source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Twin%20Prime%20Search | Twin Prime Search (TPS) is a volunteer computing project that looks for large twin primes. It uses the programs LLR (for primality testing) and NewPGen (for sieving). It was founded on April 13, 2006, by Michael Kwok. In number theory, it is conjectured that there are infinitely many twin primes, and this is known as the Twin prime conjecture.
Progress
TPS found a record twin prime, 2003663613 × 2195000 ± 1, on January 15, 2007, on a computer operated by Eric Vautier. It is 58,711 digits long, which made it the largest known twin prime at the time. The project worked in collaboration with PrimeGrid, which did most of the LLR tests.
On August 6, 2009, those same two projects announced that a new record twin prime had been found. The primes are 65516468355 × 2333333 ± 1, and have 100,355 digits. The smaller of the two primes is also the largest known Chen prime as of August 2009.
On December 25, 2011, Timothy D Winslow found the world's largest known twin primes 3756801695685 × 2666669 ± 1 (official announcement: http://www.primegrid.com/download/twin-666669.pdf ).
, the current largest twin prime pair known is 2996863034895 · 21290000 ± 1, with 388,342 decimal digits. It was discovered on September 14, 2016.
The decimal representations of the first two primes listed above are at http://4unitmaths.com/tp1.pdf and http://4unitmaths.com/tp2.pdf .
Current efforts
TPS has three sub-projects : A search for k × 2390000 ± 1, a variable twin search to find twins between 144,500 and 150,500 digits, and a search called Operation Megabit Twin for k × 21,000,000 ± 1.
See also
List of volunteer computing projects
PrimeGrid
References
External links
Twin Prime Search forum
Volunteer computing projects
Distributed prime searches |
https://en.wikipedia.org/wiki/Word%20mark%20%28computer%20hardware%29 | In computer hardware, a word mark or flag is a bit in each memory location on some variable word length computers (e.g., IBM 1401, 1410, 1620) used to mark the end of a word. Sometimes the actual bit used as a word mark on a given machine is not called word mark, but has a different name (e.g., flag on the IBM 1620, because on this machine it is multipurpose).
The term word mark should not be confused with group mark or with record mark, which are distinct characters.
References
Computing terminology
Early computers |
https://en.wikipedia.org/wiki/LaborNet | LaborNet is an AFL–CIO-backed online network focused on the labour movement.
History
LaborNet was launched following the 1990 NAFTA which created an interest to develop stronger union networks across borders to grow leverage against multinational corporations. Several bulletin board services were set up. Aside from LaborNet, SoliNet was created in Canada and La Neta in Mexico.
The LaborNet internet network was created in 1991 (or 1990) by the AFL–CIO (or the IGC/APC) to give a new boost to the labor movement. LaborNet was organized around industrial lines, allowing workers from different unions to communicate with each others.
The intent of LaborNet was to develop a labor-focused social network for activism. It was AFL-CIO's first two-way communication tool. Users had access to forums and could upload pdf files.
By 1992, LaborNet migrated its hosting to CompuServe. By 1995, LaborNet had 1000 subscribers, including 35 community labor councils. It moved to its own independent website in 1999. The plan was to further develop the social features of the website. By the end of the 1990s, LaborNet had 1,400 members. In 2001, LaborNet was established in Japan, where it held annual awareness events such as the Labor Fiesta and Union, Yes!.
Description
According to LaborNet's website, its "founders believe that the new communication technology must be put to use to revitalize and rebuild the labor movement." LaborNet aims to act as a syndicator for labor-related news and calls to actions
LaborNets are also set up in Canada, United Kingdom, Austria, Germany, Japan and Korea.
References
External links
Official website
Organizations established in 1991
Organizations based in San Francisco
Information technology organizations based in North America
Political organizations based in the United States
1991 establishments in California |
https://en.wikipedia.org/wiki/SDLT | SDLT may refer to:
Stamp Duty Land Tax, a tax on property purchase in the United Kingdom
Digital Linear Tape: Super DLT, a data storage technology |
https://en.wikipedia.org/wiki/The%20N%20Soundtrack | The N Soundtrack is a soundtrack album for Noggin's teen programming block, The N. It features songs from shows that were airing at the time: Degrassi: The Next Generation (season 5), Beyond the Break (season 1), South of Nowhere (season 1), Instant Star (season 1), and Whistler (season 1).
It was released as a digital download on August 1, 2006, and as a CD on August 29, 2006. The N Soundtrack contains the first recording by Drake.
Track listing
References
Amazon.com profile
CDUniverse profile
iTunes Store (United States) profile
2006 compilation albums
2006 soundtrack albums
Albums produced by Boi-1da
Nickelodeon
Soundtrack compilation albums
Television soundtracks |
https://en.wikipedia.org/wiki/Houston%20Automatic%20Spooling%20Priority | The Houston Automatic Spooling Priority Program, commonly known as HASP, is an extension of the IBM OS/360 operating system and its successors providing extended support for "job management, data management, task management, and remote job entry."
History
OS/360 included spooling routines, called reader/interpreters and output writers. Each reader/interpreter was "responsible for reading one input job stream" – that is one input device. Likewise each output writer was responsible for controlling one printer or punch. Spooled data were stored in OS temporary datasets controlled by standard OS services. Each reader/interpreter or output writer was a separate operating system task in its own partition or region. A system with a large number of readers, printers, and punches might have a large number of spooling tasks.
HASP was developed by IBM Federal Systems Division contractors at the Lyndon B. Johnson Space Center in Houston. The developers were Tom Simpson and Bob Crabtree. HASP was a program that ran on a mainframe, and performed functions such as: scheduling, control of job flow, spooling and printing/punching. HASP had no support for IBM System/360 Operating System Remote Job Entry, 360S-RC-536, but provided roughly equivalent facilities of its own.
In HASP II V3, NIH created the shared spool capability for HASP that was used by many mainframe sites. It allowed each HASP system to share a common spool and checkpoint. This enabled workload balancing in a multi-mainframe environment. In HASP II V4, Don Greb and Dave Miko of Mellon Bank moved shared spool to this version and carried it forward into JES2 multi-access spool (IBM's formal support of HASP in MVS). Over 350 copies of the HASP II V4 shared spool mods were distributed around the world. The shared spool Mellon Mods were added to the SHARE distribution process so they could be more widely accessed.
The program was sometimes referred to under various other names, but there is no indication of IBM ever using them in official documents.
The program became classified as part of the IBM Type-III Library. It had a competitor, ASP (Attached Support Processor), which ran on one mainframe and controlled scheduling of other attached mainframes. ASP later became JES3.
In MVS, HASP became JES2, one of two Job Entry Subsystems. It was many years before the HASP labels were removed from the JES2 source, and the messages issued by JES2 are still prefixed with "$HASP".
A modified version of HASP was used to provide batch spooling and remote job entry services for the Michigan Terminal System during the late 1960s, 1970s, and 1980s.
Program organization
HASP bypassed most operating system services with code specially tailored for efficiency. HASP operated as a single operating system task and used cooperative multitasking internally to run processors to perform tasks such as running card readers, printers, and punches, managing the spool files, communicating with the system operator, and |
https://en.wikipedia.org/wiki/Historical%20geographic%20information%20system | A historical geographic information system (also written as historical GIS or HGIS) is a geographic information system that may display, store and analyze data of past geographies and track changes in time. It can be regarded as a tool for historical geography.
Techniques used in HGIS
Digitization and georeferencing of historical maps: Old maps may contain valuable information about the past. By adding coordinates to such maps, they may be added as a feature layer to modern GIS data: This facilitates comparison of different map layers showing the geography at different times. The maps may be further enhanced by techniques such as rubbersheeting, which spatially warps the data to fit with more accurate modern maps.
Reconstruction of past boundaries: By creating polygons of former political entities, administrative sub-divisions and other types of borders, their evolution as well as aggregated statistics can be compared through time.
Georeferencing of historical microdata (such as census or parish records): This enables the use of spatial analysis to historical data.
Notable historical GIS projects
China Historical GIS is a project on Imperial China developed by Harvard University and Fudan University.
David Rumsey Historical Map Collection is one of the world's largest map collections, which has digitized and georeferenced a large part of its collection and published it on the internet.
Electronic Cultural Atlas Initiative (ECAI) is a clearinghouse for the exchange of metadata of Historical GIS. Maintained by the University of California, Berkeley.
Euratlas History Maps is a historical atlas of Europe from year 1 to present days with one map per century. The maps depict sovereign states as well as administrative divisions and dependent territories.
Great Britain Historical GIS is a GIS-enabled database holding diverse geo-referenced maps, statistics, gazetteers and travel writing, especially for the period 1801–2001 covered by British censuses. Created and maintained by Portsmouth University.
HistoAtlas is an open historical geographical information system that tries to build a free historical atlas of the world.
National Historical Geographic Information System (NHGIS) is a system for displaying and analyzing Census tracts and tract changes in the United States.
Software or web services developed for Historical GIS
Google Earth added a time line feature in version 4 (2006) that enables simple temporal browsing of spatial data.
TimeMap is a Java open-source applet (or program) for browsing spatial-temporal data and ECAI data sets. Developed by the department of archaeology University of Sydney.
See also
Digital history
GIS in archaeology
Landscape history
Rephotography
Spatiotemporal database
Time geography
References
Further reading
Ian N. Gregory, Don Debats, Don Lafreniere eds.: The Routledge Companion to Spatial History. Routledge 2018
Joachim Laczny: Friedrich III. (1440–1493) auf Reisen. Die Erstellung des Itiner |
https://en.wikipedia.org/wiki/Servicio%20Meteorol%C3%B3gico%20Nacional%20%28Mexico%29 | The Servicio Meteorológico Nacional (SMN) is Mexico's national weather organization. It collects data and issues forecasts, advisories, and warnings for the entire country.
History
A presidential decree founded El Observatorio Meteorológico y Astrónomico de México (The Meteorological and Astronomical Observatory of Mexico) on February 6, 1877 as part of the Geographic Exploring of the National Territory commission. By 1880, it became an independent agency located at Chapultepec Castle, then encompassing six observatories. In 1901, the Servicio Meteorologia Nacional was formed with 31 sections for each state and 18 independent observatories which reported back to the central office in Tacubaya via telegraph. It joined the World Meteorological Organization in 1947. By 1980, the organization included 72 observatories, of which eight launched weather balloons and radiosondes, and five radars serviced the country. In 1989, it became a subagency of the General de Administracion del Agua.
Functions of the organization
The agency issues forecasts out to five days in the future, hydrological bulletins including recent rainfall, agricultural bulletins, and run their own regional forecast model based upon the MM5. They also issue warnings for intense storms, strong northerlies in the Gulf of Mexico, snowfall, and excessive rainfall. Surface analyses for the region are drawn by the Tropical Prediction Center which are incorporated onto the Hydrometeorological Prediction Center analysis and then linked to by SMN on their website. They issue their own tropical cyclone reports that describe the impact of storms on Mexico, which are then relayed to the U.S. National Hurricane Center and the World Meteorological Organization.
See also
National Weather Service - United States (Note that the United States' NWS issues bulletins and forecasts in Spanish as the "Servicio Meteorológico Nacional")
World Meteorological Organization
References
External links
Servicio Meteorologico Nacional
Governmental meteorological agencies in North America |
https://en.wikipedia.org/wiki/Eddie%20Jackson | Eddie Jackson is the name of:
Eddie Jackson (chef) (born 1980), American NFL safety and Food Network host
Eddie Jackson (safety) (born 1993), American football player for the Chicago Bears
Edward Jackson (footballer) (1925–1996), Australian rules footballer who played with Melbourne in the Victorian Football League
Eddie Jackson (musician) (born 1961), American bassist from Queensrÿche
Eddie Jackson (singer) (1926–2002), American country and rockabilly singer
Eddie Lee Jackson (1949–2020), American politician; Democratic member of the Illinois House of Representatives
Eddie Jackson (vaudeville) (1896–1980), American vaudeville and Broadway performer
See also
Edward Jackson (disambiguation)
Edwin Jackson (disambiguation) |
https://en.wikipedia.org/wiki/Great%20Britain%20Historical%20GIS | The Great Britain Historical GIS (or GBHGIS) is a spatially enabled database that documents and visualises the changing human geography of the British Isles, although is primarily focussed on the subdivisions of the United Kingdom mainly over the 200 years since the first census in 1801. The project is currently based at the University of Portsmouth, and is the provider of the website A Vision of Britain through Time.
NB: A "GIS" is a geographic information system, which combines map information with statistical data to produce a visual picture of the iterations or popularity of a particular set of statistics, overlaid on a map of the geographic area of interest.
Original GB Historical GIS (1994–99)
The first version of the GB Historical GIS was developed at Queen Mary, University of London between 1994 and 1999, although it was originally conceived simply as a mapping extension to the existing Labour Markets Database (LMDB). The system included digital boundaries for registration districts and poor law unions (c.1840 to 1911), local government districts (1911 to 1974), and parishes (1870s to 1974). These boundaries were held not as polygons but as line segments (arcs), using ArcGIS software. Dates of creation and abolition were held for each line segment (or "arc") and custom software was developed to assemble line segments into polygons, creating conventional boundary maps for particular dates. Meanwhile, the Labour Markets Database evolved into the Great Britain Historical Database (GBHDB), which stored a large collection of historical statistics from the census, vital registration and records of poverty and economic distress. These were held in thousands of columns within hundreds of separate tables, within an Oracle database. This system is described in detail in Gregory and Southall (1998), and in Gregory and Southall (2002).
New GB Historical GIS (2000–)
The second version of the GB Historical GIS was developed at the University of Portsmouth from 2000 onwards. The work was mainly funded by the UK National Lottery, so the results had to be useful to a far wider audience than most historical GIS projects.
New architecture
This is a true spatial database in which all content is held in Oracle, although GIS software is used to edit content. It is designed to overcome the limitations of the original system:
The statistical content is now the core of the system, all data values being held in a single column of a single table, with other columns indicating what the number measures, when and where it is for, and the source it was taken from (Southall, 2007).
Where is recorded not directly as a location but via a reference to a large catalogue of administrative units. This catalogue is organised as an ontology, each unit having any number of names and at least one IsPartOf relationship with a higher-level unit; the obvious exception is the root unit, which represents the British Isles and to which all other units ultimately belong.
A |
https://en.wikipedia.org/wiki/ICDR | Interim Climate Data Record
International Centre for Dispute Resolution
Ivanhoé Chevalier Du Roi
See also
ICDr. |
https://en.wikipedia.org/wiki/Breakpoint%20%28novel%29 | Breakpoint is a cyberpunk science fiction novel by former United States intelligence and counterterrorism official Richard A. Clarke. It is his second novel. The book paints a dystopic prediction of the future.
Plot
A series of explosions occur at seemingly unimportant sites in the United States. These sites happen to be the locations where transatlantic cables from Europe and Asia reach the U.S. essentially cutting the U.S. off from the world, at least via the Internet. The attacks are immediately blamed on the Chinese. Two investigators are sent to investigate the incidents, with this assumption in mind. The investigators soon uncover an underground science of genomics and nanotechnology working on human-computer integration.
Reception
It was featured on the Colbert Report.
References
2007 American novels
2007 science fiction novels
American science fiction novels
Cyberpunk novels
Dystopian novels
G. P. Putnam's Sons books |
https://en.wikipedia.org/wiki/ISCSI%20Extensions%20for%20RDMA | The iSCSI Extensions for RDMA (iSER) is a computer network protocol that extends the Internet Small Computer System Interface (iSCSI) protocol to use Remote Direct Memory Access (RDMA). RDMA is provided by either the Transmission Control Protocol (TCP) with RDMA services (iWARP) that uses existing Ethernet setup and therefore no need of huge hardware investment, RoCE (RDMA over Converged Ethernet) that does not need the TCP layer and therefore provides lower latency, or InfiniBand.
It permits data to be transferred directly into and out of SCSI computer memory buffers (which connects computers to storage devices) without intermediate data copies and without much CPU intervention.
History
An RDMA consortium was announced on May 31, 2002, with a goal of product implementations by 2003.
The consortium released their proposal in July, 2003.
The protocol specifications were published as drafts in September 2004 in the Internet Engineering Task Force and issued as RFCs in October 2007.
The OpenIB Alliance was renamed in 2007 to be the OpenFabrics Alliance, and then released an open source software package.
Description
The motivation for iSER is to use RDMA to avoid unnecessary data copying on the target and initiator.
The Datamover Architecture (DA) defines an abstract model in which the movement of
data between iSCSI end nodes is logically separated from the rest of the iSCSI protocol; iSER
is one Datamover protocol. The interface between the iSCSI and a Datamover protocol, iSER
in this case, is called Datamover Interface (DI).
The main difference between the standard iSCSI and iSCSI over iSER is the execution of
SCSI read/write commands. With iSER the target drives all data transfer (with the
exception of iSCSI unsolicited data) by issuing RDMA write/read operations, respectively.
When the iSCSI layer issues an iSCSI command PDU, it calls the Send_Control primitive,
which is part of the DI. The Send_Control primitive sends the STag with the PDU. The iSER
layer in the target side notifies the target that the PDU was received with the Control_Notify
primitive (which is part of the DI). The target calls the Put_Data or Get_Data primitives (which are part of the DI) to perform an RDMA write/read operation respectively. Then, the target calls the Send_Control primitive to send a response to the initiator. An example is
shown in the figures (time progresses from top to bottom).
All iSCSI control-type PDUs contain an iSER header, which allows the
initiator to advertise the STags that were generated during buffer registration. The target
will use the STags later for RDMA read/write operations.
See also
LIO Linux SCSI Target
The SCST Linux SCSI target software stack
SCSI RDMA Protocol
References
Further reading
Thesis for Master of Science in Computer Science
External links
iSER and DA Frequently Asked Questions
Computer networking
SCSI |
https://en.wikipedia.org/wiki/Australia%27s%20Best%20Backyards | Australia's Best Backyards is an Australian lifestyle TV series on the Seven Network. The program is hosted by landscape gardener Jamie Durie, who previously hosted Backyard Blitz on the Nine Network.
The first episode aired on Sunday 29 July 2007 at 6:30 pm. The premiere episode rated 1.4 million viewers and was the 17th most watched program for the week.
See also
List of Australian television series
References
External links
Australia's Best Backyards
Larundel Homestead – The Garden that Made Jamie Durie change careers – Featured in Episode 1
Australian non-fiction television series
Seven Network original programming
2007 Australian television series debuts
Gardening television |
https://en.wikipedia.org/wiki/Slovensk%C3%A1%20sporite%C4%BE%C5%88a | Slovenská sporiteľňa is the largest commercial bank in Slovakia. It provides comprehensive banking services to more than 2 million clients via the largest distribution network with 400 retail outlets. It administers almost 6 million accounts, which proves its stable position in the Slovak banking sector.
In 2001, the bank became part of Erste Group.
History
Slovenská sporiteľňa has the longest tradition out of all the banking institutions in Slovakia, which dates back to the 19th century.
1819 – first branches of Die Erste oesterreichische Spar-Casse in Pressburg (Bratislava), Trnava, Banská Bystrica and Levoča
1841/42 – first savings banks in Pressburg – Pressburger Spar-Casse
1844 – savings banks in Košice and Trnava
1845 – savings banks in Komárno, Prešov and Zvolen
1846 – 1848 – savings banks established in majority of the cities, Banská Štiavnica, Kremnica, Lučenec, Nové Zámky, Spišská Nová Ves
1953 – part of Štátna banka československá súčasť Štátnej banky československej
1969 – active as Slovenská štátna sporiteľňa, š.p.ú. (Slovak State Savings Bank)
1990 – universal banking license
1991 – entered the money and capital market
1994 – transformation to Slovenská sporiteľňa, a.s. (Slovak Savings Bank join-stock company)
1998 – 2000: transformation process for privatization of the bank
2000 – privatization of majority of the shares 87,18 %
2001 – became a member of financial group - Erste Bank der oesterreichischen Sparkassen AG
Ratings
Fitch Ratings Fitch Ratings
Long-term rating A-
Short-term rating F1
Support rating 1
Viability rating bbb+
Outlook stable
Awards
2005, 2006, 2011, 2012, 2013, 2014, 2015: Euromoney Awards for Excellence – Best Bank in Slovakia
2011, 2012, 2013, 2014, 2014: The Banker – Bank of the Year
2012, 2013, 2014, 2015, 2016: TREND – TREND TOP Banka roka
Headquarters
Slovenská sporiteľňa, a.s., Tomášikova 48, Bratislava, 832 37, Slovakia
References
External links
Slovenská sporiteľňa official site
Slovenská sporiteľňa's Fact Sheet
Erste Group
Banks of Slovakia
Banks established in 1994
1994 establishments in Slovakia
Banks under direct supervision of the European Central Bank |
https://en.wikipedia.org/wiki/SPRING | SPRING was a freeware geographic information system (GIS) and remote sensing image processing system. It was developed with an object-oriented data model and used for the integration of raster and vector data representations. It had Windows and Linux versions and provided a comprehensive set of functions, including tools for satellite image, digital terrain modeling, spatial analysis, geostatistics and spatial statistics, spatial databases and map management.
SPRING was developed since 1992 by the National Institute for Space Research (INPE) in Brazil. It had required over 200 man-years of development and included extensive documentation, tutorials and examples. More than 70,000 users from 60 countries have downloaded the software, as of January 2007. It was discontinued in 2019 and succeeded by INPE's TerraLib.
References
External links
Freeware
Discontinued software
GIS software |
https://en.wikipedia.org/wiki/Tele%20Antillas | Tele Antillas is a television network operating out of Santo Domingo in the Dominican Republic. It provides a wide variety of television programs which are available to viewers throughout the Dominican Republic on channel 2. Originally the country's Southern and Capital Zones tuned in on channel 2, while the Northern Zone received it from channel 13. During the 1990s, the Dominican government implemented regulations which required networks to operate key stations and relayers on one channel throughout the entire country. Since then, all of Tele Antillas stations are now on channel 2.
History
Established during October 1979, Tele Antillas was soon considered one of the most modern television channels providing media content in the Dominican Republic. It was the first TV channel to utilize stereophonics. Additionally, it was among the pioneering channels that initially introduced programming based largely on international productions such as telenovelas, television series, films and animated cartoons. Despite incorporating an international approach, they continued producing several local programs developed specifically for the family audience. During the 1990s, the station was acquired by Grupo Corripio, which also owns Telesistema Canal 11, and later relaunched with a new programming format. Today, many international events like the Oscars, Emmys, and some of most popular events in Latin America, such as the Festival Internacional de la Canción de Viña del Mar are viewed on Tele Antillas Canal 2.
It was one of the first channels in the Dominican Republic to offer foreign made programming from Brazil and Venezuela. One of their most successful ventures was a popular late night schedule that included well-known telenovelas like Ronda de Piedra, Doña Bella and Xica da Silva among others. In 2004 the TV station was relaunched with a new logo and programming that was designed to appeal to a wider variety of viewing demographics.
Slogans
"Tele Antillas, Canal 2 en Santo Domingo y 13 en Santiago" (1980s)
"Tele Antillas, Tu Canal ...!" (1990s)
"Tele Antillas, Ahora y siempre... Lo Mejor" (1990s)
"Tele Antillas, TV como eres tú" (2004)
Some Programs Produced on Tele Antillas
Fiesta
Uno + Uno
Sube y baja del 2
El show de la noche
De buen humor
7 x 7 Roberto (segunda etapa)
Sección 2
Noticiero Teleantillas
Cine club 2
Conecta - 2
Ciro Cocina
Iamdra full
Béisbol an estilo Teleantillas (Temporada béisbol invernal 1985–1986)
El show de robertico
100 grados (segunda etapa)
Irene Narpier Entre Puntos
Current programming
Weekdays:
5:00am A Quien Madruga
6:00am Uno + Uno
9:00am Pare de Sufrir
10:00am Tele-Fit
10:30am Pauta Cami/Cocinarte
11:00am Luna la heredera
12:00pm Caso Cerrado
12:45pm Noticiero Teleantillas
1:00pm La Viuda Joven
2:00pm Cuchicheos
3:00pm La Loba
4:00pm Hechiceras
5:00pm Iamdra Full
5:45pm Noticiero Teleantillas
6:00pm Deseos de Mujer
Primetime:
7:00pm Decisiones
8:00pm Cine Club 2
1 |
https://en.wikipedia.org/wiki/Roaming%20SIM | A roaming SIM is a mobile phone SIM card that operates on more than one network within its home country. Roaming SIMs currently have two main applications, least cost call routing for roaming mobile calls and machine to machine.
Using a normal network locked SIM, travelers can use their own roaming enabled mobile phone in any country that has a roaming agreement with their home network, or for global networks like Vodafone, with another Vodafone OpCo. This manifests itself to most users when they receive a text message welcoming the traveler to a local network. Once they return home their SIM will only work on the network with which they have a contract.
A roaming SIM however, also known as a global roaming SIM, will work with whichever network it can detect, at home or abroad.
Roaming mobile calls
The use of roaming SIM cards in its most common form is in normal voice applications such as mobile phone calls. The common application of roaming SIMs for voice is where mobile calls are automatically routed to, and made on a least cost network. This typically means that incoming calls are free, no matter which network a mobile user is on. This also means that a caller enjoys the lowest cost when making a call, significantly reducing call costs, especially compared to normal network charges for International Roaming.
Global roaming SIMs are very often combined with callback technology, whereby the user dials a number in the normal way, but the call is intercepted by an application on the SIM card and turned from an outbound call to an inbound call which the user answers. This ensures that the call travels exclusively through the least cost route and also it is taking advantage of the fact that inbound call charges are typically lower than outbound ones.
Some providers achieve this automatic call interception and callback by encoding a program onto the SIM card.
Other providers use Multi-IMSI technology to lower the cost of roaming. In this case there is a program on the SIM card that selects the lowest cost IMSI ( or 'profile' ) to use in a specific country.
Increasingly, data services are being added to roaming SIM cards to reduce the cost of roaming data charges. Mobile users are increasingly using data services and it can be very difficult to predict the cost of using data because it is invoiced based on volume.
Machine to machine
This technology is also used in a number of machine to machine applications where devices communicate with one another, such as vehicle tracking systems. By switching between multiple networks, more complete network coverage is obtained and costs are minimised through least-cost routing.
Alternatives
For some applications (particularly where regular travel between two countries is the main purpose) a Dual SIM can be considered as an alternative. They have the advantage that it is possible to buy a local SIM card and use that next to the primary SIM card.
Voice over IP apps (softphones) may be installed on |
https://en.wikipedia.org/wiki/Jaghatu%20District%2C%20Maidan%20Wardak | Jaghatu is a district in Maidan Wardak province, Afghanistan, 20 km northwest of Ghazni. According to 2019 data, the population is 50,792.
The district is within the heartland of the Wardak tribe of Pashtuns. Agriculture is the main source of income. The popular apples in Afghanistan is from this district. Drought has become a serious problem in the whole province. Health and education services are lacking although most of the people in this area have attempted to create schools and for students to attend with their own efforts.
History
Jaghatu district has some historical places such as Barghalee, which was the capital of the empire before Islam. Sultan Dam is located in Jaghatu district although only two villages in the district benefit from the water, the rest of the water goes towards the Khaja Omary district and Ghazni province.
Notable people
Abdul Hamid Bahij (born 1979), medical doctor, writer, translator and dictionary writer
Rahmatullah Nabil (born 1968), politician
See also
Jalrez District
Notes
Districts of Maidan Wardak Province |
https://en.wikipedia.org/wiki/KJNP%20%28AM%29 | KJNP (1170 AM) and KJHA (88.7 FM) are non-commercial radio stations which simulcast their programming. KJNP is licensed to North Pole, Alaska and serves the Fairbanks area. KJHA is licensed to Houston, Alaska, just north of Anchorage. The stations air a Christian radio format.
KJNP's radio studios and transmitter are located a short distance northeast of the city center of North Pole, off the Richardson Highway. KJNP is a Class A station broadcasting on the clear-channel frequency of 1170 AM.
KJHA's transmitter is off Route 3, South Parks Highway, north of Houston.
In addition to the main stations, programming is relayed by an additional five FM translators to widen its broadcast area.
These radio stations were founded by Don and Gen Nelson; the former died in 1997. The AM incarnation of KJNP was the first of these stations, launched in 1967. KJNP-FM and KJNP-TV both followed in 1981. KJHA followed many years later.
In addition to the broadcasting ministry, Don Nelson made scores of road trips over the course of several decades between Alaska and his home state of Minnesota, conducting another ministry along the Alaska Highway and in numerous small towns in Canada.
The station airs one of the few non-English-language programs heard in the Fairbanks area, a weekly program in Iñupiaq produced by parishioners from First Presbyterian Church of Fairbanks.
See also
KJNP-FM
KJNP-TV
References
External links
Moody Radio affiliate stations
Radio stations established in 1967
JNP (AM) |
https://en.wikipedia.org/wiki/Network%20for%20Good | Network for Good is an American-certified B Corporation software company that offers fundraising software and coaching for charities and non-profit organizations. The company was founded in 2001 by America Online (AOL), Cisco Systems , and Yahoo! and has processed over $2.2 billion in donations since its inception. Network for Good charges between 3% and 5% transaction processing fee for donations, in addition to any subscription fees that the charity might incur. The transaction processing costs may be covered by the donor or by the nonprofit organization.
History
Network for Good was set up in 2001 as a collaboration among America Online, Cisco Systems and Yahoo, replacing AOL's earlier charitable platform, Helping.org. By 2002 it was reporting receipts of about $1 million per month, and by 2005 it reported about $30 million in annual collections. In 2005 Network for Good absorbed Groundspring, another online charitable platform that had been founded by the Tides Foundation in 1999.
In 2007 actor Kevin Bacon collaborated with Network for Good to set up his charitable project, SixDegrees.org, as a "celebrity-based" variant on Network for Good's existing model.
In 2008 Network for Good acquired the ePhilanthropy Foundation, an organization established in 2001 with the goal of providing training and promoting ethical practices in online fundraising and that had later faced uncertainty after the departure of its founder.
As of February 2014, Network for Good reported that it had processed more than $1 billion in gifts since its inception.
Management
As well as its headquarters, it also has an office in San Francisco, California, through its 2005 merger with Groundspring.org. Board members are composed of people who have previously worked with various other companies such as AOL, Yahoo! and eBay.
Services
Non-profit services
Non-profits can access tools for online fundraising, email marketing, events management and expert advice. Nonprofits can also receive free tips and training on topics including how to develop and improve their online marketing, donor communications and fundraising. Network for Good offers webinars, e-books, courses, newsletters, and how-to articles.
Competitors of Network for Good that also provide nonprofit online donation platforms include CrowdRise, Classy, Razoo, Aplos Software, and Blackbaud.
Partnership services
Network for Good provides online giving capabilities for cause marketing, employee giving, and charitable rewards for corporate partners. The company also works with technology partners and developers to power giving sites through its API.
Studies
Network for Good publishes a Digital Giving Index, based on the 2010 Online Giving Study. This data is based on Network for Good's own yearly donation processing activities and shows the annual changes in donation volume, average donation, and other trends in online giving.
Network for Good publishes multiple e-books and white-papers each year on topics ra |
https://en.wikipedia.org/wiki/NuSMV | In computer science, NuSMV is a reimplementation and extension of the SMV symbolic model checker, the first model checking tool based on binary decision diagrams (BDDs).
The tool has been designed as an open architecture for model checking. It is aimed at reliable verification of industrially sized designs, for use as a backend for other verification tools and as a research tool for formal verification techniques.
NuSMV has been developed as a joint project between ITC-IRST ( in Trento), Carnegie Mellon University, the University of Genoa and the University of Trento.
NuSMV 2, version 2 of NuSMV, inherits all the functionalities of NuSMV. Furthermore, it combines BDD-based model checking with SAT-based model checking. It is maintained by Fondazione Bruno Kessler, the successor organization of ITC-IRST.
Functionalities
NuSMV supports the analysis of specifications expressed in CTL and LTL. It can be run in batch mode, or interactively with a textual user interface.
Running NuSMV Interactively
The interaction shell of NuSMV is activated from the system prompt as follows:
[system_prompt]$ NuSMV -int
NuSMV> go
NuSMV>
NuSMV first tries to read and execute commands from an initialization file if such file exists and is readable unless -s was passed on the command line.
File master.nusmvrc is looked for in the directories defined in environment variable NUSMV_LIBRARY_PATH or in the default library path if no such variable is defined. If no such file exists, user's home directory and the current directory will also be checked. Commands in the initialization file are executed consecutively. When the initialization phase is completed the NuSMV shell prompt is displayed and the system is now ready to execute user commands.
A NuSMV command usually consists of a command name and arguments to the invoked command. It is possible to make NuSMV read and execute a sequence of commands from a file, through the command line option -source:
[system_prompt]$ NuSMV -source cmd_file
Running NuSMV batch
When the -int option is not specified, NuSMV runs as a batch program, which is with the form as follows:
[system_prompt]$ NuSMV [command line options] input_file
Checking for LTL specification or CTL specification
NuSMV can be used to check whether given LTL or CTL constraints holds for a given model.
For example, we have a CTL specification that we want to check:
CTLSPEC EF(proc5.state = critical);
This specification is true if there exists an execution path such that the component state of the process proc5 has the value critical at some point.
User can check to see if their model holds for this specification using the following commands.
[system_prompt]$ NuSMV [command line options] input_file
NuSMV> go
NuSMV> check_ctlspec
If the specification is true, NuSMV will inform you with
-- specification EF proc5.state = critical is true
>NuSMV
If some specification fails, NuSMV will return a full trace of execution showing how it fails, if possible.
See also
S |
https://en.wikipedia.org/wiki/Coding%20%28social%20sciences%29 | In the social sciences, coding is an analytical process in which data, in both quantitative form (such as questionnaires results) or qualitative form (such as interview transcripts) are categorized to facilitate analysis.
One purpose of coding is to transform the data into a form suitable for computer-aided analysis. This categorization of information is an important step, for example, in preparing data for computer processing with statistical software. Prior to coding, an annotation scheme is defined. It consists of codes or tags. During coding, coders manually add codes into data where required features are identified. The coding scheme ensures that the codes are added consistently across the data set and allows for verification of previously tagged data.
Some studies will employ multiple coders working independently on the same data. This also minimizes the chance of errors from coding and is believed to increase the reliability of data.
Directive
One code should apply to only one category and categories should be comprehensive. There should be clear guidelines for coders (individuals who do the coding) so that code is consistent.
Quantitative approach
For quantitative analysis, data is coded usually into measured and recorded as nominal or ordinal variables.
Questionnaire data can be pre-coded (process of assigning codes to expected answers on designed questionnaire), field-coded (process of assigning codes as soon as data is available, usually during fieldwork), post-coded (coding of open questions on completed questionnaires) or office-coded (done after fieldwork). Note that some of the above are not mutually exclusive.
In social sciences, spreadsheets such as Excel and more advanced software packages such as R, Matlab, PSPP/SPSS, DAP/SAS, MiniTab and Stata are often used.
Qualitative approach
For disciplines in which a qualitative format is preferential, including ethnography, humanistic geography or phenomenological psychology a varied approach to coding can be applied. Iain Hay (2005) outlines a two-step process beginning with basic coding in order to distinguish overall themes, followed by a more in depth, interpretive code in which more specific trends and patterns can be interpreted.
Much of qualitative coding can be attributed to either grounded or a priori coding. Grounded coding refers to allowing notable themes and patterns emerge from the document themselves, where as a priori coding requires the researcher to apply pre-existing theoretical frameworks to analyze the documents. As coding methods are applied across various texts, the researcher is able to apply axial coding, which is the process of selecting core thematic categories present in several documents to discover common patterns and relations.
Coding is considered a process of discovery and is done in cycles. Prior to constructing categories, a researcher might apply a first and second cycle coding methods. There are a multitude of methods available, and a resea |
https://en.wikipedia.org/wiki/Naval%20Ops%3A%20Commander | is a 2002 vehicle simulation game computer game for Microsoft Windows. It was ported to the PlayStation 2 in 2004; this port was localized and titled Naval Ops: Commander.
It is part of the larger Kurogane no Houkou series, sequel to the Windows and PlayStation 2 game Kurogane no Houkou: Warship Commander. It is related to Naval Ops: Warship Gunner and Naval Ops: Warship Gunner 2.
In 2004, this game received a direct sequel in the form of Kurogane no Houkou 3: Warship Commander, only released in Japan and only for Windows.
Overview
The game is a one-player simulation of naval combat, in which the player commands an individual ship. In the opening cutscene, a World War II-era destroyer similar to its predecessor, Naval Ops: Warship Gunner. The game uses the same type of warships and most technologies allotted in Warship Gunner.
The game differs from both Warship Gunner games, by having look-down view of playing instead of third-person view. You are also allotted escort/support vessels to assist you in missions. You can also re-arrange these escorts to different formations to allow better use of their abilities. The games still allows the customization of your "flagship" or "command ship" as in Warship Gunner(s) games.
Weapon systems are the same, but you'll note that power and effectiveness of these weapons will differ from other Warship Gunner games. You may find them not as powerful, or as effective in some cases.
Story wise, in first Warship Gunner, the player's ship is one drawn from another world. Namely World War II of Earth. In Commander, the roles are reversed, the player is now the native of the alternated world. The player witnessing people and technology coming from another world. However, not necessary from our Earth.
There are many hulls available to the player including drillships and double hull ships. However some hulls can only be used by getting a certain score on a certain level such as getting a drillship for beating the "Arahabaki2". Only type real naval vessel is not available to the player is the submarine. Naval Ops: Warship Gunner 2, the other sequel to Naval Ops: Warship Gunner, allows use of player controlled submarines.
Game Play
The player starts with simple Destroyer and small task force of Destroyer Escorts.
After the first introduction mission, the player chooses what missions they do. They also choose which faction in which they wish part of. (German, Japanese, British, & American) Choosing faction will allow player access that faction designs (& styles) vessels they were known for in World War II era up to the early 21st century in some cases.
The player earns money for various tasks done during a mission beyond achieving the mission objectives. Going above and beyond the mission requirements gains more money and higher grade for the mission.
The missions are graded from E (Eliminated), C-B (Low Grade), A (Successful), S - (Superior).
S Grade is achieved only when 3 different criteria are sufficient |
https://en.wikipedia.org/wiki/Advice%20taker | The advice taker was a hypothetical computer program, proposed by John McCarthy in his 1959 paper "Programs with Common Sense". It was probably the first proposal to use logic to represent information in a computer and not just as the subject matter of another program. It may also have been the first paper to propose common sense reasoning ability as the key to Artificial Intelligence. In his paper, McCarthy advocated:
"…programs to manipulate in a suitable formal language (most likely a part of the predicate calculus) common instrumental statements. The basic program will draw immediate conclusions from a list of premises. These conclusions will be either declarative or imperative sentences. When an imperative sentence is deduced the program takes a corresponding action."
McCarthy justified his proposal as follows:
"The main advantages we expect the advice taker to have is that its behaviour will be improvable merely by making statements to it, telling it about its symbolic environment and what is wanted from it. To make these statements will require little if any knowledge of the program or the previous knowledge of the advice taker. One will be able to assume that the advice taker will have available to it a fairly wide class of immediate logical consequences of anything it is told and its previous knowledge. This property is expected to have much in common with what makes us describe certain humans as having common sense. We shall therefore say that a program has common sense if it automatically deduces for itself a sufficiently wide class of immediate consequences of anything it is told and what it already knows."
References
1958 in computing
Computer-related introductions in 1958
Experimental programming languages
History of artificial intelligence
Logic programming |
https://en.wikipedia.org/wiki/AS1 | AS1 or AS-1 may refer to:
ActionScript version 1
As One (Hong Kong band)
AS1 (networking)
AS-1, a Soviet-era prototype assault rifle that led to the AN-94
Raduga KS-1 Komet, a missile referred to as the AS-1 'Kennel' by the West
RuPaul's Drag Race All Stars 1 (season 1)
Smith & Wesson AS, a 12-gauge select-fire shotgun. |
https://en.wikipedia.org/wiki/List%20of%20diplomatic%20missions%20of%20Benin | This is a list of diplomatic missions of Benin. Owing to its small size, the Republic of Benin maintains a very modest diplomatic network abroad. Its paramount relationship is with France, the former colonial power.
Honorary consulates are excluded from this list.
Africa
Addis Ababa (Embassy)
Rabat (Embassy)
Abuja (Embassy)
Lagos (Consulate-General)
Americas
Havana (Embassy)
Washington, D.C. (Embassy)
Asia
Beijing (Embassy)
Tokyo (Embassy)
Kuwait City (Embassy)
Doha (Embassy)
Riyadh (Embassy)
Europe
Paris (Embassy)
Moscow (Embassy)
Multilateral organization
New York City (Permanent mission)
Gallery
See also
Foreign relations of Benin
References
Les représentations diplomatiques du Bénin
Benin
Diplomatic missions |
https://en.wikipedia.org/wiki/Calling%20All%20Cars%21 | Calling All Cars! is a downloadable video game developed by Incognito Entertainment and published by Sony Computer Entertainment for PlayStation 3. It was released in 2007. It was also included for free with a 1-year subscription to Qore.
Gameplay
Calling All Cars! is similar to Twisted Metal, although one critic suggested that an early demo version of the game seemed to have "more in common with NBA Jam than it does Twisted Metal". It employs a top-down 3rd person perspective and cel-shaded graphics. There are bonus vehicles that can be unlocked through the completion of certain tasks, e.g. winning a tournament at Captain difficulty.
The object of the game is to capture escaped convicts while battling against three other bounty hunters who are also trying to capture the criminals. Points are awarded for captured criminals, and the bounty hunter with the most points wins. The game features online multiplayer and split-screen play.
The criminals in question have escaped from a local high-security prison by tunneling out. Criminals emerge from the ground somewhere on the current level and begin to walk around.
To capture a criminal that has just emerged from the ground; the player must follow an above-car arrow to the criminals location, and ram into the criminal. Upon ramming the criminal is launched high into the air, and upon coming down will be captured by the nearest bounty hunter. A targeting reticule appears under the criminal and turns green if the bounty hunter is in the correct position to collect and red if they are not. If there are no bounty hunters present the criminal will continue walking until rammed again. Once a criminal has been captured by a bounty hunter the objective is to take it to one of 6 available incarceration facilities. In order of points these are: 1 point - Police Station, 2 point - Jail, 3 point - Maximum Security, Blue Paddywagon, 4 point - Police Helicopter, 5 point - Red Paddywagon. Once a bounty hunter has captured a criminal, the other bounty hunters objective changes to try to claim the criminal for themselves. This can be done in multiple ways: a high-speed collision, or using one of the three power-ups. These power-ups include a homing missile, a large, front-mounted mallet and a front-mounted magnet. The homing missile and the magnet both have lock-on capabilities, the homing missile emits a sound as it nears lock-on and the magnet's "beam" turns red to indicate successful lock-on. The mallet shows a radius around the bounty hunters vehicle that will be effected. If hit by the mallet or homing missile the criminal launches into the air from the previous bounty hunters car, much akin to if it had been rammed for the first time. If hit in a high-speed collision or caught using the magnet the criminal is transferred directly to the bounty hunter.
Reception
The game received "average" reviews according to the review aggregation website Metacritic. GameSpot was positive to the game, but was critical of th |
https://en.wikipedia.org/wiki/Cyberdelic | Cyberdelic (from "cyber-" and "psychedelic") was the fusion of cyberculture and the psychedelic subculture that formed a new counterculture in the 1980s and 1990s.
Cyberdelic art was created by calculating fractal objects and representing the results as still images, animations, underground, algorithmic music, or other media.
Cyberdelic rave dance parties featured psychedelic trance music alongside laser light shows, projected images, and artificial fog, while attendees often used club drugs.
Advocates
Timothy Leary, an advocate of psychedelic drug use who became a cult figure of the hippies in the 1960s, reemerged in the 1980s as a spokesperson of the cyberdelic counterculture, whose adherents called themselves "cyberpunks", and became one of the most philosophical promoters of personal computers (PC), the Internet, and immersive virtual reality. Leary proclaimed that the "PC is the LSD of the 1990s" and admonished bohemians to "turn on, boot up, jack in".
In contrast to some of the hippies of the 1960s who were antiscience and antitechnology, the cyberpunks of the 1980s and 1990s ecstatically embraced technology and the hacker ethic. They believed that high technology (and smart drugs) could help human beings overcome limits, that it could liberate them from authority and even enable them to transcend space, time, and body. They often expressed their ethos and aesthetics through cyberart and reality hacking.
R. U. Sirius, co-founder and original editor-in-chief of Mondo 2000, became a prominent promoter of the cyberpunk ideology, whose adherents were pioneers in the IT industry of Silicon Valley and the West Coast of the United States.
In 1992, Billy Idol became influenced by the cyberdelic subculture and the cyberpunk fiction genre. The result of his passion for the ideals behind the culture resulted in his 1993 concept album, Cyberpunk, which Idol hoped would introduce Idol's fans and other musicians to the opportunities presented by digital technology and cyberculture. Timothy Leary and other members of the cyberdelic movement were contacted by Idol, and participated in the album's creation. The album was a critical and financial failure, and polarized online cyberculture communities of the period. Detractors viewed it as an act of co-optation and opportunistic commercialization. It was also seen as part of a process that saw the overuse of the term "cyberpunk" until the word lost meaning. Alternatively, supporters saw Idol's efforts as harmless and well-intentioned, and were encouraged by his new interest in cyberculture.
Collapse
After the dot-com bubble of the late 1990s burst in 2000, the techno-utopianism that prevailed in the cyberdelic counterculture waned while technorealism grew. Most cyberpunks realized that the PC, the Internet, and other new technologies did not really bring the radical social, political, and personal changes they thought they would, specifically the "cybersociety" - a postpolitical, non-hierarchical soci |
https://en.wikipedia.org/wiki/Lawrie%20Brown | Lawrence Peter "Lawrie" Brown is a cryptographer and computer security researcher, currently a (retired and now visiting) Senior Lecturer with UNSW Canberra at the Australian Defence Force Academy. His notable work includes the design of the block ciphers LOKI and the AES candidate LOKI97. He received his Ph.D. in mathematics from the University of New South Wales in 1991 under the supervision of Jennifer Seberry, with a dissertation on the design of LOKI and the cryptanalysis of the Data Encryption Standard. Subsequently, his research changed focus to the Safe Erlang mobile code system, to aspects of trust issues in eCommerce with some of his Ph.D. students, and with the use of Proxy Certificates for Client Authentication.
Publications
Computer Security: Principles and Practice, 3/e, Pearson Education, 2015
Personal interests
According to his personal homepage, Brown's social activities include dancing a number of different styles. He has also composed some of his own dances. He enjoys reading science fiction and is an amateur radio enthusiast. Brown is a practicing Baptist.
References
External links
Lawrie Brown's page at UNSW Canberra (ADFA)
Living people
Modern cryptographers
Australian computer scientists
Computer security academics
University of New South Wales alumni
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Lia%20van%20Leer | Lia van Leer (née Greenberg; ; August 8, 1924 – March 13, 2015) was a pioneer in the field of art film programming and film archiving in Israel. She was the founder of the Haifa Cinematheque, the Jerusalem Cinematheque, the Israel Film Archive and the Jerusalem Film Festival.
Biography
Lia Greenberg was born on August 8, 1924, in the Bessarabian city of Bălți, then in Romania, now in Moldova, to a Jewish family. Her father, Simon Greenberg, was a wheat exporter and her mother, Olga, was a WIZO volunteer. She attended a public high school and spent summer holidays in the Carpathian mountains. In 1940, her parents sent her to Palestine to visit her sister Bruria, a dentist, who had immigrated in 1936 and was living in Tel Aviv. She never saw her parents again.
In July 1941, the Germans murdered her father and other Jewish community leaders. Her mother and grandmother were deported to Transnistria and died in a concentration camp. Lia moved to Jerusalem in 1943 to attend the Hebrew University of Jerusalem. In 1952, she married Wim Van Leer, a Dutch engineer, pilot, playwright and film producer, and settled in Haifa. They founded the country's first film club in 1955.
"There was no television back then ... and we had a 16 mm projector that had come as a gift from my father-in-law. Each Friday we would have friends over to watch movies. Our house became the most popular in Haifa", she recalled. This film club became the Haifa Cinematheque. The Van Leers' private collection of films was the basis for the Israeli Film Archive, founded in 1960.
In 1973, a Brazilian businessman, George Ostrovsky, who dreamt of creating a cinematheque in Israel, approached the van Leers and persuaded them and Teddy Kollek to share his dream. Ostrovsky donated the necessary funds to build the Jerusalem Film Center (comprising the Israel Film Archives and the Jerusalem Cinematheque) in the Hinnom Valley below the Old City walls. Teddy Kollek and the Jerusalem Foundation mobilized more funding from friends in Hollywood and around the world. The Jerusalem Cinematheque opened in 1981, and Lia van Leer was named its first director. After the death of her husband in 1991, she inaugurated the Wim Van Leer Award for High School Students to encourage young filmmakers. In its first year, eight films were submitted; in 2008, 90 films contended for the prize.
In 1995, she headed the jury at the 45th Berlin International Film Festival.
Awards
In 2004, Lia van Leer was awarded the Israel Prize for her lifetime achievement & special contribution to society and the State of Israel. She won a prize for her volunteer work from Israeli president Chaim Herzog in 1988.
Death
Lia van Leer died on March 13, 2015, aged 90, from undisclosed causes.
See also
List of Israel Prize recipients
References
'
1924 births
2015 deaths
People from Bălți
Moldovan Jews
Bessarabian Jews
Soviet emigrants to Mandatory Palestine
Jews from Mandatory Palestine
Israeli people of Moldovan-Jewish descent
Isr |
https://en.wikipedia.org/wiki/Fibonacci%20search%20technique | In computer science, the Fibonacci search technique is a method of searching a sorted array using a divide and conquer algorithm that narrows down possible locations with the aid of Fibonacci numbers. Compared to binary search where the sorted array is divided into two equal-sized parts, one of which is examined further, Fibonacci search divides the array into two parts that have sizes that are consecutive Fibonacci numbers. On average, this leads to about 4% more comparisons to be executed, but it has the advantage that one only needs addition and subtraction to calculate the indices of the accessed array elements, while classical binary search needs bit-shift (see Bitwise operation), division or multiplication, operations that were less common at the time Fibonacci search was first published. Fibonacci search has an average- and worst-case complexity of O(log n) (see Big O notation).
The Fibonacci sequence has the property that a number is the sum of its two predecessors. Therefore the sequence can be computed by repeated addition. The ratio of two consecutive numbers approaches the Golden ratio, 1.618... Binary search works by dividing the seek area in equal parts (1:1). Fibonacci search can divide it into parts approaching 1:1.618 while using the simpler operations.
If the elements being searched have non-uniform access memory storage (i. e., the time needed to access a storage location varies depending on the location accessed), the Fibonacci search may have the advantage over binary search in slightly reducing the average time needed to access a storage location. If the machine executing the search has a direct mapped CPU cache, binary search may lead to more cache misses because the elements that are accessed often tend to gather in only a few cache lines; this is mitigated by splitting the array in parts that do not tend to be powers of two. If the data is stored on a magnetic tape where seek time depends on the current head position, a tradeoff between longer seek time and more comparisons may lead to a search algorithm that is skewed similarly to Fibonacci search.
Fibonacci search is derived from Golden section search, an algorithm by Jack Kiefer (1953) to search for the maximum or minimum of a unimodal function in an interval.
Algorithm
Let k be defined as an element in F, the array of Fibonacci numbers. n = Fm is the array size. If n is not a Fibonacci number, let Fm be the smallest number in F that is greater than n.
The array of Fibonacci numbers is defined where Fk+2 = Fk+1 + Fk, when k ≥ 0, F1 = 1, and F0 = 1.
To test whether an item is in the list of ordered numbers, follow these steps:
Set k = m.
If k = 0, stop. There is no match; the item is not in the array.
Compare the item against element in Fk−1.
If the item matches, stop.
If the item is less than entry Fk−1, discard the elements from positions Fk−1 + 1 to n. Set k = k − 1 and return to step 2.
If the item is greater than entry Fk−1, discard the elements from positio |
https://en.wikipedia.org/wiki/1chipMSX | The One chip MSX, or 1chipMSX as the D4 Enterprise distributional name for the ESE MSX System 3, is a re-implementation of an MSX-2 home computer that uses a single FPGA to implement all the electronics (except the RAM) of an MSX-2, including the MSX-MUSIC and SCC+ audio extensions.
The system is housed in a transparent blue plastic box, and can be used with a standard monitor (or TV) and a PC keyboard.
Original MSX cartridges can be inserted, as well as SD and MMC memory cards as an external storage medium. Even though it lacks a 3.5" disk drive, disks are supported through emulation on a memory card, including support for booting MSX-DOS. Due to its VHDL programmable hardware, it's possible to give the device new hardware extensions by simply running a reconfiguration program under MSX-DOS. The "one chip-MSX" is equipped with two USB connectors, that can be used after adding some supporting VHDL code.
Availability
The ESE MSX System 3 is designed by ESE Artists' Factory and distributed as 1chipMSX by D4 Enterprise and was supposed to be distributed outside Japan by Bazix.
However, due to RoHS regulations in Europe, it was claimed it could not be distributed to Europe in its original form and the European market had to wait for an adapted version which would be produced through Bazix and distributed to Europe by Bazix. However, no violation of RoHS has ever been proven, with all identifiable components of the PCB and power supply being RoHS-compliant.
Bazix stopped being the representative of MSX Association and thus did not bring the 1chipMSX to the Western market. In the end, MSX Association was dissolved due to a dispute with other parties involved, resulting in a shift of all intellectual property rights concerning MSX to MSX Licensing Corporation. Bazix also dissolved because this dispute made an end to their efforts and ambitions to bring the 1chipMSX to the Western market (along with other projects that were also dependent on the Japanese partners).
Hardware specifications
Altera Cyclone EP1C12Q240C8N FPGA chip
32 MB SDRAM
SD/MMC card slot
2 MSX Cartridge slots
2 audio outputs (for future stereo support)
S-Video video output
Composite video output
VGA video output
PS/2 keyboard connector
2 USB connector
2 MSX Joystick ports
FPGA I/O pin (40 pins and 10 pins)
Included are also:
A Short English instruction manual, including a short introduction to VHDL
Full VHDL code used to achieve MSX2 compatibility (default configuration)
A CD-ROM with VHDL code examples and the following software:
Altera Quartus 2 Web Edition - VHDL development environment
PLDLOAD and PLDSAVE - Software to read and program the FPGA chip
EP, FDLOAD and FDSAVE - Software to create, load and play disk images
220 V adapter or 110 V converter plug
Schematics to the One Chip MSX PCB
Blueprint of the One Chip MSX casing
Specifications
Default specifications of the implemented MSX system:
MSX 2 computer system
1 MB RAM
128 kB VRAM
Kanji-ROM
MSX-MUSIC
MSX-DOS2 with FAT16 s |
https://en.wikipedia.org/wiki/WPCL | WPCL is a religious-formatted radio station located in Northern Cambria, Pennsylvania, United States. The station broadcasts programming from the He's Alive network on 97.3 FM.
History
Beginnings as WCCZ-FM
WPCL first signed on the air on September 30, 1991 as WCCZ-FM, licensed to Spangler, which is known today as the Borough of Northern Cambria. The station was the third and final of a group of stations founded by Raymark Broadcasting, a company owned by Ray Goss of Indiana, and Mark Harley, of Clearfield. Raymark had started their company with two other radio stations that they had built prior to this one: WCCS-AM in Homer City and WOKW-FM in Curwensville. Harley had purchased Goss' stake in the company by this time, as Goss wished to pursue other interests.
WCCZ operated on the same principle as its two sister operations...a small programming staff to handle local on-air duties, while relying on a satellite-delivered format to provide music and DJs, enabling its service area to have the benefits of a full-service radio station without the expense of on-site disc jockeys. Though WCCS and WOKW used ABC/SMN's "Starstation" adult contemporary format for their own programming, Raymark chose to affiliate with "Goldies", the oldies format provided by the Jones Radio Network, along with AP world and national news. New studios and offices were constructed in a small storefront in downtown Spangler, at the intersection of PA Routes 219 and 271. In keeping with the network branding, the station became known as "Goldies 97.3".
First sale
However, the station did not achieve the level of success expected by Raymark. The station was put up for sale and was sold for $167,000 in the spring of 1993 to WKYN, Inc., which owned Adult CHR-formatted WKYN-FM (now WDDH) northwest of Spangler in Ridgway, the seat of government for Elk County. WKYN, which operated at the adjacent frequency of 97.5, changed the call letters of WCCZ to WXVE and took on the similar call letters of WKVE to replace WKYN, using WXVE as a translator to bring 97.5's signal closer to the more populous city of Johnstown.
Second sale
WKYN, Inc. was then sold to Cam Communications in 1995, as owner Bob Stevens wished to pursue radio station ownership opportunities in his hometown near Pittsburgh. WXVE was then sold to He's Alive, which operated the station as a network translator for its group of low-powered Christian-formatted radio stations, changing the call letters to WPCL. Unlike many of He's Alive's properties, this one is on the commercial band and is a full-powered Class A property.
WPCL today
In December 2013, He's Alive sold WPCL to Central Pennsylvania Christian Institute, Inc. for $200,000. The sale was consummated on January 24, 2014.
External links
PCL |
https://en.wikipedia.org/wiki/Windows%20Vista%20editions | Windows Vista—a major release of the Microsoft Windows operating system—was available in six different product editions: Starter, Home Basic, Home Premium, Business, Enterprise, and Ultimate. On September 5, 2006, Microsoft announced the USD pricing for editions available through retail channels; the operating system was later made available to retail on January 30, 2007. Microsoft also made Windows Vista available for purchase and download from Windows Marketplace; it is the first version of Windows to be distributed through a digital distribution platform. Editions sold at retail were available in both Full and Upgrade versions and later included Service Pack 1 (SP1).
Microsoft characterized the retail packaging for Windows Vista as "designed to be user-friendly, a small, hard, plastic container designed to protect the software inside for life-long use"; it opens sideways to reveal the Windows Vista DVD suspended in a clear plastic case. Windows Vista optical media use a holographic design with vibrant colors.
With the exception of Windows Vista Starter, all editions support both IA-32 (32-bit) and x64 (64-bit) processor architectures. Microsoft ceased distribution of retail copies of Windows Vista in October 2010; OEM distribution of Windows Vista ended in October 2011.
Editions for personal computers
Much like its predecessor, Windows XP Starter Edition, Windows Vista Starter was available in emerging markets; it was sold across 139 developing countries in 70 different languages. Microsoft did not make it available in developed technology markets such as the United States, Canada, the European Union, Australia, New Zealand, or other high income markets as defined by the World Bank. Windows Vista Starter has significant limitations; it disallows the concurrent operation of more than three programs (although an unlimited number of windows can be opened for each program unlike in Windows XP Starter); disallows users from sharing files or printers over a home network (or sharing a connection with other computers); does not support Windows Media Player media streaming or sharing; displays a permanent watermark in the bottom right corner of the screen, doesn't support Windows Aero, and imposes a physical memory limit of 1 GB and a maximum amount of 120 GB hard disk space. Peer-to-peer networking is also disabled, and there is no support for simultaneous SMB connections.
Consumer-oriented features such as Games Explorer, Parental Controls, Windows Calendar, Windows Mail, Windows Movie Maker (without support for high-definition video), Windows Photo Gallery (without support for sharing photos or themed slideshows), Windows Speech Recognition, and Windows Sidebar are included.
Windows Vista Starter is licensed to run only on PCs with AMD's Athlon XP, Duron, Sempron and Geode processors, Intel's Celeron, Pentium III processors, and certain models of Pentium 4. Windows Vista Starter can be installed from optical media including those belonging t |
https://en.wikipedia.org/wiki/National%20Historical%20Geographic%20Information%20System | The National Historical Geographic Information System (NHGIS) is a historical GIS project to create and freely disseminate a database incorporating all available aggregate census information for the United States between 1790 and 2010. The project has created one of the largest collections in the world of statistical census information, much of which was not previously available to the research community because of legacy data formats and differences between metadata formats. The statistical and geographic data are disseminated free of charge through a sophisticated online data access system.
In addition, NHGIS has created historical and contemporary cartographic boundary shapefiles compatible with every census, and over 50 million lines of metadata describing the collection. Historical U.S. state and county boundaries are available 1790–present, with smaller geographies available as the U.S. Census Bureau created them. Census Tract boundaries are available 1910–present and Block Group and Block boundaries available 1990–present. The cartographic boundary files and the tabular data are formatted so as to be easily linked for use in Geographic Information System software.
NHGIS was launched in 2007 and is maintained by the Minnesota Population Center at the University of Minnesota and is funded by the National Science Foundation and the National Institutes of Health.
Much of the historical data are viewable as tables or interactive maps in Social Explorer, a small company which offers both free and professional licenses.
References
External links
National Historical Geographic Information Systems citations at Google Scholar
National Historical Geographic Information Systems online Forum at Google Groups
Social Explorer
Historical geographic information systems
Demographics of the United States
Demographic history of the United States
Geographic data and information in the United States |
https://en.wikipedia.org/wiki/China%20Historical%20Geographic%20Information%20System | The China Historical Geographic Information System (CHGIS) is a Historical GIS project for creating a database of populated places and historical administrative units for the period of Chinese history between 222 BCE and 1911 CE. The project creates a dataset which tracks changes in place names, administrative status, and geography. It is a joint project of Harvard University and Fudan University. Its director is Professor Peter K. Bol of Harvard.
See also
Geographic Information Systems in China
China Biographical Database (CBDB)
References
External links
Project homepage at Harvard
Project homepage at Fudan
Historical geographic information systems
Geographic history of China
Harvard University
Fudan University |
https://en.wikipedia.org/wiki/List%20of%20diplomatic%20missions%20of%20the%20Marshall%20Islands | This is a list of diplomatic missions of the Marshall Islands. The Republic of the Marshall Islands maintains a small diplomatic network.
America
Washington, D.C. (Embassy)
Honolulu (Consulate)
Springdale (Consulate)
Asia
Tokyo (Embassy)
Taipei (Embassy)
Seoul (Embassy)
Oceania
Suva (Embassy)
Multilateral organisations
New York City (Permanent Mission)
Gallery
See also
Marshall Islands
Foreign relations of the Marshall Islands
References
External links
Embassy of the Republic of the Marshall Islands to the United States of America
Permanent Mission of the Republic of the Marshall Islands to the United Nations
Diplomatic missions
Marshall Islands |
https://en.wikipedia.org/wiki/Kowalewo%20Pomorskie | Kowalewo Pomorskie () is a town in north-central Poland, in Golub-Dobrzyń County, Kuyavian-Pomeranian Voivodeship. It is the capital of the Gmina Kowalewo Pomorskie.
According to data from December 31, 2004, Kowalewo Pomorskie had 4,130 inhabitants.
History
The name Kowalewo can be roughly translated as the "place of a smith". The town was arranged into a rectangular shape, with a typical Central European marketplace. During the times of the Teutonic Knights, Kowalewo was privileged to have its own coat of arms, which represented two red fish on a white background. The coat of arms was modified over the centuries, with one red fish being retained. In the beginning, the town's commander was Rudolf Kowalewo, who owned 1,000 serfs.
The town joined the Prussian Confederation, which opposed Teutonic rule, and upon the request of which King Casimir IV Jagiellon reincorporated the territory to the Kingdom of Poland in 1454. In May 1454 the town pledged allegiance to the Polish King in Toruń. In 1455 King Casimir IV Jagiellon appointed the city's starost, Gabriel Bażyński. Later, when Bażyński became the voivode, Jan Plemięcki, a courtier of the king, was made the starost. All that remains of this castle today is a ruined defensive tower, a local attraction and current symbol of the town. Kowalewo was a royal town administratively located in the Chełmno Voivodeship in the province of Royal Prussia in the Greater Poland Province of the Kingdom of Poland. Two medieval Gothic churches existed in the town, Saint Nicholas' and Saint Anne's.
During the Polish–Swedish War, on February 11, 1629, Field Marshal Wrangel ordered the Swedes to plunder and sack Kowalewo. From 1655 until 1657, during Swedish Deluge, the Swedes occupied the area once more. The subsequent Prussian and Swedish wars, which continued for eighteen years, turned the region into rubble.
There were a series of civil wars during the reign of kings Augustus II the Strong and under Stanisław I Leszczyński in the first half of the 18th century. On October 5, 1716, during Augustus' rule, the Russian army took what was left of Kowalewo's supplies. The town had 1,000 citizens and 120 homesteads before these wars, and by 1772 it had only 300 citizens and 34 homesteads.
The town was annexed by Prussia in the First Partition of Poland in 1772, and afterwards, on September 16, 1772, the local starost, Franciszek Stanisław Czapski, pledged allegiance to the Prussian king, Frederick II of Prussia. This resulted in the town becoming Germanized, as German colonists came to build new homesteads and farms. All former governments were replaced and were now part of the newly established Marienwerder Region. The new government permitted Polish shoemakers, blacksmiths, bricklayers, and carpenters to continue operation.
Many Poles were required to join the Prussian military by the order of Frederick II. Many deserted from their compulsory service in the army. The Prussians also sought to increase the taxes |
https://en.wikipedia.org/wiki/Barry%20Leitch | Barry Leitch (born April 27, 1970 in Strathaven, Scotland) is a Scottish video game music composer, responsible for the music in many games spanning multiple consoles and personal computers. Most notable is his work from the Lotus Turbo Challenge, TFX, Gauntlet Legends, Gauntlet Dark Legacy, Top Gear, and Rush video game series.
Games
The Addams Family (Game Boy, NES - Ocean)
Airborne Ranger (Atari ST, Amiga - Microprose)
American Gladiators (Atari ST, Amiga, Genesis, SNES - Gametek)
Back to the Future Part III (C64 - Probe - not published)
Battlefield (C64 - Atlantis Software)
Boss Rally (PC)
BSS Jane Seymour (PC - Gremlin Graphics)
Butcher Hill (Amiga - Gremlin Graphics)
Captain Blood (Spectrum - Infogrames)
Captain Courageous (C64 - English Software)
Championship Manager (PC - Domark)
Combo Racer (Amiga - Gremlin Graphics)
Daemonsgate (Atari ST, Amiga, PC - Gremlin Graphics)
Demoniak (PC - Bitmap Brothers)
DNA Warrior (Amiga - ACE)
Double Dragon (C64 Console - Gremlin Graphics)
Drakan: Order of the Flame (PC - Psygnosis)
Eek! The Cat (SNES - Ocean)
Emlyn Hughes International Soccer (C64 - Audiogenic Software 1988)
Ferrari Formula One (C64, Atari ST, Spectrum, PC - Electronic Arts 1990)
Fiendish Freddy's Big Top o' Fun (C64, Spectrum, Amstrad)
Federation of Free Traders (PC - Gremlin Graphics)
Frankenstein (Amiga - Enigma Variations - possibly never released)
Gadget Twins (Atari ST, Amiga, Genesis, SNES - Gametek)
Gauntlet Dark Legacy (Atari ST)
Gauntlet Legends (Atari ST)
Gemini Wing (C64, Atari ST, Amiga, Spectrum, Amstrad - The Sales Curve 1988)
Gilbert (C64, Atari ST, Amiga, Spectrum, Amstrad - Enigma Variations 1989)
Harlequin (Amiga, Atari ST - Gremlin Graphics 1992)
HeroQuest (C64, Atari ST, Amiga, Spectrum, Amstrad, PC - Gremlin Graphics)
Horizon Chase (Android, iOS - Aquiris)
Horizon Chase Turbo (Xbox, PS4, PC, Switch - Aquiris)
Horizon Chase 2 (iOS - Aquiris)
The Humans (Atari ST, Amiga, PC, Genesis, SNES, Lynx - Mirage)
Icups (C64 - Odin Software)
Imperium (PC - Electronic Arts)
Impossamole (C64, Atari ST, Amiga, Spectrum, Amstrad, PC - Gremlin Graphics)
Inferno (PC - Ocean)
Jack Nicklaus Golf (NES - Gremlin Graphics)
Jane's Apache Longbow (PC CD Audio - Electronic Arts)
Kick Off 2 (Game Boy, NES - Anco)
Kill Team (PlayStation, Sega Saturn - not published)
Legacy (PC - not published)
Lethal Weapon (Atari ST, Amiga, SNES - Ocean)
Lords of Chaos (PC - not published)
Lotus 2 (Atari ST, Amiga - Gremlin Graphics)
Marauder (C64 - Hewson Consultants 1988)
MicroProse Soccer (Atari ST, Amiga, Spectrum, Amstrad - Microprose)
Mindbender (PC - Gremlin Graphics)
Necromancer (Amiga, PC)
Nightbreed (RPG) (C64, Spectrum, Amstrad - Ocean)
Ocean Football (Amiga - Ocean)
Pegasus (Atari ST, Amiga - Gremlin Graphics)
Pit-Fighter (PC - Domark)
Postman Pat (C64, Spectrum, Amstrad - Enigma Variations)
Powermonger (PC - Electronic Arts)
Premier League (Amiga - Ocean)
The President Is Missing (Atari |
https://en.wikipedia.org/wiki/Taiwanese%20television%20drama | Taiwanese drama (, also known as T.W. drama) refer to dramatic programming of television programming extended stories usually dramatizing relationships through the general range of ten to forty one-hour episodes. They are produced in Taiwan and have gained increasing popularity in the Mandarin-speaking community internationally. The term "Taiwanese drama" is applied to Taiwanese miniseries in general, even including those with greater elements of comedy than of drama.
Origins and range of popularity
During the rapid development of the Four Asian Tigers, the success of the Hong Kong entertainment industry and its TV drama programming served as a major influence for television and entertainment programming in the other rapidly-industrializing Asian nations, most notably Taiwan and South Korea.
Many of these dramas have become popular throughout East Asia and Southeast Asia. Most popular Taiwanese dramas are also popular in Mainland China, Vietnam, Hong Kong and Macau, Japan, Thailand, Singapore, Malaysia, Indonesia and Philippines.
Taiwanese dramas are also well known among expatriate/overseas Asian people. Fan clubs have appeared in other countries outside Taiwan dedicated to the appreciation of Taiwanese drama. Fan clubs also involved several countries in neighbouring Asian nations and elsewhere.
Language
Taiwanese dramas are typically produced in Mandarin. Less commonly, they may be produced in Taiwanese Hokkien. Commonly characters will speak predominantly in Mandarin, but pepper their speech with Taiwanese. Sometimes characters, usually those playing the parts of parents or relatives coming from more rural and poorer areas, will speak in Taiwanese-accented Mandarin.
Subject matter
Taiwanese dramas typically focus more on romance than other television dramas. Crime dramas, police dramas, lawyer dramas, and doctor dramas are less common in Taiwan than romantic dramas. Taiwanese dramas tend to have less violence and sexual content than many other soap operas and primetime dramas.
Popular Taiwanese dramas generally divided into “idol dramas" (偶像劇) and Taiwanese Minnan dramas (台語劇). "Idol dramas" use the most popular singers and actors or actresses in the Taiwanese entertainment industry, most of whom are in their late teens or 20s, regardless of actual acting experience. The idol dramas cater primarily to the teen or 20s age group. The phenomenon started with 2001's Meteor Garden.
Typical subjects can include first teenage experiences with dating. Characters often have some dark secret or painful past that makes it difficult for them to form lasting relationships, and the drama may show characters finding a way to work through their deep personal problems. Love triangles are a common feature.
Taiwanese idol dramas share many similarities in genre with both Japanese dramas and Korean dramas, although they differ considerably in subject matter with Chinese dramas. For example, dramas based on nationalist sentiment and politics are much l |
https://en.wikipedia.org/wiki/Partitioned%20global%20address%20space | In computer science, partitioned global address space (PGAS) is a parallel programming model paradigm. PGAS is typified by communication operations involving a global memory address space abstraction that is logically partitioned, where a portion is local to each process, thread, or processing element. The novelty of PGAS is that the portions of the shared memory space may have an affinity for a particular process, thereby exploiting locality of reference in order to improve performance. A PGAS memory model is featured in various parallel programming languages and libraries, including: Coarray Fortran, Unified Parallel C, Split-C, Fortress, Chapel, X10, UPC++, Coarray C++, Global Arrays, DASH and SHMEM. The PGAS paradigm is now an integrated part of the Fortran language, as of Fortran 2008 which standardized coarrays.
The various languages and libraries offering a PGAS memory model differ widely in other details, such as the base programming language and the mechanisms used to express parallelism. Many PGAS systems combine the advantages of a SPMD programming style for distributed memory systems (as employed by MPI) with the data referencing semantics of shared memory systems. In contrast to message passing, PGAS programming models frequently offer one-sided communication operations such as Remote Memory Access (RMA), whereby one processing element may directly access memory with affinity to a different (potentially remote) process, without explicit semantic involvement by the passive target process. PGAS offers more efficiency and scalability than traditional shared-memory approaches with a flat address space, because hardware-specific data locality can be explicitly exposed in the semantic partitioning of the address space.
A variant of the PGAS paradigm, asynchronous partitioned global address space (APGAS) augments the programming model with facilities for both local and remote asynchronous task creation. Two programming languages that use this model are Chapel and X10.
Examples
Coarray Fortran now an integrated part of the language as of Fortran 2008
Unified Parallel C an explicitly parallel SPMD dialect of the ISO C programming language
Chapel a parallel language originally developed by Cray under the DARPA HPCS project
UPC++, A C++ template library that provides PGAS communication operations designed to support high-performance computing on exascale supercomputers, including Remote Memory Access (RMA) and Remote Procedure Call (RPC)
Coarray C++ a C++ library developed by Cray, providing a close analog to Fortran coarray functionality
Global Arrays a library supporting parallel scientific computing on distributed arrays
DASH a C++ template library for distributed data structures with support for hierarchical locality
SHMEM a family of libraries supporting parallel scientific computing on distributed arrays
X10 a parallel language developed by IBM under the DARPA HPCS project
Fortress a parallel language developed by Sun Micr |
https://en.wikipedia.org/wiki/Green%20Forest%2C%20My%20Home | Green Forest, My Home () is a Taiwanese television series released in 2005. Consisting of a total of 15 episodes, it was broadcast by the SETTV network. It stars Esther Liu, Leon Jay Williams, Ethan Juan, and Song Zhi Ai. Liu, who is also a member of the girl group Sweety, performs the opening theme song.
Synopsis
The series is set in the fictional Royal Spencer Academy of Music. Sophie (Esther Liu) is a wealthy girl. Luoshan (Song Zhi Ai) is the daughter of Sophie's parents' chauffeur. When Luoshan's father dies in an accident while driving drunk, she is adopted by Sophie's family and takes the name Susan instead of Luoshan. Thereon, Susan plans to take whatever Sophie has.
Summary
Su Fei (Sophie) grows up from a family with musical talent. She is a blessed and happy girl with a positive personality and no scheming thoughts.
Luo Shan grows up in Sophie's family. Her father is the Su family's driver. Her mother ran away from home when Luo Shan was young and there has been no information from her since. Luo Shan is envious of Sophie and hopes that one day she can become the type of person that Sophie is.
Luo Shan's father died because he was driving under the influence of alcohol and there has been no information on Luo Shan's mother ever since she ran away when Luo Shan was young. As a result, Sophie's parents adopted Luo Shan and changed her name to Su San(Susan) and became Sophie's older sister.
Growing up as a driver's daughter and thinking of herself as a "low class person" has caused Susan to feel inferior. As a result, Susan has always had a wish. She wished that she can become someone like Sophie because she always believed that as long as she can become Sophie, then she would definitely be happy. Under this type of a psychological shadow, Susan fosters the behavior that as long as Sophie has it, then she must have it too. From childhood to adult, this is the way that Susan treats Sophie. Sophie knows but she continues to remember the words of her mother to regard Susan as her real sister and not to tell anyone that Susan is an adopted child. Moreover, Sophie believes that Susan must be like this because of her background and as a result, she didn't haggle over the matter with Susan.
Susan and Sophie along with Yuan Fang, who grew up together with them, were originally going to study at Green Light Forest, a school with no walls, Green Light Elementary School. However, because they had to move homes, they must leave Green Light Elementary School and go to study at Spencer Royal School of Music. Sophie, who loves her independence, was very unwilling but she still had to go to a school enclosed with high walls - Spencer Royal School of Music. Within the strict Spencer Music School, there is one rule: those who forget to bring their textbooks would receive a beating on their palms.
One day, the founder of Spencer Royal School of Music's son, William, arrives from Austria to listen in on a class. Sophie, who didn't know of William's iden |
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20Warner%20Channel | This is a list of shows that have aired on the cable network Warner TV. Shows currently aired on the network are in bold.
0–9
The 100
2 Broke Girls (currently seen in France, also streaming on HBO Max)
4 Blocks
36th People's Choice Awards
37th People's Choice Awards
38th People's Choice Awards (live telecast)
39th People's Choice Awards (live telecast)
40th People's Choice Awards (live telecast)
63rd Primetime Emmy Awards (live telecast)
64th Golden Globe Awards (live telecast)
64th Primetime Emmy Awards (live telecast)
65th Primetime Emmy Awards (live telecast)
66th Primetime Emmy Awards (live telecast)
A
A to Z
Ace Ventura: Pet Detective
Adult Swim (currently streaming on HBO Max)
Alcatraz
ALF (currently streaming on HBO Max, except United States)
Alice
Aliens in America
All Elite Wrestling
Almost Human
America's Best Dance Crew
Animaniacs (Coming soon currently in Italy, currently streaming on HBO Max in Latin America)
Animal Kingdom (In Brazil seen on AMC)
Angel From Hell
Angie Tribeca (In Brazil seen on TBS)
Are You There, Chelsea?
Arrow
Aqua Teen Hunger Force (currently streaming on HBO Max)
B
The Bachelor
The Bachelorette
Batman: The Animated Series (currently seen on Italy, also streaming on HBO Max)
Batman Beyond
Batwoman (also seen on HBO and HBO Max)
The Bedford Diaries
Beetlejuice
Believe
Better With You
Bewitched
Bipolar (seen only in Brazil)
Bosch (seen only in Germany)
Blade: The Series
Bleach
Blindspot
Boruto: Naruto Next Generations (only in Latin America, also seen on HBO Max)
Bluff City Law (seen only in Germany)
The Brady Bunch
Brooklyn 9-9
C
Californication (currently seen on TNT Series)
Cane
The Cat&Birdy Warneroonie PinkyBrainy Big Cartoonie Show
Chase
Chuck
The Class
Claws
The Client
Close to Home
Club House
Cold Case (currently in Brazil seen on A&E)
Complete Savages
D
Dallas (2012)
Death Note
Deep in the City
Detention
Diff'rent Strokes
Documentários Cultura Pop (seen only in Brazil)
Dragon Ball Super (also seen on Cartoon Network)
Dragon Ball Z Kai (also seen on Cartoon Network)
Droopy
E
E-Ring
Eagleheart
Eight Is Enough (seen only in Italy)
Eleventh Hour
The Ellen DeGeneres Show
ER (currently seen on TNT Series, also streaming on HBO Max)
Everwood
The Evidence
F
The Facts of Life
Fastlane
La Femme Nikita
Flashpoint
Forever
Four Kings
Freakazoid! (currently streaming on HBO Max in Latin America, and coming soon currently in Italy)
Freddie
Friends (currently streaming on HBO Max)
Fringe (currently seen in Italy)
Full House
G
Gilmore Girls
Gimme a Break!
Go On
God Friended Me
Golden Boy
Gossip Girl (2007) (currently streaming in HBO Max)
Gossip Girl (2021) (also streaming in HBO Max)
Gotham (currently seen in Italy)
Ground Floor
Growing Pains (currently seen in Italy)
H
Happy Days
Harry's Law
Hercules: The Legendary Journeys
Histeria!
Harry Potter: Howgarts Tournament of Houses (also seen on Cartoon Network and streaming on HBO Max)
Hostages
Hot Streets
Human Target
I
I Dream of Jeannie
I Hate My Teenage Daug |
https://en.wikipedia.org/wiki/Pear%20people%20%28animation%29 | The Pear People is a series of 3D animated cartoons by John Kay.
Cartoons
Pear People in Car Race
This is one of the earliest 3D animated cartoons, made in 1992, by John Kay using a basic computer program with no interface. It features two Pear characters, a good one and a bad one, competing in a car race. Length 5:30 minutes.
It was first released in the United Kingdom on the 10th of May, 1993.
Pear People in Prisoner
The second cartoon (1993) by John Kay finds our bad pear in prison and tries various ways to escape. Of course, he is always unsuccessful in a disastrous way. Length 6:30 minutes.
External links
Computer animation |
https://en.wikipedia.org/wiki/Viva%20Am%C3%A9rica | Viva América was an American musical radio program which was broadcast live over the CBS radio network and to North and South America over the "La Cadena de las Américas" (Network of the Americas) during the 1940s (1942–1949) in support of Pan-Americanism during World War II. It was also broadcast for the benefit of members of the armed forces in Europe during World War II over the Armed Forces Network. All broadcasts of this program were supervised under the strict government supervision of the United States Department of State and the Office of the Coordinator of Inter-American Affairs (OCIAA) as part of the United States Cultural Exchange Programs cultural diplomacy initiative authorized by President Franklin D. Roosevelt (via Voice of America) during World War II through the Office for Coordination of Commercial and Cultural Relations (OCCCRBAR) and the Office of the Coordinator of Inter-American Affairs directed by Nelson Rockefeller.
This imaginative program represented a unique collaboration between government and private industry during the turbulent World War II era in an effort to foster cultural exchanges and cultural diplomacy throughout the Americas as part of President Franklin D. Roosevelt's Good Neighbor policy. It featured live performances of the CBS Pan American Orchestra under the musical direction of the noted conductor Alfredo Antonini. By 1945, performances by the orchestra on the CBS "La Cadena de los Americas" radio network were enjoyed by audiences in twenty Latin American nations and throughout North America. As a result of its cultural authenticity, it emerged over the years as the network's most popular musical program.
Viva América was primarily conceived in an effort to foster benevolent diplomatic relations throughout the Americas during World War II by showcasing the talents of a wide variety of respected professional musicians from both North and South America. In this regard, it proved to be highly successful and functioned under the direct supervision of the Department of State as a cultural exchange program (as opposed to a propaganda program). The collaborative performances by musicians who were featured on the program also served to introduce large audiences in the United States to innovative forms of Latin music including the Mexican Bolero. Included among the renowned soloists were: Juan Arvizu (the Mexican "Tenor with the Silken Voice"); Nestor Mesta Chayres (Mexican tenor - aka "El Gitano De México"); Eva Garza (Mexican songstress); Terig Tucci, (Argentine composer/arranger) Miguel Sandoval (Guatemalan composer/conductor), Elsa Miranda (Puerto Rican Vocalist/Actress), Los Panchos Trio (Latin vocalists) Manuolita Arriola (Mexican vocalist) and John Serry, Sr. (an American concert accordionist and featured soloist).
Broadcasts of this program were personally supervised by Edmund A. Chester, Vice President at the CBS network and Director of Latin-American Relations and Short Wave Broadcasting (1940 - |
https://en.wikipedia.org/wiki/Storm%20Worm | The Storm Worm (dubbed so by the Finnish company F-Secure) is a phishing backdoor Trojan horse that affects computers using Microsoft operating systems, discovered on January 17, 2007. The worm is also known as:
Small.dam or Trojan-Downloader.Win32.Small.dam (F-Secure)
CME-711 (MITRE)
W32/Nuwar@MM and Downloader-BAI (specific variant) (McAfee)
Troj/Dorf and Mal/Dorf (Sophos)
Trojan.DL.Tibs.Gen!Pac13
Trojan.Downloader-647
Trojan.Peacomm (Symantec)
TROJ_SMALL.EDW (Trend Micro)
Win32/Nuwar (ESET)
Win32/Nuwar.N@MM!CME-711 (Windows Live OneCare)
W32/Zhelatin (F-Secure and Kaspersky)
Trojan.Peed, Trojan.Tibs (BitDefender)
The Storm Worm began attacking thousands of (mostly private) computers in Europe and the United States on Friday, January 19, 2007, using an e-mail message with a subject line about a recent weather disaster, "230 dead as storm batters Europe". During the weekend there were six subsequent waves of the attack. As of January 22, 2007, the Storm Worm accounted for 8% of all malware infections globally.
There is evidence, according to PCWorld, that the Storm Worm was of Russian origin, possibly traceable to the Russian Business Network.
Ways of action
Originally propagated in messages about European windstorm Kyrill, the Storm Worm has been seen also in emails with the following subjects:
230 dead as storm batters Europe. [The worm was dubbed "Storm" because of this message subject.]
A killer at 11, he's free at 21 and kill again!
U.S. Secretary of State Condoleezza Rice has kicked German Chancellor Angela Merkel
British Muslims Genocide
Naked teens attack home director.
Re: Your text
Radical Muslim drinking enemies' blood.
Chinese/Russian missile shot down Russian/Chinese satellite/aircraft
Saddam Hussein safe and sound!
Saddam Hussein alive!
Venezuelan leader: "Let's the War beginning".
Fidel Castro dead.
If I Knew
FBI vs. Facebook
USA occupies Iran
When an attachment is opened, the malware installs the wincom32 service, and injects a payload, passing on packets to destinations encoded within the malware itself. According to Symantec, it may also download and run the Trojan.Abwiz.F trojan, and the W32.Mixor.Q@mm worm. The Trojan piggybacks on the spam with names such as "postcard.exe" and "Flash Postcard.exe," with more changes from the original wave as the attack mutates. Some of the known names for the attachments include:
Postcard.exe
ecard.exe
FullVideo.exe
Full Story.exe
Video.exe
Read More.exe
FullClip.exe
GreetingPostcard.exe
MoreHere.exe
FlashPostcard.exe
GreetingCard.exe
ClickHere.exe
ReadMore.exe
FlashPostcard.exe
FullNews.exe
NflStatTracker.exe
ArcadeWorld.exe
ArcadeWorldGame.exe
Later, as F-Secure confirmed, the malware began spreading the subjects such as "Love birds" and "Touched by Love". These emails contain links to websites hosting some of the following files, which are confirmed to contain the virus:
with_love.exe
withlove.exe
love.exe
frommetoyou.exe
iheartyou. |
https://en.wikipedia.org/wiki/Cardinality%20%28SQL%20statements%29 | In SQL (Structured Query Language), the term cardinality refers to the uniqueness of data values contained in a particular column (attribute) of a database table. The lower the cardinality, the more duplicated elements in a column. Thus, a column with the lowest possible cardinality would have the same value for every row. SQL databases use cardinality to help determine the optimal query plan for a given query.
Values of cardinality
When dealing with columnar value sets, there are three types of cardinality: high-cardinality, normal-cardinality, and low-cardinality.
High-cardinality refers to columns with values that are very uncommon or unique. High-cardinality column values are typically identification numbers, email addresses, or user names. An example of a data table column with high-cardinality would be a USERS table with a column named USER_ID. This column would contain unique values of 1-n. Each time a new user is created in the USERS table, a new number would be created in the USER_ID column to identify them uniquely. Since the values held in the USER_ID column are unique, this column's cardinality type would be referred to as high-cardinality.
Normal-cardinality refers to columns with values that are somewhat uncommon. Normal-cardinality column values are typically names, street addresses, or vehicle types. An example of a data table column with normal-cardinality would be a CUSTOMER table with a column named LAST_NAME, containing the last names of customers. While some people have common last names, such as Smith, others have uncommon last names. Therefore, an examination of all of the values held in the LAST_NAME column would show "clumps" of names in some places (e.g. a lot of Smiths) surrounded on both sides by a long series of unique values. Since there is a variety of possible values held in this column, its cardinality type would be referred to as normal-cardinality.
Low-cardinality refers to columns with few unique values. Low-cardinality column values are typically status flags, Boolean values, or major classifications such as gender. An example of a data table column with low-cardinality would be a CUSTOMER table with a column named NEW_CUSTOMER. This column would contain only two distinct values: Y or N, denoting whether the customer was new or not. Since there are only two possible values held in this column, its cardinality type would be referred to as low-cardinality.
See also
Cardinality (mathematics)
References
SQL |
https://en.wikipedia.org/wiki/Plains%20Cotton%20Cooperative%20Association | Formed in 1953, the Plains Cotton Cooperative Association is a farmed-owned cooperative effort in the United States. PCCA distributes its cotton through its computerized trading system, The Seam.
References
Agricultural organizations based in the United States
Cotton industry in the United States |
https://en.wikipedia.org/wiki/Wahoo%20Studios | Wahoo Studios is a computer and video game development company based in Orem, Utah. Founded in 2001, the company largely serves as consultants or on a contract basis working with larger gaming companies such as Electronic Arts and Microsoft. Historically, the development house has mostly been responsible for console games. Self-funded original games use the NinjaBee brand. Since the release of the Xbox 360, the developer has supported Xbox Live Arcade with multiple releases, including A Kingdom for Keflings and A World of Keflings.
History
When Utah-based video game developer Saffire encountered difficulties in 2001, Steve Taylor left and founded Wahoo Studios, hiring other ex-Saffire employees.
In 2004, Wahoo Studios introduced the brand name NinjaBee for its self-funded games.
In January 2007, Wahoo Studios announced that they were joining the massively multiplayer online game genre with Saga, an MMORTS, based in a persistent world. In August 2007, they split - Saga Games and Silverlode Interactive finished the development of the game.
Titles
Unreleased
Wahoo Studios had been working on Space Station Tycoon.
References
Software companies based in Utah
Video game companies established in 2001
Video game companies of the United States
Video game development companies
2001 establishments in Utah
Companies based in Orem, Utah |
https://en.wikipedia.org/wiki/Cinenacional.com | Cinenacional.com is a web portal and web-based database about Argentine cinema. It is the most comprehensive site for information about the Argentine film industry, with a vast array of information on films, television programs, directors, actors, cinematographers, film editors, production designers, and film viewing figures. As of July 2022 it has 53,567 articles on films in its database, 11,074 technical data sheets, and 25,478 photos. The site receives an average of 18,000 views a day.
History
The management team was organized in August 2000, and went on-line on June 9, 2001.
The founding directors were Diego Papic and Pablo Wittner.
Jorge C. Bernárdez, coauthor of #ElFinDelPeriodismo (2017), was among the critics.
The site claims that the website was labelled of cultural interest by the Buenos Aires government resolution # 136 in 2006 and that since 2007 it has been supported by the Instituto Nacional de Cine y Artes Audiovisuales (INCAA), the official governmental organ that regulates the cinema industry in Argentina. About 15% of the site traffic comes from mainland Spain and about 10% from Mexico.
Reception
DK Eyewitness Guides on Argentina or Buenos Aires recommend the use of the site to find information on Argentine films. In the German language travel Stefan Loose Reiseführer Argentinien mit Montevideo it has been cited as the "National Film Database", where "you can find everything about Argentine films, actors, screenwriters and more". In his book New Argentine Film: Other Worlds, the film critic Gonzalo Aguilar states that "I should point out that despite the usefulness of cinenacional.com, its lists are compiled not according to film titles but through the suggestions of members of the cast/crew."
Analysts from Cinenacional.com, such as Diego Papic, have been cited in the main national newspapers such as La Nación, and its data, such as on film viewership, have been cited in books such as Sophia A. McClennen's Globalization and Latin American Cinema: Toward a New Critical Paradigm (2015).
References
External links
cinenacional.com .
INCAA .
SoloCortos.com
Internet properties established in 2000
Argentine film websites
Online film databases |
https://en.wikipedia.org/wiki/Caregiver | A caregiver, carer or support worker is a paid or unpaid person who helps an individual with activities of daily living. Caregivers who are members of a care recipient's family or social network, and who may have no specific professional training, are often described as informal caregivers. Caregivers most commonly assist with impairments related to old age, disability, a disease, or a mental disorder.
Typical duties of a caregiver might include taking care of someone who has a chronic illness or disease; managing medications or talking to doctors and nurses on someone's behalf; helping to bathe or dress someone who is frail or disabled; or taking care of household chores, meals, or processes both formal and informal documentation related to health for someone who cannot do these things alone.
With an aging population in all developed societies, the role of caregiver has been increasingly recognized as an important one, both functionally and economically. Many organizations that provide support for persons with disabilities have developed various forms of support for carers as well.
Uses
A primary caregiver is the person who takes primary responsibility for someone who cannot care fully for himself or herself. The primary caregiver may be a family member, a trained professional or another individual. Depending on culture there may be various members of the family engaged in care. The concept can be important in attachment theory as well as in family law, for example in guardianship and child custody.
A person may need care due to loss of health, loss of memory, the onset of illness, an incident (or risk) of falling, anxiety or depression, grief, or a disabling condition.
Technique
Basic principles
A fundamental part of giving care is being a good communicator with the person getting care. Care is given with respect for the dignity of the person receiving care. The carer remains in contact with the primary health care provider, often a doctor or nurse, and helps the person receiving care make decisions about their health and matters affecting their daily life.
In the course of giving care, the caregiver is responsible for managing hygiene of themselves, the person receiving care, and the living environment. Hand washing for both caregivers and persons receiving care happen often. If the person receiving care is producing sharps waste from regular injections, then the caregiver should manage that. Surfaces of the living area should be regularly cleaned and wiped and laundry managed.
The caregiver manages organization of the person's agenda. Of special importance is helping the person meet medical appointments. Also routine daily living functions are scheduled, like managing hygiene tasks and keeping health care products available.
Monitoring
The caregiver is in close contact with the person receiving care and should monitor their health in a reasonable way.
Some people receiving care require that someone take notice of their breathing. I |
https://en.wikipedia.org/wiki/Project%20My%20World | Project My World is a reality television series that was broadcast on American satellite TV channel, The 101 Network, an exclusive service of DirecTV. The ten-part series premiered on October 16, 2006 and was shown on Monday nights.
The show followed three women as they traveled the world meeting up with their friends and unsigned bands, all of whom had accounts on MySpace. The program was produced in various European countries over a 30-day period.
The show's hosts, creators and executive producers are actresses/hosts Renee Intlekofer and Shaina Fewell. Taryn Southern, a friend and another actress, was also part of the cast for the first season, but will not return for an upcoming second season. An online search eventually produced Southern's replacement, Bridgetta Tomarchio.
Project My World traveled to Australia and New Zealand in the second season which premiered on October 1, 2007.
About the hosts
Intlekofer is a former professional wrestler who has a degree in sociology from UCLA; she is originally from Oregon.
Fewell grew up on a farm in Indiana and is a music video director.
Bridgetta Tomarchio is originally from Baltimore, Maryland and has been a backup dancer and snake handler. She has performed at some Britney Spears concerts.
Cities visited 2006
Valencia, Spain
Barcelona, Spain
Saint-Tropez, France
Munich, Germany
Verona, Italy
Venice, Italy
Split, Croatia
Paris, France
Ramstein, Germany
London, England
Cities visited 2007
Auckland, New Zealand
Christchurch, New Zealand
Queenstown, New Zealand
Sydney, Australia
Jindabyne, Australia
Hanging Rock, Australia
Melbourne, Australia
Brisbane, Australia
Cairns, Australia
Performing bands 2007
Dead inside the chrysalis
Midnight Youth
The Dukes
Sunburn
Pluto
Elias
Super-Ok!
MC Lesson
Angelas Dish
Kanvas Grey
Dead Day Sun
Skybombers
Events and activities on the show
Tomatillo Festival (Spain)
Hot air balloon Riding (Spain)
Oktoberfest (Germany)
Indoor skydiving (England)
Rappelling (Germany)
Events and activities on the show
Zorbing
Bungee jumping
Winterfest/Queenstown, NZ
Skydiving Great Barrier Reef
V8 car racing
dirt bikes
External links
Website of show
2000s American reality television series
2006 American television series debuts
2007 American television series endings
Audience (TV network) original programming |
https://en.wikipedia.org/wiki/Street%20Slam | Street Slam is a basketball video game developed by Data East for Neo Geo, released in 1994. The game features three-on-three basketball match-ups with a variety of different teams. Street Slam is the only basketball game released on the Neo Geo.
A sequel to the game, known as Dunk Dream '95 in Japan, Hoops '96 in Europe, and simply Hoops in North America, was released in 1995. In 2010, the original game was released for the Wii on the Virtual Console, as well as part of the compilation Data East Arcade Classics.
Gameplay
In the US version of the game, players can select a three-player team from a selection of 10 city-based teams in the United States. In the European and Japanese versions of the game, the cities are replaced with countries around the world. The selection screens, player skin colours and costumes also change between the versions.
Each team has a total of 18 points in several characteristics (Dunk, 3pts, Speed, and Defence), and 8pts max for each. Every team has its own strengths and weaknesses. For example, New York (USA in the JP/EU Version) is good in dunks and bad in 3-pointers; on the other hand, Philadelphia (Taiwan in JP/EU version) is good in 3-pointers and bad in dunks.
Release
Street Slam was first released on the Neo Geo MVS on December 8, 1994, in Japan. The home version was released on the Neo Geo AES on December 9, 1994, and on the Neo Geo CD on January 20, 1995.
Reception
In Japan, Game Machine listed Street Slam on their 15 February 1995, issue as being the eighteenth most-popular arcade game at the time. In North America, RePlay reported the game to be the third most-popular arcade game at the time. According to Famitsu, the Neo Geo CD sold over 4,873 copies in its first week on the market.
On release, Famitsu scored the Neo Geo version of the game a 25 out of 40. Next Generation reviewed the Neo-Geo version of the game, rating it two stars out of five.
Retrospective reviews
Street Slam has been met with equally positive reception from retrospective reviewers in recent years.
Notes
References
External links
Street Slam at GameFAQs
Street Slam at Giant Bomb
Street Hoop at Killer List of Videogames
Street Slam at Killer List of Videogames
Street Slam at MobyGames
1994 video games
ACA Neo Geo games
Arcade video games
Basketball video games
D4 Enterprise games
Data East video games
Head-to-head arcade video games
Marvelous Entertainment franchises
Multiplayer and single-player video games
Neo Geo games
Neo Geo CD games
Nintendo Switch games
PlayStation Network games
PlayStation 4 games
SNK games
Virtual Console games
Windows games
Xbox One games
Zeebo games
Data East arcade games
Video games developed in Japan
Hamster Corporation games |
https://en.wikipedia.org/wiki/Power%20to%20the%20edge | Power to the edge refers to the ability of an organization to dynamically synchronize its actions; achieve command and control (C2) agility; and increase the speed of command over a robust, networked grid. The term is most commonly used in relation to military organizations, but it can equally be used in a civilian context.
"Power to the edge" is an information and organization management philosophy first articulated by the U.S. Department of Defense in a publication by Dr. David S. Alberts and Richard E. Hayes in 2003 titled: "Power to the Edge: Command...Control...in the Information Age." This book was published by the Command and Control Research Program and can be downloaded from the Program's website.
Principles
Power to the edge advocates the following:
Achieving situational awareness rather than creating a single operational picture
Self-synchronizing operations instead of autonomous operations
Information "pull" rather than broadcast information "push"
Collaborative efforts rather than individual efforts
Communities of Interest (COIs) rather than stovepipes
"Task, post, process, use" rather than "task, process, exploit, disseminate"
Handling information once rather than handling multiple data calls
Sharing data rather than maintaining private data
Persistent, continuous information assurance rather than perimeter, one-time security
Bandwidth on demand rather than bandwidth limitations
IP-based transport rather than circuit-based transport
Net-Ready KPP rather than interoperability KPP
Enterprise services rather than separate infrastructures
COTS based, net-centric capabilities rather than customized, platform-centric IT
Agility
The philosophy of power to the edge is aimed at achieving organizational agility. Such agility has six attributes:
Robustness: the ability to maintain effectiveness across a range of tasks, situations, and conditions
Resilience: the ability to recover from or adjust to misfortune, damage, or a destabilizing perturbation in the environment
Responsiveness: the ability to react to a change in the environment in a timely manner
Flexibility: the ability to employ multiple ways to succeed and the capacity to move seamlessly between them
Innovation: the ability to do new things and the ability to do old things in new ways
Adaptation: the ability to change work processes and the ability to change the organization
See also
Network-centric organization
Network-centric warfare
Network simulator
External links
Command and Control Research Program
References
Command and Control Research Program Website
Power to the Edge by Alberts and Hayes (2003)
Power to the Edge presentation by Dr. Margaret Myers, CIO-DOD
"Command and Control Implications of Network-Centric Warfare"
Management
Command and control
Net-centric |
https://en.wikipedia.org/wiki/Attack%20patterns | In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security.
Attack patterns are often used for testing purposes and are very important for ensuring that potential vulnerabilities are prevented. The attack patterns themselves can be used to highlight areas which need to be considered for security hardening in a software application. They also provide, either physically or in reference, the common solution pattern for preventing the attack. Such a practice can be termed defensive coding patterns.
Attack patterns define a series of repeatable steps that can be applied to simulate an attack against the security of a system.
Categories
There are several different ways to categorize attack patterns. One way is to group them into general categories, such as: Architectural, Physical, and External (see details below). Another way of categorizing attack patterns is to group them by a specific technology or type of technology (e.g. database attack patterns, web application attack patterns, network attack patterns, etc. or SQL Server attack patterns, Oracle Attack Patterns, .Net attack patterns, Java attack patterns, etc.)
Using general categories
Architectural attack patterns are used to attack flaws in the architectural design of the system. These are things like weaknesses in protocols, authentication strategies, and system modularization. These are more logic-based attacks than actual bit-manipulation attacks.
Physical attack patterns are targeted at the code itself. These are things such as SQL injection attacks, buffer overflows, race conditions, and some of the more common forms of attacks that have become popular in the news.
External attack patterns include attacks such as trojan horse attacks, viruses, and worms. These are not generally solvable by software-design approaches because they operate relatively independently from the attacked program. However, vulnerabilities in a piece of software can lead to these attacks being successful on a system running the vulnerable code. An example of this is the vulnerable edition of Microsoft SQL Server, which allowed the Slammer worm to propagate itself. The approach taken to these attacks is generally to revise the vulnerable code.
Structure
Attack Patterns are structured very much like structure of Design patterns. Using this format is helpful for standardizing the development of attack patterns and ensures that certain information about each pattern is always documented the same way.
A recommended structure for recording Attack Patterns is as follows:
Pattern Name
The label given to the pattern which is commonly used to refer to the pattern in question.
Type & Subtypes
The pattern type and its associated subtypes aid in classification of the pattern. This allows users to rapidly locate and identify pattern groups that they will have to deal with in their security efforts.
Each pattern will have a type |
https://en.wikipedia.org/wiki/Computer%20performance | In computing, computer performance is the amount of useful work accomplished by a computer system. Outside of specific contexts, computer performance is estimated in terms of accuracy, efficiency and speed of executing computer program instructions. When it comes to high computer performance, one or more of the following factors might be involved:
Short response time for a given piece of work.
High throughput (rate of processing work).
Low utilization of computing resource(s).
Fast (or highly compact) data compression and decompression.
High availability of the computing system or application.
High bandwidth.
Short data transmission time.
Technical and non-technical definitions
The performance of any computer system can be evaluated in measurable, technical terms, using one or more of the metrics listed above. This way the performance can be
Compared relative to other systems or the same system before/after changes
In absolute terms, e.g. for fulfilling a contractual obligation
Whilst the above definition relates to a scientific, technical approach, the following definition given by Arnold Allen would be useful for a non-technical audience:
The word performance in computer performance means the same thing that performance means in other contexts, that is, it means "How well is the computer doing the work it is supposed to do?"
As an aspect of software quality
Computer software performance, particularly software application response time, is an aspect of software quality that is important in human–computer interactions.
Performance engineering
Performance engineering within systems engineering encompasses the set of roles, skills, activities, practices, tools, and deliverables applied at every phase of the systems development life cycle which ensures that a solution will be designed, implemented, and operationally supported to meet the performance requirements defined for the solution.
Performance engineering continuously deals with trade-offs between types of performance. Occasionally a CPU designer can find a way to make a CPU with better overall performance by improving one of the aspects of performance, presented below, without sacrificing the CPU's performance in other areas. For example, building the CPU out of better, faster transistors.
However, sometimes pushing one type of performance to an extreme leads to a CPU with worse overall performance, because other important aspects were sacrificed to get one impressive-looking number, for example, the chip's clock rate (see the megahertz myth).
Application performance engineering
Application Performance Engineering (APE) is a specific methodology within performance engineering designed to meet the challenges associated with application performance in increasingly distributed mobile, cloud and terrestrial IT environments. It includes the roles, skills, activities, practices, tools and deliverables applied at every phase of the application lifecycle that ensure an appli |
https://en.wikipedia.org/wiki/Bambi%20Francisco | Bambi Francisco is a Filipino-American journalist, author, and businesswoman. She is the founder and CEO of Vator, a news website and social network dedicated to high-tech entrepreneurs and investors.
Career
Francisco is a former syndicated columnist and correspondent for Dow Jones MarketWatch. She covered Internet trends and investments across the public and private sectors. Her newsletter reached more than 400,000 subscribers. She started her career at MarketWatch in 1999 as Internet editor and morning business anchor for KPIX, a CBS affiliate - at the time, MarketWatch was owned by CBS.
In 2001, Bambi was named to the "blue-chip" financial reporting all-star team by The Journal of Financial Reporters, the leading organization for the business news industry. Adweek named her one of the top ten most influential journalists on the Web.
When Spike TV launched in 2003 as the "first network for men", Bambi Francisco anchored daily business news reports on the current state of world markets and finance as host of "CBS MarketWatch" on Spike TV.
Among the articles she wrote at MarketWatch was a diary-like account of her three-week trek to Nepal. In it she made a quick allusion to how hiking in the Himalayas was similar to watching the rise and fall of the Internet bubble.
She left MarketWatch in April 2007 to manage her internet startup, Vator, full-time. Concerns were expressed by management regarding conflicts of interest concerning her ownership of the venture during her employment at MarketWatch. Before Vator even launched, Francisco's project received a tremendous amount of press from the front page of the Wall Street Journal, to television media conglomerates, such as the BBC, to respected tech magazines, such as Wired.
Francisco is a frequent speaker on innovation and entrepreneurship. In the spring of 2014, she gave a talk in Las Vegas about what kind of foundation is needed for tech hubs to flourish. She has also become a leading proponent of bringing more tech opportunities to emerging areas, such as Oakland. She has also been credited for helping to boost Oakland's tech image.
Personal life
Bambi's father is Noli Francisco, a Filipino American poker player and entrepreneur.
Bambi and her family live in the San Francisco Bay Area.
Published books
Francisco's book Unequally Yoked, was released in September 2020. The book explores what she claims is the false narrative that America is systemically racist. Peter Thiel said this about the book: "Don’t treat this as a political book. It is a work of intelligence: Bambi has lived behind enemy lines of both factions in the American culture war; and both would do well to learn from her reporting and analysis.”
References
Living people
American women journalists
1966 births
21st-century American women |
https://en.wikipedia.org/wiki/Gnat%20%28disambiguation%29 | A gnat may be one of a variety of small insects.
Gnat or GNAT may also refer to:
GNAT, a Free Software compiler for the Ada programming language
Grand National Assembly of Turkey
Gnat (surname)
Gnat Computers, an early microcomputer company
GNAT (torpedo), the Allied term for the German G7es homing torpedo
Folland Gnat, a light jet fighter/trainer aircraft
GNAT-750, an unmanned aerial vehicle
"Gnat" (song), by Eminem from the 2020 album Music to Be Murdered By: Side B
See also
Gnats (disambiguation) |
https://en.wikipedia.org/wiki/Run%20command | The Run command on an operating system such as Microsoft Windows and Unix-like systems is used to directly open an application or document whose path is known.
Overview
The command functions more or less like a single-line command-line interface. In the GNOME (a UNIX-like derivative) interface, the Run command is used to run applications via terminal commands. It can be accessed by pressing . KDE (a UNIX-like derivative) has similar functionality called KRunner. It is accessible via the same key binds.
The Multics shell includes a run command to run a command in an isolated environment. The DEC TOPS-10 and TOPS-20 Command Processor included a RUN command for running executable programs.
In the BASIC programming language, RUN is used to start program execution from direct mode, or to start an overlay program from a loader program.
Accessing the Run command
Starting with Windows 95, the Run command is accessible through the Start menu and also through the shortcut key . Although the Run command is still present in Windows Vista and later, it no longer appears directly on the Start menu by default, in favor of the new search box and a shortcut to the Run command in the Windows System sub-menu.
The Run command is launched in GNOME and KDE desktop environment by holding .
Uses
Uses include bringing up webpages; for example, if a user were to bring up the Run command and type in http://www.example.com/, the user's default Web Browser would open that page. This allows user to not only launch http protocol, but also all registered URI schemes in OS and applications associated with them, like mailto and file.
In GNOME and KDE, the Run command acts as a location where applications and commands can be executed.
See also
KDE Plasma 4
Start (command)
References
External links
Customizing Windows Run command
350+ Run Commands for Windows XP, Vista, 7, 8 & 8.1
156 Useful Run Commands
Alternative to the standard Windows Run-Dialog.
Windows components |
https://en.wikipedia.org/wiki/Dialnorm | Dialnorm is the metadata parameter that controls playback gain within the Dolby Laboratories Dolby Digital (AC-3) audio compression system. Dialnorm stands for dialog normalization. Dialnorm is an integer value with range 1 to 31 corresponding to a playback gain of -30 to 0 dB (unity) respectively. Higher values afford more headroom and are appropriate for dynamic material such as an action film.
Dolby recommends that the dialnorm value be determined by measurement of average dialog level in the program. The recommended metering approach uses a power sum of the A-weighted audio level in all channels. If every producer and distributor uses this method, consumer dialog levels will be consistent from program to program and channel to channel. The dialog levels will be normalized.
Historical basis
Audio levels within analog disk, tape and broadcasting have traditionally been adjusted to keep peak levels within the physical and legal modulation limits of the medium. While this practice has resulted in relatively consistent dialog levels and has minimized audibility of channel noise, it has come with a severe penalty in the form of excessive audio compression and limited dynamic range.
Digital recording has eliminated the concern for noise, but the lack of a standard for digital audio level has resulted in compact disc recordings and portable music player files with widely varying levels. Increasingly, digital music is excessively compressed, to ensure that the selection is not perceived by the listener as being too soft in comparison with other sources.
Dolby Laboratories sought to provide wide dynamic range and consistent audio levels in the Dolby Digital encoding system. One approach would have been to require audio levels at the encoder input to be adjusted to a fixed value. Instead, AC3 allows producers to choose input level over a wide range, by including a required dialnorm value representing the measured dialog level of the input signal.
Use within US digital television
The Dolby Laboratories recommendation for dialnorm has the force of law for US Digital Broadcasting, through the FCC's adoption of ATSC A/53 Annex B, section 5.5 Dialogue Level: "The value of the dialnorm parameter in the AC-3 elementary bit stream shall indicate the level of average spoken dialogue within the encoded audio program."
Many broadcasters were unaware of this requirement and did not initially configure their encoding equipment for a proper dialnorm value. Many broadcasters also lacked the means to measure average dialog level and the means to implement a matching dialnorm value for each program. The result was a wide disparity in audio levels when changing between digital broadcast channels through over-the-air and cable distribution.
Development of BS.1770
While appropriate for the measurement of dialog loudness, the A-weighted measurement originally used for determination of the dialnorm parameter is not suitable for the measurement of music loudness. In re |
https://en.wikipedia.org/wiki/Bobbi%20Johnson | Barbara Joan "Bobbi" Johnson (born March 24, 1945) is an American former computer application engineer and beauty pageant titleholder who held the Miss USA 1964 title and has competed in the Miss Universe pageant.
After winning the Miss District of Columbia USA crown, Johnson went on to become the first representative from the District of Columbia to achieve the title of Miss USA, at age 19. She would be the only titleholder from the District until Shauntay Hinton won the crown in 2002. Johnson went on to compete in the Miss Universe 1964 pageant, where she made the semi-finals.
Johnson later worked as an applications engineer in the computer department of General Electric to program GE 400-series and DATANET-30 computer systems. She was interviewed about her career choice in the book Your Career in Computer Programming published in 1967. In the book, she explained how after winning her Miss USA title she was asked by reporters what career ambition she had: "I guess they thought I’d say something like modeling or becoming an actress, but I said the first thing that popped into my head: that I wanted to be a computer programmer…". The book also includes side-by-side photographs of her as Miss USA and at her console as an applications engineer a few years later.
Bobbi later returned to school and would graduate magna cum laude from North Central College, receiving a degree in accounting. After passing the Certified Public Accountant exam she worked in tax accounting.
References
External links
Miss USA official website
with actor Marlon Brando
1945 births
American computer programmers
Living people
Miss Universe 1964 contestants
Miss USA 1960s delegates
Miss USA winners
People from Alexandria, Virginia
20th-century American people |
https://en.wikipedia.org/wiki/Calcomp | Calcomp Technology, Inc., often referred to as Calcomp or CalComp, was a company best known for its Calcomp plotters.
History
It was founded as California Computer Products, Inc in 1959, located in Anaheim, California.
Sanders Associates, Inc., purchased Calcomp in 1980. In 1986, Sanders Associates was purchased by the Lockheed Corporation, and merged into Lockheed's Information Systems Group. Lockheed kept CalComp as a brand name.
Shutdown
Calcomp Technology shut down its operations in 1999, and transferred different product lines to various other companies, some of whom continue to use the "Calcomp" or other "Cal-" trademarks:
Technical Services and spare parts: CalGraph Technology Services, Inc.
TechJet 5500 Large Format Inkjet Plotter / Printer Information: CalComp Graphics.
Digitizer, Tablets and scanners: GTCO CalComp, Inc.
Film Imaging Systems: EcoPro Imaging (now part of OYO Instruments)
Cutter and sign maker products: Westcomp
Products
It produced a wide range of plotters (both drum and flat-bed), digitizers, thermal transfer color printers, thermal plotters (InfoWorld June 13, 1994 p. 40) and other graphic input/output devices. In 1969, it produced about 80% of all plotters worldwide.
It also produced IBM plug compatible (PCM) disk and tape products. The disk products ranged from 2311 (CD-1,5, 17, 18, 24, 25) through 3350 equivalents. The tape product was a 3420 equivalent.
Calcomp acquired Talos and Summagraphics, which had acquired Houston Instruments.
Houston Instruments
Houston Instruments was another manufacturer of pen plotters. They used the DMPL plotting control language. They competed with Hewlett Packard plotters such as the HP 7470.
They were purchased by Summagraphics.
DMP-29
DMP-40, DMP-41, DMP-42
DMP-50, DMP-51, DMP-51MP, DMP-52, DMP-52MP, DMP-55, DMP-56
DMP-60, DMP-61, DMP-61DL, DMP-62, DMP-62DL, DMP-63, DMP-64, DMP-65C
DMP-161, DMP-162, DMP-162R
Computer division
In 1987, CalComp sold its computer division to a company that focuses on CAD/CAM.
References
External links
Referenceforbusiness.com: "History of Calcomp (California Computer Products, Inc.)"
1958 establishments in California
1980 disestablishments in California
American companies established in 1958
Companies based in Anaheim, California
Computer companies established in 1958
Computer companies disestablished in 1980
Computer printer companies
Defunct companies based in Greater Los Angeles
Defunct computer companies based in California
Defunct computer companies of the United States
Defunct computer hardware companies
Graphics hardware
Lockheed Corporation
Technology companies based in Greater Los Angeles
Technology companies established in 1958
Technology companies disestablished in 1980 |
https://en.wikipedia.org/wiki/Ariana%20Television%20Network | Ariana Television Network (ATN) (Dari/Pashto: ) is a private television network based in Kabul, Afghanistan. The channel was launched by Afghan-American Ehsan Bayat (owner of Afghan Wireless Communication Company) in 2005 and started broadcasting internationally the following year. ATN is one of the leading television channels in Afghanistan and has terrestrial coverage in 33 of 34 provinces in the country.
History
The channel was launched in summer 2005 and aired internationally from 2006. In 2014 the channel had a new logo. That same year its sister channel Ariana News, broadcasting news all day, was launched.
Programming
ATN has social, cultural, political and entertaining programs focusing to show pure Afghan culture. Some long running shows include Entekhāb-e Binendahā (Viewer's Choice, a music show), Parwāna-hā (Butterflies, a children's show), Cinemā, Warzesh (Sports), Setārahā-ye Rangin (Colored stars, a music show) and the annual ATN Awards.
59-Minute Duel is a popular cooking show airing since 2011 in which two rival cooks have exactly 59 minutes to cook a three part course for the judges. Every week, a unique ingredient would be provided, and the meals had to be based around it. The prize is the title of "The Golden Chef", awarded to the winner after the scores had been given by the usually celebrity judges. On many occasions, the chefs would be an Afghan and a foreigner, such as a soldier from the American or British base.
Ariana has also been the product of a well known comedy character Motakhases, who appeared on the former Khanda Hāy-e Girya Dār comedy show and later on Hekāyat Hāye Motakhases.
Other airing programs of Ariana Television Network are:
Mehmān-e Man
Yādeman
Yoz-Ma-Yuz (Uzbek)
Bouy-e Māh
Darman
Techpedia
Saat-e-10
Musafir
Sobh-o-Zendagi
Marā Bebakhsh (Dari translation of Turkish drama Beni Affet)
Former notable programming
Top 5, a music show
Ariāna dar Nim-e roz, a talk and cultural show
Haqiqat (The Truth), an investigative political show
Khanda Hāy-e Girya Dār, a comedy show
Who Wants to Be a Millionaire?, Afghan version of the British game show
Chashme Shishayi, a cinema show
Ariana Television Network has aired various Indian soap dramas, some of which achieved high popularity in Afghanistan.
Banoo Main Teri Dulhann
Kumkum – Ek Pyara Sa Bandhan
Heena
Khwaish
Mitwa Phool Kamal Ke
Zaara
Sasural Genda Phool
Bidaai
Maayke Se Bandhi Dor
2008 journalist arrest
Ariana Television Network gained international attention when Mohammad Nasir Fayyaz, a journalist and presenter of Ariana's hard-talk political debate show Haqiqat (The Truth in English), was detained by Afghan authorities on July 29, 2008. Fayyaz was critical of members of the country's cabinet at the time. He was detained by the intelligence agency National Directorate of Security (NDS) whilst he was presenting the show, and was released after one day but again returned to detention. Amnesty International warned the Afghan government to protect p |
https://en.wikipedia.org/wiki/Monotone%20cubic%20interpolation | In the mathematical field of numerical analysis, monotone cubic interpolation is a variant of cubic interpolation that preserves monotonicity of the data set being interpolated.
Monotonicity is preserved by linear interpolation but not guaranteed by cubic interpolation.
Monotone cubic Hermite interpolation
Monotone interpolation can be accomplished using cubic Hermite spline with the tangents modified to ensure the monotonicity of the resulting Hermite spline.
An algorithm is also available for monotone quintic Hermite interpolation.
Interpolant selection
There are several ways of selecting interpolating tangents for each data point. This section will outline the use of the Fritsch–Carlson method. Note that only one pass of the algorithm is required.
Let the data points be indexed in sorted order for .
Compute the slopes of the secant lines between successive points: for .
These assignments are provisional, and may be superseded in the remaining steps. Initialize the tangents at every interior data point as the average of the secants, for .For the endpoints, use one-sided differences: .If and have opposite signs, set .
For , where ever (where ever two successive are equal),set as the spline connecting these points must be flat to preserve monotonicity.Ignore steps 4 and 5 for those .
Let .If either or is negative, then the input data points are not strictly monotone, and is a local extremum. In such cases, piecewise monotone curves can still be generated by choosing if or if , although strict monotonicity is not possible globally.
To prevent overshoot and ensure monotonicity, at least one of the following three conditions must be met:
(a) the function , or
(b) , or
(c) .
Only condition (a) is sufficient to ensure strict monotonicity: must be positive.
One simple way to satisfy this constraint is to restrict the vector to a circle of radius 3. That is, if , then set , and rescale the tangents via .
Alternatively it is sufficient to restrict and . To accomplish this if , then set .
Cubic interpolation
After the preprocessing above, evaluation of the interpolated spline is equivalent to cubic Hermite spline, using the data , , and for .
To evaluate at , find the index in the sequence where , lies between , and , that is: . Calculate
then the interpolated value is
where are the basis functions for the cubic Hermite spline.
Example implementation
The following JavaScript implementation takes a data set and produces a monotone cubic spline interpolant function:
/*
* Monotone cubic spline interpolation
* Usage example listed at bottom; this is a fully-functional package. For
* example, this can be executed either at sites like
* https://www.programiz.com/javascript/online-compiler/
* or using nodeJS.
*/
function DEBUG(s) {
/* Uncomment the following to enable verbose output of the solver: */
//console.log(s);
}
var outputCounter = 0;
var createInterpolant = function(xs, ys) {
var i, length = xs.le |
https://en.wikipedia.org/wiki/H2Ceramic%20cooling | {{DISPLAYTITLE:H2Ceramic cooling}}
H2Ceramic cooling (also called H2C or Hot-to-Cold) is a computer cooling product offered as an option in Dell's XPS gaming systems, advertised specifically as facilitating CPU overclocking. H2C is a two-stage Liquid/Thermoelectric (TEC) hybrid cooling system that combines a liquid-to-air heat exchanger (much like a liquid radiator), a thermoelectric fluid chiller, and control circuitry to optimize CPU cooling with minimal power.
The components are delivered as a single unit designed to last a minimum of 5 years without service or liquid refilling. The XPS 710 H2C and Dell XPS 720 H2C featured a design where all components were mounted in a single plastic chassis and which only cooled the CPU. This design only matched motherboards with a very specific CPU socket location and was later replaced by a new and more flexible design featuring a separate pump unit which made it much easier to fit a broader range of motherboards with different CPU socket locations. The new design allowed the unit to cool the motherboard chipset as well.
Components
The front of the unit (facing the front of the PC case) has a 120 mm Radiator which is the primary heat exchanger. It is cooled by a fan. After passing the radiator, the cooling liquid moves through a thermoelectric fluid chiller consisting of a liquid cooling block with two Peltier plates. The pump includes an integrated reservoir and spring-loaded floor, to keep the unit pressurized while still allowing small amounts of liquid to bleed out over time.
The first version of the H2C cooled the CPU only. Later versions cooled both the chipset and CPU using a design with automotive rubber tubing to allow greater flexibility in the placement of the cooling plates.
Pump, fan and TEC control
Rather than having the control mechanism integrated into the H2C unit, the pump, fans and TEC are controlled separately by a Dell daughterboard, the Master Control Board (MCB). The MCB uses Enthusiast System Architecture (ESA) to monitor and control the pump, fans and TEC (in addition to controlling the XPS LED lights, other fans, and sensors). To avoid condensation the MCB firmware limits the use of the TECs and turns them on only when the CPU is under heavy load. The TECs are turned off when the CPU is idle or when the CPU temperature is the same as the ambient temperature (measured by the MCB).
The H2C system cannot be reused in another computer case without the MCB or custom-made control circuits to take its place.
Performance
According to Dell, the cooling efficiency of H2C contributes to PC systems that are cooler in over-clocked mode and potentially quieter in normal operating mode. By cooling the CPU below what is possible with traditional forced-air convection or water cooling systems, but preventing the temperature from falling below ambient room temperature, H2C is advertised as extending CPU life while eliminating the risk of humidity condensation.
While Dell continues to off |
https://en.wikipedia.org/wiki/Katherine%20Nash | Katherine Elizabeth Nash (1910–1982) was an American artist and sculptor best known for computer art and direct and arc welding. The Katherine E. Nash Gallery at the University of Minnesota Department of Art's Regis Center for Art bears her name.
Family and early career
Katherine Nash was the daughter of Carl and Elizabeth Flink and sister of Alice Flink of Minneapolis, Minnesota. She studied at the Minneapolis School of Art, the university and the Walker Art Center School. While at Walker Art Center School, Katherine took courses in sculpture and painting techniques.
Katherine married attorney Robert C. Nash in 1934.
After Robert Nash, who worked for the U.S. federal government as a Special Investigator for the IRS's Enforcement Branch of Alcohol and Tobacco Tax, was transferred to Lincoln, Nebraska, Katherine was hired as an instructor at the University of Nebraska. She eventually became an Assistant Professor. While at the University in Lincoln, Kathrine studied welding, foundry work, pattern making, and took jewelry classes. After Robert was transferred to Omaha, Nebraska in 1953, Katherine became head of the exhibitions program at the Joslyn Art Museum, while still continuing to teach at the University.
Katherine and Robert returned to Minneapolis in 1957. Katherine started teaching at the Minnetonka Center for the Arts. During the years of 1957 to 1963, both Robert and Katherine temporarily relocated, he - to Washington, D.C., she - to California, where she worked as a visiting professor at the San Jose State College for a semester. But in 1963, both Katherine and Robert returned to their home on St. Alban's Bay, Lake Minnetonka, near Excelsior, Minnesota.
Katherine and Robert didn't have children. In a 1976 interview, Katherine commented about her choice not to have children: "Personally, with the energies that I feel I have, I don't believe I could have been a successful mother and really worked on my art hard enough. It isn't that I wouldn't have tried."
ART 1
In 1970, Nash then of the University of Minnesota and Richard H. Williams of the University of New Mexico published Computer Program for Artists: ART 1. The authors described three approaches an artist might take to use computers in art:
The artist can become a programmer or software engineer
Artists and software engineers can cooperate, or
The artist can use existing software. At that time, ART 1 existed and she chose this path.
ART 1 output, like Rain Pattern, No. 3 from 1969, was an early example of not writing algorithms to produce art but of instead creating art with software.
Katherine's leading role in the creation of ART 1 and its successor, ART 2, is covered extensively in Sharing Code, by Patrick Frank.
Galleries
In 1957 Nash was acting director of the University Gallery in Northrop Auditorium that became the Weisman Art Museum across Washington Avenue. From 1961–1976, Nash was professor of sculpture in the University of Minnesota Studio Arts Department, now the |
https://en.wikipedia.org/wiki/Timex%20Datalink | Timex Datalink or Timex Data Link is a line of early smartwatches manufactured by Timex and is considered a wristwatch computer. It is the first watch capable of downloading information wirelessly from a computer. As the name implies, datalink watches are capable of data transfer through linking with a computer. The Datalink line was introduced in 1994 and it was co-developed with Microsoft as a wearable alternative to mainstream PDAs with additional attributes such as water resistance, that PDAs lacked, and easy programmability. The watch was demonstrated by Bill Gates on 21 June 1994 in a presentation where he downloaded information from a computer monitor using bars of light and then showed to the audience the downloaded appointments and other data. The early models included models 50, 70, 150 and model 150s (small size). The model numbers indicated the approximate number of phone numbers that could be stored in the watch memory. These early models were, at the time of their introduction, the only watches to bear the Microsoft logo. The watches have been certified by NASA for space travel and have been used by astronauts and cosmonauts in space missions. There had been an evolution over the years as to the number and type of entries that can be stored in the various watch models as well as the mode of data transfer between computer and watch. At the time of its introduction the watch was considered high-tech.
There is also the Timex Beepwear Datalink series, featuring wearable pagers using the Timex datalink platform which also function as electronic organisers.
Wireless data transfer mode
Although there are other watches capable of storing all kinds of data, most had either a small keyboard or buttons, which could be used to input data. In most cases data was lost when the battery expired. Upon introduction of the Timex Datalink models, "data watches" such as those from Casio were noted as selling for "between a third and a half the price" of such models, but the "fiddly little buttons" (having to be pressed repeatedly to select letters from the alphabet) were regarded as less convenient and largely only appealing to those used to "doing things the hard way". The Datalink models also offered water resistance to a depth of 100 metres, Timex's Indiglo backlighting, and "the build quality that helped make Timex a household name", although this robustness was reported as making the product more like "the kind of "chunky, clunky watches that divers prefer", being around one-and-a-half inches in diameter and standing "over half an inch proud of the wrist".
The Timex Datalink watches downloaded data wirelessly by illuminating a computer screen with a changing display encoding information to transfer, which was detected by the watch's sensor. Data to be transferred to Datalink watches was held in a database maintained by the Datalink software running on a Windows-based host computer, with alarms, appointments, anniversaries, phone numbers, remi |
https://en.wikipedia.org/wiki/Arnold%20Allen%20%28mathematician%29 | Arnold Oral Allen (died 2004) was an American instructor, public speaker, and writer who worked at IBM and Hewlett-Packard, and specialized in the analysis and mathematical modelling of computer performance.
Biography
Allen earned a Ph.D. in mathematics at UCLA in 1962 under Angus Taylor with a dissertation entitled Banach and Hilbert Spaces of Analytic Functions, where he later lectured. At IBM, he taught at the Information Systems Management Institute in Los Angeles, California. Later, at Hewlett-Packard, he was a member of the Performance Technology Center, then a researcher at the Advanced Technology Group in Roseville, California.
Allen was elected as a director of the Computer Measurement Group (CMG), and selected to be the keynote speaker at two international conferences. He was an invited speaker at the Sixth International Conference on Modelling Techniques and Tools for Computer Performance Evaluation, held in Edinburgh, Scotland in September 1992.
In 1994, he received the Computer Measurement group's A. A. Michelson award for technical excellence and professional contributions as a teacher and inspirer of others.
Work
Allen is most well known as the author of the book, Probability, Statistics, and Queueing Theory with Computer Science Applications. Originally published in 1978, and still in print in 2007, it is widely used as a university textbook, by practitioners of computer performance analysis, and by those wishing to apply probability, statistics and queueing theory techniques to solve problems in other fields, such as operations research, management science, engineering, and physics.
At IBM and Hewlett-Packard, Allen's students were typically systems engineers and project managers, not computer scientists. He encouraged them to improve upon the informal approaches to computer performance analysis that were (and still are) in common use, applying more formal methods and using mathematical models to predict how the performance of a computer system would behave as workloads increased. He began his 1994 book, Computer Performance Analysis with Mathematica, with this observation:
He concluded the book by quoting George Bernard Shaw: "The reasonable man adapts himself to the world; the unreasonable man persists in trying to adapt the world to himself. Therefore all progress depends on the unreasonable man". Allen commented, "I hope the reader fits Shaw's definition of unreasonable, and wants to change things for the better".
Publications
1978. Probability, statistics, and queueing theory : with computer science applications
1994. Introduction to computer performance analysis with Mathematica.
1996. Mathematica CD-ROM library
References
People in information technology
American operations researchers
University of California, Los Angeles alumni |
https://en.wikipedia.org/wiki/C%20standard | C standard may refer to:
ANSI C, C99, C11, C17, or C23, specifications of the C programming language
C standard library
C tuning (guitar), a type of tuning for guitars |
https://en.wikipedia.org/wiki/Dead%20or%20Alive%3A%20Final | Dead or Alive: Final is a 2002 Japanese cyberpunk science fiction film directed by Takashi Miike. It is the third in a three-part series, preceded by Dead or Alive in 1999 and Dead or Alive 2: Birds in 2000. The films are not connected in any apparent way except by director Takashi Miike and stars Riki Takeuchi and Show Aikawa. Besides Japanese, much of the dialogue in the film is in Cantonese and some is in English. Often, two people will talk to each other using different languages.
Plot
In the 24th century C.E., Yokohama has grown massively and is under the control of Mayor Woo. As mayor, Woo has begun forcibly sterilizing the local population, forcing all citizens to take birth control pills. His laws are enforced by a loyal officer, Takeshi Honda. Ryo, an aimless drifter, is attacked by government forces; during the ensuing fight, Honda realises that Ryo is a replicant left over from a civilization ending war. Ryo eludes capture and follows a child who had previously been asking him for food back to the base of a rebel outfit intent on ending Woo's tyrannical regime. Some of the rebels had been captured earlier and Woo has spent many hours trying to persuade them to give up their children and turn against the rebels. With Ryo on their side and believing that now is the perfect time to strike, the rebels attempt to kidnap Mayor Woo at a public event in order to ransom him for their captured friends. During the attempted kidnapping internal divisions boil over when some members of the group start stealing valuables from guests, Woo signals his body guards and they begin fighting back. The mission aborted, the group of rebels make their way outside and commandeer a school bus, realizing that one child, Honda's son, remains on board. Returning to their base, the child who met Ryo befriends him. The group's internal divisions end in a coup where a group ousts the leader before themselves being incapacitated or killed by Ryo, leaving only a skeleton force.
Seeing Honda's son as akin to a grandson, Woo agrees to trading him back for the prisoners of the rebels. They agree to meet and Honda's son is returned as are the prisoners. One couple, however, made a deal with Woo, and upon leaving the prisoner transport system, opens fire on the group, killing most of them - including the leader. Ryo, the boy and a surviving rebel go into hiding, leaving another rebel alone to wander off. They come across a movie theater and the boy manages to sneak Honda's son out to join them. Honda tracks them down and fights with Ryo until his son appears and urges him to stop. He takes him home and both men agree to fight again some other time. Honda returns home and discovers that his wife is a replicant, confronting Woo he discovers that he is also a replicant, as is his son. As part of his programming he is unable to attack Woo who reveals that his plan to sterilize everyone has grown from the belief that the "Old World" was limiting and unnecessary. Leaving, Hond |
https://en.wikipedia.org/wiki/SNEL | SNEL may refer to:
Sasken Network Engineering Limited, a wholly owned subsidiary of Sasken Communication Technologies
Société nationale d'électricité, the national electricity company of the Democratic Republic of the Congo
See also
Snel, a Dutch surname |
https://en.wikipedia.org/wiki/Lewis%20Manilow | Lewis Manilow (born Irvin Inger; August 11, 1927 – December 12, 2017) was an American attorney, real estate developer, and arts patron.
Biodata
Manilow was known as one of the founders of the Museum of Contemporary Art, Chicago. He helped fund the Museum of Contemporary Art, Chicago, in collaboration with Joseph Randall Shapiro and other contemporary art collectors in 1967 when Hugh Hefner made the former Playboy Enterprises-owned space on 237 E. Ontario St. available.
He was a principal backer and longtime honorary president of Chicago's Goodman Theatre and the developer of the town of University Park, Illinois, where he was instrumental in the creation of the Nathan Manilow Sculpture Park, a monumental internationally recognized outdoor sculpture park at Governors State University.
Manilow was a lifetime trustee of the Art Institute of Chicago, served as a member of the U.S. Advisory Commission on Public Diplomacy, and served on the boards of the National Democratic Institute for International Affairs, the Progressive Policy Institute, the Visiting Committee of the University of Chicago's Harris School of Public Policy, and the Executive Committee of the Chicago Community Trust.
Manilow was awarded the National Medal of Arts in 2000.
Personal life
In 1970 Manilow married his second wife, Susan (née Rosenberg), who came from a powerful West Side Jewish political family, former wife of Edwin W. Eisendrath Jr. and the mother of Edwin Eisendrath. The two were married for almost half a century, until his death.
References
Further reading
Kirshner, Judith Russi, and Anselm Kiefer. Lewis Manilow, a Birthday Book. Chicago: New Art Examiner Press, 1997.
External links
U.S. Advisory Commission on Public Diplomacy profile
Nathan Manilow Sculpture Park profile (Governors State University)
2001 Illinois Legislature resolution honoring Lewis Manilow
"What's a Dem donor to do?" Chicago Business, Jan. 15, 2007
"17th C. West Anatolian Coupled-Column Prayer Rug Probably Oushak From the Lewis Manilow Collection"
Bob Goldsborough, Lewis Manilow, philanthropist who played key roles with MCA, Loop theater district, dies at 90, The Chicago Tribune, December 12, 2017 (obituary)
Maureen O'Donnell, Lewis Manilow dies, helped found Chicago’s Museum of Contemporary Art, The Chicago Sun-Times, December 13, 2017 (obituary)
1927 births
2017 deaths
Philanthropists from Illinois
United States National Medal of Arts recipients
Film producers from Illinois
Lawyers from Chicago
People from University Park, Illinois
Jewish American attorneys
Deaths from Alzheimer's disease
20th-century American lawyers
20th-century American philanthropists
Neurological disease deaths in Illinois
21st-century American Jews |
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20PBS | The following is a list of programs currently or formerly distributed through the American PBS stations and other public television entities.
Current programming
1 Syndicated to public television stations by the National Educational Telecommunications Association.
2 Syndicated to public television stations by Executive Program Services.
3 Syndicated to public television stations by WestLink.
4 Running only on selected PBS stations.
5 Reruns are available to public television stations.
Original programming
Washington Week (1967)
American Black Journal (1968)
Masterpiece (1971)
Great Performances (1972)
Nova (1974)
PBS NewsHour (1975)
Austin City Limits (1976)
The Woodwright's Shop (1979)
This Old House (1979)
MotorWeek (1981)
Nature (1982)
Frontline (1983)
American Masters (1986)
American Experience (1988)
P.O.V. (1988)
Ciao Italia (1989)
Antiques Roadshow (1997)
Independent Lens (1999)
Secrets of the Dead (2000)
Ask This Old House (2002)
BBC World News America (2019)
Finding Your Roots (2012)
Reel South (2016)
Destination Craft with Jim West (2017)
Amanpour & Company (2018)
Beyond 100 Days (2018)
We'll Meet Again (2018)
Prehistoric Road Trip (2020)
Tell Me More with Kelly Corrigan (2020)
The Trouble with Maggie Cole (2020)
When Disaster Strikes (2021)
Programming from American Public Television
Acquired programming
The American Woodshop1 (1993)
BBC World News Today (2018)
Broadway Sandwich (2019)
Closer to Truth2 (2008)
Cobra (2020)
Creative Living with Sheryl Borden3 (1976)
The Daytripper1 (2010)
Democracy Now!3 (2001)
Fons & Porter's Love of Quilting1 (2003)
GardenSMART1 (2001)
Green
Martha Bakes
Martha Stewart's Cooking School
Men at Work
The Open Mind1 (1956)
Simple Living with Wanda Urbanska
Sit and Be Fit1 (1987)
Start Up1 (2013)
A Taste of History1 (2008)
Texas Parks & Wildlife1 (1985)
This Is America & the World with Dennis Wholey1 (1998)
WoodSongs1 (2006)
Former programming
Original programming
3-2-1 Contact (1980–92)
A.M. Weather (1978–95)
Africa (2013)
African American World
American Playhouse (1982–99)
America's Ballroom Challenge (2006–09)
Are You Being Served?
Art of the Western World (1989)
As Time Goes By
Backyard Jungle
BBC World News
Big Apple History
Bill Moyers Journal (1972–76; 1978–81; 2007–10)
Biography of America
Carrascolendas
Carrier (2008)
Celtic Thunder
Celtic Woman
Charlie Rose (1991–2017)
A Chef's Life (2013–18)
Childhood
China: A Century of Revolution (1989–1997)
Click and Clack's As the Wrench Turns (2008)
Columbus and the Age of Discovery
Computer Chronicles (1983–2002)
Connect With English (1998)
The Constitution: That Delicate Balance (1984)
Cosmos: A Personal Voyage (1980)
The Creation of the Universe
Crucible of Empire (1999)
Day at Night (1973–74)
Dave Allen at Large (1971–79)
Degrassi Junior High (1987–91)
Degrassi High (1990–95)
design: e2
Destinos (1992)
The Dick Cavett Show (1977–82)
Discover The World of Science (1982–90)
Discovering Psychology: Updated Edition
Doctor Who (1970–90)
Don't Look No |
https://en.wikipedia.org/wiki/Microdata%20Corporation | Microdata Corporation was an American minicomputer company which created the Reality product line featuring the Pick operating system.
In its history, Microdata
was taken over by its international distributor CMC Leasings (December 1969),
which in turn was taken over in 1983 by McDonnell Douglas Corporation (March 1983),
that division was spun off as McDonnell Douglas Information Systems (1993)
which became part of Northgate Information Solutions (April 2000).
which was acquired by NEC in 2018 and rebranded to NEC Software Solutions UK in 2021.
The company was initially formed as a hardware company.
Independently, TRW, in fulfillment of a mid-1960s US government contract to build software to track inventory, developed a database system named Generalized Information Retrieval Language System (GIRLS). As a public domain item, a developer named Richard Pick was free to use it as the basis of a subsequent work, which eventually became the Pick operating system. The initial version was designed
to work on hardware produced by Microdata, which introduced the combination under the name Reality in 1974.
Since the software part of Reality was based on public domain work, Pick considered himself free to develop versions for other systems. A lawsuit followed: the ruling was that both Microdata and Pick could each consider themselves owners of the software.
McDonnell Douglas bought Microdata but eventually sold it off. Meanwhile, Pick revised his software to make it more portable, resulting in many systems able to run what now was called the Pick Operating System.
Many implementations followed: Prime Computer's Prime INFORMATION was done as far back as 1979 as a combination of FORTRAN and Assembler.
Media appearances
Microdata's headquarters building figures prominently briefly in Godfrey Reggio's 1983 film Koyaanisqatsi.
ENGLISH (programming language)
One way of accessing data under some of the Pick implementations had a number of names:
ENGLISH—The data retrieval language used to produce reports with English-like sentences.
It was also called by other Pick and Pick-like implementations:
* RECALL (Ultimate)
* ACCESS (Pick Systems)
* INFO/ACCESS (PRIME Information)
Microdata hardware
There were 3 computer models offered by Microdata:
Microdata 800
Microdata 1600
Microdata 3200
The original machine was a Microdata 800 microcomputer first made in 1969. This computer was licensed to the French company Intertechnique who sold it in Europe under the name Multi-8. It was particularly in use in nuclear power stations, research applications (such as crystallography and biology) and process control.
The Microdata 1600 was an updated version of the 800 processor (commercialized under the name Multi-4 by Intertechnique).
The original development of Reality was done on the Microdata 800. The first Reality system was based on the 1600 and was sold commercially in 1973. The unique feature of the early Microdata processors was that the microcode |
https://en.wikipedia.org/wiki/Gofer%20%28programming%20language%29 | Gofer (Good for equational reasoning) is an implementation of the programming language Haskell intended for educational purposes and supporting a language based on version 1.2 of the Haskell report. It was replaced by Hugs.
Its syntax is closer to the earlier commercial language Miranda than the subsequently standardized Haskell. It lacks some of the features of Haskell (such as the deriving clause in data type definitions) but includes a number of features which were not adopted by Haskell (although some were later incorporated into GHC, such as generalizing the list comprehension syntax to support any monad, which is now available using the MonadComprehensions extension).
References
External links
Mark Jones' Gofer Archive – for x86 PC
Gavin Wraith's RISC OS page – for RISC OS
Declarative programming languages
Educational programming languages
Free Haskell implementations
Functional languages
Haskell programming language family |
https://en.wikipedia.org/wiki/Nuclear%20War%20%28video%20game%29 | Nuclear War is a single player turn-based strategy game developed by New World Computing and released for the Amiga in 1989 and later for MS-DOS. It presents a satirical, cartoonish nuclear battle between five world powers, in which the winner is whoever retains some population when everyone else on earth is dead.
Gameplay
The game's introduction includes an homage to Dr. Strangelove. Each player - one human, four computer-controlled - is represented by a caricature of a national leader (the MS-DOS version allowed more than one human player). If there is a computer-controlled winner at the end of the game, that leader is depicted jumping for joy in the middle of a blasted wasteland, crowing "I won! I won!". If the player wins only the high score board is shown. Once a player (computer or human) loses, all of their stockpiled weapons are automatically launched. It is possible for a game to have no winner because of this. If this happens, a cut scene of the earth shattering and exploding is shown, and the high score table appears (though without any new entries).
Characters
The following characters are available in the game; the public figure being satirized is listed in parentheses.
Ronnie Raygun (Ronald Reagan)
P.M. Satcher (Margaret Thatcher)
Infidel Castro (Fidel Castro)
Col. Malomar Khadaffy (Muammar al-Gaddafi)
Ayatollah Kookamamie (Ruhollah Khomeini)
Mao the Pun (Mao Zedong)
Jimi Farmer (Jimmy Carter)
Tricky Dick (Richard Nixon)
Mikhail Gorabachef (Mikhail Gorbachev)
Ghanji (Mahatma Gandhi)
Reception
In the July 1990 edition of Games International (Issue 16), Brian Walker didn't think this was a particularly challenging game, commenting, "All good clean fun with nothing to stretch the brain cells." He concluded by giving the game a rating of 7 out of 10 for gameplay and 8 out of 10 for graphics, saying, "What lifts the game above average is the omnipresent humour."
In the July 1990 edition of Dragon (Issue #159), Hartley, Patricia, and Kirk Lesser characterized the game as "challenging", despite its tongue in cheek humour. However, they were disappointed that only one player could play the game at a time. Nevertheless, they gave the game an above-average rating of 4 out of 5.
In the October 1990 edition of Computer Gaming World, Chuck Moss favorably reviewed the game's graphics, fast and brief game play, and humorous computer opponents.
Surveys of opinions about wargames with modern settings conducted for Computer Gaming World in 1992 and 1994 awarded the game a rating of 3 out of 5.
See also
Balance of Power
DEFCON
References
External links
Reviews at Amiga Reviews
LemonAmiga docs, comprehensive introduction and guide
1989 video games
Amiga games
Anti-war video games
Cold War video games
DOS games
New World Computing games
Political satire video games
Turn-based strategy video games
Video games about nuclear war and weapons
Cultural depictions of Ronald Reagan
Cultural depictions of Margaret Thatcher
Cultural depictions of |
https://en.wikipedia.org/wiki/Expression%20index | Within computing and computer science, an expression index, also known as a function based index, is a database index that is built on a generic expression, rather than one or more columns. This allows indexes to be defined for common query conditions that depend on data in a table, but are not actually stored in that table.
A common use for an expression index is to support case-insensitive searching or constraints. For example, if a web site wants to make user names case-insensitive, but still preserve the case as originally entered by the user, an index can be created on the lower-case representation of the user name:
CREATE INDEX users__last_name_lower ON users( lower( last_name ) );
That will create a unique index on "lower(last_name)". Any queries that search on "lower(last_name)" could then make use of that index:
SELECT user_id FROM users WHERE lower( last_name ) = lower( 'Smith' );
Database support
Major databases which support expression indexes include: IBM Db2 (since version 10.5), Oracle Database (since release 8i.) and PostgreSQL (since at least version 7).
References
Database management systems |
https://en.wikipedia.org/wiki/Ina%20Fried | Ina Fried (born December 17, 1974), formerly Ian Fried, is an American journalist for Axios. Prior to that, she was senior editor for All Things Digital, a senior staff writer for CNET Network's News.com, and worked for Re/code. She is a frequent commenter on technology news on National Public Radio, local television news and for other print and broadcast outlets.
Early life
Fried, as a child actor was best known for her role as Rocky's son, Rocky Jr., in the 1982 movie Rocky III and also as the voice of the character Timothy in the 1982 movie The Secret of NIMH. After that she mainly appeared in guest roles portraying young boys on various television series including Cagney and Lacey, Silver Spoons, V, Alice, Diff'rent Strokes, Newhart, The Wonder Years, and a recurring role on St. Elsewhere.
Professional
Fried is a personal technology writer and generally covered Microsoft related stories in the CNET blog "Beyond Binary" from 2000 to November 2010, and is currently writing for All Things Digital where she will cover the Mobile beat. Before joining CNET in 2000, Fried wrote for the Orange County Business Journal, the Orange County Register, and Bridge News. She has served as a board member, national secretary and national vice president for the National Lesbian and Gay Journalists Association (NLGJA). On April 27, 2011, Fried conducted an exclusive interview with CEO Steve Jobs and other Apple executives about the iPhone location tracking controversy. She now writes for Axios.
Awards and honors
Upon retirement from the NLGJA National Board at the 2008 NLGJA national convention in Washington, DC, Fried was honored with both a Distinguished Service Award and a Women's Distinguished Service Award.
Journalism awards:
Three-time winner of NewsBios/TJFR award: NewsBios/TJFR "30 Most Influential Business Journalists Under 30."
Western Publications Association for Outstanding Editorial Content's Maggie Award.
Society of Professional Journalists (Northern California Chapter) Excellence in Journalism Award Winner: 2005 Breaking News (shared), 2005 Feature Writing.
Society of Professional Journalists' 2003 Sigma Delta Chi Awards for excellence in journalism: Deadline Reporting (Independent): Ina Fried, CNET News, (shared) for reporting about vulnerable technology and how the MSBlast virus spread.
Fried was featured in Advocate magazine's 2014 and 2017 lists of The 50 Most Influential LGBT People in Media.
Personal
Prior to June 2003, Fried signed articles "Ian Fried". At that point, she transitioned from male to female and began using the byline "Ina Fried".
References
External links
Mobilized Ina Fried's column at All Things D
Beyond Binary Ina Fried's column at CNET
CNET
Living people
1974 births
Transgender women writers
Transgender journalists
All Things Digital people
Place of birth missing (living people)
American LGBT journalists
American transgender writers |
https://en.wikipedia.org/wiki/Null%20function | In computer science, a null function (or null operator) is a subroutine that leaves the program state unchanged. When it is part of the instruction set of a processor, it is called a NOP or NOOP (No OPeration).
Mathematically, a (computer) function is null if and only if its execution leaves the program state unchanged. That is, a null function is an identity function whose domain and codomain are both the state space of the program, and for which:
for all elements .
Less rigorous definitions may also be encountered. For example, a function may take a single operand, transform it into a new data type, and return the result. While such usages bear a strong visual resemblance to identity functions, they create or alter a binary data value and thus change the program state. From a software maintainability perspective it is better to identify such "minor" alternations of state explicitly, since calling them null functions provides future maintainers of the code with no insights on their actual purposes.
Uses
Null functions have several uses.
During software development, null functions with the same names and type signatures as a planned functions are often used as stubs—that is, as non-functional placeholders that allow the incomplete body of code to be compiled and tested prior to completion of all planned features.
Null functions, particularly the NOP variety, are also used to provide delays of indeterminate length within wait loops. This is a common strategy in dedicated device controllers that must wait for an external input and have no other tasks to perform while they are waiting. Such wait loops are also used in software applications on larger multiprocessing computer systems. However, for multiprocessing systems a better approach is to use operating system functions that let other processes use the CPU during the waiting period.
A third use of null functions is as the definition of a program feature that, if created inadvertently, is almost always deleterious. Unintended null functions can arise during the development of complex programs, and like dead code, such occurrences indicate serious flaws in program structures.
A null function or method is often used as the default behavior of a revectorable function or overrideable method in an object framework.
See also
IEFBR14
References
External links
Makes humorous statements about the NULL encryption algorithm.
Subroutines |
https://en.wikipedia.org/wiki/Star%20Trek%3A%20Starship%20Creator | Star Trek: Starship Creator is a computer-based vehicle simulation game developed by Imergy and released by Simon & Schuster Interactive in 1998 for both Microsoft Windows and Mac OS, based on the official license of the Star Trek franchise. Elements in the game were created in conjunction with the technical advisers for the series and films, such as Mike and Denise Okuda. The gameplay in Starship Creator allowed for the player to equip and crew a series of different starship classes from across the Star Trek universe, including those from both the various series and the film series. An expanded version was subsequently released as Star Trek: Starship Creator Deluxe in late 1999 which added further starships, missions and customization. The official website also contained downloads for the characters from the Star Trek: New Frontier series of books. Reception by critics for Starship Creator was negative, with criticism directed at the gameplay and graphics, and the suggestion was made that the game would only appeal to Star Trek fans. A sequel followed in 2000 entitled Star Trek: Starship Creator Warp II.
Gameplay
The game style of Star Trek: Starship Creator allows for players to create their own starships, equipping it with technology from the Star Trek universe. This includes elements such as warp drive, space probes as well as weapons such as phasers and photon torpedoes. The player also selects the crew that man the starship; these are pulled from across the franchise, and includes characters such as Spock, James T. Kirk and Worf. Some of the characters, such as Rachel Garrett from "Yesterday's Enterprise", had their biographies expanded for the game. This biography was specifically taken into account and expanded upon by Robert Greenberger in the book Star Trek: Enterprise Logs.
There is also the ability to import photos into the game to create new characters, as well as writing the related biographies. This was intended so that players could include themselves on the crew. The equipped starships are then sent out on missions which earn credits that can then be used to buy new equipment or crew for the ship, or purchase a new starship and begin once again. The game includes the option to run in background mode, so that missions can be undertaken while the user conducts other tasks on their computer. This was described as "stealth mode" in official descriptions of the game.
The starships featured in the game are a cross section from all of the television series seen so far. The Constitution class appears from Star Trek: The Original Series, while the Galaxy class seen in Star Trek: The Next Generation is also present. The Defiant and Intrepid classes appear, having been in Star Trek: Deep Space Nine and Star Trek: Voyager respectively. Also in the game is the Miranda class, which first appeared it in Star Trek II: The Wrath of Khan, and the Sovereign class which was introduced in Star Trek: First Contact.
Production
Starship Creator was |
https://en.wikipedia.org/wiki/Turtle%20%28robot%29 | Turtles are a class of educational robots designed originally in the late 1940s (largely under the auspices of researcher William Grey Walter) and used in computer science and mechanical engineering training. These devices are traditionally built low to the ground with a roughly hemispheric (sometimes transparent) shell and a power train capable of a very small turning radius. The robots are often equipped with sensor devices that aid in avoiding obstacles and, if the robot is sufficiently sophisticated, allow it some perception of its environment. Turtle robots are commercially available and are common projects for robotics hobbyists.
Turtle robots are closely associated with the work of Seymour Papert and the common use of the Logo programming language in computer education of the 1980s. Turtles specifically designed for use with Logo systems often come with pen mechanisms allowing the programmer to create a design on a large sheet of paper. The original Logo turtle, built by Paul Wexelblat at BBN, was named "Irving" and was demonstrated at the former Muzzey Junior High in Lexington, Massachusetts. "Irving" contained bump sensors and could give audio feedback with a bell. The development of the robotic Logo turtle led to the use of the term to describe the cursor in video screen implementations of the language and its turtle graphics package.
See also
BEAM robotics, the branch of robotics pioneered in part by William Grey Walter , specializing in autonomous devices using simple analog control systems
iRobot Create and its predecessor Roomba, turtle-like robots originally designed for domestic use
Player Project, a free robotics suite.
Curses (computer game), an interactive fiction game by Graham Nelson that includes a voice-operated turtle in one of its more difficult puzzles
Unicycle cart, for a mathematical model of the dynamics of a turtle robot
References
External links
The Story of Turtle Robots in Pictures.
Articles about Turtle and Roamer robots.
Photo gallery of Walter's original turtles and a Lego-based replica
Pictures and information about early UK analog turtle designs from the Bristol Robotics Laboratory
A Logo Primer or Whats with the Turtles Logo Foundation.
Historical robots
Hobbyist robots
Educational robots
1940s robots
Robots of the United States
Three-wheeled robots |
https://en.wikipedia.org/wiki/TV%202%20Nyheter | TV 2 Nyheter (TV 2 News) is a 24-hour Norwegian language television news channel which started broadcasting on 15 January 2007. It is Norway's first national news network in Norwegian, although Nyhetskanalen did exist from 1997 to 1998.
The channel's main newsroom is located in Bergen.
Programming
Weekdays
The channel has broadcasts with presenters in the studio from 06:00 to 22:30. However the newsroom is manned the whole day and thus, the channel can quickly go on air at the last minute in case news breaks during the night. Through the night, the day's news items are non-stop in Nyhetshjulet. At the same time, a news ticker rolls across the bottom of the screen all day with updates from NTB, TV 2 Nyhetene, TV 2 Sporten, and NA24.no. The broadcasts originate from TV 2's Oslo Bureau along Karl Johans gate from 06:30 to 10:30. The news team at TV 2's headquarters in Bergen takes over from 10:30 (Økonominyhetene) until 15:00. The news is broadcast from Oslo again from 15:00 (Nyhetene) until 18:30. The 18:30 edition of Nyhetene is always broadcast from Bergen. The newscasts between 19:00 to 21:00 alternate between the Oslo bureau and TV 2's Bergen headquarters. The news team at Bergen presents the newscasts from 21:00 to 23:00.
Summer changes
Since 2010, weekday newscasts during the summer period are live only from 08:00 to 14:00, 17:00 to 17:30, and 22:00 to 22:30.
From 08:00-13:59, each top of the hour consists of a news bulletin that lasts for about 22–23 minutes, after which an assortment of advertisements and show previews for the main TV 2 channel are shown. The presenter recaps the headlines at bottom of the hour. The remaining 10 minutes will be devoted to additional reports and interviews. At 45 minutes past the hour, the channel presents about 10 minutes of sports news.
In addition, the 18:30-Nyhetene and 21-Nyhetene that air on the main TV 2 channel are simulcast on TV 2 Nyheter.
Outside these times, the news is broadcast in a tape-loop but is updated regularly.
Weekends
TV 2 Nyheter expanded its output during the weekends from 4 January 2009. The channel broadcasts news, weather, sport, and invites guests in the programme Nyhetsfrokost from 08:00 to 11:30 on each weekend morning. Outside these times, the channel alternates between a newscast, Underhuset, and Nyhetshjulet. The last live broadcast from TV 2 Nyheter during weekends takes place between 13:00 to 13:30. News teams in Oslo and Bergen take turns in assuming hosting responsibilities every week. The weekend editions of the 18:30 and 21 Nyhetene is always produced in Bergen. During the summer, weekend live news is seen from 09:00 to 15:00.
Breakthrough
Its breakthrough came at 2pm on 13 January 2007, two days before its planned launch date, when the channel had a breaking news report about the environmental disaster outside Fedje, breaking into broadcast on its mother channel TV 2. During this breaking news broadcast, Lene Østby Sævrøy and Espen Fiveland |
https://en.wikipedia.org/wiki/Ambient%20authority | Ambient authority is a term used in the study of access control systems.
A subject, such as a computer program, is said to be using ambient authority if it only needs to specify the names of the involved object(s) and the operation to be performed on them in order for a permitted action to succeed.
In this definition,
a "name" is any way of referring to an object that does not itself include authorising information, and could potentially be used by any subject;
an action is "permitted" for a subject if there exists any request that that subject could make that would cause the action to be carried out.
The authority is "ambient" in the sense that it exists in a broadly visible environment (often, but not necessarily a global environment) where any subject can request it by name.
For example, suppose a C program opens a file for read access by executing the call:
open("filename", O_RDONLY, 0)
The desired file is designated by its name on the filesystem, which does not by itself include authorising information, so the program is exercising ambient authority.
When ambient authority is requested, permissions are granted or denied based on one or more global properties of the executing program, such as its identity or its role. In such cases, the management of access control is handled separately from explicit communication to the executing program or process, through means such as access control lists associated with objects or through Role-Based Access Control mechanisms. The executing program has no means to reify the permissions that it was granted for a specific purpose as first-class values. So, if the program should be able to access an object when acting on its own behalf but not when acting on behalf of one of its clients (or, on behalf of one client but not another), it has no way to express that intention. This inevitably leads to such programs being subject to the confused deputy problem.
The term "ambient authority" is used primarily to contrast with capability-based security (including object-capability models), in which executing programs receive permissions as they might receive data, as communicated first-class object references. This allows them to determine where the permissions came from, and thus avoid the Confused deputy problem. However, since there are additional requirements for a system to be considered a capability system besides avoiding ambient authority, "non-ambient authority system" is not just a synonym for "capability system".
Ambient authority is the dominant form of access control in computer systems today. The user model of access control as used in Unix and in Windows systems is an ambient authority model because programs execute with the authorities of the user that started them. This not only means that executing programs are inevitably given more permissions (see Principle of least privilege) than they need for their task, but that they are unable to determine the source or the number and types of |
https://en.wikipedia.org/wiki/Kouris%20Dam | Kouris Dam, , is the largest dam of a network of 107 dams in Cyprus. It is in the Limassol District and is fed by the Kouris River along with other smaller watercourses including the Diarizos River which has its water diverted to Kouris Dam via an underground pipeline.
History
The dam lies at an altitude of and collects the water delivered by the rivers Kouris, Limnatis and Kryos. Furthermore, water from Diarizos River is diverted to Kouris Dam via a long connecting tunnel. It has an overall catchment area of 2. The dam is located northwest of the city of Limassol and west of the village of Ypsonas. For its construction the whole village of Alassa had to be relocated to a nearby site overlooking the reservoir (between the Kouris and Limnatis valleys) at a cost of around CYP£5,000,000.
Its construction was opposed by environmental groups concerned about the effects of water diversion on the Limassol Salt Lake, a wetland located downstream to the rivers and used by migratory birds. The dam is part of the Southern Conveyor Project, which carries water from the SW side of Cyprus to the SE part of the island, over a distance of 120 km. The dam has a central clay core zoned earthfill embankment with a height of 110m and a crest length of approximately 550 metres providing a water storage volume of 115 million cubic metres.
The construction of the dam was first proposed by the Cyprus Water Development board in 1968. Following several feasibility studies the French engineering company Sogreah completed the detailed design in 1981. The contract for its construction was awarded in January 1984 to a consortium comprising J&P construction and Impregilo of Italy.
The construction cost amounted to CYP £29,000,000. Part of the funding came from the European Investment Bank. Construction was completed in September 1988. It was officially inaugurated by the then president, George Vassiliou, on 22 April 1989.
Since its construction it has overflowed three times: on March 4, 2004, on April 6, 2012,
and on January 7, 2020.
In popular culture
In 2008, rumours held that a crocodile or other large reptile was swimming in the dam, leading to humorous references to a "Cyprus Loch Ness Monster." Local community leaders authorized a search but did not find such a creature.
Gallery
See also
List of reservoirs and dams in Cyprus
References
Dams in Cyprus
Dams completed in 1988
Buildings and structures in Limassol District
1988 establishments in Cyprus |
https://en.wikipedia.org/wiki/Beautiful%20Girl%20%28film%29 | Beautiful Girl is a 2003 television movie starring Marissa Jaret Winokur. The film was directed by Douglas Barr for the ABC Family network.
Plot
Marissa Jaret Winokur plays Becca Wasserman, a young woman recently engaged to a young man, Adam Lopez (Mark Consuelos). Hoping to improve their modest honeymoon plans, Becca seeks the vacation prize offered in a local beauty pageant. Charming and buoyant, Becca enters herself confidently, over the objections of her embarrassed mother (Fran Drescher) who believes that her daughter's plus-size form will be ridiculed. Becca rejects the criticism and becomes determined to win.
Overcoming all expectations, Becca becomes Miss Squirrel Hill. The flush of success drives her to compete in other, larger pageants in the city, and she announces ambitious plans for the future. Her fiancé is supportive at first, but he becomes quickly dismayed by her aggressive efforts to win. As Becca struggles to advance in the pageant circuit, she appears to change for the worse in many ways, before finally recapturing her original good nature and joie de vivre.
Cast
Becca Wasserman – Marissa Jaret Winokur
Amanda Wasserman – Fran Drescher
Adam Lopez – Mark Consuelos
Rachel Wasserman – Sarah Manninen
Libby Leslie – Reagan Pasternak
Supporting cast – Amanda Brugel; Barbara Radecki; Clare Stone; Charlotte Sullivan; Barbara Mamabolo; Brooke D'Orsay; Joyce Gordon; Stephanie Belding; Jordan Madley; Lesley Faulkner; Mark Leone
Production
The film is set in Pittsburgh but was filmed in Toronto.
References
External links
ABC Family original films
2003 television films
2003 films
Films set in Pittsburgh
Films about beauty pageants
Films shot in Toronto
2000s English-language films
Films directed by Douglas Barr |
https://en.wikipedia.org/wiki/Hunnestad%20Monument | The Hunnestad Monument (), listed as DR 282 through 286 in the Rundata catalog, was once located at Hunnestad at Marsvinsholm north-west of Ystad, Sweden. It was the largest and most famous of the Viking Age monuments in Scania, and in Denmark, only comparable to the Jelling stones. The monument was destroyed during the end of the 18th century by Eric Ruuth of Marsvinsholm, probably between 1782 and 1786 when the estate was undergoing sweeping modernization, though the monument survived long enough to be documented and depicted.
When the antiquary Ole Worm (1588–1654) explored the monument, it consisted of eight stones. Five of them were image stones, and two of those image stones also had runic inscriptions. In the eighteenth century, all the stones were relocated or destroyed. Only three of the stones of the monument were recovered during the 19th century, and are today on display at the Kulturen museum in Lund. For a long time they were considered the only stones remaining, but on December 16, 2020 a fourth stone, DR 285 (number 6, in the picture), was discovered during excavations for a sewage line in Ystad municipality. Lying with its image facing up, it had been used in a bridge construction over the Hunnestad stream.
Runestones
The first runestone (DR 282) was raised by Ásbjörn and Tumi in memory of Tumi's two brothers, whereas the last one (DR 283) was raised by Ásbjörn in memory of Tumi.
DR 282
The oldest of the two runestones depicts a large man dressed in a long coat and a pointed helmet. The man, who carries an axe on his right shoulder, is possibly a member of the Varangian Guard.
Latin transliteration:
× osburn × (a)u(k) × tumi × þaiʀ × sautu × stain × þansi × a(f)[t]iʀ × rui × auk × ¶ laikfruþ × sunu × kuna × han[t]aʀ ×
Old Norse transcription:
Æsbiorn ok Tomi þeʀ sattu sten þænsi æftiʀ Roi ok Lekfrøþ, sunu Gunna Handaʀ.
English translation:
Ásbjôrn and Tumi they placed this stone in memory of Hróir and Leikfrøðr, Gunni Hand's sons.
DR 283
The second runestone is decorated with a cross and was raised by Ásbjörn after Tumi.
Latin transliteration:
× osburn × snti × stain × þansi × aftiʀ × tuma × sun × kuna × ¶ hantaʀ ×
Old Norse transcription:
Æsbiorn satti sten þænsi æftiʀ Toma, sun Gunna Handaʀ.
English translation:
Ásbjôrn placed this stone in memory of Tumi, Gunni Hand's son.
Image stones DR 284 through DR 286
The three image stones, without any rune inscription, show three illustrations of a huge animal. One of them, DR 284 (Hunnestad 3), shows an animal ridden by a woman who has two snakes in her hands. She appears to be the wolf-riding giantess Hyrrokkin who helped the Æsir push Balder's ship into the sea during his funeral, and thus she would be an appropriate image for a funerary monument. The wolf has a mane and pointed ears similar to the depiction of the wolf on the Tullstorp Runestone (DR 271) and the two wolves on the Lund 1 Runestone (DR 314). The second image stone (the now lost DR 286), as depict |
https://en.wikipedia.org/wiki/Microsystems | Microsystems may refer to:
Microelectromechanical systems, miniature electronic and mechanical systems less than a millimeter in size
Microsystems (magazine), a personal computing magazine of the early 1980s |
https://en.wikipedia.org/wiki/Anytime%20algorithm | In computer science, an anytime algorithm is an algorithm that can return a valid solution to a problem even if it is interrupted before it ends. The algorithm is expected to find better and better solutions the longer it keeps running.
Most algorithms run to completion: they provide a single answer after performing some fixed amount of computation. In some cases, however, the user may wish to terminate the algorithm prior to completion. The amount of computation required may be substantial, for example, and computational resources might need to be reallocated. Most algorithms either run to completion or they provide no useful solution information. Anytime algorithms, however, are able to return a partial answer, whose quality depends on the amount of computation they were able to perform. The answer generated by anytime algorithms is an approximation of the correct answer.
Names
An anytime algorithm may be also called an "interruptible algorithm". They are different from contract algorithms, which must declare a time in advance; in an anytime algorithm, a process can just announce that it is terminating.
Goals
The goal of anytime algorithms are to give intelligent systems the ability to make results of better quality in return for turn-around time. They are also supposed to be flexible in time and resources. They are important because artificial intelligence or AI algorithms can take a long time to complete results. This algorithm is designed to complete in a shorter amount of time. Also, these are intended to have a better understanding that the system is dependent and restricted to its agents and how they work cooperatively. An example is the Newton–Raphson iteration applied to finding the square root of a number. Another example that uses anytime algorithms is trajectory problems when you're aiming for a target; the object is moving through space while waiting for the algorithm to finish and even an approximate answer can significantly improve its accuracy if given early.
What makes anytime algorithms unique is their ability to return many possible outcomes for any given input. An anytime algorithm uses many well defined quality measures to monitor progress in problem solving and distributed computing resources. It keeps searching for the best possible answer with the amount of time that it is given. It may not run until completion and may improve the answer if it is allowed to run longer.
This is often used for large decision set problems. This would generally not provide useful information unless it is allowed to finish. While this may sound similar to dynamic programming, the difference is that it is fine-tuned through random adjustments, rather than sequential.
Anytime algorithms are designed so that it can be told to stop at any time and would return the best result it has found so far. This is why it is called an interruptible algorithm. Certain anytime algorithms also maintain the last result, so that if they are given more time, |
https://en.wikipedia.org/wiki/Para%C3%ADba%20do%20Meio%20River | The Paraíba do Meio River is a river in Alagoas state of northeastern Brazil. It flows southeast to empty into Manguaba Lagoon, an estuarine lake connected to the Atlantic Ocean by a network of channels.
See also
List of rivers of Alagoas
References
Rivers of Alagoas |
https://en.wikipedia.org/wiki/WKAQ%20%28AM%29 | WKAQ (580 kHz) is a commercial AM radio station in San Juan, Puerto Rico. Currently owned by WAPA Media Group, the station airs a Spanish language talk radio format. Its programming is repeated on WUKQ, which broadcasts on 1420 kHz in Ponce, and WYEL which broadcasts on 600 kHz in Mayagüez. The station was the first radio station to broadcast in Puerto Rico. According to Ernesto Vigoreaux, in the early days of music in Puerto Rico, the musicians would record music at the WKAQ radio station. WKAQ is the Puerto Rico primary entry point station for the Emergency Alert System.
WKAQ was owned for many years by Angel Ramos, owner of the El Mundo newspaper, and eventual namesake for WKAQ-TV, branded as Telemundo. The El Mundo operated until 1986 when labor strikes and acts of terrorism ended its operation.
On May 9, 2022, Hemisphere Media Group, the owners of WAPA-TV, announced they would purchase WKAQ, WKAQ-FM, WUKQ, WUKQ-FM and WYEL from Univision Radio. The deal marks Hemisphere's entry to the radio business. During WAPA's 2023 upfront presentation, the network's management alluded that talent from the channel would also be joining the radio stations in the future and vice versa.
On September 1, 2023, Hemisphere Media Group announced that the deal to buy WKAQ-AM and WKAQ-FM had been finalized and that they would be spinning off their media properties into a subsidiary called WAPA Media. The conglomerate would include WAPA-TV, WAPA Deportes (WAPA-TV Sub-channel), WAPA América and the two radio stations.
Notable current on-air staff
Jay Fonseca - Jay en el 580
Rubén Sánchez - Temprano en la Mañana
Ángel Rosa - Las Cosas como Son
Carlos Díaz Olivo – political analyst WKAQ Analiza
Luis Pabón Roca - political analyst WKAQ Analiza
Veronique Abreu Tañon - WKAQ Intimus
References
External links
FCC History Cards for WKAQ
FCC History Cards for WUKQ
Official website
KAQ (AM)
Radio stations established in 1922
KAQ
1922 establishments in Puerto Rico |
https://en.wikipedia.org/wiki/Geni.com | Geni is an American commercial genealogy and social networking website, founded in 2006, and owned by MyHeritage, an Israeli private company, since November 2012. As of 2021, MyHeritage has kept its genealogical website separate from Geni's website, though the Smart Matches™ feature enables matching of Geni profiles to trees on MyHeritage and to other family tree sites and digitized records.
The New York Times groups it with FamilyLink.com and Ancestry.com, "a vast and growing trove of digitized records". As of March 23, 2023, around 177,017,009 profiles had been created on Geni.
Features
At the website users enter names and email addresses of their parents, siblings, and other relatives, as well as profiles with various fields of biographical information about themselves and their relatives. From there users may graphically manipulate sections of their connections network to create a complete personal family tree.
The service uses the contact information to invite additional members to join, and builds a social network database from the information collectively entered by members. For now users may only see information belonging to themselves, their connected "family group", and to people in their immediate network who have given them permission.
Discussion forums and projects
Each family tree features a family discussion forum where messages can be posted and responses made. It can be used as such a digest for family news. There are also public discussions, profile specific discussions, and project discussions.
Projects are special interest groups organized around historical topics (e.g. "World War One - Casualties"), immigration patterns (e.g. "Norwegian American"), occupations (e.g. "Librarians"), place-names (e.g. "Christ Church, Oxford University"), or any other subject of general interest that will foster social discussion among members, as well as providing a portal to which biographical profiles may be linked.
Importing and exporting
From 2008 until December 2010, Geni had a built-in feature that allowed users to import their family history using the GEDCOM file format. This facility was disabled for eight years because Geni found it was duplicating thousands of existing profiles, often with poor information quality as compared to the existing profiles.
In February 2019 a new GEDCOM file import feature became available that allows the import of profiles which didn’t exist before on Geni. Only a few generations of a tree are imported at a time, continuing only on branches where there are no matches to existing profiles on Geni.
Data from public records and family trees can also be imported from 13 supported web sites using an independently developed semi-automatic tool called SmartCopy, which is based on web scraping. Families are imported one at a time; the user can manually edit or verify the information before importing, and also choose between adding the information to existing profiles or creating new profiles. SmartCopy |
https://en.wikipedia.org/wiki/List%20of%20BBC%20children%27s%20television%20programmes | This is a list of CBBC programmes that are currently and formerly being broadcast on the children's television strand of the BBC in the United Kingdom.
Current programming
Live action
4 O'Clock Club (2012–2020, reruns)
All Over the Place (2011–present)
Almost Never (2019–2021)
Andy and the Band (2020–present)
Art Ninja (2015–present)
Big Fat Like (2020–present)
Blue Peter (1958–present)
Born to Spy (2022-present)
Class Dismissed (2016–present)
Clipheads (2022–present)
Crackerjack! (1955–1984, 2020–present)
Danny and Mick (2019–present)
Deadly 60 (2009–2012, 2020–present)
Dodger (2022-present)
Dwight in Shining Armor (2021–present)
First Day (2020–present)
Game on Grandparents (2022–present)
Got What It Takes? (2016–present)
Hardball (2021–present)
Heirs of the Night (2020–present)
Hey You What If? (2020–present)
Holly Hobbie (2019–present)
Itch (2020–present)
Jamie Johnson (2016–present)
Junior Eurovision Song Contest (2022–present)
Lagging (2021-present) (2021–present)
Lifebabble (2016-2017)
Love! Love! Love! (2022–present)
Malory Towers (2020–present)
Matilda and the Ramsay Bunch (2015–present)
Meet the McQueens (2023-present)
Mimi and Co (2020–present)
Monster Court (2021–present)
My Life (2011–present)
My Perfect Landing (2020–present)
Mustangs FC (2018-present)
Mystic (2020–present)
Newsround (1972–present)
Nova Jones (2021–present)
Odd Squad (2015–present)
One Zoo Three (2020–present)
Operation Ouch! (2012–present)
Our CBBC (2021–present)
Our School (2014–present)
Out of This World (2020–present)
Princess Mirror-Belle (2021–present)
Saturday Mash-Up! (2017–present)
Seriously Raleigh (2021–present)
Show Me The Honey (2021–present)
Show Me What You're Made Of (2011–present)
Silverpoint (2022–present)
Sketchy Comedy (2018)
Snaps (2021–present)
So Awkward (2015-2020, reruns)
Still So Awkward (2021-present)
The Amelia Gething Complex (2019–present)
The Beaker Girls (2021–present)
The Demon Headmaster (1996–1998, 2019–present)
The Dengineers (2015–present)
The Dog Ate My Homework (2014–present)
The Dumping Ground (2013–present)
The New Legends of Monkey (2021–present)
The Next Step (2014–present)
The Pets Factor (2017–present)
The Playlist (2017–present)
The Story of Tracy Beaker (2002–present)
The Zoo (2017–present)
Theodosia (2022–present)
Top Class (2016–present)
What's Cooking Omari (2020–present)
Wow That's Amazing (2022–present)
Animation
Arthur (1997-2022) (iPlayer only; since 2023)
Boy Girl Dog Cat Mouse Cheese (2019–present)
Danger Mouse (2015–present)
The Deep (2016–present)
Dennis & Gnasher: Unleashed! (2017–present)
Dragon Ball Super (2022–present) (iPlayer only)
Dragon Quest: Dai no Daiboken (2021) (2022–present) (iPlayer only)
DreamWorks Dragons: The Nine Realms (2022–present)
Girls of Olympus (2023-present) (iPlayer only)
Grizzy & the Lemmings (2023–present)
Monster Loving Maniacs (2022-present)
Ninja Express (2021–present)
OOglies (2009–2015)
|
https://en.wikipedia.org/wiki/Jeff%20Green%20%28multimedia%20artist%29 | Jeffrey Stuart Green (born June 21, 1956) is a Canadian author, playwright, producer, and director, who has worked in a variety of media including radio, television, computer, DVD-based multimedia, and in live nightclub settings. His work has earned him critical acclaim and a number of awards. In addition to the work he has created, he was instrumental in the evolution of broadcast radio in the Ottawa market during the late 1970s and the 1980s — specifically, the Carleton University non-profit radio station CKCU-FM and the commercial album-oriented rock radio station CHEZ-FM.
Career
Jeff Green began his career in radio in 1972 at Carleton University's CKCU-FM, when it was only running with a carrier current license — "broadcasting" by closed circuit to the university commons areas, and through a transmitter in the residence building to the students there. He was one of the founding Production Managers when CKCU received its FM radio license in 1975. In 1976, he became the founding Production Manager at the Ottawa album-oriented rock station CHEZ-FM. In 1980 he received a Canada Council Explorations grant to create the radio drama Epiphanies, intended as a pilot for a series that was never produced. In addition to his work in radio, he was editor for the now-defunct tabloid entertainment paper Ottawa Revue from 1981 to 1983. From 1983 to 1985, he was Central and Eastern Canada's first VJ, presenting groundbreaking video programming at Ottawa rock and roll venue Barrymore's before music video television was generally available in Canada (MTV had just launched and was only available by satellite television, which was relatively rare at the time). In Ottawa, from 1979 through 1983, Jeff Green designed and executed an annual series of popular live club multimedia performances at Hallowe'en entitled "Ne'ewollah".
In 1985 he began the series of radio dramas that became known as Soundings. Soundings went on to win several awards, including a silver medal at the New York International Radio Festival. Originally aired on Ottawa's CHEZ-FM, episodes of the series were eventually broadcast on the Canadian Broadcasting Corporation, Australian Broadcasting Corporation, and National Public Radio (U.S.) networks, as well as London's LBC Radio station. The radio plays were featured on XM Satellite Radio's former Sonic Theater channel.
In 1990, Green began an association with members of Ottawa's Salt & Pepper Theatre Company which resulted in the four-season Cowboy Who? television series, an all-ages satire of children's programming for which he was co-creator, co-writer, producer, director, engineer, and performer. The series was broadcast from 1991 to 1995 on Mid-Canada Television, and won the 1992 Canpro Award (Canadian Independent Television Producer's Association) for Best Children's Series.
In 1993, he teamed up with the Animatics Multimedia Corporation, which resulted in the award-winning video-based interactive multimedia productions Midnight Stranger a |
https://en.wikipedia.org/wiki/Flyweight%20%28disambiguation%29 | Flyweight may mean:
Flyweight pattern, a software design pattern in computer science;
Flyweight, a class in boxing;
Flyweight (MMA), a class in mixed martial arts.
Fly weight, a weight connected to a spinning axle, as most frequently found in flywheels. However, a fly weight may also be used in other applications, such as for sensing rotation speed in centrifugal governors. |
https://en.wikipedia.org/wiki/Shrek%20the%20Halls | Shrek the Halls is an American Christmas computer-animated comedy television special that premiered on the American television network ABC
on November 28, 2007. The thirty minute Christmas special was co-written and directed by Gary Trousdale and produced by DreamWorks Animation. Mike Myers, Eddie Murphy, Cameron Diaz, and Antonio Banderas reprise their roles from the feature films. This Christmas special takes place between Shrek the Third and Shrek Forever After. As with the other Shrek animations, this television special was based on the 1990 children's book Shrek! by William Steig.
Plot
Shrek is quietly living in the swamp with his family when the Christmas season arrives. Under Donkey's urging, Shrek reluctantly promises Princess Fiona a special Christmas surprise. Shrek goes to the local bookstore in Far Far Away to try to find a present for Fiona, but since he does not know what Christmas is all about, the shopkeeper gives Shrek a copy of Christmas For Village Idiots, a step by step guide to celebrating the holiday. Shrek proceeds to follow the book's advice by decorating the house and getting a tree so he can spend a quiet Christmas Eve with his family, but Donkey brings the entire "family" to the swamp, spoiling Shrek's plans.
As Shrek tries to recite "A Visit from St. Nicholas", Donkey, Puss in Boots, and Gingy interrupt and each tell their own Christmas story. Donkey tells of a Christmas parade passing by the swamp and licking an enormous waffle Santa, and absentmindedly starts licking Shrek's foot. Puss's version of the Santa Claus story ends with playing with the tassel on Santa's hat, while in reality he is playing with a bauble. Gingy tells a horrifying story about how his girlfriend Suzy was eaten by Santa Claus. Donkey calls it ridiculous, and finds Shrek's Christmas for Village Idiots book. A fight breaks out over the book and Shrek's supper is destroyed. After lighting his butt on fire, Shrek finally loses his temper and ends up ejecting his friends from his house, including Donkey, who denounces him as "Ebenezer Shrek" in the heat of the argument. With their Christmas spirit ruined, Fiona is upset at Shrek's behavior and leaves with the ogre triplets. She catches up to their friends and explains to Donkey what Shrek had wanted for Christmas.
Shrek, remorseful at what he has done, catches up with the group and apologizes for lashing out at them earlier. He then tells everyone this is also his first Christmas, since ogres do not celebrate anything. They return to the swamp and Shrek tells his own version of "The Night Before Christmas", featuring himself as "Ogre Claus". Soon, they hear bells and go outside to see Santa and his reindeer, although Gingy is still afraid of Santa and runs back inside in fear. The special ends with Santa using his magic to put ogre ears on the moon.
Cast
Mike Myers as Shrek
Eddie Murphy as Donkey
Cameron Diaz as Princess Fiona
Antonio Banderas as Puss in Boots
Conrad Vernon as Gingy
Cody |
https://en.wikipedia.org/wiki/Real-time%20transcription | Real-time transcription is the general term for transcription by court reporters using real-time text technologies to deliver computer text screens within a few seconds of the words being spoken. Specialist software allows participants in court hearings or depositions to make notes in the text and highlight portions for future reference.
Real-time transcription is also used in the broadcasting environment where it is more commonly termed "captioning."
Career opportunities
Real-time reporting is used in a variety of industries, including entertainment, television, the Internet, and law.
Specific careers include the following:
Judicial reporters use a stenotype to provide instant transcripts on computer screens as a trial or deposition occurs.
Communication access real-time translation (CART) reporters assist the hearing-impaired by transcribing spoken words, giving them personal access to the communications they need day to day.
Television broadcast captioners use real-time reporting technology to allow hard-of-hearing or deaf people to see what is being said on live television broadcasts such as news, emergency broadcasts, sporting events, awards shows, and other programs.
Internet information (or Webcast) reporters provide real-time reporting of sales meetings, press conferences, and other events, while simultaneously transmitting the transcripts to computers worldwide.
Other rapid data entry positions.
History
Before the advent of the stenotype machine, court reporters wrote official trial transcripts by hand using a shorthand system of stenoforms that could later be translated into readable English. It often took eight years of training to learn this manual form of writing at the necessary speed. Walter Heironimus was among the first stenographers to make use of the stenotype machine during his work in the U.S. District Court system in New Jersey in 1935.
A "transcript crisis" arose during the later half of the twentieth century due to the increasing volume of lawsuits. There were not enough number of court reporters to match the increasing number of trials. Not only were court reporters unavailable to attend many court proceedings, court transcripts were constantly late and the qualities varied. Some believed it was due to the non-interchangeability between court reporters, and others believed it was simply due to a labor shortage. In the meantime, magnetic audiotape recording, or known as electronic recording (ER) began to threaten all reporters' job since it could record long-hour courtroom trials and replace a court reporter's position in the courtroom. As a result, machine translation (MT) intended to serve as a solution for preventing ER from potentially replacing reporters' jobs. However, MT relied heavily on human labors operating behind the system and many started to question if it should be the right way to end the "transcript crisis." Later in 1964, set up by CIA, the Automatic Language Processing Advisory Committee (AL |
https://en.wikipedia.org/wiki/Sandfordscourt | Sandfordscourt (formerly "Cantwell's Court") is a townland in the civil parish of Rathcoole, in the barony of Gowran, County Kilkenny.https://www.logainm.ie/ga/27034 Placenames Database of Ireland. There is an association with the Crusades. It is home to Cantwell's Castle, a towerhouse.
Its former owner Thomas Sandford was Mayor of Kilkenny in 1723.
References
See also
List of towns and villages in Ireland
List of townlands in County Kilkenny
Townlands of County Kilkenny |
https://en.wikipedia.org/wiki/CAD/CAM%20dentistry | CAD/CAM dentistry is a field of dentistry and prosthodontics using CAD/CAM (computer-aided-design and computer-aided-manufacturing) to improve the design and creation of dental restorations, especially dental prostheses, including crowns, crown lays, veneers, inlays and onlays, fixed dental prostheses (bridges), dental implant supported restorations, dentures (removable or fixed), and orthodontic appliances. CAD/CAM technology allows the delivery of a well-fitting, aesthetic, and a durable prostheses for the patient. CAD/CAM complements earlier technologies used for these purposes by any combination of increasing the speed of design and creation; increasing the convenience or simplicity of the design, creation, and insertion processes; and making possible restorations and appliances that otherwise would have been infeasible. Other goals include reducing unit cost and making affordable restorations and appliances that otherwise would have been prohibitively expensive. However, to date, chairside CAD/CAM often involves extra time on the part of the dentist, and the fee is often at least two times higher than for conventional restorative treatments using lab services.
Like other CAD/CAM fields, CAD/CAM dentistry uses subtractive processes (such as CNC milling) and additive processes (such as 3D printing) to produce physical instances from 3D models.
Some mentions of "CAD/CAM" and "milling technology" in dental technology have loosely treated those two terms as if they were interchangeable, largely because before the 2010s, most CAD/CAM-directed manufacturing was CNC cutting, not additive manufacturing, so CAD/CAM and CNC were usually coinstantiated; but whereas this loose/imprecise usage was once somewhat close to accurate, it no longer is, as the term "CAD/CAM" does not specify the method of production except that whatever method is used takes input from CAD/CAM, and today additive and subtractive methods are both widely used.
Application of CAD/CAM in dentistry
Computer-aided design (CAD) and computer-aided manufacture (CAM) is a process where non-digital data is captured, converted into a digital format, edited as necessary, and subsequently converted back into a physical form with the exact dimensions and materials specified during the digital design process, usually by either 3D printing or milling. This set of stages is known as a “digital workflow”.
CAD/CAM may be used to provide a machine-led means of fabricating dental prostheses that are used to restore or replace teeth. This is an alternative to the traditional process of prosthesis fabrication using physical techniques, in which the dentist makes an impression of the site that is to be restored. This is then transported to the laboratory where a study model is made. On that model, an imitation of the final design is made using wax – known as a wax up – which represents the size and shape of the finished dental prosthesis. The wax is then encased in an investment mold, burned out an |
https://en.wikipedia.org/wiki/NedWeb | The NedWeb project is a cultural documentation centre, with an online database, an initiative of the Department of Dutch Language Studies ("Netherlandistics") at the University of Vienna.
It contains documentation on Dutch literature, Dutch language and Dutch culture. Its aim is to promote literature and a broader public understanding of Dutch and Flemish culture.
External links
Information on Netherlandistics: Netherlandistics website, University of Vienna (in Dutch, German and English with parts in Hungarian, Polish, Slovenian, Slovak and Czech)
Comenius Association website, University of Vienna
Dutch language
Flanders
Foreign relations of the Netherlands
University of Vienna |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.