wikipedia.org/wiki/Lottery%20competition
Lottery competition in ecology is a model for how organisms compete. It was first used to describe competition in coral reef fish. Under lottery competition, many offspring compete for a small number of sites (e.g., many fry competing for a few territories, or many seedlings competing for a few treefall gaps). Under lottery competition, one individual is chosen randomly to "win" that site (typically becoming an adult soon after), and the "losers" typically die off. Thus, in an analogy to a lottery or raffle, every individual has an equal chance of winning (like every ticket has an equal chance of being chosen), and therefore more abundant species are proportionately more likely to win (just as an individual who buys more tickets is more likely to win). Some models generalize this idea by weighting some individuals who are more likely to be chosen (by analogy, this would be like some tickets counting as two tickets instead of one). When a population is below carrying capacity, e.g. due to ecological disturbance, then producing twice as many individuals is not identical to producing individuals twice as likely to win; the two specialized groups can coexist in a competition-colonization trade-off. Lottery competition has been used to in understanding many key ideas in ecology, including the storage effect (species coexist because they are affected differently by environmental variation) and neutral theory (species diversity is maintained because species are competitively equivalent, and extinction rates are slow enough to be offset by speciation and dispersal events). References Ecology
https://en.wikipedia.org/wiki/Tensor%20representation
In mathematics, the tensor representations of the general linear group are those that are obtained by taking finitely many tensor products of the fundamental representation and its dual. The irreducible factors of such a representation are also called tensor representations, and can be obtained by applying Schur functors (associated to Young tableaux). These coincide with the rational representations of the general linear group. More generally, a matrix group is any subgroup of the general linear group. A tensor representation of a matrix group is any representation that is contained in a tensor representation of the general linear group. For example, the orthogonal group O(n) admits a tensor representation on the space of all trace-free symmetric tensors of order two. For orthogonal groups, the tensor representations are contrasted with the spin representations. The classical groups, like the symplectic group, have the property that all finite-dimensional representations are tensor representations (by Weyl's construction), while other representations (like the metaplectic representation) exist in infinite dimensions. References , chapters 9 and 10. Bargmann, V., & Todorov, I. T. (1977). Spaces of analytic functions on a complex cone as carriers for the symmetric tensor representations of SO(n). Journal of Mathematical Physics, 18(6), 1141–1148. Tensors
https://en.wikipedia.org/wiki/Sergey%20Kitaev
Sergey Kitaev (Russian: Сергей Владимирович Китаев; born 1 January 1975 in Ulan-Ude) is a Professor of Mathematics at the University of Strathclyde, Glasgow, Scotland. He obtained his Ph.D. in mathematics from the University of Gothenburg in 2003 under the supervision of Einar Steingrímsson. Kitaev's research interests concern aspects of combinatorics and graph theory. Contributions Kitaev is best known for his book Patterns in permutations and words (2011), an introduction to the field of permutation patterns. He is also the author (with Vadim Lozin) of Words and graphs (2015) on the theory of word-representable graphs which he pioneered. Kitaev has written over 120 research articles in mathematics. Of particular note is his work generalizing vincular patterns to having partially ordered entries, a classification (with Anders Claesson) of bijections between 321- and 132-avoiding permutations, and a solution (with Steve Seif) of the word problem for the Perkins semigroup, as well as his work on word-representable graphs. Selected publications External links Sergey Kitaev's page at the University of Strathclyde References Combinatorialists 21st-century Russian mathematicians Academics of the University of Strathclyde University of Gothenburg alumni Novosibirsk State University alumni 1975 births Living people
https://en.wikipedia.org/wiki/Orbit%20capacity
In mathematics, orbit capacity of a subset of a topological dynamical system may be thought of heuristically as a “topological dynamical probability measure” of the subset. More precisely, its value for a set is a tight upper bound for the normalized number of visits of orbits in this set. Definition A topological dynamical system consists of a compact Hausdorff topological space X and a homeomorphism . Let be a set. Lindenstrauss introduced the definition of orbit capacity: Here, is the membership function for the set . That is if and is zero otherwise. Properties Obviously, one has . By convention, topological dynamical systems do not come equipped with a measure; the orbit capacity can be thought of as defining one, in a "natural" way. It is not a true measure, it is only sub-additive: Orbit capacity is sub-additive: For a closed set C, where MT(X) is the collection of T-invariant probability measures on X. Small sets When , is called small. These sets occur in the definition of the small boundary property. References Topological dynamics
https://en.wikipedia.org/wiki/Google%20Pay%20%28payment%20method%29
Google Pay (formerly Android Pay) is a mobile payment service developed by Google to power in-app, online, and in-person contactless purchases on mobile devices, enabling users to make payments with Android phones, tablets, or watches. Users can authenticate via a PIN, passcode, or biometrics such as 3D face scanning or fingerprint recognition. , it is currently available in 71 countries. Service Google Pay uses near-field communication (NFC) to transmit card information facilitating funds transfer to the retailer. It replaces the credit or debit card chip and PIN or magnetic stripe transaction at point-of-sale terminals by allowing the user to upload these in Google Wallet. It is similar to contactless payments already used in many countries, with the addition of two-factor authentication. The service lets Android devices wirelessly communicate with point of sale systems using a near field communication (NFC) antenna and host-based card emulation (HCE). When the user makes a payment to a merchant, Google Pay does not send the actual payment card number. Instead, it generates a virtual account number representing the user's account information. Google Pay requires that a screen lock be set on the phone or watch. It has no card limit. Users can add payment cards to the service by taking a photo of the card, or by entering the card information manually. To pay at points of sale, users hold their authenticated device to the point of sale system. The service has smart-authentication, allowing the system to detect when the device is considered secure (for instance if unlocked in the last five minutes) and challenge if necessary for unlock information. Technology Google Pay uses the EMV Payment Tokenization Specification. The service keeps customer payment information private from the retailer by replacing the customer's credit or debit card Funding Primary Account Number (FPAN) with a tokenized Device Primary Account Number (DPAN) and creates a "dynamic security
https://en.wikipedia.org/wiki/David%20Bevan%20%28mathematician%29
David Bevan is an English mathematician, computer scientist and software developer. He is known for Bevan's theorem, which gives the asymptotic enumeration of grid classes of permutations and for his work on enumerating the class of permutations avoiding the pattern 1324. He is also known for devising weighted reference counting, an approach to computer memory management that is suitable for use in distributed systems. Work and research Bevan is a lecturer in combinatorics in the department of Mathematics and Statistics at the University of Strathclyde. He has degrees in mathematics and computer science from the University of Oxford and a degree in theology from the London School of Theology. He received his PhD in mathematics from The Open University in 2015; his thesis, On the growth of permutation classes, was supervised by Robert Brignall. In 1987, as a research scientist at GEC's Hirst Research Centre in Wembley, he developed an approach to computer memory management, called weighted reference counting, that is suitable for use in distributed systems. During the 1990s, while working for the Summer Institute of Linguistics in Papua New Guinea, he developed a computer program, called FindPhone, that was widely used by field linguists to analyse phonetic data in order to understand the phonology of minority languages. While employed by Pitney Bowes, he was a major contributor to the development of the FreeType text rendering library. Bevan's mathematical research has concerned areas of enumerative combinatorics, particularly in relation to permutation classes. He established that the growth rate of a monotone grid class of permutations is equal to the square of the spectral radius of a related bipartite graph. He has also determined bounds on the growth rate of the class of permutations avoiding the pattern 1324. In the Acknowledgements sections of his journal articles, he often includes the Latin phrase Soli Deo gloria. Selected publications External links
https://en.wikipedia.org/wiki/Small%20boundary%20property
In mathematics, the small boundary property is a property of certain topological dynamical systems. It is dynamical analog of the inductive definition of Lebesgue covering dimension zero. Definition Consider the category of topological dynamical system (system in short) consisting of a compact metric space and a homeomorphism . A set is called small if it has vanishing orbit capacity, i.e., . This is equivalent to: where denotes the collection of -invariant measures on . The system is said to have the small boundary property (SBP) if has a basis of open sets whose boundaries are small, i.e., for all . Can one always lower topological entropy? Small sets were introduced by Michael Shub and Benjamin Weiss while investigating the question "can one always lower topological entropy?" Quoting from their article: "For measure theoretic entropy, it is well known and quite easy to see that a positive entropy transformation always has factors of smaller entropy. Indeed the factor generated by a two-set partition with one of the sets having very small measure will always have small entropy. It is our purpose here to treat the analogous question for topological entropy... We will exclude the trivial factor, where it reduces to one point." Recall that a system is called a factor of , alternatively is called an extension of , if there exists a continuous surjective mapping which is eqvuivariant, i.e. for all . Thus Shub and Weiss asked: Given a system and , can one find a non-trivial factor so that ? Recall that a system is called minimal if it has no proper non-empty closed -invariant subsets. It is called infinite if . Lindenstrauss introduced SBP and proved: Theorem: Let be an extension of an infinite minimal system. The following are equivalent: has the small-boundary property. , where denotes mean dimension. For every , , there exists a factor so and . where is an inverse limit of systems with finite topological entropy for all . La
https://en.wikipedia.org/wiki/Micro-80
The Micro-80 () was the first do-it-yourself home computer in the Soviet Union. Overview Schematics and information were published in the local DIY electronic magazine Radio in 1983. It was complex, using an KR580VM80A-based system (a clone of the Intel 8080) which contained about 200 ICs. This system gained low popularity, but set a precedent in getting the attention of hobbyists for DIY computers, and later other DIY computers were published by Radio and other DIY magazines. History of creation The creation of the Micro-80 prototype began in 1978, when a package from the Kiev NPO Kristall arrived at the Moscow Institute of Electronic Machine Building (MIEM) by mistake. There were microcircuits in that package. Soon, MIEM specialists figured out that this was a domestic analogue of the i8080 microprocessor and peripheral controllers and decided to create their own PC. In 1979, the first sample of a microcomputer was launched. As in the first Western microcomputers, a terminal connected via a serial interface was used as a display device and keyboard, in this case the Videoton-340. There was also a punched tape reader FS-1500. 4 KB RAM was made on K565RU2 microcircuits with a 1K×1 organization (later the RAM was increased by another 8 KB). Initially, there was no ROM at all, and when the computer was turned on cold (as in one of the first American microcomputers Altair 8800 of 1975), it was necessary to manually enter the program for loading the block from punched tape with toggle switches. When i2708 chips (UV-ROM 1K×8) became available some time after the computer was running, they were used to store the ROM-BIOS and the monitor, eliminating the need to constantly load them from punched tape. Popov developed a text video adapter that works on a conventional household TV and a keyboard read through the PPA KR580VV55, which eliminated the bulky industrial terminal. After a data storage system based on a cassette recorder was developed, in 1980 a prototype of a
https://en.wikipedia.org/wiki/Specialist%20%28computer%29
The Specialist () is a DIY computer designed in Soviet Union. Its description was published in Modelist-Konstructor (), a magazine for scale model builders in 1987. It was the first such publication in a magazine not oriented on electronics. Overview The original construction was developed by a professional technical school teacher two years earlier. It was much more advanced than previous DIY computers, because it had a higher graphical image resolution (384x256) and a "transparent" video system, which did not slow down the CPU when both the CPU and the video system tried to access the RAM simultaneously. It gained limited popularity with hobbyists, though some factories produced DIY kits (Lik for example). Technical specifications CPU: KR580VM80A (Intel 8080A clone) clocked at 2 MHz. RAM: 32 or 48 KiB. ROM: 2 KiB, expandable to 12 KiB. ROM contains monitor firmware. Video: monochrome graphics mode. The image resolution is 384 × 256 pixels. Text can be displayed using 64 columns × 25 rows of characters. Images for the upper case Cyrillic and Latin characters in KOI-7 N2 encoding are built in the Monitor ROM. Storage media: cassette tape. The recording format is compatible with the one used in Radio-86RK. Keyboard: membrane type, 72 keys. The keyboard matrix is attached via programmable peripheral interface chip KR580VV55 (Intel 8255 clone) and scanned by CPU. References Soviet computer systems
https://en.wikipedia.org/wiki/UT-88
The UT-88 () is a DIY educational computer designed in the Soviet Union. Its description was published in YT dlya umelykh ruk (Young technical designer for skilled hands, ) — a supplement to Yunij Technik (Young technical designer, ) magazine in 1989. It was intended for building by school children of extracurricular hobby groups at Pioneers Palaces. Description At the time of publication, there were several DIY computers: Micro-80, Radio-86RK, and Specialist. The main feature of UT-88 was the possibility to build a computer in stages while getting a workable construction at each step. This approach made it easier to build by less skilled hobbyists. The minimal configuration of the computer includes a power supply, CPU, 1 KiB of ROM and 1 KiB of RAM, 6 seven-segment displays, a 17-key keyboard, and a tape interface. This computer can be used as a scientific calculator. Full configuration adds a display module with a TV interface, a full keyboard, and a 64 KiB dynamic RAM module. References Soviet computer systems
https://en.wikipedia.org/wiki/Orion-128
The Orion-128 () is a DIY computer designed in Soviet Union. It was featured in the Radio magazine in 1990, other materials for the computer were published until 1996. It was the last Intel 8080-based DIY computer in Russia. Overview The Orion-128 used the same concepts as the Specialist and had similar specifications, with both advances and flaws. It gained more popularity because it was supported by a more popular magazine. In the early 1990s the computer was produced industrially at the Livny pilot plant of machine graphics means in Oryol Oblast. Much of the software for the Orion-128 was ported by hobbyists from the Specialist and the ZX Spectrum. Technical specifications CPU: KR580VM80A (Intel 8080A clone) clocked at 2.5 MHz. RAM: 128 KiB in original version, expandable to 256 KiB. A bank switching scheme was used. ROM: 2 KiB contains monitor firmware Video: three graphics modes with the same image resolution 384 × 256 pixels. Text can be displayed using 64 columns × 25 rows of characters. Images for the upper case Cyrillic and Latin characters in KOI-7 N2 encoding are built in the Monitor ROM. List of graphics modes includes: monochrome mode (two color palettes available: black and green, yellow and blue) 4 color mode (each pixel has its own color, two palettes available) 16 color mode (each group of 8 horizontal pixels can use one of 16 foreground colors and one of 16 background colors) Storage media: cassette tape, ROM drive (a special board containing a set of ROM chips). In later years a floppy disk controller and an ATA hard disk controller were developed Keyboard: 67 keys. The keyboard matrix is attached via programmable peripheral interface chip KR580VV55 (Intel 8255 clone) and scanned by CPU Peculiarities "Orion" is partially compatible with "Radio-86RK" in terms of keyboard, standard ROM subroutines and data storage format on the cassette, and with another amateur radio computer, "Specialist" in terms of graphic screen format. Apparently,
https://en.wikipedia.org/wiki/EURO%20Journal%20on%20Computational%20Optimization
The EURO Journal on Computational Optimization (EJCO) is a peer-reviewed academic journal that was established in 2012 and is now published by Elsevier. It is an official journal of the Association of European Operational Research Societies, promoting the use of computers for the solution of optimization problems. Coverage includes both methodological contributions and innovative applications, typically validated through convincing computational experiments. The editor-in-chief is Immanuel Bomze. Past Editor-in-Chief: Martine Labbé (2012-2020). Abstracting and indexing The journal is abstracted and indexed in the following databases: EBSCO Information Services Emerging Sources Citation Index Google Scholar International Abstracts in Operations Research Mathematical Reviews OCLC Research Papers in Economics Scopus Summon by ProQuest Zentralblatt Math External links Operations research English-language journals Academic journals established in 2012
https://en.wikipedia.org/wiki/Distributed%20point%20function
In cryptography, a distributed point function is a cryptographic primitive that allows two distributed processes to share a piece of information, and compute functions of their shared information, without revealing the information itself to either process. It is a form of secret sharing. Given any two values and one can define a point function (a variant of the Kronecker delta function) by That is, it is zero everywhere except at , where its value is . A distributed point function consists of a family of functions , parameterized by keys , and a method for deriving two keys and from any two input values and , such that for all , where denotes the bitwise exclusive or of the two function values. However, given only one of these two keys, the values of for that key should be indistinguishable from random. It is known how to construct an efficient distributed point function from another cryptographic primitive, a one-way function. In the other direction, if a distributed point function is known, then it is possible to perform private information retrieval. As a simplified example of this, it is possible to test whether a key belongs to replicated distributed database without revealing to the database servers (unless they collude with each other) which key was sought. To find the key in the database, create a distributed point function for and send the resulting two keys and to two different servers holding copies of the database. Each copy applies its function or to all the keys in its copy of the database, and returns the exclusive or of the results. The two returned values will differ if belongs to the database, and will be equal otherwise. References Cryptographic primitives
https://en.wikipedia.org/wiki/Meow%20Wars
The Meow Wars were an early example of a flame war sent over Usenet which began in 1996 and ended circa 1998. Its participants were known as "Meowers". The war was characterized by posters from one newsgroup "crapflooding", or posting a large volume of nonsense messages, to swamp on-topic communication in other groups. Ultimately, the flame war affected many boards, with Roisin Kiberd writing in Motherboard, a division of Vice, that esoteric Internet vocabulary was created as a result of the Meow Wars. The wars began when some Harvard students, who had "colonized" an abandoned newsgroup for fans of Karl Malden, , and were using it as a community newsgroup for such posts about daily student life, jokingly suggested harassing members of the Beavis and Butthead fan group , would be a good idea. One of the students — who was actually using a Boston University address, since he was an alumnus — announced the plan on Usenet on January 9, 1996. The original "Meowers" were denizens of the newsgroup, who responded to the "invasion" by adopting a "scorched earth" policy of rendering the newsgroup unusable. They began including the word "meow" in their posts in a reference to a karl-malden user with the initials CAT; the "meow" itself was a reference to Henrietta Pussycat, a character from Mr. Rogers' Neighborhood. Once the Harvard students abandoned alt.fan.karl-malden.nose, it became the Meowers' base of operations for what they called their "Usenet Performance Art". The Harvard students retreated to a private news server. After taking over the Meowers decided to expand their campaign of operations, and spread throughout the alt.* hierarchy, to the so-called "Big 8" groups, and out to the wider Internet. The invasion and disruption of various groups lasted for over one year. Escalation As the Meowers spilled over into more newsgroups, some experienced Usenetters placed the word "meow" and names of commonly seen Meowers into personal filters known as killfiles. This w
https://en.wikipedia.org/wiki/IMA%20Journal%20of%20Applied%20Mathematics
The IMA Journal of Applied Mathematics is a publication of Oxford University Press on behalf of the Institute of Mathematics and its Applications. Created in 1965, the Journal covers topics related to the application of mathematics. References External links Journal homepage Submission website Institute of Mathematics and its Applications Oxford University Press academic journals Mathematics journals Academic journals established in 1965 Bimonthly journals Hybrid open access journals
https://en.wikipedia.org/wiki/M-PHY
M-PHY is a high speed data communications physical layer protocol standard developed by the MIPI Alliance, PHY Working group, and targeted at the needs of mobile multimedia devices. The specification's details are proprietary to MIPI member organizations, but a substantial body of knowledge can be assembled from open sources. A number of industry standard settings bodies have incorporated M-PHY into their specifications including Mobile PCI Express, Universal Flash Storage, and as the physical layer for SuperSpeed InterChip USB. To support high speed, M-PHY is generally transmitted using differential signaling over impedance controlled traces between components. When use on a single circuit card, the use of electrical termination may be optional. Options to extend its range could include operation over a short flexible flat cable, and M-PHY was designed to support optical media converters allowing extended distance between transmitters and receivers, and reducing concerns with electromagnetic interference. Applications M-PHY (like its predecessor D-PHY) is intended to be used in high-speed point-to-point communications, for example video Camera Serial Interfaces. The CSI-2 interface was based on D-PHY (or C-PHY), while the newer CSI-3 interface is based on M-PHY. M-PHY was designed to supplant D-PHY in many applications, but this is expected to take a number of years. The M-PHY the physical layer is also used in a number of different high-speed emergent industry standards, DigRF (High speed radio interface), MIPI LLI (Low latency memory interconnect for multi-processors systems), and one possible physical layer for the UniPro protocol stack. Signaling speed and gears M-PHY supports a scalable variety of signaling speeds, ranging from 10 kbit/s to over 11.6 Gbit/s per lane. This is accomplished using two different major signaling/speed modes, a simple low-speed (using PWM) mode and high speed (using 8b10b). Communications goes on in bursts, and the design of b
https://en.wikipedia.org/wiki/Joseph%20Weisbecker
Joseph A. Weisbecker (September 4, 1932 – November 15, 1990) was an early microprocessor and microcomputer researcher, as well as a gifted writer and designer of toys and games. He was a recipient of the David Sarnoff award for outstanding technical achievement, recipient of IEEE Computer magazine's "Best Paper" award, as well as several RCA lab awards for his work. His designs include the RCA 1800 and 1802 processors, the 1861 "Pixie" graphics chip, the RCA Microtutor, the COSMAC ELF, RCA Studio II, and COSMAC VIP computers. His daughter Joyce Weisbecker took to programming his prototypes, becoming the first female video game designer in the process, using his language called CHIP-8. Early career Professionally, Weisbecker began working with digital logic and computer systems in 1951. It was also his hobby, however, and even his early work is marked by designs that are intended for educational or hobbyist use. These include a hobby tic-tac-toe computer built from relays in 1951, grade school educational aids built using lights and switches in 1955, and the Think-a-Dot, an inexpensive game to teach basic computer concepts in 1964. As a staff engineer at RCA, he performed advanced development research on LSI circuits as well as development of new product lines based on those circuits and other RCA products. Microprocessors In 1970 and 1971, Weisbecker developed a new 8 bit architecture computer system. This work preceded the release of the 4004 by competitor Intel. He built a demonstration home computer powered by the 1802 called FRED (Flexible Recreational and Educational Device) that utilized cassette tape for storage and a television for display. Subsequent to the success of the 4004, RCA released Weisbecker's work as the COSMAC 1801R and 1801U using its CMOS process in 1975. In 1976 the two 1801 ICs were integrated into a single chip, the 1802. In the time between 1971 and the production release of the 1800 series processor, Weisbecker developed a range o
https://en.wikipedia.org/wiki/Simulation%20governance
Simulation governance is a managerial function concerned with assurance of reliability of information generated by numerical simulation. The term was introduced in 2011 and specific technical requirements were addressed from the perspective of mechanical design in 2012. Its strategic importance was addressed in 2015. At the 2017 NAFEMS World Congress in Stockholm simulation governance was identified as the first of eight “big issues” in numerical simulation. Simulation governance is concerned with (a) selection and adoption of the best available simulation technology, (b) formulation of mathematical models, (c) management of experimental data, (d) data and solution verification procedures, and (e) revision of mathematical models in the light of new information collected from physical experiments and field observations. Plans for simulation governance have to be formulated to fit the mission of each organization or department within an organization: In the terminology of structural and mechanical engineering, typical missions are: Application of established rules of design and certification: Given the allowable value defined in a design rule , show that . Formulation of design rules (typically for new materials or material systems): What is ? This involves the interpretation of results from coupon tests and component tests. Condition-based maintenance (typically of high-value assets): Given a detected flaw, what is the probability that failure will occur after load cycles? Structural analysis of large structures (such as airframes, marine structures, automobiles under crash conditions). Note that items 1 to 3 require strength analysis where the quantities of interest are related to the first derivatives of the displacement field. Item 4 refers to structural analysis where the quantities of interest are force-displacement relations or accelerations (as in crash dynamics). This distinction is important because in strength analysis errors associated wi
https://en.wikipedia.org/wiki/Dr.%20Duke%27s%20Phytochemical%20and%20Ethnobotanical%20Databases
Dr. Duke's Phytochemical and Ethnobotanical Databases is an online database developed by James A. Duke at the USDA. The databases report species, phytochemicals, and biological activity, as well as ethnobotanical uses. The current Phytochemical and Ethnobotanical databases facilitate plant, chemical, bioactivity, and ethnobotany searches. A large number of plants and their chemical profiles are covered, and data are structured to support browsing and searching in several user-focused ways. For example, users can get a list of chemicals and activities for a specific plant of interest, using either its scientific or common name download a list of chemicals and their known activities in PDF or spreadsheet form find plants with chemicals known for a specific biological activity display a list of chemicals with their LD toxicity data find plants with potential cancer-preventing activity display a list of plants for a given ethnobotanical use find out which plants have the highest levels of a specific chemical References to the supporting scientific publications are provided for each specific result. Also included are links to nutritional databases, plants and cancer treatments and other plant-related databases. The content of the database is licensed under the Creative Commons CC0 public domain. External links Dr. Duke's Phytochemical and Ethnobotanical Databases References (dataset) U.S. Department of Agriculture, Agricultural Research Service. 1992-2016. Dr. Duke's Phytochemical and Ethnobotanical Databases. Home Page, http://phytochem.nal.usda.gov/ Biology websites Biodiversity databases Online databases Taxonomy (biology)
https://en.wikipedia.org/wiki/BBC%20Player
BBC Player is an authenticated multi-genre subscription video on demand service operated by BBC Studios, formerly BBC Worldwide, for the Asia market. It is available online and as an app. The service debuted in Singapore in summer 2016 to StarHub subscribers, in Malaysia in March 2017 with Telekom Malaysia, in Poland in June 2022 with Canal+, and most recently in Taiwan in August 2023 with Taiwan Mobile myVideo. BBC Player offers curated content from BBC global brands – BBC Earth, BBC First, BBC Lifestyle, CBeebies and BBC World News. Although not available to watch on linear TV in Asia, BBC Brit is available to watch on BBC Player. The most popular British programmes are available through the service, including Top Gear, Doctor Who, The Great British Bake Off and Sherlock. References Media players Internet television channels Streaming media systems BBC
https://en.wikipedia.org/wiki/Ekonomist%20%28magazine%29
Ekonomist is a Montenegrin online magazine, founded in 2014 in Podgorica. Ekonomist'''s primary focus is Montenegrin and world events, finances, business and economy. It aims at promoting good business practice and developing entrepreneurial awareness, as an important aspect of economic growth. Ekonomist'' is also the only FinTech portal in Montenegro, thus representing a platform for business and technology themes. In addition to national and world news, it features interviews, opinions, and career advice. Editor in chief is Ljiljana Premović. History Ekonomist was founded in 2014 in Podgorica, Montenegro. The magazine was established with the goal of providing accurate and objective news and analysis related to Montenegro's economy, business, and finance sectors. The magazine is published in Montenegrin and offers articles on a range of topics, including market trends, financial analysis, and policy developments. In addition to its online platform, the magazine has also published several print editions. Over the years, Ekonomist has become a leading source of economic news and analysis in Montenegro, and currently rank the 3rd best finance magazine. Sources External links Official website Business magazines Magazines established in 2014 Mass media in Podgorica Magazines published in Montenegro Online magazines
https://en.wikipedia.org/wiki/RCF%20audio
RCF S.p.A. (formerly Radio Cine Forniture - R.C.F. S.r.l.) is a widely recognized Italian manufacturer of high performance audio products including power amplifiers, loudspeakers, digital mixers and digital signal processors (DSP). History RCF is an Italian audio products manufacturer founded in 1949 in Reggio Emilia. The first products sold were microphones and electroacoustic transducers (loudspeakers). In the late ’60s, concert sound was going electric, and many loudspeaker pioneers were searching for high-powered devices to use in their designs. RCF was one of the first European OEM suppliers for international brands, thanks to the experience built on high power transducers. After a few years, thanks to the in-depth know-how in loudspeaker technology, RCF began to develop and produce sound reinforcement systems under the same brand. The introduction of the ART Series, in 1996, has established RCF among the few global manufacturers of active loudspeakers. The TT+ High Definition - Touring and Theater series equipped with DSP, introduced in 2004, and the RDNet Networked Management technology, gained RCF full recognition in the professional audio market. Since 2017, all DSP active speakers incorporate FiRPHASE technology, which allows achieving a 0° linear phase playback. RCF is the first audio manufacturer to have a complete catalogue of 0° phase-compatible sound systems including line arrays. RCF gave its name to the RCF Arena, the largest permanent outdoor concert arena in Europe. Professional Audio Systems ART 3/4/7/9 - Portable Speakers Nx Series - Professional Speakers with Wood Cabinet D-Line & HDL - Professional Portable Speakers EVOX - Column Array Portable Speakers Max Series - Hi Performance Speakers for Entertainment Sub Series Analog Mixer series Digital Mixer series TT+ Audio - High Performance Touring & Install Systems for large-size, high quality applications Studio Monitoring AYRA PRO / MYTHO / Iconica headphones System Integration
https://en.wikipedia.org/wiki/System%20Module
System Modules (originally known as System Building Blocks; the name was changed around 1961) are a DEC modular digital logic family which preceded the later FLIP CHIPs. They connect to the units they are plugged into via a set of 22 gold-plated discrete pins along one edge. They use transistor inverter circuits, with the transistors operating saturated, to avoid dependence on tight tolerances; they use -3V and 0V as logic levels. Intended for prototyping as well as production, they include design features intended to avoid damage. They are provided with design advice which includes loading rules and wiring instructions. They were available in several compatible speed lines: 4000-Series: the second series, nominally 500 KHz, but some 1 MHz 1000-Series: the original series, nominally 5 MHz 6000-Series: higher speeds, nominally 10 Mhz 8000-Series: very high speeds, nominally 30MHz In addition, special modules were available for purposes such as Input/Output (I/O) converters (to standard internal voltages), bus drivers, lamp and solenoid drivers, A/D conversion, relays, core memory drivers, etc. Larger assemblies which are part of the same family provide core memory testing devices. There are also power supplies, mounting panels with slots for the modules, cabinets to hold groups of mounting panels, indicator light panels, etc. References Citations Sources External links DEC Building Block Logic manual from the Computer History Museum, dated September 1960 Digital Logic Handbook, Third Edition, dated March 1961. New Module Accessories, dated February 1964 30 Megacycle Modules, dated September 1964 System Modules, dated 1968. DEC hardware
https://en.wikipedia.org/wiki/Bare%20machine%20computing
Bare Machine Computing (BMC) is a computer architecture based on bare machines. In the BMC paradigm, applications run without the support of any operating system (OS) or centralized kernel i.e., no intermediary software is loaded on the bare machine prior to running applications. The applications, which are called bare machine applications or simply BMC applications, do not use any persistent storage or a hard disk, and instead are stored on detachable mass storage such as a USB flash drive. A BMC program consists of a single application or a small set of applications (application suite) that runs as a single executable within one address space. BMC applications have direct access to the necessary hardware resources. They are self-contained, self-managed and self-controlled entities that boot, load and run without using any other software components or external software. BMC applications have inherent security due to their design. There are no OS-related vulnerabilities, and each application only contains the necessary (minimal) functionality. There is no privileged mode in a BMC system since applications only run in user mode. Also, application code is statically compiled-there is no means to dynamically alter BMC program flow during execution. History In the early days of computing, computer applications directly communicated to the hardware and there was no operating system. As applications grew larger encompassing various domains, OSes were invented. They served as middleware providing hardware abstractions to applications. OSes have grown immensely in their size and complexity resulting in attempts to reduce OS overhead and improve performance including Microkernel, Exokernel, Tiny-OS, OS-Kit, Palacios and Kitten, IO_Lite, bare-metal Linux, IBM-Libra and other lean kernels. In addition to the above approaches, in embedded systems such as smart phones, a small and dedicated portion of an OS and a given set of applications are closely integrated with the hardw
https://en.wikipedia.org/wiki/FT8
FT8 or Franke & Taylor 8 is a frequency shift keying digital mode of radio communication used by amateur radio operators worldwide. Following release on June 29, 2017, by its creators Joe Taylor, K1JT, and Steve Franke, K9AN, along with the software package WSJT, FT8 was adopted rapidly and, in little over two years, it became the most popular digital mode recorded by automatic spotting networks such as PSK Reporter. FT8DMC is the most important club dedicated to this mode of digital communication. Introduction FT8 is a popular form of digital weak signal communication used primarily by amateur radio operators to communicate on amateur radio bands with a majority of traffic occurring on the HF amateur bands. The mode offers operators the ability to communicate in unfavorable environments such as during low sun spot numbers, high RF noise, or during low power operations. With advances in signal processing technology FT8 is able to decode signals with a signal to noise ratio as low as −20 dB in a 2500 Hz bandwidth, which is significantly lower than CW or SSB transmissions. Operation FT8 sends 77 information bits in 15-second cycles with 12.64 seconds of transmission time and 2.36 seconds of decode time for a user data rate of 6.09 bits/sec. Source encoding gives an effective throughput of about 5 words per minute. The required SNR in a 2500 Hz bandwidth is −21 dB, so the corresponding Eb/N0 is 10 log10(2500/6.09) = 26.1 dB greater, or −21 dB + 26.1 = 5.1 dB. The mode requires the sending and receiving computers to be synchronised so, while manual time setting is possible, most users make use of automatic online time servers using NTP or by receiving broadcast time signals from the GPS to ensure their transmissions fall in the proper windows. Each FT8 transmission can support up to 13 text characters, coded using forward error correction to ensure proper transmission and decoding despite common radio effects such as fading, noise, interference, poor propagation, lo
https://en.wikipedia.org/wiki/Radiosynthesis%20%28metabolism%29
Radiosynthesis is the theorized capture and metabolism, by living organisms, of energy from ionizing radiation, analogously to photosynthesis. Metabolism of ionizing radiation was theorized as early as 1956 by the Russian microbiologist S. I. Kuznetsov. Beginning in the 1990s, researchers at the Chernobyl Nuclear Power Plant uncovered some 200 species of apparently radiotrophic fungi containing the pigment melanin on the walls of the reactor room and in the surrounding soil. Such "melanized" fungi have also been discovered in nutrient-poor, high-altitude areas which are exposed to high levels of ultraviolet radiation. Following the Russian results, an American team at the Albert Einstein College of Medicine of Yeshiva University in New York began experimenting with radiation exposure of melanin and melanized fungi. They found that ionizing radiation increased the ability of melanin to support an important metabolic reaction, and that Cryptococcus neoformans fungi grew three times faster than normal. Microbiologist Ekaterina Dadachova suggested such fungi could serve as a food supply and source of radiation protection for interplanetary astronauts, who would be exposed to cosmic rays. In 2014, the American research group was awarded a patent for a method of enhancing the growth of microorganisms through increasing melanin content. The inventors of this process claimed their fungi were employing radiosynthesis, and hypothesized that radiosynthesis may have played a role in early life on Earth, by allowing melanized fungi to act as autotrophs. From October 2018 through March 2019, NASA conducted an experiment aboard the International Space Station to study radiotrophic fungi as a potential radiation barrier to the harmful radiation in space. Radiotrophic fungi have many possible applications on Earth as well, potentially including a disposal method for nuclear waste or use as high-altitude biofuel or a nutrition source. References Radiobiology Biochemistry Photo
https://en.wikipedia.org/wiki/ARCore
ARCore, also known as Google Play Services for AR, is a software development kit developed by Google that allows for augmented reality applications to be built. ARCore uses three key technologies to integrate virtual content with the real world as seen through the camera of a smartphone or tablet: Six degrees of freedom allows the phone to understand and track its position relative to the world. Environmental understanding allows the phone to detect the size and location of flat horizontal surfaces like the ground or a coffee table. Light estimation allows the phone to estimate the environment's current lighting conditions. ARCore has been integrated into a multitude of devices. References External links Google software Software development kits Computer-related introductions in 2018 3D imaging Augmented reality
https://en.wikipedia.org/wiki/Tesla%20Roadster%20%28second%20generation%29
The Tesla Roadster is an upcoming battery electric four-seater sports car to be built by Tesla, Inc. The company has said that it will be capable of accelerating from 0 to 60 mph in 1.9 seconds. The Roadster is the successor to Tesla's first production car, the 2008 Roadster. Tesla CEO Elon Musk has said that the Roadster should ship in 2024. Musk said in a tweet that higher-performance trim levels will be available beyond the base specifications, including a SpaceX package that would "include ~10 small rocket cold air thrusters arranged seamlessly around the car" which would supposedly allow for dramatic improvements in "acceleration, top speed, braking & cornering" such as a claimed 1.1 second 0–60 mph (0–97 km/h) time. Overview History In 2011, at the end of the production run of the original Tesla Roadster, Elon Musk suggested that a new version of the Roadster, without the Lotus chassis, would return to production by 2014. The new Roadster was first teased in 2014. At the time, it was also referred to as the Tesla Model R. In 2015, Musk suggested a new Roadster, capable of faster acceleration. A tweet by Elon Musk in December 2016 reconfirmed a second Roadster was in the works, but still "some years away". The second Roadster was designed by Franz von Holzhausen. A prototype of the Roadster was shown in a surprise moment at the end of the Tesla Semi event on November 16, 2017, with an announced availability in the year 2020 at the starting price of US$200,000. Musk explained the concept as: "The point of doing this is to give a hardcore smackdown to gasoline cars. Driving a gasoline sports car is going to feel like a steam engine with a side of quiche." Test rides were given at the event for those who immediately paid the first $5,000 of a $50,000 deposit to pre-order the vehicle. Additional information followed after the teaser, such as the various world-record speeds Tesla said it will break. In June 2018, Elon Musk revealed a potential feature called
https://en.wikipedia.org/wiki/OpenFrame
OpenFrame is a mainframe rehosting solution developed by TmaxSoft that aims to help customers move existing mainframe assets to the cloud quickly and with minimal risk. It replaces legacy CICS/IMS/JES mainframe engines and shifts business applications written in legacy code like COBOL and PL/I to Linux. This allows reduced licensing costs compared to the mainframe. It also includes a test tool which helps users determine if the migration will preserve functionality without additional adjustments. The current version of OpenFrame is 7.0, which was first released in Japan in September, 2015. The previous version, OpenFrame 6.0 was released in the U.S. market in 2009. Mainframe Migration Organizations that run on mainframes tend to have difficulty with costs and agility. Rehosting is one approach an organization may take to migrate their mainframe operations to the cloud, with other options including batch-job migration and full re-engineering. With the rehosting option, the entire mainframe is emulated on the cloud so that the end-user experience is essentially unchanged. Compatibility OpenFrame advertises the following components can be migrated and continue working without modification, provided they run on open systems components such as Linux: Compilers COBOL PL/I Assembler Datasets Flat files GDGs VSAM Databases IMS DB2 IDMS Oracle Online Systems CICS Batch Systems JES JCL Notable Users Kela Kela, the Finnish government agency in charge of the nation's social security programs, used OpenFrame to rehost its mainframe. The agency had estimated that the rising costs of maintaining a mainframe would become prohibitive in the near future, and saw a shortage of IT professionals skilled in working in a mainframe environment. As a result, Kela was able to lift over 10 million lines of code to the rehosted environment and reduce the cost of system maintenance. Since the rehosted iteration was functionally similar to the mainframe system, Kela
https://en.wikipedia.org/wiki/Envelope%20%28category%20theory%29
In :Category theory and related fields of mathematics, an envelope is a construction that generalizes the operations of "exterior completion", like completion of a locally convex space, or Stone–Čech compactification of a topological space. A dual construction is called refinement. Definition Suppose is a category, an object in , and and two classes of morphisms in . The definition of an envelope of in the class with respect to the class consists of two steps. A morphism in is called an extension of the object in the class of morphisms with respect to the class of morphisms , if , and for any morphism from the class there exists a unique morphism in such that . An extension of the object in the class of morphisms with respect to the class of morphisms is called an envelope of in with respect to , if for any other extension (of in with respect to ) there is a unique morphism in such that . The object is also called an envelope of in with respect to . Notations: In a special case when is a class of all morphisms whose ranges belong to a given class of objects in it is convenient to replace with in the notations (and in the terms): Similarly, if is a class of all morphisms whose ranges belong to a given class of objects in it is convenient to replace with in the notations (and in the terms): For example, one can speak about an envelope of in the class of objects with respect to the class of objects : Nets of epimorphisms and functoriality Suppose that to each object in a category it is assigned a subset in the class of all epimorphisms of the category , going from , and the following three requirements are fulfilled: for each object the set is non-empty and is directed to the left with respect to the pre-order inherited from for each object the covariant system of morphisms generated by has a colimit in , called the local limit in ; for each morphism and for each element there are an ele
https://en.wikipedia.org/wiki/IPv4%20shared%20address%20space
In order to ensure proper working of carrier-grade NAT (CGN), and, by doing so, alleviating the demand for the last remaining IPv4 addresses, a size IPv4 address block was assigned by Internet Assigned Numbers Authority (IANA) to be used as shared address space. This block of addresses is specifically meant to be used by Internet service providers (or ISPs) that implement carrier-grade NAT, to connect their customer-premises equipment (CPE) to their core routers. Instead of using unique addresses from the rapidly depleting pool of available globally unique IPv4 addresses, ISPs use addresses in for this purpose. Because the network between CPEs and the ISP's routers is private to each ISP, all ISPs may share this block of addresses. Background If an ISP deploys a CGN and uses private Internet address space (networks , , ) to connect their customers, there is a risk that customer equipment using an internal network in the same range will stop working. The reason is that routing will not work if the same address ranges are used on both the private and public sides of a customer’s network address translation (NAT) equipment. Normal packet flow can therefore be disrupted and the customer effectively cut off the Internet, unless the customer chooses another private address range that does not conflict with the range selected by their ISP. This prompted some ISPs to develop policy within American Registry for Internet Numbers (ARIN) to allocate new private address space for CGNs. ARIN, however, deferred to the Internet Engineering Task Force (IETF) before implementing the policy, indicating that the matter was not typical allocation but a reservation for technical purposes. In 2012, the IETF defined a Shared Address Space for use in ISP CGN deployments and NAT devices that can handle the same addresses occurring both on inbound and outbound interfaces. ARIN returned space to the IANA as needed for this allocation and "The allocated address block is ". Transition to
https://en.wikipedia.org/wiki/Juku%20E5101
Juku E5101 was a personal computer targeted at Estonian schools which was released in 1988. The computer had monochrome display, a mouse and basic LAN capabilities, it ran CP/M 2.2 based EKDOS and had a Soviet Intel 8080A clone KR580VM80A for CPU. Juku E5101 was developed by and the Institute of Cybernetics of the Academy of Sciences of Estonia, test batch of 100 was produced in cooperation with factory in 1986. The computer initially used tape recorder as storage and was reported as first computer in USSR to have mouse attached. In a multibus (Soviet I41) compatible expansion slot one could also connect 32 KiB memory expansion cards or ROM cartridges. Juku E5104 production of which started in December 1988 was upgraded to use dual 5.25 inch diskette drive and drivers for printers. Despite relabelling it to "intellectual terminal for real-time system E5104", the label presented on main unit remained E5101. During first two years of serial production around 2000 Jukus were produced and last batch of 500 was ordered by Estonian Ministry of Education in 1992. Altogether 3000 Jukus were produced at Narva, plant (from Russian "Балтиец", Baltiyets), 2500 of them for school use. In 1991 many, if not all, bigger (at least 100 pupils) Estonian schools had a computer classroom that was furnished with those machines and Epson LX800 printers. Although the production was delayed four years and computers delivered were technologically outdated, Jukus did enable Estonia to "gain a head start in mass school computerization" by providing early access to computers and a standardized study environment. Despite conceived lack of end user skills and the shortage of computer professionals, there were schools having dedicated teachers and students themselves writing software for Jukus during extra hours at computer class, often convincing schools to lend computers home for summer vacation. In general tens of thousands students got their first computing experience with Juku "much
https://en.wikipedia.org/wiki/Catherine%20Yan
Catherine Huafei Yan () is a professor of mathematics at Texas A&M University interested in algebraic combinatorics. Education and career Yan earned a bachelor's degree from Peking University in 1993. She was a student of Gian-Carlo Rota at the Massachusetts Institute of Technology, where she earned her Ph.D. in 1997 with a dissertation on The Theory of Commuting Boolean Algebras. After working for two years as a Courant Instructor at New York University, she joined Texas A&M in 1999, with a three-year hiatus as Chern Professor at the Center of Combinatorics, Nankai University, from 2005 to 2008. Book With her advisor and Joseph Kung, she is an author of Combinatorics: The Rota Way (Cambridge University Press, 2009). The book provides an exposition of the areas of combinatorics of interest to Rota, unified through an algebraic framework, and lists many open research problems in this area. Recognition Yan won a Sloan Research Fellowship in 2001. She was elected to the 2018 class of fellows of the American Mathematical Society "for contributions to combinatorics and discrete geometry". References External links Home page Year of birth missing (living people) Living people 21st-century American mathematicians Chinese women mathematicians Combinatorialists International Mathematical Olympiad participants High School Affiliated to Renmin University of China alumni Peking University alumni Massachusetts Institute of Technology School of Science alumni New York University faculty Texas A&M University faculty Academic staff of Nankai University Sloan Research Fellows Fellows of the American Mathematical Society Place of birth missing (living people) Nationality missing 21st-century women mathematicians
https://en.wikipedia.org/wiki/History%20of%20computing%20in%20the%20Soviet%20Union
The history of computing in the Soviet Union began in the late 1940s, when the country began to develop its Small Electronic Calculating Machine (MESM) at the Kiev Institute of Electrotechnology in Feofaniya. Initial ideological opposition to cybernetics in the Soviet Union was overcome by a Khrushchev era policy that encouraged computer production. By the early 1970s, the uncoordinated work of competing government ministries had left the Soviet computer industry in disarray. Due to lack of common standards for peripherals and lack of digital storage capacity the Soviet Union's technology significantly lagged behind the West's semiconductor industry. The Soviet government decided to abandon development of original computer designs and encouraged cloning of existing Western systems (e.g. the 1801 CPU series was scrapped in favor of the PDP-11 ISA by the early 1980s). Soviet industry was unable to mass-produce computers to acceptable quality standards and locally manufactured copies of Western hardware were unreliable. As personal computers spread to industries and offices in the West, the Soviet Union's technological lag increased. Nearly all Soviet computer manufacturers ceased operations after the breakup of the Soviet Union. A few companies that survived into 1990s used foreign components and never achieved large production volumes. History Early history In 1936, an analog computer known as a water integrator was designed by Vladimir Lukyanov. It was the world's first computer for solving partial differential equations. The Soviet Union began to develop digital computers after World War II. A universally programmable electronic computer was created by a team of scientists directed by Sergey Lebedev at the Kiev Institute of Electrotechnology in Feofaniya. The computer, known as MESM (), became operational in 1950. By some authors it was also depicted as the first such computer in continental Europe, even though the Zuse Z4 and the Swedish BARK preceded it. Th
https://en.wikipedia.org/wiki/DataCore
DataCore, also known as DataCore Software, is a developer of software-defined storage based in Fort Lauderdale, Florida, United States. The company is a pioneer in the development of SAN virtualization technology, and offers software-defined storage solutions across core data center, edge and cloud environments. History DataCore was founded in Fort Lauderdale in February 1998 by George Teixeira and Ziya Aral, co-workers at parallel computing company Encore Computer. The premise behind the company was to allow network operators to purchase commodity disk drives, external storage arrays or SAN disk drive arrays, and treat them all as virtual disks of networked, block-access storage. This storage was controlled using DataCore software. They were joined by 10 other former Encore colleagues, and they all worked without pay until January 1999, when the company secured its first funding round, of $8 million. In 2000, the company had a $35 million Series C funding round. In 2006, seeing an exodus of venture funding, company employees mortgaged their homes to keep the business going, until 2008 when a US$30 million round of funding stabilized company finances. In 2011, the company launched SANsymphony-V, an upgrade to its storage virtualization software offering faster performance. In April 2014, the company released version 10 of its SANsymphony product. In March 2015, DataCore partnered with Chinese technology vendor Huawei to run SANsymphony-V software on Huawei's FusionServer to create virtual storage networks. In 2016, the company's SANsymphony-V software was reported to have set new price performance records based on testing done by Redwood City, California-based non-profit testing company Storage Performance Council using their SPC-1 storage performance benchmark. The results led to complaints from multiple vendors, who claimed that storing all the "test" data in cache made the results unfair. One of the three SPC-1 benchmark results was later withdrawn. In M
https://en.wikipedia.org/wiki/Lattice%20and%20bridged-T%20equalizers
Lattice and bridged-T equalizers are circuits which are used to correct for the amplitude and/or phase errors of a network or transmission line. Usually, the aim is to achieve an overall system performance with a flat amplitude response and constant delay over a prescribed frequency range, by the addition of an equalizer. In the past, designers have used a variety of techniques to realize their equalizer circuits. These include the method of complementary networks; the method of straight line asymptotes; using a purpose built test-jig; the use of standard circuit building blocks,; or with the aid of computer programs. In addition, trial and error methods have been found to be surprisingly effective, when performed by an experienced designer. In video or audio channels, equalization results in waveforms that are transmitted with less degradation and have sharper transient edges with reduced overshoots (ringing) than before. In other applications, such as CATV distribution systems or frequency multiplexed telephone signals where multiple carrier signals are being passed, the aim is to equalize the transmission line so that those signals have much the same amplitude. The lattice and bridged-T circuits are favoured for passive equalizers because they can be configured as constant-resistance networks such as the Zobel network, as pointed out by Zobel and later by Bode. The single word description “equalizer” is commonly used when the main purpose of the network is to correct the amplitude response of a system, even though some beneficial phase correction may also be achieved at same time. When phase correction is the main concern, the more explicit term "phase equalizer" or "phase corrector" is used. (In this case, the circuit is usually an all-pass network which does not alter the amplitude response at all such as the lattice phase equalizer). When equalizing a balanced transmission line, the lattice is the best circuit configuration to use, wh
https://en.wikipedia.org/wiki/Quirks%20%28board%20game%29
Quirks is a 1980 board game published by Eon Products. Gameplay The game components are a 108 cards printed on thin cardstock representing characteristics of animals and plants, and a game board, also printed on thin cardstock. The object of the game is to build three viable organisms called "quirks" from two or three of the cards. Reception In the February 1981 edition of The Space Gamer (No. 36), Forrest Johnson liked Quirks, saying, "This is a good family game." Ian Livingston reviewed Quirks for White Dwarf #24, giving it an overall rating of 9 out of 10, and stated that "All in all it is totally absurd but great fun and Eon Products must be congratulated for coming up with another ace." In the May 1981 edition of Ares (Issue 8), Eric Goldberg found the most serious flaw in the game was an ever-diminishing replay value as players either consciously or subconsciously memorized the card values. "Quirks.. is fun only for a limited number of times. The game is quite good until that point of diminishing returns is reached." Games magazine included Quirks in their "Top 100 Games of 1981", praising it as a "lighthearted game" involving "weird creatures and plants". In the December 1993 edition of Dragon (Issue 200), Allen Varney gave a thumbs down to the game. "One big flaw, I think, is that [the game] never identifies players with the animals they're evolving. Instead they're unspecified creature-makers who look down on these beasts and foliage from above. Quirks would involve me a lot more by evolving me — making me the creature who needs to emerge victorious in a niche. Deciding whether to eat plants or animals, or if I should ditch my wings in favor of an electric sting — that sounds like fun." Reviews Jeux & Stratégie #17 References Biology-themed board games Board games introduced in 1980
https://en.wikipedia.org/wiki/Haptik
Haptik is an Indian enterprise conversational AI platform founded in August 2013, and acquired by Reliance Industries Limited in 2019. The company develops technology to enable enterprises to build conversational AI systems that allow users to converse with applications and electronic devices in free-format, natural language, using speech or text. The company has been accorded numerous accolades including the Frost & Sullivan Award, NASSCOM's Al Game Changer Award, and serves Fortune 500 brands globally in industries such as financial, insurance, healthcare, technology and communications. History Haptik was founded by Aakrit Vaish and Swapan Rajdev, in August 2013. The company launched its first product Haptik app in March 2014, which is a chat-based personal assistant which lets its users get things done for Android and iOS platforms in India. By September 2014, the platform added 125 chat experts who helped users with their queries. Over time the company upgraded it into a complete conversational commerce app. The app received 2 million downloads and 15 million installations. In August 2015, Dan Roth joined Haptik's board of advisers who helped scale the platform's Natural language processing (NLP). In the same year, Haptik was appointed as the official personal assistant of Mumbai City FC. It also provided a customer support chatbot to SwipeTelecom. In November 2017, the company launched a full-scale enterprise-level bot management platform including an analytics dashboard. In 2019, Haptik launched a voice bot for one of the largest food chains in the world, allowing its customers to place orders using Alexa. It also helps users find the nearest outlet of the food chain and provides information on product availability on a real-time basis. In March 2019, the Government of Maharashtra signed a partnership pact with Haptik to develop a chatbot for its Aaple Sarkar platform. The bot provides conversational access to information regarding 1,400 services managed
https://en.wikipedia.org/wiki/Dell%20EMC%20Data%20Domain
Dell EMC Data Domain was Dell EMC’s data deduplication storage system. Development began with the founding of Data Domain, and continued since that company’s acquisition by EMC Corporation (and EMC’s later merger with Dell to form Dell EMC). History The technology started in a separate company, which was then acquired and re-branded twice. Data Domain Corporation The Data Domain Corporation was founded by Kai Li, Ben Zhu, and Brian Biles in 2001 as a company specializing in target-based data deduplication products for disk-based backup. Hugo Patterson joined as chief architect 3 months after initial funding. The company started operations in a series of venture capital offices around Palo Alto, California, pre-funding at U.S. Venture Partners, where Zhu was an entrepreneur in residence (EIR), then at New Enterprise Associates (NEA), where Li was an EIR, and post-funding at Greylock Partners. NEA and Greylock provided Series A funding in 2002. The first product revenue was realized in the beginning of 2004. Funding, IPO and Acquisition NEA and Greylock led the company’s $9.3 million Series A funding round in 2002. Sutter Hill Ventures led its $17 million Series B funding round in 2003, joined again by NEA and Greylock. Through 2005, the three companies invested a total of $40 million in Data Domain. The company had their initial public offering on June 27, 2007, with a total market capitalization of $776.5 million, above its forecast range despite years of losses. This put the stock price at $15 per share, above the forecasted range of $11.50 to $13.50. The company’s market capitalization was $776.5 million at the time of the IPO. It was listed on Nasdaq with symbol DDUP. EMC Data Domain In May 2009, NetApp announced it would acquire Data Domain for about $1.5 billion. In June 2009, EMC Corporation announced their intention to acquire Data Domain Corp for $2.4 billion, outbidding the previous offer. In July, the two companies agreed to the acquisition. Pos
https://en.wikipedia.org/wiki/Lightwood%27s%20law
Lightwood's law is the principle that, in medicine, bacterial infections will tend to localise while viral infections will tend to spread. This is based on the observation that while bacterial sepsis tends, despite affecting the whole body, to have a clear site of origin or 'focus', the opposite may be true of viral infections. There may be multiple sites across the body which are affected including dermatological manifestations, respiratory symptoms and gastrointestinal symptoms. This principle is by no means infallible and in clinical practice a variety of diagnostic tests are used to distinguish between bacterial and viral infections. References Medical terminology Microbiology Eponyms Adages
https://en.wikipedia.org/wiki/ZipBooks
ZipBooks is free online accounting software company based in American Fork, Utah. The cloud-based software is an accounting and bookkeeping tool that helps business owners process credit cards, track finances, and send invoices, among other features. History ZipBooks was founded by Tim Chaves in June 2015, backed by venture capital firm Peak Ventures. The company secured an additional $2 million of funding in July 2016, and in 2017 it was awarded a $100,000 economic grant by the Utah Governor's Office of Economic Development Technology Commercialization and Innovation Program. Products ZipBooks' core modules are invoicing, transactions, bills, reporting, time tracking, contacts, and payroll. Accrual accounting was added in 2017. The application is available on G Suite, iOS, Slack, and as a web application. Reception Computerworld compared ZipBooks favorably with other accounting software. PC Magazine praised its user experience, but stated it lacked "a lot of features that competing sites offer". See also Comparison of accounting software Double-entry bookkeeping system Software as a service Time tracking software Web application References Accounting software Cloud applications Cross-platform software Proprietary software Software companies based in Utah Software companies established in 2015 Time-tracking software Web applications Software companies of the United States 2017 establishments in Utah
https://en.wikipedia.org/wiki/Neuman%E2%80%93S%C3%A1ndor%20mean
In mathematics of special functions, the Neuman–Sándor mean M, of two positive and unequal numbers a and b, is defined as: This mean interpolates the inequality of the unweighted arithmetic mean A = (a + b)/2) and of the second Seiffert mean T defined as: so that A < M < T. The M(a,b) mean, introduced by Edward Neuman and József Sándor, has recently been the subject of intensive research and many remarkable inequalities for this mean can be found in the literature. Several authors obtained sharp and optimal bounds for the Neuman–Sándor mean. Neuman and others utilized this mean to study other bivariate means and inequalities. See also Mean Arithmetic mean Geometric mean Stolarsky mean Identric mean Means in Mathematical Analysis References Means Special functions
https://en.wikipedia.org/wiki/Info-metrics
Info-metrics is an interdisciplinary approach to scientific modeling, inference and efficient information processing. It is the science of modeling, reasoning, and drawing inferences under conditions of noisy and limited information. From the point of view of the sciences, this framework is at the intersection of information theory, statistical methods of inference, applied mathematics, computer science, econometrics, complexity theory, decision analysis, modeling, and the philosophy of science. Info-metrics provides a constrained optimization framework to tackle under-determined or ill-posed problems – problems where there is not sufficient information for finding a unique solution. Such problems are very common across all sciences: available information is incomplete, limited, noisy and uncertain. Info-metrics is useful for modelling, information processing, theory building, and inference problems across the scientific spectrum. The info-metrics framework can also be used to test hypotheses about competing theories or causal mechanisms. History Info-metrics evolved from the classical maximum entropy formalism, which is based on the work of Shannon. Early contributions were mostly in the natural and mathematical/statistical sciences. Since the mid 1980s and especially in the mid 1990s the maximum entropy approach was generalized and extended to handle a larger class of problems in the social and behavioral sciences, especially for complex problems and data. The word ‘info-metrics’ was coined in 2009 by Amos Golan, right before the interdisciplinary Info-Metrics Institute was inaugurated. Preliminary definitions Consider a random variable that can result in one of K distinct outcomes. The probability of each outcome is for . Thus, is a K-dimensional probability distribution defined for such that and . Define the informational content of a single outcome to be (e.g., Shannon). Observing an outcome at the tails of the distribution (a rare event
https://en.wikipedia.org/wiki/Internetmuseum
Internetmuseum is a Swedish digital museum opened in 2014. In June 2016 Internetmuseum was inducted to The Association of Swedish Museums (Riksförbundet Sveriges museer) as the first entirely digital museum. Internetmuseum is run by the independent organization The Internet Foundation in Sweden (Internetstiftelsen i Sverige) and features a mix of technology, politics, and internet culture. The ambition of the museum is to spread knowledge of the Swedish history of Internet and to preserve the digital heritage. The museum retains websites of certain historical interest such as all websites from Sweden's first commercial ISP Swipnet. References External links Internetmuseums website Museums established in 2014 Technology museums Virtual museums Museums in Sweden 2014 establishments in Sweden
https://en.wikipedia.org/wiki/Corps%20of%20Military%20Topographers%20of%20the%20Russian%20Imperial%20Army
The Corps of Military Topographers of the Russian Imperial Army was a branch of the Imperial Russian Army with a long history dating back to the early 18th century. History The Corps of Military Topographers was established in 1822 in order to centralize the carrying out of cartographic surveys on the territory of the Russian Empire under the leadership of the Military Topographic Depot. Its predecessor was the Quartermaster Unit that Peter the Great had organized in order to provide topographic support to the Imperial Russian Army in 1702. Following the October 1917 Revolution the corps continued to exist initially under the same name until 1923, when it was renamed as the Military Topographic Service (Военно-Топографическую Службу) of the Red Army. See also Russian Hydrographic Service Literature Dolgov E.I., Sergeev S.V. Military Topographers of the Russian Army. - M .: ZAO "CDiPress", 2001 ISBN 5844300068 References Geodesy Topography Cartography organizations
https://en.wikipedia.org/wiki/Keycloak
Keycloak is an open source software product to allow single sign-on with identity and access management aimed at modern applications and services. this WildFly community project is under the stewardship of Red Hat who use it as the upstream project for their RH-SSO product. History The first production release of Keycloak was in September 2014, with development having started about a year earlier. In 2016 Red Hat switched the RH SSO product from being based on the PicketLink framework to being based on the Keycloak upstream Project. This followed a merging of the PicketLink codebase into Keycloak. To some extent Keycloak can now also be considered a replacement of the Red Hat JBoss SSO open source product which was previously superseded by PicketLink. JBoss.org is redirecting the old jbosssso subsite to the Keycloak website. The JBoss name is a registered trademark and Red Hat moved its upstream open source projects names to avoid using JBoss, JBoss AS to Wildfly being a more commonly recognized example. Features The features of Keycloak include: User registration Social login Single sign-on/sign-off across all applications belonging to the same realm Two-factor authentication LDAP integration Kerberos broker Multitenancy with per-realm customizable skin Custom extensions to extend the core functionality Components There are two main components of Keycloak: Keycloak server, including the API and graphical interface. Keycloak application adapter: a set of libraries to call the server. See also Single sign-on (SSO) OpenAM Kerberos (protocol) Identity management List of single sign-on implementations Red Hat Single Sign-On References External links Official website Free Keycloak tutorials Computer security software Java enterprise platform Federated identity Java (programming language) software
https://en.wikipedia.org/wiki/ONTAP
ONTAP or Data ONTAP or Clustered Data ONTAP (cDOT) or Data ONTAP 7-Mode is NetApp's proprietary operating system used in storage disk arrays such as NetApp FAS and AFF, ONTAP Select, and Cloud Volumes ONTAP. With the release of version 9.0, NetApp decided to simplify the Data ONTAP name and removed the word "Data" from it, and remove the 7-Mode image, therefore, ONTAP 9 is the successor of Clustered Data ONTAP 8. ONTAP includes code from BSD Net/2 and 4.4BSD-Lite, Spinnaker Networks technology, and other operating systems. ONTAP originally only supported NFS, but later added support for SMB, iSCSI, and Fibre Channel Protocol (including Fibre Channel over Ethernet and FC-NVMe). On June 16, 2006, NetApp released two variants of Data ONTAP, namely Data ONTAP 7G and, with nearly a complete rewrite, Data ONTAP GX. Data ONTAP GX was based on grid technology acquired from Spinnaker Networks. In 2010 these software product lines merged into one OS - Data ONTAP 8, which folded Data ONTAP 7G onto the Data ONTAP GX cluster platform. Data ONTAP 8 includes two distinct operating modes held on a single firmware image. The modes are called ONTAP 7-Mode and ONTAP Cluster-Mode. The last supported version of ONTAP 7-Mode issued by NetApp was version 8.2.5. All subsequent versions of ONTAP (version 8.3 and onwards) have only one operating mode - ONTAP Cluster-Mode. NetApp storage arrays use highly customized hardware and the proprietary ONTAP operating system, both originally designed by NetApp founders David Hitz and James Lau specifically for storage-serving purposes. ONTAP is NetApp's internal operating system, specially optimized for storage functions at both high and low levels. The original version of ONTAP had a proprietary non-UNIX kernel and a TCP/IP stack, networking commands, and low-level startup code from BSD. The version descended from Data ONTAP GX boots from FreeBSD as a stand-alone kernel-space module and uses some functions of FreeBSD (for example, it uses a comm
https://en.wikipedia.org/wiki/Colony%20hybridization
Colony hybridization is a method of selecting bacterial colonies with desired genes through a straightforward cloning and transfer process. The genes of interest have been added to a bacterial plasmid previously through recombination, allowing genes from other organisms to be analyzed within a bacterial colony. The overall process involves a transfer of genetic material from one medium to another, typically using nitrocellulose filter paper, with the intended goal of identifying and isolating a specific gene. Radiographed RNA is used to find the desired sequence within the new bacterial colony and essentially "light it up" so that the sequence can be identified for transfer. The most common purpose of colony hybridization is to verify that a certain DNA sequence was able to successfully enter into a new cell, meaning that the cells being analyzed through this method are the result of recombination between a specific piece of DNA and a bacterial plasmid. This method was discovered by Michael Grunstein and David S. Hogness. Methods Colony hybridization begins with a desire to extract a segment of DNA containing a specific gene, such as a gene that conveys antibiotic resistance. A specific piece of DNA is removed from its respective cell culture and inserted into a bacterial plasmid via a process known as recombination. These bacterial plasmids are cultured on a nutrient agar plate, leading to the formation of bacterial colonies, some of which ideally continue to contain the gene of interest. A nitrocellulose filter is then washed three times with distilled water, placed in between absorbent sheets, and heated at high temperatures to kill bacteria or other microorganism. This filter, which has a pore size of .45 μm, undergoes these processes to ensure that there is no contamination during the transfer, thus allowing for accuracy in results. The bacterial colonies are then symmetrically replicated onto the nitrocellulose filter by direct contact. At this point, the cel
https://en.wikipedia.org/wiki/Rainway
Rainway was a remote desktop video game streaming service for Microsoft Windows. It allowed users to stream locally installed applications to other devices over a WLAN or internet connection. The initial beta version launched on January 20, 2018. Version 1.0 of the software launched on January 31, 2019. In April 2021, the company announced a partnership with Microsoft to implement their streaming technology into Xbox Cloud Gaming. On October 26, 2022, founder Andrew Sampson announced the service was shutting down. Compatibility Rainway is compatible with games purchased from Steam, Origin, Battle.net, itch.io, GOG.com and Uplay. The service can run in web browsers and is also compatible with iOS and Android mobile phones. The iOS version of the app was limited to only local network streaming, as a result of Apple's attitude towards game streaming apps. Rainway released a client version for Xbox One consoles in January 2020, though it was removed from the store just a month later. History Rainway was announced in March 2017. The announcement was made on the official website for Ulterius, another streaming service worked on by founder Andrew Sampson which used similar technologies, but focused on desktop remote access rather than game streaming. Rainway did not gain significant attention until April, when it announced its plan to support the then-newly released Nintendo Switch console. During E3 2017, Rainway announced that the Rainway beta would launch on November 25. The release of the beta was later delayed again, to January 20, 2018. In August 2018, Rainway closed its seed round, having raised $1.5 million in seed funding from GoAhead Ventures. The software left beta on January 31, 2019, with the release of version 1.0. Later in 2019, David Perry (former CEO of Gaikai) and Jon Kimmich joined the company's advisory board, as it closed another $3.5 million round of funding. Investors included Bullpen Capital, Madrona Venture Group, GoAhead Ventures, and Bill M
https://en.wikipedia.org/wiki/Pujiang%20line
The Pujiang line of Shanghai Metro () is an automated, driverless, rubber-tired Shanghai Metro line in the town of Pujiang in the Shanghainese district of Minhang. It was originally conceived as phase 3 of Shanghai Metro line 8, but afterwards was constructed as a separate line, connecting with line 8 at its southern terminus, Shendu Highway. The line opened for passenger trial operations on March 31, 2018. It is the first automated, driverless people mover line in the Shanghai Metro, and has 6 stations with a total length of . The people mover was expected to carry 73,000 passengers a day. The line is colored grey on system maps. The line is operated by Shanghai Keolis Public Transport Operation & Management Co. Ltd. (), a joint venture owned by Keolis and Shanghai Shentong Metro Group for at least five years after opening. History Stations Service routes Important stations - Passengers can interchange to line 8. Future expansion There are no plans to extend the line. Station name change On June 9, 2013, the Aerospace Museum was renamed (before Pujiang line began serving the station). Headways <onlyinclude> Technology Signalling The entire operation of the new line is remotely controlled from a central dispatch room. Trains operate using the Cityflo 650 communications-based train control (CBTC) from CRRC Puzhen Bombardier Transportation Systems Limited, a joint venture between Bombardier and CRRC Nanjing Puzhen Co., Ltd. The automatic trains had initially six staff members working at each APM station, but the operator hopes to reduce that to one or two. Rolling stock The Pujiang line uses rubber-tyred Bombardier Innovia APM 300 trains. The trains have 4 cars each, totaling in length, with capacity for 566 passengers per train. There are large windows at each end of the train allowing passengers to look out the front and rear. The small trains with rubber tires running on concrete tracks allow for turning radii as tight as to be negotiated, c
https://en.wikipedia.org/wiki/Judy%20Green%20%28mathematician%29
Judith (Judy) Green (born 1943) is an American logician and historian of mathematics who studies women in mathematics. She is a founding member of the Association for Women in Mathematics; she has also served as its vice president, and as the vice president of the American Association of University Professors. Education and career Green earned her bachelor's degree at Cornell University. She completed a master's degree at Yale University, and a Ph.D. at the University of Maryland, College Park. Her dissertation, supervised by Carol Karp and finished in 1972, was Consistency Properties for Uncountable Finite-Quantifier Languages. Green was elected an AMS Member at Large in 1975 and served for three years until 1977. She belonged to the faculty of Rutgers University before moving to Marymount University in 1989. After retiring from Marymount in 2007, she became a volunteer at the National Museum of American History. Book With Jeanne LaDuke, she wrote Pioneering Women in American Mathematics: The Pre-1940 PhD’s (American Mathematical Society and London Mathematical Society, 2009). This was a biographical study of the first women in the U.S. to earn doctorates in mathematics. Recognition She is part of the 2019 class of fellows of the Association for Women in Mathematics. References 1943 births Place of birth missing (living people) Living people 20th-century American mathematicians American women mathematicians Mathematical logicians Women logicians American historians of mathematics Cornell University alumni Yale University alumni University of Maryland, College Park alumni Rutgers University faculty Marymount University faculty Fellows of the Association for Women in Mathematics 20th-century women mathematicians 20th-century American women 21st-century American women
https://en.wikipedia.org/wiki/Trans%2Ccis-2%2C6-Nonadienal
trans,cis-2,6-Nonadienal is an organic compound that is classified as a doubly unsaturated derivative of nonanal. The molecule consists of a α,β-unsaturated aldehyde with an isolated alkene group. The compound has attracted attention as the essence of cucumbers, but it is also found in bread crust and freshly cut watermelon. Biosynthesis Isotopic labeling has indicated that nonadienal is formed from α-linolenic acid. Such reactions are typically catalyzed by hydroperoxide lyases. See also 2-Nonenal - another potent odorant in cucumber References Fatty aldehydes Flavors
https://en.wikipedia.org/wiki/Wi-Fi%20over%20Coax
Wi-Fi over Coax is a technology for extending and distributing Wi-Fi signals via coaxial cables. As an in-building wireless solution, Wi-Fi over Coax can make use of existing or new cabling with native impedance of 50 Ω shared by a Wi-Fi access point, cabling run, and antenna. Coaxial cables with characteristic impedance of 75 Ω, such as RG-6 cables used for in-building television distribution, can also be used by incorporating impedance converters. As part of a distributed antenna system, Wi-Fi over Coax can connect multiple floors of a home or office via power dividers and zoned antennas either passively or via amplifiers, potentially eliminating the need for multiple access points. Range By avoiding signal attenuation caused by obstructions and free-space path loss, Wi-Fi over Coax can increase Wi-Fi coverage beyond the minimum receiver sensitivity attainable by Wi-Fi over the air alone. While the Wi-Fi signal from a radio chain with 23 dBm transmit power may be attenuated by 10...15 dB when passing through a concrete wall, the corresponding attenuation for Wi-Fi over Coax may be limited to the specific cable assembly loss for the width of the wall. As expressed by the minimum acceptable received signal strength indication (RSSI) for the client device, maximum range via Wi-Fi over coax varies based on transmit power of the access point radio chain, the wireless LAN (WLAN) frequency or frequencies being transmitted, the type and length of the cabling run, assembly loss caused by the specific connectors used, and antenna gain. When using 23 dBm of transmit power from an access point radio chain, a Wi-Fi signal at channel 1 (2412 MHz) may be transmitted over of RG-6 cabling with a maximum RSSI of −9.9 dBm, or over of LMR-900-DB cabling with a maximum RSSI of −13.5 dBm. Applications As with distributed antenna systems deployed by mobile network operators, Wi-Fi over Coax allows client devices at various antenna locations to connect to a single network, with fro
https://en.wikipedia.org/wiki/Sweat%20allergy
A sweat allergy is the exacerbation of atopic dermatitis associated with an elevated body temperature and resulting increases in the production of sweat. It appears as small reddish welts that become visible in response to increased temperature and resulting production of sweat. It can affect all ages. Sweating can trigger intense itching or cholinergic urticaria. The protein MGL_1304 secreted by mycobiota (fungi) present on the skin such as Malassezia globosa acts as a histamine or antigen. People can be desensitized using their own samples of sweat that have been purified that contains small amounts of the allergen. The allergy is not due to the sweat itself but instead to an allergy-producing protein secreted by bacteria found on the skin. Cholinergic urticaria (CU) is one of the physical urticaria (hives) which is provoked during sweating events such as exercise, bathing, staying in a heated environment, or emotional stress. The hives produced are typically smaller than classic hives and are generally shorter-lasting. Multiple subtypes have been elucidated, each of which require distinct treatment. Tannic acid has been found to suppress the allergic response, along with showering. See also Miliaria Exercise-induced anaphylaxis Idiopathic pure sudomotor failure Hypohidrosis Fabry disease Allergy Food allergy List of allergens Tree nut allergy Cholinergic urticaria References Allergology Dermatitis Immunology
https://en.wikipedia.org/wiki/RNase%20H-dependent%20PCR
RNase H-dependent PCR (rhPCR) is a modification of the standard PCR technique. In rhPCR, the primers are designed with a removable amplification block on the 3’ end. Amplification of the blocked primer is dependent on the cleavage activity of a hyperthermophilic archaeal Type II RNase H enzyme during hybridization to the complementary target sequence. This RNase H enzyme possesses several useful characteristics that enhance the PCR. First, it has very little enzymatic activity at low temperature, enabling a “hot start PCR” without modifications to the DNA polymerase. Second, the cleavage efficiency of the enzyme is reduced in the presence of mismatches near the RNA residue. This allows for reduced primer dimer formation, detection of alternative splicing variants, ability to perform multiplex PCR with higher numbers of PCR primers, and the ability to detect single-nucleotide polymorphisms. Principle rhPCR primers consist of three sections. 1) The 5’ DNA section, equivalent in length and melting temperature (Tm) requirements to a standard PCR primer, is extended after cleavage by the RNase HII enzyme. 2) A single RNA base provides the cleavage site for the RNase HII. 3) A short 3’ extension of four or five bases followed by a blocker (usually a short, non-extendable molecule like a propanediol) prevents extension by a DNA polymerase until removal. A rhPCR reaction begins with the primers and template free in solution (Figure 1). While free in solution, these primers are not deblocked by the RNase HII enzyme, as they must be in an RNA:DNA heteroduplex with the template to be cleaved. Once bound to the template, the rhPCR primers are cleaved by the thermostable RNase HII enzyme. This removes the block, allowing for the DNA polymerase to extend off of the primers. The cycling of the PCR reaction continues the process. rhPCR primers are designed so that after cleavage by the RNase H2 enzyme, the Tm of the primers are still greater than the annealing te
https://en.wikipedia.org/wiki/IEEE%20Transactions%20on%20Molecular%2C%20Biological%20and%20Multi-Scale%20Communications
The IEEE Transactions on Molecular, Biological and Multi-Scale Communications is a quarterly peer-reviewed scientific journal published by the Institute of Electrical and Electronics Engineers IEEE Communications Society covering research on molecular and biological signal processing. It was established in 2015. The first editor-in-chief was Dr. Urbashi Mitra from University of Southern California from 2015 to 2018. Currently, Dr. Chan-Byoung Chae from Yonsei University, Korea is the editor-in-chief of the journal. References External links Engineering journals IEEE academic journals Quarterly journals Academic journals established in 2015 English-language journals
https://en.wikipedia.org/wiki/Affinity%20capture
Affinity capture is a technique in molecular biology used to isolate desired compounds based on their chemical properties and a solid substrate. Commonly, plates out of solid materials such as glass are coated with various reagents to allow for covalent bonding of a capturing molecule such as an antibody. Afterwards, a solvent containing a desired compound for isolation is poured onto the plate, and the compound binds to the receptors on the plate (hence the capturing of the compound). Washing the plate and removing the desired compound completes the purification process. Applications Affinity capture has been used to isolate proteins by means of binding a peptide sequence to the solid substrate, thus allowing for protein capture. The process has also been examined for potential automation, but the unique circumstances for any given experiment may impede reproducibility. References Molecular biology techniques
https://en.wikipedia.org/wiki/OPNsense
OPNsense is an open source, FreeBSD-based firewall and routing software developed by Deciso, a company in the Netherlands that makes hardware and sells support packages for OPNsense. It is a fork of pfSense, which in turn was forked from m0n0wall built on FreeBSD. It was launched in January 2015. When m0n0wall closed down in February 2015 its creator, Manuel Kasper, referred its developer community to OPNsense. OPNsense has a web-based interface and can be used on the x86-64 platform. Along with acting as a firewall, it has traffic shaping, load balancing, and virtual private network capabilities, and others can be added via plugins. OPNsense offers next-generation firewall capabilities utilizing Zenarmor, a NGFW plugin developed by OPNsense partner Sunny Valley Networks. History In November 2017, a World Intellectual Property Organization panel found that Netgate, the copyright holder of pfSense, used the domain opnsense.com in bad faith to discredit OPNsense, and obligated Netgate to transfer domain ownership to Deciso. See also Comparison of firewalls List of router and firewall distributions References Further reading Jack Wallen (18 April, 2019) "How to install the OPNsense Firewall/Router distribution". TechRepublic. External links 2015 software BSD software Firewall software Free routing software Free software FreeBSD Gateway/routing/firewall distribution Open-source movement Operating system distributions bootable from read-only media Products introduced in 2015 Routers (computing) Wireless access points
https://en.wikipedia.org/wiki/Nvidia%20NVDEC
Nvidia NVDEC (formerly known as NVCUVID) is a feature in its graphics cards that performs video decoding, offloading this compute-intensive task from the CPU. It is accompanied by NVENC for video encoding in Nvidia's Video Codec SDK. Technology NVDEC can offload video decoding to full fixed-function decoding hardware (Nvidia PureVideo), or (partially) decode via CUDA software running on the GPU, if fixed-function hardware is not available. Depending on the GPU architecture, the following codecs are supported: MPEG-2 VC-1 H.264 (AVC) H.265 (HEVC) VP8 VP9 AV1 Versions NVCUVID was originally distributed as part of the Nvidia CUDA Toolkit. Later, it was renamed to NVDEC and moved to the Nvidia Video Codec SDK. Operating system support NVDEC is available for Windows and Linux operating systems. As NVDEC is a proprietary API (as opposed to the open-source VDPAU API), it is only supported by the proprietary Nvidia driver on Linux. Application and library support Gstreamer has supported NVDEC since 2017. FFmpeg has supported NVDEC since 2017. mpv has supported NVDEC since 2017 by the use of FFmpeg. GPU support HW accelerated decode and encode are supported on Nvidia GeForce, Quadro, Tesla, and GRID products with Fermi or newer generation GPUs. See also AMD Video Core Next, AMD's equivalent SIP core since 2018 AMD Unified Video Decoder, AMD's equivalent SIP core up to 2017 Intel Quick Sync Video, Intel's equivalent SIP core List of Nvidia graphics processing units Qualcomm Hexagon Nvidia NVENC References External links NVIDIA VIDEO CODEC SDK Nvidia IP cores Video acceleration Video compression and decompression ASIC Hardware_acceleration
https://en.wikipedia.org/wiki/Primate%20Conservation%20%28journal%29
Primate Conservation is a journal published by the IUCN Species Survival Commission's Primate Specialist Group about the world's primates. First published as a mimeographed newsletter in 1981, the journal today publishes conservation research and papers on primate species, particularly status surveys and studies on distribution and ecology. Besides these regular papers, the journal has also been a significant place for primatologists to publish descriptions of new primate species in Primate Conservation. New primate species descriptions From South America, this includes the Caquetá titi (Callicebus caquetensis) described in 2010 and the Madidi titi (Plecturocebus aureipalatii, Syn.: Callicebus aureipalatii). From the island of Madagascar, new lemur species scientifically described in the pages of the journal include the Montagne d'Ambre dwarf lemur or Andy Sabin's dwarf lemur (Cheirogaleus andysabini), the Ankarana dwarf lemur (Cheirogaleus shethi), and two new species of mouse lemurs (Microcebus). References Conservation biology Environmental science journals IUCN commissions Primatology journals
https://en.wikipedia.org/wiki/Andy%20and%20Bill%27s%20law
Andy and Bill's law is a statement that new software will always consume any increase in computing power that new hardware can provide. The law originates from a humorous one-liner told in the 1990s during computing conferences: "what Andy giveth, Bill taketh away." The phrase is a riff upon the business strategies of former Intel CEO Andy Grove and former Microsoft CEO Bill Gates. Intel and Microsoft had entered into a lucrative partnership in the 1980s through to the 1990s, and the standard chipsets in Microsoft Windows were Intel brand. Despite the profit Intel gained from the deal, Grove felt that Gates was not making full use of the powerful capabilities of Intel chips, and that he was in fact refusing to upgrade his software to achieve optimum hardware performance. Grove's frustration with the dominance of Microsoft software over Intel hardware became public, which spawned the humorous catchphrase; and, later, the law. See also Jevons paradox Moore's law Wirth%27s law References Computer architecture statements
https://en.wikipedia.org/wiki/Alan%20Woodward%20%28computer%20scientist%29
Alan Woodward is a British computer scientist at the University of Surrey. He is a specialist in computer security and a core member of the Surrey Centre for Cyber Security. He studied physics as an undergraduate student and conducted research in signal processing as a postgraduate student. Both of these were at the University of Southampton. He has worked in government service, business as well as academia. In addition to his academic qualifications, his practical accomplishments have resulted in him being elected Fellow of the Institute of Physics, a Chartered Physicist, Chartered IT Practitioner, Chartered Engineer, Fellow of the British Computer Society, a EUR ING, and Fellow of the Royal Statistical Society. References External links https://www.linkedin.com/in/woodwardalan/ https://www.profwoodward.org/ British computer scientists Internet security Alumni of the University of Southampton Academics of the University of Surrey Fellows of the Royal Statistical Society Fellows of the British Computer Society Living people 1962 births InfoSec Twitter
https://en.wikipedia.org/wiki/Human%20information%20interaction
Human-information interaction or HII is the formal term for information behavior research in archival science; the term was invented by Nahum Gershon in 1995. HII is not transferable from analog to digital research because nonprofessional researchers greatly emphasize the need for further elaboration of context and scope finding aid elements. Researchers in HII take on many tasks, including helping to design information systems from a biological perspective that conform to the requirements of different segments of society, along with other behaviour intended to improve interaction between humans and information systems. HII is generally considered to be multi-disciplinary as different disciplines have different viewpoints on these interactions and their consequences. HII is considered especially important due to humanity's dependence on information and the technology needed to access it. References Information theory Information science Interdisciplinary subfields
https://en.wikipedia.org/wiki/Euplotidium
Euplotidium is a genus of ciliates. Species form symbiotic relations with bacteria in structures named Epixenosomes. References Hypotrichea Ciliate genera Symbiosis
https://en.wikipedia.org/wiki/Cray%20XC50
The Cray XC50 is a massively parallel multiprocessor supercomputer manufactured by Cray. The machine can support Intel Xeon processors, as well as Cavium ThunderX2 processors, Xeon Phi processors and NVIDIA Tesla P100 GPUs. The processors are connected by Cray's proprietary "Aries" interconnect, in a dragonfly network topology. The XC50 is an evolution of the XC40, with the main difference being the support of Tesla P100 processors and the use of Cray software release CLE 6 or 7. Deployed Cray XC50 systems India Indian Institute of Technology, Bombay (IITB) has deployed a Cray XC50 system named Spacetime with a peak performance of 1 petaflops coupled with Cray ClusterStor L300 Lustre storage system. Japan The Japanese National Institutes for Quantum and Radiological Science and Technology has deployed on 2018 26th July a XC50 to support the ITER fusion project. At deployment, it will not be as fast as the Swiss Piz Daint computer; however, it is predicted as one of the top 30 supercomputers in the world, and the fastest available to fusion researchers. The Japan Meteorological Agency is planning to deploy 2 Cray XC50s to help with weather forecasting. The systems will be deployed with the assistance of Cray and Hitachi. The Center for Computational Astrophysics at the National Astronomical Observatory of Japan have deployed a XC50 named ATERUI II, named after a Japanese chief. It has 40,200 Xeon cores, with a peak performance of 3.087 petaflops. The Railway Technical Research Institute (RTRI) will install five XC50 cabinets and a 720 TB Cray ClusterStor L300 for storage to gain insights on rail transportation. This is their third Cray machine after acquiring an XC30 and CS300, both in 2013. Yokohama City University has selected the air-cooled XC50-AC for life sciences research. New Zealand New Zealand Science Infrastructure (NeSI) is deploying a XC50 at their High Performance Computing Facility in Wellington. South Korea The Institute for Basic Scie
https://en.wikipedia.org/wiki/Local%20Computer%20Networks%20Conference
The Local Computer Networks Conference (LCN) is an annual international academic conference organized by the IEEE Computer Society. The first LCN was held in 1976, with the full name of "Conference on Experiments in New Approaches to Local Computer Networking". The second meeting in 1977 was called the "Conference on 'A Second Look at Local Computer Networking'" before it changed its name to "Third Conference on Local Computer Networks" in 1978. After that the conference was simply called LCN. The IEEE Technical Committee on Computer Communications has sponsored the LCN since 1979. LCN has grown to be a premier conference on theoretical and practical aspects of computer networking and is ranked as an A conference according to the CORE Rankings Portal in 2017. History of the Conference Historical Events The conference celebrated its 40th anniversary 2015 in Clearwater Beach, Florida where Robert Metcalfe (founder of 3COM and co-inventor of the Ethernet network technology) gave the keynote speech and held a panel session with Harvey Freeman (President of the IEEE Communications Society 2017), Howard Salwen ("father of the token ring" and founder of Proteon), and Peter Martini (Director of Institute Fraunhofer FKIE). References Telecommunication conferences IEEE conferences Computer networking conferences
https://en.wikipedia.org/wiki/Glossary%20of%20representation%20theory
This is a glossary of representation theory in mathematics. The term "module" is often used synonymously for a representation; for the module-theoretic terminology, see also glossary of module theory. See also Glossary of Lie groups and Lie algebras, list of representation theory topics and :Category:Representation theory. Notations: We write . Thus, for example, a one-representation (i.e., a character) of a group G is of the form . A B C D E F G H I J K L M O P Q R S T U V W Y Z Notes References Theodor Bröcker and Tammo tom Dieck, Representations of compact Lie groups, Graduate Texts in Mathematics 98, Springer-Verlag, Berlin, 1995. Claudio Procesi (2007) Lie Groups: an approach through invariants and representation, Springer, . N. Wallach, Real Reductive Groups, 2 vols., Academic Press 1988, Further reading M. Duflo et M. Vergne, La formule de Plancherel des groupes de Lie semi-simples réels, in “Representations of Lie Groups;” Kyoto, Hiroshima (1986), Advanced Studies in Pure Mathematics 14, 1988. External links https://math.stanford.edu/~bump/ Representation theory Wikipedia glossaries using description lists
https://en.wikipedia.org/wiki/Physical%20oncology
Physical oncology (PO) is defined as the study of the role of mechanical signals in a cancerous tumor. The mechanical signals can be forces, pressures ("pull", "push" and "shear" designating the forces / pressures that push, pull or are tangential). If we generalize we will speak of "stress field" and "stress tensor". A cancerous tumor (or "solid tumor" in the jargon of oncologists to differentiate them from hematological malignancies) is an organ consisting of two tissues: in the center the cancerous tumor proper and around the ExtraCellular Matrix (ECM), sometimes called stroma, chorion or connective tissue. The concept of connective tissue is interesting because it defines a tissue that travels the entire organism (except the brain) and is a preferred transmitter of mechanical signals. But for the cancer organ - isolated from this connective system - we prefer the term ECM. The cancerous tissue is derived from a normal tissue of the body: breast cancer arises from a cancerous transformation of the normal mammary glandular tissue. It looks more or less like the original tissue: it is said that it is more or less differentiated; poorly differentiated it has a microscopic appearance that is far from normal tissue and is then "poorly prognostic", will make more metastases and will be more difficult to treat. We are only considering cancers derived from "epithelia", that is to say the tissue that covers the organs in their interfaces with air, liquids ... or the outside world. Epithelial cells are contiguous and polarized. More than 90% of cancers (breast, prostate, colon / rectum, bronchi, pancreas, etc.) arise from these epithelia after a long process of cancerization. Both tissues of the cancer organ The ECM ECM is a mixture of cells (immune, fibroblasts, etc.) dispersed in proteins, most of them collagen. It surrounds the tumor. It is analogous to connective tissue and basal membrane, which is a local condensation, located below normal epithelia. This conne
https://en.wikipedia.org/wiki/State%20microbe
A state microbe is a microorganism used as an official state symbol. Several U.S. states have honored microorganisms by nominating them to become official state symbols. The first state to declare an Official State Microbe is Oregon which chose Saccharomyces cerevisiae (brewer's or baker's yeast) as the Official Microbe of the State of Oregon in 2013 for its significance to the craft beer industry in Oregon. One of the first proponents of State Microbes was microbiologist Moselio Schaechter, who, in 2010, commented on Official Microbes for the American Society for Microbiology's blog "Small Things Considered" as well as on National Public Radio's "All Things Considered". Wisconsin 2009: Lactococcus lactis, proposed, not passed In November 2009, Assembly Bill 556 that proposed designating Lactococcus lactis as Wisconsin state microbe was introduced by Representatives Hebl, Vruwink, Williams, Pasch, Danou, and Fields; it was cosponsored by Senator Taylor. Although the bill passed the Assembly 56 to 41, It was not acted on by the Senate. The proposed AB 556 simply stated that Lactococcus lactis is the State Microbe and should be included in the Wisconsin Blue Book, an almanac containing information on the state of Wisconsin, published by Wisconsin's Legislative Reference Bureau.Lactococcus lactis was proposed as the State Microbe because of its crucial contribution to the cheese industry in Wisconsin. Wisconsin is the largest cheese producer in the United States, producing 3.1 billion pounds of cheese, 26% of all cheese in the US, in more than 600 varieties (2017 data). Lactococcus lactis is vital for manufacturing cheeses such as Cheddar, Colby, cottage cheese, cream cheese, Camembert, Roquefort, and Brie, as well as other dairy products like cultured butter, buttermilk, sour cream, and kefir. It may also be used for vegetable fermentations such as cucumber pickles and sauerkraut. Hawaii 2013-14: Flavobacterium akiainvivens and/or Aliivibrio fischeri In January 2
https://en.wikipedia.org/wiki/Controlled%20Access%20Protection%20Profile
The Controlled Access Protection Profile, also known as CAPP, is a Common Criteria security profile that specifies a set of functional and assurance requirements for information technology products. Software and systems that conform to CAPP standards provide access controls that are capable of enforcing access limitations on individual users and data objects. CAPP-conformant products also provide an audit capability which records the security-relevant events which occur within the system. CAPP is intended for the protection of software and systems where users are assumed to be non-hostile and well-managed, requiring protection primarily against threats of inadvertent or casual attempts to breach the security protections. It is not intended to be applicable to circumstances in which protection is required against determined attempts by hostile and well-funded attackers. It does not fully address the threats posed by malicious system development or administrative personnel, who generally have a higher level of access. The CAPP was derived from the requirements of the C2 class of the U.S. Department of Defense Trusted Computer System Evaluation Criteria and the material upon which those requirements are based. Computer security models
https://en.wikipedia.org/wiki/Bitmain
Bitmain Technologies Ltd., is a privately owned company headquartered in Beijing, China, that designs application-specific integrated circuit (ASIC) chips for bitcoin mining. History It was founded by Micree Zhan and Jihan Wu in 2013. Prior to founding Bitmain, Zhan was running DivaIP, a startup that allowed users to stream television to a computer screen via a set-top box, and Wu was a financial analyst and private equity fund manager. By 2018 it had become the world's largest designer of application-specific integrated circuit (ASIC) chips for bitcoin mining. The company also operates BTC.com and Antpool, historically two of the largest mining pools for bitcoin. In an effort to boost Bitcoin Cash (BCH) prices, Antpool "burned" 12% of the BCH they mined by sending them to irrecoverable addresses. Bitmain was reportedly profitable in early 2018, with a net profit of $742.7 million in the first half of 2018, and negative operating cash flow. TechCrunch reported that unsold inventory ballooned to one billion dollars in the second quarter of 2018. Bitmain's first product was the Antminer S1 which is an ASIC Bitcoin miner making 180 gigahashes per second (GH/s) while using 80200 watts of power. Bitmain as of 2018 had 11 mining farms operating in China. Bitmain was involved in the 2018 Bitcoin Cash split, siding with Bitcoin Cash ABC alongside Roger Ver. In December 2018 the company laid off about half of its 3000 staff. The company has since closed its offices in Israel and the Netherlands, while significantly downsizing its Texas mining operation. In February 2019, Bitmain had lost "about $500 million" in the third quarter of 2018. Bitmain issued a statement saying "the rumors are not true and we will make announcements in due course." In June 2021, suspended spot delivery of sales of machines globally aiming to support local prices following Beijing's crackdown. Bitmain's attempts at initial public offering In June 2018, Wu told Bloomberg that Bitmain was conside
https://en.wikipedia.org/wiki/Uptane
Uptane is a Linux Foundation / Joint Development Foundation hosted software framework designed to ensure that valid, current software updates are installed in adversarial environments. It establishes a process of checks and balances on these electronic control units (ECUs) that can ensure the authenticity of incoming software updates. Uptane is designed for "compromise-resilience," or to limit the impact of a compromised repository, an insider attack, a leaked signing key, or similar attacks. It can be incorporated into most existing software update technologies, but offers particular support for over-the-air programming or OTA programming strategies originating from The Update Framework. History Uptane was developed by a team of engineers at New York University Tandon School of Engineering in Brooklyn, NY, the University of Michigan Transportation Research Institute in Ann Arbor, MI, and the Southwest Research Institute in San Antonio, TX. It was developed as open source software under a grant from the U.S. Department of Homeland Security. In 2018, the Uptane Alliance, a non-profit organization, was formed under the aegis of IEEE-ISTO to oversee the first formal release of a standard. The first standard volume, entitled IEEE-ISTO 6100.1.0.0 Uptane Standard for Design and Implementation, was released on July 31, 2019. Uptane was recognized in 2017 by Popular Science as one of that year’s top security innovations. As of 2020, multiple implementations of Uptane are available, both through open source projects such as the Linux Foundation’s Automotive Grade Linux, and through third party commercial suppliers, such as Advanced Telematic Systems (ATS), now part of Here Technologies, and Airbiquity. There is also a reference implementation meant to aid adopters implementing Uptane. References External links Uptane website Further reading Proceedings of 14th Embedded Security in Cars Conference (16-17 November 2016) Kuppusamy,T.K., Brown, A., Awwad, S., McCoy, D.,
https://en.wikipedia.org/wiki/Mycorrhiza%20helper%20bacteria
Mycorrhiza helper bacteria (MHB) are a group of organisms that form symbiotic associations with both ectomycorrhiza and arbuscular mycorrhiza. MHBs are diverse and belong to a wide variety of bacterial phyla including both Gram-negative and Gram-positive bacteria. Some of the most common MHBs observed in studies belong to the phylas Pseudomonas and Streptomyces. MHBs have been seen to have extremely specific interactions with their fungal hosts at times, but this specificity is lost with plants. MHBs enhance mycorrhizal function, growth, nutrient uptake to the fungus and plant, improve soil conductance, aid against certain pathogens, and help promote defense mechanisms. These bacteria are naturally present in the soil, and form these complex interactions with fungi as plant root development starts to take shape. The mechanisms through which these interactions take shape are not well-understood and needs further study. Taxonomy MHBs consist of a diverse group of bacteria, often gram-negative and gram-positive bacteria. Most of the bacteria are associated with both ectomycorrhiza and arbuscular mycorrhiza, but some show specificity to a particular type of fungus. The common phyla that MHB belong to will be addressed in the following sections, as well as common genera. Pseudomonadota The Pseudomonadota (formerly Proteobacteria) are a large and diverse group of gram-negative bacteria containing five classes. Pseudomonas is in the gammaproteobacteria class. Specific bacteria within this genus are strongly associated as being MHBs in the rhizosphere of both ectomycorrhiza and arbuscular mycorrhiza. Pseudomonas fluorescens has been examined in several studies to understand how they work in benefiting the mycorrhiza and plant. In one study, they found that the bacteria helped ectomycorrhizal fungi promote a symbiotic relationship with the plant by examining an increase in formation of mycorrhiza when Pseudomonas fluorescens was applied to the soil. Some bacteria improve
https://en.wikipedia.org/wiki/Data%20preservation
Data preservation is the act of conserving and maintaining both the safety and integrity of data. Preservation is done through formal activities that are governed by policies, regulations and strategies directed towards protecting and prolonging the existence and authenticity of data and its metadata. Data can be described as the elements or units in which knowledge and information is created, and metadata are the summarizing subsets of the elements of data; or the data about the data. The main goal of data preservation is to protect data from being lost or destroyed and to contribute to the reuse and progression of the data. History Most historical data collected over time has been lost or destroyed. War and natural disasters combined with the lack of materials and necessary practices to preserve and protect data has caused this. Usually, only the most important data sets were saved, such as government records and statistics, legal contracts and economic transactions. Scientific research and doctoral theses data have mostly been destroyed from improper storage and lack of data preservation awareness and execution. Over time, data preservation has evolved and has generated importance and awareness. We now have many different ways to preserve data and many different important organizations involved in doing so. The first digital data preservation storage solutions appeared in the 1950s, which were usually flat or hierarchically structured. While there were still issues with these solutions, it made storing data much cheaper, and more easily accessible. In the 1970s relational databases as well as spreadsheets appeared. Relational data bases structure data into tables using structured query languages which made them more efficient than the preceding storage solutions, and spreadsheets hold high volumes of numeric data which can be applied to these relational databases to produce derivative data. More recently, non-relational (non-structured query language) databa
https://en.wikipedia.org/wiki/Inertial%20audio%20effects%20controller
An inertial audio effects controller is an electronic device that senses changes in acceleration, angular velocity and/or a magnetic field, and relays those changes to an effects controller. Transmitting the sensed data can be done via wired or wireless methods. To be of use the effects controller must be connected to an effect unit so that an effect can be modulated, or connected to a MIDI controller or musical keyboard. The Wah-Wah effect is a classic example of effect modulation. An inertial audio effects controller can be compared with a traditional expression pedal to explain what it does. An inertial effects controller uses an inertial sensor to detect user directed changes, whereas a traditional expression pedal uses an electrically resistive element to detect changes. There are some advantages and disadvantages between the two. The main advantages of inertial control versus a traditional foot pedal, are an increased range of dynamic motion, remote control, finer modulation precision and software enabled features such as motion triggered ADSR envelopes and bi-directional motion control. The main disadvantages are the requirement for a power source and a more complicated setup. Due to their functional similarity with traditional expression pedals, they have been given the informal name, 'Expression box'. Availability Conceivably any or all of the inertial sensors (accelerometer, gyroscope, magnetometer), could be used for effect modulation. However, currently the only commercially available products use acceleration sensing only or acceleration combined with angular velocity, as sensed by a gyroscope. Future Inertial control of an audio device, wired or wireless, is a relatively recent and growing trend as technology advances have reduced pricing and size as well as improved usability and performance of the core components. Specifically the core components are an inertial device called a Mirco- Electro-Mechanical-System (MEMs), a microcontroller, and for
https://en.wikipedia.org/wiki/Ultimate%20Chicken%20Horse
Ultimate Chicken Horse is a multiplayer competitive platform video game developed and published by Canadian studio Clever Endeavour Games. It was released for Microsoft Windows on 4 March 2016, PlayStation 4 and Xbox One in December 2017, and Nintendo Switch on 25 September 2018. Gameplay Ultimate Chicken Horse is a platform video game where players assume the role of one of various animals. The goal of each game is to score points by building a platform level one piece at a time (per player) and race each other to a flag on the other side of the level. Players add obstacles designed to challenge their opponents, while also making sure they themselves can handle their handiwork. If nobody reaches the goal, or if everybody does, nobody gets any points. Points are awarded each round for various achievements, such as reaching the goal first, or setting a successful trap. The winner of the match is the player who reaches a set number of points or has the most points after a set number of rounds. Each round is estimated to last a minute. The PC, Nintendo Switch, Xbox and PlayStation versions of the game support cross-play online. Development The concept for Ultimate Chicken Horse emerged in September 2014 during a game jam. Developer Richard Atlas stated in an interview with Gamasutra that he was in the process of forming Clever Endeavour Games when it came about. The final team included personnel who had previously worked on games such as Gardenarium and Rimworld. Ultimate Chicken Horse was primarily built in the Unity engine. Reception The PlayStation 4 version of Ultimate Chicken Horse received "generally favorable" reviews, according to review aggregator Metacritic. The Escapist said the game "does everything it tries to do very well, but a few quibbles keep it from greatness," and recommended "a better guiding hand for stage building, especially for new players". References External links 2016 video games Multiplayer video games Nintendo Switch games Plat
https://en.wikipedia.org/wiki/Twitching%20motility
Twitching motility is a form of crawling bacterial motility used to move over surfaces. Twitching is mediated by the activity of hair-like filaments called type IV pili which extend from the cell's exterior, bind to surrounding solid substrates, and retract, pulling the cell forwards in a manner similar to the action of a grappling hook. The name twitching motility is derived from the characteristic jerky and irregular motions of individual cells when viewed under the microscope. It has been observed in many bacterial species, but is most well studied in Pseudomonas aeruginosa, Neisseria gonorrhoeae and Myxococcus xanthus. Active movement mediated by the twitching system has been shown to be an important component of the pathogenic mechanisms of several species. Mechanisms Pilus structure The type IV pilus complex consists of both the pilus itself and the machinery required for its construction and motor activity. The pilus filament is largely composed of the PilA protein, with more uncommon minor pilins at the tip. These are thought to play a role in initiation of pilus construction. Under normal conditions, the pilin subunits are arranged as a helix with five subunits in each turn, but pili under tension are able to stretch and rearrange their subunits into a second configuration with around subunits per turn. Three subcomplexes form the apparatus responsible for assembling and retracting the type IV pili. The core of this machinery is the motor subcomplex, consisting of the PilC protein and the cytosolic ATPases PilB and PilT. These ATPases drive pilus extension or retraction respectively, depending on which of the two is currently bound to the pilus complex. Surrounding the motor complex is the alignment subcomplex, formed from the PilM, PilN, PilO and PilP proteins. These proteins form a bridge between the inner and outer membranes and create a link between the inner membrane motor subcomplex and the outer membrane secretion subcomplex. This consists of a
https://en.wikipedia.org/wiki/Algorithmic%20bias
Algorithmic bias describes systematic and repeatable errors in a computer system that create "unfair" outcomes, such as "privileging" one category over another in ways different from the intended function of the algorithm. For mapping this to ideas in statistical learning, it is ```extremely important``` to note that the "bias" here is typically the ```variance``` in the bias-variance trade off in machine learning. So it is actually the opposite of real machine learning bias. It is variance, the model is over-fitting the data or data generation process. In situations where there was no training data and or no consistent learning, then the "algorithmic bias" is simply a measure of deviation according to some score. Bias can emerge from many factors, including but not limited to the design of the algorithm or the unintended or unanticipated use or decisions relating to the way data is coded, collected, selected or used to train the algorithm. For example, algorithmic bias has been observed in search engine results and social media platforms. This bias can have impacts ranging from inadvertent privacy violations to reinforcing social biases of race, gender, sexuality, and ethnicity. The study of algorithmic bias is most concerned with algorithms that reflect "systematic and unfair" discrimination. This bias has only recently been addressed in legal frameworks, such as the European Union's General Data Protection Regulation (2018) and the proposed Artificial Intelligence Act (2021). As algorithms expand their ability to organize society, politics, institutions, and behavior, sociologists have become concerned with the ways in which unanticipated output and manipulation of data can impact the physical world. Because algorithms are often considered to be neutral and unbiased, they can inaccurately project greater authority than human expertise (in part due to the psychological phenomenon of automation bias), and in some cases, reliance on algorithms can displace human
https://en.wikipedia.org/wiki/Superiorization
Superiorization is an iterative method for constrained optimization. It is used for improving the efficacy of an iterative method whose convergence is resilient to certain kinds of perturbations. Such perturbations are designed to "force" the perturbed algorithm to produce more useful results for the intended application than the ones that are produced by the original iterative algorithm. The perturbed algorithm is called the superiorized version of the original unperturbed algorithm. If the original algorithm is computationally efficient and useful in terms of the target application and if the perturbations are inexpensive to calculate, the method may be used to steer iterates without additional computation cost. Areas of application The superiorization methodology is very general and has been used successfully in many important practical applications, such as iterative reconstruction of images from their projections, single-photon emission computed tomography, radiation therapy and nondestructive testing, just to name a few. A special issue of the journal Inverse Problems is devoted to superiorization, both theory and applications. Objective function reduction and relation with constrained optimization An important case of superiorization is when the original algorithm is "feasibility-seeking" (in the sense that it strives to find some point in a feasible region that is compatible with a family of constraints) and the perturbations that are introduced into the original iterative algorithm aim at reducing (not necessarily minimizing) a given merit function. In this case, superiorization has a unique place in optimization theory and practice. Many constrained optimization methods are based on methods for unconstrained optimization that are adapted to deal with constraints. Such is, for example, the class of projected gradient methods wherein the unconstrained minimization inner step "leads" the process and a projection onto the whole constraints set (the feasi
https://en.wikipedia.org/wiki/Basics%20of%20blue%20flower%20colouration
Blue flower colour was always associated with something unusual and desired. Blue roses especially were assumed to be a dream that cannot be realised. Blue colour in flower petals is caused by anthocyanins, which are members of flavonoid class metabolites. We can diversify three main classes of anthocyanin pigments: cyaniding type (two hydroxyl groups in the B-ring) responsible for red coloration, pelargonidin type (one hydroxyl group in the B-ring) responsible for orange colour and delphinidin type (three hydroxyl groups in the B-ring) responsible for violet/blue flower and fruits coloration. The main difference in the structure of listed anthocyanins type is the number of hydroxyl groups in the B-ring of the anthocyanin. Nevertheless, in the monomeric state anthocyanins never show blue colour in the weak acidic and neutral pH. The mechanism of blue colour formation are very complicated in most cases, presence of delphinidin type pigments is not sufficient, great role play also the pH and the formation of complexes of anthocyanins with flavones and metal ions. Mechanisms Self-association is correlated with the anthocyanin concentration. When concentration is higher we can observe change in the absorbance maximum and increase of colour intensity. Molecules of anthocyanins associate together what results in stronger and darker colour. Co-pigmentation stabilizes and gives protection to anthocyanins in the complexes. Co-pigments are colourless or have slightly yellow colour. Co-pigments usually are flavonoids (flavones, flavonols, flavanons, flavanols), other polyphenols, alkaloids, amino acids or organic acids. The most efficient co-pigments are flavonols like rutin or quercetin and phenolic acids like sinapic acid or ferulic acid. Association of co-pigment with anthocyanin causes bathochromic effect, shift in absorption maximum to higher wavelength, in result we can observe change of the colour from red to blue. This phenomenon is also called bluing effect. We can
https://en.wikipedia.org/wiki/Histamine%20intolerance
Histamine intolerance, sometimes called histaminosis, is an over-accumulation of dietary histamine in the human body. Histamine intolerance is sometimes informally called an allergy; however, the intolerance is technically caused by the gradual accumulation of extracellular histamine due to an imbalance. Roughly 1% of the population has histamine intolerance; of those, 80% are middle-aged. General The imbalance in histamine intolerance is between the synthesis and selective release of histamine from certain granulocytes (i.e., mast cells and basophils), versus the breakdown of histamine by the enzymes which metabolize it, such as diamine oxidase (DAO) and histamine N-methyltransferase (HNMT). In contrast, allergic reactions involving an immediate allergic response to an allergen are caused by anaphylactic degranulation, which is the abrupt and explosive release of "pre-formed mediators", including histamine, from mast cells and basophils throughout the body. Symptoms Possible symptoms after ingestion of histamine-rich food include: Skin rash, hives, eczema, itching Headache, flushing, migraine, dizziness Narrowed or runny nose, difficulty breathing, bronchial asthma, sore throat Bloating, diarrhea, constipation, nausea / vomiting, abdominal pain, stomach sticking, heartburn High blood pressure (hypertension), tachycardia, cardiac arrhythmias, low blood pressure (hypotension) Menstrual disorders (dysmenorrhea), cystitis, urethritis and mucosal irritation of female genitalia Water retention (edema), bone marrow edema (BME), joint pain Fatigue, seasickness, tiredness, sleep disorders Confusion, nervousness, depressive moods Metabolism In the human body, histamine is metabolized extracellularly by the enzyme diamine oxidase (DAO), and intracellularly by histamine N-methyltransferase (HNMT) and aldehyde oxidases (AOX1). In histamine intolerance, the activity of DAO is limited, and histamine taken up by the diet and formed in the body is only partially
https://en.wikipedia.org/wiki/Religious%20Orders%20Study
The Religious Orders Study conducted at the Rush Alzheimer's Disease Center at Rush University in Chicago is a research project begun in 1994 exploring the effects of aging on the brain. More than 1,000 nuns, priests, and other religious professionals are participating across the United States. The study is finding that cognitive exercise including social activities and learning new skills has a protective effect on brain health and the onset of dementia, while negative psychological factors like anxiety and clinical depression are correlated with cognitive decline. The Religious Orders Study follows the earlier Nun Study. Initial funding was provided by the National Institute on Aging in 1993. References Neuroscience projects Alzheimer's disease Cohort studies Rush Medical College 1994 establishments in the United States Pathology
https://en.wikipedia.org/wiki/Diffeomorphometry
Diffeomorphometry is the metric study of imagery, shape and form in the discipline of computational anatomy (CA) in medical imaging. The study of images in computational anatomy rely on high-dimensional diffeomorphism groups which generate orbits of the form , in which images can be dense scalar magnetic resonance or computed axial tomography images. For deformable shapes these are the collection of manifolds , points, curves and surfaces. The diffeomorphisms move the images and shapes through the orbit according to which are defined as the group actions of computational anatomy. The orbit of shapes and forms is made into a metric space by inducing a metric on the group of diffeomorphisms. The study of metrics on groups of diffeomorphisms and the study of metrics between manifolds and surfaces has been an area of significant investigation. In Computational anatomy, the diffeomorphometry metric measures how close and far two shapes or images are from each other. Informally, the metric is constructed by defining a flow of diffeomorphisms which connect the group elements from one to another, so for then . The metric between two coordinate systems or diffeomorphisms is then the shortest length or geodesic flow connecting them. The metric on the space associated to the geodesics is given by. The metrics on the orbits are inherited from the metric induced on the diffeomorphism group. The group is thusly made into a smooth Riemannian manifold with Riemannian metric associated to the tangent spaces at all . The Riemannian metric satisfies at every point of the manifold there is an inner product inducing the norm on the tangent space that varies smoothly across . Oftentimes, the familiar Euclidean metric is not directly applicable because the patterns of shapes and images don't form a vector space. In the Riemannian orbit model of Computational anatomy, diffeomorphisms acting on the forms don't act linearly. There are many ways to define metrics, an