source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/List%20of%20Christian%20hospitals%20in%20China
In 1910 126 Church Hospitals supplied data for the China Medical Journal for vol 25 no. 5. There were 175 Medical Missionaries in those hospitals. The report states that there were a total of 415 Medical Missionaries in China at the time. As of 1937 there were 254 mission hospitals in China, and more than half of these were eventually destroyed by Japanese bombing during World War II or otherwise due to the Second Sino-Japanese War or the Chinese Civil War. After World War II most of these hospitals were at least partially rehabilitated, and eventually passed to the control of the Government of the People's Republic of China, but are still functioning as hospitals. Amoy Missionary Hospital Bethel Hospital in Shanghai (1920) Bresee Memorial Hospital (1925), named in honour of Phineas Bresee located in Da Ming, Hebei. Operated by the Church of the Nazarene. Borden Memorial Hospital (Canton Ophthalmic Hospital) Guangzhou Boji Hospital (1835) Peter Parker (physician) Chengdu Eye, Ear, Nose and Throat Hospital (1894) Chungking Canadian Mission Hospital (1896) Chungking Methodist Union Hospital (1892) David Gregg Hospital for Women and Children (also known as Yuji Hospital 柔濟醫院) (1902), affiliated with Hackett Medical College for Women 夏葛女子醫學院, located in Guangzhou. Goldsby King Memorial Hospital in Chinkiang (1922) Love and Mercy Hospital (1887) (Qingjiangpu) - Absalom Sydenstricker (father of Pearl Buck) and later occupied by L. Nelson Bell Kathleen Mallory Hospital for Women in Laichowfu (1901) Kiating Canadian Mission Hospital (1894) Kwang-Chi Hospital (1871) Lester Chinese Hospital (1844) William Lockhart (surgeon) Louella Roach Alexander Hospital for Women in Pingtu (1890) Luchow Canadian Mission Hospital (1909) Mackenzie Memorial Hospital (1880) Mayfield-Tyzzer Hospital for Men in Laichowfu (1901) Methodist Hospital in Kaifeng, Henan Mukden Medical College & Hospital Hospital in Ningbo (William Parker) (1843) Oxner Memorial Hospital for Men in Pingtu (1890) Penghsien Canadian Mission Hospital Roberts Memorial Hospital (1903) Ronghsien Canadian Mission Hospital St. Andrew's Hospital in Beijing St. Barnabas's Hospital in Beijing St. Elizabeth's Hospital in Shanghai St. Luke's Hospital in Shanghai (1866) St. Peter's Hospital in Wuchang St. Stephen's Hospital in Beijing Tzeliutsing Canadian Mission Hospital (1906) United Church of Canada Mission Hospital for Men (1892) University Hospital of West China Union University (1942) Warren Memorial Hospital in Hwanghsien Dr. T.W. Ayers Woolston Memorial Hospital, (19th century) Zicong Methodist Union Hospital (1908) References Christian China Hospitals Hospitals
https://en.wikipedia.org/wiki/AACT
AACT may refer to: Academy of Arts, Careers and Technology, a career-tech high school in Reno, Nevada Aggregate Analysis of ClinicalTrials.gov, a database of clinical trials data. See Data sources section Alpha 1-antichymotrypsin, a protein American Academy of Clinical Toxicology American Association of Community Theatre
https://en.wikipedia.org/wiki/AADA
The acronym AADA may refer to: Advances in Adaptive Data Analysis, a publication by World Scientific "Anders als die Andern" (Different from the Others), first German movie about homosexuality American Academy of Dramatic Arts, a conservatory in New York American Autoduel Association, both a fictional organization in Car Wars and its official fan club Australian Academy of Dramatic Art, the former name of the Australian Institute of Music - Dramatic Arts theatre school in Sydney
https://en.wikipedia.org/wiki/Hewlett-Packard%209100A
The Hewlett-Packard 9100A (HP 9100A) is an early programmable calculator (or computer), first appearing in 1968. HP called it a desktop calculator because, as Bill Hewlett said, "If we had called it a computer, it would have been rejected by our customers' computer gurus because it didn't look like an IBM. We therefore decided to call it a calculator, and all such nonsense disappeared." An ad for the 9100A in 1968 Science magazine contains one of the earliest documented use (as of 2000) of the phrase personal computer. History The unit was descended from a prototype produced by engineer Thomas "Tom" E. Osborne, who joined the company when HP decided to adopt the project. An engineering triumph at the time, the logic circuit was produced without any integrated circuits, the assembly of the CPU having been entirely executed in discrete components. With CRT readout, magnetic card storage, and printer, the price was around . The 9100A was the first scientific calculator by the modern definition, i.e., capable of trigonometric, logarithmic (log/ln), and exponential functions, and was the beginning of Hewlett-Packard's long history of using Reverse Polish notation (RPN) entry on their calculators. Due to the similarities of the machines, Hewlett-Packard was ordered to pay about in royalties to Olivetti after copying some of the solutions adopted in the Programma 101, like the magnetic card and the architecture. See also HP-35 CORDIC References External links Hosted at the Computer History Museum. Steven Leibson interview of Tom Osborne 9100a
https://en.wikipedia.org/wiki/Tynemouth%20Metro%20station
Tynemouth is a Tyne and Wear Metro station, serving the coastal town of Tynemouth, North Tyneside in Tyne and Wear, England. It joined the network as a terminus station on 11 August 1980, following the opening of the first phase of the network, between Haymarket and Tynemouth via Four Lane Ends. History The station, designed by architect William Bell, was originally opened by the North Eastern Railway on 7 July 1882. It was designated as a Grade II* listed building on 2 November 1978. Following a significant decline in the number of passengers using the North Eastern Railway's services in North Tyneside during the early 1900s, the line was electrified as part of the Tyneside Electrics network, using a 600VDC third-rail system. Owing to falling passenger numbers during the 1960s, as well as rising costs, and the need to renew life expired infrastructure and rolling stock, the Tyneside Electrics network was de-electrified and converted to diesel multiple unit operation in 1967. The station has remained in constant use since opening, with British Rail continuing to use the station's former bay platforms for services from Newcastle via Wallsend until the day before the first section of the Tyne and Wear Metro opened. Tynemouth joined the Tyne and Wear Metro network on 11 August 1980, with the opening of the first phase of the network between Haymarket and Tynemouth via Four Lane Ends. Prior to the introduction of through services to St James via Wallsend on 14 November 1982, all trains used the present platform 2. Regeneration In 2007, English Heritage placed the station on the Heritage at Risk Register. The survey is used by national and local government, a wide range of individuals and heritage groups to establish the extent of risk and to help assess priorities for action and funding decisions. Work on the £3.68million regeneration project began in early 2011, and was completed in the following year. On 2 July 2012, the station was officially reopened by Anne, Princess Royal, and subsequently removed from the register. Facilities The station has two platforms, both of which have ticket machines (which accept cash, card and contactless payment), seating, next train audio and visual displays, timetable and information posters and an emergency help point. There is step-free access to both platforms by road bridge, with platforms also linked by a pre-grouping wooden footbridge, which is similar in design to that at nearby Cullercoats. The station has a pay and display car park, with 71 spaces. There is also cycle storage at the station, with four cycle pods and five Sheffield stands. Services , the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains per hour during the evening and on Sunday. Rolling stock used: Class 599 Metrocar Market A weekly market is held at the station every Saturday and Sunday, which doubles as a farmers' market once a month. The Friends of Tynemouth Station also hol
https://en.wikipedia.org/wiki/Trolleybuses%20in%20Oslo
The Oslo trolleybus system was a trolleybus network operated by Oslo Sporveier in Oslo, Norway between 15 December 1940 and 15 February 1968. The system measured at the most 26.1 km on four lines. History While Drammen had got the Drammen trolleybus, the first in Scandinavia in 1909, Oslo had relied on the Oslo Tramway since 1875. In 1927 Oslo Sporveier started their first bus route, and on 28 September 1931 they sent an application for operation of a trolleybus in Oslo between Oslo and Grorud. But the application met a lot of resistance. Schøyens Bilcentraler route 30 went from Grorud to Skøyen, and if Oslo Sporveier were to operate a route on the same line they would have to pay compensation to Schøyens. To avoid this, Oslo Sporveier changed their applied terminus to Majorstuen. But while the City Council of Aker wanted the other solution, and was pressing Oslo Sporveier to go to Skøyen, and the Norwegian National Road Administration felt that if Oslo Sporveier wanted to build a trolleybus route to Grorud, they would have to pay for part of the upgrade of Trondheimsveien, a term not acceptable for the company. After a one-year trial run in Drammen in 1939 the first trolleybus route in Oslo opened in 1940. This was line 17, a 1.6 km feeding line at Rodeløkka. This line only used one bus, that didn't run on Sundays so it could be maintained. Then came World War II with fuel shortage, resulting in the trolleybus being quite popular, as Norway had ample electricity. But there were other problems, including material shortage and the fear of the German forces confiscating any copper that would be used in the wires. But after the war the network was expanded onwards, with three new lines in 1946. The lines were constantly expanded until 1955 when the network was at its largest. The end of the trolleybuses started in 1960 when the sale of cars in Norway was deregulated. This resulted in an enormous reduction in public transport ridership, and the same year the Oslo City Council decided to close both the trolleybus and tramway networks. In 1961 the first line was decommissioned, followed by another the next year. Excess buses were sold to Drammen. The last lines were closed in 1968. The plan was to replace all the electrical powered tram and trolleybus routes with the diesel bus, a strategy that would prove fatal when the oil crisis (1973 and 1979) hit in the 1970s. Unlike the trolleybus network, the Oslo Tramway still exists. References Oslo Trolleybus transport in Norway Oslo Sporveier Public transport in Oslo Bus transport in Oslo
https://en.wikipedia.org/wiki/California%20Music%20Channel
California Music Channel (CMC) is an American music video broadcast television network based in the San Francisco Bay Area. It is one of the longest running local music video television stations in the world. CMC has been broadcasting music videos over the air in the Bay Area since 1982. CMC has grown from an hour-long program to two 24/7 stations with digital simulcast capabilities. The live broadcasts feature on-camera disc jockeys, audience participation, and contemporary music videos. It is owned by CMC Broadcasting Company, Inc. CMC is carried as a Digital Broadcast Network nationally on LocalBTV, and locally on nine Northern California television stations including company owned and operated KTVJ-LD Boise, Idaho. CMC is also carried as a live linear channel on various Free ad-supported streaming television platforms and the California Music Channel App available for download to connected TVs and mobile devices. History 1981–1982 CMC was founded on August 31, 1981, by Rick Kurkjian, launching on March 1, 1982, as a half-hour show telecast twelve times per week on Teleprompter Cable Oakland Channel 12. The notion of a Bay Area Interconnect was developed early on as CMC expanded by doing local original cable channels on Concord TV Cable Ch. 11, Viacom Cable of San Francisco Ch 6, Viacom of Marin and Castro Valley Cable TV. After a little more than a year on the local cable channels CMC started running a Saturday night version of the program on KCSM-TV Ch 60 in San Mateo. The CMC broadcast was simulcast in stereo on KCSM-TV's sister station, KCSM-FM 91.1. 1983 In 1983, KCSM-TV was one of a batch of educational-access television stations to experiment with running expanded underwriting announcements and full 30-second commercial TV spots from non-profit organizations. In addition to the U.S. Army, many of its other advertisers were coincidentally set up as non-profit organizations under dealer associations and franchise organizations such as the California Milk Advisory Board and the McDonald's "Golden Arches Advertising Fund". As such, CMC was able to include commercials for these organizations on the otherwise non-commercial, educational, KCSM. This revenue allowed the show to remain profitable, when other local music video shows were struggling to remain on the air or even on non commercial Public-access television. 1984 In 1984, the demand from CMC advertisers grew beyond the scope of underwriting announcements and non profit 30s. On October 1, 1984, the California Music Channel debuted its Monday to Friday broadcast on full power independent KTSF-TV where CMC remained through February 23, 2018. 2016 In 2016 and 2018, Nielsen Media Research encodes, samples, and reports the San Francisco DMA transmissions of CMC as local broadcast TV station CMC-TV and CMC-USA as station CMCU-TV. 2018 In 2018, CMC Broadcasting purchased KTVJ-LD channel 6 licensed to Nampa/Boise, Idaho from OMI. 2019 In 2019, Gracenote and other television listing ser
https://en.wikipedia.org/wiki/Trolleybuses%20in%20Stavanger
The Stavanger trolleybus system was the shortest trolleybus network in Norway, in both route length and time span. The system was opened on 26 October 1947 and closed on 11 January 1963. It was operated by Stavanger Buss-Selskap. History The first plans for public transport in Stavanger was launched in 1916 with plans for a tramway. Permission was given, and track and wires were bought, but in the end there wasn't enough money to build the system. In 1933 a plan for trolleybuses was made for Stavanger, in combination with diesel buses. But things came in the way, and it was not until after the end of World War II that the system was constructed. In 1947 the first line, Line 1, was opened from the city square to Hillevåg, a 3 km stretch. The line was equipped with wires in both directions, but a 2 km line to the depot was only equipped with one wire. On 26 June 1949 the system was supplemented with Line 2 that went between the city square and Våland, as a partial circle line. During the 1950s there were serious plans for a Line 3 to Tasta. Line 1 operated at a 10-minute headway while Line 2 had a 20-minute headway. The system was closed in the 1960s due to a new route policy of driving the buses through the city, a system that did not work well with the existing trolleybuses. Line 2 was closed in 1962 and on 11 January 1963 the last trolleybus was driven in Stavanger. The route change was originally to take place on 17 February but a national strike that lasted until 9 February resulted in trolley buses being taken out of service early. None of the five trolleybuses from Stavanger have been preserved. It was announced in 2016 that a new trolleybus system will open in the city in 2021. References Stavanger Trolleybus transport in Norway Bus transport in Rogaland
https://en.wikipedia.org/wiki/Stack%20register
A stack register is a computer central processor register whose purpose is to keep track of a call stack. On an accumulator-based architecture machine, this may be a dedicated register. On a machine with multiple general-purpose registers, it may be a register that is reserved by convention, such as on the IBM System/360 through z/Architecture architecture and RISC architectures, or it may be a register that procedure call and return instructions are hardwired to use, such as on the PDP-11, VAX, and Intel x86 architectures. Some designs such as the Data General Eclipse had no dedicated register, but used a reserved hardware memory address for this function. Machines before the late 1960s—such as the PDP-8 and HP 2100—did not have compilers which supported recursion. Their subroutine instructions typically would save the current location in the jump address, and then set the program counter to the next address. While this is simpler than maintaining a stack, since there is only one return location per subroutine code section, there cannot be recursion without considerable effort on the part of the programmer. A stack machine has 2 or more stack registers — one of them keeps track of a call stack, the other(s) keep track of other stack(s). Stack registers in x86 In 8086, the main stack register is called stack pointer - SP. The stack segment register (SS) is usually used to store information about the memory segment that stores the call stack of currently executed program. SP points to current stack top. By default, the stack grows downward in memory, so newer values are placed at lower memory addresses. To push a value to the stack, the PUSH instruction is used. To pop a value from the stack, the POP instruction is used. Example: Assuming that SS = 1000h and SP = 0xF820. This means that current stack top is the physical address 0x1F820 (this is due to memory segmentation in 8086). The next two machine instructions of the program are: PUSH AX PUSH BX These first instruction shall push the value stored in AX (16-bit register) to the stack. This is done by subtracting a value of 2 (2 bytes) from SP. The new value of SP becomes 0xF81E. The CPU then copies the value of AX to the memory word whose physical address is 0x1F81E. When "PUSH BX" is executed, SP is set to 0xF81C and BX is copied to 0x1F81C. This illustrates how PUSH works. Usually, the running program pushes registers to the stack to make use of the registers for other purposes, like to call a routine that may change the current values of registers. To restore the values stored at the stack, the program shall contain machine instructions like this: POP BX POP AX POP BX copies the word at 0x1F81C (which is the old value of BX) to BX, then increases SP by 2. SP now is 0xF81E. POP AX copies the word at 0x1F81E to AX, then sets SP to 0xF820. Stack engine Simpler processors store the stack pointer in a regular hardware register and use the arithmetic logic unit (ALU) to manipulate
https://en.wikipedia.org/wiki/Simonside%20Metro%20station
Simonside is a Tyne and Wear Metro station, serving the suburb of West Harton, South Tyneside in Tyne and Wear, England. It joined the network on 17 March 2008. History The station was constructed at a cost of £3.2million, with original plans to open in January 2007. However, delays in planning and construction meant that the station opened later than planned, on 17 March 2008. The decision to construct a station here was controversial, with the decision not universally welcomed by all local residents. There were concerns that the station's opening would lead to an increase in both crime and local road traffic. Facilities Step-free access is available at all stations across the Tyne and Wear Metro network, with ramps providing step-free access to both platforms at Simonside. The station is equipped with ticket machines, waiting shelter, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is also fitted with smartcard validators, which feature at all stations across the network. There is no dedicated car parking available at the station. There is the provision for cycle parking, with two cycle pods available for use. Services , the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains per hour during the evening and on Sunday. Rolling stock used: Class 599 Metrocar References External links Timetable and station information for Simonside Metro stations in South Shields 2008 establishments in England Railway stations in Great Britain opened in 2008 Tyne and Wear Metro Yellow line stations Transport in Tyne and Wear
https://en.wikipedia.org/wiki/Cookie%20Jar%20Kids%20Network
The Cookie Jar Kids Network (formerly DIC Kids Network) was a syndicated children's programming block that airs selected Cookie Jar Group shows on local Fox, The CW, MyNetworkTV, and independent stations to provide them with a source of E/I programming required by federal law. The block is known on-air as simply Cookie Jar. It was first formed in 2003 as the DIC Kids Network, and was syndicated by Tribune Entertainment from 2003 to 2007, and then by Ascent Media from 2007 to 2011. National ad sales for the syndicated blocks were handled by Tribune Entertainment with a barter basis available. Ads could have stitched together other programs throughout the three blocks. History In February 2003, DIC announced three syndicated children's programming E/I blocks called DIC Kids Network with 200 stations including those owned by Tribune, Sinclair, Clear Channel and Cox signed up to carry the blocks. Margaret Loesch and Donald Roberts, a specialist in kids and media at Stanford University, help develop the blocks. By July, 400 stations had signed 3 to 5 year deals to air the block, and it was also announced that the block would launch on September 1. With its three feeds, DIC Kids was on Fox, The WB and UPN affiliates and out fulfilled the networks' Saturday morning blocks by December 1. On March 31, 2004, DIC acquired the North American broadcast rights to Ace Lightning from Alliance Atlantis, and would premiere the series on April 5th. On the same day, Liberty's Kids was announced to be added to the block, alongside the return of Sabrina: The Animated Series. A holiday lineup consisting of specials and movies like A Christmas Carol and Inspector Gadget Saves Christmas was also planned. DIC also planned to offer up acquired programmes for the block as well. In May 2004, DIC acquired the syndicated television rights to 26 select episodes of The Smurfs and the first three seasons of The Adventures of Captain Planet from Warner Bros. Domestic Television Distribution for a March 2005 broadcast window. In May 2005, DIC announced that Strawberry Shortcake would be added to the strand beginning in January 2006 in order to broaden the screen reach for the series. In October, it was confirmed that Strawberry would replace Captain Planet on the schedule. In mid-2008, the group announced that they would renew the focus of the block with an emphasis on offering DIC Entertainment programming to additional digital subchannels to meet their E/I needs. On May 20, 2008, it has been announced that DIC Entertainment would be acquired by Canada-based Cookie Jar. On June 23, 2008, the deal was completed, and the block was later relaunched as the Cookie Jar Kids Network on August 31, 2009. The block ceased to exist on September 17, 2011. As of 2023, no known footage of the 2009-2011 block has been surfaced online, and the bumpers and content of the 2009-2011 block are considered lost media. Programming Notes: -Shows marked with a * do not fulfill E/I requirements.
https://en.wikipedia.org/wiki/Computer%20Society%20of%20India
Computer Society of India is a body of computer professionals in India. It was started on 6 March 1965 by a few computer professionals and has now grown to be the national body representing computer professionals. It has 72 chapters across India, 511 student branches, and 100,000 members. The Computer Society of India is a non-profit professional meet to exchange views and information to learn and share ideas. The wide spectrum of members is committed to the advancement of theory and practice of Computer Engineering and Technology Systems, Science and Engineering, Information Processing and related Arts and Sciences. The Society also encourages and assists professionals to maintain integrity and competence of the profession and fosters a sense of partnership amongst members. Besides the activities held at the Chapters and Student Branches, the Society also conducts periodic conferences, seminars. Through the initiatives of Professor Rangaswamy Narasimhan the first President, CSI has been in close liaison with International Federation for Information Processing (IFIP) since its inception in 1965, when observers from India attended the IFIP Council meeting. Since 1974, when CSI became a member of IFIP, CSI has organized many IFIP sponsored events and was host to the 1978 Council meeting in Bombay and 1988 General Assembly in New Delhi. It represents India in technical committees and working groups of IFIP. Prof. Vipin Tyagi, Jaypee University of Engineering and Technology is Hon. Secretary of Computer Society of India. Organization The Society functions under the guidance of an Executive Committee. The members of this Committee are elected by voting members of the Society. The Functional head of the Society is the President and is assisted by the Vice President, Secretary and Treasurer. Membership The Society is targeted at the IT professionals and also user community at large. Hence, the membership of the Society is open to all professionals involved in the field of information technology. The membership categories include individual and institutional. In the individual member category there are five grades namely Fellow, Senior, Member, Associate and Student, whereas institutional membership includes organisations and educational institutions. A professional can also apply for life membership in the society. Education Directorate CSI started conducting the National Standard Test for Programming Competence in 1975. A Directorate of Education was set up in 1985, and a number of modules, such as Systems Analysis and Design, Data Communication, OS, and DBMS, are covered, in order to ensure a minimum level of professional competence, especially amongst those without a university background. CSI has an Educational Directorate which undertakes activities related to certification of professionals related to the latest technologies. Its recent initiative of distance education in the Business Domain areas offers technology enabled learning suppo
https://en.wikipedia.org/wiki/Panasonic%20JR-200
The Panasonic JR-200 (Panasonic Personal Computer (PPC)) was a simple, relatively early (1983), 8-bit home computer with a chiclet keyboard somewhat similar to the VTech Laser 200. It's part of the JR Series. Made of silver grey plastic, it had a black matte area around the keyboard area. Most of the 63 rubber chiclet keys were grey, with some (the more important) keys in marine blue, and with white control and break keys. Each of the grey keys could produce any of five inputs: Upper and lower-case letters (or numbers and symbols), two graphic characters (similar to the graphic symbols of PETSCII), and a BASIC keyword. Two keys, ALPHA and GRAPH, are used to switch back and forth between character and graphics modes. Holding down the CONTROL key while pressing any grey key produced a Basic keyword. In total the JR-200 had 253 built-in characters. 96 letters, numbers and symbols, 5 Greek letters, 63 graphical symbols, 79 Japanese (katakana) symbols and 10 music and other symbols. All symbols formed in an 8x8 pixel matrix, and the JR-200 could display 32 characters per line and 24 lines. All relevant keys would auto-repeat when pressed continuously. The JR-200 used a very unusual 8-bit CPU, the MN1800A, which was compatible with the Motorola MC6802, a slightly improved version of the Motorola 6800. It ran at a slow 0.89 MHz (according to unconfirmed information). There is also a second processor, the 4-bit MN1544CJR, which is used for I/O and contains 128 bytes of RAM plus four kilobytes of ROM. A version of the JR-200 called the Panasonic JR-200U was developed for the North American and European markets and was announced in January 1983. JR-Basic The JR-200 did not use Microsoft BASIC, but its own dialect, one that was designed to be mostly compatible with Microsoft BASIC. JR-BASIC was a greatly extended Basic, with, (for example) graphical commands such as COLOR, (which selected character color, background color and display mode) and PLOT which permitted direct addressing of the low resolution graphics mode (64×48, using text semigraphics characters, which represented pixel blocks that used one-quarter of each character). Eight colors were available for the background and foreground use: blue, red, magenta, green, cyan, yellow, white and black. By re-programming a part of the character-set a limited high resolution graphics mode was achievable with a resolution of 256×192. The BASIC also supported on-screen editing and direct execution of BASIC instructions. the machine came with 32K of RAM, and had 30,716 bytes free for a Basic program. User memory could be expanded to 40K. JR-BASIC itself occupied 16K of ROM, while the character set video memory and I/O used another 6K. The JR-200 ROM also contained a machine code monitor to enter and execute machine code programs. Sound The JR-200 was capable of producing a wide range of sounds. The JR-200 had a general purpose timer - I/O chip, with three of the timer outputs being hooked up to generat
https://en.wikipedia.org/wiki/Global%20Resource%20Serialization
Global Resource Serialization (GRS) is the component within the IBM z/OS operating system responsible for enabling fair access to serially reusable computing resources, such as datasets and tape drives or virtual resources, such as lists, queues, and control blocks. Programs can request exclusive access to a resource (which means that program and all subsequent requesting programs are blocked until that program is given access to the resource), usually requested when a program needs to update the resource or shared access (which means that multiple programs can be given access to the resource), usually requested when a program only needs to query the state of the resource. GRS manages all requests in FIFO (first in/first out) order. Scoping GRS manages resources at three different levels of scoping: STEP - this level is for resources that exist within a single MVS address space. Only threads (tasks) within that address space can request access to the resource. SYSTEM - this level is for resources that exist within a single MVS instance. Any thread running on the system can request access to the resource. SYSTEMS - also known as GLOBAL, these resources are accessible by multiple MVS instances. Any thread running on a system in the GRS complex can request access to the resource. Clustering In order for GRS to serialize resources between multiple systems, the systems must be clustered. There are several options to enable this clustering: GRS Ring - each of the systems (LPARs) are connected with channel-to-channel adapters (CTCAs) in a ring configuration. The GRS software sends messages around the ring to ensure the integrity of the complex and to arbitrate correct succession of ownership. Basic Sysplex - each of the systems in the sysplex has complete connectivity to every other system via CTCAs or ESCON CTCAs, managed by the XCF (Cross System Coupling Facility) component. The GRS component utilizes the Messaging and Group Services provided by XCF to replace and augment the function through the GRS managed CTCAs. GRS Star (Parallel Sysplex) - Rather than using a message passing protocol to manage resource ownership succession, GRS uses the locking services provided by the XES (Cross System Extended Services) component of MVS. Use of locking services requires a lock structure (called ISGLOCK) to be created in a Coupling Facility (CF). Similar CA, Inc. licenses a product called "Multi-Image Manager" (CA-MIM) which contains a component called "Multi-Image Integrity" (MII) which can be used to implement similar functions to GRS. References IBM mainframe operating systems
https://en.wikipedia.org/wiki/Sentry%20Firewall
Sentry Firewall is a free open-source network firewall Linux distribution that was first published in 2001 and has been the subject of multiple magazine reviews. The distribution is particularly notable because it consists solely of a bootable CD-ROM that is designed to be used in a computer with no hard disk. Configuration information is retrieved at boot time by automatically searching on an attached floppy disk drive, USB flash memory drive, or another server on the local network willing to provide the configuration. Overview Sentry Firewall starts from CD-ROM and immediately constructs a RAM disk in the computer's memory. Before the system fully boots, a script searches for removable media containing a file called "sentry.conf". If that file is found, it may contain detailed instructions and a list of files to be copied from the removable media to the RAM disk before the system is finally allowed to boot. The CD-ROM is pre-loaded with a variety of configurable network tools, including iptables. Because the RAM disk is created each time the machine boots, it is possible to recover from any sort of problem simply by rebooting the machine. From a security perspective, this is compelling because the machine essentially becomes immune to viruses or file corruption - or at least the effects of either problem can't survive a reboot. Configuration While basic Linux familiarity is necessary to configure a basic set of files necessary to use the firewall, there exist Windows programs capable of creating the bulk of the configuration scripts based on interaction with a graphical user interface. Firewall Builder is one such example; this program also works with other firewall products unrelated to Sentry Firewall. Current status According to the project's maintainer, Sentry Firewall has not been updated since its January 2005 release. External links Sentry Firewall on ArchiveOS.org References Firewall software Gateway/routing/firewall distribution Slackware Discontinued Linux distributions Linux distributions
https://en.wikipedia.org/wiki/Webroot
Webroot Inc. is an American privately-held cybersecurity software company that provides Internet security for consumers and businesses. The company was founded in Boulder, Colorado, US, and is now headquartered in Broomfield, Colorado, and has US operations in San Mateo and San Diego, and globally in Australia, Austria, Ireland, Japan and the United Kingdom. History Webroot was founded on 5 July 1997 when Steven Thomas and his girlfriend Boulderite Kristen Tally launched Webroot's first commercial product, a trace removal agent called Webroot Window Washer. Investors include venture capital firms such as Technology Crossover Ventures, Accel Partners and Mayfield. In 2002, Webroot launched a spyware blocking and removal product called Webroot Spy Sweeper. The company introduced antivirus protection with the launch of Spy Sweeper with AntiVirus in 2006. In October 2007, Webroot AntiVirus with AntiSpyware and Desktop Firewall was released with added firewall protection feature. Webroot entered the enterprise market in 2004 with the launch of Webroot Spy Sweeper Enterprise, which combined Spy Sweeper with technology that enables IT administrators to deploy antispyware protection across an entire network. In October 2008, Webroot launched its first consumer security suite, Webroot Internet Security Essentials, in the United States. The international release of the security suite followed in early 2009. In August 2009, Webroot appointed a new president and CEO, former CEO of Wily Technology. In May 2010 Webroot announced plans to open its international headquarters in Dublin, Ireland. In July 2010 Webroot Internet Security Complete 2011 was released, including antivirus and antispyware protection, firewall capabilities, online back-up, password management licensed from LastPass, protection against identity theft and credit card monitoring for US customers. In September 2010 Webroot opened a regional office in Leidschendam, The Netherlands which is primarily aimed at distributing Webroot's enterprise security-as-a-service (SaaS) products to businesses. Webroot Mobile Security for Android was launched on April 5, 2011 for smartphones and tablets, with a free basic version and a paid premium version. The app is designed to protect against viruses from apps, threats delivered via web browsing and against the threats created when mobile devices are lost. The SecureAnywhere products launched on October 4, 2011, and the mobile security offerings were expanded to include the iOS mobile operating system. In October 2011 Webroot launched a new generation of their products, using Prevx cloud technology. This included three basic products for Windows (SecureAnywhere AntiVirus, Essentials and Complete 2012) and security for Android and iOS mobile devices. In February 2012 products for businesses were added. In July 2014 Webroot announced its BrightCloud Security Services, a new portfolio of services for enterprise-class businesses, including integrat
https://en.wikipedia.org/wiki/Mklivecd
mklivecd is a script for Linux distributions that allows for one to compile a "snapshot" of the current hard drive partition and all data which resides in it (all settings, applications, documents, bookmarks, etc.) and compress it into an ISO 9660 CD-image. This allows easy backup of a user's data and also makes it easy to create customized Linux-distribution. Some Linux-distributions like PCLinuxOS include a graphical frontend for easier script usage. Used by AmaroK Live CD Dreamlinux Mandriva Linux Ruby on Rails Live CD Unity Linux Live CD See also Live CD Software remastering Remastersys, a similar tool (for Debian/Ubuntu) List of remastering software External links mklivecd source code mklivecd project page (obsolete) Backup software for Linux
https://en.wikipedia.org/wiki/InterPlanetary%20Network
The InterPlanetary Network (IPN) is a group of spacecraft equipped with gamma ray burst (GRB) detectors. By timing the arrival of a burst at several spacecraft, its precise location can be found. The precision for determining the direction of a GRB in the sky is improved by increasing the spacing of the detectors, and also by more accurate timing of the reception. Typical spacecraft baselines of about one AU (astronomical unit) and time resolutions of tens of milliseconds can determine a burst location within several arcminutes, allowing follow-up observations with other telescopes. Rationale Gamma rays are too energetic to be focused with mirrors. The rays penetrate mirror materials instead of reflecting. Because gamma rays cannot be focused into an image in the traditional sense, a unique location for a gamma ray source cannot be determined as it is done with less energetic light. In addition, gamma ray bursts are brief flashes (often as little as 0.2 seconds) that occur randomly across the sky. Some forms of gamma ray telescope can generate an image, but they require longer integration times, and cover only a fraction of the sky. Once three spacecraft detect a GRB, their timings are sent to the ground for correlation. A sky position is derived, and distributed to the astronomical community for follow-up observations with optical, radio, or spaceborne telescopes. Iterations of the IPN Note that, since any IPN must consist of several spacecraft, the boundaries between networks are defined differently by different commentators. Spacecraft naturally join or leave service as their missions unfold, and some modern spacecraft are far more capable than prior IPN members. A "planetary network" The Vela group of satellites was originally designed to detect covert nuclear tests, possibly at the Moon's altitude. Thus, the Velas were placed in high orbits, so that a time delay would occur between spacecraft triggers. In addition, each satellite had multiple gamma-ray detectors across their structures; the detectors facing a blast would register a higher gamma count than the detectors facing away. A gamma-ray burst was detected by the Vela group on June 3, 1969, and thus referred to as GRB 690603. The location was determined to be clearly outside of the satellites' orbit, and probably outside of the Solar system. After reviewing archived Vela data, a previous burst was determined to have occurred on July 2, 1967. Public reports of initial GRBs were not disclosed until the early 1970s. Further missions Additional spacecraft were given gamma-ray detectors. The Apollo 15 and 16 missions carried detectors to study the Moon; middle-to-late Venera spacecraft carried detectors to Venus. The relatively long baselines of these missions again showed that bursts originated at great distances. Other spacecraft (such as the OGO, OSO, and IMP series) had detectors for Earth, Solar, or all-sky gamma radiation, and also confirmed the GRB phenomenon. The first true
https://en.wikipedia.org/wiki/Data%20loss%20prevention%20software
Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint actions), in motion (network traffic), and at rest (data storage). The terms "data loss" and "data leak" are related and are often used interchangeably. Data loss incidents turn into data leak incidents in cases where media containing sensitive information is lost and subsequently acquired by an unauthorized party. However, a data leak is possible without losing the data on the originating side. Other terms associated with data leakage prevention are information leak detection and prevention (ILDP), information leak prevention (ILP), content monitoring and filtering (CMF), information protection and control (IPC) and extrusion prevention system (EPS), as opposed to intrusion prevention system. Categories The technological means employed for dealing with data leakage incidents can be divided into categories: standard security measures, advanced/intelligent security measures, access control and encryption and designated DLP systems, although only the latter category are currently thought of as DLP today. Common DLP methods for spotting malicious or otherwise unwanted activity and responding to it mechanically are automatic detection and response. Most DLP systems rely on predefined rules to identify and categorize sensitive information, which in turn helps system administrators zero in on vulnerable spots. After that, some areas could have extra safeguards installed. Standard measures Standard security measures, such as firewalls, intrusion detection systems (IDSs) and antivirus software, are commonly available products that guard computers against outsider and insider attacks. The use of a firewall, for example, prevents the access of outsiders to the internal network and an intrusion detection system detects intrusion attempts by outsiders. Inside attacks can be averted through antivirus scans that detect Trojan horses that send confidential information, and by the use of thin clients that operate in a client-server architecture with no personal or sensitive data stored on a client device. Advanced measures Advanced security measures employ machine learning and temporal reasoning algorithms to detect abnormal access to data (e.g., databases or information retrieval systems) or abnormal email exchange, honeypots for detecting authorized personnel with malicious intentions and activity-based verification (e.g., recognition of keystroke dynamics) and user activity monitoring for detecting abnormal data access. Designated DLP systems Designated systems detect and prevent unauthorized attempts to copy or send sensitive data, intentionally or unintentionally, mainly by personnel who are authorized to access the sensitive information. In order to classify certain information as sensitive, these use mechanisms, such as exact data matching, structured data f
https://en.wikipedia.org/wiki/Peter%20Robinson%20%28computer%20scientist%29
Peter Robinson (born 1952) is Professor of Computer Technology at the University of Cambridge Computer Laboratory in England, where he works in the Rainbow Group on computer graphics and interaction. He is also a Fellow of Gonville and Caius College and lives in Cambridge. Education Robinson graduated with a Bachelor of Arts degree in Mathematics from the University of Cambridge in 1974 and continued with a year of post-graduate study in Mathematics before joining the Computer Laboratory, where he was sponsored by the BBC to work on Graphic Design with Computers under Neil Wiseman and graduated PhD in 1979. Research Robinson worked on computer-aided design systems for integrated circuits in the 1980s, undertaking the physical design of the video processor for early BBC computers as a case study. He continued with work on self-timed (asynchronous) circuits and his students Paul Cunningham and Steev Wilcox started Azuro to exploit the ideas in designing low power integrated circuits. The Rank Xerox Research Centre in Cambridge sponsored several of Robinson's research students in the 1990s to work on video cameras and projection as part of the user interface including Pierre Wellner's DigitalDesk, an early tabletop display featuring tangible interaction and augmented reality and Quentin Stafford-Fraser's work leading to the webcam. Further work investigated augmenting paper documents and high-resolution interactive tabletop displays leading to the commercial nuVa system developed by Thales. More recently, Robinson has led a team working on affective computing. This has included inference of mental states from facial expressions non-verbal speech and gestures together with the expression of emotions by robots and cartoon avatars. His YouTube video on The emotional computer has resulted in regular television and radio appearances and his student Rana el Kaliouby founded Affectiva with Rosalind Picard to exploit the ideas commercially. Robinson has supervised over thirty research students for PhDs. References External links Peter Robinson's home page at the Computer Laboratory Computer Laboratory web page at Gonville and Caius College Gonville and Caius College 1952 births Living people British computer scientists Fellows of the British Computer Society Alumni of Gonville and Caius College, Cambridge Fellows of Gonville and Caius College, Cambridge Academics of the University of Cambridge Members of the University of Cambridge Computer Laboratory People educated at King's College School, London
https://en.wikipedia.org/wiki/Devon%20and%20Somerset%20Railway
The Devon and Somerset Railway (D&SR) was a cross-country line that connected Barnstaple in Devon, England, to the network of the Bristol and Exeter Railway (B&ER) near Taunton. It was opened in stages between 1871 and 1873 and closed in 1966. It served a mostly rural area although it carried some through services from east of Taunton to the seaside resort of Ilfracombe. From 1988 onwards the route of the line west of South Molton was redeveloped to form the part of the North Devon Link Road. History The Act of Parliament that authorised the D&SR received assent on 29 July 1864. Eugenius Birch was appointed as Engineer, but he was replaced by Richard Hassard in 1870. The first section of the line was opened on 8 June 1871, from Watchet Junction (later Norton Fitzwarren) to on the edge of Exmoor. The remaining to Barnstaple opened on 1 November 1873. The line used its own station at Barnstaple (later to be named Victoria Road), some distance from the rival station at Barnstaple Quay. The line was built as broad gauge and operated by the B&ER. The last broad gauge train ran on 14 May 1881, after which the line was converted to and reopened on 18 May. In 1884 the Tiverton and North Devon Railway opened from a junction on the D&SR to Tiverton. The Tiverton services started from and ran over the D&SR as far as where they diverged southwards, and that line was later extended to Exeter. In 1890 the GWR appointed a Mrs Towns as signalwoman at Morebath Junction. She is the only recorded example of a signalwoman on any railway in Britain in the 19th century. In October 1913 the Railway Magazine reported that she was "very proud" of her job after 23 years service and hoped to continue indefinitely. Conversion to standard gauge enabled a connection to the London and South Western Railway at Barnstaple. This was opened on 1 June 1887, after which GWR trains ran through to via Barnstaple and the LSWR. The GWR acquired the Devon and Somerset Railway in 1901. On 1 July 1905 an avoiding line was opened at Barnstaple, which allowed through trains to Ilfracombe to run directly to the LSWR station without having to reverse in the D&SR terminus. During the 1930s the line carried heavy traffic on summer weekends and automatic token equipment was installed to allow trains to pass token exchange points at higher speeds. In 1937 the junction at Norton Fitwarren was modified to allow an easier route from the main line, and the single track as far as was doubled. On 1 January 1948 the GWR was nationalised to become part of British Railways. The D&SR station was named from 26 September 1949 to distinguish it from Barnstaple Junction and railway stations, the former Southern Railway stations. Victoria Road station closed to passengers on 12 June 1960, after which all through trains ran directly to Barnstaple Junction. On 1 October 1966 the last train ran on the line; Victoria Road remained open for freight traffic, served from Barnstaple Junction, until
https://en.wikipedia.org/wiki/Global%20Ocean%20Data%20Analysis%20Project
The Global Ocean Data Analysis Project (GLODAP) is a synthesis project bringing together oceanographic data, featuring two major releases as of 2018. The central goal of GLODAP is to generate a global climatology of the World Ocean's carbon cycle for use in studies of both its natural and anthropogenically forced states. GLODAP is funded by the National Oceanic and Atmospheric Administration, the U.S. Department of Energy, and the National Science Foundation. The first GLODAP release (v1.1) was produced from data collected during the 1990s by research cruises on the World Ocean Circulation Experiment, Joint Global Ocean Flux Study and Ocean-Atmosphere Exchange Study programmes. The second GLODAP release (v2) extended the first using data from cruises from 2000 to 2013. The data are available both as individual "bottle data" from sample sites, and as interpolated fields on a standard longitude, latitude, depth grid. Dataset The GLODAPv1.1 climatology contains analysed fields of "present day" (1990s) dissolved inorganic carbon (DIC), alkalinity, carbon-14 (14C), CFC-11 and CFC-12. The fields consist of three-dimensional, objectively-analysed global grids at 1° horizontal resolution, interpolated onto 33 standardised vertical intervals from the surface (0 m) to the abyssal seafloor (5500 m). In terms of temporal resolution, the relative scarcity of the source data mean that, unlike the World Ocean Atlas, averaged fields are only produced for the annual time-scale. The GLODAP climatology is missing data in certain oceanic provinces including the Arctic Ocean, the Caribbean Sea, the Mediterranean Sea and Maritime Southeast Asia. Additionally, analysis has attempted to separate natural from anthropogenic DIC, to produce fields of pre-industrial (18th century) DIC and "present day" anthropogenic . This separation allows estimation of the magnitude of the ocean sink for anthropogenic , and is important for studies of phenomena such as ocean acidification. However, as anthropogenic DIC is chemically and physically identical to natural DIC, this separation is difficult. GLODAP used a mathematical technique known as C* (C-star) to deconvolute anthropogenic from natural DIC (there are a number of alternative methods). This uses information about ocean biogeochemistry and surface disequilibrium together with other ocean tracers including carbon-14, CFC-11 and CFC-12 (which indicate water mass age) to try to separate out natural from that added during the ongoing anthropogenic transient. The technique is not straightforward and has associated errors, although it is gradually being refined to improve it. Its findings are generally supported by independent predictions made by dynamic models. The GLODAPv2 climatology largely repeats the earlier format, but makes use of the large number of observations of the ocean's carbon cycle made over the intervening period (2000–2013). The analysed "present-day" fields in the resulting dataset are normalised
https://en.wikipedia.org/wiki/Barkarby
Barkarby is a district of Järfälla Municipality, Stockholm County, Sweden and part of the contiguously built-up Stockholm urban area. Barkarby has a station of the Stockholm commuter rail network. 1912 Summer Olympics During the 1912 Summer Olympics, it hosted the endurance trials for the equestrian eventing competition. The equestrian part of the modern pentathlon competition also took place here. See also Barkarby Airport References 1912 Summer Olympics official report. pp. 82, 85. Stockholm urban area Venues of the 1912 Summer Olympics Sports venues in Stockholm Olympic modern pentathlon venues
https://en.wikipedia.org/wiki/Patrick%20Wyatt
Patrick Wyatt is a game programmer and one of the three co-founders of ArenaNet. He was the leader of the Network and Technology teams and a programmer for Guild Wars. Before the founding of ArenaNet, he was working in Blizzard Entertainment where he was the Vice President of Research and Development and a senior programmer. Wyatt was the leader of Battle.net gaming network's programming and a major contributor on the multiplayer parts of Blizzard's popular games including StarCraft, Diablo and Warcraft II: Tides of Darkness. Having been in Blizzard for more than eight years, his work also includes earlier Blizzard games like Lost Vikings and Rock N' Roll Racing. On February 24, 2010, he became the Chief Operations Officer for En Masse Entertainment, along with other industry veterans. The first official En Masse title, an MMORPG titled TERA, launched in 2011 in South Korea and 2012 in North America and Europe. Patrick was employed by Undead Labs on January 30, 2014, where he worked with Jeff Strain, another co-founder of ArenaNet. As of November 2015 he is now Senior Principal Engineer for Amazon Games. Games Programmer of Game Ports The Lost Vikings (1992), Interplay Productions Battle Chess Enhanced CD-ROM (1992), Interplay Productions Rock 'n Roll Racing (1993), Interplay Productions The Death and Return of Superman (1994), Sun Corporation of America Blackthorne* (1994), Interplay Productions Justice League Task Force (1995), Acclaim Entertainment The Lost Vikings 2 (1997), Interplay Entertainment Producer and Lead Programmer WarCraft: Orcs & Humans (1994), Blizzard Entertainment Warcraft II: Tides of Darkness (1995), Blizzard Entertainment StarCraft (1998), Blizzard Entertainment Programmer Diablo (1996), Blizzard Entertainment Warcraft II: The Dark Saga (1997), Electronic Arts Warcraft II: Battle.net Edition (2000), Blizzard Entertainment Diablo II (2000), Blizzard Entertainment StarCraft: Brood War (1998), Blizzard Entertainment StarCraft 64 (2000), Nintendo of America Warcraft III: Reign of Chaos (2002), Blizzard Entertainment Production/Business Guild Wars: Nightfall (2006), NCsoft Europe Guild Wars: Factions (2006), NCsoft Europe Guild Wars: Eye of the North (2007), NCsoft Europe Aion (2009), NCsoft West TERA (2011), NHN Games Corporation References External links American video game programmers American video game designers Living people Year of birth missing (living people) American chief operating officers Blizzard Entertainment people
https://en.wikipedia.org/wiki/UTOPIA%20%28bioinformatics%20tools%29
UTOPIA (User-friendly Tools for Operating Informatics Applications) is a suite of free tools for visualising and analysing bioinformatics data. Based on an ontology-driven data model, it contains applications for viewing and aligning protein sequences, rendering complex molecular structures in 3D, and for finding and using resources such as web services and data objects. There are two major components, the protein analysis suite and UTOPIA documents. Utopia Protein Analysis suite The Utopia Protein Analysis suite is a collection of interactive tools for analysing protein sequence and protein structure. Up front are user-friendly and responsive visualisation applications, behind the scenes a sophisticated model that allows these to work together and hides much of the tedious work of dealing with file formats and web services. Utopia Documents Utopia Documents brings a fresh new perspective to reading the scientific literature, combining the convenience and reliability of the Portable Document Format (pdf) with the flexibility and power of the web. History Between 2003 and 2005 work on UTOPIA was funded via The e-Science North West Centre based at The University of Manchester by the Engineering and Physical Sciences Research Council, UK Department of Trade And Industry, and the European Molecular Biology Network (EMBnet). Since 2005 work continues under the EMBRACE European Network of Excellence. UTOPIA's CINEMA (Colour INteractive Editor for Multiple Alignments), a tool for Sequence Alignment, is the latest incarnation of software originally developed at The University of Leeds to aid the analysis of G protein-coupled receptors (GPCRs). SOMAP, a Screen Oriented Multiple Alignment Procedure was developed in the late 1980s on the VMS computer operating system, used a monochrome text-based VT100 video terminal, and featured context-sensitive help and pulldown menus some time before these were standard operating system features. SOMAP was followed by a Unix tool called VISTAS (VIsualizing STructures And Sequences) which included the ability to render 3D molecular structure and generate plots and statistical representations of sequence properties. The first tool under the CINEMA banner developed at The University of Manchester was a Java-based applet launched via web pages, which is still available but is no longer maintained. A standalone Java version, called CINEMA-MX, was also released but is no longer readily available. A C++ version of CINEMA, called CINEMA5 was developed early on as part of the UTOPIA project, and was released as a stand-alone sequence alignment application. It has now been replaced by a version of the tool integrated with UTOPIA's other visualisation applications, and its name has reverted simply to CINEMA. References Bioinformatics software Computational science Engineering and Physical Sciences Research Council Department of Computer Science, University of Manchester Science and technology in Greater Manchester
https://en.wikipedia.org/wiki/Security%20information%20management
Security information management (SIM) is an information security industry term for the collection of data such as log files into a central repository for trend analysis. Overview SIM products generally are software agents running on the computer systems that are monitored. The recorded log information is then sent to a centralized server that acts as a "security console". The console typically displays reports, charts, and graphs of that information, often in real time. Some software agents can incorporate local filters to reduce and manipulate the data that they send to the server, although typically from a forensic point of view you would collect all audit and accounting logs to ensure you can recreate a security incident. The security console is monitored by an administrator who reviews the consolidated information and takes action in response to any alerts issued. The data that is sent to the server to be correlated and analyzed are normalized by the software agents into a common form, usually XML. Those data are then aggregated in order to reduce their overall size. Terminology The terminology can easily be mistaken as a reference to the whole aspect of protecting one's infrastructure from any computer security breach. Due to historic reasons of terminology evolution; SIM refers to just the part of information security which consists of discovery of 'bad behavior' or policy violations by using data collection techniques. The term commonly used to represent an entire security infrastructure that protects an environment is commonly called information security management (InfoSec). Security information management is also referred to as log management and is different from SEM (security event management), but makes up a portion of a SIEM (security information and event management) solution. See also Information security Information security management Information security management system Security Information and Event Management Security event manager Gordon–Loeb model for cyber security investments References Computer security
https://en.wikipedia.org/wiki/AN/UYK-20
The AN/UYK-20 "Data Processing Set" was a ruggedized small computer manufactured by Univac and used by the United States Navy for small and medium-sized shipboard and shore systems built in the 1970s. It featured non-volatile magnetic core memory and was housed in a heavy-duty metal cube-shaped box which was designed to fit through a 25-inch circular hatch. In 1972, in response to the proliferation of small computer types in the Navy's inventory, the Chief of Naval Material mandated the use of the AN/UYK-20(V) in systems requiring a small digital processor. In March 1974 the AN/UYK-20 received service approval and by late 1974 they were in use in the development of tactical systems. Programmers and operators colloquially referred to this computer as the "Yuck Twenty." Technical In addition to various uses throughout the fleet, the system was used to train the U.S. Navy's Data Systems Technicians (DS) on digital computer theory and application. The 9-month course had 4 phases and phase 3 was UYK-20. Phase 3 was broken into the following sections: Microinstructions Macroinstructions Processor/Emulator Memory Input/Output Graded Troubleshooting (Mids)- MIDS was the last week of Phase 3 where as the class started at 2300 hours and finished at 0630. Each night a series of faults was inserted into the UYK-20 for troubleshooting purposes. The student had to use diagnostic routines, troubleshooting techniques, and skill to find and fix the faults. The student had to pass with a majority of faults identified and fixed to move on to phase 4. Phase 3 for some was the toughest part of Data Systems A School at Mare Island, CA. I know this, because I attended A School as a DS from SEP 89 - MAY 90. Phase 2 used the training computer called the COMTRAN 10 aka "Comtrash 10". After the dissolution of the Navy's DS rate, the primary maintenance responsibility was moved to the Electronic Technicians (ET), as the UYK-20 was already being used in several of their systems primarily the NAVMACS system. Replacement The AN/UYK-20 is still currently in use, but has been largely supplanted by the AN/UYK-44, which uses a 'superset' of the UYK-20 instruction set, meaning the UYK-44 will execute all of the UYK-20 instructions, as well as several new instructions specific to the UYK-44. See also AN/AYK-14 AN/UYK-44 CMS-2 programming language References External links AN/UYK-20 drawing AN/UYK-20 photograph Sperry Univac AN/UYK-20 Technical Description UNIVAC hardware Military computers Military electronics of the United States Military equipment introduced in the 1970s 16-bit computers
https://en.wikipedia.org/wiki/Compatibility%20testing
Compatibility testing is a part of non-functional testing conducted on application software to ensure the application's compatibility with different computing environment. The ISO 25010 standard, (System and Software Quality Models) defines compatibility as a characteristic or degree to which a software system can exchange information with other systems whilst sharing the same software and hardware. The degree to which a product can perform its required functions efficiently while sharing a common environment and resources with other products, without detrimental impact on any other product is known as co-existence while interoperability is the degree to which two or more systems, products, or components can exchange information and use the information that has been exchanged. In these contexts, compatibility testing would be information gathering about a product or software system to determine the extent of coexistence and interoperability exhibited in the system under test. See also List of International Organization for Standardization standards, 24000-25999 ISO/IEC 25010:2011 Systems and software engineering - Systems and software Quality Requirements and Evaluation (SQuaRE) - System and software quality models References Software testing
https://en.wikipedia.org/wiki/List%20of%20diplomatic%20missions%20of%20the%20State%20of%20Palestine
The State of Palestine has a network of diplomatic missions worldwide, predominantly in Africa, Asia, Eastern Europe, Latin America, and the Middle East. However, due to its ongoing tensions with Israel as part of the Arab–Israeli conflict, the scope of Palestine's diplomatic network has been relatively limited in the Western/Western-aligned world, with many of these countries permitting only sub-diplomatic relations with lower-than-embassy-status missions. Africa Algiers (Embassy) Luanda (Embassy) Brazzaville (Embassy) Djibouti City (Embassy) Cairo (Embassy) Addis Ababa (Embassy) Libreville (Embassy) Accra (Embassy) Conakry (Embassy) Bissau (Embassy) Abidjan (Embassy) Nairobi (Embassy) Tripoli (Embassy) Bamako (Embassy) Nouakchott (Embassy) Rabat (Embassy) Maputo (Embassy) Windhoek (Embassy) Abuja (Embassy) Dakar (Embassy) Pretoria (Embassy) Khartoum (Embassy) Dar es Salaam (Embassy) Tunis (Embassy) Lusaka (Embassy) Harare (Embassy) Americas Buenos Aires (Embassy) La Paz (Embassy) Brasília (Embassy) Ottawa (General Delegation) Santiago (Embassy) Bogotá (Embassy) Havana (Embassy) Quito (Embassy) San Salvador (Embassy) Mexico City (Embassy) Managua (Embassy) Lima (Embassy) Montevideo (Embassy) Caracas (Embassy) Asia Baku (Embassy) Manama (Embassy) Dhaka (Embassy) Beijing (Embassy) New Delhi (Embassy) Jakarta (Embassy) Tehran (Embassy) Baghdad (Embassy) Tokyo (General Mission) Amman (Embassy) Astana (Embassy) Kuwait City (Embassy) Beirut (Embassy) Kuala Lumpur (Embassy) Pyongyang (Embassy) Muscat (Embassy) Islamabad (Embassy) Manila (Embassy) Doha (Embassy) Riyadh (Embassy) Colombo (Embassy) Damascus (Embassy) Dushanbe (Embassy) Ankara (Embassy) Istanbul (Consulate-General) Ashgabat (Embassy) Abu Dhabi (Embassy) Dubai (Consulate-General) Tashkent (Embassy) Hanoi (Embassy) Sana'a (Embassy) Europe Tirana (Embassy) Vienna (Permanent Mission) Minsk (Embassy) Brussels (Mission) Sarajevo (Embassy) Sofia (Embassy) Nicosia (Embassy) Prague (Embassy) Copenhagen (Mission) Helsinki (mission) Paris (Mission) Berlin (Mission) Athens (Mission) Rome (Embassy) Budapest (Embassy) Dublin (Mission) Rome (Mission) Valletta (Embassy) The Hague (General Delegation) Oslo (Mission) Warsaw (Embassy) Lisbon (Mission) Bucharest (Embassy) Moscow (Embassy) Belgrade (Embassy) Bratislava (Embassy) Madrid (Mission) Stockholm (Embassy) Bern (General Delegation) Kyiv (Embassy) London (Mission) Oceania Canberra (General Delegation) Multilateral organisations Cairo (Permanent Mission to the Arab League) Geneva (Permanent Observer Mission to the United Nations) New York City (Permanent Observer Mission to the United Nations) Accredited as representative office to Paris (Permanent Mission to UNESCO) Jeddah (Permanent Mission to OIC) Gallery See also Foreign relations of
https://en.wikipedia.org/wiki/Bally%20Sports%20Midwest
Bally Sports Midwest is an American regional sports network owned by Diamond Sports Group, a joint venture between Sinclair Broadcast Group and Entertainment Studios, and operates as an affiliate of Bally Sports. The channel broadcasts regional event coverage of sports teams throughout the Midwestern United States, most prominently, professional sports teams based in St. Louis, Missouri. Bally Sports Midwest is available on cable providers throughout eastern and central Missouri, Western and Southern Illinois, Nebraska, and Iowa; it is also available nationwide on satellite via DirecTV. History The channel originally launched by TCI and Bill Daniels in November 1989 as Prime Sports Network Midwest (also referred to as Prime Sports Midwest), serving as an affiliate of the Prime Network. The network was originally based in Indianapolis and held rights to 25 home games of the Indiana Pacers. Originally seen mainly within Indiana, the channel began expanding its cable provider coverage westward in 1994. Following Liberty Media's sale of the Prime Network to News Corporation, the channel became a member of the newly formed Fox Sports Net (then a joint venture between Liberty Media and News Corporation) and rebranded as Fox Sports Midwest (FSMW) on November 1, 1996. The channel was then rebranded as Fox Sports Net Midwest in 1999, as part of a collective brand modification of the FSN networks under the "Fox Sports Net" banner; subsequently in 2004, the channel shortened its name to FSN Midwest, through the networks' de-emphasis of the brand. In the spring of 2006, Fox Sports Midwest obtained the exclusive regional cable television rights to broadcast NBA games involving the Indiana Pacers. This resulted in the channel creating a spin-off regional sports network channel, Fox Sports Indiana, for the primary purpose of airing games from the Pacers and the WNBA's Indiana Fever; Fox Sports Indiana launched on November 1, 2006, at the start of the team's regular season. In the fall of 2007, Fox Sports Midwest signed an exclusive long-term agreement to broadcast games from the Kansas City Royals (this followed the team's decision to dissolve the Royals Sports Television Network, a regional television syndication service for the team's game broadcasts). On January 24, 2008, the network formally announced that it would spin-off its subfeed for the Kansas City market into a separate channel, Fox Sports Kansas City, to avoid scheduling conflicts with Fox Sports Midwest's St. Louis Cardinals game coverage. The main St. Louis-based feed reverted to the Fox Sports Midwest moniker that same year. On July 15, 2010, Fox Sports Midwest signed a new television contract with the St. Louis Cardinals, giving the channel exclusive regional broadcast rights to the team's games beginning with the 2011 season, ending the team's local broadcasts in the St. Louis market on NBC affiliate KSDK (channel 5). On July 30, 2015, Fox Sports Midwest and the St. Louis Cardinals agr
https://en.wikipedia.org/wiki/Urdu%20keyboard
The Urdu keyboard is any keyboard layout for Urdu computer and typewriter keyboards. Since the first Urdu typewriter was made available in 1911, the layout has gone through various phases of evolution. With time, the variety of layouts introduced in the 1950s for mechanized compositions have reduced to very few that are compatible with the new digital age. Modern improvements in Urdu keyboard were pioneered by the National Language Authority () in Pakistan, which standardized the linguistic aspects such as orthography and lexicography. These developments helped the keyboard layout to evolve from the typewriters to be compatible with computers, to increase the productivity and textual efficiency of the language, especially through modern electronic media. Evolution of the Urdu keyboard When Urdu was declared as the national language of the independent Pakistan in 1947, a variety of keyboard designs were quickly brought into the market by various individuals and organizations. However, differences remained in the order of the keys and the number of characters. This underscored an urgent need for a standard form of keyboard adaptable for diverse users. Third generation In 1980, the National Language Authority of Pakistan developed a new keyboard layout for typewriters based on Naskh script. The keyboard had 46 keys to type 71 Urdu consonants, vowels, diacritics, and punctuation marks, and 21 key symbols for arithmetic calculations and digits. However, with the arrival of the digital age, the layout became inadequate for computerized processing that required software backup to select the shape of the character appropriate to the context, and the ability to store multiple language character sets. These issues were addressed through the standardization of keyboard. Fourth generation In 1998 National Language Authority, under Dr. Attash Durrani's supervision started working on a research and development project to standardize the Urdu encoding. This resulted in the formation of () (UZT). In July 2000, UZT 1.01 was standardized for all kinds of electronic computing, communications, and storage. Based on this version, Urdu language support was incorporated into the Versions 3.1 and 4.0 of Unicode. The Keyboard version 1 was finalized by NLA on December 14, 1999. In 2001, the National Database and Registration Authority of Pakistan fully adopted this keyboard for Data Entry operations of the Computerized National Identity Cards. Phonetic Keyboard Along with the UZT keyboards, phonetic keyboards have been developed for Urdu. Phonetic keyboards works with the sound of the words, e.g. 'a' button of the English keyboard contain an Urdu word which is similar to the sound of 'a' and same is the case for other characters. Though less common in the past, phonetic keyboards have seen wider use recently. CRULP (Center for research for Urdu language processing) has been working on phonetic keyboard designs for URDU and other local languages of Pakistan. Their U
https://en.wikipedia.org/wiki/MIT%20Electrical%20Engineering%20and%20Computer%20Science%20Department
The MIT Electrical Engineering and Computer Science Department is an engineering department of the Massachusetts Institute of Technology in Cambridge, Massachusetts. It is regarded as one of the most prestigious in the world, and offers degrees of Master of Science, Master of Engineering, Doctor of Philosophy, and Doctor of Science. History The curriculum for the electrical engineering program was created in 1882, and was the first such program in the country. It was initially taught by the physics faculty. In 1902, the Institute set up a separate Electrical Engineering department. The department was renamed to Electrical Engineering and Computer Science in 1975, to highlight the new addition of computer science to the program. Academics Current faculty Professors Silvio Micali Harold Abelson Anant Agarwal Akintunde I. Akinwande Dimitri A. Antoniadis Arvind Arthur B. Baggeroer Hari Balakrishnan Dimitri P. Bertsekas Robert C. Berwick Duane S. Boning Louis D. Braida Rodney A. Brooks Vincent W. S. Chan Anantha P. Chandrakasan Paul E. Gray (S.B. 1954, S.M. 1955, Ph.D. 1960) Marvin Minsky Pablo A. Parrilo L. Rafael Reif Jerome H. Saltzer (Sc.D. 1966) Kenneth N. Stevens (Sc.D. 1952) Gerald J. Sussman (S.B. 1968, Ph.D. 1973, both in Mathematics) Patrick H. Winston Regina Barzilay (website) Associate professors Saman P. Amarasinghe Krste Asanovic Marc Baldo Sangeeta Bhatia Vladimir Bulovic Isaac L. Chuang Michael Collins Karl K. Berggren Elfar Adalsteinsson Tomas Palacios Professors emeriti Michael Anthans Abraham Bers Amar Bose (S.B. 1951, S.M. 1952, Sc.D. 1956) James D. Bruce Fernando J. Corbató Shaoul Ezekiel Robert Fano (S.B. 1941, Sc.D. 1947) Former faculty Leo Beranek Gordon S. Brown (S.B. 1931, S.M. 1934, Ph.D. 1938) Vannevar Bush (Eng.D. 1916) Jack Dennis (S.B. 1953, S.M. 1954, Sc.D. 1958) Harold Edgerton (S.M. 1927, Sc.D. 1931) Jay Wright Forrester (S.M. 1945) Irwin M. Jacobs (S.M. 1957, Sc.D. 1959) William B. Lenoir (S.B. 1961, S.M. 1962, Ph.D. 1965) John McCarthy Julius Stratton (S.B. 1923, S.M. 1926) Notable alumni References External links MIT Department of Electrical Engineering and Computer Science Electrical Engineering and Computer Science Department Computer science departments in the United States Science and technology in Massachusetts Electrical and computer engineering departments
https://en.wikipedia.org/wiki/Virtual%20Digital%20Cable
VDC Corporation was a distributor of multichannel video programming that delivered live cable television through broadband connected computers in the United States. They developed and were involved in the distribution and delivery of live cable television programming channels. History VDC Corporation was founded in 2002 by Scott Wolf. VDC was a pioneer in the delivery of live cable programming to mobile devices. The company transitioned its mobile product to the delivery of live cable television to desktop computers with their Virtual Digital Cable service launched in April 2006. In October 2006, VDC became one of the first providers to utilize the Microsoft Silverlight technology to provide secure, live distribution of streaming television. In January 2007, VDC made public its decision to file a program-access complaint with the FCC to commence a proceeding to obtain enforcement of the program access rules under the 1992 Cable TV Consumer Protection Act, to ensure vertically integrated programming providers sell their programming to VDC. Such providers include Time Warner (CNN, TNT, TBS, Cartoon Network, HBO), Liberty Media, (Discovery Channel), Cablevision (Rainbow) and Comcast (E!, Golf Channel). In late January 2010, the company posted a notice on their website stating that they had ceased offering subscriptions pending the FCC's decision on their program-access complaint. This remained in place at least until July 2011; the website has since been replaced with a generic domain parking page. Controversies Congress attempted to encourage growth and competition in the vertically integrated cable marketplace with the 1992 Cable TV Consumer Protection Act. Using the internet, VDC claims to have brought diversity and increased competition to the marketplace: The term 'multichannel video programming distributor' means an entity engaged in the business of making available for purchase, by subscribers or customers, multiple channels of video programming. Such entities include, but are not limited to, a cable operator, a multichannel multipoint distribution service, a direct broadcast satellite service, a television receive-only satellite program distributor, and a satellite master antenna television system operator, as well as buying groups or agents of all such entities. VDC's complaint with the FCC was filed against Turner Broadcasting System to force Turner into compliance with the 1992 Cable Act and to recognize VDC as an MVPD. This would grant VDC mandatory access to broadcast Turner's programming on VDC's MVPD system. The FCC debate also raises regulatory and broadcast issues involving net neutrality. References External links Cable television companies of the United States Streaming television
https://en.wikipedia.org/wiki/Kitchen%20Nightmares
Kitchen Nightmares, known in the U.K. as Ramsay's Kitchen Nightmares USA, is an American reality television series originally broadcast on the Fox network, in which chef Gordon Ramsay is invited by the owners to spend a week with a failing restaurant in an attempt to revive the business. Produced by ITV Studios America, it is based on the British show Ramsay's Kitchen Nightmares. The show premiered September 19, 2007, on Fox. On June 23, 2014, Ramsay announced that he was ending the series; the final episode aired on September 12 that year. In June 2018, Gordon Ramsay's 24 Hours to Hell and Back, a new series with a premise much like Kitchen Nightmares but a shorter timeline, premiered on Fox. The show still hosts a YouTube channel with over 6.53 million subscribers. The channel presents highlights from the show, and has also shown selected full episodes of the show. In May 2023, Fox announced that the show would re-enter production for an eighth season, which premiered on September 25, 2023. Synopsis Each episode of Kitchen Nightmares typically consists of a series of introductory clips and interviews of the specific restaurant before Gordon Ramsay's visit, emphasizing the subpar conditions of the restaurant. This is followed by Ramsay arriving to the restaurant for lunch, meeting the owner(s), and trying various items on their menu while making first impression observations of the restaurant. Chef Ramsay then consults the restaurant's chef(s) on his dining experience, which is almost exclusively negative. After this, every episode involves Ramsay observing a typical dinner service for the restaurant, it does not go well as the various issues of the restaurant are highlighted. Gordon Ramsay then in each episode inspects the conditions of the restaurant's kitchen and food storage compartments, uncovering even more issues. This is typically followed by meeting with the owners and/or staff to discuss the critical changes that need to made. These changes are then shown, from additions to the items in the menu to the staff being trained and occasionally replaced to the restaurant being remodeled. After these revisions, the restaurant is relaunched, which predominantly ends with a more successful service. After the end of each relaunch, Ramsay addresses the restaurant's owner and staff one final time before leaving, wishing them well. At the end of episodes of later seasons, a follow-up segment is shown, showcasing the status of the restaurant in the weeks and months after Gordon Ramsay's visit. Each season after season one, an episode is dedicated to Ramsay revisiting some of the previous restaurants he visited to see what became of the restaurant and its staff. Production The show was produced by ITV Studios America and Optomen, in association with A. Smith & Co. Productions, with Arthur Smith, Kent Weed, and Patricia Llewellyn serving as executive producers. In the UK, the series is broadcast under the name Kitchen Nightmares USA and Ramsay's
https://en.wikipedia.org/wiki/The%20Post-Modern%20Prometheus
"The Post-Modern Prometheus" is the fifth episode of the fifth season of the American science fiction television series The X-Files and originally aired on the Fox network on November 30, 1997. Written and directed by series creator Chris Carter, "The Post-Modern Prometheus" is a "Monster-of-the-Week" episode, a stand-alone plot which is unconnected to the overarching mythology of The X-Files. "The Post-Modern Prometheus" earned a Nielsen household rating of 11.5, being watched by 18.68 million viewers upon its initial broadcast. The episode was nominated for seven awards at the 1998 Emmys and won one. The entry generally received positive reviews; some reviewers called it a classic, with others calling it the most striking stand-alone episode of the show's fifth season. The show centers on FBI special agents Fox Mulder (David Duchovny) and Dana Scully (Gillian Anderson) who work on cases linked to the paranormal, called X-Files. Mulder is a believer in the paranormal, while the skeptical Scully was initially assigned to debunk his work. In this episode, Mulder and Scully investigate reports of a mysterious creature that has impregnated a middle-aged woman. They find that the "monster", nicknamed The Great Mutato, is the genetic creation of a Frankenstein-like doctor. The Great Mutato is at first ostracized, but later accepted, by his community. Carter's story draws heavily on Mary Shelley's Frankenstein and particularly on James Whale's 1931 film version of the story. The episode was even filmed in black-and-white, with a sky backdrop created to imitate the style of old Frankenstein films. The script had been written specifically with singer Cher and actress Roseanne Barr in mind, but both were unavailable at the time of shooting. Talk-show host Jerry Springer appeared as himself, and Chris Owens—who appeared in later episodes as FBI agent Jeffrey Spender—played The Great Mutato. Owens wore makeup and prosthetics that took several hours to apply. Plot The episode begins in the guise of a comic book. FBI special agent Fox Mulder (David Duchovny) receives a letter from Shaineh Berkowitz (Pattie Tierce), a single mother who claims to have been impregnated, while unconscious, by an unknown presence 18 years ago, resulting in the birth of her son, Izzy (Stewart Gale). Now, following a similarly unexplained attack, she is pregnant again. She has heard about Fox Mulder's expertise in the paranormal from The Jerry Springer Show, and wants him to investigate. Special agents Mulder and Dana Scully (Gillian Anderson), travel to rural Albion, Indiana. They meet Shaineh and her son Izzy, and learn that the description of the creature that attacked her, with a lumpy head and two mouths, is very similar to a comic book character invented by Izzy. His monstrous creation, called The Great Mutato, is inspired by a mysterious creature that has been seen by many of the locals. Izzy and his friends accompany the agents to a wooded area, where they see Mutato (
https://en.wikipedia.org/wiki/KTFD-TV
KTFD-TV (channel 50) is a television station in Denver, Colorado, United States, affiliated with the Spanish-language network UniMás. It is owned by Entravision Communications, which provides certain services to Boulder-licensed Univision-owned station KCEC (channel 14) under a local marketing agreement (LMA) with TelevisaUnivision. Both stations share studios on Mile High Stadium West Circle in Denver, while KTFD-TV's transmitter is located atop Lookout Mountain, near Golden. History The station first signed on the air on February 22, 1996, as KTVJ. Founded by Roberts Broadcasting, it originally aired programming from the Home Shopping Network. In January 2003, Roberts sold the station to Univision Communications. Two months later on March 10, 2003, the station changed its call sign to KTFD-TV (which was modified to KTFD-DT on June 23, 2009, in correspondence with the callsign modifications to the "-DT" suffix applied by all Univision-owned stations following the digital television transition), and became an owned-and-operated station of Univision's secondary network TeleFutura. KTFD's signal was formerly relayed on low-power analog translator station KDVT-LP (channel 36) in Denver, which was owned by Entravision Communications. The translator was never converted to digital, and its license was canceled on September 13, 2017. On December 4, 2017, as part of a channel swap made by Entravision Communications, KTFD and sister station KCEC swapped licenses and channel numbers, with KTFD moving from the Univision-owned facility using digital channel 15 and virtual channel 14 to Entravision's digital channel 26 and virtual channel 50 facility. On January 9, 2019, KTFD completed the migration to digital channel 28 from digital 26 as part of the FCC spectrum auction repack. Technical information Subchannels The station's digital channel is multiplexed Analog-to-digital conversion KTFD-TV shut down its analog signal, over UHF channel 14, on June 12, 2009, the official date on which full-power television in the United States transitioned from analog to digital broadcasts under federal mandate. The station's digital signal remained on its pre-transition UHF channel 15. Through the use of PSIP, digital television receivers display the station's virtual channel as its former UHF analog channel 14. References Television channels and stations established in 1996 1996 establishments in Colorado TFD-TV UniMás network affiliates Bounce TV affiliates Get (TV network) affiliates Ion Mystery affiliates TFD-TV Entravision Communications stations
https://en.wikipedia.org/wiki/Codework
Codework is "a type of creative writing which in some way references or incorporates formal computer languages (C++, Perl, etc.) within the text. The text itself is not necessarily code that will compile or run, though some have added that requirement as a form of constraint." The concept of and term 'codework' was originally developed by Alan Sondheim, but is also practiced by and used to refer to the work of other Internet artists such as Mez Breeze, Talan Memmott (especially in the work Lexia to Perplexia), Ted Warnell, Brian Lennon, and John Cayley. Scholar Rita Raley uses the term "[net.writing]," which she defines as "the use of the contemporary idiolect of the computer and computing processes in digital media experimental writing." Raley sees codework as part of a broader practice exploring "the art of code." Codework has been used for many forms of writing, mostly poetry and fiction. Duc Thuan's Days of JavaMoon is an example of fiction in the codework style (in this case, using JavaScript syntax). For example: // Feeling. if (ashamed++ == losing self-esteem.S_ wasn't on diet) [re]solution = would stop eating lunch next time; // Result. after all = S_ couldn't resist to eat when see[sniff]ing food ("ate();", felt defeated & self-disgusted x 1000); } A variety of examples of codework can be found in the Electronic Literature Collections published by the Electronic Literature Organization, such as Alan Sondheim's online performance Internet Text (1994-), Giselle Beiguelman's Code Movie 1 (2004), Dan Shiovitz's interactive fiction Bad Machine (1999) (Volume 1), Mez Breeze's "netwurk repository" of "_mezangelles_," _cross.ova.ing ][4rm.blog.2.log][_ (2003-), Bjørn Magnhildøen's live writing performance/text movie, PlainTextPerformance (2010), Ted Warnell's new media network (1994-), and Nick Montfort's Perl poetry generator ppg256-1 (2008) (Volume 2). References External links Electronic Literature Collection Writing systems Internet art Genres of electronic literature Electronic literature
https://en.wikipedia.org/wiki/Terrorist%20Screening%20Database
The Terrorist Screening Database (TSDB) is the central terrorist watchlist consolidated by the Federal Bureau of Investigation's Terrorist Screening Center and used by multiple agencies to compile their specific watchlists and for screening. The list was created after the September 11 attacks. History, sources, uses, and scope The TSDB is overseen by the FBI Terrorist Screening Center. It was created after the September 11 attacks. A 2007 report by the U.S. Department of Justice Office of the Inspector General stated that the TSDB, as the "U.S. Government's consolidated terrorist watchlist" contained "basic biographical information on known or appropriately suspected domestic and international terrorists" and that "the underlying derogatory information on individuals nominated for inclusion in the TSDB must demonstrate a reasonable suspicion of ties to terrorism." The main source of names for the TSDB is the Terrorist Identities Datamart Environment (TIDE), a database that as of 2013, contained between 700,000 and 1.1 million names. The TSDB is massive in size and includes names of people identified as potential security risks. It is distinct from the much smaller No Fly List, a subset of the TSDB. Those on the TSDB are not actively monitored because doing so would be impracticable and would raise civil liberties issues. Those on the TSDB are not blocked from buying guns and are not automatically barred from boarding airplanes or traveling. In 2019, the government acknowledged that it shared its list with 1,441 non-governmental entities that were "in some way connected to the criminal justice system" such as campus police, hospital security staff, and private detention facilities; the admission alarmed some civil libertarian groups. The purpose of the TSDB is to promote information-gathering and information sharing different agencies, and to flag individuals of interest for closer scrutiny when interacting with investigators or others, such as border agents or state police. TSDB data is categorized as sensitive but unclassified. The TSDB supports various other screening systems, such as the Transportation Security Administration's No Fly, Selectee, and Expanded Selectee Lists for airport security screening (lists which are much smaller subsets of the TSDB); the State Department's Consular Lookout and Support System (CLASS), used by consular officers for screening passport and visa applicants; U.S. Customs and Border Protection's TECS system, used for screening at border checkpoints; the FBI's "Known or Appropriately Suspected Terrorist File" (which is used by domestic law enforcement and is one of 21 files used by the FBI National Crime Information Center); the Defense Department (for screening of visitors to military bases). In 2021, a person familiar with the database told the Washington Post that the database has "silent hit" capability, so that if a person on the list is stopped by police (for example, for speeding), the event will be logg
https://en.wikipedia.org/wiki/TSDB
TSDB may refer to: Terrorist Screening Database Time series database
https://en.wikipedia.org/wiki/SA%20Power%20Networks
SA Power Networks is the principle electricity distributor in the state of South Australia, delivering electricity from high voltage transmission network connection points operated by ElectraNet. It is the successor to the Electricity Trust of South Australia. Ownership SA Power Networks arose from the split up of the generation, transmission, distribution and retail responsibilities of the former SA Government-owned Electricity Trust of South Australia and its subsequent privatisation in 1999. The distribution business is owned by the Hong Kong-based Cheung Kong Infrastructure Holdings (51%), and Spark Infrastructure (49%). SA Power Networks is structured as a partnership of CKI Utilities Development Limited, PAI Utilities Development Limited, each incorporated in the Bahamas; and Spark Infrastructure SA (No. 1) Pty Ltd, Spark Infrastructure SA (No. 2) Pty Ltd, and Spark Infrastructure SA (No. 3) Pty Ltd, each incorporated in Australia. Regulated electricity distribution SA Power Networks operates its electricity distribution business under a licence granted by the Government of South Australia. The business is subject to regulation by the Australian Energy Regulator and Essential Services Commission of South Australia. Regulation of the business primarily relates to establishing service standards and setting the revenue required to meet those standards cost efficiently. SA Power Networks is the fifth largest electricity distributor in the Australian National Electricity Market (NEM). It has consistently ranked as the most efficient distributor on a State-wide basis in the NEM. Other business activities SA Power Networks also competes in the un-regulated energy market through its wholly owned business Enerven, which provides infrastructure construction and maintenance services to industry and government. SA Power Networks has employed former politician Nick Bolkus as their lobbyist in South Australia. See also Australian Energy Market Operator Electricity Trust of South Australia National Electricity Market Spark Infrastructure References External links SA Power Networks website Spark Infrastructure website SA Power Networks inverters promise flexible solar exports, 7 Oct 2020 Companies based in Adelaide Electric power distribution network operators in Australia
https://en.wikipedia.org/wiki/Close%20Combat%3A%20A%20Bridge%20Too%20Far
Close Combat: A Bridge Too Far, or Close Combat II, is a World War II real-time computer wargame, developed by Atomic Games, and released on October 13, 1997. The second installment of the Close Combat series, the game is played on a two-dimensional map, between two players. Close Combat is based on Operation Market Garden; most units in the game are based on those used in 1944, with the exception of a few which are only available in custom games. The game may be played as either the Germans, or the Allies, the latter divided into the British, Americans, and Polish. The game received mainly positive reviews. On February 6, 2018, the game was re-released on GOG.com. Gameplay Combat takes place on a two-dimensional map with three-dimensional terrain elements. Depending on the map, terrain features can include a variety of features providing concealment and cover, such as hills, hedges, foxholes, trenches, streams and buildings. Units have limited fields of vision (particularly vehicles), suffer from fatigue, have limited ammunition, can be suppressed, will break and flee if their morale drops too low, and generally behave in a manner similar to real life (although there are options to make units always visible, always obey orders, and/or fearless). The units used in the game vary, but are nonetheless divided into two categories: infantry, and support. The infantry category contains most infantry units, such as rifle infantry, scouts, snipers, MG42 machine gunners (for the German side), antitank infantry (for the Allied side), heavy assault teams, and reserves. More specialized infantry teams such as flamethrower engineers, mortar teams and machine gun teams are placed in the support category, as are vehicles (including halftracks, armored cars, tanks, tank destroyers and assault guns) and fixed guns. Gameplay modes The player can choose to play a single battle, or a longer operation or campaign made up of multiple battles. Battle The "battle" depicts a single one-day engagement, such as the taking of the Arnhem rail bridge (Battle of Arnhem). Battles are played in a single seating, and usually last several minutes. Units are assigned to each player at the start of the battle, and cannot be changed. The objective of each battle is usually for the Allies to take victory locations dotted around the map, and the Germans to hold those locations (although this can vary with the map). Sometimes, the Allies may have to secure a bridge (by forcing the Germans off the map) before the Germans can destroy it. Declaring a ceasefire or retreating from the battle immediately ends it. Operation Operations are made up of a series of battles (up to five), and depict an operation spanning several days in a specific locale (such as the offensive at the Arnhem Bridge). The overall objective of each side is to control the maps in the operation, with each map having a certain point value: If the player fails to win the entire map, they still receives points based
https://en.wikipedia.org/wiki/Kapamilya%20Channel
Kapamilya Channel is a 24-hour Philippine pay television network operated by ABS-CBN Corporation, a company under Lopez Holdings Corporation. The network is headquartered at ABS-CBN Broadcasting Center in Quezon City. A separate high definition 1080i resolution channel began broadcasting the same day. The network serves as the replacement of the main terrestrial ABS-CBN network after ceasing its free-to-air broadcast operations due to the loss of its legislative broadcast franchise in 2020. It carries most of the programs that ABS-CBN aired prior to the shutdown. Overview The channel is available through most cable providers who are members of the Philippine Cable and Telecommunications Association (PCTA) (including ABS-CBN's Sky Cable) and through direct broadcast satellite television service providers Sky Direct (until June 30, 2020), G Sat, and since October 21, 2020, through Cignal and SatLite. This allowed ABS-CBN Corporation to continue producing and distributing content while the outcome of their congressional franchise application was still pending at that time since the NTC's cease and desist order for the network only covers the company's free-to-air television and radio stations. The network's franchise renewal was rejected by the House of Representatives on July 10, 2020, after a 70-11 vote. The network also streams live and makes most of its shows available on the streaming service iWant (now iWantTFC). On August 1, 2020, the network officially launched the Kapamilya Online Live, which live streams some of the content from Kapamilya Channel and Jeepney TV on the online video-sharing platforms Facebook and YouTube. Although the network itself is available only in the Philippines, most of its local programs are available on ABS-CBN's international subscription service The Filipino Channel via cable, satellite, online and IPTV. Like the terrestrial ABS-CBN network, Kapamilya Channel operates 24/7 with Movie Central Presents shown during the overnight slots except during the overnight hours of the Paschal Triduum courtesy of the Holy Week in the Philippines wherein it signs off at Maundy Thursday and Black Saturday from midnight to 6:00 a.m. The channel, along with TeleRadyo Serbisyo, broadcasts the daily Three O'Clock Prayer () similar to the main terrestrial ABS-CBN. Programming Kapamilya Channel features shows that have aired or were slated to air on ABS-CBN whose productions were suspended due to the Luzon enhanced community quarantine in March 2020 as well as the ensuing uncertainty following the NTC's cease and desist order. These include the variety shows It's Showtime (with new segments) and ASAP Natin 'To; FPJ's Ang Probinsyano, Love Thy Woman, and A Soldier's Heart; and morning talk show Magandang Buhay. Two new public service programs, Paano Kita Mapasasalamatan? hosted by Judy Ann Santos, and Iba 'Yan hosted by Angel Locsin, made their debut on Kapamilya Channel. Contrary to earlier news reports, ABS-CBN's primary new
https://en.wikipedia.org/wiki/List%20of%20longest-running%20Australian%20television%20series
Below is a list of all the longest-running Australian television programs, both past and present, that have been broadcast for a minimum of 6–10 years or 6 seasons (or both). All data is updated as of 2 February 2022. Note: Programs with a shaded background indicate the program is still in production. 40–69 years 30–39 years 25–29 years 20–24 years 15–19 years 10–14 years 6–9 years See also List of Australian television series List of longest-running United States television series List of longest-running Philippine television series List of longest-running Indian television series List of longest-running Spanish television series References External links Lists of Australian television series Television Australian
https://en.wikipedia.org/wiki/VH1%20%28Latin%20American%20TV%20channel%29
VH1 Latin America was a music channel from ViacomCBS-owned ViacomCBS Networks Americas. The network was launched on April 1, 2004 exclusively on Cablevisión D.F. in Mexico, and in the rest of the region some months later. The channel targeted audience from 19 to 44 years old and played local and international music videos from the 1970s to the 2000s. It also aired famous countdowns from VH1 United States. It reached most of the satellite and cable systems in Latin America. VH1 Soul, another channel of MTV Networks and sister channel of VH1 was also available in the region. History The channel was launched on April 1, 2004 only on Cablevisión in Mexico. Eventually, it started reaching other countries, and as of 2006 it was available in most of the countries of Latin America. On April 27, 2009 the channel launched a new image, with new idents, bumpers and new colors for the logo. The new identity was called "look & feel" and represents the beginnings of color television. On April 29, 2013 the channel began to use the current logos and idents used by its parent channel. On October 7, 2020 the channel closed down and was replaced by VH1 Europe. Shows on VH1 Latin America Last programming (2015-2020) Old Is Cool (formerly VH1 Clásico) Video Hits One Videografía Best Of Former programming (2004-2015) Antes Y Después 80/90 Neo... Música Nueva 10 Clips 10 Top 20 VH1 VH1 Solar Música + Música - I Love La Crème Rock N' Roll High School Gene Simmons' Rock School The Fabulous Life of... (Sometimes called La Fabulosa Vida de...) Planet Rock Profiles Movies That Rock Exposed Comedy Central Present Stand Up VH1 First Look Man Caves 3 Famous Crime Scenes That Metal Show Cyndi Lauper: Still So Unusual Video Killed The Radio Star VH1 Storytellers Sziget Festival MTV Unplugged Reality shows Flavor of Love I Love New York I Love Money Hogan Knows Best The Surreal Life Rock of Love The Graham Norton Effect The Graham Norton Show RuPaul's Drag Race (season 2) Controversy On January 29, 2007, VTR added the network in a channel slot timeshared with GolTV. This caused anger among its subscribers, which only grew when VTR added FX to the same channel slot on May, making VH1 available only after midnight. In August, the channel was pulled off with no notification given. Despite this, VH1 was added back in early-2009 on its own channel slot. The channel was withdrawn in mid-April 2020. See also VH1 VH1 Brasil MTV Networks Latin America References Defunct television channels Music organizations based in Mexico Television channels and stations established in 2004 Spanish-language television stations VH1 Television channels and stations disestablished in 2020
https://en.wikipedia.org/wiki/Shelby%20Young
Shelby Young (born April 8, 1992) is an American actress. She is known for her roles on American Horror Story, Days of Our Lives, The Social Network and the Star Wars franchise, as well as her presence on social media. Early life Young was born in Florida and always wanted to be an actor. As a child, she loved performing for her friends and family, and performed in pageantry, theater and commercials while living there. As she has grown, her career focus has shifted to voice over and motion capture acting for animation and video. Career Young's first television role was in 2001 when she played the role of Sue Ann Butler on the Showtime series Going to California. In 2002, Young played Stephanie in the unaired pilot for LazyTown. From 2005 to 2008, she had a recurring role as Jennifer on Everybody Hates Chris, and from 2009 to 2011, she recurred on Days of Our Lives as Kinsey. Young has also had guest starring roles on the MTV series Awkward (2011), Ghost Whisperer (2006), and Freddie (2006). She then co-starred in the Universal Studios film Wild Child (2008). In 2010, Young played the role of KC in the film The Social Network. In 2011, she had a recurring role as Leah on American Horror Story: Murder House, the first season in the anthology series. In addition, Young played the role of Rose in The Midnight Game, which was released in 2013 by Anchor Bay Entertainment. Young starred in the found-footage horror film Nightlight; the film was released in a limited release and through video on demand on March 27, 2015. That same year, she appeared in the film The House Sitter opposite Kate Ashfield. She also starred in the horror-thriller film A Haunting in Cawdor, which was released in the United Kingdom on October 9, 2015, and in the United States in March 2016. As a voice actress, Young is known in the Star Wars galaxy for voicing multiple characters across their animation titles and video games. Her most notable role may be voicing Princess Leia Organa in projects like Lego Star Wars: The Skywalker Saga, the Disney Channel series Star Wars Forces of Destiny and the Disney Plus TV special, Lego Star Wars: Summer Vacation. Young is also known by video game fans for her work as Soph Blazkowicz, whom she brought to life through both voice and movement via MoCap, in Wolfenstein: Youngblood as one of the first-ever playable female characters in the long-standing franchise. Young's resume includes other AAA franchises such as Call of Duty, Battlefield, Final Fantasy and Dead Rising 3, where she voiced and provided MoCap for the lead role of Annie. Young currently recurs as Rayna on Nickelodeon's, Baby Shark's Big Show!, as Captain Bragg and others on the Disney Plus series Star Wars The Bad Batch. Shelby can also be heard in recent hit releases God of War: Ragnarök as Skuld and Horizon Call of the Mountain as Hami. Young has been doing voice impressions on TikTok, YouTube and other social media platforms and has amassed a following of over 4 milli
https://en.wikipedia.org/wiki/GPRename
GPRename is a computer program for renaming multiple files and directories at one time. GPRename is written in Perl, and runs on any Unix-like operating system. Features Rename both files and directories Case change: to UPPERCASE, to lowercase or Only The First Letter Insert or delete text at a position Replace text with the option of case sensitive Search text with the option of regular expression Rename with numbers (001.jpg, 002.jpg, 003.jpg...) Automatically trim double spaces to one space, also trim leading and/or trailing spaces around the name Multilingual : Brazilian Portuguese, English, French, Polish, Spanish History At the start of 2007, GPRename has been ported from the deprecated GTK-Perl to the new GTK2-Perl and in mid-2007 the new 2.4 release is now GPL-3. Reception Jack Wallen writing in ghacks.net in August 2010 said: References External links Free file managers Free software programmed in Perl
https://en.wikipedia.org/wiki/Lawyer%20referral%20service
A lawyer referral service maintains a network of lawyers, and connects people in need of lawyers with its participating attorneys. A potential client who contacts a lawyer referral service is directed to a lawyer who practices in the area of law that is most appropriate for their situation. Some lawyer referral services charge a fee for providing a referral, while others provide referrals at no cost to the prospective client. Many referral services connect prospective clients with lawyers who have agreed to provide a low-cost or free initial consultation. Referral services are often provided by state and local bar associations as a public service. Referral services may also be offered by non-profit organizations and advocacy groups. For-profit referral services may connect lawyers with clients who pay a membership fee, or a fee for successfully referred clients, subject to rules against sharing fees with non-lawyers. Process Historically, lawyer referral services involved prospective clients contacting a bar association or responding to an advertisement, by placing a telephone call to the service and seeking a referral. With the internet boom in the 1990s, many consumers turned to the web to search for goods and services. A research study released in 2012, shows that 76 percent of adult consumers looking for a lawyer used online resources at some point during the search process. Some referral services provide referrals to lawyers in a broad range of areas of legal practice. Others may focus on referrals within a narrow range of practice areas, or a single practice area. Online lawyer referral services are sometimes called attorney-client matching services. People who contact a service may be matched with one or more attorneys, based upon such factors as area of legal practice and geographic location. Lawyers who participate in these services may pay a fee for participation, a fee for each referral, or in some cases a percentage of the amount charged to a referred client. In some cases the prospective client will be able to choose from a list of referred attorneys, while in other cases the referral will be made to a specific participating lawyer. If a client is unable to afford a lawyer and the legal problem is not a matter that can be handled by a lawyer on a percentage fee basis, some referral services may attempt to match the client with a pro bono lawyer, or direct the client to contact a legal aid organization or law student clinic for help. Ethics Ethical issues may arise for lawyers who participate in for-profit referral services, and state rules governing participation can vary significantly. Some referral services are certified by bar associations, including the American Bar Association. Certified referral services must maintain standards of service as defined by the certifying organization. Among those standards, certification may require that participating lawyers meet minimum standards of experience, or maintain legal malprac
https://en.wikipedia.org/wiki/Jobless%20claims
Initial jobless claims are a data point issued by the U.S. Department of Labor as part of its weekly Unemployment Insurance Weekly Claims Report. Initial jobless claims refer to claims for unemployment benefits filed by unemployed individuals with state unemployment agencies. Initial claims should not be confused with the number of people who actually receive unemployment benefits. For one, initial claims don't include continued claims—individuals who claim benefits for additional weeks of unemployment beyond their initial claim. Additionally, not all claimants will actually receive unemployment benefits. The report is released weekly at 08:30 Eastern Time on Thursdays. The data in the report is collected from state unemployment agencies who report the information to the Department of Labor's Office of Unemployment Insurance. Market impact The weekly release of the report can be a market moving event. The employment situation is extremely important for a macroeconomic analysis, so the financial markets track employment indicators, although this is a low impact indicator compared with the monthly BLS's "Employment Report". This report tracks how many new people have filed for unemployment benefits in the previous week. It is a good gauge of the U.S. job market. For instance, when more people file for unemployment benefits, fewer people have jobs, and vice versa. Investors can use this report to gather pertinent information about the economy, but it's a very volatile data, so the four-week average of jobless claims is monitored. Initial jobless claims measure emerging unemployment, and it is released after one week, but continued claims data measure the number of persons claiming unemployment benefits, and it is released one week later than the initial claims, that's the reason initial have a higher impact in the financial markets. Comparison to other indicators The jobless claims report is generally monitored closely as one of the few weekly labor market indicators produced by the government. The closely watched Employment Situation Summary from the Bureau of Labor Statistics, colloquially referred to as the "jobs report", is only produced monthly. Jobless claims are also one of the few near-realtime indicators produced by the government. Each week's report includes data for the week ending on the preceding Saturday of the report's release, providing a measure of labor market activity less than a week after it occurs. By comparison, the monthly Employment Situation Summary's survey reference period is the week or the pay period including the 12th day of the month, which means the time from data collection to release can extend for weeks. Unlike many labor market indicators reported by the Bureau of Labor Statistics, jobless claims are not collected by survey but are instead reported by state unemployment agencies and thus represent a direct measurement of actual labor market activity. References External links weekly report at Departme
https://en.wikipedia.org/wiki/Patellar%20network
The patellar network (circulatory anastomosis around the knee-joint, patellar anastomosis, genicular anastomosis, articular vascular network of knee or rete articulare genus) is an intricate network of blood vessels around and above the patella, and on the contiguous ends of the femur and tibia, forming a superficial and a deep plexus. The superficial plexus is situated between the fascia and skin around about the patella, and forms three well-defined arches: one, above the upper border of the patella, in the loose connective tissue over the quadriceps femoris; the other two, below the level of the patella, are situated in the fat behind the patellar ligament. The deep plexus, which forms a close net-work of vessels, lies on the lower end of the femur and upper end of the tibia around their articular surfaces, and sends numerous offsets into the interior of the joint. The genicular arteries which form this plexus are the medial inferior and medial superior genicular arteries, the lateral inferior and lateral superior genicular arteries, the descending genicular artery, the descending branch of lateral femoral circumflex artery, and the anterior tibial recurrent artery. Clinical relevance The genicular anastomosis provides collateral circulation to supply the leg when the knee is fully flexed. When the knee suffers a popliteal aneurysm, if the femoral artery has to be ligated surgically, blood can still reach the popliteal artery distal to the ligation via the genicular anastomosis. However, if flow in the femoral artery of a normal leg is suddenly disrupted, blood flow distally is rarely sufficient. The reason for this is the fact that the genicular anastomosis is only present in a minority of individuals and is always undeveloped when disease in the femoral artery is absent. Illustrations of the genicular anastomosis in textbooks all appear to have been derived from the idealized image, shown in the sidebox, produced first by Gray's Anatomy in 1910. Neither the 1910 illustration, nor any subsequent version, was made of an anatomical dissection but rather from the writings of John Hunter (surgeon) and Astley Cooper which described the genicular anastomosis many years after ligation of the femoral artery for popliteal aneurysm. The genicular anastomosis has not been demonstrated even with modern imaging techniques such as X-ray computed tomography or angiography. References External links Definition of Genicular Anastomosis at medilexicon.com Knee
https://en.wikipedia.org/wiki/Abstract%20model%20checking
In computer science and in mathematics, abstraction model checking is for systems where an actual representation is too complex in developing the model alone. So, the design undergoes a kind of translation to scaled down "abstract" version. The set of variables are partitioned into visible and invisible depending on their change of values. The real state space is summarized into a smaller set of the visible ones. Galois connected The real and the abstract state spaces are Galois connected. This means that if we take an element from the abstract space, concretize it and abstract the concretized version, the result will be equal to the original. On the other hand, if you pick an element from the real space, abstract it and concretize the abstract version, the final result will be a super set of the original. That is, ((abstract)) = abstract ((real)) real See also References Model checking
https://en.wikipedia.org/wiki/ZTV%20Norway
ZTV Norway was a Norwegian entertainment television channel. Its programming consisted of music videos, movies and sitcoms. The channel was launched in Norway for the first time in 1995. It was unsuccessful, however, and it closed down in 1996. In 2002, ZTV returned to Norway, replacing the Viasat Plus channel. The second time around it quickly established itself as popular with younger viewers, this time with a greater emphasis on music and especially Norwegian artists. On September 8, 2007 the channel had its last broadcast, and was replaced by Viasat 4. References External links Official website - 2005 Archive.org version Modern Times Group Defunct television channels in Norway Television channels and stations established in 1995 Television channels and stations established in 2002 Television channels and stations disestablished in 1996 Television channels and stations disestablished in 2007 1995 establishments in Norway 2002 establishments in Norway 1996 disestablishments in Norway 2007 disestablishments in Norway
https://en.wikipedia.org/wiki/Government%20Secure%20Intranet
Government Secure Intranet (GSi) was a United Kingdom government wide area network, whose main purpose was to enable connected organisations to communicate electronically and securely at low protective marking levels. It was known for the '.gsi.gov.uk' family of domains for government email. Migration away from these domains began in 2019 and will be completed in 2023. History Use Many UK government organisations used the GSi to transfer files on a peer-to-peer (P2P) basis between similarly accredited networks. The network itself was open within the context of its accreditation – it imposed no restrictions on traffic types carried across the network, restrictions and policy control were left to the connecting departments. Email traffic in and out of the network was filtered by an external provider. Origin The concept of GSi was defined by the Cabinet Office, and was turned into practical reality by the Internet Special Products group of Cable & Wireless (then known as Mercury Communications) at their Brentford premises. GSi development started late 1996, and can be roughly dated by checking the registration date of its first domain name, 'gsi.net', registered 30 May 1997. The formal go-live date was several months later (according to the Central Computer and Telecommunications Agency (CCTA) this was February 1998). The main drivers behind the development of GSi was the plethora of inter-agency connections in UK government which made managing security and connectivity budgets problematic. GSi not only provided better oversight, it also normalised connectivity. GSi was designed as an accredited, dual link connected Internet Protocol backbone, it imposed no restrictions on what type of traffic it carried; any restrictions were considered a policy decision for each connecting department. The design of GSi partly supported the then developing eGIF interoperability standards. This was a direct consequence of the two key technical people driving the project, one from Cable & Wireless, one from the UK government in the form of the CCTA. GSi used SMTP as mail transport protocol, and the conversion from the then prevalent X.400 email facilities to SMTP proved for many departments an improvement in reliability and speed. In the case of X.400, this conversion also cut email costs substantially as X.400 message conversions were still chargeable even if the conversion failed due to message size. In some cases, the ROI of such an email conversion was as short as two months. The creation of GSi handed Cable & Wireless a monopoly on UK government data connectivity. GSi can be considered one of the more successful UK government IT projects from the point of view of take up - even when still in pilot phase, demand increased to a point where service windows had to be imposed to continue building the platform to full strength. The development of GSi was also the root of the creation of the CESG Listed Adviser Scheme (CLAS). During the build of GSi, th
https://en.wikipedia.org/wiki/Six-bit%20character%20code
A six-bit character code is a character encoding designed for use on computers with word lengths a multiple of 6. Six bits can only encode 64 distinct characters, so these codes generally include only the upper-case letters, the numerals, some punctuation characters, and sometimes control characters. The 7-track magnetic tape format was developed to store data in such codes, along with an additional parity bit. Types of six-bit codes An early six-bit binary code was used for Braille, the reading system for the blind that was developed in the 1820s. The earliest computers dealt with numeric data only, and made no provision for character data. Six-bit BCD, with several variants, was used by IBM on early computers such as the IBM 702 in 1953 and the IBM 704 in 1954. Six-bit encodings were replaced by the 8-bit EBCDIC code starting in 1964, when System/360 standardized on 8-bit bytes. There are some variants of this type of code (see below). Six-bit character codes generally succeeded the five-bit Baudot code and preceded seven-bit ASCII. Six-bit codes could encode more than 64 characters by the use of Shift Out and Shift In characters, essentially incorporating two distinct 62-character sets and switching between them. For example, the popular IBM 2741 communications terminal supported a variety of character sets of up to 88 printing characters plus control characters. BCD six-bit code Six-bit BCD code was the adaptation of the punched card code to binary code. IBM applied the terms binary-coded decimal and BCD to the variations of BCD alphamerics used in most early IBM computers, including the IBM 1620, IBM 1400 series, and non-decimal architecture members of the IBM 700/7000 series. COBOL databases six-bit code A six-bit code was also used in COBOL databases, where end-of-record information was stored separately. Magnetic stripe card six-bit code A six-bit code, with added odd parity bit, is used on Track 1 of magnetic stripe cards, as specified in ISO/IEC 7811-2. DEC SIXBIT code A popular six-bit code was DEC SIXBIT. This is simply the ASCII character codes from 32 to 95 coded as 0 to 63 by subtracting 32 (i.e., columns 2, 3, 4, and 5 of the ASCII table (16 characters to a column), shifted to columns 0 through 3, by subtracting 2 from the high bits); it includes the space, punctuation characters, numbers, and capital letters, but no control characters. Since it included no control characters, not even end-of-line, it was not used for general text processing. However, six-character names such as filenames and assembler symbols could be stored in a single 36-bit word of PDP-10, and three characters fit in each word of the PDP-1 and two characters fit in each word of the PDP-8. See table below. Another, less common, variant is obtained by just stripping the high bit of an ASCII code in 32 - 95 range (codes 32 - 63 remain at their positions, higher values have 64 subtracted from them). Such variant was sometimes used on DEC's PDP-8 (1965).
https://en.wikipedia.org/wiki/Z%20curve
The Z curve (or Z-curve) method is a bioinformatics algorithm for genome analysis. The Z-curve is a three-dimensional curve that constitutes a unique representation of a DNA sequence, i.e., for the Z-curve and the given DNA sequence each can be uniquely reconstructed from the other. The resulting curve has a zigzag shape, hence the name Z-curve. Background The Z Curve method was first created in 1994 as a way to visually map a DNA or RNA sequence. Different properties of the Z curve, such as its symmetry and periodicity can give unique information on the DNA sequence. The Z curve is generated from a series of nodes, P0, P1,...PN, with the coordinates xn, yn, and zn (n=0,1,2...N, with N being the length of the DNA sequence). The Z curve is created by connecting each of the nodes sequentially. Applications Information on the distribution of nucleotides in a DNA sequence can be determined from the Z curve. The four nucleotides are combined into six different categories. The nucleotides are placed into each category by some defining characteristic and each category is designated a letter. The x, y, and z components of the Z curve display the distribution of each of these categories of bases for the DNA sequence being studied. The x-component represents the distribution of purines and pyrimidine bases (R/Y). The y-component shows the distribution of amino and keto bases (M/K) and the z-component shows the distribution of strong-H bond and weak-H bond bases (S/W) in the DNA sequence. The Z-curve method has been used in many different areas of genome research, such as replication origin identification,, ab initio gene prediction, isochore identification, genomic island identification and comparative genomics. Analysis of the Z curve has also been shown to be able to predict if a gene contains introns, Research Experiments have shown that the Z curve can be used to identify the replication origin in various organisms. One study analyzed the Z curve for multiple species of Archaea and found that the oriC is located at a sharp peak on the curve followed by a broad base. This region was rich in AT bases and had multiple repeats, which is expected for replication origin sites. This and other similar studies were used to generate a program that could predict the origins of replication using the Z curve. The Z curve has also been experimentally used to determine phylogenetic relationships. In one study, a novel coronavirus in China was analyzed using sequence analysis and the Z curve method to determine its phylogenetic relationship to other coronaviruses. It was determined that similarities and differences in related species can quickly by determined by visually examining their Z curves. An algorithm was created to identify the geometric center and other trends in the Z curve of 24 species of coronaviruses. The data was used to create a phylogenetic tree. The results matched the tree that was generated using sequence analysis. The Z curve method
https://en.wikipedia.org/wiki/AppNeta
AppNeta is a computer software company headquartered in Boston, Massachusetts, with research and development based in Vancouver, British Columbia. History The company was co-founded in July 2000 by Irfhan Rajani as Jaalam Research and then later renamed to Jaalam Technologies. Its first product was called Appare.Net. In December 2002, Glenn Wong became chief executive, and in August 2003 the company was renamed again to Apparent Networks, to reflect its product. In January 2004 Wong resigned and Rajani resumed his role as chief. It is privately held, with venture capital investors, including SolarWinds, Bain Capital Ventures, JMI Equity, Egan-Managed Capital and Business Development Bank of Canada. In 2008, its headquarters moved from Vancouver to Boston. Apparent Networks changed their name to AppNeta in 2011. Customers and partners include Artisan Infrastructure and Bandwidth Management Group. In July 2014, Matt Stevens, co-founder of AppNeta, replaced Jim Melvin as the company's CEO. In 2019, AppNeta was named one of Inc. magazine's Best Workplaces for 2019 for fulfilling and willing to go beyond 'just work' to support their employees and their families, making their "work to live" mantra a reality. On December 07, 2021, AppNeta announced its pending acquisition by Broadcom. Technology AppNeta provides software as a service cloud tools that is intended for enterprises, managed service providers and other technology vendors. Enterprises can use the software to manage application and network performance across different branch offices. This technology has also been deployed by managed service providers (MSPs) to monitor their customers’ network performance and generate service revenue. The company also provides services designed for IT professionals to monitor and analyze network traffic, as well as pinpoint the causes of performance issues in applications including VoIP, Video conferencing, virtualization, and other cloud-based services. In September 2012, the company released a performance management tool called TraceView, after acquiring Tracelytics. According to AppNeta, this service provides Web application performance management across different application layers and environments. Awards “Best Use of Cloud Delivery” by the Enterprise Management Associates (EMA) Radar™ Report for Application-Aware Network Performance Management (ANPM) Q3 2010. "Strong Value" by the Enterprise Management Associates (EMA) Radar™ Report for Application-Aware Network Performance Management (ANPM) Q3 2010. "Tech Innovator" by the Xchange Technology Innovator Awards in the managed services category "Customer Enhancement Value of the Year 2010" by Frost & Sullivan "2010 Excellence Award" by Unified Communications References External links AppNeta's website Companies based in Boston Software companies based in Massachusetts Software companies of the United States
https://en.wikipedia.org/wiki/Lost%20Tales
Lost Tales may refer to: The Book of Lost Tales, a collection of stories by J.R.R. Tolkien Atlantis: The Lost Tales, a computer game developed by Cryo Interactive Babylon 5: The Lost Tales, a direct-to-DVD anthology show set in the Babylon 5 universe "Lost Tales" (EP), an EP by black metal band Summoning
https://en.wikipedia.org/wiki/MTV%20Japan
MTV Japan (Music Television Japan) is the Japanese version of the cable television network based in Japan. It is a subsidiary of Paramount Networks Japan K.K., and was launched on November 15, 1993. It can be viewed on cable television, SKY PerfecTV!, SKY PerfecTV! e2 and IPTV. History MTV originally was a music block on Asahi Broadcasting Corporation from 1984 to 1988. Then it became a block on Tokyo Broadcasting System from 1989 to 1992. In 1992, Music Channel, Inc. acquired a license from Viacom to broadcast with the MTV name. Broadcast began on CS Analog and Skyport services, with PerfecTV! accessed added in 1996 and DirecTV access added in 1997. Notable VJs from that time include Marc Panther and Ken Lloyd. In 1998, Music Channel canceled their license with Viacom because of the high license fee required. Consequently, from 1999 the station changed its name to Vibe and shifted its content focus from Western music to domestic music products. Without the MTV brand name behind it, competition from other channels such as Space Shower TV and Sony Music Japan's Viewsic (now Music On! TV) led to the station being acquired by H&Q Asia Pacific in 2000. Also in 2000, MTV Broadcasting Japan, Inc., a separate company formed by groups like CSK and Sega, acquired a broadcast license from SKY PerfecTV!. However, the company never broadcast under the MTV name; it changed its name to M-BROS and broadcast under that name on both DirecTV and SKY PerfecTV! until April 30, 2002. Following this attempt to use the MTV name (and perhaps because of it), Viacom once again formed a contract with Music Channel, and created a revival of MTV Japan on January 1, 2001, this time under the umbrella of MTV Networks and with the support of MTV capital. Music Channel, Inc. also changed its company name to MTV Japan, Inc. at this time. The first video played on MTV Japan was bird's "Mind Travel." The Vibe name carries on in its Internet activities, which were spun off from the channel as VIBE, Inc. This company was integrated into Bandai Networks in 2005. There is a marked difference in this revival of MTV Japan when contrasted to the old MTV Japan. The older MTV Japan focused on overseas artists, whereas the current MTV Japan focuses on domestic artists. As a result, the channel has drawn criticism from proponents of the older MTV Japan. However, in March 2006 the network drew 6,000,000 viewers, making the channel second to Space Shower TV and an overall financial success. In August 2006, MTV Japan was made a complete subsidiary of MTV Networks and again made a complete subsidiary of Viacom International Media Networks on December 1, 2014. This was to consolidate its activities with other Viacom subsidiaries in Japan, such as Nickelodeon Japan and the FLUX Digital Content Service. Some of the most popular musical acts such as Ayumi Hamasaki and Tohoshinki have received several awards from this channel and performed numerous times on its awards show. Programming MTV
https://en.wikipedia.org/wiki/CANARIE
CANARIE (formerly the Canadian Network for the Advancement of Research, Industry and Education) is the not-for-profit organisation which operates the national backbone network of Canada's national research and education network (NREN). The organisation receives the majority of its funding from the Government of Canada. It supports the development of research software tools; provides cloud resources for startups and small businesses; provides access and identity management services; and supports the development of policies, infrastructure and tools for research data management. History The Canadian Network for the Advancement of Research, Industry and Education was created in 1993. It initially focused on the development of the CANARIE network, which provides interprovincial and international connectivity for Canada's National Research and Education Network (NREN). Provincial and territorial partners in the NREN provide connectivity to institutions in their jurisdictions, and connect to CANARIE to collaborate and share data and tools across Canada and around the world. The NREN connects universities, colleges, research hospitals and government research labs. CANARIE links Canada's NREN to over 100 NRENs around the world. The CANARIE network was originally called CA*net or CAnet. The original CA*net was created in 1990 with support from the National Research Council. In 1993 that CANARIE had upgraded its links to 56 kbit, to 10 Mbit/s in 1995, and then later to 20 Mbit/s. It had 100 Mbit/s aggregate capacity in 1996, and the same year the National Test Network (NTN) project introduced ATM. In 1997, Bell Advanced Communications Inc. (later Bell Nexxia, now part of Bell Canada) was given operating control over the network operations. The replacement network, CA*net II, was launched based on NTN links and capacities, with OC-3 (155 Mbit/s) at the core. At the same time, Sympatico "DSL" service started, using the same technology. In 1998, CANARIE deployed CA*net 3, the world's first national optical research and education network, with a planned capacity of 2.5Gbit/s. In 2002, the Government of Canada committed $110 million to CANARIE to build and operate CA*net 4. CA*net 4 yielded a total network capacity of 40Gbit/s, 16 times its predecessor. CA*net 4 was based on OC-192 optical circuits, with a capability of offering users optical Lightpath services, a legacy dedicated point-to-point connection between research facilities. CANARIE has funded the development of research software tools since 2007. In 2011, it took on the operations and support for the Canadian Access Federation, which provides participants with secure access to eduroam, an international federation of campus WiFi networks. The Canadian Access Federation also provides the trust framework to enable participants to access remote web-based datasets and tools in a secure and privacy-protecting environment. In 2011, it also launched the Digital Accelerator for Innovation and Researc
https://en.wikipedia.org/wiki/Development%20Assistance%20Database
The Development Assistance Database (DAD) is an aid information management system (AIMS) developed by Synergy International Systems, for tracking development aid and managing official development assistance with transparency and accountability. DAD is widely adopted AIMS which has been established in more than 35 countries worldwide in close cooperation with UNDP and respective governments. DAD provides country governments and development partners with a consolidated source of data on development projects across all donors, demonstrates "who is doing what, when and where" in managing foreign aid, enables harmonization of development projects with national priorities, facilitates management and coordination of development efforts in the country by and promotes results-driven decision-making and aid effectiveness. DAD has served as the official government AIMS in Afghanistan, Armenia, Burundi, Cameroon, Central African Republic, Comoros, Georgia, Ghana, Guatemala, India, Indonesia, Iraq (including Kurdistan Regional Government), Kazakhstan, Kenya, Maldives, Mauritania, Nigeria, Lesotho, Pakistan, Papua New Guinea, Philippines, Russia, Rwanda, Sierra Leone, Sri Lanka, Somalia (including Somaliland), Solomon Islands, Tajikistan, Thailand, Ukraine, Vietnam, Yemen and Zambia. History Originally known as the Donor Assistance Database, the DAD was rebranded as the Development Assistance Database on August 2, 2005. The first Donor Assistance Database was a PC system developed in the scope of the G7 Support Implementation Group project for Russia in 1996 to monitor aid assistance donated from the international community. The first Donor Assistance Database tracked 20,000 projects, and over US$100 billion in official development assistance delivered from 1991 to 2001. The DAD was then adapted as a tool for the newly independent states of the former Soviet Union to monitor development assistance from the international community. These first generation implementations include Armenia, Georgia, Kazakhstan, Kyrgyzstan, Turkmenistan, Ukraine, and Tajikistan. Most of these implementations have taken place through a partnership between the software company Synergy International Systems, and the United Nations Development Programme (UNDP). This partnership led to the signing of a long-term agreement in July, 2005. See also Synergy International Systems External links Synergy International Systems, Inc. References United Nations documents Business software
https://en.wikipedia.org/wiki/KTPN-LD
KTPN-LD (channel 48) is a low-power television station licensed to Tyler, Texas, United States, affiliated with MyNetworkTV. It is owned by Nexstar Media Group alongside Jacksonville-licensed NBC affiliate KETK-TV (channel 56); Nexstar also provides certain services to Longview-licensed Fox affiliate KFXK-TV (channel 51) under a shared services agreement (SSA) with White Knight Broadcasting. The stations share studios on Richmond Road (near Loop 323) in Tyler, while KTPN-LD's transmitter is located west of Texas Loop 323 northeast of the city. KTPN-LD's signal was formerly relayed on KLPN-LD (channel 47) in Longview, which provided KTPN-LD's programming to the central and eastern portions of the market; that station's transmitter was located near East Mountain, Texas. KLPN-LD's license was canceled on June 6, 2016. Due to KTPN-LD's low power status, its broadcasting radius only covers the immediate Tyler area. Therefore, in order to reach the entire market, the station is simulcast in high definition on KFXK's second digital subchannel (51.2) from a transmitter near FM 125 in rural northwestern Rusk County (northwest of New London). History KTPN-LP first signed on the air from Tyler in 1990 as K48DP; originally operating as an independent station, it later became a charter affiliate of The WB when the network launched on January 11, 1995. KLPN-LP signed on in Longview as K22EH later that year, serving as a repeater of K48DP and also carrying WB network programming. In 1997, the two stations both dropped their WB affiliations to join the United Paramount Network (UPN); channels 48 and 58 were collectively branded as "UPN 22/48". The two stations were then collectively branded as "UPN 22/48". Accordingly, channel 48 changed its callsign to KTPN-LP (standing for "Tyler Paramount Network"). In 1998, K22EH moved to UHF channel 58 and changed its callsign to K58FS in order to allow KETK-TV (channel 56) to sign on its digital signal on UHF channel 22 (both stations were accordingly rebranded as "UPN 58/48"); two years later in 2000, K58FS changed its callsign to KLPN-LP (standing for "Longview Paramount Network") to match its sister station. KTPN and KLPN received a full-power satellite when KCEB (channel 54, now an Azteca América station) signed on in July 2003, simulcasting UPN programming from the low-power outlets; the three stations collectively branded as "UPN 54/58/48". In 2005, KCEB dropped its UPN affiliation to affiliate with The WB; subsequently thereafter in January 2006, KTPN-LP and KLPN-LP lost the UPN affiliation to CBS affiliate KYTX (channel 19), which added the network as a second digital subchannel; this resulted in the two stations reverting into independent stations. On January 24, 2006, CBS Corporation (which split from Viacom in December 2005) and Time Warner's Warner Bros. Entertainment (the division that operated The WB) announced that the two companies would shut down The WB and UPN and combine the networks' respective pro
https://en.wikipedia.org/wiki/The%20Brainies
The Brainies is a puzzle game released on the Super Nintendo Entertainment System console and Atari ST, Amiga, Apple IIgs, Macintosh, and Amstrad CPC computers. Even though its European title is Tiny Skweeks, the connection to the popular Skweek series was made late. The game is also known as The Tinies on home computers. Gameplay The gameplay revolves around Mexican jumping beans (referred to in game as Brainies) as they navigate 101 levels to solve the puzzles that are in their way. A time limit is in effect; running out of time means losing a life. Players can only control the direction in which a Brainy will walk; taking care not to bump into another Brainy or an obstacle. There are four difficulty levels and the object is to return the Mexican jumping beans safely home. Items can be picked up; they may be beneficial or detrimental to the Brainy depending on certain factors. Arrows can also force a Brainy to change directions, rendering him helpless for a while and possibly messing up a carefully solved puzzle. Reception GamePro gave the Super NES version a generally positive review, criticizing that "the icons are too small", but praising the brain-stretching and addictive gameplay. The Super NES version of the video game was reviewed in one of the first 50 issues of Nintendo Power. References 1991 video games Amiga games Amstrad CPC games Atari ST games DOS games Kalisto Entertainment games Loriciel games Puzzle video games Single-player video games Super Nintendo Entertainment System games Titus Software games Video games developed in France Video games scored by Frédéric Motte
https://en.wikipedia.org/wiki/YCA
YCA may refer to: The International Air Transport Association airport code of Courtenay Airpark Yemen Cyber Army, hacker group
https://en.wikipedia.org/wiki/Treyfer
In cryptography, Treyfer is a block cipher/MAC designed in 1997 by Gideon Yuval. Aimed at smart card applications, the algorithm is extremely simple and compact; it can be implemented in just 29 bytes of 8051 machine code. Treyfer has a rather small key size and block size of 64 bits each. All operations are byte-oriented, and there is a single 8×8-bit S-box. The S-box is left undefined; the implementation can simply use whatever data is available in memory. In each round, each byte has added to it the S-box value of the sum of a key byte and the previous data byte, then it is rotated left one bit. The design attempts to compensate for the simplicity of this round transformation by using 32 rounds. Due to the simplicity of its key schedule, using the same eight key bytes in each round, Treyfer was one of the first ciphers shown to be susceptible to a slide attack. This cryptanalysis, which is independent of the number of rounds and the choice of S-box, requires 232 known plaintexts and 244 computation time. Implementation A simple implementation of Treyfer can be done as follows #include <stdint.h> #define NUMROUNDS 32 extern uint8_t const sbox[256]; void treyfer_encrypt(uint8_t * text[8], uint8_t const key[8]) { unsigned i; uint8_t t = *text[0]; for (i = 0; i < 8 * NUMROUNDS; i++) { t += key[i % 8]; t = sbox[t] + *text[(i + 1) % 8]; t = (t << 1) | (t >> 7); /* Rotate left 1 bit */ *text[(i + 1) % 8] = t } } void encrypt(uint8_t * text[8], uint8_t const key[8]) { unsigned int i = 0; unsigned int j = 0; uint8_t t = 0; t = text[0]; for (j = 0; j < NUMROUNDS; j++) { for (i = 0; i < 8; i++) { t = t + key[i]; t = sbox[t] + *text[(i + 1) % 8]; t = (t << 1) | (t >> 7); *text[(i + 1) % 8] = t; } } } void decrypt(uint8_t *text[8], uint8_t const key[8]) { int i = 0; int j = 0; uint8_t top = 0; uint8_t bottom = 0; for (j = 0; j < NUMROUNDS; j++) { for (i = 7; i >= 0; i--) { top = *text[i] + key[i]; top = sbox[top]; bottom = *text[(i + 1) % 8]; bottom = (bottom >> 1) | (bottom << 7); *text[(i + 1) % 8] = bottom - top; } } } See also Tiny Encryption Algorithm References Broken block ciphers
https://en.wikipedia.org/wiki/Strange%20haircuts%20//%20cardboard%20guitars%20//%20and%20computer%20samples
strange haircuts // cardboard guitars // and computer samples is a greatest hits album by the synthpop band Information Society. Track listing "Running" - 7:41 "Walking Away" - 3:58 "Repetition" - 4:32 "Lay All Your Love on Me" (Metal Mix) - 6:48 "What's on Your Mind (Pure Energy)" - 4:33 "Think" - 3:54 "How Long" - 4:05 "Crybaby" - 5:10 "Peace & Love, Inc." - 5:00 "Going, Going Gone" - 4:53 "Strength" - 5:10 "A Knife and a Fork/Think Tank" (The Massively Parallel Mix) - 7:06 "Running" (Victor Calderone Remix) - 4:31 "What's on Your Mind (Pure Energy 2001)" (Junior Vasquez Remix) - 3:46 References 2001 greatest hits albums Information Society (band) albums Tommy Boy Records compilation albums
https://en.wikipedia.org/wiki/Prunus%20subcordata
Prunus subcordata, known by the common names Klamath plum, Oregon plum, Pacific plum and Sierra plum, is a member of the genus Prunus, native to the western United States, especially California and Oregon. Description Prunus subcordata is an erect deciduous shrub or small tree growing to in height with a trunk diameter of up to . It sprouts from its roots and can form dense, spiny thickets. The bark is gray with horizontal brown lenticels, similar in appearance to that of the cultivated cherry tree. The leaves are long with a petiole, dark green, turning red before falling, and are faintly toothed. The flowers are white or pinkish, 2 cm across, appearing in the spring in clusters of one to seven together. The fruit is a small, plum-like drupe, variable in appearance, in length, and may be red or yellow; they mature in late summer. The plums are small and tart. Varieties P. subcordata var. kelloggii is less hairy and had larger, yellow fruits. P. subcordata var. rubicunda is a shrub with red fruits, which are relatively bitter. In addition to California and Oregon, P. subcordata var. subcordata, known as Klamath plum, is also found in Washington. Similar species Prunus americana (American or wild plum) is found in the eastern United States. Taxonomy The three main common names are related to the plum's mountain ranges and locales. Distribution and habitat The species is native to Northern California and from central to western and southern Oregon. It grows in forests, most often at low elevations near the coast, but is also found in the Sierra Nevada and Cascades. It grows at altitudes of . The range of P. subcordata surrounds the San Joaquin Valley, especially the western flank foothills of the Sierra Nevada range, but avoids the coast mountains of the southwest San Joaquin Valley. For other Pacific coastal Prunus species, P. emarginata is also found in the Pacific Northwest states; P. fremontii and P. ilicifolia are found in coastal or mountain areas of southwest California and northern Baja California. Ecology Various animals eat the fruit and thus spread the seeds. Culture The Concow tribe call the tree gos’-i (Konkow language). See also Klamath Mountains References External links United States Department of Agriculture Plants Profile for Prunus subcordata (Klamath plum) Lady Bird Johnson database, University of Texas, Klamath Plum CalPhotos photo gallery, University of California subcordata subcordata Flora of the West Coast of the United States Plants described in 1849 Natural history of the California Coast Ranges Natural history of the Central Valley (California) Natural history of the San Francisco Bay Area
https://en.wikipedia.org/wiki/2007%20Omani%20general%20election
General elections were held in Oman on 27 October 2007, for advisory Consultative Assembly of Oman. Political parties are banned in Oman, so all the candidates ran as independents. Data About 390,000 people were eligible to vote for the 632 candidates (among them 21 women) standing for 84 mandates in 61 districts. Shortly before the election one candidate died, leaving only 631 candidates. For the first time, all women and men over the age of 21 were enfranchised. Results One candidate was nominated rather than elected, as he had no opponent. Women lost two seats they won in the previous election at the capital. Generally, candidates who emphasized their professional and educational background lost, while those who mainly campaigned based on their tribal and family ties received more votes. Many candidates stated the goal for the assembly was becoming a true legislative chamber and increasing its influence. Voter turnout was 62.7%. References 2007 2007 elections in Asia Election Non-partisan elections
https://en.wikipedia.org/wiki/Veoh
Veoh () is an American video-sharing website, launched in September 2005. It was originally launched as a virtual television network application, and then became a video-sharing website in March 2006. During the mid-2000s, it was one of the largest video-sharing websites, though eventually began to be superseded by YouTube, Vimeo and Dailymotion. In February 2010, the company filed for Chapter 7 bankruptcy, until it was saved two months later by the technology company Qlipso Inc. It was later sold to blogging host FC2, Inc, who still own it as of October 2021. History Veoh was founded by web-developer Dmitry Shapiro, who had the idea of creating a video-sharing website in 2004 during his honeymoon, wanting to create a platform for anyone to be able to record and share video online. It raised around $70 million from venture capital and media investors. Time Warner, Michael Eisner's Tornante Company, Spark Capital, Shelter Capital Partners, Tom Freston's Firefly3 LLC, Jonathan Dolgen (former chairman of Viacom Entertainment Group), Intel, and Goldman Sachs were all major investors. The company launched an early version of its distribution technology in September 2005, and debuted its full beta service in March 2006. Veoh officially launched (out of beta) in February 2007. In addition to the user-generated content that Veoh broadcasts, Veoh has distributed content from major media companies via its VeohTV Beta including CBS, ABC, The WB, Viacom's MTV Networks, ESPN, FEARNet, Billboard, Ford Models, Us Weekly, TV Guide, and others. Independent creators who produced Veoh include NextNewNetworks, 60 Frames, Can We Do That?, Goodnight Burbank, and Dave and Tom. The company received media attention after Michael Eisner, a former Disney chairman, joined the board. In April 2006, he was one of the investors (along with Time Warner) in the $12.5 million second round of financing for Veoh and re-affirmed his status in August 2007 as an investor in the company's $25 million Series C financing round. In 2008, the website veoh.com attracted approximately 17 million unique visitors monthly according to a Quantcast.com study. In April 2009, following layoffs in November 2008, Veoh reduced its staff by 25 more to 45 remaining employees and reinstated Dmitry Shapiro as its CEO, replacing Steve Mitgang. Chapter 7 bankruptcy In February 2010, Shapiro, indicated on his blog that "the distraction of the legal battles, and the challenges of the broader macro-economic climate have led to our Chapter 7 bankruptcy." On April 7, 2010, it was announced that Israeli blogging host Qlipso had acquired Veoh out of bankruptcy for an undisclosed sum, who aimed to use the acquisition to add users and revenue to its blogging and content sharing service. As of September 2021, its website remains active, though its social pages remain fairly inactive. Its privacy policy has not been updated since 2008, its terms of service have not been updated since 2009. The site contain
https://en.wikipedia.org/wiki/Brian%20Naylor%20%28broadcaster%29
Brian Norman Naylor (21 January 19317 February 2009) was an Australian television broadcaster and presenter, best known for his longstanding stint as chief news presenter at Seven Network (HSV-7) from 1970 to 1978 and for Nine Network (GTV-9) from 1978 to 1998 and his sign-off line, "May your news be good news, and good-night." Early life Naylor was born on 21 January 1931. He grew up in Melbourne, initially attending Melbourne High School until the onset of World War II, when he was relocated to Camberwell High School, along with all of the students at his school. Completing his schooling in Form 5 (Year 11), his first job was as a production cadet at the Australian Paper Manufacturers. Naylor left APM when his manager started Woodweev Blinds, a blinds manufacturer, for which Naylor produced the original radio advertisement. It was from there that he was to start his career in the media. Radio broadcasting In 1956, when Woodweev Blinds needed someone to provide a voice for their radio commercials, Naylor was "co-opted" into the role – reportedly because his voice made him sound like "a nice family sort of fellow". This led to a two-year stint as the radio presenter of the company's program on radio station 3AK. Two years after starting with 3AK, Naylor joined Melbourne radio station 3DB where he worked with Ernie Sigley as a radio announcer and host of a children's talent program, Swallow's Juniors. Television broadcasting and presenting In 1958, Naylor moved to Melbourne television station HSV-7, transferring Swallow's Juniors to television where it was renamed Brian and the Juniors. Running until 1969, it provided a stepping stone for performers such as Debra Byrne, Rod Kirkham, Jane Scali, Peter Doyle, Patti Newton, Anne Watt, Vikki Broughton and Jamie Redfern. Naylor also hosted the SSB Adventure Club in the early 1960s with Madeleine Burke, and appeared as a regular on the station's daytime variety program Time For Terry in 1965. He became HSV-7's chief news presenter in 1970, replacing Geoff Raymond. Naylor switched to GTV-9 in 1978 and replaced Sir Eric Pearce as chief news presenter. He presented the Melbourne edition of National Nine News until he retired from this position on 27 November 1998. He was replaced by Peter Hitchener. Further hosting In his time at Nine, Naylor also hosted Carols by Candlelight from the Sidney Myer Music Bowl ten times. He won the 1988 Victorian Father of the Year Award. A patron of several organisations (the Variety Club in Victoria, the Dialysis and Transplant Association of Victoria and the Jack Brockhoff Reconstructive Plastic Surgery Research Unit of Royal Melbourne Hospital), Naylor also assisted with fundraising for the Macfarlane Burnet Appeal and Windana Society Drug Rehabilitation. Death Naylor's son Matthew was killed in a plane crash at Kinglake, Victoria, on 29 May 2008, aged 41. Less than a year later, on 7 February 2009, Naylor and his wife Moiree were killed as one of the Black Satu
https://en.wikipedia.org/wiki/WKQL
WKQL (103.3 FM) is a classic hits formatted radio station. The station is licensed to Brookville, Pennsylvania, where it maintains its transmitter facility, but the station's programming and administration functions originate in Punxsutawney, where it shares studio space with its affiliate stations WPXZ and WECZ. Since signing on the air for the first time in February 2000, this station had used the call letters WYTR, but had always maintained an oldies format, through ABC/SMN's Classic Hits (formerly "Oldies Radio") music format. At the time of its initial sign on, the station had very briefly used the call letters WBEU. Another set of call letters, WBKV (for Brookville), were proposed but never used. WKQL "Kool 103.3" serves Clarion, Clearfield, Elk, Forest, Indiana, Jefferson, Armstrong, and Cambria counties. The station is owned and operated by Renda Radio, Inc. The station added a local website (oldiesradioonline.com is ABC/SMN's site) http://www.kool1033fm.com/ in September 2007. History The groundwork for WKQL was laid in the mid 1990s, when Anthony F. Renda, president of Renda Broadcasting Corporation, wanted to put a new radio station on the air that would also, in part, serve his hometown of Indiana, Pennsylvania. Through a series of engineering maneuvers, Renda learned that 103.3 could go on the air with a powerful regional signal if some signal shuffling among other FM's in northwest Pennsylvania occurred. This affected stations in his hometown of Indiana, his co-owned property in neighboring Punxsutawney, and competing stations in St. Mary's, Brookville, Barnesboro, Emporium, Reynoldsville and Clearfield. It took some time for the maneuvers to occur, but all of them were complete within four years. A new tower was built on a massive hillside on the outskirts of Brookville. There were many construction delays because of poor access, no electricity was available in the area, and unable to afford the station remaining silent any longer, Kool 103.3 finally went on the air in February 2000, using a gasoline-powered generator to provide electricity to the station's transmitter. The station finally had hard-wired electricity at the transmitter site less than six months later. WKQL, though licensed to Brookville, converted former newsroom studio space for its sister stations in Punxsutawney to that of a permanent live on-air studio. WKQL today WKQL continues as KOOL 103.3, playing classic hits, and is also the radio home of Brookville Raiders football and basketball play-by-play broadcasts. WKQL is also an affiliate of the Pittsburgh Penguins hockey network. Weekdays, the station airs newscasts featuring Shelby White. Programming Some of Kool 103.3's programming includes: Larry King (no relation to Larry King formerly of CNN), Maria Danza, Dwayne Dancer, Steve Gunn and Smokin' Kevan Browning. External links KQL Classic hits radio stations in the United States Radio stations established in 2000 Renda Broadcasting radio stati
https://en.wikipedia.org/wiki/Ian%20Clarke
Ian Clarke may refer to: Ian Clarke (computer scientist) (born 1977), Irish computer programmer, the original designer and lead developer of Freenet Ian Clarke (physician) (born 1952), Irish-born physician, missionary, philanthropist, businessman, resident of Uganda Ian Clarke (flautist) (born 1964), British classical flute player and composer Ian Clarke (gymnast) (born 1946), Australian Olympic gymnast Ian Clarke (drummer) (born 1946), drummer with the group Uriah Heep from 1970 to 1971 and Cressida Ian Clarke (rugby union) (1931–1997), New Zealand rugby player, farmer and rugby administrator Ian Clarke (soccer) (born 1975), Canadian soccer player I. F. Clarke (1918–2009), known as Ian, British bibliographer and literary scholar See also Ian Clark (disambiguation)
https://en.wikipedia.org/wiki/1970s%20in%20television
The decade of the 1970s saw significant changes in television programming in both the United Kingdom and the United States. The trends included the decline of the "family sitcoms" and rural-oriented programs to more socially contemporary shows and "young, hip and urban" sitcoms in the United States and the permanent establishment of colour television in the United Kingdom. Overall trends United Kingdom In 1967, BBC Two had started trials of their new colour service, and it was gradually rolled out over the next few years. BBC One and ITV followed suit in 1969, so by 1970 the viewer had three colour channels from which to choose: BBC1, BBC2 and ITV. Although U.S. imports occupied a significant proportion of airtime, there was a substantial amount of high quality in-house production too. The BBC, supported by its licence fee and with no advertisers to placate, continued fulfilling its brief to entertain and inform. The Play for Today was a continuation of the Wednesday Play which had run from the mid-1960s. As the title implied, it presented TV drama which had relevance to current social and economic issues, done in a way calculated to intrigue or even shock the viewer. As well as using established writers, it was effectively an apprenticeship for new ones who were trying to make a name for themselves; Dennis Potter, John Mortimer, Arthur Hopcraft and Jack Rosenthal all served time on Play for Today before going on to write their own independent series. In style, the plays could go from almost documentary realism (of which Cathy Come Home is the best known example) to the futuristic or surrealist (The Year of the Sex Olympics, House of Character). Potter went on to write Pennies from Heaven, one of the landmarks of 1970s television drama. It had the now familiar elements of Potter's style: sexual explicitness, nostalgia, fantasy song and dance scenes, all overlaying a dark and pessimistic view of human motivation. The series was a success, but the BBC was not yet ready for Brimstone and Treacle, a story of the rape of a physically and mentally disabled young woman. After viewing it, the BBC's Director Of Programs Alasdair Milne, pronouncing it to be "brilliantly written ... but nauseating", withdrew it, and it would not be shown on British television until 1987. Things had begun to change in the 1960s, with Till Death Us Do Part, and the series continued during 1972–75. The rantings of Alf Garnett on race, class, religion, education and anything else at all definitely touched a nerve. Although the show was in fact poking fun at right-wing bigotry, not everyone got the joke. Some—including, notably, Mary Whitehouse—complained about the language (although the level of profanity was quite light) and resented the racial epithets like "wog" and "coon" and the attitudes underlying them. Others, completely missing the point of the show, actually adopted Alf as their hero, thinking he was uttering truths that others didn't dare to—apparently oblivious
https://en.wikipedia.org/wiki/Yokel%20Chords
"Yokel Chords" is the fourteenth episode of the eighteenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on March 4, 2007. It was written by Michael Price, and directed by Susie Dietter. Guest starring Meg Ryan as Dr. Swanson, Peter Bogdanovich as a psychiatrist and Andy Dick, James Patterson and Stephen Sondheim as themselves. This also marked the return of director Susie Dietter who had taken a hiatus to work on Futurama and the film Open Season. This was her first episode in nearly nine years. It won the 2008 Annie Award for Music in an Animated Television Production. Plot Marge oversleeps, and this forces Homer to make the children's lunch for the day. He does not do a very good job, so Bart decides to scare an alternative lunch out of his friends by making up a story about a cannibal cafeteria worker named Dark Stanley, who killed all the students in the cafeteria and put them in his kids' head soup and was eventually hanged for his crimes. According to Bart, Dark Stanley's ghost haunts the site to repeat his act of murder on the current kids. At lunchtime, Bart pretends to be killed by Dark Stanley, leading all the students to run screaming into the woods while he takes their lunches. Groundskeeper Willie is sent to fetch the students back and brings seven extra kids: Cletus's children. Principal Skinner tells Superintendent Chalmers that the kids have been refused education in fear that they will lower test averages and cost the school federal funding, which Lisa overhears. To appease her, Skinner and Chalmers appoint her tutor of the children. Her initial tutoring efforts are unsuccessful, so she decides to take the children to downtown Springfield to introduce them to culture in the outside world. However, her plans are diverted when Krusty spots the kids singing, decides to use them as a musical act for his show, and offers them a contract, which Cletus signs immediately. Lisa is worried about the way that Krusty and Cletus are exploiting the children, so she sends an e-mail to Brandine, who is currently a soldier in Iraq. She arrives by helicopter to tell Krusty that the contract Cletus signed is null and void, as he is the father of only two of the seven children. Cletus tells her that they owe Krusty $12,000, but she assures him that they can live on that, and Cletus is happy to have things back to normal. Meanwhile, Skinner punishes Bart by having him spend five sessions with Dr. Stacey Swanson (Meg Ryan), a qualified psychologist. Bart is initially dismissive, but ends up developing a close bond with Swanson, who uses a Mad Libs-like game and violent video games to get him to open up about Homer's alcoholism and other matters. When his sessions end, Bart starts to miss the time he spent with her and enters into a state of depression. A worried Marge uses the funds she had been saving up for Homer's breast reduction surgery to get her son one more ses
https://en.wikipedia.org/wiki/List%20of%20Dark%20Angel%20characters
Dark Angel is an American television series created by James Cameron and Charles H. Eglee. The series premiered in the United States on the Fox network on October 3, 2000. Max Guevara, portrayed by Jessica Alba, is the protagonist of the series. The first season had an additional seven regular characters. Two of these characters, Kendra Maibaum and Herbal Thought, did not return for the second season, and a third main character, Colonel Donald Michael Lydecker, was written out of the show shortly into the second season. Four new characters, however, become regulars for the series second and final season. The series was continued with three canonical novels; "Skin Game" picks up directly where season two ended, and was followed by the final media in the Dark Angel universe, "After the Dark". A prequel novel, "Before the Dawn", chronicles Max's life between escaping from Manticore, the government facility that created her, and the beginning of season one of the television series. An apocryphal Dark Angel video game adaptation features the series' characters Max Guevara, Logan Cale and Original Cindy. Main characters Max Guevara/X5-452 Portrayed by Jessica Alba and Geneva Locke as Young Max (Seasons 1–2) Max Guevara is the main character in all Dark Angel media. She is a genetically enhanced transgenic super-soldier who escaped from Manticore, the government facility that created her and gave her the signalled code (X5-452). She can be identified by the bar code on the back of her neck, which reads the number 332960073452. Logan Cale/Eyes Only Portrayed by Michael Weatherly (Seasons 1–2) Logan Cale is a cyber-journalist who uses his knowledge of computer technology to bring down the corrupt power brokers of the new millennium. Heir to a family fortune, Logan hacks into television cable networks and delivers his broadcast entitled Streaming Freedom Video under the pseudonym and alter ego "Eyes Only". When he discovers Max trying to burgle his apartment, Logan notices her Manticore barcode and offers to help her locate the other Manticore children in return for helping him on a vigilante mission. Max denies his offer, and Logan is rendered a paraplegic after he is shot on the mission. Max later accepts Logan's original offer, and the two form a close friendship and romantic interest. After receiving a blood transfusion from Max, Logan temporarily regains the ability to walk due to her stem-cell enriched blood. Logan is a minor character in the prequel novel, Before the Dawn, after he recruits the X5 Seth to work for him. He is a major character in the novels Skin Game and After the Dark and the video game adaptation (voiced by Weatherly), where he continues to assist Max and the transgenics in the same way he did during the series. After the Dark, the final Dark Angel story, ends with Logan and Max finally consummating their relationship. Colonel Donald Michael Lydecker Portrayed by John Savage (Season 1, recurring season 2) Colonel Donald Mic
https://en.wikipedia.org/wiki/Ludwig%20Bruck
Ludwig Bruck was an Australian medical practitioner and medical journalist. He was the compiler of the first five editions of the Australasian Medical Directory and Handbook between 1883 and 1900. References 19th-century Australian medical doctors Australian journalists Medical journalists Australian people of German descent Year of birth missing Year of death missing
https://en.wikipedia.org/wiki/Berlin%20Ringbahn
The Ringbahn (German for circle railway) is a long circle route around Berlin's inner city area, on the Berlin S-Bahn network. Its course is made up of a pair of tracks used by S-Bahn trains and another parallel pair of tracks used by various regional, long distance and freight trains. The S-Bahn lines S41 and S42 provide a closed-loop continuous service without termini. Lines S45, S46 and S47 use a section of the southern and western ring, while lines S8 and S85 use sections of the eastern ring. The combined number of passengers is about 400,000 passengers a day. Due to its distinctive shape, the line is often referred to as the Hundekopf (Dog's Head). The Ringbahn is bisected by an east–west railway thoroughfare called the Stadtbahn (city railway), which crosses the Ringbahn from Westkreuz (Western Cross) to Ostkreuz (Eastern Cross), forming a Südring (Southern Ring) and a Nordring (Northern Ring). The north-south S-Bahn link (with the North-South S-Bahn-tunnel as its core) divides the Ringbahn into a Westring (Western Ring) and an Ostring (Eastern Ring), crossing at Gesundbrunnen station in the north and both Schöneberg station and Südkreuz in the south. These four sections served as tariff zones of the suburban fare structure before World War II. Over time, these four rings ceased to exist with the removal of track connections. Only at Westkreuz does an original such track remain, used only for utility purposes. At Ostkreuz, a newly-designed bypass provides access to southern branches without having to enter the station. Gesundbrunnen is not a typical crossing, but rather has parallel tracks that curve to the south after leaving the station, allowing trains to run towards Südkreuz. The approximately area encompassed by the Ringbahn comprises the "Berlin A" zone in the Verkehrsverbund Berlin-Brandenburg's fare structure. The Ringbahn also serves as the border for Berlin's low-emission zone, established on 1 January 2008. History Background In 1851, the Königliche Bahnhofs-Verbindungsbahn (Royal Station Connection Railway) was completed between the termini of some railroads terminating in Berlin: initially the Stettiner Bahnhof and the Anhalter Bahnhof, but later to include the Schlesischer Bahnhof. It was laid in the streets, which disrupted traffic as well as local residents. Thus, in order to reduce disruption of traffic, trains ran at night, as the train bell had to be rung constantly. Plans were soon developed to build a ring line primarily for freight, running outside the then city limits. Funding for construction was possible only after the victory in the war with Austria of 1866. The Lower Silesia-March [of Brandenburg] Railway Company was commissioned to construct and manage the line: construction began in 1867 and was completed in 1877. Route The first section opened on 17 July 1871 from Moabit through Gesundbrunnen, Central-Viehhof (now Storkower Straße), Stralau-Rummelsburg (now Ostkreuz), Rixdorf (now Neukölln) and Schöne
https://en.wikipedia.org/wiki/ULYSSES%20%28cable%20system%29
ULYSSES is a submarine communications cable network divided into two sections: ULYSSES-1 and ULYSSES-2 that transit the English Channel and the North Sea, respectively. It carries telecommunications and internet signals to-and-from the United Kingdom to the continental European Union. It began service in 1997 and is owned by WorldCom International, BT, France Telecom and KPN. Network ULYSSES-1 has landing points in: 1. St Margaret's Bay, Kent, United Kingdom 2. Calais, Pas-de-Calais, France ULYSSES-2 has landing points in: 3. Lowestoft, Suffolk, United Kingdom 4. Near IJmuiden, North Holland, the Netherlands The route then continues inland into mainland Europe and joins the two cables together at: 5. Amsterdam, Netherlands 6. Düsseldorf, Germany 7. Frankfurt, Germany 8. Saarbrücken, Germany 9. Brussels, Belgium 10. Reims, France 11. Fresnes-lès-Montauban, France 12. Paris, France And from the two UK landing points the cable connects together at: 13. London, UK References Alcatel info-Ulysses North Sea(South)-Kingfisher Cable Chart Atlantic cable info Submarine communications cables in the English Channel Submarine communications cables in the North Sea Netherlands–United Kingdom relations France–United Kingdom relations 1997 establishments in Europe
https://en.wikipedia.org/wiki/Cluster%20Computing%20%28journal%29
Cluster Computing: the Journal of Networks, Software Tools and Applications is a peer-reviewed scientific journal on parallel processing, distributed computing systems, and computer communication networks. The journal was established in 1998. According to the Journal Citation Reports, the journal had a 2020 impact factor of 1.809. The editor-in-chief is Salim Hariri (University of Arizona). References External links Computer science journals Cluster computing Academic journals established in 1998 English-language journals Springer Science+Business Media academic journals Quarterly journals
https://en.wikipedia.org/wiki/Greyware
Greyware may refer to: Grey ware, a type of pottery made of a grey paste Grayware, unwanted applications or files that are not classified as malware, but can worsen the performance of computers and cause security risks Greyware Automation Products, a time synchronization software manufacturer; see Control Panel (Windows)
https://en.wikipedia.org/wiki/Virtual%20microscopy
Virtual microscopy is a method of posting microscope images on, and transmitting them over, computer networks. This allows independent viewing of images by large numbers of people in diverse locations. It involves a synthesis of microscopy technologies and digital technologies. The use of virtual microscopes can transform traditional teaching methods by removing the reliance on physical space, equipment, and specimens to a model that is solely dependent upon computer-internet access. This increases the convenience of accessing the slide sets and making the slides available to a broader audience. Digitized slides can have a high resolution and are resistant to being damaged or broken over time. Prior to recent advances in virtual microscopy, slides were commonly digitized by various forms of film scanner and image resolutions rarely exceeded 5000 dpi. Nowadays, it is possible to achieve more than 100,000 dpi and thus resolutions approaching that visible under the optical microscope. This increase in scanning resolution comes at a price; whereas a typical flatbed or film scanner ranges in cost from $200 to $600, a 100,000 dpi slide scanner will range from $80,000 to $200,000. See also Digital pathology Microscopy Telepathology Tissue Cytometry, a technique that brings the concept of flow cytometry to tissue section, in situ, and helps to perform whole slide scanning and quantification of markers by maintaining the spatial context. References Further reading External links Virtual Microscopy Database by the American Association of Anatomists More information about definition, technology and teaching PathXL: Range of virtual microscopy software developed by Pathologists. Virtual Microscopy Slide Database Free Virtual Microscope Web Application with automated image analysis Virtual Microscopy of the Brain Virtual Microscopy a Disruptive Technology? Holycross Cancer Center (Poland, Kielce) Pathomorphology Department virtual slides Digital medicine in the virtual hospital of the future Virtual Pathology at the University of Leeds Invertebrate Zoology Virtual Microscopy, Yale Peabody Museum Microscopy Pathology
https://en.wikipedia.org/wiki/PME%20Aggregation%20Function
PME Aggregation Function (PAF) is a computer networking mechanism defined in Clause 61 of the IEEE 802.3 standard, which allows one or more Physical Medium Entities (PMEs) to be combined to form a single logical Ethernet link. The PAF is located in the physical coding sublayer (PCS), between the media access control (MAC)-PHY Rate Matching function and the Transmission Convergence (TC) sublayer. It interfaces with the PMEs across the λ-interface, and to the MAC-PHY Rate Matching function using an abstract interface. PAF is an optional function that was defined before 2007 for two IEEE 802.3 interfaces: 2BASE-TL and 10PASS-TS, both of which were Ethernet in the First Mile (EFM) copper physical layers. Details PME Aggregation function has the following characteristics: Supports aggregation of up to 32 PMEs Supports individual PMEs having different data rates (max 1:4 ratio) Ensures low packet latency and preserves frame order Scalable and resilient to PME failure Independent of type of EFM copper PHY Allows vendor discretionary algorithms for fragmentation PAF Transmit function works by fragmenting incoming Ethernet frames into a number of fragments, limited in size to a range between 64 and 512 Bytes. A sequential fragmentation header is prepended to each fragment, indicating if the fragment is from the start-of-packet, end-of-packet or middle of packet. A frame check sequence (FCS) is appended to each fragment, which is then transmitted by the next available active PME in the aggregated group. The following diagram illustrates the PAF fragmentation: PAF Receive function reassembles the original frames from the received fragments, which are buffered in a per-MAC fragment buffer. The algorithm uses the fragmentation header to make sure that the reassembled frames are in order. History The PME Aggregation function was first defined in IEEE 802.3ah in 2004. The original Loop Aggregation proposal was submitted by Klaus Fosmark from now defunct First Mile Systems in 2001. It was later referenced by ITU-T G.998.2 (Ethernet-based multi-pair bonding) and its ANSI equivalent NIPP-NAI T1.427.02. Comparison PAF algorithm and fragmentation header are very similar to MLPPP which works at layer 3 (IP). PAF is an asymmetric protocol, i.e., all information required for reassembly is contained in the fragmentation header sent with each fragment. While allowing great flexibility in Transmitter and Receiver implementations it requires an overhead consuming about 5% of the bandwidth (estimation for 2BASE-TL protocol, including 64B/65B encapsulation). PAF is optimized for the Ethernet traffic. Inverse Multiplexing for ATM (IMA) is another aggregation protocol, which unlike PAF uses fixed-size cells, sending them across multiple links in a Round-Robin fashion. IMA is optimized for ATM and in the extreme cases (short Ethernet frames) may add as much as 40% overhead due to the AAL5 encapsulation. ITU-T G.998.3 (Multi-pair bonding using time-division
https://en.wikipedia.org/wiki/Terrorist%20Identities%20Datamart%20Environment
The Terrorist Identities Datamart Environment (TIDE) is the U.S. government's central database on known or suspected international terrorists, and contains highly classified information provided by members of the Intelligence Community such as CIA, DIA, FBI, NSA, and many others. As of February 2017, there are 1.6 million names in TIDE. In 2008, more than 27,000 names were removed from the list when it was determined they no longer met the criteria for inclusion. According to the FBI, international terrorists include those persons who carry out terrorist activities under foreign direction. For this purpose, they may include U.S. persons (U.S. citizens and legal permanent residents). The Terrorist Identities Group (TIG), located in NCTC's Information Sharing & Knowledge Development Directorate (ISKD), is responsible for building and maintaining TIDE. From the classified TIDE database, an unclassified, but sensitive, extract is provided to the FBI's Terrorist Screening Center, which compiles the Terrorist Screening Database (TSDB). This database, in turn, is used to compile various watch lists such as the TSA's No Fly List, State Department's Consular Lookout and Support System, Homeland Security's Interagency Border Inspection System, and FBI's NCIC (National Crime Information Center) for state and local law enforcement. Tuscan and Tactics Documents revealed under the Access to Information Act indicate that all border guards and immigration offers have access to a US database of 680,000 people affiliated with terrorism and maintained by the United States. The names on the list come from the US Terrorist Identities Datamart Environment (TIDE), which populates various US traveller databases, Canada's Tuscan and the Australian equivalent, "Tactics". See also Computer Assisted Passenger Prescreening System Datamart Open Source Information System No Fly List Selectee list References External links Terror Database Has Quadrupled In Four Years - washingtonpost.com (March 25, 2007) Terrorism databases Government databases in the United States
https://en.wikipedia.org/wiki/Manors%20Metro%20station
Manors is a Tyne and Wear Metro station, serving the Shieldfield area in Newcastle upon Tyne. It joined the network on 14 November 1982, following the opening of the fourth phase of the network, between Tynemouth and St James via Wallsend. The station is located near to Manors National Rail station, which is on the East Coast Main Line. However, the stations are not directly connected. History The station was purpose-built for the network and opened on 14 November 1982. Heading east from Manors, the route surfaces alongside the East Coast Main Line, before crossing the Byker Viaduct over the Ouseburn Valley, towards Byker. The S-shaped viaduct was constructed for the Tyne and Wear Metro by Ove Arup, with work commencing in 1976, and completed in 1979. The former North Eastern Railway route between Manors and Jesmond is connected by a link tunnel, located to the west of the station. It is used only by trains running out of public service, allowing them to terminate at Manors, and then return to the depot at South Gosforth (and vice versa), without having to travel around the North Tyneside Loop. Facilities Step-free access is available at all stations across the Tyne and Wear Metro network, with two lifts providing step-free access to platforms at Manors. As part of the Metro: All Change programme, new lifts were installed at Manors in 2014, with new escalators installed in 2015. The station is equipped with ticket machines, seating, next train information displays, timetable posters, and an emergency help point on both platforms. Ticket machines are able to accept payment with credit and debit card (including contactless payment), notes and coins. The station is fitted with automatic ticket barriers, which were installed at 13 stations across the network during the early 2010s, as well as smartcard validators, which feature at all stations. There is no dedicated parking at the station, however there are nearby pay and display car parks, operated by Newcastle City Council. There is the provision for cycle parking, with five cycle pods available for use. Services , the station is served by up to five trains per hour on weekdays and Saturday, and up to four trains per hour during the evening and on Sunday. Rolling stock used: Class 599 Metrocar Art An abstract mural, Magic City by British artist Basil Beattie, was commissioned in 1987, and can be seen on the station concourse. References External links Timetable and station information for Manors Newcastle upon Tyne 1982 establishments in England Railway stations in Great Britain opened in 1982 Tyne and Wear Metro Yellow line stations Transport in Newcastle upon Tyne Transport in Tyne and Wear Railway stations located underground in the United Kingdom
https://en.wikipedia.org/wiki/Statewide%20opinion%20polling%20for%20the%202008%20Democratic%20Party%20presidential%20primaries
Statewide public opinion polls conducted relating to the 2008 Democratic Party presidential primaries include the following. A graphic summary of the data in map form follows. For state and territory names abbreviated in the maps in this article, see: List of US postal abbreviations. Polling Poll summary and current pledged delegate count Delegate table and polling data The following table shows a summary of the most recent polling data for each state, as well as completed primary and caucus results. Totals for withdrawn candidates have been placed in the "Uncommitted/Other" and "Other" columns. The pledged delegate vote estimates come from each state's primary or caucus article. Click on the specific election (link) column to see the sources used in those articles. † Barack Obama was not on the ballot in Michigan. On 24 August, the DNC gave Florida and Michigan full voting rights. See also Nationwide opinion polling for the Democratic Party 2008 presidential primaries Statewide opinion polling for the Republican Party presidential primaries, 2008 External links 2008 Democratic National Convention Website – FAQ gives map with delegation information. Pollster.com Graphs showing various primary and general polls USAElectionPolls.com – Primary polling by state Select2008 – Live issue-based and policy-based polling 2008 United States Democratic presidential primaries Democratic
https://en.wikipedia.org/wiki/Enterprise%20Library
Enterprise Library can be one of the following: Microsoft Enterprise Library, a collection of .NET API's for enterprise programming. Enterprise Library (Las Vegas) a library that is a part of the Las Vegas-Clark County Library District. Enterprise Public Library (Mississippi), Enterprise, Mississippi. Enterprise Public Library (Oregon), Enterprise, Oregon, listed on the National Register of Historic Places in Wallowa County, Oregon
https://en.wikipedia.org/wiki/The%20Little%20Revue
The Little Revue was an American early-broadcast television series, which ran on the ABC network from 1949 to 1950. The program broadcast music performers and other variety show elements. It was first broadcast on September 4, 1949, and stayed on Sunday evenings until March 1950, where it moved to Friday evenings. Its last performance was on April 21, 1950. Regular performers included: Nancy Doran and Dick France Nancy Evans (1910–1963) Billy Johnson Dick Larkin Bill Sherry Gloria Van The Bill Weber Marionettes See also 1949–50 United States network television schedule References Brooks, Tim and Marsh, Earle; The Complete Directory to Prime Time Network and Cable TV Shows, External links The Little Revue at IMDB 1949 American television series debuts 1950 American television series endings American Broadcasting Company original programming Black-and-white American television shows
https://en.wikipedia.org/wiki/Interagency%20Border%20Inspection%20System
The Interagency Border Inspection System (IBIS) is a United States computer-based system that provides the law enforcement community with files of common interest. IBIS provides access to the Federal Bureau of Investigation National Crime Information Center (NCIC) and allows its users to interface with all 50 U.S. states via the National Law Enforcement Telecommunications System (NLETS). IBIS physically resides on the Treasury Enforcement Communications System (TECS) at the U.S. Customs and Border Protection Data Center. Regulatory and law enforcement personnel from more than 20 federal agencies or bureaus use IBIS, including: Animal and Plant Health Inspection Service Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) Drug Enforcement Administration (DEA) Federal Aviation Administration (FAA) Federal Bureau of Investigation (FBI) Internal Revenue Service (IRS) Interpol U.S. Customs and Border Protection (CBP) United States Coast Guard United States Department of State (for use by Consular Officers at United States embassies and consulates) United States Secret Service (USSS) Field access is provided by a network with more than 24,000 IBIS terminals, located at ports of entry including border checkpoints, seaports, and airports to track information on suspect individuals, businesses, vehicles, aircraft, and watercraft. IBIS terminals can also be used to access records on wanted persons, stolen vehicles, vessels or firearms, license information, criminal histories, and previous federal inspections, allowing the border enforcement agencies to focus their limited resources on those potential non-compliant travelers. Notes Law enforcement databases in the United States
https://en.wikipedia.org/wiki/Let%20There%20Be%20Stars
Let There Be Stars was a variety television series broadcast on ABC in 1949, the first program to originate in Hollywood for a major TV network. It debuted on October 16, 1949, and ended on November 27, 1949. It was a high-budget show for its time, and used new production techniques such as "Teleparencies", transparencies which could be displayed in the background, faded in or out or dissolved, and changed on the fly. The idea of the program was to highlight up-and-coming actors and actresses who had been found by a talent scout working to cast new performers in Broadway shows. Variety magazine praised the premiere episode in a review, but the program's success did not last. The first seven episodes are stored at the Paley Center for Media. The archive also has a "rough rehearsal kinescope" of one of the episodes. Peter Marshall was the host. Production Let There Be Stars originated at an east Hollywood studio that ABC bought from Warner Bros., making it "the first major network show produced out of Hollywood". The show's September 21, 1949, premiere on the west coast was recorded via kinescope to be shown in New York on October 16. Production and distribution proved to be difficult. Leighton Brill and William Triz were the producers. The director was Richard J. Goggin, and the writer was Nat Linden. See also 1949-50 United States network television schedule References External links Let There Be Stars at IMDB 1949 American television series debuts 1949 American television series endings 1940s American television series Let There Be Stars
https://en.wikipedia.org/wiki/Business%20networking
In businesses, networking is the sharing of information or services between people, companies, or groups. It is also a way for individuals to grow their relationships for their job or companies. As a result, connections or a network can be built and useful for individuals in their professional or personal lives. Networking helps build meaningful relationships that are beneficial to all involved parties to exchange information and services. Gaining new significant business acquaintances can be obtained by networking meetings, social media, personal networking, and business networking. In the second half of the twentieth century, networking was promoted to help business people to build their social capital. In the US, workplace equity advocates encouraged business networking by members of marginalized groups (e.g., women, African-Americans, etc.) to identify and address the challenges barring them from professional success. Mainstream business literature subsequently adopted the terms and concepts, promoted them as pathways to success for all career climbers. Overview There are many ways to network, whether the traditional way of making connections through a group or club or non-traditional through hobbies or unrelated events. They all serve the same purpose of making close and valuable connections that allow for an equal exchange of knowledge or advice. Business networks are types of social networks which are developed to help executives connect with other managers and entrepreneurs to further each other's interests  by forming mutually beneficial business relationships. By doing so, they can both each other's business interests by forming mutually beneficial business relationships. Business networking is a way of leveraging your business and personal connections to help you bring in new customers, vendors or to get great advice for running your business. There are several prominent business networking organizations that create models of networking events. When followed, the models allow the business person to build new business relationships and generate business opportunities simultaneously. A professional network service is an implementation of information technology in support of business networking. Chambers of Commerce and other business-oriented groups may also organize networking activities. However, there are multiple networking groups, and there is no one-size-fits-all for every person or company. The models will vary based on their field of business and what they want their outcomes/goals to be. It is important to note; networking works mainly in favor of small businesses. The owners have to dabble with a variety of job functions in a small set-up. When they meet up with like-minded people, they learn from their experiences and guidance on essential. They can even find partners and angel investors through a networking group of experienced business owners. A plethora of networking events takes place in every country where entrepreneu
https://en.wikipedia.org/wiki/1999%E2%80%932000%20League%20of%20Wales
The 1999–2000 League of Wales was the eighth season of the League of Wales since its establishment in 1992. It began on 20 August 1999 and ended on 6 May 2000. The league was won by Total Network Solutions. League table Results References Cymru Premier seasons 1 Wales
https://en.wikipedia.org/wiki/G.983
ITU-T Recommendation G.983 is a family of recommendations that defines broadband passive optical network (BPON) for telecommunications Access networks. It originally comprised ten recommendations, G.983.1 through G.983.10, but recommendations .6–.10 were withdrawn when their content was incorporated into G.983.2. The current view is that the BPON standards are mature, and no further work will be done on them after the 2007 round. The GPON OMCI definition has been revised to stand alone, rather than citing G.983.2. Although G.983 is directed at BPON, the GPON recommendations draw heavily on it, especially G.984.4, which defines the management model for GPON ONTs. Current recommendations The current recommendations are: G.983.1, Broadband optical access systems based on passive optical networks (PON), 2005, with amendment 1 and erratum 1. Includes the definition of the churning cipher. G.983.2, ONT management and control interface specification for B-PON, 2005, with amendments 1 and 2, erratum 1 and an implementer's guide. G.983.3, A broadband optical access system with increased service capability by wavelength allocation, 2001, with amendments 1 and 2. G.983.4, A broadband optical access system with increased service capability using dynamic bandwidth assignment, 2001, with amendment 1 and corrigendum 1. G.983.5, A broadband optical access system with enhanced survivability, 2002. ITU-T recommendations ITU-T G Series Recommendations
https://en.wikipedia.org/wiki/GPON
G.984 is the ITU-T standard for implementing a gigabit-capable passive optical network (GPON). It is commonly used to implement the outermost link to the customer (last kilometre or last mile) of fibre-to-the-premises (FTTP) services. GPON puts requirements on the optical medium and the hardware used to access it, and defines the manner in which Ethernet frames are converted to an optical signal, as well as the parameters of that signal. The bandwidth of the single connection between the OLT (optical line termination) and the ONTs (optical network terminals) is 2.4Gbit/s down, 1.2Gbit/s up, or rarely symmetric 2.4Gbit/s, shared between up to 128 ONTs using a time-division multiple access (TDMA) protocol, which the standard defines. GPON specifies protocols for error correction (Reed–Solomon) and encryption (AES), and defines a protocol for line control (OMCI) which includes authentication (LOID, serial number and/or password). Though implementations of GPON share a lot of common features, many features were left undefined, thus in practice, there is little compatibility between the various implementations. Specifically, the exact kind of fibre cable and connectors to use is undefined. The primary optical transmitter, known as the Optical Line Terminal (OLT), is housed within the central office of the telecommunications operator. A laser in the OLT injects photons from the central office into a glass-and-plastic fiber-optic cable that terminates at a passive optical splitter. The splitter divides the single signal from the central office into many signals that can be sent to up to 64 consumers. The number of consumers serviced by a single laser is determined by the operator's engineering criteria; operators may opt to reduce the number to 32 consumers. Furthermore, the operator may choose to divide the signal twice, for example, once into eight and again farther down the line. The maximum distance between the central office and the site can be 20 kilometers, however operators will normally limit it to 16 kilometers in order to maintain a high level of service. In contrast to ADSL technology, which deteriorates as the distance between the central office and the household rises, with severe signal loss beyond 3km, all houses may enjoy high-speed internet within the 16km range of a fibre central office. The standards The first version of GPON was ratified in 2003. Since then, it has been expanded upon and revised several times. Work on the standard continues. As of July 2018, G.984.5 is currently being revised. The most recent version comprises seven parts: G.984.1 : General characteristics, 2008, with amendment 1 (2009) and 2 (2012) G.984.2 : Physical Media Dependent (PMD) layer specification, 2003, with amendment 1 (2006) and 2 (2008) G.984.3 : Transmission convergence layer specification, 2008, with amendments 1 (2009), 2 (2009), 3 (2012) and erratum 1 (2010) G.984.4 : ONT management and control interface (OMCI) specification, 2008, wit
https://en.wikipedia.org/wiki/Feasible%20region
In mathematical optimization and computer science, a feasible region, feasible set, or solution space is the set of all possible points (sets of values of the choice variables) of an optimization problem that satisfy the problem's constraints, potentially including inequalities, equalities, and integer constraints. This is the initial set of candidate solutions to the problem, before the set of candidates has been narrowed down. For example, consider the problem of minimizing the function with respect to the variables and subject to and Here the feasible set is the set of pairs (x, y) in which the value of x is at least 1 and at most 10 and the value of y is at least 5 and at most 12. The feasible set of the problem is separate from the objective function, which states the criterion to be optimized and which in the above example is In many problems, the feasible set reflects a constraint that one or more variables must be non-negative. In pure integer programming problems, the feasible set is the set of integers (or some subset thereof). In linear programming problems, the feasible set is a convex polytope: a region in multidimensional space whose boundaries are formed by hyperplanes and whose corners are vertices. Constraint satisfaction is the process of finding a point in the feasible region. Convex feasible set A convex feasible set is one in which a line segment connecting any two feasible points goes through only other feasible points, and not through any points outside the feasible set. Convex feasible sets arise in many types of problems, including linear programming problems, and they are of particular interest because, if the problem has a convex objective function that is to be maximized, it will generally be easier to solve in the presence of a convex feasible set and any local optimum will also be a global optimum. No feasible set If the constraints of an optimization problem are mutually contradictory, there are no points that satisfy all the constraints and thus the feasible region is the empty set. In this case the problem has no solution and is said to be infeasible. Bounded and unbounded feasible sets Feasible sets may be bounded or unbounded. For example, the feasible set defined by the constraint set {x ≥ 0, y ≥ 0} is unbounded because in some directions there is no limit on how far one can go and still be in the feasible region. In contrast, the feasible set formed by the constraint set {x ≥ 0, y ≥ 0, x + 2y ≤ 4} is bounded because the extent of movement in any direction is limited by the constraints. In linear programming problems with n variables, a necessary but insufficient condition for the feasible set to be bounded is that the number of constraints be at least n + 1 (as illustrated by the above example). If the feasible set is unbounded, there may or may not be an optimum, depending on the specifics of the objective function. For example, if the feasible region is defined by the constraint set {x
https://en.wikipedia.org/wiki/Jadeworld%20%28USA%29
Jadeworld is a programming package operated by TVB (USA) Inc., a wholly owned subsidiary of the largest distributor of Chinese-language television programs – TVB Group, Hong Kong based. TVB USA is headquartered in Los Angeles, with other operators in New York and San Francisco. Programs TVB Channels cover an array of dramas, variety shows, U.S. and Hong Kong news, and sports. Dramas Variety shows News TVB covers local, U.S. and Hong Kong news. U.S. and Hong Kong news is only offered on TVB's Jadeworld channels, however, TVB provides local news clips on their website. Sports Although TVB has a limited sports coverage that includes the Olympics, FIFA and other Hong Kong sports; with TVB on DISH, NBA TV, One World Sports and Universal Sports Network are also now offered as a part of DISH's Chinese Basic Package. Revamp of Jadeworld package In April 2020, TVB HD, TVB Pearl, TVB2 (discontinued May 2020), and TVB Mandarin has no longer to providing with continued channel service. Although Jadeworld has provided new services on TVBJ1 referred to same as TVB Jade Los Angeles schedule so however, the TVB1 and TVBe have switched from standard version to high-definition version. TVB1 HD, TVBJ1, TVB Jade LA & SF, and TVBe HD have been already taking over because the TVB Network News is now provided for a new channel program of 24/7. Anyway, the TVB Drama Mandarin has been switched the language from Mandarin to Cantonese, and now the TVB Drama is now available in the Cantonese language version. TVBHD, TVB Pearl, and TVB Mandarin is already discontinued service by April 2020 also the TVBS has no longer provided a TVB Hong Kong Drama in the TVBS schedule, Will be Reorganization Full TVBS Content From Taiwan. Jadeworld is still longer available Dish, but is now only available via satellite, IPTV, and Sling TV (internet streaming), which requires directly contacting TVB. In addition, the channel lineup was altered in April 2020. Only TVB1, TVBE, and TVB Drama remain from the original lineup, with an overseas simulcast of the TVB News Channel being added to the roster. The four channels, and TVB J1, a free channel available on TVB Anywhere's North American free streaming service, were added to the USA's TVB Anywhere Plus as live TV channels. References External links Foreign-language television stations in the United States TVB channels Television channels and stations established in 1984 Norwalk, California Non-English-language mass media in California
https://en.wikipedia.org/wiki/Inter-American%20Biodiversity%20Information%20Network
The Inter-American Biodiversity Information Network (IABIN) is a network dedicated to the adoption and promotion of ecoinformatics standards and protocols in all the countries of the Americas, thus facilitating the sound use of biological information for conservation and sustainable use of biodiversity. It is primarily an inter-governmental initiative but has a strong participation of a wide range of non-governmental partners. The creation of IABIN in 1996 was mandated by the Heads of State at the Santa Cruz Summit of the Americas meeting in Bolivia. The Summit requested the Organization of American States (OAS) to act as the diplomatic host of the network. Partnerships with similar or related initiatives is a critical part of the network’s strategy, so that existing standards or protocols can be promoted and not reinvented. For example, the Global Biodiversity Information Facility (GBIF) is leading the world in the development of specimen data standards, which IABIN is promoting. Strong relationships are also being developed with national environmental information organizations which are often very active and better placed to promote national programs, such as the National Biological Information Infrastructure (NBII) in the United States or the Instituto Nacional de Biodiversidad (INBio) of Costa Rica. Governance IABIN is a network in which the countries of the Americas as well as diverse governmental and civil society organizations participate. The highest governing body of the network is the IABIN Council, which meets about every year. Each participating country can send a representative, their “Focal Point”, to the Council, which defines the strategies and policies of the network. In practice, decisions are made by consensus and include a strong participation of non-governmental actors such as major non-governmental organizations (NGOs). At present, 34 countries have designated IABIN Focal Points. Most countries have designated their Clearing House Mechanism National Focal Point as their IABIN Focal Point as well. The Focal Points in each country are responsible for both representing their country’s views in the adoption of IABIN decisions and policies and then promoting them in their country. Between Council meetings, in order to guide effectively the operations of IABIN, a smaller governance body has been created. The IABIN Executive Committee (IEC) comprises representatives of eight countries and two international governmental organization or non-governmental organization (IGO/NGO) members, currently GBIF (Global Biodiversity Information Facility) and TNC (The Nature Conservancy). The IEC members are elected for fixed terms at each Council meeting. The current members of the IEC are: Gladys Cotter (Chairperson) - United States Karin Molt (Vice-Chairperson) - Chile Dionne Newell - Jamaica Ana Aber - Uruguay Edgar Selvín Pérez - Guatemala Jocelyn Paul/Rickie Morain - Grenada Marina Hernández - Dominican Republic Dario Luque -
https://en.wikipedia.org/wiki/Comparison%20of%20BitTorrent%20clients
The following is a general comparison of BitTorrent clients, which are computer programs designed for peer-to-peer file sharing using the BitTorrent protocol. The BitTorrent protocol coordinates segmented file transfer among peers connected in a swarm. A BitTorrent client enables a user to exchange data as a peer in one or more swarms. Because BitTorrent is a peer-to-peer communications protocol that does not need a server, the BitTorrent definition of client differs from the conventional meaning expressed in the client–server model. Bram Cohen, author of the BitTorrent protocol, made the first BitTorrent client, which he also called BitTorrent, and published it in July 2001. Many BitTorrent programs are open-source software; others are freeware, adware or shareware. Some download managers, such as FlashGet and GetRight, are BitTorrent-ready. Opera 12, a web browser, can also transfer files via BitTorrent. In 2013 Thunder Networking Technologies publicly revealed that some of their employees surreptitiously distributed a Trojan horse with certain releases of Xunlei, the company's BitTorrent-ready download manager. Xunlei is included in the comparison tables. Applications General Operating system support Interface and programming Features I Features II Libraries General Operating system support and programming language Supported features 1 Supported features 2 See also Anonymous P2P BitTorrent tracker Comparison of BitTorrent sites Comparison of BitTorrent tracker software Comparison of file sharing applications File sharing Open Music Model Timeline of file sharing Notes References BitTorrent BitTorrent clients it:BitTorrent#Client
https://en.wikipedia.org/wiki/RBN
RBN may refer to: Rajah Broadcasting Network, a television and radio network in the Philippines Rejoice Broadcast Network, a Christian network in Pensacola, Florida Reliance Broadcast Network, India Republic Broadcasting Network, a satellite, shortwave, and Internet radio operation in Texas Rock Band Network, a downloadable content service Russian Business Network, a Russian ISP openly engaged in criminal activities Random boolean network, a model in statistical physics where the nodes of graph carry a Boolean value Royal Brunei Navy, and also the associated prefix for ships of the navy
https://en.wikipedia.org/wiki/Regional%20Transport%20Office
The Regional Transport Office or District Transport Office or Regional Transport Authority (RTO/DTO/RTA) is the organisation of the Indian government responsible for maintaining a database of drivers and a database of vehicles for various states of India. The RTO issues driving licences, organises collection of vehicle excise duty (also known as road tax and road fund licence) and sells personalised registrations. Along with this, the RTO is also responsible to inspect vehicle's insurance and clear the pollution test. Function of RTO: To enforce the provisions of the various acts of motor vehicles, central motor vehicle rules and the State motor vehicle rules as laid down by the government from time to time. To ensure that co-ordinated development of road transport through management of permit. To charge and collect tax as per the provisions of the motor vehicle act. To enforce road safety and bring in new amendments into force with relation to the Indian Motor Vehicle Act 1988. The officer ranks are categorized as: (Rank from lower to higher, Mostly known by different names for designations across different states) Junior Inspector of Motor Vehicles Senior Inspector of Motor Vehicles Assistant Regional Transport Officer Regional Transport Officer Followed by other top level officers acting as Administrators for the Department The Above mentioned designation names are as per Government of Karnataka Nomenclature RTO database The RTO identifies untaxed vehicles (Periodic or Lifetime), and identify keepers of cars entering various Indian states, or who exceed speed limits on a road that has speed cameras by matching the cars to their keepers utilising the RTO database. The High Security Registration plates (HSRP) were introduced to help reduce vehicle crime and improve security. It is intended to deter criminals from disguising stolen cars with the identity of written off or scrapped vehicles. The RTO database will include important details such as Make, Model, VIN number, and further changes (if any) and the owner of the car is completely entitled to with any law offense or change of ownership or renewal procedures. There are various portals where one can check their license status. Vehicle registration certificate The owner of a vehicle can apply and get duplicate copy of the vehicle registration certificate from the concerned RTO office if it is stolen, lost, destructed and completely written off. A complaint should be lodged to the police station which is situated under the jurisdiction / area of lost before approaching the regional transport officer. After completing the formalities, the owner has to submit FORM 26 and the Police Certificate to the Registering Authority along with the required documents for applying duplicate vehicle registration certificate. Certain states in the country allow for acquiring a certificate for candidates appearing to Heavy Motor Vehicle licenses to which Government of India or Government
https://en.wikipedia.org/wiki/Kyiv%20Laboratory%20for%20Artificial%20Intelligence
The Kyiv Laboratory for Artificial Intelligence (NeuroTechnica) is a research institute in Kyiv, the capital of Ukraine. Research Speech recognition, Speech synthesis, Prototype of the system to understand text in a natural language, Recognition of the hand-written information, Optical character recognition, System of the automatic construction of Spellcheckers for arbitrary linear languages, Translation systems with elements of the semantic analysis, Translation memory, Vocabularies, Systems of training to languages, Web robots, and others. Current project "Veliar-3" the system to understand text in a natural language, program-instrumental system of automatisation of programming ("PICAP"): language support Cprolog, construct logics support Veliar-2, filemanager Fmgr, text editor Fedit, language support Perl-6, language support Lisp-13, language support Common-Lisp, language support CLIPS, primary key hierarchy database support BTIO, database support BerkeleyDB, connection support with С-compilers. Previous projects "Veliar-2" - further development of the basis project, "Veliar" - programming language, for developing systems of "Artificial Intelligence" class, "Gebe Deutschunterricht" (Teaching German) - multimedia system, Cossack "3D speaking head" (Cossack - multimedia program with mimics for speech synthesis) External links Official site (in Russian) Artificial intelligence laboratories Research institutes in Ukraine Organizations based in Kyiv Laboratories in Ukraine
https://en.wikipedia.org/wiki/OSDI
OSDI can mean: Operating Systems: Design and Implementation, a computer science book by Andrew S. Tanenbaum Operating Systems Design and Implementation, a computer science conference sponsored by USENIX The ICAO code for Damascus International Airport in Syria
https://en.wikipedia.org/wiki/Homicide%3A%20Life%20on%20the%20Street%20%28season%203%29
The third season of Homicide: Life on the Street aired in the United States on the NBC television network from October 14, 1994, to May 5, 1995, and contained 20 episodes. It was the first full season of episodes. Beginning in the third season, Homicide was moved to Fridays at 10 p.m. EST, a timeslot the show would remain at until its cancellation in 1999. The third season saw all the original cast members return except for Jon Polito (playing Steve Crosetti), who was reportedly dropped at the request of NBC. Season 3 also marked the debut of character Lt. Megan Russert (Isabella Hofmann), and the final season for both Detectives Beau Felton (Daniel Baldwin) and Stanley Bolander (Ned Beatty). Celebrities who made guest appearance during the third season include Al Freeman Jr., Steve Buscemi, Tim Russert, Howie Mandel and Chris Noth. As with the previous seasons, Season 3 had several episodes air out of order resulting in continuity issues. To make up for this, the episodes "Crosetti" and "Nothing Personal" included title cards in the beginning to tell the viewers the episodes took place in the past. Season 3 also saw the first crossover between Homicide and Law & Order as Chris Noth makes a cameo appearance as Detective Mike Logan in the episode "Law & Disorder". The DVD box set of season 3 was released for Region 1 on October 28, 2003. The set includes all 20 season 3 episodes on six discs. Episodes When first shown on network television, multiple episodes were aired out of order. The DVD present the episodes in the correct chronological order, restoring all storylines and character developments. Cast For the third season of Homicide, almost all the original cast members, including Daniel Baldwin, Ned Beatty, Richard Belzer, Andre Braugher, Clark Johnson, Yaphet Kotto, Melissa Leo, & Kyle Secor, returned. Jon Polito was the only original cast member not to return as NBC reportedly requested that he'd be dropped from the show due to their unhappiness with his physical appearance; Polito's character, Steve Crosetti, would be written out as having gone on vacation to Atlantic City only to commit suicide upon his return to Baltimore. According to an interview in 2005, Polito claimed that when Tom Fontana called him to tell him he was being dropped, he promised Polito would return in the future. However, after Polito refused to believe Fontana and began criticizing the show, the plans were dropped. In the same interview, Polito expressed regret for his comments:. We had some conflicts on the show. I was also not in the best of shape: I was feeling very passionately about the show, and I was very annoyed about NBC's—what NBC was doing with it. I was very passionate about it. I stepped on the wrong toes. And I made a major mistake. I did not know at the time that Tom Fontana—when Tom Fontana tells you, "You have to be dropped now, but I'll bring you back"—I didn't believe that because I'd been screwed by so many producers over the years. He is a