source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Phyllosticta%20micropuncta | Phyllosticta micropuncta is a plant pathogen of the Botryosphaeriaceae family of sac fungi infecting avocados.
References
External links
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Avocado tree diseases
micropuncta |
https://en.wikipedia.org/wiki/Phyllosticta%20mortonii | Phyllosticta mortonii is a fungal plant pathogen infecting mangoes.
References
External links
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Mango tree diseases
mortonii |
https://en.wikipedia.org/wiki/Phyllosticta%20palmetto | Phyllosticta palmetto is a fungal plant pathogen infecting coconuts.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Coconut palm diseases
palmetto |
https://en.wikipedia.org/wiki/Phyllosticta%20penicillariae | Phyllosticta penicillariae is a fungal plant pathogen infecting pearl millet.
References
External links
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Pearl millet diseases
penicillariae
Fungi described in 1914 |
https://en.wikipedia.org/wiki/Phyllosticta%20platani | Phyllosticta platani is a fungal plant pathogen infecting plane trees. It is found in Eastern North America and Europe.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal tree pathogens and diseases
platani
Fungi described in 1878 |
https://en.wikipedia.org/wiki/Phyllosticta%20pseudocapsici | Phyllosticta pseudocapsici is a fungal plant pathogen infecting Jerusalem cherries.
References
External links
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Ornamental plant pathogens and diseases
pseudocapsici
Fungi described in 1882
Taxa named by Casimir Roumeguère |
https://en.wikipedia.org/wiki/Phyllosticta%20theae | Phyllosticta theae is a fungal plant pathogen infecting tea.
References
External links
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Tea diseases
theae
Fungi described in 1904 |
https://en.wikipedia.org/wiki/Phyllosticta%20theicola | Phyllosticta theicola is a fungal plant pathogen infecting tea.
References
External links
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Tea diseases
theicola
Fungi described in 1926 |
https://en.wikipedia.org/wiki/WCAC-LD | WCAC-LD, virtual and UHF digital channel 33, is a low-power independent television station licensed to LaGrange, Georgia, United States. The station is owned by BeeTV Network, LLC. WCAC-LD's transmitter is located on Campbell Street north of downtown La Grange.
The station began broadcasting in 1989 as WJCN-LD.
In 2021, Community Network Television sold WJCN-LD to BeeTV Network, LLC. The founder of BeeTV, April Ross, had interned at the then-WJCN-LD in college and previously worked at WRBL in Columbus, Georgia.
References
External links
Television channels and stations established in 1989
1989 establishments in Georgia (U.S. state)
CAC-LD
Low-power television stations in Georgia (U.S. state)
Companies based in Troup County, Georgia |
https://en.wikipedia.org/wiki/Nautilus%20%28video%20game%29 | Nautilus is a video game for the Atari 8-bit family of home computers created by Mike Potter and published by Synapse Software in 1982. The players control a submarine, the Nautilus, or a destroyer, the Colossus, attempting to either destroy or rebuild an underwater city. The game the first to feature a "split screen" display to allow both players to move at the same time.
Gameplay
Nautilus starts with player one in control of the submarine, visible in the lower pane of the split-screen display. The joystick allows the player to move left and right or rise and sink. The player can shoot their Thunderbolt torpedoes to the right or left in the direction of travel. The primary task for the player is to move into location beside the various underwater buildings and destroy them with their torpedoes in order to expose their energy core, which can be picked up by moving over it. The player wins the level by collecting all of the cores.
Player two, or the computer player in a single-player game, controls the destroyer, visible in the upper pane. The ship's primary task is to ferry repair crews from the right side of the map back to the left, dropping them into an elevator that takes them to the bottom of the ocean. From there they quickly move back towards the right through a tube on the ocean floor, instantly repairing the buildings directly above them as they pass. The destroyer also drops depth charges and Barracuda missiles that attack the submarine. The missiles track the submarine and can be killed by hitting them with five torpedoes. Frogmen with limpet mines randomly appear on the sea bed and track the submarine if it passes over them. These are relatively easy to dodge in most cases, and can be killed by shooting them five times. The most dangerous enemy is normally the construction crew, who may fix one of the buildings while the Nautilus is inside, retrieving the core.
Both the Nautilus and Colossus have a sonar system that indicates the direction to the other ship. When the two are aligned vertically the display turns red and a warning horn sounds.
In two-player mode the actions of the destroyer are relatively limited. The delay between dropping charges and them reaching the submarine is enough to allow the sub to destroy an average building before they arrive, so the ship cannot easily directly attack the sub in order to prevent it from winning. This forces it to act as a ferry for the repair crews.
Reception
Nautilus was lauded at the time of its release, with Creative Computing calling it a "tour de force", and judges at the 4th annual Arkie Awards granting it a Certificate of Merit in the category of "Most Innovative Computer Game". In an article about Synapse, an InfoWorld author noted no one was examining their highly rated relational database program, in favour of watching a game of Nautilus being played.
Grant Butenhoff reviewed the game for Computer Gaming World, and stated that "Truly, Synapse has produced another top rate g |
https://en.wikipedia.org/wiki/Cyclohexane%20%28data%20page%29 | This page provides supplementary chemical data on cyclohexane.
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. It is highly recommend that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source and follow its directions.
Sigma Aldrich
SIRI
Science Stuff
Fisher Scientific
Structure and properties
Thermodynamic properties
Vapor pressure of liquid
Table data obtained from CRC Handbook of Chemistry and Physics 44th ed. The "(s)" annotation indicates equilibrium temperature of vapor over solid. Otherwise value is equilibrium temperature of vapor over liquid.
Distillation data
Spectral data
References
Chemical data pages
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/Nonstop | Nonstop or non-stop may refer to:
Computing
NonStop (server computers), a fault-tolerant computer architecture by Tandem Computers (later Compaq, now Hewlett-Packard)
NonStop SQL, relational database software by Tandem Computers (later Compaq, now Hewlett-Packard)
UnixWare NonStop Clusters, a fault tolerant computer system sold by SCO
Film and TV
Non-Stop (2013 film), starring Lacey Chabert
Non-Stop (film) (2014), starring Liam Neeson
Cozi TV, a network of digital subchannels on NBC's owned-and-operated television stations formerly known as NBC Nonstop
Nonstop (South Korean TV series), a South Korean sitcom, 2000-2006
Nonstop (Chinese TV series), the Chinese version of the South Korean sitcom, 2009
Non-Stop (France), 6-hour-daily live news show on BFMTV
Music
Nonstop (band), a Portuguese girl band
Albums
Nonstop!, James Brown album
Nonstop (Vocal Point album)
NonStop (Fun Factory album)
Non Stop (Julio Iglesias album)
Non Stop (Reflex album)
Non-Stop (Andy Bell album)
Non-Stop (B. T. Express album)
Nonstop (EP), an EP by Oh My Girl, or the title song
XXV Nonstop, by Sick of It All
Songs
"Nonstop", a song by Drake
"Non Stop", a song by Exo from the album Obsession
"Non-Stop", a song from the musical Hamilton
"Non-Stop", a song by the Human League from the 1981 single "Open Your Heart"
"Nonstop", an instrumental piano solo by Juan María Solare
Other uses
Non-Stop (novel), a 1958 science fiction novel by Brian Aldiss
24/7 service, a service available at all times
Non-stop decay, cellular mechanism to prevent translation of mRNA molecules lacking a stop codon
Non-stop flight, an airplane flight with no intermediate stops |
https://en.wikipedia.org/wiki/Transport%20in%20Leeds | Transport within Leeds consists of road, bus and rail networks. Leeds railway station is one of the busiest in Britain, and Leeds is connected to the national road network via the A1(M) motorway, M1 motorway and M62 motorway. The city is served by Leeds Bradford Airport.
Leeds has less extensive public transport coverage than other UK cities of comparable size, and is the largest city in Europe without any form of light rail or underground.
Rail
The rail network is of great importance. Leeds railway station on New Station Street is one of the busiest in the UK outside central London, with around 1,000 trains serving more than 100,000 passengers who pass through the main ticket gates daily. Its modern interior provides connections to Birmingham, Bristol, Exeter, Newcastle via CrossCountry. Edinburgh and the north can be accessed via CrossCountry or London North Eastern Railway services to Aberdeen, although changes are often required at York or Newcastle. Manchester, Liverpool and the west are accessible by TransPennine Express, as are Scarborough and Hull in the east. There is a large commuter rail network co-ordinated by Metro and operated by Northern to many villages, towns and cities in the city region.
The station has 18 platforms, making it the largest in England outside London, and the second largest, after Edinburgh Waverley, in the UK, having been rebuilt from 12 platforms in 2001 at a cost of £265 million.
From Leeds, West Yorkshire Metro trains operated by Northern operate to all parts of West Yorkshire and surrounding local and commuter locations and other operators including CrossCountry, London North Eastern Railway and TransPennine Express operate services to the rest of the country.
Leeds is connected to London via the electrified East Coast Main Line which operates half-hourly through the day. This service terminates at London Kings Cross.
Railway stations in Leeds
Leeds
Bramley
Burley Park
Cross Gates
Cottingley
East Garforth
Garforth
Guiseley
Headingley
Horsforth
Kirkstall Forge
Micklefield
Morley
New Pudsey
Woodlesford
Closed railway stations
Marsh Lane
Leeds Wellington
Leeds New
Leeds Whitehall
Leeds Central
Newlay
Kirkstall
Hunslet Station
Hunslet Lane
Holbeck
Armley Moor
Armley Canal Road
Beeston
Pendas Way
Scholes
Kippax
Otley
Pool-in-Wharfedale
Arthington
Stanningley
Pudsey Lowtown
Pudsey Greenside
Calverley
High Speed rail and Leeds New Lane
Publication of the proposed route of the second phase of High Speed 2 on 28 January 2013 revealed that the station at Leeds would be a new terminus called Leeds New Lane, connected to Leeds station by pedestrian walkways, possibly with moving walkways. However, following a review in November 2015, there have also been proposals to instead add the HS2 platforms as an extension to the existing Leeds station. On 18 November 2021 the UK government confirmed that the Leeds leg of HS2 would be scrapped, favouring instead investment in a mass transit system.
Middleton Steam Ra |
https://en.wikipedia.org/wiki/Bit%20numbering | In computing, bit numbering is the convention used to identify the bit positions in a binary number.
Bit significance and indexing
In computing, the least significant bit (LSb) is the bit position in a binary integer representing the binary 1s place of the integer. Similarly, the most significant bit (MSb) represents the highest-order place of the binary integer. The LSb is sometimes referred to as the low-order bit or right-most bit, due to the convention in positional notation of writing less significant digits further to the right. The MSb is similarly referred to as the high-order bit or left-most bit. In both cases, the LSb and MSb correlate directly to the least significant digit and most significant digit of a decimal integer.
Bit indexing correlates to the positional notation of the value in base 2. For this reason, bit index is not affected by how the value is stored on the device, such as the value's byte order. Rather, it is a property of the numeric value in binary itself. This is often utilized in programming via bit shifting: A value of 1 << n corresponds to the nth bit of a binary integer (with a value of 2n).
Least significant bit in digital steganography
In digital steganography, sensitive messages may be concealed by manipulating and storing information in the least significant bits of an image or a sound file. The user may later recover this information by extracting the least significant bits of the manipulated pixels to recover the original message. This allows the storage or transfer of digital information to remain concealed.
Unsigned integer example
This table illustrates an example of decimal value of 149 and the location of LSb. In this particular example, the position of unit value (decimal 1 or 0) is located in bit position 0 (n = 0). MSb stands for most significant bit, while LSb stands for least significant bit.
Most- vs least-significant bit first
The expressions most significant bit first and least significant bit at last are indications on the ordering of the sequence of the bits in the bytes sent over a wire in a serial transmission protocol or in a stream (e.g. an audio stream).
Most significant bit first means that the most significant bit will arrive first: hence e.g. the hexadecimal number 0x12, 00010010 in binary representation, will arrive as the sequence 0 0 0 1 0 0 1 0 .
Least significant bit first means that the least significant bit will arrive first: hence e.g. the same hexadecimal number 0x12, again 00010010 in binary representation, will arrive as the (reversed) sequence 0 1 0 0 1 0 0 0.
LSb 0 bit numbering
When the bit numbering starts at zero for the least significant bit (LSb) the numbering scheme is called LSb 0. This bit numbering method has the advantage that for any unsigned number the value of the number can be calculated by using exponentiation with the bit number and a base of 2. The value of an unsigned binary integer is therefore
where bi denotes the value of the bit with n |
https://en.wikipedia.org/wiki/Strasbourg%20tramway | The Strasbourg tramway (, ; ), run by the CTS, is a network of six tramlines, A, B, C, D, E and F that operate in the cities of Strasbourg in Alsace, France, and Kehl in Baden-Württemberg, Germany. It is one of the few tram networks to cross an international border, along with the trams of Basel and Geneva. The first tramline in Strasbourg, which was originally horse-drawn, opened in 1878. After 1894, when an electric-powered tram system was introduced, a widespread network of tramways was built, including several longer-distance lines on both sides of the Rhine.
Use of the system declined from the 1930s onwards, and the service closed in 1960 in parallel with many other tramways at the time. However, a strategic reconsideration of the city's public transport requirements led to the reconstruction of the system, a development whose success led to other large French cities reopening their tramways, such as Montpellier and Nice. Lines A and D were opened in 1994, lines B and C were opened in 2000, line E was opened in 2007 and line F was opened in 2010. It is regarded as a remarkable example of the tramway's rebirth in the 1990s. Together with the success seen in Nantes since 1985, the Strasbourg experiment resulted in the construction of tramways in multiple other French urban areas, and the expansion of tramway systems remains an ongoing project in Strasbourg and throughout France. Since 2017, the tram system also reaches Kehl on the right bank of the Rhine, in Germany. While the prior tram network also included such a Rhine-crossing line at times, this section of the Rhine did not form the border between France and Germany from 1871 to the end of World War I and during World War II when Alsace (including Strasbourg) was annexed to Germany.
History
The first tram line in Strasbourg, which was originally horse-drawn, opened in 1878. After 1894, when an electric-powered tram system was introduced, a widespread network of tramways was built in the largest city of Alsace, including also several longer-distance lines on both sides of the Rhine. The decline of the tramways system began in the 1930s, and ended with the retirement of the service in 1960. After a long drawn out communal political decision process, the tram was reintroduced in 1994. As part of the redevelopment of the city, a track of a total 33 km distance was built, on which 5 tram line services have been developed.
Horse-drawn trams
On 5 April 1877 the Strasbourg Horse Railway Company ("Straßburger Pferde-Eisenbahngesellschaft") was founded, and the name changed on 25 April 1888 to the Strasbourg Tramway Company ("Straßburger Straßenbahngesellschaft"). Since May 1897, the AEG electrical manufacturing company was the main shareholder. In 1912 the company was transferred to the possession of the city of Strasbourg. When Alsace became part of France in November 1918, the name of the company was translated into French, "Compagnie des tramways strasbourgeois" (CTS). In this for |
https://en.wikipedia.org/wiki/Capnodium%20footii | Capnodium footii is a sooty mold that develops in coconut leaves.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Coconut palm diseases
Leaf diseases
Capnodiaceae
Fungi described in 1849
Taxa named by Miles Joseph Berkeley
Taxa named by John Baptiste Henri Joseph Desmazières |
https://en.wikipedia.org/wiki/Tripospermum%20acerinum | Tripospermum acerinum is a plant pathogen infecting mangoes.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal tree pathogens and diseases
Mango tree diseases
Capnodiaceae
Fungi described in 1918
Taxa named by Paul Sydow |
https://en.wikipedia.org/wiki/Lyon%20tramway | The Lyon tramway () comprises eight lines, seven lines operated by TCL and one by Rhônexpress in the city of Lyon in Auvergne-Rhône-Alpes, France. The original tramway network in Lyon was developed in 1879, and the modern network was built in 2001.
Lines T1 and T2 opened in January 2001; T3 opened in December 2006; line T4 opened in April 2009; line Rhônexpress (airport connector) opened in August 2010; line T5 opened in November 2012; line T6 opened in November 2019 and line T7 opened in February 2021. The tramway system complements the Lyon Metro and forms an integral part of the public transportation system (TCL) in Lyon. The network of 7 tram lines (T1-T7) operated by TCL runs ; the single line operated by Rhônexpress runs for (including approximately shared with the T3 tram line). The network is currently served by 73 Alstom Citadis 302 and 34 Alstom Citadis 402 trams.
Line T1 extends from Debourg to La Doua–IUT Feyssine via Perrache, Gare Part-Dieu–Vivier Merle and Charpennes. Line T2 runs from Hôtel de Région–Montrochet to Saint-Priest - Bel-Air via Perrache, Jean Macé, Grange Blanche and Porte des Alpes. Line T3 goes from Gare Part-Dieu–Villette to Meyzieu–ZI (on weekends) and Meyzieu–Les Panettes (on weekdays) via Vaulx-en-Velin–La Soie. Line T4 runs from La Doua–Gaston Berger to Hôpital Feyzin Vénissieux via Charpennes, Gare Part-Dieu–Villette, Jet d'Eau–Mendès France and Gare de Vénissieux. Line T5 runs from Grange Blanche to Eurexpo. Line T6 runs from Debourg to Hôpitaux Est–Pinel via Beauvisage–CISL, Mermoz–Pinel and Desgenettes. Line T7 links Vaulx-en-Velin–La Soie to Décines–OL Vallée.
History: the original network (1879 - 1957)
The first steam-driven tram line, the number 12, linked Lyon and Vénissieux in 1888. The network was electrified between 1893 and 1899. Extensions to the suburbs were built until 1914. This was the height of the network - high quality service, low price, high frequency and high profitability for shareholders. The inflation between World War I and World War II made the network unprofitable. Beginning in the 1930s, tramways were progressively replaced with trolleybuses and later buses. A modernization plan, including underground sections in the city centre, planned in the 1940s was rapidly abandoned. The last urban tram ran on line 4 in January 1956 and the last suburban tram, the "Train bleu" in Neuville-sur-Saône, was abandoned in June 1957.
Original OTL network
The first tram network was built and operated by the Compagnie des Omnibus et tramways de Lyon (OTL), founded in 1879. It consisted of ten (standard gauge), horse-drawn lines with a total length of 44 km serving Lyon, Villeurbanne, La Mulatière et Oullins .
In 1894, new electric trams were in service with these lines:
1 : Bellecour – Monplaisir via Pont de la Guillotière and Grande Rue de la Guillotière
2 : Bellecour – Montchat
3 : Cordeliers – Villeurbanne
4 : Parc de la Tête d'or – La Mouche (now Jean Macé), extended to Perrache
5 : |
https://en.wikipedia.org/wiki/Carbon%20disulfide%20%28data%20page%29 | This page provides supplementary chemical data on carbon disulfide.
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. It is highly recommended that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source such as SIRI, and follow its direction. MSDS available from Mallinckrodt Baker
Structure and properties
Thermodynamic properties
Vapor pressure of liquid
Table data obtained from CRC Handbook of Chemistry and Physics 44th ed.
Distillation data
Spectral data
References
Chemical data pages
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/Lake%20Crescent%20cutthroat%20trout | {{Taxobox
| name = Lake Crescent cutthroat trout
| image = Lake_Crescent_Cutthroat_Trout.jpg
| image_caption = Crescenti Cutthroat trout
| regnum = Animalia
| phylum = Chordata
| classis = Actinopterygii
| ordo = Salmoniformes
| familia = Salmonidae
| genus = Oncorhynchus
| species = O. clarkii
| subspecies = O. c. clarkii (but see text)
| forma = Oncorhynchus clarkii clarkii f. crescenti
| synonyms = Oncorhynchus clarkii crescenti
}}
The Crescenti cutthroat trout or the Lake Crescent cutthroat trout is a North American freshwater fish, a local form (f. loc.) of the coastal cutthroat trout (Oncorhynchus clarkii clarkii) isolated in Lake Crescent in Washington. While previously attributed to a distinct subspecies Oncorhynchus clarkii crescenti'', it is not currently recognized at the subspecies rank. However the cutthroat trout of Lake Crescent do remain distinct. They have the highest known gill raker and vertebrae counts of any coastal cutthroat population. The cutthroat are believed to have been isolated in Lake Crescent after a landslide blocked the eastern outflow of the lake.
Before the introduction of non-native trout to the lake, these fish co-existed with the lake's population of coastal rainbow trout known as Beardslee trout. The cutthroat mostly used the lake's inlet stream Barnes Creek for spawning, while the rainbow trout used the Lyre River for spawning. However, in the early 1980s a small cutthroat population was found in the Lyre River that spawns further downstream than the native rainbow trout. Today the cutthroat of Barnes Creek have been hybridized with introduced rainbow into cutbows, but Crescenti cutthroat trout persist in the Lyre River as a genetically pure population (Behnke 1992). A Crescenti cutthroat caught in 1961 set the state record for cutthroats at and .
Notes
Further reading
Oncorhynchus
Cold water fish
Endemic fauna of Washington (state)
Endemic fish of the United States
Fish of the Western United States
Freshwater fish of the United States |
https://en.wikipedia.org/wiki/IMDG | IMDG may refer to:
International Maritime Dangerous Goods Code
In-memory data grid, such as Hazelcast
An imidazol molecule |
https://en.wikipedia.org/wiki/Genie%20Backup%20Manager | Genie Backup Manager, developed by Genie-soft Inc, is a backup software for Microsoft Windows operating systems that can back up and restore the whole system (operating system, applications, documents, e-mails, settings, files/folders, etc.) to many local and remote devices including internal and external hard disks, Iomega REV Disks, FTP locations, online, across network, and removable media.
The software has two interfaces, a "normal" interface and a "simple" interface, which has a more appealing appearance but fewer advanced options. The software permits backups in standard .zip files or a proprietary format, the latter of which includes an encryption option. An optional supplementary piece of software permits backups of open files.
Criticism
The same backup platform is run under different names by the same owner, Muayyad (Mo) Fahed Shehadeh. For example, Zoolz, BigMIND and PolarBackup are the most popular. This company has a history of offering cheap "lifetime" backups only to renege on them later. Instead of offering to transfer to another platform, even one that sells the same backup service, they send emails that apologize and then encourage the customer to now purchase another premium plan that will be billed monthly. They will only provide a complete refund if you purchased a "lifetime" backup plan within the last 30 days. It is understood that many will feel forced to do this because they already have all their information backed up with Genie. For years, some have been trying to warn others about this company and their practices. Many consider this a bait and switch. Others describe this as "fraud" and a "scam."
See also
List of backup software
References
Reviews
PC World Magazine, June 21, 2006
PC Magazine March 14, 2008
External links
Background information:
Backup software for Windows |
https://en.wikipedia.org/wiki/PPML | PPML (Personalized Print Markup Language) is an XML-based industry standard printer language for variable data printing defined by PODi. The industry-wide consortium of 13 companies was initially formed to create PPML, and now has more than 400 member companies.
Overview
PPML is an open, inter-operable, device-independent standard first released in 2000 to enable the widespread use of personalized print applications. PPML is made to enable efficient production printing of variable data; rather than sending 300 copies of the same data with only a name changed, PPML is designed to allow all the data to be sent to the printer at once, allowing for much faster printing, as data does not need to be transferred to the printer for each copy.
High-volume print jobs are getting more complex due to higher demands for the layout, content and personalization of documents. This is particularly true in the case of "image-swapping", where different images are selected and replaced on a record-by-record basis. At the same time pressure on the operators at the machines is increasing. A third development relates to the rise of XML, as a neutral basis for multi-channel communication of documents to fax, internet, e-mail, electronic archive and printer.
Personalized Print Markup Language (PPML) is the print industry's answer to these developments. PPML strongly reduces the complexity of the print-job, especially when color, images and personalized elements are being used. The RIP (describing the contents of a page in a rasterized image) is a lot faster.
The Printing On Demand Initiative (PODi) is responsible for the concept and development of this new PPML standard. This platform combines all major suppliers in this market, with the initial development completed by Adobe Systems, EFI, CreoScitex, Hewlett-Packard, Kodak Nexpress, Xerox, IBM, Lexmark, Océ, XMPie, PageFlex, Printable, QuarkXPress, Kodak GCG Inkjet Printing Systems, and Xeikon working together as members of PODI.
Reusable Content
The traditional printer languages retrieve a page, examine what is on it and start to create rasterized images to tell the printer device what is where and how it should be put on paper. This is repeated for every single page. High-volume print jobs easily contain tens of thousands of pages that all have to be RIPped. RIPping can become a problem if one realizes that a page with a color photo and a logo can reach a size of as much as 20 MB in PostScript. This costs an exceptional amount of processing power and memory space and is the most important cause of print processes running aground. This is why rated engine speeds are often not met and machines may be RIPping all night to be able to produce at a reasonable speed during the day.
This bottleneck in printing can be solved by specifying reusable content. Reusable content items are things that are used on many of the pages. Reusable content can be fonts (letter types), logos (in all sorts of formats), signatures ( |
https://en.wikipedia.org/wiki/Agent-oriented%20software%20engineering | Agent-Oriented Software Engineering (AOSE) is a new software engineering paradigm that arose to apply best practice in the development of complex Multi-Agent Systems (MAS) by focusing on the use of agents, and organizations (communities) of agents as the main abstractions. The field of Software Product Lines (SPL) covers all the software development lifecycle necessary to develop a family of products where the derivation of concrete products is made systematically and rapidly.
Commentary
With the advent of biologically inspired, pervasive, and autonomic computing, the advantages of, and necessity of, agent-based technologies and MASs has become obvious. Unfortunately, current AOSE methodologies are dedicated to developing single MASs. Clearly, many MASs will make use of significantly the
same techniques, adaptations, and approaches. The field is thus ripe for exploiting the benefits of SPL: reduced costs, improved time-to-market, etc. and enhancing agent technology in such a way that it is more industrially applicable.
Multiagent Systems Product Lines (MAS-PL) is a research field devoted to combining the two approaches: applying the SPL philosophy for building a MAS. This will afford all of the advantages of SPLs and make MAS development more practical.
References
Michael Winikoff and Lin Padgham. Agent Oriented Software Engineering. Chapter 15 (pages 695-757) In G. Weiss (Ed.). Multiagent Systems. 2nd Edition. MIT Press. (a recent survey of the field)
Site of the MaCMAS methodology which is applying MAS-PL. http://www.macmas.org
MAS Product Lines site: https://web.archive.org/web/20140518122645/http://mas-productlines.org/
Joaquin Peña, Michael G. Hinchey, and Antonio Ruiz-Cortés. Multiagent system product lines: Challenges and benefits. Communications of the ACM, December 2006, volume 49, issue number 12.
Joaquin Peña, Michael G. Hinchey, Antonio Ruiz-Cortés, and Pablo Trinidad. Building the Core Architecture of a NASA Multiagent System Product Line. In 7th International Workshop on Agent Oriented Software Engineering 2006, page to be published, Hakodate, Japan, May 2006. LNCS. https://doi.org/10.1007%2F978-3-540-70945-9_13
Joaquin Peña, Michael G. Hinchey, Manuel Resinas, Roy Sterritt, James L. Rash. Managing the Evolution of an Enterprise Architecture using a MAS-Product-Line Approach. 5th Int. Workshop on System/Software Architectures (IWSSA’06). Nevada, USA. 2006
Soe-Tsyr Yuan. MAS Building Environments with Product-Line-Architecture Awareness.
Josh_Dehlinger and Robyn Lutz have several publications in this field.
MAS-PL -- Current research. In THE FOURTH TECHNICAL FORUM (TF4) of AgentLink. December 2006.
Software project management |
https://en.wikipedia.org/wiki/IPython | IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language, that offers introspection, rich media, shell syntax, tab completion, and history. IPython provides the following features:
Interactive shells (terminal and Qt-based).
A browser-based notebook interface with support for code, text, mathematical expressions, inline plots and other media.
Support for interactive data visualization and use of GUI toolkits.
Flexible, embeddable interpreters to load into one's own projects.
Tools for parallel computing.
IPython is a NumFOCUS fiscally sponsored project.
Parallel computing
IPython is based on an architecture that provides parallel and distributed computing. IPython enables parallel applications to be developed, executed, debugged and monitored interactively, hence the I (Interactive) in IPython. This architecture abstracts out parallelism, enabling IPython to support many different styles of parallelism including:
Single program, multiple data (SPMD) parallelism
Multiple program, multiple data (MPMD) parallelism
Message passing using MPI
Task parallelism
Data parallelism
Combinations of these approaches
Custom user defined approaches
With the release of IPython 4.0, the parallel computing capabilities were made optional and released under the ipyparallel python package. And most of the capabilities of ipyparallel are now covered by more mature libraries like Dask.
IPython frequently draws from SciPy stack libraries like NumPy and SciPy, often installed alongside one of many Scientific Python distributions. IPython provides integration with some libraries of the SciPy stack, notably matplotlib, producing inline graphs when used with the Jupyter notebook. Python libraries can implement IPython specific hooks to customize rich object display. SymPy for example implements rendering of mathematical expressions as rendered LaTeX when used within IPython context, and Pandas dataframe use an HTML representation.
Other features
IPython allows non-blocking interaction with Tkinter, PyGTK, PyQt/PySide and wxPython (the standard Python shell only allows interaction with Tkinter). IPython can interactively manage parallel computing clusters using asynchronous status callbacks and/or MPI. IPython can also be used as a system shell replacement. Its default behavior is largely similar to Unix shells, but it allows customization and the flexibility of executing code in a live Python environment.
End of Python 2 support
IPython 5.x (Long Time Support) series is the last version of IPython to support Python 2. The IPython project pledged to not support Python 2 beyond 2020 by being one of the first projects to join the Python 3 Statement, the 6.x series is only compatible with Python 3 and above. It is still possible though to run an IPython kernel and a Jupyter Notebook server on different Python versions allowing users to still acces |
https://en.wikipedia.org/wiki/Gilbertella%20persicaria | Gilbertella persicaria is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Zygomycota
Fungal plant pathogens and diseases
Fungi described in 1925 |
https://en.wikipedia.org/wiki/Claviceps%20fusiformis | Claviceps fusiformis is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Clavicipitaceae
Fungi described in 1967 |
https://en.wikipedia.org/wiki/Chrysomyxa%20piperiana | Chrysomyxa piperiana is a plant pathogen.
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
piperiana
Fungi described in 1925 |
https://en.wikipedia.org/wiki/Chrysomyxa%20roanensis | Chrysomyxa roanensis is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Teliomycotina
Fungi described in 1934 |
https://en.wikipedia.org/wiki/Corticium%20theae | Corticium theae is fungus that is a plant pathogen.
References
Further reading
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Corticiales |
https://en.wikipedia.org/wiki/Speech%20corpus | A speech corpus (or spoken corpus) is a database of speech audio files and text transcriptions.
In speech technology, speech corpora are used, among other things, to create acoustic models (which can then be used with a speech recognition or speaker identification engine).
In linguistics, spoken corpora are used to do research into phonetic, conversation analysis, dialectology and other fields.
A corpus is one such database. Corpora is the plural of corpus (i.e. it is many such databases).
There are two types of Speech Corpora:
Read Speech – which includes:
Book excerpts
Broadcast news
Lists of words
Sequences of numbers
Spontaneous Speech – which includes:
Dialogs – between two or more people (includes meetings; one such corpus is the KEC);
Narratives – a person telling a story (one such corpus is the Buckeye Corpus);
Map-tasks – one person explains a route on a map to another;
Appointment-tasks – two people try to find a common meeting time based on individual schedules.
A special kind of speech corpora are non-native speech databases that contain speech with foreign accent.
See also
Arabic Speech Corpus
Common Voice
EXMARaLDA
Lingua Libre, an online libre tool
List of children's speech corpora
Non-native speech database
Praat
Spoken English Corpus
The BABEL Speech Corpus
TIMIT
Transcriber
Transcription (linguistics)
References
Edwards, Jane / Lampert, Martin (eds.) (1992): Talking Data – Transcription and Coding in Discourse Research. Hillsdale: Erlbaum.
Leech, Geoffrey / Myers, Greg / Thomas, Jenny (eds.) (1995): Spoken English on Computer: Transcription, Markup and Application. Harlow: Longman.
External links
Santa Barbara Corpus of Spoken American English
Buckeye Corpus The Buckeye Corpus of Conversational Speech
The KEC -- The Karl Eberhards Corpus of spontaneously spoken southern German in dialogues - audio and articulatory recordings
Spoken Language Corpora at the Research Center on Multilingualism
The Spoken Turkish Corpus at METU Ankara
Spoken Corpus Klient with the Corp-Oral Corpus at ILTEC Lisbon
VoxForge – open source speech corpora
OLAC: Open Language Archives Community
BAS Bavarian Archive for Speech Signals
Simmortel Speech Recognition Corpus for Indian English and Hindi
ELRA: the European Language Resources Association
The PELCRA Conversational Corpus of Polish
The Arabic Speech Corpus
Corpus of Political Speeches : Free access to political speeches by American and Chinese politicians, developed by Hong Kong Baptist University Library
Large Multimodal Corpus of Human Speech
Corpora
Corpus linguistics
Speech recognition
Dialectology
Phonetics
Language documentation
de:Textkorpus |
https://en.wikipedia.org/wiki/Reia | Reia may refer to:
Rhea (mythology)
Reia, Mozambique
Reia (programming language) |
https://en.wikipedia.org/wiki/Application%20delivery%20controller | An application delivery controller (ADC) is a computer network device in a datacenter, often part of an application delivery network (ADN), that helps perform common tasks, such as those done by web accelerators to remove load from the web servers themselves. Many also provide load balancing. ADCs are often placed in the DMZ, between the outer firewall or router and a web farm.
Features
An Application Delivery Controller (ADC) is a type of server that provides a variety of services designed to optimize the distribution of load being handled by backend content servers. An ADC directs web request traffic to optimal data sources in order to remove unnecessary load from web servers. To accomplish this, an ADC includes many OSI layer 3-7 services, including load-balancing.
ADCs are intended to be deployed within the DMZ of a computer server cluster hosting web applications and/or services. In this sense, an ADC can be envisioned as a drop-in load balancer replacement. But that is where the similarities end. When an ADC receives a web request from an external host, it enacts the following process (assuming all features exist and are enabled):
Serve as TLS endpoint for the cluster and decrypt incoming requests (HTTPS-only).
Examine the Request URI and determine the type of resource being requested.
Verify that the entity making the request is authorized to access the given URI.
Perform any URI translation, if applicable.
Lookup the pool of hosts associated with that resource type (e.g. image, stylesheet, HTML, etc).
In the case of login requests, the request may be translated, rather than simply forwarded, to an instance within a pool of authentication servers.
In the case of static objects, the ADC may serve the object directly from its own internal cache or direct it to a dedicated static object repository.
Maintain a table describing the health of the servers in every pool via one of several methods (e.g. average response time).
Forward the request to the server within the target pool with the best health score.
Features commonly found in ADCs include:
Traffic Shaping
SSL/TLS offloading
Web Application Firewall
DNS
Reverse Proxy
API Gateway
HTTP Content Redirection
Server Health Monitoring
Payload Compression/Decompression
A/B Testing
Facilitation of zero-downtime server maintenance cycles (by temporarily removing servers being upgraded from their respective pool)
Authorization & Access Control (but typically does not include Authentication)
In the context of Telco infrastructure, an ADC could provide access control services for a Gi-LAN area.
History
Starting around 2004, first generation ADCs offered simple application acceleration and load balancing.
In 2006, ADCs began to mature when they began featuring advanced applications services such as compression, caching, connection multiplexing, traffic shaping, application layer security, SSL offload, and content switching, combined with services like server load balancin |
https://en.wikipedia.org/wiki/Nitromethane%20%28data%20page%29 | This page provides supplementary chemical data on nitromethane.
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. MSDS is available from Mallinckrodt Baker.
Structure and properties
Thermodynamic properties
Vapor pressure of liquid
Table data obtained from CRC Handbook of Chemistry and Physics 44th ed.
Distillation data
Spectral data
References
Cited sources
Further reading
Chemical data pages
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/Thomas%20Zacharia | Thomas Zacharia (born 1957 in Kerala, India) is an Indian-born American computer scientist. He received his bachelor's degree in mechanical engineering from National Institute of Technology, Karnataka in 1980 and a master's degree in Materials Science from the University of Mississippi in 1984. He obtained his doctoral degree from Clarkson University in 1987.
He has contributed to research in computational materials science, particularly on Marangoni Effect in solidification processes. He previously served as the executive vice president and chief port officer captain at Qatar Science & Technology Park at Qatar Foundation.
Zacharia was previously deputy director for science and technology at Oak Ridge National Laboratory and a professor at the University of Tennessee.
On June 1, 2017, UT-Battelle named Zacharia as ORNL's new laboratory director. He succeeds Thom Mason.
References
1957 births
Indian emigrants to the United States
Living people
American people of Malayali descent
Scientists from Kerala
Georgia Tech faculty
Oak Ridge National Laboratory people
University of Tennessee faculty
National Institute of Technology, Karnataka alumni
Qatar Foundation people |
https://en.wikipedia.org/wiki/Jon%20Gnagy | Jon Gnagy (January 13, 1907 – March 7, 1981) was a self-taught artist most remembered for being America's original television art instructor, hosting You Are an Artist, which began on the NBC network and included analysis of paintings from the Museum of Modern Art, and his later syndicated Learn to Draw series.
As of 1986, over fifteen million of Gnagy's drawing kits had been sold.
The Philadelphia-based Martin F. Weber Company still manufactures Gnagy's drawing kits.
Gnagy also worked on book illustrations including The Coit Fishing Pole Club Beginner's Book of Fishing and The Nature of Things.
Life and career
According to his 1947 instruction book, his TV program You Are an Artist "had at this writing by far the longest run of any program emanating from the NBC television studios." His biography, published in the catalogue of An Exhibition of Paintings and Litho-Drawings (Idyllwild, California, 1964), told of his early life:
Jon Gnagy, known to millions as America's television art teacher, was born at Varner's Forge, an outpost settlement near Pretty Prairie, Kansas, in 1907. The pioneer environment of his first seven years at the Forge and family farm reflect a strong influence in his work as an artist. Son of Hungarian-Swiss Mennonites, Jon early developed inventive skills common to rural craftsmen. At the age of eleven he began drawing and painting without instruction, winning sweepstake prizes at the Kansas State Fair in Hutchinson when he was 13 years old. Gaining attention each year at the State Fair as the self-taught "blacksmith" of art, his vigorous compositions of the American Scene brought him an offer from Tulsa, Oklahoma. When he was seventeen he accepted the position of art director with an industrial public relations organization in the Oil Capital, where he produced posters for the International Petroleum Exposition... Gnagy became well prepared for his role as one of the country's greatest audio-visual educators when television started beaming to the public on May 13th, 1946. His was the first performer on the first show the day the updated Channel 4 antenna (replacing NBC's old channel one antenna) was completed atop the Empire State Building. Since then the grassroots blacksmith's name has become a household friend to millions of people.
During the early part of World War II, Gnagy taught camouflage techniques at the Franklin Institute in Philadelphia.
On May 13, 1946, Jon Gnagy was the first "act" on the first television program broadcast from the new WNBT channel 4 antenna atop the Empire State Building. Gnagy pioneered drawing on television in the United States from the early 1950s throughout the 1960s on his program, Learn to Draw, and his popular art kits are still available.
His son-in-law, Thaddeus Seymour, was president of Rollins College from 1978 to 1990.
Legacy
Author and illustrator Richard Egielski, in the October 2011 issue of BookPage, described Gnagy as his childhood hero, writing, "I drew alo |
https://en.wikipedia.org/wiki/Syphon%20Filter%3A%20Logan%27s%20Shadow | Syphon Filter: Logan's Shadow is a third-person shooter stealth video game developed by Bend Studio and published by Sony Computer Entertainment for the PlayStation Portable and PlayStation 2. It is the sixth and final installment in the Syphon Filter franchise and a sequel to 2006's Syphon Filter: Dark Mirror.
Gameplay
Logan's Shadow is played from a third-person perspective. With the Havok physics, enemies and objects react realistically to gunfire and other means of interaction.
Logan's Shadow features weapons and gameplay mechanics new to the series. These include additions to the cover system such as side-to-side movement, leaning, and blind fire around obstacles and corners, an advanced melee system that allows Gabe to use enemies as human shields, regenerative health, and underwater combat.
Plot
When the al-Jamil terrorist group assaults the U.S. Navy spy ship USS Mt. St. Helens, the National Intelligence Oversight Committee must rely on the Agency to secure the classified material within a cargo hold before the antagonists acquire it. NIOC Director Robert Cordell convinces Gabe Logan that he is their only option, but Teresa Lipan counters that this is an assignment outside of Agency jurisdiction. Gabe agrees to go anyway, for a chance at stopping terrorist leader Ghassan al-Bitar, a Syrian he almost caught a year ago, and with whom he has a score to settle.
With his partner Lian Xing on vacation in Cyprus, Gabe flies to the Indian Ocean where a clan of Somali pirates called the Warsingala Protectors have invaded the ship. Bitar is leading them, and Gabe suspects this assault involves more than a mere pirating operation. Intercepting Spec Ops communications, pilot Alima Haddad warns Gabe that Cordell did not tell him everything, and Logan realises the contents of Hold Five, a secret even to the U.S. Navy, are Bitar's primary target.
Establishing a link to St. Helens communications dish, Alima attempts to extract Logan, but her helicopter is shot down. Despite Gabe's efforts, she dies. Frustrated and furious, Gabe destroys several pirate boats carrying stolen goods from St Helens and re-enters the ship via the damaged main hull. However, Bitar has already stolen the cargo inside Hold Five, which NIOC couriers ship.
When Gabe reaches the bridge, s with the Fifth Fleet have already begun launching cruise missiles to scuttle their own ship. He tries to stop Bitar from escaping, but terrorist Fahid Tamer distracts him. Gabe kills Fahid and escapes from the ship before it sinks. His return to the Agency brings more complications when Cordell mentions Lian was "never" in Cyprus, and produces pictures of her with a Chinese man, both in a foreign land. From Cordell's point of view, Lian being a defector or a double agent, the Agency would be compromised, and the NIOC suspends the IPCA.
Despite Teresa's reservations, and running out of options, Gabe enlists a marine salvage expert Dane Bishop to explore the sunken St Helens for NIOC courier |
https://en.wikipedia.org/wiki/List%20of%20South%20Park%20characters | South Park is an American animated television series created by Trey Parker and Matt Stone for the Comedy Central television network. The ongoing narrative revolves around four children, Stan Marsh, Kyle Broflovski, Eric Cartman, Kenny McCormick, and their bizarre adventures in and around the fictional Colorado town of South Park. The town is also home to an assortment of characters who make frequent appearances in the show such as students and their family members, elementary school staff, and recurring characters.
Stan is portrayed as the everyman of the group, as the show's official website describes him as "a normal, average, American, mixed-up kid". Kyle is the lone Jew among the group, and his portrayal in this role is often dealt with satirically. Stan and Kyle are best friends, and their relationship, which is intended to reflect the real-life friendship between South Park creators Trey Parker and Matt Stone, is a common topic throughout the series. Cartman—loud, obnoxious, and obese—is sometimes portrayed as the series' antihero and his antisemitic attitude has resulted in an ever-progressing rivalry with Kyle. Kenny, who comes from a poor family, wears his parka hood so tightly that it covers most of his face and muffles his speech. During the show's first five seasons, Kenny would die in almost every single episode before returning in the next without explanation.
Stone and Parker perform the voices of most of the male South Park characters. Mary Kay Bergman voiced the majority of the female characters until her death in 1999. Eliza Schneider (1999–2003), Mona Marshall (2000–present), April Stewart (2003–present) and Kimberly Brooks (2008–present) have voiced most of the female characters since. A few staff members such as Jennifer Howell, Vernon Chatman, John Hansen, and Adrien Beard have voiced other recurring characters.
Creation and inception
Following the success of the 1995 short Jesus vs. Santa, creators Trey Parker and Matt Stone conceived a plan to create a television series based on the short, with four children characters as the main stars. The series was originally set up at 20th Century Fox Television for its primetime premiere on FOX, which previously commissioned Parker and Stone to develop the short. However, FOX was not pleased with the show's inclusion of Mr. Hankey, a talking poo character, and felt it wouldn't bode well with viewers. The network's executives also said that placing kids as the stars could not be as funny and popular as it would with the grown-ups and families, like The Simpsons and King of the Hill.
As a result, Parker and Stone broke off relations with FOX and took the series somewhere else. They pitched the series to MTV and Comedy Central, and decided it was best suited for the latter, fearing the former could turn it to a more kid-friendly show later on. Comedy Central agreed to pick up the series, and the premiere episode, "Cartman Gets an Anal Probe", debuted on the network on August 13, |
https://en.wikipedia.org/wiki/List%20of%20diplomatic%20missions%20of%20Belgium | The Kingdom of Belgium is unique in having three networks of representation — one for the Belgian federal state, another for Dutch-speaking community and Flemish Region, and a third one for the French-speaking Community and the Walloon region, often comprising international missions of the Brussels-Capital Region and, more rarely, the German-speaking Community of Belgium. However officers representing the governments of the communities and Brussels, Flanders and Wallonia are usually co-located together with the diplomatic representation of Belgium, as most countries do not consider regions to be states.
Excluded from this listing are honorary consulates, representative offices of the communities and regions of Belgium, development offices, and trade missions. On the other hand, the trade mission in Taipei, known as the "Belgian Office, Taipei (BOT)" is included as it serves as a de facto embassy to Taiwan.
Current missions
Africa
Americas
Asia
Europe
Oceania
Multilateral organizations
Gallery
Closed missions
Africa
Americas
Asia
Europe
See also
Foreign relations of Belgium
List of diplomatic missions in Belgium
Visa policy of the Schengen Area
Notes
References
External links
Belgian Ministry of Foreign Affairs
Flanders Department of Foreign Affairs
Belgium
Diplomatic missions |
https://en.wikipedia.org/wiki/Super%20Doubles%20Tennis | Super Doubles Tennis is an arcade game released by Data East in 1983.
Gameplay
The game puts four players on a tennis match - two humans and two computer-controlled players. If one player decides to play without company, the computer takes the role of the player's partner.
Reception
In Japan, Game Machine listed Super Doubles Tennis on their November 1, 1983 issue as being the fourth most-successful new table arcade unit of the month.
References
External links
1983 video games
Arcade video games
Arcade-only video games
Data East video games
Tennis video games
Video games developed in Japan
Data East arcade games |
https://en.wikipedia.org/wiki/Framewave | Framewave (formerly AMD Performance Library (APL)) is computer software, a high-performance optimized programming library, consisting of low level application programming interfaces (APIs) for image processing, signal processing, JPEG, and video functions. These APIs are programmed with task level parallelization (multi-threading) and instruction-level parallelism single instruction, multiple data (SIMD) for maximum performance on multi-core processors from Advanced Micro Devices (AMD).
Framewave is free and open-source software released under the Apache License version 2.0, which is compatible with the GNU General Public License 3.0.
Overview
The AMD Performance Library was developed by Advanced Micro Devices (AMD) as a collection of popular software routines designed to accelerate application development, debugging, and optimization on x86 class processors. It includes simple arithmetic routines, and more complex functions for applications such as image and signal processing. APL is available as a static library for 32- or 64-bit versions of GNU Compiler Collection (GCC) 4.1 and Microsoft Visual Studio 2005, and as a 32- or 64-bit dynamic library for the operating systems Linux, Solaris, and Windows.
In 2008, AMD deprecated the APL library in favor of an open-source derivative named Framewave.
Framewave is available as 32- and 64-bit static libraries for GCC 4.3 and Microsoft Visual Studio 2008, and as 32- and 64-bit dynamic libraries for the operating systems Linux, macOS, Solaris, and Windows. Relative to Framewave 1.0, noticeable performance gains occurred in several APIs, including JPEG.
Features
Framewave consists of the following main components:
Simple interface to take advantage of latest hardware innovations
MMX
Streaming SIMD Extensions (SSE), SSE2
Multi-core processors
Faster development of multimedia projects
Media players
Codecs – including MPEG-1 and MPEG-2 decoders
Image editors
Audio applications
Easy path to multi-threading
APL 1.1
Released on 2007-09-19, APL 1.1 added these feature enhancements:
Video Decoding (H.264) support
JPEG support
AMD "Barcelona" quad-core processor optimizations
Support for Sun Studio compilers for Solaris
See also
AMD Core Math Library
Open64 - AMD has its own Open64 distribution that is tuned for AMD processors
Integrated Performance Primitives (IPP)
References
External links
Framewave main page
User's Guide
Using the New AMD Performance Library
AMD Performance Library: Blazing your Way to Glory
Framewave (SourceForge) main page
Framewave * Programming Reference in .pdf format
AMD software
Graphics libraries |
https://en.wikipedia.org/wiki/Festival%20d%27%C3%A9t%C3%A9%20de%20Qu%C3%A9bec | Festival d'été de Québec (FEQ) is the third biggest outdoor musical event in Canada. The event was held since 1968, the 11-day festival takes place every year in July. FEQ's programming includes many international stars and emerging artists from around the globe.
History
The festival has been taking place annually since 1968. The first editions were organized by a group of businesspersons and artists of Quebec City in order to show the artistic, economic, and tourist potential of the region. During the 1970s and 1980s, the festival specialized in musicians from the Francophonie and world music.
The festival grew substantially during the last decade after its decision to diversify its music offering and go after international headliners from genres across the board, including rock music, punk, hip hop, classical music, world music and electronic dance music.
The festival reached the million spectators mark for the first time in 2007 and sold-out passes for the first time in 2010.
This festival went on hiatus in 2020 due to the COVID-19 pandemic with the 53rd edition being deferred to 2021.
Since February 2022, the organization behind Festival d’été de Québec is named BLEUFEU.
Setting
The Bell Stage on the Plains of Abraham (Capacity of 100,000)
Parc Grande Allée (Capacity of 10,000; two stages in alternation)
The Loto-Quebec Stage (Left Side)
The SiriusXM Stage (Right Side)
The Hydro-Quebec Stage at Place de L'Assemblée-Nationale (Capacity of 2,000)
The Quebec City Armoury (indoors, for all Extra-FEQ concerts) (Capacity 1,000)
Main bands since 2011
2011: Elton John, Metallica, Avenged Sevenfold, The Black Keys, Dropkick Murphys, John Fogerty, Ben Harper, Simple Plan, Hollywood Undead.
2012: Bon Jovi, Aerosmith, Lionel Richie, LMFAO, The Offspring, Our Lady Peace, Sarah McLachlan, Skrillex, Metric, Mastodon, City and Colour.
2013: Def Leppard, Guns N' Roses, Bruno Mars, Wu-Tang Clan, Weezer, Rush, Stevie Wonder, Foreigner, The Black Keys, Tiësto, Ellie Goulding.
2014: Lady Gaga, Billy Joel, Journey, Bryan Adams, The Killers, Soundgarden, Snoop Dogg, Queens Of The Stone Age, Deadmau5, Cypress Hill.
2015: The Rolling Stones, Foo Fighters, Boston, Megadeth, Keith Urban, Deep Purple, The Doobie Brothers, Jack Ü, Iggy Azalea, Milky Chance.
2016: Rammstein, Sting, Peter Gabriel, Red Hot Chili Peppers, Duran Duran, Selena Gomez, Ice Cube, Brad Paisley, The Lumineers, The Cult.
2017: Muse, The Who, Metallica, P!nk, Gorillaz, Kendrick Lamar, The Backstreet Boys, Lady Antebellum, Flume, Melissa Etheridge, Migos, DNCE.
2018: The Weeknd, Foo Fighters, Neil Young, Shawn Mendes, Beck, Lorde, Future, Dave Matthews Band, The Chainsmokers, Machine Gun Kelly.
2019: Twenty One Pilots, Mariah Carey, Slipknot, Imagine Dragons, Blink-182, Lynyrd Skynyrd, Kygo, Logic, Alt-J, Corey Hart, The Offspring, Live.
2022: Rage Against the Machine, Maroon 5, Luke Combs, Alanis Morissette, Three Days Grace, Marshmello, Halsey, Jack Johnson, Garbage.
20 |
https://en.wikipedia.org/wiki/Oak%20Ridge%20Leadership%20Computing%20Facility | The Oak Ridge Leadership Computing Facility (OLCF), formerly the National Leadership Computing Facility, is a designated user facility operated by Oak Ridge National Laboratory and the Department of Energy. It contains several supercomputers, the largest of which is an HPE OLCF-5 named Frontier, which was ranked 1st on the TOP500 list of world's fastest supercomputers as of June 2023. It is located in Oak Ridge, Tennessee.
History
Under its former name of the National Leadership Computing Facility, the OLCF was founded in 1992 at Oak Ridge National Laboratory to advance the state of the art in high-performance computing (HPC) by bringing a new generation of parallel computers out of the laboratory and into the hands of the scientists who could most use them. It was called the Center for Computational Sciences, or CCS, and had an Intel Paragon computer. Over time, it expanded to contain many supercomputers including the Intel Paragon, an IBM system based on the POWER3, an IBM system based on the POWER4, SGI Altix, and more recently, the Cray X1E, Cray XD1, Cray XT3, Cray XT4, Cray XT5, and Titan.
The OLCF is a collaboration of the DOE-SC and a world-class team from national laboratories, research institutions, computing centers, universities, and vendors. It evaluates and deploys technology designed to maximize the performance of scientific applications and engages the scientific and engineering communities for the purpose of advancing science and technology research in the United States. To accomplish this, the OLCF has developed and implemented a three-pronged strategy for building and engaging the research communities to define critical computational needs, work with the manufacturers of HPC resources to express and meet those needs, and develop the tools and algorithms to best take advantage of the HPC resources.
Computers and projects
OLCF's fastest computer, Frontier, is a 1.102 ExaFLOPs HPE OLCF-5 supercomputer with a CPU/GPU hybrid architecture. The combination of CPUs and GPUs will allow Titan and future systems to overcome power and space limitations inherent in previous generations of high-performance computers.
The facility also contains a petabyte High Performance Storage System (HPSS) that currently stores upwards of 29 petabytes of data.
OLCF facilities are accessible through the Energy Sciences Network or ESnet.
Resources of the Oak Ridge Leadership Computing Facility are dedicated to a limited number of high-impact, grand challenge scale projects. Calls for proposals are initiated throughout the year and large, multi-institution proposals are considered. 95% of the OLCF resources are dedicated to these projects. Participants may inquire about joining an existing project by contacting the project's Principal Investigator.
External links
Supercomputer sites
Oak Ridge National Laboratory |
https://en.wikipedia.org/wiki/WLKB | WLKB (89.1 FM) is a radio station broadcasting a contemporary Christian format. Licensed to Bay City, Michigan, it is a member of the K-LOVE radio network. The station's signal reaches from the West Branch area southward to north of Flint and westward to Mount Pleasant.
The station began broadcasting in July 1993 as "The Rock" WTRK, a locally-originating Christian CHR/Rock station. The station was popular in local ratings due to providing an edgier-styled Christian music format not available elsewhere in the area at the time. However, with only 2,000 watts of power the station's signal did not reach far outside Bay City.
WTRK dropped local programming in 2004 to affiliate with Educational Media Foundation's Air 1 format. Two years later, EMF purchased the station outright and began the process of upgrading WTRK's signal from 2,000 to 50,000 watts. In December 2006, WTRK swapped programming and calls with K-Love sister station WLKB 90.9 FM licensed to Freeland, Michigan.
References
Michiguide.com - WLKB History
External links
Contemporary Christian radio stations in the United States
K-Love radio stations
Radio stations established in 1993
1993 establishments in Michigan
Educational Media Foundation radio stations
LKB |
https://en.wikipedia.org/wiki/WMAX%20%28AM%29 | WMAX (1440 AM) is a radio station broadcasting a Catholic religious format. It is co-owned with WDEO 990 AM in Ypsilanti, Michigan, and features the same programming from the EWTN Global Catholic Radio network.
History
Licensed to Bay City, Michigan, it first began broadcasting in 1925 as WSKC at 1150 kHz, with its call sign reflecting its ownership by the World's Star Knitting Co. It was the first radio station in the Tri-Cities and first Michigan radio station north of Flint. In 1930, the call sign changed to WBCM, followed by a shift in frequency in 1941 to 1440 kHz. WBCM served the Bay City area as a local station for many years with a variety of formats including MOR and country music.
WBCM began experimenting with FM radio in 1947, one of the first in the region. WBCM-FM was located at 96.1 mHz and broadcast from an over 300 foot (90m) Blaw-Knox tower at the station's Bay City east side studio on Tuscola Rd, initially signing on in 1947. In the late 1960s and early 1970s, 96.1 FM broadcast a beautiful music format. Purchased by Liggett Communications earlier in 1973, on August 27, 1973 the FM calls were changed to WHNN and the station adopted a Top 40 format as "Super Win". Later, Liggett built a new FM tower location in Quanicassee to alleviate a short spaced situation with WHTC-FM Holland, and the power was upped to a legal maximum of 100,000 watts.
In February of 1978, Liggett changed the AM format to country, and the call letters to WRDD (Big Red Radio), and also built a new 5 KW AM directional transmitter site for the station along M-84 in southern Frankenlust Township, Michigan. Upon license approval of the new AM facility, he sold WRDD to a local broadcast concern who returned the call letters to WBCM. The station would go through another ownership change and change of call letters briefly to WUNI (You and I) to WMAX in 1992 and simulcast sports-talk station WTRX of Flint. WMAX is of no relation to WMAX-FM 96.1, an IHeartMedia-owned radio station in Holland, Michigan. The simulcast only lasted about ten years when it was then sold to the current Catholic radio operator.
WMAX is also the former call sign of an AM station at 1480 kHz in Grand Rapids, Michigan (now WSLI).
Until April 2018, WMAX's programming was simulcast on WHHQ AM 1250, a station based in Bridgeport that covered much of the same broadcasting area as WMAX.
References
Sources
Michiguide.com - WMAX History
External links
Catholic radio stations
Radio stations established in 1925
MAX |
https://en.wikipedia.org/wiki/Pyridine%20%28data%20page%29 | This page provides supplementary chemical data on pyridine.
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. It is highly recommend that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source such as eChemPortal, and follow its directions. MSDS is available from Sigma - Aldrich.
Structure and properties
Thermodynamic properties
Vapor pressure of liquid
Table data obtained from CRC Handbook of Chemistry and Physics 44th ed.
Spectral data
References
Chemical data pages
Pyridines
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/Puzzle%20Quest%3A%20Galactrix | Puzzle Quest: Galactrix, or Galactrix, is a puzzle video game developed by Infinite Interactive for the PC, Nintendo DS, Xbox 360's Xbox Live Arcade, and PlayStation 3's PlayStation Network service.
The game offers a full-featured campaign mode, online multiplayer for 2 to 4 players, and downloadable content, including ships, items, plans, planets, factions, and missions.
Gameplay
Like the original Puzzle Quest, Galactrix has Bejeweled-style gameplay with a few exceptions. Tiles are now hexagonally shaped, and gravity will be a factor in how they fall. If the match takes place in orbit around a planet, the tiles will always fall downward, but in open space new tiles will come from the direction of the player's previous move.
Unlike the original Puzzle Quest, Galactrix's quests have the player traveling various planets, star systems, and the entire galaxy. D3 Publisher has stated that there will be a diplomacy system and commodity system as well as the ability to collect, customize and build ships.
Tiles
There are currently two basic forms of tiles:
Colored tiles (red, yellow, green, blue, purple, and silver); Red tiles relate to the player's weapons gauge, yellow tiles correspond to the player's engine gauge, blue tiles recharge the ship's shields and green tiles represent the ship's computer. The purple tiles represent psi power while the silver tiles are intel tiles.
Numbered attack tiles have replaced skull tiles: Now whenever the player matches one of these numbered tiles, the amount of damage done will be the sum of all the numbers on any attack tile they complete.
Puzzle Types
All the puzzles use tiles with small changes in the rules and large differences in the goals.
Combat: This represents combat between spaceships. The ships have the equipment (the equivalent of spells in Puzzle Quest) which use gunnery, engineering, and science energy corresponding with red, yellow, and green tiles respectively. Damage is caused in two ways: by matching numbered attack tiles and/or by using certain pieces of ship equipment. The health of a ship is composed of shield and hull strength. Direct damage dealt to a ship must eliminate the shields before reducing the hull strength. When a ship's hull strength is reduced to 0, the ship is destroyed, and the battle is over. Shields can be replenished by matching blue tiles and/or by using certain pieces of the ship or equipment, while grey tiles produce intel and purple tiles produce psi power. Both intel and psi power are persistent between battles. Intel is useful for increasing the level of your character between battles by giving bonuses to the amount of energy players begin with at the start of each battle or allowing you to increase the maximum energy your character gets when matching red, yellow, green, or blue gems. Psi powers are used to skip battles with enemy ships of the player's choosing--such as when you feel your ship is not powerful enough to take on a particular opponent. Psi power ca |
https://en.wikipedia.org/wiki/Cryptosporiopsis%20tarraconensis | Cryptosporiopsis tarraconensis is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Dermateaceae |
https://en.wikipedia.org/wiki/Cylindrosporium%20cannabinum | Cylindrosporium cannabinum is a species of Ascomycota and a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungi described in 1955
Fungal plant pathogens and diseases
Ploettnerulaceae |
https://en.wikipedia.org/wiki/Cylindrosporium%20juglandis | Cylindrosporium juglandis is a fungus in the order of Helotiales and a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungi described in 1914
Fungal plant pathogens and diseases
Ploettnerulaceae |
https://en.wikipedia.org/wiki/Dermea%20pseudotsugae | Dermea pseudotsugae is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Dermateaceae |
https://en.wikipedia.org/wiki/Durandiella%20pseudotsugae | Durandiella pseudotsugae is a plant pathogen which causes Dime canker in Douglas-fir trees.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal tree pathogens and diseases
Dermateaceae
Fungi described in 1962 |
https://en.wikipedia.org/wiki/Gloeosporium%20cattleyae | Gloeosporium cattleyae is a fungal plant pathogen.
References
External links
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Dermateaceae |
https://en.wikipedia.org/wiki/Pseudopeziza%20trifolii | Pseudopeziza trifolii is a plant pathogen infecting red clover.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Dermateaceae |
https://en.wikipedia.org/wiki/DANTE | Delivery of Advanced Network Technology to Europe (DANTE) is a not-for-profit company that plans, builds and operates the consecutive generations of the backbone network that interconnects the national research and education networks (NRENs) in Europe. The organisation is based in Cambridge, United Kingdom and was formed in 1993 as a limited liability company owned by Réseaux Associés pour la Recherche Européenne (RARE). Ownership was transferred to a number of NRENs and government agencies in 1994.
DANTE Ltd. currently operates the third generation of the GÉANT pan-European backbone network, and previously operated the earlier-generation EuropaNET, TEN-34, TEN-155, GÉANT and GÉANT2 networks.
History
At a first European research networking workshop, held in Luxembourg in May 1985, the NRENs decided to create the RARE association as their joint European organisation. The first few years were dominated by the Co-operation for Open Systems Interconnection Networking in Europe (COSINE) project (1985-1993). RARE was tasked with he execution of the project and created a COSINE Project Management Unit (CPMU) within its secretariat to manage the various sub-projects. One of the sub-projects of COSINE aimed to create a backbone network interconnecting the national research networks of the participating countries. The first two generations of the European backbone were developed as part of COSINE: IXI (International X.25 Infrastructure Backbone Service) and EMPB (European Multi-Protocol Backbone).
By 1991, consensus was growing that it would make sense to split off RARE's Operational Unit from the association. In May 1991 RARE created a task force to examine the possibility of creating a new entity to take responsibility for the provision of pan-European backbone services; the task force's proposals were accepted by the RARE membership in December 1991. After a comparison of alternatives it was decided to found the Operational Unit as a company limited by shares under English law with its headquarters in Cambridge. The company was incorporated on 30 March 1993 as Operational Unit Ltd. and changed its name to DANTE Ltd. on 2 July 1993. The organisation was launched at an event at St John's College, Cambridge on 6 July 1993. Initially all shares were owned by RARE, but on 25 March 1994 RARE transferred its shares to eleven NRENs and government agencies. On 20 October 1994 RARE changed its name to TERENA.
The original eleven shareholders were Ariadnet (Greece), ARNES (Slovenia), INFN (Italy), DFN (Germany), FCCN (Portugal), HEFCE (United Kingdom), HUNGARNET (Hungary), NORDUnet (Nordic countries), RedIRIS (Spain), SURFnet (Netherlands) and SWITCH (Switzerland). Later INFN and RedIRIS transferred their shares to GARR and CSIC, respectively. Other NRENs were given the opportunity to buy shares later; this offer was taken up by RENATER (France) and CESNET (Czech Republic) in 1999, by HEAnet (Ireland) in 2000 and by RESTENA (Luxembourg) in 2002, bringing the t |
https://en.wikipedia.org/wiki/Diners%2C%20Drive-Ins%20and%20Dives | Diners, Drive-Ins and Dives (often nicknamed Triple D and stylized as Diners, Drive-Ins, Dives) is an American food reality television series that premiered on April 23, 2007, on the Food Network. It is hosted by Guy Fieri. The show originally began as a one-off special that aired on November 6, 2006. The show features a "road trip" concept, similar to Road Tasted, Giada's Weekend Getaways, and $40 a Day. Fieri travels around the United States, Canada, and Mexico looking at various diners, drive-in restaurants, and dive bars. He has also featured restaurants in European cities, including London and Florence, as well as in Cuba (see the episodes page).
Premise
Each episode generally has a unifying theme (such as burgers, ribs, or seafood) with the host visiting multiple restaurants within a single city to sample the food that corresponds to this theme. The program focuses on small, independent eateries featuring traditional comfort foods (such as barbecue, smoked meat, hamburgers, deep-fried food, pizza, steak, and bacon-and-egg breakfast), regional styles, or ethnic specialties. Often, the chosen restaurants will use fresh ingredients, home-style recipes, and gourmet culinary approaches to what is usually not considered gourmet food. The host interacts with both the customers, to get their opinion on the food, and with the kitchen staff, who demonstrate how to prepare one or more of the dishes.
Takeout
As a result of the ongoing COVID-19 pandemic, the show's format shifted to feature chefs sending Fieri boxes of ingredients and guiding him through the process via video link. Takeout episodes of the show were filmed at Fieri's home in California with the help of his children, Hunter and Ryder.
Guest appearances
The show has had various stars appear in the kitchen alongside Guy Fieri, including fellow chefs Robert Irvine, Andrew Zimmern, Michael Symon, Emeril Lagasse, and Geoffrey Zakarian, as well as celebrities such as Matthew McConaughey, Gene Hackman, Rosie O'Donnell, Joe Theismann, Chris Rock, Kid Rock, Adam Sandler, Kevin James, Clint Bowyer, Martin Sheen, Gene Simmons, Steve Harwell, E-40 and Mick Fleetwood.
Lawsuit
In May 2011, Page Productions, the original producers of the show, filed a lawsuit against Food Network. The lawsuit alleges that the network failed to pay required production costs, and failed to make the show's host, Guy Fieri, available for taping.
A week after Food Network counter-sued the producer, a settlement was reached in August 2011, allowing the 12th season of the show to resume, with a new production company, Citizen Pictures.
Impact
Throughout the years, more than 800 restaurants have been mentioned on the show, resulting in a dramatic increase in customers. Due to the show's popularity, long-term effects have included increases in both customers and sales.
In 2015, the owner of Duluth specialty market Northern Waters Smokehaus said that being featured in a 2010 episode had "jump started" its mail-order bus |
https://en.wikipedia.org/wiki/Road%20transport%20in%20Brisbane | The road transport in Brisbane, Australia, consists of a network of highways, freeways and motorways. Some motorways have tolls applied.
Brisbane is a car dependent city. In 2006, within the South East Queensland region, 83% of trips were done by car.
Brisbane is linked with both the Gold Coast and Sunshine Coast by freeway-led suburbanisation.
Network
The Brisbane River has created a barrier to some road transport routes. In total there are nine road bridges and one road tunnel, mostly concentrated in the inner city area. This has intensified the need for transport routes to focus on the inner city. One more cross-river tunnel is planned (East-West Link) as part of the TransApex plan.
Brisbane's road system was planned around large, spacious suburban areas. Dense suburbs now rely on several main road corridors that split through and between these areas and provide the only link to the CBD and other areas of Brisbane. Logan Road, Moggill Road, Old Cleveland Road and Gympie Road are but a few of these multi-lane corridors that come out of the CBD and snake through the suburbs.
Bypasses such as the Inner City Bypass, Airport Link and Clem Jones Tunnel are intended to help to circulate traffic away from the inner-city areas and main roads via limited-access roads above the ground, and tunnels below that have higher speed limits and exits to particular suburbs.
Existing high speed cross-suburban motorways such as the Western Freeway, Centenary Motorway, Pacific Motorway and Gateway Motorway provide alternative routes to main roads and connect up to main highways and other arterial roads. The TransApex plan tunnels, Airport Link tunnel and Clem Jones Tunnel, Legacy Way tunnel and East-West Link tunnel are designed to link all the various motorways in Brisbane together. Only East-West link is yet to commence planning or construction.
In total, the twisting Brisbane River is crossed by nine road bridges, one road tunnel, three railway bridges, three dedicated cyclist/pedestrian bridges and one dedicated bus/cycle/pedestrian bridge. Route signage is achieved by means of a system of Metroads, consisting of the most important arterial roads in metropolitan Brisbane including most motorways, and less important State Routes; however, in recent years, the Metroads are being superseded by an alphanumeric numbering system. Multiple freeways connect Brisbane to other cities, including the Pacific Motorway, the Bruce Highway and the Ipswich Motorway, all of which are part of the National Highway System. Brisbane is approximately away from Sydney, the closest major capital city.
An upgrade to Brisbane's traffic lights system began in April 2011. The old system was called Brisbane Linked Intersection Signal System (BLISS) and required a controller to trigger traffic lights to relieve congestion. The new system called Sydney Coordinated Adaptive Traffic System (SCATS) is used in every other Australian capital city and is expected to cost much less to mainta |
https://en.wikipedia.org/wiki/Tok%21%20Tok%21%20Tok%21%20Isang%20Milyon%20Pasok | Tok! Tok! Tok! () is a Philippine television game show broadcast by GMA Network. Hosted by Paolo Bediones, it premiered on May 27, 2007. The show returned for a second season on August 24, 2008 replacing Pinoy Idol. The show concluded on November 2, 2008 with a total of 63 episodes. It was replaced by Family Feud: Celebrity Edition in its timeslot.
Overview
Ratings
According to AGB Nielsen Philippines' Mega Manila household television ratings, the final episode of Tok! Tok! Tok! scored a 25.1% rating.
Accolades
References
External links
2007 Philippine television series debuts
2008 Philippine television series endings
Filipino-language television shows
GMA Network original programming
GMA Integrated News and Public Affairs shows
Philippine game shows |
https://en.wikipedia.org/wiki/Filter%20%28higher-order%20function%29 | In functional programming, filter is a higher-order function that processes a data structure (usually a list) in some order to produce a new data structure containing exactly those elements of the original data structure for which a given predicate returns the boolean value true.
Example
In Haskell, the code example
filter even [1..10]
evaluates to the list 2, 4, …, 10 by applying the predicate even to every element of the list of integers 1, 2, …, 10 in that order and creating a new list of those elements for which the predicate returns the boolean value true, thereby giving a list containing only the even members of that list. Conversely, the code example
filter (not . even) [1..10]
evaluates to the list 1, 3, …, 9 by collecting those elements of the list of integers 1, 2, …, 10 for which the predicate even returns the boolean value false (with . being the function composition operator).
Visual example
Below, you can see a view of each step of the filter process for a list of integers X = [0, 5, 8, 3, 2, 1] according to the function :
This function express that if is even the return value is , otherwise it's . This is the predicate.
Language comparison
Filter is a standard function for many programming languages, e.g.,
Haskell,
OCaml,
Standard ML,
or Erlang.
Common Lisp provides the functions remove-if and remove-if-not.
Scheme Requests for Implementation (SRFI) 1 provides an implementation of filter for the language Scheme.
C++ provides the algorithms remove_if (mutating) and remove_copy_if (non-mutating); C++11 additionally provides copy_if (non-mutating). Smalltalk provides the select: method for collections. Filter can also be realized using list comprehensions in languages that support them.
In Haskell, filter can be implemented like this:
filter :: (a -> Bool) -> [a] -> [a]
filter _ [] = []
filter p (x:xs) = [x | p x] ++ filter p xs
Here, [] denotes the empty list, ++ the list concatenation operation, and [x | p x] denotes a list conditionally holding a value, x, if the condition p x holds (evaluates to True).
Variants
Filter creates its result without modifying the original list. Many programming languages also provide variants that destructively modify the list argument instead for faster performance. Other variants of filter (e.g., Haskell dropWhile and partition) are also common. A common memory optimization for purely functional programming languages is to have the input list and filtered result share the longest common tail (tail-sharing).
See also
Map (higher-order function)
List comprehension
Guard (computing)
References
Higher-order functions
Articles with example Haskell code |
https://en.wikipedia.org/wiki/Big%20Breadwinner%20Hog | Big Breadwinner Hog is a British television thriller serial devised by Robin Chapman, produced by Granada TV and transmitted in eight parts, starting at 9.00pm on 11 April 1969 on the ITV network.
Overview
The series focussed on the ruthless rise through the criminal underworld of the trendy young London gangster Hogarth (Peter Egan). He exploits the resources of a declining gangster, Ryan (Godfrey Quigley), to take over the dominant crime syndicate Scot-Yanks, controlled by the equally ruthless and manipulative Lennox (Timothy West). The key to Hogarth's success is knowledge of a murder arranged by Lennox, of which there is a crucial witness, Ackerman (Donald Burton), a one-time private eye who has been blackmailed into working for Scot-Yanks and bitterly resents Lennox.
The eight-part serial was widely condemned at the time for its amorality and violence. Its first episode featured a scene in which a jar of hydrochloric acid was thrown into a rival's face. "Barely minutes after the first episode was transmitted, the Granada TV switchboard was inundated" with viewers' complaints about the violence and the second episode was preceded by a Granada apology for the previous week's episode. Granada toned down some of the more violent aspects of later episodes but despite this, viewer complaints continued and from episode 5 some ITV regions moved transmission to a later timeslot. Southern Television and Anglia Television stopped transmission of the serial.
The serial was directed by Mike Newell (later of Four Weddings and a Funeral) and Michael Apted. It gave an early role to John Challis, later Boycie of Only Fools and Horses and an important role for Priscilla Morgan. Peter Egan is also better known these days for sitcoms like Ever Decreasing Circles (1984–89), Joint Account (1989) and Home Again (2006)
Cast
Hogarth – Peter Egan
Edge – Rosemary McHale
Ryan – Godfrey Quigley
Spicer – Barry Linehan
Singleton – Tony Steedman
Lennox – Timothy West
Gould – Hamilton Dyce
Moira – Priscilla Morgan
Ackerman – Donald Burton
Greenwood – Brian McDermott
Izzard – Alan Browning
Grange – David Leland
Raymond – James Hunter
Nicholson – Tenniel Evans
Walker – Arthur Pentelow
Parker – John Horsley
Raspberry – Peter Thomas
Operative – John Challis
DVD release
The series was released on Region 2 DVD in a box set with Spindoe by Network DVD in June 2007. The series is presented on the DVD from the original videotapes, except episode one (containing the infamous acid-throwing scene) which exists only via a telerecorded film copy, where the image quality is noticeably inferior to the other episodes.
Disc 3 |
https://en.wikipedia.org/wiki/NetXMS | NetXMS is an multi-platform open-source network management system. It can be used for monitoring entire IT infrastructures, starting with SNMP-capable hardware (such as switches and routers) and ending with applications on servers.
Victor Kirhenshtein and Alex Kirhenshtein are the original authors and current maintainers of NetXMS. NetXMS runs natively on Windows, Linux, and other Unix variants. It is licensed under the GNU General Public License version 2 as published by the Free Software Foundation.
Overview
NetXMS features include:
Monitoring of network devices, servers and applications from one management server
Data collection either from SNMP-capable platforms or from native NetXMS agent
Configuration, administration and monitoring functions are accessible through multiplatform (Eclipse-based) and Web GUIs
The ability to send e-mails and SMS notifications or execute external programs as a reaction to any event, enables users to receive warning notifications based on collected values
The ability to organize monitored objects into hierarchical structure to represent service dependencies
Centralized remote agent upgrades
OSI Layer 2 and Layer 3 IP topology automatic discovery
Portable client library (C and Java APIs)
Flexible policy-based event processing (including correlation rules)
Remote actions
Flexible access control configuration
Built-in scripting engine for advanced automation and management
Project milestones
Notable project milestones include:
October 2004: 0.1.4 is a first public release
August 2005: 0.2.3 added event correlation support based on IP topology
January 2006: 0.2.9 introduced built-in scripting language NXSL
December 2008: 0.2.23 added Java API
July 2009: 0.2.27 added support for SNMPv3
February 2010: 1.0.0 released
May 2011: 1.1.1 introduced dashboards and zoning
September 2011: 1.1.4 introduced mobile client for Android
April 2012: 1.2.0 introduced Web GUI with desktop GUI look and feel
January 2013: 1.2.5 added support for mobile device monitoring and introduced an agent for Android
See also
Network monitoring
Comparison of network monitoring systems
References
External links
Official website
Internet Protocol based network software
Free network management software
Multi-agent network management software |
https://en.wikipedia.org/wiki/Nue%20%28album%29 | Nue (French for naked), is Lara Fabian's fifth album, and first French release in four years, since Pure.
Track listing
Credits
Rick Allison : Guitar, Piano, Arranger, Programming, Clavier, Basse
Kate Barry : Photography
Janey Clewer : Piano
Julie Leblanc : Choir, Chorus
Cathi Leveille : Choir, Chorus
Kim Richardson : Choir, Chorus
William James Ross : Arranger
Dorian Sherwood : Percussion, Choir, Chorus
Charts
Certifications
References
2001 albums
Lara Fabian albums
Polydor Records albums |
https://en.wikipedia.org/wiki/Admissible%20heuristic | In computer science, specifically in algorithms related to pathfinding, a heuristic function is said to be admissible if it never overestimates the cost of reaching the goal, i.e. the cost it estimates to reach the goal is not higher than the lowest possible cost from the current point in the path.
It is related to the concept of consistent heuristics. While all consistent heuristics are admissible, not all admissible heuristics are consistent.
Search algorithms
An admissible heuristic is used to estimate the cost of reaching the goal state in an informed search algorithm. In order for a heuristic
to be admissible to the search problem, the estimated cost must always be lower than or equal to the actual cost of reaching the goal state.
The search algorithm uses the admissible heuristic to find an estimated
optimal path to the goal state from the current node.
For example, in A* search the evaluation function (where
is the current node) is:
where
= the evaluation function.
= the cost from the start node to the current node
= estimated cost from current node to goal.
is calculated using the heuristic
function. With a non-admissible heuristic, the A* algorithm could
overlook the optimal solution to a search problem due to an
overestimation in .
Formulation
is a node
is a heuristic
is cost indicated by to reach a goal from
is the optimal cost to reach a goal from
is admissible if,
Construction
An admissible heuristic can be derived from a relaxed
version of the problem, or by information from pattern databases that store exact solutions to subproblems of the problem, or by using inductive learning methods.
Examples
Two different examples of admissible heuristics apply to the fifteen puzzle problem:
Hamming distance
Manhattan distance
The Hamming distance is the total number of misplaced tiles. It is clear that this heuristic is admissible since the total number of moves to order the tiles correctly is at least the number of misplaced tiles (each tile not in place must be moved at least once). The cost (number of moves) to the goal (an ordered puzzle) is at least the Hamming distance of the puzzle.
The Manhattan distance of a puzzle is defined as:
Consider the puzzle below in which the player wishes to move each tile such that the numbers are ordered. The Manhattan distance is an admissible heuristic in this case because every tile will have to be moved at least the number of spots in between itself and its correct position.
The subscripts show the Manhattan distance for each tile. The total Manhattan distance for the shown puzzle is:
Optimality proof
If an admissible heuristic is used in an algorithm that, per iteration, progresses only the path of lowest evaluation (current cost + heuristic) of several candidate paths, terminates the moment its exploration reaches the goal and, crucially, never closes all optimal paths before terminating (something that's possible with A* search algorithm if special care isn |
https://en.wikipedia.org/wiki/Graphics%20Animation%20System%20for%20Professionals | GRaphic Animation System for Professionals (GRASP) was the first multimedia animation program for the IBM PC family of computers. It was also at one time the most widely used animation format.
Originally conceived by Doug Wolfgram under the name FlashGun, the first public version of GRASP was the Graphical System for Presentation. The original software was written by Doug Wolfgram and Rob Neville. It later became the GRaphic Animation System for Professionals. Many regard this as the birth of the multimedia industry.
GRASP - Graphic Animation System for Professionals
GRASP 1.0
In 1984 Doug Wolfgram conceived of the idea of an animation scripting language that would allow graphics images to move smoothly across a computer screen under program control. Persyst Systems hired Wolfgram's company to develop some graphics and animation for their new graphics card, the BoB board. The marketing manager from Persyst then moved to AST computer where he brought in Wolfgram to do similar animation work for the AST line of peripheral cards for PCs. 1
Wolfgram saw the growing demand for multimedia so he brought in John Bridges, with whom he had co-developed PCPaint for Mouse Systems in 1982. Together they co-developed the early versions of GRASP for Wolfgram's company, Microtex Industries. Subsequent versions followed. Version 1.10c was released in September 1986.
Starting with John and Doug's source code for PCPaint, the painting aspects were chopped out and
instead a simple font editor for Doug's slideshow program FlashGun was created. The graphics library was used to make a simple script playback that had a command for each graphics library function. It also originally used the assembly language fades from FlashGun for
a "FADE" command, but those image fade routines were mode specific (CGA) and difficult to enhance. The routines were rewritten along with the script parts. It stored all the files in a ZIB archive, renaming John Bridges' program ZIB to GLIB and the archives it produced were GL files.
GRASP 2.0
In 1987, GRASP 2.0, was released and no longer distributed as ShareWare. It became a commercial product published in the USA by Paul Mace Software. John Bridges assumed responsibility for development of the core engine while Wolfgram developed fades, external utilities and new commands.
GRASP 3.0 and 3.5
In 1988, GRASP 3.0 was released, followed in October 1988 by GRASP 3.5, bundled with Pictor Paint, an improved PCPaint minus publishing features. GRASP 3.5 "[supported] a wide range of video formats, including CGA, EGA, Hercules, VGA and all popular enhanced VGA modes up to 800 x 600 pixels and 1,024 x 768 pixels resolution. The software [displayed] and [edited] images in several standard formats, including PC Paintbrush (PCX) and GIF."
Award-winning animator Tom Guthery claims that by using GRASP in 1990 his early animated computer programs "[gave] smooth movement and detailed animation to a degree that many programmers had thought impossibl |
https://en.wikipedia.org/wiki/Kuckuck%20Schallplatten | Kuckuck Schallplatten (engl.: Cuckoo Records) is a German record label founded in August 1969 by Eckart Rahn, Mal Sondock and the advertising agency ConceptData in Munich, growing out of his music publishing company
E.R.P. Musikverlag which was founded on April 1, 1968. It was distributed by Deutsche Grammophon (Polydor). It is the first German progressive rock-label. It is now the longest-surviving independent label in Germany. Most of its recordings have been reissued on CD, and all are now available as downloads.
Artists
Antiteater (Peer Raben and filmmaker Rainer Werner Fassbinder)
Armageddon
Murphy Blend
CWT
Deuter
Out of Focus
Jack Grunsky
Peter Michael Hamel
Hanuman
Sonny Hennig
Ihre Kinder
Hans Otte
Terry Riley
Eberhard Schoener
Ernst Schultz
Lied des Teufels
Keith West
Sam Spence
Some early releases by Kitaro were licensed to the label through Pony Canyon, Inc. of Tokyo, Japan.
See also
List of record labels
External links
Celestial Harmonies (Eckart Rahn)
IFPI members
German record labels
Record labels established in 1969
Experimental music record labels
Rock record labels
Krautrock |
https://en.wikipedia.org/wiki/Gemstar%E2%80%93TV%20Guide%20International | Gemstar–TV Guide International, Inc. was a media company that licensed interactive program guide technology to multichannel video programming distributors such as cable and satellite television providers, and consumer electronics manufacturers; video recorder scheduling codes under brands such as VCR Plus; as well as serving as publishers of TV Guide magazine as well as operators of tvguide.com, owners of TV Guide Network and TVG Network, and provided various related services. On May 2, 2008, Gemstar–TV Guide International, Inc. became a wholly owned subsidiary of Macrovision Solutions Corporation, which later changed its name to Rovi Corporation on July 16, 2009.
History
As United Video
In 1978, United Video Satellite Group, Inc. was founded in Tulsa, OK. United Video itself dated back to 1965, founded by Gene Schneider, and was originally a cable company in the Tulsa area, originally under the names of GenCo and then LVO Cable (during a period when they were owned by LVO Corporation, an oil company). The name United Video came from an acquisition in 1970: a small, microwave-based TV relay operation serving the Illinois towns of Ottawa, Streator and Pontiac with TV signals from Chicago. The microwave business expanded to serve other cable companies and regions, including Iowa, Louisiana, and Oklahoma itself, carrying distant stations to rural communities.
Thanks to their experience in distributing Chicago's WGN-TV via microwave, they were chosen to distribute WGN's signal nationwide via satellite uplink (after a period where UV competed with several other firms, including another Tulsa-based uplink firm, Southern Satellite Systems). They began uplinking the signal from a facility in Monee, Illinois, to the Satcom-3 satellite on November 9, 1978. Soon, several other stations began to be uplinked for national distribution by UVSG, including WGN's then-sister station WPIX in New York, KTVT in Dallas, and KPLR in St. Louis. (With the rise of satellite, this meant that microwave transmission of distant stations was now outmoded, with UVSG selling their microwave systems by 1980.)
A side venture was the Satellite Music Network, formed in 1981; the concept came about when UV employee Al Stem pointed out that the satellite bandwidth used for their superstation uplinks still left considerable amounts of bandwidth open for other usage. In less than three years, the service had more than 300 affiliates. SMN was sold to Capital Cities/ABC Inc. for a stock deal worth approximately $55 million on January 10, 1989; Capital Cities/ABC had purchased a minority stake in the company in the days prior. By the time of the purchase, SMN boasted over 1,050 affiliates for nine distinct formats throughout the United States. The deal closed at the end of July, with SMN's operations folded into the original ABC Radio Networks, and through subsequent mergers and divestitures is now a part of the current Westwood One under Cumulus Media. The sale of SMN also ultimatel |
https://en.wikipedia.org/wiki/Multiply-with-carry%20pseudorandom%20number%20generator | In computer science, multiply-with-carry (MWC) is a method invented by George Marsaglia for generating sequences of random integers based on an initial set from two to many thousands of randomly chosen seed values. The main advantages of the MWC method are that it invokes simple computer integer arithmetic and leads to very fast generation of sequences of random numbers with immense periods, ranging from around to .
As with all pseudorandom number generators, the resulting sequences are functions of the supplied seed values.
General theory
An MWC generator is a special form of Lehmer random number generator which allows efficient implementation of a prime modulus much larger than the machine word size.
Normal Lehmer generator implementations choose a modulus close to the machine word size. An MWC generator instead maintains its state in base , so multiplying by is done implicitly by shifting one word. The base is typically chosen to equal the computer's word size, as this makes arithmetic modulo trivial. This may vary from for a microcontroller to . (This article uses for examples.)
The initial state ("seed") values are arbitrary, except that they must not be all zero, nor all at the maximum permitted values ( and ). (This is commonly done by choosing between 1 and .). The MWC sequence is then a sequence of pairs determined by
This is called a lag-1 MWC sequence. Sometimes an odd base is preferred, in which case can be used, which is almost as simple to implement. A lag- sequence is a generalization of the lag-1 sequence allowing longer periods. The lag- MWC sequence is then a sequence of pairs
(for ) determined by
and the MWC generator output is the sequence of 's,
In this case, the initial state ("seed") values must not be all zero nor and .
The MWC multiplier and lag determine the modulus . In practice, is chosen so the modulus is prime and the sequence has long period. If the modulus is prime, The period of a lag- MWC generator is the order of in the multiplicative group of numbers modulo . While it is theoretically possible to choose a non-prime modulus, a prime modulus eliminates the possibility of the initial seed sharing a common divisor with the modulus, which would reduce the generator's period.
Because 2 is a quadratic residue of numbers of the form , cannot be a primitive root of . Therefore, MWC generators with base have their parameters chosen so their period is (abr−1)/2. This is one of the difficulties that use of b = 2k − 1 overcomes.
The basic form of an MWC generator has parameters a, b and r, and r+1 words of state. The state consists of r residues modulo b
0 ≤ x0, x1, x2,..., xr−1 < b,
and a carry cr−1 < a.
Although the theory of MWC generators permits a > b, a is almost always chosen smaller for convenience of implementation.
The state transformation function of an MWC generator is one step of Montgomery reduction modulo p. The state is a large integer with most significant |
https://en.wikipedia.org/wiki/Naval%20Computer%20and%20Telecommunications%20Command | Naval Computer and Telecommunications Command (COMNAVCOMTELCOM) was located at the intersection of Massachusetts Avenue and Nebraska Avenue within Nebraska Avenue Complex in Washington, D.C.
See also
Naval Network Warfare Command
Director, Communications Security Material System
Naval Communications Security Material System
References
External links
http://www.netwarcom.navy.mil/
Shore commands of the United States Navy
Military units and formations established in 1990
Military units and formations disestablished in 2001
Military in Washington, D.C. |
https://en.wikipedia.org/wiki/Beat%20the%20Boss | Beat the Boss is a business gameshow broadcast in the United Kingdom as part of the BBC's children-oriented programming, CBBC. It was presented by Cameron Johnson and originally Saira Khan. The format features two teams, one team of children named "The Bright Sparks", and one team of adults named "The Big Shots", creating a product that will appeal to the children's market. At the end of each episode, a panel of children vote for their favourite product and the team with the most votes wins the Beat the Boss trophy and a limousine ride home, while the losing team has to take the bus.
Series 1
Fruit Drink
Aired: Monday 22 May 2006
Filmed: 2005
Brief:
Bright Sparks: Joseph, Becky & James
Bright Sparks product: "Creative Juices"
Big Shots: Rachel, Mark & Jo
Big Shots product: "VIBE"
Winner: The Bright Sparks
Dog Backpack
Aired: Monday 29 May 2006
Filmed: 2005
Brief:
Bright Sparks: George, Nina & Sam
Bright Sparks product:
Big Shots: Andrea, Ali & Andy
Big Shots product:
Winner: The Big Shots
Practical Joke
Aired:
Filmed:
Brief:
Bright Sparks: Shawn, Holly & Callum
Bright Sparks product: "The FP3 Player"
Big Shots: Tom, Calypso & Alan
Big Shots product: "The Screaming Diary"
Winner: The Bright Sparks
Inflatable
Aired:
Filmed:
Brief:
Bright Sparks: Robert, Radha & Owen
Bright Sparks product:
Big Shots: Jonathan, Karen & Spencer
Big Shots product:
Winner: The Bright Sparks
Sleepover Experience
Aired:
Filmed:
Brief:
Bright Sparks: Lauren, Ben & Aimee
Bright Sparks product:
Big Shots: Narrinder, Tia & Tom
Big Shots product:
Winner: The Bright Sparks
Comic Relief does Beat the Boss
A special version of Beat the Boss was shown before Red Nose Day 2007. It involved The Bright Sparks and a celebrity team of The Big Shots composed of Joe Pasquale, Duncan Bannatyne and Chantelle Preston. The teams had to design a suit for Lenny Henry to wear on the night. Viewers were asked to phone in and vote for their favourite.
During Red Nose Day 2007, Saira Khan and the two teams were on the stage, and Saira Khan announced that the winners were "The Bright Sparks", Lenny Henry came from backstage wearing the designed suit.
Series 2
Swim
Aired:
Filmed:
Brief:
Bright Sparks: Robin, Oscar & Jess
Bright Sparks product:
Big Shots: Paul, Charlie & Jak
Big Shots product:
Winner: The Bright Sparks
Board Game
Aired:
Filmed:
Brief:
Bright Sparks: Harry, Charlotte & Daniel
Bright Sparks product: "Pyramid Plunder"
Big Shots: Shauna, Syd & Denise
Big Shots product: "Beat the Boss"
Winner: The Bright Sparks
Ice
Aired:
Filmed:
Brief:
Bright Sparks: Bethany, Luke & Dani
Bright Sparks product:
Big Shots: Jonathan, Lydia & Doug
Big Shots product: "Rap Freeze"
Winner: The Big Shots
Bike
Aired:
Filmed:
Brief:
Bright Sparks: Joe, Lisa & Jimmy
Bright Sparks product: "MountRock"
Big Shots: Yana, Andy & Charlotte
Big Shots product: "BodyPAC"
Winner: The Bright Sparks
Hair
Aired:
Filmed:
Brief:
Bright Sparks: Craig, Alice & Dale
Bright Sparks product:
Big Shots: Sarah, Jason & Sian
|
https://en.wikipedia.org/wiki/Toxbot | Toxbot is a computer worm that was primarily active in 2005. On infected computers, it opened up a backdoor to allow command and control over the IRC network, thus creating a botnet that at its peak comprised about 1.5 million computers. The two makers of the botnet were arrested in October 2005 and received jail sentences of 24 and 18 months from a Dutch court.
References
External links
W32.Toxbot at Symantec Security Response
Win32/Toxbot at CA
Toxbot at F-Secure
Computer worms |
https://en.wikipedia.org/wiki/List%20of%20Commodore%2064%20games%20%28A%E2%80%93M%29 | This is a list of game titles released for the Commodore 64 personal computer system, sorted alphabetically.
0–9
$100,000 Pyramid
007: Licence to Kill
10 Knockout!
10-Pin Bowling
10th Frame
10000 Meters
180
19 Part One: Boot Camp
1942
1943: One Year After
1943: The Battle of Midway
1985: The Day After
1994: Ten Years After
1st Division Manager
2001
221B Baker Street
3-D Breakout
3-D Labyrinth
3-D Skramble
3D Construction Kit
3D Glooper
3D Tanx
4 Soccer Simulators
4th & Inches
4x4 Off-Road Racing
50 Mission Crush
5th Gear
720°
720° Part 2
A
Aaargh!
Aardvark
ABC Monday Night Football
Abrakadabra
Accolade's Comics
ACE - Air Combat Emulator
Ace 2
ACE 2088
Ace Harrier
Ace of Aces
Acrojet
Action Biker
Action Fighter
Action Force
Adam Norton's Ultimate Soccer
The Addams Family
Addicta Ball
ADIDAS Championship Football
Adrenalin
Adult Poker
Advance to Boardwalk
Advanced Dungeons & Dragons: Heroes of the Lance
Advanced Basketball Simulator
Advanced Pinball Simulator
Adventure Construction Set
Adventure Master
Adventure Quest
Adventureland
Adventures in Narnia: Dawn Treader
Adventures in Narnia: Narnia
Aegean Voyage
After Burner
After The War
Afterlife
Afterlife II
Afterlife v1.0
Afterlife v2.0
Aftermath
Agent Orange
Agent USA
Agent X
Agent X II: The Mad Prof's Back
Ah Diddums
Aigina's Prophecy
Air Support
Airborne Ranger
Airwolf
Airwolf II
Alcazar: The Forgotten Fortress
ALF: The First Adventure
Alf in the Color Caves
Alice in Videoland
Alice in Wonderland
Alien (graphics adventure)
Alien
Alien 3
Alien Storm
Alien Syndrome
Aliens: The Computer Game
Alter Ego
Alleykat
Altered Beast
Alter Ego: Female Version
Alter Ego: Male Version
Alternate Reality: The City
Alternate Reality: The Dungeon
Alternative World Games
Amadeus Revenge
Amaurote
The Amazing Spider-Man
Amazon Warrior
Amazon
America's Cup
American Tag-Team Wrestling
Amnesia
Anarchy
Andy Capp: The Game
Annals of Rome
Annihilator
Annihilator II
Another World (1990) (Double Density)
Another World (1991) (CP Verlag)
Another World (1992) (X-Ample)
Ant Attack
Antimonopoly
Antiriad
Apache
Apache Gold
Apache Strike
Apocalypse Now
Apollo 18: Mission to the Moon
Apple Cider Spider
Arabian
Arabian Nights
Arac
Arachnophobia
Arcade Classics
Arcade Flight Simulator
Arcade Fruit Machine: Cash 'n' Grab
Arcade Game Construction Kit
Arcade Pilot
Arcade Trivia Quiz
Arcade Volleyball
Arcadia
Arcana
Archipelago
Archon: The Light and the Dark
Archon II: Adept
Archon III: ExciterD
ArciereD
ArcoD
ARCOSD
Arctic ShipwreckD
Arctic Wastes!D
Arc of Yesod
Arcticfox
ArdantD
Ardok the BarbarianD
Ardy the Aardvark
Area 13D
Area EstimationD
AreasD
AreeD
ArenaD
Arena 3000D
Arena Football
ArenumD
ArexD
ArgoD
ArgonD
Argon - L'Orrore di ProvidenceD
The Argon FactorD
ArgosD
The Argos ExpeditionD
Arhena! The AmazonD
Arithme-SketchD
The Arithmetic GameD
ArithmeticianD
ArizonaD
Arizona - The Boy in the BubbleD
The Ark of ExodusD
Ark PandoraD
Arkanoid
Arkanoid: Revenge of Doh
Armageddon
The Armageddon Files
The Armageddon Man
Armalyte
Ar |
https://en.wikipedia.org/wiki/List%20of%20Commodore%2064%20games%20%28N%E2%80%93Z%29 | This is a list of game titles released for the Commodore 64 personal computer system, sorted alphabetically.
N
NARC
NATO Commander
Nautilus
Navy SEALS
Nebulus
Necromancer
Nemesis
Nemesis: The Warlock
Neptune's Daughters
Nether Earth
Netherworld
Neuromancer
Neutral Zone
New York City
The NewZealand Story
Newcomer
Nexus
Night Driver
Night Shift
A Nightmare on Elm Street
Nightshade
Nine Princes In Amber
Ninja
Ninja Commando
Ninja Gaiden
Ninja Hamster
Ninja Master
Ninja Rabbits
Ninja Spirit
The Ninja Warriors
Nobby the Aardvark
Nodes of Yesod
Nonterraqueous
Nord and Bert Couldn't Make Head or Tail of It
North & South
NorthStar
Norway 1985
Nosferatu the Vampyre
O
Octapolis
Odell Lake
Oil Barons
Oil's Well
Oink!
Olli & Lissa 3
Ollie's Follies
Omega
Omega Race
On The Moon
On-Court Tennis
One Man and His Droid
One on One: Dr. J vs. Larry Bird
Operation Thunderbolt
Operation Wolf
Oregon
OsWALD
Out of this World
Out Run
Out Run Europa
Outlaws
Overlander
Overlord
Overrun!
P
P. P. Hammer and his Pneumatic Weapon
Pac-Land
Pac-Man
Pac-Mania
Painterboy
Pandora
Panic
Pang (also known as Buster Bros.)
Panther
Panzer Strike
Paperboy
Paperboy 2
Paradroid
Paragon
Parallax
The Paranoia Complex
Paratroopers
Park Patrol
Pastfinder
Patton Versus Rommel
The Pawn
PC Fuzz
Pedro
Penetrator
Pengo
Periscope Up
Perry Mason: The Case of the Mandarin Murder
Perseus and Andromeda
Persian Gulf Inferno
Peter Pack Rat
Peter Shilton's Handball Maradona
Phantasie
Phantasie II
Phantasie III
Phantom of the Asteroid
The Pharaoh's Curse
Pharaoh's Revenge
PHM Pegasus
Phobia
Pilgrim
Pinball Construction Set
Pinball Wizard (1984 video game)
Pink Panther
Pipe Mania
Piracy
Pirate Adventure
Pirates
Pit-Fighter
Pitfall!
Pitfall II: Lost Caverns
Pitstop
Pitstop II
Planet X2
Planetfall
Platoon
Plotting
Plundered Hearts
Pogo Joe
Pole Position
Pole Position II
Police Cadet
Pool of Radiance
Pooyan
PopMan
Popeye
Portal
Poster Paster
Postman Pat
Postman Pat II
Postman Pat III
Pot Panic
Potty Painter
Potty Pigeon
Power At Sea
Power Drift
Power!
Predator
President Elect
The President Is Missing
Press Your Luck
The Price Is Right
Prince of Persia
Pro Boxing Simulator
Pro Tennis Tour
Professional Ski Simulator
Project Firestart
Project Space Station
Project Stealth Fighter
Proof of Destruction
Psi-5 Trading Company
PSI Warrior
Psycho Hopper
Psycho Soldier
Pub Games
Pub Trivia
Puffy's Saga
Punchy
Purple Turtles
Puzzle Panic
Puzzlenoid
Puzznic
Pyjamarama
The Pyramid
Q
Q*bert
Qix
Quake Minus One
Quango
Quartet
Quasimodo
Quedex
The Quest
A Question of Sport
Questron
Quo Vadis
R
R-Type
Racing Destruction Set
Rack 'Em
Radar Rat Race
Rags to Riches
Raid on Bungeling Bay
Raid over Moscow
Rainbow Islands
Rail Boss
The Railroad Works
Rally Cross Simulator
Rally Racer
Rally Speedway
Rambo
Rambo: First Blood Part II
Rambo III
Rampage
Rampart
Ranarama
Rasputin
Rastan Saga
Rasterscan
The Rats
Ratsplat
RDF 1985
Reach for the Stars
Reader Rabbit
The Real Ghostbusters
Realm of Impossibility
Realms of Darkness
Reb |
https://en.wikipedia.org/wiki/Internet%20in%20Australia | Internet in Australia first became available on a permanent basis to universities in Australia in May 1989, via AARNet. Pegasus Networks was Australia's first public Internet provider in June 1989. The first commercial dial-up Internet Service Provider (ISP) appeared in capital cities soon after, and by the mid-1990s almost the entire country had a range of choices of dial-up ISPs. Today, Internet access is available through a range of technologies, i.e. hybrid fibre coaxial cable, digital subscriber line (DSL), Integrated Services Digital Network (ISDN) and satellite Internet. In July 2009, the federal government, in partnership with the industrial sector, began rolling out a nationwide fibre-to-the-premises (FTTP) and improved fixed wireless and satellite access through the National Broadband Network. Subsequently, the roll out was downgraded to a Multi-Technology Mix on the promise of it being less expensive and with earlier completion. In October 2020, the federal government announced an upgrade by 2023 of NBN fibre-to-the-node (FTTN) services to FTTP for 2 million households, at a cost of A$3.5 billion.
History
Early days
Australia was recognised as part of the Internet when the .au domain (ccTLD) was delegated to Robert Elz of the Australian Computing Science Network (ACSNet) in March 1986. From then on various universities connected intermittently (mostly via dialup UUCP protocol links) to allow for the sending and receiving of email links and for use by emerging newsgroup facilities. Prior to IP-based connection to the greater Internet, there existed an IP-based network, linking academic institutions within Australia, known as ACSNet, using the .oz domain and connected to international networks using other technologies. When Australia was fully integrated into the Internet, this domain was moved under .au to become .oz.au and still exists today.
The first permanent circuit connecting AARNet to ARPANet using TCP/IP over X.25 was established in May 1989. It linked the University of Melbourne with the University of Hawaii via a 2400 bit/s (bits per second) satellite connection. It was later upgraded to 56 kbit/s (kilobits per second), and then 256 kbit/s, at a time during which the US end-point was moved to San Jose at a NASA facility.
In 1992 there were two commercial ISPs competing with one another. DIALix provided services to Perth, and the other was Pegasus Networks in Byron Bay. In late 1994 the Telstra team led by Max Bosotti commenced negotiations to acquire all the assets of AARNet and establish a fully fledged commercial operation. Under AARNet the internet link to the node in Los Angeles consisted of a 1.5 Mbit/s link, accommodating all the dial-up services for Australia. After extensive negotiations with the Australian Vice-Chancellors' Committee (AVCC) Telstra Internet commenced operation out of Canberra on 1 July 1995. Prior to this operation the tariffs charged by the then small internet providers was based on time used on |
https://en.wikipedia.org/wiki/GoldenSource | GoldenSource Corporation, formerly known as "Financial Technologies International," is a global software company in the enterprise data management industry, founded in 1984 and headquartered in New York City, United States, with offices in London, Mumbai, Milan, Melbourne, and Hong Kong.
Most employees the company hires are from New York University; 10.7% of its employees attended NYU.
Products and services
GoldenSource provides enterprise data management solutions to domestic and international asset managers, banks, investment banks, broker-dealers, mutual fund companies, insurance companies, and global custodians, exchanges and depositories. The capabilities of GoldenSource cover the mastering, management, storage and distribution of all types of capital markets data, including: Securities, entities, customers, products, ESG, positions and transactions, corporate actions, pricing and market and risk data.
Typical uses of the software include: Product control, P&L attribution, IPV, client onboarding, solvency II, MiFID II, FRTB, BCBS 239, and other regulations. Financial institutions use GoldenSource software to achieve a central reliable source of data for use across trading, risk and finance.
Clients and partners
Many of GoldenSource's clients include large and mid-sized financial services companies on both the buy side and sell side. They partner with a number of technology and services providers.
References
Companies based in New York City
American companies established in 1984
Financial services companies established in 1984
Financial services companies of the United States
Software companies based in New York (state)
Business software companies
Software companies of the United States
1984 establishments in New York City
1984 establishments in the United States
Companies established in 1984 |
https://en.wikipedia.org/wiki/Mary%20Leigh%20Blek | Mary Leigh Blek is a gun control advocate from California. She serves as president emeritus of the Million Mom March and is a spokesperson for the national grassroots network of Million Mom chapters.
Blek became involved in gun control legislation after her son was murdered. In June 1994, her son Matthew Blek was confronted by three armed teenagers, and subsequently shot and killed.
Blek and her husband Charles founded the Orange County Citizens for the Prevention of Gun Violence in 1995. Blek later became the western regional organizer for the Million Mom March in 2000. Blek was also the co-founder and president of the Bell Campaign, a grassroots organization in Orange County, California, dedicated to the prevention of gun deaths and injuries. She frequently provides testimony before local, state, and federal legislators.
Her husband Charles is a member of the Lincoln Club of Orange County.
References
University of California, Los Angeles alumni
American gun control activists
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Cristo%20Rey%20St.%20Martin%20College%20Prep | Cristo Rey St. Martin College Prep, formerly St. Martin de Porres High School, is a private high school in Waukegan, Illinois, established in 2004. It is a member of the Cristo Rey work-study network of high schools, and is in the Roman Catholic Archdiocese of Chicago.
History
In 2001 Auxiliary Bishop Gerald Kicanas and Rev. George J. Rassas, both of St. Mary's Catholic Church in Lake Forest, suggested opening a Cristo Rey school to enroll Hispanic and Latino and low income teenagers in the Waukegan/North Chicago area. St. Martin de Porres was the first Catholic high school to be established in Lake County since Carmel High School in Mundelein, which opened in 1963.
In 2018, the school moved into a former Kmart store that was extensively remodeled to become a school campus. The new building has won multiple awards for creatively reusing an existing space.
Background
The Cristo Rey Network comprises 35 high schools that provide a Catholic, college preparatory education to urban young people who live in communities with limited educational options. And 80% of the students at CRSM qualify for the Federal Free and Reduced Lunch Program. Students cover the bulk of their tuition by working at entry-level jobs in the corporate world. Around 86 businesses employ students from St. Martin's. Videos are available covering the St. Martin experience.
Cristo Rey St. Martin is open to students of all faiths and cultures. There are five school-wide liturgies, prayer services on Martin Luther King Day and Ash Wednesday, and a spiritual retreat program for all the students. Sixty-five percent of the students choose to participate in voluntary service projects.
Academics
Twenty-eight two-semester credits are required for graduation. This includes 4 credits in English and math, science, and social studies, 2 in world languages, and 1 in physical education/health. A credit in theology and in work study must also be earned for each year in attendance. Also 4 credits must be chosen from the choice of 9 advanced placement courses and about 11 other electives. Further, eligible students can earn college credit directly through College of Lake County. And Jesuit Virtual Learning Academy (JVLA) courses are available online for courses not offered at St. Martin.
References
External links
School Website
More than a Dream (official book site)
Cristo Rey Network
Fr. John P. Foley honored with Presidential Citizen's Medal
60 minutes
Aljazeera
Cristo Rey Featured in WashPost column by George Will
Boston Globe - With sense of purpose, students cut class for a day
Bill & Melinda Gates Foundation - Success of Innovative Urban Catholic School Sparks Major Investment
Cristo Rey Network
Educational institutions established in 2004
Roman Catholic Archdiocese of Chicago
Catholic secondary schools in Illinois
Waukegan, Illinois
Schools in Lake County, Illinois
2004 establishments in Illinois |
https://en.wikipedia.org/wiki/Unified%20shader%20model | In the field of 3D computer graphics, the unified shader model (known in Direct3D 10 as "Shader Model 4.0") refers to a form of shader hardware in a graphical processing unit (GPU) where all of the shader stages in the rendering pipeline (geometry, vertex, pixel, etc.) have the same capabilities. They can all read textures and buffers, and they use instruction sets that are almost identical.
History
Earlier GPUs generally included two types of shader hardware, with the vertex shaders having considerably more instructions than the simpler pixel shaders. This lowered the cost of implementation of the GPU as a whole, and allowed more shaders in total on a single unit. This was at the cost of making the system less flexible, and sometimes leaving one set of shaders idle if the workload used one more than the other. As improvements in fabrication continued, this distinction became less useful. ATI Technologies introduced a unified architecture on the hardware they developed for the Xbox 360. Nvidia quickly followed with their Tesla design. AMD introduced a unified shader in card form two years later in the TeraScale line. The concept has been universal since then.
Early shader abstractions (such as Shader Model 1.x) used very different instruction sets for vertex and pixel shaders, with vertex shaders having much more flexible instruction set. Later shader models (such as Shader Model 2.x and 3.0) reduced the differences, approaching unified shader model. Even in the unified model the instruction set may not be completely the same between different shader types; different shader stages may have a few distinctions. Fragment/pixel shaders can compute implicit texture coordinate gradients, while geometry shaders can emit rendering primitives.
Unified shader architecture
Unified shader architecture (or unified shading architecture) is a hardware design by which all shader processing units of a piece of graphics hardware are capable of handling any type of shading tasks. Most often Unified Shading Architecture hardware is composed of an array of computing units and some form of dynamic scheduling/load balancing system that ensures that all of the computational units are kept working as often as possible.
Unified shader architecture allows more flexible use of the graphics rendering hardware. For example, in a situation with a heavy geometry workload the system could allocate most computing units to run vertex and geometry shaders. In cases with less vertex workload and heavy pixel load, more computing units could be allocated to run pixel shaders.
While unified shader architecture hardware and unified shader model programming interfaces are not a requirement for each other, a unified architecture is most sensible when designing hardware intended to support an API offering a unified shader model.
OpenGL 3.3 (which offers a unified shader model) can still be implemented on hardware that does not have unified shader architecture. Similarly, hardware t |
https://en.wikipedia.org/wiki/Clout%20%28radio%20show%29 | Clout is a talk radio program in the United States, which began on the Air America Radio Network, and is now airing on WCPT, a progressive talk radio station in Chicago.
The show is hosted by Richard Greene (a communications consultant, attorney and prominent vegetarian who has been closely associated with motivational guru Anthony Robbins) and debuted on May 26, 2007, airing Saturday nights with a replay on Sunday afternoons. The show is variously referred to on the air as "Clout", "Hollywood Clout", and "Clout with Richard Greene".
In September 2007 Air America Radio moved the show to weeknights and could also be heard live on XM radio channel 167 America Left, a Weekend edition also premiered at that time, with guest hosts along with clips from Greene's interviews during his weekday show.
Air America Radio filed for bankruptcy and ceased broadcasting in January 2010; Clout can now be heard on WCPT and its live Internet stream, weeknights 8-9PM CT.
About Host Richard Greene
Richard Greene is an American media personality, speaker and writer who was the creator and host of Clout. The Sunday Times of London called Richard "the master of charisma". He is the author of several books including Words that Shook the World from Penguin Press. Richard was also a celebrity judge on The Learning Channel's series The Messengers and is a regular contributor to The Huffington Post.
Richard Greene is also a speaker and speech coach with many high-profile appearances and clients including the late Princess Diana.
References
External links
Clout at Air America Radio
Clout at WCPT website
Air America (radio network)
American talk radio programs
Radio programs on XM Satellite Radio |
https://en.wikipedia.org/wiki/Patterned%20media | Patterned media (also known as bit-patterned media or BPM) is a potential future hard disk drive technology to record data in magnetic islands (one bit per island), as opposed to current hard disk drive technology where each bit is stored in within a continuous magnetic film. The islands would be patterned from a precursor magnetic film using nanolithography. It is one of the proposed technologies to succeed perpendicular recording due to the greater storage densities it would enable. BPM was introduced by Toshiba in 2010.
Comparison with existing HDD technology
In existing hard disk drives, data is stored in a thin magnetic film. This film is deposited so that it consists of isolated (weakly exchange coupled) grains of material of around diameter. One bit of data consists of around that are magnetized in the same direction (either "up" or "down", with respect to the plane of the disk). One method of increasing storage density has been to reduce the average grain volume. However, the energy barrier for thermal switching is proportional to the grain volume. With existing materials, further reductions in the grain volume would result in data loss occurring spontaneously due to superparamagnetism.
In patterned media, the thin magnetic film is first deposited so there is strong exchange coupling between the grains. Using nanolithography, it is then patterned into magnetic islands. The strong exchange coupling means that the energy barrier is now proportional to the island volume, rather than the volume of individual grains within the island. Therefore, storage density increases can be achieved by patterning islands of increasingly small diameter, whilst maintaining thermal stability. Patterned media is predicted to enable areal densities up to as opposed to the limit that exists with current HDD technology.
Differences in read/write head control strategies
In existing HDDs data bits are ideally written on concentric circular tracks. This process is different in bit patterned media recording where data
should be written on tracks with predetermined shapes, which are created by lithography (see below) on the disk. The trajectories that are required to be followed by the servo system in patterned media recording are characterized by a set of "servo tracks" existing on the disk. Deviation of a servo track from an ideal circular shape is called "repeatable runout" (RRO). Therefore, the servo controller in bit patterned media recording has to follow the RRO which is unknown in the time of design, and as a result the servo control methodologies used for conventional drives cannot be applied. Patterned media recording has some specific challenges in terms of servo control design:
RRO profile is unknown.
RRO frequency spectrum can spread beyond the bandwidth of the servo system; therefore, it will be amplified by the feedback controller.
RRO spectrum contains many harmonics of the spindle frequency (e.g. ~ 200 harmonics) that should be attenuated. |
https://en.wikipedia.org/wiki/War%20Front | War Front may refer to:
War Front: Turning Point, a computer game
War Front (horse) (foaled 2002), American Thoroughbred racehorse
Warfront, a war comic published by Harvey Comics
See also
Battlefront (disambiguation) |
https://en.wikipedia.org/wiki/Active%20message | An Active message (in computing) is a messaging object capable of performing processing on its own. It is a lightweight messaging protocol used to optimize network communications with an emphasis on reducing latency by removing software overheads associated with buffering and providing applications with direct user-level access to the network hardware.
This contrasts with traditional computer-based messaging systems in which messages are passive entities with no processing power.
Distributed Memory Programming
Active messages are communications primitive for exploiting the full performance and flexibility of modern computer interconnects. They are often classified as one of the three main types of distributed memory programming, the other two being data parallel and message passing. The view is that Active Messages are actually a lower-level mechanism that can be used to implement data parallel or message passing efficiently.
The basic idea is that each message has a header containing the address or index of a userspace handler to be executed upon message arrival, with the contents of the message passed as an argument to the handler. Early active message systems passed the actual remote code address across the network, however this approach required the initiator to know the address of the remote handler function when composing a message, which can be quite limiting even within the context of a SPMD programming model (and generally relies upon address space uniformity which is absent in many modern systems). Newer active message interfaces require the client to register a table with the software at initialization time that maps an integer index to the local address of a handler function; in these systems the sender of an active message provides an index into the remote handler table, and upon arrival of the active message the table is used to map this index to the handler address that is invoked to handle the message.
Other variations of active messages carry the actual code itself, not a pointer to the code. The message typically carries some data. On arrival at the receiving end, more data is acquired, and the computation in the active message is performed, making use of data in the message as well as data in the receiving node. This form of active messaging is not restricted to SPMD, although originator and receiver must share some notions as to what data can be accessed at the receiving node.
Integration, usage for micro-services, orchestration, ESB architecture
A higher level implementation for active messages is also named Swarm communication in the SwarmESB project. The basic model of the active messages is extend with new concepts and Java Script is used to express the code of the active messages.
References
Sources and external links
https://web.archive.org/web/20070610055547/http://www.tc.cornell.edu/Services/Education/Topics/Parallel/Distributed/%2B6.3%2BActive%2BMessages.htm
https://github.com/salboaie/SwarmESB/
GASNet |
https://en.wikipedia.org/wiki/Gambler%27s%20Help | Gambler's Help is a network of agencies funded by the State Government in Victoria, Australia to provide a range of community served for gambling related issues. Gambler's Help is administered by the Victorian Responsible Gambling Foundation, but receives funding from the Community Support Fund which receives a portion of the profits from the operation of gaming machines (better known as poker machines) in Victoria.
History
Gambler's Help was established under the name Breakeven in 1994 with the first regional services commencing operation in 1995. The name was changed to Gambler's Help in November 2000.
Network
The Gambler's Help network in the state of Victoria consists of:
A range of projects and a communications campaign delivered and managed by the Office of Gaming and Racing's Problem Gambling Unit
A statewide telephone counselling service
Gambler's Help Line 1800 858 858
Regional services which provide counselling, financial counselling and community education as well as manage local projects.
Separately funded are a Gambler's Help Indigenous service and multicultural service.
External links
Gambler's Help
References
Problem gambling organizations
Victoria State Government
Gambling in Australia |
https://en.wikipedia.org/wiki/John%20Bridges%20%28software%20developer%29 | John Bridges is the co-author of the computer program PCPaint and primary developer of the program GRASP for Microtex Industries with Doug Wolfgram. He is also the sole author of GLPro and AfterGRASP. His article entitled "Differential Image Compression" was published in the February 1991 issue of Dr. Dobb's Journal.
Early work
In 1980 Bridges started his programming career at the NYU Institute for Reconstructive Plastic Surgery as a summer intern, working with sophisticated programmable vector graphics systems. He wrote editing tools and also updated and debugged software used for early 3D x-ray scanning research.
From 1981-85 Bridges wrote the RAM disk drivers, utilities, cracking software, task switching software, and memory test diagnostics for Abacus, a maker of large memory cards for the Apple II.
In 1982, he started working for Classroom Consortia Media, Inc., an educational software company, developing and writing Apple and IBM graphics libraries and tools for their software. During his tenure there he created a drawing program called SuperDraw for CCM, and on his own wrote the core graphics code for what would later become PCPaint, as well as develop the GRASP GL library format.
PCPaint
In 1984, Bridges developed the first version of PCPaint with Doug Wolfgram for Mouse Systems. PCPaint was the first IBM PC-based mouse driven GUI paint program. The company purchased the exclusive rights to PCPaint, and John continued development until 1990.
GRASP
In 1985, Bridges' PCPaint code and Doug's slideshow program morphed into a new program, GRASP. GRASP was the first multimedia animation program for the IBM PC and created the GRASP GL library format. GRASP was originally released as shareware through Doug's company, Microtex Industries. However, version 2.0 and after were sold commercially by Paul Mace Software. Doug sold his shares of both PCPaint and GRASP to Bridges in 1990, and Bridges' work on GRASP continued through 1994, when he terminated the contract with Paul Mace Software. Bridges' work on GRASP included several toolsets and add-ons, such as Pictor Paint, ARTools, HRFE (High Res Flic Enhancement), and PC Speaker sound code that caused Paul Mace Software to be threatened with a lawsuit by RealSound because of the use of frequency modulation, upon which RealSound held a patent.
A stripped-down version of GRASP 4.0 was also included with copies of Philip Shaddock's Multimedia Creations: Hands-On Workshop for Exploring Animation and Sound.
VIDSPEED
In 1987, Bridges released VIDSPEED, a freeware program that tests the speed of graphics cards by "[measuring] the throughput of writing constant
pixel data to video memory over the bus in graphics modes." VIDSPEED was well received in the community and was recommended in at least two books, Patrick Killelea's Web Performance Tuning and Stephen J. Bigelow's Bigelow's Computer Repair Toolkit, though Bigelow expresses concern over support and updates.
IBM Project
In 1986-87 Bridges |
https://en.wikipedia.org/wiki/World%20ORT | ORT (), also known as the Organisation for Rehabilitation through Training, is a global education network driven by Jewish values. It promotes education and training in communities worldwide. Its activities throughout its history have spanned more than 100 countries and five continents. It was founded in 1880 in Saint Petersburg to provide professional and vocational training for young Jews.
Overview
World ORT is a federation of autonomous ORT national organisations. In 2005 ORT's global budget exceeded US$250 million annually. As of 2016, its annual budget was US$62.7 million. ORT's current operations are in Israel, the former Soviet Union (including the Baltic States), Europe, Latin America, and South Africa. ORT also runs International Cooperation programs and supports non-sectarian economic and social development in underdeveloped parts of the world, with vocational training and the provision of technical assistance.
In 2003 Israel was the area of ORT's largest operation, with 90,000 students educated or trained at ORT's 159 schools, colleges and institutions, educating 25% of Israel’s hi-tech workforce. However, in 2006 ORT Israel withdrew from World ORT. World ORT continues to work in Israel under the name of Kadima Mada-Educating for Life, working with the Israeli Ministry of Education, other Israeli ministries, regional councils and hospitals providing increased resources and improved facilities and schools equipment. World ORT raises funds through its membership organisations in different countries and through the Jewish Federations of North America'' (JFNA).
World ORT is legally constituted in Switzerland, but operates from offices in London, England. It has consultative status for information and education purposes with UNESCO, and observer status at the International Labour Organization
ORT is a founding member of ICVA (International Council of Voluntary Agencies).
History
The second partition of Poland in 1793 had resulted in a sharp increase in the number of Jews in Russia, so that in 1794 Empress Catherine the Great decreed that the majority of them would henceforth be restricted to living and working in the Pale of Settlement. The Jews were not allowed to leave the Pale or own land outside it. They were removed from their homes and villages and once resettled, barred from all but a handful of professions. The crowded conditions and legal barriers to self-sufficiency led to deepening poverty for the Pale's four million inhabitants. After the reforms of Tsar Alexander II in the 1860s, the situation improved for some Jews but those in the Pale remained trapped by economic hardship and dismal conditions. In 1880, Samuel Polyakov, Horace de Gunzburg and Nikolai Bakst petitioned Tsar Alexander II for permission to start an assistance fund which would improve the lives of the millions of Russian Jews then living in poverty. The fund would provide education and training in practical occupations like handicrafts and agricultural ski |
https://en.wikipedia.org/wiki/ISmell | The iSmell is a commercial application of digital scent technology. Personal Scent Synthesizer developed by DigiScents Inc. was a small device that can be connected to a computer through a universal serial bus (USB) port and powered using any ordinary electrical outlet. The appearance of the device is similar to that of a shark’s fin, with many holes lining the “fin” to release the various scents. Using a cartridge similar to a printer’s, it can synthesize and even create new smells from certain combinations of other scents. These newly created odors can be used to closely replicate common natural and man-made odors. The cartridges used also need to be swapped every so often once the scents inside are used up. Once partnered with websites and interactive media, the scents can be activated either automatically once a website is opened or manually. However, the product is no longer on the market and never generated substantial sales. Digiscent had plans for the iSmell to have several versions but did not progress past the prototype stage. The company did not last long and filed for bankruptcy a short time after.
In 2006, PC World Magazine commented that "[f]ew products literally stink, but this one did--or at least it would have, had it progressed beyond the prototype stage."
Digiscent
Company start
In 1999, Joel Lloyd Bellenson and Dexter Smith, on vacation in Miami, began to think about how to store and reproduce the smells that they had experienced on the beach. They first worked to create a database of smells and then they created the device that would connect to the PC, the iSmell. Their idea was considered to be somewhat profitable, as they had raised “$20 million investments by major investors” such as Givaudan, the largest perfumes and essences company and Real Networks, a provider of streaming services.
Bankruptcy
The iSmell lacked not in technological capability but in marketing success. DigiScents has shut down due to a lack of funding, although as of June 2001, it was still licensing its technology and looking for funding for a relaunch.
Product design
The iSmell was designed to be easy to set up and use, a simple USB port and a cable to be plugged into an ordinary electrical outlet. Digiscents collected thousands of smells based on their chemical makeup and their spot on the spectrum of smells. Each combination of chemicals was then assigned to a small file that represented that specific mixture of ingredients. The file is then embedded into a website, email, or computer program. The user triggers the smell by clicking on the file or opening an email. When the file is opened, that file is sent to the Digiscent and the iSmell will emit the correct combination and amount of chemicals to replicate the requested smell.
Prototype
The original prototype was a black box that was 5 inches deep, 2 inches wide, and 3 inches tall. The device would contain a cartridge which held a set amount of smells. When activated, a fan will start s |
https://en.wikipedia.org/wiki/Clipping%20%28signal%20processing%29 | Clipping is a form of distortion that limits a signal once it exceeds a threshold. Clipping may occur when a signal is recorded by a sensor that has constraints on the range of data it can measure, it can occur when a signal is digitized, or it can occur any other time an analog or digital signal is transformed, particularly in the presence of gain or overshoot and undershoot.
Clipping may be described as hard, in cases where the signal is strictly limited at the threshold, producing a flat cutoff; or it may be described as soft, in cases where the clipped signal continues to follow the original at a reduced gain. Hard clipping results in many high-frequency harmonics; soft clipping results in fewer higher-order harmonics and intermodulation distortion components.
Audio
In the frequency domain, clipping produces strong harmonics in the high-frequency range (as the clipped waveform comes closer to a squarewave). The extra high-frequency weighting of the signal could make tweeter damage more likely than if the signal was not clipped.
Many electric guitar players intentionally overdrive their amplifiers (or insert a "fuzz box") to cause clipping in order to get a desired sound (see guitar distortion).
In general, the distortion associated with clipping is unwanted, and is visible on an oscilloscope even if it is inaudible.
Images
In the image domain, clipping is seen as desaturated (washed-out) bright areas that turn to pure white if all color components clip. In digital colour photography, it is also possible for individual colour channels to clip, which results in inaccurate colour reproduction.
Causes
Analog circuitry
A circuit designer may intentionally use a clipper or clamper to keep a signal within a desired range.
When an amplifier is pushed to create a signal with more power than it can support, it will amplify the signal only up to its maximum capacity, at which point the signal will be amplified no further.
An integrated circuit or discrete solid state amplifier cannot give an output voltage larger than the voltage it is powered by (commonly a 24- or 30-volt spread for operational amplifiers used in line-level equipment).
A vacuum tube can only move a limited number of electrons in an amount of time, dependent on its size, temperature, and metals.
A transformer (most commonly used between stages in tube equipment) will clip when its ferromagnetic core becomes electromagnetically saturated.
Digital processing
In digital signal processing, clipping occurs when the signal is restricted by the range of a chosen representation. For example in a system using 16-bit signed integers, 32767 is the largest positive value that can be represented, and if during processing the amplitude of the signal is doubled, sample values of 32000 should become 64000, but instead they are truncated to the maximum, 32767. Clipping is preferable to the alternative in digital systems — wrapping — which occurs if the digital hardware is allowed to |
https://en.wikipedia.org/wiki/Space-based%20architecture | A Space-based architecture (SBA) is an approach to distributed computing systems where the various components interact with each other by exchanging tuples or entries via one or more shared spaces. This is contrasted with the more common Message queuing service approaches where the various components interact with each other by exchanging messages via a message broker. In a sense, both approaches exchange messages with some central agent, but how they exchange messages is very distinctive.
An analogy might be where a message broker is like an Academic conference, where each presenter has the stage, and presents in the order they are scheduled; whereas a tuple space is like an Unconference, where all participants can write on a common whiteboard concurrently, and all can see it at the same time.
Tuple Spaces
each space is like a 'channel' in a message broker system that components can choose to interact with
components can write a 'tuple' or 'entry' into a space, while other components can read entries/tuples from the space, but using more powerful mechanisms than message brokers
writing entries to a space is generally not ordered as in a message broker, but can be if necessary
designing applications using this approach is less intuitive to most people, and can present more cognitive load to appreciate and exploit
Message Brokers
each broker typically supports multiple 'channels' that components can choose to interact with
components write 'messages' to a channel, while other components read messages from the channel
writing messages to a channel is generally in order, where they are generally read out in the same order
designing applications using this approach is more intuitive to most people, sort of the way that NoSQL databases are more intuitive than SQL
A key goal of both approaches is to create loosely-coupled systems that minimize configuration, especially shared knowledge of who does what, leading to the objectives of better availability, resilience, scalability, etc.
More specifically, an SBA is a distributed-computing architecture for achieving linear scalability of stateful, high-performance applications using the tuple space paradigm. It follows many of the principles of representational state transfer (REST), service-oriented architecture (SOA) and event-driven architecture (EDA), as well as elements of grid computing. With a space-based architecture, applications are built out of a set of self-sufficient units, known as processing-units (PU). These units are independent of each other, so that the application can scale by adding more units.
The SBA model is closely related to other patterns that have been proved successful in addressing the application scalability challenge, such as shared nothing architecture (SN), used by Google, Amazon.com and other well-known companies. The model has also been applied by many firms in the securities industry for implementing scalable electronic securities trading applications.
Hist |
https://en.wikipedia.org/wiki/Distributed%20networking | Distributed networking is a distributed computing network system where components of the program and data depend on multiple sources.
Overview
Distributed networking, used in distributed computing, is the network system over which computer programming, software, and its data are spread out across more than one computer, but communicate complex messages through their nodes (computers), and are dependent upon each other. The goal of a distributed network is to share resources, typically to accomplish a single or similar goal. Usually, this takes place over a computer network, however, internet-based computing is rising in popularity. Typically, a distributed networking system is composed of processes, threads, agents, and distributed objects. Merely distributed physical components is not enough to suffice as a distributed network; typically distributed networking uses concurrent program execution.
Client/server
Client/server computing is a type of distributed computing where one computer, a client, requests data from the server, a primary computing center, which responds to the client directly with the requested data, sometimes through an agent. Client/server distributed networking is also popular in web-based computing. Client/Server is the principle that a client computer can provide certain capabilities for a user and request others from other computers that provide services for the clients. The Web's Hypertext Transfer Protocol is basically all client/server.
Agent-based
A distributed network can also be agent-based, where what controls the agent or component is loosely defined, and the components can have either pre-configured or dynamic settings.
Decentralized
Decentralization is where each computer on the network can be used for the computing task at hand, which is the opposite of the client/server model. Typically, only idle computers are used, and in this way, it is thought that networks are more efficient. Peer-to-peer (P2P) computation is based on a decentralized, distributed network, including the distributed ledger technology such as blockchain.
Mesh
Mesh networking is a local network composed of devices (nodes) that was originally designed to communicate through radio waves, allowing for different types of devices. Each node is able to communicate with every other node on the network.
Advantages of distributed networking
Prior to the 1980s, computing was typically centralized on a single low-cost desktop computer. But today, computing resources (computers or servers) are typically physically distributed in many places, which distributed networking excels at. Some types of computing doesn't scale well past a certain level of parallelism and the gains of superior hardware components, and thus is bottle-necked, such as by Very Large Scale Instruction Words. By increasing the number of computers rather than the power of their components, these bottlenecks are overcome. Situations where resource sharing becomes an issue, or wher |
https://en.wikipedia.org/wiki/ViewMinder | ViewMinder is a computer application for managing content, rights and usage of digital images using structured metadata. The program was first published in August 2003. The freeware version, ViewMinder Express, had the same features but could organize no more than 250 pictures.
Version 4.01 supported Windows XP and Windows 2000. In October 2007 its publisher, ViewMinder Limited of Cambridge, England announced that consumer versions of the program had been discontinued.
Organizer
ViewMinder manages images by using structured metadata stored in an embedded relational database. This is claimed to produce more accurate search results than traditional image organizers that find image content according to a list of keywords.
It uses a subset of the metadata proposed by the DIG35 Initiatives Group . Although this group was formed by the I3A association, representing major international imaging companies, ViewMinder seems to be the only implementation of the DIG35 specification.
XML was the recommended implementation structure for DIG35 but ViewMinder instead uses SQLite , an ACID-compliant relational database management system.
A picture's content can be described using any number of elements – people, places, events and "others". In addition to describing what is shown, an element can have an "unseen" field, where things related to the image but not appearing in it can be mentioned without creating misleading search results.
ViewMinder also tracks image authors (photographers or designers) and can monitor image rights and usage.
Formats
ViewMinder accepts images in the formats jpg, bmp, png and uncompressed tif. The technical data (Exif or DCF) embedded in files from digital cameras is imported into the database at the same time and can later be used in searches.
To save disc space, tif images can be converted to png during import and converted back during export. Images sizes and filenames can be changed automatically during export.
Image editing
ViewMinder contains a simple image editor that can rotate and crop images, and adjust brightness. Alternatively, the user can define one or several external image editing programs, which can then can be invoked transparently to edit images while ViewMinder is running.
To be compatible in this way, the external image editor must accept a filename as an argument i.e. in response to the command editor.exe,image.jpg the editing program editor.exe must open the file image.jpg. Photoshop Elements and IrfanView are given as examples of compatible external editors.
Searches
Images are displayed in classes, a different set of classes for Dates, Countries, Authors, Lightboxes, People, Locations and Events. When the user places an image in a certain class, the class information is written to the database. When the user selects the class, the database is searched for the class information. Images imported from other ViewMinder users therefore arrange themselves into the correct classes.
There is also a |
https://en.wikipedia.org/wiki/CNGrid | CNGrid () is the Chinese national high performance computing network supported by 863 Program.
Research and development
China National Grid (CNGrid) is a major project supported by the Hi-Tech Research and Development (863) Program of China. CNGrid is the new generation test-bed of information infrastructure aggregating high-performance computing and transaction processing capabilities.
Through resource sharing, work in coordination, and service mechanism, CNGrid effectively supports many applications such as scientific research, resource environment, advanced manufacturing, and information services. CNGrid promotes the construction of national information industry and the development of related industries by technological innovations.
China National Grid Software, named CNGrid GOS, is a suite of grid software with independent intellectual property, which is developed by CNGrid software R&D project team. It mainly includes a system software, a CA certificate management system and a testing environment, three business version of sub-systems (high-performance computing gateway, data grid, and grid workflow), and a monitoring system.
This project is undertaken by seven organizations including Institute of Computing Technology of Chinese Academy of Sciences, Jiangnan Institute of Computing Technology, Tsinghua University, National University of Defense Technology, Beihang University, Computer Network Information Center of Chinese Academy of Sciences, and Shanghai Supercomputing Center.
2. CNGrid GOS system software
CNGrid GOS system software (VegaGOS) provides functionalities including global naming management, VO management, user management, resource management, application runtime management and so on. The VegaGOS has many important innovations in global naming management, distributed resource management, virtual organization (agora), grid process (grip) technology, grid security mechanism, supporting a variety of domain applications, etc.
(1) Naming. Naming is a decentralized and name-stable global object (Gnode) management system. Naming supports locating objects by the global unique identifier with the feature of low latency and high success ratio; Naming also supports object searching based-on attribute-match with the feature of low latency and high recall ratio. Naming is a fundamental component in VegaGOS to construct the whole system. As a reusable component, Naming forms a global layer of virtual names to solve the problem of non-stable of physical address and tight coupling between applications and resources.
(2) Resource management. Resources in VegaGOS are in various forms, and are accessed in different ways. It is really difficult to describe and manage those heterogeneous resources. The introduction of resource controller mechanism (RController) is in order to import and manage various heterogeneous resources in a unified way. RController provides many functions for resources like create, destroy, access control, access, rea |
https://en.wikipedia.org/wiki/Motorola%20i886 | The Motorola i886 is the first ever qwerty slider style cellular telephone designed for use with iDEN Networks. It was released for Nextel on January 9, 2011.
Background
Like the Motorola i850, i760, and even the i920/i930, the i886 supports both iDEN 800mhz and 900mhz bands. The iDEN 900 band is also supported pending Sprint's petition to move all iDEN spectrum away from the 800 band for public safety workers to utilize it.
The i886 is an Android device that features an alphanumeric keypad and a slide-out QWERTY keyboard, but the screen does not support touch functions. It utilizes Bluetooth2.1 support with OBEX and hands-free earpiece compliance.
The i886 adds selective dynamic group call, MP3 support, MIDI/WAV support, and TransFlash/Micro SD support for cards up to 32 GB-to-date. The i886 also features a digital camera, but the resolution has been increased to 2 megapixels, and video recording.
The i885 is the first phone to feature mo-sms on Sprint Nextel's iDEN network.
There are currently no criticisms as of this time, neither there are any opportunities to find any for the timebeing.
Regulatory information
See also
Motorola iDEN phone models
Sprint Nextel
External links
Motorola i886 Manual in PDF Format
Motorola i886 Specs
I886
IDEN mobile phones
Mobile phones introduced in 2011 |
https://en.wikipedia.org/wiki/Matt%20Saracen | Matthew "Matt" Saracen is a fictional character in the NBC/DirecTV (The 101 Network) television drama series Friday Night Lights portrayed by the actor Zach Gilford. He is the former backup quarterback of the Dillon High School Panthers before being thrust into the starting spotlight after Jason Street suffers a career-ending injury. His character is based on Chris Comer from the original 1990 book and the 2004 film.
Background
Matt is the son of Henry Saracen and Shelby Garrett. He lives alone with his grandmother, Lorraine Saracen. Matt takes care of Lorraine due to her old age and battle with dementia. At one time, Matt's relationship with both of his parents was strained. His father, Henry, was in the U.S. Army and his mother, Shelby, left Matt when he was a child after divorcing Henry. The full extent of their relationship is unknown, but it is implied that Henry may have been an abusive husband.
Overview
He is the back-up quarterback for the Dillon Panthers in the ”Pilot” as a sophomore. Eventually, he is the starting quarterback for the Dillon Panthers in seasons 1 and 2. He then becomes a wide receiver for the Dillon Panthers in season 3, his senior year. He is a main character in seasons 1 through 3 and continues to play an important role in the series throughout seasons 4 and 5.
In season 1, when Henry is first introduced, the difficult relationship between father and son is revealed. Throughout the show, it is shown that Matt sees Coach Eric Taylor as more of a father figure than Henry. Henry exhibits some symptoms of posttraumatic stress disorder (P.T.S.D.). Landry warns Matt that he [Henry] may be "all messed up from the war." However, the term is never explicitly mentioned in the show, leading him to become distant and uncaring of his family, which deeply hurts Matt. During his senior year of high school, in season 3, Matt slowly begins reconnecting with his mother, who desperately wants to be a part of her son's life again. The season after graduating, season 4, Matt's father dies after stepping on an IED. Matt became an East Dillon supporter following Coach Taylor coaching the EDHS football program, along with Julie and Landry attending EDHS.
Characterization
Matt is something of an "anti-jock" who "listens to Bob Dylan and draws pictures" and is generally out of place with his teammates, such as Smash Williams and Tim Riggins, who are often seen hanging around girls or at parties, and even his predecessor, the charismatic and popular Jason Street. He is more socially awkward and often looks uncomfortable with the attention he receives as the star quarterback. His closest friend is Landry Clarke, a "nerd". An introvert, Matt's shy nature sometimes comes across as a lack of self-confidence and, according to Smash, he was "so shy he had to e-mail his plays in". Unlike most of his teammates, college football is not high on his priority list after high school.
Storylines
Season 1
When the series begins, Matt is the back-up quart |
https://en.wikipedia.org/wiki/Jason%20Street | Jason Mitchell Street is a fictional character in the NBC/DirecTV (The 101 Network) television drama Friday Night Lights, portrayed by Scott Porter. Introduced as the small town "All-American," Jason is the starting quarterback of the Dillon Panthers, with a promising future career, until an injury during the season-opening football game results in paraplegia. Jason's story arc is focused on his adjusting to life and carving out a niche for himself outside of Panthers' football. In Season 3, due to Porter leaving the show, Jason moves to New York City after landing an entry-level position at a sports agency to be near his infant son.
The character is inspired by the real-life events in the career of David Edwards, a high school player in San Antonio, Texas.
Background
Jason is portrayed as a confident, affable, charismatic and popular all-American high school student from a middle-class home with loving and supportive, although sometimes over-protective, parents. He is presumably the only child of Mitchell and Joanne Street (there is no mention of siblings). He, Landry and Julie Taylor are the only original main characters in high school who come from stable, two-parent families, in contrast to the others, all of whom come from divorced or single-parent homes or families with absent parental figures. Of the adult characters in the show, Jason is closest to Coach Taylor, who coached him since elementary school and was his position coach in high school, and often seeks his advice.
Despite his social status as a jock and star quarterback, he is well-liked by everyone, young and old, in both his school and the community (including the notoriously difficult and loud-mouthed Buddy Garrity). Tim Riggins once called him "the heart" of the Panthers team and as the season progresses, it becomes apparent that he still commanded his former teammates' respect and loyalty, even from his wheelchair.
Jason is best friends with Tim Riggins, his fullback. They have known each other, and Jason's (ex) girlfriend Lyla Garrity, since middle school. Throughout the show they are seen supporting each other almost unconditionally and bailing one another out of trouble. Prior to his injury, Jason was dating Lyla Garrity, who was then captain of the cheerleading team, and had an on-off relationship and brief engagement before circumstances led them to break up for good. Their friendship is tested in Season 1 when Tim sleeps with Lyla to cope with his feelings of guilt and self-hatred as he felt he could have prevented Jason's injury by tackling the defensive player before Jason did. In Season 2, they are on speaking terms and still good friends.
Character
Early in season 1, it is established that Jason is a seventeen-year-old high school senior at Dillon High School and by Season 3 he is around age twenty. Throughout the season, he is seen supporting the Panthers, be it from his hospital bed or by personally coaching his successor Matt Saracen before practices. Whether |
https://en.wikipedia.org/wiki/Series%201900 | Series 1900, 1900 series, or variant, may refer to:
ICT 1900 series of mainframe computers
Cisco 1900-series switch for computer networking
Unimate 1900 series mechanical arm, first robotic arm for die casting
Series 1900 dollar bills of the United States; see History of the United States dollar
Series 1900 leu coins of Romania; see Coins of the Romanian leu
See also
1900 world series of American baseball
1900 (disambiguation) |
https://en.wikipedia.org/wiki/Internet%20in%20the%20United%20States | The Internet in the United States grew out of the ARPANET, a network sponsored by the Advanced Research Projects Agency of the U.S. Department of Defense during the 1960s. The Internet in the United States in turn provided the foundation for the worldwide Internet of today.
Internet connections in the United States are largely provided by the private sector and are available in a variety of forms, using a variety of technologies, at a wide range of speeds and costs. In 2019, the United States ranked 3rd in the world for the number of internet users (behind China and India), with 312.32 million users. As of 2019, 90% of adults in America use the internet, either irregularly or frequently. The United States ranks #1 in the world with 7,000 Internet Service Providers (ISPs) according to the CIA. Internet bandwidth per Internet user was the 43rd highest in the world in 2016.
Internet top-level domain names specific to the U.S. include .us, .edu, .gov, .mil, .as (American Samoa), .gu (Guam), .mp (Northern Mariana Islands), .pr (Puerto Rico), and .vi (U.S. Virgin Islands). Many U.S.-based organizations and individuals also use generic top-level domains, such as .com, .net, .org, .name, etc.
Overview
Access and speed
Access to the Internet can be divided into dial-up and broadband access. Around the start of the 21st century, most residential access was by dial-up, while access from businesses was usually by higher speed connections. In subsequent years dial-up declined in favor of broadband access. Both types of access generally use a modem, which converts digital data to analog for transmission over a particular analog network (ex. the telephone or cable networks).
Dial-up access is a connection to the Internet through a phone line, creating a semi-permanent link to the Internet. Operating on a single channel, it monopolizes the phone line and is the slowest method of accessing the Internet. Dial-up is often the only form of Internet access available in rural areas because it requires no infrastructure other than the already existing telephone network. Dial-up connections typically do not exceed a speed of 56 kbit/s, because they are primarily made via a 56k modem.
Broadband access includes a wide range of speeds and technologies, all of which provide much faster access to the Internet than dial-up. The term "broadband" once had a technical meaning, but today it is more often used as a marketing buzzword to simply mean "faster". Broadband connections are continuous or "always on" connections, without the need to dial and hangup, and do not monopolize phone lines. Common types of broadband access include DSL (digital subscriber lines), which uses a telephone line, cable Internet access, satellite Internet access, and mobile or wireless broadband, via cell phones or a mobile broadband modem, through a cellular or wireless network, and from a cell tower. In 2015, the United States Federal Communications Commission (FCC) defined broadband as any co |
https://en.wikipedia.org/wiki/Government%20database | A government database collects information for various reasons, including climate monitoring, securities law compliance, geological surveys, patent applications and grants, surveillance, national security, border control, law enforcement, public health, voter registration, vehicle registration, social security, and statistics.
Canada
National DNA Data Bank, a system established under the DNA Identification Act of 1998 to hold DNA profiles of persons convicted of designated offenses and DNA profiles obtained from crime scenes. Profiles may only be used for law enforcement purposes. At the end of September 2013 the National DNA Data Bank held 277,590 profiles in the Convicted Offender Index and 88,892 profiles in the Crime Scene Index with from 500 to 600 new samples received each week.
Government Electronic Directory Services, a directory of Canadian federal public servants throughout the country, including names, titles, telephone and facsimile numbers, departmental names, office locations, and e-mail addresses for some public servants.
Homeless Individuals and Families Information System, a free client management application created in 1995 to assist service providers in managing their operations and collecting information about the population using homeless shelters, client bookings, provision of goods and services, housing placement, and case management. Its data may be exported and incorporated into the National Homelessness Information System. Personal identifiers are replaced by unique, encrypted identifiers before the data is exported to ensure that client information is and remains anonymous.
National Homelessness Information System, a database system designed to collect and analyze baseline data on the use of homeless shelters in Canada. It includes anonymized data imported from Homeless Individuals and Families Information System systems as well as data shared by some cities and provinces that do not use that system.
System for Electronic Document Analysis and Retrieval, a filing system developed for the Canadian Securities Administrators to facilitate the electronic filing of securities information, allow for the public dissemination of Canadian securities information collected in the securities filing process, and provide electronic communication between electronic filers, agents and the Canadian Securities Administrator.
European Union
Eurodac system, a computerised central database established in December 2000 for comparing fingerprints of asylum seekers and some categories of illegal immigrants and a system for electronic data transmission between EU countries and the database. The database contains fingerprints, EU country of origin, sex, place and date of asylum application or apprehension of the person, reference number, date fingerprints were taken, and the date when the data was transmitted.
Data Retention Directive, a directive passed by the legislative body of the European Union on 15 December 2005 that requires tel |
https://en.wikipedia.org/wiki/List%20of%20mammals%20of%20Mexico | This is a list of the native wild mammal species recorded in Mexico. As of September 2014, there were 536 mammalian species or subspecies listed. Based on IUCN data, Mexico has 23% more noncetacean mammal species than the U.S. and Canada combined in an area only 10% as large, or a species density over 12 times that of its northern neighbors. Mexico's high mammal biodiversity is in part a reflection of the wide array of biomes present over its latitudinal, climatic and altitudinal ranges, from lowland tropical rainforest to temperate desert to montane forest to alpine tundra. The general increase in terrestrial biodiversity moving towards the equator is another important factor in the comparison. Mexico includes much of the Mesoamerican and Madrean pine-oak woodlands biodiversity hotspots. From a biogeographic standpoint, most of Mexico is linked to the rest of North America as part of the Nearctic realm. However, the lowlands of southern Mexico are linked with Central America and South America as part of the Neotropical realm. Extensive mixing of Nearctic and Neotropical mammal species commenced only three million years ago, when the formation of the Isthmus of Panama ended South America's long period of isolation and precipitated the Great American Interchange. Twenty of Mexico's extant nonflying species (opossums, armadillos, anteaters, monkeys and caviomorph rodents) are of South American origin. Most of the megafauna that formerly inhabited the region became extinct at the end of the Pleistocene about 10,000 years ago, shortly after the arrival of the first humans. Increasing alteration and destruction of natural habitats by expanding human populations during the last several centuries is causing further attrition of the region's biodiversity, as exemplified by the "hotspot" designations (by definition, such areas have lost over 70% of their primary vegetation).
The following tags are used to highlight each species' conservation status as assessed by the International Union for Conservation of Nature; those on the left are used here, those in the second column in some other articles:
Of the listed taxa, 7 are extinct, 1 (not recognized by the IUCN) is possibly extinct, 30 are critically endangered, 46 are endangered, 26 are vulnerable, and 23 are near threatened. These status tags were most recently updated in April 2011. Six of the extinct or possibly extinct taxa and 11 of the critically endangered taxa are insular (all but two of these are rodents); another 13 of the critically endangered species (all rodents or shrews) are montane. The only critically endangered species that are neither rodents nor shrews are the Cozumel Island raccoon and the vaquita. The vaquita population estimate has dropped below 100 as of 2014 and it is regarded as being in imminent danger of extinction.
Subclass: Theria
Infraclass: Metatheria
Order: Didelphimorphia (common opossums)
Didelphimorphia is the order of common opossums of the Western Hemisphere. O |
https://en.wikipedia.org/wiki/International%20Journal%20of%20Wireless%20Information%20Networks | The International Journal of Wireless Information Networks is a quarterly peer-reviewed scientific journal covering research on wireless networks, including sensor networks, mobile ad hoc networks, wireless personal area networks, wireless LANs, indoor positioning systems, wireless health, body area networking, cyber-physical systems, and RFID techniques. The journal is abstracted and indexed in Scopus.
References
External links
Wireless networking
Computer science journals
Engineering journals
Academic journals established in 1994
Springer Science+Business Media academic journals
Quarterly journals
English-language journals |
https://en.wikipedia.org/wiki/Modesty%20Blaise%20%281982%20film%29 | Modesty Blaise was a 1982 American-produced one-hour television pilot produced for the ABC Network and based upon the comic strip Modesty Blaise, created by Peter O'Donnell.
This was the second attempt at adapting the comic strip as a live-action production, following a 1966 film of the same title. It was written by Stephen Zito, directed by Reza Badigi, with Barney Rosenzweig as executive producer. The plot has a few elements taken from O'Donnell's first Modesty Blaise novel (which in turn had been a novelization of a practically unused screenplay that Peter O'Donnell had written for the first Modesty Blaise film) but is largely original. Whereas Modesty in the comic strip and novels was said to be of uncertain Eastern European ancestry (but adopted England as her homeland), and her companion Willie Garvin was a Cockney, the telefilm makes both characters American.
Cast
The 50-minute program featured Ann Turkel as Modesty Blaise, Lewis Van Bergen as Willie Garvin, Keene Curtis as Gerald Tarrant, Sab Shimono as Weng and Douglas Dirkson as Jack Fraser, with Carolyn Seymour as villainess Debbie DeFarge. Though the planned TV series was never produced, the pilot was televised by the ABC network.
Story
The plot, set in what appears to be Los Angeles, involves Modesty and Willie preventing the kidnap of a young girl who turns out to be a computer genius and has been working for Tarrant's agency. Although both Modesty and Willie's back stories are given as described by O'Donnell, no explanation is provided for their North American accents or presence in California. Tarrant, as an operative of an American secret service, naturally does not have his knighthood. The super-computer they have been developing has been stolen by Debbie Defarge to use to make a killing on the New York stock exchange. Willie's knife-throwing skills and Modesty's habit of ripping off the lower part of her dress when called to action are faithfully reproduced, as is much of the banter between Willie and Modesty, but in other ways, the characters bear little resemblance to O'Donnell's literary creations.
Another attempt to adapt the comic strip took place in 2003 with the release of My Name Is Modesty.
Music
The American group Sparks wrote and recorded the theme song "Modesty Blaise" for the pilot. After the cancellation of the proposed series, Sparks released the song in Europe under the amended title "Modesty Plays" in late 1982/early 1983. The song was later re-recorded and included on their 1986 album Music That You Can Dance To.
The rest of the musical score was produced by Kevin Knelman.
Modesty Plays tracklisting
7" vinyl (Metronome, Germany)
"Modesty Plays" – 3:06
"Nicotina" – 3:29
7" vinyl (Underdog, France)
"Modesty Plays (Long Version)" – 5:09
"Modesty Plays (Short Version)" – 3:06
12" vinyl (Underdog, France)
"Modesty Plays" – 5:09
"Angst In My Pants" – 3:20
External links
Films based on works by Peter O'Donnell
1982 television films
1982 films
L |
https://en.wikipedia.org/wiki/Predictive%20state%20representation | In computer science, a predictive state representation (PSR) is a way to model a state of controlled dynamical system from a history of actions taken and resulting observations. PSR captures the state of a system as a vector of predictions for future tests (experiments) that can be done on the system. A test is a sequence of action-observation pairs and its prediction is the probability of the test's observation-sequence happening if the test's action-sequence were to be executed on the system. One of the advantage of using PSR is that the predictions are directly related to observable quantities. This is in contrast to other models of dynamical systems, such as partially observable Markov decision processes (POMDPs) where the state of the system is represented as a probability distribution over unobserved nominal states.
References
Machine learning
Dynamical systems |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.