source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Intersex%20%28biology%29
Intersex is a general term for an organism that has sex characteristics that are between male and female. It typically applies to a minority of members of gonochoric animal species such as mammals (as opposed to hermaphroditic species in which the majority of members can have both male and female sex characteristics). Such organisms are usually sterile. Intersexuality can occur due to both genetic and environmental factors and has been reported in mammals, fishes, nematodes, and crustaceans. Mammals Intersex can also occur in non-human mammals such as pigs, with it being estimated that 0.1% to 1.4% of pigs are intersex. In Vanuatu, Narave pigs are sacred intersex pigs that are found on Malo Island. An analysis of Navare pig mitochondrial DNA by Lum et al. (2006) found that they are descended from Southeast Asian pigs. At least six different mole species have an intersex adaption where by the female mole has an ovotestis, "a hybrid organ made up of both ovarian and testicular tissue. This effectively makes them intersex, giving them an extra dose of testosterone to make them just as muscular and aggressive as male moles". The ovarian part of the ovotestis is reproductively functional. Intersexuality in humans is relatively rare. Depending on the definition, the prevalence of intersex among humans have been reported to range from 0.018% to up to 1.7% of humans. Nematodes Intersex is known to occur in all main groups of nematodes. Most of them are functionally female. Male intersexes with female characteristics have been reported but are less common. Fishes Gonadal intersex also occurs in fishes, where the individual has both ovarian and testicular tissue. Although it is a rare anomaly among gonochoric fishes, it is a transitional state in fishes that are protandric or protogynous. Intersexuality has been reported in 23 fish families. Crustaceans The oldest evidence for intersexuality in crustaceans comes from fossils dating back 70 million years ago. Inte
https://en.wikipedia.org/wiki/Containerization%20%28computing%29
In software engineering, containerization is operating system-level virtualization or application-level virtualization over multiple network resources so that software applications can run in isolated user spaces called containers in any cloud or non-cloud environment, regardless of type or vendor. Usage The containers are basically a fully functional and portable cloud or non-cloud computing environment surrounding the application and keeping it independent of other environments running in parallel. Individually each container simulates a different software application and runs isolated processes by bundling related configuration files, libraries and dependencies. But, collectively, multiple containers share a common operating system kernel (OS). In recent times, the containerization technology has been widely adopted by cloud computing platforms like Amazon Web Services, Microsoft Azure, Google Cloud Platform, and IBM Cloud. Containerization has also been pursued by the U.S. Department of Defense as a way of more rapidly developing and fielding software updates, with first application in its F-22 air superiority fighter. Types of containers OS containers Application containers Security issues Because of the shared OS, security threats can affect the whole containerized system. In containerized environments, security scanners generally protect the OS but not the application containers, which adds unwanted vulnerability. Container management, orchestration, clustering Container orchestration or container management is mostly used in the context of application containers. Implementations providing such orchestration include Kubernetes and Docker swarm. Container cluster management Container clusters need to be managed. This includes functionality to create a cluster, to upgrade the software or repair it, balance the load between existing instances, scale by starting or stopping instances to adapt to the number of users, to log activities and monitor pr
https://en.wikipedia.org/wiki/Megalodon%20%28website%29
Megalodon (, "web gyotaku") is an on demand web citation service based in Japan. It is owned by Affility. Megalodon's server can be searched for "web gyotaku" or copies of web pages, by prefixing any URL with "gyo.tc"; the process checks the query against other services as well, including Google's cached pages and Mementos. On 12 November 2010, Affility revealed that all files copied before the first half of 2007 were lost because of a malfunction in their backup process. Megalodon does not archive sites which include a "noindex" or "noarchive" tag in the robots.txt file. See also List of Web archiving initiatives Wayback Machine archive.today References External links Affility's website Internet properties established in 2005 Japanese websites Online archives 2005 establishments in Japan
https://en.wikipedia.org/wiki/Vision%20transformer
A Vision Transformer (ViT) is a transformer designed for computer vision. Transformers were introduced in 2017, and have found widespread use in Natural Language Processing. In 2020, they were adapted for computer vision, yielding ViT. The basic structure is to break down input images as a series of patches, then tokenized, before applying the tokens to a standard Transformer architecture. The attention mechanism in a ViT repeatedly transforms representation vectors of image patches, incorporating more and more semantic relations between image patches in an image. This is analogous to how in natural language processing, as representation vectors flow through a Transformers, they incorporate more and more semantic relations between words, from syntax to semantics. ViT has found applications in image recognition, image segmentation, and autonomous driving. Architecture The basic architecture, used by the original 2020 paper, is as follows. In summary, it is a BERT-like encoder-only Transformer. The input image is of type , where are height, width, channel (RGB). It is then split into square-shaped patches of type . For each patch, the patch is pushed through a linear operator, to obtain a vector ("patch embedding"). The position of the patch is also transformed into a vector by "position encoding". The two vectors are added, then pushed through several Transformer encoders. Classification The above architecture turns an image into a sequence of vector representations. To use the vector representation for downstream applications, one needs to add some network modules on top of it. For example, to use it for classification, one can add a shallow MLP on top of it that outputs a probability distribution over classes. The original paper uses a linear-GeLU-linear-softmax network. Vision Transformers Transformers found their initial applications in natural language processing tasks, as demonstrated by language models such as BERT and GPT-3. By contrast the typi
https://en.wikipedia.org/wiki/Toshiba%20Pasopia%2016
Toshiba Pasopia 16 or PA7020 (also known as T300 in the U.S. and PAP in Europe) is an IBM PC compatible computer from manufacturer Toshiba, released in 1982 and based around a Intel 8088-2 microprocessor running at 6 MHz. Details The operating system was MS-DOS 2.3 with CP/M-86 as an option. The machine included GW-BASIC, communication (Pap.Com) and graphics (Pap.Graph) software. The computer came with two 5.25" disk drives and supported an optional 8087 co-processor. Two graphic cards were available: a Color Graphic Card with 128KB and 8 colors; an Extended Graphic Card with 256KB of memory and 16 colors out of 256. Several graphics modes are possible: , , and . The European PAP model had a SCART connector with RGB output. A green monochrome monitor was also available. Possible peripherals for this model are extra 5.25" disk drives, a hard disk, a RS-232 interface and a printer. The keyboard has 103 keys. Other models Toshiba Pasopia 1600 An expanded model, the Toshiba Pasopia 1600 (PA7030) was released in 1984. The basic specifications are the same as the base model, but the CPU is an Intel 8086-2 running at 8 MHz, and graphic memory was expanded to 384 KB. The machine is smaller and the number of expansion slots was reduced to two. A mouse and JS-WORD came as standard equipment, along with a screen editor software. Several types of floppy and hard drives were available. Pasopia 1600 TS100 / 300 Another variation was the Pasopia 1600 TS100 / 300 with a 80286 CPU running at 8 MHz and 704 KB of RAM. It came with MS-DOS 2.11, two 5.25" floppy disk drives (TS100 version) or a single 5.25" floppy disk drive and a 20 MB hard drive (TS300 version). After this, Toshiba starts the J-3100 series of personal computers. See also Toshiba Pasopia Toshiba Pasopia 5 Toshiba Pasopia 7 Toshiba Pasopia IQ References Pasopia Computer-related introductions in 1982 IBM PC compatibles
https://en.wikipedia.org/wiki/VM%20Software
VM Software was a software company whose product line focused on mainframes running IBM's VM/CMS operating system. History VM Software was formed under that name in 1981. They had 11 products named VMxxxxx, with features that complemented the systems-oriented capabilities that IBM's software provided. With the 1987 arrival of IBM's 9370 mid-range mainframe, VM added VMCenter II to its product line. The chain of acquisitions by which the company changed names and ownership is VM Software, Systems Center Inc, Sterling Software, Computer Associates. VM Softwares mailing address, under Systems Center and Sterling remained 1800 Alexander Bell Drive but addressed as "VM Software Division." Product summary Among their offerings were: VMAccount - facilitating chargeback VMArchive - facilitated queue-based user-initiated saving and restoring of individual or groups of files VMBackup - intended for doing full system saves, but permitting user-initiated queued file restores. VMBatch''' - more features than IBM's CMSBATCH'' See also Connect:Direct References History of software Defunct software companies of the United States
https://en.wikipedia.org/wiki/Rafael%20Guarga
Rafael Andrés Guarga Ferro (born 23 August 1940 in Montevideo) is a Uruguayan industrial engineer and inventor. Career After graduating from the University of the Republic, Guarga had to leave his country due to the civic-military dictatorship. He pursued his career in Mexico, obtaining a doctorate at the National Autonomous University of Mexico. Back in Uruguay he devoted himself to lecturing; in 1992-1998 he served as Dean of the School of Engineering, and in 1998-2006 as Rector of the university. In the late 1990s Guarga invented the selective inverted sink (acronym SIS), a device used by farmers to protect plants from frost. References 1940 births Living people University of the Republic (Uruguay) alumni Academic staff of the University of the Republic (Uruguay) University of the Republic (Uruguay) rectors Uruguayan engineers National Autonomous University of Mexico alumni Academic staff of the National Autonomous University of Mexico Uruguayan inventors
https://en.wikipedia.org/wiki/Toshiba%20Pasopia%20IQ
The Toshiba Pasopia IQ are a series of MSX compatible machines released by Toshiba between 1983 and 1985. This is not to be confused with a different computer line (unrelated to MSX) with the similar name of Toshiba Pasopia. HX-10 series The HX-10 was released in the fall of 1983. There is only one ROM cartridge slot, but there's an optional expansion slot available. Several models exist (D, DP, DPN, F, E and S), targeting different markets. For example, the HX-10DPN is equipped with an RGB 21-pin terminal, but other connections (RF, composite video) are non existing; the HX-10S only has 16KB of RAM. HX-20 series The HX-20 was released in the fall of 1984 is equipped with 64KB of RAM. It has a monaural / stereo sound selector switch. Like with the HX-10 series, several models exist (HX-21, HX-22, HX-23). The later models have a RGB 21-pin video output. The HX-23 is compatible with the MSX2 and comes with 64KB of VRAM. The HX-23F is equipped with a RS-232 interface and comes with 128KB of VRAM. HX-30 series The HX-30 was MSX compatible and released in 1985, with 16KB of RAM, with latter models coming with 64KB, a RGB 21-pin video output and Programmable sound generator stereo output. The HX-33 model has 128kB of VRAM and was MSX2 compatible with integrated keyboard. The next model, HX-34, added a floppy disk drive. Model list The following table present a condensed model list of the MSX compatible computers released by Toshiba. See also Toshiba Pasopia Toshiba Pasopia 5 Toshiba Pasopia 7 Toshiba Pasopia 16 References Pasopia MSX microcomputer
https://en.wikipedia.org/wiki/Leonardo%20%28supercomputer%29
Leonardo is a petascale supercomputer located at the CINECA datacenter in Bologna, Italy. The system consists of an Atos BullSequana XH2000 computer, with close to 14,000 Nvidia Ampere GPUs and 200Gb/s Nvidia Mellanox HDR InfiniBand connectivity. Inagurated in November 2022, Leonardo is capable of 250 petaflops (250 quadrillion operations per second), making it one of the top five fastest supercomputers in the world. It debuted on the TOP500 in November 2022 ranking fourth in the world, and second in Europe. Architecture The system is constructed as three separate "modules". The first, known as the "booster module", consists of 13,824 Nvidia A100 GPUs, grouped four per node, for a total of 3,456 nodes. This module will be capable of 240.50 LINPACK petaflops, and is expected to be online by autumn 2022. The second module, called the "data centric module", is made up of 1,536 Intel Sapphire Rapids CPUs, and will be capable of 8.97 LINPACK petaflops. These two computing modules will be complemented by a "front-end & service module", and backed by two storage systems; 5 PB of high IOPS storage with 1 TB/s bandwidth and 100 PB of high capacity storage with bandwidth. The components will be joined up by a 200 Gb/s InfiniBand interconnect. Booster Module The 3,456 individual nodes which make up the "booster module" are custom BullSequana X2135 "Da Vinci" blade servers, each composed of: 1x Intel Xeon 8358 CPU, with 32 cores running at 2.6 GHz 512 GB RAM DDR4 3200 MHz 4x NVidia custom Ampere GPU, 64GB HBM2 2x NVidia HDR InfiniBand network adapters, each with two 100 Gb/s ports Each node is expected to deliver 89.4 TFLOPs peak. Data Centric Module The "data centric module" consists of 1536 nodes, each comprising a BullSequana X2610 compute blade with: 2x Intel Sapphire Rapids CPUs, with 56 cores 512 GB RAM DDR5 4800 MHz 1x NVidia HDR InfiniBand network adapter, with one 100 Gb/s port 8 TB NVM storage Front-end & Service Module This module is responsible
https://en.wikipedia.org/wiki/Hardcore%20Gaming%20101
Hardcore Gaming 101 is an online video game magazine founded by Kurt Kalata. Kalata established the site after graduating college, when he noticed the overabundance of game strategy guides, and felt that someone should create more books about gaming history. In its formative years, Hardcore Gaming 101 focused especially on games from Japan. The site has become known for its in-depth coverage of classic games and the history behind them. Kalata describes his motivations for founding the site, "gaming history is important to me because it's important to analyze how everything is connected to each other. ... New products are always influenced by things that came before it, so it's interesting to trace where certain elements may have come from and to recognize the talents of the trailblazers." Books Over the years, Hardcore Gaming 101 has also produced a number of books on specific gaming topics. In 2013, they published Sega Arcade Classics Volume 1, focused on Sega's contributions to arcade gaming. They later published The Best 200 Video Games of All Time, which examines titles that their editorial team felt were important to the history of games. In 2016, they produced a book called Taito Arcade Classics about the history of Taito, arcade games, and the gaming industry in japan. This followed with the publication of The Unofficial Guide To Konami Shooters, covering a history of shooter games produced by Konami, as well as Data East Arcade Classics about titles from Data East. By 2017, Hardcore Gaming 101 also published The Guide to Shoot Em Ups: Volume 1, which covers classic shoot 'em up titles that were not already covered in their books about Taito or Konami. Recognition Nintendo Life contributor Damien McFarren has called the site "a goldmine for retro gamers, with its staff tirelessly uncovering gems from the past that everyone else has all but forgotten about." The Escapist took note of the site's "exhaustively researched spotlights on games old and new ali
https://en.wikipedia.org/wiki/Hans-Wilhelm%20Knobloch
Hans-Wilhelm Knobloch (18 March 1927, in Schmalkalden – 10 July 2019) was a German mathematician, specializing in dynamical systems and control theory. Although the field of mathematical systems and control theory was already well-established in several other countries, Hans-Wilhelm Knobloch and Diederich Hinrichsen were the two mathematicians of most importance in establishing this field in Germany. Education and career After completing undergraduate study in mathematics from 1946 to 1950 at the University of Greifswald, he matriculated at the Humboldt University of Berlin, where he received his PhD in 1950. His thesis Über galoissche Algebren (On Galois algebras) was supervised by Helmut Hasse. After completing his doctorate, Knobloch, with the aid of a scholarship, followed Hasse to the University of Hamburg. In 1952 and 1953 Knobloch held a teaching appointment at the University of Würzburg, after which he was offered a scholarship to complete his habilitation. After completing his habitation at the University of Würzburg in 1957, he was appointed to a substitute professorship in Münster. He held temporary academic posts at the Technical University of Munich, the University of Michigan from 1962 to 1963, and Denmark's Aarhus University from 1963 to 1965. From 1965 to 1970 he held a full professorship at the Technical University of Berlin. In 1970 at the University of Würzburg he accepted the professorial chair for control theory and dynamical systems, which he held until his retirement as professor emeritus in 1995. In the 1950s Knobloch published several papers in algebra and number theory. In 1958 he published two papers in integral transforms and differential equations. By the 1960s he focused on differential equations and control theory. He made important contributions in the theory of the existence of periodic solutions of non-linear differential equations, the construction of integral manifolds for ordinary differential equations, and necessary higher-o
https://en.wikipedia.org/wiki/Group%20analysis%20of%20differential%20equations
Group analysis of differential equations is a branch of mathematics that studies the symmetry properties of differential equations with respect to various transformations of independent and dependent variables. It includes methods and applied aspects of differential geometry, Lie groups and algebras theory, calculus of variations and is, in turn, a powerful research tool in theories of ODEs, PDEs, mathematical and theoretical physics. Motivation References Group theory Differential geometry Lie groups Lie algebras Differential equations Mathematical physics
https://en.wikipedia.org/wiki/Cantor%27s%20isomorphism%20theorem
In order theory and model theory, branches of mathematics, Cantor's isomorphism theorem states that every two countable dense unbounded linear orders are order-isomorphic. For instance, Minkowski's question-mark function produces an isomorphism (a one-to-one order-preserving correspondence) between the numerical ordering of the rational numbers and the numerical ordering of the dyadic rationals. The theorem is named after Georg Cantor, who first published it in 1895, using it to characterize the (uncountable) ordering on the real numbers. It can be proved by a back-and-forth method that is also sometimes attributed to Cantor but was actually published later, by Felix Hausdorff. The same back-and-forth method also proves that countable dense unbounded orders are highly symmetric, and can be applied to other kinds of structures. However, Cantor's original proof only used the "going forth" half of this method. In terms of model theory, the isomorphism theorem can be expressed by saying that the first-order theory of unbounded dense linear orders is countably categorical, meaning that it has only one countable model, up to logical equivalence. One application of Cantor's isomorphism theorem involves temporal logic, a method for using logic to reason about time. In this application, the theorem implies that it is sufficient to use intervals of rational numbers to model intervals of time: using irrational numbers for this purpose will not lead to any increase in logical power. Statement and examples Cantor's isomorphism theorem is stated using the following concepts: A linear order or total order is defined by a set of elements and a comparison operation that gives an ordering to each pair of distinct elements and obeys the The familiar numeric orderings on the integers, rational numbers, and real numbers are all examples of linear Unboundedness means that the ordering does not contain a minimum or maximum element. This is different from the concept of a bounded set
https://en.wikipedia.org/wiki/Uranium%20ditelluride
Uranium ditelluride, (UTe2), an unconventional superconductor, discovered to be a superconductor in 2018. Superconductivity in UTe2 appears to be a consequence of triplet electrons spin-pairing. The material acts as a topological superconductor, stably conducting electricity without resistance even in high magnetic fields. It has superconducting transition temperature at Tc= 2K. Charge density waves (CDW) and pair density waves (PDW) have been described in UTe2, with the latest case being the first time it has been described in a p-wave superconductor. See also Distrontium ruthenate a p-wave triplet state superconductor candidate. Helium-3 a spin-triplet superfluid Ferromagnetic superconductor spin-triplet pairing with coexisting superconductivity and ferromagnetic phases. Reentrant superconductivity an effect similar to ferromagnetic superconductivity. References Superconductors
https://en.wikipedia.org/wiki/Time%20resolved%20microwave%20conductivity
Time resolved microwave conductivity (TRMC) is an experimental technique used to evaluate the electronic properties of semiconductors. Specifically, it is used to evaluate a proxy for charge carrier mobility and a representative carrier lifetime from light-induced changes in conductance. The technique works by photo-generating electrons and holes in a semiconductor, allowing these charge carriers to move under a microwave field, and detecting the resulting changes in the electric field. TRMC systems cannot be purchased as a single unit, and are generally "home-built" from individual components. One advantage of TRMC over alternative techniques is that it does not require direct physical contact to the material. History While semiconductors have been studied using microwave radiation since the 1950s, it was not until the late 1970s and early 1980s that John Warman at the Delft University of Technology exploited microwaves for time-resolved measurements of photoconductivity. The first reports used electrons then photons to generate charges in fluids. The technique was later refined to study semiconductors by Kunst and Beck at the Hahn Meitner Institute in Berlin. Delft remains a significant center for TRMC, however the technique is now used at a number of institutions around the world, notably the National Renewable Energy Laboratory and Kyoto University. Operating principles The experiment relies upon the interaction between optically-generated charge carriers and microwave frequency electromagnetic radiation. The most common approach is to use a resonant cavity. An oscillating voltage is produced using a signal generator such as a voltage controlled oscillator or a Gunn diode. The oscillating current is incident on an antenna, resulting in the emission of microwaves of the same frequency. These microwaves are then directed into a resonant cavity. Because they can transmit microwaves with lower loss than cables, metallic waveguides are often used to form the ci
https://en.wikipedia.org/wiki/Revive%20%26%20Restore
Revive & Restore is a nonprofit wildlife conservation organization focused on use of biotechnology in conservation. Headquartered in Sausalito, California, the organization's mission is to enhance biodiversity through the genetic rescue of endangered and extinct species. The organization was founded by Stewart Brand and his wife, Ryan Phelan. Revive & Restore has created a “Genetic Rescue Toolkit” for wildlife conservation – a suite of biotechnology tools adapted from human medicine and commercial agriculture that can improve wildlife conservation outcomes. The toolkit includes biobanking and cell culturing, genetic sequencing, and advanced reproductive technologies, such as cloning. The toolkit complements traditional conservation practices, such as captive breeding and habitat restoration. Revive & Restore has caused controversy. In particular, Brand's work in de-extinction has been characterized as "playing god" and criticized for taking time and money away from traditional conservation efforts. In addition, many are concerned by the concept of cloning, even in the context of conservation. History Revive & Restore was co-founded in 2012 by Stewart Brand and Ryan Phelan with the idea of bringing biotechnology solutions to conservation. The group was incubated by the Long Now Foundation until 2017, when it became an independent 501(c)(3) organization. In 2013 Revive & Restore organized the first public meeting on de-extinction. Their founding projects include the de-extinction of the passenger pigeon, heath hen, and woolly mammoth. Since then, Revive & Restore has established partnerships with research institutions, governmental agencies, and conservation organizations on a broad range of genetic rescue programs. Revive & Restore is a member of the International Union for Conservation of Nature (IUCN) and has long-standing partnerships with the US Fish & Wildlife Service, The San Diego Zoo Wildlife Alliance, Morris Animal Foundation, and ViaGen Pets & Equine,
https://en.wikipedia.org/wiki/Toasternet
Toasternets were an early-1990s instantiation of the decentralized Internet, featuring open-standards-based federated services, radical decentralization, ad-hoc routing and consisting of many small individual and collective networks rather than a cartel of large commercial Internet Service Provider networks. Today's "community networks" and decentralized social networks are the closest modern inheritors of the ethos of the 1991-1994 era Toasternets. History The first known use of the word was by Robert Ullmann, then active in the Internet Engineering Task Force developing next-generation Internet addressing and routing protocols. He circulated two documents, entitled Toasternet Part I (December 1989) and Toasternet Part II (March 1992) on the IETF mailing list, and then published RFCs 1475 and 1476 and the "CATNIP" Internet-Draft in June 1993. Early toasternet proponent Tim Pozar described them thus: Pozar, and other early toasternet builders Bill Woodcock and John Gilmore were participants in the cooperative The Little Garden, the first Internet service provider based on the west coast of the United States. Founded and led by Tom Jennings, The Little Garden (named for the Vietnamese restaurant where its foundational meetings were held) was an Internet Service Provider network built between 1992 and 1996 in the toasternet ethos, and consisting of constituent toasternet members; some individual, and some collective. Many of the initial Little Garden members went on to become founding members of Packet Clearing House, the not-for-profit which now supports core Internet infrastructure globally, but still continues to promulgate the toasternet values of collaborative competition and "permissionless" new market entry. Writing contemporaneously in Wired, Jonathan Steuer said, Gareth Bronwyn, also writing in Wired in 1993, defined them much more haphazardly, saying that they used "Cheap Internet routers made with old PCs" and coining the umbrella term "grunge computin
https://en.wikipedia.org/wiki/Alexander%20Munro%20Davie
Alexander "Sandy" Munro Davie (born 4 April 1946 in Dundee) is a Scottish mathematician and was the chess champion of Scotland in 1964, 1966, and 1969. He grew up in Dundee, attending the High School of Dundee, and he was encouraged to play chess by Nancy Elder. He was the Scottish Chess Association's Scottish Boys' Champion in 1960 and 1962. He won the Scottish Chess Championship for 1964, 1966, and 1969 and in 1966 was a member of the Scottish team at the 13th World Student Team Chess Championship at Örebro, Sweden. His last FIDE rating was 2280. Davie received his PhD in 1970 from the University of Dundee. In 1973 he was elected a Fellow of the Royal Society of Edinburgh. He became a professor of mathematics at the University of Edinburgh, where he is currently retired. His mathematical research deals with dynamical systems and stochastic analysis. He also has "some interest in applications of analysis to PDE, complexity of matrix multiplication and applications of mathematics to biology, particularly protein folding." In 1986 he was an invited speaker at the International Congress of Mathematicians in Berkeley, California. Selected publications 2007 References 1946 births Living people People educated at the High School of Dundee Alumni of the University of Dundee Academics of the University of Edinburgh 20th-century Scottish mathematicians 21st-century Scottish mathematicians Dynamical systems theorists Probability theorists Fellows of the Royal Society of Edinburgh People from Dundee Scottish chess players
https://en.wikipedia.org/wiki/Valencia%20Koomson
Valencia Joyner Koomson is an associate professor in the Department of Electrical and Computer Engineering and adjunct professor in the Department of Computer Science at the Tufts University School of Engineering. Koomson is also the principal investigator for the Advanced Integrated Circuits and Systems Lab at Tufts University. Background Koomson was born in Washington, DC, and graduated from Benjamin Banneker Academic High School. Her parents, Otis and Vernese Joyner, moved to Washington DC during the Great Migration after living for years as sharecroppers in Wilson County, North Carolina. Her family history can be traced back to the antebellum period. Her oldest known relative is Hagar Atkinson, an enslaved African woman whose name is recorded in the will of a plantation owner in Johnston County, North Carolina. Career Koomson attended the Massachusetts Institute of Technology, graduating with a BS in Electrical Engineering and Computer Science in 1998 and a Masters of Engineering in 1999. Koomson subsequently earned her Master of Philosophy from the University of Cambridge in 2000, followed by her PhD in Electrical Engineering from the same institution in 2003. Koomson was an adjunct professor at Howard University from 2004 to 2005, and during that period was a Senior Research Engineer at the University of Southern California's Information Sciences Institute (USC/ISI). She was a Visiting Professor at Rensselaer Polytechnic Institute and Boston University in 2008 and 2013, respectively. Koomson joined Tufts University in 2005 as an assistant professor, and became an associate professor in 2011. In 2020, Koomson was named an MLK Visiting Professor at MIT for the academic year 2020/2021. Research Koomson's research lies at the intersection of biology, medicine, and electrical engineering. Her interests are in nanoelectronic circuits, systems for wearable and implantable medical devices, semiconductors, and advanced nano-/microfluidic systems to probe int
https://en.wikipedia.org/wiki/Rope-burning%20puzzle
In recreational mathematics, rope-burning puzzles are a class of mathematical puzzle in which one is given lengths of rope, fuse cord, or shoelace that each burn for a given amount of time, and matches to set them on fire, and must use them to measure a non-unit amount of time. The fusible numbers are defined as the amounts of time that can be measured in this way. As well as being of recreational interest, these puzzles are sometimes posed at job interviews as a test of candidates' problem-solving ability, and have been suggested as an activity for middle school mathematics students. Example A common and simple version of this problem asks to measure a time of 45 seconds using only two fuses that each burn for a minute. The assumptions of the problem are usually specified in a way that prevents measuring out 3/4 of the length of one fuse and burning it end-to-end, for instance by stating that the fuses burn unevenly along their length. One solution to this problem is to perform the following steps: Light one end of the first fuse, and both ends of the second fuse. Once the second fuse has burned out, 30 seconds have elapsed, and there are 30 seconds of burn time left on the first fuse. Light the other end of the first fuse. Once the first fuse burns out, 45 seconds have elapsed. Many other variations are possible, in some cases using fuses that burn for different amounts of time from each other. Fusible numbers In common versions of the problem, each fuse lasts for a unit length of time, and the only operations used or allowed in the solution are to light one or both ends of a fuse at known times, determined either as the start of the solution or as the time that another fuse burns out. If only one end of a fuse is lit at time , it will burn out at time . If both ends of a fuse are lit at times and , it will burn out at time , because a portion of is burnt at the original rate, and the remaining portion of is burnt at twice the original rate, hence the f
https://en.wikipedia.org/wiki/Alexander%20Moiseevich%20Olevskii
Alexander Moiseevich Olevskii (, born February 12, 1939, in Moscow) is a Russian-Israeli mathematician at Tel Aviv University, specializing in mathematical analysis. As of July 2021, he is a professor emeritus. He graduated in 1963 with a Candidate of Sciences degree (PhD) from Moscow State University. There he received in 1966 a Russian Doctor of Sciences degree (habilitation). At the Moscow Institute of Electronics and Mathematics, he was from 1988 to 1992 head of the department of algebra and analysis. In the spring of 1996 he was at the Institute for Advanced Study. He has held visiting appointments at universities or institutes in several countries, including France, Australia, Germany, Italy, and the United States. In 1986 Olevskii was an invited speaker at the International Congress of Mathematicians in Berkeley, California. He was a member of the 2013 Class of Fellows of the American Mathematical Society (announced in 2012). In 2014 he was an invited speaker at the European Congress of Mathematics in Kraków. His doctoral students include Gady Kozma. Selected publications } 2004 References External links (publication list) 1939 births Living people Soviet mathematicians Israeli mathematicians Moscow State University alumni Academic staff of the Moscow Institute of Electronics and Mathematics Academic staff of Tel Aviv University Functional analysts Mathematical analysts Operator theorists Soviet Jews Soviet emigrants to Israel Israeli people of Russian-Jewish descent Fellows of the American Mathematical Society
https://en.wikipedia.org/wiki/Van%20der%20Meer%20formula
The Van der Meer formula is a formula for calculating the required stone weight for armourstone under the influence of (wind) waves. This is necessary for the design of breakwaters and shoreline protection. Around 1985 it was found that the Hudson formula in use at that time had considerable limitations (only valid for permeable breakwaters and steep (storm) waves). That is why the Dutch government agency Rijkswaterstaat commissioned Deltares to start research for a more complete formula. This research, conducted by Jentsje van der Meer, resulted in the Van der Meer formula in 1988, as described in his dissertation. This formula reads and In this formula: Hs = Significant wave height at the toe of the construction Δ = relative density of the stone (= (ρs -ρw)/ρw) where ρs is the density of the stone and ρw is the density of the water dn50 = nominal stone diameter α = breakwater slope P = notional permeability S = Damage number N = number of waves in the storm ξm = the Iribarren number calculated with the Tm For design purposes, for the coefficient cp the value of 5,2 and for cs the value 0,87 is recommended. The value of P can be read from attached graph. Until now, there is no good method for determining P different than with accompanying pictures. Research is under way to try to determine the value of P using calculation models that can simulate the water movement in the breakwater (OpenFOAM models). The value of the damage number S is defined as where A is the area of the erosion area. Permissible values for ''S are: References Hydraulic engineering
https://en.wikipedia.org/wiki/Borg%20%28microbiology%29
A borg is a "giant extrachromosomal element with the potential to augment methane oxidation", described by Basem Al-Shayeb and Jill Banfield. Borgs are long DNA sequences existing alongside the main chromosome in the archaea Methanoperedens, in oxygen-starved environments such as deep mud. Borgs were discovered by Professor Jill Banfield and her team in the soil of a wetland, an aquifer, a riverbed, and a deserted mercury mine in the states of California and Colorado. Borgs are considered to be a new form of "giant linear plasmids" or giant viruses rather than unknown DNA elements. They co-occur within a species of archaea which likely hosts them and shares many of their genes. The archaeon's main chromosome is only three times larger, and their capacity for anaerobic oxidation of methane as well as other biological functions – such as production of proteins – may be augmented by borgs. Features They were discovered in March 8 2020 by Jill and others. The structure of Borg genomes are conserved and are distinguished from the plasmids and chromosomes of Methanoperedens, as well as other archaeal genomes. Borgs do not possess discernible proteins that are associated with plasmids or viruses, rRNA loci, origins of replication, or vital genes that are commonly found within minichromosomes, also known as megaplasmids, of archaea. A sample of borg genomes have been found to measure between 0.66-0.92 Mbp long, which is beyond the genome length of archaea viruses currently known. Instead, the size of Borg genomes are characteristic of eukaryote-specific double-stranded DNA viruses from the phylum Nucleocytoviricota, also known as nucleocytoplasmic large DNA viruses (NCLDV), which can surpass 2.5 Mbp. Tandem direct repeat sequences are prevalent throughout a Borg's genome, and long inverted repeats terminate the genome. This differs from the megaplasmids of some bacteria, which carry interspaced repeats and usually are not responsible for encoding necessary genes. Funct
https://en.wikipedia.org/wiki/Urbach%20energy
The Urbach Energy, or Urbach Edge, is a parameter typically denoted , with dimensions of energy, used to quantify energetic disorder in the band edges of a semiconductor. It is evaluated by fitting the absorption coefficient as a function of energy to an exponential function. It is often used to describe electron transport in structurally disordered semiconductors such a hydrogenated amorphous silicon. Introduction In the simplest description of a semiconductor, a single parameter is used to quantify the onset of optical absorption: the band gap, . In this description, semiconductors are described as being able to absorb photons above , but are transparent to photons below . However, the density of states in 3 dimensional semiconductors increases further from the band gap (this is not generally true in lower dimensional semiconductors however). For this reason, the absorption coefficient, , increases with energy. The Urbach Energy quantifies the steepness of the onset of absorption near the band edge, and hence the broadness of the density of states. A sharper onset of absorption represents a lower Urbach Energy. History and name The Urbach Energy is defined by an exponential increase in absorbance with energy. While an exponential dependence of absorbance had been observed previously in photographic materials, it was Franz Urbach that evaluated this property systematically in crystals. He used silver bromide for his study while working at the Kodak Company in 1953. Definition Absorption in semiconductors is known to increase exponentially near the onset of absorption, spanning several orders of magnitude. Absorption as a function of energy can be described by the following equation: where and are fitting parameters with dimensions of inverse length and energy, respectively, and is the Urbach Energy. This equation is only valid when . The Urbach Energy is temperature-dependent. Room temperature values of for hydrogenated amorphous silicon are typically
https://en.wikipedia.org/wiki/BIO-LGCA
In computational and mathematical biology, a biological lattice-gas cellular automaton (BIO-LGCA) is a discrete model for moving and interacting biological agents, a type of cellular automaton. The BIO-LGCA is based on the lattice-gas cellular automaton (LGCA) model used in fluid dynamics. A BIO-LGCA model describes cells and other motile biological agents as point particles moving on a discrete lattice, thereby interacting with nearby particles. Contrary to classic cellular automaton models, particles in BIO-LGCA are defined by their position and velocity. This allows to model and analyze active fluids and collective migration mediated primarily through changes in momentum, rather than density. BIO-LGCA applications include cancer invasion and cancer progression. Model definition As are all cellular automaton models, a BIO-LGCA model is defined by a lattice , a state space , a neighborhood , and a rule . The lattice () defines the set of all possible particle positions. Particles are restricted to occupy only certain positions, typically resulting from a regular and periodic tesselation of space. Mathematically, is a discrete subset of -dimensional space. The state space () describes the possible states of particles within every lattice site . In BIO-LGCA, multiple particles with different velocities may occupy a single lattice site, as opposed to classic cellular automaton models, where typically only a single cell can reside in every lattice node simultaneously. This makes the state space slightly more complex than that of classic cellular automaton models (see below). The neighborhood () indicates the subset of lattice sites which determines the dynamics of a given site in the lattice. Particles only interact with other particles within their neighborhood. Boundary conditions must be chosen for neighborhoods of lattice sites at the boundary of finite lattices. Neighborhoods and boundary conditions are identically defined as those for regular cellular auto
https://en.wikipedia.org/wiki/Mutualism%20Parasitism%20Continuum
The hypothesis or paradigm of Mutualism Parasitism Continuum postulates that compatible host-symbiont associations can occupy a broad continuum of interactions with different fitness outcomes for each member. At one end of the continuum lies obligate mutualism where both host and symbiont benefit from the interaction and are dependent on it for survival. At the other end of the continuum highly parasitic interactions can occur, where one member gains a fitness benefit at the expense of the others survival. Between these extremes many different types of interaction are possible. The degree of change between mutualism or parasitism varies depending on the availability of resources, where there is environmental stress generated by few resources, symbiotic relationships are formed while in environments where there is an excess of resources, biological interactions turn to competition and parasitism. Classically the transmission mode of the symbiont can also be important in predicting where on the mutualism-parasitism-continuum an interaction will sit. Symbionts that are vertically transmitted (inherited symbionts) frequently occupy mutualism space on the continuum, this is due to the aligned reproductive interests between host and symbiont that are generated under vertical transmission. In some systems increases in the relative contribution of horizontal transmission can drive selection for parasitism. Studies of this hypothesis have focused on host-symbiont models of plants and fungi, and also of animals and microbes. See also Red King Hypothesis Red Queen Hypothesis Black Queen Hypothesis Biological interaction References Evolution Biological interactions
https://en.wikipedia.org/wiki/Temperature%20paradox
The Temperature paradox or Partee's paradox is a classic puzzle in formal semantics and philosophical logic. Formulated by Barbara Partee in the 1970s, it consists of the following argument, which speakers of English judge as wildly invalid. The temperature is ninety. The temperature is rising. Therefore, ninety is rising. (invalid conclusion) Despite its obvious invalidity, this argument would be valid in most formalizations based on traditional extensional systems of logic. For instance, the following formalization in first order predicate logic would be valid via Leibniz's law: t=90 R(t) R(90) (valid conclusion in this formalization) To correctly predict the invalidity of the argument without abandoning Leibniz's Law, a formalization must capture the fact that the first premise makes a claim about the temperature at a particular point in time, while the second makes an assertion about how it changes over time. One way of doing so, proposed by Richard Montague, is to adopt an intensional logic for natural language, thus allowing "the temperature" to denote its extension in the first premise and its intension in the second. extension(t)=90 R(intension(t)) R(90) (invalid conclusion) Thus, Montague took the paradox as evidence that nominals denote individual concepts, defined as functions from a world-time pair to an individual. Later analyses build on this general idea, but differ in the specifics of the formalization. Notes External links Non-classical logic Philosophical logic Predicate logic Formal semantics (natural language) Paradoxes
https://en.wikipedia.org/wiki/List%20of%20research%20methods%20in%20biology
This list of research methods in biology is an index to articles about research methodologies used in various branches of biology. Research design and analysis Research designs Charts and diagrams Statistical analyses Laboratory techniques Field techniques Computational tools Mathematical models Algorithms References External links Biology Biology
https://en.wikipedia.org/wiki/Gufeng%20music
Gufeng music () is a type of music genre by artists originating from the Greater China region, It is a kind of C-pop music with the background of Chinese legends, the style of Chinese folk songs and drama, the melody that is similar to classical Chinese music and played by classical Chinese musical instruments. It is similar but slightly different from Zhongguo feng music. The lyrics of Gufeng music are created mainly based on ancient Chinese mythological legends and verses. In recent years, this kind of songs are often used in Xianxia, Wuxia games, anime, dramas, etc. This kind of music has also become popular among Internet cultures such as Hanfu movement. History Gufeng music was usually called Xianxia music (仙侠; xianxia being a genre of Chinese fiction that is similar to wuxia, but with more mythological elements), and what now seems like a movement began rather quietly in 2005, calling for netizens to write lyrics with ancient-styled poems for the music in some popular PC games, including The Legend of Sword and Fairy and Fairy and Sword of Xuanyuan. The name seems to derive from the namesake lyricist column on Fenbei, and the basic concept of Chinoiserie music among netizens came out from that group. References and sources References External links Chinese music sharing site 5sing for Chinoiserie music Internet culture Chinese popular culture Chinese youth culture
https://en.wikipedia.org/wiki/Vietnam%20War%20Song%20Project
The Vietnam War Song Project (VWSP) is an archive and interpretive examination of over 6000 Vietnam War songs identified. It was founded in 2007 by its current editor, Justin Brummer, a historian with a PhD in contemporary Anglo-American relations from University College London. The project analyses the lyrics, and collects data on the genre, location, ethnicity, nationality, language, and time period of the recordings. It also involves the preservation of the original physical vinyl records. Additional items collected include cassette tapes, CDs, MP3s, record label scans, and sheet music. The project is currently hosted on the online collaborative database Rate Your Music, with components on YouTube, Twitter, and at the University of Maryland. Part of the project includes a discography, Vietnam War Songs: An incomplete discography, which has over 6000 titles, both unique songs and cover songs, a collaboration between Hugo Keesing, Wouter Keesing, C.L. Yarbrough, and Justin Brummer at the University of Maryland Libraries. Hugo Keesing, adjunct professor of American Studies at the University of Maryland, and the producer of the 13 CD box-set compilation Next Stop Is Vietnam is also a major contributor of songs and record scans. The project has categorised songs into a variety of themes, from anti-war / protest / peace songs, to patriotic / pro-government / anti-protest songs during the war years, as well an analysis of songs released in the post-war period. Other themes include regional songs, such as Puerto Ricans in the Vietnam War, Australia in the Vietnam War, New Zealand in the Vietnam War, Mexican-Americans, and songs from South America, Central America, and the Caribbean. Genres include soul, gospel & funk, the blues, garage rock, and punk music. The project also looks at songs about key events and issues, which include the Chicago Seven, Kent State shootings, the My Lai Massacre, and the Vietnam War POW/MIA issue. Other topics include songs about the Vietn
https://en.wikipedia.org/wiki/Urey%E2%80%93Bigeleisen%E2%80%93Mayer%20equation
In stable isotope geochemistry, the Urey–Bigeleisen–Mayer equation, also known as the Bigeleisen–Mayer equation or the Urey model, is a model describing the approximate equilibrium isotope fractionation in an isotope exchange reaction. While the equation itself can be written in numerous forms, it is generally presented as a ratio of partition functions of the isotopic molecules involved in a given reaction. The Urey–Bigeleisen–Mayer equation is widely applied in the fields of quantum chemistry and geochemistry and is often modified or paired with other quantum chemical modelling methods (such as density functional theory) to improve accuracy and precision and reduce the computational cost of calculations. The equation was first introduced by Harold Urey and, independently, by Jacob Bigeleisen and Maria Goeppert Mayer in 1947. Description Since its original descriptions, the Urey–Bigeleisen–Mayer equation has taken many forms. Given an isotopic exchange reaction , such that designates a molecule containing an isotope of interest, the equation can be expressed by relating the equilibrium constant, , to the product of partition function ratios, namely the translational, rotational, vibrational, and sometimes electronic partition functions. Thus the equation can be written as: where and is each respective partition function of molecule or atom . It is typical to approximate the rotational partition function ratio as quantized rotational energies in a rigid rotor system. The Urey model also treats molecular vibrations as simplified harmonic oscillators and follows the Born–Oppenheimer approximation. Isotope partitioning behavior is often reported as a reduced partition function ratio, a simplified form of the Bigeleisen–Mayer equation notated mathematically as or . The reduced partition function ratio can be derived from power series expansion of the function and allows the partition functions to be expressed in terms of frequency. It can be used to relate mole
https://en.wikipedia.org/wiki/Right%20to%20repair
Right to repair is a legal right for owners of devices and equipment to freely modify and repair products such as automobiles, electronics, and farm equipment. This right is framed in opposition to restrictions such as requirements to use only the manufacturer's maintenance services, restrictions on access to tools and components, and software barriers. Obstacles to owner repair can lead to higher consumer costs or drive consumers to single-use devices instead of making repairs. While the global community is concerned over the growing volume of the waste stream, especially electronic waste, the debate over the right to repair has been centered on the United States, India, and the European Union. Right to repair may also refer to the social movement of citizens putting pressure on their governments to enact laws protecting a right to repair. Definition Right to repair refers to the concept that end users, business users as well as consumers, of technical, electronic or automotive devices should be allowed to freely repair these products. Four requirements are of particular importance: the device should be constructed and designed in a manner that allows repairs to be made easily; end users and independent repair providers should be able to access original spare parts and necessary tools (software as well as physical tools) at fair market conditions; repairs should, by design, be possible and not be hindered by software programming; and the repairability of a device should be clearly communicated by the manufacturer. The goals of the right to repair are to favor repair instead of replacement, and make such repairs more affordable leading to a more sustainable economy and reduction in electronic waste. Law and policy As of 2021, many countries and economic unions have proposed right to repair legislation. United States In the United States, the right to repair found application in federal and state law: The Magnuson–Moss Warranty Act; a United States fe
https://en.wikipedia.org/wiki/DynaMo
DynaMo was a British children's educational programme created in 1998. It was broadcast by the BBC on the BBC Learning Zone. The programme was hosted by the eponymous cartoon dog DynaMo with his friend SlowMo to teach children aged 5–9 about English, maths, science and history. The programme was broadcast on BBC television from 3 October 1998 to 24 September 2001. Programme The concept came about from a BBC survey of 2,800 parents, teachers and children. The survey showed that parents were unwilling to assist children with homework due to not wanting to impose on them or risk upsetting teachers. DynaMo was created as a result. The programme designed for an eight week run on the BBC Learning Zone. It was created by the BBC to be a way for children to enjoy learning by involving cartoon characters and using educational clips from other BBC Education programmes. The programme was designed to follow the British National Curriculum. Hosted by the titular cartoon dog DynaMo and his friend SloMo, the two investigate a certain educational topic each episode. It was designed so that it could be watched by children alone or with their parents. The programme whilst part of Learning Zone would be two hours long. Segments of the programme were also broadcast on the BBC Knowledge programme "K Club". During the winter and summer of 2001, segments of DynaMo would be broadcast on BBC Two during BBC Schools. Web content DynaMo was also used as the face of the BBC's parental assistance website. This was created for parents to assist children with homework. There was also a section called "DynaMo's Den" which included educational games for children. The website was activated on 2 October 1998. References External links DynaMo at Broadcast for Schools BBC Television shows Cartooning 1998 British television series debuts 2001 British television series endings BBC children's television shows British children's animated education television series British television series with l
https://en.wikipedia.org/wiki/Performance%20portability
Performance portability refers to the ability of computer programs and applications to operate effectively across different platforms. Developers of performance portable applications seek to support multiple platforms without impeding performance, and ideally while minimizing platform-specific code. It is a sought after commodity within the HPC (high performance computing) community, however there is no universal or agreed upon way to measure it. There is some contention as to whether portability refers to the portability of an application or the portability of the source code. Performance can be measured in two ways: either by comparing an optimized version of an application with its portable version; or to compare the theoretical peak performance of an application based on how many FLOPs are performed, with the data moved from main-memory to the processor. The diversity of hardware makes developing software that works across a wide variety of machines increasingly important for the longevity of the application. Contentions The term performance portability is frequently used in industry and generally refers to: "(1) the ability to run one application across multiple hardware platforms; and (2) achieving some notional level of performance on these platforms." For example, at the 2016 DOE (United States Department of Energy) Centers of Excellence Performance Portability Meeting,  John Pennycook (Intel), stated “An application is performance portable if it achieves a consistent level of performance [e.g. defined by execution time or other figure of merit, not percentage of peak FLOPS (floating point operations per second] across platforms relative to the best known implementation on each platform.” More directly, Jeff Larkin (NVIDIA) noted that performance portability was when "The same source code will run productively on a variety of different architectures." Performance portability is a key topic of discussion within the HPC (high performance computing) com
https://en.wikipedia.org/wiki/Behali%20Wildlife%20Sanctuary
Behali Wildlife Sanctuary, located in the Biswanath district of Assam is a patch of semi-evergreen forest in the foothills of Eastern Himalayas. This forest is a part of the greater Sonitpur Elephant Reserve and was declared as a reserved forest in 1917. It lies between the two famous protected areas, the Nameri National Park on its west and Kaziranga National Park on its south comprising a total area of 140 km2. Hence it acts as an important corridor for migration of several species between these protected areas mainly the elephants. On 4 May 2022, In The Assam Gazette, The Governor of Assam proposed to declare the Behali Reserved Forest as a Wildlife Sanctuary. It is also recognized as an Important Bird Area in 1994 and a Key Biodiversity Area in 2004. Located between 93°11′30.58″ E and 93°23′21.09″ E longitudes and 26°52′20.08″ N and 26°57′33.17″N latitudes, the area is bordered in the east by the Buroi River, west by Borgang river, the north side is by Papum Reserve of Arunachal Pradesh and several human habitations, tea plantations and paddy fields in the south. With an elevation between 90 metres to 110 metres a.s.l., the forest comprises several highlands and lowlands. The temperature varies between 13 °C to 37 °C and the mean annual rainfall in the forest is about 1800 mm. Landscape and Biodiversity Rivers Borgang and Buroi are the main tributaries flowing through Behali Reserve Forest and drains in the Brahmaputra. Apart from these, there are several other small streams spanning the forest such as Behali, Bedeti, Bihmari, Borajuli, Dikal, Diring, Kochujan, Kolaguri, Naharjan, Nasbor, Sauldhowa, Sukansuti, etc. Flora The flora of the forest has recently been explored. It is known to host a total of 308 native angiosperm species. Several of which are hidden for decades. Three taxa are described as new to science form this forest by the botanist, Dipankar Borah. Of which, Chlorophytum assamicum and Peliosanthes macrophylla var assamensis are endemic t
https://en.wikipedia.org/wiki/Sexual%20system
A sexual system is a pattern of sex allocation or a distribution of male and female function across organisms in a species. Terms like reproductive system and mating system have also been used as synonyms. The distinction between sexual systems is not always clear due to phenotypic plasticity. Sexual systems are viewed as a key factor for genetic variation and reproductive success, and may have also led to the origin or extinction of certain species. Interests in sexual systems go back to Darwin, who found that barnacles contain species that are androdioecious and some that are dioecious. Types of sexual systems In angiosperms there are monomorphic sexual systems where a species has combination of hermaphrodite, male, and/or female flowers on the same plant. Monomorphic sexual systems include monoecy, gynomonoecy, andromonoecy, and trimonoecy. There are also dimorphic sexual systems where individual plants within a species only produce one sort of flower — hermaphrodite, male, or female. Dimorphic sexual systems include dioecy, gynodioecy, androdioecy, and trioecy. Mixed sexual systems are where hermaphrodites coexist with single sexed individuals. This includes androdioecy, gynodioecy, and trioecy. What determines whether a flower is male, female, or hermaphroditic is the presence of a stamen — which contains male gametes — and/or pistil — which contains female gametes. Male ( staminate) flowers only have a stamen. Female (a.k.a. pistillate) flowers only have a pistil. Hermaphrodite (a.k.a. perfect, or bisexual) flowers have both a stamen and pistil. The sex of a single flower may differ from the sex of the whole organism: for example, a plant may have both staminate and pistillate flowers, making the plant as a whole a hermaphrodite. Hence although all monomorphic plants are hermaphrodites, different combinations of flower types (staminate, pistillate, or perfect) produces distinct monomorphic sexual systems. (See Plant reproductive morphology for further d
https://en.wikipedia.org/wiki/Dynamin%20superfamily
Dynamin Superfamily Protein (DSP) is a protein superfamily includes classical dynamins, GBPs, Mx proteins, OPA1, mitofusins in Eukaryote, and bacterial dynamin-like proteins (BDLPs) in Prokaryote. DSPs mediate eukaryotic membrane fusion and fission necessary for endocytosis, organelle biogenesis and maintenance, Mitochondrial fusion and fission, as well as for prokaryotic cytokinesis. Structure All DSPs have two common domains: a GTPase domain and an elongated α-helical bundle domain. References External links Cellular processes EC 3.6.5
https://en.wikipedia.org/wiki/List%20of%20Samsung%20tablets
This is a list of tablets produced by Samsung. Samsung announced its first tablet, the Android-powered Galaxy Tab 7.0, in September 2010. Since then, it has produced a number of tablets, including the Galaxy Tab series, the Galaxy Book series, and the Galaxy View series. It has also released three tablets under the Galaxy Note moniker, a brand that was also used for releasing a number of smartphones. Samsung has also released a number of co-branded tablets, such as the Nexus 10 (with Google) and a number of Nook-branded Galaxy tablets with Barnes & Noble. Mainstream Android tablets Flagship tablets Samsung Galaxy Tab 7.0 Samsung Galaxy Tab 7.0 Plus Samsung Galaxy Tab 7.7 Samsung Galaxy Tab 8.9 Samsung Galaxy Tab 10.1 Samsung Galaxy Tab 2 7.0 Samsung Galaxy Tab 2 10.1 Samsung Galaxy Tab 3 7.0 Samsung Galaxy Tab 3 8.0 Samsung Galaxy Tab 3 10.1 Samsung Galaxy Tab 4 7.0 Samsung Galaxy Tab 4 8.0 Samsung Galaxy Tab 4 10.1 Samsung Galaxy Note 8.0 Samsung Galaxy Note 10.1 Samsung Galaxy Note 10.1 2014 Edition Samsung Galaxy Note Pro 12.2 Samsung Galaxy Tab Pro 8.4 Samsung Galaxy Tab Pro 10.1 Samsung Galaxy Tab Pro 12.2 Samsung Galaxy Tab S 8.4 Samsung Galaxy Tab S 10.5 Samsung Galaxy Tab S2 8.0 Samsung Galaxy Tab S2 9.7 Samsung Galaxy Tab S3 Samsung Galaxy Tab S4 Samsung Galaxy Tab S5e Samsung Galaxy Tab S6 Samsung Galaxy Tab S6 Lite Samsung Galaxy Tab S7 Samsung Galaxy Tab S7+ Samsung Galaxy Tab S7 FE Samsung Galaxy Tab S8 Samsung Galaxy Tab S8+ Samsung Galaxy Tab S8 Ultra Samsung Galaxy Tab S9 Entry-level tablets Samsung Galaxy Tab 3 Lite 7.0 Samsung Galaxy Tab E 8.4 Samsung Galaxy Tab E 10.5 Samsung Galaxy Tab E 9.6 (T560, T561) Samsung Galaxy Tab E 8.0 (T375, T377) Samsung Galaxy Tab A 8.0 (2015) Samsung Galaxy Tab A 10.1 (2016) Samsung Galaxy Tab A 8.0 (2017) Samsung Galaxy Tab A 8.0 (2018) Samsung Galaxy Tab A 10.5 (2018) Samsung Galaxy Tab A 10.1 (2019) Samsung Galaxy Tab A 8.0 (2019) Samsung Galaxy Tab A 8.0
https://en.wikipedia.org/wiki/Spatial%20Mathematics%3A%20Theory%20and%20Practice%20through%20Mapping
Spatial Mathematics: Theory and Practice through Mapping is a book on the mathematics that underlies geographic information systems and spatial analysis. It was written by Sandra Arlinghaus and Joseph Kerski, and published in 2013 by the CRC Press. Topics The book has 10 chapters, divided into two sections on geodesy and on techniques for visualization of spatial data; each chapter has separate sections on theory and practice. For practical aspects of geographic information systems it uses ArcGIS as its example system. In the first part of the book, Chapters 1 and 2 covers the geoid, the geographic coordinate system of latitudes and longitudes, and the measurement of distance and location. Chapter 3 concerns data structures for geographic information systems, data formatting based on raster graphics and vector graphics, methods for buffer analysis, and its uses in turning point and line data into area data. Later in the book, but fitting thematically into this part, chapter 9 covers map projections. Moving from geodesy to visualization, chapters 4 and 5 concern the use of color and scale on maps. Chapter 6 concerns the types of data to be visualized, and the types of visualizations that can be made for them. Chapter 7 concerns spatial hierarchies and central place theory, while chapter 8 covers the analysis of spatial distributions in terms of their covariance. Finally, chapter 10 covers network and non-Euclidean data. Additional material on the theoretical concepts behind the topics of the book is provided on a web site, accessed through QR codes included in the book. Audience and reception Reviewer reactions to the book were mixed. Several reviewers noted that, for a book with "mathematics" in its title, the book was surprisingly non-mathematical, with both Azadeh Mousavi and Paul Harris calling the title "misleading". Harris complains that "the maths is treated quite lightly and superficially". Alfred Stein notes the almost total absence of mathematical equa
https://en.wikipedia.org/wiki/Execute%20instruction
In a computer instruction set architecture (ISA), an execute instruction is a machine language instruction which treats data as a machine instruction and executes it. It can be considered a fourth mode of instruction sequencing after ordinary sequential execution, branching, and interrupting. Since it is an instruction that operates on other instructions like the repeat instruction, it has also been classified as a meta-instruction. Computer models Many computer families introduced in the 1950s and 1960s include execute instructions: the IBM 709 and IBM 7090 (op code mnemonic: ), the IBM 7030 Stretch (, ), the PDP-1/-4/-7/-9/-15 (), the UNIVAC 1100/2200 (), the CDC 924 (), the PDP-6/-10 (), the IBM System/360 (), the GE-600/Honeywell 6000 (, ), the SDS-9xx (), the SDS 92 (), and the SDS Sigma series (). Fewer 1970s designs include execute instructions: the Nuclear Data 812 minicomputer (1971) (), the HP 3000 (1972) (), and the Texas Instruments TI-990 (1975) and its microprocessor version, the TMS9900 (1976) (). An execute instruction was proposed for the PDP-11 in 1970, but never implemented for it or its successor, the VAX. Modern instruction sets do not include execute instructions because they interfere with pipelining, prefetching, and other optimizations. Semantics The instruction to be executed, the target instruction, may be in a register or fetched from memory. Some architectures allow the target instruction to itself be an execute instruction; others do not. The target instruction is executed as if it were in the memory location of the execute instruction. If, for example, it is a subroutine call instruction, execution is transferred to the subroutine, with the return location being the location after the execute instruction. However, some architectures implement variants of the execute instruction which inhibit branches. The System/360 supports variable-length target instructions. It also supports modifying the target instruction before executing
https://en.wikipedia.org/wiki/Ecological%20overshoot
Ecological overshoot is the phenomenon which occurs when the demands made on a natural ecosystem exceed its regenerative capacity. Global ecological overshoot occurs when the demands made by humanity exceed what the biosphere of Earth can provide through its capacity for renewal. Record of global ecological overshoot To determine whether ecological overshoot is happening requires the collection of global and nation-specific data regarding the availability of natural resources, the capability of the ecosystems to renew any natural resources that were consumed, and the rate at which the resources are being consumed, usually assessed for each calendar year. This data collection, and analysis is typically done by scientific and conservation organisations, such as the Global Footprint Network, which collects data to assess the ecological footprint of each country and the global community. Ecological data collected so far reveals that the global community has been exceeding the regenerative capacity of the Earth since 1970, which was the year when the consumption capacity of humanity first exceeded the biocapacity the Earth. Each year since 1970 humanity has witnessed global ecological overshoot. Earth Overshoot Day This problem is highlighted each year on Earth Overshoot Day, an illustrative calendar date obtained through calculation, on which day humanity's resource consumption for the year is considered to have exceeded the Earth’s capacity to regenerate those resources for that year. Global ecological debt This ecological debt is often referred to as our global 'ecological overshoot'. The data from the Global Footprint Network has been used to create the graph below, it shows that since the 1970s the global population is increasingly compromising the Earth's ecosystem. The red section of the graph indicates that the global population have been accruing a global ecological overshoot since 1970. This means that the rate at which we are using natural resources
https://en.wikipedia.org/wiki/Meme%20Man
Meme Man, sometimes also referred to as Mr. Succ and the Stonks guy, is a character often featured in internet memes. He is depicted as a 3D render of a smooth, bald, and often disembodied blue-eyed male head. He was popularized in the mid-2010s by the artist "Special meme fresh", and became a common character in many surreal memes, a genre of internet humor inspired by surrealism. During the 2021 GameStop short squeeze, Meme Man was popularized by users of the subreddit r/wallstreetbets as the face of the "stonks" meme. The first usage of him as a recurring character was on the Facebook page of the artist "Special meme fresh" starting in 2014, and soon spread to become "one of the only consistent stylistic elements" of the surreal memes aesthetic. On June 5, 2017, the artist uploaded an image of Meme Man overlaid on top of a stock photo of a man in a business suit with arms crossed and a chart pointing upwards behind him, and the caption "Stonks", a deliberate misspelling of the word "stocks". The meme went viral and became a common reaction image on Reddit and Twitter. On February 1, 2019, Elon Musk bought the domain name "stankmemes.com" according to his tweet. In June 2020, when Tesla Inc. shares soared he tweeted "stonks" and the website featured this meme. On August 27, 2020, a tweet by user @trentandrewrld comparing Meme Man to Amazon founder Jeff Bezos went viral, accumulating over 400,000 likes as of July 30, 2021. Elon Musk has used both Meme Man and the "stonks" meme as a reaction on Twitter, and on January 26, 2021, he tweeted the word "Gamestonk!!" with an attached link to r/wallstreetbets. Immediately afterwards, shares in GameStop rose 157 percent in extended-hours trading, which some linked with Musk's tweet. In 2021, the multiplayer video game Fortnite released the playable character "Diamond Hanz", based on the design of Meme Man, as a joke for April Fools Day. See also Rage comic – A meme which uses copies of black-and-white Microsoft Pain
https://en.wikipedia.org/wiki/Sugarbook
Sugarbook is an online dating service that was founded in Kuala Lumpur, Malaysia. Sugarbook is most popular in the Southeast Asian countries of Malaysia, Singapore and Philippines. The site is controversial in Malaysia, the country where it was founded. On February 23, 2021, Sugarbook founder and CEO, Darren Chan was arrested by Malaysian police and put in lockup for 10 days, as authorities in the Muslim-majority country believed that Chan had violated anti-prostitution laws. History Sugarbook was founded by Darren Chan in Kuala Lumpur, Malaysia in 2016. The site focuses on connecting "sugar daddies" with "sugar babies." The "sugar babies" can register for free, while the "sugar daddies" pay membership fees to find matches. Controversy Formula One sponsorship In 2018, Sugarbook had sponsored a party as part of the Singapore Tourism Board's Formula One-themed Sky Grande Prix event, but it was cancelled due to the controversial nature of the company's platform. Arrest of founder and ban in Malaysia On February 23, 2021, Sugarbook Founder and CEO, Darren Chan was arrested and put in lockup for 10 days. The arrest was internationally condemned, prompting attorneys and netizens to questions its legality. Chan later pleaded not guilty to the charges. Sugarbook was also blocked by Malaysian ISPs, but users in Malaysia found ways to bypass the blocks, such as using VPNs. There was a public outcry across the Asia-Pacific region, with the media publishing articles about the controversy in Thailand, Singapore, and Hong Kong. A day after the ban the company circumvented the block by using the URL sucrebook.com. On April 4, 2021, Darren Chan spoke out about the case to VICE News. Chan's arrest also prompted coverage from the BBC, New York Post, Astro AEC, among others. Google Play Store ban As of September 1, 2021, Google has banned Sugarbook and a number of other sugar baby apps from its Google Play store. See also Comparison of online dating services SeekingArrange
https://en.wikipedia.org/wiki/Tautness%20%28topology%29
In mathematics, particularly in algebraic topology, a taut pair is a topological pair whose direct limit of cohomology module of open neighborhood of that pair which is directed downward by inclusion is isomorphic to the cohomology module of original pair. Definition For a topological pair in a topological space , a neighborhood of such a pair is defined to be a pair such that and are neighborhoods of and respectively. If we collect all neighborhoods of , then we can form a directed set which is directed downward by inclusion. Hence its cohomology module is a direct system where is a module over a ring with unity. If we denote its direct limit by the restriction maps define a natural homomorphism . The pair is said to be tautly embedded in (or a taut pair in ) if is an isomorphism for all and . Basic properties For pair of , if two of the three pairs , and are taut in , so is the third. For pair of , if and have compact triangulation, then in is taut. If varies over the neighborhoods of , there is an isomorphism . If and are closed pairs in a normal space , there is an exact relative Mayer-Vietoris sequence for any coefficient module Properties related to cohomology theory Let be any subspace of a topological space which is a neighborhood retract of . Then is a taut subspace of with respect to Alexander-Spanier cohomology. every retract of an arbitrary topological space is a taut subspace of with respect to Alexander-Spanier cohomology. A closed subspace of a paracompactt Hausdorff space is a taut subspace of relative to the Alexander cohomology theory Note Since the Čech cohomology and the Alexander-Spanier cohomology are naturally isomorphic on the category of all topological pairs, all of the above properties are valid for Čech cohomology. However, it's not true for singular cohomology (see Example) Dependence of cohomology theory Example Let be the subspace of which is the union of four sets The first singular cohomo
https://en.wikipedia.org/wiki/Satisfaction%20equilibrium
In game theory, a satisfaction equilibrium is a solution concept for a class of non-cooperative games, namely games in satisfaction form. Games in satisfaction form model situations in which players aim at satisfying a given individual constraint, e.g., a performance metric must be smaller or bigger than a given threshold. When a player satisfies its own constraint, the player is said to be satisfied. A satisfaction equilibrium, if it exists, arises when all players in the game are satisfied. History The term Satisfaction equilibrium (SE) was first used to refer to the stable point of a dynamic interaction between players that are learning an equilibrium by taking actions and observing their own payoffs. The equilibrium lies on the satisfaction principle, which stipulates that an agent that is satisfied with its current payoff does not change its current action. Later, the notion of satisfaction equilibrium was introduced as a solution concept for Games in satisfaction form. Such solution concept was introduced in the realm of electrical engineering for the analysis of quality of service (QoS) in Wireless ad hoc networks. In this context, radio devices (network components) are modelled as players that decide upon their own operating configurations in order to satisfy some targeted QoS. Games in satisfaction form and the notion of satisfaction equilibrium have been used in the context of the fifth generation of cellular communications (5G) for tackling the problem of energy efficiency, spectrum sharing and transmit power control. In the smart grid, games in satisfaction form have been used for modelling the problem of data injection attacks. Games in Satisfaction Form In static games of complete, perfect information, a satisfaction-form representation of a game is a specification of the set of players, the players' action sets and their preferences. The preferences for a given player are determined by a mapping, often referred to as the preference mapp
https://en.wikipedia.org/wiki/A%20History%20of%20Mathematical%20Notations
A History of Mathematical Notations is a book on the history of mathematics and of mathematical notation. It was written by Swiss-American historian of mathematics Florian Cajori (1859–1930), and originally published as a two-volume set by the Open Court Publishing Company in 1928 and 1929, with the subtitles Volume I: Notations in Elementary Mathematics (1928) and Volume II: Notations Mainly in Higher Mathematics (1929). Although Open Court republished it in a second edition in 1974, it was unchanged from the first edition. In 1993, it was published as an 820-page single volume edition by Dover Publications, with its original pagination unchanged. The Basic Library List Committee of the Mathematical Association of America has listed this book as essential for inclusion in undergraduate mathematics libraries. It was already described as long-awaited at the time of its publication, and by 2013, when the Dover edition was reviewed by Fernando Q. Gouvêa, he wrote that it was "one of those books so well known that it doesn’t need a review". However, some of its claims on the history of the notations it describes have been subsumed by more recent research, and its coverage of modern mathematics is limited, so it should be used with care as a reference. Topics The first volume of the book concerns elementary mathematics. It has 400 pages of material on arithmetic. This includes the history of notation for numbers from many ancient cultures, arranged by culture, with the Hindu–Arabic numeral system treated separately. Following this, it covers notation for arithmetic operations, arranged separately by operation and by the mathematicians who used those notations (although not in a strict chronological ordering). The first volume concludes with 30 pages on elementary geometry, including also the struggle between symbolists and rhetoricians in the 18th and 19th centuries on whether to express mathematics in notation or words, respectively. The second volume is divided more
https://en.wikipedia.org/wiki/P-i%20mechanism
The p-i concept refers to the pharmacological interaction of drugs with immune receptors. It explains a form of drug hypersensitivity, namely T cell stimulation, which can lead to various acute inflammatory manifestations such as exanthems, eosinophilia and systemic symptoms, Stevens–Johnson syndrome, toxic epidermal nercrolysis, and complications upon withdrawing the drug. Principle The p-i concept links pharmacology with immunology: It implies that drugs bind directly, as an off-target activity to immune receptors which results in various forms of T cell stimulations. P-i thus starts with an off-target pharmacological activity of the drug followed by a cascade of immunological events which always starts with T cell activation, even if the drug did not bind to the T cell itself but to an antigen presenting cell (APC). The drug bindings occur by non-covalent bonds (e.g. Hydrogen bonds, electrostatic interactions, van der Waals forces) to some of the highly polymorphic T cell receptors for antigen (TCR) and / or human leukocyte antigens (HLA). The binding occurs mostly on the cell surface and is labile, reversible and transient. It interacts with the crucial molecules of antigen dependent T cell activation, which may alter the self-HLA to make it look like an allo-HLA-allele, to which T cells strongly react; Some drug binding to TCR itself may – together with HLA-peptide interaction – elicit TCR-CDR signalling or alter the TCR conformation, thereby enhancing its interaction with HLA-peptide (allogeneic effect). Certain drugs may not only interact with the immune receptors on the surface but also inside the cell (endoplasmic reticulum e.g. Abacavir to HLA-B*57:01). This may cause a change of presented peptides (altered peptide model). The polymorphism of the immune receptors explains to a large extent the notoriously unpredictable “idiosyncrasy” of drug hypersensitivity reactions (DHR), as some of the individually distinct protein sequences may bind the drug bette
https://en.wikipedia.org/wiki/Near-field%20radiative%20heat%20transfer
Near-field radiative heat transfer (NFRHT) is a branch of radiative heat transfer which deals with situations for which the objects and/or distances separating objects are comparable or smaller in scale or to the dominant wavelength of thermal radiation exchanging thermal energy. In this regime, the assumptions of geometrical optics inherent to classical radiative heat transfer are not valid and the effects of diffraction, interference, and tunneling of electromagentic waves can dominate the net heat transfer. These "near-field effects" can result in heat transfer rates exceeding the blackbody limit of classical radiative heat transfer. History The origin of the field of NFRHT is commonly traced to the work of Sergei M. Rytov in the Soviet Union. Rytov examined the case of a semi-infinite absorbing body separated by a vacuum gap from a near-perfect mirror at zero temperature. He treated the source of thermal radiation as randomly fluctuating electromagnetic fields. Later in the United States, various groups theoretically examined the effects of wave interference and evanescent wave tunneling. In 1971, Dirk Polder and Michel Van Hove published the first fully correct formulation of NFRHT between arbitrary non-magnetic media. They examined the case of two half-spaces separated by a small vacuum gap. Polder and Van Hove used the fluctuation-dissipation theorem to determine the statistical properties of the randomly fluctuating currents responsible for thermal emission and demonstrated definitively that evanescent waves were responsible for super-Planckian (exceeding the blackbody limit) heat transfer across small gaps. Since the work of Polder and Van Hove, significant progress has been made in predicting NFRHT. Theoretical formalisms involving trace formulas, fluctuating surface currents, and dyadic Green's functions, have all been developed. Though identical in result, each formalism can be more or less convenient when applied to different situations. Exact soluti
https://en.wikipedia.org/wiki/Perceiver
Perceiver is a transformer adapted to be able to process non-textual data, such as images, sounds and video, and spatial data. Transformers underlie other notable systems such as BERT and GPT-3, which preceded Perceiver. It adopts an asymmetric attention mechanism to distill inputs into a latent bottleneck, allowing it to learn from large amounts of heterogeneous data. Perceiver matches or outperforms specialized models on classification tasks. Perceiver was introduced in June 2021 by DeepMind. It was followed by Perceiver IO in August 2021. Design Perceiver is designed without modality-specific elements. For example, it does not have elements specialized to handle images, or text, or audio. Further it can handle multiple correlated input streams of heterogeneous types. It uses a small set of latent units that forms an attention bottleneck through which the inputs must pass. One benefit is to eliminate the quadratic scaling problem found in early transformers. Earlier work used custom feature extractors for each modality. It associates position and modality-specific features with every input element (e.g. every pixel, or audio sample). These features can be learned or constructed using high-fidelity Fourier features. Perceiver uses cross-attention to produce linear complexity layers and to detach network depth from input size. This decoupling allows deeper architectures. Components A cross-attention module maps a (larger) byte array (e.g., a pixel array) and a latent array (smaller) to another latent array, reducing dimensionality. A transformer tower maps one latent array to another latent array, which is used to query the input again. The two components alternate. Both components use query-key-value (QKV) attention. QKV attention applies query, key, and value networks, which are typically multilayer perceptrons – to each element of an input array, producing three arrays that preserve the index dimensionality (or sequence length) of their inputs. Perceiver
https://en.wikipedia.org/wiki/DOMELRE
DOMELRE (an acronym of Domestic Electric Refrigerator) was one of the first domestic electrical refrigerators, invented by Frederick William Wolf Jr. (1879–1954) in 1913 and produced starting in 1914 by Wolf's Mechanical Refrigerator Company in Chicago. Several hundred units were sold, which made it the most commercially successful product out of several competing designs of its time. The unit replaced the block of ice in the icebox with an electrical-powered cooling device, and was completely automatic. Often labelled as the "first electrical refrigerator" or similar, It has been described as "revolutionary" in the history of domestic refrigeration. History DOLMERE was invented by Frederick William Wolf Jr. (American engineer also known as Fred W. Wolf Jr., 1879-1954), a charter member of the American Society of Refrigerating Engineers, in 1913. An estimated several hundred to thousands of units were produced starting in 1914 by his Mechanical Refrigerator Company in Chicago. Fred Heideman was also involved in the unit's design. In 1916 Wolf sold the rights to the invention to Henry Joy, president of Packard Motor Car Company in Detroit, which released an upgraded version under the name ISKO. Having sold about a thousand more models, Joy's company nonetheless went bankrupt in 1922. Commercially, DOMELRE was described as "a quick hit". The unit was considered relatively inexpensive for its time. The original model was sold for $900 ($24,450 in 2021 dollars); the 1916 model was priced at $385 in 1916 ($9,600 in 2021 dollars), later dropping to $275 ($6,850 in 2021 dollars). 525 were sold. Significance DOMELRE has been described as "revolutionary" in the history of domestic refrigeration. It has been described as the "first domestic refrigerator", the "first household refrigerator", the "first electrical refrigerator", the "first successful, mass marketed package automatic electric refrigeration unit", "the first plug-in refrigeration unit", "the first mass-pro
https://en.wikipedia.org/wiki/Data%20Security%20Law%20of%20the%20People%27s%20Republic%20of%20China
The Data Security Law of the People's Republic of China (; referred to as the Data Security Law or DSL) governs the creation, use, storage, transfer, and exploitation of data within China. The law is seen to be primarily targeted at technology companies which have grown increasingly powerful in China over the years. The law is part of a series of interlocking but related national security legislation including the National Security Law of the People's Republic of China, Cybersecurity Law and National Intelligence Law, passed during Xi Jinping's administration as part of efforts to strengthen national security . Provisions The law controversially requires data localisation of data collected by foreign and domestic entities on Chinese citizens. The law prohibits the export of data by technology companies without first the completion of a "cybersecurity review", the process of which is vague and still being developed. In addition, foreign judicial authorities are prohibited from requesting data on Chinese citizens without first seeking permission from Chinese authorities. Reactions Carolyn Bigg of law firms DLA Piper Hong Kong stated that the law represents: “another important piece in the overall data protection regulatory jigsaw in China”, making it: “complex" and "increasingly onerous" for international businesses to navigate through. Chinese technology company stocks fell in reaction to the passing of the law while tech companies such as Meituan, Alibaba and Ant Financial were all placed under regulatory scrutiny prior to its passing. The law is seen to have wide-ranging implications and is seen as another step in the increasing lawfare between China and the United States in areas of trade, intellectual property and national security since the beginning of the US-China trade war which began in 2016. See also Personal Information Protection Law of the People's Republic of China Cybersecurity Law of the People's Republic of China References Law of the Peo
https://en.wikipedia.org/wiki/Damir%20Novosel
Damir Novosel is the founder and president of Quanta Technology, Raleigh, North Carolina. Novosel got his PhD in electrical engineering from Mississippi State University where he was a Fulbright scholar, after obtaining bachelor's degree from the University of Tuzla and master's degree from University of Zagreb. He was a Vice President of ABB Automation Products, President of IEEE Power & Energy Society, and has authored or coauthored more than 100 articles in transactions, journals, and proceedings. He holds 16 U.S. and international patents. Novosel became a Fellow of the IEEE in 2003, and a member of the National Academy of Engineering in 2014. References Fellow Members of the IEEE Living people Bosnian American Members of the United States National Academy of Engineering 1957 births Mississippi State University alumni University of Zagreb alumni
https://en.wikipedia.org/wiki/List%20of%20environmental%20sampling%20techniques
Environmental sampling techniques are used in biology, ecology and conservation as part of scientific studies to learn about the flora and fauna of a particular area and establish a habitat's biodiversity, the abundance of species and the conditions in which these species live amongst other information. Where species are caught, researchers often then take the trapped organisms for further study in a lab or are documented by a researcher in the field before the animal is released. This information can then be used to better understand the environment, its ecology, the behaviour of species and how organisms interact with one another and their environment. Here is a list of some sampling techniques and equipment used in environmental sampling: Quadrats - used for plants and slow moving animals Techniques for Birds and/or Flying Invertebrates and/or Bats Malaise Trap Flight Interception Trap Harp Trap Robinson Trap Butterfly Net Mist Net Techniques for Terrestrial Animals Transect Tullgren Funnel - used for soil-living arthropods Pitfall Trap - used for small terrestrial animals like insects and amphibians Netting techniques for terrestrial animals Beating Net - used for insects dwelling in trees and shrubs Sweep Netting - used for insects in grasses Aspirator/Pooter - used for insects Camera Trap - used for larger animals Sherman Trap - used for small mammals See also Insect Collecting Wildlife Biology Sampling Sources Scientific method Survey methodology Scientific observation Biological techniques and tools
https://en.wikipedia.org/wiki/Repeat%20instruction
In computer instruction set architectures (ISA), a repeat instruction is a machine language instruction which repeatedly executes another instruction a fixed number of times, or until some condition is met. Since it is an instruction that operates on other instructions like the execute instruction, it has been classified as a meta-instruction. Computer models The Univac 1103 (1953) includes a repeat instruction (op code mnemonic: ) which executes the following instruction a fixed number of times, possibly incrementing one or both of the address fields of that instruction. This compensates for the architecture's lack of index registers. The GE-600/Honeywell 6000 series (1964) supports a single-instruction repeat (), a double-instruction repeat (), and a linked-list repeat (). The x86 ISA, starting with the 8086, includes a series of special-purpose repeat instructions () which are called "repeat string operation prefixes" and may only be applied to a small number of string instructions (). These instructions repeat an operation and decrement a counter until it is zero, or may also stop when a certain condition is met. The Texas Instruments TMS320 digital signal processor (1983) includes an instruction for repeating a single-cycle instruction or two single-cycle instruction in parallel () and an instruction for repeating a block of instructions (). These use special block-repeat counter registers (). Semantics The instruction or instruction pair to be executed follows the repeat instruction. Fields in the instruction determine the loop termination condition. In the case of the TMS320, a block of up to 64Kbytes can be repeated. Notes Central processing unit Instruction processing Instruction set architectures
https://en.wikipedia.org/wiki/Zoom%20Cat%20Lawyer
Zoom Cat Lawyer, also known as I'm Not a Cat, is an Internet meme that refers to a viral video taken from a live stream of a civil forfeiture hearing, and being held on the video conferencing application Zoom in Texas' 394th Judicial District Court. The video features an attorney named Rod Ponton, who is struggling to disable a cat filter that shows a white kitten mask over his face, making it appear as though a cat is speaking. History On February 9, 2021, the YouTube account for the 394th District Court of Texas live-streamed and published a clip entitled "Kitten Zoom Filter Mishap." The video features an attorney, Rod Ponton, who accidentally signed in with a white kitten face filter and is attempting to remove it from his Zoom application. In the video, the kitten's eyes appear to dart back and forth when Ponton says, "I don't know how to remove it. I've got my assistant here and she's trying to." Ponton then attempts to move forward, saying, "I'm prepared to go forward with it." Finally, he says, "I'm here live. I'm not a cat." The post later received 3.6 million views on YouTube and over 26.9 million views on Twitter. Ponton told CNN and the Associated Press that he was using his assistant's 10-year-old desktop computer when he logged on to the civil forfeiture hearing. Ponton claimed his secretary or her daughter had last used the image, but Dell Technologies said that it is more likely that the aging desktop's machine needed a software update. After the clip was posted, Judge Roy Ferguson later shared the clip on Twitter with a tweet being captioned as "IMPORTANT ZOOM TIP: If a child used your computer, before you join a virtual hearing check the Zoom Video Options to be sure filters are off. This kitten just made a formal announcement on a case in the 394th." Reuters reporter Lawrence Hurley later shared the clip on Twitter. Canadian poet Margaret Atwood praised and also shared the tweet with a caption "I on the other hand am a cat. I just can't get this
https://en.wikipedia.org/wiki/Vesna%20Radi%C5%A1i%C4%87
Vesna Radišić is a principal scientist and lead for engineered RF materials at Northrop Grumman. She received the bachelor's degree in Electrical Engineering from University of Belgrade, Serbia in 1991, master's degree from University of Colorado at Boulder in 1993 and Ph.D. degree from UCLA in 1998. Before joining Northrop Grumman in 2002, she worked at Opnext and HRL Laboratories. In 2017, she was elected Fellow of the Institute of Electrical and Electronics Engineers "for contributions to millimeter- and submillimeter-wave sources, amplifiers, and monolithic integrated circuits." References Fellow Members of the IEEE Serbian engineers University of Belgrade School of Electrical Engineering alumni University of Colorado Boulder alumni UCLA Henry Samueli School of Engineering and Applied Science alumni Living people Year of birth missing (living people) Place of birth missing (living people)
https://en.wikipedia.org/wiki/Plasma%20Bigscreen
Plasma Bigscreen is a software project from KDE which contains an interface optimized for Smart TVs and other computers such as the Raspberry Pi which can be connected to large displays. Software The desktop environment is based on KDE Plasma 5. Voice control is provided through integration with Mycroft AI. Plasma Bigscreen supports HDMI-CEC. Availability Plasma Bigscreen is currently available as a KDE Neon-based image, or installable on postmarketOS. See also Plasma Mobile Mycroft (software) References External links Free and open-source software KDE Plasma
https://en.wikipedia.org/wiki/OrthoFinder
OrthoFinder is a command-line software tool for comparative genomics. OrthoFinder determines the correspondence between genes in different organisms (also known as orthology analysis). This correspondence provides a framework for understanding the evolution of life on Earth, and enables the extrapolation and transfer of biological knowledge between organisms. OrthoFinder takes FASTA files of protein sequences as input (one per species) and as output provides: Orthogroups Rooted Phylogenetic trees of all orthogroups A rooted species tree for the set of species included in the input dataset Hierarchical orthogroups for each node in the species tree Orthologs between all species Gene duplication events mapped to branches in the species tree Comparative genomic statistics As of August 2021, the tool has been referenced by more than 1500 published studies. See also Bioinformatics Homology (biology) Sequence homology Protein family Sequence clustering References Evolutionary biology Bioinformatics software Phylogenetics
https://en.wikipedia.org/wiki/Mathematics%20of%20apportionment
Mathematics of apportionment describes mathematical principles and algorithms for fair allocation of identical items among parties with different entitlements. Such principles are used to apportion seats in parliaments among federal states or political parties. See apportionment (politics) for the more concrete principles and issues related to apportionment, and apportionment by country for practical methods used around the world. Mathematically, an apportionment method is just a method of rounding fractions to integers. As simple as it may sound, each and every method for rounding suffers from one or more paradoxes. The mathematical theory of apportionment aims to decide what paradoxes can be avoided, or in other words, what properties can be expected from an apportionment method. The mathematical theory of apportionment was studied as early as 1907 by the mathematician Agner Krarup Erlang. It was later developed to a great detail by the mathematician Michel Balinsky and the economist Peyton Young. Besides its application to political parties, it is also applicable to fair item allocation when agents have different entitlements. It is also relevant in manpower planning - where jobs should be allocated in proportion to characteristics of the labor pool, to statistics - where the reported rounded numbers of percentages should sum up to 100%, and to bankruptcy problems. Definitions Input The inputs to an apportionment method are: A positive integer representing the total number of items to allocate. It is also called the house size, since in many cases, the items to allocate are seats in a house of representatives. A positive integer representing the number of agents to which items should be allocated. For example, these can be federal states or political parties. A vector of numbers representing entitlements - represents the entitlement of agent , that is, the amount of items to which is entitled (out of the total of ). These entitlements are often norma
https://en.wikipedia.org/wiki/Shit%20flow%20diagram
A shit flow diagram (also called excreta flow diagram or SFD) is a high level technical drawing used to display how excreta moves through a location, and functions as a tool to identify where improvements are needed. The diagram has a particular focus on treatment of the waste, and its final disposal or use. SFDs are most often used in developing countries. Development In 2012–2013, the World Bank's Water and Sanitation Program sponsored a study on the fecal sludge management of twelve cities with the goal of developing tools for better understanding the flow of excreta through the cities. As a result, Isabel Blackett, Peter Hawkins, and Christiaan Heymans authored The missing link in sanitation service delivery: a review of fecal sludge management in 12 cities. Using this as a basis, a group of excreta management institutions began collaborating in June 2014 to continue development of SFDs. In November 2014, the SFD Promotion Initiative was started with funding from the Bill & Melinda Gates Foundation. Initially funded as a one year project, it was extended in 2015. In September 2019, the focus of the program shifted to scaling up the current methods of producing SFDs to allow for citywide sanitation in South Asia and Africa. As of 2021 more than 140 shit flow diagram reports have been published. The initiative is managed as part of the Sustainable Sanitation Alliance and is supported by the Bill and Melinda Gates Foundation. It is partnered with many nonprofit organizations such as the Centre for Science and Environment, EAWAG, and the Global Water Security & Sanitation Partnership. Use in developing countries The great majority of those living in urban areas, especially the poor, use non-sewer sanitation systems. This poses environmental and health challenges for growing urban areas in developing countries, and many of these countries will need to change their sanitation strategies as their population grows. Using a shit flow diagram allows political leaders
https://en.wikipedia.org/wiki/Chet%20Moritz
Chet T. Moritz is an American neural engineer, neuroscientist, physiologist, and academic researcher. He is a Professor of Electrical and Computer Engineering, and holds joint appointments in the School of Medicine departments of Rehabilitation Medicine, and Physiology & Biophysics at the University of Washington. Moritz's research is focused on neurotechnology including stimulation to restore function after brain and spinal cord injury. His work also includes brain-computer interfaces to control muscle and spinal stimulation. His discoveries have been featured in Nature, MSNBC national news, Wired, Popular Mechanics and local TV news and community outreach videos. He has also been quoted in the New York Times, Newsweek, Scientific American, Forbes, and Science News, and in a news story by Nature. Education Moritz graduated with a bachelor's degree in Zoology from the University of Washington in 1998. He then enrolled at the University of California, Berkeley, and earned his Doctoral Degree in Integrative Biology in 2003. From 2003 till 2004, he served as a Postdoctoral Fellow of Integrative Physiology at the University of Colorado, and subsequently rejoined the University of Washington as a Senior Fellow. Career Following his Postdoctoral fellowship, Moritz joined the faculty at the University of Washington as a Research Assistant Professor in the Department of Physiology & Biophysics in 2009, and was promoted to Assistant Professor of Rehabilitation Medicine in 2010. Along with this appointment, he held secondary appointments as assistant professor in the Department of Physiology and Biophysics. He was promoted to Associate Professor in 2014, and later joined the Department of Electrical & Computer Engineering in 2018. Since 2010, he has been a member of the Graduate Faculty, and a mentor for the Neuroscience Graduate Program. Research Moritz has worked in the area of neurotechnology, neuromodulation, brain-computer interfaces, and home rehabilitation physical
https://en.wikipedia.org/wiki/Plethystic%20exponential
In mathematics, the plethystic exponential is a certain operator defined on (formal) power series which, like the usual exponential function, translates addition into multiplication. This exponential operator appears naturally in the theory of symmetric functions, as a concise relation between the generating series for elementary, complete and power sums homogeneous symmetric polynomials in many variables. Its name comes from the operation called plethysm, defined in the context of so-called lambda rings. In combinatorics, the plethystic exponential is a generating function for many well studied sequences of integers, polynomials or power series, such as the number of integer partitions. It is also an important technique in the enumerative combinatorics of unlabelled graphs, and many other combinatorial objects. In geometry and topology, the plethystic exponential of a certain geometric/topologic invariant of a space, determines the corresponding invariant of its symmetric products. Definition, main properties and basic examples Let be a ring of formal power series in the variable , with coefficients in a commutative ring . Denote by the ideal consisting of power series without constant term. Then, given , its plethystic exponential is given by where is the usual exponential function. It is readily verified that (writing simply when the variable is understood): Some basic examples are: In this last example, is number of partitions of . The plethystic exponential can be also defined for power series rings in many variables. Product-sum formula The plethystic exponential can be used to provide innumerous product-sum identities. This is a consequence of a product formula for plethystic exponentials themselves. If denotes a formal power series with real coefficients , then it is not difficult to show that:The analogous product expression also holds in the many variables case. One particularly interesting case is its relation to integer partitio
https://en.wikipedia.org/wiki/Armley%20Hippo
The Armley Hippo, previously known as the Leeds Hippopotamus, is a partial skeleton of a common hippopotamus (Hippopotamus amphibius) consisting of 122 bones, of which 25 were taxidermy-mounted in 2008 by James Dickinson for display at Leeds City Museum in Leeds, West Yorkshire, England. The skeleton dates to the last interglacial (Eemian) around 130,000 to 115,000 years ago. The bones were discovered between 1851 and 1852 by workmen digging clay at Longley's brickfield in Wortley, Leeds (now Armley). Astonished at the size of the remains, they brought the larger bones to Henry Denny, the curator at the Leeds Philosophical Society's former museum in Park Row, Leeds. Denny visited the brickfield and retrieved many more bones, although some of the smaller bones had been lost. The remains discovered at the site in 1851 included parts of four hippopotami (including the Armley Hippo), a woolly mammoth and an aurochs. In 1852, the bones of two more hippopotami were found there. The discovery impressed the antiquarians of the Victorian era, because it was rare to find remains of the hippopotamus so far north in the world, and because Leeds Museum was "probably now in possession of the most extensive series of hippopotamic remains of any provincial museum in the kingdom". It has been suggested that, at a time when the climate was warmer and some of the continents that are now separate were joined together, the Armley Hippo or its ancestors may have travelled north along watercourses from Africa to the land that is now England, and that early humans may have co-existed with some of the hippopotami found in Yorkshire. The Armley Hippo skeleton has long captured the public imagination. It has been on display, first as a pile of bones, and then as a mount, in various museum locations in Leeds since it was discovered. In the 19th century, it was the subject of lectures and papers and is still sometimes the subject of newspaper articles. Today it is often used as an educationa
https://en.wikipedia.org/wiki/Walther%20graph
In the mathematical field of graph theory, the Walther graph, also called the Tutte fragment, is a planar bipartite graph with 25 vertices and 31 edges named after Hansjoachim Walther. It has chromatic index 3, girth 3 and diameter 8. If the single vertex of degree 1 whose neighbour has degree 3 is removed, the resulting graph has no Hamiltonian path. This property was used by Tutte when combining three Walther graphs to produce the Tutte graph, the first known counterexample to Tait's conjecture that every 3-regular polyhedron has a Hamiltonian cycle. Algebraic properties The Walther graph is an identity graph; its automorphism group is the trivial group. The characteristic polynomial of the Walther graph is : References Individual graphs Bipartite graphs Planar graphs Hamiltonian paths and cycles
https://en.wikipedia.org/wiki/Takeuti%E2%80%93Feferman%E2%80%93Buchholz%20ordinal
In the mathematical fields of set theory and proof theory, the Takeuti–Feferman–Buchholz ordinal (TFBO) is a large countable ordinal, which acts as the limit of the range of Buchholz's psi function and Feferman's theta function. It was named by David Madore, after Gaisi Takeuti, Solomon Feferman and Wilfried Buchholz. It is written as using Buchholz's psi function, an ordinal collapsing function invented by Wilfried Buchholz, and in Feferman's theta function, an ordinal collapsing function invented by Solomon Feferman. It is the proof-theoretic ordinal of several formal theories: , a subsystem of second-order arithmetic -comprehension + transfinite induction IDω, the system of ω-times iterated inductive definitions Despite being one of the largest large countable ordinals and recursive ordinals, it is still vastly smaller than the proof-theoretic ordinal of ZFC. Definition Let represent the smallest uncountable ordinal with cardinality . Let represent the th epsilon number, equal to the th fixed point of Let represent Buchholz's psi function References Proof_theory Ordinal_numbers Set_theory
https://en.wikipedia.org/wiki/Retrieval%20Data%20Structure
In computer science, a retrieval data structure, also known as static function, is a space-efficient dictionary-like data type composed of a collection of (key, value) pairs that allows the following operations: Construction from a collection of (key, value) pairs Retrieve the value associated with the given key or anything if the key is not contained in the collection Update the value associated with a key (optional) They can also be thought of as a function for a universe and the set of keys where retrieve has to return for any value and an arbitrary value from otherwise. In contrast to static functions, AMQ-filters support (probabilistic) membership queries and dictionaries additionally allow operations like listing keys or looking up the value associated with a key and returning some other symbol if the key is not contained. As can be derived from the operations, this data structure does not need to store the keys at all and may actually use less space than would be needed for a simple list of the key value pairs. This makes it attractive in situations where the associated data is small (e.g. a few bits) compared to the keys because we can save a lot by reducing the space used by keys. To give a simple example suppose video game names annotated with a boolean indicating whether the game contains a dog that can be petted are given. A static function built from this database can reproduce the associated flag for all names contained in the original set and an arbitrary one for other names. The size of this static function can be made to be only bits for a small which is obviously much less than any pair based representation. Examples A trivial example of a static function is a sorted list of the keys and values which implements all the above operations and many more. However, the retrieve on a list is slow and we implement many unneeded operations that can be removed to allow optimizations. Furthermore, we are even allowed to return junk if the quer
https://en.wikipedia.org/wiki/Grating-coupled%20interferometry
Grating-coupled interferometry (GCI) is a biophysical characterization method mainly used in biochemistry and drug discovery for label-free analysis of molecular interactions. Similar to other optical methods such as surface plasmon resonance (SPR) or bio-layer interferometry (BLI), it is based on measuring refractive index changes within an evanescent field near a sensor surface. After immobilizing a target to the sensor surface, analyte molecules in solution which bind to that target cause a small increase in local refractive index. By monitoring these refractive changes over time characteristics such as kinetic rates and affinity constants of the analyte-target binding, or analyte concentrations, can be determined. Explanation GCI is based on phase-shifting waveguide interferometry. Light of the sensing arm of the interferometer is coupled into a monomode waveguide through a first grating, and undergoes a phase change until it reaches a second grating, depending on the local refractive index within the evanescent field (see image). The second grating is used for coupling in light of the reference arm of the interferometer, and interference created by the superposition of the sensing and reference waves after the second grating translates the phase changes into an intensity modulation. By rapid phase modulation of one of the arms using a liquid crystal element, and thanks to the long interaction length with the sample, extremely high sensitivities with respect to surface refractive index can be achieved even at acquisition rates above 10Hz. Since the interference is created on chip and not through free-space propagation, a high robustness with respect to ambient disturbances such as vibrations or temperature changes is achieved. References See also Receptor–ligand kinetics Affinity Ligand binding assay Immunoassay Label-free quantification Electromagnetism Nanotechnology Spectroscopy Biochemistry methods Biophysics Forensic techniques Protein–protein
https://en.wikipedia.org/wiki/Fungus%20pocket
Fungus pockets are any of various convergently evolved inoculum-retention and -cultivation organs in a wide range of insect taxa. They are generally divided into mycangia (or "mycetangia") and infrabuccal pockets. Fungus pockets are found in ambrosia beetles, bark beetles, termites and attine ants. References Insect morphology Mycology Symbiosis
https://en.wikipedia.org/wiki/Vaccine%20resistance
Vaccine resistance is the evolutionary adaptation of pathogens to infect and spread through vaccinated individuals, analogous to antimicrobial resistance. It concerns both human and animal vaccines. Although the emergence of a number of vaccine resistant pathogens has been well documented, this phenomenon is nevertheless much more rare and less of a concern than antimicrobial resistance. Vaccine resistance may be considered a special case of immune evasion, from the immunity conferred by the vaccine. Since the immunity conferred by a vaccine may be different from that induced by infection by the pathogen, the immune evasion may also be easier (in case of an inefficient vaccine) or more difficult (would be the case of the universal flu vaccine). We speak of vaccine resistance only if the immune evasion is a result of evolutionary adaptation of the pathogen (and not a feature of the pathogen that it had before any evolutionary adaptation to the vaccine) and the adaptation is driven by the selective pressure induced by the vaccine (this would not be the case of an immune evasion that is the result of genetic drift that would be present even without vaccinating the population). Some of the causes advanced for less frequent emergence of resistance are that vaccines are mostly used for prophylaxis, that is before infection occurs, and usually act to suppress the pathogen before the host becomes infectious most vaccines target multiple antigenic sites of the pathogen different hosts may produce different immune responses to the same pathogen For diseases that confer long lasting immunity after exposure, typically childhood diseases, it was argued that a vaccine may provide the same immune response as natural infection, so it is expected that there should be no vaccine resistance. If vaccine resistance emerges the vaccine may retain some level of protection against serious infection, possibly by modifying the immune response of the host away from immunopathology. T
https://en.wikipedia.org/wiki/Virtually%20Live
Virtually Live is a patented media method and system that uses visualization technology and telemetry to enable a fan experience of virtually attending live events and interact with them across multiple devices and platforms, creating an immersive and socially interactive experience. Features The Virtually Live media method and system allows for the real time visualization of live data for the purpose of producing a live CGI stream with very low latency. The inventors’ concept was to recreate live sporting and entertainment events in hyper-realistic scenery and allow users to participate in real time rather than just passively watch. Virtually Live is compatible with HTC Vive and Oculus Rift. Development and patents Jamil El-Imad and Jesús Hormigo Cebolla conceived the Virtually Live method and system in 2008. Their idea was to create a media method that would take all the active elements of an event and transpose it in real time to a platform whereby people could feel a ‘sense of presence’ in the event. The media method would “capture all the telemetry and motion of an event, place it in a simulator, then bring the fans in to experience it.” Their technology was invented and patented globally from 2009 onwards. In 2010, the European Patent Office granted patents across 38 designated states: Albania, Austria, Belgium, Bosnia & Herzegovina, Bulgaria, Switzerland/Liechtenstein, Cyprus, Czech Republic, Germany, Denmark, Estonia, Spain, Finland, France, the United Kingdom, Greece, Croatia, Hungary, Ireland, Iceland, Italy, Lithuania, Luxembourg, Latvia, Monaco, Macedonia, Malta, Netherlands, Norway, Poland, Portugal, Romania, Serbia, Sweden, Slovenia, Slovakia, and Turkey. In 2011, the patent was granted in South Africa. In 2012, patents were granted in Singapore and the USA. Applications in sports In 2016, the first proof of concept was with the Scottish Professional Football League which used the platform to test a live football broadcast in virtual reality at
https://en.wikipedia.org/wiki/Samuel%20Lubkin
Samuel Lubkin (1906-1972) was a mathematician and computer scientist instrumental in the early history of computing. Life Lubkin studied mathematics at Cooper Union in New York City, and was president of the Cooper Union Mathematics Club in the 1923-1924 academic year. He received a PhD in applied mathematics from Courant Institute of Mathematical Sciences. He later went on to work on the design of the ENIAC computer while at the Moore School of Electrical Engineering at the University of Pennsylvania. Lubkin afterwards joined the US Army's Ballistic Research Laboratory to work with other ENIAC designers on the design of the EDVAC computer's programming system, It has been claimed that the "Operating Manual for the EDVAC", which was authored by Lubkin, was "the bible of the computer industry in the late 1940s and early 1950s". After that he joined the design team who went on to build the first UNIVAC computer. In the 1940s, Reeves Instrument Corporation hired Lubkin to lead a project designing their first digital computer. Reeves later decided to build analogue computers instead (which ultimately resulted in the Reeves Electronic Analog Computer series of machines), and Lubkin left the company for a job in the digital computer division of the National Bureau of Standards (the US government organization later renamed the National Institute of Standards and Technology). The bureau essentially hired Lubkin to replicate his design for the EDVAC, and this would go on to become the bureau's SEAC computer. Electronic Computer Corporation Within a few months, Lubkin left the bureau, and started his own company with Murray Pfefferman, who had been part of the SEAC design team, with Lubkin as president. This was the Electronic Computer Corporation. The company was established in Brooklyn, New York, as that is where Lubkin's extended family lived. Even as a fledgling enterprise, the company was able to hire several very experienced engineers who had a pedigree in large
https://en.wikipedia.org/wiki/Landsupport
Landsupport (spelling: LANDSUPPORT) is a pilot consulting project funded by the European Union for land use for the near-natural modeling of different types and methods of land use while at the same time protecting the environment. Project goal In the long term, sustainable use of the soil must be guaranteed in order to meet the needs of the world's population. The project brings together numerous universities, research institutions, companies and stakeholders with the aim of creating a web-based, free system to support practical agriculture and land users in making decisions about sustainable land use, environmental protection and agricultural use. With the active participation of various and numerous stakeholders in and outside Europe, the consortium also aims at legislation at European level, based on scientific data that is processed and modeled in the system. In the research framework program Horizon 2020, the project is organized under the direction of Fabio Terribile at the University of Naples Federico II. Project Consortium The Landsupport consortium consists of the following partners: University of Naples, Italy ARIESPACE, Italy Barcelona Supercomputing Center, Spain University of Natural Resources and Life Sciences, Vienna, Austria Consiglio Nazionale delle Ricerche, Italy Crops for the Future, Malaysia ICARDA, Tunisia Institute of Advanced Studies, Hungary Institute for Environmental Protection and Research, Italy Rasdaman GmbH, Germany Joint Research Center, European Commission Regione Campania, Italy University of Milan, Italy Zala County, Hungary CMAST / Modis, Belgium Acteon, France Federal Environment Agency, Austria Slovenian Forestry Institute, Slovenia Results and advice The results of the investigations are internationally evaluated by the members in specialist committees and made available to practice and the responsible bodies at regional and state level, as well as to the European Uninion for legislative and approval procedures. See
https://en.wikipedia.org/wiki/SWIM%20Protocol
The Scalable Weakly Consistent Infection-style Process Group Membership (SWIM) Protocol is a group membership protocol based on "outsourced heartbeats" used in distributed systems, first introduced by Indranil Gupta in 2001. It is a hybrid algorithm which combines failure detection with group membership dissemination. Protocol The protocol has two components, the Failure Detector Component and the Dissemination Component. The Failure Detector Component functions as follows: Every T''' time units, each node () sends a ping to random other node () in its membership list. If receives a response from , is decided to be healthy and N1 updates its "last heard from" timestamp for to be the current time. If does not receive a response, contacts k other nodes on its list (), and requests that they ping . If after T units of time: if no successful response is received, marks as failed. The Dissemination Component functions as follows: Upon detecting a failed node , sends a multicast message to the rest of the nodes in its membership list, with information about the failed node. Voluntary requests for a node to enter/leave the group are also sent via multicast. Properties The protocol provides the following guarantees: Strong Completeness: Full completeness is guaranteed (e.g. the crash-failure of any node in the group is eventually detected by all live nodes). Detection Time: The expected value of detection time (from node failure to detection) is , where is the length of the protocol period, and is the fraction of non-faulty nodes in the group. Extensions The original SWIM paper lists the following extensions to make the protocol more robust: Suspicion: Nodes that are unresponsive to ping messages are not initially marked as failed. Instead, they are marked as "suspicious"; nodes which discover a "suspicious" node still send a multicast to all other nodes including this mechanism. If a "suspicious" node responds to a ping before some time-ou
https://en.wikipedia.org/wiki/Ontogenetic%20niche%20shift
Ontogenetic niche shift (abbreviated ONS) is an ecological phenomenon where an organism (usually an animal) changes its diet or habitat during its ontogeny (development). During the ontogenetic niche shifting an ecological niche of an individual changes its breadth and position. The best known representatives of taxa that exhibit some kind of the ontogenetic niche shift are fish (e.g. migration of so-called diadromous fish between saltwater and freshwater for purpose of breeding), insects (e.g. metamorphosis between different life stages; such as larva, pupa and imago) and amphibians (e.g. metamorphosis from tadpole to adult frog). A niche shift is thought to be determined genetically, while also being irreversible. Important aspect of the ONS is the fact, that individuals of different stages of a population (e.g. of various age or size) utilize different kind of resources and habitats. The term was introduced in a 1984 paper by biologists Earl E. Werner and James F. Gilliam. Characteristics The ontogenetic niche shift is thought to be determined genetically, while also being irreversible. In complex natural systems the ONS happens multiple times in lifetime of an individual (in some examples the ontogenetic niche shifting can occur continuously). The ontogenetic niche shift varies across species; in some it is hardly visible and gradual (for example a change in diet or in size in mammals and reptiles), while in others it is obvious and abrupt (the metamorphosis of insects, which often results in changing habitat, diet and other ecological conditions). One of the studies suggests that differences in the ONS across species could be (at least to some degree) explained by diversity of traits and functional roles of a species. As a consequence differences in ontogenetic niche shifting are thought to follow some general patterns. Importance For communities It is thought that almost every organism shows some kind of ontogenetic niche shift. The ONS, which is respons
https://en.wikipedia.org/wiki/MotoStudent
MotoStudent is a biennial competition between students from universities around the whole world that consist in that these students design, manufacture and develop a prototype of competition motorcycle over a year and a half. Finally, these prototypes compete in an event at MotorLand Aragón, a circuit situated in Alcañiz, in Aragón, Spain. Since the beginning of the competition, universities from 20 countries have participated in some edition. History This competition was born in Aragón, Spain, becoming an alternative to Formula SAE. On it, students must, on the one hand, present a viable project for the mass production of a motorcycle that they themselves design (calling this part of the competition as MS1), and on the other, manufacture the designed motorcycle, to later evaluate its performance in a final event alongside the rest of the participants (receiving the name of MS2). Initially, the only existing category was for prototypes with petrol engine, being a 125 cc and 2-stroke engine from Gas Gas brand. This first edition, in which 23 teams participated, mostly Spanish and Italian, culminated in autumn 2010, with a final event on the MotorLand Aragón track, where the final event of the competition has been held each edition since. The second edition took place between 2011 and 2012, with lower reception, as the number of registered teams was reduced to 18. In this new edition the regulations were adapted to become similar to the newly created moto3 category, replacing the engine used in the previous edition by a 4-stroke and 250 cc, this time, made by Yamaha. In the third edition, held between 2013 and 2014, the number of participating teams increased to 33, consolidating this event at an international level. Sherco was the brand of the engines supplied to the participants on this occasion. In the fourth edition, which took place between 2015 and 2016, a category for 100% electric prototypes was included for the first time. On this occasion, 35 teams
https://en.wikipedia.org/wiki/Reeves%20Electronic%20Analog%20Computer
The Reeves Electronic Analog Computer (commonly shortened REAC) was a family of early analog computers produced in the United States by Reeves Instrument Corporation from the 1940s through the 1960s. History Origins In the 1940s, Reeves Instrument Corporation began developing ideas for a digital computation machine. They hired mathematician Samuel Lubkin, of the original team who designed the UNIVAC, to lead the project. The original proposal was to build a machine called the REEVAC, which was to have been based on the design of the EDVAC machine, which Lubkin had also done design work on. For unknown reasons, Reeves decided to scrap this approach, and Lubkin left the company for a job with the National Bureau of Standards (the US government organization later renamed the National Institute of Standards and Technology). Reeves then decided to move forward with an analogue computer instead. In 1946, the Office of Naval Research launched a project code named Project Cyclone at Reeves to develop a general purpose analogue computing machine to further Naval objectives — it is unclear if this was the cause of Reeves's change of direction or a consequence. This was the beginning of a 20-year partnership between Reeves and the Navy. For the entire 20-year duration of Project Cyclone, Reeves would continually furnish the Navy with the most recent REAC model. Commercial production In 1948, Reeves began putting the REAC machine into commercial production. The original price was USD $14,320 for the machine itself, but fully loaded with all the necessary peripherals it cost USD $37,000 (about USD $425,000 in 2021 dollars). By 1951, there were more than sixty REAC machines in use at universities, private (usually engineering) companies, and government and military institutions. Today the REAC is credited with proving that a general-purpose analog computer could be a viable commercial product. Notable early adopters included the following: Naval Air Missile Test Center (now
https://en.wikipedia.org/wiki/List%20of%20first%20response%20mnemonics
This article is a list of mnemonics and acronyms related to first responders including community first responders, emergency departments, and other first responders with either low level or no qualifications in the relevant field. This list includes the definition of each item in the mnemonic or acronym. General Incident Reporting M/ETHANE (The common structure for first responders to report information regarding an incident or emergency to superiors or incident command or control systems.) Major incident - Joint consideration between first responders should be conducted to decide whether a major incident (indicating that vast resources or personnel will be needed to deal with the incident) or a standby (indicating that the incident may evolve into a major incident) should be declared. 'M/ETHANE' becomes 'ETHANE' if a major incident is not declared. The date and time of any declaration should be recorded. Exact location - The exact location of the incident should be communicated using a system which can be understood by other first responders or emergency personnel. It is recommended to be as precise as possible. Examples of possible location systems the person reporting the location may use are: an address, latitude and longitude, a grid reference, or (when accepted by local emergency services) a What3words coordinate. Type of incident - The general nature of the incident should then be communicated. Hazards - Current or potential hazards should then be reported. A risk analysis process such as comparing likelihood and severity should guide the person conducting the report as to which hazards or risks are most notable. Access - The number of access and egress routes should be noted, with the best or most practical routes being described in additional detail. Information regarding routes which are inaccessible and potential rendezvous points should also be included in communications. Number of casualties - The number of casualties and their condition/clas
https://en.wikipedia.org/wiki/Call%20of%20Duty%3A%20Vanguard
Call of Duty: Vanguard is a 2021 first-person shooter game developed by Sledgehammer Games and published by Activision. It was released on November 5 for PlayStation 4, PlayStation 5, Windows, Xbox One, and Xbox Series X/S. It serves as the 18th installment in the overall Call of Duty series. Vanguard establishes a storyline featuring the birth of the special forces to face an emerging threat at the end of the war during various theatres of World War II. The game received mixed reviews from critics, with praise towards the entertainment value of the campaign and multiplayer, and the graphics, but criticism for its writing, Zombies mode, and lack of innovation. It failed to meet the sales expectations of Activision. Gameplay Campaign Vanguard's campaign features similar gameplay mechanics previously introduced in Modern Warfare, such as the player being able to mount wielded weapons to flat surfaces, interact with doors and execute takedowns. New gameplay features allow the player the ability to use a more advanced tactical approach in combat such as blind firing from behind cover, breaking through destructible environmental elements or creating new paths to complete objectives by climbing walls. Multiplayer Vanguard's multiplayer mode introduces a new game mode to the series, titled "Champion Hill", a successor to the mode "Gunfight", a 2v2 arena mode previously featured in Call of Duty: Modern Warfare and Call of Duty: Black Ops Cold War. Champion Hill tasks players with surviving as long as possible in a squad-based deathmatch, round-robin tournament. Season 2 of Vanguard introduces "Arms Race", a large-scale game mode where two teams of 12 players attempt to capture five bases, or destroy them; players can also earn cash from kills and complete objectives to buy custom loadouts and killstreaks. A new feature introduced to the Call of Duty series through Vanguard's multiplayer is "Combat Pacing". This allows the player to have more control over the selection
https://en.wikipedia.org/wiki/Theories%20of%20iterated%20inductive%20definitions
In set theory and logic, Buchholz's ID hierarchy is a hierarchy of subsystems of first-order arithmetic. The systems/theories are referred to as "the formal theories of ν-times iterated inductive definitions". IDν extends PA by ν iterated least fixed points of monotone operators. Definition Original definition The formal theory IDω (and IDν in general) is an extension of Peano Arithmetic, formulated in the language LID, by the following axioms: for every LID-formula F(x) The theory IDν with ν ≠ ω is defined as: for every LID-formula F(x) and each u < ν Explanation / alternate definition ID1 A set is called inductively defined if for some monotonic operator , , where denotes the least fixed point of . The language of ID1, , is obtained from that of first-order number theory, , by the addition of a set (or predicate) constant IA for every X-positive formula A(X, x) in LN[X] that only contains X (a new set variable) and x (a number variable) as free variables. The term X-positive means that X only occurs positively in A (X is never on the left of an implication). We allow ourselves a bit of set-theoretic notation: means For two formulas and , means . Then ID1 contains the axioms of first-order number theory (PA) with the induction scheme extended to the new language as well as these axioms: Where ranges over all formulas. Note that expresses that  is closed under the arithmetically definable set operator , while  expresses that  is the least such (at least among sets definable in ). Thus,  is meant to be the least pre-fixed-point, and hence the least fixed point of the operator . IDν To define the system of ν-times iterated inductive definitions, where ν is an ordinal, let  be a primitive recursive well-ordering of order type ν. We use Greek letters to denote elements of the field of . The language of IDν, is obtained from by the addition of a binary predicate constant JA for every X-positive formula that contains at most
https://en.wikipedia.org/wiki/BharatPe
BharatPe is an Indian fintech company that sells digital payment and financial services to small merchants and Grocery stores. History According to Peerzada Abrar of Business Standard, "BharatPe was founded in 2018 by Ashneer Grover and Shashvat Nakrani, with the vision of making financial inclusion a reality for Indian merchants." In 2021, the company acquired Payback India, a "multi-brand loyalty programme" 2023 data theft allegations In 2023 Grover, who has left the company, accused his fellow co-founder Bhavik Koladiya of data theft. Grover claimed that Koladiya, who has since left BharatPe, had stolen data of 150 million users. Investments BharatPe has a stake in Unity Small Finance Bank. References External links Financial services companies established in 2018 Payment service providers Online payments Mobile payments in India
https://en.wikipedia.org/wiki/Popcat
Popcat is an Internet meme originating in October 2020, in a series of videos which showcase two images of a domestic short-haired cat named 'Oatmeal', where one image has its mouth closed and the other has its mouth open, with the second image being edited to give its mouth an 'O' shape. The meme was later created into a popular game. Oatmeal is a cat owned by a Twitter user named Xavier BFB, who first started the meme by posting to a private Discord server a video of Oatmeal chirping at a bug in mid-October 2020. It was then turned into a gif and posted on the reddit subreddit Meow IRL on October 9 by a friend of Xavier BFB. On 10 October, it was reposted onto Twitter where it gained over a million views. This sudden popularity then led to Xavier BFB uploading to Twitter the original video of Oatmeal chirping at a bug on 11 October. However, it would be until it was utilized in music videos on Instragam where the gif was synced to the music to give the belief that Oatmeal was singing, that it would become popular. Its popularity in music videos would also lead the meme to become known as 'wide-mouth singing cat'. Game A game around the meme, called Popcat.click, would be later be launced on 11 December 2020, by three students from the University of Sheffield in the United Kingdom: Freddy Heppell, Joshua O’Sullivan, and Edward Hails. The game revolved around the user clicking on an image of Oatmeal, in which the cat opens its mouth the same way it did in the viral memes. Each click contributes to their user's nation rank on a leaderboard. As of 20 August 2023, the leaderboard consists of 229 nations; with Hong Kong, Taiwan and Thailand being in the top 3; whilst Guinea-Bissau, São Tomé and Príncipe and North Korea are ranked as the bottom three. Spread In a similar way to the online meme, the effects of the COVID-19 pandemic increased its popularity as many people gained more free time due to lockdowns. On 9 February 2021, the game launced an official Twitter
https://en.wikipedia.org/wiki/Ariane%20Next
Ariane Next—also known as SALTO (reusable strategic space launcher technologies and operations)—is the code name for a future European Space Agency rocket being developed in the 2020s by ArianeGroup. This partially reusable launcher is planned to succeed Ariane 6, with an entry into service in the 2030s. The objective of the new launcher is to halve the launch costs compared with Ariane 6. The preferred architecture is that of the Falcon 9 rocket (a reusable first stage landing vertically with a common engine model for the two stages) while using an engine burning a mixture of methane and liquid oxygen. The first technological demonstrators are under development. History The European Space Agency's Ariane 6 launcher is to gradually succeed the Ariane 5 rocket after 2023. Studies on the next generation of European government-funded launcher to follow Ariane 6 started before 2019. The stated priority objective for the new rocket is to halve the cost of launching compared to Ariane 6 with simplified and more flexible launch methods. ArianeGroup was selected by the ESA in 2021 to head two projects: one to develop a new reusable launch vehicle and the other to develop a new liquid propellant rocket engine for the vehicle. More specifically, the two programmes were named "SALTO (reuSable strAtegic space Launcher Technologies & Operations) and ENLIGHTEN (European iNitiative for Low cost, Innovative & Green High Thrust Engine) projects," respectively. ArianeGroup secured funding to begin development of the new reusable launch vehicle in May 2022. Funding for the project will be provided "by the European Commission as a part of the Horizon Europe programme designed to encourage and accelerate innovation" in Europe. In May 2022, the "French Economy Minister Bruno Le Maire said SALTO and ENLIGHTEN would be operational by 2026", and ArianeGroup stated that the target date was achievable. As of May 2022, the SALTO project intended to carry out an initial flight test of a
https://en.wikipedia.org/wiki/Intel%20Arc
Intel Arc is a brand of graphics processing units designed by Intel. These are discrete GPUs mostly marketed for the high-margin PC gaming market. The brand also covers Intel's consumer graphics software and services. Intel Arc is competing with Nvidia's GeForce and AMD's Radeon lines. The Arc-A series for laptops was launched on March 30, 2022, with the A750 and A770 both released in Q3'22. Intel missed their initial Q2 2022 release target, with most discrete Arc GPUs not launching until October 2022. Intel officially launched the Arc Pro workstation GPUs on August 8, 2022. Etymology According to Intel, the brand is named after the concept of story arcs found in video games. Each generation of Arc is named after each letter of the Latin alphabet in ascending order. They begin with A, then B, then C, and so on. The first generation is named Alchemist, while Battlemage, Celestial and Druid are the respective names for the second, third and fourth Arc generations. Graphics processor generations Alchemist Developed under the previous codename "DG2", the first generation of Intel Arc GPUs (codenamed "Alchemist") released on March 30, 2022. It will come in both add-on desktop card and laptop form factors. TSMC manufactures the die, using their N6 process. Alchemist uses the Intel Xe GPU architecture, or more specifically, the Xe-HPG variant. Alchemist supports hardware-based ray tracing, XeSS or supersampling based on neural networks (similar to Nvidia's DLSS), and DirectX 12 Ultimate. Also supported is DisplayPort 2.0 and overclocking. AV1 fixed-function hardware encoder is included in Alchemist GPUs as part of the Intel Quick Sync Video core. Intel confirmed ASTC support has been removed from hardware starting with Alchemist and future Intel Arc GPU microarchitectures will also not support it. Intel Arc Alchemist does not support SR-IOV. Intel Arc Alchemist does not support Direct3D 9 natively, instead falling back on the D3D9On12 wrapper which translates Di
https://en.wikipedia.org/wiki/Evolution%20%28board%20game%29
Evolution is a 2014 board game where 2-6 players build a highly competitive ecosystem of herbivores, carnivores and scavengers. Players adapt their existing species and evolve new ones in response both to the abundance or scarcity of food, but also the behaviour of other species in the ecosystem. The scoring system rewards players whose species have high populations, consume the most food and are the most diverse. It was designed by Dominic Crapuchettes of North Star Games, working with Dmitry Knorre and Sergei Machin, who had previously released a similar game in Russia. Gameplay Over the course of the game, each player will create, feed, adapt and sometimes lose a number of species. Each species consists of body size and population stats and up to 3 (or 2 in a two-player game) trait cards. A species can also hold food tokens and players also have a food bag or screen for storing any food their species ate over the course of the game. At the end of the game players get 1 point for each food token consumed, 1 point for each population point and 1 point for each trait card that is in use. The player with the most points wins. The shared components include the deck of trait cards, the watering hole (which is a shared board that holds food tokens), the supply of food tokens and the species components. Finally there is a first player marker which passes in a clockwise direction each round. The core component of the game is the cards, which are dealt at the beginning of each round according to how many species each player has. They can be used in a number of ways depending on the phase of the turn. There is a food selection phase, where each player secretly selects one card to add food to (or deduct from) the watering hole. There is a card playing phase, when cards can be used either to increase population or body size of one species; to enhance a species with a new trait or to create a new species. Cards may be withheld either to power the intelligence trait during
https://en.wikipedia.org/wiki/Kind%20code
In patent law, a kind code, or WIPO Standard ST.16 code, is a code used on patent documents published by intellectual property offices to distinguish different kinds of patent documents. A kind code includes a letter, and in many cases a number, used to distinguish the kind of patent document (e.g., publication of an application for a utility patent (patent application publication), patent, plant patent application publication, plant patent, or design patent) and the level of publication (e.g., first publication, second publication, or corrected publication). The recommended use is the two-letter country code followed by the patent document number and then the kind code, e.g., "US 7,654,321 B1" for U.S. Patent No. 7,654,321 where there was no previously-published patent application publication, and "US 2003/1234567 A1" for U.S. Patent Application Publication No. 2003/1234567, published in 2003. In the European Patent Office The European Patent Office (EPO) uses kind codes such as the following. Kind codes for patent applications begin with A and include A1, for an application published with a European search report; A2, for an application published without a European search report; and A3, for a later publication of the European search report. Kind codes for granted patents begin with B and chiefly include B1 for a European patent specification (granted patent). In Japan The Japan Patent Office (JPO) uses kind codes including A for publications of patent applications; and B1 and B2 for publications of granted patents. In the United States In the United States, effective January 2, 2001, the kind codes indicate a variety of documents published by the United States Patent and Trademark Office (USPTO), most importantly patent application publications and patents. The kind codes include A1, for a patent application publication (pre-grant publication); B1, for a patent issuing from an application that was not previously published as a pre-grant publication; and B2,
https://en.wikipedia.org/wiki/SerenityOS
SerenityOS is a free and open source desktop operating system that has been in continuous development since 2018. Initially the one-man project of Swedish programmer Andreas Kling, SerenityOS is now developed by a community of hobbyists. The system supports the x86-64 instruction set, features a preemptive kernel, and hosts multiple complex applications including its own web browser, Ladybird, and integrated development environment (IDE). History Andreas Kling previously worked at Nokia and later at Apple on the WebKit team. He began developing the project in part to aid his recovery from addiction, and as such the name of the project derives from the Serenity Prayer. As of 2021, Kling works full-time on SerenityOS, supported by community donations. Features SerenityOS aims to be a modern Unix-like operating system, with a look and feel that emulates 1990s operating systems such as Microsoft Windows and Mac OS. Incorporating third-party code into the system is discouraged. The web browser, for instance, does not use a pre-existing web engine such as WebKit, instead using its own known as LibWeb. There is a collection of ported software, such as GCC, Git and Doom, with varying levels of functionality. Development does not adhere to a release cycle; as such, there are no releases. Additionally, no binary distributions are provided and prospects are expected to build the system from source. The system is written in what the authors call "Serenity C++", a variant of C++ that lacks exceptions and features its own standard library. The relative popularity of SerenityOS compared to other hobbyist systems is in part due to the modest success of Kling's YouTube channel, where he uploads videos of himself developing parts of the system alongside demos and monthly progress updates. Reception Jim Salter of Ars Technica regarded the use of the ext2 file system as his least favorite feature of the operating system. Compared to TempleOS (another operating system well kno
https://en.wikipedia.org/wiki/Motorola%2068000%20Educational%20Computer%20Board
The Motorola 68000 Educational Computer Board (MEX68KECB) was a development board for the Motorola 68000 microprocessor, introduced by Motorola in 1981. It featured the 68K CPU, memory, I/O devices and built-in educational and training software. Hardware CPU: 4-MHz Motorola 68000 RAM: 32KB ROM: 16KB 9600 baud serial port for dumb terminal connection 9600 baud serial port for host computer connection Parallel port for communication and printer connection Audio output for tape storage 24-bit programmable interval timer Wire-wrap area for custom circuitry Required power voltages: -12V, +5V and +12V Software The board has built-in 16K ROM memory containing assembly/disassembly/stepping/monitoring software called TUTOR. The software was operated using command-line interface over a serial link, and provided many commands useful in machine code debugging. Memory contents (including programs) could be dumped via a serial link to a file on the host computer. The file was transferred in Motorola's S-Record format. Similarly, files from host could be uploaded to the board's arbitrary user memory area. Price The price of the Motorola ECB at launch was which was relatively inexpensive for a computer with an advanced for that time 16/32-bit CPU. Use According to the manual, for basic use only a dumb terminal and power source are required. However, it seems that in colleges the board was predominantly used in connection with a time-sharing host computer to teach assembly language programming and other computer science subjects. References MC68000 Educational Computer Board User's Manual External links MC68000 Educational Computer Board User's Manual Early microcomputers Microcomputers Single-board computers
https://en.wikipedia.org/wiki/Crunch%20%28video%20games%29
In the video game industry, crunch (or crunch culture) is compulsory overtime during the development of a game. Crunch is common in the industry and can lead to work weeks of 65–80 hours for extended periods of time, often uncompensated beyond the normal working hours. It is often used as a way to cut the costs of game development, a labour-intensive endeavour. However, it leads to negative health impacts for game developers and a decrease in the quality of their work, which drives developers out of the industry temporarily or permanently. Critics of crunch note how it has become normalized within the game-development industry, to deleterious effects for all involved. A lack of unionization on the part of game developers has often been suggested as the reason crunch exists. Organizations such as Game Workers Unite aim to fight against crunch by forcing studios to honour game developers' labor rights. Description Crunch time vs. crunch culture "Crunch time" is the point at which the team is thought to be failing to achieve milestones needed to launch a game on schedule. The complexity of work flow, reliance on third-party deliverables, and the intangibles of artistic and aesthetic demands in video-game creation create difficulty in predicting milestones. The use of crunch time is also seen to be exploitative of the younger male-dominated workforce in video games, who have not had the time to establish a family and who were eager to advance within the industry by working long hours. In some cases, the drive for crunch may come from the developers themselves as individual developers may want to work extra hours without a mandate to assure their product meets delivery milestones and is of high quality, which can influence other developers to also commit to extra hours or avoid taking time off as to appear slacking. Because crunch time tends to come from a combination of corporate practices as well as peer influence, the term "crunch culture" is often used to discuss
https://en.wikipedia.org/wiki/Tesla%20Dojo
Tesla Dojo is a supercomputer designed and built by Tesla for computer vision video processing and recognition. It will be used for training Tesla's machine learning models to improve its Full Self-Driving (FSD) advanced driver-assistance system. According to Tesla, it went into production in July 2023. Dojo's goal is to efficiently process millions of terabytes of video data captured from real-life driving situations from Tesla's 4+ million cars. This goal led to a considerably different architecture than conventional supercomputer designs. History Tesla operates several massively parallel computing clusters for developing its Autopilot advanced driver assistance system. Its primary unnamed cluster using 5,760 Nvidia A100 graphics processing units (GPUs) was touted by Andrej Karpathy in 2021 at the fourth International Joint Conference on Computer Vision and Pattern Recognition (CCVPR 2021) to be "roughly the number five supercomputer in the world" at approximately 81.6 petaflops, based on scaling the performance of the Nvidia Selene supercomputer, which uses similar components. However, the performance of the primary Tesla GPU cluster has been disputed, as it was not clear if this was measured using single-precision or double-precision floating point numbers (FP32 or FP64). Tesla also operates a second 4,032 GPU cluster for training and a third 1,752 GPU cluster for automatic labeling of objects. The primary unnamed Tesla GPU cluster has been used for processing one million video clips, each ten seconds long, taken from Tesla Autopilot cameras operating in Tesla cars in the real world, running at 36 frames per second. Collectively, these video clips contained six billion object labels, with depth and velocity data; the total size of the data set was 1.5 petabytes. This data set was used for training a neural network intended to help Autopilot computers in Tesla cars understand roads. By August 2022, Tesla had upgraded the primary GPU cluster to 7,360 GPUs. D
https://en.wikipedia.org/wiki/EU%20Cloud%20Code%20of%20Conduct
The EU Cloud Code of Conduct (abbr. "EU Cloud CoC" also known by its extended title "EU Data Protection Code of Conduct for Cloud Service Providers") is a transnational Code of Conduct pursuant Article 40 of the European General Data Protection Regulation (GDPR). The code defines clear requirements for cloud service providers (CSPs) to implement Article 28 GDPR and all its related articles, which covers the processing activities of every type of personal data. Encompassing all cloud service layers (XaaS, which is including IaaS, PaaS, SaaS), the code allows cloud service providers to demonstrate GDPR compliance in their role as processors, which is overseen by an accredited monitoring body, as required by Article 41 GDPR. History The work on the code started in 2012 when former vice president of the European Commission, Neelie Kroes, launched the European Cloud Strategy. In that context, a dedicated working group was created with the task to draft a cloud code of conduct under the Data Protection Directive. One of the primary goals of drafting such code was to increase trust and amplify the adoption of cloud computing across the European Union. The first draft produced by the working group was submitted to its first assessment in January 2015, which was then performed by the Article 29 Working Party. With the introduction of the GDPR, the code had to be adapted accordingly and by 2017, the European Commission fully handed over the project to the industry. Still in 2017, six companies coming from that working group (Alibaba Cloud, Fabasoft, IBM, Oracle, Salesforce and SAP) founded the EU Cloud CoC General Assembly and assigned SCOPE Europe as its monitoring body and secretariat. After several exchanges with supervisory authorities and related revisions, the final version of the EU Cloud CoC was submitted to the Belgian Data Protection Authority for approval in 2019. According to the timestamps of the code versions published on the initiative's website, the c
https://en.wikipedia.org/wiki/John%20Smillie%20%28mathematician%29
John David Smillie (born February 18, 1953 in Ithaca, New York) is an American mathematician, specializing in dynamical systems. Biography His father, David Smillie, was a professor of psychology. John Smillie graduated in 1974 with a B.A. in mathematics from New College of Florida. At the university he graduated with an M.S. in 1975 and a Ph.D. in 1977. His Ph.D. thesis Affinely flat manifolds was supervised by Richard Lashof. From 1977 to 1980 Smillie was an instructor at Princeton University. For the academic year 1980–1981 he was at the Institute for Advanced Study. He was a postdoc for the academic year 1981–1982 at the University of California, Berkeley and for the academic year 1982–1983 at City University of New York (CUNY). At CUNY Smillie was an assistant professor from 1983–1986 and an associate professor from 1986–1989. At Cornell University he was a visiting associate professor from 1986 to 1987, an associate professor from 1987 to December 1990, and a full professor from January 1991 to July 2015, when he became an emeritus professor. At Cornell University he was the chair of the mathematics department from 1999 to 2002. In 2013 he became a professor at the University of Warwick. He is married to the mathematician Karen Vogtmann. The couple moved in 2013 to England and settled in Kenilworth. His research deals with "polygonal billiards and dynamics of flows on Teichmüller space; analysis of algorithms; and diffeomorphisms of surfaces", as well as "translation surfaces and complex dynamics in higher dimensions". Smillie has held visiting positions at several institutions, including the University of Illinois Chicago, the École normale supérieure de Lyon, the Institut des Hautes Études Scientifiques, the Mathematical Sciences Research Institute in Berkeley, the Research Institute for Mathematical Sciences of Kyoto University, and the Mathematical Institute of the Hausdorff Center for Mathematics in Bonn. He has given talks in the USA, Canada, France,
https://en.wikipedia.org/wiki/Ocean%20optics
Ocean optics is the study of how light interacts with water and the materials in water. Although research often focuses on the sea, the field broadly includes rivers, lakes, inland waters, coastal waters, and large ocean basins. How light acts in water is critical to how ecosystems function underwater. Knowledge of ocean optics is needed in aquatic remote sensing research in order to understand what information can be extracted from the color of the water as it appears from satellite sensors in space. The color of the water as seen by satellites is known as ocean color. While ocean color is a key theme of ocean optics, optics is a broader term that also includes the development of underwater sensors using optical methods to study much more than just color, including ocean chemistry, particle size, imaging of microscopic plants and animals, and more. Key terminology Optically deep Where waters are “optically deep,” the bottom does not reflect incoming sunlight, and the seafloor cannot be seen by humans or satellites. The vast majority of the world’s oceans by area are optically deep. Optically deep water can still be relatively shallow water in terms of total physical depth, as long as the water is very turbid, such as in estuaries. Optically shallow Where waters are “optically shallow,” the bottom reflects light and often can be seen by humans and satellites. Here, ocean optics can also be used to study what is under the water. Based on what color they appear to sensors, researchers can map habitat types, including macroalgae, corals, seagrass beds, and more. Mapping shallow-water environments requires knowledge of ocean optics because the color of the water must be accounted for when looking at the color of the seabed environment below. Inherent optical properties (IOPs) Inherent optical properties (IOPs) depend on what is in the water. These properties stay the same no matter what the incoming light is doing (daytime or nighttime, low sun angle or high sun an
https://en.wikipedia.org/wiki/Five-qubit%20error%20correcting%20code
The five-qubit error correcting code is the smallest quantum error correcting code that can protect a logical qubit from any arbitrary single qubit error. In this code, 5 physical qubits are used to encode the logical qubit. With and being Pauli matrices and the Identity matrix, this code's generators are . Its logical operators are and . Once the logical qubit is encoded, errors on the physical qubits can be detected via stabilizer measurements. A lookup table that maps the results of the stabilizer measurements to the types and locations of the errors gives the control system of the quantum computer enough information to correct errors. Measurements Stabilizer measurements are parity measurements that measure the stabilizers of physical qubits. For example, to measure the first stabilizer (), a parity measurement of of the first qubit, on the second, on the third, on the fourth , and on the fifth is performed. Since there are four stabilizers, 4 ancillas will be used to measure them. The first 4 qubits in the image above are the ancillas. The resulting bits from the ancillas is the syndrome; which encodes the type of error that occurred and its location. A logical qubit can be measured in the computational basis by performing a parity measurement on . If the measured ancilla is , the logical qubit is . If the measured ancilla is , the logical qubit is . Error correction It is possible to compute all the single qubit errors that can occur and how to correct them. This is done by calculating what errors commute with the stabilizers. For example, if there is an error on the first qubit and no errors on the others (), it commutes with the first stabilizer . This means that if an X error occurs on the first qubit, the first ancilla qubit will be 0. The second ancilla qubit: , the third: and the fourth . So if an X error occurs on the first qubit, the syndrome will be ; which is shown in the table below, to the right of . Similar calculations are real
https://en.wikipedia.org/wiki/Polymer%20devolatilization
Polymer devolatilization, also known as polymer degassing, is the process of removing low-molecular-weight components such as residual monomers, solvents, reaction by-products and water from polymers. Motivation When exiting a reactor after a polymerization reaction, many polymers still contain undesired low-molecular weight components. These component may make the product unusable for further processing (for example, a polymer solution cannot directly be used for plastics processing), may be toxic, may cause bad sensory properties such as an unpleasant smell or worsen the properties of the polymer. It may also be desirable to recycle monomers and solvents to the process. Plastic recycling can also involve removal of water and volatile degradation products. Basic process types Devolatilization can be carried out when a polymer is in the solid or liquid phase, with the volatile components going into a liquid or gas phase. Examples are: Solid polymer, liquid phase: Extraction of caprolactam from Polyamides with water. Solid polymer, gas phase: Removal of ethylene from Polyethylene via air or nitrogen in silos. Liquid polymer, gas phase: Removal of Styrene from Polystyrene via vacuum. It is usual for different types of devolatilization steps to be combined to overcome limitations in the individual steps. Physical and chemical aspects Thermodynamics The thermodynamic activity of volatiles needs to be higher in the polymer than in the other phase for them to leave the polymer. In order to design such a process, the activity needs to be calculated. This is usually done via the Flory–Huggins solution theory. This effect can be enhanced via higher temperatures or lower partial pressure of the volatile component by applying an inert gas or lower pressure. Diffusion In order to be removed from the polymer, the volatile components need to travel to a phase boundary via diffusion. Because of the low diffusion coefficients of volatiles in polymers, this can be th
https://en.wikipedia.org/wiki/Bot%20prevention
Bot prevention refers to the methods used by web services to prevent access by automated processes. Types of bots Studies suggest that over half of the traffic on the internet is bot activity, of which over half is further classified as 'bad bots'. Bots are used for various purposes online. Some bots are used passively for web scraping purposes, for example, to gather information from airlines about flight prices and destinations. Other bots, such as sneaker bots, help the bot operator acquire high-demand luxury goods; sometimes these are resold on the secondary market at higher prices, in what is commonly known as 'scalping'. Detection techniques and avoidance Various fingerprinting and behavioural techniques are used to identify whether the client is a human user or a bot. In turn, bots use a range of techniques to avoid detection and appear like a human to the server. Browser fingerprinting techniques are the most common component in anti-bot protection systems. Data is usually collected through client-side JavaScript which is then transmitted to the anti-bot service for analysis. The data collected includes results from JavaScript APIs (checking if a given API is implemented and returns the results expected from a normal browser), rendering complex WebGL scenes, and using the Canvas API. TLS fingerprinting techniques categorise the client by analysing the supported cipher suites during the SSL handshake. These fingerprints can be used to create whitelists/blacklists containing fingerprints of known browser stacks. In 2017, Salesforce open sourced its TLS fingerprinting library (JA3). Between August and September 2018, Akamai noticed a large increase in TLS tampering across its network to evade detection. Behaviour-based techniques are also utilised, although less commonly than fingerprinting techniques, and rely on the idea that bots behave differently to human visitors. A common behavioural approach is to analyse a client's mouse movements and determine
https://en.wikipedia.org/wiki/Equals%20Pi
Equals Pi is a painting created by American artist Jean-Michel Basquiat in 1982. The painting was published in GQ magazine in 1983 and W magazine in 2018. History Equals Pi was executed by Jean-Michel Basquiat in 1982, which is considered his most coveted year. The robin egg blue painting contains Basquiat's signature crown motif and a head alongside his characteristic scrawled text with phrases such as "AMORITE," "TEN YEN" and "DUNCE." The title refers to the mathematical equations incorporated on the right side of the work. The cone refers to the pointed dunce caps depicted in the work. The painting was acquired in 1982 by Anne Dayton, who was the advertising manager of Artforum magazine. She purchase it for $7,000 from Basquiat's exhibition at the Fun Gallery in the East Village. At the time the painting was called Still Pi, however, when the work appeared in the March 1983 issue of GQ magazine, it was titled Knowledge of the Cone, which is written on the top of the painting. According to reports in August 2021, the luxury jewelry brand Tiffany & Co. had recently acquired the painting privately from the Sabbadini family, for a price in the range of $15 million to $20 million. The painting, which is the brand's signature blue color, is displayed in the Tiffany & Co. Landmark store on Fifth Avenue in New York City. Although initial reports claimed that the painting was never seen before, it was previously offered at auction twice and had appeared in magazines. The work was first offered at a Sotheby's sale in London in June 1990, where it went unsold. In December 1996, the Sabbadinis, a Milan-based clan behind the eponymous jewelry house, purchased it during a Sotheby's London auction for $253,000. Mother and daughter Stefania and Micól Sabbadini posed in front of the painting in their living room for a 2018 feature in W magazine. Stephen Torton, a former assistant of Basquiat’s posted an Instagram statement saying, “I designed and built stretchers, painted ba
https://en.wikipedia.org/wiki/Hemerochory
Hemerochory (Ancient Greek ἥμερος, hemeros: 'tame, ennobled, cultivated, cultivated' and Greek χωρίς choris: separate, isolated) is the distribution of cultivated plants or their seeds and cuttings, consciously or unconsciously, by humans into an area that they could not colonize through their natural mechanisms of spread, but are able to maintain themselves without specific human help in their new habitat. Hemerochory is one of the main propagation mechanisms of a plant. Hemerochoric plants can both increase and decrease the biodiversity of a habitat. Categorisation Hemerochoric plants are classified according to the manner of introduction into, for example: Ethelochory: the conscious introduction by seed or young plants. Speirochoria: the unintentional introduction by contaminated seed. Examples are the true chamomile and the cornflower. Agochory: the introduction by unintentional transport with, among other things, ships, trains and cars. These plants are common in port areas, roadsides, stations and railways. Division Chronologically the hemerochoric plants are divided in: Archaeophytes: plants that were introduced before the onset of world trade around the year 1500, or before the year 1492 (discovery of America). Neophytes: plants that were introduced later. Related terms Anthropochory is often used synonymously but does not mean exactly the same. Anthropochory is the spread by humans. The spread through domestic animals does not belong to the anthropochoric, but to the hemerochoric, because domestic animals belong to the human culture. Strictly speaking, anthropochoric means the spread through humans as a transport medium. These can also be native species that were either adapted from the outset to locations created by human cultural activity or have adapted to them afterwards; As a result, their area of distribution has often, but not always, increased. The term adventitious plants is sometimes used synonymously with hemerochory, but is often re
https://en.wikipedia.org/wiki/Point-pair%20separation
In a cyclic order, such as the real projective line, two pairs of points separate each other when they occur alternately in the order. Thus the ordering a b c d of four points has (a,c) and (b,d) as separating pairs. This point-pair separation is an invariant of projectivities of the line. The concept was described by G. B. Halsted at the outset of his Synthetic Projective Geometry: Given any pair of points on a projective line, they separate a third point from its harmonic conjugate. A pair of lines in a pencil separates another pair when a transversal crosses the pairs in separated points. See also Separation relation References G. B. Halsted (1906) Synthetic Projective Geometry, Introduction, page 7 via Internet Archive Edward V. Huntington and Kurt E. Rosinger (1932) "Postulates for Separation of Point-Pairs (Reversible order on a closed line)", Proceedings of the American Academy of Arts and Sciences 67(4): 61-145 via JSTOR Bertrand Russell (1903) The Principles of Mathematics, Separation of couples via Internet Archive Projective geometry
https://en.wikipedia.org/wiki/Janice%20Hudgings
Janice A. Hudgings is an American physicist and educator whose research interests include optics and semiconductor devices. She is the Seeley W. Mudd Professor of Physics at Pomona College in Claremont, California. Early life Hudgings attended Swarthmore College, graduating with degrees in math and engineering in 1991. She was selected as a Rhodes Scholar at Oxford University, where she earned an M.Sc. in Mathematics. Hudgings completed her doctorate in electrical engineering at the University of California, Berkeley in 1999. Career Hudgings taught physics at Mount Holyoke College, where she was an associate dean of faculty. She co-founded the thermal imaging company Alenas Imaging, and was its vice president and chief technology officer from 2007 to 2012. In 2013, she came to Pomona College, where she is the Seeley W. Mudd Professor of Physics. Her research interests include optics and semiconductor devices. She was Vice President for Academic Affairs and Dean of the College, a position in which she pursued diversity initiatives. After returning to the faculty, Hudgings was recognized for her innovative teaching and work as a mentor for Claremont Colleges groups promoting women in STEM and LGBTQA+ students in STEM. Recognition Hudgings was awarded a National Science Foundation CAREER Award in 2002. She is an Optical Society of America Fellow, and was awarded the Esther Hoffman Beller Medal in 2004. In 2018, she won Pomona's Wig Distinguished Professor Award, the college's highest faculty honor, in recognition of her teaching. In 2020, Hudgings won the Claremont Colleges' Diversity Mentoring Award. Personal life Hudgings is married to Sharon Stranford, a biology professor at Pomona. She enjoys hiking. References External links Faculty page at Pomona College Research page Year of birth missing (living people) Living people Pomona College faculty American women physicists American physicists Fellows of Optica (society) Women in optics Optical physicists
https://en.wikipedia.org/wiki/Afghan%20Girls%20Robotics%20Team
The Afghan Girls Robotics Team, also known as the Afghan Dreamers, is an all-girl robotics team from Herat, Afghanistan, founded in 2017 by Roya Mahboob and made up of girls between ages 12 and 18 and their mentors. A documentary film featuring members of the team, titled Afghan Dreamers, was released by MTV Documentary Films in 2023. Origins The Afghan Girls Robotics Team was founded in 2017 by Roya Mahboob, who is their coach, mentor and sponsor, and founder of the Digital Citizen Fund (DCF), which is the parent organization for the team. Dean Kamen was planning a 2017 competition in the United States and had recruited Mahboob to form a team from Afghanistan. Out of 150 girls, 12 were selected for the first team. Before parts were sent by Kamen, they trained in the basement of the home of Mahboob's parents, with scrap metal and without safety equipment under the guidance of their coach, Mahboob's brother Alireza Mehraban. 2017 and 2018 In 2017, six members of the Afghan Girls Robotics Team traveled to the United States to participate in the international FIRST Global Challenge robotics competition. Their visas were rejected twice after they made two journeys from Herat to Kabul through Taliban-controlled areas, before officials in the United States government intervened to allow them to enter the United States. Customs officials also detained their robotics kits, which left them two weeks to construct their robot, unlike some teams that had more time. They were awarded a Silver medal for Courageous Achievement. One week after they returned home from the competition, the father of team captain Fatemah Qaderyan, Mohammad Asif Qaderyan, was killed in a suicide bombing. After their United States visas expired, the team participated in competitions in Estonia and Istanbul. Three of the 12 members participated in the 2017 Entrepreneurial Challenge at the Robotex festival in Estonia, and won the competition for their solar-powered robot designed to assist farmers. In