source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/UnionPay%20%28application%29
The app of UnionPay (, literally “Cloud QuickPass”) is a mobile and online payment service, developed and operated by UnionPay, the national Chinese bank card clearing service. Launched in 2017, it was designed to compete with the existing third-party Chinese mobile payment platforms, Alibaba Group's Alipay and Tencent's WeChat Pay. The mobile app allows the user to add their UnionPay bank card, and use it for various types of online and mobile payments, including in-app online payments, QR code payments, as well as contactless payments on NFC-enabled devices using UnionPay's QuickPass feature. History The UnionPay app was launched on 11 December 2017, which was merged from the old UnionPay app and UnionPay Wallet (). Following that, the app has trailed in popularity behind its two major competitors, however, in 2021, the mandate by the Ministry of Industry and Information Technology (MIIT) to open up the "walled garden" ecosystems of the major tech companies, has allowed for increasing interoperability of payment QR codes of Alipay and WeChat Pay in the process ongoing throughout 2021 and 2022. Availability The UnionPay app is available for the followings: holders of the UnionPay cards issued in Mainland China, Hong Kong and Macau; holders of the American Express renminbi cards issued in Mainland China. As of 2021, it can be used internationally in contactless "tap-and-go" mode with supported point of sale terminals in 51 countries and regions, and in 33 countries and regions in when the QR code "scan-and-go" mode is used. References External links (in English) Mobile payments in China Mobile payments Online payments Payment service providers
https://en.wikipedia.org/wiki/Allogeneic%20processed%20thymus%20tissue
Allogeneic processed thymus tissue, sold under the brand name Rethymic, is a thymus tissue medical therapy used for the treatment of children with congenital athymia. It takes six months or longer to reconstitute the immune function in treated people. The most common adverse reactions include high blood pressure, cytokine release syndrome, low blood magnesium levels, rash, low platelets, and graft versus host disease. It was approved for medical use in the United States in October 2021. Allogeneic processed thymus tissue is the first thymus tissue product approved by the U.S. Food and Drug Administration (FDA). Allogeneic processed thymus tissue is composed of human allogeneic (donor-derived) thymus tissue that is processed and cultured, and then implanted into people to help reconstitute immunity (improve immune function) in people who are athymic. Dosing is patient customized, determined by the surface area of the allogeneic processed thymus tissue slices and the body surface area of the patient. Medical uses Allogeneic processed thymus tissue is indicated for immune reconstitution in children with congenital athymia. History The safety and efficacy of allogeneic processed thymus tissue were established in clinical studies that included 105 participants, with ages from one month to 16 years, who each received a single administration of allogeneic processed thymus tissue, from 1993 to 2020. Allogeneic processed thymus tissue improved survival of people with congenital athymia, and most people treated with this product survived at least two years. The U.S. Food and Drug Administration (FDA) granted the application for allogeneic processed thymus tissue a rare pediatric disease voucher and granted approval of Rethymic to Enzyvant Therapeutics, Inc. References Further reading Congenital disorders Immunology Medical treatments Orphan drugs Thymus
https://en.wikipedia.org/wiki/Titan%20Security%20Key
The Titan Security Key is a FIDO-compliant security token developed by Google which contains the Titan M cryptoprocessor which is also developed by Google. It was first released on October 15, 2019. Features Depending on the features, the key costs $25-$35, but Google has provided them for free to high-risk users. It is considered a more secure form of multi-factor authentication to log in to first-party and third-party services and to enroll in Google's advanced protection program. In 2021, Google removed the Bluetooth model due to concerns about its security and reliability. Vulnerabilities The Bluetooth "T1" and "T2" models initially had a security bug that allowed anyone within 30 feet to make a clone of the key. The security firm NinjaLab has been able to extract the key using a side channel attack. In 2019, Google has put a bug bounty up to US$1.5 million on the Titan chip. Newer versions and model numbers include: 1. USB-A/NFC (K9T) 2. Bluetooth/NFC/USB (K13T) 3. USB-C/NFC (YT1) 4. USB-C/NFC supporting U2F and FIDO2 (K40T) While none of these included publicly disclosed security vulnerabilities, Google has discontinued selling Bluetooth versions of the keys in August 2021, although Bluetooth keys continue to work with their warranties honored. References Cryptographic hardware Google hardware
https://en.wikipedia.org/wiki/Moses%20Holden
Moses Holden (21 November 1777 – 3 June 1864) was an English astronomer, known particularly for giving lectures on astronomy. Life Holden was born in Bolton, Lancashire, the second youngest of five children of Thomas Holden, a handloom weaver, and his wife Joyce. As a youth he worked in a foundry at Preston, until disabled by an accident. On his recovery he worked as a landscape gardener. From early in life he possessed a love of astronomy; he collected a library, and gave talks on the subject. In 1814–15 he constructed a large orrery and a magic lantern, made to illustrate his astronomical lectures. These were first given in the Theatre Royal, Preston, in 1815, and then in many towns in the north of England; their success led to his touring throughout (northern) England to give lectures. He lectured at the Theatre Royal, Nottingham, in 1817. In 1826 he devoted the proceeds of one of his lectures to the erection of a monument in St. Michael's Church, Toxteth Park, Liverpool, to the memory of the astronomer Jeremiah Horrocks. In 1818 Holden published A small Celestial Atlas, or Maps of the Visible Heavens, in the Latitude of Britain, (3rd edition 1834, 4th edition 1840). It was one of the earliest works of the kind published at a low price. He also compiled an almanac, published in 1835 and later. He made several microscopes, and made a telescope for the Revd William Carus Wilson. He settled in Preston in 1828, where he gave courses on astronomy until 1852. He assisted in establishing the Preston Institution for the Diffusion of Knowledge, and from 1837 he was an enthusiastic member of the British Association for the Advancement of Science. In 1834 the Freedom of the Borough was conferred on him. Holden died at his home in Jordan Strret, Preston on 3 June 1864, aged 86. References Moses Holden, 1777 - 1864: Preston's Pioneering Astronomer Stephen R. Halliwell (2021) Produced for the University of Central Lancashire by Canopus Publishing Ltd. Attribution
https://en.wikipedia.org/wiki/Dietary%20biology%20of%20the%20tawny%20owl
The tawny owl (Strix aluco) is an opportunistic and generalized predator. Peak hunting activity tends to occur largely between dusk to midnight, with owls often following an erratic hunting pattern, perhaps to sites where previous hunts were successful. When feeding young, hunting may need to be prolonged into daylight in the early morning. Based on hand-reared young owls that re-released into the wild, hunting behaviour is quite innate rather than learned. Normally this owl hunts from a perch. Perching bouts usually last from about 8 to 14 minutes depending largely on habitat. Tawny owl's hunting from a perch or pole can recall a buzzard and the two take similar prey sizes as well. However, high initial speed and maneuvering among trees and bushes with great dexterity may allow it to surprise relatively large prey, more like a goshawk. The tawny owl is capable of lifting and carrying off in flight individual prey weighing up to at least . Their middle talon, the most enlarged claw on owls, measures an average of . While not as large as those of the Ural owl, the talons are extremely sharp, stout and quite decurved. The claws are considered to be visibly more overdeveloped than those of other European mid-sized owls and the footspan including the claws is fairly larger as well, at an average of about . The hunting owl often extends its wings to balance and control prey upon impact. Alternatively, this species may hunt from flight. This occurs from over the ground, often over open habitats such as bushes, marsh or grassland, forming a quartering or zigzag pattern over the opening. During these flights they cover about before changing direction. Hunting from flight was surprisingly prevalent in a Swedish study of two radio-tagged birds, with 34% of study time spent hunting from flight while 40% of the study time was spent on hunting from a perch. In a similar study in England, less than 1% of time was spent hunting from flight. In a more deliberate variation of hunt
https://en.wikipedia.org/wiki/Muhammad%20Hazi
Muhammad Hazi (Arabic: محمد حازي) is an Algerian writer. He graduated from École Normale Supérieure, University Of Science And Technology Houari Boumediene, and Universities of Paris VI and XI (Center of Orsay). He is an associate professor at the National School of Public Works of Kouba, the Polytechnic School of El Harrach, and the Ecole Normale Supérieure of Laghouat. He also worked at the Community College of Rafha in Saudi Arabia. He was a former director of studies and training at École Normale Supérieure in El-Kobba. He was also previously the head of the mathematics department at the same school and still works there as a teacher. Career Apart from this academic career, Hazi has excelled in the field of writing, as he has published more than ten books in various fields mostly centered on science. His book “Key Principles in Topological Concepts” was widely popular and got adopted by educational institutions in Algeria. It is the first book in a trilogy including 'Key Principles in Topological Concepts,' 'Comprehensive Lessons in Metric Spaces,' and 'The Abstract Seat of Semantic Analysis.' Hazi’s second book in the series, “Adequate Lessons in Metric Spaces,” a book in which he reviewed, in the context of metric spaces, the concepts of convergence, continuity, agglutination, and interconnectedness, as well as several famous and important theorems, which are among the main pillars of semantic analysis. His third book titled “Functional analysis bench; Solved Exercises and Practice” is the final in the series. In this book, Hazi focuses on a structural tool, the systematic spaces and their features, and reviews aspects of its applications and ramifications. It was issued in six chapters: Systematic space: definitions and general properties, The space of linear and radial applications, additive families, Hilbertarian spaces, Fourier series, and an introduction to the theory of influences. Each chapter also contains many solved problems and exercises, and oth
https://en.wikipedia.org/wiki/Session%20%28software%29
Session is a cross-platform end-to-end encrypted instant messaging application, focused on confidentiality and anonymity for the user. It is developed by The Oxen Project under the non-profit Oxen Privacy Tech Foundation. It uses a blockchain-based decentralized network for transmission. Users can send one-to-one and group messages, which can include files, voice notes, images and videos. Session offers applications for multiple platforms, including macOS, Windows, and Linux, in addition to mobile clients available on both iOS and Android. Features Session does not require a telephone number or email address to create an account. It uses a randomly generated 66-digit alpha-numeric number for user creation/identification. Communication (messages, voice clips, photos, and files) between users is end-to-end encrypted using the Session protocol. The Loki blockchain network is used by Session for transmissions. There was an independent review by the third party Quarkslab in 2021 that verified these claims. Development Session originally started as a fork of another messenger, Signal, with the idea of building upon its foundation. However, due to concerns about the centralized structure of Signal Protocol and the potential collection of unnecessary metadata, the team decided to deviate from it and instead created their own protocol, called Session Protocol. This approach allowed for increased anonymity and decentralization, but during the development process, the team encountered various challenges, leading to the necessity of abandoning or modifying many features. Limitations Session does not support two-factor authentication. Underlying protocols are still in a developmental phase. After migrating from Signal Protocol to own internally developed protocol, Perfect Forward Secrecy and deniable authentication was not implemented back. References External links Cross-platform software Cryptographic software Free and open-source Android software Free instant me
https://en.wikipedia.org/wiki/Yorkshire%20Mycological%20Committee
The Yorkshire Mycological Committee is a committee within the Yorkshire Naturalists' Union. First formed in 1892, it was the first permanent organisation dedicated to the study of fungi in Great Britain. It was the principal founding organisation of the British Mycological Society. History The Mycological Committee was first founded in 1892 so that the Yorkshire Naturalists' Union might better organise its recording of fungi across Yorkshire via annual 'fungal forays'. The Rev. William Fowler was appointed as its first Chairman with Charles Crossland being appointed its first secretary. George Edward Massee would succeed Fowler and together with Crossland would run the Committee until 1916. The period of Massee's tenure would see the Mycological Committee function completely independently of the British Mycological Society (a national mycological society founded primarily by members of Mycological Committee. This was primarily due to a disagreement of an unknown nature between Massee and Carleton Rea, a prominent figure in the British Mycological Society. By 1903, the Committee was so prominent that it attracted the attention of George Francis Atkinson who attended the 1903 foray as a guest of George Edward Massee. Notably, he did not attend any events hosted by the British Mycological Society. Notable members George Francis Atkinson (1854–1918; visiting member) George Edward Massee (1845–1917) Charles Crossland (1844–1916) James Needham (1849–1913) Kathleen Sampson (1892–1980) Henry Thomas Soppitt (1858–1899) Harold Wager (1862–1929) Roy Watling (b. 1938) References Mycology
https://en.wikipedia.org/wiki/Windows%20App%20SDK
Windows App SDK (formerly known as Project Reunion) is a software development kit (SDK) from Microsoft that provides a unified set of APIs and components that can be used to develop desktop applications for both Windows 11 and Windows 10 version 1809 and later. The purpose of this project is to offer a decoupled implementation of capabilities which were previously tightly-coupled to the UWP app model. Windows App SDK allows native Win32 (USER32/GDI32) or .NET (WPF/WinForms) developers alike a path forward to enhance their apps with modern features. It follows that Windows App SDK is not intended to replace the Windows SDK. By exposing a common application programming interface (API) primarily using the Windows Runtime (WinRT) through generated WinMD metadata, the tradeoffs which once characterized either app model are largely eliminated. NuGet packages for version 1.4 were released in August 2023 after approximately four months of development. Features and components While Microsoft has developed a number of new features, some of the features listed below are abstractions of functionality provided by existing APIs. WinUI 3 Most of the investment into the decoupled UI stack has gone towards bug fixes, improvements to the debugging experience, and simplifying the window management capabilities made possible by switching from CoreWindow. An API abstracting USER32/GDI32 primitives known as AppWindow was introduced to expose a unified set of windowing capabilities and enable support for custom window controls. WebView2 A replacement for the UWP WebView control was announced early on. This is because it was based on an unsupported browser engine. A new Chromium-based control, named WebView2, was developed and can be used from WinUI as well as other supported app types. Packaging While MSIX is included in the Windows App SDK and considered to be the recommended application packaging format, a design goal was to allow for unpackaged apps. These apps can be deployed
https://en.wikipedia.org/wiki/Elephind
Elephind is a search engine for digitized versions of newspapers from various countries, with the goal of making it possible to search all digitized newspapers from a single website. , 3,600,000 newspapers were accessible on the website, many of them not accessible through Google. Function Elephind is a search engine specifically for digitized versions of historical newspapers, allowing the user to freely search across various newspaper archive websites instead of visiting each individual site. When the user clicks on a search result, they are directed to the online archive where it can be accessed. The collection is international, with newspapers from various countries included. , 3,600,000 newspapers were accessible on Elephind. Many of the newspapers are on the deep web and cannot be accessed through other search engines such as Google. Optional registration allows users to bookmark and comment on newspapers. Elephind uses software from Veridian Software, which was spun out of Greenstone. References Online archives Digital preservation Mass digitization Internet search engines
https://en.wikipedia.org/wiki/Hardware%20for%20artificial%20intelligence
Specialized computer hardware is often used to execute artificial intelligence (AI) programs faster, and with less energy, such as Lisp machines, neuromorphic engineering, event cameras, and physical neural networks. As of 2023, the market for AI hardware is dominated by GPUs. Lisp machines Lisp machines were developed in the late 1970s and early 1980s to make Artificial intelligence programs written in the programming language Lisp run faster. Dataflow architecture Dataflow architecture processors used for AI serve various purposes, with varied implementations like the polymorphic dataflow Convolution Engine by Kinara (formerly Deep Vision), structure-driven dataflow by Hailo, and dataflow scheduling by Cerebras. Component hardware AI accelerators Since the 2010s, advances in computer hardware have led to more efficient methods for training deep neural networks that contain many layers of non-linear hidden units and a very large output layer. By 2019, graphics processing units (GPUs), often with AI-specific enhancements, had displaced central processing units (CPUs) as the dominant means to train large-scale commercial cloud AI. OpenAI estimated the hardware compute used in the largest deep learning projects from Alex Net (2012) to Alpha Zero (2017), and found a 300,000-fold increase in the amount of compute needed, with a doubling-time trend of 3.4 months. Artificial Intelligence Hardware Components Cеntral Procеssing Units (CPUs) Evеry computеr systеm is built on cеntral procеssing units (CPUs). Thеy handle duties, do computations, and carry out ordеrs. Evеn if spеcializеd hardwarе is morе еffеctivе at handling AI activitiеs, CPUs arе still еssеntial for managing gеnеral computing tasks in AI systеms. Graphics Procеssing Units (GPUs) AI has sееn a dramatic transformation as a rеsult of graphics procеssing units (GPUs). Thеy arе pеrfеct for AI jobs that rеquirе handling massivе quantitiеs of data and intricatе mathеmatical opеrations bеcausе of thеir
https://en.wikipedia.org/wiki/Conversations%20%28software%29
Conversations is a free software, instant messaging client application software for Android. It is largely based on recognized open standards such as the Extensible Messaging and Presence Protocol (XMPP) and Transport Layer Security (TLS). The development focus is on secure communication and implementation of XMPP extensions that are important for mobile use. The trade press praised the decentralized and open nature of the transmission network and simple, intuitive usability with user guidance familiar from other applications. It enjoys recognition as a serious attempt to raise the mass suitability of XMPP-based messaging to a competitive level. The source code of the software is maintained at GitHub, and is subject to the terms of the GPL-3.0-only license. The application can be installed for free (or with donations) using F-Droid, or for a fee in the Google Play store. Google recorded over 100,000 installations as of November 2020. Features Conversations includes optional end-to-end encryption (OpenPGP or OMEMO), and in-transit encryption (Transport Layer Security). The latter must be configured by the server computers involved in the messaging. Conversations allows users to have multiple client devices (endpoints) logged into an account simultaneously (through XMPP), and also delivers messages to multiple client devices (synchronization) using the protocol extension "Message Carbons" ("carbon copies", XEP-0280). Files, also encrypted, can be sent between users. Transmitted images are displayed in the conversation view as inline image messages. As an XMPP client, Conversations can exchange messages with other, different XMPP client software, in principle, and is also not tied to a particular vendor's server infrastructure. The following features are also included: Multi-User (Group) chat (MUC) Optional address book integration Support for multiple user accounts or addresses Implemented XMPP extension protocols Conversations handles many XMPP extension p
https://en.wikipedia.org/wiki/Biopiracy
Biopiracy (also known as scientific colonialism) is defined as the unauthorized appropriation of knowledge and genetic resources of farming and indigenous communities by individuals or institutions seeking exclusive monopoly control through patents or intellectual property. While bioprospecting is the act of exploring natural resources for undiscovered chemical compounds with medicinal or anti-microbial properties, commercial success from bioprospecting leads to the company's attempt at protecting their intellectual property rights on indigenous medicinal plants, seeds, genetic resources, and traditional medicines. Moreover, if biological resources and traditional knowledge are taken from indigenous or marginalized groups, the commercialization of their natural resource can harm communities. Despite the medicinal and innovative benefits of bioprospecting and biochemical research, the expropriation of indigenous land for their genetic resources without fair compensation inevitably leads to exploitation. Biopiracy can harm indigenous populations in multiple ways. Without proper compensation or reward for traditional knowledge of natural resources, the sudden increase in commercial value of the species producing the active compound can make it now unaffordable for the native people. In some cases, a patent filed by the western company could prohibit the use or sell of the resource by any individual or institution, including the indigenous group. With nearly one third of all small-molecule drugs approved by the U.S. Food and Drug Administration (FDA) between 1981 and 2014 being either natural products or compounds derived from natural products, bioprospecting or piracy is growing more significantly, especially in the pharmaceutical industry. With the advancement of extraction techniques of genetic material in biochemistry and molecular biology, scientists are now able to identify a specific gene, which directs to enzymes capable of converting one molecule to another.
https://en.wikipedia.org/wiki/Matroid-constrained%20number%20partitioning
Matroid-constrained number partitioning is a variant of the multiway number partitioning problem, in which the subsets in the partition should be independent sets of a matroid. The input to this problem is a set S of items, a positive integer m, and some m matroids over the same set S. The goal is to partition S into m subsets, such that each subset i is an independent set in matroid i. Subject to this constraint, some objective function should be minimized, for example, minimizing the largest sum item sizes in a subset. In a more general variant, each of the m matroids has a weight function, which assigns a weight to each element of the ground-set. Various objective functions have been considered. For each of the three operators max,min,sum, one can use this operator on the weights of items in each subset, and on the subsets themselves. All in all, there are 9 possible objective functions, each of which can be maximized or minimized. Special cases Some important special cases of matroid-constrainted partitioning problems are: The (max,sum) objective is the maximum over all subsets, of the total weight in the subset. When the items represent jobs and the weights represent their length, this objective is simply the makespan of the schedule. Therefore, minimizing this objective is equivalent to minimizing the makespan under matroid constraints. The dual goal of maximizing (min,sum) has also been studied in this context. The special case in which the matroids are free matroids (no constraints) and the m weight-functions are identical corresponds to identical-machines scheduling, also known as multiway number partitioning. The case of free matroids and different weight-functions corresponds to unrelated-machines scheduling. The special case of uniform matroids corresponds to cardinality constraints on the subsets. The more general case of partition matroids corresponds to categorized cardinality constraints. These problems are described in the page on balanced numbe
https://en.wikipedia.org/wiki/Glossary%20of%20engineering
This glossary is split across multiple pages due to technical limitations. By Alphabetical Order Glossary of engineering: A–L Glossary of engineering: M–Z By Category Glossary of civil engineering Glossary of electrical and electronics engineering Glossary of mechanical engineering Glossary of structural engineering Glossary of aerospace engineering
https://en.wikipedia.org/wiki/Glugging
Glugging (also referred to as "the glug-glug process") is the physical phenomenon which occurs when a liquid is poured rapidly from a vessel with a narrow opening, such as a bottle. It is a facet of fluid dynamics. As liquid is poured from a bottle, the air pressure in the bottle is lowered, and air at higher pressure from outside the bottle is forced into the bottle, in the form of a bubble, impeding the flow of liquid. Once the bubble enters, more liquid escapes, and the process is repeated. The reciprocal action of glugging creates a rhythmic sound. The English word "glug" is onomatopoeic, describing this sound. Onomatopoeias in other languages include (German). Academic papers have been written about the physics of glugging, and about the impact of glugging sounds on consumers' perception of products such as wine. Research into glugging has been done using high-speed photography. Factors which affect glugging are the viscosity of the liquid, its carbonation, the size and shape of the container's neck and its opening (collectively referred to as "bottle geometry"), the angle at which the container is held, and the ratio of air to liquid in the bottle (which means that the rate and the sound of the glugging changes as the bottle empties). References Fluid dynamics Food science
https://en.wikipedia.org/wiki/Irving%20Anellis
Irving H. Anellis (1946 to 2013) was a historian of philosophy. Anellis began his study of philosophy in Boston, Massachusetts at Northeastern University, gaining his B.A. in 1969. He continued in Pittsburgh, Pennsylvania at Duquesne University, gaining the M.A. in 1971. He studied with Jean van Heijenoort at Brandeis University and obtained the Ph.D. in 1977 with his thesis Ontological Commitment in Ideal Languages: Semantic Interpretations for Logical Positivism. Anellis began his teaching career as a teaching assistant when at Northeastern. He taught at Mississippi Valley State University in 1980 and Mount Saint Clare College the next year. He was at University of Minnesota Duluth in 1982 and Des Moines Area Community College in the 1990s. As a researching scholar he visited International Logic Review in Milan, Italy in 1982, and also the Bertrand Russell Editorial Project at McMaster University. In 1989 he joined the Institute for American Thought and became a research associate in the Peirce Edition Project in 2008. In 1990 he began to edit Modern Logic, a journal on 19th and 20th century logic. Later the title was changed to The Review of Modern Logic. Irving Henry Anellis died 15 July 2013. Works 1991: (with N. Houser) "Nineteenth Century Roots of Algebraic Logic and Universal Algebra" 1994: Jean van Heijenoort: Logic and its History in the Work and Writings of Jan van Heijenoort, Modern Logic Publishing 2005: Thirty-five biographical sketches in The Dictionary of Modern American Philosophers 2005: "Some views of Russell and Russell's logic by his Contemporaries, with particular reference to Peirce", Seminar at Peirce Edition Project 2011: "How Peircean was the 'Fregean' Revolution in Logic?" 2012 [2006]: Evaluating Bertrand Russell, the Logician and His Work, Docent Press References CV at Indiana University Irving Anellis Homepage at Blogspot Irving Anellis at PhilPapers 1946 births 2013 deaths American historians of mathematics Brand
https://en.wikipedia.org/wiki/Reverse%20search%20warrant
A reverse search warrant is a type of search warrant used in the United States, in which law enforcement obtains a court order for information from technology companies to identify a group of people who may be suspects in a crime. They differ from traditional search warrants, which typically apply to specific individuals. Geo-fence warrants, which seek data on mobile phone users who were in a specific location at a given time, and keyword warrants, which request information on users who searched specific phrases, are two types of reverse search warrants. History Reverse location warrants were first used in 2016, and have become increasingly widely used by United States law enforcement. Google reported that it had received 982 reverse location warrants in 2018, 8,396 in 2019, and 11,554 in 2020. A 2021 transparency report showed that 25% of data requests from law enforcement to Google were geo-fence data requests. Google is the most common recipient of reverse location warrants and the main provider of such data, although companies including Apple, Snapchat, Lyft, and Uber have also received such warrants. Types Geo-fence warrant Geo-fence warrants, also called reverse location warrants, seek to compel data from search engine companies and other technology companies that collect mobile location data, to determine which users may have been in a specific location at a given time. Keyword warrant Keyword search warrants seek to compel search engine companies to release data on users who have searched specific phrases—for example, an address that was later the location of a crime. Keyword warrants are comparatively rare but have been used to request data from companies including Google, Microsoft, and Yahoo since at least 2017. Genealogy database warrants Companies that collect DNA data have received warrants from law enforcement seeking to access their databases. GEDMatch and Family Tree DNA have cooperated with such requests, while larger companies like Ance
https://en.wikipedia.org/wiki/Tara%20Matise
Tara Matise is an American geneticist at Rutgers University. Since 2018, she has served as chair of the Department of Genetics. Her research interests span computational genetics, data science, and human genetics. She is co-director of the Rutgers University Genetics Coordinating Center. Early life and education A native of Buffalo, New York, Matise attended high school at The Buffalo Seminary, a private secular school for girls, graduating in 1982, after which she attended Cornell University, where she earned a bachelor’s degree in biology with a concentration in genetics. She went on to earn a master’s degree in Genetic Counseling in 1988 from the University of Pittsburgh, and a doctorate in 1992 in human genetics from the University of Pittsburgh School of Public Health under the direction of Aravinda Chakravarti. Matise then worked as a postdoctoral fellow at the University of Pittsburgh, Columbia University and Rockefeller University. At Rockefeller, Matise worked under the supervision of Jürg Ott. Research and career Matise moved to Rutgers University in 2000. She was appointed Head of the Computational Genetics Program in the Human Genetics Institute of New Jersey in 2014. In 2021, Matise was elected as a fellow in the American Association for the Advancement of Science. Matise began her career using genetic linkage to identify genes for genetic diseases.  Her contribution to the identification of the cystic fibrosis transmembrane conductance regulator (CFTR) gene was honored by the Cystic Fibrosis Foundation in 1990. Matise was the creator of MultiMap, a computer program that automated the construction of genetic linkage maps of the human genome. Her work facilitated the development of several genome-wide gene maps in humans and other organisms, and led to the development of the Rutgers Maps, which contain over 28,000 markers and provide an interpolated position for all human markers, the largest linkage map of human polymorphic markers. In 2008, Matis
https://en.wikipedia.org/wiki/The%20Symmetries%20of%20Things
The Symmetries of Things is a book on mathematical symmetry and the symmetries of geometric objects, aimed at audiences of multiple levels. It was written over the course of many years by John Horton Conway, Heidi Burgiel, and Chaim Goodman-Strauss, and published in 2008 by A K Peters. Its critical reception was mixed, with some reviewers praising it for its accessible and thorough approach to its material and for its many inspiring illustrations, and others complaining about its inconsistent level of difficulty, overuse of neologisms, failure to adequately cite prior work, and technical errors. Topics The Symmetries of Things has three major sections, subdivided into 26 chapters. The first of the sections discusses the symmetries of geometric objects. It includes both the symmetries of finite objects in two and three dimensions, and two-dimensional infinite structures such as frieze patterns and tessellations, and develops a new notation for these symmetries based on work of Alexander Murray MacBeath that, as proven by the authors using a simplified form of the Riemann–Hurwitz formula, covers all possibilities. Other topics include Euler's polyhedral formula and the classification of two-dimensional surfaces. It is heavily illustrated with both artworks and objects depicting these symmetries, such as the art of M. C. Escher and Bathsheba Grossman, as well as new illustrations created by the authors using custom software. The second section of the book considers symmetries more abstractly and combinatorially, considering both the color-preserving symmetries of colored objects, the symmetries of topological spaces described in terms of orbifolds, and abstract forms of symmetry described by group theory and presentations of groups. This section culminates with a classification of all of the finite groups with up to 2009 elements. The third section of the book provides a classification of the three-dimensional space groups and examples of honeycombs such as the Weai
https://en.wikipedia.org/wiki/Prompt%20engineering
Prompt engineering is the process of structuring text that can be interpreted and understood by a generative AI model. A prompt is natural language text describing the task that an AI should perform. A prompt for a text-to-text model can be a query such as "what is Fermat's little theorem?", a command such as "write a poem about leaves falling", a short statement of feedback (for example, "too verbose", "too formal", "rephrase again", "omit this word") or a longer statement including context, instructions, and input data. Prompt engineering may involve phrasing a query, specifying a style, providing relevant context or assigning a role to the AI such as "Act as a native French speaker". A prompt may include a few examples for a model to learn from, such as "maison -> house, chat -> cat, chien ->", an approach called few-shot learning. When communicating with a text-to-image or a text-to-audio model, a typical prompt is a description of a desired output such as "a high-quality photo of an astronaut riding a horse" or "Lo-fi slow BPM electro chill with organic samples". Prompting a text-to-image model may involve adding, removing, emphasizing and re-ordering words to achieve a desired subject, style, layout, lighting, and aesthetic. In-context learning Prompt engineering is enabled by in-context learning, defined as a model's ability to temporarily learn from prompts. The ability for in-context learning is an emergent ability of large language models. In-context learning itself is an emergent property of model scale, meaning breaks in downstream scaling laws occur such that its efficacy increases at a different rate in larger models than in smaller models. In contrast to training and fine tuning for each specific task, which are not temporary, what has been learnt during in-context learning is of a temporary nature. It does not carry the temporary contexts or biases, except the ones already present in the (pre)training dataset, from one conversation to the other.
https://en.wikipedia.org/wiki/Eat-me%20signals
Eat-me signals are molecules exposed on the surface of a cell to induce phagocytes to phagocytose (eat) that cell. Currently known eat-me signals include: phosphatidylserine, oxidized phospholipids, sugar residues (such as galactose), deoxyribonucleic acid (DNA), calreticulin, annexin A1, histones and pentraxin-3 (PTX3). The most well characterised eat-me signal is the phospholipid phosphatidylserine. Healthy cells do not expose phosphatidylserine on their surface, whereas dead, dying, infected, injured and some activated cells expose phosphatidylserine on their surface in order to induce phagocytes to phagocytose them. Most glycoproteins and glycolipids on the surface of our cells have short sugar chains that terminate in sialic acid residues, which inhibit phagocytosis, but removal of these residues reveals galactose residues (and subsequently N-acetylglucosamine and mannose residues) that can bind opsonins or directly activate phagocytic receptors. Calreticulin, annexin A1, histones, pentraxin-3 and DNA may be released by (and onto the surface of) dying cells to encourage phagocytes to eat these cells, thereby acting as self-opsonins. Eat-me signals, or the opsonins that bind them, are recognised by phagocytic receptors on phagocytes, inducing engulfment of the cell exposing the eat-me signal. See also Find-me signals References Cell biology Cellular senescence
https://en.wikipedia.org/wiki/Token-based%20replay
Token-based replay technique is a conformance checking algorithm that checks how well a process conforms with its model by replaying each trace on the model (in Petri net notation ). Using the four counters produced tokens, consumed tokens, missing tokens, and remaining tokens, it records the situations where a transition is forced to fire and the remaining tokens after the replay ends. Based on the count at each counter, we can compute the fitness value between the trace and the model. The algorithm The token-replay technique uses four counters to keep track of a trace during the replaying: : Produced tokens : Consumed tokens : Missing tokens (consumed while not there) : Remaining tokens (produced but not consumed) Invariants: At any time: At the end: At the beginning, a token is produced for the source place (p = 1) and at the end, a token is consumed from the sink place (c' = c + 1). When the replay ends, the fitness value can be computed as follows: Example Suppose there is a process model in Petri net notation as follows: Example 1: Replay the trace () on the model M Step 1: A token is initiated. There is one produced token (). Step 2: The activity consumes 1 token to be fired and produces 2 tokens ( and ). Step 3: The activity consumes 1 token and produces 1 token ( and ). Step 4: The activity consumes 1 token and produces 1 token ( and ). Step 5: The activity consumes 2 tokens and produces 1 token (, ). Step 6: The token at the end place is consumed (). The trace is complete. The fitness of the trace () on the model is: Example 2: Replay the trace (a, b, d) on the model M Step 1: A token is initiated. There is one produced token (). Step 2: The activity consumes 1 token to be fired and produces 2 tokens ( and ). Step 3: The activity consumes 1 token and produces 1 token ( and ). Step 4: The activity needs to be fired but there are not enough tokens. One artificial token was produced and the missing token coun
https://en.wikipedia.org/wiki/Mixtilinear%20incircles%20of%20a%20triangle
In plane geometry, a mixtilinear incircle of a triangle is a circle which is tangent to two of its sides and internally tangent to its circumcircle. The mixtilinear incircle of a triangle tangent to the two sides containing vertex is called the -mixtilinear incircle. Every triangle has three unique mixtilinear incircles, one corresponding to each vertex. Proof of existence and uniqueness The -excircle of triangle is unique. Let be a transformation defined by the composition of an inversion centered at with radius and a reflection with respect to the angle bisector on . Since inversion and reflection are bijective and preserve touching points, then does as well. Then, the image of the -excircle under is a circle internally tangent to sides and the circumcircle of , that is, the -mixtilinear incircle. Therefore, the -mixtilinear incircle exists and is unique, and a similar argument can prove the same for the mixtilinear incircles corresponding to and . Construction The -mixtilinear incircle can be constructed with the following sequence of steps. Draw the incenter by intersecting angle bisectors. Draw a line through perpendicular to the line , touching lines and at points and respectively. These are the tangent points of the mixtilinear circle. Draw perpendiculars to and through points and respectively, and intersect them in . is the center of the circle, so a circle with center and radius is the mixtilinear incircle This construction is possible because of the following fact: Lemma The incenter is the midpoint of the touching points of the mixtilinear incircle with the two sides. Proof Let be the circumcircle of triangle and be the tangency point of the -mixtilinear incircle and . Let be the intersection of line with and be the intersection of line with . Homothety with center on between and implies that are the midpoints of arcs and respectively. The inscribed angle theorem implies that and are triples of coll
https://en.wikipedia.org/wiki/Lunar%20arithmetic
Lunar arithmetic, formerly called dismal arithmetic, is a version of arithmetic in which the addition and multiplication operations on digits are defined as the max and min operations. Thus, in lunar arithmetic, and The lunar arithmetic operations on nonnegative multidigit numbers are performed as in usual arithmetic as illustrated in the following examples. The world of lunar arithmetic is restricted to the set of nonnegative integers. 976 + 348 ---- 978 (adding digits column-wise) 976 × 348 ---- 876 (multiplying the digits of 976 by 8) 444 (multiplying the digits of 976 by 4) 333 (multiplying the digits of 976 by 3) ------ 34876 (adding digits column-wise) The concept of lunar arithmetic was proposed by David Applegate, Marc LeBrun, and Neil Sloane. In the general definition of lunar arithmetic, one considers numbers expressed in an arbitrary base and define lunar arithmetic operations as the max and min operations on the digits corresponding to the chosen base. However, for simplicity, in the following discussion it will be assumed that the numbers are represented using 10 as the base. Properties of the lunar operations A few of the elementary properties of the lunar operations are listed below. The lunar addition and multiplication operations satisfy the commutative and associative laws. The lunar multiplication distributes over the lunar addition. The digit 0 is the identity under lunar addition. No non-zero number has an inverse under lunar addition. The digit 9 is the identity under lunar multiplication. No number different from 9 has an inverse under lunar multiplication. Some standard sequences Even numbers It may be noted that, in lunar arithmetic, and . The even numbers are numbers of the form . The first few distinct even numbers under lunar arithmetic are listed below: These are the numbers whose digits are all less than or equal to 2. Squares A square number is a number of the form . So in lunar arit
https://en.wikipedia.org/wiki/Institute%20of%20Seismological%20Research
Institute of Seismological Research (ISR) is a earthquake engineering and research center in Gandhinagar, India. In the aftermath of 2001 Gujarat earthquake, the institute was established by the Department of Science and Technology of Government of Gujarat in 2003. History In 2003, Dr. J. G. Negi formulated the framework for Institute of Seismological Research (ISR) and established the centre with the funding from Asian Development Bank. He resigned in 2004 due to differences arising between him and the state government. Later, Prof. Naveenchandra N. Srivastava was deputed by Gujarat government to lead the institute. Formal research activities were commenced in 2006. ISR is the nodal agency in the western state of Gujarat to deploy and maintain a sub-network of 22 broadband seismograph stations and 40 strong-motion accelerographs. The sub-network is the part of the larger network called Indian National Strong-Motion Instrumentation Network, operated by Department of Earthquake Engineering, Indian Institute of Technology Roorkee. See also National Centre for Seismology References Gandhinagar Earthquake engineering Engineering research institutes Seismological observatories, organisations and projects 2003 establishments in Gujarat
https://en.wikipedia.org/wiki/Probabilistic%20numerics
Probabilistic numerics is an active field of study at the intersection of applied mathematics, statistics, and machine learning centering on the concept of uncertainty in computation. In probabilistic numerics, tasks in numerical analysis such as finding numerical solutions for integration, linear algebra, optimization and simulation and differential equations are seen as problems of statistical, probabilistic, or Bayesian inference. Introduction A numerical method is an algorithm that approximates the solution to a mathematical problem (examples below include the solution to a linear system of equations, the value of an integral, the solution of a differential equation, the minimum of a multivariate function). In a probabilistic numerical algorithm, this process of approximation is thought of as a problem of estimation, inference or learning and realised in the framework of probabilistic inference (often, but not always, Bayesian inference). Formally, this means casting the setup of the computational problem in terms of a prior distribution, formulating the relationship between numbers computed by the computer (e.g. matrix-vector multiplications in linear algebra, gradients in optimization, values of the integrand or the vector field defining a differential equation) and the quantity in question (the solution of the linear problem, the minimum, the integral, the solution curve) in a likelihood function, and returning a posterior distribution as the output. In most cases, numerical algorithms also take internal adaptive decisions about which numbers to compute, which form an active learning problem. Many of the most popular classic numerical algorithms can be re-interpreted in the probabilistic framework. This includes the method of conjugate gradients, Nordsieck methods, Gaussian quadrature rules, and quasi-Newton methods. In all these cases, the classic method is based on a regularized least-squares estimate that can be associated with the posterior mean aris
https://en.wikipedia.org/wiki/Kentik
Kentik is an American network observability, network monitoring and anomaly detection company headquartered in San Francisco, California. History Kentik was founded in 2014 as CloudHelix by Co-founders Avi Freedman, Ian Applegate, Ian Pye, and Justin Biegel. The company changed its name to Kentik in 2015. Technology Kentik's Network Observability Cloud is a software-as-a-service (SaaS) product that ingests NetFlow and other network data and analyzes it to provide network monitoring and anomaly detection services for the operators of Internet-connected networks. Kentik's underlying data engine is a clustered datastore modeled on Dremel. The engine collects and correlates live operational data from Internet routers and switches to produce network activity and health information. Analysis Since November 2020, Kentik has been the organizational home of Doug Madory's Internet routing analysis practice, previously associated with Renesys and Renesys' subsequent acquirers DynDNS and Oracle. While employed by Kentik, Madory discovered the Global Resource Systems IP address hijacking which occurred during the final hours of the Trump administration and was the first to accurately quantify the 2021 Facebook outage, the largest communications outage in history. References External links Kentik Internet Analysis 2014 establishments in California American companies established in 2014 Computer companies established in 2014 Networking companies of the United States Technology companies based in the San Francisco Bay Area Technology companies established in 2014
https://en.wikipedia.org/wiki/Mary%20Hughes%20Budenbach
Mary Caroline "Polly" Hughes Budenbach (April 18, 1914 – June 23, 2005) was an American cryptanalyst. She won the Federal Woman's Award in 1969, and was posthumously inducted into the NSA Hall of Honor in 2017. Early life and education Mary Caroline Hughes was born in New York City and raised in Scotch Plains, New Jersey, the daughter of Harold Lincoln Hughes and Jane Plunkett Hughes. She attended The Hartridge School and graduated from Smith College in 1934, with a bachelor's degree in English. Career During World War II, Budenbach worked as a cryptanalyst with the United States Navy in Washington, D.C., focused on Japanese naval cryptosystems. After the war, she continued working in as a cryptanalyst and consultant. After 1953, she was senior cryptologist, administrator, and, at one point, the highest-paid woman at the National Security Agency (NSA), based at Fort George G. Meade in Maryland. She worked on computerizing analytical tasks in cryptology, and chaired a committee on promotion and assignment for women at the NSA. She described her work in 1969 as "challenging, fascinating, interesting and frustrating, but not romantic." Budenbach was recognized with the Navy's Meritorious Civilian Service Award in 1945. In 1969, she received the Federal Woman's Award. "When they heard of the award, many of my friends came to me and said 'Now we know where you work'," she told a reporter in 1969. In 1975, the year she retired from the NSA, she received the agency's Exceptional Civilian Service Award. Personal life Mary Hughes married stockbroker Theodore Oswald Budenbach in 1940. He died in 1982. She died in New Jersey in 2005, aged 91 years. Posthumous honors Budenbach's story was included in the book Code Girls: The Untold Story of the American Women Code Breakers of World War II (2017), by Liza Mundy. Also in 2017, she was posthumously inducted into the NSA Hall of Honor. References 1914 births 2005 deaths National Security Agency people National Security
https://en.wikipedia.org/wiki/ICES%20Statistical%20Rectangles
ICES Statistical Rectangles (aka "ICES Rectangles") is a gridded, latitude-longitude based area notation system covering the north-east Atlantic region developed by the International Council for the Exploration of the Sea (ICES) in the 1970s, for simplified analysis and visualization of spatial data of relevance to that organization's interests. The individual rectangles that make up the system each measure 1 degree of longitude by 0.5 degrees of latitude and are intended to be roughly square in real world use in the ICES region of interest, approximately 30 nautical miles by 30 nautical miles (55×55 km) at 60°N, although the actual width varies with latitude, gradually becoming wider than they are high south of 60°N, and narrower further north. The grid covers the region from 36°N to 85°30'N and from 44°W to 69°E (quoted as 68°30') using a set of alphanumeric identifiers, with row of latitude (identifiers 01 through 99, from south to north) cited first, then column of longitude (identifiers A0-A3, then B0-B9, C0-C9 etc., from west to east). The last used column identifier is M8; column identifiers A4-A9, and prefix "I" (uppercase "i") i.e. columns "I"0-"I"9 are not used. The resulting grid is 113 columns by 99 rows, comprising 11,187 labelled 1×0.5 degree cells. An example cell designation is 37F3, which designates the 1×0.5 degree rectangle of which the south-west corner is 54°00'N, 03°00'E. The grid covers both land and sea areas across its designated region, but as per the interests of its originating body, is typically employed for use with marine data such as analysis of marine resources, fishing activities, seabed habitat, etc., refer example references below. The full extent of the grid is visible in published figures such as Figs. 5-8 in Williamson et al., 2017. To accommodate the visualization and/or analysis of finer scale data than is supported by the "standard" (1×0.5 degree) rectangles, an optional fifth character (as digits 1 through 9) can be used w
https://en.wikipedia.org/wiki/Problem%20of%20the%20Nile
The problem of the Nile is a mathematical problem related to equal partitions of measures. The problem was first presented by Ronald Fisher in 1936–1938. It is presented by Dubins and Spanier in the following words:"Each year, the Nile would flood, thereby irrigating or perhaps devastating parts of the agricultural land of a predynastic Egyptian village. The value of different portions of the land would depend upon the height of the flood. In question was the possibility of giving to each of the k residents, piece of land whose value would be 1/k of the total land value, no matter what the height of the flood."Formally, for each height h, there is a nonatomic measure vh on the land, which represents the land values when the height of the Nile is h. In general, there can be infinitely many different heights, and hence, infinitely many different measures. William Feller showed in 1938 that a solution for the general case might not exist. When the number of different heights (= measures) is finite, a solution always exists. This was first noted by Jerzy Neyman in 1946, and proved as a corollary of the Dubins–Spanier theorems in 1961. The problem in this case is called the exact division or consensus division problem. Related problems A related problem is the problem of similar regions studied by Neyman and Pearson. Here, instead of partitioning the land into k subsets, one only looks for a single subset, whose value for each measure vh is r times the total value (where r is a given constant in [0,1]). From existence perspective, the problem is equivalent to the problem of the Nile, as noted by Georges Darmois. However, they differ in the number of required cuts. The optimal number of required cuts for any r is described in the Stromquist–Woodall theorem. References Fair division
https://en.wikipedia.org/wiki/TO-8
In electronics, TO-8 is a designation for a standardized metal semiconductor package. TO in TO-8 stands for "transistor outline" and refers to a series of technical drawings produced by JEDEC. The TO-8 package is noticeably larger than the more common TO-5 package. While originally designed for medium power transistors (that is, higher power than TO-5 but lower than TO-3) such as the 2N1483 series or the AD136, it is more commonly used for integrated circuits and sensors (see Variants below). Construction The typical TO-8 metal can package has a base diameter of , a cap diameter of , and a cap height of . The lead diameter is nominally . The leads are arranged on a circle with a diameter of . The minimum length of the leads is . Variants Several variants of the original TO-8 package have the same cap dimensions but differ in the number and length of the leads (wires). Somewhat incorrectly, TO-8 is often used in manufacturer's literature as a synonym for any package with the cap dimensions of TO-8, regardless of the number of leads, or even for any package with the diameter of TO-8, regardless of the cap height and the number of leads. Light-sensitive or light-emitting devices have a transparent window, lens, or parabolic reflectors in the top of the case rather than a sealed, flat top. There are variants with between 2 and 16 leads. For packages with more than 4 leads, the leads are usually arranged along the edges of a square with a side length of (rather than on a circle as in packages with up to 4 leads or for other metal can packages such as TO-101). These variants usually have a tab to identify lead number 1 and an increased cap diameter of . National standards TO-233 is intended to replace previous definitions of TO-8. References Semiconductor packages
https://en.wikipedia.org/wiki/Reducing%20subspace
In linear algebra, a reducing subspace of a linear map from a Hilbert space to itself is an invariant subspace of whose orthogonal complement is also an invariant subspace of That is, and One says that the subspace reduces the map One says that a linear map is reducible if it has a nontrivial reducing subspace. Otherwise one says it is irreducible. If is of finite dimension and is a reducing subspace of the map represented under basis by matrix then can be expressed as the sum where is the matrix of the orthogonal projection from to and is the matrix of the projection onto (Here is the identity matrix.) Furthermore, has an orthonormal basis with a subset that is an orthonormal basis of . If is the transition matrix from to then with respect to the matrix representing is a block-diagonal matrix with where , and References Linear algebra Matrices
https://en.wikipedia.org/wiki/Optogenetic%20methods%20to%20record%20cellular%20activity
Optogenetics began with methods to alter neuronal activity with light, using e.g. channelrhodopsins. In a broader sense, optogenetic approaches also include the use of genetically encoded biosensors to monitor the activity of neurons or other cell types by measuring fluorescence or bioluminescence. Genetically encoded calcium indicators (GECIs) are used frequently to monitor neuronal activity, but other cellular parameters such as membrane voltage or second messenger activity can also be recorded optically. The use of optogenetic sensors is not restricted to neuroscience, but plays increasingly important roles in immunology, cardiology and cancer research. History The first experiments to measure intracellular calcium levels via protein expression were based on aequorin, a bioluminescent protein from the jellyfish Aequorea. To produce light, however, this enzyme needs the 'fuel' compound coelenteracine, which has to be added to the preparation. This is not practical in intact animals, and in addition, the temporal resolution of bioluminescence imaging is relatively poor (seconds-minutes). The first genetically encoded fluorescent calcium indicator (GECI) to be used to image activity in an animal was cameleon, designed by Atsushi Miyawaki, Roger Tsien and coworkers in 1997. Cameleon was first used successfully in an animal by Rex Kerr, William Schafer and coworkers to record from neurons and muscle cells of the nematode C. elegans. Cameleon was subsequently used to record neural activity in flies and zebrafish. In mammals, the first GECI to be used in vivo was GCaMP, first developed by Junichi Nakai and coworkers in 2001. GCaMP has undergone numerous improvements, notably by a team of scientists at the Janelia Farm Research Campus (GENIE project, HHMI), and GCaMP6 in particular has become widely used in neuroscience. Very recently, G protein-coupled receptors have been harnessed to generate a series of highly specific indicators for various neurotransmitters. Desi
https://en.wikipedia.org/wiki/Right%20to%20sit
The right to sit refers to laws or policies granting workers the right to be granted suitable seating at the workplace. Jurisdictions that have enshrined "right to sit" laws or policies include Mexico, France, Spain, Argentina, the United Kingdom, Jamaica, South Africa, Eswatini, Cameroon, Tanzania, Uganda, Lesotho, Malaysia, Brazil, Israel, Ireland, Zambia, Guyana, the Indian states of Tamil Nadu and Kerala, the Canadian province of Newfoundland and Labrador, and the British overseas territory of Gibraltar and Montserrat. Almost all states of the United States and Australia, as well as the majority of Canadian provinces passed right to sit legislation for women workers between 1881 and 1917. US states with current right to sit legislation include California, Florida, Massachusetts, Montana, New Jersey, New York, Oregon, Pennsylvania, West Virginia, and Wisconsin. A right to sit provision is included in the International Labour Organization's Hygiene (Commerce and Offices) Convention, 1964; the international treaty being ratified by 52 countries as of 2023. Local jurisdictions with right to sit laws include Portland, Oregon, St. Louis, Missouri and London's Royal Borough of Kensington and Chelsea. Some jurisdictions, such as Alabama, Arkansas, Connecticut, Idaho, Kentucky, Maine, Maryland, Michigan, Missouri, Nebraska, Nevada, New Mexico, New Hampshire, Quebec, and Washington, D.C. have revoked their right to sit laws. Many right to sit laws originally contained gendered language specifying women workers only. Some jurisdictions maintain gendered laws, but many jurisdictions have amended their right to sit laws to be gender neutral. Jurisdictions without general right to sit laws often grant seating accommodations to disabled, pregnant, or minor workers. Companies with suitable seating policies The German supermarket chain Aldi allows cashiers to sit while attending to their registers. Aldi allows their workers to sit down not because of concern for worker health
https://en.wikipedia.org/wiki/Colossal%20Biosciences
Colossal Biosciences is a biotechnology and genetic engineering company working to genetically resurrect the woolly mammoth, the Tasmanian tiger, and the dodo. It has claimed to have the first woolly mammoth hybrid calves by 2028 and will reintroduce them to the Arctic tundra habitat to restore the mammoth steppe grasslands and combat climate change. Endangered Asian elephants reportedly would have mammoth traits. Likewise, it plans to launch a thylacine research project to release Tasmanian tiger joeys back to their original Tasmanian and broader Australian habitat after a period of observation in captivity. The company develops genetic engineering and reproductive technology for conservation biology. It was founded in 2021 by George Church and Ben Lamm. History Foundation In a 2008 interview with The New York Times, George Church first expressed his interest in engineering a hybrid Asian elephant-mammoth by sequencing the woolly mammoth genome. In 2012, Church was part of a team that pioneered the CRISPR-Cas9 gene editing tool, through which the potential for altering genetic code to engineer the envisioned “mammophant" surfaced. Church presented a talk at the National Geographic Society in 2013, where he mapped out the idea of Colossal. Church and his genetics team used CRISPR to copy mammoth genes into the genome of an Asian elephant in 2015. That same year, Church’s lab integrated mammoth genes into the DNA of elephant skin cells; the lab zeroed in on 60 genes that experiments hypothesized as being important to the distinctive traits of mammoths, such as a high-domed skull, ability to hold oxygen at low temperatures, and fatty tissue. Church’s lab reported in 2017 that it had successfully added 45 genes to the genome of an Asian elephant. In 2019, Ben Lamm, a serial entrepreneur, contacted Church to meet at his lab in Boston. Lamm was intrigued by press reports of Church’s de-extinction idea. Launch Colossal was officially launched on September 13, 2021
https://en.wikipedia.org/wiki/Mike%27s%20Weather%20Page
Mike's Weather Page is a weather aggregator and video blog established in 2004 by American blogger Mike Boylan from Oldsmar, Florida. History The website was launched in 2004 by Mike Boylan. He graduated from the University of South Florida with a degree in marketing in 1996. He joined Facebook in 2009 to establish his weather site and has since amassed over one million followers, becoming a popular figure in the weather blogging realm. Boylan is well known for his live coverage of Atlantic hurricanes as a storm chaser. Background The website provides a wide range of aggregated information related to weather and climate. Analysis and forecasts of tropical cyclogenesis can be found on the site. For example, computer model runs and real-time satellite imagery data of tropical activity in the Atlantic basin can be accessed on the website. The site also collects maps and tropical forecasts on a national scale, as well as a global earthquake feed. The website's style is simple and classic. Mike Boylan Born as Michael Jerome Boylan, he attended East Lake High School in Tarpon Springs, Florida as part of Class of 1991. In 1996, Boylan graduated from the University of South Florida with a background in marketing. He is a registered Republican. As a weather enthusiast, he founded the website in 2004, and it has since become a reliable source of meteorological information for personal, corporate, military, government, and scientific entities, due to its data aggregation style. Boylan declares in media reports and personal communication channels that his weather website is only for informational purposes and is not intended to sell tropical forecasts. Boylan's comprehension of tropical cyclogenesis is self-taught, and he describes himself as a blogger, storm chaser, and civilian weather tracker with no educational background in meteorology. Boylan is married to Julie, and the couple has two daughters as well as two pets. He is a NASCAR enthusiast. The Boylan family fi
https://en.wikipedia.org/wiki/CAST-31
CAST-31, Technical Clarifications Identified for RTCA DO-254 / EUROCAE ED-80 is a Certification Authorities Software Team (CAST) Position Paper. It is an FAA publication that "does not constitute official policy or guidance from any of the authorities", but is provided for educational and informational purposes only for applicants for software and hardware certification. Contents DO-254/ED-80 was introduced in 2000, but, unlike DO-178C, has not been updated to address concerns coming from decades of experience with applying the guidance of the standard; including errors, omissions, and advances in technology. This CAST Position Paper was created as both needed interim clarifications and a starting point for eventual development and release of an updated DO-254/ED-80. Concerns identified in the Position Paper include: a few known errors in the standard, largely concerning consistency within the document (definition of complex) and across related processes (usage of IDAL), a compilation of recognized omissions to be added (notably, increased resolution in addressing hardware of ranging complexity, from extremely simple to highly complex) with identification of published sources for information on the omitted topics, updates to the revision status of referenced publications that have been modified since the standard’s release, particularly ARP 4754A/ED79A and DO-178C, and various additional content clarifications. Where this Position Paper identifies an omission or need for clarification in DO-254, it generally identifies a section within either FAA Order 8110.105 or EASA CM-SWCEH-001 where the issue is discussed. While DO-254/ED-80 has not been updated, this Position Paper is no longer provided on the FAA website because the "model for certification authority harmonization has changed since CAST's inception and now includes direct collaboration with industry on technical topics." References External links . Retrieved 2021-11-02. Avionics Safety Softwar
https://en.wikipedia.org/wiki/DIMPL
DIMPL (Discovery of Intergenic Motifs PipeLine) is a bioinformatic pipeline that enables the extraction and selection of bacterial GC-rich intergenic regions (IGRs) that are enriched for structured non-coding RNAs (ncRNAs). The method of enriching bacterial IGRs for ncRNA motif discovery was first reported for a study in "Genome-wide discovery of structured noncoding RNAs in bacteria". DIMPL pipeline automates the process of total genome analysis by extracting IGRs, filtering them by length and nucleic acid composition, and collecting the data necessary to identify candidate motifs and assign their possible functions. DIMPL pipeline provides reproducible techniques for identifying genomic regions enriched for ncRNA through support vector machine (SVM) classifiers. It can be used to look for nucleic acid and protein motifs, including riboswitch-like elements, upstream open reading frames (uORFs), short open reading frames (sORFs), ribosomal protein leader sequences, selfish genetic elements and other structured RNA motifs of unknown function. DIMPL uses various sequence analysis resources, including: Rfam database, as a reference of known RNA families BLASTX search tool, to eliminate unannotated protein coding regions INFERNAL package, to search the IGSs sequences CMfinder, to look for possible RNA secondary structure features R-scape software and R2R drawing algorithm, to generate the consensus model RNAcode, to look for the presence of coding regions GenomeView, to visualize the genetic context of the RNA motif RNA motifs discovered using DIMPL include HMP-PP riboswitch, icd-II ncRNA motif, carA ncRNA motif, ldh2 ncRNA motif, among others. References Bioinformatics Computational biology
https://en.wikipedia.org/wiki/Certification%20Authorities%20Software%20Team
The Certification Authorities Software Team (CAST) is an international group of aviation certification and regulatory authority representatives. The organization of has been a means of coordination among representatives from certification authorities in North and South America, Europe, and Asia, in particular, the FAA and EASA. The focus of the organization has been harmonization of Certification Authorities activities in part though clarification and improvement of the guidance provided by DO-178() and DO-254(). Activities Since 1982, RTCA publication DO-178 has provided guidance on certification aspects of safety-critical software use in civil aircraft. In 1985, the first revision DO-178A was issued. The CAST organization first met November 1990 to develop consistent international certification authority input to the drafting of the next revision, DO-178B, which was released in 1992. In 2003, the organization expanded its scope to address the published certification guidance for airborne electronic hardware provided in the RTCA publication DO-254 released in 2000. With application of DO-178B, it was discovered that many projects were not complying with DO-178B, but there was also wide variations in how various certification authorities conducted project assessments. In response, the CAST developed a standard software compliance assessment approach. In a manner similar to standard staged engineering design review practices (e.g., 10%-50%-90%-100% Complete), this introduced four standard milestones in a software development project where an FAA authority or representative would assess the applicant's progress towards compliance. A goal was to detect issues in time to for the applicant to make adjustments to maximize successful accomplishment of all certification objectives. The FAA further developed this approach in the "Mega" FAA Order 8110.49 Chapter 2, defining the four Stages of Involvement (SOI) Audits as Planning, Development, Verification (Test), and Fin
https://en.wikipedia.org/wiki/Digital%20Building%20Logbook
The Digital Building Logbook is a proposal aiming at establishing a common European approach that aggregates all relevant data about a building and ensures that authorised people can access accurate information about the building. See also Energy performance certificate Building information modeling References Building engineering Building information modeling
https://en.wikipedia.org/wiki/German%20Centre%20for%20Rail%20Traffic%20Research
The German Centre for Rail Traffic Research () is an independent, technical-scientific departmental research institution of the Federal Government. It was founded on May 23, 2019, and is located as an independent federal institute at the Eisenbahn-Bundesamt. Its mission is to strengthen rail transport in Germany through application and solution-oriented research. The budget for 2019 was 5 million euros and was expected to increase to 20 million euros in 2020. 2020 staff should be built up first and the research content (along the federal research program) should be specified later. Tasks The coalition agreement for the 19th Election Period foresees a German Centre for Rail Transport Research (DZSF). This center should document research findings, manage and coordinate research projects, and also carry out research itself. This is intended to achieve a more effective use of resources and a lasting strengthening of railway traffic as a mode of transport. The DZSF deals with the central issues of the railway sector as defined in the Federal Rail Research Program and provides solutions for them. Research fields are Economic efficiency Environment and sustainable Mobility, and Safety. The cross-cutting topics of digitalization, automation, migration, and legal issues are assigned to these three topic areas. These cross-cutting topics complement the integrative approach of the federal research program. References External links Internetseite Deutsches Zentrum für Schienenverkehrsforschung Bundesforschungsprogramm Schiene vom Juli 2021 2019 establishments in Germany Research institutes in Germany Research institutes established in 2019 German federal agencies Government agencies established in 2019 Rail transport in Germany Engineering research institutes Transport education
https://en.wikipedia.org/wiki/Lancet%20letter%20%28COVID-19%29
The Lancet letter (also referred to as Calisher et al. 2020) was a statement made in support of scientists and medical professionals in China fighting the outbreak of COVID-19, and condemning theories suggesting that the virus does not have a natural origin, which it referred to as "conspiracy theories". The letter was published in The Lancet on February 19, 2020, and signed by 27 prominent scientists, gaining a further 20,000 signatures in a Change.org petition. The letter generated significant controversy over the alleged conflicts of interest of its authors, and the chilling effect it had on scientists proposing that the COVID-19 lab leak theory be investigated. Background From the early outbreak of the COVID-19 pandemic, rumors and speculation arose about the possible lab origins of SARS-CoV-2, the causative agent of the COVID-19 disease. Different versions of the lab origin hypothesis present different scenarios in which a bat-borne progenitor of SARS-COV-2 may have spilled over to humans, including a laboratory-acquired infection of a natural or engineered virus. Some early rumors focused on the deliberate leak of a virus as a bioweapon or accidental leak of an engineered virus. Some signatories of the Lancet letter, such as Stanley Perlman and Linda Saif, said they were focused on dispelling these rumours, though the letter did not make this distinguishment, as Daszak insisted on a "broad statement". Reception Critical commentary According to journalist Paul Thacker, the Lancet letter "helped to guide almost a year of reporting, as journalists helped to amplify Daszak’s message and to silence scientific and public debate." This affected reporting on the origins of the virus, "characterising the lab leak theory as unworthy of serious consideration". In an interview with The Wall Street Journal, social scientist Filippa Lentzos said that the letter's conclusion was premature, saying that some scientists "closed ranks", fearing for their careers and grants
https://en.wikipedia.org/wiki/TPC-C
TPC-C, short for Transaction Processing Performance Council Benchmark C, is a benchmark used to compare the performance of online transaction processing (OLTP) systems. This industry standard was published in August 1992, and eventually replaced the earlier TPC-A, which was declared obsolete in 1995. It has undergone a number of changes to keep it relevant as computer performance grew by several orders of magnitude, with the current version , 5.11, released in 2010. In 2006, a newer OLTP benchmark was added to the suite, TPC-E, but TPC-C remains in widespread use. The TPC-C system models a multi-warehouse wholesale operation, known simply as "the Company". In a minimal test, the company has ten warehouses, each with ten user terminals. Each warehouse serves ten defined sales districts, each with 3,000 customers who are ordering against a product catalog of 100,000 items. The most frequent transactions are customer orders, with an average of ten items on each order, and customer payments. Less frequent requests query the status of orders and warehouse inventory, ship orders and replenish stocks that get low. To test the performance of a given system, the number of warehouses is increased to meet the required minimum needed to measure the targeted performance level. The results of the benchmark are measured in transactions per minute, known as tpmC. The first tpmC result was published in September 1992 for an IBM AS/400 and returned a result of 54 tpmC. By the 2000s, the average result for high-end machines was 2.4 million tpmC, and companies were building systems of very large size in an effort to capture the record. The current record was set in 2020 using cloud computing that provided 707.3 million tpmC. Recent results for smaller on-premises systems have focused on lowering the cost-per-tpmC. IBM modified TPC-C to create a simplified version known as the Commercial Processing Workload for their own internal use, similar conversions are commonplace but generally
https://en.wikipedia.org/wiki/List%20of%20cryptosystems
A cryptosystem is a set of cryptographic algorithms that map ciphertexts and plaintexts to each other. Private-key cryptosystems Private-key cryptosystems use the same key for encryption and decryption. Caesar cipher Substitution cipher Enigma machine Data Encryption Standard Twofish Serpent Camellia Salsa20 ChaCha20 Blowfish CAST5 Kuznyechik RC4 3DES Skipjack Safer IDEA Advanced Encryption Standard, also known as AES and Rijndael. Public-key cryptosystems Public-key cryptosystems use a public key for encryption and a private key for decryption. Diffie–Hellman key exchange RSA encryption Rabin cryptosystem Schnorr signature ElGamal encryption Elliptic-curve cryptography Lattice-based cryptography McEliece cryptosystem Multivariate cryptography Isogeny-based cryptography References Cryptography Algorithms
https://en.wikipedia.org/wiki/Cryptocurrencies%20in%20Europe
The general notion of cryptocurrencies in Europe denotes the processes of legislative regulation, distribution, circulation, and storage of cryptocurrencies in Europe. In April 2023, the EU Parliament passed the Markets in Crypto Act (MiCA) unified legal framework for crypto-assets within the European Union. The legality of cryptocurrencies in Europe There are some regulatory policy recommendations for EU states to follow in the course of cryptocurrency adoption and regulatory framework development that are given below in chronological order. In 2013, the European Banking Authority (EBA) issued a public warning about the possible risks of virtual currencies. In 2014, The EBA issued a decision on virtual currencies, which included a list of more than 70 risks associated with its dissemination. In 2016, the European Central Bank issued an analysis of virtual currency schemes, acknowledging the potential advantages of virtual currencies. The European Securities and Markets Authority (ESMA) published a study in 2017 on the use of distributed ledger technology (DLT) in securities markets. Also in the same year, ESMA released two statements on initial coin offerings (ICOs), one on investor risks and the other on the laws that apply to companies that participate in these offers. After that, the European Commission directed the EBA and ESMA to evaluate the applicability and appropriateness of the existing EU financial services regulatory framework to crypto assets. In 2018, the European Parliament released two reports about virtual currencies and central banks’ monetary policy. In 2018, The Financial Stability Board (FSB) released a study on the crypto asset market and its potential pathways for future financial stability concerns. During the G7 meeting of July 2019 risks posed by global stablecoin projects were discussed. FINMA, the Swiss financial authority, published a supplement to its ICO guidelines outlining how it treats so-called ‘stable coins’ under Sw
https://en.wikipedia.org/wiki/Kiamoy
Kiamoy (also spelled kiamuy or kiam muy, or in Philippine Spanish as ciamoy), is a class of Filipino treats made with dried sour plums, prunes, or apricots preserved in brine and vinegar. They are sold covered in a powdery coating of an anise (sometimes licorice), li hing (red powder made from plum seeds), salt, and sugar mixture called "kiamoy powder" or kiam-muy-hoon. They are characteristically bright red, orange, or light brown in color. They originate from Chinese Filipino immigrants and are derived from the li hing mui (旅行梅) treats of Chinese cuisine (also called huamei, 話梅). The name is derived from Philippine Hokkien . A local variant of the kiamoy that evolved in the Bicol Region of the Philippines is champóy (also spelled tsampóy, sampóy, or cham-poi, names which can also apply to kiamoy). It differs from kiamoy in that champóy is made from the locally available berry Myrica rubra (which is also known as "champóy"). Champóy is also dark red to black in color and has a predominantly sweet and tart flavor profile, in contrast to the saltier flavor profile of kiamoy. In modern times, the term "champóy" has also come to include the similar-tasting sampalok candy (sometimes differentiated as champóy na sampalok), which are sweets made from tamarind balls cooked in sugar and/or salt. Champoy is derived from Cantonese , referring to chenpi. Kiamoy are popular as street food usually sold near schools and are also commonly eaten as a remedy for car sickness. Kiamoy can also be infused into alcoholic drinks. Kiamoy powder is also sold separately as an ingredient, and can be used as a coating for kiamoy chicken or as a dip for fruits like pomelo, fresh green mango, or pickled green mango. Kiamoy and champóy are believed to be the direct ancestors of the Mexican treat saladitos and the chamoy sauce derived from it. They were transported to Nueva España by Filipino migrants via the Manila Galleons (1565 to 1815). See also Chamoy Chanh muối Crack seed Pickled fruit
https://en.wikipedia.org/wiki/Superposition%20Benchmark
Superposition Benchmark is benchmarking software based on the UNIGINE Engine. The benchmark was developed and published by UNIGINE Company in 2017. The main purpose of software is performance and stability testing for GPUs. Users can choose a workload preset, Low to Extreme, or set the parameters by custom. The benchmark 3D scene is an office of a fictional genius scientist from the middle of the 20th century. The scene is GPU-intensive because of SSRTGI (Screen-Space Ray-Traced Global Illumination), proprietary dynamic lighting technology by Unigine. Superposition and other benchmarks by Unigine are often used by hardware reviewers to measure graphics performance (PCMag, Digital Trends, Lifewire and others) and by overclockers for online and offline competitions in GPU overclocking. Running Superposition (or another) benchmark by Unigine produces a performance score: the higher the numbers, the better the performance. Users can compare different configurations in the online leaderboards. Technological features Visuals powered by UNIGINE 2 Engine Support for Windows 7 SP1 x64, Windows 8 x64, Windows 10 x64, Linux x64, macOS Extreme hardware stability testing GPU temperature and clock monitoring Unique SSRTGI (Screen-Space Ray-Traced Global Illumination) dynamic lighting technology VR experience (Oculus Rift and HTC Vive) Free exploration mode with mini-games Over 900 interactive objects Global leaderboards integration See also Benchmark Overclocking References Benchmarks (computing)
https://en.wikipedia.org/wiki/Presbyosmia
Presbyosmia is the gradual degeneration of sense of smell due to ageing process, which occurs especially in those who are 70 years old or more. It is possibly due to loss of nerve endings in the nose, as well as reduced mucus production. Prebyosmia is less prevalent among elderly who are healthy, and who lack the risk factors for smell disorders. Other factors among elderly that can effect the sense of smell are medication use and some neurological disorders, in these cases the loss of smell can be much more noticeable. There is currently no established treatment for this condition. References Gerontology Olfaction
https://en.wikipedia.org/wiki/Garrod%20Lecture%20and%20Medal
The Garrod Lecture and Medal is an award presented by the British Society for Antimicrobial Chemotherapy. It was established in 1982 and named for L. P. Garrod. The medal is made of silver by the Birmingham Mint. The recipient of the award is considered by the society as having international authority in the field of antimicrobial chemotherapy. They are invited to deliver an accompanying lecture and receive honorary membership of the Society. Recipients References British lecture series Lists of physicians Medicine awards Medical education in the United Kingdom Medical lecture series 1982 establishments in the United Kingdom Recurring events established in 1982 Microbiology
https://en.wikipedia.org/wiki/Journal%20of%20Transportation%20Engineering
Journal of Transportation Engineering was a journal published by the American Society of Civil Engineers. Prior to 1968, it was known as Journal of the Highway Division, and from 1968 to 1982 it was known as the Transportation Engineering Journal of ASCE, taking the current name in 1983. In 2017 it split into Journal of Transportation Engineering, Part A: Systems Journal of Transportation Engineering, Part B: Pavements American Society of Civil Engineers academic journals Transportation journals English-language journals Publications with year of establishment missing
https://en.wikipedia.org/wiki/Dosi%20%28food%29
Dosi (, ) is a traditional Sri Lankan confectionery, similar in nature to fruit preserves or candied fruit. The dish is prepared by boiling segmented fruit in sugar and allowing it to cool in order for the sugar to crystallise on both the surface and the inside of the fruit. Dosi are traditionally served as a snack, during the day or after a meal. It is a dish that is commonly served by Sri Lankan Malays as a part of traditional Eid al-Fitr celebrations, marking the end of Ramadan. It is also popular during weddings, religious festivals and other social functions and celebrations. Variations include the addition of cardamom and/or cinnamon and/or rose essence. The most popular version is the sweet light yellow puhul-dosi (), which is made from wintermelon (ash pumpkin). Other versions include inguru-dosi (), made of ginger; pol-dosi (), made from coconut; annasi-dosi or annāsikā-dosi (), made of pineapple; ambarella-dosi (), made of ambarella (june plum); amba-dosi or mānga-dosi (), made from mango; ala-dosi (), made from potatoes; kiri-dosi () made of milk; apple dosi; jambu-dosi (), made of java plum; ambarelikā-dosi, made with hog plum; nelli-dosi, made from gooseberries; biling-dosi; lovi-dosi (), made from batoko fruit (commonly known in Sri Lanka as lovi-lovi); rambutan-dosi () made from rambutan; and banana-dosi or kesel-dosi (). In Portuguese, doçe simply means ‘sweet’, which is derived from the Latin dolce and the Sinhalese derivative is 'dosi'. It is generally considered that this dish had its origins in the Lusitania region and was brought to the country by Portuguese sailors, who devised this method of preserving fruit for long sea journeys. Boiling the fruit in a sugar syrup effectively stops micro-organisms that spoil fruit by drawing off water from their cells or destroying them by desiccation. See also Petha References Confectionery Sri Lankan desserts and sweets Preserved fruit Food preservation
https://en.wikipedia.org/wiki/Beer%20tasting
Beer tasting is a way to learn more about the history, ingredients and production of beer as well as different beer styles, hops, yeast and beer presentation. A common way is to analyse the appearance, smell and taste of the beer. Then a final judgement of the beer's quality is done. There are many scales for rating beer among beer journalists and beer experts. Different magazines and experts often use their own scale, for example the famous British sommelier Jancis Robinson uses a scale between 1 and 20 and the famous American sommelier Joshua M. Bernstein uses a scale between 1 and 100. However it is common for professional organisations such as the Wine & Spirit Education Trust to rate beer with verbal grades: faulty - poor - acceptable - good - very good - outstanding, corresponding to a scale from 1 to 5. Themes First, a selection of beers is chosen for the tasting. A theme can be for example Belgian beers or a selection of beers of varying bitterness. Beers are often tasted in an order from lightest to heaviest, driest to sweetest and cheapest to most expensive. This forms a basic structure of the tasting, but it is more important to organise the tasting according to how the human tastebuds work. As tasting progresses, the tastebuds become less sensitive and can even be anaesthesised. After the beers have been chosen, suitable snacks are provided and information about each beer producer and region is given. To make the tasting diverse, four to six different beers to taste at the same time are generally provided. Interesting tasting themes can be for example different types of beer such as stout, wheat beer or India pale ale, different countries such as Belgian beers or American pale ales. It is also common to couple the beers with various food, such as a tasting of beers and cheeses. Glass Choosing a glass for beer tasting is more important than one might think. An ISO standard tasting glass is often used in professional tastings, which is the standard for t
https://en.wikipedia.org/wiki/Caryma%20Sa%27d
Caryma Sa'd is a Canadian lawyer. She is known for documenting events at anti-COVID-19-lockdown protests in Canada, and also as a landlord-tenant lawyer. She is a former executive director of Canada's branch of the National Organization for the Reform of Marijuana Laws (NORML). Early life and education Sa'd was born to an Indian mother and a Palestinian father, and grew up in Mississauga, Ontario. She studied law at the University of Ottawa. Legal career After articling in a Bay Street law firm, and working for Lenczner Slaght Royce Smith Griffin LLP, Sa'd launched her own practice that specializes in criminal, housing, and cannabis law in 2017. She serves on the board of directors of Legal Line, and in 2019 ran unsuccessfully to be a bencher at the Law Society of Ontario, finishing in 28th place with 15.8% of the vote. She ran again in 2023 and came in 38th place with 8.6% of the vote. In 2019, Sa'd represented tenants displaced by a fatal fire from 235 Gosford Boulevard apartment block in Toronto. She organized an open letter to Toronto Mayor John Tory, requesting him to block reoccupation of the building until air quality issues were addressed. Also in 2019, Sa'd described Ontario's lottery system of providing retail cannabis licences as "unfair" because it excluded potential licensees based on luck, not experience or relevant skills. In 2021, she campaigned for the rights of small cannabis businesses, and criticized Facebook and Instagram for blocking their posts despite the legality of selling cannabis in Canada. In 2021, Sa'd represented tenants who rented illegal apartments from Toronto landlord Brad J. Lamb, pushing for financial compensation for those evicted, and persuaded a judge to give more time to two tenants whose rent was delayed due to hardship caused by the COVID-19 pandemic. Art and activism Sa'd has commissioned cartoons that are critical of corporations, public figures, and politicians. Sa'd co-founded 420 Cannabis Court, an outdoor com
https://en.wikipedia.org/wiki/Interning%20%28computer%20science%29
In computer science, interning is re-using objects of equal value on-demand instead of creating new objects. This creational pattern is frequently used for numbers and strings in different programming languages. In many object-oriented languages such as Python, even primitive types such as integer numbers are objects. To avoid the overhead of constructing a large number of integer objects, these objects get reused through interning. For interning to work the interned objects must be immutable, since state is shared between multiple variables. String interning is a common application of interning, where many strings with identical values are needed in the same program. History Lisp introduced the notion of interned strings for its symbols. The LISP 1.5 Programmers Manual describes a function called intern which either evaluates to an existing symbol of the supplied name, or if none exists, creates a new symbol of that name. This idea of interned symbols persists in more recent dialects of Lisp, such as Clojure in special forms such a (def symbol) which perform symbol creation and interning. In the object-oriented programming paradigm interning is an important mechanism in the flyweight pattern, where an interning method is called to store the intrinsic state of an object such that this can be shared among different objects which share different extrinsic state, avoiding needless duplication. Interning continues to be an important technique for managing memory use in programming language implementations; for example, the Java Language Specification requires that identical string literals (that is, literals that contain the same sequence of code points) must refer to the same instance of class String, because string literals are "interned" so as to share unique instances. In the Python programming language small integers are interned, though the details of exactly which are dependent on language version. Motivation Interning saves memory and can thus improve p
https://en.wikipedia.org/wiki/Barbara%20Burke%20Hubbard
Barbara Burke Hubbard (born 1948) is an American science journalist, mathematics popularizer, textbook author, and book publisher, known for her books on wavelet transforms and multivariable calculus. Life Burke Hubbard is the daughter of Los Angeles Times reporter Vincent J. Burke, and spent a year in high school living in Moscow when Burke was stationed there in 1964. She was an undergraduate at Harvard University, initially majoring in biology but switching to English, and graduating in 1969. She became a science writer for the Massachusetts Institute of Technology and a journalist for The Ithaca Journal, and was the 1981 winner of the AAAS Westinghouse Science Journalism Award in the small newspaper category, for her articles on acid rain in The Ithaca Journal. She married mathematician John H. Hubbard, with whom she has four children, and with her family has split her time between Ithaca, New York and Marseille, France, with shorter-term stays elsewhere. Books Burke Hubbard is the author of a popular mathematics book on wavelet transforms, originally published in French as Ondes et ondelettes: la saga d’un outil mathématique (Pour la Science, 1995). It won the of the Société mathématique de France, and Hubbard became the first winner of this prize who was not French. The English edition of the same book, The world according to wavelets: the story of a mathematical technique in the making, was published in 1996 by A K Peters, with a second edition in 1998. It was also translated into German by M. Basler as Wavelets: Die Mathematik der kleinen Wellen (Birkhäuser, 1997). With her husband, she wrote a textbook on multivariate calculus, Vector calculus, linear algebra, and differential forms: A unified approach (Prentice Hall, 1999; 5th ed., 2015). She has also translated the book Biochronological correlations by Jean Guex from French into English. In 2001, Burke Hubbard founded the mathematics book publisher Matrix Editions. References 1948 births Living peo
https://en.wikipedia.org/wiki/The%20International%20Encyclopedia%20of%20Ethics
The International Encyclopedia of Ethics is an 11-volume encyclopedia of ethics edited by Hugh LaFollette. The encyclopedia was given Honorable Mention in competition for the Best Reference Work of 2013 by the Research User Services Association. Reception The book has been reviewed by John Martin Fischer, Jennifer A. Herdt, Peter Singer and Larry S. Temkin. References External links The International Encyclopedia of Ethics Ethics books 2013 non-fiction books 2018 non-fiction books Wiley (publisher) books Online encyclopedias English-language encyclopedias Encyclopedias of philosophy
https://en.wikipedia.org/wiki/National%20Initiative%20for%20Cybersecurity%20Careers%20and%20Studies
National Initiative for Cybersecurity Careers and Studies (NICCS) is an online training initiative and portal built as per the National Initiative for Cybersecurity Education framework. This is a federal cybersecurity training subcomponent, operated and maintained by Cybersecurity and Infrastructure Security Agency. History The initiative was launched by Janet Napolitano, then-Secretary of Homeland Security of Department of Homeland Security on February 21, 2013. The primary objective of the initiative is to develop and train the next generation of American cyber professional by involving academia and the private sector. Federal Virtual Training Environment NICCS hosts Federal Virtual Training Environment, a completely free online cybersecurity training system for federal and state government employees. It contains more than 800 hours of training materials on ethical hacking and surveillance, risk management, and malware analysis. See also Cybersecurity and Infrastructure Security Agency National Cyber Security Division National Initiative for Cybersecurity Education References Initiatives_in_the_United_States Computer network security
https://en.wikipedia.org/wiki/1105%20%28number%29
1105 (eleven hundred [and] five, or one thousand one hundred [and] five) is the natural number following 1104 and preceding 1106. 1105 is the smallest positive integer that is a sum of two positive squares in exactly four different ways, a property that can be connected (via the sum of two squares theorem) to its factorization as the product of the three smallest prime numbers that are congruent to 1 modulo 4. It is also the second-smallest Carmichael number, after 561, one of the first four Carmichael numbers identified by R. D. Carmichael in his 1910 paper introducing this concept. Its binary representation 10001010001 and its base-4 representation 101101 are both palindromes, and (because the binary representation has nonzeros only in even positions and its base-4 representation uses only the digits 0 and 1) it is a member of the Moser–de Bruijn sequence of sums of distinct powers of four. As a number of the form for 1105 is the magic constant for magic squares, and as a difference of two consecutive fourth powers it is a rhombic dodecahedral number (a type of figurate number), and a magic number for body-centered cubic crystals. These properties are closely related: the difference of two consecutive fourth powers is always a magic constant for an odd magic square whose size is the sum of the two consecutive numbers (here . References Integers
https://en.wikipedia.org/wiki/National%20Institute%20of%20Cryptology%20Research%20and%20Development
National Institute of Cryptology Research and Development (NICRD) is a national-level research center for cryptologic education and research. History The institute was established in 2007 in Hyderabad. It is one of the institutes which comes under the purview of the National Technical Research Organisation. The other one is the National Critical Information Infrastructure Protection Centre. It was envisioned to house simulation laboratories, and digital fortress laboratories for financial security and design. And, to develop encryption products for national security-related critical applications. References Cyber Security in India Cryptologic education Computer security organizations Indian intelligence agencies
https://en.wikipedia.org/wiki/Mercedes-Benz%20M30%20engine
The Mercedes-Benz M23 engine is a naturally-aspirated, 1.5-liter, inline-4 gasoline engine, designed, developed and produced by Mercedes-Benz; between 1934 and 1939. Applications Mercedes-Benz 150 (W30) References Mercedes-Benz engines Straight-four engines Engines by model Gasoline engines by model
https://en.wikipedia.org/wiki/Metal%20allergy
Metal allergies inflame the skin after it has been in contact with metal. They are a form of allergic contact dermatitis. They are becoming more common, , except in areas with regulatory countermeasures. People may become sensitized to certain metals by skin contact, usually by wearing or holding consumer products (including non-metal products, like textiles and leather treated with metals), or sometimes after exposure at work. Contact with damaged skin makes sensitization more likely. Medical implants may also cause allergic reactions. Diagnosis is by patch test, a method which does not work as well for metals as it does for some other allergens. Prevention and treatment consists of avoiding the metal allergen; there is no other treatment, . It can be difficult to identify and avoid the allergen, because many metals are common in the environment, and some are biologically necessary to humans. Regulations have successfully reduced the rates of some metal allergies in Europe, but are not widespread. The social and economic costs of metal allergies are high. Metal allergies are type IV allergies; the metals are haptens. The toxicity of some allergenic metals may contribute to the development of allergies. Metals Nickel allergy and allergies to mercury and chromium have long been recognised; gold, palladium, and cobalt have gotten attention more recently. There is often cross-sensitization, where a person allergic to one metal may become allergic to another, but monosensitization, reacting to just one metal, is also possible. For instance, many people allergic to nickel are often also allergic to cobalt (a similar element often found in the same places as nickel) and palladium. But it is also possible to only be allergic to one of these metals. Nickel is one of the most common contact allergens. Exposure routes Most cases of metal allergy are caused by consumer products containing metal; exposure at work can also cause metal allergies. The largest human exposu
https://en.wikipedia.org/wiki/Club%20Quarantine
Club Quarantine (Club Q) is a virtual gay club based in Toronto that began hosting URL (online) parties in early 2020 during the COVID-19 pandemic. Created by four friends, recording artist Ceréna Sierra, DJ Casey MQ, comedian Brad Allen, and digital creative Mingus New, Club Q began by hosting parties on Zoom in March 2020. In Ontario, full closures of all non-essential businesses were recommended by the province on March 16 2020. Club Q's first online event took place on that same Monday, March 16, 2020, with a modest 12 attendees. The Club Q Zoom event on March 17, 2020 featured a spontaneous live stick-and-poke session where a virtual club-goer got a tattoo reading "Club Q". Later online events often saw 1,000 attendees. By April 2020, Club Q had partnered with PAPER magazine (a collaboration called PAPER x Club Quarantine) to host a series of events. Club Q hosted their first IRL (real life) - as opposed to URL) event for Halloween 2021 at a membership based co-working space called Eastroom in Toronto where 700 people attended. The IRL halloween event was called "Literally Dead" and was also live streamed to a Zoom audience. Performances and events April 2020 On April 3 2020, Club Q celebrated the birthday of Chester Lockhart who hosted the party on Zoom. Performers at the April 3 online event included Dorian Electra, Charli XCX, Abhora, Santi Storm, HANA, Allie X, Alice Glass, and That Kid. Club Q on April 8 2020 featured performances by Pabllo Vittar; DJS Nídia, Mazurbate (Matthew Mazur), and DJ MINAS; and Drag performers Rify Royalty and Louisiana Purchase. On April 15 2020, Club Q featured a live DJ set by Rebecca Black (of Friday fame), who had recently come out as queer. Javiera Mena, Sateen, Himera, and Allysin Chaynes also performed at the 3-hour virtual event. On April 22, 2020, Mike Thornwell hosted the virtual party. Victoria Monét was a guest DJ, in celebration of her newest single at the time, "Dive". Gia Woods, Dana Dentata, MEATY, Nar, JayJ
https://en.wikipedia.org/wiki/ITU-R%20BT.1886
ITU-R BT.1886 is the reference EOTF of SDR-TV. It is a gamma 2.4 transfer function (a power law with a 2.4 exponent) considered as a satisfactory approximation of the response characteristic of CRT to electrical signal. It has been standardized by ITU in March 2011. It is used for Rec. 709 (HD-TV) and Rec. 2020 (UHD-TV). Definition BT.1886 EOTF is as follows: where is the screen luminance, in cd/m2. is the input video signal level, in the range . is the exponent of the power function and equal to 2.4 is the variable for user gain (legacy “contrast” control) is the variable for user black level lift (legacy “brightness” control) is the screen luminance for white, in cd/m2. is the screen luminance for black, in cd/m2. According to ITU, for a better match, can be set to 0.1 for moderate black level settings (e.g. 0.1 cd/m2) or to 0 for lower black levels (e.g. 0.01 cd/m2). An alternative EOTF has also been provided by ITU for the cases a more precise match of CRT characteristics is required. See also Gamma correction Transfer functions in imaging References ITU-R recommendations Transfer functions Display technology
https://en.wikipedia.org/wiki/Catherine%20E.%20Costello
Catherine E. Costello is the William Fairfield Warren distinguished professor in the department of biochemistry, Cell Biology and Genomics, and the director of the Center for Biomedical Mass Spectrometry at the Boston University School of Medicine. Education Catherine E. Costello attended the Emmanuel College in Boston for her undergraduate studies in chemistry, and minors in mathematics and physics. She received a Master of Science (1967) and a PhD from Georgetown University (1971). After graduation, she did post-doctoral research with Klaus Biemann at Massachusetts Institute of Technology. Career Prior to founding the Center for Biomedical Mass Spectrometry at Boston University School of Medicine in 1994, Costello was a senior research scientist and the associate director of the National Institutes of Health Research Resource for Mass Spectrometry at Massachusetts Institute of Technology for 20 years. She is a William Fairfield Warren Distinguished Professor and the director of the Center for Biomedical Mass Spectrometry at the Boston University School of Medicine. Costello served as the president of the American Society for Mass Spectrometry (2002–2004), the Human Proteome Organization (2011–2012), and the International Mass Spectrometry Foundation (2014–2018). She currently serves on the board of directors of the US Human Proteome Organization, and the editorial board of Clinical Proteomics. Research Her research involves structural characterization of biopolymers using mass spectrometry-based techniques, such as liquid chromatography-mass spectrometry, thin-layer chromatography-mass spectrometry, Fourier-transform ion cyclotron resonance mass spectrometry, matrix-assisted laser desorption/ionization time-of-flight mass spectrometry, microfluidic capillary electrophoresis-mass spectrometry, and ion mobility spectrometry-mass spectrometry. She was one of the first scientists to characterize glycoconjugates with tandem mass spectrometry. Her 1988 article h
https://en.wikipedia.org/wiki/Klila
In Mandaeism, the klila () is a small myrtle (asa) wreath or ring (translated as "circlet" by E. S. Drower) used during Mandaean religious rituals. The klila is a female symbol that complements the taga, a white crown which always takes on masculine symbolism. The klila is used to adorn the drabsha, a wooden cross covered with a white cloth that is the main symbol of Mandaeism. Use in rituals The klila is used during most Mandaean rituals, including masbuta, masiqta, and priest initiation rituals. In the Qolasta Several prayers in the Qolasta are recited when consecrating and putting on the klila, including prayers 19, 46, 47, 61, and 79. In E. S. Drower's version of the Qolasta, prayers 305-329 are recited for the klila, as well as for the taga. Hazazban (or Haza-Zban) is mentioned in Qolasta prayers 19 and 27 as an uthra who sets wreaths (klila) upon the heads of Mandaeans who are performing masbuta. See also Drabsha Laurel wreath Olive wreath References External links Preparing the klila: cutting myrtle (video) Mandaean religious objects Symbols of Abrahamic religions Mandaic words and phrases Plants in culture Myrtus
https://en.wikipedia.org/wiki/Meme%20coin
A meme coin (also spelled memecoin) is a cryptocurrency that originated from an Internet meme or has some other humorous characteristic. It may be used in the broadest sense as a critique of the cryptocurrency market in its entirety—those based on particular memes such as "doge coins", celebrities like Coinye, and pump-and-dump schemes such as BitConnect—or it may be used to make cryptocurrency more accessible. The term is often dismissive, comparing the value or performances of those cryptocurrencies to that of mainstream ones. Supporters, on the other hand, observe that some memecoins have acquired social currency and high market capitalizations. In late 2013, Dogecoin was released after being created as a joke on the Doge meme by software engineers. This sparked the creation of several subsequent meme coins. In October 2021, there were about 124 meme coins circulating in the market. Notable examples include Dogecoin and Shiba Inu. In late 2021, advertisements promoting the meme coin Floki Inu in London led to subsequent investigations around promoting the meme coin, considered to be an unregulated financial product by the ASA (The Advertising Standards Authority). Some countries have taken steps to regulate meme coins. In early 2021, Thailand's Securities and Exchange Commission banned meme coins as part of a crackdown on digital goods with "no clear objective or substance". Popularity Meme coins have surged in popularity since Elon Musk endorsed the use of Dogecoin, one of the first meme coins. He continues to post tweets about Dogecoin in 2022, including one in January where he stated he would eat a Happy Meal from McDonald's on live TV if they started accepting Dogecoin as payment. The risk of losing money is significant. However, some projects seem to be successful and sustainable over time. References External links Will APENFT token listed on Binance Bigtert Token Prediction Storepay Token Prediction Cryptocurrencies Internet memes
https://en.wikipedia.org/wiki/Mercedes-Benz%20M142%20engine
The Mercedes-Benz M142 engine is a naturally-aspirated, 3.2-liter to 3.4-liter, straight-6, internal combustion piston engine, designed, developed and produced by Mercedes-Benz; between 1937 and 1942. Applications Mercedes-Benz W142 Mercedes-Benz 320A References Mercedes-Benz engines Straight-six engines Engines by model Gasoline engines by model
https://en.wikipedia.org/wiki/Tramp%20species
In ecology, a tramp species is an organism that has been spread globally by human activities. The term was coined by William Morton Wheeler in the bulletin of the American museum of natural history in 1906, used to describe ants that “have made their way as well known tramps or stow-aways[sic] to many islands The term has since widened to include non-ant organisms, but remains most popular in myrmecology. Tramp species have been noted in multiple phyla spanning both animal and plant kingdoms, including but not limited to arthropods, mollusca, bryophytes, and pteridophytes. The term "tramp species" was popularized and given a more set definition by Luc Passera in his chapter of David F William's 1994 book Exotic Ants: Biology, Impact, And Control Of Introduced Species. Definition Tramp species are organisms that have stable populations outside their native ranges. They are closely associated with human activities. They are disturbance-specialists, and are characterized by their synanthropic associations with humans as their primary mode of expansion is human-mediated dispersal. That being said, tramp species are not limited to anthropogenically disturbed habitats, they have the potential to invade pristine habitats, especially when established in a new area. For example, Anoplolepis gracilipes was able to invade undisturbed forest ecosystems in Australia after being introduced and having an established population in northeast Arnhem Land. It is important to note that while some tramp species are invasive, the majority of them are not. Some can exist alongside native species without competing with them, simply occupying unfilled niches, such as is the case with some populations of Tapinoma melanocephalum and Monomorium pharaonic, who rarely interfere with native species outside human settlement areas. Ants Ants have a more rigid list of criterion to be considered "true" tramp species. The most cited body of work outlining these traits comes from Luc Passera. His
https://en.wikipedia.org/wiki/Intelligent%20automation
Intelligent automation, or alternately intelligent process automation, is a software term that refers to a combination of artificial intelligence (AI) and robotic process automation (RPA). Companies use intelligent automation to cut costs by using artificial-intelligence-powered robotic software to replace workers who handle repetitive tasks. The term is similar to hyperautomation, a concept identified by research group Gartner as being one of the top technology trends of 2020. Technology Intelligent automation applies the assembly line concept of breaking tasks into repetitive steps to digital business processes. Rather than having humans do each step, intelligent automation replaces each step with an intelligent software robot or bot, improving efficiency. Applications The technology is used to process unstructured content. Common applications include self-driving cars, self-checkouts at grocery stores, smart home assistants, and appliances. Businesses can apply data and machine learning to build predictive analytics that react to consumer behavior changes, or to implement RPA to improve manufacturing floor operations. The technology has also been used to automate the workflow behind distributing Covid-19 vaccines. Data provided by hospital systems’ electronic health records can be processed to identify and educate patients, and schedule vaccinations. Intelligent Automation can provide real-time insights on profitability and efficiency. However in an April 2022 survey by Alchemmy, despite three quarters of businesses acknowledging the importance of Artificial Intelligence to their future development, just a quarter of business leaders (25%) considered Intelligent Automation a “game changer” in understanding current performance. 42% of CTOs see “shortage of talent” as the main obstacle to implementing Intelligent Automation in their business, while 36% of CEOs see ‘upskilling and professional development of existing workforce’ as the most significant adoption
https://en.wikipedia.org/wiki/Schneider%20Euro%20PC
The Schneider Euro PC was a PC compatible home computer, introduced in 1988 by the Schneider Computer Division. A follow-up to the success of the Schneider CPC series, the Euro PC offered an inexpensive entry into the emerging market for home PCs. The computer used a Siemens 8088 processor (clocked at 4.77, 7.15 or 9.54 MHz according to a BIOS setting or key combination), had 512 KB of RAM (expandable to 640 KB), and was shipped with MS-DOS 3.3 and Microsoft Works 1.0. As with many other home computers of its time, the computer circuit board was built into the keyboard housing. A 12" amber monochrome monitor (MM12) and a 14" color monitor (CM14) were available for the system. The Euro PC had a graphics chip that could be switched between monochrome Hercules and color CGA modes. The power supply was external, an unusual feature for a PC. A 3-inch floppy disk drive (720 KB) was installed as a mass storage device. An external 3-inch floppy disk drive with 720 KB (FD720), a 5-inch floppy disk drive with 360 KB (FD360), and a 20 MB hard disk (XT Attachment, similar to IDE / ATA ) were available as accessories. This could not be replaced by any other model, as the drive parameters were permanently programmed into the BIOS. However, it was possible to operate other hard drives with a corresponding controller in the expansion slot. The computer was sold through large mail-order companies at a price of 1,800 DEM. The highly competitive PC market left little room for new machines, but the Euro PC was still sold in considerable numbers thanks to its very low price and slim, home computer-like appearance. An updated version, the Euro PC II introduced in 1989, had 768 KB RAM and a 8087 mathematical coprocessor. Another version with further expansions was called EURO XT. The Euro AT offered a 80286 processor, 1MB of RAM, and a EGA graphics card. The Euro SX, introduced in 1992, came with a 80386SX processor. Technical details See also PC compatible PC AT Sinclair PC200 Re
https://en.wikipedia.org/wiki/Funga
In life sciences, funga is a recent term for the kingdom fungi similar to the longstanding fauna for animals and flora for plants. The term was considered to be needed in order to simplify projects oriented toward implementation of educational and conservation goals. An informal meeting held during the IX Congreso Latinoamericano de Micología resulted in a proposal for the term in 2018; alternative terms were also proposed and discussed. Funga was recommended by the IUCN in 2021. The term highlights parallel terminology referring to treatments of these macroorganisms of particular geographical areas. Funga refers to the fungi of a particular region, habitat, or geological period. The Species Survival Commission (SSC) of the International Union for Conservation of Nature (IUCN) in August 2021 called for the recognition of fungi as one of three kingdoms of life, and critical to protecting and restoring Earth. They ask that the phrase animals and plants be replaced by animals, fungi, and plants, and fauna and flora by fauna, flora, and funga. The term funga had been used in the scientific literature before the later recommendation. References Life sciences Fungi
https://en.wikipedia.org/wiki/Identity%20safety%20cues
Identity safety cues are aspects of an environment or setting that signal to members of stigmatized groups that the threat of discrimination is limited within that environment and/or that their social identities are welcomed and valued. Identity safety cues have been shown to reduce the negative impacts impact of social identity threats, which are when people experience situations where they feel devalued on the basis of a social identity (see Stereotype Threat). Such threats have been shown to undermine performance in academic and work-related contexts and make members of stigmatized groups feel as though they do not belong. Identity safety cues have been proposed as a way of alleviating the negative impact of stereotype threat or other social identity threats, reducing disparities in academic performance for members of stigmatized groups (see Achievement Gaps in the US), and reducing health disparities caused by identity related stressors. Research has shown that identity safety cues targeted towards one specific group can lead individuals with other stigmatized identities to believe their identities will be respected and valued in that environment. Further, the implementation of identity safety cues in existing research did not cause members of non-stigmatized groups feeling threatened or uncomfortable. In fact, some work has suggested that the benefits of identity safety cues extend to members of non-stigmatized groups. For example, implementation of identity safety cues within a university context has been shown to increase student engagement, efficacy, and reduce the average number of student absences for all students, but especially those from stigmatized groups. Several types of identity safety cues have been identified. Types of cues Diversity philosophies and programing There is evidence suggesting that when individuals or organizations communicate that they value diversity highly, concerns about identity threats are reduced. For example, Hall and coll
https://en.wikipedia.org/wiki/PB286LP
The PB286LP, released in 1989, was Packard Bell's first laptop computer. The laptop featured an 80C286 processor clocked at 12 MHz and 1 MB of RAM, along with a single ISA expansion slot. Packard Bell released the PB286LP in 1989 among a slew of products aimed at the corporate market. Technology writers gave it mostly positive reviews, although some noted its 16-lb weight as hefty and its monochrome LCD as somewhat flawed. Originally only capable of CGA-mode graphics, the laptop was updated in 1990 to support VGA. Packard Bell discontinued the PB286LP in 1991, in favor of more-compact, notebook-sized computers. Development and specifications The PB286LP was the first laptop of Packard Bell, a defunct trademark of Teledyne Technologies revived as a computer manufacturer by Beny Alagem, Alex Sandel and Jason Barzilay in 1986. The laptop was announced in November 1988 amid a barrage of computers aimed at the corporate market. The PB286LP, which features an 80C286 processor clocked at 12 MHz—downclockable to 6 MHz—was marketed to existing buyers of 80286-based personal computers. It arrived stock with 1 MB of RAM SIMMs, expandable up to 5 MB. Packard Bell included a single full-length ISA expansion slot to offer users a means of expanding and upgrading the laptop. The laptop carries a 1.44 MB floppy disk drive and was optioned with either a 20 MB or a 40 MB hard disk drive. Conner and TEAC manufactured the hard and floppy drives respectively. In addition the PB286LP had an optional 2400-bit/s modem. The systems chipset of the PB286LP was manufactured by Intel, while the BIOS was provided by Award. The PB286LP's video chipset was designed in-house by Packard Bell and has an interface eight bits wide and support for both double-scan CGA and MDA. The laptop's monochrome LCD measures 9.7 inches diagonally with an aspect ratio of 1.6:1. Its removable nickel–cadmium battery had a claimed battery life of three hours in 1990. Packard Bell allowed users to enable a battery-con
https://en.wikipedia.org/wiki/Ecosection
An ecosection is a biogeographic unit smaller than an ecoregion that contains minor physiographic, macroclimatic or oceanographic variations. They are a virtual ecological zone in the Canadian province of British Columbia, which contains 139 ecosections that vary from pure terrestrial units to pure marine units. See also Bioregion Ecological classification References Biogeography Ecology terminology
https://en.wikipedia.org/wiki/Danish%20Sugar%20Beet%20Auction
The Danish Sugar Beet Auction was the first large-scale and practical application of secure multi-party computation, which took place in January 2008. An electronic double auction was successfully run by a multiparty computation involving representatives of Denmark's only sugar beets processor (Danisco), the Danish sugar beet growers' association, and a research group responsible for implementing and running the computation. Due to European Union sugar market policy reforms which reduced sugar subsidies and lowered prices, as well as the recent closure of one of Danisco's sugar processing plants, the Danish sugar beet industry needed to reallocate production contracts to farmers nation-wide in an attempt to retain market efficiency. The decision made was to hold an electronic double auction to find the new market clearing price of sugar beets, where the role of the "auctioneer" was played by a computer program implementing a secure multi-party computation (SMPC) between the farmers and Danisco. The use of SMPC not only reduced expenses of the auction process (when compared to hiring an external consultancy to run the auction), but also allowed farmers' bids to remain private from Danisco, the only sugar beets processor on the Danish market and the seller of production contracts. This was important as farmers' bids can reveal their individual economic positions and productivities, which Danisco could have hypothetically used to their advantage when selling contracts. In a survey of the auction participants, 80% of respondents indicated that it was important to them that the bids were kept confidential. Aside from organizing the logistics of such a novel auction, the actual computation of the market clearing price and each bidder's positions only took about 30 minutes to complete. Ultimately, the auction resulted in the transfer of 25 thousand tons of production rights between farmers. References History of auctions Food processing Beta (plant)
https://en.wikipedia.org/wiki/Jose%20Emilio%20Esteban
Jose Emilio Esteban is a Mexican-American food scientist and former veterinarian who is serving as under secretary of agriculture for food safety in the Biden administration since January 2023. Education Esteban earned a Doctor of Veterinary Medicine from the National Autonomous University of Mexico. He later earned a Master of Business Administration, Master of Science in preventive veterinary medicine, and PhD in epidemiology from the University of California, Davis. Career Esteban began his career as a veterinarian in Mexico. After graduating from University of California, Davis, he joined the Centers for Disease Control and Prevention, serving as a staff epidemiologist, officer with the Epidemic Intelligence Service, and assistant director of the Food Safety Office. He joined the Food Safety and Inspection Service in 2006 and has served as a science advisor, laboratory director, and chief scientist in the department. He is also chair of the Codex Alimentarius Commission Committee on Food Hygiene and vice president of the International Association for Food Protection. References Living people Food scientists University of California, Davis alumni Centers for Disease Control and Prevention people United States Department of Agriculture officials National Autonomous University of Mexico alumni Mexican veterinarians Year of birth missing (living people) Biden administration personnel
https://en.wikipedia.org/wiki/Phytobenthos
Phytobenthos () (from Greek (phyton, meaning "plants") and (benthos, meaning "depths") are autotrophic organisms found attached to bottom surfaces aquatic environments, such as rocks, sediments, or even other organisms. This photosynthetic community includes single-celled or filamentous cyanobacteria, microalgae, and macrophytes. Phytobenthos are highly diverse, and can be found in freshwater and marine environments, as well as transitional water systems. However, their distribution and availability still depend on the factors and stressors that exist in the environment. Because phytobenthos are autotrophs, they need to be able to subsist where it is still possible to perform photosynthesis. Similar to phytoplankton, phytobenthos contribute to the aquatic food web for grazers and heterotrophic bacteria, and researchers have also been studying their health as an indicator for water quality and environmental integrity of aquatic ecosystems. Overview Phytobenthos are subcategorized into microphytobenthos and macrophytobenthos. Microphytobenthos such as diatoms can be as small as 0.2 μm in diameter, and macrophytobenthos such as kelps can be tens of meters long. To establish themselves on surfaces, phytobenthos usually stabilize themselves onto substrates through the use of various polysaccharides, glycoproteins, and even lipids that make up the extracellular polymeric substance, of which 40 - 90% of the carbons are derived from carbohydrates. Some species of phytobenthos such as Ostreobium and diatoms such as the Synedra acus Kütznig have been observed to live in a free-living state. Benthic diatoms have been found to be useful indicator species for determining the state of the aquatic environment as many study models have demonstrated association between the type of diatom communities that are present and the stability and the size of the sediments. Non-diatom phytobenthos such as the cyanobacteria Nostoc spp. and Phormidium spp. have also been used as biological
https://en.wikipedia.org/wiki/Consoling%20touch
Consoling touch is a pro-social behavior involving physical contact between a distressed individual and a caregiver. The physical contact, most commonly recognized in the form of a hand hold or embrace, is intended to comfort one or more of the participating individuals. Consoling touch is intended to provide consolation - to alleviate or lessen emotional or physical pain. This type of social support has been observed across species and cultures. Studies have found little difference in the applications of consoling touch, with minor differences in frequency occurrence across cultures. These findings suggest a degree of universality. It remains unclear whether the relationship between social touch and interpersonal emotional bonds reflect biologically driven or culturally normative behavior. Evidence of consoling touch in non-human primates, who embrace one another following distressing events, suggest a biological basis. Numerous studies of consoling touch in humans and animals unveil a consistent physiological response. An embrace from a friend, relative, or even stranger can trigger the release of oxytocin, dopamine, and serotonin into the bloodstream. These neurotransmitters are associated with positive mood, numerous health benefits, and longevity. Cortisol, a stress hormone, also decreases. Studies have found that the degree of intimacy and quality of relationship between consoler and the consoled mediates physiological effects. In other words, while subjects experience reduced cortisol levels while holding the hand of a stranger, they exhibit a larger effect when receiving comfort from a trusted friend, and greater still, when holding the hand of a high quality romantic partner. Contact and development The importance of consoling touch was first explored by Harry Frederick Harlow (Oct 31, 1905 – Dec 6, 1981). From 1950 through 1970, Harlow conducted controversial research on rhesus monkeys observing maladaptation resulting from maternal-separation and social
https://en.wikipedia.org/wiki/Jot%20Down
Jot Down is a cultural magazine based in Barcelona, Spain. The magazine was started as an online magazine, but has also published quarterly print editions. It describes itself as one of the representatives of slow journalism. History and profile Jot Down was launched by a group of journalists and businesspeople led by Mar de Marchis, Ángel Fernández and Ricardo Jonás on 16 May 2011 as an online cultural magazine. As of 2017 Mar de Marchis was also the editor-in-chief. The magazine features narrations and interviews using visuals, including photographs, illustrations and graphic humor. The early contributors of the magazine include Enric González, Fernando Savater and Félix de Azúa. From 2012 Jot Down published print editions on a quarterly basis. The print edition is published black and white and consists of 350 pages. As of 2017 Jot Down had one million unique visitors and sold 10,000–15,000 copies of print edition. References External links 2011 establishments in Spain Cultural magazines Magazines established in 2011 Online magazines Quarterly magazines published in Spain Spanish-language magazines Magazines published in Barcelona
https://en.wikipedia.org/wiki/Invariant%20decomposition
The invariant decomposition is a decomposition of the elements of groups into orthogonal commuting elements. It is also valid in their subgroups, e.g. orthogonal, pseudo-Euclidean, conformal, and classical groups. Because the elements of Pin groups are the composition of oriented reflections, the invariant decomposition theorem readsEvery -reflection can be decomposed into commuting factors. It is named the invariant decomposition because these factors are the invariants of the -reflection . A well known special case is the Chasles' theorem, which states that any rigid body motion in can be decomposed into a rotation around, followed or preceded by a translation along, a single line. Both the rotation and the translation leave two lines invariant: the axis of rotation and the orthogonal axis of translation. Since both rotations and translations are bireflections, a more abstract statement of the theorem reads "Every quadreflection can be decomposed into commuting bireflections". In this form the statement is also valid for e.g. the spacetime algebra , where any Lorentz transformation can be decomposed into a commuting rotation and boost. Bivector decomposition Any bivector in the geometric algebra of total dimension can be decomposed into orthogonal commuting simple bivectors that satisfy Defining , their properties can be summarized as (no sum). The are then found as solutions to the characteristic polynomial Defining and , the solutions are given by The values of are subsequently found by squaring this expression and rearranging, which yields the polynomial By allowing complex values for , the counter example of Marcel Riesz can in fact be solved. This closed form solution for the invariant decomposition is only valid for eigenvalues with algebraic multiplicity of 1. For degenerate the invariant decomposition still exists, but cannot be found using the closed form solution. Exponential map A -reflection can be written as where is a bivecto
https://en.wikipedia.org/wiki/Network%20Protocol%20Virtualization
Network Protocol Virtualization or Network Protocol Stack Virtualization is a concept of providing network connections as a service, without concerning application developer to decide the exact communication stack composition. Concept Network Protocol Virtualization (NPV) was firstly proposed by Heuschkel et al. in 2015 as a rough sketch as part of a transition concept for network protocol stacks. The concept evolved and was published in a deployable state in 2018. The key idea is to decouple applications from their communication stacks. Today the socket API requires application developer to compose the communication stack by hand by choosing between IPv4/IPv6 and UDP/TCP. NPV proposes the network protocol stack should be tailored to the observed network environment (e.g. link layer technology, or current network performance). Thus, the network stack should not be composed at development time, but at runtime and needs the possibility to be adapted if needed. Additionally the decoupling relaxes the chains of the ISO OSI network layer model, and thus enables alternative concepts of communication stacks. Heuschkel et al. proposes the concept of Application layer middleboxes as example to add additional layers to the communication stack to enrich the communication with useful services (e.g. HTTP optimizations) The Figure illustrates the dataflow. Applications interface to the NPV software through some kind of API. Heuschkel et al. proposed socket API equivalent replacements but envision more sophisticated interfaces for future applications. The application payload is assigned by a scheduler to one (of potentially many) communication stack to get processed to network packets, that get sent using networking hardware. A management component decide how communication stacks get composed and how the scheduling scheme should be. To support decisions a management interface is provided to integrate the management system in software-defined networking contexts. NPV has bee
https://en.wikipedia.org/wiki/Phenotypic%20response%20surfaces
Phenotypic response surfaces (PRS) is an artificial intelligence-guided personalized medicine platform that relies on combinatorial optimization principles to quantify drug interactions and efficacies to develop optimized combination therapies to treat a broad spectrum of illnesses. Phenotypic response surfaces fit a parabolic surface to a set of drug doses and biomarker values based on the understanding that the relationship between drugs, their interactions, and their effect on the measure biomarker can be modeled by quadric surface. The resulting surface allows for the omission of both in-vitro and in-silico screening of multi-drug combinations based on a patients unique phenotypic response. This provides a method to utilize small data sets to create time-critical personalized therapies that is independent of the disease or drug mechanism. The adaptable nature of the platform allows it to tackle a wide range of applications from isolating novel combination therapies to predicting daily drug regimen adjustments to support in-patient treatments. History Modern medical practice since its inception in the early 19th to 20th centuries has been seen as "a science of uncertainty and art of probability" as mused by one of its founders, Sir William Osler. The lack of a concrete mechanism for the relationship between drug dosing and its efficacy led largely to the use of population averages as a metric for determine optimal doses for patients. However, this issue is further compounded by the introduction of combination therapies as there is an exponential growth in number of possible combinations and outcomes as the number of drugs increases. Combinatory therapy treatments provide significant benefits over monotherapy alternatives including greater efficacies and lower side effects and fatality rates, making them ideal candidates to optimize. In 2011 the PRS methodology was developed by a team led by Dr. Ibrahim Al-Shyoukh and Dr. Chih Ming Ho of the University of Calif
https://en.wikipedia.org/wiki/Milkweed%20yellows%20phytoplasma
Milkweed yellows phytoplasma is a strain of phytoplasma in the class Mollicutes, a class of bacteria distinguished by the absence of a cell wall. The phytoplasma strain is denoted by the acronym MW1. Like all phytoplasmas, milkweed yellows phytoplasma is an obligate intracellular parasite, that is, it can not live outside of host cells. It spreads by means of an insect vector, the identity of which is unknown. In general, phytoplasmas spread via leafhoppers and other sap-sucking insects that transmit the pathogen from one host plant to another. Taxonomy In 1994, two strains of phytoplasmas that infect the common milkweed Asclepias syriaca (denoted MW1 and MW2) were shown to be members of the X-disease group (16Sr group III). Milkweed yellows phytoplasma (MW1) was later found to be a 'Candidatus Phytoplasma pruni'-related strain of phytoplasma belonging to subgroup F (16SrIII-F). Other phytoplasmas in subgroup 16SrIII-F include Vaccinium witches' broom phytoplasma (VAC, VacWB) and potato purple top phytoplasma (AKpot7). , milkweed yellows phytoplasma has not been formally described. Milkweed yellows Milkweed yellows is an infectious disease of milkweeds caused by the milkweed yellows phytoplasma. Other diseases caused by pathogens in subgroup 16SrIII-F include Vaccinium witches' broom, potato purple top, and a greening disorder of Trillium grandiflorum and other Trillium species. Hosts The common milkweed Asclepias syriaca and the periwinkle Catharanthus roseus are known plant hosts for milkweed yellows phytoplasma. The insect host species for milkweed yellows is not known. See also Aster yellows Elm yellows Grapevine yellows Bibliography References External links Mollicutes Bacterial plant pathogens and diseases Ornamental plant pathogens and diseases Undescribed species
https://en.wikipedia.org/wiki/Neural%20synchrony
Neural synchrony is the correlation of brain activity across two or more people over time. In social and affective neuroscience, neural synchrony specifically refers to the degree of similarity between the spatio-temporal neural fluctuations of multiple people. This phenomenon represents the convergence and coupling of different people's neurocognitive systems, and it is thought to be the neural substrate for many forms of interpersonal dynamics and shared experiences. Some research also refers to neural synchrony as inter-brain synchrony, brain-to-brain coupling, inter-subject correlation, between-brain connectivity, or neural coupling. In the current literature, neural synchrony is notably distinct from intra-brain synchrony—sometimes also called neural synchrony—which denotes the coupling of activity across regions of a single individual's brain. Neural synchrony approaches represent an important theoretical and methodological contribution to the field. Since its conception, studies of neural synchrony have helped elucidate the mechanisms underlying social phenomena, including communication, narrative processing, coordination, and cooperation. By emphasizing the social dynamics of the brain, this area of research has played a critical role in making neuroscience more attuned to people's social proclivities—a perspective that is often lost on individual-level approaches to understanding the brain. History Motivation Driven by the desire to understand the social nature of the human brain, the study of neural synchrony stems from social cognition, a subfield of psychology that explores how we understand and interact with other people through processes like mentalization or theory of mind. Given that it relies on measuring brain activity, neural synchrony also has its roots in cognitive neuroscience. Despite the growth of social cognition and cognitive neuroscience prior to the early 2000s, research into the brain neglected interpersonal processes, focusing most
https://en.wikipedia.org/wiki/List%20of%20organisms%20named%20after%20famous%20people%20%28born%201800%E2%80%931899%29
In biological nomenclature, organisms often receive scientific names that honor a person. A taxon (e.g. species or genus; plural: taxa) named in honor of another entity is an eponymous taxon, and names specifically honoring a person or persons are known as patronyms. Scientific names are generally formally published in peer-reviewed journal articles or larger monographs along with descriptions of the named taxa and ways to distinguish them from other taxa. Following rules of Latin grammar, species or subspecies names derived from a man's name often end in -i or -ii if named for an individual, and -orum if named for a group of men or mixed-sex group, such as a family. Similarly, those named for a woman often end in -ae, or -arum for two or more women. This list is part of the List of organisms named after famous people, and includes organisms named after famous individuals born between the 1st of January 1800 and the 31st of December 1899. It also includes ensembles in which at least one member was born within those dates; but excludes companies, institutions, ethnic groups or nationalities, and populated places. It does not include organisms named for fictional entities, for biologists, paleontologists or other natural scientists, nor for associates or family members of researchers who were not otherwise notable (exceptions are made, however, for natural scientists who are much more famous for other aspects of their lives, such as, for example, writers Vladimir Nabokov or Beatrix Potter). Organisms named after famous people born earlier can be found in: List of organisms named after famous people (born before 1800) Organisms named after famous people born later can be found in: List of organisms named after famous people (born 1900–1949) List of organisms named after famous people (born 1950–present) The scientific names are given as originally described (their basionyms); subsequent research may have placed species in different genera, or rendered them taxonomi
https://en.wikipedia.org/wiki/Jupiter%27s%20South%20Pole
For the first time the South Pole of Jupiter was photographed in detail by the Juno spacecraft, which arrived to Jupiter in July 2016 and for the first time in history entered the polar orbit of Jupiter. At the same time, six cyclones were discovered at the South Pole: Оne in the center and five around it (their centers formed a close to regular pentagon), each about 4,500 km (2,800 mi.) in diameter, with a wind speed of about 360 km/h (220 mph), and all of them twisted clockwise. A similar picture at the North Pole of Jupiter presents nine cyclones of similar size: one in the center, and eight around it, rotating counterclockwise. For more than three years the structure of cyclones at both poles of the nearest to us gas giant remained stable, but on November 3, 2019, on the 22nd rotation, "Juno" found the birth of a new cyclone at the South Pole: it quickly "pushed" the previous (although still has a smaller size, about 800 km), and now the centers of peripheral cyclones pole form almost right 6-corner. Before Juno, only the Galileo probe entered Jupiter's orbit from 1995 to 2003; however, its orbital inclination made it impossible to observe the polar regions of Jupiter; Cassini, which flew past Jupiter in 2000, also had no opportunity to photograph the polar regions. Thus, they remained "white spots" until 2016 (the images of the previous flyby missions and Earth telescopes had low resolution); however, back in 2000, the polar X-ray spots of Jupiter (the southern one is significantly weaker than the northern one) were detected. Jupiter's geographic South Pole is also the location of its magnetic South Pole (Jupiter does not have a well-defined magnetic North Pole). References Jupiter Solar System Space
https://en.wikipedia.org/wiki/Nickel%20niobate
Nickel niobate is a complex oxide which as a solid material has found potential applications in catalysis and lithium batteries. Properties Complexes Nickel niobate has been added to other elements forming bismuth nickel niobate (), providing a dense ceramic body at low sintering temperatures. Cubic pyrochlore, tetragonal pyrochlore, and other unknown phases were found. Single-phase perovskite ceramics of (PNN) have been prepared by the columbite precursor method. Dielectric studies showed that ceramic is a typical relaxor ferroelectric with properties like those of its single-crystals. Applications Nickel niobate has been examined for use as a catalyst to reduce 4-nitrophenol due to a photo-synergistic effect that exploits the synergy between thermal active sites and photogenerated electrons. Nickel niobate has also been examined in an "open and regular" crystalline form for use as the anode in a lithium ion battery. It forms a porous, nano-scale structure that eliminates the dendrite formation that can cause short circuits and other problems. The material offers energy density of 244 mAh g−1 and retains 80%+ of its capacity across 20k cycles. The manufacturing process is straightforward and does not require a clean room. The anode offers a diffusion coefficient of 10−12 cm2 s−1 at 300 K, which allows fast charging/dischargine at high current densities, yielding capacities of 140 and 50 mAh g−1 for 10 and 100C respectively. References External links Nickel compounds Nickel complexes Battery (electricity) Catalysts Niobates
https://en.wikipedia.org/wiki/Photosynthesis%20%28board%20game%29
Photosynthesis is a strategy board game designed by Hjalmar Hach and published by Blue Orange in 2017. Gameplay There are four differently-coloured player boards (blue, green, orange, and yellow) with similarly-coloured trees of three different sizes (small, medium, and large) and seed tokens. Each player takes a board of one colour, the tokens and trees of that colour, a light token used to track that player's light collection on their board, and a round marker. The player board has spaces for 4 seedlings, 4 small trees, 3 medium trees, and 2 large trees. A collective game board is placed centrally and paired with a crescent-shaped board that represents the sun, a number of coin-shaped tokens represent victory points, and a token represents the starting player. Setup is completed once each player places the light token on the zero marker of their game board and two trees on the outer edge of the central game board. The game then proceeds in rounds, each with two phases. In the Photosynthesis Phase, the sun rotates around the outer edge of the central board each turn, casting light on a row of spaces (indicated by arrows on the sun board). Trees in that row collect light (1 unit for small trees, 2 units for medium trees, and 3 units for large trees); this is adjusted by subtracting units as a result of trees occurring earlier in the row casting shadows. The light accumulated from this process is recorded on the player board with the light token. It represents the currency of the game. In the Life Cycle Phase, the accumulated light is spent on growing trees, the cost of which is indicated on the associated spaces on the player board. Paying the cost allows the player to move the object to the ready area of their game board, which indicates further costs to pay in order to move the object to the central game board. A player may also cut down a large tree on the central board for a cost of 4 light to obtain a victory point token with a value dependent on its placem
https://en.wikipedia.org/wiki/IBM%20Eagle
IBM Eagle is a 127-qubit quantum processor. IBM claims that it can not be simulated by any classical computer. It is two times bigger than China's Jiuzhang 2. It was revealed on the 16th of November 2021 and was claimed to be the most powerful quantum processor ever made until November 2022, when the IBM Osprey overtook it with 433 qubits. It is almost twice as powerful as their last processor, the 'Hummingbird', which had 65 quantum bits and was created in 2020. IBM believes that the processes used in creating the 'Eagle', will be the backbone for their future processors. Their roadmap indicates that in 2023 the 'Condor' will be released with 1,121 qubits. They have also started development on IBM Quantum System Two, as the first one (IBM Quantum System One) is not powerful enough to keep up with the upscaling of their processors. References External links IBM’s roadmap for scaling quantum technology Quantum computing IBM products IBM microprocessors
https://en.wikipedia.org/wiki/Yandex%20Cloud
Yandex Cloud is a public cloud platform developed by the Russian internet company Yandex. Yandex Cloud provides private and corporate users with infrastructure and computing resources in an ‘as a service’ format. History Yandex's plans to enter the public cloud market have been known since 2016, but the first news about the development of the service appeared in 2017 when Yan Leshchinsky, who had previously worked on cloud platforms at Microsoft, Salesforce and AWS, joined the company. Closed testing of Yandex Cloud began in April 2018 with the participation of over 50 large Russian and international companies, including Tinkoff Bank, X5 Retail Group, S7 and Skyeng. The platform was presented in a technical preview in September 2018. The user base and revenue of the platform grew consistently, so in October 2020, Yandex moved Yandex Cloud from an experimental direction to an independent business unit. Structure The Yandex Cloud platform uses the same infrastructure as the main Yandex services and is located in the same data centers. Many Yandex Cloud components are based on the company's internal tools, originally developed for in-company use. Open-source software is also used: KVM for the hypervisor, Tungsten Fabric (OpenContrail) for software-defined networking, etc. As the first Russian partner of Nvidia GPU Cloud (NGC), Yandex Cloud provides access to specialized applications which are optimized for Nvidia GPUs[6] for working with artificial intelligence, machine learning, neural networks and high-performance computing. Services Yandex Cloud includes infrastructure and data management services, tools for developing cloud applications and machine learning models, as well as proprietary ML-based services: Infrastructure and Network Compute Cloud (VMs and disks) Object Storage (scalable data storage) Cloud Interconnect (dedicated network connections) API Gateway (integration with Yandex Cloud services via the API) Network Load Balancer Application Load
https://en.wikipedia.org/wiki/MultiVersus
MultiVersus is an upcoming free-to-play crossover fighting game developed by Player First Games and published by Warner Bros. Games for PlayStation 4, PlayStation 5, Windows, Xbox One, and Xbox Series X/S. The game features characters from Warner Bros. Entertainment franchises. Officially announced in November 2021 following online rumors and leaks, early access and open beta versions of the game ran from July 2022 to April 2023. The full launch of the game is scheduled for an early 2024 release. Gameplay MultiVersus is a platform fighter, with players battling on different stages and attempting to knock the opponent beyond the stage's boundary by dealing sufficient damage. While 1-vs-1 and free-for-all options are available, the game emphasizes battling in teams of two characters; most attacks in the game are designed with this in mind, including other players passively strengthening the move's effect. MultiVersus features a perk system, which allows players to customize their characters with passive abilities that will also affect their partners in Teams. These include Signature Perks, which are exclusive to a respective character and directly affect their attributes and abilities. If players in the same team equip the same perks, those perks' effects are enhanced. Currencies and Season Pass MultiVersus features two currencies: Gold, which is primarily used to purchase characters and train perks; and Gleamium, a premium currency that can be used to buy variants, taunts, banners, and Premium Season Passes in addition to characters. Gold is obtained by normally playing the game through various means, while Gleamium is purchasable with real-world currencies. During certain events, specific tokens can be earned by playing in any mode and playing with specific character variants doubles the amount. These currencies can be used to purchase cosmetic items or, in the case of candy during the Monster Mash event, traded for Gold, with 10 Gold for every 500 candy units.
https://en.wikipedia.org/wiki/Cator%20Park
Cator Park is a park in Kidbrooke, Greenwich. It has been won awards for placemaking, biodiversity, and landscape. It was resigned by HTA Design in collaboration with the London Wildlife Trust and opened to the public in 2019. The park is made up of multiple biophilic spaces including lakes, wetlands and ponds. It is a protected space for wetland birds. The park also includes sports facilities and a 3000m³ play space at the park most elevated point. In September 2021, the body of Sabina Nessa was found by a dogwalker in the park, under a pile of leaves. References Parks in England Greater London Biodiversity
https://en.wikipedia.org/wiki/Quantification%20%28machine%20learning%29
In machine learning and data mining, quantification (variously called learning to quantify, or supervised prevalence estimation, or class prior estimation) is the task of using supervised learning in order to train models (quantifiers) that estimate the relative frequencies (also known as prevalence values) of the classes of interest in a sample of unlabelled data items. For instance, in a sample of 100,000 unlabelled tweets known to express opinions about a certain political candidate, a quantifier may be used to estimate the percentage of these 100,000 tweets which belong to class `Positive' (i.e., which manifest a positive stance towards this candidate), and to do the same for classes `Neutral' and `Negative'. Quantification may also be viewed as the task of training predictors that estimate a (discrete) probability distribution, i.e., that generate a predicted distribution that approximates the unknown true distribution of the items across the classes of interest. Quantification is different from classification, since the goal of classification is to predict the class labels of individual data items, while the goal of quantification it to predict the class prevalence values of sets of data items. Quantification is also different from regression, since in regression the training data items have real-valued labels, while in quantification the training data items have class labels. It has been shown in multiple research works that performing quantification by classifying all unlabelled instances and then counting the instances that have been attributed to each class (the 'classify and count' method) usually leads to suboptimal quantification accuracy. This suboptimality may be seen as a direct consequence of 'Vapnik's principle', which states: In our case, the problem to be solved directly is quantification, while the more general intermediate problem is classification. As a result of the suboptimality of the 'classify and count' method, quantification has evolv
https://en.wikipedia.org/wiki/PANoptosis
PANoptosis is an inflammatory cell death pathway. Genetic, molecular, and biochemical studies identified extensive crosstalk among the molecular components across cell death pathways in response to a variety of pathogens and innate immune triggers, leading to the conceptualization of PANoptosis. PANoptosis is defined as a unique innate immune inflammatory cell death pathway driven by caspases and RIPKs and regulated by multi protein PANoptosome complexes. PANoptosis is implicated in driving innate immune responses and inflammation in disease. PANoptosome formation and PANoptosis occur during pathogenic infections, including bacterial, viral, and fungal infections, as well as during inflammatory diseases and can be beneficial in the context of cancer. Inflammatory cell death is associated with activation of the immune system through the release of cytokines and damage-associated molecular patterns. Live pathogens that carry multiple pathogen-associated molecular patterns and homeostasis-altering triggers can modulate cell death pathways. Pyroptosis (inflammatory caspase-mediated cell death that drives maturation of the cytokines IL-1β and IL-18) and necroptosis (RIPK1/RIPK3/MLKL-driven cell death) were historically described as two major inflammatory cell death pathways, with recent studies describing PANoptosis as an additional inflammatory cell death pathway. Activation of PANoptosis can clear infected cells for host defense, and it has shown preclinical promise as an anti-cancer strategy. For example, PANoptosis is important for host defense during influenza infection through the ZBP1-PANoptosome and during Francisella and herpes simplex virus 1 infections through the AIM2-PANoptosome. Additionally, treatment of cancer cells with the PANoptosis-inducing agents TNF and IFN-γ can reduce tumor size in preclinical models. The combination of the nuclear export inhibitor selinexor and IFN can also cause PANoptosis and regress tumors in preclinical models. However, exc
https://en.wikipedia.org/wiki/Retinomorphic%20sensor
Retinomorphic sensors are a type of event-driven optical sensor which produce a signal in response to changes in light intensity, rather than to light intensity itself. This is in contrast to conventional optical sensors such as charge coupled device (CCD) or complementary metal oxide semiconductor (CMOS) based sensors, which output a signal that increases with increasing light intensity. Because they respond to movement only, retinomorphic sensors are hoped to enable faster tracking of moving objects than conventional image sensors, and have potential applications in autonomous vehicles, robotics, and neuromorphic engineering. Naming and history The first so-called artificial retina were reported in the late 1980's by Carver Mead and his doctoral students Misha Mahowald, and Tobias Delbrück. These silicon-based sensors were based on small circuits involving differential amplifiers, capacitors, and resistors. The sensors produced a spike and subsequent decay in output voltage in response to a step-change in illumination intensity. This response is analogous to that of animal retinal cells, which in the 1920's were observed to fire more frequently when the intensity of light was changed than when it was constant. The name silicon retina has hence been used to describe these sensors. The term retinomorphic was first used in a conference paper by Lex Akers in 1990. The term received wider use by Stanford Professor of Engineering Kwabena Boahen, and has since been applied to a wide range of event-driven sensing strategies. The word is analogous to neuromorphic, which is applied to hardware elements (such as processors) designed to replicate the way the brain processes information. Operating principles There are several retinomorphic sensor designs which yield a similar response. The first designs employed a differential amplifier which compared the input signal from of a conventional sensor (e.g. a phototransistor) to a filtered version of the output, resultin
https://en.wikipedia.org/wiki/Bioactive%20agents
Bioactive agents are substances that can influence an organism, tissue or cell. Examples include enzymes, drugs, vitamins, phytochemicals, and bioactive compounds. Bioactive agents can be incorporated into polymers, which has applications in drug delivery and commercial production of household goods and biomedical devices. In drug delivery systems, bioactive agents are loaded into enzyme-responsive polymers which can then be cleaved by target enzymes. Activation of the bioactive agents leads to the release of therapeutic cargos. References Biology Microbiology terms
https://en.wikipedia.org/wiki/Lane%20W.%20Martin
Lane Wyatt Martin is an American chemical engineer. He is a professor in the department of materials science and engineering at the University of California, Berkeley. Early life and education Martin was born and raised in rural western Pennsylvania. He chose to enroll at Carnegie Mellon University for his undergraduate degree in business but eventually switched to material science. Following this, he completed his master's degree in 2006 and PhD in 2008 from the University of California, Berkeley. Career Following his PhD, Martin served as a postdoctoral fellow in the quantum materials program at Lawrence Berkeley National Laboratory before accepting a faculty position at the University of Illinois Urbana-Champaign. As an assistant professor of materials science and engineering, Martin received a National Science Foundation CAREER Award for his proposal, "Enhanced Pyroelectric and Electrocaloric Effects in Complex Oxide Thin Film Heterostructures." He also helped devise a method to make thin films of ferroelectric material with twice the strain of traditional methods, giving the films exceptional electric properties. In 2013, Martin was nominated for a Presidential Early Career Award for Scientists and Engineers by the United States Department of Defense "for his research accomplishments in the synthesis and study of multifunctional materials that have enabled the development and understanding of fundamentally new materials phenomena and potential for advanced devices." In 2014, Martin returned to his alma mater, the University of California, Berkeley, as a faculty member in their department of materials science and engineering. As an associate professor of materials science and engineering, Martin oversaw a research team that found a way to control the movement and placement of electrons in graphene. While serving in this role, he received the 2015 American Associate for Crystal Growth Young Author Award for his "outstanding accomplishments in the heteroepitaxi
https://en.wikipedia.org/wiki/Plantae%20Delavayanae
Plantae Delavayanae: Plants from China collected in Yunnan by Father Delavay. is a book by Adrien René Franchet and Père Jean Marie Delavay, with Franchet describing and establishing the taxonomy for flora found by Delavay in Yunnan. Background Père Jean Marie Delavay was a missionary sent to China for Missions Etrangères de Paris (Foreign Missions of Paris) on an extended assignment in Yunnan. While in France in 1881, he met Père Armand David, a natural history collector and fellow missionary, and was persuaded to take up David's role of collecting plant specimens in China for the Paris Museum of Natural History. His meticulous methodology led to a prolific collection of plants, which included 200,000 specimens of 4,000 distinct species of flora. As Delavay did not have extensive training on botany, he would collect specimen with even the most minor of differences, which led to the discovery of 1,500 new species of plants within his collections. His work was only slowed when he contracted the bubonic plague in 1888, from which he only partially recovered. Much of Delavay's collections that were sent to the Paris Museum of Natural History were processed by Adrien René Franchet. Franchet was a trained botanist focused on the authorship of taxonomy for the plant specimens arriving at the museum. Franchet primarily worked on the taxonomy of the collections from French missionaries in China and Japan, including Delavay, David, Paul Guillaume Farges, and Jean-André Soulié. Franchet published much of his taxonomy work in academic journals, including "Les Primula du Yun-nan" for Bulletin de la Société botanique de France in 1885. Description From 1889 to 1890, Franchet would publish Plantae Delavayanae. Plantes de Chine recueillies au Yun-nan par l'abbé Delavay. "Plantae Delavayanae: Plants from China collected in Yunnan by Father Delavay" is a book focused on the taxonomy of Père Jean Marie Delavay's flora collection. The text is written in Latin. The book consist
https://en.wikipedia.org/wiki/Plastic%20card
Plastic cards usually serve as identity documents, thus providing authentication. In combination with other assets that complement the data stored on the card, like PIN numbers, they also serve authorization purposes, most often as bank cards for allowing their holders to do financial transactions. While early and simpler cards feature only hard-to-imitate integrated photographs, security holograms, guillochés, or a magnetic strip on which few bytes of personal data could be stored, smart cards, i.e. those equipped with an electronic chip (storage, or RFID), nowadays serve as high-security active electronic documents that allow their holder to qualify for driving cars (drivers license card), receive medical treatment (health insurance cards), do banking and more. Industry In their January 2020 report, the International Card Manufacturers Association's (ICMA) indicates a production increase to a record-high of 37.1 billion cards and $27 billion revenue in 2019. Forecasts predicted market growth at a rate of 8.2% from 2021 to 2028, which was counteracted by losses through the Covid pandemic. Production Plastic cards (standard size ID-1) come in various colors and finishings. The laminated mixture of various dyes, paper and plastics (so far mainly PVC and PVCA) and the integration with electronics makes them hard to recycle. Classification Type Range Contact cards (must be inserted into a suitable reading device, e.g. magnetic stripe cards) Contactless cards (using Near-field communication or RFID) Technology Apart from "regular", i.e. non-electronic cards, there is considerable overlap between "chip-enabled", "digital" and "smart" cards, mostly for historical reasons in the development of the current fully equipped smart cards. Regular cards Chip-enabled cards Smart cards Digital card Magnetic stripe cards Applications Gift cards Discount cards Access cards Payment cards Credit cards Debit cards Telephone cards Transportation cards Government/Health, e.g. E