source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/RDE | RDE may refer to:
Redundant data elimination, the process of reducing file storage requirements through data deduplication
Revue d'Égyptologie, a scholarly journal of Egyptology (commonly abbreviated RdE)
Rotating detonation engine, a rocket engine that uses continuous detonation to provide thrust.
Rotating disk electrode, a type of electrode used in electrochemistry
Remote data entry, a process for the collection of data in electronic format
Rule-developing experimentation, a term used in market research
European Democratic Alliance (Rassemblement des Démocrates Européens), a political group in the European Parliament 1984–1995.
European Democratic and Social Rally group, formerly the Democratic and European Rally group (groupe du Rassemblement démocratique et européen), a parliamentary group in the French Senate
Real Driving Emissions, see European emission standards. |
https://en.wikipedia.org/wiki/ISO/IEC%2042010 | ISO/IEC/IEEE 42010 Systems and software engineering — Architecture description is an international standard for architecture descriptions of systems and software.
Overview
ISO/IEC/IEEE 42010:2011 defines requirements on the description of system, software and enterprise architectures. It aims to standardise the practice of architecture description by defining standard terms, presenting a conceptual foundation for expressing, communicating and reviewing architectures and specifying requirements that apply to architecture descriptions, architecture frameworks and architecture description languages.
Following its predecessor, IEEE 1471, the standard makes a strict distinction between architectures and architecture descriptions.
The description of ISO/IEC/IEEE 42010 in this article is based upon the standard published in 2011. This standard has been withdrawn and replaced with ISO/IEC/IEEE 42010:2022 in November 2022 https://www.iso.org/standard/74393.html
History of ISO/IEC/IEEE 42010
The origin of the standard was the fast track international standardization of IEEE 1471:2000. The standard was originally balloted as ISO/IEC DIS 25961. It was subsequently adopted and published as ISO/IEC 42010:2007 which was identical with IEEE 1471:2000.
In 2006, ISO/IEC JTC1/SC7 WG 42 and IEEE Computer Society launched a coordinated revision of this standard to address: harmonization with ISO/IEC 12207 and ISO/IEC 15288; alignment with other ISO/IEC architecture standards (e.g. ISO/IEC 10746 Reference Model Open Distributed Processing); the specification of architecture frameworks and architecture description languages; architecture decision capture; and correspondences for model and view consistency.
In July 2011, the Final Draft International Standard was balloted and approved (21-0) by ISO member bodies. The corresponding IEEE version, P42010/D9, was approved as a revised standard by the IEEE-SA Standards Board on 31 October 2011. ISO/IEC/IEEE 42010:2011 was published by ISO on 24 November 2011.
References
External links
ISO/IEC/IEEE 42010 website
A documentation framework for architecture decisions based on 42010
Views and Beyond: The SEI Approach to Architecture Documentation
MEGAF is an infrastructure for realizing architecture frameworks that conform to the definition of architecture framework provided in the ISO/IEC/IEEE 42010 standard.
42010
42010
42010
Software architecture |
https://en.wikipedia.org/wiki/YProxy | yProxy is a Network News Transfer Protocol (NNTP) proxy server for the Windows operating system. yProxy's main function is to convert yEnc-encoded attachments to UUE-encoded attachments on the fly. The main purpose of this is to add functionality to NNTP newsreaders that do not have native support for yEnc.
The inventor of yEnc recommends yProxy for use by Windows users whose newsreaders do not support yEnc decoding.
yProxy comes in two varieties:
yProxy
yProxy Pro
yProxy
The latest free version of yProxy is version 1.3.
History of yProxy
yEnc (8 bit ASCII of 8 bit data) was released in 2001, and almost immediately the most popular utility for decoding yEnc became a software utility named yEnc32. yEnc32 was an early provider of yEnc decoding, but yEnc32, while flexible through its user interface, requires manual steps to decode yEnc attachments.
In the spring of 2002, shortly after yEnc gained popularity in binary newsgroups, yProxy was released as freeware. yProxy was designed to convert yEnc attachments as they are downloaded, without user intervention. Because yProxy is a proxy server, once it is configured, the user must only ensure that yProxy is running in order to use it.
Due to the design of yProxy as a generic NNTP proxy server, yProxy can be used by any NNTP newsreader. There are many free and commercial NNTP newsreader clients that do not natively support yEnc. yProxy was designed to let the user continue to use his or her existing newsreader.
As of May 31, 2007, the following, popular, free newsreaders do not support yEnc:
Outlook Express
Windows Mail
Windows Live Mail
Mozilla Thunderbird
The free version of yProxy is not supported on Windows Vista or Windows 7 due to yProxy's dependency on WinHelp for the help file. In addition, the free version of yProxy only includes instructions for configuring Outlook Express, which does not apply to Windows Vista's free email and NNTP client, Windows Mail or Windows Live Mail for Windows 7.
The free version of yProxy is still available for download via links on the FAQ page of yProxy's main web site.
How yProxy works
yProxy is a non-transparent NNTP proxy server. A NNTP client connects to yProxy. yProxy connects to the NNTP server. When the NNTP client makes a request for a news article, yProxy passes the request directly to the server. When the server responds with a yEnc encoded attachment, yProxy will decode the yEnc attachment to its raw binary form and reencode the attachment using the older, more widely accepted UUE format before passing the attachment to the client. The client then handles the attachment normally.
Below is a textual diagram of how yProxy works for the downstream from the NNTP server to the NNTP client.
(NNTP Client) <=UUE= (yProxy) <=yEnc= (NNTP Server)
yProxy Pro
yProxy Pro was initially released in October, 2004 and is no longer freeware.
yProxy Pro added new features such as:
Full compliance with yEnc v1.3 standards
Support for secure NNTP |
https://en.wikipedia.org/wiki/List%20of%20programmes%20broadcast%20by%20Sky%20One | Sky One had commissioned many homegrown programmes since it first started broadcasting back in 1984 but it was not until 1989 that content went beyond music and children's programming. During the early years, new game shows included a few series of Blockbusters and Spellbound, along with The Price Is Right and Sale of the Century. Original dramas include Dream Team, a series based on a fictional football team; The Strangerers, a science fiction sitcom that was dropped after one series and never repeated; Al Murray's sitcom Time Gentlemen Please; and Baddiel's Syndrome. Hex, another sci-fi show, proved popular but was cancelled in April 2006, and Mile High also proved quite popular but only lasted from 2003 to 2005. Sky One commissioned Terry Pratchett's Hogfather for Christmas 2006, which proved to be their most successful programme ever. Following that success, Sky brought out in 2008 an adaptation of The Colour of Magic and its second half The Light Fantastic, and in 2010 Terry Pratchett's Going Postal, the 33rd book in the Discworld series. Sky also co-produced The 4400 and co-financed the first season of Battlestar Galactica.
The channel shut down for good on 1 September 2021, with its channel number taken by Sky Showcase and much of its content library moved to Sky Max.
This is a list of television programmes broadcast by Sky One in the United Kingdom and Ireland.
Programming at closure
The remaining shows listed below were still on the air at the time of Sky One's closure, with future series moved to Sky Max unless stated otherwise.
Original programming
Drama
A Discovery of Witches (2018–2021)
Temple (2019)
COBRA (2020)
Comedy drama
Agatha Raisin (2016–2020)
Brassic (2019–2020)
Frayed (2019)
Comedy
Avenue 5 (2020)
Intelligence (2020–2021)
Breeders (2020–2021)
Code 404 (2020)
Hitmen (2020)
Animation
Moominvalley (2019–2020)
Unscripted
Game Show
A League of Their Own (2010–2021)
Reality
Rob & Romesh Vs (2019–2021)
Dating No Filter (2021)
Variety
The Russell Howard Hour (2017–2020)
Acquired programming
Drama
The Blacklist
The Flash
Legends of Tomorrow
Magnum P.I.
Manifest
NCIS: Los Angeles
NCIS: New Orleans
SEAL Team
Supergirl
S.W.A.T.
Warrior
Comedy drama
The Flight Attendant
Resident Alien
Comedy
Modern Family
Former programming
0–9
The 10th Kingdom
2000 Malibu Road
21 Jump Street
227
24
3rd Rock from the Sun
The 4400
A–G
According to Jim
Action Man (DIC series)
The Addams Family
The Adventures of Ozzie and Harriet
Adventures of Superman
The Adventures of Tintin
After Hours
ALF
Alice
Alien Nation
All Hail King Julien
All in the Family
All*Star Cup (transferred to ITV in 2006)
All Star Wrestling
All You Need Is Love
The Amazing Spider-Man
Amen
American Gladiators
American Sex
The American Show
American Sports Cavalcade
America's Dumbest Criminals (now on CBS Reality)
Andromeda (now on Horror Channel)
Angel
Angela and Friends
Animal World
Animated Classic
Another World
Are You Smarter than a 10 Year Old? |
https://en.wikipedia.org/wiki/OCS%20Inventory | Open Computer and Software Inventory Next Generation (OCS inventory NG) is free software that enables users to inventory IT assets. OCS-NG collects information about the hardware and software of networked machines running the OCS client program ("OCS Inventory Agent"). OCS can visualize the inventory through a web interface. Furthermore, OCS includes the capability of deploying applications on computers according to search criteria. Agent-side IpDiscover makes it possible to discover the entirety of networked computers and devices.
History
The open-source OCS Inventory NG project started in late 2005 and produced its first release version of OCS Inventory in early 2007. Since version 1.0rc3, most of OCS Inventory functionality can be adapted or extended via a module system.
Operation
The dialogue between OCS client machines and the server depends on the Hypertext Transfer Protocol (HTTP). The software formats data in XML. The management server uses Apache, MySQL and Perl. OCS runs on multiple platforms: under Unixes and under Microsoft Windows (95 or later). A web-interface written in PHP offers consultation of the inventory, user-rights management, and technical support features.
Agents
In order to collect detailed information, one can install agents on the client machines in the inventory. Developers have made client agents available for:
Microsoft Windows
Linux
Mac OS X
Sun Solaris
IBM AIX
FreeBSD, NetBSD, OpenBSD
HP-UX
Android
Relation to other software
OCS Inventory can be used to feed the manager of GLPI and thus offers part of an ITAM solution.
Samanage is a cloud-based, commercial ITAM, that has used modified OCS-NG agent as a data source.
License
OCS Inventory consists of free software published under GNU GPL v2. The developers own the copyright.
References
External links
The official site of OCS Inventory
GLPI Project
OCS and BPM
Free software programmed in Perl |
https://en.wikipedia.org/wiki/Herbaspirillum%20huttiense | Herbaspirillum huttiense is a Gram-negative species of bacteria.
References
Further reading
External links
Type strain of Herbaspirillum huttiense at BacDive - the Bacterial Diversity Metadatabase
Burkholderiales
Bacteria described in 2004 |
https://en.wikipedia.org/wiki/Uppland%20Runic%20Inscription%2013 | This runestone, listed as U 13 in Rundata, crowns the barrow of Björn Ironside in Uppland, Sweden. The stone is a fragment; broken pieces of the stone lie next to it.
Inscription
A transliteration of the damaged runic inscription is:
... ...[r]kutr þaiʀ... / ... atu ' ok| |ku[þ]... ...
(... ... Torgöt the... / ... spirit and Gods... ... )
Gallery
References
Uppland Runic Inscription 0013 |
https://en.wikipedia.org/wiki/Power%20gain | In electrical engineering, the power gain of an electrical network is the ratio of an output power to an input power. Unlike other signal gains, such as voltage and current gain, "power gain" may be ambiguous as the meaning of terms "input power" and "output power" is not always clear. Three important power gains are operating power gain, transducer power gain and available power gain. Note that all these definitions of power gains employ the use of average (as opposed to instantaneous) power quantities and therefore the term "average" is often suppressed, which can be confusing at occasions.
Operating power gain
The operating power gain of a two-port network, , is defined as:
where
is the maximum time-averaged power delivered to the load, where the maximization is over the load impedance, i.e., we desire the load impedance which maximizes the time-averaged power delivered to the load.
is the time-averaged input power to the network.
If the time-averaged input power depends on the load impedance, one must take the maximum of the ratio, not just the maximum of the numerator.
Transducer power gain
The transducer power gain of a two-port network, , is defined as:
where
is the average power delivered to the load
is the maximum available average power at the source
In terms of y-parameters this definition can be used to derive:
where
is the load admittance
is the source admittance
This result can be generalized to z, h, g and y-parameters as:
where
is a z, h, g or y-parameter
is the load value in the corresponding parameter set
is the source value in the corresponding parameter set
may only be obtained from the source when the load impedance connected to it (i.e. the equivalent input impedance of the two-port network) is the complex conjugate of the source impedance, a consequence of the maximum power theorem.
Available power gain
The available power gain of a two-port network, , is defined as:
where
is the maximum available average power at the load
is the maximum power available from the source
Similarly may only be obtained when the load impedance is the complex conjugate of the output impedance of the network.
References
Lecture notes on two-port power gain
Electrical parameters
Two-port networks
Audio amplifier specifications
Transfer functions |
https://en.wikipedia.org/wiki/Search%20query | Search query may refer to:
Database query
Web search query
See also
Search engine (computing) |
https://en.wikipedia.org/wiki/World%20Innovation%2C%20Technology%20and%20Services%20Alliance | The World Innovation, Technology and Services Alliance (WITSA) is a consortium of tech associations from 80 countries and economies. WITSA was founded in 1978 as the World Computing Services Industry Association, and participates in advocacy in international public policy that affects the "global information infrastructure". It voices the concerns of the international IT industry in organizations such as the World Trade Organization, the Organisation for Economic Co-operation and Development, and the G7.
WITSA represents IT industry associations in over 80 countries or economies. WITSA's motto is "Fulfilling the Promise of the Digital Age".
WITSA World Innovation, Technology and Services Alliance elected the 2022-2024 Chairman and Board of Directors on September 12, 2022 with Dato' Dr Sean Seah, then Chairman of the National Tech Association of Malaysia (PIKOM) was elected as the new chairman.
World Congress on Innovation and Technology (WCIT)
2023, Sarawak, Malaysia
2022, Penang, Malaysia
2021, Dhaka, Bangladesh
2020, Penang, Malaysia
2019, Yerevan, Armenia
2018, Hyderabad, India
2017, Taipei, Taiwan
2016, Brasilia, Brazil
2014, Guadalajara, Mexico
2012, Montreal, Canada
2010, Amsterdam, the Netherlands
2008, Kuala Lumpur, Malaysia
2006, Austin, Texas, USA
2004, Athens, Greece
2002, Adelaide, Australia
2000, Taipei, Taiwan
1998, Fairfax, Virginia, USA
1996, Bilbao, Spain
1994, Yokohama, Japan
1992, London, England
1990, Washington D.C., USA
1988, Paris, France
1986, Toronto, Canada
1984, Tokyo, Japan
1982, Copenhagen, Denmark
1980, San Francisco, California, USA
1978, Barcelona, Spain
For additional information regarding the WCIT, see the "WCIT - A Proud History" document [PDF]
Other programs and events
WITSA Global Innovation and Tech Excellence Awards
The WITSA Global Innovation and Tech Excellence Awards honor achievements in the application of information technology around the globe. Winners have exhibited excellence in one of the following categories: Digital Opportunity/Inclusion Award, Smart Cities Award, Sustainable Growth/Circular Economy Award, Innovative eHealth Solutions Award, Public/Private Partnership Award, E-Education & Learning Award, Emerging Digital Solutions Award, and Startup Ecosystem Award. A Chairman's Award is presented to a nominee selected from the entire pool of candidates from all awards categories. The award ceremonies are a signature event of the proceedings at the World Congress on Innovation and Technology.
See also
Information and communications technology
WCIT 2019
Health information technology
Information technology
References
[WITSA Elects New Leadership for the 2020-22 Term: Selects Mr. Yannis Sirros as its First Chairman from Europe https://witsa.org/witsa-elects-new-leadership-for-the-2020-22-term-selects-mr-yannis-sirros-as-its-first-chairman-from-europe/]
[Greek Scientist Elected Chairman of Global IT Flagship Organization https://greece.greekreporter.com/2020/11/18/greek-scientist-appo |
https://en.wikipedia.org/wiki/Expert%20elicitation | In science, engineering, and research, expert elicitation is the synthesis of opinions of authorities of a subject where there is uncertainty due to insufficient data or when such data is unattainable because of physical constraints or lack of resources. Expert elicitation is essentially a scientific consensus methodology. It is often used in the study of rare events. Expert elicitation allows for parametrization, an "educated guess", for the respective topic under study. Expert elicitation generally quantifies uncertainty.
Expert elicitation tends to be multidisciplinary as well as interdisciplinary, with practically universal applicability, and is used in a broad range of fields. Prominent recent expert elicitation applications include climate change, modeling seismic hazard and damage, association of tornado damage to wind speed in developing the Enhanced Fujita scale, risk analysis for nuclear waste storage.
In performing expert elicitation certain factors need to be taken into consideration. The topic must be one for which there are people who have predictive expertise. Furthermore, the objective should be to obtain an experts' carefully considered judgment based on a systematic consideration of all relevant evidence. For this reason one should take care to adopt strategies designed to help the expert being interviewed to avoid overlooking relevant evidence. Additionally, vocabulary used should face intense scrutiny; qualitative uncertainty words such as "likely" and "unlikely" are not sufficient and can lead to confusion. Such words can mean very different things to different people, or to the same people in different situations.
See also
Applied science
Bayesian probability
References
Bibliography
Apostolakis, G., 7 December 1990: The concept of probability in safety assessments of technological systems. Science, 250 (4986): 1359–1364.
Arkes, Hal R., Jeryl L. Mumpower, and Thomas R. Stewart, 24 January 1997: Combining Expert Opinions. Science, 275: 461–465.
Boissonnade, A., Hossain, Q., Kimbell, J., Mensing, R., and Savy, J., 2000: Development of a probabilistic tornado wind hazard model for the Continental United States, UCRL-ID-140922 Vol. I, Lawrence Livermore National Laboratory, Livermore, CA, 131pp.
Kerr, Richard A., 8 November 1996: Risk Assessment: A New Way to Ask the Experts: Rating Radioactive Waste Risks. Science, 274 (5289): 913–914.
SSHAC, 1997: Recommendations for probabilistic seismic hazard analysis: guidelines on uncertainty and use of experts, NUREG/CR-6372, UCRL-ID-122160, Vol. I, Lawrence Livermore National Laboratory, Livermore, CA, 131 pp.
Scientific method |
https://en.wikipedia.org/wiki/SmartDrive | SmartDrive (or SMARTDRV) is a disk caching program shipped with MS-DOS versions 4.01 through 6.22 and Windows 3.0 through Windows 3.11. It improves data transfer rates by storing frequently accessed data in random-access memory (RAM).
Early versions of SmartDrive were loaded through a device driver named . Versions 4.0 and later were loaded through an executable file named , which could be run at user's discretion or at boot time via . However, also includes a double-buffering driver that should be loaded through . Version 4.0 also introduced 32-bit disk access and could reduce its footprint in conventional memory (the first 640 kilobytes of memory which was critical to DOS) by running in upper memory area (the 384 kilobytes of memory located beyond the conventional memory).
A cloaked variant of SmartDrive utilizing the Helix Cloaking API was available from Helix Software. On Intel 80386 processors, it could run in protected mode to reduce its footprint in conventional memory.
Microsoft suggests SmartDrive to be used when installing Windows 2000 or Windows XP from MS-DOS to reduce installation time.
SmartDrive has been superseded by VCache, which was introduced in Windows for Workgroups 3.11 and carried over to Windows 95, Windows 98/Windows 98 SE and Windows Me. The main advantage of VCache over SmartDrive is its ability to adjust cache size dynamically. However, it tended to take too much RAM in Windows 95; this aspect was improved in Windows 98.
See also
FASTOPEN
List of DOS commands
32-bit file access
References
Hard disk software
DOS software |
https://en.wikipedia.org/wiki/Drew%20McDermott | Drew McDermott (December 27, 1949 – May 26, 2022) was a professor of Computer Science at Yale University. He was known for his contributions in artificial intelligence and automated planning.
Education
Drew McDermott earned B.S., M.S., and Ph.D. degrees from the Massachusetts Institute of Technology (MIT).
He became a tenured full professor at Yale in 1983. He served as Chair of the Department from 1991 to 1995. He retired in 2018.
Research
His research has been in the area of artificial intelligence, with side excursions into philosophy. His Ph.D. dissertation was in the area of automated planning. In that work, he coined the term "task network" to refer to hierarchies of abstract and concrete actions and policies. He did seminal work in non-monotonic logic in the early 1980s, and was an advocate for the "logicist" methodology in AI, defined as formalizing knowledge and reasoning in terms of deduction and quasideduction. In 1987 he published a paper criticizing the logicist approach. The critique was based partly on a previous paper (with Steve Hanks) pointing out a flaw with all known approaches to nonmonotonic temporal reasoning, embodied in what is now called the Yale shooting problem.
Artificial intelligence
Although new approaches have since been found, McDermott turned to other areas of AI, such as vision and robotics, and began working on automated planning again. His work on planning focused on the "classical" case rather than on hierarchical task network planning. In 1990 he was named a Fellow of the Association for the Advancement of Artificial Intelligence, one of the first group of Fellows. In 1996 he (and Hector Geffner and Blai Bonet independently) discovered "estimated-regression planning", based on the idea of heuristic search with an estimator derived from a simplified domain model by reasoning backward ("regression") from the goal. The simplified version is obtained automatically from a full domain model by ignoring propositions deleted by actions. In 2000 he got interested in logic again because the development of the semantic web made it seem newly applicable. He did work on ontology translation and on semantic web services.
ICAPS
McDermott was a prime mover, with James Hendler and others, behind the AI Planning Systems Conference, which, after merging with the European Conference on Planning, became the annual International Conference on Automated Planning and Scheduling (ICAPS). He also helped start the International Planning Competition, which is held semiannually in conjunction with ICAPS. He led the group that molded the Planning Domain Definition Language from several predecessor notations in order to provide a standard notation for input to planning systems.
A sideline of his work has been an interest in the philosophy of mind, stemming from his realization as a child that "electronic brains" do not have a "part that thinks", and that therefore biological brains probably don't either. This interest culminated in |
https://en.wikipedia.org/wiki/Stigmina%20palmivora | Stigmina palmivora is a plant pathogen infecting coconut palms.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Coconut palm diseases
Dothideales
Fungi described in 1952
Taxa named by Pier Andrea Saccardo |
https://en.wikipedia.org/wiki/Stigmina%20platani | Stigmina platani is a plant pathogen infecting plane trees.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal tree pathogens and diseases
Dothideales
Fungi described in 1880 |
https://en.wikipedia.org/wiki/Stigmina%20platani-racemosae | Stigmina platani-racemosae is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Dothideales
Fungi described in 1929 |
https://en.wikipedia.org/wiki/Cryptocline%20cyclaminis | Cryptocline cyclaminis is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Helotiales |
https://en.wikipedia.org/wiki/Stagonosporopsis%20trachelii | Stagonosporopsis trachelii (syn. Ascochyta bohemica) is a fungal plant pathogen that causes Ascochyta leaf spot in Campanula species.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Eudicot diseases
bohemica
Fungi described in 1895 |
https://en.wikipedia.org/wiki/Ascochyta%20fabae%20f.sp.%20lentis | Ascochyta fabae f.sp. lentis is a plant pathogen that causes ascochyta blight on lentil.
See also
List of Ascochyta species
References
External links
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Pulse crop diseases
fabae f.sp. lentis
Forma specialis taxa
Fungi described in 1986
Lentil |
https://en.wikipedia.org/wiki/Richard%20Lipton | Richard Jay Lipton (born September 6, 1946) is an American computer scientist who is Associate Dean of Research, Professor, and the Frederick G. Storey Chair in Computing in the College of Computing at the Georgia Institute of Technology. He has worked in computer science theory, cryptography, and DNA computing.
Career
In 1968, Lipton received his undergraduate degree in mathematics from Case Western Reserve University. In 1973, he received his Ph.D. from Carnegie Mellon University; his dissertation, supervised by David Parnas, is entitled On Synchronization Primitive Systems. After graduating, Lipton taught at Yale 1973–1978, at Berkeley 1978–1980, and then at Princeton 1980–2000. Since 2000, Lipton has been at Georgia Tech. While at Princeton, Lipton worked in the field of DNA computing. Since 1996, Lipton has been the chief consulting scientist at Telcordia. In 1999, Lipton was elected a member of the National Academy of Engineering for the application of computer science theory to practice.
Karp–Lipton theorem
In 1980, along with Richard M. Karp, Lipton proved that if SAT can be solved by Boolean circuits with a polynomial number of logic gates, then the polynomial hierarchy collapses to its second level.
Parallel algorithms
Showing that a program P has some property is a simple process if the actions inside the program are uninterruptible. However, when the action is interruptible, Lipton showed that through a type of reduction and analysis, it can be shown that the reduced program has that property if and only if the original program has the property. If the reduction is done by treating interruptible operations as one large uninterruptible action, even with these relaxed conditions properties can be proven for a program P. Thus, correctness proofs of a parallel system can often be greatly simplified.
Database security
Lipton studied and created database security models on how and when to restrict the queries made by users of a database such that private or secret information will not be leaked. For example, querying a database of campaign donations could allow the user to discover the individual donations to political candidates or organizations. If given access to averages of data and unrestricted query access, a user could exploit the properties of those averages to gain illicit information. These queries are considered to have large "overlap" creating the insecurity. By bounding the "overlap" and number of queries, a secure database can be achieved.
Online scheduling
Richard Lipton with Andrew Tomkins introduced a randomized online interval scheduling algorithm, the 2-size version being strongly competitive, and the k-size version achieving O(log), as well as demonstrating a theoretical lower-bound of O(log). This algorithm uses a private-coin for randomization and a "virtual" choice to fool a medium adversary.
Being presented with an event the user must decide whether or not to include the event in the schedule. The 2-size |
https://en.wikipedia.org/wiki/Christof%20Ebert | Christof Ebert (born 1964 in Stuttgart) is a German computer scientist and entrepreneur.
He studied electrical engineering and computer sciences from 1984 to 1990 at the University of Stuttgart and Kansas State University. In 1994, he received his Ph.D. at the University of Stuttgart on complexity control during the product life-cycle. From 1994 to 2007, he worked at Alcatel: first in Stuttgart, then, in 1996, in Antwerp, and, as of 2001, in Paris. As director of engineering, he had global responsibility for software platforms and technology. Recognizing his contributions in productivity improvement, systems engineering, and product lifecycle management, he was named member of Alcatel's technical academy. In 2006, he founded Vector Consulting Services, where he is managing director and Partner.
Christof is an adjunct professor at the University of Stuttgart and has authored several books and over 150 scientific publications. He serves on the editorial boards of IEEE Software and the Journal of Systems and Software and is chair of the conference series IEEE International Conference on Global Software Engineering (ICGSE). Being an IEEE Distinguished Visitor, he is working on requirements engineering, product management and software engineering.
Further reading
Christof Ebert: Global Software and IT Wiley, New York, USA, 2011,
Christof Ebert and Reiner Dumke: Software Measurement Springer, 2. edition, New York 2007,
External links
Vector Consulting Services
Blog on Software Technology
University of Stuttgart
IEEE Software magazine
Sorbonne University MIKS program
1964 births
Living people
Computer systems researchers
Businesspeople from Stuttgart
German computer scientists
Academic staff of the University of Stuttgart
University of Stuttgart alumni |
https://en.wikipedia.org/wiki/CORE%20Music%20Foundation | CORE Music Foundation began as C.O.R.E., a network of united hip hop artists working together to obtain success in the music industry, educating artists, promoting creative endeavors, and preserving the true essence of hip-hop culture.
Overview
The acronym C.O.R.E. stands for Chicago's Organization of Rap (hip-hop) Entertainment. It now stands as a cooperative organization of (conscious) Rap (hip-hop) Entertainers, with membership extending to the suburbs. C.O.R.E. and CORE Music Foundation was founded by Yakira Levi (also known as Yakira James. The CORE concept was conceived in 1994. In 1996, the network formed a student chapter sponsored by Columbia College Chicago.
On January 21, 2005, CORE Music Foundation was incorporated as a not-for-profit corporation in the State of Illinois. The mission of CORE Music Foundation is to provide educational programming in the arts, mainly music and literacy. CMF provides outlets for creative expression, social interaction, and entertainment. CORE Music Foundation NFP is a public charity, exempt from federal income tax under section 501(c)(3) of the Internal Revenue Code.
CORE Music Foundation currently facilitates workshops and residencies at schools, libraries, parks, temples of worship, and other public places.
Geographically, CORE Music Foundation has directed most of its efforts in the Englewood and Austin areas of Chicago. CMF has developed close working relationships with Chicago Public Schools as a vendor, Illinois Arts Council as an Arts in Education program facilitator, and with the Center for Community Arts Partnerships (CCAP) at Columbia College Chicago for programming and teaching the arts at various community schools.
CORE Music Foundation has joined forces with Chicago Public Schools-Service Learning Program to provide high-school students with the opportunity to earn community service credit hours as required for graduation. CMF has also serviced the community at large by providing summer jobs to teens and adults, and by preparing and distributing free meals to hungry children and homeless adults.
See also
hip hop
External links
https://web.archive.org/web/20161220111615/http://www.joincore.org/home.html
https://web.archive.org/web/20160224004235/http://coremusicfoundation.org/CORE_Music_Foundation/Welcome.html
References
Hip hop activists
Artist groups and collectives based in Chicago
Non-profit organizations based in Chicago |
https://en.wikipedia.org/wiki/Television%20Iwate | , also known as TVI, is a Japanese broadcast network affiliated with the Nippon News Network and Nippon Television Network System. Their headquarters are located in Morioka, Iwate Prefecture.
The Headquarters
2-10 Uchimaru Morioka, Iwate 020-8650 Japan
Telephone Number:+81-19-624-1166
History
1969 December 1: It was set up to become Iwate Prefecture's second broadcasting station.
2006 October 1: their Morioka Station started their first Digital terrestrial television broadcasts.
Stations
Analog
Morioka(Main Station) 35ch
Digital(ID:4)
Morioka(Main Station) 18ch
Programs
5kigenTV
NEWS PLUS 1 IWATE
Rival Stations
Other Links
Television Iwate
Iwate Prefecture
Television stations in Japan
Nippon News Network
Television channels and stations established in 1969
Mass media in Morioka, Iwate |
https://en.wikipedia.org/wiki/Software%20measurement | Software measurement is a quantified attribute (see also: measurement) of a characteristic of a software product or the software process. It is a discipline within software engineering. The process of software measurement is defined and governed by ISO Standard ISO 15939 (software measurement process).
Software metrics
Software size, functional measurement
The primary measurement of software is size, specifically functional size. The generic principles of functional size are described in the ISO/IEC 14143. Software size is principally measured in function points. It can also be measured in lines of code, or specifically, source lines of code (SLOC) which is functional code excluding comments. Whilst measuring SLOC is interesting, it is more an indication of effort than functionality. Two developers could approach a functional challenge using different techniques, and one might need only write a few lines of code, and the other might need to write many times more lines to achieve the same functionality. The most reliable method for measuring software size is code agnostic, from the user's point of view - in function points.
Measuring code
One method of software measurement is metrics that are analyzed against the code itself. These are called software metrics and including simple metrics, such as counting the number of lines in a single file, the number of files in an application, the number of functions in a file, etc. Such measurements have become a common software development practice.
Measuring software complexity, cohesion and coupling
There are also more detailed metrics that help measure things like software complexity, Halstead, cohesion, and coupling.
See also
History of software engineering
Software engineer
Software metrics
Function point
COSMIC functional size measurement
References
Further reading
Norman Fenton, Shari L Pfleeger: Software metrics: a rigorous and practical approach PWS Publishing Co. Boston, MA, USA 1997,
Christof Ebert and Reiner Dumke: Software Measurement Springer, New York 2007,
Zádor Dániel Kelemen, Gábor Bényasz and Zoltán Badinka: A measurement based software quality framework ThyssenKrupp Presta, Budapest 2014, Technical Report No: TKPH-QDTR-201401.
Software metrics |
https://en.wikipedia.org/wiki/The%20Graceful%20Fallen%20Mango | The Graceful Fallen Mango is an album by Dave Longstreth. The album is a collection of tunes recorded in Longstreth's bedroom on a 4-track machine and in his brother's basement on a computer. Dave Longstreth plays everything on the album save for some back-up vocals on two tracks, which were sung by his brother Jake and a person only identified as Steve in the liner notes. Musically, the songs range from straightforward acoustic tunes, to hard rock songs and experimental instrumentals. A small discrepancy in the title of the album exists, since the graceful-fallen mango is written on one side of the CD's spine and THE GRACEFUL FALLEN MANGO is written on the other. Western Vinyl shows the title as the latter, following normal capitalization rules.
Track listing
References
2002 debut albums
Dirty Projectors albums
Albums produced by David Longstreth |
https://en.wikipedia.org/wiki/Hollywood%20United%20F.C. | Hollywood United is an American amateur soccer team based in Los Angeles, California. Founded in 1988, the team plays in Region IV of the United States Adult Soccer Association, a network of amateur leagues at the fifth tier of the American Soccer Pyramid.
History
Origins
Hollywood United was founded in the late-1980s by a group of British expatriates who frequented the Cat & Fiddle, an English-style pub on Sunset Boulevard in the heart of Hollywood, California. The original team was made up of several U.S.-based British celebrities from the world of music, film and television, including Paul Cook and Steve Jones of the Sex Pistols, Billy Duffy and Ian Astbury of The Cult, and Vivian Campbell of Def Leppard. Word eventually spread throughout the entertainment world about the club and its players and, before long, not only other well-known stars, but also former national team soccer players from around the world asked to play.
Initially, Hollywood United basically had one team that competed in different Sunday leagues around Los Angeles, including the Los Angeles Metro League and the Glendale League. It was loosely organized and comprised roughly of the same 20 players in all games.
2003–2007
By the mid-2000s, there were two Hollywood United teams: an over-30s squad that competed in the Los Angeles Premier League from 2003 to 2005, and then in the now-defunct Olympic Soccer League from 2005–2006, and a Sunday League team that of older players that did not want to compete with the younger players. The over-30s team started to be the focus of international notoriety when people such as actors Anthony LaPaglia, Dermot Mulroney, Jason Statham, Brandon Routh, Ralf Little, Donal Logue, Gilles Marini and Jimmy Jean-Louis, singers Robbie Williams and Ziggy Marley, film director Danny Cannon, Los Angeles Galaxy veteran Paul Bravo, and former international soccer players Vinnie Jones, Eric Wynalda, John Harkes, Alexi Lalas, Richard Gough and Frank Leboeuf, began playing regularly for the team.
2008 U.S. Open Cup Run
Hollywood United qualified for the 2008 Lamar Hunt U.S. Open Cup by going 3-0-0 in a group with National Premier Soccer League's Santa Cruz County Breakers, San Diego United and Phoenix Banat Arsenal. They then advanced to the first round to take on the Portland Timbers of the USL First Division. Hollywood stunned the Timbers by beating them 3-2 thanks to penalties from Matt Taylor, but were defeated 6-0 by Seattle Sounders in the second round.
Teams
Hollywood United Hitmen
The Hollywood United Hitmen were formed in early 2009 and compete in the USL Premier Development League, having acquired the franchise rights from the San Fernando Valley Quakes. They play in the "Stadium by the Sea" at Palisades Charter High School in the Los Angeles neighborhood of Pacific Palisades.
Los Angeles Premier League
Hollywood United LAPL over-30 team plays its home games at Crossroads High School in Santa Monica, California. This is the team that was form |
https://en.wikipedia.org/wiki/WJND-LP | WJND-LP (100.7 FM, "MegaMix 100.7") is a low-power non-commercial radio station in Ocala, Florida. Its format is primarily Dance music, with occasional Spanish language and Christian music programming.
The station is a one-man operation, as its Program Director and DJ, James Dispoto, aka "DJ New York", runs the station from his parents' home in Ocala. FCC regulations limit non-commercial radio certificates to educational or non-profit entities; the operating certificate is actually held by Primeria Inglesia Bautista Hispanic Association, a group in the Ocala area.
The station's location and broadcasting tower were a source of conflict between Marion County officials and Dispoto's family. The county shut down the station in the fall of 2003, citing zoning laws that prohibited the operation of a radio station in a residential neighborhood and restricted the height of any towers to 50 feet; the tower was approximately 100 feet tall. An engineer working with the Dispotos noted that James Dispoto's mother, Elaine, possesses an amateur radio operator license, and that the Federal Communications Commission requires communities to reasonably accommodate amateur radio operators. The county's response was that the station failed to secure a permit to construct the tower, and in any case, the tower was higher than required for amateur use.
In November 2004, the Marion County Commission agreed to let the station continue operating from the Dispoto home as long as the transmitter was moved out of the neighborhood. A compromise was reached in which the transmitter would be moved a short distance away, to an existing tower at a landfill owned by the county.
References
External links
JND-LP
JND-LP
Dance radio stations
JND-LP
Radio stations established in 2003
2003 establishments in Florida |
https://en.wikipedia.org/wiki/New%20Zealand%20Railways%20Corporation | New Zealand Railways Corporation (NZRC) is the state-owned enterprise that owns the land beneath KiwiRail's railway network on behalf of the Crown. The Corporation has existed under a number of guises since 1982, when the old New Zealand Railways Department was corporatised followed by deregulation of the land transport sector. In 1986, the Corporation became a State-owned enterprise, required to make a profit. Huge job losses and cutbacks ensued, and the rail network, rail operations and ferry service of the Corporation were transferred to New Zealand Rail Limited in 1990. The Corporation retained ownership of the land beneath the railway network, and charged a nominal rental to New Zealand Rail, which was privatised in 1993, and renamed Tranz Rail in 1995. In 2004, following a deal with Tranz Rail's new owners Toll NZ, the Corporation took over responsibility for maintaining and upgrading the rail network once more, trading under the name ONTRACK. Negotiations with Toll over track access charges concluded after four years with no agreement reached, so the government purchased the entire rail and ferry operations, naming the service KiwiRail. ONTRACK's railway infrastructure and employees were then transferred to KiwiRail in 2008, which itself was initially a subsidiary of the Corporation. On 31 December 2012, the Corporation once again became the landowner.
History
The NZRC was created as a statutory corporation by the New Zealand Railways Corporation Act 1981 from the New Zealand Railways Department. It took over the operations of the department from 1 April 1982. Since then, NZRC's role has changed with various governments' policies.
Creation
Like the Railways Department that preceded it, the Corporation had a responsible Minister, the Minister of Railways. Along with rail operations, the Corporation inherited New Zealand Railways Road Services bus, truck and parcels services and SeaRail interisland ferries.
During the 1980s NZRC faced many business challenges, such as the growth of competition from road freight operators following the deregulation of the land transport industry from 1983 by the repeal of the Transport Licensing Act 1931. The Corporation's revenues were halved by the new competition.
Booz Allen Hamilton report
In April 1983 the Corporation engaged international consultants Booz Allen Hamilton to review the effectiveness and efficiency of the Corporation's operations.
In May 1984 they consultants reported back to the Muldoon National government. The report identified three major events that had critically influenced the Corporation:
The 1978 lifting of the road transport regulations to allow goods to be transported up to 150 km, causing freight volumes to drop 18% by 1983;
The creation of the Corporation in 1982;
The full deregulation of land transport in 1983;
The report recommended, amongst other things:
Reducing staff numbers;
Re-orienting freight services towards bulk commodities;
Increasing the length an |
https://en.wikipedia.org/wiki/EUSTORY | EUSTORY - History Network for Young Europeans is an international network of non-governmental organizations carrying out historical research competitions for young people. Since the network was founded in September 2001 on the initiative of the Hamburg-based Körber Foundation, some 252,000 youth have already participated in the history competitions with about 102,000 contributions. In addition to those involved in the individual national member organizations, there are about 2,500 teachers, experts, scholars and volunteers who give their time to EUSTORY and its projects.
The critical confrontation with controversial aspects of European history is the basis of the youth encounters, where prize winners from all national history competitions meet. Every year, youth from EUSTORY member countries set out on the trail of history, tracking numerous themes. The independent national history competitions encourage young people to look for traces of history in their immediate environment.
The Network Structure
The EUSTORY network was established in 2001, initiated by the Körber Foundation. With its coordination office at the Körber Foundation in Hamburg, Germany, the network currently connects 23 civic organisations in 23 countries across Europe. They are: Belarus, Belgium, Bulgaria, the Czech Republic, Denmark, Estonia, Finland, Germany, Italy, Israel, Latvia, Norway, Poland, Romania, Russia, Serbia, Slovak Republic, Slovenia, Switzerland, Sweden, Spain, the Ukraine and Wales.
All members agreed on a common document, the Charter, postulating the "disarmament of history", for tolerance and mutual understanding in Europe.
Board of Patrons
Jacques Delors
Romano Prodi
Martti Ahtisaari, Sir Peter Ustinov and Johannes Rau have been Patrons in their lifetime.
Sources
External links
Reference
Website
History organisations based in Germany
International organisations based in Germany
Organisations based in Hamburg
Non-profit organisations based in Hamburg |
https://en.wikipedia.org/wiki/.QL | .QL (pronounced "dot-cue-el") is an object-oriented query language used to retrieve data from relational database management systems. It is reminiscent of the standard query language SQL and the object-oriented programming language Java. .QL is an object-oriented variant of a logical query language called Datalog. Hierarchical data can therefore be naturally queried in .QL in a recursive manner.
Queries written in .QL are optimised, compiled into SQL and can then be executed on any major relational database management system. .QL query language is being used in SemmleCode to query a relational representation of Java programs.
.QL is developed at Semmle Limited and is based on the company's proprietary technology.
Language features
.QL has several language features to make queries concise, intuitive and reusable:
Extensible type hierarchy
Methods and predicates
Definition before use
Example query
The sample query below illustrates use of .QL to query a Java program. This is how one would select all classes that contain more than ten public methods:
from Class c, int numOfMethods
where numOfMethods = count(Method m| m.getDeclaringType()=c
and m.hasModifier("public"))
and numOfMethods > 10
select c.getPackage(), c, numOfMethods
In fact, this query selects not only all classes with more than ten public methods, but also their corresponding packages and the number of methods each class has.
See also
SQL - Structured Query Language
OQL - Object Query Language
Datalog - logic programming language
SemmleCode - Software testing tool that uses .QL language
References
Hervé Gallaire and Jack Minker. Logic and Databases. Plenum Press, New York,1978.
Serge Abiteboul and Paris C. Kanellakis. Object identity as a query language primitive. In SIGMOD Rec, pages 159–173, ACM Press, 1989.
Oege de Moor, Elnar Hajiyev and Mathieu Verbaere. Object-oriented queries over software systems. In Proceedings of the 2007 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation (PEPM), page 91, ACM Press, 2007.
External links
Semmle Limited creators of .QL
Declarative programming languages
Logic programming languages
Query languages
Data modeling languages |
https://en.wikipedia.org/wiki/WEDI | WEDI may refer to:
WEDI (AM), an AM radio station located in Eaton, Ohio
Workgroup for Electronic Data Interchange (WEDI)
See also
Wedi 7
WEDY
WIDI (disambiguation) |
https://en.wikipedia.org/wiki/IBM%20WebSphere%20DataPower%20SOA%20Appliances | IBM WebSphere DataPower SOA Appliances is a family of pre-built, pre-configured rack-mountable network devices (XML appliances) that can help accelerate XML and Web Services deployments while extending SOA infrastructure. Originally these devices were created by DataPower Technology Inc., which was acquired by IBM in October 2005.
This WebSphere family consists of rack-mountable network appliances, blade appliances, appliances that rack inside a z/OS mainframe, and virtual appliances. The appliances are designed to scale to meet the demands of growing organizations, with options for high availability and clustering for increased performance and reliability. DataPower SOA Appliances can be integrated with other IBM middleware products, such as WebSphere Application Server.
Appliance list
Based on Hardware Model 9235
WebSphere DataPower Caching Appliance XC10
WebSphere DataPower XML Accelerator XA35
WebSphere DataPower Security Appliance XS40
WebSphere DataPower Integration Appliance XI50
WebSphere DataPower B2B Appliance XB60
WebSphere DataPower Messaging Appliance XM70
This hardware model is a 1U rack mountable appliance that has 4 1Gb ethernet connections.
Based on Hardware Model 7198
WebSphere DataPower Service Gateway XG45
This model is a 1U rack mountable appliance that has 4 1Gb ethernet connections and 2 10Gb ethernet connections.
Based on Hardware Model 7199
WebSphere DataPower Caching Appliance XC10 V2
WebSphere DataPower Integration Appliance XI52
WebSphere DataPower B2B Appliance XB62
WebSphere DataPower Edge Appliance XE82
This model is a 2U rack mountable appliance that has 8 1Gb ethernet connections and 2 10Gb ethernet connections.
Based on Hardware Model 8436
IBM DataPower Gateway
This model is a 2U rack mountable appliance that has 8 1Gb ethernet connections and 2 10Gb ethernet connections.
Technical specifications
DataPower Appliances contain many hardware components, including ASIC-based IPS, custom encrypted RAID drives, and (optional) Hardware Security Modules.
DataPower Appliances operate a single digitally signed firmware containing a Linux-based operating system and application stack. Its firmware runs on a flash storage device. IBM updates the firmware image every 10–20 weeks. Users cannot run third-party applications on DataPower as they would need a traditional server and operating system. Instead of a traditional filesystem, it runs with a collection of isolated virtual file systems called 'Application Domains'. As a result, it can appear to its client connections to be any type of network file system with any type of folders and links.
DataPower firmware is mostly used to perform electronic messaging functions, like transformation and routing of messages as an enterprise service bus or to protect web services interfaces and the architecture behind them. It helps to integrate any two applications by considering them as services, and is platform and language independent.
Competitors in market |
https://en.wikipedia.org/wiki/Naming%20and%20Design%20Rules | In metadata, Naming and Design Rules are the formal rules associated with how data elements are structured within a process of creating exchange documents between organizations.
Naming and Design Rules are a set of guidelines and naming conventions that go beyond what a single data exchange standard specification will permit. The most common standard that Naming and Design Rules are created on is XML Schema. For example, the use of upper camel case data element names is a convention used in many standard but is not specified by the XML Schema specification.
Naming and Design Rules have become an important aspect of each organizations data exchange standards. Within the United States, Naming and Design Rules standards are recommended for each federal and state agency.
See also
metadata
XML
XML Schema
References
National Information Exchange Model Naming and Design Rules NIEM Technical Architecture Committee (NTAC) October 31, 2008 Version 1.3
National Information Exchange Model Version 1.2 Aug. 7th 2007
GJXDM Naming and Design Rules used by the US Department of Justice
Powerpoint presentation to federal agencies on Naming and Design Rules
Infostructurebase Naming and Design Rules that are part of the Danish e-Government Project
UN/EDIFACT Naming and Design Rules
Metadata |
https://en.wikipedia.org/wiki/Lutheran%20Services%20in%20America | Lutheran Services in America is the national office of a network of 300 Lutheran health and human services organizations across the United States. Headquartered in Washington, DC, Lutheran Services in America amplifies the voice of its $23 billion network to aid community leaders and advance policies and practices that improve the lives of people and communities. It is recognized by the Chronicle of Philanthropy and Forbes as one of the nation’s top nonprofit organizations.
Lutheran Services in America leads collaborations with its member organizations and partners in philanthropy, academia, healthcare, and others to address the most critical challenges in communities and empower people to lead their best lives. It attempts to leverage the shared values, trust, and heritage of Lutheran social ministry to drive systemic change for children, older adults, families, people with disabilities, veterans, refugees, and others experiencing need in the United States.
Together with its member organizations and partners, Lutheran Services in America serves 6 million people in 1,400 communities across the United States each year.
History
Lutheran Services in America was founded in 1997 by the Evangelical Lutheran Church in America (ELCA) and Lutheran Church–Missouri Synod (LCMS). While it leads a network of organizations rooted in five centuries of Lutheran theology, many of which were founded more than 150 years ago, the Lutheran Services in America network offers services to people of all backgrounds.
Programs
Through partnerships and collaboration, Lutheran Services in America leads programs that address the policy and practice changes that
advance equitable outcomes for children, youth, and families impacted by the child welfare system by expanding programs that reach families in crisis and prevent children from being removed from their homes;
address gaps in care for older adults by leading collaborative projects to test and evaluate models of service that improve the quality and access to care so older adults can remain in their homes and communities;
champion services and supports that empower individuals with intellectual and developmental disabilities to live and work in the community of their choice independently; and
support nonprofit leaders in honing their leadership skills, developing strategies to adapt to the changing needs of their communities, and shaping new paths for low-income people and families.
References
Further reading
External links
Lutheran organizations
Organizations established in 1997 |
https://en.wikipedia.org/wiki/M%C3%B6jbro%20Runestone | The Möjbro Runestone is a runestone that is designated as U 877 in the Rundata catalog and is inscribed in Proto-Norse using the Elder Futhark. It was found in Möjbro, which is about 8 kilometers north of Örsundsbro in Uppsala County, Sweden, which is in the historic province of Uppland. The runestone is on display at the Swedish Museum of National Antiquities in Stockholm.
Formerly placed in the 3rd century, the inscription and drawing are now mostly placed in the 5th or early 6th centuries.
History
Although the stone has been known since the initial surveys of runestones in Sweden during the 1600s, its exact original location is not known.
The runestone is in height and made of granite. It is considered to be fragile. To protect the stone and its shallow inscription, it was moved in 1948 from Möjbro to the Swedish Museum of National Antiquities.
Drawing
The Möjbro Runestone is notable not only for being one of few runestones in Proto-Norse, but also for showing what is considered to be an artistically crafted image of a rider on a horse with two dogs. It is believed to have been inspired by continental Germanic images of victorious warriors on horses and that it ultimately derives from the motifs of horsemen common on tombstones of members of the Roman cavalry in late Roman Empire era art.
Inscription
The inscription is to be read from right to left, and from bottom to top. It transliterates as
frawaradaz / anahahaisla[g]ina/z.
Several interpretations have been put forth for the inscription,
but the only thing that can be said with certainty on the interpretation of the inscription is that Frawaradaz is the name of a man (and even the interpretation of the name is debated).
The most common view is that the final part of the inscription is to be read as slaginaz "slain", indicating that the stone is a memorial and that it says that Frawaradaz was slain.
Hempl (1900), by contrast, read langiniz, reading the letter transliterated [g] above as a bind rune (ligature) for ng (/ŋ/).
The middle part of the inscription, reading anahahai or similar, has given rise to a wide variety of tentative interpretations, most of them assuming that it gives additional information on the person of Frawaradaz or on the circumstances of his death, including
"Āna, the one-eyed",
"the noble",
"on the racer"/"on his steed/horse",
"of Hagho", "in Hagho".
Grønvik (1985) gives an alternative interpretation inasmuch as he has the slaginaz refer to the horse, not the dead man, reading "Frawarādaz [is buried here] - Over [the dead one] the horse was slaughtered."
Elmevik (1978) interprets the final word as laikīnaz, preceded by the copula is:
Frawarādaz ainahāhǣ is laikinaz.
The ainahāhǣ is interpreted as "the only high one" (=the one most noble of all), and the is laikinaz either as "is eager to fight" or "is killed intentionally" or "is killed by witchcraft".
Krause (1966) segments the top line of text into "ana hahai slaginaz." "Hahai" here is interpreted a |
https://en.wikipedia.org/wiki/Security%20breach%20notification%20laws | Security breach notification laws or data breach notification laws are laws that require individuals or entities affected by a data breach, unauthorized access to data, to notify their customers and other parties about the breach, as well as take specific steps to remedy the situation based on state legislature. Data breach notification laws have two main goals. The first goal is to allow individuals a chance to mitigate risks against data breaches. The second goal is to promote company incentive to strengthen data security.Together, these goals work to minimize consumer harm from data breaches, including impersonation, fraud, and identity theft.
Such laws have been irregularly enacted in all 50 U.S. states since 2002. Currently, all 50 states have enacted forms of data breach notification laws. There is no federal data breach notification law, despite previous legislative attempts. These laws were enacted in response to an escalating number of breaches of consumer databases containing personally identifiable information. Similarly, multiple other countries, like the European Union General Data Protection Regulation (GDPR) and Australia's Privacy Amendment (Notifiable Data Breaches) Act 2017 (Cth), have added data breach notification laws to combat the increasing occurrences of data breaches.
The rise in data breaches conducted by both countries and individuals is evident and alarming, as the number of reported data breaches has increased from 421 in 2011, to 1,091 in 2016, and 1,579 in 2017 according to the Identity Theft Resource Center (ITRC). It has also impacted millions of people and gained increasing public awareness due to large data breaches such as the October 2017 Equifax breach that exposed almost 146 million individual's personal information.
Australia
On 2018, Australia Privacy Amendment (Notifiable Data Breaches) Act 2017 went into effect. This amended the Privacy Act 1988 (Cth), which had established a notification system for data breaches involving personal information that lead to harm. Now, entities with existing personal information security obligations under the Australian Privacy Act are required to notify the Office of Australian Information Commissioner (OAIC) and affected individuals of all “eligible data breaches.” The amendment is coming off large data breaches experiences in Australia, such as the Yahoo hack in 2013 involving thousands of government officials and the data breach of NGO Australian Red Cross releasing 550,000 blood donor's personal information.
Criticism of the data breach notification include: the unjustified exemption of certain entities such as small businesses and the Privacy Commissioner not required to post data breaches in one permanent place to be used as data for future research. In addition, notification obligations are not consistent at a state level.
China
In mid-2017, China adopted a new Cyber security Law, which included data breach notification requirements.
European Union
In 1995, |
https://en.wikipedia.org/wiki/WAFC%20%28AM%29 | WAFC (590 AM) is a classic country radio station licensed to Clewiston, Florida, United States. The station is currently owned by Glades Media Company LLP.
On June 30, 2014, Cumulus Media Networks stopped distributing the network True Oldies Channel, and WAFC switched to Westwood One's Classic Hits Radio.
Previously, the station played a regional Mexican format with the branding Radio Fiesta. Prior to that it played a country music format.
On December 26, 2018, WAFC changed their format from classic hits to classic country, branded as "Pure Country WAFC".
Translators
Previous logo
References
External links
AFC
Classic country radio stations in the United States
1988 establishments in Florida
Radio stations established in 1988 |
https://en.wikipedia.org/wiki/Hylomorphism%20%28computer%20science%29 | In computer science, and in particular functional programming, a hylomorphism is a recursive function, corresponding to the composition of an anamorphism (which first builds a set of results; also known as 'unfolding') followed by a catamorphism (which then folds these results into a final return value). Fusion of these two recursive computations into a single recursive pattern then avoids building the intermediate data structure. This is an example of deforestation, a program optimization strategy. A related type of function is a metamorphism, which is a catamorphism followed by an anamorphism.
Formal definition
A hylomorphism can be defined in terms of its separate anamorphic and catamorphic parts.
The anamorphic part can be defined in terms of a unary function defining the list of elements in by repeated application ("unfolding"), and a predicate providing the terminating condition.
The catamorphic part can be defined as a combination of an initial value for the fold and a binary operator used to perform the fold.
Thus a hylomorphism
may be defined (assuming appropriate definitions of & ).
Notation
An abbreviated notation for the above hylomorphism is .
Hylomorphisms in practice
Lists
Lists are common data structures as they naturally reflect linear computational processes. These processes arise in repeated (iterative) function calls. Therefore, it is sometimes necessary to generate a temporary list of intermediate results before reducing this list to a single result.
One example of a commonly encountered hylomorphism is the canonical factorial function.
factorial :: Integer -> Integer
factorial n
| n == 0 = 1
| n > 0 = n * factorial (n - 1)
In the previous example (written in Haskell, a purely functional programming language) it can be seen that this function, applied to any given valid input, will generate a linear call tree isomorphic to a list. For example, given n = 5 it will produce the following:
factorial 5 = 5 * (factorial 4) = 120
factorial 4 = 4 * (factorial 3) = 24
factorial 3 = 3 * (factorial 2) = 6
factorial 2 = 2 * (factorial 1) = 2
factorial 1 = 1 * (factorial 0) = 1
factorial 0 = 1
In this example, the anamorphic part of the process is the generation of the call tree which is isomorphic to the list [1, 1, 2, 3, 4, 5]. The catamorphism, then, is the calculation of the product of the elements of this list. Thus, in the notation given above, the factorial function may be written as where and .
Trees
However, the term 'hylomorphism' does not apply solely to functions acting upon isomorphisms of lists. For example, a hylomorphism may also be defined by generating a non-linear call tree which is then collapsed. An example of such a function is the function to generate the nth term of the Fibonacci sequence.
fibonacci :: Integer -> Integer
fibonacci n
| n == 0 = 0
| n == 1 = 1
| n > 1 = fibonacci (n - 2) + fibonacci (n - 1)
This function, again applied to any valid input, will generat |
https://en.wikipedia.org/wiki/University%20Computing%20Centre | The University Computing Centre in Zagreb (, abbreviated SRCE, which also means "heart") has a long tradition in the area of information and communication technologies. It was founded in 1971 within the University of Zagreb, the only Croatian university at the time, with the purpose to enhance the implementation of information technologies in the academic community as well as in Croatia in general.
Today, SRCE is the main computing centre and the architect of the e-infrastructure, covering both the University of Zagreb and the whole research and high education system. Furthermore, SRCE is the competence center for information and communication technologies as well as the center for education and support in the area of ICT application.
Mission
The University Computing Centre – SRCE provides support to the academic community in building the information society in the Republic of Croatia through the implementation of the latest information and communication technologies, high quality student support and collecting and transferring expert knowledge.
Fundamental functions of SRCE
Fundamental functions of SRCE are: (1) central nod for e-infrastructure for scientific and university education systems (2) expert centre for ICT, (3) educational and support centre for the application of ICT.
Major activities and projects in Srce
NOC - network operations center of the national Academic and Research Network CARNET, which was founded in Srce in 1991 as a project of the Ministry of science, education and sports. SRCE maintained CARNET NOC until April 2009.
StuDOM - local network system for all student dormitories
DNS HR – SRCE has been conducting operational registering and maintenance of the domain system since 1992, i.e. the registration of the Croatian national domain (.hr)
CIX - Croatian Internet eXchange – national centre for the Internet exchange
CRO-GRID Infrastructure – national grid infrastructure – distributed computer system, based on the paradigm of the computer and information grid. Accessible by the CRO-GRID Portal, a Grid portal operated by the Ruđer Bošković Institute and based on P-GRADE Portal technology. The project finished in 2006 and as a result in 2007 CRO NGI was started.
Computer cluster Isabella – common resource of all scientist in Croatia for advanced calculations.
AAI@EduHr – Authentication and authorization infrastructure (AAI) of the scientific and higher education system in the Republic of Croatia
Network applications - MWP (measuring web space), HRČAK (site for Croatian electronic scientific magazines), DAMP and AMD (network publications archive)
ISVU – Informational system of higher education institutions in the Republic of Croatia
ISSP - Informational system of student canteen (students' X-card)
Beginners and advanced IT courses
Expert educational programs for information technology and computer experts and professionals (Microsoft IT academy, A Cloud Guru, Cisco network technologies academy programs)
Exam |
https://en.wikipedia.org/wiki/Martin%20Rapaport | Martin Rapaport is chairman of the Rapaport Group, founder of the Rapaport Diamond Report and the RapNet online diamond trading network. Rapaport has been called a "maverick" within the diamond industry for standardizing and publishing diamond prices. He has also been criticized for non-transparency in his methodology, as well as his silence over a corruption scandal involving the GIA, with which he has strong ties. Rapoport was an early proponent of the Kimberley Process aimed at limiting the number of "conflict diamonds" in worldwide circulation.
Each year Rapaport hosts an International Diamond Conference which tackles various topics in the diamond trade world.
Education and early career
Martin Rapaport began his work in diamonds as a cleaver and rough sorter in Antwerp, Belgium. He began brokering rough and polished diamonds in New York City in 1975. In 1978, he created the Rapaport Price List, which has been criticized for not being reflective of true prices. He has since created a number of businesses that bear his name, including the electronic trading network RapNet in 1980 and several diamond-related news sources in print and web formats.
He is a member of several non-profit and diamond-industry-related organizations, including the Jewelers for Children Charity Fund, the Diamond Manufacturers and Importers Association of America and the Jewelers Vigilance Committee. Following visits to Sierra Leone in the early 2000s, Rapaport advocated more for a Kimberley Process and launched Rapaport Fair Trade.
The price list
Rapaport is a controversial figure according to many in the diamond industry for publishing the Rapaport Diamond Report in the late 1970s, which has become the de facto pricing baseline for wholesale polished diamonds. His proponents claim his guide is the reason diamonds cost significantly less than what they did during the commodities boom of that time.
Activities
Martin Rapaport's impact within the industry is largely controversial because his commercial price guides have made manipulation of prices much more difficult for the diamond industry, and are considered a step toward commoditizing diamonds. This is an affront to all the industry represents, with efforts to sell diamonds as something as unique as a snowflake, and of eternal value, hence the De Beers' sales pitch A Diamond Is Forever. It is no coincidence either, that Rapaport has largely played a maverick role in issues such as conflict diamonds, synthetic diamonds, diamond treatments, and Fair-Trade diamond issues, or has often been an unlikely ally to NGOs.
The Rapaport Diamond Corporation has been criticized for publishing wholesale price guides for diamonds whilst allegedly simultaneously trading in diamonds directly to consumers (thereby possibly cutting out the wholesalers who subscribe to the Rapaport Diamond Corporation's services).
Pricing
Diamonds as a commodity
Rapaport originally tried in 1982 by filing out a contract proposal to the New York M |
https://en.wikipedia.org/wiki/MTV%20%28Spanish%20TV%20channel%29 | MTV is a Spanish pay television channel which focuses its programming on general entertainment and music. It was launched on 10 September 2000 and is owned by Paramount Global. It used to be available on the Spanish digital terrestrial television platform between 2010 and 2014, until it moved back to pay television due to a low audience figure.
The channel broadcasts from London, UK.
History
MTV España launched on September 10, 2000 with a selection of localised content and content from MTV Europe. The channel launched with localised versions of hit MTV shows (Hitlist España, MTV Select, MTV Hot). Upon launch the channel was made available to 100 per cent digital television viewers across Spain and the Canary Islands. MTV España was part of MTV Networks Southern Europe (MTV Italy and MTV France) often sharing similar on-air identities. By 2010 due to an agreement between ViacomCBS and Vocento on August 3, 2010, MTV began broadcasting in test signal within the national digital terrestrial.
On July 1, 2011, MTV Spain adapted its corporate image by removing the name "Music Television" under the logo and cutting it in half sharing a similar on-air identity to MTV's other global channels.
On January 31, 2014, it was announced that MTV would cease broadcasting in DTT on February 7 of the same year. While the channel returned exclusively to Canal+, in the rest of the paid operators the channel was replaced by another of the company or completely removed from its programming offer.
On April 7, 2014, the frequency where MTV broadcast disappeared due to the judgment of the Supreme Court of Justice, promoted by the Popular Party to annul the free broadcasting concessions for nine channels because they were granted without proper licenses. For this reason, MTV was not replaced by any other channel.
On February 20, 2015, the operator Movistar TV incorporated the channel into its programming grid.
Despite having relegated music to the background, MTV continues to broadcast music daily, with programming blocks such as "100% MTV", composed entirely of music videos from genres such as R&B, Hip-Hop, EDM, Rock, Indie, among others. In early June 2016, this block was renamed "MTV Insomnia". In addition, the channel broadcasts music on a block called "#MañanasMusicalesMTV" from morning to afternoon on weekends. Shortly after his return to Canal+, MTV begins broadcasting concerts again during central time.
After almost a year of exclusivity on Canal+, the channel joined Telecable on January 7, 2015, and on February 20 on Movistar TV. In this way, it continued to be part of Movistar+ after the merger of Canal+ and Movistar TV.
On December 1, 2015, the channel rejoined Vodafone TV's dial 37 after almost 2 years of having abandoned its channel offer.
On September 7, 2016, MTV Spain's high definition signal is launched exclusively for Vodafone TV and Telecable subscribers.
On September 17, 2018 MTV launched My MTV a customisable music television channel
Former Present |
https://en.wikipedia.org/wiki/Sk%C3%A5%C3%A4ng%20Runestone | The Skåäng Runestone, designated as Sö 32 under Rundata, is an Iron Age runestone located in Skåäng, Södermanland, Sweden, which is inscribed in Proto-Norse with the elder futhark. During the Viking Age, a second runic inscription was added in Old Norse using the younger futhark.
Description
The Skåäng Runestone consists of a younger futhark inscription that is within a serpent on the edge of the stone and an older inscription in the center of the stone. The younger futhark inscription was discovered in 1830, but the older central inscription was not noticed until 1867.
The Elder Futhark inscription is harija ÷ leugaz which is interpreted as the Proto-Norse names Harija and Leugaz. The name Harija is a hypocoristic form of names ending with -harjaz ("warrior"), or a name beginning with Harja-, and it is part of the place name Häringe. The name Leugaz is a nomen agentis of the same word as the Gothic liugan ("swear an oath") and means "oath taker." Between the two names there is a rune (the shape of younger futhark rune hagall), but there is no consensus on how to interpret it. Two different forms of the z rune algiz are used in this inscription, the first a double or mirrored form similar to that used in the inscription on the Charnay fibula and the second the standard form.
The younger futhark inscription is classified as being carved in runestone style Fp. The text on the serpent states that the stone was part of "landmarks" made by Skammhals and Ólôf in memory of their father Sveinn. The prayer at the end of this text uses the Norse word salu for soul, which was imported from English and is first recorded as being used on a different runestone dating from the tenth century.
Inscription
Runic
§A
§B
Transliteration of the runes into Latin characters
§A harijah ÷ leugaz
§B skanmals auk × olauf × þau × litu × kiara × merki × þausi × eftiʀ × suain × faþur × sin × kuþ × hialbi salu hans
Transcription into Proto Norse and Old Norse
§A Harja, Leugaz
§B Skammhals ok Olof þau letu gæra mærki þausi æftiʀ Svæin, faður sinn. Guð hialpi salu hans.
Translation in English
§A Harja, Leugaz
§B Skammhals and Ólôf, they had these landmarks made in memory of Sveinn, their father. May God help his soul.
See also
List of runestones
References
Other sources
The article Skåängstenen in Nordisk familjebok (1917).
(Lexicon of Nordic personal names before the 8th century)
Proto-Norse language
Runestones in Södermanland
Elder Futhark inscriptions |
https://en.wikipedia.org/wiki/Hyperconnectivity | Hyperconnectivity is a term invented by Canadian social scientists Anabel Quan-Haase and Barry Wellman, arising from their studies of person-to-person and person-to-machine communication in networked organizations and networked societies. The term refers to the use of multiple means of communication, such as email, instant messaging, telephone, face-to-face contact and Web 2.0 information services.
Hyperconnectivity is also a trend in computer networking in which all things that can or should communicate through the network will communicate through the network. This encompasses person-to-person, person-to-machine and machine-to-machine communication. The trend is fueling large increases in bandwidth demand and changes in communications because of the complexity, diversity and integration of new applications and devices using the network.
The communications equipment maker Nortel has recognized hyperconnectivity as a pervasive and growing market condition that is at the core of their business strategy. CEO Mike Zafirovski and other executives have been quoted extensively in the press referring to the hyperconnected era.
Apart from network-connected devices such as landline telephones, mobile phones and computers, newly-connectable devices range from mobile devices such as PDAs, MP3 players, GPS receivers and cameras through to an ever wider collection of machines including cars refrigerators and coffee makers, all equipped with embedded wireline or wireless networking capabilities. The IP enablement of all devices is a fundamental limitation of IP version 4, and IPv6 is the enabling technology to support massive address explosions.
There are other, independent, uses of the term:
The U.S. Army describes hyperconnectivity as a digitization of the battlefield where all military elements are connected.
Hyperconnectivity is used in medical terminology to explain billions and billions of neurons creating excessive connections, within the brain associated with schizophrenia, or epileptic seizures or DS
Examples
Some examples to support the existence of this accelerating trend to hyperconnectivity include the following facts and assertions:
About 2.8 billion mobile phones are already in use with another 1.6 million being added every day (The Economist, April 28, 2007)
The network will need to accommodate a trillion devices, most of them wireless, in the next 15–20 years' time (David Clark, MIT)
Sales of wireless modules for devices, sensors and machines are forecast to grow to $400 million by 2011 (Harbor Research)
Tens of billions of e-mails, mobile text messages and instant messages are being sent through the world's public networks each day (The Economist, April 28, 2007)
References
Further reading
Mark A. Sportack, Frank C. Pappas, Emil Rensing, and Joshua Konkle (1997),High-Performance Networking Unleashed ()
"New Media: The time is now-swim and swim fast," (1998) Telephony
"Trends to track for the millennium" (1999) Target Mar |
https://en.wikipedia.org/wiki/Dynamic%20convex%20hull | The dynamic convex hull problem is a class of dynamic problems in computational geometry. The problem consists in the maintenance, i.e., keeping track, of the convex hull for input data undergoing a sequence of discrete changes, i.e., when input data elements may be inserted, deleted, or modified. It should be distinguished from the kinetic convex hull, which studies similar problems for continuously moving points. Dynamic convex hull problems may be distinguished by the types of the input data and the allowed types of modification of the input data.
Planar point set
It is easy to construct an example for which the convex hull contains all input points, but after the insertion of a single point the convex hull becomes a triangle. And conversely, the deletion of a single point may produce the opposite drastic change of the size of the output. Therefore, if the convex hull is required to be reported in traditional way as a polygon, the lower bound for the worst-case computational complexity of the recomputation of the convex hull is , since this time is required for a mere reporting of the output. This lower bound is attainable, because several general-purpose convex hull algorithms run in linear time when input points are ordered in some way and logarithmic-time methods for dynamic maintenance of ordered data are well-known.
This problem may be overcome by eliminating the restriction on the output representation. There are data structures that can maintain representations of the convex hull in an amount of time per update that is much smaller than linear. For many years the best algorithm of this type was that of Overmars and van Leeuwen (1981), which took time O(log2 n) per update, but it has since been improved by Timothy M. Chan and others.
In a number of applications finding the convex hull is a step in an algorithm for the solution of the overall problem. The selected representation of the convex hull may influence on the computational complexity of further operations of the overall algorithm. For example, the point in polygon query for a convex polygon represented by the ordered set of its vertices may be answered in logarithmic time, which would be impossible for convex hulls reported by the set of it vertices without any additional information. Therefore, some research of dynamic convex hull algorithms involves the computational complexity of various geometric search problems with convex hulls stored in specific kinds of data structures. The mentioned approach of Overmars and van Leeuwen allows for logarithmic complexity of various common queries.
References
.
Convex hull algorithms |
https://en.wikipedia.org/wiki/Rich%20Waltz | Rich Waltz (born October 22, 1962) is an American television play-by-play commentator currently calling college football and basketball for CBS Sports and CBS Sports Network. Waltz also calls MLB for MLB Network's Showcase telecasts and Apple TV's Friday Night Baseball. The past two season's he has filled in on TV for the Arizona Diamondbacks and the Los Angeles Angels on Bally Sports. Waltz also called the Phoenix Regional of the World Baseball Classic for MLB Network and MLB International. A three-time Emmy winner, Waltz is formerly known for calling television broadcasts for the Miami Marlins of Major League Baseball from 2005 to 2017. Waltz's dismissal by Fox Sports Florida and the Marlins was criticized by fans and media. Over the past few years, Waltz has called MLB for MLB Network and Turner Sports, including the Cubs' Alec Mills no-hitter, the sixth MLB no-hitter he has announced. Waltz also called the 2020 AL Wild Card Series for TBS alongside Jimmy Rollins.
Broadcasting career
Major League Baseball
From 2012 to 2015, Waltz called games on Fox's Saturday Baseball package, and he has filled in on MLB Network's Thursday Night Baseball coverage. Waltz has called four World Baseball Classics (WBC) for MLB Network; in 2013, 2017 and 2023 he partnered with Buck Martinez and called two rounds of the WBC in Japan and Arizona.
Waltz joined FSN Florida from FSN Northwest. He has also called Major League Baseball games for Fox, ESPN, ESPN Radio, and FX nationally along with the Seattle Mariners and Toronto Blue Jays broadcasts on CBC Television in Canada. Waltz's no-hitters include Aníbal Sánchez's in September 2006, Roy Halladay's perfect game on May 29, 2010, and Henderson Alvarez's no-hitter against the Detroit Tigers on the final game of the 2013 Major League Baseball season.
Other sports
Since 2014 Rich's College Football and Basketball has been with CBS Sports and CBS Sports Network. His CBS analysts have included Adam Archuleta, Aaron Murray, and Aaron Taylor. From 1997 to 2002, Waltz called college football games for ESPN, ESPN Radio and ABC in the Big Ten, SEC and ACC conferences. His football experience also includes NFL Europe for Fox, Pac-12 Football for FSN, and NFL preseason games for the Seattle Seahawks.
From 2010 to 2012, Waltz called games on ACC College Football Saturday and SEC Saturday Nights produced and distributed by Fox Sports Net and Raycom Sports. His college basketball work has included games in every major conference for Fox, ESPN, CBS, CBS Sports Network, and Raycom. In 2018 Waltz called the NBA Playoffs and the NCAA Tournament East Regional on TNT's VR platform.
Waltz's ESPN assignments included the Women's NCAA basketball tournament, Arena Football, NCAA College Softball World Series, Little League World Series Regional Finals, and Major League Soccer. Waltz has also called both ATP and WTA events on Tennis Channel, including 2015 events from Dubai, Doha, and Buenos Aires.
In the 2019, NCAA Super Regional on |
https://en.wikipedia.org/wiki/The%20Shield%3A%20Music%20from%20the%20Streets | The Shield: Music From the Streets is a collection of songs taken from the FX Networks TV series The Shield.
Track listing
"The Shield Theme"
"Hating Hollywood" by Theory of a Deadman
"Death March" by Black Label Society
"Bring 'Em Out Dead" by Onyx
"Lay Down" by Mikal Raymo
"Perkins" by Peyote Asesino
"Caught Up in the System" by SX-10
"Freedom Band" by Delinquent Habits
"Pride" by Damageplan
"Nothing's Clear" by Ill Niño
"Rushing In" by Crazy Anglos
"No Muerdas La Mano" by Kinto Sol
"Breakdown" by Tantric
"Betrayal" by The Black Maria
"Let's Ride" by Conejo (rapper)
"Ooohhhwee" by Master P
"Mafia" by Kelis
"Cuiden a Los Niños" by Brujeria
"The Shield" by Roc Raida Feat. DJ Paradime
Television soundtracks
2005 soundtrack albums |
https://en.wikipedia.org/wiki/Roger%20Daley | Roger Willis Daley (January 25, 1943 – August 29, 2001) was a British meteorologist known particularly for his work on data assimilation.
Early life
Daley was born in Purley, England on January 25, 1943, but moved with his parents to Canada at an early age. He studied at the University of British Columbia as an undergraduate and completed PhD studies at McGill University in 1971 where he was the student of Phil Merilees (Superintendent of NRL Marine Meteorology Division, 1997–2002).
Career
After 2 years as a postdoc in Denmark, Daley took a position at the numerical weather prediction research center in Montreal where he was instrumental in the development of the first operational weather model (implemented in 1976) based on the spectral transform method for the globe. This method is now the standard in most operational centers around the world including the Navy's Fleet Numerical Meteorological and Oceanographic Center (FNMOC) in Monterey.
In 1977, Daley accepted a position at the National Center for Atmospheric Research (NCAR) in Boulder, Colorado, where he carried out research on non-linear normal mode initialization and other outstanding problems in the dynamics of large-scale atmospheric flow particularly as they related to global numerical weather prediction. He also became much more interested in the science of data assimilation. During this period, Daley was author or co-author on many publications in the refereed literature and was honored by receiving the NCAR outstanding publication award. Nevertheless, he did not neglect his interest in operational applications. He was involved in implementation of non-linear normal mode initialization for baroclinic models at the Canadian Meteorological Centre in Canada and at Météo-France in Paris; and he implemented an innovative error covariance formulation at the European Centre for Medium-Range Weather Forecasts in the United Kingdom.
From 1985 until 1995, Daley held a position of Senior Scientist with the Meteorological Service of Canada in Toronto. His personal scientific work concentrated on the writing of a book entitled Atmospheric Data Assimilation, which was published in 1991. By the time he left Canada in 1995, he was firmly established as a world leader in data assimilation not only through his comprehensive book but also in terms of creative new developments in the theory and practice of data assimilation. Daley was largely responsible for elevating data assimilation to be a prestigious field of scientific enquiry.
Throughout his career, Daley was in demand as a consultant, as a scientific visitor and adjunct professor. He held visiting appointments at ECMWF; Météo-France; Florida State University and The Meteorological Institute of Stockholm University. He was an adjunct professor at McGill University, Colorado State University and the Naval Postgraduate School and a Scientist Emeritus with the Meteorological Service of Canada. He also lectured extensively throughout the wor |
https://en.wikipedia.org/wiki/Incunabula%20Short%20Title%20Catalogue | The Incunabula Short Title Catalogue (ISTC) is an electronic bibliographic database maintained by the British Library which seeks to catalogue all known incunabula. The database lists books by individual editions, recording standard bibliographic details for each edition as well as giving a brief census of known copies, organised by location. It currently holds records of over 30,000 editions.
History
Previous efforts to comprehensively catalog 15th century printing include Georg Wolfgang Panzer's Annales Typographici ab Artis Inventae Origine ad Annum MD (1793–97) and Ludwig Hain's Repertorium Bibliographicum (1822). Hain's work was later supplemented by Copinger's Supplement and Reichling's Appendices, which would pave the way for the Gesamtkatalog der Wiegendrucke (1925). The Gesamtkatalog der Wiegendrucke (GW) was the most comprehensive catalog of incunables to date (and still offers more in-depth information than ISTC), but in recent decades work on the catalog has slowed to such a degree that the goal of cataloging all extant incunables under the GW'''s system is indefinitely far-off.
The ISTC was created to establish a system of incunable cataloging that was simple enough to be expanded quickly, bringing the goal of a complete incunable catalog back into focus. Furthermore, the ISTC would use standardized entries that could be entered into a machine-searchable database.
Work on the ISTC began in 1980 under the leadership of the British Library's Lotte Hellinga. Frederick R. Goff's Incunabula in American Libraries (1973) was the first pre-existing catalog to be keyed into ISTC's database. Besides providing the catalog's first 12,900 entries, Goff's system for classifying information about incunables formed the basis for the structure of ISTC's records. Entries for all of the incunables in British Library and the Italian union catalog (IGI) were added next, followed by other national incunable catalogs.
Records
ISTC records retain many characteristics of the records from Goff's census. Each record represents one edition of a work. Information such as author, title, printer, place of printing, year of printing, language, and format is entered into discrete fields to make the records searchable by a computer. Catalogue entries are reduced to a standard form, for ease of indexing and access, which includes the use of standard names for authors and printers—a major issue in an era where the use of Latinised names and vernacular ones interchangeably was common—and contemporary English names for places. Dates are reduced to conventional years where possible.
Scope and coverage
The ISTC has recorded 29,777 editions to date, although some of the records included in that number are actually 16th-century works that were included in previous incunable catalogs in error, so the number of true incunabula recorded is 27,460. The number of extant incunabula is estimated to be approximately 28,000 editions, which puts ISTC extraordinarily clos |
https://en.wikipedia.org/wiki/Pride%20Radio | Pride Radio (stylized as PRIDE Radio) is an LGBTQ+ electronic dance music and top 40 radio network launched by Clear Channel Communications Format Lab under the direction of Michael Albl, who conceived the format, on terrestrial HD2 & HD3 stations and online via CCRD (Clear Channel Radio Digital) in 2006. The radio division became known as iHeartMedia on September 16, 2014. It is one of several music channels that are available through iHeartMedia's iHeartRadio app.
Network information
The online portal acts as an interactive hub, hosting a variety of user-generated content. In addition, PRIDE Radio is a 24/7 streaming channel that plays upbeat Top 40 music (including remixes) and dance music targeted to the LGBTQ+ community. The service is also carried on the HD Radio sub-channels (HD2 & HD3) of selected iHeart radio stations around the U.S. The channel and accompanying online portal provide the LGBTQ+ audience with programming that aims to be entertaining, informative, and uniting. PRIDE Radio introduced a 24/7 slate of personalities in May 2013.
Stations
These FM stations currently carry Pride Radio on their HD2 (or HD3) digital subchannels:
WKTU HD2 103.5 FM: New York, New York
KBIG HD2 104.3 FM: Los Angeles, California
WKSC-FM HD2 103.5 FM: Chicago, Illinois
KIOI HD2 101.3 FM: San Francisco, California
KHKS HD2 106.1 FM: Dallas, Texas (Previously an affiliate from 2006 to 2008; returned in March 2011.)
KQBT HD2 93.7 FM: Houston, Texas
WIHT HD2 99.5 FM: Washington, D.C.
WBZY HD3 105.7 FM: Atlanta, Georgia
WIOQ HD3 102.1 FM: Philadelphia, Pennsylvania (Previous affiliate that returned in March 2017.)
WBWL HD2 101.7 FM: Boston, Massachusetts
WBGG-FM HD3 105.9 FM: Miami, Florida
KBKS-FM HD2 106.1 FM: Seattle, Washington
KMXP HD2 96.9 FM: Phoenix, Arizona
KDWB HD2 101.3 FM: Minneapolis, Minnesota
KHTS-FM HD2 93.3 FM: San Diego, California
WFLZ-FM HD2 93.3 FM Tampa, Florida (serves as PRIDE Radio’s monitored reporter on Billboard’s Dance/Mix Show Airplay chart)
KBCO HD3 97.3 FM: Denver, Colorado
WZFT HD2 104.3 FM: Baltimore, Maryland
KXJM HD2 107.5 FM: Portland, Oregon
WLKO HD2 102.9 FM: Charlotte, North Carolina
KSLZ HD2 107.7 FM: St. Louis. Missouri
WKST-FM HD2 96.1 FM: Pittsburgh, Pennsylvania
WXXL HD2 106.7 FM: Orlando, Florida
WKFS HD2 107.1: Cincinnati, Ohio
KPEZ HD2 102.3 FM: Austin, Texas (serves as PRIDE Radio's monitored reporter on Mediabase's Dance Airplay Chart)
WHLK HD2 106.5 FM: Cleveland, Ohio
WXZX HD2 105.7 FM: Columbus, Ohio
WKSS HD2 95.7 FM: Hartford, Connecticut
WTUE HD3 104.7 FM: Dayton, Ohio
WPRM-FM HD4 99.1 FM: San Juan, Puerto Rico
Former affiliates
WSRS HD2: Worcester, Massachusetts (Switched to an 1980s pop format, probably originating from the iHeart80s feed, without any branding or slogan present)
KDMX HD2: Dallas, Texas (Switched to oldies/gold AC format known as "Sunny 102.9 HD2" in early spring of 2011, now silent)
KHFI HD2: Austin, Texas (Switched to "Hot Spot" programming)
|
https://en.wikipedia.org/wiki/Anguillosporella%20vermiformis | Anguillosporella vermiformis is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa
Fungi described in 1916 |
https://en.wikipedia.org/wiki/Beniowskia%20sphaeroidea | Beniowskia sphaeroidea is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Enigmatic Ascomycota taxa
Fungal plant pathogens and diseases
Fungi described in 1928 |
https://en.wikipedia.org/wiki/Botryodiplodia%20oncidii | Botryodiplodia oncidii is an ascomycete fungus that is a plant pathogen. It causes dieback on Cattleya.
References
External links
Index Fungorum
USDA ARS Fungal Database
Enigmatic Ascomycota taxa
Fungal plant pathogens and diseases
Orchid diseases
Fungi described in 1926 |
https://en.wikipedia.org/wiki/Briosia%20ampelophaga | Briosia ampelophaga is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa
Fungi described in 1888 |
https://en.wikipedia.org/wiki/Capitorostrum%20cocoes | Capitorostrum cocoes is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa
Fungi described in 1991 |
https://en.wikipedia.org/wiki/Coniothecium%20chomatosporum | Coniothecium chomatosporum is an ascomycete fungus that is a plant pathogen. It is found on plants of the genus Malus and Pyrus.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa
Fungi described in 1837 |
https://en.wikipedia.org/wiki/Cryptosporium%20minimum | Cryptosporium minimum is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa
Fungi described in 1907 |
https://en.wikipedia.org/wiki/Cytosporina%20ludibunda | Cytosporina ludibunda is an ascomycete fungus that is a plant pathogen.
External links
Index Fungorum
USDA ARS Fungal Database
References
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa
Fungi described in 1884 |
https://en.wikipedia.org/wiki/Dactuliophora%20elongata | Dactuliophora elongata is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa
Fungi described in 1964 |
https://en.wikipedia.org/wiki/Deightoniella%20papuana | Deightoniella papuana is an ascomycete fungus that is a plant pathogen.
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa
Fungi described in 1959 |
https://en.wikipedia.org/wiki/Dendrophoma%20marconii | Dendrophoma marconii is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa
Fungi described in 1888 |
https://en.wikipedia.org/wiki/Denticularia%20mangiferae | Denticularia mangiferae is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa |
https://en.wikipedia.org/wiki/Kutilakesa%20pironii | Kutilakesa pironii is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa |
https://en.wikipedia.org/wiki/Leandria%20momordicae | Leandria momordicae is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa |
https://en.wikipedia.org/wiki/Leptothyrium%20nervisedum | Leptothyrium nervisedum is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa |
https://en.wikipedia.org/wiki/Mauginiella%20scaettae | Mauginiella scaettae is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Enigmatic Ascomycota taxa
Fungal plant pathogens and diseases
Fungi described in 1925 |
https://en.wikipedia.org/wiki/Monilochaetes%20infuscans | Monilochaetes infuscans is an ascomycete fungus that is a plant pathogen.
References
External links
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Sordariomycetes |
https://en.wikipedia.org/wiki/Periconiella%20cocoes | Periconiella cocoes is an ascomycete fungus that is a plant pathogen affecting the coconut.
See also
List of coconut palm diseases
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Coconut palm diseases
Enigmatic Ascomycota taxa |
https://en.wikipedia.org/wiki/Phaeocytostroma%20iliau | Phaeocytostroma iliau is an ascomycete fungus that is a plant pathogen infecting sugarcane.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Sugarcane diseases
Enigmatic Ascomycota taxa |
https://en.wikipedia.org/wiki/Phaeocytostroma%20sacchari | Phaeocytostroma sacchari is an ascomycete fungus that is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa |
https://en.wikipedia.org/wiki/Phialophora%20cinerescens | Phialophora cinerescens is an ascomycete fungus that is a plant pathogen infecting carnations.
References
External links
Index Fungorum
USDA ARS Fungal Database
EPPO Global Database
Fungal plant pathogens and diseases
Ornamental plant pathogens and diseases
Eurotiomycetes |
https://en.wikipedia.org/wiki/Botrytis%20tracheiphila | Botrytis tracheiphila is an ascomycete fungus that is a plant pathogen.
References
External links
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Enigmatic Ascomycota taxa
Fungi described in 1986 |
https://en.wikipedia.org/wiki/Pseudoepicoccum%20cocos | Pseudoepicoccum cocos is an ascomycete fungus that is a plant pathogen infecting coconut palms.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Coconut palm diseases
Enigmatic Ascomycota taxa |
https://en.wikipedia.org/wiki/Pycnostysanus%20azaleae | Pycnostysanus azaleae or Seifertia azaleae is an ascomycete fungus that is a plant pathogen infecting azaleas and rhododendrons.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Ornamental plant pathogens and diseases
Enigmatic Ascomycota taxa |
https://en.wikipedia.org/wiki/Sirosporium%20diffusum | Sirosporium diffusum is an ascomycete fungus that is a plant pathogen, infecting pecan.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal tree pathogens and diseases
Nut tree diseases
Enigmatic Ascomycota taxa |
https://en.wikipedia.org/wiki/Thyrostroma%20compactum | Thyrostroma compactum is a plant pathogen in the family Botryosphaeriaceae.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Botryosphaeriaceae
Fungi described in 1876 |
https://en.wikipedia.org/wiki/Tunstallia%20aculeata | Tunstallia aculeata is an ascomycete fungus that is a plant pathogen infecting tea.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Tea diseases
Enigmatic Ascomycota taxa
Fungi described in 1906
Taxa named by Thomas Petch |
https://en.wikipedia.org/wiki/Quality%20control%20and%20genetic%20algorithms | The combination of quality control and genetic algorithms led to novel solutions of complex quality control design and optimization problems. Quality is the degree to which a set of inherent characteristics of an entity fulfils a need or expectation that is stated, general implied or obligatory. ISO 9000 defines quality control as "A part of quality management focused on fulfilling quality requirements". Genetic algorithms are search algorithms, based on the mechanics of natural selection and natural genetics.
Quality control
Alternative quality control (QC) procedures can be applied to a process to test statistically the null hypothesis, that the process conforms to the quality specifications and consequently is in control, against the alternative, that the process is out of control. When a true null hypothesis is rejected, a statistical type I error is committed. We have then a false rejection of a run of the process. The probability of a type I error is called probability of false rejection. When a false null hypothesis is accepted, a statistical type II error is committed. We fail then to detect a significant change in the probability density function of a quality characteristic of the process. The probability of rejection of a false null hypothesis equals the probability of detection of the nonconformity of the process to the quality specifications.
The QC procedure to be designed or optimized can be formulated as:
(1)
where denotes a statistical decision rule, denotes the size of the sample , that is the number of the samples the rule is applied upon, and denotes the vector of the rule specific parameters, including the decision limits. Each symbol denotes either the Boolean operator AND or the operator OR. Obviously, for denoting AND, and for , that is for , the (1) denotes a -sampling QC procedure.
Each statistical decision rule is evaluated by calculating the respective statistic of the measured quality characteristic of the sample. Then, if the statistic is out of the interval between the decision limits, the decision rule is considered to be true. Many statistics can be used, including the following: a single value of the variable of a sample, the range, the mean, and the standard deviation of the values of the variable of the samples, the cumulative sum, the smoothed mean, and the smoothed standard deviation. Finally, the QC procedure is evaluated as a Boolean proposition. If it is true, then the null hypothesis is considered to be false, the process is considered to be out of control, and the run is rejected.
A quality control procedure is considered to be optimum when it minimizes (or maximizes) a context specific objective function. The objective function depends on the probabilities of detection of the nonconformity of the process and of false rejection. These probabilities depend on the parameters of the quality control procedure (1) and on the probability density functions (see probability density function) of the |
https://en.wikipedia.org/wiki/Centamap | Centamap () is a free web map service that displays maps of Hong Kong, launched in 1999. It obtains licensed map data from the Survey and Mapping Office of the Hong Kong Government.
History
Centamap was developed by Centaline Property Agency at a cost of HK$6 million. The website was launched on 19 November 1999; within its first four days it had attracted 100,000-page views per day. At the time, it was one of two digital maps of Hong Kong that had been developed using map data from the government, the other being PCCW's YPmap. Centaline had intended to make money from the website using banner advertising, expecting revenue of $1–1.5 million a year.
Features
The website shows a single, seamless map of Hong Kong, the Community Map on Internet. The data for the Community Map is obtained from the Survey and Mapping Office of the Hong Kong Government's Lands Department, and it is jointly built by Cable & Wireless HKT's Telecom Directories Limited (TDL), Centaline Property Agency, and a Canadian software house. The website shows the locations of various landmarks, places of interest, and property listings. Standard digital map functions are provided, such as searching by address, building name, street intersection and geographic co-ordinates, as well as panning and zooming the map. The map can be zoomed to a scale as low as 1:500 or as high as 1:10,000. The search function utilised data from the Geographic Information System (GIS). The website also showed census data and photographs of scenic places.
An April 2000 review of several digital maps of Hong Kong and Macau in The Asian Wall Street Journal complimented Centamap for having a search facility that allowed users to display, for example, a map showing a hotel by typing the hotel's name. The service was the only one that allowed maps to be easily copied and pasted into other documents. However, the reviewer lamented that the map lacked transport information and displayed only "the income and educational levels of the residents in [an] area", which was probably not useful to a visitor of Hong Kong. Another review in the South China Morning Post that month noted that Centamap's website had a "no-frills" design, worked better in Netscape Navigator than Internet Explorer, and had less features than TDL's HKCityMap, which used the same Community Map data. By July 2001, Centamap had added links to government air pollution indexes across the city, the meteorological department's weather predictions and the government department responsible for selling aerial photographs; a review in the International Herald Tribune commented that the site was a good example of how online maps can provide information that is impossible to present on printed maps.
Statistics
From the website's launch in 1999 to 2003, the average number of monthly page views for its maps increased from 0.1 to 4 million. In November 2003, Centamap was the first mapping service licensed by the Hong Kong Census and Statistics Department to |
https://en.wikipedia.org/wiki/SYS%20%28command%29 | In computing, sys is a command used in many operating system command-line shells and also in Microsoft BASIC.
DOS, Windows, etc.
SYS is an external command of Seattle Computer Products 86-DOS, Microsoft MS-DOS, IBM PC DOS, Digital Research FlexOS, IBM/Toshiba 4690 OS, PTS-DOS, Itautec/Scopus Tecnologia SISNE plus, and Microsoft Windows 9x operating systems. It is used to make an already formatted medium bootable. It will install a boot sector capable of booting the operating system into the first logical sector of the volume. Further, it will copy the principal DOS system files, that is, the DOS-BIOS (IO.SYS or IBMBIO.COM) and the DOS kernel (MSDOS.SYS or IBMDOS.COM) into the root directory of the target. Due to restrictions in the implementation of the boot loaders in the boot sector and DOS' IO system, these two files must reside in the first two directory entries and be stored at the beginning of the data area under MS-DOS and PC DOS. Depending on version, the whole files or only a varying number of sectors of the DOS-BIOS (down to only three sectors in modern issues of DOS) will have to be stored in one consecutive part. SYS will try to physically rearrange other files on the medium in order to make room for these files in their required locations. This is why SYS needs to bypass the filesystem driver in the running operating system. Other DOS derivatives such as DR-DOS do not have any such restrictions imposed by the design of the boot loaders, therefore under these systems, SYS will install a DR-DOS boot sector, which is capable of mounting the filesystem, and can then simply copy the two system files into the root directory of the target.
SYS will also copy the command line shell (COMMAND.COM) into the root directory. The command can be applied to hard drives and floppy disks to repair or create a boot sector.
Although an article on Microsoft's website says the SYS command was introduced in MS-DOS version 2.0, this is incorrect. SYS actually existed in 86-DOS 0.3 already. According to The MS-DOS Encyclopedia, the command was licensed to IBM as part of the first version of MS-DOS, and as such it was part of MS-DOS/PC DOS from the very beginning (IBM PC DOS 1.0 and MS-DOS 1.25).
DR DOS 6.0 includes an implementation of the command.
Syntax
The command syntax is:
SYS [drive1:][path] drive2:
Arguments:
[drive1:][path] – The location of the system files
drive2: – The drive to which the files will be copied
Example
C:\>sys a:
Microsoft BASIC
SYS is also a command in Microsoft BASIC used to execute a machine language program in memory. The command took the form SYS n where n is a memory location where the executable code starts. Home computer platforms typically publicised dozens of entry points to built-in routines (such as Commodore's KERNAL) that were used by programmers and users to access functionality not easily accessible through BASIC.
See also
List of DOS commands
Disk formatting
References
Further reading
External links
|
https://en.wikipedia.org/wiki/Awn | AWN may stand for:
Awn Access to Justice Network in Gaza Strip, Legal Aid Network operate in Gaza Strip, Palestine
Animation World Network, an online organization for animators
Avant Window Navigator, a dock-like bar that tracks open windows
Awn may refer to:
Awn (botany), on a plant, a hair or bristle-like appendage (i.e., an awned appendage)
Awn hair (mammal), a type of hair on mammals
Alton Downs Airport, IATA airport code "AWN" |
https://en.wikipedia.org/wiki/WYCS | WYCS (91.5 MHz) is a non-commercial FM radio station licensed to Yorktown, Virginia, and serving the Peninsula of Hampton Roads. WYCS is part of the "Oasis Radio Network" and is owned and operated by David Ingles Ministries, Inc.
On weekdays, WYCS offers a schedule of Christian talk and teaching programs, middays and overnight. Early mornings, afternoons, evenings and weekends, WYCS plays Southern Gospel and Traditional Worship Music.
History
WYCS first signed on the air in February 1966. It was owned by the York County School Board and offered educational programs and training for students interested in careers in broadcasting. The call sign stands for "York County Schools".
It was later sold to David Ingles Ministries, Inc. The station became part of the Oasis Radio Network, based in Tulsa, Oklahoma.
References
External links
91.5 FM the Oasis Network Online
Radio stations established in 1966
1966 establishments in Virginia
YCS
York County, Virginia
Southern Gospel radio stations in the United States |
https://en.wikipedia.org/wiki/James%20H.%20Fowler | James H. Fowler (born February 18, 1970) is an American social scientist specializing in social networks, cooperation, political participation, and genopolitics (the study of the genetic basis of political behavior). He is currently Professor of Medical Genetics in the School of Medicine and Professor of Political Science in the Division of Social Science at the University of California, San Diego. He was named a 2010 Fellow of the John Simon Guggenheim Foundation.
Background
Fowler earned a bachelor's degree from Harvard College in 1992, a master's degree in International Relations from Yale University in 1997, and a Ph.D. in Government from the Harvard University in 2003. He was also a Peace Corps volunteer in Ecuador from 1992 to 1994. In 2010, he was named by Foreign Policy magazine to its list of top global thinkers.
Research
Fowler's research centers on social networks. He is best known for his studies of the social spread of obesity, smoking, and happiness in the Framingham Heart Study, but he has also studied the network of legislative cosponsorships in the U.S. Congress and the network of U.S. Supreme Court precedents.
Studies by Nicholas A. Christakis and Fowler suggested a variety of individuals' attributes like obesity, smoking cessation, and happiness rather than being individualistic, are causally correlated by contagion mechanisms that transmit these behaviors over long distances within social networks. A debate over the statistical models used to establish these three degrees of influence findings ensued, but subsequent studies have found evidence of their central claims about behavioral influence and contagion.
In addition to his research on social networks, Fowler has become known for his work on genopolitics, showing that genes influence voting and other forms of political participation. Fowler used twin studies of voter turnout in Los Angeles and the National Longitudinal Study of Adolescent Health to establish that the decision to vote in the United States has very strong heritability. He has also identified three genes that are associated with voter turnout and partisan attachment, specifically those regulating the serotonin and dopamine systems in the brain via the production of monoamine oxidase, 5HTT, and DRD2.
More recently, he has shown evidence that social networks have a partly genetic basis. In 2010, he published a paper regarding the use of social networks as 'sensors' for forecasting epidemics.
In other research, Fowler is known for his theoretical and experimental work on egalitarianism and the evolution of cooperation, with related work on altruism, overconfidence, and political participation.
Fowler's newest research focuses on Facebook friendship as a predictor of voter mobilization, and the use of the social network medium, to mobilize voters in American elections. Based on a large manipulation of friendship cues in the Facebook social network, Fowler demonstrates that being presented with indicati |
https://en.wikipedia.org/wiki/History%20of%20numerical%20solution%20of%20differential%20equations%20using%20computers | Differential equations, in particular Euler equations, rose in prominence during World War II in calculating the accurate trajectory of ballistics, both rocket-propelled and gun or cannon type projectiles. Originally, mathematicians used the simpler calculus of earlier centuries to determine velocity, thrust, elevation, curve, distance, and other parameters.
New weapons, however, such as Germany's giant cannons, the "Paris Gun" (Encyclopedia Astronautica) and "Big Bertha," and the V-2 rocket, meant that projectiles would travel hundreds of miles in distance and dozens of miles in height, in all weathers. As a result, variables such as diminished wind resistance in thin atmospheres and changes in gravitational pull reduced accuracy using the historic methodology. There was the additional problem of planes that could now fly hundreds of miles an hour. Differential equations were applied to stochastic processes. Developing machines that could speed up human calculation of differential equations led in part to the creation of the modern computer through the efforts of Vannevar Bush, John von Neumann and others.
According to Mary Croarken in her paper "Computing in Britain During World War II," by 1945, the Cambridge Mathematical Laboratory created by John Lennard-Jones utilized the latest computing devices to perform the equations. These devices included a model "differential analyser," and the Mallock machine, described as "an electrical simultaneous equation solver." According to Croarken, the Ministry was also interested in the new arrival of a differential analyzer accommodating eight integrators. This exotic computing device built by Metropolitan-Vickers in 1939 consisted of wheel and disk mechanisms that could provide descriptions and solutions for differential equations. Output resulted in a plotted graph.
At the same time, in the United States, analog computer pioneer Vannevar Bush took on a similar role to that of Lennard-Jones in the military effort after President Franklin Delano Roosevelt entrusted him with the bulk of wartime research into automatic control of fire power using machines and computing devices.
According to Sarah Bergbreiter in her paper "Moving from Practice to Theory: Automatic Control after World War II," fire control for the downing of enemy aircraft by anti-aircraft guns was the priority. The analog electro-mechanical computing machines plotted the differential firing data while servos created by H.L. Hazen adapted the data to the guns for precise firing control and accuracy. Other improvements of a similar type by Bell Labs increased firing stability so that output from the differential engines could be fully used to compensate for stochastic behaviors of enemy aircraft and large guns. A new age of intelligent warfare had begun.
This work at MIT and Bell Labs would later lead to Norbert Wiener's development of the electronic computer and the science of cybernetics for the same purpose, speeding the differential |
https://en.wikipedia.org/wiki/Camarosporium%20pistaciae | Camarosporium pistaciae is a fungal plant pathogen that causes blight in pistachio shoots and panicles.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal tree pathogens and diseases
Fruit tree diseases
Pleosporales |
https://en.wikipedia.org/wiki/Boeremia%20lycopersici | Boeremia lycopersici (syn. Didymella lycopersici) is a fungal plant pathogen infecting tomatoes and strawberries.
References
External links
Index Fungorum
USDA ARS Fungal Database
Pleosporales
Fungal plant pathogens and diseases
Tomato diseases
Fungal strawberry diseases
Fungi described in 1881 |
https://en.wikipedia.org/wiki/Hendersonia%20creberrima | Hendersonia creberrima is a fungal plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Pleosporales |
https://en.wikipedia.org/wiki/Hendersonia%20theicola | Hendersonia theicola is a fungal plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Pleosporales |
https://en.wikipedia.org/wiki/Phoma%20caricae-papayae | Phoma caricae-papayae is a fungal plant pathogen infecting papayas.
References
External links
Index Fungorum
USDA ARS Fungal Database
caricae-papayae
Fungal tree pathogens and diseases
Papaya tree diseases
Fungi described in 1955 |
https://en.wikipedia.org/wiki/Phoma%20cucurbitacearum | Phoma cucurbitacearum is a fungal plant pathogen infecting cucurbits.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Vegetable diseases
Cucurbitaceae
cucurbitacearum
Fungi described in 1823 |
https://en.wikipedia.org/wiki/Phoma%20eupyrena | Phoma eupyrena is a fungal plant pathogen infecting Douglas firs.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal conifer pathogens and diseases
eupyrena
Fungi described in 1879 |
https://en.wikipedia.org/wiki/Phoma%20microspora | Phoma microspora is a fungal plant pathogen known for infecting peanuts.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Peanut diseases
microspora |
https://en.wikipedia.org/wiki/Phoma%20nebulosa | Phoma nebulosa is a fungal plant pathogen infecting spinach.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Vegetable diseases
nebulosa
Fungi described in 1800 |
https://en.wikipedia.org/wiki/Phoma%20oncidii-sphacelati | Phoma oncidii-sphacelati is a fungal plant pathogen infecting cattleyas.
References
External links
Index Fungorum
USDA ARS Fungal Database
oncidii-sphacelati
Fungal plant pathogens and diseases
Orchid diseases
Fungi described in 1899 |
https://en.wikipedia.org/wiki/Didymella%20pinodella | Didymella pinodella (syn. Phoma pinodella) is a fungal plant pathogen infecting pea and red clover.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Vegetable diseases
Pleosporales
Fungi described in 1927 |
https://en.wikipedia.org/wiki/Phoma%20strasseri | Phoma strasseri is a fungal plant pathogen infecting mint.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Mint diseases
strasseri
Fungi described in 1924 |
https://en.wikipedia.org/wiki/Stagonospora%20recedens | Stagonospora recedens is a fungal plant pathogen infecting red clover.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Pleosporales
Fungi described in 1938 |
https://en.wikipedia.org/wiki/Stagonospora%20sacchari | Stagonospora sacchari is a fungal plant pathogen infecting sugarcane.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Sugarcane diseases
Pleosporales
Fungi described in 1950 |
https://en.wikipedia.org/wiki/Workgroup%20for%20Electronic%20Data%20Interchange | WEDI, pronounced "wee dee", is a not-for-profit user group in the United States for users of Electronic Data Interchange (EDI) in public and private healthcare. It is sometimes referred to by other names including some or all of the words Workgroup for Electronic Data Interchange.
By: Hipaasuite
It was established to provide leadership and guidance to the healthcare industry on how to use and leverage its collective knowledge, expertise and information resources to improve the quality, affordability and availability of healthcare, via forums, conferences and online resources, especially in matters of conformance to EDI standards required by the Health Insurance Portability and Accountability Act, also known as HIPAA which was enacted by the U.S. Congress in 1996.
WEDI has regional affiliates in 27 US States and the Virgin Islands.
History
In November 1991, the Workgroup for Electronic Data Interchange (WEDI) was established in response to the challenge from the Bush administration, specifically, Louis Sullivan MD, Secretary of HHS, to reduce administrative costs in the nation's health care system by up to 10%.
Joseph Brophy, President of Travelers Insurance Company, and Bernard Tresnowski, President of the Blue Cross and Blue Shield Association, agreed to establish and lead a voluntary, public-private task force, named WEDI, to develop an action plan to streamline health care administration by standardizing electronic communications across the health care and health insurance industry.
Initial task force
The initial task force included members from the following organizations:
The Travelers Insurance Company
Blue Cross and Blue Shield Association
Self-Insurance Institute of America
American Medical Association
ANSI ASC X12
Mutual of Omaha
American Hospital Association
Drug Benefit Management
United Healthcare Group
American Clinical Laboratory Association
Columbia Healthcare Corporation
Medical Group Management
American Nurses Association
Aetna Life Insurance Company
American Dental Association
Health Insurance Association of America
National Committee to Preserve Social Security and Medicare
Health Technology Management, Inc
National Association for Home Care
Health Care Financing Administration
American Association of Retired Persons
American Health Information Management Association
Blue Cross of California
American Health Care Association
Department of Income Maintenance State of Connecticut.
WEDI 1992 report highlights
In July 1992, WEDI published a report that outlined the steps necessary to make electronic data interchange (EDI) a routine business practice for the health care industry by 1996. The Workgroup envisioned the entire health care industry transacting business electronically, under a nationwide set of coding and format standards for all transactions. The transaction records would be transmitted electronically, in a secure manner to protect privacy, over private and public interconnectin |
https://en.wikipedia.org/wiki/Monographella%20cucumerina | Monographella cucumerina is a fungal plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Xylariales
Fungi described in 1919 |
https://en.wikipedia.org/wiki/Monographella%20nivalis%20var.%20neglecta | Monographella nivalis var. neglecta is a plant pathogen.
References
External links
Index Fungorum
USDA ARS Fungal Database
Fungal plant pathogens and diseases
Xylariales
Fungi described in 1926 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.