source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Moreau%20envelope
The Moreau envelope (or the Moreau-Yosida regularization) of a proper lower semi-continuous convex function is a smoothed version of . It was proposed by Jean-Jacques Moreau in 1965. The Moreau envelope has important applications in mathematical optimization: minimizing over and minimizing over are equivalent problems in the sense that set of minimizers of and are the same. However, first-order optimization algorithms can be directly applied to , since may be non-differentiable while is always continuously differentiable. Indeed, many proximal gradient methods can be interpreted as a gradient descent method over . Definition The Moreau envelope of a proper lower semi-continuous convex function from a Hilbert space to is defined as Given a parameter , the Moreau envelope of is also called as the Moreau envelope of with parameter . Properties The Moreau envelope can also be seen as the infimal convolution between and . The proximal operator of a function is related to the gradient of the Moreau envelope by the following identity: . By defining the sequence and using the above identity, we can interpret the proximal operator as a gradient descent algorithm over the Moreau envelope. Using Fenchel's duality theorem, one can derive the following dual formulation of the Moreau envelope: where denotes the convex conjugate of . Since the subdifferential of a proper, convex, lower semicontinuous function on a Hilbert space is inverse to the subdifferential of its convex conjugate, we can conclude that if is the maximizer of the above expression, then is the minimizer in the primal formulation and vice versa. By Hopf-Lax formula, the Moreau envelope is a viscosity solution to a Hamilton-Jacobi equation. Stanley Osher and co-authors used this property and Cole-Hopf transformation to derive an algorithm to compute approximations to the proximal operator of a function. See also Proximal operator Proximal gradient method References External
https://en.wikipedia.org/wiki/L%27%C3%8Ele%20Coco
L'Île Coco (Coco Island) is one of the largest islands by size within the St. Brandon archipelago and was permanently inhabited by fishermen until recently. It is still sometimes used as a base by a local fishing company for fly fishing and fly casting activities. The island is inhabited by many thousands of sea birds and seasonally by turtles coming to lay their eggs. See Also St. Brandon Île Raphael L'île du Sud Raphaël Fishing Company References Islands of St. Brandon Mascarene Islands Outer Islands of Mauritius Reefs of the Indian Ocean Fishing areas of the Indian Ocean Important Bird Areas of Mauritius Atolls of the Indian Ocean
https://en.wikipedia.org/wiki/Kunming-Montreal%20Global%20Biodiversity%20Framework
The Kunming-Montreal Global Biodiversity Framework (GBF) is an outcome of the 2022 United Nations Biodiversity Conference. Its tentative title had been the "Post-2020 Global Biodiversity Framework". The GBF was adopted by the 15th Conference of Parties (COP15) to the Convention on Biological Diversity (CBD) on 19 December 2022. It has been promoted as a "Paris Agreement for Nature". It is one of a handful of agreements under the auspices of the CBD, and it is the most significant to date. It has been hailed as a "huge, historic moment" and a "major win for our planet and for all of humanity." The Framework is named after two cities, Kunming, which was scheduled to be the host city for COP15 in October 2020 but postponed and subsequently relinquished the hosting duties due to China's COVID policy, and Montreal, which is the seat of the Convention on Biological Diversity Secretariat and stepped in to host COP15 after Kunming's cancellation. Background Human activities around the planet have been causing a crisis of biodiversity loss around the globe. This phenomenon has been known as the Holocene extinction, which is the sixth mass extinction event in the earth's history. The decline in nature threatens the survival of a million species and impacts billions of people. Due to increasing awareness of the biodiversity crisis, there was pressure from citizens and investors around the world to take action to address the interlinked crises of climate change and biodiversity loss. There is already an international agreement for climate change, the Paris Agreement under the auspices of the United Nations Framework Convention on Climate Change, but until the development of the CBD, there was no similar framework for actions to protect biodiversity to be coordinated internationally. Goals and Targets The GBF contains 4 global goals ("Kunming-Montreal Global Goals for 2050") and 23 targets ("Kunming-Montreal 2030 Global Targets"). The four goals are: The integrity, re
https://en.wikipedia.org/wiki/2024%20United%20Nations%20Biodiversity%20Conference
The 2024 United Nations Biodiversity Conference (COP16) of the Parties to the UN Convention on Biological Diversity (CBD) is planned to be held in 2024. The monitoring framework agreed at the previous conference should allow the progress of the countries towards national goals and targets under the Kunming-Montreal Global Biodiversity Framework to be evaluated. The UNCBD notified Parties on 31 July 2023 "Türkiye’s decision to withdraw from hosting and presiding over the sixteenth meeting of the Conference of the Parties to the Convention on Biological Diversity due to a force majeure situation created by the three destructive earthquakes that occurred in February 2023." See also Biodiversity loss Kunming-Montreal Global Biodiversity Framework References Biodiversity United Nations conferences on the environment Convention on Biological Diversity Events postponed due to the COVID-19 pandemic
https://en.wikipedia.org/wiki/Lumen%20Naturae
Lumen Naturae: Visions of the Abstract in Art and Mathematics is a book on connections between contemporary art, on the one hand, and mathematics and theoretical physics, on the other. It is written by Matilde Marcolli, and published by the MIT Press in 2020. Background The author, Matilde Marcolli, is an Italian mathematical physicist who describes herself as having grown up "among art critics and art historians." The book had its origin in public lectures given by Marcolli, at a bookshop near the California Institute of Technology, where she works as a professor. It aims "to explain modern science to the artists and to enlighten the art for scientists". Contents Lumen Naturae overviews many recent developments in mathematics, physics, and art, finding in many cases "fluid analogies" rather than more direct correspondences. Reproductions of nearly 250 artworks are included, together with the author's interpretation of these works and their connections to the scientific topics she discusses. The book's focus is on these works themselves, and not on the lives of the artists who created them. After an introductory chapter, Lumen Naturae is organized into ten topic-specific chapters: The first chapter is primarily focused on art, and concerns the frozen moments and juxtapositions of still life and vanitas painting, from its pre-contemporary origins through Paul Cézanne, Dada, and Cubism. It compares these to mathematical models of spacetime. The next chapter shifts its focus to mathematics, including number systems, vector spaces, coordinate geometry, and topology, fractals, tessellations, and the Erlangen program of understanding geometries through their symmetries. Two more chapters concern entropy, randomness, and complexity, connecting them to the art theory of Rudolf Arnheim and the action painting of Jackson Pollock. The sixth chapter concerns zero, the vacuum, and artistic representations of the void. In both general relativity and quantum physics the vacuum
https://en.wikipedia.org/wiki/Mewgenics
Mewgenics is an upcoming tactical role-playing roguelike life simulation video game developed by Edmund McMillen and Tyler Glaiel. The game has players breed cats, which assume character classes and are sent out on adventures, featuring tactical combat on a procedurally-generated grid. Originally announced by Team Meat in 2012 as a follow-up to Super Meat Boy, the game experienced a protracted development cycle, before being cancelled and subsequently reacquired by McMillen for development with Glaiel in 2018. Mewgenics is tentatively set to be released via the digital distribution platform Steam in summer 2024. Gameplay Mewgenics is a tactical role-playing game that is divided into two stages: combat and breeding. At the beginning of the game, the player is assigned a team of four cats, which feature character classes, such as hunter, mage and healer. The cats have varying statistics, as well as access to mana reserves, which influence their roles and performance. The cats may affect the aforementioned statistics by equipping clothing and other paraphernilia. Sent on a journey, the combat portion of the game principally takes place on a procedurally-generated grid with a two-dimensional isometric perspective, where the team must eliminate all the enemies, before advancing. Every character may move and use an active ability, with passive abilities affecting them. The combat is heavily influenced by the environment, with the weather affecting performance and the foliage being able to be manipulated for and against the cats. If a cat loses all its hit points, it will be incapacitated, yet remain in the battle, though it will suffer long-term consequences, such as brain damage – and could still be killed with three subsequent blows from enemies. Should a cat die, its items will be lost, including any exclusive rarities that may only drop once. After a successful battle, the player may choose a cat to level up, thereby enhancing its abilities. The second stage of the
https://en.wikipedia.org/wiki/Momentus%20space
Momentus Inc, sometimes styled Momentus space, is an American spaceflight company founded by Mikhail Kokorich which plans to offer space infrastructure services in the form of on-orbit services. The company advertises three orbital tug services which are based around spacecraft electric propulsion and vary in payload mass and Delta-v. As of late 2022 the company has launched one demonstration mission, which produced mixed results. History Momentus space was a 2018 graduate of the Y Combinator program. Momentus space received 8.3 million US dollars of seed funding in November 2018. The investors were Prime Movers Lab, Liquid 2 Ventures, One Way Ventures, Mountain Nazca, Y Combinator, and others. In 2019, Momentus claimed that its Microwave Electrothermal Thruster (MET) was successfully tested in space, though the U.S. Securities and Exchange Commission accused it of misleading investors via this claim. In 2020, Momentus was merged with a SPAC which valued it at 1.2 Billion US dollars though its valuation quickly dropped to half of this value when it began public trading. Momentus space had its first demonstration launch of a vehicle in 2022, which achieved mixed results. Services Momentus space lists plans to offer "space infrastructure" services, including space transportation, on-orbit refueling, and on-orbit services of satellites. Space transportation in the form of space tugs is particularly emphasized. The website lists three models of tug with successively larger payload masses and Delta-v capabilities, in ascending order, name Vigoride, Ardoride, and Fervoride. A still larger tug, called Valoride, has since been removed from their website. These tugs are propelled by the company's Microwave Electrothermal Thruster (MET), a form of spacecraft electric propulsion in which water is ionized by microwaves and accelerated out of the spacecraft. The specific impulse of these propulsion systems is targeted to be "two or three times" that of chemical propuls
https://en.wikipedia.org/wiki/Microsoft%20Autofill
Microsoft Autofill is a password manager developed by Microsoft. It supports multiple platforms such as Android, iOS, and Google Chrome browser. It is a part of Microsoft Authenticator app in Android and iOS, and a browser extension on Google Chrome. It stores users' passwords under the user's Microsoft Account. It can import passwords from Chrome and some popular password managers or from a CSV file. In Microsoft Authenticator app, it requires multi-factor authentication to sign in which provides an additional layer of security. The passwords are encrypted both on the device and the cloud. Features Multi-factor authentication (through Microsoft Authenticator mobile app) Import from competitors Export to CSV file Save credit card information Security The Microsoft Authenticator app requires biometric or device passcode as extra security. The passwords on the device are encrypted, and encryption/decryption keys are not stored and are always generated when needed. Passwords are decrypted only when a user wants to see the password or the password is filled out automatically. Passwords are synced over an SSL-protected HTTPS connection. See also Autofill References External links Chrome Web Store Password managers Cryptographic software 2021 software Google Chrome extensions Proprietary cross-platform software
https://en.wikipedia.org/wiki/Tata%20Neu
Tata Neu is a multi-purpose super-app, developed in India by the Tata Group. It is the country's first super-app. The app was launched to coincide with the start of a 2022 Indian Premier League match. Tata Neu was launched on 7 April 2022, during which the servers were overloaded. Sales numbers missed the million targets set by Tata Digital. Reports stated that Tata Digital received as much as billion in funding from Tata Group for the Tata Neu app and additional investments. By May ending the app had nearly 11 million downloads, however the app was bugged with constant glitches and slow response time leading to a reduction in customer usage. As the reports of high number of bugs and sluggish user experienced continued, reports emerged that Tata Neu CTO had resigned within 4 months and the app faced backlash over data sharing of customer info between companies. In January 2023, Mukesh Bansal the President of Tata Digital and head of operations for Tata Neu stepped down from Tata Neu with Pratik Pal, the CEO of Tata Digital, looking after all the business decisions at the firm. Soon, additional reports emerged that Tata Neu is set to miss the first year GMV by as much as 50%. Internal projections showed the company projecting GMV by March 2023 at billion vs expected billion (which was scaled down from billion). The Tata Neu app, which was revamped in time for the 2023 Indian Premier League (IPL) season, saw a significant increase in downloads and membership following the tournament.The Tata Group's sponsorship of the IPL and the heavy promotion of the Neu app during the matches likely played a role in this growth. Post the revamp, Neu’s rating on the Google Play store has improved from 3.8 to 4.2. References E-commerce in India Mobile payments in India Indian brands Online payments Payment service providers Super-apps Mobile payments Tata Group
https://en.wikipedia.org/wiki/Relation%20of%20degree%20zero
A relation of degree zero, 0-ary relation, or nullary relation is a relation with zero attributes. There are exactly two relations of degree zero. One has cardinality zero; that is, contains no tuples at all. The other has cardinality 1 contains the unique 0-tuple.:56 The zero-degree relations represent true and false in relational algebra.:57 Under the closed-world assumption, an n-ary relation is interpreted as the extension of some n-adic predicate: all and only those n-tuples whose values, substituted for corresponding free variables in the predicate, yield propositions that hold true, appear in the relation. A zero-degree relation is therefore interpreted as the extension of the 0-adic predicate . The zero-degree relation with cardinality zero therefore represents false because it contains no tuples that yield a true proposition, and the zero-degree relation with cardinality 1 represents true because it contains the unique 0-tuple that yields a true proposition. The zero-degree relations are also significant as identities for certain operators in the relational algebra. The zero-degree relation of cardinality 1 is the identity with respect to join (⋈); that is, when it is joined with any other relation , the result is . Defining an identity with respect to join makes it possible to extend the binary join operator into a n-ary join operator.:89 Since the relational Cartesian product is a special case of join, the zero-degree relation of cardinality 1 is also the identity with respect to the Cartesian product.:89 A projection of a relation over no attributes yields one of the relations of degree zero. If the projected relation has cardinality 0, the projection will have cardinality 0; if the projected relation has positive cardinality, the result will have cardinality 1. Hugh Darwen refers to the zero-degree relation with cardinality 0 as TABLE_DUM and the relation with cardinality 1 as TABLE_DEE, alluding to the characters Tweedledum and Tweedledee.
https://en.wikipedia.org/wiki/Klikk
Klikk is an Indian subscription video on-demand and over-the-top streaming service, owned and maintained by Angel Television Private Limited with headquarters in Kolkata, India. History In 1986, Angel Television Private Limited was founded in Kolkata, India, and started its business with movie acquisitions. In 2020, when Klikk was launched by Vikas Tantiya, the company got transformed into a fully vertically integrated studio. A short videos sharing mobile app Chingari was collaborated with Klikk in 2021. KliKK is available for Android, iOS, Amazon Fire TV, Android TV, Jio Store and Mi TV. Content Klikk focuses on original web series, feature films, short films, animated films, and a library of over 1000 Bengali language films across many genres. Releases References External links Official Website Companies based in Kolkata Indian brands Streaming media systems Video on demand services Indian companies established in 2020 2020 establishments in West Bengal
https://en.wikipedia.org/wiki/Marsh%20terrace
A marsh terrace is an artificially created berm that is built in a wetland to prevent erosion, reduce wave energy, and improve habitat for wildlife. Marsh terracing is most common throughout the upper Gulf Coast where it is used to prevent coastal erosion, with 980 linear km (609 mi) having been built in Texas and Louisiana alone over the past thirty years. The terraces catch sediment from rivers which is then colonized by plants to form marshland. Construction and design The design of marsh terraces depends on the local conditions such as wave strength and wind speed. There are several commonly used patterns, including chevrons (duck wings), straight lines, and square grids. Chevrons are the most effective pattern as wind can blow from any direction but there will still be calm water on at least one side of the chevron. One thing that must be considered is the type of soil, as some are more vulnerable to erosion than others. Soils heavy with clay and silt are more resistant than soils primarily composed of organic matter. Terraces are often built in shallow coastal ponds that may have been former marshland that has eroded away over time. Large berms, usually two to five meters in width, are built with material that is either dredged at the site or brought in as fill from inland. The berms themselves are often only a meter in height above sea level which allows it to be occasionally inundated with water and create the proper coastal plant community. Marshland terraces are a relatively new construction, so far has only been extensively used in the Gulf Coast of the United States. They were first built at the Sabine National Wildlife Refuge in 1990. In 2021, a plan to create marsh terraces in Virginia's Back Bay National Wildlife Refuge has been approved. This will be the first project of its kind to be done in the Mid-Atlantic region. Results Being only constructed recently, there have not been a lot of published studies on the effects of marsh terracing. How
https://en.wikipedia.org/wiki/The%20Aviary%20%28bar%29
The Aviary is a craft cocktail bar in Chicago, Illinois. The bar is part the Alinea Group, in of the same "culinary universe" as Alinea, run by Michelin-starred chef Grant Achatz. The Aviary is known as one of the world's best bars. It is centered around molecular gastronomy, with prominent scientific and culinary influence in its drinks. Attributes and history The bar takes the food world's fine-dining approach into its bar program, with elements of molecular gastronomy, custom glassware and other serviceware, and an evolving seasonal menu, all allowing for unique drinks which have changed how drinks are presented worldwide. The bar also includes a separate room where an "ice chef" prepares custom ice cubes for drinks. The bartenders are treated like chefs, and work in a fenced-in "cocktail kitchen". The bar is within the restaurant Next, in Chicago's Fulton Market District, part of the West Loop neighborhood. Another bar in the space, The Office, is a 22-seat speakeasy-style bar situated directly beneath The Aviary. The Aviary has several ordering methods, including an à la carte menu, a three-course cocktail tasting, a five-course tasting, and a seven-course "kitchen table experience". The three-course menu starts with delicate drinks and progresses to richer items. The five-course menu includes food with the drinks, prepared by the chefs and bar team to accompany the cocktails. The seven-course tasting is served in the restaurant's kitchen, and includes food and reportedly the best cocktails The Aviary can offer. The bar is considered a destination cocktail establishment. History The Aviary bar opened in 2011. In 2017, the bar released its first cookbook, The Aviary Cocktail Book, self-published and funded via Kickstarter. The funding move was reported by Eater as unusual given that publishers would have accepted the work, and Achatz has already published several books through reputable publishers. Business partner Nick Kokonas cited the financial benefit
https://en.wikipedia.org/wiki/High-dimensional%20quantum%20key%20distribution
High-dimensional quantum key distribution (HDQKD) is a technology for secure communication between two parties. It allows for higher information efficiency than traditional binary quantum key distribution (QKD) protocols, which are limited to 1 bit/photon. HDQKD also exhibits higher resilience to noise, enabling lower signal-to-noise ratios and longer transmission distances. Implementation One way to implement HDQKD is by using space division multiplexing technology and encoding quantum information in the spatial dimension, such as with optical angular momentum (OAM) modes. While OAM modes have been demonstrated for HDQKD over free-space links, transmission over long-distance fiber links is challenging due to intermodal crosstalk. An alternative approach is to use multicore fibers (MCFs) with separate cores, which offer a large multiplicity of cores and low crosstalk between cores. However, there are also challenges to implementing HDQKD with MCFs. Manipulating high-dimensional quantum states in MCFs requires precise phase stability, which can be difficult to achieve. In addition, transmitting quantum states through fibers can introduce noise and loss, leading to lower fidelity and higher quantum bit error rates (QBER). See also List of quantum key distribution protocols References Cryptographic algorithms Quantum information science Quantum cryptography Quantum cryptography protocols
https://en.wikipedia.org/wiki/Floating%20cable-stayed%20bridge
A Floating cable-stayed bridge is a type of cable-stayed bridge where the towers float on tension-leg submerged material, tethered to the seabed for buoyancy. No floating cable-stayed bridge has been made or planned yet, a floating suspension bridge has been planned in Norway. This bridge could be more stable horizontally across the bridge than floating suspension bridges, the lateral movement force from the wind and current in the water is a problem trying to be resolved by placing the tethered cables at different angles from the floating platform to the seabed. See also List of longest cable-stayed bridge spans List of longest suspension bridge spans List of cable-stayed bridges in the United States Cable-stayed suspension bridge References Bridges by structural type Structural engineering
https://en.wikipedia.org/wiki/Doxbin%20%28clearnet%29
Doxbin is a type of pastebin and is primarily used and designed for the purpose of doxing. It gained some media attention partially because it was/is used for the purpose of swatting. In January 2022, the site experienced a data breach. Legality Doxbin has seemed to avoid any heavy attention from law enforcement due to their rules and regulations users have to abide by when using the service. Doxbin does not allow any minor, illegally obtained or harassing/threatening info. Using Section 230 of the Communications Decency Act to be immune to liability of cyberstalking laws globally. The privacy policy mentions that they do not allow illegally obtained material and instigates by saying "Can anybody prove it? Not unless you brag about it". It also states that "Doxbin was not made for harassment, intimidation or to cause nuisance", but also states that "it is impossible for some PHP code to harass somebody". Doxbin and Lapsus$ "White" was a founding leader of a ransomware group named Lapsus$ which had a list of notable data leaks, such as ones from Nvidia, T-Mobile, and Rockstar Games. The feud between the Doxbin owner C1 and between White had been ongoing since he leaked the Doxbin database. C1 had eventually doxed White on January 8, 2022, and published his personal details onto Doxbin. White's house was raided on the morning of April 1st 2022 and earlier in December 2021, both in relation to Lapsus$. White was charged with: Three counts of unauthorized access to a computer with intent to impair the reliability of data; One count of fraud by false representation; One count of unauthorized access to a computer with intent to hinder access to data; One count of causing a computer to perform a function to secure unauthorized access to a program. "Swatting" incident In July 2020, John William Kirby Kelley, who was involved in a neo-Nazi swatting conspiracy and a group linked to a neo-Nazi terrorist network known as Atomwaffen Division, admitted hel
https://en.wikipedia.org/wiki/Virivore
Virivore (equivalently virovore) comes from the English prefix viro- meaning virus, derived from the Latin word for poison, and the suffix -vore from the Latin word vorare, meaning to eat, or to devour; therefore, a virivore is an organism that consumes viruses. Virivory is a well-described process in which organisms, primarily heterotrophic protists, but also some metazoans consume viruses. Viruses are considered a top predator in marine environments, as they can lyse microbes and release nutrients (i.e. the viral shunt). Viruses also play an important role in the structuring of microbial trophic relationships and regulation of carbon flow. Discovery The first described virovore was a small marine flagellate that was shown to ingest and digest virus particles. Subsequently, numerous studies directly and indirectly demonstrated the consumption of virions. In 2022, DeLong et al. showed that over the course of two days the ciliates Halteria and Paramecium reduced chlorovirus plaque-forming units by up to two orders of magnitude, supporting the idea that nutrients were transferred from the viruses to consumers. Furthermore, the Halteria population grew with chlorovirus as the only source of nutrition, and grew minimally in the absence of chlorovirus. The Paramecium population, however, did not differ in growth when fed chloroviruses compared to the control group. Since the Paramecium population size remained constant in the presence of only cholorviruses, this indicated that Paramecium is capable of maintaining its population size, but not growing using chlorovirus as the sole carbon source. These data showed that some grazers can grow on viruses, but it does not apply to all grazers. It was estimated that Halteria consumed between 10,000 and 1,000,000 viruses per day.It's known that small protists, such as Halteria and Paramecium, are consumed by zooplankton indicating the movement of viral-derived energy and matter up through the aquatic food web. This contradic
https://en.wikipedia.org/wiki/Hallucination%20%28artificial%20intelligence%29
In the field of artificial intelligence (AI), a hallucination or artificial hallucination (also called confabulation or delusion) is a response generated by an AI which contains false or misleading information presented as fact. For example, a hallucinating chatbot might, when asked to generate a financial report for a company, falsely state that the company's revenue was $13.6 billion (or some other number apparently "plucked from thin air"). Such phenomena are termed "hallucinations", in loose analogy with the phenomenon of hallucination in human psychology. However, one key difference is that human hallucination is usually associated with false percepts, but an AI hallucination is associated with the category of unjustified responses or beliefs. Some researchers believe the specific term "AI hallucination" unreasonably anthropomorphizes computers. AI hallucination gained prominence around 2022 alongside the rollout of certain large language models (LLMs) such as ChatGPT. Users complained that such bots often seemed to pointlessly embed plausible-sounding random falsehoods within their generated content. By 2023, analysts considered frequent hallucination to be a major problem in LLM technology. Analysis Various researchers cited by Wired have classified adversarial hallucinations as a high-dimensional statistical phenomenon, or have attributed hallucinations to insufficient training data. Some researchers believe that some "incorrect" AI responses classified by humans as "hallucinations" in the case of object detection may in fact be justified by the training data, or even that an AI may be giving the "correct" answer that the human reviewers are failing to see. For example, an adversarial image that looks, to a human, like an ordinary image of a dog, may in fact be seen by the AI to contain tiny patterns that (in authentic images) would only appear when viewing a cat. The AI is detecting real-world visual patterns that humans are insensitive to. However, these
https://en.wikipedia.org/wiki/Cable-stayed%20suspension%20bridge
A cable-stayed suspension bridge or CSS bridge merges the designs of cable-stayed bridges and suspension bridges. The suspension bridge's architecture is better at handling the load in the middle of the bridge, while the cable stayed bridge is better suited to handle the load closest to the tower. Combining these two architectural engineering ideas into a hybrid has been done in Istanbul with the Yavuz Sultan Selim Bridge. A bridge over the Krishna River in India has been approved in October 2022 that will be a CSS bridge design. Yavuz Sultan Selim Bridge In Turkey the Yavuz Sultan Selim Bridge over the Bosporus Strait opened in August 2016. The main span is long and is the 13th longest bridge span in the world. See also List of longest cable-stayed bridge spans List of longest suspension bridge spans List of cable-stayed bridges in the United States List of bridge types Floating cable-stayed bridge Floating suspension bridge References Structural engineering Building engineering
https://en.wikipedia.org/wiki/Universal%20Taylor%20series
A universal Taylor series is a formal power series , such that for every continuous function on , if , then there exists an increasing sequence of positive integers such thatIn other words, the set of partial sums of is dense (in sup-norm) in , the set of continuous functions on that is zero at origin. Statements and proofs Fekete proved that a universal Taylor series exists. References Mathematical series
https://en.wikipedia.org/wiki/James%20A.%20Rafferty
James A. Rafferty, Vice President, Officers' Committee member, Director, and member of the executive committee of Union Carbide, was an important figure in the petrochemical industry. Rafferty guided Union Carbide's effort in developing the new industry of synthetic aliphatic chemicals (aliphatic compounds are one of the two main branches within organic chemistry) and was instrumental in the development of the liquid oxygen industry. Rafferty directed Union Carbide's collaboration with the United States government for the Manhattan Project and with the War Production Board for the synthetic rubber program during World War II. Rafferty was born in Chicago, Illinois on May 4, 1886, and studied engineering and chemistry at the Illinois Institute of Technology (where Rafferty would later become a Trustee). After graduation in 1908, Rafferty worked for the People's Gas, Light, and Coke Company and then in 1917 joined the Linde Air Products Company, which later merged with three other companies to become Union Carbide. Rafferty became general manager of the newly formed Union Carbide subsidiary, the Carbide and Carbon Chemicals Corporation (CCCC) in 1920. He became vice president in 1924, President in 1929, and chairman of the board in 1944. He was made president of the Bakelite Corporation in 1939 and Chairman of Bakelite in 1944. Under Rafferty's leadership, Carbide and Carbon Chemicals Corporation went on to become the second largest chemical company in the United States by 1948. Rafferty became a Vice President of Union Carbide, the parent company of the CCCC, in 1938, a Director in 1941, and a member of the executive committee in 1944. Rafferty served as Chairman of the Union Carbide's new product development committee until his death on December 19, 1951. As a result of lifetime achievements, Rafferty was awarded the Chemical Industry Medal in 1948. The Manhattan Project Under the auspices of the Manhattan Project, Rafferty directed Union Carbide's efforts to
https://en.wikipedia.org/wiki/Windows%2010X
Windows 10X is a cancelled edition of Windows 10, a major release of the Microsoft Windows series of operating systems. Announced by Microsoft on October 2, 2019, it was initially developed as an operating system to support dual-screen devices, such as the unreleased Surface Neo. 10X was expected to be released in 2020, but Microsoft later announced that the project had been cancelled in May 2021. However, some features and design changes from 10X were integrated into the newer Windows 11. While the operating system was originally designed for dual-screen devices, Windows 10X shifted its target to single-screen devices in 2020 due to increasing demand for traditional computers from the COVID-19 pandemic. Features New and changed Windows 10X introduced major changes to the Windows shell, abolishing legacy components in favor of new user experiences and enhanced security, as well as some notable design changes, which were integrated into Windows 11: The taskbar is now centered. It has 3 different sizes; Small, intended for mouse-controlled desktop computers, and medium and large are intended for touch computers The taskbar is automatically hidden, and can be clicked/tapped to be shown. New start menu: Microsoft redesigned the start menu with a focus on productivity, with the search box now at the top instead of in the taskbar like in other editions of Windows 10, as well as a section of pinned apps which is the successor to the Live Tiles from other Windows 10 editions and 8. The Action Center has been renamed “Quick Settings” and given a redesign. Network/Internet controls, volume controls and power options have been moved to Quick Settings. There also exists an area to check notifications and control music playing from a specific app. Window borders have been rounded. The Out-of-box setup has been updated to better fit the new user interface of 10X, with a more modern design, as well as Cortana no longer being an integrated feature. The default UI now use
https://en.wikipedia.org/wiki/IEEE%20Transactions%20on%20Instrumentation%20and%20Measurement
IEEE Transactions on Instrumentation and Measurement is a bimonthly peer-reviewed scientific journal published by the IEEE Instrumentation and Measurement Society. It covers the theory, design and use of electronic instrumentation and measurement techniques. Its editor-in-chief is Ruqiang Yan (Xi'an Jiaotong University). The journal was established in 1963 as the IRE Transactions on Instrumentation by Institute of Radio Engineers. According to the Journal Citation Reports, the journal has a 2021 impact factor of 5.332. References External links Instrumentation and Measurement, IEEE Transactions on English-language journals Academic journals established in 1963 Bimonthly journals Electronics journals
https://en.wikipedia.org/wiki/Vanishing%20puzzle
A vanishing puzzle is a mechanical optical illusion comprising multiple pieces which can be rearranged to show different versions of a picture depicting several objects, the number of which depending on the arrangement of the pieces. History Wemple & Company marketed an advertising card named The Magic Egg Puzzle, (How Many Eggs?) in New York in 1880. Cutting the rectangular card into four oblongs allowed the pieces to be rearranged to show either 8, 9 or 10 eggs. Many other similar puzzles have been published since. Chess player and recreational mathematician Sam Loyd patented rotary vanishing puzzles in 1896 and published versions named Get Off the Earth, Teddy and the Lion and The Disappearing Bicyclist (pictured). Each had a circular card connected to a cardboard backdrop with a pin, letting it freely rotate. In The Disappearing Bicyclist, when the disc is rotated such that the arrow points to A, 13 boys can be counted, but when it points to B, there are only 12 boys. Prizes from $5 to $100 were offered for the best explanation of one illusion. Though the names of the winners were published, their explanations were not. Similar puzzles The missing square puzzle is an optical illusion used in mathematics classes to help students reason about geometrical figures; or rather to teach them not to reason using figures, but to use only textual descriptions and the axioms of geometry. It depicts two arrangements made of similar shapes in slightly different configurations. Each apparently forms a 13×5 right-angled triangle, but one has a 1×1 hole in it. Sam Loyd's chessboard paradox demonstrates two rearrangements of an 8×8 square. In the "larger" rearrangement (the 5×13 rectangle in the image to the right), the gaps between the figures have a combined unit square more area than their square gaps counterparts, creating an illusion that the figures there take up more space than those in the original square figure. See also Missing square puzzle Chessboard parado
https://en.wikipedia.org/wiki/Millennial%20pause
The millennial pause is a pause in speaking that is present at the start of some recorded videos, especially on short-form video app TikTok. The practice of including such a pause is generally ascribed to millennials, a group often defined to include people born in the 1980s or 1990s. The phenomenon is an example of the digital generation gap between millennials and younger generations. Observation The practice was first observed as early as 1 March 2021, when a TikTok user questioned "why [millennials] pause so long before speaking", and mentioned that they should "hit record and GO". The term "millennial pause" is attributed to TikTok user nisipisa, a millennial who posted a TikTok video on 26 November 2021, pointing out that Taylor Swift, a millennial singer, includes such pauses at the start of her videos. Kathryn Lindsay of The Atlantic, a millennial herself, stated that this pause is becoming more noticeable as short-form videos are becoming more prevalent on social network Instagram, instant messaging app Snapchat, and online video platform YouTube. Videos by people other than millennials have also been described as exhibiting a millennial pause; Parade reported that singer JC Chasez included one in his TikTok debut video, and James Factora of Them mentioned how actress Jennifer Coolidge included one in "a perfect TikTok" during her debut. Theory It has been conjectured that the reason why people older than zoomers tend to include a pause at the start of their videos is to make sure that the device they are using is actually recording before beginning to say anything. In contrast, younger users are said to trust that the devices are working correctly, and begin speaking immediately after the recording begins. Another theory for the pause's prevalence is that the habit may have first been adopted when earlier recording devices commonly took a split second before beginning to record. Although newer devices do not exhibit the same delay, this habit
https://en.wikipedia.org/wiki/Core-compact%20space
In general topology and related branches of mathematics, a core-compact topological space is a topological space whose partially ordered set of open subsets is a continuous poset. Equivalently, is core-compact if it is exponentiable in the category Top of topological spaces. Expanding the definition of an exponential object, this means that for any , the set of continuous functions has a topology such that function application is a unique continuous function from to , which is given by the Compact-open topology and is the most general way to define it. Another equivalent concrete definition is that every neighborhood of a point contains a neighborhood of whose closure in is compact. As a result, every (weakly) locally compact space is core-compact, and every Hausdorff (or more generally, sober) core-compact space is locally compact, so the definition is a slight weakening of the definition of a locally compact space in the non-Hausdorff case. See also Locally compact space References Further reading Topology
https://en.wikipedia.org/wiki/Intermittent%20water%20supply
A piped water supply and distribution system is intermittent when water continuity is for less than 24 hours a day or not on all days of the week. During this continuity defining factors are water pressure and equity. At least 45 countries have intermittent water supply (IWS) systems. It is contrasted with a continuous or "24/7" water supply, the service standard. No system is intentionally designed to be intermittent, but they may become that way because of system overexpansion, leakage and other factors. As of 2022, there was no feasible method for modelling IWS, including no computer-aided tools. Contamination issues can be associated with an intermittent water distribution system. Global public health impact includes millions of cases of infections and diarrhea, and 1560 deaths annually. A continuous supply is not practical in all situations. In the short term, an IWS may have some benefits. These may include addressing demand with a limited supply in a more economical manner. An intermittent supply may be temporary (e.g., when water reserves are low) or permanent (e.g., where the piped system cannot sustain a continuous supply). Associated factors resulting from an intermittent supply include water extraction by users at the same time, resulting in low pressure and a possible higher peak demand. Prevalence A large share of water supply systems around the world are intermittent; in other words, intermittent water supply is a norm. About 1.3 billion people have a piped supply that is intermittent, including large populations in Africa, Asia, and Latin America. This does not include those who do not get piped water at all, about 2.7 billion people. Countries with intermittent supply in some areas and continuous supply in others include India and South Africa. In India, various cities are at various stages of constructing 24/7 supply systems, such as Chandigarh, Delhi, Shimla, and Coimbatore. In Cambodia, Phnom Penh increased coverage from 25% to 85% and durati
https://en.wikipedia.org/wiki/Markus%20Ralser
Markus Ralser (born 3 April 1980 in Vipiteno, Italy) is an Italian biologist. His main research interest is metabolism of microorganisms. He is also known for his work on the origin of metabolism during the origin of life, and proteomics. Life and career Prof. Ralser serves since 2019 as head of the Institute of Biochemistry at the Charité – Universitätsmedizin Berlin, Germany; as well as since 2022 as group leader at the University of Oxford, UK. He studied genetics and molecular biology in Salzburg, Austria. He completed his PhD in 2006 at the Max Planck Institute for Molecular Genetics in Berlin, Germany, studying neurodegenerative diseases. This was followed by a postdoctoral fellowship at the Vrije Universiteit Amsterdam, Netherlands, where he started to explore mass spectrometry. He returned to the MPI for Molecular Genetics in 2007 to become junior group leader, but in 2011 relocated his group to the University of Cambridge, UK. He then relocated again, becoming group leader at the newly opened Francis Crick Institute in London in 2013 (senior group leader since 2019). His group moved to Oxford in 2022. Research Ralser's two research groups use LC–MS to analyze the proteomes and metabolomes of microorganisms. The main model organism is the baking yeast (Saccharomyces cerevisiae), but other species, such as pathogenic fungus Candida albicans and the fission yeast Schizosaccharomyces pombe, are used too. The Ralser lab not only uses LC–MS, but also develops novel LC–MS methods and protocols that improve detection accuracy, speed, and throughput. Specializing in data-independent acquisition, the group has developed scanning SWATH MS and Zeno SWATH MS in collaboration with MS manufacturer SCIEX. Both methods greatly improve upon SWATH MS, which was developed in Switzerland in 2012. The group additionally developed an acquisition method—DIA-NN—that uses neural networks. But proteins and metabolites are not the only focus: in 2022 the lab developed a protoco
https://en.wikipedia.org/wiki/Intercellular%20communication
Intercellular communication (ICC) refers to the various ways and structures that biological cells use to communicate with each other directly or through their environment. Different types of cells use different proteins and mechanisms to communicate with one another using extracellular signalling molecules. Components of each type of intercellular communication may be involved in more than one type of communication making attempts at clearly separating the types of communication listed somewhat futile. The sections are loosely compiled from various areas of research rather than by a systematic attempt of classification by functional or structural characteristics. Communication within an organism Cell signalling Molecular cell signaling Single celled organisms will sense their environment to seek food and may send out signals to other cells to behave symbiotically or reproduce. A classic example of this is the slime mold. The slime mold shows how intercellular communication with a small molecule e.g. cyclic AMP allows a simple organism to form from an organized aggregation of single cells. Research into cell signalling investigated a receptor specific to each signal or multiple receptors potentially being activated by a single signal. It is not only the presence or absence of a signal that is important but also the strength. Using a chemical gradient to coordinate cell growth and differentiation continues to be important as multicellular animals and plants become more complex. This type of intercellular communication within an organism is commonly referred to as cell signalling. This type of intercellular communication is typified by a small signalling molecule diffusing through the spaces around cells, often relying on a diffusion gradient forming part of the signalling response. Cell junctions Complex organisms may have molecules to hold the cells together which can also be involved in intercellular communication. Some binding molecules are termed the extrace
https://en.wikipedia.org/wiki/Zero-touch%20provisioning
Zero-touch provisioning (ZTP), or zero-touch enrollment, is the process of remotely provisioning large numbers of network devices such as switches, routers and mobile devices without having to manually program each one individually. The feature improves existing provisioning models, solutions and practices in the areas of wireless networks, (complex) network management and operations services, and cloud based infrastructure services provisioning. ZTP saves configuration time while reducing errors. The process can also be used to update existing systems using scripts. Research has shown that ZTP systems allow for faster provisioning versus manual provisioning. The global market for ZTP services was estimated to be $2.1 Billion in 2021. In April 2019, the Internet Engineering Task Force submitted RFC 8572 Secure Zero Touch Provisioning (SZTP) as an Internet standard. Applications One application of the technology is to improve delivery of cloud computing services. The concept has been particularly influential for information technology when paired with mobile device management. Repetitive processes that can be automated and streamlined include configuring settings; collecting inventory details; deploying apps; managing licenses; and implementing security policy, including password management and wiping remote devices. System architecture A basic ZTP system requires a network device that supports ZTP, a server that supports Dynamic Host Configuration Protocol (DHCP) or Trivial File Transfer Protocol (TFTP), and a file server. When a ZTP-enabled device is powered on, the device's boot file sets up configuration parameters. A switch then sends a request using DHCP or TFTP to get the device's configuration file from a central location. The file then runs and configures ports, IP addresses and other server parameters for each location. Similar concepts A similar concept is the zero-touch network, which integrates zero-touch provisioning with automation, artificial int
https://en.wikipedia.org/wiki/Semantic%20spacetime
Semantic spacetime is a theoretical framework for agent-based modelling of spacetime, based on Promise Theory. It is relevant both as a model of computer science and as an alternative network based formulation of physics in some areas. Semantic Spacetime was introduced by physicist and computer scientist Mark Burgess, in a series of papers called Spacetimes with Semantics, as a practical alternative to describing space and time, initially for Computer Science.  It attempts to unify both quantitative and qualitative aspects of spacetime processes into a single model. This is referred to by Burgess as covering both “dynamics and semantics”. Promise theory is used as a representation for semantics. Directed adjacency is the graph theoretic logical primitive, but with the caveat that each node must both emit and absorb adjacency relations, cooperatively, similar to the unitary structure of quantum probabilities and transitions. Thus space is made up of cooperating nodes and edges. The representation of spacetime becomes a form of labelled graph, specifically built from promise theoretic bindings. Origins According to Burgess, Semantic Spacetime originates from asking what are the implications of Promise Theory to our understanding of space and time. The traditional view of spacetime seems to have no relevance to phenomena in computing, electronics, biology, or many other information based processes. The classical understanding of spacetime from Newton's era is based on ballistics, the idea about space and time was that of a purely passive theatre for the motion and behaviours of material bodies. Einstein partially changed that perception with General Relativity, in which spacetime geometry is an active participant with its own properties, i.e. curvature, energy, and mass. In the process models of Computer Science, Electronics, Biology, and Logistics, however, space is formed from functional components that act more like service providers. Processes are representatio
https://en.wikipedia.org/wiki/Human%20chimera
A human chimera is a human with a subset of cells with a distinct genotype than other cells, that is, having genetic chimerism. In contrast, an individual where each cell contains genetic material from a human and an animal is called a human–animal hybrid. Mechanisms A major mechanisms of human chimerism is mosaicism, wherein there is a mutation of the genetic material in a cell, giving rise to a subset of cells that are different from the rest. Another mechanism is the fusion of more than one fertilized zygote in the early stages of prenatal development. In artificial chimerism, an individual has one cell lineage that was inherited genetically at the time of the formation of the human embryo and the other that was introduced through a procedure, including organ transplantation or blood transfusion. Specific types of transplants that could induce this condition include bone marrow transplants and organ transplants, as the recipient's body essentially works to permanently incorporate the new blood stem cells into it. Examples Natural chimerism Natural chimerism has been documented in humans in several instances. The Dutch sprinter Foekje Dillema was expelled from the 1950 national team after she refused a mandatory sex test in July 1950; later investigations revealed a Y-chromosome in her body cells, and the analysis showed that she was probably a 46,XX/46,XY mosaic female. In 1953, a human chimera was reported in the British Medical Journal. A woman was found to have blood containing two different blood types. Apparently this resulted from her twin brother's cells living in her body. A 1996 study found that such blood group chimerism is not rare. In 2002, Lydia Fairchild was denied public assistance in Washington state when DNA evidence appeared to show that she was not the mother of her children. A lawyer for the prosecution heard of a human chimera in New England, Karen Keegan, and suggested the possibility to the defense, who were able to show that Fairch
https://en.wikipedia.org/wiki/Taiga%20of%20North%20America
The Taiga of North America is a Level I ecoregion of North America designated by the Commission for Environmental Cooperation (CEC) in its North American Environmental Atlas. The taiga ecoregion includes much of interior Alaska as well as the Yukon forested area, and extends on the west from the Bering Sea to the Richardson Mountains in on the east, with the Brooks Range on the north and the Alaska Range on the south end. It is a region with a vast mosaic of habitats and a fragile yet extensive patchwork of ecological characteristics. All aspects of the region such as soils and plant species, hydrology, and climate interaction, and are affected by climate change, new emerging natural resources, and other environmental threats such as deforestation. These threats alter the biotic and abiotic components of the region, which lead to further degradation and to various endangered species. Flora, fauna, and soil Soils and plant species The main type of soil in the taiga is Spodosol. These soils contain a Spodic horizon, a sandy layer of soil that has high accumulations of iron and aluminum oxides, which lays underneath a leached A horizon. The color contrast between the Spodic horizon and the overlying horizon is very easy to identify. The color change is the result of the migration of iron and aluminum oxides from small, but consistent amounts of rainfall from the top horizon to the lower horizon of the soil. The decomposition of organic matter is very slow in the taiga because of the cold climate and low moisture. With the slow decomposition of organic matter, nutrient cycling is very slow and the nutrient level of the soil is also very low. The soils in the taiga are quite acidic as well. A relatively small amount of rainfall coupled with the slow decomposition of organic material allows the acidic plant debris to sit and saturate the top horizons of the soil profile. As a result of the infertile soil, only a few plant species can really thrive in the taiga. The c
https://en.wikipedia.org/wiki/Cis-action
Cis-action or cis-acting is a vague term that, in general, means "an action on the same" in contrast to trans-action "an action on a different". In other words, the initiator of the action is affected by it. Cis-actions occur wherever circular dependencies are present. Most notably in: biology, where it refers to life itself as in the selfish gene, cis-acting genetic elements and self-maintenance as a trait of self-replicating entities; chemistry, where it is known as autocatalytic set. Software engineering, as in computer viruses. References Genetics terms Molecular biology
https://en.wikipedia.org/wiki/Service%20account
A service account or application account is a digital identity used by an application software or service to interact with other applications or the operating system. They are often used for machine to machine communication (M2M), for example for application programming interfaces (API). The service account may be a privileged identity within the context of the application. Updating passwords Local service accounts can interact with various components of the operating system, which makes coordination of password changes difficult. In practice this causes passwords for service accounts to rarely be changed, which poses a considerable security risk for an organization. Some types of service accounts do not have a password. Wide access Service accounts are often used by applications for access to databases, running batch jobs or scripts, or for accessing other applications. Such privileged identities often have extensive access to an organization's underlying data stores laying in applications or databases. Passwords for such accounts are often built and saved in plain textfiles, which is a vulnerability which may be replicated across several servers to provide fault tolerance for applications. This vulnerability poses a significant risk for an organization since the application often hosts the type of data which is interesting to advanced persistent threats. Service accounts are non-personal digital identities and can be shared. Misuse Google Cloud lists several possibilities for misuse of service accounts: Privilege escalation: Someone impersonates the service account Spoofing: Someone impersonates the service account to hide their identity Non-repudiation: Performing actions on their behalf with a service account in cases where it is not possible to trace the actions of the abuser Information disclosure: Unauthorized persons extract information about infrastructure, applications or processes See also Kerberos Service Account, a service account in Ker
https://en.wikipedia.org/wiki/Sulemana%20Abdul%20Samed
Sulemana Abdul Samed, also known as Awuche (meaning 'Let's Go' in the Hausa language), is the tallest man in Ghana. He was born in 1994 in the Northern Region of Ghana. Abdul Samed was diagnosed with the endocrine disorder acromegaly, which is caused by an excess of growth hormone in the body. An investigation by a BBC reporter revealed that Samed was only 7 feet 4 inches (223 cm), suggesting that the hospital at which he had been measured had made a "mistake" when other sources reported a larger height. He has undergone treatment for his condition. Despite his unusual height, Abdul Samed has lived a relatively normal life, attending school and being employed as a farmer and a mechanic. He has stated that he hopes to marry and have children. Abdul Samed has received media attention for his height, which he has used to raise awareness about acromegaly and the challenges faced by people who have the condition. References Biological records Human height People 1994 births Living people
https://en.wikipedia.org/wiki/Statistics%20of%20Deadly%20Quarrels
Statistics of Deadly Quarrels is a 1960 book by English mathematician and physicist Lewis Fry Richardson 11 October 1881 - 30 September 1953 published by Boxwood Press. The book is a mathematical and social science study on the origins of war; topics that informed much of Richardson's research throughout his life. The book received mixed reviews in academia, with overall critical consensus that the works therein are important pioneering endeavors. Background The book can be seen as a follow-up to Richardson's book Arms and Insecurity (1949) with a number of reviewers commenting on both books, treating them as a related set. It was published posthumously, based on published and unpublished works of Richardson, and was edited by American political scientists Quincy Wright and C. C. Lienau. Contents In Statistics of Deadly Quarrels Richardson presented data on most conflicts, in particular, wars, from early 19th century to mid-20th century. He hypothesized a base 10 logarithmic scale for conflicts (not just wars but at the bottom of the scale, even simple homicides). He illustrated the fact that there are many more small fights, in which only a few people die, than large ones that kill many. While no conflict's size can be predicted beforehand and it is impossible to give an upper limit to the series, overall they do form a Poisson distribution. Richardson also attempted to correlate factors such as economics, language, and religion with the causes of war. Most proved insignificant, except religion; data indicated that countries with differing religions are more likely to engage in hostilities. Some of his findings suggested that Christian nations participated in an above-average number of hostilities, particularly against Islamic nations; and that Spanish speakers tended to war against one another more than other language speakers, while Chinese speakers fought against one another less than expected. (Here Richardson criticizes individualism and praises collect
https://en.wikipedia.org/wiki/Journal%20of%20Rehabilitation%20in%20Civil%20Engineering
The Journal of Rehabilitation in Civil Engineering is a quarterly peer-reviewed open-access scientific journal published by Semnan University and the editor-in-chief is Ali Kheyroddin (Semnan University). The journal covers all aspects of rehabilitation engineering. It was established in 2012 and is indexed and abstracted in Scopus. References External links Academic journals established in 2012 Civil engineering journals Quarterly journals English-language journals
https://en.wikipedia.org/wiki/Dayna%20Communications
Dayna Communications, Inc., was a privately-held American computer company, active from 1984 to 1997 and based in Salt Lake City, Utah. It primarily manufactured networking products for Apple Computer's computing platforms, including the Macintosh, PowerBook and Newton (although some of its later networking products were platform-independent and could work on PCI-based IBM PC compatibles). In 1997, the company was acquired by Intel for nearly $14 million. History Dayna Communications was founded by William Sadleir in Salt Lake City in 1984, with $1.6 million in start-up capital. In May 1985, the company delivered the MacCharlie, a hardware add-on for the Macintosh 128K that was essentially a headless IBM PC clone, complete with one or two 5.25-inch floppy drives, that clipped onto the side of the Mac. It connected to the Mac via a serial cable; users could run PC software through a terminal application provided through included floppy disks. The product received positive reviews, with The New York Times calling it "a brilliant idea" that gave Apple the potential to "grow in businesses or households already committed to IBM hardware and software". The product was however a market failure, with Sadleir overspending on advertising while ignoring the needs of customers he had surveyed, the majority of which specifically wanted a means of transferring files captured in the IBM PC's FAT filesystem to the Mac while not necessarily desiring a means of running IBM PC software on the Mac. Dayna nearly went bankrupt amid debt to creditors, but after securing $2.5 million in investment capital from Norman Lear of Act III Communications, Sadleir was able to avoid Chapter 11 bankruptcy before releasing the FT100, a retooling of the MacCharlie that leaned on the file interoperability aspect of the MacCharlie while removing any unnecessary components. It sold for less than half the street price of the MacCharlie and even reused the latter's packaging. Released in November 1986,
https://en.wikipedia.org/wiki/List%20of%20largest%20non-human%20primates
This is a list of large extant primate species (excluding humans) that can be ordered by average weight or height range. There is no fixed definition of a large primate, it is typically assessed empirically. Primates exhibit the highest levels of sexual dimorphism amongst mammals, therefore the maximum body dimensions included in this list generally refer to male specimens. Mandrills and baboons are monkeys; the rest of the species on this list are apes. Typically, Old World monkeys (paleotropical) are larger than New World monkeys (neotropical); the reasons for this are not entirely understood but several hypotheses have been generated. As a rule, primate brains are "significantly larger" than those of other mammals with similar body sizes. Until well into the 19th century, juvenile orangutans were taken from the wild and died within short order, eventually leading naturalists to mistakenly assume that the living specimens they briefly encountered and skeletons of adult orangutans were entirely different species. Largest non-human primates See also Largest wild canids List of largest land carnivorans Monkey Great apes List of heaviest land mammals Largest mammals Sexual dimorphism in non-human primates References Further reading Body Mass in Lowland Gorillas: A Quantitative Analysis (2019) External links AlltheWorldsPrimates.org Heaviest or most massive organisms Lists of largest animals Lists of primates Primate anatomy
https://en.wikipedia.org/wiki/StrongDM
StrongDM is an American technology company that develops an infrastructure access platform. History StrongDM was founded in 2015 by Elizabeth Zalman, Justin McCarthy, and Schuyler Brown. The company was one of the first female led startups backed by Hearst's initiative to invest in women led startups. The company received an early investment of $250,000 from HearstLabs. In 2018, the company released free open source software called Comply which allows smaller organizations to implement SOC 2 in an open source environment. Any organization can download a pre-authored library of 24 policies, edit directly in markdown, track versions with Github, assign compliance tasks through Jira and monitor progress in a unified dashboard. Elizabeth Zalman continued as CEO until 2021 when Tim Prendergast was appointed new CEO. As of 2023, the company had received investments from investors such as Bloomberg Beta and Tiger Global. Douglas Leone joined the board as part of an investment by Sequoia Capital. Software The software is a privileged access manager for aggregating secure access and permissions. It centralizes backend infrastructure access for legacy or multi-cloud environments. The software also integrates with identity providers, secret stores, and SIEM tools. The platform provides and manages user access to backend infrastructure like serves and databases, and logs user actions in video replay. Similar software is produced by CyberArk, Delinea, BeyondTrust, Teleport and Perimeter 81. Fundraising Founding CEO, Elizabeth Zalman is one of the first woman CEOs in Silicon Valley to successfully raise over $100M in venture capital. She successfully raised over $76M as CEO of StrongDM. Seed - $800,000 in 2015 from Bloomberg Beta, Data Collective, SocialStarts, Jerry Neumann Seed II, $3,000,000 in 2016 from True Ventures, Bloomberg Beta, Laconia Capital Group, Social Starts, Jerry Neumann Series A, $17,000,000 in 2020 from Sequoia Series B, $54,000,000 in 2021 fro
https://en.wikipedia.org/wiki/BrainChip
BrainChip (ASX:BRN, OTCQX:BRCHF) is an Australia-based technology company, founded in 2004 by Peter Van Der Made, that specializes in developing advanced artificial intelligence (AI) and machine learning (ML) hardware. The company's primary products are the MetaTF development environment, which allows the training and deployment of spiking neural networks (SNN), and the AKD1000 neuromorphic processor, a hardware implementation of their spiking neural network system. BrainChip's technology is based on a neuromorphic computing architecture, which attempts to mimic the way the human brain works. The company is a part of Intel Foundry Services and Arm AI partnership. History Australian mining company Aziana acquired BrainChip in March 2015. Later, via a reverse merger of the now dormant Aziana in September 2015 BrainChip was put on the Australian Stock Exchange (ASX), and van der Made started commercializing his original idea for artificial intelligence processor hardware. In 2016, the company appointed former Exar CEO Louis Di Nardo as CEO; Van Der Made then took the position of CTO. In October 2021, the company announced that it was taking orders for its Akida AI Processor Development Kits, and in January 2022, that it was taking orders for its Akida AI Processor PCIe boards. In April 2022, BrainChip partnered with NVISO to provide collaboration with applications and technologies. In November 2022, BrainChip added the Rochester Institute of Technology to its University AI accelerator program. The next month, BrainChip was a part of Intel Foundry Services. In January 2023, Edge Impulse announced support for BrainChip's AKD processor. MetaTF The MetaTF software is designed to work with a variety of image, video, and sensor data, and is intended to be implemented in a range of applications, including security, surveillance, autonomous vehicles, and industrial automation. The software uses Python to create spiking neural networks (or convert other neural networks to
https://en.wikipedia.org/wiki/National%20Academy%20of%20Engineering%20of%20Korea
The National Academy of Engineering of Korea (NAEK; ) is a Korean nonprofit, non-governmental organization founded to support engineering and technology development in academia, industry, and national institutions; and to contribute to the development and sustainable development of engineering technology through academic research. The Academy was founded in 1996 in accordance with Article 40 of the Industrial Technology Innovation Promotion Act. History The Korean Association for Engineering Deans petitioned the government to establish the National Academy of Engineering of Korea in December 1993. The Association was included in the Industrial Technology Innovation Promotion Act and then approved by the Ministry of Industry and Energy. The Board of Directors, chairman, and initial members were determined in April 1996 followed by the first president two months later. Objectives There are four stated objectives of the National Academy of Engineering of Korea: Conduct research and propose policies in regards to engineering technologies Strengthen international activities of engineering technologies through international network of the International Council of Academies of Engineering and Technological Sciences (CAETS), the East Asia Round Table Meetings, etc. Create and promote engineering culture Acknowledge and honor engineers who brought about innovation for society Membership Membership is divided into members, associate members, emeritus members, and foreign members both in academia and the private sector. Engineering divisions include electrical and electronic engineering; mechanical engineering; architectural, civil and environmental engineering; chemical and biological engineering; material and energy engineering; technology, management and policy; computer science and engineering; and biomedical engineering. Leadership Chairmen Rieh Chong Hun (April 1996–September 1998) Yun Jong Yong () (September 1998–February 2005) Huh Chin Gyu (February 2005–Ju
https://en.wikipedia.org/wiki/Adversarial%20stylometry
Adversarial stylometry is the practice of altering writing style to reduce the potential for stylometry to discover the author's identity or their characteristics. This task is also known as authorship obfuscation or authorship anonymisation. Stylometry poses a significant privacy challenge in its ability to unmask anonymous authors or to link pseudonyms to an author's other identities, which, for example, creates difficulties for whistleblowers, activists, and hoaxers and fraudsters. The privacy risk is expected to grow as machine learning techniques and text corpora develop. All adversarial stylometry shares the core idea of faithfully paraphrasing the source text so that the meaning is unchanged but the stylistic signals are obscured. Such a faithful paraphrase is an adversarial example for a stylometric classifier. Several broad approaches to this exist, with some overlap: imitation, substituting the author's own style for another's; translation, applying machine translation with the hope that this eliminates characteristic style in the source text; and obfuscation, deliberately modifying a text's style to make it not resemble the author's own. Manually obscuring style is possible, but laborious; in some circumstances, it is preferable or necessary. Automated tooling, either semi- or fully-automatic, could assist an author. How best to perform the task and the design of such tools is an open research question. While some approaches have been shown to be able to defeat particular stylometric analyses, particularly those that do not account for the potential of adversariality, establishing safety in the face of unknown analyses is an issue. Ensuring the faithfulness of the paraphrase is a critical challenge for automated tools. It is uncertain if the practice of adversarial stylometry is detectable in itself. Some studies have found that particular methods produced signals in the output text, but a stylometrist who is uncertain of what methods may have been use
https://en.wikipedia.org/wiki/T%20memory%20stem%20cell
A T memory stem cell (TSCM) is a type of long-lived memory T cell with the ability to reconstitute the full diversity of memory and effector T cell subpopulations as well as to maintain their own pool through self-renewal. TSCM represent an intermediate subset between naïve (Tn) and central memory (Tcm) T cells, expressing both naïve T cells markers, such as CD45RA+, CD45RO-, high levels of CD27, CD28, IL-7Rα (CD127), CD62L, and C-C chemokine receptor 7 (CCR7), as well as markers of memory T cells, such as CD95, CD122 (IL-2Rβ), CXCR3, LFA-1. These cells represent a small fraction of circulating T cells, approximately 2-3%. Like naïve T cells, TSCM cells are found more abundantly in lymph nodes than in the spleen or bone marrow; but in contrast to naïve T cells, TSCM cells are clonally expanded. Similarly to memory T cells, TSCM are able to rapidly proliferate and secrete pro-inflammatory cytokines (IFN-γ, IL-2, and TNF-α) in response to antigen re-exposure, but show higher proliferation potential compared with Tcm cells; their homeostatic turnover is also dependent on IL-7 and IL-15. Differentiaion Longitudinal studies on TSCM dynamics in patients undergoing hematopoietic stem cell transplantation (HSCT) have shown that donor-derived TSCM cells were highly enriched early after HSCT, differentiated directly from Tn, and that Tn and TSCM cells (but not central memory or effector T cells) were able to reconstitute the entire heterogeneity of memory T cell subsets including TSCM cells. Together with the transcriptome analysis of differentially expressed genes reflecting the relatedness of TSCM and Tn cells, these data support the existing hierarchical model of human T cell differentiation: naïve T cells (Tn) → stem cell like memory T cells (T scm) → central memory T cells (Tcm) → effector memory T cells (Tem) / effector T cells (Teff). After primary antigen exposure and elimination, antigen-specific TSCM preferentially survive among memory T cells and stably persist
https://en.wikipedia.org/wiki/Serratus%20%28virology%29
Serratus is a large scale viroinformatics platform for uncovering the total genetic diversity of Earth's virome. Originating with the goal of uncovering novel coronaviruses that may have been incidentally sequenced by other researchers, the project expanded to encompass all RNA viruses, those which encode a viral RNA-dependent RNA polymerase (RdRp). By the end of 2020 there were approximately 15,000 distinct RNA virus sequences known from public databases, measured by the number of distinct RdRp (greater than 10% difference in amino acid sequence). Using a bioinformatics workflow optimized for large-scale cloud computing, the research team analyzed 5.7 million freely available sequencing datasets (20.4 petabytes of raw data) in the Sequence Read Archive (SRA) in only 11 days and a computing cost of USD$23,900. This analysis yielded 132,000 novel viral RdRp, representing nearly an order of magnitude increase in the known genetic diversity of RNA viruses. Within the database, RNA viruses are classified according to their RdRp palmprint, a type of molecular barcode. The palmprint can be used as a computationally efficient index for the identification of which SRA sequencing runs contain a particular RNA virus. Such an index allows for targeted analysis of raw sequencing datasets from which novel RNA viruses can be characterized. All Serratus data are freely-available under the INDSC release policy. References External links palmID: RdRp sequence search tool Serratus code repository Bioinformatics Computational biology Virology Computational fields of study
https://en.wikipedia.org/wiki/Photoblasticism
Photoblasticism is a mechanism of seed dormancy. Photoblastic seeds require light in order to germinate. Once germination starts, the stored nutrients that have accumulated during maturation start to be digested which then supports cell expansion and overall growth. Within light-stimulated germination, Phytochrome B (PHYB) is the photoreceptor that is responsible for the beginning stages of germination. When red light is present, PHYB is converted to its active form and moves from the cytoplasm to the nucleus where it upregulates the degradation of PIF1. PIF1, phytochrome-interaction-factor-1, negatively regulates germination by increasing the expression of proteins that repress the synthesis of gibberellin (GA), a major hormone in the germination process. Another factor that promotes germination is HFR1 which accumulates in light in some way and forms inactive heterodimers with PIF1. Although the exact mechanism is not known, nitric oxide (NO) plays a role in this pathway as well. NO is thought to repress PIF1 gene expression and stabilises HFR1 in some way to support the start of germination. Bethke et al. (2006) exposed dormant Arabidopsis seeds to NO gas and within the next 4 days, 90% of the seeds broke dormancy and germinated. The authors also looked at how NO and GA effects the vacuolation process of aleurone cells that allow the movement of nutrients to be digested. A NO mutant resulted in inhibition of vacuolation but when GA was later added the process was active again leading to the belief that NO is prior to GA in the pathway. NO may also lead to the decrease in sensitivity of Abscisic acid (ABA), a plant hormone largely responsible for seed dormancy. The balance between GA and ABA is important. When ABA levels are higher than GA then that leads to dormant seeds and when GA levels are higher, seeds germinate. References Botany Germination
https://en.wikipedia.org/wiki/Rangeland%20health
The rangeland health refers to the degree to which the integrity of the soil and ecological processes of rangeland ecosystems are sustained. The attributes evaluated during rangeland health assessments are 1) Soil and Site Stability 2) Hydrologic Function 3) Biotic Integrity. References Ecology
https://en.wikipedia.org/wiki/Hunting%20success
In ecology, hunting success is the proportion of hunts initiated by a predatory organism that end in success. Hunting success is determined by a number of factors such as the features of the predator, timing, different age classes, conditions for hunting, experience, and physical capabilities. Predators selectivity target certain categories of prey, in particular prey of a certain size. Prey animals that are in poor health are targeted and this contributes to the predator's hunting success. Different predation strategies can also contribute to hunting success, for example, hunting in groups gives predators an advantage over a solitary predator, and pack hunters like lions can kill animals that are too powerful for a solitary predator to overcome, like a megaherbivore. Similar to hunting success, kill rates are the number of animals an individual predator kills per time unit. Hunting success rate focuses on the percentage of successful hunts. Hunting success is also measured in humans, but due to their unnaturally high hunting success, human hunters can have a big effect on prey population and behaviour, especially in areas lacking natural predators, recreational hunting can have inferences for wildlife populations. Humans display a great variety of hunting methods, numbering up to 24 hunting methods. There are also many types of hunting such as whaling, trophy hunting, big game hunting, fowling, poaching, pest control, etc. Definition Predators may actively seek out prey, if the predator spots its preferred target it would decide whether to attack or continue searching, and success ultimately depends on a number of factors. Predators may deploy a variety of hunting methods such as ambush, ballistic interception, pack hunting or pursuit predation. Hunting success is used to measure a predator's success rate against a species of prey or against all prey species in its diet, for example in the Mweya area of Queen Elizabeth National Park, lions had a hunting success
https://en.wikipedia.org/wiki/Madhava%27s%20correction%20term
Madhava's correction term is a mathematical expression attributed to Madhava of Sangamagrama (c. 1340 – c. 1425), the founder of the Kerala school of astronomy and mathematics, that can be used to give a better approximation to the value of the mathematical constant (pi) than the partial sum approximation obtained by truncating the Madhava-Leibniz infinite series for . The Madhava-Leibniz infinite series for is Taking the partial sum of the first terms we have the following approximation to : Denoting the Madhava correction term by , we have the following better approximation to : Three different expressions have been attributed to Madhava as possible values of , namely, In the extant writings of the mathematicians of the Kerala school there are some indications regarding how the correction terms and have been obtained, but there are no indications on how the expression has been obtained. This has led to a lot of speculative work on how the formulas might have been derived. Correction terms as given in Kerala texts The expressions for and are given explicitly in the Yuktibhasha, a major treatise on mathematics and astronomy authored by the Indian astronomer Jyesthadeva of the Kerala school of mathematics around 1530, but that for appears there only as a step in the argument leading to the derivation of . The Yuktidipika-Laghuvivrthi commentary of Tantrasangraha, a treatise written by Nilakantha Somayaji an astronomer/mathematician belonging to the Kerala school of astronomy and mathematics and completed in 1501, presents the second correction term in the following verses (Chapter 2: Verses 271 - 274): English translation of the verses: "To the diameter multiplied by 4 alternately add and subtract in order the diameter multiplied by 4 and divided separately by the odd numbers 3, 5, etc. That odd number at which this process ends, four times the diameter should be multiplied by the next even number, halved and [then] divided by one added
https://en.wikipedia.org/wiki/Maarten%20van%20Emden
Maarten Herman van Emden (December 31, 1937 – January 4, 2023) was a Dutch-Canadian mathematician and computer scientist whose research in the foundations of logic programming and constraint logic programming was highly influential. Early Years Van Emden was born in Velp, the Netherlands, and his early childhood was spent mostly in the Dutch East Indies. He did his national military service in 1959–1960, serving as pilot and commissioned officer. He attended national flight training school and worked for KLM as a pilot from 1960 to 1963. Education Van Emden completed an MSc from the Delft University of Technology in 1966 and a PhD in computer science from the University of Amsterdam in 1971. His dissertation, titled “An Analysis of Complexity" was in Information theory and Data analysis. His thesis supervisor was Adriaan van Wijngaarden, who also supervised another notable Dutch computer scientist Edsger W. Dijkstra. Career Van Emden spent 1971 to 1972 as a postdoctoral fellow at the IBM Thomas J. Watson Research Center and then joined the Machine Intelligence group at the University of Edinburgh as a research fellow under Donald Michie. In 1975, he immigrated to Canada to join the faculty at the University of Waterloo. He moved to the University of Victoria in 1987. His visiting fellow positions include University of Edinburgh in 1980, Imperial College (UK) in 1982–1983, and NWO (Netherlands) in 2000–2001. In collaboration with Robert Kowalski, van Emden developed the fixpoint semantics of Horn clauses, which underpin the logical semantics of logic programming. He further researched on software verification and correctness, and constraint satisfaction, along with interval arithmetic and interval propagation . He wrote an advice-taking Prolog program for certain chess endgames. Between 2008 and 2016 van Emden wrote a collection of essays on the practice of programming and the history and philosophy of computing on a blog entitled A Programmer's Place. Referen
https://en.wikipedia.org/wiki/Bioconvergence
Bioconvergence is a multidisciplinary method in life science. It uses the synergy between biotech, engineering and computerized systems to address unresolved challenges, like speeding up diagnostic processes, creating more advanced materials, or advancing drug development. Along with healthcare, bioconvergence assists in the improvement of various sectors such as agriculture, energy, food, security, climate, etc. McKinsey research predicts that more than half of the impact of bioconvergence will be outside of healthcare, in areas such as agriculture, aquaculture and food, consumer products and services (such as DNA and microbiome testing), novel materials, chemistry and energy. According to McKinsey, bioconvergence solutions currently being developed could have an economic impact of up to per year over the next 10 to 20 years. Implications Bioconvergence uses methods from disciplines such as biology, chemistry, physics, engineering, medicine, mathematics, agriculture, computational sciences and artificial intelligence (AI), in order to solve challenges across several sectors. Healthcare Bioconvergence technologies in healthcare include translational medicine, enabling the extraction of hidden insights from massive data sets; neuromorphic computing, who seeks to emulate the biological neural structure of the brain to achieve unparalleled levels of processing performance and energy efficiency; creation of digital twins for clinical trials; and biochips such as organ on a chip" (OOC). Other implications of bioconvergence include new methods ot using nanorobotics for drug delivery, regenerative medicine, diagnostics and biological sensors, optogenetics, bioelectronics, engineered "living" materials, and more. According to Belén Garijo, CEO of Merck, bioconvergence can also bring about the potential of personalized medicine". Food and agriculture Traditional agriculture relies on land, water, and a suitable climate. In the future, based on bioconvergence led resea
https://en.wikipedia.org/wiki/Mafia%20hypothesis
The mafia hypothesis posits that brood parasite eggs are accepted by the host out of fear of retaliation (nest destruction) from the brood parasite, in an example of coevolution. Amotz Zahavi proposed it in 1979, and it was tested by Manuel Soler in 1995. Mathematical modeling Maria Abou Chakra, of the Max Planck Institute for Evolutionary Biology, with others, successfully mathematically modeled the mafia hypothesis as a viable strategy, conditional on two factors: hosts are capable of learning parasites revisit nests They found that the proportion of mafia vs non mafia brood parasites and unconditionally vs conditionally accepting hosts cycled over time: if all hosts unconditionally accepted parasite eggs, then it would not be worth the effort of revisiting the nest- being 'mafia'. If sufficiently few parasites were mafia, then only accepting parasite eggs after nest destruction once would be best for the hosts. As such, the mafia proportion of parasites would increase, thereby leading to unconditional acceptance by hosts, and so on. Farmer strategy Nest destruction also occurs as a result of 'farming'- attempts to synchronize the hosts' schedule with the parasites'. It bears similarities to the mafia strategy in that both engage in depredation of nests. The farmer strategy complicates the mafia/non, un/conditional acceptance model, as in the case of farmers, rejection enters as a viable third host strategy. References Hoover, Jeffrey P.; Robinson, Scott K. (2007-03-13). "Retaliatory mafia behavior by a parasitic cowbird favors host acceptance of parasitic eggs". Proceedings of the National Academy of Sciences. 104 (11): 4479–4483. doi:10.1073/pnas.0609710104. ISSN 0027-8424. PMC 1838626. PMID 17360549. "Cuckoos Use Mafia Tactics, And They Work". IFLScience. Retrieved 2023-01-20. https://www.journals.uchicago.edu/doi/epdf/10.1086/283374 https://books.google.com/books?id=U3ZZDwAAQBAJ&dq=mafia+hypothesis&pg=PA280 https://journal.afonet.org/vol93/
https://en.wikipedia.org/wiki/Agilex
Agilex is a brand covering several families of FPGA products developed by Intel Programmable Solutions Group, and are the FPGA products developed by Intel after the acquisition of Altera. The initial family of Agilex FPGAs began shipping in 2019 and are built using Intel 10nm silicon process. Agilex FPGAs are typically programmed in hardware description languages such as VHDL or Verilog, using the Intel Quartus Prime computer software. Higher level design languages, such as SYCL, are supported as well. Product Families Intel Agilex FPGAs initially focused on performance applications such as data center processing, but the brand has been expanded to include several new series of Agilex FPGAs which have different characteristics, such as lower power and lower logic densities, in order to fit an even wider range of applications. As a result, the Agilex brand is combined with a numerical suffix to organize various FPGA product series into different families of FPGAs and SoC FPGAs. Agilex 9 The Agilex 9 family are FPGAs targeted at Direct RF applications and include wideband data converters with sample rates up to 64Gsps and medium-band data converters with hi-fidelity performance. Agilex 7 The initial family of Agilex FPGAs and SoC FPGAs which began shipping in 2019 were rebranded as Agilex 7 in January 2023 as the Agilex brand was broadened to cover additional FPGA families by using a numerical suffix. Agilex 7 FPGAs are a family of high-performance FPGAs with a focus on delivering industry-leading logic fabric and I/O speeds and targeted at bandwidth- and compute-intensive applications. Agilex 5 The Agilex 5 family are FPGAs and SoC FPGAs with lower power and logic densities than the Agilex 7 FPGA and are generally considered mid-range FPGAs. Agilex 3 The Agilex 3 family are power and cost optimized FPGAs and currently listed by Intel as "coming soon". References Field-programmable gate arrays Intel microprocessors Reconfigurable computing
https://en.wikipedia.org/wiki/MAD-1
The MAD-1 (Modular Advanced Design-1) is an IBM PC–compatible desktop computer released by Mad Computers, Inc., of Santa Clara, California, in 1984. The computer was noted among the technology press for its unique, modular design and its 80186 microprocessor, the latter seldom used in PC compatibles. It received positive reviews but sold poorly and was pulled from market a year later. Specifications The MAD-1 is an IBM PC–compatible desktop computer measuring 12 inches wide, 16 inches deep and 5.5 inches tall. The computer was noted by the technology press of the day for its unique design that stood in stark contrast with the beige IBM PC and compatibles of the day. Its exterior case was medium-gray in color and featured prominent beveled edges and louvers at the sides. As the expanded acronym Modular Advanced Design-1 suggests, the computer is modular—split into halves across the perimeter of the case, with its disk drives occupying the Data Module on top and the rest of the computer's circuitry occupying the Computing Module on bottom. The computer came in two variants: one with two 5.25-inch double-density floppy disk drives, and the other with one such floppy drive in addition to a 10-MB half-height hard drive. The Data Module also contains the computer's 160-watt power supply unit; as such the computer is virtually unusable without it. A 12-inch amber monochrome monitor came included with the computer, as well as its 18-inch-wide 84-key keyboard, which also featured a grey finish (its keys were two-tone—dark gray for function keys and light grey for alphanumeric keys; both sets of keys featured red, black, and white lettering, depending on their function). Each part of the MAD-1 could be opened up by unfastening two screws from their backs and pulling up the lids. Internally, the MAD-1 features the purely 16-bit Intel 80186 microprocessor, eschewing from the IBM PC's use of the 8-bit Intel 8088, and 512 KB of RAM stock (expandable to 704 KB). Unlike the IBM
https://en.wikipedia.org/wiki/Parameterized%20approximation%20algorithm
A parameterized approximation algorithm is a type of algorithm that aims to find approximate solutions to NP-hard optimization problems in polynomial time in the input size and a function of a specific parameter. These algorithms are designed to combine the best aspects of both traditional approximation algorithms and fixed-parameter tractability. In traditional approximation algorithms, the goal is to find solutions that are at most a certain factor away from the optimal solution, known as an -approximation, in polynomial time. On the other hand, parameterized algorithms are designed to find exact solutions to problems, but with the constraint that the running time of the algorithm is polynomial in the input size and a function of a specific parameter . The parameter describes some property of the input and is small in typical applications. The problem is said to be fixed-parameter tractable (FPT) if there is an algorithm that can find the optimum solution in time, where is a function independent of the input size . A parameterized approximation algorithm aims to find a balance between these two approaches by finding approximate solutions in FPT time: the algorithm computes an -approximation in time, where is a function independent of the input size . This approach aims to overcome the limitations of both traditional approaches by having stronger guarantees on the solution quality compared to traditional approximations while still having efficient running times as in FPT algorithms. An overview of the research area studying parameterized approximation algorithms can be found in the survey of Marx and the more recent survey by Feldmann et al. Obtainable approximation ratios The full potential of parameterized approximation algorithms is utilized when a given optimization problem is shown to admit an -approximation algorithm running in time, while in contrast the problem neither has a polynomial-time -approximation algorithm (under some complexity assumptio
https://en.wikipedia.org/wiki/Farhan%20Baqai
Farhan A. Baqai is a Senior Research Manager at Apple, working on camera technology. He was elevated to a fellow of the IEEE in 2023 for "contributions in leadership in digital camera image processing". A graduate of Purdue University, Baqai received his masters and doctoral degrees (electrical and computer engineering) in 1997 and 2000 respectively; his doctoral advisor was Jan Philip Allebach. In addition to his work at Apple, Baqai formerly worked for Sony and Xerox. His positions with these companies includes work on the iPhone, Mac, iPad and CyberShot cameras. References Fellow Members of the IEEE Purdue University alumni Year of birth missing (living people) Living people
https://en.wikipedia.org/wiki/List%20of%20eponyms%20of%20Nvidia%20GPU%20microarchitectures
This is a list of eponyms of Nvidia GPU microarchitectures. The eponym in this case is the person after whom an architecture is named. Listed are the person, their portrait, their profession or areas of expertise, their birth year, their death year, their country of origin, the microarchitecture named after them, and the year of release of the GPU architecture. References Graphics microarchitectures Lists of eponyms Nvidia graphics processors Nvidia microarchitectures
https://en.wikipedia.org/wiki/Gauss%20composition%20law
In mathematics, in number theory, Gauss composition law is a rule, invented by Carl Friedrich Gauss, for performing a binary operation on integral binary quadratic forms (IBQFs). Gauss presented this rule in his Disquisitiones Arithmeticae, a textbook on number theory published in 1801, in Articles 234 - 244. Gauss composition law is one of the deepest results in the theory of IBQFs and Gauss's formulation of the law and the proofs its properties as given by Gauss are generally considered highly complicated and very difficult. Several later mathematicians have simplified the formulation of the composition law and have presented it in a format suitable for numerical computations. The concept has also found generalisations in several directions. Integral binary quadratic forms An expression of the form , where are all integers, is called an integral binary quadratic form (IBQF). The form is called a primitive IBQF if are relatively prime. The quantity is called the discriminant of the IBQF . An integer is the discriminant of some IBQF if and only if . is called a fundamental discriminant if and only if one of the following statements holds and is square-free, where and is square-free. If and then is said to be positive definite; if and then is said to be negative definite; if then is said to be indefinite. Equivalence of IBQFs Two IBQFs and are said to be equivalent (or, properly equivalent) if there exist integers α, β, γ, δ such that and The notation is used to denote the fact that the two forms are equivalent. The relation "" is an equivalence relation in the set of all IBQFs. The equivalence class to which the IBQF belongs is denoted by . Two IBQFs and are said to be improperly equivalent if and The relation in the set of IBQFs of being improperly equivalent is also an equivalence relation. It can be easily seen that equivalent IBQFs (properly or improperly) have the same discriminant. Gauss's formulation of
https://en.wikipedia.org/wiki/Strongly%20typed%20identifier
A strongly typed identifier is user-defined data type which serves as an identifier or key that is strongly typed. This is a solution to the "primitive obsession" code smell as mentioned by Martin Fowler. The data type should preferably be immutable if possible. It is common for implementations to handle equality testing, serialization and model binding. The strongly typed identifier commonly wraps the data type used as the primary key in the database, such as a string, an integer or universally unique identifier (UUID). Web frameworks can often be configured to model bind properties on view models that are strongly typed identifiers. Object–relational mappers can often be configured with value converters to map data between the properties on a model using strongly typed identifier data types and database columns. Examples C# C# have records which provide immutability and equality testing. The record is sealed to prevent inheritance. It overrides the built-in ToString() method. This example implementation includes a static method which can be used to initialize a new instance with a randomly generated globally unique identifier (GUID). /// <summary> /// Represents a user identifier. /// </summary> /// <param name="Id">The user identifier.</param> public sealed record UserId(Guid Id) { /// <summary> /// Initializes a new instance of the <see cref="UserId" /> record. /// </summary> /// <returns>A new UserId object.</returns> public static UserId New() => new(Guid.NewGuid()); public override string ToString() => Id.ToString(); } C++ C++ have structs but not immutability so here the id field is marked as private with a method named value() to get the value. struct UserId { UserId(const string _id) { id = _id; } string value() const { return id; } bool operator==(const UserId& rhs) const { return value() == rhs.value(); } private: string id; }; ostream& operator << (ost
https://en.wikipedia.org/wiki/Pseudogamma%20function
In mathematics, a pseudogamma function is a function that interpolates the factorial. The gamma function is the most famous solution to the problem of extending the notion of the factorial beyond the positive integers only. However, it is clearly not the only solution, as, for any set of points, an infinite number of curves can be drawn through those points. Such a curve, namely one which interpolates the factorial but is not equal to the gamma function, is known as a pseudogamma function. The two most famous pseudogamma functions are Hadamard's gamma function: where is the Lerch zeta function. We also have the Luschny factorial: where denotes the classical gamma function and denotes the digamma function. Other related pseudo gamma functions are also known, for instance see. References Functions and mappings Factorial and binomial topics
https://en.wikipedia.org/wiki/Sor%20%28geomorphology%29
A sor (; ) is a closed drainless depression characteristic of the Central Asian deserts, found especially in Kazakhstan. The sor area is seasonally flooded, forming a lake, which becomes an inland salt marsh and then a salt flat as it dries. The term forms part of some toponyms of Kazakhstan, such as Aralsor, Azhibeksor, Karasor, Sorkol, Sorasha, Altybaysor and Sor Tuzbair. Description A sor forms in the flatland of arid areas or deserts. Heavy seasonal rains taking place usually in the spring bring the water to accumulate at the bottom of the depression. The intermittent lake is characterized by a clear-cut coastline. As the summer approaches the lake dries quickly owing to hot temperatures, forming a salt pan with a layer of salt of varying thickness. In the dry flat expanse the groundwater is located close to the surface. Although usually a sor is located away from the seashore, an inlet in the southern coast of the Dead Kultuk had the characteristics of a sor and was known as "Sor Kaydak". However, in recent decades it lost its distinct shoreline owing to the rise of the level of the Caspian Sea and has become a salt marsh. Flora Located in areas of sparse vegetation, the typical sor landscape is quite barren. Tough halophytes such as Halocnemum are among the only species able to grow in such an environment. See also Inland salt marsh Solonchak References External links Salt Lake Colors, Kazakhstan Geomorphology Lacustrine landforms Depressions (geology) Salt flats Turkic toponyms
https://en.wikipedia.org/wiki/Digital%20multicast%20television%20network
A digital multicast television network, also known as a diginet or multichannel, is a type of national television service designed to be broadcast terrestrially as a supplementary service to other stations on their digital subchannels. Made possible by the conversion from analog to digital television broadcasting, which left room for additional services to be broadcast from an individual transmitter, regional and national broadcasters alike have introduced such channels since the 2000s. By March 2022, 54 such services existed in the United States. Typically run on a lesser budget, national multicast services often rely on archive and imported content and are tailored to allow advertisers to reach specific demographics. Most of their revenue is derived from national advertising. Digital multicast services by country Australia The first multichannel broadcast in Australia was ABC Kids, which broadcast from 2001 to 2003; in the succeeding years, the country's commercial broadcasters also launched secondary services to compete against DVDs and online piracy. However, their ability to do so was hampered at first by a ban on adding channels, with a focus on such services as datacasting and high-definition. It was not until 2009 that commercial broadcasters were allowed to add multichannels; in that year, the three major networks all did so, bringing the number of channels they offered from three to eleven. The original commercial multichannels were generalist in nature, which made it difficult for advertisers to target specific demographics and therefore made them less lucrative. The shift to specifically targeted services and their reliance on existing programming has allowed these channels to survive despite drawing comparatively low shares of the audience: in 2018, 7mate led the group with an audience share of 4.1 percent among metropolitan audiences. However, after the Australian Communications and Media Authority permitted the commercial broadcasters to move requ
https://en.wikipedia.org/wiki/Logo%20Software
Logo Software is a Turkish business software company based in Gebze, Kocaeli. The company was founded in 1984, and was officially established in 1986. Logo Yazılım has more than 1,300 employees and over 800 business partners in 7 different locations in 4 different countries. It started developing Logo Paas in 2015 as part of its servitization strategy and offers cloud applications through this platform. Logo Yazılım also provides digital transformation consultancy and special project management services. In 2000, Logo Yazılım completed its initial public offering (IPO) and was the first IT company to go public in Turkey. The company is traded on Borsa Istanbul under the code LOGO and currently has a free float percentage rate of 66.37%. The company was the first software company to be included in "Turquality®", the Turkish Ministry of Trade's branding program. Logo ranked 67th on the list of "Turkey's Most Valuable Brands" according to the 2022 report by Brand Finance, which is a brand evaluation company. History Foundation and early years (1984 - 2000) Launched on July 1, 1984, by eight young engineers, Logo Yazılım was one of Turkey's first start-ups and was officially founded and registered on March 5, 1986. In the same year, Logo introduced Logo Commercial System (LTS) to users and released many DOS and Windows-based products in the following years. The first version of Logo accounting programs, LKS - Logo Classic Series, is the predecessor of today's GO application. Following the LKS program running on the MS-DOS operating system, Logo Classic Series 2 marked the beginning of the current versions, in which Microsoft-based data is kept on Microsoft SQL Server. Logo Gold was Logo's first ERP application developed to be optimized with the MS-DOS operating system using the Btrieve database, and was launched in 1992. Following this application, Logo Gold Open, the predecessor of Tiger which is used today, was presented using Windows operating system and MS SQL.
https://en.wikipedia.org/wiki/Early%20Start%20Denver%20Model
The Early Start Denver Model (ESDM) is a form of intervention directed at young children that display early signs of being on the autism spectrum proposed by American psychiatrists Sally J. Rogers and Geraldine Dawson. It is intended to help children improve development traits as early as possible so as to narrow or close the gaps in capabilities between the individual and their peers. Development The American psychiatrists Sally J. Rogers and Geraldine Dawson began developing the Early Start Denver Model during the 1980s. While working at the University of Colorado, in Denver, Rogers provided what was first called the "play school model" of intervention which was applied to children in preschool during their regular play activities. The model was founded in Piaget's theory of cognitive development and came to be described by Rogers and Dawson as the Denver Model. In 2010, the two researchers published Early Start Denver Model for Young Children with Autism: Promoting Language, Learning, and Engagement, in which the ESDM is manualized and described in detail. It is generally cited to be directed towards children between 12 and 48 months of age, and is closely related to Applied behavior analysis, influencing and being influenced by this field of work. Description The ESDM is aimed at using "joint activity routines" that explore the child's natural interests to explore their learning potential, shaping everyday activities between the child and their caregivers to maximize their development potential according to the child's assessment. Rogers and Dawson describe the core features of the ESDM as: an interdisciplinary team that implements a developmental curriculum addressing all domains; focus on interpersonal engagement; development of fluent, reciprocal, and spontaneous imitation of gestures, facial movements and expressions, and object use; emphasis on both nonverbal and verbal communication development; focus on cognitive aspects of play carried out wi
https://en.wikipedia.org/wiki/Empirical%20evidence%20for%20the%20spherical%20shape%20of%20Earth
The roughly spherical shape of Earth can be empirically evidenced by many different types of observation, ranging from ground level, flight, or orbit. The spherical shape causes a number of effects and phenomena that combined disprove flat Earth beliefs. These include the visibility of distant objects on Earth's surface; lunar eclipses; appearance of the moon; observation of the sky from altitude; observation of certain fixed stars from different locations; observing the Sun; surface navigation; grid distortion on a spherical surface; weather systems; gravity; and modern technology. Visibility of distant objects on Earth's surface On a completely flat Earth without obstructions (mountains, hills, valleys or volcanos), the ground itself would never obscure distant objects. A spherical surface has a horizon which is closer when viewed from a lower altitude. In theory, a person standing on the surface with eyes above the ground can see the ground up to about away, but a person at the top of the Eiffel Tower at can see the ground up to about away. This phenomenon permits a way of confirming that Earth's surface is locally convex: If the degree of curvature is determined to be the same everywhere on Earth's surface, and that surface was determined to be large enough, the constant curvature would show that Earth is spherical. In practice, this method is not reliable because of variations in atmospheric refraction, which is how much the atmosphere bends light traveling through it. Refraction can give the impression that Earth's surface is flat, curved more convexly than it is, or even that it is concave (this is what happened in various trials of the Bedford Level experiment). The phenomenon of variable atmospheric bending can be seen when distant objects appear to be broken into pieces or even turned upside down. This is often seen at sunset, when the Sun's shape is distorted, but has also been photographed happening to ships, and has caused the city of Chicago t
https://en.wikipedia.org/wiki/BharOS
BharOS (formerly IndOS) is a mobile operating system allegedly designed by IIT Madras. It is an Indian government-funded project to develop a free and open-source operating system (OS) for use in government and public systems. The Indian Express Android. History Google is facing a crackdown from the Competition Commission of India (CCI) for its practices pertaining to its Android mobile operating system. There have been several demands for the need for an Indian app store that does not levy exorbitant fees for sales. The BharOS project aims to reduce the dependence on foreign operating systems in smartphones and promote the use of locally developed technology. It was developed by JandK Operations Private Limited (JandKops), which was incubated at IIT Madras. Minister for telecommunications and information technology Ashwini Vaishnaw and education minister Dharmendra Pradhan launched the operating system in a public event. Features BharOS targets security-conscious groups. BharOS does not come with any preinstalled services or apps. This approach gives the user more freedom and control over the permissions that are available to apps on their device. Users can choose to grant permissions only to apps that they require to access certain features or data on their device. The software can be installed on commercially available handsets, providing users with a secure environment, the company stated in a statement. The new operating system will provide access to trusted apps via organisation-specific Private App Store Services (PASS), which is a list of curated apps that meet security and privacy standards. Security updates and bug fixes will be automatically installed rather than users having to manually check for updates and install them. Criticism Divya Bhati writing for India Today noted that instructions on downloading, installing BharOS on compatible devices, or plans for new devices, or its support for security and software updates were scant. In September 2023
https://en.wikipedia.org/wiki/Agostino%20Amadi
Agostino Amadi (Venice, ..., 1588), also written as Agostin, or Augostino Amadi, was a Venetian writer who created a manuscript on ciphers. It is assumed that he was a teacher of ciphers, but it is not known if he ever worked at the Council of Ten in that capacity. The manuscript The Amadi manuscript contained 700 pages and was bought by the Council of Ten from his widow on the 16th of March, 1588. It was titled: "Agostino Amadi. Trattato delle cifre. 1588. Trattato delle cifre. Venezia". Ciphers of Agostino Amadi, 1588 in the Archivio di Stato di Venezia. The archive kept the contents secure and secret for hundreds of years. The manuscript was then sold to the Emperor of Austria and moved to Vienna in 1799 and stored under Cod. 313. It was only in 1869 that it was returned to the Venetian Archives in Italy. Agostino must have owned a huge collection of mathematical and musical books, about 1,500 of them, as well as many instruments. The contents The first volume teaches the different ways of coding "in simple, double and multiple alphabets", with extensive use of "rotae", rotating alphabets made of parchment and a coloured thread. The second volume is dedicated to the art of trazer: decoding the cipher without having the decryption key. The great cipher collector Luigi Pasini (1835-1885), the archivist in the State Archives of Venice, wrote: "The volumes by our loyal citizen Agostin Amadi, who recently died, provide instructions for writing simple and double ciphers and for using several alphabets. They teach the art of deciphering unknown ciphers without code sheet, both in our language and in foreign ones, with beautiful, clear and realistic rules, so that anyone who puts in some exercise and diligence can make true progress in a short time. They also teach different ways of writing secret messages, strengthening a cipher so that it cannot be understood; they teach ways of writing invisible, undetectable ciphers, of reviving dead letters, and other impor
https://en.wikipedia.org/wiki/Gordana%20Jovanovic%20Dolecek
Gordana Jovanovic Dolecek is an electronics engineer specializing in digital filters. Originally from Yugoslavia, she works in Mexico as a professor and researcher at the National Institute of Astrophysics, Optics and Electronics (INAOE) in Puebla. Education and career Dolecek earned a bachelor's degree in electrical engineering from the University of Sarajevo in 1969. After a master's degree from the University of Belgrade in 1975, she returned to the University of Sarajevo for her Ph.D., completed in 1981. She worked as a research assistant at Energoinvest in 1969 and 1971 became a teaching and research assistant at the University of Sarajevo. She became an assistant professor there in 1977, one of the founding members of the Department of Telecommunications. She was promoted to associate professor in 1985 and full professor in 1991. She alternately chaired the telecommunications and communications systems departments from 1980 to 1993. In 1993 she moved to the Mihajlo Pupin Institute of the University of Belgrade, and in 1995 she took her present position in Mexico at INAOE. Books Dolecek is the author of the book Random Signals and Processes Primer with MATLAB (Springer, 2012). Her edited volumes include Multirate Systems: Design and Applications (Idea Group, 2002) and Advances in Multirate Systems (Springer, 2017). Recognition Dolecek is a member of the Mexican Academy of Sciences, elected in 2005. Personal life Dolecek was married to mechanical engineering professor Vlatko Doleček. Their daughter, coding theorist Lara Dolecek, is a professor in California at the UCLA Henry Samueli School of Engineering and Applied Science. References External links Home page Living people Year of birth missing (living people) University of Sarajevo alumni University of Belgrade alumni Academic staff of the University of Sarajevo Yugoslav engineers Mexican engineers Mexican women engineers Electronics engineers Members of the Mexican Academy of Sciences
https://en.wikipedia.org/wiki/John%20I.%20Pitt
John Ingram Pitt (13 March 1937 – 23 March 2022) was an Australian mycologist, known as a leading expert on the role of fungi in food spoilage. He gained an international reputation as a pioneering researcher on the ecology of spoilage moulds in extreme environments and of dried fruits and other dried foodstuffs. Education and career John I. Pitt was born and grew up on a small farm near Wamberal, New South Wales. After attending Gosford High School, he moved to Sydney. There on 1 March 1954 he became an employee of the Australian Government's Commonwealth Scientific and Industrial Research Organisation (CSIRO). He began at CSIRO as a Technical Assistant Grade 1 (Junior), was slowly but steadily promoted over many years, and was appointed a Chief Research Scientist in 1992 when he reached the age of 55. At the time of his death in 2022, he was the only CSIRO employee in its history to start at the lowest research employment grade and to go through all of the research grades up to the highest level. He retired from CSIRO in 2002. After joining CSIRO in 1954 he became a part-time student at the University of New South Wales (UNSW), where he studied food technology. At UNSW he completed a seven-year course of study in eight years, followed by an M.Sc. qualifying course, and then a part-time M.Sc. program. His 1965 M.Sc. thesis is entitled Microbiological Problems in Prune Preservation. On leave of absence from CSIRO, he became in 1965 a graduate student at the University of California, Davis. He graduated there with a Ph.D. in 1968. His Ph.D. thesis (on the taxonomy of Metschnikowia) is entitled The yeast genus Metschnikowia. His thesis advisor was Martin Wesley Miller (1925–2005) in the UC Davis department of food science and technology. After completing his Ph.D., Pitt spent a postdoctoral year at the USDA's Northern Regional Research Laboratory (NRRL), where his supervisor was Clifford William Hesseltine (1917–1999). At the USDA Pitt studied Penicillium taxonomy a
https://en.wikipedia.org/wiki/ACFA-8
The ACFA-8 (Affordable Computers for All-8) was a microcomputer based on the Motorola 6808. It was released in 1979 by Andrew M. Veronis, a doctorate of computer science more well-known for his books on computer engineering. Description and history The ACFA-8 was a single-board microcomputer running the Motorola 6808. The board's memory layout comprised an array of eight chip sockets, onto which 3 KB or 6 KB DRAM chips can be populated, for a maximum of 48 KB of RAM. As stock it came with 16 KB of RAM. The computer's cassette interface supports the Kansas City standard, and the computer came shipped with 8-KB BASIC on cassette. The board features a built-in color RF modulator; American buyers got shipped a color video display for the price of the computer. Both American and overseas buyers however both got the board with an enclosure, a keyboard, and the power supply unit. The ACFA-8 was one of the few microcomputers based on the 6808 microprocessor, being a lesser-cost component in the Motorola 6800 family. It was more popular with embedded processing systems in industrial environments. The computer came shipped with manuals describing the principles of operation, which Electronics Today International described as "really a computer course on their own". ACFA, Inc. (Affordable Computers for All), was founded by Andrew M. Veronis, a doctorate of computer science more well-known for his books on computer engineering. In the United States, the computer sold for $695 as an assembled kit or $595 unassembled. Computer journalist Fred Ruckdeschel felt that it needed an additional $300 in hardware on top of the cost of the unassembled kit to bring it on par with its contemporaries. To that end the ACFA-8 came with a RS-232C serial port for peripherals including teletypes. ACFA, Inc. was incorporated at 130 Main Street in Annapolis, Maryland. This location was previously the home of Wicker Basket Ltd., a seller of wicker furniture, cookware, and fine china. Veronis bough
https://en.wikipedia.org/wiki/Response%20coefficient%20%28biochemistry%29
Control coefficients measure the response of a biochemical pathway to changes in enzyme activity. The response coefficient, as originally defined by Kacser and Burns, is a measure of how external factors such as inhibitors, pharmaceutical drugs, or boundary species affect the steady-state fluxes and species concentrations. The flux response coefficient is defined by: where is the steady-state pathway flux. Similarly, the concentration response coefficient is defined by the expression: where in both cases is the concentration of the external factor. The response coefficient measures how sensitive a pathway is to changes in external factors other than enzyme activities. The flux response coefficient is related to control coefficients and elasticities through the following relationship: Likewise, the concentration response coefficient is related by the following expression: The summation in both cases accounts for cases where a given external factor, , can act at multiple sites. For example, a given drug might act on multiple protein sites. The overall response is the sum of the individual responses. These results show that the action of an external factor, such as a drug, has two components: The elasticity indicates how potent the drug is at affecting the activity of the target site itself. The control coefficient indicates how any perturbation at the target site will propagate to the rest of the system and thereby affect the phenotype. When designing drugs for therapeutic action, both aspects must therefore be considered. Proof of Response Theorem There are various ways to prove the response theorems: Proof by perturbation The perturbation proof by Kacser and Burns is given as follows. Given the simple linear pathway catalyzed by two enzymes and : where is the fixed boundary species. Let us increase the concentration of enzyme by an amount . This will cause the steady state flux and concentration of , and all downstream species beyond to in
https://en.wikipedia.org/wiki/Biochemical%20systems%20equation
The biochemical systems equation is a compact equation of nonlinear differential equations for describing a kinetic model for any network of coupled biochemical reactions and transport processes. The equation is expressed in the following form: The notation for the dependent variable x varies among authors. For example, some authors use s, indicating species. x is used here to match the state space notation used in control theory but either notation is acceptable. is the stoichiometry matrix which is an by matrix of stoichiometry coefficient. is the number of species and the number of biochemical reactions. The notation for is also variable. In constraint-based modeling the symbol tends to be used to indicate 'stoichiometry'. However in biochemical dynamic modeling and sensitivity analysis, tends to be in more common use to indicate 'number'. In the chemistry domain, the symbol used for the stoichiometry matrix is highly variable though the symbols S and N have been used in the past. is an n-dimensional column vector of reaction rates, and is a p-dimensional column vector of parameters. Example Given the biochemical network: where and are fixed species to ensure the system is open. The system equation can be written as: So that: The elements of the rate vector will be rate equations that are functions of one or more species and parameters, p. In the example, these might be simple mass-action rate laws such as where is the rate constant parameter. The particular laws chosen will depend on the specific system under study. Assuming mass-action kinetics, the above equation can be written in complete form as: Analysis The system equation can be analyzed by looking at the linear response of the equation around the steady-state with respect to the parameter . At steady-state, the system equation is set to zero and given by: Differentiating the equation with respect to and rearranging gives: This derivation assumes that the stoichiome
https://en.wikipedia.org/wiki/Fax%C3%A9n%20integral
In mathematics, the Faxén integral (also named Faxén function) is the following integral The integral is named after the Swedish physicist Olov Hilding Faxén, who published it in 1921 in his PhD thesis. n-dimensional Faxén integral More generally one defines the -dimensional Faxén integral as with and for and The parameter is only for convenience in calculations. Properties Let denote the Gamma function, then For one has the following relationship to the Scorer function Asymptotics For we have the following asymptotics References Mathematical analysis Functions and mappings Definitions of mathematical integration
https://en.wikipedia.org/wiki/ImHex
ImHex is a free cross-platform hex editor available on Windows, macOS, and Linux. ImHex is used by programmers and reverse engineers to view and analyze binary data. History The initial release of the project in November 2020, saw significant interest on GitHub. Features Features include: Hex editor Custom Pattern matching and analysis Scripting Language Visual, node based data pre-processor Disassembler Running and visualizing of YARA rules Bookmarks Binary data diffing Additional Tools MSVC, Itanium, D and Rust name demangler ASCII Table Calculator Base converter File utilities IEEE 754 floating point decoder Division by invariant multiplication calculator Support for: Data importing and exporting ASCII string, Unicode string, numeric, hexadecimal and Regular expressions search Byte manipulation File hashing Plug-ins See also Comparison of hex editors Reverse engineering References External links Hex editors Programming tools
https://en.wikipedia.org/wiki/Trend%20periodic%20nonstationary%20processes
Trend periodic non-stationary processes (or trend cyclostationary processes) are a type of cyclostationary process that exhibits both periodic behavior and a statistical trend. The trend can be linear or nonlinear, and it can result from systematic changes in the data over time. A cyclostationary process can be formed by removing the trend component. This approach is utilized in the analysis of the trend-stationary process. In data analysis classification of periodic data into stationary-periodic, trend-periodic and stochastic-periodic time series is achieved by means of phase dispersion minimization (PDM) test, which is a method for identifying periodicity. Applications Trending cyclostationary processes have several applications in finance, engineering, economics, and environmental research. Trending cyclostationary processes are used in economics to predict the seasonality and trend of time series data that display both periodic and trending behavior, such as rail and air travel demand. Trending cyclostationary processes are used in engineering to simulate signals that display both periodic and trending behavior, such as signals in modulated radio communications or control systems. Trending cyclostationary processes are used in economics to represent time series data that display both periodic behavior and trends in which the trend is usually represented by a so-called unit root in the autoregressive part of the model. Trending cyclostationary processes are used in environmental research to simulate time series data that display both periodic behavior and trends, such as temperature or pollutant appearance patterns. In fact, almost any pollutions related phenomena falls into one of stochastic, periodic-stochastic, or trend-period-stochastic processes. Properties Trending cyclostationary processes have traits that are a mix of cyclostationary processes and trends. Trending cyclostationary processes have second-order stationarity, which means that their second
https://en.wikipedia.org/wiki/Data%20version%20control
Data version control is a method of working with data sets. It is similar to the version control systems used in traditional software development, but is optimized to allow better processing of data and collaboration in the context of data analytics, research, and any other form of data analysis. Data version control may also include specific features and configurations designed to facilitate work with large data sets and data lakes. History Background As early as 1985, researchers recognized the need for defining timing attributes in database tables, which would be necessary for tracking changes to databases. This research continued into the 1990s, and the theory was formalized into practical methods for managing data in relational databases, providing some of the foundational concepts for what would later become data version control. In the early 2010s the size of data sets was rapidly expanding, and relational databases were no longer sufficient to manage the amounts of data organizations were accumulating. The rise of the Apache Hadoop eco system, with HDFS as a storage layer, and later object storage had become dominant in big data operations. Research into data management tools and data version control systems increased sharply, along with demand for such tools from both academia and the private and public sectors. Version controlled databases The first versioned database was proposed in 2012 for the SciDB database, and demonstrated it was possible to create chains and trees of different versions of the database while decreasing both the overall storage size and access speeds associated with previous methods. In 2014, a proposal was made to generalize these principles into a platform that could be used for any application. In 2016, a prototype for a data version control system was developed during a Kaggle competition. This software was later used internally at an AI firm, and eventually spun off as a startup. Since then, a number of data version contro
https://en.wikipedia.org/wiki/Neural%20radiance%20field
A neural radiance field (NeRF) is a method based on deep learning for reconstructing a three-dimensional representation of a scene from two-dimensional images. It is a graphics primitive which can be optimized from a set of 2D images to produce a 3D scene. The NeRF model can learn the scene geometry, camera poses, and the reflectance properties of objects in a scene, which allows it to render new views of the scene from novel viewpoints. The method was originally introduced by a team from UC Berkeley, Google Research, and UC San Diego in 2020. See also Gaussian splatting References Machine learning algorithms
https://en.wikipedia.org/wiki/TIBER
TIBER (Threat Intelligence Based Ethical Red Teaming) is a standard developed by the European Central Bank for Red Teaming. It can be adopted by member states of the European Union. See also ENISA References External links European Central Bank Computer security standards
https://en.wikipedia.org/wiki/MLB%20The%20Show%2023
MLB The Show 23 is a baseball video game by San Diego Studio and published by Sony Interactive Entertainment, based on Major League Baseball (MLB). It is available on the PlayStation 4 and PlayStation 5, as well as Xbox One, Xbox Series X/S, and Nintendo Switch. It is the eighteenth entry of the MLB: The Show franchise and was released on March 28, 2023. Miami Marlins player Jazz Chisholm Jr. is featured as the cover star, while The Captain Edition of the game features retired New York Yankees player Derek Jeter. For the third consecutive year, the Xbox versions of the game are available for Xbox Game Pass subscribers at no additional cost. Gameplay The game includes a new game mode, named Storylines: A New Game Experience. This mode is set to focus on the Negro Leagues. The mode will feature eight players who played in the Negro Leagues, including Jackie Robinson, Buck O'Neil, Satchel Paige, Rube Foster, and more. The mode is a mix of gameplay and narration by Negro Leagues Baseball Museum president Bob Kendrick, highlighting moments from that player's career. For every new launch of MLB The Show, there would be a new season, featuring different players who also played in the Negro Leagues. These players would also become regular players in the other modes of the game. Other changes included Core Seasons in Diamond Dynasty, which would allow for 99 overall players to be obtained from day one, which take place every 6–8 weeks. For every new Core Season, only the players featured on that and the previous season can be used in Ranked and Conquest. This, however, won’t affect other game modes in Diamond Dynasty such as Play vs CPU. Another new addition is Captain Cards, in which once a certain tier requirement is met for that Captain Card player, it would boost your team significantly. Proper two-way play was also implemented in this release; this makes it possible for players such as Shohei Ohtani to be used as both a starting pitcher and as a true designated hitte
https://en.wikipedia.org/wiki/Grip%20%28raven%29
Grip was a talking raven kept as a pet by Charles Dickens. She was the basis for a character of the same name in Dickens's novel Barnaby Rudge and is generally considered to have inspired the eponymous bird from Edgar Allan Poe's poem "The Raven". Grip lived with the Dickens family in their home at 1 Devonshire Terrace, Marylebone. She could repeat several phrases, she buried coins and cheese in the garden, and she often bit people, including the coachman and the children. Following an incident where Grip bit one of the Dickens children, she was banished to the shed. Grip died in 1841, possibly from lead poisoning after consuming a large amount of lead paint. After a necropsy, Dickens had her stuffed and mounted. She was displayed above the desk in his study and he replaced her with another raven he also named Grip. Her remains passed through the hands of several collectors after Dickens's death and are now on display in the Rare Book Department of the Parkway Central Library in Philadelphia. Life in London Grip was a female common raven (Corvus corax), hatched in England 1839. Charles Dickens may have been considering including a raven as a character in his novel Barnaby Rudge as early as 1839. After he announced to his neighbours that he had a fancy for ravens, Grip was discovered in a "modest retirement" in London by Frederick Ash and gifted to Dickens. Dickens named the raven Grip and she lived with the Dickens family at 1 Devonshire Terrace, in Marylebone near Regent's Park. The earliest mention of Grip was in a letter from Dickens to his friend Daniel Maclise on 13 February 1840 in which he joked, "I love nobody here but the Raven, and I only love him because he seems to have no feeling in common with anybody." Grip was treated as a family pet in the Dickens household, allowed to roam freely like a cat or a dog. She grew to be 18 inches in length and her wingspan was at least 25 inches. She was a talking bird and knew several phrases, her favourite bein
https://en.wikipedia.org/wiki/Nine-point%20stencil
In numerical analysis, given a square grid in two dimensions, the nine-point stencil of a point in the grid is a stencil made up of the point itself together with its eight "neighbors". It is used to write finite difference approximations to derivatives at grid points. It is an example for numerical differentiation. This stencil is often used to approximate the Laplacian of a function of two variables. Motivation If we discretize the 2D Laplacian by using central-difference methods, we obtain the commonly used five-point stencil, represented by the following convolution kernel: Even though it is simple to obtain and computationally lighter, the central difference kernel possess an undesired intrinsic anisotropic property, since it doesn't take into account the diagonal neighbours. This intrinsic anisotropy poses a problem when applied on certain numerical simulations or when more accuracy is required, by propagating the Laplacian effect faster in the coordinate axes directions and slower in the other directions, thus distortiong the final result. This drawback calls for finding better methods for discretizing the Laplacian, reducing or eliminating the anisotropy. Implementation The two most commonly used isotropic nine-point stencils are displayed below, in their convolution kernel forms. They can be obtained by the following formula: The first one is known by Oono-Puri, and it is obtained when γ=1/2. The second one is known by Patra-Karttunen or Mehrstellen, and it is obtained when γ=1/3. Both are isotropic forms of discrete Laplacian, and in the limit of small Δx, they all become equivalent, as Oono-Puri being described as the optimally isotropic form of discretization, displaying reduced overall error, and Patra-Karttunen having been systematically derived by imposing conditions of rotational invariance, displaying smallest error around the origin. Desired anisotropy On the other hand, if controlled anisotropic effects are a desired feature, when solvi
https://en.wikipedia.org/wiki/CIBERSORT
CIBERSORT, also called CIBERSORTx, is a bioinformatics tool used to deconvolute cell type proportions and gene expression profiles from bulk RNA sequencing datasets. It is among the fastest growing software tools in the life sciences. References Biotechnology
https://en.wikipedia.org/wiki/E%27Lite
The E'Lite is a small-form-factor microcomputer based on the Zilog Z80B microprocessor released by Barrington International Corporation in 1982. It served as the market introduction of Irwin Magnetic Systems's long-awaited 510 Winchester tape drives. Development and specifications William M. Cassell formed Barrington International in Ann Arbor, Michigan, in 1980, after leaving the Candor Computer Corporation located in the same city, where he was employed as its executive vice president. The E'Lite was the product of nearly two years of development and was delivered to customers in September 1982, two months after its announcement and projected release date. Cassell designed the computer around the 8-bit Zilog Z80B microprocessor, at a time when the industry was shifting en masse to 16-bit processors for microcomputers. He explained that the immediate dearth of prepackaged 16-bit software would have hindered sales of his computer, had he designed it around a 16-bit processor. He planned on releasing such a computer in the spring of 1983, although this never came to fruition. The E'Lite served as the market introduction of Irwin Magnetic Systems's long-anticipated 510 Winchester tape drives. Irwin was a computer storage manufacturer out of Ann Arbor founded by several former executives of Sycor Inc.; Cassell himself had worked at Sycor before his employment at Candor. The 510 Winchester drives were co-developed by Olivetti S.p.A. of Italy. The tapes for the drive can hold up to 10 MB of data, while its seek time was rated for 33 ms. Random writes reportedly took one-fifth the time to complete as compared to 5.25-inch floppy disks. The 510 Winchester fits in the E'Lite's sole 5.25 drive bay. An external 5.25-inch floppy drive, which plugs into the computer's built-in floppy controller, was also included. The E'Lite came with 2 KB of page cache for the disk drives, while its RAM was maxed out to 64 KB. The computer came shipped with CP/M or, optionally, MP/M—single-
https://en.wikipedia.org/wiki/Nothing%2C%20Forever
Nothing, Forever is an American interactive procedurally generated animated sitcom broadcast as a livestream. It was created by American digital art collective Mismatch Media, led by developers Skyler Hartle and Brian Habersberger. Originally started as a direct parody of the American sitcom Seinfeld, the livestream broadcasts permutations of 3D computer-animated sequences in a kitschy retro low-resolution style, where characters perform AI-generated scripts using voices generated through speech synthesis. The first season continuously ran on Twitch from December 14, 2022 until the channel's temporary suspension on February 6, 2023. After the suspension was lifted, the show went on a brief hiatus until the second season debuted on March 8, with a new cast of characters and an original format different from that of Seinfeld. Nothing, Forever experienced a surge in popularity in February 2023 following media coverage of the show. The show's nonsensical humor, nondescript style and enthusiastic audience activity has received praise. Conception and format The concept of Nothing, Forever was envisioned by Skyler Hartle, a product manager at Microsoft Azure, and Brian Habersberger, a polymer physicist, in 2019. The two met over the video game Team Fortress 2. The show takes inspiration from Rabbits, a series of web films created by American filmmaker David Lynch, and the show's original premise was an homage to the American sitcom Seinfeld. Hartle said that the work "originally started its life as this weird, very, off-center kind of nonsensical, surreal art project. But then we kind of worked over the years to bring it to this new place. And then, of course, generative media [...] just kind of took off in a crazy way over the past couple of years". Hartle and Habersberger formed Mismatch Media in 2022, in collaboration with Jakob Broaddus, Zale Bush, Nic Freeman, Edward Garmon, and Stanley Janoski. The first season's cast of characters included Larry Feinberg, Yvonne
https://en.wikipedia.org/wiki/Alerts.in.ua
alerts.in.ua is an online service that visualizes information about air alerts and other threats on the map of Ukraine. History The idea of the site appeared in the first weeks of the 2022 Russian invasion of Ukraine, during the development of other projects related to alerting the population about alarms. So, on March 2, 2022, the "Lviv Siren" bot was created, which reported on air alarms in Lviv on Twitter. Later, the idea arose to monitor alarms all over Ukraine and display them on a map. However, the lack of a single official source reporting alarms made this task much more difficult. On March 15, 2022, the Ajax Systems company announced the creation of the official Telegram channel "Air Alarm". This channel receives signals from the "Air Alarm" application and instantly publishes messages about the start and end of alarms in different regions of Ukraine. This immediately solved the problem with the source of information and gave impetus to the further implementation of the project. On March 22, 2022, the first version of the "Air Alarm Map" website was published, located on the war.ukrzen.in.ua domain. The map quickly gained popularity in social networks. It, like several other similar projects, began to be widely distributed by the mass media: Suspilne, Novyi Kanal, UNIAN, DW, Fakty ICTV, Vikna TV, Ukrainian Radio, STB, Espresso, dev.ua, itc.ua and state bodies: Center for Countering Disinformation at the National Security and Defense Council of Ukraine, Verkhovna Rada of Ukraine, Khmelnytska OVA, etc. On April 8, 2022, the site moved to the alerts.in.ua domain, where it is still available today. On August 25, 2022, the service began monitoring local official channels in addition to the main "Air Alarm". On September 11, 2022, the English version of the site was published. On March 22, 2023, its own Android application was published. The project is actively developing and has its own community. Description The main part of the site is a map of Ukr
https://en.wikipedia.org/wiki/Enshittification
Enshittification, also known as platform decay, is the pattern of decreasing quality of online platforms that act as two-sided markets. Enshittification can be seen as a form of rent-seeking. Examples of alleged enshittification have included Amazon, Bandcamp, Google Search, Facebook, Reddit, and Twitter. Definition The term enshittification was coined by Cory Doctorow in a November 2022 blog post, later republished in Locus in January 2023. He expanded on the concept in an article of the January 2023 edition of Wired, in which he explained that enshittification is how platforms die: According to Doctorow, new platforms offer useful products and services at a loss, as a way to gain new users. Once users are locked in, the platform then offers access to the userbase to suppliers at a loss, and once suppliers are locked-in, the platform shifts surpluses to shareholders. Once the platform is fundamentally focused on the shareholders, and the users and vendors are locked in, the platform no longer has any incentive to maintain quality. Enshittified platforms which act as intermediaries can functionally act as both a monopoly on services and a monopsony on customers, as high switching costs prevent either from leaving even when alternatives technically exist. Doctorow has described the process of enshittification as happening through "twiddling"; the continual adjustment of the parameters of the system in search of marginal improvements of profits, without regard to any other goal. To solve the problem, Doctorow has called for two general principles to be followed: The first is a respect of the end-to-end principle, a fundamental principle of the Internet in which the role of a network is to reliably deliver data from willing senders to willing receivers. When applied to platforms, this entails users being given what they asked for, not what the platform prefers to present. For example, users would see all content from users they subscribed to, allowing content cre
https://en.wikipedia.org/wiki/Journal%20of%20Heat%20and%20Mass%20Transfer%20Research
The Journal of Heat and Mass Transfer Research is a semiannual peer-reviewed open-access scientific journal published by Semnan University and the editor-in-chief is Syfolah Saedodin (Semnan University). The journal covers all aspects of research on heat and mass transfer. It was established in 2014 and is indexed and abstracted in Scopus. References External links Energy and fuel journals Biannual journals Creative Commons Attribution-licensed journals English-language journals Academic journals established in 2014
https://en.wikipedia.org/wiki/Regulation%20to%20Prevent%20and%20Combat%20Child%20Sexual%20Abuse
The Regulation to Prevent and Combat Child Sexual Abuse (Child Sexual Abuse Regulation, or CSAR) is a European Union regulation proposed by the European Commissioner for Home Affairs Ylva Johansson on 11 May 2022. The stated aim of the legislation is to prevent child sexual abuse online through the implementation of a number of measures, including the establishment of a framework that would make the detection and reporting of child sexual abuse material (CSAM) by digital platforms a legal requirement within the European Union. Support for the proposal Supporters of the regulation include dozens of campaign groups, activists and MEPs, along with departments within the European Commission and European Parliament themselves. The European Commission's Migration and Home Affairs department argues that voluntary actions by online service providers to detect online child sexual abuse are insufficient. They emphasize that some service providers are less involved in combating such abuse, leading to gaps where abuse can go undetected. Moreover, they highlight that companies can change their policies, making it challenging for authorities to prevent and combat child sexual abuse effectively. The EU currently relies on other countries, primarily the United States, to launch investigations into abuse occurring within the EU, resulting in delays and inefficiencies. Several bodies within the EU claim the establishment of a centralized organization, the EU Centre on Child Sexual Abuse, would create a single point of contact for receiving reports of child sexual abuse. It is claimed this centralization would streamline the process by eliminating the need to send reports to multiple entities and would enable more efficient allocation of resources for investigation and response. Proponents also argue for the need to improve the transparency of the process of finding, reporting, and removing online child sexual abuse material. They claim that there is currently limited oversight o
https://en.wikipedia.org/wiki/Bad%20control
In statistics, bad controls are variables that introduce an unintended discrepancy between regression coefficients and the effects that said coefficients are supposed to measure. These are contrasted with confounders which are "good controls" and need to be included to remove omitted variable bias. This issue arises when a bad control is an outcome variable (or similar to) in a causal model and thus adjusting for it would eliminate part of the desired causal path. In other words, bad controls might as well be dependent variables in the model under consideration. Angrist and Pischke (2008) additionally differentiate two types of bad controls a simple bad-control scenario and proxy-control scenario where the included variable partially controls for omitted factors but is partially affected by the variable of interest. Pearl (1995) provides a graphical method for determining good controls using causality diagrams and the back-door criterion and front-door criterion. Examples Simple bad control A simplified example studies effect of education on wages . In this gedankenexperiment two levels of education are possible: lower and higher and two types of jobs are performed: white-collar and blue-collar work. When considering the causal effect of education on wages of an individual, it might be tempting to control for the work-type , however, work type is a mediator () in the causal relationship between education and wages (see causal diagram) and thus, controlling for it precludes causal inference from the regression coefficients. Bad proxy-control Another example of bad control is when attempting to control for innate ability when estimating effect of education on wages . In this example, innate ability (thought of as for example IQ at pre-school age) is a variable influencing wages , but its value is unavailable to researchers at the time of estimation. Instead they choose before-work IQ test scores , or late ability, as a proxy variable to estimate innate abil
https://en.wikipedia.org/wiki/Algorithmic%20Contract%20Types%20Unified%20Standards
Algorithmic Contract Types Unified Standards, abbreviated to ACTUS, are a set of royalty-free, open standards for representing financial contracts. The standards combine (1) a concise data dictionary that defines the contractual terms present in financial contracts with (2) a simple but complete taxonomy of fundamental algorithmic contract type patterns that incorporate elements from that data dictionary that apply to a given contract type such that (3) the cash flow obligations that are established by the contract can be accurately projected, analyzed and acknowledged by all parties to the contract over the life of the contract. Providing an open and royalty-free standard for the data elements and algorithms of financial contracts enables the consistent sharing of accurate financial data by organizations in the financial industry, whether to consolidate views of product lines within an enterprise, to manage obligations between institutions, or to facilitate the collection and consolidation of financial data by regulators. Adoption and uptake of ACTUS is viewed as a public good benefit to create a globally accepted set of definitions capable of representing the preponderance of financial contracts in the real economy. Such standards are regarded as important for transparency and efficiency in financial innovation, risk management, financial regulation, the tokenization of financial instruments, and the development of smart contracts for decentralized finance (DeFi) using blockchain. History The difficulty of defining and analyzing financial data were described by Willi Brammertz and his co-authors in a 2009 book, Unified Financial Analysis: The missing links of finance. The simplicity of the problem is described in an ECB paper, “Modelling metadata in central banks”. This cites the issue of how financial institutions have tried to overcome data silos by building enterprise-wide data warehouses. However, while these data warehouses physically integrate differen
https://en.wikipedia.org/wiki/Generative%20pre-trained%20transformer
Generative pre-trained transformers (GPT) are a type of large language model (LLM) and a prominent framework for generative artificial intelligence. The first GPT was introduced in 2018 by OpenAI. GPT models are artificial neural networks that are based on the transformer architecture, pre-trained on large data sets of unlabelled text, and able to generate novel human-like content. As of 2023, most LLMs have these characteristics and are sometimes referred to broadly as GPTs. OpenAI has released very influential GPT foundation models that have been sequentially numbered, to comprise its "GPT-n" series. Each of these was significantly more capable than the previous, due to increased size (number of trainable parameters) and training. The most recent of these, GPT-4, was released in March 2023. Such models have been the basis for their more task-specific GPT systems, including models fine-tuned for instruction followingwhich in turn power the ChatGPT chatbot service. The term "GPT" is also used in the names and descriptions of such models developed by others. For example, other GPT foundation models include a series of models created by EleutherAI, and recently seven models created by Cerebras. Also, companies in different industries have developed task-specific GPTs in their respective fields, such as Salesforce's "EinsteinGPT" (for CRM) and Bloomberg's "BloombergGPT" (for finance). History Initial developments Generative pretraining (GP) was a long-established concept in machine learning applications, but the transformer architecture was not available until 2017 when it was invented by employees at Google. That development led to the emergence of large language models such as BERT in 2018 which was a pre-trained transformer (PT) but not designed to be generative (BERT was an "encoder-only" model). Also around that time, in 2018, OpenAI published its article entitled "Improving Language Understanding by Generative Pre-Training," in which it introduced the first
https://en.wikipedia.org/wiki/Entotrust%20certification
The Entotrust certification is a voluntary product certification of insects as food, and related insect-based foods, which allows producers to communicate their food safety and sustainability. Increasingly used, in Europe, Africa, Asia, US, Mexico, and Latam with the mission to recognize and report quality products based on edible insects, the logo can only be used by fully certified producers and farmers. The participated and open programme envisions a world where insects will provide healthy foods, high-value proteins, accessible to a large part of the population, with environmental and social benefits. The Entotrust International certification covers a wide range of food products including bakery, pasta, confectionary, salted snacks and chips, protein and energy bars, whole dried insects, insect protein powder, and functional drinks. In general, it encompasses any product that might become a more sustainable and nutritious one, with the inclusion of a percentage of insect origin proteins. The call for more sustainable proteins, healthier diets, and food innovation is driving wider adoption of insect food across the globe: a certificate and a seal of acceptance have a capability to play a major part in making clients trust edible insect solutions. It is easier making people wish to consume insects if they know they’re secure and bred in a sustainable manner. The insect as food market is expected to grow significantly according independent analysis at an average CAGR of 8.9% during the forecast period (2023–2028). More than 2,100 insect species are currently eaten by two billion people from 130 countries. Insects have high-value nutritional profiles, and are rich in protein, omega-3 fatty acids, iron, zinc, folic acid and vitamins B12, C and E. Commercial insect farming is considered to have a low environmental footprint, requiring minimal water, energy, and land resources. Europe and the United States of America are the leading edible insect markets in the
https://en.wikipedia.org/wiki/Microsegmentation%20%28network%20security%29
Microsegmentation is a network security approach that enables security architects to construct network security zones boundaries per machine in data centers and cloud deployments in order to segregate and secure workloads independently. It is now also used on the client network as well as the data center network. Types of microsegmentation There are three main types of microsegmentation: Native OS host-based firewall segmentation employs OS firewalls to regulate network traffic between network segments. Instead of using a router or network firewalls or deploying agents, each host firewall is used to perform both auditing and enforcement, preventing attackers from moving laterally between network machines. While Native OS host-based firewalls can implement many segmentation schemes, including microsegmentation, only recent innovations in the space have made implementation and management achievable at scale. Host-agent segmentation: This style of microsegmentation makes use of endpoint-based agents. By having a centralized manager with access to all data flows, the difficulty of detecting obscure protocols or encrypted communications is mitigated. The use of host-agent technology is commonly acknowledged as a powerful method of microsegmentation. Because infected devices act as hosts, a solid host strategy can prevent issues from manifesting in the first place. This software, however, must be installed on every host. Hypervisor segmentation: In this implementation of microsegmentation, all traffic passes through a hypervisor. Since hypervisor-level traffic monitoring is possible, existing firewalls can be used, and rules can be migrated to new hypervisors as instances are spun up and spun down. Hypervisor segmentation typically doesn't function with cloud environments, containers, or bare metal, which is a downside. Network segmentation: This approach builds on the current setup by using tried-and-true techniques like access-control list (ACLs) for network segme
https://en.wikipedia.org/wiki/JAB%20Code
JAB Code (Just Another Barcode) is a colour 2D matrix symbology made of colour squares arranged in either square or rectangle grids. It was developed by Fraunhofer Institute SIT (Secure Information Technology). The code contains one primary symbol and optionally multiple secondary symbols. The primary symbol contains four finder patterns located at the corners of the symbol. The code uses either 4 or 8 colours. The 4 basic colours (cyan, magenta, yellow, black) are the 4 primary colours of the subtractive CMYK colour model which is the most widely used system in the industry for colour printing on a white base such as paper. The other 4 colours (blue, red, green, and white) are secondary colours of the CMYK model and originate as an equal mixture of a pair of basic colours. The barcode is not subject to licensing and was submitted to ISO/IEC standardization as ISO/IEC 23634 expected to be approved at the beginning of 2021 and finalized in 2022. The software is open source and published under the LGPL v2.1 license. The specification is freely available. Because the colour adds a third dimension to the two-dimensional matrix, a JAB Code can contain more information in the same area compared to two-colour (black and white) codes – a 4 colour code doubles the amount of data that could possibly be stored and triples it with an 8 colour code. This can allow storage of an entire message in the barcode, rather than just storing partial data with a reference to a full message somewhere else (such as a link to a website), thus eliminating the need for additional always-available infrastructure beyond the printed barcode itself. It may be used to digitally sign encrypted digital version of printed legal documents, contracts and certificates (diplomas, training), medical prescriptions or provide product authenticity assurance to increase protection against counterfeits. References Automatic identification and data capture Barcodes Encodings Hypermedia
https://en.wikipedia.org/wiki/Axial%20current
The axial current, also denoted the pseudo-vector or chiral current, is the conserved current associated to the chiral symmetry or axial symmetry of a system. Origin According to Noether's theorem, each symmetry of a system is associated a conserved quantity. For example, the rotational invariance of a system implies the conservation of its angular momentum, or spacetime invariance implies the conservation of energy–momentum. In quantum field theory, internal symmetries also result in conserved quantities. For example, the U(1) gauge transformation of QED implies the conservation of the electric charge. Likewise, if a theory possesses an internal chiral or axial symmetry, there will be a conserved quantity, which is called the axial charge. Further, just as the motion of an electrically charged particle produces an electric current, a moving axial charge constitutes an axial current. Definition The axial current resulting from the motion of an axially charged moving particle is formally defined as , where is the particle field represented by Dirac spinor (since the particle is typically a spin-1/2 fermion) and and are the Dirac gamma matrices. For comparison, the electromagnetic current produced by an electrically charged moving particle is . Meaning As explained above, the axial current is simply the equivalent of the electromagnetic current for the axial symmetry instead of the U(1) symmetry. Another perspective is given by recalling that the chiral symmetry is the invariance of the theory under the field rotation   and   (or alternatively   and   ), where denotes a left-handed field and a right-handed one. From this as well as the fact that and the definition of above, one sees that the axial current is the difference between the current due to left-handed fermions and that from right-handed ones, whilst the electromagnetic current is the sum. Chiral symmetry is exhibited by vector gauge theories with massless fermions. Since there is no know
https://en.wikipedia.org/wiki/Environmental%20epigenetics
Environmental epigenetics is a branch of epigenetics that studies the influence of external environmental factors on the gene expression of a developing embryo. The way that genes are expressed may be passed down from parent to offspring through epigenetic modifications, although environmental influences do not alter the genome itself. During embryonic development, epigenetic modifications determine which genes are expressed, which in turn determines the embryo's phenotype. When the offspring is still developing, genes can be turned on and off depending on exposure to certain environmental factors. While certain genes being turned on or off can increase the risk of developmental diseases or abnormal phenotypes, there is also the possibility that the phenotype will be non-functional. Environmental influence on epigenetics is highly variable, but certain environmental factors can greatly increase the risk of detrimental diseases being expressed at both early and adult life stages. Environmental triggers for epigenetic change The way that genes are expressed is influenced by the environment that the genome is in. These environmental influences are referred to as triggers and can involve anything that influences normal gene expression. How the genome is expressed depends on the environmental factors present during gestation. It is possible for the environmental effects of epigenetics to be deleterious or to be a natural part of the development pathway. When these environmental factors are detrimental it causes the deactivation of some DNA sequences, which can lead to atypical phenotypes. Some of the most common triggers include diet, temperature, exposure to harmful substances, and lifestyle. These triggers can cause low birth weight, neurological disorders, cancers, autoimmune diseases, and many other malformations. These epigenetic triggers can change the way that an organism develops and have lifelong effects. Epigenetic changes can be passed down through offspri
https://en.wikipedia.org/wiki/Big-line-big-clique%20conjecture
The big-line-big-clique conjecture is an unsolved problem in discrete geometry, stating that finite sets of many points in the Euclidean plane either have many collinear points, or they have many points that are all mutually visible to each other (no third point blocks any two of them from seeing each other). Statement and history More precisely, the big-line big-clique conjecture states that, for any positive integers and there should exist another number , such that every set of points contains collinear points (a "big line"), mutually-visible points (a "big clique"), or both. The big-line-big-clique conjecture was posed by Jan Kára, Attila Pór, and David R. Wood in a 2005 publication. It has led to much additional research on point-to-point visibility in point sets. Partial results Finite point sets in general position (no three collinear) do always contain a big clique, so the conjecture is true for . Additionally, finite point sets that have no five mutually-visible points (such as the intersections of the integer lattice with convex sets) do always contain many collinear points, so the conjecture is true for . Generalizing the integer lattice example, projecting a -dimensional system of lattice points of size onto the plane, using a generic linear projection, produces a set of points with no collinear points and no mutually visible points. Therefore, when exists, it must be greater than . Related problems The visibilities among any system of points can be analyzed by using the visibility graph of the points, a graph that has the points as vertices and that connects two points by an edge whenever the line segment connecting them is disjoint from the other points. The "big cliques" of the big-line-big-clique conjecture are cliques in the visibility graph. However, although a system of points that is entirely collinear can be characterized by having a bipartite visibility graph, this characterization does not extend to subsets of points: a subset ca
https://en.wikipedia.org/wiki/Sharkbook
Sharkbook is a global database for identifying and tracking sharks, particularly whale sharks, using uploaded photos and videos.In addition to identifying and tracking sharks, the site allows people to "adopt a shark" and get updates on specific animals. Creation Sharkbook is the result of collaboration between Simon J Pierce of the Marine Megafauna Foundation and Jason Holmberg of Wild Me. The software is Open Source and is now being used by other biology projects. Identification of individual sharks Whale sharks have unique spot patterning on their sides, similar to a human fingerprint, which allows for individual identification. Scuba divers around the world can photograph sharks and upload their identification photographs to the Sharkbook website, supporting global research and conservation efforts. Additionally, the software automatically searches social media sites like YouTube and Instagram to look for images of whale sharks and adds them to the database. Sharkbook software uses special pattern-matching software to identify the unique spots on each shark. This software and algorithms were originally adapted from NASA star tracking software used on the Hubble Space Telescope. This software uses a scale-invariant feature transform (SIFT) algorithm, which can cope with complications presented by highly variable spot patterns and low contrast photographs. Purpose This citizen science tool is free to use by researchers worldwide. Sharkbook represents a global initiative to centralize shark sightings and facilitate research on these vulnerable species. See also Manta Matcher - For Manta Rays Flukebook - For whales and dolphins References Marine biology Sharks Citizen science
https://en.wikipedia.org/wiki/Rubika
Rubika is a proprietary, cross-platform Iranian messaging app. It is sponsored by the public-private mobile telecommunications companies Tusca holding, Mobile Telecommunication Company of Iran, and MTN Irancell. Rubika features include a free digital assistant, video calls, business pages and shopping channels, creator ads monetization, photo sharing, live broadcast, TV and video streaming, payment wallet, dark mode, Balad maps and required-to-purchase Bime free health insurance. The platform has 15.5 million daily and 35-40 million monthly users. It has financial backed equal to all Iranian startups. The app offers state sanctioned ads. Security Rubika was banned and lost its media license for streaming movies in 2020. It was removed by Google Play Protect in 2022. It is surveilled in part through Hamrahe aval Digital platform monitoring center. Software forks Shaad References Instant messaging Internet in Iran