source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Advanced%20combat%20direction%20system | The Advanced Combat Direction System (ACDS) is a centralized, automated command-and-control system, collecting and correlating combat information. It upgrades the Naval Tactical Data System (NTDS) for aircraft carriers and large-deck amphibious ships. A core component of non-Aegis combat systems, ACDS provides the capability to identify and classify targets, prioritize and conduct engagements, vector interceptor aircraft to targets, and exchange targeting information and engagement orders within the battle group and among different service components in the joint theater of operations. ACDS integrates the ship's sensors, weapons, and intelligence sources to allow command and control of battle group tactical operations.
The ACDS upgrade is divided into two phases designated as Block 0 and Block 1. The Block 0 system replaces obsolete Naval Tactical Data System (NTDS) computers and display consoles with modern equipment and incorporates both new and upgraded NTDS software. Block 1 operates with the equipment provided under ACDS Block 0 but implements significant improvements in software capability. The Block 1 upgrade includes modifiable doctrine, the Joint Tactical Information Distribution System (JTIDS) for joint and allied interoperability, increased range and track capability, multi-source identification, National Geospatial-Intelligence Agency (NGA) based digital maps, and an embedded training capability.
Program Status
ACDS Block 0 was deployed in nine aircraft carriers, five Wasp-class amphibious assault ships, and all five Tarawa-class amphibious assault ships. The first installation of ACDS Block 1 began in FY 1996 with the USS Eisenhower (CVN-69) and Wasp (LHD-1), followed by the USS John F. Kennedy (CV-67) in 1999 and USS Iwo Jima (LHD-7) and USS Nimitz (CVN-68) in 2001. ACDS will be replaced with the Ship Self-Defense System (SSDS) Mark 2 as it is fielded across the fleet.
Developer/Manufacturer
Raytheon, San Diego, California. ACDS Block I development, performance, and integration testing: Raytheon; SPAWAR Systems Center, San Diego, California; and the Integrated Combat Systems Test Facility (ICSTF) and Naval Surface Warfare Center Port Hueneme (NSWC/PHD) (Later, Combat Direction System Activity (CDSA)), Dam Neck, Virginia.
See also
H/ZKJ
Naval Tactical Data System
Ship Self-Defense System
References
Anti-submarine warfare
Military computers
Military equipment introduced in the 1990s |
https://en.wikipedia.org/wiki/Delta%20Dental | The Delta Dental Plans Association, also known as simply Delta Dental, is an American network of dental insurance companies composed of 39 independent Delta Dental members operating in all 50 states, the District of Columbia and Puerto Rico. These member companies provide coverage to 85 million people, enrolled in over 157,000 groups. While many of the Delta Dental member companies and Delta Dental Plans Association (DDPA) are non-profit organizations, a few of the member companies have for-profit segments.
Delta Dental member companies serve more than one third of the estimated 166 million Americans with dental insurance.
History
In 1954, several dental service corporations formed in California, Oregon, and Washington. These corporations were created by dentists who recognized the need to increase access to oral health care, and later joined to form Delta Dental. Delta Dental began working with Washington Dental Service to provide dental benefit programs for organized labor unions and later underprivileged residents through a partnership with the Washington State Department of Public Assistance.
Delta Dental Plans Association (DDPA) was created in Fall of 1966 to bring together these local state service organizations and coordinate dental benefit programs for customers with employees in multiple states. A year later, the first multi-state program was sold by WDS to the International Association of Machinists. WDS ceded the administration for enrollees in other states to other Delta Dental member companies and contracted with the Blue Cross and Blue Shield Association for administration in those states without a Delta Dental affiliate organization.
Coverage was provided this way until the late 1980s when Delta Dental of California won the bid for the Office of the Civilian Health and Medical Program of the Uniformed Services (OCHAMPUS) program. Delta Dental member companies agreed to share its provider data so the administration of this very large account could be centralized, with Delta Dental of California sharing the administrative income and risk. The OCHAMPUS program led to the creation of the National Provider File (NPF), which was made available for commercial accounts in 1990 via Delta USA – providing Delta Dental coverage to organizations with employees and subscribers located in multiple states.
In 2013, the Washington Dental Service was rebranded as Delta Dental of Washington.
Plan assignment
If individuals have dental insurance through their employer, the Delta Dental member company in the state of their headquarters usually will handle coverage. Individual Delta Dental insurance is available in several states either through that state's member company or the state or federal health care exchange. Other individual dental insurance options are available through specialty groups such as AARP and military retiree, federal employee and veterans' groups.
Vertical integration
Dental Service of Massachusetts, also known as Delta Den |
https://en.wikipedia.org/wiki/MQL | MQL may refer to:
Mbelime, an Oti–Volta language
Merseyside Quiz Leagues
MetaQuotes Language, the programming language of MetaTrader 4 software
Metaweb Query Language, the programming language of Freebase software
Mildura Airport, IATA code MQL
Molecular Query Language, a query language used in chemoinformatics
Marketing Qualified Lead
Minimum quantity lubrication, a type of lubrication using minimal lubricant, with applications in bearings and cutting fluids
Manchester Quays Ltd, a partnership between Manchester City Council and Allied London |
https://en.wikipedia.org/wiki/Brian%20Sullivan%20%28game%20designer%29 | Brian Sullivan is a computer game designer and entrepreneur known for developing Titan Quest and the Age of Empires series of games. He is also the co-founder of Iron Lore Entertainment and Ensemble Studios. Sullivan won the 1998 Computer Game Developers Association (GDC) Spotlight Award for Achievement in Game Design for his work on Age of Empires.
In addition to his work in the video game industry, Sullivan has also worked as a professor at Northeastern University, teaching a number of design courses.
Sullivan graduated from Carnegie Mellon University.
References
External links
Brian Sullivan entry at MobyGames
Video game designers
American entertainment industry businesspeople
Year of birth missing (living people)
Living people
Ensemble Studios people |
https://en.wikipedia.org/wiki/Midrange%20computer | Midrange computers, or midrange systems, were a class of computer systems that fell in between mainframe computers and microcomputers.
This class of machine emerged in the 1960s, with models from Digital Equipment Corporation (PDP line), Data General (NOVA), Hewlett-Packard (HP3000) widely used in science and research as well as for business - and referred to as minicomputers.
IBM favored the term "midrange computer" for their comparable, but more business-oriented systems.
IBM Midrange Systems
System/3 was the first IBM midrange system (1969)
System/32 (introduced in 1975) was a 16-bit single-user system also known as the IBM 5320.
System/34 (1977) was intended to be a successor to both the 3 and the 32.
System/38 (1979) was the first midrange system to have an integrated relational database management system (DBMS). The S/38 had 48-bit addressing, and ran the CPF operating system.
System/36 (1983) had two 16-bit processors with an operating system that supported multiprogramming.
AS/400 was introduced under that name in 1988, renamed eServer iSeries in 2000, and subsequently became the IBM System i in 2006. It runs the OS/400 operating system.
IBM Power Systems were introduced in April 2008, a convergence of IBM System i and IBM System p.
Positioning
The main similarity of midrange computers and mainframes is that they are both oriented for decimal-precision computing and high volume input and output (I/O), but most midrange computers have an (reduced and specially designed) internal architecture with limited compatibility to mainframes. The low-end mainframe can be more affordable and less powerful that a hi-end midrange system, but midrange system still was a "replacement solution" with another service process, different OS and internal architecture.
The difference between similar-size Midrange and Supermini/Minicomputer - is a computing purposes: Super/mini oriented for float-point scientific computing, midrange - for decimal business-oriented computing, but without clear distinction border between classes.
Earliest midrange computers was a single-user business calculation machines; the virtualization, typical feature of mainframes since 1972 (partially from 1965), was ported to midrange systems only in 1977; the multi-user support was added to midranges in 1976 instead of 1972 for mainframes (but that's still a significantly earlier that a limited release of x86 virtualization (1985/87) or multi-user support (1983)).
Latest midrange systems are primarily mid-class multi-user local network servers that can handle the large-scale processing of many business applications. Although not as powerful and reliably as full-size mainframe computers, they are less costly to buy, operate, and maintain than mainframe systems and thus meet the computing needs of many organizations. Midrange systems was relatively popular as powerful network servers to help manage large Internet Web sites, but more oriented for corporate intranets and |
https://en.wikipedia.org/wiki/Fantaserye%20and%20telefantasya | Fantaserye or telefantasya is a genre of Philippine television programming which mixes soap opera, telenovela, fantasy, myth, magic and enchantment. The episodes are usually 30 minutes long and have a daily slot in the evening primetime row.
Usage
The term fantaserye is often used to refer to ABS-CBN's fantasy series. The first official fantaserye was Marina, a series about a girl cursed to become a mermaid. Telefantasya often refers to the creations of GMA Network; their first telefantasya was Mulawin, a series about a humanoid bird who fell in love with a girl who was later revealed to be part-bird. But even before, GMA has its first fantasy-based soap via Ikaw Na Sana in 1997 and Pintados in 1999. ABS-CBN also reinvented the name of their fantasy TV series depending on its origin, like Krystala, named superserye (pertaining to superhero) and Ang Panday as sineserye (cinematic origin). However, both are still regarded by many as fantaseryes.
History
The Fantasy genre of television has been around even before the word was conceived. Probably the first Filipino fantasy series could be regarded as Okey Ka Fairy Ko!1 produced by TAPE, Inc. in 1987 and broadcast originally on IBC Channel 13, moved to ABS-CBN until TAPE Inc. transferred its programs to GMA after its contract expired with ABS-CBN.
Okey ka, Fairy Ko! is a story about Taga-Lupa ("Earthling" in English) Vic Sotto who married Engkantada (a fairy) Alice Dixson. They had children who were half-earthlings and half-fairies. The fairy, a princess in her world, had a stern mother, Ina Magenta (Charito Solis) who visited the neighborhood everyday, criticizing their lifestyle on earth (sometimes battling with evil from the dark world).
Fantaserye's origins were more rooted towards situational comedy than soap opera (today's fantaseryes and telefantsayas are lined up in evening prime time along with other soap operas), and Okey ka, Fairy Ko! is proof of that. The series had a run of about seven years and was aired on one day of the week for about 60 minutes per episode. Other notable series with similar nature are Wansapanataym of ABS CBN and Beh Bote Nga of GMA Network on Pinoy Teleserye.
Telefantasyas or Fantaseryes need not only depict magical worlds in space or underwater. They may also depict future settings. Pintados, launched by GMA, could also fall under the same genre. Pintados was about a band of painted warriors (Pintados) with the power to control the elements on a mission to save the world. Nowadays, several titles fall under this genre. However, the most popular fantaseryes or telefantasyas are the ones shown weeknights during primetime television. Once-a-week fantaseryes are also included under the same genre but do not receive as much viewership as the ones shown every weeknight.
Fantaseryes weren't given as much as attention earlier and thus were usually shown on a once-a-week basis with each episode running for one to one hour and a half. In 2003, ABS-CBN introduced a |
https://en.wikipedia.org/wiki/Mobile%20broadband | Mobile broadband is the marketing term for wireless Internet access via mobile networks. Access to the network can be made through a portable modem, wireless modem, or a tablet/smartphone (possibly tethered) or other mobile device. The first wireless Internet access became available in 1991 as part of the second generation (2G) of mobile phone technology. Higher speeds became available in 2001 and 2006 as part of the third (3G) and fourth (4G) generations. In 2011, 90% of the world's population lived in areas with 2G coverage, while 45% lived in areas with 2G and 3G coverage. Mobile broadband uses the spectrum of 225 MHz to 3700 MHz.
Description
Mobile broadband is the marketing term for wireless Internet access delivered through cellular towers to computers and other digital devices using portable modems. Although broadband has a technical meaning, wireless-carrier marketing uses the phrase "mobile broadband" as a synonym for mobile Internet access. Some mobile services allow more than one device to be connected to the Internet using a single cellular connection using a process called tethering.
The bit rates available with Mobile broadband devices support voice and video as well as other data access. Devices that provide mobile broadband to mobile computers include:
PC cards, also known as PC data cards, and Express cards
Mini PCI and Mini PCI Express cards that are integrated into the laptop
USB and mobile broadband modems, also known as connect cards
portable devices with built-in support for mobile broadband, such as laptops, smartphones/tablets, PDAs, and other mobile Internet devices.
Internet access subscriptions are usually sold separately from mobile service subscriptions.
Generations
Roughly every ten years, new mobile network technology and infrastructure involving a change in the fundamental nature of the service, non-backwards-compatible transmission technology, higher peak data rates, new frequency bands, and/or wider channel frequency bandwidth in Hertz, becomes available. These transitions are referred to as generations. The first mobile data services became available during the second generation (2G).
The download (to the user) and upload (to the Internet) data rates given above are peak or maximum rates and end users will typically experience lower data rates.
WiMAX was originally developed to deliver fixed wireless service with wireless mobility added in 2005. CDPD, CDMA2000 EV-DO, and MBWA are no longer being actively developed.
Coverage
In 2011, 90% of the world's population lived in areas with 2G coverage, while 45% lived in areas with 2G and 3G coverage, and 5% lived in areas with 4G coverage. By 2017 more than 90% of the world's population is expected to have 2G coverage, 85% is expected to have 3G coverage, and 50% will have 4G coverage.
A barrier to mobile broadband use is the coverage provided by the mobile service networks. This may mean no mobile network or that service is limited to older and slower mob |
https://en.wikipedia.org/wiki/Walter%20Kopp | Walter Kopp (1913 in Alsenz – 1974 in Gauting) was a lieutenant colonel in the Wehrmacht in Nazi Germany. After the Nazi defeat in 1945, he became the chief of one stay-behind network in West Germany, code-named KIBITZ-15. The British and US intelligence services had set up clandestine anti-communist organisations supposed to "stay-behind" in case of a Soviet invasion. Walter Kopp was described by his own North-American handlers as an "unreconstructed Nazi," and the KIBITZ-15 network as "a group with Nazi tendencies" in CIA documents released in June 2006.
In May 1945 Kopp wrote a letter to High Commissioner McCloy stating that he and a group of his friends were concerned over what might happen in case of a Russian invasion of Germany and wished to place themselves at the disposal of the Americans. Walter Kopp was later made chief agent of the KIBITZ stay-behind network.
In May 1953 Kopp's contract with the CIA was terminated "on the friendliest terms".
In 1968 he was Liaison officer of the Military District Command in Munich to the political parties.
See also
U.S. intelligence involvement with German and Japanese war criminals after World War II
References
External links
CIA Ties With Ex-Nazis Shown, The Washington Post, June 7, 2006
Declassified CIA files relating to Walter Kopp (179 documents as of June 2013)
German anti-communists
German Army officers of World War II
1974 deaths
1913 births
People from Donnersbergkreis
Military personnel from Rhineland-Palatinate |
https://en.wikipedia.org/wiki/DuMont%20Royal%20Theater | DuMont Royal Theater (also known as Royal Playhouse) is an American dramatic anthology television series which ran on the now-defunct DuMont Television Network from April 12, 1951, to June 26, 1952. The half-hour series ran during the summers, and in 1952 it ran on alternate weeks with Gruen Playhouse.
The series helped launch the career of Hugh O'Brian, who later appeared in the popular series The Life and Legend of Wyatt Earp. Others who appeared on the program included Mary Sinclair and Edgar Barrier. Some sources say the sponsor was Royal Gelatin when it was part of Standard Brands.
Bing Crosby Enterprises produced the program, which was also broadcast with the title Crown Theater. DuMont sponsored the series on 18 TV stations, with a variety of sponsors putting it on the air in other markets. United Television Programs was in charge of rights to reruns.
See also
List of programs broadcast by the DuMont Television Network
List of surviving DuMont Television Network broadcasts
References
Bibliography
David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004)
Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980)
Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964)
External links
DuMont Royal Theater at Internet Movie Database
DuMont historical website
Royal Playhouse at CVTA
DuMont Television Network original programming
1950s American anthology television series
1951 American television series debuts
1952 American television series endings
Black-and-white American television shows |
https://en.wikipedia.org/wiki/Hybrid%20Scheduling | Hybrid Scheduling is a class of scheduling mechanisms that mix different scheduling criteria or disciplines in one algorithm. For example, scheduling uplink and downlink traffic in a WLAN (Wireless Local Area Network, such as IEEE 802.11e) using a single discipline or framework is an instance of hybrid scheduling. Other examples include a scheduling scheme that can provide differentiated and integrated (guaranteed) services in one discipline. Another example could be scheduling of node communications where centralized communications and distributed communications coexist. Further examples of such schedulers are found in the following articles:
References
1- Y. Pourmohammadi Fallah, H. Alnuweiri,"Hybrid Polling and Contention Access Scheduling in IEEE 802.11e WLANs", Journal of Parallel and Distributed Computing, Elsevier, Vol 67, Issue 2, Feb. 2007, pp. 242–256.
Computer networking |
https://en.wikipedia.org/wiki/Lucky%20number%20%28disambiguation%29 | A lucky number, in number theory, is a natural number generated by a particular sieve algorithm.
Lucky number may also refer to:
Film and television
The Lucky Number, a 1933 British comedy film
Lucky Number (film), a 1951 Donald Duck cartoon
Lucky Numbers, a 2000 American comedy film
#Lucky Number, a 2015 film starring Tom Pelphrey
Lucky Numbers (TV series), a 1995–1997 British game show
Music
Lucky Number (album) or the title song, by Jolin Tsai, 2001
Lucky Numbers (album), by Frank Sinatra, 1998
Lucky Number: The Best of Lene Lovich, an album by Lene Lovich, 2004
"Lucky Number" (song), by Lene Lovich, 1979
"Lucky Number", a song by Saves the Day from Saves the Day, 2013
Other uses
Lucky numbers of Euler, producing prime-generating polynomials
A number believed to affect one's luck
Lucky number combinations, an element of Chinese numerology
Lucky Numbers, a discontinued Cadbury product |
https://en.wikipedia.org/wiki/Programming%20by%20example | In computer science, programming by example (PbE), also termed programming by demonstration or more generally as demonstrational programming, is an end-user development technique for teaching a computer new behavior by demonstrating actions on concrete examples. The system records user actions and infers a generalized program that can be used on new examples.
PbE is intended to be easier to do than traditional computer programming, which generally requires learning and using a programming language. Many PbE systems have been developed as research prototypes, but few have found widespread real-world application. More recently, PbE has proved to be a useful paradigm for creating scientific work-flows. PbE is used in two independent clients for the BioMOBY protocol: Seahawk and Gbrowse moby.
Also the programming by demonstration (PbD) term has been mostly adopted by robotics researchers for teaching new behaviors to the robot through a physical demonstration of the task. The usual distinction in literature between these terms is that in PbE the user gives a prototypical product of the computer execution, such as a row in the desired results of a query; while in PbD the user performs a sequence of actions that the computer must repeat, generalizing it to be used in different data sets. For final users, to automate a workflow in a complex tool (e.g. Photoshop), the most simple case of PbD is the macro recorder.
See also
Query by Example
Automated machine learning
Example-based machine translation
Inductive programming
Lapis (text editor), which allows simultaneous editing of similar items in multiple selections created by example
Programming by demonstration
Test-driven development
References
External links
Henry Lieberman's page on Programming by Example
Online copy of Watch What I Do, Allen Cypher's book on Programming by Demonstration
Online copy of Your Wish is My Command, Henry Lieberman's sequel to Watch What I Do
A Visual Language for Data Mapping, John Carlson's description of an Integrated Development Environment (IDE) that used Programming by Example (desktop objects) for data mapping, and an iconic language for recording operations
User interfaces
Programming paradigms
Machine learning |
https://en.wikipedia.org/wiki/Paramount%20Television%20Network | The Paramount Television Network was a venture by American film corporation Paramount Pictures to organize a television network in the late 1940s. The company built television stations KTLA in Los Angeles and WBKB in Chicago; it also invested $400,000 in the DuMont Television Network, which operated stations WABD in New York City, WTTG in Washington, D.C., and WDTV in Pittsburgh. Escalating disputes between Paramount and DuMont concerning breaches of contract, company control, and network competition erupted regularly between 1940 and 1956, and culminated in the dismantling of the DuMont Network. Television historian Timothy White called the clash between the two companies "one of the most unfortunate and dramatic episodes in the early history of the television industry."
The Paramount Television Network aired several programs, including the Emmy Award-winning children's series Time for Beany. Filmed in Hollywood, the programs were distributed to an ad-hoc network of stations across the United States. The network signed affiliation agreements with more than 50 television stations in 1950; despite this, most of Paramount's series were not widely viewed outside the West Coast. The Federal Communications Commission (FCC), which filed suit against Paramount for antitrust violations, prevented the studio from acquiring additional television stations. Paramount executives eventually gave up on the idea of a television network, and continued to produce series for other networks. In 1995, after four decades of television production for other companies, Paramount re-entered the broadcast network field when the company and Chris-Craft Industries launched the United Paramount Network (UPN), a television network that operated until 2006. Paramount's longtime television division is now owned by CBS Studios, and it has since founded a second version of Paramount Television under Viacom ownership. Both of these (along with the former WDTV, now KDKA-TV) are now part of Paramount Global.
Origins
William Wadsworth Hodkinson founded American film corporation Paramount Pictures in 1914. Famous Players–Lasky Corporation acquired the company in 1916 and by the 1920s Paramount became a key player in Hollywood. The company founded or acquired many film production and exhibition properties; among these were the 2,000-screen theater chain United Paramount Theatres (UPT), newsreel service Paramount News, the Famous Players theater chain in Canada and animation studio Famous Studios. The company became one of the "big five" Hollywood studios. By the 1940s, however, Paramount was the target of several antitrust lawsuits by the federal government, culminating with U.S. vs. Paramount Pictures, et al. (1948), which found that Paramount and other studios conducted monopolistic practices. Due to this Supreme Court decision, the Federal Communications Commission (FCC) forced Paramount to sell off its theater division in 1949.
As early as 1937, executives at Paramount Pictures w |
https://en.wikipedia.org/wiki/J%C3%A6gersborg%20station | Jægersborg station is a station on the Hillerød radial of the S-train network in Copenhagen, Denmark, served by the E and A-train.
It is also the southern terminus of the Nærumbanen local railway.
There are two distinct sets of platforms for each service. The S-train has double tracks and an island platform. Although there are two tracks with platforms on either side for the local Nærumbanen service, because it is the terminus of the single track line, only the closer southerly platform is regularly used.
Number of travellers
According to the Østtællingen in 2008:
See also
List of railway stations in Denmark
References
S-train (Copenhagen) stations
Railway stations opened in 1936
1936 establishments in Denmark
Knud Tanggaard Seest railway stations
Railway stations in Denmark opened in the 1930s |
https://en.wikipedia.org/wiki/Gentofte%20station | Gentofte station is a station on the Hillerød radial of the S-train network in Copenhagen, Denmark, served by E-trains to Hillerød/Holte and Copenhagen. It is located centrally in Gentofte municipality.
See also
1897 Gentofte train crash
List of railway stations in Denmark
References
S-train (Copenhagen) stations
Buildings and structures in Gentofte Municipality
1863 establishments in Denmark
Railway stations in Denmark opened in 1863 |
https://en.wikipedia.org/wiki/BBC%20Micro%20expansion%20unit | A BBC Micro expansion unit, for the BBC Micro is one of a number of peripherals in a box with the same profile and styling as the main computer.
Second Processors
The second processors are connected to Acorn's proprietary and trademarked Tube interface. Only one second processor unit could be connected at a time to a BBC Micro, although a Master 128 could also have a co-processor fitted internally at the same time. The terminology of second processor was slightly misleading, since connected and switched on, the system worked on a "host-parasite" model, with the processor in the external unit taking control while the 6502 in the "main" computer simply took on responsibility for I/O.
6502 Second Processor
The 6502 Second Processor (using a 65C02) was clocked at 3 MHz, a full 50% faster than the 6502 inside a BBC Model B, and also had 64 KB of RAM, of which typically 30–44 KB was free for application data (compared to as little as 8.5 KB on an unexpanded Model B in graphics mode, or only 5.75 KB with the disc interface). A version of BBC BASIC II, called Hi-BASIC, was delivered on ROM with this processor together with a DNFS ROM containing the latest versions of the disc filing system (DFS) and Econet network filing system (NFS). The product was launched with a price of £199.
The Bitstik CAD system, originally developed by Robocom for the Apple II, was offered as an accessory for the 6502 Second Processor, also requiring dual 80-track floppy drives. The Bitstik system itself was introduced with a price of around £375, which combined with floppy drives estimated at £500, the second processor at £199, the cost of the BBC Micro itself at £399, and the price of a colour monitor (Acorn recommending their own RGB monitor), the total investment was estimated to be between £1500 and £2000 depending on any particular customer's existing equipment and preferences. Featuring a three-axis joystick, offering the usual two-dimensional navigation plus a knob to control zooming, the software worked in the high-resolution four-colour display mode, providing support for the display and editing of scalable vector graphics. The dual-drive arrangement was necessary to allow the first drive to provide access to the utilities and for the second drive to act as a "drawing buffer".
The original Bitstik product had been introduced for the 64 KB Apple II Plus in 1982 at a price of £275 for the device and software itself, with a complete system costing around £2000. This was, however, considered "extremely good value", given that a "ready-to-use 'turnkey' drawing computer" would have cost £100,000 for a minicomputer-based system in 1980, and even at the start of 1982 could have cost £20,000. To realise the "full potential" of the solution, a plotter was recommended, although A3-sized plotters cost at least £1,000, with a Tektronix A2-sized model costing £6,500 but offering a precision of 0.001mm. In a review published in late 1982, the solution was regarded as "the most |
https://en.wikipedia.org/wiki/Packeteer | Packeteer, Inc., founded in 1996 by Robert Packer, Brett Galloway and Bob Luxenberg was an I.T. company based in Cupertino, California that was listed on the NASDAQ. Networking appliances focus on Application Traffic Management and optimization for wide area networks. They held at least 40 patents for various network optimization methods. Packeteer was acquired by Blue Coat Systems in 2008.
Packeteer was a contributing member of the Apdex Alliance.
Their main product lines were:
PacketShaper (Traffic shaping, compression, TCP & HTTP acceleration, analysis, reporting)
SkyX (TCP acceleration and compression, high latency link optimization) via the Mentat acquisition.
iShared (WAFS and TCP acceleration, optimization, compression and caching) via the Tacit Networks acquisition.
iShaper (Introduced: May 7, 2007. Combines PacketShaper and iShared technologies into a single appliance.
Mobiliti software (data protection and link optimization for mobile business users. via the Tacit Networks acquisition.
PolicyCenter (centrally manages the configuration, policy management, software distribution and adaptive response tracking of multi-unit deployments.)
History
In 1999, Packeteer had an initial public offering on NASDAQ.
In 2000, Packeteer acquired the company Workfire Technologies and released their AppCelera product based on the Internet Web Acceleration technology developed by Workfire.
In 2004, Packeteer acquired the company Mentat, integrating their SkyX product into the Packeteer portfolio.
In 2006, Packeteer acquired the company Tacit Networks, maker of the iShared and Mobiliti product lines.
On April 21, 2008, Blue Coat System announced its intention to acquire Packeteer, Inc.
On June 9, 2008, Packeteer, Inc. was acquired by Blue Coat Systems. which in 2016 was acquired by Symantec
See also
Traffic shaping
Bandwidth management
WAN optimization
Allot Communications
NetEqualizer
References
1999 initial public offerings
2008 mergers and acquisitions
American companies established in 1996
American companies disestablished in 2008
Companies based in Cupertino, California
Companies formerly listed on the Nasdaq
Computer companies established in 1996
Computer companies disestablished in 2008
Defunct computer companies of the United States
Network performance
Technology companies based in the San Francisco Bay Area |
https://en.wikipedia.org/wiki/Stevens%20Award | The Stevens Award is a software engineering lecture award given by the Reengineering Forum, an industry association. The international Stevens Award was created to recognize outstanding contributions to the literature or practice of methods for software and systems development. The first award was given in 1995. The presentations focus on the current state of software methods and their direction for the future.
This award lecture is named in memory of Wayne Stevens (1944-1993), a consultant, author, pioneer, and advocate of the practical application of software methods and tools. The Stevens Award and lecture is managed by the Reengineering Forum. The award was founded by International Workshop on Computer Aided Software Engineering (IWCASE), an international workshop association of users and developers of computer-aided software engineering (CASE) technology, which merged into The Reengineering Forum. Wayne Stevens was a charter member of the IWCASE executive board.
Recipients
1995: Tony Wasserman
1996: David Harel
1997: Michael Jackson
1998: Thomas McCabe
1999: Tom DeMarco
2000: Gerald Weinberg
2001: Peter Chen
2002: Cordell Green
2003: Manny Lehman
2004: François Bodart
2005: Mary Shaw, Jim Highsmith
2006: Grady Booch
2007: Nicholas Zvegintzov
2008: Harry Sneed
2009: Larry Constantine
2010: Peter Aiken
2011: Jared Spool, Barry Boehm
2012: Philip Newcomb
2013: Jean-Luc Hainaut
2014: François Coallier
2015: Pierre Bourque
See also
List of computer science awards
References
Computer science awards
Software engineering |
https://en.wikipedia.org/wiki/CEGUI | Crazy Eddie's GUI (CEGUI) is a graphical user interface (GUI) library for the programming language C++. It was designed for the needs of video games, but is usable for non-game tasks, such as applications and tools. It is designed for user flexibility in look-and-feel, and to be adaptable to the user's choice in tools and operating systems.
Configurability
The strengths CEGUI are its robustness and its configurability. The system does not directly load files, render windows, directly display text, or even fetch input from the system. CEGUI interfaces with these through user-defined code, though its source code package comes with a number of modules for using certain components and libraries.
This freedom allows using CEGUI in any kind of resource management system or operating environment. Input is expected to be gathered by the user's code, possibly filtered as the user sees fit, and then passed to CEGUI for window processing.
CEGUI comes with a reasonable set of widgets, comparable to those of the average widget toolkit.
Tools
CEGUI can be fully customized using standard image, xml, and/or code editing tools. However, CEGUI also provides tools designed to aid in designing and developing CEGUI based interfaces.
Older CEGUI versions, before 0.8, provided separate tools to edit different aspects of the interface. The most notable of those being the Imageset and Layout editors.
Since CEGUI 0.8, there exists a new unified editing tool called CEGUI unified editor (CEED) which is being actively developed. It incorporates all aspects of GUI development into one tool.
Rendering
Rendering is performed by a back-end Rendering Module. CEGUI provides modules for Direct3D, OpenGL, the OGRE 3D engine, and the Irrlicht Engine. Other modules can be written for custom engines.
CEGUI's GUI components are organized in a tree (graph) and are rendered in the order of the tree traversal.
Resource management
File loading and resource management are handled through a back-end "Resource Provider Module". Users can create custom modules to define how resources are accessed. This allows the library to be used in virtually any operating environment. The default resource provider is cross-platform and provides standard file-access mechanics for loading resources. An optional minizip module enables resource-loading from zip-archives.
Memory management
CEGUI has a flexible Memory Management system. This system was based on OGRE and allows clients to map different types of allocators to different types of objects. By default all objects use the operating system's default allocator. CEGUI provides support for OGRE and nedmalloc allocators.
Scripting
CEGUI has an optional back-end Scripting Module. Lua and Python scripting modules are provided by CEGUI. The full CEGUI application programming interface (API) is available via script so that clients can create windows, define relationships, and handle events all within a scripted environment.
Look and feel
CEGUI has a p |
https://en.wikipedia.org/wiki/Gospel%20Broadcasting%20Network | The Gospel Broadcasting Network (GBN) is an American Christian satellite broadcast network, which broadcasts 24 hours a day, seven days a week.
All of the programming is produced by congregations and ministries affiliated with Churches of Christ. Although organized as a separate 501(c)(3) legal entity, GBN is under the oversight of the elders of the Southaven Church of Christ (Southaven, Mississippi), which serves as its sponsoring church.
The GBN headquarters are in Olive Branch, Mississippi. Programs are recorded at the Olive Branch location, as well as in individual studios of local congregations of Churches of Christ located throughout the country. Syndicated programs that air on GBN include Pulaski, Tennessee (Preaching the Gospel), Edmond, Oklahoma (In Search of the Lord's Way), Dunlap, TN ( Good News Today), McMinnville, TN (The Gospel of Christ), Cantonment, FL (Have a Bible Question), and Maxwell, Texas (World Video Bible School programming).
History
GBN was started by Barry Gilreath Sr. and began broadcasting in November 2005. Jim Dearman worked alongside Gilreath throughout the early years and served as its first Program Director.
Originally based in Chattanooga, Tennessee, GBN relocated to Olive Branch in 2011 (shortly upon Gilreath's death) when the Southaven Church of Christ took over as its sponsoring church. Following Barry Gilreath, Don Blackwell took over as the executive director of GBN in December of 2010.
Transmission
GBN transmits simulcasts over the Internet over GBNTV.org, through its own Roku channel, on Android and iOS devices, and over the air via both low-powered radio stations (all of which are individually owned and operated by local congregations) and television stations (primarily smaller cable networks located in the Southern United States). On April 27, 2011, GBN launched its public Roku channel. In addition to the live GBN broadcast, the channel also contains many archived programs. In June 2012, the GBN Roku channel was one of the 10-highest rated Roku channels with five out of five possible stars.
As of May, 2018, 24 cable companies in six states broadcast the network over their systems.
The January 2007 (IV) Issue of GoodNews reported that the two jails within the Dallas County, Alabama Sheriff's Department will broadcast GBN 17 hours a day (where deputies would like access during down-time 24/7).
Financial support
Unlike many religious networks, GBN does not solicit contributions over the air. (i.e., there are no fund-raising telethons, 'pledge' times, or on-air pleas for financial support). Several of the network's personalities have stated that "...you will never hear a plea for money on this network." GBN further states on its website that it "... is fully supported from the donations of members of the churches of Christ around the world. We do not solicit donations from non-members of the church of Christ." GBN does not accept paid advertisements.
GBN sends out a free newsletter for t |
https://en.wikipedia.org/wiki/C/s | C/s may refer to:
Client–server model, a computer network programming model
Cycle per second, a now-obsolete unit of frequency
C/S, a Philippine television network
See also
CS (disambiguation) |
https://en.wikipedia.org/wiki/KERI | KERI (1410 kHz "Faith & Family 1410 AM") is a commercial AM radio station in Bakersfield, California. The station is owned by Robert and Luann Wilkins, through licensee Bob Wilkins Radio Network Broadcasting, Inc. It airs a religious radio format. Most hours are brokered programming, where national and local religious leaders pay for a segment of time, for preaching or instruction, and where they may appeal to listeners for donations. Hosts include Charles Stanley, Jim Daly, John MacArthur, David Jeremiah and Jay Sekulow.
KERI is powered at 1,000 watts, day and night, using a non-directional antenna. Its transmitter is located on Kimber Avenue in Bakersfield, off Route 58 - Exit 115. KERI's studios and offices are on Easton Drive in Bakersfield.
History
On May 17, 1950, the station first sign-on signed on as KWSO, a 250-watt daytimer at 1050 kHz, owned by Maple Leaf Broadcasting. It was licensed to Wasco, California, about 25 miles northwest of Bakersfield. By the 1960s, the station had assorted programs including middle of the road and classical music, farm and news reports and religious programs. The station's signal was limited to the area around Wasco, and was reflected in the KWSO call letters.
In the early 1980s, the Federal Communications Commission allowed KWSO to move to 1180 kHz, coupled with a boost in power to 10,000 watts by day and nighttime authorization, running with 1,000 watts after sunset, using a directional antenna. With this new power, the station could be heard around the larger Bakersfield radio market. It switched to a full-time religious format, changing its call sign to KERI, which stands for "Kern County inspirational programming". (The 1050 frequency is now occupied by KJPG in nearby Frazier Park, California, airing a Catholic radio format.)
In the early 2000s, the station got another power boost, this time powered at its current 50,000 watts by day and 10,000 watts at night. Its city of license was changed to two communities, Wasco and Greenacres. In 2004, the station was bought by American General Media, which owns five other stations in the Bakersfield market.
On January 1, 2009, a frequency swap with talk radio sister station KERN 1410 AM was made. The talk format on KERN was moved to the more powerful 1180 frequency, while the religious format on KERI switched to AM 1410. (For the history of the 1410 frequency, see KERN.) After the switch was made, KERI 1410 was sold to the Watkins Radio Network, which owns about 30 other religious stations around the U.S.
Previous logo
References
External links
FCC History Cards for KERI (covering 1927-1980 as KSMR / KERN)
Corporate website
Fybush.com Tower Site of the Week photos of radio towers in Bakersfield
ERI
ERI
Radio stations established in 2008 |
https://en.wikipedia.org/wiki/Kansas%20Audio-Reader%20Network | The Kansas Audio-Reader Network (generally called Audio-Reader) is a radio reading service for the blind in Lawrence, Kansas. The program began operating on October 11, 1971, and is the second to operate in the United States. Audio-Reader broadcasts the content of books, newspapers, magazines, and other printed materials via a closed-circuit radio to certified users in Kansas, Missouri and Oklahoma. In addition to the radio program, Audio-Reader operates other services for the blind, including a telephone information service called Telephone Reader, audio description of theater in Kansas City, Missouri, and Lawrence, Kansas, cassette taping of printed materials, and a sensory garden.
Audio-Reader is funded through public and private sources, and is run through the University of Kansas through KU's public radio station, KANU. A staff of thirteen operate the service, supervising three hundred volunteers, who record materials at the on-campus office or through telephone headsets from their homes. In addition, the service has live broadcasts of daily newspapers, and some volunteers travel to theaters in the area to provide descriptions of theater performances.
History
Anne "Petey" Cerf, a Lawrence resident, began working in the mid-1960s to find a way to provide written materials for people unable to use standard print using radio, and hired Midwest Research Institute to determine the feasibility of such a project, originally focusing on using the same radio channels used by Muzak. MRI's report was discouraging, as was the reaction of a major organization for the blind, whose director told Ms. Cerf "The blind don't need a special radio service." On a visit to the Library of Congress, Cerf discovered that Stan Potter and Bob Watson, two amateur radio operators, had developed the first radio reading service, through Minnesota Public Radio in 1969. Cerf contacted Potter, and with his help, she worked to start a similar program in Kansas. Cerf presented the idea to the University of Kansas, offering to fund the first two years of its operation, provided the university would administer the program. KANU began operating Audio-Reader in 1971.
Audio-Reader began its operation in the kitchen of KU's Sudler House in 1971. Shortly after that, the service was moved to a trailer outside of the house, where it remained for a number of years. During this period, volunteers recalled live broadcasts that were interrupted by heavy rainstorms or squirrels running along the tin roof of the trailer. By the late 1970s, Stan Potter and Audio-Reader director Rosie Hurwitz collaborated to create the Association of Radio Reading Services, which came to be known as the International Association of Audio Information Services (IAAIS) over time. Hurwitz also served as one of the two original presidents of the association, Stan Potter being the other original president.
In 1988, Audio-Reader purchased its current facility, a 1920s Tudor-style house, with funding |
https://en.wikipedia.org/wiki/Chiller%20%28TV%20network%29 | Chiller (stylized as chiller) was an American cable and satellite television network that was owned by NBCUniversal Cable Entertainment Group subsidiary of NBCUniversal, all owned by Comcast. It later opened its own film production company as well. Chiller specialized in horror, thriller and suspense programming, mainly films.
As of February 2015, 38,820,000 American households (33.4% of households with television) received Chiller, though this declined with later removals by several cable services as carriage agreements expired.
The channel ceased operations on December 31, 2017.
Their website now redirects to Syfy Wire (formerly Sci-Fi Wire and Blastr) operated by Syfy featuring coverage of news in the science fiction, horror, and fantasy genres
History
On January 12, 2007, NBCUniversal announced its intent to launch Chiller on March 1, dedicated to films and television shows related to the horror genre. The company also stated that, aside from their own content, Chiller would feature content from competing film studios, including Lionsgate, Sony, Warner Bros., and 20th Century Fox. In February 2007, The 101, channel 101 on DirecTV, aired a "preview" of Chiller, featuring the pilot episodes of Twin Peaks and American Gothic, as well as various horror movies and programs. Sleuth, NBC/Universal's mystery-themed network later known as Cloo, aired a fourteen-hour movie marathon entitled "Chiller On Sleuth" to promote the launch of Chiller. The channel officially launched at 6:00 am Eastern/5:00 am Central on March 1. After a brief introduction to the channel, Chiller aired its first program, Alfred Hitchcock Presents.
On July 30, 2014, its carriage was merged with that of its former competitor Fearnet, a network launched by Comcast in 2006 as a video on demand service 6 years before their purchase of NBCUniversal.
Carriage decline and end of operations
The termination of Cloo on February 1, 2017, along with Esquire Network on June 28, and Universal HD (another NBCUniversal network rebranding as the Olympic Channel) on July 14, as non-prime networks in NBCU's cable portfolio, portended Chiller's fate at the end of 2017.
On February 1, 2017 (the same day sister network Cloo ended all operations), Dish removed the channel from their lineup, which cited that most of the network's rerun-centric programming was duplicative of that available on other networks and streaming services, with Charter Communications (Spectrum, Time Warner Cable and Bright House Networks subsidiaries) dropping it and Esquire Network on April 25 for the same reason. Five months later on October 2, 2017, it was discontinued by Verizon FiOS, while Mediacom quietly removed the channel from their lineup on October 23.
Cox effectively ended the network's life on November 8, 2017, when it refused to continue their carriage of Chiller within their new carriage agreements with NBCUniversal Cable Entertainment Group, removing the network from several Cox regional outlets.
On Nov |
https://en.wikipedia.org/wiki/DTX | DTX may refer to:
Science and technology
DTX (drum set), an electronic drum line by Yamaha
DTX (form factor), a computer form factor
Discontinuous Transmission, in mobile communications
Dendrotoxin, a class of snake neurotoxin
.dtx, source files of Documented LaTeX for DocStrip
Docetaxel, a chemotherapy medication
DTX (Digital Talent Experience), a team composed of Global Talent and IT Employee Experience at ServiceNow
Places
Downtown Crossing (MBTA station), a station in Boston, USA
Dallas, a city in the state of Texas
Other
Yamaha DTX, a variation of Yamaha DT series of Yamaha motorcycles
Delta Tau Chi, a fictional fraternity in the popular 1978 film Animal House
DTX (TV channel), a CEEMEA channel owned by Discovery Networks
The Downtown Rail Extension in San Francisco, California
Dövlət Təhlükəsizlik Xidməti(DTX) - state security service of Azerbaijan |
https://en.wikipedia.org/wiki/Stochastic%20universal%20sampling | Stochastic universal sampling (SUS) is a technique used in genetic algorithms for selecting potentially useful solutions for recombination. It was introduced by James Baker.
SUS is a development of fitness proportionate selection (FPS) which exhibits no bias and minimal spread. Where FPS chooses several solutions from the population by repeated random sampling, SUS uses a single random value to sample all of the solutions by choosing them at evenly spaced intervals. This gives weaker members of the population (according to their fitness) a chance to be chosen.
FPS can have bad performance when a member of the population has a really large fitness in comparison with other members. Using a comb-like ruler, SUS starts from a small random number, and chooses the next candidates from the rest of population remaining, not allowing the fittest members to saturate the candidate space.
Described as an algorithm, pseudocode for SUS looks like:
SUS(Population, N)
F := total fitness of Population
N := number of offspring to keep
P := distance between the pointers (F/N)
Start := random number between 0 and P
Pointers := [Start + i*P | i in [0..(N-1)]]
return RWS(Population,Pointers)
RWS(Population, Points)
Keep = []
for P in Points
I := 0
while fitness sum of Population[0..I] < P
I++
add Population[I] to Keep
return Keep
Where Population[0..I] is the set of individuals with array-index 0 to (and including) .
Here RWS() describes the bulk of fitness proportionate selection (also known as "roulette wheel selection") – in true fitness proportional selection the parameter is always a (sorted) list of random numbers from 0 to . The algorithm above is intended to be illustrative rather than canonical.
See also
Fitness proportionate selection
Reward-based selection
References
Genetic algorithms |
https://en.wikipedia.org/wiki/List%20of%20The%20Wedge%20episodes | The following is a list of episodes for the Network Ten comedy series, The Wedge.
Season one
We're Moving
Lucky
Thanks For Coming
That's Valid
Season two
¹This episode featured a cameo appearance from past cast members, Julia Zemiro and Marney McQueen.
Lists of Australian comedy television series episodes |
https://en.wikipedia.org/wiki/Legislation.gov.uk | legislation.gov.uk, formerly known as the UK Statute Law Database, is the official Web-accessible database of the statute law of the United Kingdom, hosted by The National Archives. It contains all primary legislation in force since 1267 and all secondary legislation since 1823; it does not include legislation which was fully repealed prior to 1991. The contents have been revised to reflect legislative changes up to 2002, with material that has been amended since 2002 fully updated and searchable.
New Statute Law Database
In December 2008, the Statute Law Database team transferred to The National Archives, which meant the responsibility for the Office of Public Sector Information and SLD websites became the responsibility of one department. A major consideration of the transfer was to enable the rationalization of the two websites in order to provide one point of access to all UK legislation and in doing so reduce duplication in effort, increase efficiency (for example taking advantage of technological developments to streamline processes) and provide a more user-friendly and accessible service across the board. Since December 2008 a considerable amount of work has taken place to look at who the customers of the joint services are and look carefully at their requirements.
The content of the new Statute Law Database consists of the combined content of the previous UK Statute Law Database (SLD) and the Office of Public Sector Information (OPSI) website. Updated legislation on the new website is the same data as that available on SLD. The only exceptions are a few acts that are being updated by the editorial team that is available on SLD but will not be available on the new site until the revisions are complete and they are ready to be published to SLD and the new website. Many of the revised documents held by SLD are also available in the OPSI dataset as an "as enacted" version. The new website combines these so one can switch between the different versions.
Aspects of the new site:
The majority of revised legislation, now held the 'as enacted' and 'revised' versions. The different versions can be accessed via the buttons in the 'What Version' area on the table of contents.
'Next' and 'Previous' buttons are now available when navigating the content of legislation (this has only been made possible because of the way the legislation is held on the new site).
'Change to Legislation' – Much work has been done in order to make the revised legislation as usable as possible although it is not fully up to date. The development of the new site has allowed us to take the 'Tables of Legislative Effects' information currently published on SLD and incorporate the 'unapplied effects' into the content of the legislation at the provision level. This means that instead of having to look through the 'Tables of Effects' year by year in order to establish the current position of a piece of legislation, one can access all the outstanding effects when viewing t |
https://en.wikipedia.org/wiki/Streetdirectory.com | Streetdirectory.com is an online web mapping service, founded by Singapore-headquartered Virtual Map in 2000. It originally used licensed data from Singapore Land Authority under a non-exclusive agreement until July 2004. On top of providing free maps for personal use, the website also offers a variety of ad-supported services. The website has since expanded to include maps in Malaysia and Indonesia.
In recent years, it has been involved in lawsuits against other businesses who appeared to have used Streetdirectory.com's maps without permission. Ironically, it lost a suit initiated by Singapore Land Authority for copyright infringement in early 2008 resulting in its maps taken offline for months. The website has since been taken over officially by JobsDB in August 2008, it was mentioned that JobsDB had negotiated its purchase since 2007.
The website underwent a severe downtime from April to August 2008 citing re-development of its maps from scratch. It came back online after announcing JobsDB's purchase. The speedy recovery of its status is now under the radar of Singapore Land Authority for yet another copyright infringement suit.
Services
The website is best known for offering an online version of the Singapore street directory, which is free for personal use. It is also accompanied with value-added tools such as driving directions, photos of locations, and a travel guide. Some of these services have been previously offered only on a pay-per-use basis, but an advertisement-supported alternative has since been made available.
Use of litigation
Since early 2004, Streetdirectory.com has gained prominence in several of its owner's successful legal action against schools and small and medium enterprises for what they see as unauthorised use of its maps. This is after Virtual Map has also won landmark cases against larger enterprises such as NTUC Income and Suncool International, with the former's damages waived and the latter's appeal being subsequently dismissed.
Its owner is known to have hired an IT firm to conduct investigations aggressively against the unlicensed use of their maps on other websites, and most of the defendants contacted by Virtual Map's legal team claim that they were not aware that doing so constitutes a copyright infringement. Nevertheless, they were liable for damages and lawyers subsequently warned of this fact in the local media.
The justification given by Virtual Map was that enough skill and effort was made in using SLA data to create maps that the company can claim its own independent copyright to, and suffered from a loss of potential profit when businesses reproduced their maps online without paying any licensing fees. Such use constituted, as Virtual Map claims, infringement of the Copyright Law and has angered existing clients who have legally paid to license their maps. This position was endorsed by the High Court of Singapore, which gave Virtual Map the green light to send cease and desist letters to hundreds |
https://en.wikipedia.org/wiki/Tecmar | Tecmar Inc. was an American manufacturer of personal computer enhancement products based in Solon, Ohio. The company was founded in 1974 by Martin Alpert, M.D., and Carolyn Alpert. The company's first products were computerized medical equipment; the company shortly after pivoted to data acquisition boards for the first generation of microcomputers. Popular products included the Scientific Solutions LabMaster series of boards for S-100 and Apple Computer.
Scientific Solutions
In 1981, at the COMDEX show, Tecmar introduced 20 expansion cards for the new IBM Personal Computer (IBM PC) announced three months earlier. Using experience in developing scientific and industrial products for Intel 8086 microcomputers, the company purchased two PCs on the first day and up to 50 employees worked on the peripherals; Tecmar's speed surprised even IBM. These products included the Scientific Solutions LabMaster, LabTender, IEEE-488, BaseBoard, TimeMaster, GraphicsMaster, memory expansion boards, external hard disk drives and tape drives. In 1985, Tecmar incorporated Scientific Solutions Inc. and used this new company to design and distribute the data acquisition products. Their early achievements are now well known and expressed by their corporate saying: Scientific Solutions First in PC Data Acquisition.
Scientific Solutions has been an independent company since 1995 and is still active .
Repositioning as a tape brand
In 1986, Tecmar was acquired by the technology holding company Rexon. Martin Alpert stayed on the board of directors briefly before founding Cumulus Corporation to market expansion cards for the IBM PS/2. While Scientific Solutions continued to design and market scientific and multimedia products, Tecmar concentrated on data storage. In 1991, Rexon purchased two other tape drive manufacturers, WangTek and WangDAT to add to the Tecmar product line. Then in 1995, while Rexon was having financial difficulties, Tecmar was sold to Legacy Storage Systems and Scientific Solutions continued as an independent company focused on the original Tecmar product line of data acquisition equipment.
Three years later, in 1998, Tecmar was sold to a new holding company, TTI Holdings of Longmont, Colorado, which positioned Tecmar as a comprehensive magnetic tape data storage brand. This was reinforced in 1999 when Iomega sold their Ditto brand to Tecmar. At this time, Tecmar offered DAT, QIC, Travan and Ditto magnetic tape technologies. In 2000, Overland Data saw this and acquired Tecmar in an effort to complement its line of higher end tape products.
As of 2007, Tecmar is a dormant corporation owned by Overland.
References
1974 disestablishments in Ohio
2007 disestablishments in Ohio
American companies established in 1974
American companies disestablished in 2007
Computer companies established in 1974
Computer companies disestablished in 2007
Computer storage companies
Defunct companies based in Ohio
Defunct computer companies of the United St |
https://en.wikipedia.org/wiki/Echo%20state%20network | An echo state network (ESN) is a type of reservoir computer that uses a recurrent neural network with a sparsely connected hidden layer (with typically 1% connectivity). The connectivity and weights of hidden neurons are fixed and randomly assigned. The weights of output neurons can be learned so that the network can produce or reproduce specific temporal patterns. The main interest of this network is that although its behaviour is non-linear, the only weights that are modified during training are for the synapses that connect the hidden neurons to output neurons. Thus, the error function is quadratic with respect to the parameter vector and can be differentiated easily to a linear system.
Alternatively, one may consider a nonparametric Bayesian formulation of the output layer, under which: (i) a prior distribution is imposed over the output weights; and (ii) the output weights are marginalized out in the context of prediction generation, given the training data. This idea has been demonstrated in by using Gaussian priors, whereby a Gaussian process model with ESN-driven kernel function is obtained. Such a solution was shown to outperform ESNs with trainable (finite) sets of weights in several benchmarks.
Some publicly available implementations of ESNs are: (i) aureservoir: an efficient C++ library for various kinds of echo state networks with python/numpy bindings; (ii) Matlab code: an efficient matlab for an echo state network; (iii) ReservoirComputing.jl: an efficient Julia-based implementation of various types of echo state networks; and (iv) pyESN: simple echo state networks in Python.
Background
The Echo State Network (ESN) belongs to the Recurrent Neural Network (RNN) family and provide their architecture and supervised learning principle. Unlike Feedforward Neural Networks, Recurrent Neural Networks are dynamic systems and not functions. Recurrent Neural Networks are typically used for: Learn dynamical process: signal treatment in engineering and telecommunications, vibration analysis, seismology, control of engines and generators. Signal forecasting and generation: text, music, electric signals, chaotic signals. Modeling of biological systems, neurosciences (cognitive neurodynamics), memory modeling, brain-computer Interfaces (BCIs), filtering and Kalman processes, military applications, volatility modeling etc.
For the training of RNN a number of learning algorithms are available: backpropagation through time, real-time recurrent learning. Convergence is not guaranteed due to instability and bifurcation phenomena.
The main approach of the ESN is firstly to operate a random, large, fixed, recurring neural network with the input signal, which induces a nonlinear response signal in each neuron within this "reservoir" network, and secondly connect a desired output signal by a trainable linear combination of all these response signals.
Another feature of the ESN is the autonomous operation in prediction: if the Echo State Network i |
https://en.wikipedia.org/wiki/Agur | Agur ben Jakeh () was a sage of Arab descent and a compiler of a collection of proverbs found in Proverbs 30, which is sometimes known as the Book of Agur or Sayings of Agur.
Biblical accounts
The initial text of the chapter runs as follows (JPS translation), and bears great similarity to . This translation is not universally accepted as correct; see below.
The text (verse 1) seems to say that he was a "Massaite," the gentilic termination not being indicated in the traditional writing "Ha-Massa." This place has been identified by some Assyriologists with the land of Mash, a district between Judea and Babylonia, and the traces of nomadic or semi-nomadic life and thought found in and give some support to the hypothesis. Heinrich Graetz, followed by Bickell and Cheyne, conjectures that the original reading is ("Ha-Moshel" = "the collector of proverbs"). Even still, the root word maššā denotes something that is carried, and it is used several times in the prophetic books of the Hebrew Bible (, , , etc.) to describe the words or predictions of prophets. Though Agur is not explicitly called a prophet, this may indicate that maššā is being used to give his words an oracular quality.
In rabbinical literature
"Agur", and the enigmatical names and words which follow in Proverbs 30:1, are interpreted by the Aggadah as epithets of Solomon, playing upon the words as follows: "Agur" denotes "the compiler; the one who first gathered maxims together". "The son of Jakeh" denotes "the one who spat out" or "despised" (from קוא, "to spit"), le-Ithiel, "the words of God" (ot, "word"; El, "God"), exclaiming, "I can [ukal] transgress the law against marrying many wives without fear of being misled by them."
Another interpretation is that "Agur" means "the one who is brave in the pursuit of wisdom"; "the son of Jakeh" signifies "he who is free from sin" (from naki, "pure"); ha-massa ("the burden"), "he who bore the yoke of God"; le-Ithiel, "he who understood the signs" (ot, "sign") and deeds of God, or he who understood the alphabet of God, that is the creative "letters" (ot, "letter"); we-Ukal, "the master".
Alternate explanations of first verse
Scholars, including Perdue, have considered other meanings for "le-ithiel" and "ukhal". Observing that "it is highly unlikely that the two Hebrew terms refer to personal names" (note that the names Agur and Jakeh are not seen anywhere else in the Bible or any other Israelite document), Perdue points out that some better translations for le-ithiel would be "I am weary, O God"; or: "I am not God". "Ve-ukhal" would complement it: "How can I prevail/I am exhausted?". The highly non-standard Hebrew and the lack of parallel language elsewhere makes it difficult to settle on a particular shade of meaning.
Some have speculated that Agur is a "foreign sage from the East" (Perdue, op cit), who is quoted here only to be later rebuked.
Another explanation may be: This is the name of the author of the wise sayings provided in P |
https://en.wikipedia.org/wiki/Full%20Pipe | Full Pipe (Total Flush) (, Polnaya Truba) is a computer game developed by Russian Pipe Studio. It features script and animation by celebrated Russian cartoonist, Ivan Maximov.
Release history
Full Pipe (Total Flush) was released in November 2003 for Russia, CIS, and Baltic states as part of the 1С: Game collection series (), and it received its first international release the following month in Lithuania under the title Pilnas Vamzdis. After being discovered by Tom Hall and John Romero at the Russian Game Developer's Conference (KRI-2004), distribution rights were discussed, and a localized version of the game was released (via download only) over Steam in 2006. According to staff from the 1C display at KRI-2004, the game created such a favorable impression upon Mr. Hall and Mr. Romero that the pair had to be removed from the demonstration by force. The game was released in Germany, Austria, and Switzerland by distributor, Daedalic Entertainment, in July 2010. In September 2015, the game was released on Apple's App Store and the Google Play Store.
Gameplay
The game revolves around navigating a main character named Dude from the third-person perspective about a secret landscape under his bed in search of a lost slipper. The game is in 2D and consists of a number of puzzles centered on using items collected and interacting with the 45 other NPCs. There is no dialogue in the game and the difficulty often derives from trying to determine why a character behaves in the way it does. Solutions to the puzzles are often illogical, in keeping with the atmosphere of the game which has been described as psychedelic.
Reception
Critical reception of Full Pipe has been mixed.
Adventure Gamers' Jack Allin scored the Steam version of the game 2 out of 5 stars, describing the gameplay as "tedious and frustrating," its plot as "completely lack[ing]," and its puzzles as "poor quality."
Game score aggregator, Metacritic, lists positive scores from organizations including GamingXP which gave the game an 83 out of 100
References
External links
Official website of full pipe
Ivan Maximov's site
Full Pipe Demo
2003 video games
1C Company games
Adventure games
Daedalic Entertainment games
ScummVM-supported games
Video games developed in Russia
Windows games
Windows-only games
Single-player video games |
https://en.wikipedia.org/wiki/Taipan%21 | Taipan! is a 1979 turn-based strategy computer game written for the TRS-80 and ported to the Apple II in 1982. It was created by Art Canfil and the company Mega Micro Computers, and published by Avalanche Productions.
The game Taipan! was inspired by the novel Tai-Pan by James Clavell. The player is in the role of a trader in the Far East. The goal of the game is for the player to accumulate wealth through trade and possibly also through booty won in battles against pirates. As soon as the player's net worth reaches one million pounds, the player has the option to retire.
A companion book about the game was co-authored by Canfil and illustrated by Chrisann Brennan.
Gameplay
The player begins the game with a ship. At the beginning, they have the option to either start without any cash but five guns, or with some cash and a debt.
The basic strategy of the game is to buy goods (opium, silk, arms, and general cargo) at a low price and sell them at a higher price. Silk, arms, and general cargo have no special features; opium is special in that it can be confiscated at random points by the local authorities, resulting in a fine for the player. This makes dealing in opium riskier than dealing in the other goods; however, it is also generally the most profitable item for trade.
At various times when arriving at a port, a message will pop up indicating a special price has occurred for one of the commodities. In this case, either the commodity's price falls or rises significantly.
The player may trade at any of seven historically named ports: Hong Kong, Shanghai, Nagasaki, Saigon, Manila, Singapore, and Batavia.
The port at Hong Kong is the player's home port. Here, the player has access to ship repair, a money lender, a warehouse, and a bank. Often in Hong Kong, the local extortionist Li Yuen asks if the player would like to "donate" money to the Sea Goddess. If the player refuses to donate, Li Yuen eventually sends a fleet of hostile ships after the player (which are much more difficult to fight than ordinary pirates). On the other hand, if one chooses to pay Li Yuen, he will occasionally drive off hostile ships for you. The money he asks depends on the amount of cash the player carries. It is not advisable to carry too much excessive cash; the donations asked from Li Yuen, the fines for dealing with opium and the amount stolen from oneself after occasionally getting "beaten up and robbed" always depend on how much you have.
Money may be transferred into your bank account for some interest. The player also has the option of borrowing money from Elder Brother Wu, the moneylender, although this amount is limited to twice the amount the player already has on hand (if the player has zero, they cannot borrow anything).
Goods may be stored in the warehouse in Hong Kong, while waiting for prices to rise. However, purchases left in the warehouse may be stolen if left too long. Rates of theft are higher with higher-end commodities such as opium or silk |
https://en.wikipedia.org/wiki/List%20of%20turkey%20breeds | Turkey breeds are reported to the DAD-IS breed database of the Food and Agriculture Organization of the United Nations by more than sixty countries. The breeds reported include commercial/industrial strains, local types and recognised breeds in many countries.
United States
Twenty breeds are reported to DAD-IS by the United States. Eight of them are recognised by the American Poultry Association in its breed standard, the American Standard of Perfection, where however they are classified as "varieties" rather than as breeds. This may be because the original genotype for domestic turkeys was for Bronze, and all other color varieties are due to mutations from it.
APA varieties
Europe
Twelve breeds are recognized by the Entente Européenne d'Aviculture et de Cuniculture. Others with breed standards of European national associations are accepted.
EE breeds
Other varieties not recognized by the APA or EE include the following:
Auburn or Light Brown is an extremely rare as its numbers are not considered high enough for inclusion in the Standard. An extremely rare variant of the Auburn is called the Silver Auburn.
Buff (or Jersey Buff) is a very rare heritage breed.
Chocolate breed is chocolate brown in color. Day-old poults are white-faced with chocolate bodies.
Midget White is a rare heritage breed sometimes confused with the Beltsville Small White.
Zagorje (Zagorski puran) is a Croatian variant of turkey.
See also
Turkey genus
Wild turkey of North America
Domestic turkey
Ocellated turkey, a species of turkey residing primarily in the Yucatán Peninsula in Mexico.
References
Lists of birds
List of
Lists of breeds |
https://en.wikipedia.org/wiki/GeoNetwork%20opensource | The GeoNetwork opensource (GNOS)
project is a free and open source (FOSS) cataloging application for spatially referenced resources. It is a catalog of location-oriented information.
Outline
It is a standardized and decentralized spatial information management environment designed to enable access to geo-referenced databases, cartographic products and related metadata from a variety of sources, enhancing the spatial information exchange and sharing between organizations and their audience, using the capacities of the internet. Using the Z39.50 protocol it both accesses remote catalogs and makes its data available to other catalog services. , OGC Web Catalog Service are being implemented.
Maps, including those derived from satellite imagery, are effective communicational tools and play an important role in the work of decision makers (e.g., sustainable development planners and humanitarian and emergency managers) in need of quick, reliable and up-to-date user-friendly cartographic products as a basis for action and to better plan and monitor their activities; GIS experts in need of exchanging consistent and updated geographical data; and spatial analysts in need of multidisciplinary data to perform preliminary geographical analysis and make reliable forecasts.
Deployment
The software has been deployed to various organizations, the first being FAO GeoNetwork and WFP VAM-SIE-GeoNetwork, both at their headquarters in Rome, Italy. Furthermore, the WHO, CGIAR, BRGM, ESA, FGDC and the Global Change Information and Research Centre (GCIRC) of China are working on GeoNetwork opensource implementations as their spatial information management capacity.
It is used for several risk information systems, in particular in the Gambia.
Several related tools are packaged with GeoNetwork, including GeoServer. GeoServer stores geographical data, while GeoNetwork catalogs collections of such data.
See also
Comparison of GIS software
List of GIS software
List of open source software packages
Open Source Geospatial Foundation
References
External links
Sourceforge project
GitHub repository
Free GIS software
Free software programmed in Java (programming language)
Web applications |
https://en.wikipedia.org/wiki/BI-RADS | BI-RADS is an acronym for Breast Imaging-Reporting and Data System, a quality assurance tool originally designed for use with mammography. The system is a collaborative effort of many health groups but is published and trademarked by the American College of Radiology (ACR).
The system is designed to standardize reporting and is used by medical professionals to communicate a patient's risk of developing breast cancer, particularly for patients with dense breast tissue. The document focuses on patient reports used by medical professionals, not "lay reports" that are provided to patients.
Published documents
The BI-RADS is published by ACR in the form of the BI-RADS Atlas. the Atlas is divided into three publications:
Mammography, Fifth Edition
Ultrasound, Second Edition
MRI, Second Edition
Assessment categories
While BI-RADS is a quality control system, in day-to-day usage the term BI-RADS refers to the mammography assessment categories. These are standardized numerical codes typically assigned by a radiologist after interpreting a mammogram. This allows for concise and unambiguous understanding of patient records between multiple doctors and medical facilities.
The assessment categories were initially developed for mammography and later adapted for use with MRI and ultrasound findings. The summary of each category, given below, is nearly identical for all three modalities.
Category 6 was added in the 4th edition of the BI-RADS.
BI-RADS assessment categories are:
0: Incomplete
1: Negative
2: Benign
3: Probably benign
4: Suspicious
5: Highly suggestive of malignancy
6: Known biopsy – proven malignancy
An incomplete (BI-RADS 0) classification warrants either an effort to ascertain prior imaging for comparison, or to call the patient back for additional views and/or higher quality films. A BI-RADS classification of 4 or 5 warrants biopsy to further evaluate the offending lesion. Some experts believe that the single BI-RADS 4 classification does not adequately communicate the risk of cancer to doctors and recommend a subclassification scheme:
4A: low suspicion of malignancy, about > 2% to ≤ 10% likelihood of malignancy
4B: intermediate suspicion of malignancy, about > 10% to ≤ 50% likelihood of malignancy
4C: moderate concern, but not classic for malignancy, about > 50% to < 95% likelihood of malignancy
Breast composition categories
As of the BI-RADS 5th edition:
a. The breasts are almost entirely fatty
b. There are scattered areas of fibroglandular density
c. The breasts are heterogeneously dense, which may obscure small masses
d. The breasts are extremely dense, which lowers the sensitivity of mammography
Automated extraction
Automatic parsers have been developed to automatically extract BI-RADS features, categories and breast composition from textual mammography reports.
There is also an automatic parser available for BI-RADS final category inference by parsing only the semi-formatted finding section of the textual mammography repo |
https://en.wikipedia.org/wiki/Ni1000 | The Ni1000 is an artificial neural network chip developed by Nestor Corporation and Intel. It is Intel's second-generation neural network chip but first all digital. The chip is aimed at image analysis applications, contains more than 3 million transistors and can analyze patterns at the rate of 40,000 per second. Prototypes running with Nestor's OCR software in 1994 were capable of recognizing around 100 handwritten characters per second.
The development was funded with money from DARPA and Office of Naval Research.
References
Intel/Nestor Ni1000 Recognition Accelerator Technical Specification
Artificial neural networks |
https://en.wikipedia.org/wiki/EcoCyc | In bioinformatics EcoCyc is a biological database for the bacterium Escherichia coli K-12. The EcoCyc project performs literature-based curation of the E. coli genome, and of E. coli transcriptional regulation, transporters, and metabolic pathways. EcoCyc contains written summaries of E. coli genes, distilled from over 36,000 scientific articles. EcoCyc is also a description of the genome and cellular networks of E. coli that supports scientists to carry out computational analyses.
Data objects in the EcoCyc database describe each E. coli gene and gene product. Database objects also describe molecular interactions, including metabolic pathways, transport events, and the regulation of gene expression. EcoCyc provides several genome-scale visualization tools to aid in the analysis of omics data, such as by painting gene expression or metabolomics data onto the full regulatory network of E. coli.
EcoCyc can be accessed through the EcoCyc web site, as a set of downloadable files, and in conjunction with the Pathway Tools software that can be installed locally on Macintosh, PC/Windows, and PC/Linux computers. The downloadable software provides capabilities that go well beyond the web version of EcoCyc.
References
Biological databases
Escherichia coli |
https://en.wikipedia.org/wiki/CSI%3A%20Hard%20Evidence | CSI: Hard Evidence is a computer and Xbox 360 game based on the CSI: Crime Scene Investigation television series. This is the fifth CSI game released, including CSI: Miami.
As with the previous CSI games, there are five cases to work on. However, the game includes improvements on CSI: 3 Dimensions of Murder, like a 3D crime scene kit. The voice of Sara Sidle is again performed by a soundalike (Kate Savage) and not Jorja Fox. In this game, Catherine Willows is also replaced by a soundalike is also replaced by a soundalike in this game, with Edie Mirman standing in for Marg Helgenberger.
This is Telltale's first console game, released in line with the PC version. It is Telltale's first Xbox 360 and Wii game. A Mac OS X version was later released by TransGaming, using their Cider technology.
The Cases
Case 1: Burning For You
In the first case, a taxi driver, Bob Castor, was killed in an apparent arson attack inside his car. The player works with Nick Stokes in this case.
During the investigation, the victim was found to be a racist with a criminal record. The details narrow down the suspects to Ed Danville, a homeless man from Arizona, Liz Sunderland, an aspiring artist whom Ed had a one-night stand with. And Debra Finch, Liz's lesbian lover and the victim's old high school prom date, who he had harassed for two weeks. It is revealed that Ed killed Bob because of his racist attitude towards the women, which Ed would not tolerate.
Case 2: Double Down
Waitress Connie Roth is repeatedly stabbed in her house and survives but doesn't know who hurt her. The player works with Catherine Willows in this case. Connie's boyfriend Shane, also the owner of the casino where Connie worked, is initially suspected after the woman is found to have entered into a contract with an aging African-American tycoon to be the surrogate mother for his son. However, after discovering that the husband was oblivious to the arrangement, the only suspects are the tycoon and his trophy wife. The wife attacked Connie because she was also pregnant, but she was carrying a girl, and her husband wanted a boy, causing her to fear Connie would steal him away. This case can also be played as the sixth case of the PlayStation 2 version of 3 Dimensions of Murder.
Case 3: Shock Rock
The bodies of four members of a rock band called Bullet Train are found electrocuted. The player works with Warrick Brown in this case.
The band members each have a record, except for the young singer. The suspects are the band's roadie/sound-tech, who was picked on by the band; his current lover, who is the band's second choice for a singer, the band's hateful manager, and Bullet Train's ex-singer, who was also the ex-wife of the lead guitar player. The evidence eventually reveals the roadie's lover seduced him into killing the band so she could take over as the lead singer.
Case 4: In Your Eyes
An eye surgeon originally from India was brutally killed in his own home. The only witness is his blind wif |
https://en.wikipedia.org/wiki/MetaCyc | The MetaCyc database is one of the largest metabolic pathways and enzymes databases currently available. The data in the database is manually curated from the scientific literature, and covers all domains of life. MetaCyc has extensive information about chemical compounds, reactions, metabolic pathways and enzymes. The data have been curated from more than 58,000 publications.
MetaCyc has been designed for multiple types of uses. It is often used as an extensive online encyclopedia of metabolism. In addition,
MetaCyc is used as a reference data set for computationally predicting the metabolic network of organisms from their sequenced genomes; it has been used to perform pathway predictions for thousands of organisms, including those in the BioCyc Database Collection. MetaCyc is also used in metabolic engineering and metabolomics research.
MetaCyc includes mini reviews for pathways and enzymes that provide background information as well as relevant literature references. It also provides extensive data on individual enzymes, describing their subunit structure, cofactors, activators and inhibitors, substrate specificity, and, when available, kinetic constants. MetaCyc data on metabolites includes chemical structures, predicted Standard energy of formation, and links to external databases. Reactions in MetaCyc are presented in a visual display that includes the structures of all components. The reactions are balanced and include EC numbers, reaction direction, predicted atom mappings that describe the correspondence between atoms in the reactant compounds and the product compounds, and computed Gibbs free energy.
All objects in MetaCyc are clickable and provide easy access to related objects. For example, the page for L-lysine lists all of the reactions in which L-lysine participates, as well as the enzymes that catalyze them and pathways in which these reactions take place.
References
Chemical databases
Enzyme databases
Metabolism |
https://en.wikipedia.org/wiki/Resolvconf | In some FreeBSD, Linux distributions, and other Unix-like operating systems, the resolvconf program maintains the system information about the currently available name servers and manages the contents of the configuration file resolv.conf, which determines Domain Name System (DNS) resolver parameters.
Before a computer can connect to an external network resource by name, it must convert that alpha-numeric name (e.g., wikipedia.org) into its corresponding network address called an IP address (e.g., 66.230.200.10). The computer performs this conversion by contacting one of a number of special computers called name servers, which have tables of resource names and corresponding IP addresses. The information about the servers is kept in the configuration file resolv.conf. However, when multiple programs need to dynamically modify the resolv.conf file, they can interfere with each other and store incorrect information in the file.
The resolvconf program addresses this problem. It acts as an intermediary between programs that supply name server information (e.g., DHCP clients) and programs that use name server information (e.g., resolvers). When resolvconf is properly installed, the resolv.conf file is replaced by a symbolic link to and the resolver instead uses the dynamically generated linked file. In a system without resolvconf, the file is normally maintained manually or by a collection of scripts. The scripts may cause problems, because there is no program to control access to the file. Resolvconf controls access to the file, allowing many programs to use it at the same time.
resolvconf cannot easily be disabled on some systems. On FreeBSD it can be disabled by placing in .
In securely administered environments the resolvconf program (or daemon, depending on the implementation) causes uneasiness since it interferes with the containment of security vulnerabilities, making changes to it without authorization. (Centralized change management, or centralized compliance, requires that system changes cannot be made from the sidelines.)
References
External links
resolvconf – Original implementation.
openresolv – Compatible implementation.
192-168-i-i.com
Domain Name System
Configuration files |
https://en.wikipedia.org/wiki/BioCyc%20database%20collection | The BioCyc database collection is an assortment of organism specific Pathway/Genome Databases (PGDBs) that provide reference to genome and metabolic pathway information for thousands of organisms. As of July 2023, there were over 20,040 databases within BioCyc. SRI International, based in Menlo Park, California, maintains the BioCyc database family.
Categories of Databases
Based on the manual curation done, BioCyc database family is divided into 3 tiers:
Tier 1: Databases which have received at least one year of literature based manual curation. Currently there are seven databases in Tier 1. Out of the seven, MetaCyc is a major database that contains almost 2500 metabolic pathways from many organisms. The other important Tier 1 database is HumanCyc which contains around 300 metabolic pathways found in humans. The remaining five databases include, EcoCyc (E. coli), AraCyc (Arabidopsis thaliana), YeastCyc (Saccharomyces cerevisiae), LeishCyc (Leishmania major Friedlin) and TrypanoCyc (Trypanosoma brucei).
Tier 2: Databases that were computationally predicted but have received moderate manual curation (most with 1–4 months curation). Tier 2 Databases are available for manual curation by scientists who are interested in any particular organism. Tier 2 databases currently contain 43 different organism databases.
Tier 3: Databases that were computationally predicted by PathoLogic and received no manual curation. As with Tier 2, Tier 3 databases are also available for curation for interested scientists.
Software tools
The BioCyc website contains a variety of software tools for searching, visualizing, comparing, and analyzing genome and pathway information. It includes a genome browser, and browsers for metabolic and regulatory networks. The website also includes tools for painting large-scale ("omics") datasets onto metabolic and regulatory networks, and onto the genome.
Use in Research
Since BioCyc Database family comprises a long list of organism specific databases and also data at different systems level in a living system, the usage in research has been in a wide variety of context. Here, two studies are highlighted which show two different varieties of uses, one on a genome scale and other on identifying specific SNPs (Single Nucleotide Polymorphisms) within a genome.
AlgaGEM
AlgaGEM is a genome scale metabolic network model for a compartmentalized algae cell developed by Gomes de Oliveira Dal’Molin et al. based on the Chlamydomonas reinhardtii genome. It has 866 unique ORFs, 1862 metabolites, 2499 gene-enzyme-reaction-association entries, and 1725 unique reactions. One of the Pathway databases used for reconstruction is MetaCyc.
SNPs
The study by Shimul Chowdhury et al. showed association differed between maternal SNPs and metabolites involved in homocysteine, folate, and transsulfuration pathways in cases with Congenital Heart Defects (CHDs) as opposed to controls. The study used HumanCyc to select candidate genes and SNPs.
Refe |
https://en.wikipedia.org/wiki/Robin%20of%20the%20Wood | Robin of the Wood is a maze game published in 1985 for a few 8-bit computer formats by Odin Computer Graphics in the UK and Serma Software in Spain. It was based on the English legend of Robin Hood.
Reception
Crash (magazine) awarded the game 94%, giving it a Crash Smash, with the reviewer positively saying "This game is one of the most addictive I’ve played and I would recommend it to anyone."
References
External links
1985 video games
Commodore 64 games
Maze games
Robin Hood video games
Video games developed in the United Kingdom
Video games scored by Fred Gray
ZX Spectrum games |
https://en.wikipedia.org/wiki/John%20Alan%20Robinson | John Alan Robinson (9 March 1930 – 5 August 2016) was a philosopher, mathematician, and computer scientist. He was a professor emeritus at Syracuse University.
Alan Robinson's major contribution is to the foundations of automated theorem proving. His unification algorithm eliminated one source of combinatorial explosion in resolution provers; it also prepared the ground for the logic programming paradigm, in particular for the Prolog language.
Robinson received the 1996 Herbrand Award for Distinguished Contributions to Automated Reasoning.
Life
Robinson was born in Halifax, Yorkshire, England in 1930 and left for the United States in 1952 with a classics degree from Cambridge University. He studied philosophy at the University of Oregon before moving to Princeton University where he received his PhD in philosophy in 1956. He then worked at DuPont as an operations research analyst, where he learned computer programming and taught himself mathematics. He moved to Rice University in 1961, spending his summers as a visiting researcher at the Argonne National Laboratory's Applied Mathematics Division. He moved to Syracuse University as Distinguished Professor of Logic and Computer Science in 1967 and became professor emeritus in 1993.
It was at Argonne that Robinson became interested in automated theorem proving and developed unification and the resolution principle. Resolution and unification have since been incorporated in many automated theorem-proving systems and are the basis for the inference mechanisms used in logic programming and the programming language Prolog.
Robinson was the Founding Editor of the Journal of Logic Programming, and has received numerous honours. These include a Guggenheim Fellowship in 1967, the American Mathematical Society Milestone Award in Automatic Theorem Proving 1985, an AAAI Fellowship 1990, the Herbrand Award for Distinguished Contributions to Automatic Reasoning 1996, and the Association for Logic Programming honorary title Founder of Logic Programming in 1997. He has received honorary Doctorates from Katholieke Universiteit Leuven 1988, Uppsala University 1994, and Universidad Politecnica de Madrid 2003. Robinson died in Portland, Maine on 5 August 2016 from a ruptured aneurysm following surgery for pancreatic cancer.
In 1994, he received the Humboldt Senior Scientist Award at the request of Wolfgang Bibel, which included a six-month stay at the Department of Computer Science of the Technische Universität Darmstadt.
Selected publications
Gabbay, Dov M.; Hogger, Christopher John; Robinson, J.A., eds. (1993-1998). Handbook of Logic in Artificial Intelligence and Logic Programming. Vols. 1-5, Oxford University Press.
See also
— an alternative to the Quine–McCluskey algorithm for Boolean function minimization
Notes
External links
Books listed by The MIT Press
1930 births
2016 deaths
British computer scientists
American computer scientists
20th-century British mathematicians
21st-century British |
https://en.wikipedia.org/wiki/Quoi%20de%20Neuf | Quoi de Neuf ("What's New") is a Canadian 24-hour news and information radio station, which airs on XM Satellite Radio channel 125. The station is primarily a loop of news programming, much of which was originally sourced from Corus Quebec's terrestrial news stations. Quoi de Neuf focused much more on entertainment and lifestyle news than its English counterpart, Canada 360.
However, due to budget issues, XM Radio Canada decided to release the staff at Quoi de Neuf. In addition, the format was changed to news radio and is outsourced to the French-language broadcast arm of The Canadian Press, with a culture segment done in-house.
On November 12, 2008, Quoi de Neuf was moved from channel 245 to channel 125.
References
External links
Quoi de Neuf
XM Canada Quoi de Neuf
XM Satellite Radio channels
Satellite radio stations in Canada
News and talk radio stations in Canada
French-language radio stations in Canada
Radio stations established in 2005
Defunct radio stations in Canada |
https://en.wikipedia.org/wiki/Count%20key%20data | Count key data (CKD) is a direct-access storage device (DASD) data recording format introduced in 1964, by IBM with its IBM System/360 and still being emulated on IBM mainframes. It is a self-defining format with each data record represented by a Count Area that identifies the record and provides the number of bytes in an optional Key Area and an optional Data Area. This is in contrast to devices using fixed sector size or a separate format track.
Count key data (CKD) also refers to the set of channel commands (collectively Channel Command Words, CCWs) that are generated by an IBM mainframe for execution by a DASD subsystem employing the CKD recording format. The initial set of CKD CCWs, introduced in 1964, was substantially enhanced and improved into the 1990s.
CKD Track Format
"The beginning of a track is signalled when the index marker (index point) is detected.… The marker is automatically recognized by a special sensing device." Following the index marker is the home address, which indicates the location of this track on the disk, and contains other control information internal to the control unit. A fixed-length gap follows the home address. Next, each track contains a Record 0 (R0), the track descriptor record, which is "designed to enable the entire content of a track to be moved to alternate tracks if a portion of the primary track becomes defective." Following R0 are the data blocks, separated by gaps.
The principle of CKD records is that since data block lengths can vary, each block has an associated count field which identifies the block and indicates the size of the key, if used (user-defined up to 255 bytes), and the size of the data area, if used. The count field has the identification of the record in cylinder-head-record format, the length of the key, and the length of the data. The key may be omitted or consist of a string of characters.
Each CKD record consists of a count field, an optional key field, and an optional "user" data field with error correction/detection information appended to each field and gaps separating each field. Because of the gaps and other information, the recorded space is larger than that required for just the count data, key data, or user data. IBM provides a "reference card" for each device, which can be used to compute the number of blocks per track for various block sizes, and to optimize the block size for the device. Later, programs were written to do these calculations. Because blocks are normally not split between tracks, specification of an incorrect block size can waste up to half of each track.
Most often, the key is omitted and the record is located sequentially or by direct cylinder-head-record addressing. If it is present, the key is typically a copy of the first bytes of the data record (for "unblocked" records, or a copy of the highest key in the block, for "blocked" records), but can be any data which will be used to find the record, usually using the Search Key Equal or Search K |
https://en.wikipedia.org/wiki/Fame%20Story | Fame Story is a Greek reality TV show that was a licensed version of Endemol's Star Academy originally broadcast on the ANT1 network. It has been one of the most successful Greek television shows and is credited for having helped foster the careers of some of the show's contestants, which have gone on to produce chart topping hits in the Greek market.
The contestants gave a weekly performance in a 2½–3 hour episode in which the contestants were judged and where one contestant was voted off after a week-long televote. On the other 6 days of the week, the best footage of the day was compiled in a late night episode from inside the academy's studios and from the adjacent house where the contestants lived for their entire stay on the show inclusively. The show's seasons ran for 3½ months, except for season three which ran for 6½ months.
The show is one of few Star Academy franchises, along with the UK's Fame Academy, to feature the iconic song "Fame" originally performed by Irene Cara in the 1980 film of the same name. However ANT1 later commissioned popular songwriter Phoebus to write the original song titled "You can be a star", and the famous Cara song was used in TV spots and montages instead.
ANT1 premiered The X Factor in its Fall 2008 lineup, thus switching to competitor FremantleMedia's The X Factor franchise.
Ιn March 17, 2017, a spin-off show titled Star Academy premiered on E Channel. The judges were Anna Vissi, Nikos Mouratides, Petros Kostopoulos and Natalia Germanou, and the host was Menios Fourthiotis. This was the least commercially successful season and a critical failure, receiving negative reviews and an audience share of just 1%.
TV presenter and producer Nikos Koklonis announced that the show would come back in September 2023 on Star and CyBC. The winner of the fifth season will earn a €50,000 prize, will be signed to the label Panik Records, and was originally intended to be chosen to represent at the 68th edition of the Eurovision Song Contest. Placed under review after Greek national broadcaster ERT raised objections to Star having the right to air the event in Greece, the EBU reportedly expanded the official rules regarding the organization and production of national selections, effectively barring the use of the format as a national final. This was ultimately confirmed by Star. The show was then moved from CyBC to Omega TV, as for other Star programs broadcast in Cyprus. It began airing on 30 September 2023. The four new judges are Antonis Remos, Eleni Foureira, Giorgos Arsenakos and Light.
Series overview
As Fame Story
As Star Academy
Cast
Hosts
Color key:
– Hosts
– Hosts (Replacement)
Judges
Color key:
– Judges
– Judges (Replacement)
Contestants
Series 1
Since Live Concert 7
Since Live Concert 8
Series 2
Since Live Concert 6
Since Live Concert 7
Series 3
Since Live Concert 6
Since Live Concert 13
Since Live Concert 17
Series 4
Series 5
16 contestants were selected for the fifth season |
https://en.wikipedia.org/wiki/Intel%20Cascade%20Cipher | In cryptography, the Intel Cascaded Cipher is a high bandwidth block cipher, used as an optional component of the Output Content Protection DRM scheme of the Microsoft Windows Vista operating system. The cipher is based on Advanced Encryption Standard (AES) operating in counter mode, used for generating keys, and a 3-round version of Serpent for encrypting actual content.
The Cascaded Cipher has not been subject to an open peer review process. A license for using the Cascaded Cipher is required from Intel Corporation.
Description
The Cascaded Cipher specifications are not currently available on the Intel web site or in academic journals. A description of the structure of the cipher appears in a US patent application. In this case, the patent application only describes the inventive steps as claimed by its inventors, and is not a specification of the cipher as it is intended to be used to protect content in Windows Vista.
There are two embodiments of the cipher described in the US patent application.
CTR-ECB mode
In the counter-electronic codebook mode, the Cascaded Cipher uses full strength AES-128 in counter mode to generate a secure key stream and supplies this key-stream to a reduced round Serpent in electronic codebook mode to encrypt each plaintext block. To increase performance, each inner key stream block is reused several times to encrypt multiple blocks.
CTR-CTR mode
In the counter-counter mode, the Cascaded Cipher uses full-strength AES-128 in counter mode to generate a secure key stream and supplies this key-stream to a reduced round Serpent also operating in counter mode to encrypt each plaintext block. To increase performance, each inner key stream block is reused several times to encrypt multiple blocks.
Security
In the Microsoft document "Output Content Protection and Windows Vista", it is claimed that: "The security level achieved for typical video data is estimated to be approaching that of regular AES. This assertion is being tested by Intel putting its Cascaded Cipher out to the cryptography community to get their security assessment — that is, to see if they can break it."
The security of the system requires that it is impossible to recover the currently active inner key from the output of the reduced round Serpent encrypted video stream. Furthermore, the security of this method is highly sensitive to the number of rounds used in Serpent, the mode of operation described in the patent application, and the number of times the inner key is reused.
References
Advanced Encryption Standard |
https://en.wikipedia.org/wiki/HTC%20Excalibur | The HTC Excalibur (HTC S620) is a smartphone model manufactured by High Tech Computer beginning in 2006. It is rebranded and sold as the O2 Xda Cosmo, the T-Mobile Dash, the HTC S621 for Rogers Wireless in Canada, the HTC S621 for Suncom Wireless in the lower-eastern United States, the BT ToGo (as part of the BT Total Broadband Anywhere package), and the Dopod C720W. The model has been discontinued.
Features
The device runs the Windows Mobile 5 and 6 Smartphone Edition operating systems (AKU 3.0). It uses a 200 MHz Texas Instruments OMAP850 (ARM architecture) processor, with 64 MB of RAM and 128 MB of flash ROM. A microSD slot is also available for additional expansion capability.
It includes a quad band (850 MHz, 900 MHz, 1800 MHz, 1900 MHz) GSM radio with EDGE, 802.11g WiFi support, and Bluetooth communications. The device syncs with ActiveSync or Windows Mobile Device Center (Windows Vista and Windows 7) over Bluetooth or USB. It also has GPRS/EDGE and Wi-Fi connections.
Its successor, the HTC S630 (codenamed Cavalier) was released August 2007.
T-Mobile initially shipped Windows Mobile 5 on all Dash devices, but began offering existing Dash owners the ability to update to Windows Mobile 6 on May 4, 2007.
Version of Windows Mobile 6.1 such as Kavanna's and Ricky's are available but not supported by T-Mobile. It also supports Windows Mobile 6.5.
This phone has also been ported to android by xda-developers.http://forum.xda-developers.com/showthread.php?t=560495
Bluetooth
The phone supports Bluetooth 2.0 without EDR and could support these profiles:
A2DP-Source
AVCTP
AVDTP
AVRCP-Target
BNEP
FT-Client
FT-Server
GAP
GAVDP
Generic Object Exchange
HandsFree-AG (1.0)
Headset-AG
HID-Host
OPP-Client
OPP-Server
PAN-AP
SAP-Server
SDAP
Serial-DevA
Serial-DevB
New firmware versions disable nearly a half of these profiles, including FTP according to the pre-commercial review.
See also
Samsung Blackjack, a competing smartphone with similar specifications.
Motorola Q, a competing smartphone with similar specifications.
References
External links
Official HTC S620 product description at HTC manufacturer website
Mobile phones introduced in 2006
Windows Mobile Standard devices
Excalibur
Mobile phones with an integrated hardware keyboard |
https://en.wikipedia.org/wiki/Frequency%20scaling | In computer architecture, frequency scaling (also known as frequency ramping) is the technique of increasing a processor's frequency so as to enhance the performance of the system containing the processor in question. Frequency ramping was the dominant force in commodity processor performance increases from the mid-1980s until roughly the end of 2004.
The effect of processor frequency on computer speed can be seen by looking at the equation for computer program runtime:
where instructions per program is the total instructions being executed in a given program, cycles per instruction is a program-dependent, architecture-dependent average value, and time per cycle is by definition the inverse of processor frequency. An increase in frequency thus decreases runtime.
However, power consumption in a chip is given by the equation
where P is power consumption, C is the capacitance being switched per clock cycle, V is voltage, and F is the processor frequency (cycles per second). Increases in frequency thus increase the amount of power used in a processor. Increasing processor power consumption led ultimately to Intel's May 2004 cancellation of its Tejas and Jayhawk processors, which is generally cited as the end of frequency scaling as the dominant computer architecture paradigm.
Moore's Law was still in effect when frequency scaling ended. Despite power issues, transistor densities were still doubling every 18 to 24 months. With the end of frequency scaling, new transistors (which are no longer needed to facilitate frequency scaling) are used to add extra hardware, such as additional cores, to facilitate parallel computing - a technique that is being referred to as parallel scaling.
The end of frequency scaling as the dominant cause of processor performance gains has caused an industry-wide shift to parallel computing in the form of multicore processors.
See also
Dynamic frequency scaling
Overclocking
Underclocking
Voltage scaling
References
Computer architecture
Central processing unit
fr:Fréquence du processeur |
https://en.wikipedia.org/wiki/Diamonique | Diamonique is the brand name used by television shopping network QVC for their cubic zirconia simulated colorless diamond, simulated colored diamond, and simulated colored gemstone jewelry (cubic zirconia is a common type of gemstone substitute). QVC acquired the manufacturing facilities, proprietary technology and trade name rights from MSB Industries, Inc. in 1988. Starting in April 2001, QVC began a limited distribution of Diamonique jewelry at Target retail locations. In the 1990s, Diamonique jewelry made up approximately 5% of QVC's sales. Sales of jewelry for QVC have naturally declined as the company has diversified their shopping programming.
Designers
Celebrities and fine jewelry designers have designed collections of Diamonique Jewelry for QVC.
Morgan Fairchild
Loni Anderson
Carol Channing
Judith Ripka
Paul Klecka
Tacori
Erica Courtney
Tova Borgnine
Michelle Mone, Baroness Mone
Scott Kay
Netali Nissim
Lisa P. Mason
See also
Diamond simulant
References
Diamond simulants
QVC
Jewelry companies of the United States
Store brands |
https://en.wikipedia.org/wiki/Deb%20Placey | Deborah Kaufman Placey (born March 17, 1966) is an American sportscaster who currently co-hosts the television program, NHL Live, with EJ Hradek on the NHL Network, as well as The BlackBerry All-Access Pregame show on NHL.com. On September 6, 2018, MSG Network announced Placey was leaving the regional sports network to take a new on-air position with the NHL Network.
Placey had previously served as a news anchor/reporter for the New Jersey Devils' televised games on MSG Plus and the MSG Network. Placey joined the New Jersey Devils in 2011 after 10 seasons as pre-game and intermission host for New York Islanders telecasts. Placey's earlier TV anchor work includes stops at WSIL-TV in Carterville, Illinois, KWWL-TV in Waterloo, Iowa, WPRI-TV in Providence, Rhode Island and WSVN-TV in Miami, Florida.
Prior to joining MSG in the mid-1990s, Placey regularly appeared on ESPN2 at the time of ESPN2's infancy (October 1993) through mid-1995. From 2004 through 2005, Placey worked as a fill-in weekend sports anchor and reporter for WNBC-TV, the flagship NBC affiliate.
Born and raised in St. Louis, Missouri, Deb Placey is married to Edward Placey, a senior coordinating producer at ESPN. The Placeys have two daughters, Madeline and Caroline, and a beagle named Lucky.
References
External links
MSG biography
Deb Placey's Twitter Account
National Hockey League broadcasters
New Jersey Devils announcers
New York Liberty announcers
Women's National Basketball Association announcers
New York Islanders announcers
1966 births
Living people |
https://en.wikipedia.org/wiki/The%20COED%20Project | The COED Project, or the COmmunications and EDiting Project, was an innovative software project created by the Computer Division of NOAA, US Department of Commerce in Boulder, Colorado in the 1970s. This project was designed, purchased and implemented by the in-house computing staff rather than any official organization.
Intent
The computer division previously had a history of frequently replacing its mainframe computers. Starting with a CDC 1604, then a CDC 3600, a couple of CDC 3800s, and finally a CDC 6600. The department also had an XDS 940 timesharing system which would support up to 32 users on dial-up modems. Due to rapidly changing requirements for computer resources, it was expected that new systems would be installed on a regular basis, and the resultant strain on the users to adapt to each new system was perceived to be excessive. The COED project was the result of a study group convened to solve this problem.
The project was implemented by the computer specialists who were also responsible for the purchase, installation, and maintenance of all the computers in the division. COED was designed and implemented in long hours of overtime. The data communications aspect of the system was fully implemented and resulted in greatly improved access to the XDS 940 and CDC 6600 systems. It was also used as the front end of the - Free University of Amsterdam's SARA system for many years.
Design
A complete networked system was a pair of Modcomps: one II handled up to 256 communication ports, and one IV handled the disks and file editing. The system was designed to be fully redundant. If one pair failed the other automatically took over. All computer systems in the network were kept time-synchronized so that all file dates/times would be accurate - synchronized to the National Bureau of Standards atomic clock, housed in the same building. Another innovation was asynchronous dynamic speed recognition. After a terminal connected to a port, the user would type a Carriage Return character, and the software would detect the speed of the terminal (in the range of 110 to 9600 bit/s) and present a log in message to the user at the appropriate speed. Due to limitations of the operating systems which came with the Modcomps, new Operating systems had to be created, CORTEX for the Modcomp II's and IV BRAIN for the Modcomp IV's.
History
(Dates are approximate - from memory)
1970: First discussions of new communications system for XDS 940
1971: The COED Project was created
1972: The system was designed, funding was approved, a Request for Quote for the hardware was issued and executed
1973: The hardware components—2 Modcomp IV's and 2 Modcomp II's were delivered and installed and implementation began
1976: (April 8) First communication through COED to XDS 940 worked!
1979: project terminated
Staff
Those involved in the original design meetings were:
Ralph Slutz, George Sugar, Jim Winkelman and most of the COED implementors. Support was also provided by T |
https://en.wikipedia.org/wiki/Heroes%20of%20Jin%20Yong | Heroes of Jin Yong (), first published in 1996, is a tactical role-playing game developed by Taiwanese game developer Soft-World's Heluo Studio (later known as Oriental Algorithm System), based on the storyline and characters from Jin Yong's wuxia novels.
The player takes on the role of present-day protagonist, who falls asleep playing a new computer game and wakes up one day to find himself in an alternate dimension of the ancient Chinese jianghu world. The player learns that in order to return to the real modern world, he must find all of Jin Yong's fourteen novels and be crowned the champion of jianghu. The books are scattered around the world and the player must interact with many characters from the novels, each with his/her own story and mission. Some characters are friendly and willing to help the player in his quest, while others are hostile and fight with him. The player must train and improve his own martial art skills in order to acquire the books. There are a wide variety of martial arts styles and weapons available, including sword, saber, whip, and palm styles. The player can also choose to follow a righteous or evil path through his actions and deeds, with different reactions from characters depending on what path he takes.
Online version
The massive multiplayer online version (金庸群俠傳Online) was published by Chinesegamer International Corp. Version 1.0 was released in June, 2001, and version 2.0 was released in December, 2004.
Legacy
A sequel titled Wulin Qunxia Zhuan () was developed by Heluo Studio and published by Softworld in 2001. A remake of the game under the title of Tale of Wuxia () was released in Chinese on 28 July 2015, and later on Steam in both Chinese and English on 28 April 2016.<ref>{{cite web |url=http://wulin.fhyx.com/news/150322/25.html |title=Heluo's New Wulin Qunxia Zhuan has received an official title change to Xiake Fengyun Zhuan|date=2015-03-22|publisher=Phoenix Publishing & Media Group|accessdate=2015-03-22|language=zh}}</ref> A standalone prequel to Tale of Wuxia was released in 2017 under the title Tale of Wuxia: The Pre-Sequel ().
Another sequel to Heroes of Jin Yong was released in 2018 under the title Ho Tu Lo Shu: The Books of Dragon () on the Chinese Cube Game platform, and later on Steam with only Chinese language support.
Fan works Heroes of Jin Yong 2 is a browser game developed by an independent Chinese gaming developer, 半瓶神仙醋, with Adobe Flash. The game was released on 24 December 2006 for free and gained popularity on Chinese gaming platforms.
See alsoDragon OathMartial KingdomsXuanyuan JianThe Legend of Sword and FairyJade EmpireBujingaiHeavenly Sword''
References
External links
CIC Jinyong 1.x online page
CIC Jinyong 2.0 online page
1996 video games
Adaptations of works by Jin Yong
Chinese-language-only video games
DOS games
DOS-only games
Single-player video games
Soft-World games
Video games based on novels
Video games developed in Taiwan
Wuxia video games |
https://en.wikipedia.org/wiki/1954%20in%20radio | The year 1954 saw a number of significant happenings in radio broadcasting history.
Events
20 January – The National Negro Network is formed in the United States.
25 January – First broadcast of Dylan Thomas's radio play Under Milk Wood, two months after its author's death, with Richard Burton as 'First Voice', on the BBC Third Programme.
1 February – KECA and KECA-FM, two Los Angeles stations, change their call letters to KABC and KABC-FM respectively, reflecting their new ownership by ABC-United Paramount Theaters.
1 April – ABC-United Paramount Theaters, owners of WENR-Chicago, purchase time-share counterpart WLS-Chicago from Sears, Roebuck and Co., and merge both stations under the WLS call sign (their FM sister station would keep the WENR call sign until 1965).
15 July – The Nippon Broadcasting System initiates its first official regular broadcasting service in Tokyo, Japan.
18 October – Texas Instruments announces the development of the first commercial transistor radio. The Regency TR-1 goes on sale the following month.
17 November – WJW (AM) in Cleveland, Ohio (later WKNR) is sold by William M. O'Neill to Storer Broadcasting.
Debuts
3 January – Man's Right to Knowledge debuts on CBS.
3 January – WSTN debuts as a 1 kW daytimer at St. Augustine, Florida.
9 January – Roadshow debuts on NBC. Starring Bill Cullen, the three-hour weekly program is considered a forerunner of the network's Monitor, which began a year later.
6 April – Crime and Peter Chambers debuts on NBC.
2 September – Dr. Sixgun debuts on NBC.
25 October - WMSN in Raleigh, North Carolina debuts as a 500 watt daytimer at Raleigh, North Carolina.
2 November – Hancock's Half Hour debuts on BBC radio.
Endings
3 January – Quiz Kids ends its run on network radio (CBS).
6 January – Dr. Christian ends its run on network radio (CBS).
15 January – Double or Nothing ends its run on network radio (ABC).
16 January – The Baron and the Bee ends its run on network radio (NBC).
5 March – Family Skeleton ends its run on network radio (CBS).
12 March – House of Glass ends its run on network radio (NBC).
26 March – Front Page Farrell ends its run on network radio (NBC).
27 March – Twenty Questions ends its run on network radio.
28 March – Bulldog Drummond ends its run on network radio (Mutual).
30 March – Rocky Fortune, a half-hour detective drama starring Frank Sinatra, aired its final episode on NBC.
22 May – The Armstrong Theater of Today ends its run on network radio (CBS).
27 May – Time for Love ends its run on network radio (CBS).
18 June – The Adventures of Ozzie and Harriet ends its run on network radio (ABC).
24 June – The Six Shooter ends its run on network radio (NBC).
9 July – Can You Top This? ends its run on network radio (NBC).
1 August – Broadway Is My Beat ends its run on network radio (CBS).
7 September – Crime and Peter Chambers ends its run on network radio (NBC).
25 September – Escape ends its run on CBS.
25 September – Stars over Hollywood ends its run o |
https://en.wikipedia.org/wiki/BZA | BZA may refer to:
Benzanthrone, an aromatic hydrocarbon
Board of zoning appeals
Bombenzielanlage, or Bomb Ziel Automat, an analog bombsight computer, used to compute bomb release in German World War II bombers
Bonanza Airport/San Pedro Airport
Station code for Vijayawada Junction railway station |
https://en.wikipedia.org/wiki/Rental%20management%20software | The rental industry spans many different types of equipment from tools to heavy construction equipment, aerial to vehicles, party and event to computers and test and measurement equipment and highly specialized areas such as Crane and Temporary Accommodation rental. In the UK and some parts of Europe it is referred to as the Hire Industry.
History
Like most software development, initial rental software systems were developed in the 1970s and 1980s as custom or bespoke solutions provided for individual rental companies and occurred in parallel in locations across the globe. In the last two decades a number of leading players have emerged providing solutions for everything from one or two user systems in a single store to international, multi-company and multi-location organizations.
The rental industry itself continues to adapt and re-shape, as different players enter the market and national boundaries become less significant. The introduction and expansion of increasing numbers of manufacturers, such as Volvo Rents, and CAT into the rental industry as direct providers of rental services is also re-shaping the way that individual rental software providers adapt their software.
Rental Management Software Functionality
Rental management software should cover all aspects of a rental business in a systematic way including Financials (GL, AR and AP), Equipment Servicing, CRM and reporting functionality allowing rental businesses to achieve all their business analytics from within a single package. Rental management software that integrates with 'off-the-shelf' accounting software can provide a viable alternative to the 'all-in-one' solutions. There are distinct industry requirements which need to be managed within the software, with Utilization one of the most important. These special features include:
Reservations and Allocations management based on differing contract durations and customer requests.
Dispatch/Pick-Up/Returns Process Management with the ability to manage partial dispatches and returns including asset tracking and signature capture on delivery / pick up..
Accessories, Attachments & Kits including sale or return items such as fuel.
'In Lieu of' or alternate items when equipment is not available as expected.
Transport management including ordering in outside haulage and keeping track of revenue and cost against delivery vehicles.
Product Exchanges and swap outs on live contracts
Site Moves/Drop Ship & Relocations within live contracts
Contract Charging Profile determining when and how charging is generated including flexibility on excess hours charges, charging by hour / day / week / month etc.
Product Service Units and clock hour recording and maintenance triggers
Bill Processing for long term rental contracts on specific cycles (continuation or recurring invoicing), automated off-rent billing and additional charge management.
Sale or Return consumables must be managed alongside rental products.
Rent to Purchase or Rent to Own a |
https://en.wikipedia.org/wiki/Meiji-jingumae%20Station | is a subway station located in Shibuya, Tokyo, Japan. It is a part of the Tokyo Metro subway network, and is served by the Chiyoda Line and the Fukutoshin Line.
Harajuku Station on the Yamanote Line is immediately adjacent to Meiji-jingumae Station and is marked as an interchange on most route maps. Due to this proximity and to encourage use of the station by visitors, Tokyo Metro changed station signboards to read on 6 March 2010.
Station layout
Platforms
History
The Chiyoda Line station opened on 20 October 1972; the Fukutoshin Line station opened on 14 June 2008.
The station facilities were inherited by Tokyo Metro after the privatization of the Teito Rapid Transit Authority (TRTA) in 2004.
PASMO smart card coverage at this station began operation on 18 March 2007.
Surrounding area
Points of interest include:
Meiji Shrine
Yoyogi Park
Yoyogi National Gymnasium
NHK Broadcasting Center
References
External links
Meiji-jingumae Station (Tokyo Metro)
Railway stations in Japan opened in 1972
Harajuku
Railway stations in Tokyo
Stations of Tokyo Metro
Tokyo Metro Chiyoda Line
Tokyo Metro Fukutoshin Line |
https://en.wikipedia.org/wiki/Apache%20Jena | Apache Jena is an open source Semantic Web framework for Java. It provides an API to extract data from and write to RDF graphs. The graphs are represented as an abstract "model". A model can be sourced with data from files, databases, URLs or a combination of these. A model can also be queried through SPARQL 1.1.
Jena is similar to RDF4J (formerly OpenRDF Sesame); though, unlike RDF4J, Jena provides support for OWL (Web Ontology Language). The framework has various internal reasoners and the Pellet reasoner (an open source Java OWL-DL reasoner) can be set up to work in Jena.
Jena supports serialisation of RDF graphs to:
a relational database
RDF/XML
Turtle
TriG
Notation 3
JSON-LD
Versions
After Apache integration
Jena was integrated as a project under the umbrella of The Apache Software Foundation in April 2012, after having been in the Apache Incubator since November 2010.
Before Apache integration
Jena was created by HP Labs and was on SourceForge since 2001, and was donated to The Apache Software Foundation in November 2010.
Fuseki
Fuseki is an HTTP interface to RDF data. It supports SPARQL for querying and updating. The project is a sub-project of Jena and is developed as servlet. Fuseki can also be run stand-alone server as it ships preconfigured with the Jetty web server.
ARQ
ARQ is a query engine within Jena that supports SPARQL.
References
External links
Jena
Resource Description Framework
Semantic Web
Triplestores |
https://en.wikipedia.org/wiki/Voice%20of%20Israel | Voice of Israel was a Jerusalem-based private global broadcast network staffed by media professionals with a Zionist and often religious orientation, who saw their mission in pro-Israel advocacy (hasbara) and combating the global pro-Palestinian Boycott, Divestment and Sanctions movement, by addressing the wider Jewish diaspora. It streamed digital news and talk radio between 2014 and 2015, at Voice of Israel | Bringing Israel Closer, from Israel, about Israel, in English. Voice of Israel began broadcasting in July 2014 and was closed down due to lack of money in August 2015. Voice of Israel was listened to in more than 170 countries and gained over 40,000 "likes" on Facebook in less than a year. It was located in the JVP Media Quarter in Jerusalem.
"Voice of Israel" is not to be confused with Kol Yisrael (lit. "Voice of Israel" in Hebrew), which is run by the Israel Broadcasting Authority.
Orientation
The station had a national Zionist orientation, the self-declared goal being to "reveal the real Israel" as a "Jewish state with great sensitivity to other cultures and peoples" and "fight [its] deligitimization".
The self-professed mission was to 'Bring Israel Closer' to millions of people around the world: To repair the disconnect between Israel and the diaspora: To educate and inform the world on all issues Israel, including politics, defense, religion and culture by providing world-class news, analysis and opinion and feature stories, about Israel, from Israel.
Notable guests
Notable guests included: Prime Minister Benjamin Netanyahu, Tzipi Livni – Opposition Leader, Isaac Herzog – Opposition Leader, Baruch Marzel – far right activist, formerly of the outlawed Kach party and currently with the Jewish National Front, internationally acclaimed novelist A. B. Yehoshua, Michael Oren – former Israeli ambassador to the US and, as of 2015, a member of the Knesset, Jon Medved – CEO of OurCrowd, Yosef Abramowitz – solar pioneer, CEO of Energia, Ben Carson – US presidential candidate, Brigitte Gabriel – political activist, Rudy Giuliani – former New York mayor, Mike Huckabee – presidential candidate, Bishop Merton Clark – Truth Revealed International, Avi Dichter – former head of Shin Bet and minister of internal security, Moshe Arens – former defense minister and ambassador to US, Tuvia Tenenbom – author of Catch the Jews!, David Parsons – International Christian Embassy Jerusalem, Pastor Jonathan Hanson – World Ministries International, Natan Sharansky – Jewish Agency chairman, Malcolm Hoenlein – executive vice chairman of the Conference of Presidents of Major American Jewish Organizations, Rabbi Shmuley Boteach – influential author, columnist, TV host, and lecturer, Governor Mike Pence – State of Indiana, Jerry Silverman – Jewish Federations of North America (JFNA), CEO, Philip Levine – mayor of Miami Beach, Florida, Dr. Billy Wilson – president of Oral Roberts University.
Talk show hosts from abroad also teamed up with Voice of Israel to broadc |
https://en.wikipedia.org/wiki/BSAM | BSAM may refer to:
Basic sequential access method, a data set access method
Birendra Sainik Awasiya Mahavidyalaya, the only Nepalese military boarding high school |
https://en.wikipedia.org/wiki/MBT | MBT may refer to:
Armaments
Main battle tank
MBT 1925, an Italian rifle
Businesses
Manitoba Telecom Services, traded as MBT on the TSX
MTS (network provider), traded as MBT on the NYSE
Masai Barefoot Technology, a brand of rocker bottom shoes
Massachusetts business trust, United States, a type of business
Tech Mahindra (formerly Mahindra British Telecom)
Metropolitan Bank and Trust Company, Philippines, a bank
Monroe Bank & Trust, a holding company in Michigan, United States
Places (including buildings etc.)
The National Rail code for Marsh Barton railway station in the Marsh Barton area of Exeter, England
Mont Blanc Tunnel, between France and Italy
Mount Baker Theatre, Bellingham, Washington, US
Mountbatten MRT station, Singapore
Moises R. Espinosa Airport, Philippines (IATA code)
Murfreesboro Municipal Airport, Tennessee, United States (FAA LID code)
Metropolitan Branch Trail, a hiking/cycling route, north-east United States
Science and technology
Biology and medicine
Malignant brain tumor
Mentalization-based treatment
Methylbutyltryptamine, a lesser-known psychedelic drug
Midblastula transition in embryonic development
Mind-body training, such as yoga, tai chi and Pilates
Other uses in science and technology
Main Boundary Thrust, Himalayas, a geologic fault
Maximum brake torque, a tuning setting at which an engine achieves maximum torque
Model-based testing, a software testing approach
3-Methyl-2-butene-1-thiol, a compound sometimes found in beer that is similar in chemical composition and odor to the spray of a skunk
Mechanical biological treatment, for sewage
Mercaptobenzothiozole, used as an accelerant in vulcanisation processes
Other uses
Majlis Bachao Tehreek, a political party in the Indian state of Telangana
Manufacturing Business Technology, a website
Master of Business Taxation, an academic qualification
The Monster Ball Tour, 2009–2011 Lady Gaga world tour
MBT (board game), a wargame involving tanks
Matigsalug language of Mindanao
Modified Brussels Treaty of 1954, a mutual defence agreement between European countries
McLeod Bethel-Thompson, American football quarterback for the New Orleans Breakers |
https://en.wikipedia.org/wiki/Jeanne%20Ferrante | Jeanne Ferrante (born January 3, 1949) is an American computer scientist active in the field of compiler technology. As a Professor of Computer Science and Engineering at the University of California, San Diego's Jacobs School of Engineering, Ferrante has made important contributions regarding optimization and parallelization.
Early life and education
Ferrante was born on January 3, 1949. She completed her Bachelor of Arts degree in natural sciences from Hofstra University in 1969 and her PhD in mathematics from the Massachusetts Institute of Technology in 1974. During her undergraduate studies, Ferrante originally wished to pursue a career as a high school chemistry teacher but was encouraged by a female professor to pursue a career in mathematics.
Career
Following her PhD, Ferrante taught at Tufts University until 1978 when she became a Research Staff Member at IBM's Thomas J. Watson Research Center. While with IBM, she worked on computational complexity problems such as the theory of rational order and first order theory of real addition. In the 1980s, Ferrante collaborated with various researchers at IBM to develop the Static Single Assignment form (SSA). The SSA is a data structure that allows for more efficient methods of transforming the user's program to machine code. Ferrante was later recognized for her collaborative work with the SSA form by the Association for Computing Machinery with their 2006 SIGPLAN Programming Languages Achievement Award. In 1992, Ferrante and her husband Larry Carter decided to look for academic jobs after learning of major changes coming to IBM's research division. After being encouraged by Francine Berman to apply to University of California, San Diego's (UCSD) Jacobs School of Engineering, they were both offered full professorships in 1994.
Upon joining the faculty of UCSD, Ferrante served as the Computer Science and Engineering Department Chair from 1996 to 1999 and Associate Dean of Engineering from 2002 to 2013. In her first year as department chair, Ferrante was elected a Fellow of the Association for Computing Machinery (ACM). As UCSD's Associate Dean, Ferrante focused on developing programs to encourage women to pursue careers in science. In 2004, she founded the Teams in Engineering Service (TIES) program which matches UCSD undergraduates with San Diego non-profit organizations to "solve technology-based problems for their community clients." In the same year, Ferrante was elected a Fellow of the Institute of Electrical and Electronics Engineers (IEEE) for her "contributions to optimizing and parallelizing compilers." She subsequently became one of the only UCSD academics to hold fellowships simultaneously in IEEE and the ACM. Later, Ferrante served as the co-principal investigator of the Information Technology Experiences for Students and Teachers (ITEST) award program to create a multiplayer online science challenge game designed specifically for middle and high school aged girls. As a result of h |
https://en.wikipedia.org/wiki/CN2%20algorithm | The CN2 induction algorithm is a learning algorithm for rule induction. It is designed to work even when the training data is imperfect. It is based on ideas from the AQ algorithm and the ID3 algorithm. As a consequence it creates a rule set like that created by AQ but is able to handle noisy data like ID3.
Description of algorithm
The algorithm must be given a set of examples, TrainingSet, which have already been classified in order to generate a list of classification rules. A set of conditions, SimpleConditionSet, which can be applied, alone or in combination, to any set of examples is predefined to be used for the classification.
routine CN2(TrainingSet)
let the ClassificationRuleList be empty
repeat
let the BestConditionExpression be Find_BestConditionExpression(TrainingSet)
if the BestConditionExpression is not nil
then
let the TrainingSubset be the examples covered by the BestConditionExpression
remove from the TrainingSet the examples in the TrainingSubset
let the MostCommonClass be the most common class of examples in the TrainingSubset
append to the ClassificationRuleList the rule
'if ' the BestConditionExpression ' then the class is ' the MostCommonClass
until the TrainingSet is empty or the BestConditionExpression is nil
return the ClassificationRuleList
routine Find_BestConditionExpression(TrainingSet)
let the ConditionalExpressionSet be empty
let the BestConditionExpression be nil
repeat
let the TrialConditionalExpressionSet be the set of conditional expressions,
{x and y where x belongs to the ConditionalExpressionSet and y belongs to the SimpleConditionSet}.
remove all formulae in the TrialConditionalExpressionSet that are either in the ConditionalExpressionSet (i.e.,
the unspecialized ones) or null (e.g., big = y and big = n)
for every expression, F, in the TrialConditionalExpressionSet
if
F is statistically significant
and F is better than the BestConditionExpression
by user-defined criteria when tested on the TrainingSet
then
replace the current value of the BestConditionExpression by F
while the number of expressions in the TrialConditionalExpressionSet > user-defined maximum
remove the worst expression from the TrialConditionalExpressionSet
let the ConditionalExpressionSet be the TrialConditionalExpressionSet
until the ConditionalExpressionSet is empty
return the BestConditionExpression
References
External links
CN2 Algorithm Description
Machine learning algorithms |
https://en.wikipedia.org/wiki/Gadget%20%28computer%20science%29 | In computational complexity theory, a gadget is a subunit of a problem instance that simulates the behavior of one of the fundamental units of a different computational problem. Gadgets are typically used to construct reductions from one computational problem to another, as part of proofs of NP-completeness or other types of computational hardness. The component design technique is a method for constructing reductions by using gadgets.
traces the use of gadgets to a 1954 paper in graph theory by W. T. Tutte, in which Tutte provided gadgets for reducing the problem of finding a subgraph with given degree constraints to a perfect matching problem. However, the "gadget" terminology has a later origin, and does not appear in Tutte's paper.
Example
Many NP-completeness proofs are based on many-one reductions from 3-satisfiability, the problem of finding a satisfying assignment to a Boolean formula that is a conjunction (Boolean and) of clauses, each clause being the disjunction (Boolean or) of three terms, and each term being a Boolean variable or its negation. A reduction from this problem to a hard problem on undirected graphs, such as the Hamiltonian cycle problem or graph coloring, would typically be based on gadgets in the form of subgraphs that simulate the behavior of the variables and clauses of a given 3-satisfiability instance. These gadgets would then be glued together to form a single graph, a hard instance for the graph problem in consideration.
For instance, the problem of testing 3-colorability of graphs may be proven NP-complete by a reduction from 3-satisfiability of this type. The reduction uses two special graph vertices, labeled as "Ground" and "False", that are not part of any gadget. As shown in the figure, the gadget for a variable x consists of two vertices connected in a triangle with the ground vertex; one of the two vertices of the gadget is labeled with x and the other is labeled with the negation of x. The gadget for a clause consists of six vertices, connected to each other, to the vertices representing the terms t0, t1, and t2, and to the ground and false vertices by the edges shown. Any 3-CNF formula may be converted into a graph by constructing a separate gadget for each of its variables and clauses and connecting them as shown.
In any 3-coloring of the resulting graph, one may designate the three colors as being true, false, or ground, where false and ground are the colors given to the false and ground vertices (necessarily different, as these vertices are made adjacent by the construction) and true is the remaining color not used by either of these vertices. Within a variable gadget, only two colorings are possible: the vertex labeled with the variable must be colored either true or false, and the vertex labeled with the variable's negation must correspondingly be colored either false or true. In this way, valid assignments of colors to the variable gadgets correspond one-for-one with truth assignments to the |
https://en.wikipedia.org/wiki/Uttarakhand%20Solidarity%20Network | The Uttarakhand Solidarity Network (USN), is at once an electronic network of individuals, a working committee, and a group of web sites dedicated to political, economic, environmental, cultural and social justice issues in the Uttarakhand state of India.
The USN traces its foundation to an address on 26 March 1995 by Indian actor Victor Banerjee to the Public Forum on Minority Rights in Toronto, Canada. His speech, entitled, "Uttarakhand: A People Denied" led the People's Front/East Indian Defence Committee to pass a resolution in support of the demand for a separate Uttarakhand state within India. A pamphlet and a petition to this effect was published and circulated.
This act of solidarity with the Uttarakhand separate state movement led to the establishment of the Uttarakhand Support Committee (USC), the only organization outside of India that would lend direct support to the Uttarakhand statehood movement until it achieved its principal goal with the formation of Uttarakhand in 2000.
In 1997, the USC was reestablished in Boston, Massachusetts after a period of inactivity. The first web site covering the Uttarakhand region was launched and its new members began raising the Uttarakhand separate state issue in various South Asian human rights fora. The following three years would witness a number of other firsts, including the 1998 launch of the Prayaga electronic newsletter and the 1999 foundation of the Uttarakhand Solidarity Network e-group. These efforts would be replicated by other individuals and groups in subsequent years. The committee would also play an active role in Uttarakhandi expatriate associations in Canada and the USA, organizing the first seminar of the Uttaranchal Association of North America Convention in 2001.
With the formation of Uttarakhand in 2000, the USC began increasingly focusing on maintaining and building its web presence and taking the name of its e-group. However, the USN itself would be officially relaunched in 2004 to support ongoing social movements in the region including struggles over land, water, and forest rights and outstanding demands of the separate state movement such as relocation of the capital to Gairsain.
References
Organisations based in Uttarakhand
Social movements in India |
https://en.wikipedia.org/wiki/Adaptive%20replacement%20cache | Adaptive Replacement Cache (ARC) is a page replacement algorithm with
better performance than LRU (least recently used). This is accomplished by keeping track of both frequently used and recently used pages plus a recent eviction history for both. The algorithm was developed at the IBM Almaden Research Center. In 2006, IBM was granted a patent for the adaptive replacement cache policy.
Summary
Basic LRU maintains an ordered list (the cache directory) of resource entries in the cache, with the sort order based on the time of most recent access. New entries are added at the top of the list, after the bottom entry has been evicted. Cache hits move to the top, pushing all other entries down.
ARC improves the basic LRU strategy by splitting the cache directory into two lists, T1 and T2, for recently and frequently referenced entries. In turn, each of these is extended with a ghost list (B1 or B2), which is attached to the bottom of the two lists. These ghost lists act as scorecards by keeping track of the history of recently evicted cache entries, and the algorithm uses ghost hits to adapt to recent change in resource usage. Note that the ghost lists only contain metadata (keys for the entries) and not the resource data itself, i.e. as an entry is evicted into a ghost list its data is discarded. The combined cache directory is organised in four LRU lists:
T1, for recent cache entries.
T2, for frequent entries, referenced at least twice.
B1, ghost entries recently evicted from the T1 cache, but are still tracked.
B2, similar ghost entries, but evicted from T2.
T1 and B1 together are referred to as L1, a combined history of recent single references.
Similarly, L2 is the combination of T2 and B2.
The whole cache directory can be visualised in a single line:
. . . [ B1 <-[ T1 <-!-> T2 ]-> B2 ] . .
[ . . . . [ . . . . . . ! . .^. . . . ] . . . . ]
[ fixed cache size (c) ]
The inner [ ] brackets indicate actual cache, which although fixed in size, can move freely across the B1 and B2 history.
L1 is now displayed from right to left, starting at the top, indicated by the ! marker. ^ indicates the target size for T1, and may be equal to, smaller than, or larger than the actual size (as indicated by !).
New entries enter T1, to the left of !, and are gradually pushed to the left, eventually being evicted from T1 into B1, and finally dropped out altogether.
Any entry in L1 that gets referenced once more, gets another chance, and enters L2, just to the right of the central ! marker. From there, it is again pushed outward, from T2 into B2. Entries in L2 that get another hit can repeat this indefinitely, until they finally drop out on the far right of B2.
Replacement
Entries (re-)entering the cache (T1, T2) will cause ! to move towards the target marker ^. If no free space exists in the cache, this marker also determines whether either T1 or T2 will evict an entry.
Hits in B1 will increas |
https://en.wikipedia.org/wiki/Indore%20City%20Bus | Indore City Bus is a road transport system run by Atal Indore City Transport Services Limited or AICTSL. This transport system runs through 277 kilometers of road network in the Indore city and surrounding areas. The city bus service has 6 private partners along with the city administration and the total investment has gone more than 40 Crores.
History of local transportation in Indore
Indore is the largest metropolitan city of the state of Madhya Pradesh and a center of trade and commerce. The city is growing rapidly with need for increasing mobility, high travel demand, increasing intensity of traffic, congestion, delays, accidents and other transportation problems.
The intra-city public transport system is essentially road based with 500 private minibuses, 550 tempos(to reduce pollution now replaced by Maruti van as contract carrier), more than 100 Metro Taxi (Flat fare Rs.11.95 per KM) and 10,000 auto rickshaws. The city felt a lack of public mass transport system for long time.
Company
Indore City Transport Services Limited was incorporated on 1 December 2005 with an objective to operate and manage the public transport system of Indore. Seven key people were identified as the Board of Directors. Indore Municipal Corporation and Indore Development Authority invested an authorized capital of Rs 2,500,000 jointly. The collector of Indore, Vivek Aggarwal was responsible for the execution of the project to run the bus service. The company is run as a public-private partnership.
Operations
The city bus routes are spread citywide and also to neighboring cities. Majority of city bus consist of ordinary route. Limited bus services which skips minor stops is used on Long routes, high capacity routes and routes that provides connectivity beyond Indore city. The buses have colour strips appended to routes. Green coloured buses connect Indore with Mhow. Some buses like yellow and orange go beyond Indore region to Pithampur and Gandhinagar area. Buses with magenta strip mostly serve BRTS and provide connection AB Road and buses coloured blue serve Rajwada region. The ICTSL uses CNG powered buses for its operation.
As of 2011, the ICTSL runs a total of 125 buses, ferrying an average of 55,000 passengers over 30 routes, and has a workforce strength of 375 which includes 225 bus drivers and 150 conductors.
Suburbs
The Indore City Transport Service Corporation operates inter-city services to six different areas beyond the municipal limits of Indore city, i.e. into the limits of the bordering corporations of Mhow, Rau, Hatod, Pithampur, Manpur & Bhopal. Two new suburbs Runji Gautampura and Depalpur also added in city bus circle on 15 December 2012. The ICTSL supplements suburban buses, which is the mass carrier on Indore region. It is for this reason that ICTSL always gives priority for feeder routes are given more priority than other routes.
Rates and passes
The city bus offers daily passes to regular travelers. The city bus fare has been increased |
https://en.wikipedia.org/wiki/Prosopography%20of%20the%20Byzantine%20World | The Prosopography of the Byzantine World (PBW) is a project to create a prosopographical database of individuals named in textual sources in the Byzantine Empire and surrounding areas in the period from 642 to 1265. The project is a collaboration between the British Academy and the Berlin-Brandenburg Academy of Sciences and Humanities.
Origins
The project was begun in the 1980s with the aim of completing the work on later Roman Empire and Byzantine prosopography begun by Theodore Mommsen in the 19th century and carried on by A.H.M. Jones and J. R. Martindale, which produced The Prosopography of the Later Roman Empire (three volumes, Cambridge, 1971–1992), covering the period from 260 (the accession of Gallienus) to 641 (the death of Heraclius, marking the end of late Antiquity).
In 1993, the British Academy signed a collaboration agreement with the Berlin-Brandenburg Academy. The work is divided into three periods, 641–867 (Heraclian dynasty to the Amorian dynasty), 867–1025 (Macedonian dynasty up to the death of Basil II) and 1025–1261 (last Macedonians, the Komnenian period, and up to the recovery of Constantinople from the Latin Empire). The Palaiologan period, after 1261, is covered by the Prosopographisches Lexikon der Palaiologenzeit, launched by the Austrian Academy of Sciences under the direction of Erich Trapp and published between 1976 and 1991.
Status
The first result was the Prosopographie der mittelbyzantinischen Zeit, Abteilung I: 641–867, edited by Friedhelm Winkelmann and Ralph-Johannes Lilie and published in five volumes between 1998 and 2002. A version of this database is hosted at Berlin-Brandenburg Academy. In 2001, the British Academy published a CD-ROM with its own Prosopography of the Byzantine Empire I (641–867), edited by John Robert Martindale, which is complementary to the German work. A section of the database covering the period 1025–1261 is hosted at King's College London and is freely accessible from the internet.
The project aimed to cover all named individuals in the Byzantine world in the period from 641, where The Prosopography of the Later Roman Empire ends, to 1265. The geographical scope has since been extended to cover Jerusalem. As of 2006 the PBW itself covers the period 1025 to 1180, a total of some 10,000 individuals. The data is drawn from textual sources and also from sigillography which constitutes an important resource in Byzantine prosopography. Around 7500 seals are recorded. The project team estimate that, in printed form, the database would amount to some 1400 pages.
The project was chaired until 2005 by Dame Averil Cameron. The current chair is Professor Charlotte Roueché FSA, head of the Byzantine and Modern Greek Studies department at King's College London. The project has been funded by the Arts and Humanities Research Council.
Selected publications
John Robert Martindale, ed., Prosopography of the Byzantine Empire, Vol. 1 (Ashgate compact disc, 2001)
See also
Prosopography of Anglo |
https://en.wikipedia.org/wiki/Edgio | Edgio, Inc., evolved from Limelight Networks, a 20-year provider content delivery services to stream digital content over the internet. Following a 2022 acquisition of Edgecast, the company re-branded as Edgio and has grown to offer a full suite of edge-enabled applications that run on the company's globally scaled network. These applications include video workflow and automation, website acceleration, and cyber security. As of January 2023, the company's network has more than 300 points-of-presence and delivers with 250+ terabits per second of egress capacity across the globe.
Company history
Edgio was founded in 2001 in Tempe, Arizona as Limelight Networks, a provider of content delivery network services. The company's Limelight Orchestrate Platform delivers Live and On-Demand video and online content to any connected device anywhere in the world.
In July 2006, the company closed a $130 million equity financing round led by Goldman Sachs Capital Partners. Limelight Networks later raised $240 million in an initial public offering, during June 2007, selling 16 million shares at $15. In April 2008, company founder Michael Gordon was recognized as a "Streaming Media All-Star" by StreamingMedia Magazine, for his contributions to the industry.
Over the years, Limelight has received several other awards for its services including, receiving Frost & Sullivan's prestigious award for Product Line Strategy in 2012. Forrester Research named Limelight a Strong Performer in The Forrester Wave™: Online Video Platforms, Q1 2013.
In October 2017, Limelight Networks was recognized on Streaming Media's List of "100 Companies that Matter Most in Online Video".
In January 2021, Limelight Networks and its board of directors announced that Bob Lyons has been named as the new president and CEO of Limelight Networks, Inc. and will join the company and the board of directors effective February 1, 2021. Mr. Lyons was formerly CEO of Alert Logic.
In September 2021, Limelight Networks acquired Moov Corporation, which did business as Layer0. The acquisition of Layer0 added website orchestration and workflow products, now part of Edgio's Applications suite.
On June 16, 2022, Limelight Networks completed the acquisition of Edgecast from Yahoo! Inc. and rebranded itself to Edgio. The acquisition of Edgecast expanded the reach of Edgio's global delivery network, and also added enterprise-class security solutions to the product portfolio. Additionally, Edgecast brought the Uplynk product - a video workflow and orchestration tool for the streaming of live and on-demand events. Following this acquisition, Edgio developed two distinct offerings - its Applications suite, consisting of website orchestration and cybersecurity solutions; and its Media suite, consisting of media delivery on its global edge network and video streaming solutions.
Edgio had received several industry accolades. In November 2022, an Industry Analyst firm, Quadrant Knowledge Solutions, conduct |
https://en.wikipedia.org/wiki/Programming%20by%20demonstration | In computer science, programming by demonstration (PbD) is an end-user development technique for teaching a computer or a robot new behaviors by demonstrating the task to transfer directly instead of programming it through machine commands.
The terms programming by example (PbE) and programming by demonstration (PbD) appeared in software development research as early as the mid 1980s to define a way to define a sequence of operations without having to learn a programming language. The usual distinction in literature between these terms is that in PbE the user gives a prototypical product of the computer execution, such as a row in the desired results of a query; while in PbD the user performs a sequence of actions that the computer must repeat, generalizing it to be used in different data sets.
These two terms were first undifferentiated, but PbE then tended to be mostly adopted by software development researchers while PbD tended to be adopted by robotics researchers. Today, PbE refers to an entirely different concept, supported by new programming languages that are similar to simulators. This framework can be contrasted with Bayesian program synthesis.
Robot programming by demonstration
The PbD paradigm is first attractive to the robotics industry due to the costs involved in the development and maintenance of robot programs. In this field, the operator often has implicit knowledge on the task to achieve (he/she knows how to do it), but does not have usually the programming skills (or the time) required to reconfigure the robot. Demonstrating how to achieve the task through examples thus allows to learn the skill without explicitly programming each detail.
The first PbD strategies proposed in robotics were based on teach-in, guiding or play-back methods that consisted
basically in moving the robot (through a dedicated interface or manually) through a set of relevant configurations that the robot
should adopt sequentially (position, orientation, state of the gripper). The method was then progressively ameliorated by
focusing principally on the teleoperation control and by using different interfaces such as vision.
However, these PbD methods still used direct repetition, which was useful in industry only when conceiving an assembly line using exactly the same product components. To apply this concept to products with different variants or to apply the programs to new robots, the generalization issue became a crucial point. To address this issue, the first attempts at generalizing the skill
were mainly based on the help of the user through queries about the user's intentions. Then, different levels of abstractions were
proposed to resolve the generalization issue, basically dichotomized in learning methods at a symbolic level or at a trajectory level.
The development of humanoid robots naturally brought a growing interest in robot programming by demonstration. As a humanoid robot is supposed by its nature to adapt to new environments, not on |
https://en.wikipedia.org/wiki/Marina%20%282006%20TV%20series%29 | Marina is a Spanish-language telenovela that aired on United States-based television network Telemundo. It premièred on October 16, 2006. The final original episode aired on Thursday, June 28, 2007.
Sandra Echeverría, in her first major role, plays the title character. Aylín Mújica plays twin sisters, Laura and Verónica Saldivar. Mauricio Ochmann appears as Ricardo in early episodes before being replaced by Manolo Cardona.
Telemundo's slogan in English-language ads for the show was "The heat of Acapulco, the passion of a woman." As with most of its other soap operas, the network broadcast English subtitles as closed captions on CC3. Marina was produced by Argos Mexico.
During the show's last month, June 28, 2007, Marina'''s time slot (which included one soccer pre-emption and an encore of the finale) averaged 577,000 core adult viewers (ages 18 to 49), an 18 percent increase over the year before, when Tierra de Pasiones aired during that hour, according to Nielsen Media Research.
Story
Set in Acapulco, this love story features Marina, a beautiful, sweet young woman who makes a living driving a tourist boat. Her simple life transforms when her mother dies unexpectedly and she inherits a large family fortune. Marina moves into an elegant mansion owned by the wealthy Alarcón Morales family, who treat her with evil, scorn and rejection.
This humble girl is abruptly immersed into a world of rich, superficial people, who live lives of luxury, intrigue and vengeance. She finds love with the man she least expects: Ricardo Alarcón, a handsome man.
Plot
Marina is a young, beautiful girl, neglected by her rich father who loses her mother and her house. Her uncle, who was madly in love with her mother and always took care of Marina from afar, promises her mother on her death bed that he will watch over Marina. When Marina moves to her uncle's mansion, she meets her future husband Ricardo, who currently is unhappily married to Adriana. Adriana is having an affair with many men, including Ricardo's best friend, Julio. She hates Marina because she notices that her husband is falling in love with her. Julio and Adriana plot to kill Marina, but all attempts fail; instead Julio is thought to be dead after he is caught kidnapping Marina and then throws himself off a cliff. Adriana is then asked to leave the mansion by Marina's uncle. Instead she tries to kill Ricardo, but when that fails, she runs out of the house and is killed in a horrible car accident. Before she dies, she confesses to Ricardo about all of the affairs she had and admits that the baby she was expecting was Julio's and not his. This news leaves Ricardo very insecure.
Later Ricardo and Marina marry. Two months later, Marina and Ricardo return from their honeymoon. Ricardo then leaves her because he thinks she is unfaithful, which in reality is a scheme his mother devised. She becomes pregnant during their honeymoon but when she leaves her house to attend her baby shower, Julio return |
https://en.wikipedia.org/wiki/KMRE-LP | KMRE-LP (102.3 Low power FM) was a radio station broadcasting local and regional educational, cultural and historic programming. The station was located in Bellingham, Washington. The FCC granted KMRE-LP its license on July 19, 2006.
Programming
Featuring music from the Pacific Northwest and more, KMRE-LP also featured local news programming and other work from all around Whatcom County. The station also aired music and educational programs.
History
The meaning behind the call sign for KMRE-LP is the Museum of Radio and Electricity. Broadcasting since 2005 in Bellingham, WA, the station began as part of the Spark Museum of Electrical Invention. The station initially broadcast music and programming from the Golden Age of radio – the 1920s through the advent of television, but evolved to share programming on a wide range of topics.
In 2018, Kulshan Community Media was formed and operated KMRE-LP since then.
Some of the changes incorporated over the last five years include a format shift to Roots Americana music, the development of a local news team and weekday afternoon newscasts, and the shift from a 100 watt Low Power FCC License to a full power Non-Commercial Educational FM Station.
Kulshan Community Media surrendered KMRE-LP's license to the FCC on June 19, 2023; it was cancelled the following day.
See also
List of community radio stations in the United States
List of radio stations in Bellingham, WA
References
External links
MRE-LP
MRE-LP
Community radio stations in the United States
Radio stations established in 2006
2006 establishments in Washington (state)
Defunct radio stations in the United States
Radio stations disestablished in 2023
2023 disestablishments in Washington (state) |
https://en.wikipedia.org/wiki/Horst%20Zuse | Horst Zuse (born November 17, 1945) is a German computer scientist.
Life
Horst Zuse was born in 1945 as the son of the computer pioneer Konrad Zuse. He first studied electrical engineering at the Technical University of Berlin and later on completed his PhD on software metrics. Horst Zuse worked as a Privatdozent at the Technical University of Berlin and was professor at the Hochschule Lausitz (FH), University of Applied Sciences. Besides software engineering, he has concentrated on the history of computer science.
Books
A Framework of Software Measurement (Walter de Gruyter, 1997),
Software complexity: Measures and methods (Programming complex systems) (Walter de Gruyter, 1991),
References
External links
Horst Zuse's website
The Life and Work of Konrad Zuse by Horst Zuse, an extensive and well-written historical account of Horst Zuse's father's pioneering work
1945 births
Living people
People from Oberallgäu
Technical University of Berlin alumni
German computer scientists
Historians of technology |
https://en.wikipedia.org/wiki/Northwind | Northwind may refer to:
Companies
Shorthand for Northern Power Systems, a wind energy company
Northwind (company), a Canadian computer software company that develops property management systems
Music
Northwind (album), album by the Swedish band Falconer
Northwinds, the second solo album by David Coverdale
Other
Northwind (Australian rules football team), Canada's national Australian rules football team
Northwind (comics), a fictional character in the DC Universe
USCGC Northwind (WAGB-282), a United States Coast Guard icebreaker
Northwind Glacier, a large glacier in Antarctica
Northwind Traders: a database sample that is shipped along with Microsoft Access application.
See also
North wind |
https://en.wikipedia.org/wiki/Silent%20Hunter%204%3A%20Wolves%20of%20the%20Pacific | Silent Hunter 4: Wolves of the Pacific (known in the United States as Silent Hunter: Wolves of the Pacific) is a computer submarine simulation for Windows developed by Ubisoft Bucharest and published by Ubisoft in 2007. It places the player in command of a U.S. Navy submarine during World War II and takes place in the Pacific theater. The game allows players a variety of play modes including career, single war patrol and single battle engagements. An expansion pack, The U-Boat Missions, was released in 2008.
Gameplay
The simulation uses detailed and accurate 3D graphics to immerse the player in the environment of a World War II submarine. The systems of the vessel are largely functional and the player is exposed to many aspects of submarine warfare of the time. The game allows the player to choose how realistic and challenging the game experience is to be and it is designed to allow new players to easily master the basic game play, while allowing for experienced users to manually control systems such as crew management, torpedo allocation, radar, sonar and target trigonometry.
Like its predecessor Silent Hunter 3, the simulation features a dynamic campaign. The game gives players various mission objectives and unique rewards, and attempts to make each campaign a unique experience. The major naval battles of the war in the Pacific, such as the Battle of Midway, are re-enacted and players are informed of them by in-game radio messages. Unlike the earlier title, however, the game gives more specific and varied mission objectives during the campaign—including rescues, reconnaissance and agent insertions—rather than just assigning a specific patrol area.
Multiplayer
Until Ubisoft shut down the servers for the game in 2013, Silent Hunter 4 featured an online adversarial mode and gave players the opportunity to command Japanese destroyers and pit them against US submarines. Servers supported up to eight players and let them choose from several scripted and generated missions.
Critical reception
The game received "generally favorable reviews" according to video game review aggregator Metacritic. Due to concerns relating to the Stolen Valor Act of 2005, as well as U.S. federal laws regarding depictions of the Medal of Honor at the time, the original release of the game awarded players with fictional decorations which in no way resembled actual United States military awards. This drew heavy criticism from many players, leading to several mods which altered the game to display actual United States decorations. The original "shelf version" of the game was never updated; all game versions, including those downloadable on Steam, continue to depict fictional awards in lieu of actual United States combat decorations.
Expansion pack
On October 31, 2007 Ubisoft announced The U-Boat Missions add-on to Silent Hunter 4. It was released in Europe on February 29, 2008 and in North America on March 24, 2008. The expansion focuses on the German U-boat campa |
https://en.wikipedia.org/wiki/Renuka%20Sanctuary | The Renuka Sanctuary is a nature sanctuary. It is situated in Sirmour district in Himachal Pradesh and is connected to a network of roads. It covers about 4.028 square kilometres. Also known as Renuka Reserve Forest, it has been formally declared a sanctuary (). A further area of roughly about 3 square kilometres that lies outside the sanctuary has been declared as a buffer area.
Religious aspect
The area is well recognized by its religious, aesthetic and cultural value. Renuka is an abode of temples of the mother-and-son duo of Renuka and Lord Parshuram. Mythologically Renukaji is an incarnation of Goddess Durga. She was the wife of Rishi Jamadagni. Parshuram believed to be the sixth incarnation of Lord Vishnu. He was the youngest of the five sons of the couple.
Renuka was considered extremely beautiful. Sahastarva, the emperor, wanted to marry her and once when Parshuram was away, he killed Rishi Jamadagni and his four sons to marry Renukaji. To escape the clutches of the emperor Renukaji jumped into small pond, known by the name of the Ramsarover at that time, and vanished into it. Ever since the lake is worshiped as Renuka lake.
Geographic aspect
The sanctuary falls in the bio-geographical zone IV and biogeographical province IV as per the classification done by the Wildlife Institute of India (WII). According to forest types classification, the area falls under group 5B/C2 i.e. dry mixed deciduous forest and group 5/051 i.e. dry sal forest.
The forest bears a mixed crop of Anogeissus, Lucinea, Terminalia, Khair, Shisham, carrie mangos, Cordia and a number of climbers in moist depressions.
The fauna includes the leopard, sambar, spotted deer, barking deer, jackal, hare, jungle cat, palm civet, porcupine, blue jay, black partridge, drongo, hill crow, scarlet minivet, bulbul, common coot, and green pigeon.
Renukaji Zoo is the oldest zoo in Himachal Pradesh. It was started in 1957 with rescued, stray and deserted wild animals. The first animal brought here was a male spotted deer named Moti. To accommodate the increasing number of animals, an open park was conceived and the park was established in 1983. Black buck and nilgai were brought from Pipli Zoo. A pair of mithun, gifted by Rajiv Gandhi, the prime minister of India in 1985, were brought from Arunachal Pradesh and another was brought from Nagaland in 1986. A pair of lions was brought to the zoo from Zunagarh in 1975.
The periphery of the area is fenced by inter-channeled chain fence to restrict the illegal entry of villagers to the area. At present the lion safari, zoo, aviary and sanctuary are under control of the administrative control of the Shimla Wildlife Division.
See also
Renuka Lake
References
External links
himachaltourism.nic.in
hptdc.gov.in
Wildlife sanctuaries in Himachal Pradesh
Sirmaur district
Geography of Sirmaur district
Protected areas with year of establishment missing
Renuka |
https://en.wikipedia.org/wiki/Giada%27s%20Weekend%20Getaways | Giada's Weekend Getaways is a show on the Food Network that ran from 2007 to 2008. The show follows chef Giada De Laurentiis around the U.S. for "3 day weekend adventures." The show begins Friday afternoon, as Giada arrives at her destination. She may begin with a light dinner, appetizer, and a cocktail. The bulk of the show happens on Saturday, beginning with a breakfast, some sight-seeing or activity, lunch, followed by another round of activity and finishes off with dinner, in which she goes all out, dresses up and has a night on the town. The show wraps up on Sunday with brunch and one last activity. the show was rerun on the Cooking Channel.
Season one
"Seattle": Cities and towns across the country are visited to seek out the best local food stops and activities. First up: Seattle's dining scene is explored with host Giada De Laurentiis. Included: French toast on a ferry ride; a martini happy hour; mini burgers. Aired January 12, 2007.
"Miami": The local fare of Miami's South Beach offers stone crabs and yellow tail snapper. Also: a hidden Italian restaurant. Giada also goes out for salsa lessons. Aired January 12, 2007.
"Los Angeles": Host Giada De Laurentiis lays out the perfect step-by-step three-day holiday in her own howetown, sunny Los Angeles. From a Friday cruise up the Pacific Coast Highway for the ultimate sunset sangria to a Sunday helicopter ride for fish and chips on the island of Catalina, Giada has a packed food weekend planned. Aired January 19, 2007.
"Jackson Hole": Giada De Laurentiis saddles up for the perfect food-filled weekend in the Old West, Jackson Hole, Wyoming. From a spicy Mexican hot chocolate to a real cowboy breakfast, it's a weekend of exploring the mountains and savoring great food. Aired January 26, 2007.
"New York City": Giada discovers the charm of the boroughs outside Manhattan as she dines in some of Brooklyn's hot spots and best kept secrets on a weekend in the Big Apple. February 2, 2007
"Santa Fe": Giada pays homage to the arts on a visit to Santa Fe. Highlights from the weekend include a chocolate artist, a pottery class and a tasting of Mexican flavors. February 9, 2007
"San Francisco": Giada has a weekend of food and fun in the bay that includes a game of bocce and a trip to the famous Ferry Building Marketplace. February 16, 2007
"Austin": Giada tastes steak, barbecue and other Texan treats when she visits one of the Lone Star State's trendiest cities. February 23, 2007
"Charleston, SC": Giada samples food and dabbles in ghost hunting in Charleston, SC, purportedly one of America's most haunted cities. March 9, 2007
"Napa/Sonoma":Giada enjoys a hot air balloon ride and olive oil tasting on a visit to California's wine country.March 16, 2007
"Chicago": Giada finds that variety is the spice of life when she samples the wide range of cuisines in the Windy City. March 30, 2007
"Newport, RI": Giada goes sailing and takes a scooter ride between bites in the seaside town of Newport, Rhode I |
https://en.wikipedia.org/wiki/Dell%20PowerConnect | The current portfolio of PowerConnect switches are now being offered as part of the Dell Networking brand: information on this page is an overview of all current and past PowerConnect switches as per August 2013, but any updates on current portfolio will be detailed on the Dell Networking page.
PowerConnect was a Dell series of network switches. The PowerConnect "classic" switches are based on Broadcom or Marvell Technology Group fabric and firmware. Dell acquired Force10 Networks in 2011 to expand its data center switch products.
Dell also offers the PowerConnect M-series which are switches for the M1000e blade-server enclosure and the PowerConnect W-series which is a Wi-Fi platform based on .
Starting in 2013 Dell will re-brand their networking portfolio to Dell Networking which covers both the legacy PowerConnect products as well as the Force10 products.
Product line
The Dell PowerConnect line is marketed for business computer networking. They connect computers and servers in small to medium-sized networks using Ethernet. The brand name was first announced in July 2001, as traditional personal computer sales were declining.
By September 2002 Cisco Systems cancelled a reseller agreement with Dell.
Previously under storage business general manager Darren Thomas, in September 2010 Dario Zamarian was named to head networking platforms within Dell.
PowerConnect switches are available in pre-configured web-managed models as well as more expensive managed models.
there is not a single underlying operating system: the models with a product-number up to 5500 run on a proprietary OS made by Marvell while the Broadcom powered switches run on an OS based on VxWorks. With the introduction of the 8100 series the switches will run on DNOS or Dell Networking Operating System which is based on a Linux kernel for DNOS 5.x and 6.x.
Via PowerConnect W-series Dell offers a range of Aruba WiFi products.
The Powerconnect-J (Juniper Networks) and B (Brocade) series are not longer sold, except for the B8000e/PCM8428-K full FCoE switches. Most of these products are now replaced by Force10 models.
Legacy Devices
This page is about the legacy Dell PowerConnect switches that are no longer for sale. For the current portfolio please see the Dell Networking page.
All Dell switches will be re-brand-ed to Dell Networking and will then have a different naming-system based on a letter and a 4 digit number. But the current PowerConnect rack-switches will keep their current name until they reach 'end-of'sales', except for the (new) 8100 series: these will be renamed to DN N-40xx series. The existing Force10 switches will mainly keep their current name and numbering (e.g. DN S-4800 series, DN S-5000, DN-Z9000 etc.
2200 and 2300 series
Models 2216 and 2224 were unmanaged, 10/100 Mbit/s Ethernet over twisted pair switches, with 16 and 24 ports each, respectively. They were discontinued.
The PowerConnect 2324 was similar to 2224, but includes 2 Gigabit Ethernet ports for up |
https://en.wikipedia.org/wiki/Komodo%20IDE | Komodo IDE is an integrated development environment (IDE) for dynamic programming languages. It was introduced in May 2000. Many of Komodo's features are derived from an embedded Python interpreter.
Komodo IDE uses the Mozilla and Scintilla code base, and supports many of the same features, languages and platforms, including the languages Python, Perl, PHP, Ruby, Tcl, SQL, Smarty, CSS, HTML and XML, and the operating systems Linux, OS X, and Windows. The editor component is implemented using the Netscape Plugin Application Programming Interface (NPAPI), with the Scintilla view embedded in the XML User Interface Language (XUL) interface in the same manner as a web browser plugin.
Komodo IDE has an open-source counterpart called Komodo Edit. Much of the code base is shared, although more advanced features are reserved for Komodo IDE such as debugging and unit testing.
Both Komodo Edit and IDE support user customizing via plug-ins and macros. Komodo plug-ins are based on Mozilla Add-ons and extensions can be searched for, downloaded, configured, installed and updated from within the application. Available extensions include a Document Object Model (DOM) inspector, pipe features, additional language support and user interface enhancements.
Komodo IDE has features such as integrated debugger support, DOM viewer, interactive shells, source code control integration, and the ability to select the engine used to run regular expressions, to ensure compatibility with the final deployment target. The commercial version also adds code browsing, a database explorer, collaboration, support for many popular source code control systems, and more. Independent implementations of some of these features, such as the database editor, git support, and remote FTP file access, are available in the free version via Komodo Edit's plugin system.
History
5.0: On 2008-11-03, ActiveState Software Inc. announced the release of Komodo IDE 5.0, which was built-on Mozilla 1.9 and Python 2.6.
With the creation of the subscription-based ActiveState platform in 2018, the Komodo IDE is now available only as part of an ActiveState Platform subscription.
Development of Komodo Edit and Komodo IDE was officially stopped in 2022, and the IDE was released as open source under the terms of Mozilla Public License.
References
External links
Gecko-based software
Linux integrated development environments
Linux text editors
MacOS text editors
Software that uses Scintilla
Software that uses XUL
Unix text editors
Windows text editors |
https://en.wikipedia.org/wiki/Chowder%20%28TV%20series%29 | Chowder is an American animated television series created by C. H. Greenblatt for Cartoon Network. It premiered on November 2, 2007. The series follows an aspiring young boy named Chowder and his day-to-day adventures as an apprentice in Chef Mung Daal's catering company. Although he means well, Chowder often finds himself in predicaments due to his perpetual appetite and his nature as a scatterbrain. Chowder's guidance in his goal to become a master chef is influenced by Mung's wife, Truffles; Mung's assistant, Shnitzel; Mung's rival, Endive; Endive's apprentice, who has a perpetual crush on Chowder, Panini; as well as other side characters.
Chowder ran for three seasons with a total of 49 episodes. It received mostly positive reviews, as well as one Primetime Emmy Award win, six Annie Award nominations, and two additional Emmy Award nominations during its run. The series finale, "Chowder Grows Up", aired on August 7, 2010.
Plot
The series revolves a chubby purple cat-bear-rabbit hybrid named Chowder as an aspiring young cook at Chef Mung Daal's catering company. Though he is lighthearted and carefree, Chowder's actions habitually land him in circumstances beyond his control, partly due to his large appetite and absent-mindedness. Mung and his wife Truffles, Mung's rock monster employee Schnitzel, and Chowder's gaseous pet Kimchi all try to aid Chowder in his ambitions to become a great chef, but frequently find themselves undermined by the calamitous antics that ensue. Chowder is also undermined by Panini, a girl who has an unrequited love for Chowder, going so far as to say that he is her boyfriend despite the pair not actually dating.
Episodes
Characters
Each character is named after a type of food or dish.
Main
Chowder (voiced by Nicky Jones): A chubby purple hybrid who serves as an apprentice under the chef Mung Daal, Chowder lives with him and his wife, Truffles, in a room at the top of the catering business. Chowder wants to become a great chef, but he is very impulsive and scatterbrained and often gives in to his urges. He has a large appetite and eats anything, even a customer's order. Chowder can also regurgitate objects, and he is used as a storage container by the other characters. According to Greenblatt, he is a composite of a cat, a bear, and a rabbit, and his species was verified in at least one episode. C. H. Greenblatt voiced his adult self in the last episode.
Mung Daal (voiced by Dwight Schultz): The elderly chef who runs the catering company at which Chowder works. He serves as his cooking master. Although his exact age has not been stated, he has mentioned that he has cooked for at least 386 years, and he celebrated 450 years of marriage to Truffles. He likes to impress ladies to the point where as a child apprentice, he prepared a dish incorrectly due to becoming distracted. He is a light blue-colored humanoid with an oversized nose, ears, and a white mustache. He is named after the Indian dish mung daal. Greenbla |
https://en.wikipedia.org/wiki/Granby%20Runestone | The Granby Runestone (Swedish: Granbyhällen), designated as U 337 under the Rundata catalog, is one of the longest Viking Age runic inscriptions located in Uppland, Sweden.
Description
The Granby Runestone has a runic inscription carved on a boulder consisting of a memorial to a father, a mother and some other people. The father Finnvid's property is mentioned. Some of these family members are mentioned on the inscriptions on other local runestones. Kalfr is mentioned on inscriptions U 338 and U 341, which are located in Söderby, and on U 342, which is also located in Granby, and Ragnfríðr is mentioned on U 338.
The runic text states that the inscription was carved by the runemaster Visäte, who was active in Uppland during the last half of the eleventh century. There are seven other runestones signed by Visäte in Uppland, including U 74 in Husby, U 208 in Råcksta, U 236 in Lindö, U 454 in Kumla, U 669 in Kålsta, U 862 in Säva, and U Fv1946;258 in Fällbro. In the runic text Visäte spelled Guð ("God") using an o-rune instead of a u-rune, an alternative spelling which he also used on U 74 and in spelling the name Guðlaug on U Fv1972;172 in Lilla Vilunda.
The inscription is classified as being carved in runestone style Pr4, which is also known as the Urnes style. Inscriptions in this runestone style are characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks.
Inscription
A transliteration of the runic inscription into roman letters is:
+ hemik + uk + sialfi + uk + iohan + þeiʀ + lata hakua + eftʀ + faþur sin + finuiþ + uk + uarkas × uk × rahnfriþ + uk moþur sina + uk + at + ikikerþi + uk + at + kalf + uk + kiarþar + u- ...-at + (h)an ati ' ein × alt fyrst × þat × uaru × freantr þeia + koþ : hialbi + ant þaira + uiseti + risti × runa þisa
Gallery
See also
List of runestones
References
Other sources
The article Runristare - Swedish Museum of National Antiquities.
External links
Photography of stone and information - Swedish National Heritage Board.
Drawing of the inscription - Stockholm County Museum.
Runestones in Uppland
Runestones raised in memory of women |
https://en.wikipedia.org/wiki/North%20Shields%20Metro%20station | North Shields is a Tyne and Wear Metro station, serving the coastal town of North Shields, North Tyneside in Tyne and Wear, England. It joined the network on 14 November 1982, following the opening of the fourth phase of the network, between Tynemouth and St James via Wallsend.
History
The station, which was named Shields until 1874, was opened on 22 June 1839 by the Newcastle and North Shields Railway. Although originally a terminus station, the line was extended to Tynemouth in 1847, by the digging of a tunnel under North Shields.
The original station were replaced by the North Eastern Railway in 1890, by new booking offices constructed over the platforms. These survived until the mid-1960s, when they were replaced with a prefabricated structure by British Rail. During this time, the station roof was replaced with individual canopies over each platform.
Following closure for conversion in the early 1980s, the platform-level canopies and ramps from the entrance to the platform were retained, with the 1960s station entrance being replaced by a new structure.
Regeneration
By the end of the 2000s, the station structure was again becoming dated. Nexus drew up plans to replace it with facilities which would provide "a visually striking new gateway to the town centre". The new station was fully completed in September 2012, with changes including passenger lifts, wave-shaped canopies for each platform, and a new black, white and blue colour scheme. The ramps that had formerly provided access to the platforms were replaced with stairs.
Prior to refurbishment, the station had three platforms – consisting of two through platforms, and a bay platform at the south west of the station. The former bay platform, located at the south-west of the station, was used by terminating services from St James. Following the network's extension to Wearside in March 2002, these services were withdrawn.
Facilities
Step-free access is available at all stations across the Tyne and Wear Metro network, with two lifts and ramps providing step-free access to platforms at North Shields. The station is equipped with ticket machines, sheltered waiting area, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is fitted with automatic ticket barriers, which were installed following the station's refurbishment in 2012, as well as smartcard validators, which feature at all stations. The station also housed a Nexus TravelShop, which was located to the right of the station entrance. This has now closed.
There is no dedicated car parking available at the station. A taxi rank is located off Nile Street. There is the provision for cycle parking, with five cycle pods available for use.
Services
, the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains p |
https://en.wikipedia.org/wiki/Hubert%20Dreyfus%27s%20views%20on%20artificial%20intelligence | Hubert Dreyfus was a critic of artificial intelligence research. In a series of papers and books, including Alchemy and AI (1965), What Computers Can't Do (1972; 1979; 1992) and Mind over Machine (1986), he presented a pessimistic assessment of AI's progress and a critique of the philosophical foundations of the field. Dreyfus' objections are discussed in most introductions to the philosophy of artificial intelligence, including , a standard AI textbook, and in , a survey of contemporary philosophy.
Dreyfus argued that human intelligence and expertise depend primarily on unconscious processes rather than conscious symbolic manipulation, and that these unconscious skills can never be fully captured in formal rules. His critique was based on the insights of modern continental philosophers such as Merleau-Ponty and Heidegger, and was directed at the first wave of AI research which used high level formal symbols to represent reality and tried to reduce intelligence to symbol manipulation.
When Dreyfus' ideas were first introduced in the mid-1960s, they were met with ridicule and outright hostility. By the 1980s, however, many of his perspectives were rediscovered by researchers working in robotics and the new field of connectionism—approaches now called "sub-symbolic" because they eschew early AI research's emphasis on high level symbols. In the 21st century, statistics-based approaches to machine learning simulate the way that the brain uses unconscious process to perceive, notice anomalies and make quick judgements. These techniques are highly successful and are currently widely used in both industry and academia. Historian and AI researcher Daniel Crevier writes: "time has proven the accuracy and perceptiveness of some of Dreyfus's comments." Dreyfus said in 2007, "I figure I won and it's over—they've given up."
Dreyfus' critique
The grandiose promises of artificial intelligence
In Alchemy and AI (1965) and What Computers Can't Do (1972), Dreyfus summarized the history of artificial intelligence and ridiculed the unbridled optimism that permeated the field. For example, Herbert A. Simon, following the success of his program General Problem Solver (1957), predicted that by 1967:
A computer would be world champion in chess.
A computer would discover and prove an important new mathematical theorem.
Most theories in psychology will take the form of computer programs.
The press reported these predictions in glowing reports of the imminent arrival of machine intelligence.
Dreyfus felt that this optimism was unwarranted and based on false assumptions about the nature of human intelligence. Pamela McCorduck explains Dreyfus position:
A great misunderstanding accounts for public confusion about thinking machines, a misunderstanding perpetrated by the unrealistic claims researchers in AI have been making, claims that thinking machines are already here, or at any rate, just around the corner.
These predictions were based on the success of an "inf |
https://en.wikipedia.org/wiki/Jesmond%20Metro%20station | Jesmond is a Tyne and Wear Metro station, serving the suburb of Jesmond, Newcastle upon Tyne in Tyne and Wear, England. It joined the network on 11 August 1980, following the opening of the first phase of the network, between Haymarket and Tynemouth via Four Lane Ends.
History
The Tyne and Wear Metro station was designed by Faulkner-Brown Hendy Watkinson Stonor and L. J. Couves & Partners. It was chosen by Simon Jenkins as one of the top 100 stations in Britain, being described as a "miniature homage to the modernist architect Mies van der Rohe". In the treatment of the roof detailing and glass external walls, there are some similarities to Mies' New National Gallery in Berlin.
The former North Eastern Railway station was built in the 1860s, to a design by John Dobson. The station opened under the Blyth and Tyne Railway, which ran from Blyth to Newcastle New Bridge Street. The line was later linked to Newcastle Central, and became part of the North Tyneside Loop.
The station closed in January 1978, to allow for the construction of the Tyne and Wear Metro network, using a new alignment in a tunnel, bypassing the original station. The new station was built to the north west of the former, re-opening in August 1980.
The main station building is still present, and is now The Carriage public house. The building is grade II listed and is the last remaining station of the former Blyth and Tyne Railway. A mockup of a signal box was built in the early 1990s, on the site of the former station master's house (demolished in the late 1970s), forming part of a restaurant, along with an old railway carriage.
A line still runs through the former station linking, the Tyne and Wear Metro line to the north of Jesmond, with the line to the west of Manors.
Facilities
Step-free access is available at all stations across the Tyne and Wear Metro network, with two lifts providing step-free access to platforms at Jesmond. The station is equipped with ticket machines, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is fitted with automatic ticket barriers, which were installed at 13 stations across the network during the early 2010s, as well as smartcard validators, which feature at all stations. The station houses a newsagent's shop and coffee kiosk.
There is no dedicated car parking available at this station. There is the provision for cycle parking, with five cycle pods available for use.
Services
, the station is served by up to ten trains per hour on weekdays and Saturday, and up to eight trains per hour during the evening and on Sunday. Additional services operate between and , , or at peak times.
Rolling stock used: Class 599 Metrocar
Art
The Garden Front art installation, was commissioned for the station in 1978, and was designed by sculptor Raf Fulcher. It is l |
https://en.wikipedia.org/wiki/Linutop | The Linutop is a small, light, environmentally friendly Nettop computer containing a metal case and no moving parts, that runs the Linutop OS (a customized version of Linux based on the Xubuntu and Ubuntu/XFCE distribution).
Linutop Kiosk software and Linutop Tv server offer a full Digital signage solution.
A variety of QT applications oriented towards secure web browsing and digital signage are available in the Operating system. Linutop is multimedia-capable and offers line-out/mic-in for sound. The device can be configured easily into a LTSP thin client. Linutop is suited for use in internet cafés, public libraries and schools.
History
Linutop 1
The first device was based on the ThinCan reference design from Estonian company Artec Group.
Linutop 2
On February 20, 2008, the company unveiled the Linutop 2 based on the FIC ION A603 mini PC (like Works Everywhere Appliance). Linutop 2 had a stronger Geode processor and more memory, allowing it to run OpenOffice.org. It has 512 MB RAM and 1 GB flash memory storage.
Hardware
Specifications
Linutop XS
The Linutop XS is the smallest computer offered by Linutop. Due to its small size, and the absence of fan making it very silent, it is often hidden behind the dynamic display screens by professionals. The compact Linutop XS comes in a small aluminum case with dimensions 9 x 6 x 2 cm ( 3,5 x 2,3 x 0,8in ) for a weight of 92 grams (3 oz) and a power consumption of 3 Watts. On board, there is a processor running at 900 MHz, a RAM of 1 GB and an 8 GB flash memory.
Connectors: HDMI, mini-jack audio, RJ-45 Ethernet, four USB 2.0, 5-volt micro USB power.
The Linutop XS is a professional packaging of the Raspberry Pi 2 and incorporates a 1080p HD video Hardware accelerator. With this compact configuration, designed for the fields of education, transport, trade and health for
the dissemination of information.
Linutop 6
Linutop 6 is the most powerful Linutop.
The Linutop 6 microcomputer is in the form of a small fanless metal case with dimensions 9.5 x 9.1 x 3.6 cm (3,7 x 3,6 x 1,4in ) for a weight of 350 grams (12 oz) and an energy consumption of 14 Watts. On board, there is an Intel ATOM x5-Z8350 processor, a 2GB RAM and a 16GB flash memory.
Connectors: HDMI, RJ-45 Ethernet, four USB 2.0, 5-volt power supply.
With this configuration, the Linutop 6 computer targets a varied use where compactness and power are required.
Linutop OS
Linutop Kiosk
Linutop Kiosk is a software in Linutop OS that allows you to easily configure:
A secure Internet access point.
A dynamic display, multi-format (photos, HD videos, MP3, web pages, music, PDF ...)
Linutop OS 14.04 for PC
Linutop OS 14.04 is based on Xubuntu / XFCE
It contains features designed for business use cases:
Firefox 44, Libre Office 4, et VLC 2, Terminal server client, pdf viewer, GNU Paint, Mirage, Archive Manager, VNC, Gedit, Samba
Internet kiosk : Full screen, toolbar management, white/blacklist management.
Display kiosk : user can d |
https://en.wikipedia.org/wiki/Klepp%20I%20Runestone | The Klepp I Runestone, listed as N 225 in the Rundata catalog, is one of two runestones from Klepp in Rogaland, Norway. It is among the few Viking Age runestones that was raised as a memorial to a woman.
Description
The Klepp I Runestone has three lines of runic text on two sides of the stone. The runic inscription ends with a cross, indicating that it dates from after the local conversion to Christianity, or the late 10th or early 11th century. The inscription provides an early example of the use of the name Kleppr, which means "rocky hill," for the town of Klepp. It has been suggested that the detailed description of the family relationships in the inscription may have been to document the inheritance of the estate of the deceased woman Ásgerðr. The details of the family ties indicate the different ways that Ásgerðr could inherit property and how it then could be divided among the living.
Although the runestone is classified as a Christian monument, Ásgerðr combines two name elements from Norse paganism: Ás, which refers to one of the Æsir, the main group of Norse gods, and the name of the goddess Gerðr, who was the wife of the god Freyr.
Inscription
Transliteration of the runes into Latin characters
A: þurir : harþar:sunr : raisti : stain : þina : ¶ aft : oskarþi : kuon : sina : (t)u(t)ur : kunars (:)
B: bruþur : halka : o : klabi +
Transcription into Old Norse
A: Þórir Harðarsonr reisti stein þenna ept Ásgerði, kván sína, dóttur Gunnars,
B: bróður Helga á Kleppi.
Translation in English
A: Þórir Harðr's son raised this stone in memory of his wife Ásgerðr, daughter of Gunnarr
B: (the) brother of Helgi of Kleppr.
See also
List of runestones
References
External links
Norske runeinnskrifter med de yngre runer, shows Norwegian inscriptions with images
Runestones raised in memory of women
Runestones in Norway
10th-century inscriptions
11th-century inscriptions |
https://en.wikipedia.org/wiki/DSSP%20%28algorithm%29 | The DSSP algorithm is the standard method for assigning secondary structure to the amino acids of a protein, given the atomic-resolution coordinates of the protein. The abbreviation is only mentioned once in the 1983 paper describing this algorithm, where it is the name of the Pascal program that implements the algorithm Define Secondary Structure of Proteins.
Algorithm
DSSP begins by identifying the intra-backbone hydrogen bonds of the protein using a purely electrostatic definition, assuming partial charges of −0.42 e and +0.20 e to the carbonyl oxygen and amide hydrogen respectively, their opposites assigned to the carbonyl carbon and amide nitrogen. A hydrogen bond is identified if E in the following equation is less than -0.5 kcal/mol:
where the terms indicate the distance between atoms A and B, taken from the carbon (C) and oxygen (O) atoms of the C=O group and the nitrogen (N) and hydrogen (H) atoms of the N-H group.
Based on this, eight types of secondary structure are assigned. The 310 helix, α helix and π helix have symbols G, H and I and are recognized by having a repetitive sequence of hydrogen bonds in which the residues are three, four, or five residues apart respectively. Two types of beta sheet structures exist; a beta bridge has symbol B while longer sets of hydrogen bonds and beta bulges have symbol E. T is used for turns, featuring hydrogen bonds typical of helices, S is used for regions of high curvature (where the angle between and is at least 70°), and a blank (or space) is used if no other rule applies, referring to loops. These eight types are usually grouped into three larger classes: helix (G, H and I), strand (E and B) and loop (S, T, and C, where C sometimes is represented also as blank space).
π helices
In the original DSSP algorithm, residues were preferentially assigned to α helices, rather than π helices. In 2011, it was shown that DSSP failed to annotate many "cryptic" π helices, which are commonly flanked by α helices. In 2012, DSSP was rewritten so that the assignment of π helices was given preference over α helices, resulting in better detection of π helices. Versions of DSSP from 2.1.0 onwards therefore produce slightly different output from older versions.
Variants
In 2002, a continuous DSSP assignment was developed by introducing multiple hydrogen bond thresholds, where the new assignment was found to correlate with protein motion.
See also
STRIDE (algorithm) an alternative algorithm
Chris Sander (scientist)
References
External links
DSSP Analysis tool
Continuous DSSP tool
Protein structure |
https://en.wikipedia.org/wiki/British%20Rail%20Classes%20341%20and%20342 | Class 341 and Class 342 were proposed electric multiple unit classes from the Networker series, to be introduced in the late 1990s. The trains were planned to run on the Channel Tunnel Rail Link and Crossrail projects. Both projects were halted in the early 1990s, following the early 1990s recession. With the subsequent privatisation of British Rail in 1994, neither train was ordered.
Class 341
Class 341 was intended as the rolling stock for the Crossrail project, and would have entered service in the late 1990s. A mock-up unit demonstrating the design of the train (and moquette) was built in 1991. At one point, the Class 341 would form part of the Networker family of trains as 'Networker Crossrail'. The Crossrail project was rejected by Parliament in 1994, and the train was not ordered.
The specifications drawn up for the Class 341 were subsequently used as a base for laying down specifications for the new Class 345 units built to run on Crossrail. The Bombardier built Class 345 units were introduced in June 2017, with the Crossrail project opening as the Elizabeth line in May 2022.
Class 342
Class 342 was intended to operate domestic services on the Channel Tunnel Rail Link (CTRL) high speed line between London and the Kent coast. Plans for the high speed line were delayed in the early 1990s, and the trains never got beyond the proposal stage.
The CTRL (now High Speed 1) was subsequently built from 1998 onwards, and was completed in 2007. Domestic services began running in 2009, operated by Southeastern using Hitachi built Class 395 high speed trains.
References
341
Abandoned trains of the United Kingdom |
https://en.wikipedia.org/wiki/RK%20Launcher | RK Launcher is a free application intended to generate a dock on the side of a Windows computer screen. The application has support for themes and can support docklets made for ObjectDock and Y'z Dock. Icons with the file extension .PNG and .ICO can be placed on the dock for shortcuts to applications and documents. The application also mimics the smooth zooming and scrolling effects of the Mac OS X smooth zooming animations, as well as the effects used when minimizing windows (Aladdin's Lamp Effect).
See also
Dock (computing)
RocketDock
ObjectDock
Xwindows dock
Avant Window Navigator
Y'z Dock
MobyDock
References
Anke Anlauf (January 14, 2010), Schmucke PC-Docks wie auf dem Mac , Softonic OnSoftware
External links
www.thewindowsclub.com/rk-launcher-for-windows
Application launchers
Windows-only freeware |
https://en.wikipedia.org/wiki/Diffing | Diffing may refer to:
A type of drifting (motorsport) or doughnut (driving)
diffing, use of the utility in computing |
https://en.wikipedia.org/wiki/Mark%20Daley | Mark Daley is a Northern Irish-born American broadcaster.
Recent career
Since 2015, Daley has been a contributor to NPR network news shows on new music.
Early career
Daley’s radio career began at the BBC in Northern Ireland in 1983 as a reporter. He switched channels in 1985 to Downtown Radio where he produced and presented his own nighttime Indie music and talk show—exposing new bands. Moving to London, England in the late 1980s, Daley joined BBC Greater London Radio (GLR), the station whose presenter line-up included Chris Evans, Kevin Greening, Janis Long, and Johnnie Walker MBE. Crossing the Atlantic in 1994, Daley became a Disk Jockey at the influential modern rock station WHFS.
A keen environmentalist, Daley left WHFS in 1999 to create and program Zero24-7 Web Radio, the world’s first internet radio station to mix progressive music with a green progressive message and to be programmed by professional broadcasters. Streaming globally and playing locally, the station was featured in media such as CNN and The Washington Post.
Zero24-7 was awarded the 1999 OMB Watch Grand Prize for "effective use of technology in their public policy activities."
As BBC America’s Music Expert from 1999 to 2003, Daley was at the forefront of exposing UK bands such as The Chemical Brothers, Stereophonics, and The Beta Band to the US audience.
Daley joined the emerging satellite radio revolution in 2000, hosting shows on WorldSpace Satellite Radio channels BOB, The System and UPOP. He was the American and international host of BRIT40 and the music and pop culture show The Daley Planet on Sirius XM Satellite Radio and WorldSpace Satellite Radio. He also hosted numerous specials including most recently the 2006 V Festival USA, The Brit Awards 2007, and the UPOP Sessions at Abbey Road 2007 and 2008.
References
External links
Year of birth missing (living people)
Living people
American radio personalities
Radio DJs from Northern Ireland
Northern Ireland emigrants to the United States
Place of birth missing (living people) |
https://en.wikipedia.org/wiki/Ascendency | Ascendency or ascendancy is a quantitative attribute of an ecosystem, defined as a function of the ecosystem's trophic network. Ascendency is derived using mathematical tools from information theory. It is intended to capture in a single index the ability of an ecosystem to prevail against disturbance by virtue of its combined organization and size.
One way of depicting ascendency is to regard it as "organized power", because the index represents the magnitude of the power that is flowing within the system towards particular ends, as distinct from power that is dissipated naturally. Almost half a century earlier, Alfred J. Lotka (1922) had suggested that a system's capacity to prevail in evolution was related to its ability to capture useful power. Ascendency can thus be regarded as a refinement of Lotka's supposition that also takes into account how power is actually being channeled within a system.
In mathematical terms, ascendency is the product of the aggregate amount of material or energy being transferred in an ecosystem times the coherency with which the outputs from the members of the system relate to the set of inputs to the same components (Ulanowicz 1986). Coherence is gauged by the average mutual information shared between inputs and outputs (Rutledge et al. 1976).
Originally, it was thought that ecosystems increase uniformly in ascendency as they developed, but subsequent empirical observation has suggested that all sustainable ecosystems are confined to a narrow "window of vitality" (Ulanowicz 2002). Systems with relative values of ascendency plotting below the window tend to fall apart due to lack of significant internal constraints, whereas systems above the window tend to be so "brittle" that they become vulnerable to external perturbations.
Sensitivity analysis on the components of the ascendency reveals the controlling transfers within the system in the sense of Liebig (Ulanowicz and Baird 1999). That is, ascendency can be used to identify which resource is limiting the functioning of each component of the ecosystem.
It is thought that autocatalytic feedback is the primary route by which systems increase and maintain their ascendencies (Ulanowicz 1997.)
References
Ulanowicz, R.E. 1986. Growth & Development: Ecosystems Phenomenology. Springer-Verlag, NY. 203 p.
Ulanowicz, R.E. 1997. Ecology, the Ascendent Perspective. Columbia University Press, NY. 201p.
Information theory
Entropy and information
Trophic ecology |
https://en.wikipedia.org/wiki/Tax-benefit%20model | A tax-benefit model is a form of microsimulation model. It is usually based on a representative or administrative data set and certain policy rules. These models are used to cost certain policy reforms and to determine the winners and losers of reform. One example is EUROMOD, which models taxes and benefits for 27 EU states, and its post-Brexit offshoot, UKMOD.
Overview
Tax-benefit models are used by policy makers and researchers to examine the effects of proposed or hypothetical policy changes on income inequality, poverty and government budget. Their primary advantage over conventional cross-country comparison method is that they are very powerful at evaluating policy changes not only ex post, but also ex ante.
Generally, tax-benefit models can simulate income taxes, property taxes, social contributions, social assistance, income benefits and other benefits.
The underlying micro-data are obtained mainly through household surveys. These data include information about households' income, expenditure and family composition.
Most of the tax-benefit models are operated by governments or research institutions. Very few models are publicly available.
Depending on their purpose, tax-benefit models may or may not ignore behavioral responses of individuals.
General framework
The basic steps in conducting research using a simple tax-benefit model are:
Gross micro-data describing households' income, expenditure and family composition are collected and processed;
These data enter a tax-benefit model;
First simulation takes place;
Disposable income of each household is calculated and the results of the simulation are summarized;
A set of rules of the policies enters the model and the second simulation takes place;
Disposable income of each household is calculated and the results of the simulation are summarized;
The impact of the set of policy changes is evaluated by comparing the results from the two simulations.
A dynamic tax-benefit model PoliSim's webpage provides an illustration diagram of the process. Since this model is dynamic, it also requires data on probabilistic characteristics of the underlying population. These data would be created in step 1 and enter the model in step 2.
Taxonomy
Basically, there are two properties that make given tax-benefit models different from each other. A model can be:
Arithmetical or behavioral;
Static or dynamic.
Arithmetical vs. behavioral tax-benefit models
Arithmetical tax-benefit models can be viewed as advanced calculators. They typically show only direct effects of the reform on individuals' disposable income, tax revenue, income inequality and other aspects of interest. These models do not take into account behavioral responses of people such as decreased labor supply induced by a tax hike. This is not problematic when, for example, a researcher is only interested in studying the effects of a marginal change in tax liability on overall inequality.
On the other hand, behavioral tax-benef |
https://en.wikipedia.org/wiki/Data%20hub | A data hub is a center of data exchange that is supported by data science, data engineering, and data warehouse technologies to interact with endpoints such as applications and algorithms.
Features
A data hub differs from a data warehouse in that it is generally unintegrated and often at different grains. It differs from an operational data store because a data hub does not need to be limited to operational data.
A data hub differs from a data lake by homogenizing data and possibly serving data in multiple desired formats, rather than simply storing it in one place, and by adding other value to the data such as de-duplication, quality, security, and a standardized set of query services. A data lake tends to store data in one place for availability, and allow/require the consumer to process or add value to the data.
Data hubs are ideally the "go-to" place for data within an enterprise, so that many point-to-point connections between callers and data suppliers do not need to be made, and so that the data hub organization can negotiate deliverables and schedules with various data enclave teams, rather than being an organizational free-for-all as different teams try to get new services and features from many other teams.
References
Data management
Database management systems |
https://en.wikipedia.org/wiki/Rod%20Burstall | Rodney Martineau "Rod" Burstall FRSE (born 1934) is a British computer scientist and one of four founders of the Laboratory for Foundations of Computer Science at the University of Edinburgh.
Biography
Burstall studied physics at the University of Cambridge, then an M.Sc. in operational research at Birmingham University. He worked for three years before returning to Birmingham University to earn a Ph.D. in 1966 with thesis titled Heuristic and Decision Tree Methods on Computers: Some Operational Research Applications under the supervision of N. A. Dudley and K. B. Haley.
Burstall was an early and influential proponent of functional programming, pattern matching, and list comprehension, and is known for his work with Robin Popplestone on POP, an innovative programming language developed at Edinburgh around 1970, and later work with John Darlington on NPL and program transformation and with David MacQueen and Don Sannella on Hope, a precursor to Standard ML, Miranda, and Haskell.
In 1995, he was elected a Fellow of the Royal Society of Edinburgh.
Burstall retired in 2000, becoming Professor Emeritus.
In 2002 David Rydeheard and Don Sannella assembled a festschrift for Rod Burstall that was published in Formal Aspects of Computing.
In 2009, he was awarded the ACM SIGPLAN Programming Language Achievement Award.
Books
May 1971: Programming in POP-11, Edinburgh University Press.
1980: (with Alan Bundy) Artificial Intelligence: An Introductory Course, Edinburgh University Press.
1988: (with D. E. Rydeheard) Computational Category Theory, Prentice-Hall, .
References
External links
University of Edinburgh home page
Rod Burstall Home Page
1934 births
Living people
Scientists from Liverpool
British computer scientists
Formal methods people
History of computing in the United Kingdom
Academics of the University of Edinburgh
Alumni of the University of Cambridge
Alumni of the University of Birmingham |
https://en.wikipedia.org/wiki/Phrase%20chunking | Phrase chunking is a phase of natural language processing that separates and segments a sentence into its subconstituents, such as noun, verb, and prepositional phrases, abbreviated as NP, VP, and PP, respectively. Typically, each subconstituent or chunk is denoted by brackets.
See also
Terminology extraction
Part-of-speech tagging
Constituent (linguistics)
External links
TermExtractor
TreeTagger Chunker
References
Tasks of natural language processing |
https://en.wikipedia.org/wiki/Goodman%20and%20Kruskal%27s%20gamma | In statistics, Goodman and Kruskal's gamma is a measure of rank correlation, i.e., the similarity of the orderings of the data when ranked by each of the quantities. It measures the strength of association of the cross tabulated data when both variables are measured at the ordinal level. It makes no adjustment for either table size or ties. Values range from −1 (100% negative association, or perfect inversion) to +1 (100% positive association, or perfect agreement). A value of zero indicates the absence of association.
This statistic (which is distinct from Goodman and Kruskal's lambda) is named after Leo Goodman and William Kruskal, who proposed it in a series of papers from 1954 to 1972.
Definition
The estimate of gamma, G, depends on two quantities:
Ns, the number of pairs of cases ranked in the same order on both variables (number of concordant pairs),
Nd, the number of pairs of cases ranked in reversed order on both variables (number of reversed pairs),
where "ties" (cases where either of the two variables in the pair are equal) are dropped.
Then
This statistic can be regarded as the maximum likelihood estimator for the theoretical quantity , where
and where Ps and Pd are the probabilities that a randomly selected pair of observations will place in the same or opposite order respectively, when ranked by both variables.
Critical values for the gamma statistic are sometimes found by using an approximation, whereby a transformed value, t of the statistic is referred to Student t distribution, where
and where n is the number of observations (not the number of pairs):
Yule's Q
A special case of Goodman and Kruskal's gamma is Yule's Q, also known as the Yule coefficient of association, which is specific to 2×2 matrices. Consider the following contingency table of events, where each value is a count of an event's frequency:
Yule's Q is given by:
Although computed in the same fashion as Goodman and Kruskal's gamma, it has a slightly broader interpretation because the distinction between nominal and ordinal scales becomes a matter of arbitrary labeling for dichotomous distinctions. Thus, whether Q is positive or negative depends merely on which pairings the analyst considers to be concordant, but is otherwise symmetric.
Q varies from −1 to +1. −1 reflects total negative association, +1 reflects perfect positive association and 0 reflects no association at all. The sign depends on which pairings the analyst initially considered to be concordant, but this choice does not affect the magnitude.
In term of the odds ratio OR, Yule's Q is given by
and so Yule's Q and Yule's Y are related by
See also
Kendall tau rank correlation coefficient
Goodman and Kruskal's lambda
Yule's Y, also known as the coefficient of colligation
References
Further reading
Sheskin, D.J. (2007) The Handbook of Parametric and Nonparametric Statistical Procedures. Chapman & Hall/CRC,
Rankings
Statistical tests
Summary statistics for contingency tables |
https://en.wikipedia.org/wiki/Lee%20Daniel%20Crocker | Lee Daniel Crocker (born July 3, 1963) is an American computer programmer. He is best known for rewriting the software upon which Wikipedia runs, to address scalability problems. This software, originally known as "Phase III", went live in July 2002 and became the foundation of what is now called MediaWiki. MediaWiki's code repository was still named "phase3" until the move from Subversion to Git in March 2012.
He is a co-author of the PNG specification, and was also involved in the creation of the GIF and JPEG image file formats. He invented the per-scanline variable pre-filtering compression method used by PNG, the sum-of-abs heuristic used by many encoding programs, and proposed an early version of the Adam7 algorithm, using 5 passes rather than 7. In 1998, he was one of the 23 original creators of the "Transhumanist Declaration". As of 1999, he was a member of the Extropians futurist society.
In June 2010, Crocker was among those recognized by the Software Tools Users Group (STUG) as a major contributor to MediaWiki when they awarded MediaWiki and the Wikimedia Foundation the USENIX Advanced Computing Technical Association STUG award for "the largest collaboratively edited reference projects in the world, including Wikipedia".
See also
List of Wikipedia people
References
External links
Information Week May 7, 2007: The Best Web Software Ever Written
San Diego Union-Tribune December 6, 2004: Everyone's Encyclopedia
Dr. Dobb's Journal #232 July 1995 (Vol 20, Issue 7), pp. 36–44: PNG: The Portable Network Graphic Format
1963 births
Living people
American transhumanists
Extropians
Free software programmers
American software engineers
American Wikimedians
Wikipedia people |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.