source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Semulation | Semulation is a computer science-related portmanteau of simulation and emulation, signifying the process of controlling an emulation through a simulator.
Semulation in computer science
Digital hardware is described using hardware description languages (HDL) like VHDL, Verilog or System Verilog. These descriptions are simulated together with a problem-specific testbench. The initial functional verification of most IP designs is done via simulation at register transfer level (RTL) or gate level. In an event driven simulation method the code must be processed sequential by a CPU, because a normal computer is not able to process the implemented hardware parallel. This sequential approach leads to long simulation times especially in complex systems on chip (SoC) designs.
After simulation the RTL description must be synthesized to fit in the final hardware (e.g. FPGA, ASIC). This step brings a lot of uncertainties because the real hardware is normally not as ideal as the simulation model. The differences between real world and simulation are a major reason why emulation is used in hardware design.
Generally the simulation and emulation environment are two independent systems. Semulation is a symbiosis of both methods. In semulation one part of a hardware design is processed sequential in software (e.g. the testbench) while the other part is emulated.
An example design flow for semulation is depicted in the following block chart:
The database holds the design and testbench files and the information about the block whether it will be simulated or emulated. The left part shows the normal simulation path where the design files must be compiled for an HDL simulator. The right part of the state chart handles the flow for the emulation system. Design files for the FPGA must be synthesized to the appropriate target technology. A major point in semulation is the connection between the emulation system and the HDL simulator. The interface is necessary for the simulator to handle the connected hardware.
Advantages of Semulation
Simulation acceleration: Simulating huge designs with an HDL simulator is a tedious task. When the designer transfers parts of the design to an emulation system and co-simulates them with the HDL simulation, the simulation run times can be decreased.
Using real hardware early in the design flow.
References
D. Scheurer and S. Reichör, SEmulation: Turbocharging the FPGA Development Process. White Paper, Altera Corporation
External links
SEmulation Technology Combines ReConfigurable Computing-based Simulation and Emulation into a Single Platform for RTL Design Verification
SEmulator
SDC to Showcase SEmulation for FPGA Development at Embedded Masterclass
Semulation in EETimes
Electronic circuit verification |
https://en.wikipedia.org/wiki/Peter%20E.%20Hart | Peter E. Hart (born 1941) is an American computer scientist and entrepreneur. He was chairman and president of Ricoh Innovations, which he founded in 1997. He made significant contributions in the field of computer science in a series of widely cited publications from the years 1967–75 while associated with the Artificial Intelligence Center of SRI International, a laboratory where he also served as director.
Education
Hart studied at Rensselaer Polytechnic Institute, leading to a BEE degree (1962). He did his graduate studies at Stanford University, where he got his MS (1963) and PhD (1966); Thomas M. Cover was his advisor and discovered & co-published a seminal paper on 1-NN nearest neighbor search.
Career
While at the SRI International Artificial Intelligence Center, Hart co-authored 20 papers, among them the initial exposition of the A* search algorithm and the variant of the Hough transform now widely used in computer vision for finding straight line segments in images. He also contributed to the development of Shakey the Robot.
Hart and Richard O. Duda are the authors of "Pattern Classification and Scene Analysis", originally published in 1973. This classic text is a widely cited reference, and the first edition was in print for over 25 years until being superseded by the second edition in 2000.
A strong advocate of artificial intelligence in industry, Hart was the founding director of the Fairchild/Schlumberger Artificial Intelligence Center and co-founder of Syntelligence, a company specializing in expert systems for financial risk analysis.
Hart is currently Group Senior Vice President at the Ricoh Company, Ltd.
Memberships and awards
Hart is an IEEE Fellow, an ACM Fellow and an AAAI Fellow.
References
External links
Hart's personal web page
Hart's web page at Ricoh Innovations
American engineering writers
Rensselaer Polytechnic Institute alumni
Stanford University alumni
Living people
SRI International people
Fellow Members of the IEEE
Fellows of the Association for Computing Machinery
Fellows of the Association for the Advancement of Artificial Intelligence
1941 births |
https://en.wikipedia.org/wiki/List%20of%20largest%20airlines%20in%20Asia | This is a list of the largest airlines in Asia by fleet size and total passengers carried in a twelve-month period. The table is updated periodically as and when new monthly data are available. Figures are for individual airlines; aggregate figures for airline groups (airlines and their partners/subsidiaries related by full equity ownership) are shown only when they are officially published. The list excludes companies headquartered on the Asian side of Russia, Turkey and Azerbaijan.
By passengers carried (millions)
Notes
Based on Fiscal Year ending 31 Mar.
Includes figures for Shanghai Airlines and China United Airlines.
Includes figures for Shenzhen Airlines (including Kunming Airlines), Air Macau and Dalian Airlines.
Includes figures for Thai AirAsia, Indonesia AirAsia, Philippines AirAsia, AirAsia X and Thai AirAsia X.
Includes figures for Chang An Airlines, China Xinhua Airlines and Shan Xi Airlines.
Includes figures for Batik Air, Wings Air, Batik Air Malaysia and Thai Lion Air.
Includes figures for J-Air and JAL Express.
Includes figures for Air Japan, ANA Wings and Vanilla Air.
Includes figures for Scoot and SilkAir.
Includes figures for Citilink.
Includes figures for Air India Express and Alliance Air.
Based on Fiscal Year ending 31 Mar.
Includes figures for Jin Air.
Includes figures for Cebgo.
Based on Fiscal Year ending 31 Mar.
Includes figures for Firefly and MASwings.
Includes figures for PAL Express.
Includes figures for Thai Smile.
Includes figures for Air Busan and Air Seoul
Includes figures for FlyArystan.
Inclused figures for Air Arabia Egypt, Air Arabia Maroc, Air Arabia Abu Dhabi, Fly Arna and Fly Jinnah
Includes figures for Dragonair.
Includes figures for Mandarin Airlines.
Includes figures for Uni Air.
References
Asia
Largest
Airlines of Asia |
https://en.wikipedia.org/wiki/Pilot%20%28operating%20system%29 | Pilot is a single-user, multitasking operating system designed by Xerox PARC in early 1977. Pilot was written in the Mesa programming language, totalling about 24,000 lines of code.
Overview
Pilot was designed as a single user system in a highly networked environment of other Pilot systems, with interfaces designed for inter-process communication (IPC) across the network via the Pilot stream interface. Pilot combined virtual memory and file storage into one subsystem, and used the manager/kernel architecture for managing the system and its resources.
Its designers considered a non-preemptive multitasking model, but later chose a preemptive (run until blocked) system based on monitors. Pilot included a debugger, Co-Pilot, that could debug a frozen snapshot of the operating system, written to disk.
A typical Pilot workstation ran 3 operating systems at once on 3 different disk volumes : Co-Co-Pilot (a backup debugger in case the main operating system crashed), Co-Pilot (the main operating system, running under co-pilot and used to compile and bind programs) and an inferior copy of Pilot running in a 3rd disk volume, that could be booted to run test programs (that might crash the main development environment).
The debugger was written to read and write variables for a program stored on a separate disk volume.
This architecture was unique because it allowed the developer to single-step even operating system code with semaphore locks, stored on an inferior disk volume. However, as the memory and source code of the D-series Xerox processors grew, the time to checkpoint and restore the operating system (known as a "world swap") grew very high. It could take 60-120 seconds to run just one line of code in the inferior operating system environment.
Eventually, a co-resident debugger was developed to take the place of Co-Pilot.
Pilot was used as the operating system for the Xerox Star workstation.
See also
Timeline of operating systems
References
Further reading
Horsley, T.R., and Lynch, W.C. Pilot: A software engineering case history. In Proc. 4th Int. Conf. Software Engineering, Munich, Germany, Sept. 1979, pp. 94-99.
External links
Pilot: An Operating System for a Personal Computer
Computer-related introductions in 1981
History of human–computer interaction
Proprietary operating systems
Window-based operating systems
Pilot
1981 software |
https://en.wikipedia.org/wiki/Nondeterministic%20programming | A nondeterministic programming language is a language which can specify, at certain points in the program (called "choice points"), various alternatives for program flow. Unlike an if-then statement, the method of choice between these alternatives is not directly specified by the programmer; the program must decide at run time between the alternatives, via some general method applied to all choice points. A programmer specifies a limited number of alternatives, but the program must later choose between them. ("Choose" is, in fact, a typical name for the nondeterministic operator.) A hierarchy of choice points may be formed, with higher-level choices leading to branches that contain lower-level choices within them.
One method of choice is embodied in backtracking systems (such as Amb, or unification in Prolog), in which some alternatives may "fail," causing the program to backtrack and try other alternatives. If all alternatives fail at a particular choice point, then an entire branch fails, and the program will backtrack further, to an older choice point. One complication is that, because any choice is tentative and may be remade, the system must be able to restore old program states by undoing side-effects caused by partially executing a branch that eventually failed.
Another method of choice is reinforcement learning, embodied in systems such as Alisp. In such systems, rather than backtracking, the system keeps track of some measure of success and learns which choices often lead to success, and in which situations (both internal program state and environmental input may affect the choice). These systems are suitable for applications to robotics and other domains in which backtracking would involve attempting to undo actions performed in a dynamic environment, which may be difficult or impractical.
See also
Nondeterminism (disambiguation)
Category: Nondeterministic programming languages
angelic non-determinism
demonic non-determinism
References
Computer programming
Programming paradigms
Determinism |
https://en.wikipedia.org/wiki/Scientists%20for%20Global%20Responsibility | Scientists for Global Responsibility (SGR) in the United Kingdom promotes the ethical practice and use of science, design and technology. SGR is affiliated to the International Network of Engineers and Scientists for Global Responsibility (INES). It is an independent UK-based membership organisation of hundreds of natural scientists, social scientists, engineers, IT professionals and architects. In 2017 its partner organization ICAN (International Campaign to Abolish Nuclear Weapons) won the Nobel Peace Prize. ICAN have promoted a Kurzgesagt YouTube video endorsed by the International Committee of the Red Cross and Crescent (ICRC) showing the consequences of a single atomic weapon exploded over a city.
SGR's work is focused on four main issues: security and disarmament; climate change and energy, including nuclear power; who controls science and technology?; emerging technologies. The main areas of concern are arms and arms control, including military involvement in UK universities; effect of excessive greenhouse gas emissions on climate; the nature of war and reducing barbarity; topsoil and water shortages resulting from modern agricultural methods; depletion of species of fish due to over-fishing; continual spread of nuclear weapons, and reduction of occurrence of serious nuclear accidents.
In 2019 SGR launched the journal Responsible Science. SGR evaluates the risk of new science and new technological solutions to older science-based problems and threats, while recognizing the enormous contribution science, design and technology has made to civilisation and human well-being.
SGR promotes science, design and technology that contribute to peace, social justice and environmental sustainability.
See also
Campaign for Nuclear Disarmament
Scientists against Nuclear Arms, a forerunner of SGR
References
External links
SGR website
Organizations with year of establishment missing
Non-profit organisations based in the United Kingdom
Ethics organizations
Anti-nuclear organizations
Anti–nuclear weapons movement
Science and technology in the United Kingdom
Ethics of science and technology |
https://en.wikipedia.org/wiki/WECV | WECV is a radio station operated by Bott Radio Network, with a Christian talk/teaching format.
Until 2011, the station was owned by Trevecca Nazarene University, and played Contemporary Christian music.
A key figure in the station's history is former General Manager David Deese. Deese, who still teaches at the university, led the radio station as a student, then as a faculty member. He was able to increase the station's transmission power on a couple of occasions and helped the university purchase 760 AM WENO and later put WNRZ, a repeater at 91.5 MHz in Dickson, on the air.
WECV is simulcast on WNRZ (covering western Middle Tennessee) and translator stations on 93.9 in Gallatin and 99.5 in Clarksville.
In the fall of 2010, Trevecca Nazarene University announced the sale of WNAZ, WNRZ and its translator stations to Bott Radio Network. On February 18, 2011 at noon, the station was transferred to Bott, at which time it began airing Bott Radio Network programming. The WNAZ call letters were officially changed to WECV several days later.
Translators
External links
ECV
Bott Radio Network stations
ECV |
https://en.wikipedia.org/wiki/No%20instruction%20set%20computing | No instruction set computing (NISC) is a computing architecture and compiler technology for designing highly efficient custom processors and hardware accelerators by allowing a compiler to have low-level control of hardware resources.
Overview
NISC is a statically scheduled horizontal nanocoded architecture (SSHNA). The term "statically scheduled" means that the operation scheduling and Hazard handling are done by a compiler. The term "horizontal nanocoded" means that NISC does not have any predefined instruction set or microcode. The compiler generates nanocodes which directly control functional units, registers and multiplexers of a given datapath. Giving low-level control to the compiler enables better utilization of datapath resources, which ultimately result in better performance. The benefits of NISC technology are:
Simpler controller: no hardware scheduler, no instruction decoder
Better performance: more flexible architecture, better resource utilization
Easier to design: no need for designing instruction-sets
The instruction set and controller of processors are the most tedious and time-consuming parts to design. By eliminating these two, design of custom processing elements become significantly easier.
Furthermore, the datapath of NISC processors can even be generated automatically for a given application. Therefore, designer's productivity is improved significantly.
Since NISC datapaths are very efficient and can be generated automatically, NISC technology is comparable to high level synthesis (HLS) or C to HDL synthesis approaches. In fact, one of the benefits of this architecture style is its capability to bridge these two technologies (custom processor design and HLS).
Zero instruction set computer
In computer science, zero instruction set computer (ZISC) refers to a computer architecture based solely on pattern matching and absence of (micro-)instructions in the classical sense. These chips are known for being thought of as comparable to the neural networks, being marketed for the number of "synapses" and "neurons". The acronym ZISC alludes to reduced instruction set computer (RISC).
ZISC is a hardware implementation of Kohonen networks (artificial neural networks) allowing massively parallel processing of very simple data (0 or 1). This hardware implementation was invented by Guy Paillet and Pascal Tannhof (IBM), developed in cooperation with the IBM chip factory of Essonnes, in France, and was commercialized by IBM.
The ZISC architecture alleviates the memory bottleneck by blending pattern memory with pattern learning and recognition logic. Their massively parallel computing solves the by allotting each "neuron" its own memory and allowing simultaneous problem-solving the results of which are settled up disputing with each other.
Applications and controversy
According to TechCrunch, software emulations of these types of chips are currently used for image recognition by many large tech companies, such as Facebook and G |
https://en.wikipedia.org/wiki/Foto-Mem | Foto-Mem Inc. was a US company that attempted to introduce very large computer memory systems based on optical storage on microfiche cards. An alternate product line based on the same mechanical systems allowed a single microfiche card to be displayed on multiple workstations, intended for large libraries where a single card might be used by several people at once. Only one such system was ever delivered, a microfiche reader for The New York Times; this system was never successful and the company failed as a result.
FM 390
The company was formed on May 5, 1967 by James Laura, who considered himself primarily a financial consultant, but had some experience in computers. His idea was to use existing microfiche systems to develop a computer memory system with a "multi-billion bit capacity", a concept IBM had recently introduced in a more complex and less-standard fashion as the IBM 1360 Photostore. The 1360 used custom film "chips" packed into custom boxes used with custom hardware to move and file them. In comparison, the Foto-Mem concept would use standard microfiche ISO A5 (105 x 148 mm) cards, using a laser to read and write the cards instead of the Photostore's complex electron-beam writer. Additionally the mechanical systems were developed for other purposes by a 3rd party, Mosler, who sold a sorting system known as the Selectriever. By combining the two technologies, Laura could develop a highly competitive device for costs well below the Photostore.
In January 1968 he hired Albert Eng to run development of the system Laura had sketched out, now known as the FM 390. The 390 consisted of two main parts, the reader/writer on top, and the store and retrieval system under it. Together they formed a single two-part cabinet about the size of a large drum printer. The "Foto-Data Cards" used to store data were standard A5 microfiche, but punched along one edge to allow them to be mechanically sorted. The Cards were packed into "Foto-Data Cell"s, each containing 100 cards (IBM used similar terminology). Each 390 stored up to 250 Cells, for a combined total of "1 to 3 billions bits of information".
Risar
During development of the FM 390 they decided to use the Selectriever system to develop a second product, the Risar, which placed the microfiche cards in front of a TV camera, sending the display to televisions at remote locations. This allowed a Risar customer to place workstations around their buildings, with their employees accessing the data without having to remove the card from the store. Additionally the same signal could be sent to more than one workstation, eliminating contention problems on commonly accessed cards. Card selection, indexing and retrieval was controlled by an associated computer.
Prototypes both machines were completed and demonstrated publicly at various trade shows. However the company was rapidly running out of money, and in September 1969 they started the process of raising a debenture offering to fund continued devel |
https://en.wikipedia.org/wiki/Tub%20file | The tub file was a technique used in the punched card era to speed generation of data files. Multiple copies of frequently used cards were prepunched and stored in trays with index tabs between card sets, arranged so that cards would be easy to find.
This technique was an early form of random access memory.
Example
A wholesaler might have a tub file with cards for frequent customers and for each inventory item. Instead of keypunching a set of cards for each purchase order, a clerk would pull out one customer card and then a card for each item that customer ordered. The resulting deck could then be run through a tabulating machine to produce an invoice.
In this example item cards also provided inventory control, since each card presumably represented one item in stock, so it was simple to check availability and schedule reordering.
References
External links
Photo of workers using a tub file
RAMAC Oral History Project, Computer History Museum, at 26:21
Punched card |
https://en.wikipedia.org/wiki/United%20States%20Senate%20Commerce%20Subcommittee%20on%20Consumer%20Protection%2C%20Product%20Safety%2C%20and%20Data%20Security | The Senate Commerce Subcommittee on Consumer Protection, Product Safety, and Data Security is a subcommittee within the United States Senate Committee on Commerce, Science, and Transportation. It was formerly named the Subcommittee on Manufacturing, Trade, and Consumer Protection, Subcommittee on Consumer Affairs, Insurance, and Automotive Safety and the Subcommittee on Consumer Protection, Product Safety, Insurance and Data Security before getting its current title at the beginning of the 117th United States Congress.
Jurisdiction
The Subcommittee on Consumer Protection, Product Safety, and Data Security is responsible for consumer affairs, consumer protection, and consumer product safety; product liability; property and casualty insurance; manufacturing and workforce development; sports-related matters; and data privacy, security, and protection. The subcommittee also conducts oversight on the Federal Trade Commission (FTC) and Consumer Product Safety Commission (CPSC), as well as manufacturing and trade related matters within the Department of Commerce.
Members, 118th Congress
Historical subcommittee rosters
117th Congress
116th Congress
Notable activities
2021 Facebook whistleblower hearing
Following the 2021 Facebook leak controversy, the subcommittee under then-chairman Richard Blumenthal (D-CT) held a hearing titled "Protecting Kids Online: Testimony from a Facebook Whistleblower". Held on October 5, 2021, the hearing featured testimony from Frances Haugen, a former Facebook product manager who disclosed tens of thousands of internal documents to the Securities and Exchange Commission (SEC) and The Wall Street Journal.
During the hearing, Haugen testified that the social media platform has harmed young users' mental health and facilitated the spread of dangerous misinformation. Haugen's testimony was praised by a bipartisan group of Senators, including Blumenthal and Marsha Blackburn, a Republican from Tennessee.
References
External links
Consumer Protection, Product Safety, and Data Security
Commerce Consumer |
https://en.wikipedia.org/wiki/XMTC | XMTC (for explicit multi-threading C) is a shared-memory parallel programming language. It is an extension of the C programming language which strives to enable easy PRAM-like programming based on the explicit multi-threading paradigm. It is developed as part of the XMT PRAM-On-Chip vision by a research team at the University of Maryland, College Park, led by Dr. Uzi Vishkin.
The philosophy of XMTC and the whole XMT project is that parallel programming is a hard intellectual task and the approach of building a hardware system first and then figuring out how to program them has not had much success. For that reason a robust algorithmic theory and a reasonably easy hardware abstraction should be the specifications that guide how to build a new parallel architecture and programming language. For parallel algorithms the algorithmic theory that has the largest body of literature is called PRAM (parallel random-access machine ). This is not a coincidence, since PRAM is a natural way in which to think algorithmically in parallel. In the early 1990s the PRAM model was deemed unrealistic because the hardware abstraction it was based on could not be implemented (because of low inter-chip bandwidth and high latency). Now that multiple processors can be put on a single chip, these limitations are no longer present. The XMT architecture takes advantage of this excess on-chip real estate to implement a PRAM abstraction.
The XMTC language is a modest extension of C and a work in progress. The basic premise is that the programmer is responsible for exposing all the available parallelism. While this sounds simple and many earlier approaches share this ideal, in practice, if the programmer defines too large a number of parallel tasks and the tasks are short, the program will perform very poorly. The way around that is to combine short parallel tasks into a longer one, which is usually the responsibility of the programmer. In XMTC it is possible for the language to do that automatically, lifting the burden from the programmer.
Software release of XMTC: PRAM-like programming allows experimenting with XMTC programming on standard computers.
Concurrent programming languages
C programming language family |
https://en.wikipedia.org/wiki/Hospital%20Cl%C3%ADnic%20%28Barcelona%20Metro%29 | Hospital Clínic is a station in the Barcelona Metro network, named after the Hospital Clínic i Provincial de Barcelona which lies in its immediate vicinity, in the Eixample district of Barcelona. It serves line 5.
The station, which opened in 1969, is part of the central section of L5. It is located under Carrer Rosselló, between Carrer del Comte d'Urgell and Carrer de Villarroel.
Services
External links
Hospital Clínic at Trenscat.com
Railway stations in Spain opened in 1969
Barcelona Metro line 5 stations |
https://en.wikipedia.org/wiki/Sagrada%20Fam%C3%ADlia%20%28Barcelona%20Metro%29 | Sagrada Família is a metro station in Barcelona Metro network. It is named after the famous, and adjacent, Basílica i Temple Expiatori de la Sagrada Família, a church first designed by architect Antoni Gaudí and still under construction. It is served by TMB-operated Barcelona Metro lines L2 and L5.
The station takes the form of two separate sections linked by a corridor within the paid area of the station complex. Both sections also have their own street entrances:
The L2 section is located under Marina street, between Mallorca and Provença streets and has two accesses, one at each side of the station. The upper level has two halls. The trains run on the lower level that has two platforms, one bigger than the other one.
The L5 section is located under Provença street, between Sardenya and Marina streets. The upper level has two halls and is equipped with a TMB Information Center and commercial areas. The trains run on the lower level.
The L5 section of the station was the first to open, with the opening, in 1970, of the line between Diagonal and Sagrera. The L2 section followed in 1995, with the opening of the line between Sant Antoni and this station.
Gallery
External links
Information about L2 metro station at TMB
Information about L5 metro station at TMB
Transports Metropolitans de Barcelona
Information about L2 metro station at Trenscat.com
Information about L5 metro station at Trenscat.com
Transport in Eixample
Railway stations in Spain opened in 1970
Barcelona Metro line 2 stations
Barcelona Metro line 5 stations |
https://en.wikipedia.org/wiki/Lesseps%20station | Lesseps is a station in the Barcelona Metro network, named after its location, Plaça de Lesseps, in the Gràcia district of Barcelona, itself named after Ferdinand de Lesseps, who was appointed French consul in 1842. The station is served by line L3.
The station opened in 1924 as the northern terminus of the first metro line of the city, which ran south to Catalunya station and was operated by the Gran Metropolitano de Barcelona rail company. To the north of the station were terminal sidings, which in turn gave access to the Lesseps workshops via a vehicle elevator. The line was extended north to Montbau station in 1985, diverging to the right before the terminal sidings, which remain in existence although little used. The Lesseps workshops closed in 1988.
The station is located under Carrer Gran de Gràcia, between Carrer de Maurici Serrahima and Plaça de Lesseps, and can be accessed from the square, in the corner where Avinguda del Príncep d'Astúries ends. It has two tracks, with twin side platforms that are long.
Future plans are for Lesseps to be served by the joint section of lines L9 and L10. Platforms for this are currently under construction, and will provide interchange with line L3.
References
External links
Lesseps at Trenscat.com
Lesseps at Wiki del Transport Català, with photos and history of the station.
Barcelona Metro line 3 stations
Railway stations in Spain opened in 1924
Transport in Gràcia |
https://en.wikipedia.org/wiki/Protestantism%20in%20Eritrea | The World Religion Database noted that in 2020, 47% of the population of Eritrea were Christian; almost 4% are Protestant (mainly P'ent'ay Evangelicalists).
The Evangelical Lutheran Church of Eritrea is one of the four officially recognized religious institutions in Eritrea.
History
Protestantism has had a presence in Eritrea for over 150 years. The Swedish Evangelical Mission (SEM) first sent missionaries to preach to the Kunama people in 1866. Between the late-19th and late-20th centuries, the SEM undertook the task of translating the Bible into various Eritrean languages.
Jehovah's Witnesses have been a target of government persecution since Eritrea's independence, as they opposed the referendum for independence and have refused to participate in compulsory military service. They have been stripped of their rights and subjected to imprisonment; the United States Department of State reported in 2021 that 24 Jehovah's Witnesses are currently detained.
In 2002, the Eritrean government closed down places of worship of all unrecognized religious groups, including Jehovah's Witnesses and Protestant churches separate from the Evangelical Lutheran Church of Eritrea. The USDoS reported in 2021 that 345 church leaders and between 800 and 1,000 laypeople are currently detained.
Denominations
Amnesty International reports that the following evangelical denominations are present in Eritrea:
Seventh-day Adventists
Mullu Wongel (Full Gospel) Church
Kale Hiwot (Word of Life) Church
Meseret Kristos Church
Rema Church
Hallelujah Church
Faith Mission
Faith Church of Christ
Philadelphia Church
Presbyterian Evangelical Church
Trinity Fellowship Church
Dubre Bethel Church
Church of the Living God
New Covenant Church
Freedom of religion
In 2021, the United States Department of State (USDoS) named it a Country of Particular Concern due to its violation of religious liberty, noting that other denominations (particularly Jehovah's Witnesses) face persecution from the Eritrean government. In the same year, the Barnabas Fund reported that Christians (regardless of denomination) in Eritrea had been subjected to torture, including being held in shipping containers.
In 2023, the country was scored 1 out of 4 for religious freedom. This was seen as an improvement, as several religious prisoners had been released in the previous months. In the same year, the country was rated as the 4th worst place in the world to be a Christian.
See also
Religion in Eritrea
Christianity in Eritrea
Eritrean Catholic Church
References
Christianity in Eritrea
Eritrea |
https://en.wikipedia.org/wiki/TV3%20Plus | TV3 Plus is a Baltic pay television channel owned by the TV3 Group broadcasting to the Russian-speaking community in the Baltic states. It was launched on 1 November 2003 in Latvia.
Its programming consists of simulcasts of Russian entertainment shows, and benefits from MTG's ownership in STS Media and Peretz.
TV3 Plus is the second most popular Russian channel in Latvia with a viewing share of 5.2% in May 2007, ahead of REN TV Baltic, but after the dominating First Baltic channel.
TV3 Plus, as with other channels of the All Media Baltics group in the Baltic states, switched to HD broadcasting on 26 July 2018.
References
External links
Television channels in Estonia
Television channels in Latvia
Television channels in Lithuania
TV3+ Latvia
Television channels and stations established in 2003 |
https://en.wikipedia.org/wiki/Kings%20of%20the%20Beach | Kings of the Beach is a beach volleyball computer game released by Electronic Arts in 1988 for the Commodore 64 and MS-DOS. A version for the Nintendo Entertainment System was produced by Konami (under the Ultra Games label) in 1990.
Gameplay
The player can play as Sinjin Smith and Randy Stoklos. The game features three modes of play: practice, match play and tournament. In the latter, you progress through five beaches (San Diego, Chicago, Waikiki, Rio de Janeiro, and Australia) filled with increasingly challenging opponents as you attempt to win it all. While Smith and Stoklos are joined by Ron Von Hagen, Tim Hovland and Mike Dodd as the only 'real' volleyball players featured in the game, EA spiced up the competition with some notorious characters from other games, including Hard Hat Mack and Lester from Skate or Die and Ski or Die.
The gameplay controls for the console version are fairly simple, with the directional pad and two buttons doing all the work. In the PC version, players control three actions: bump, set, and block/spike. Diving for the ball occurs automatically. The only 'advanced' moves in the game are the ability to dink or perform a one-handed Kong block (Stoklos's trademark).
Another endearing feature of the game is the ability to 'argue' calls with the referee, which occasionally allows players to get a point overturned. However, if players argue too much, the referee may penalize them with a red card and deduct a point.
References
External links
GameFAQs provides a fairly complete overview of the game
1988 video games
Beach volleyball video games
Commodore 64 games
DOS games
Electronic Arts games
Nintendo Entertainment System games
North America-exclusive video games
Sports video games set in the United States
Video games scored by Rob Hubbard
Video games developed in the United States
Tiger Electronics handheld games
Video games set in San Diego
Video games set in Chicago
Video games set in Hawaii
Video games set in Australia
Video games set in Brazil |
https://en.wikipedia.org/wiki/Weakest%20Link%20%28Australian%20game%20show%29 | The Weakest Link is an Australian game show based on the UK format, which aired from 5 February 2001 until 22 April 2002 and was originally broadcast on the Seven Network. Presented by Cornelia Frances, the show featured nine contestants competing for a potential prize of $100,000. Airing twice weekly in primetime, on Mondays and Thursdays (in Melbourne, Adelaide and Perth, later extended to nationwide following the conclusion of the 2001 AFL season) or Fridays (in Sydney and Brisbane), it received modest ratings until its cancellation in April 2002. The show was produced in the Seven Network's South Melbourne headquarters.
A revival of the show with actress Magda Szubanski as host was announced for the Nine Network, airing from 25 May 2021 to 1 February 2022. TVNZ 1 aired the revival in New Zealand.
Format
2001–02
The format of the Seven Network iteration was identical to that of the British version apart from some slight time differences on rounds. The first round lasted for 2 minutes and 30 seconds as opposed to 3 minutes on the British version, and each round thereafter was reduced by 10 seconds (meaning a time limit of 1 minute and 20 seconds for the triple stakes round). As with the British version, any money banked in round eight was trebled (e.g. if the contestants bank $1,000 then $3,000 is added to the final total). The money tree was as follows:
The voice-over was Marcus Irvine, while the adjudicator and question researcher was Alan Mason, the contestant revealed as The Mole in 2000.
The money tree is the same figures as in the British version, but ten times larger, and in Australian dollars rather than pound sterling.
2021–22
The format of the Nine Network iteration saw some major changes to the format; similar to the 2020 US revival, eight contestants (as opposed to nine on the original Seven Network iteration) begin the game, and play begins with the player in the first position (as opposed to the player whose name is first alphabetically). The top prize increases in each round, making for a potential top prize of . Additionally, the contestants are interrogated about their roundly performances before the revealing of votes, as opposed to afterwards. As is convention, in the event of a tie, the strongest link casts the deciding vote. After round six, the game moves straight to the final round; if the strongest link in the preceding round had been voted off, the second-strongest link decides who receives the first question.
Additionally, several minor additions to the game were introduced:
A buzzer was added to each contestant's podium. It is used both to bank money (contestants not only have to say the word "bank" before being asked the question but must also press the buzzer), as well as to reveal the contestant's vote at the end of each round.
A touch screen was also added to each contestant's podium. It is used to present visual information for visual questions – where the host asks the contestants to identify items tha |
https://en.wikipedia.org/wiki/Wayne%20Cotter | Wayne Cotter is an American stand-up comedian.
Cotter attended the University of Pennsylvania where he studied computer engineering. After college, he became a comedian and made appearances on The Tonight Show, Late Show with David Letterman, and Politically Incorrect. From 1991 to 1994, he hosted Comic Strip Live, a stand-up comedy series on the Fox television network.
Cotter was one of the comedians featured in The Aristocrats. He also had a small part in the film Spy Hard. He now performs at corporate events and has appeared at hundreds of events for companies like Intel, IBM, BMW and Deloitte.
References
External links
American stand-up comedians
Living people
University of Pennsylvania alumni
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Columbia%20Institute%20for%20Tele-Information | The Columbia Institute for Tele-Information (CITI) is one of several research centers for Columbia Business School, focusing on strategy, management, and policy issues in telecommunications, computing, and electronic mass media. It aims to address the large and dynamic telecommunications and media industry that has expanded horizontally and vertically drive by technology, entrepreneurship and policy.
History
Founded in 1983 at Columbia University, the institute is the first research center for communications economics, management, and policy established at a US management school. Its location in New York City provides a unique foundation for these activities. Research collaboration among academic, corporate, and public sectors is vital in analyzing the complex problems associated with managing communications enterprises, systems, and policy in environments of rapidly changing technology and regulation.
Funding
In 2000, the Alfred P. Sloan Foundation selected the institute as its fifteenth academic center for industry research and the only one for the field of telecommunications. This enables CITI to substantially expand its program of research on the telecommunications sector. CITI conducts research on all forms of networks, IT, and electronic media industries. The Sloan Foundation's main objective is for each of its centers to build an academic base of observations and knowledge in order to make practical contributions to the industries studied and accelerate U.S. economic development and global competitiveness. It aims to foster academic-industry collaboration and to develop scholarly expertise by educating the next generation of doctoral students.
Background
The Columbia Institute for Tele-Information is directed by Professor Eli Noam. The Institute is part of Columbia University's traditionally strong role in communications research, going back to Paul Lazarsfeld (audience research methodologies), Edwin Howard Armstrong (FM radio), Michael I. Pupin (long distance transmission), Harvey J. Levin (economic regulation of broadcasting), and Charles Townes and Arthur Schawlow (laser). The Columbia Institute for Tele-Information draws upon the excellent resources of several university departments beyond the Columbia Business School. The School of Engineering and Applied Science is a technology center focusing on the integration of telecommunications networks. The School of Journalism studies the impact and applications of new technology for Journalism. The Institute for Learning Technologies at Teacher's College studies and develops new technology applications. The Law School is strong in issues of intellectual property. The School of the Arts has major involvement in content production such as film. And the School of International and Public Affairs deals with global policy issues.
The Institute's research activities are determined by the University's academic principles, and the advice of an Advisory Board drawn from industry, universit |
https://en.wikipedia.org/wiki/PDA%20Optional%20Packages%20for%20the%20J2ME%20Platform | PDA Optional Packages for the J2ME Platform JSR 75 is a specification that standardizes access in the Java on embedded devices such as mobile phones and PDAs to data that resides natively on mobile devices. JSR 75 is part of the Java ME framework and sits on top of CLDC, a set of lower level programming interfaces. It has 2 main components. Not all devices that claim to implement JSR 75 will implement both components.
See also
MIDlet
External links
The JSR 75 Specification
Suns overview of the File Connection Optional Package
Suns Overview of the PIM Optional Package
Java device platform
Java specification requests |
https://en.wikipedia.org/wiki/When%20Good%20Ghouls%20Go%20Bad | When Good Ghouls Go Bad is a 2001 Fox Family television film directed by Patrick Read Johnson, commissioned for the network's 13 Nights of Halloween program block.
Based upon a concept by R. L. Stine, the film's screenplay was written by Johnson and John Lau. Stine then wrote a full novelization of the film as a tie-in.
The story is set in the fictional town of Walker Falls, Minnesota, during the Halloween season. It stars Christopher Lloyd.
Plot
Danny Walker (Joe Pichler), and his father, James (Tom Amandes), who has gotten a divorce from his wife, have just moved to the town of Walker Falls from Chicago. James plans to fulfill his dream of re-opening the family chocolate factory. Both father and son are staying with James' father, known by all as "Uncle Fred" (Christopher Lloyd). Uncle Fred is considered crazy and is a bit childish, but his grandson loves him very much. Danny dislikes his new life in Walker Falls, and it seems nobody likes him, especially the football coach Mike Kankel (Joe Clements) and his son, Ryan (Craig Marriott), the school's biggest bully. The only people who seem to be nice to Danny are Dayna Stenson (Brittany Byrnes), a schoolgirl he has a crush on, and Taylor Morgan (Imelda Corcoran), the school nurse, James' childhood friend, and Dayna's mother.
Danny is surprised by how few decorations are up with Halloween only a week away. The people of Walker Falls do not seem to be making any effort at all to celebrate the holiday. Sheriff Ed Frady (Alan Flower) even takes down the decorations that Danny puts up. When walking home from school, Ryan and his pal, Leo (Daniel Karr) push him into the cemetery and tell him that Walker Falls does not celebrate Halloween because of the legend of a curse.
20 years prior, Curtis Danko (Brendan McCarthy), an artistic boy, was ostracized by "normal" people. When a competition was held for all the eighth graders to design a sculpture of their personal hero, Curtis kept his project covered during the day, then came to school at night to work by the light of captured fireflies. On Halloween night, Mike Kankel and his friends were walking by the school when they saw Curtis from the window, at work on his sculpture. When Kankel returned the next day, he noticed the kiln had been on all night and ran out of fuel. He opened the door and found Curtis's charred skeleton and a message in the ashes, allegedly saying that if the town ever celebrated another Halloween, he would come back and destroy them all. Kankel was struck blind for three days after seeing Curtis' finished statue. Everyone in the town believed the threat and, since then, Halloween has never been celebrated.
Danny thinks it is a silly story and runs home. James is rarely around, so Uncle Fred serves as a stand-in father for Danny. That night, James is planning to announce his "Halloween Spooktacular" idea to raise funds to re-open Walker Chocolates at the town meeting. Uncle Fred and Danny try to tell him that the townspeopl |
https://en.wikipedia.org/wiki/Bottleneck%20%28software%29 | In software engineering, a bottleneck occurs when the capacity of an application or a computer system is limited by a single component, like the neck of a bottle slowing down the overall water flow. The bottleneck has the lowest throughput of all parts of the transaction path.
System designers try to avoid bottlenecks through direct effort towards locating and tuning existing bottlenecks in a software application. Some examples of engineering bottlenecks that appear include the following: a processor, a communication link, and disk IO. A system or application will hit a bottleneck if the work arrives at a comparatively faster pace relative to other processing components. According to the theory of constraints, improving on the occurrences of hot-spot point of the bottleneck constraint improves the overall processing speed of the software. A thought-provoking stipulation of the theory reveals that improving the efficiency of a particular process stage rather than the constraint can generate even more delay and decrease overall processing capabilities of a software.
The process of tracking down bottlenecks (also referred as "hot spots" - sections of the code that execute most frequently - i.e. have the highest execution count) is called performance analysis. Reduction is achieved with the utilization of specialized tools such as performance analyzers or profilers, the objective being to make particular sections of code perform as effectively as possible to improve overall algorithmic efficiency.
See also
Performance engineering
Profiling (computer programming)
Program optimization
References
Software optimization
Software performance management |
https://en.wikipedia.org/wiki/Fishing%20Australia | Fishing Australia is an Australian fishing television program, produced by WIN Television. The program premiered in 2001 and is broadcast on weekends on WIN Television and Network Ten formerly on the Nine Network, Imparja and NBN Television.
Fishing Australia travels around Australia, fishing for different species of fish in unique locations. The show also features special guests ranging from iconic Australians, television and media personalities through to local fishing guides and identities. It is hosted by professional fishing guide, writer, photographer and television presenter, Rob Paxevanos.
See also
WIN Television
References
External links
Official Website
WIN Television original programming
Nine Network original programming
Network 10 original programming
Australian sports television series
Fishing television series
2001 Australian television series debuts
Television shows set in Australia
2010s Australian television series
Recreational fishing in Australia
English-language television shows |
https://en.wikipedia.org/wiki/Rob%20Blokzijl | Robert "Rob" Blokzijl (21 October 1943 – 1 December 2015) was a Dutch physicist and computer scientist at the National Institute for Subatomic Physics (NIKHEF), and an early internet pioneer. He was founding member and chairman of RIPE, the Réseaux IP Européens (French translation of: Europeans IP Networks), the European Internet Registrar organisation.
Life and work
Born in Amsterdam, Blokzijl graduated from the University of Amsterdam in 1970, and received a doctorate in experimental physics from the same university in 1977.
Blokzijl had been active in building networks for the particle physics community in Europe. He was founding member and chairman of NIKHEF, the National Institute for Nuclear and High energy physics in the Netherlands. At the Réseaux IP Européens (RIPE), the European open forum for IP networking, he was spokesperson at its foundation in 1989 and later chaired this forum. He was also instrumental in the creation of the Réseaux IP Européens Network Coordination Centre (RIPE NCC) in 1992 as the first regional Internet registry (RIR) in the world. In 1999 he also was selected for the ICANN Board by the Address Supporting Organization, where he served until December 2002. In 2013 Blokzijl announced his resignation as chairman of RIPE, as per RIPE 68, after being in this position for 25 years. He appointed Hans Petter Holen as his successor.
In 2010 Blokzijl was awarded Officer in the Order of Orange-Nassau. He received this Royal Honour from Lodewijk Asscher, the Acting Mayor of Amsterdam. At the 93rd IETF meeting in 2015, Blokzijl was awarded the ISOC Jonathan B. Postel Service Award.
He died on 1 December 2015, aged 72.
On 1 December 2016, the RIPE NCC established the Rob Blokzijl Foundation to honour Rob's legacy by recognising and rewarding individuals who make substantial contributions to the development of the internet in the RIPE NCC service region.
References
External links
ICANNWiki entry on Robert Blokzijl
VIDEO of Postel Award announcement 23 July 2015
1943 births
2015 deaths
20th-century Dutch physicists
Dutch computer scientists
Particle physicists
University of Amsterdam alumni
Officers of the Order of Orange-Nassau
Scientists from Amsterdam
21st-century Dutch physicists |
https://en.wikipedia.org/wiki/Interpenetration | Interpenetration may refer to:
Interpenetration (Buddhism), a concept of Buddhist philosophy
Interpenetration (Christianity), a term in Christian theology
Interpenetration, in computer 3D modelling collision detection
See also
Impenetrability, that quality of matter whereby two bodies cannot occupy the same space at the same time
Penetration (disambiguation) |
https://en.wikipedia.org/wiki/Echo%3A%20Secrets%20of%20the%20Lost%20Cavern | Echo: Secrets of the Lost Cavern (known in Europe as Secret of the Lost Cavern) is a computer adventure game released in July 2005. It was developed by Kheops Studio and published by The Adventure Company. It is very similar to previous Kheops Studio games; the interface and gameplay are almost identical to Return to Mysterious Island. The player takes the role of Arok, a 15-year-old European Homo sapiens from the Paleolithic period.
Gameplay
Plot
Secret of the Lost Cavern is set in the Paleolithic period around 15,000 B.C. The game follows Arok, a young hunter who discovers a cavern marked with a strange symbol. It reminds him of a charismatic traveler, Klem, who ventured through the lands of his clan a few years before. Klem is a painter and sorcerer with the gift of speaking with the spirits of the world through the paintings he creates on cave walls. Arok spent many days with this shaman artist, fascinated by his creations and his stories. After noticing the painter's talent in the cavern, Arok decides not to return to his clan, but rather follow the path of his mentor.
Development
Reception
According to review aggregation site Metacritic, critical reception of Echo was "mixed or average".
Mark Smith of Game Chronicles thought the game offered a breath of fresh air in a category of boring and badly designed adventure games. Adventure-Treff reviewer Hans Frank wrote that the game offered an exciting and interesting journey into the past. Bodo Naser of 4Players noted that generic puzzles had been included to artificially lengthen the game's play time. Slydos of Adventure-Archiv thought the game followed in the tradition of Kheops Studio and Cryo Interactive. Jeuxvideo reviewer Superpanda positively compared the game to Myst, which he thought was too obscure to allow players to easily progress.
Charles Herold of The New York Times called Echo "painfully sincere" and found that its "story is a perfunctory vehicle for puzzles and a little anthropological teaching."
References
External links
Official website (archived)
Echo: Secrets of the Lost Cavern at The Adventure Company (archived)
Secret of the Lost Cavern (Mac) at Coladia Games (archived)
Secret of the Lost Cavern (iOS) at Coladia Games (archived)
Echo: Secrets of the Lost Cavern at MobyGames
2005 video games
Adventure games
First-person adventure games
iOS games
Kheops Studio games
MacOS games
Prehistoric people in popular culture
Single-player video games
The Adventure Company games
Video games developed in France
Video games set in the Stone Age
Windows games |
https://en.wikipedia.org/wiki/Li%20Huatian | Professor Li Huatian (1922–2007) was one of the first few computer scientists in China and was well known for his early contributions to the areas of computer science and computer networks.
Life and work
He was born on Jan 29, 1922 in Songjiang, Jiangsu (now Songjiang, Shanghai). He graduated from the National Southwestern Associated University with a degree in electrical engineering in 1943 and from Harvard University with a master's degree in 1948.
He returned to China in 1949 to start his research and teaching career as a university professor. He taught at Dalian University of Technology and Northeastern University. He served as the department chair of the departments of Automation and Computer Science and the university vice president at Northeastern University.
He also served as a vice president for IFAC, the International Federation of Automatic Control. He resigned administration positions in 1984 to return to full-time research and teaching. Meanwhile, he founded the first PhD program in computer science in China.
Till his final retirement in 1995, he had published numerous journal papers in areas of automatic control, computer theory, computer networks, and multimedia systems and brought up a lot of younger computer scientists in China. He also co-founded the Neusoft Group in early 1990s with his PhD student Liu Jiren. Professor Li died on Jan 24, 2007 in Shenzhen, China.
Chinese computer scientists
Theoretical computer scientists
Computer systems researchers
Harvard University alumni
Tsinghua University alumni
1922 births
2007 deaths
Educators from Shanghai
Academic staff of the Northeastern University (China)
Academic staff of Dalian University of Technology
Scientists from Shanghai
National Southwestern Associated University alumni |
https://en.wikipedia.org/wiki/Earth%20mover%27s%20distance | In computer science, the earth mover's distance (EMD) is a distance-like measure of dissimilarity between two frequency distributions, densities, or measures over a region D.
For probability distributions and normalized histograms, it reduces to the Wasserstein metric .
Informally, if the distributions are interpreted as two different ways of piling up earth (dirt) over the region D, the EMD captures the minimum cost of building the smaller pile using dirt taken from the larger, where cost is defined as the amount of dirt moved multiplied by the ground distance over which it is moved.
Theory
Assume that we have a set of points in (dimension ). Instead of assigning one distribution to the set of points, we can cluster them and represent the point set in terms of the clusters. Thus, each cluster is a single point in and the weight of the cluster is decided by the fraction of the distribution present in that cluster. This representation of a distribution by a set of clusters is called the signature. Two signatures can have different sizes, for example, a bimodal distribution has shorter signature (2 clusters) than complex ones. One cluster representation (mean or mode in ) can be thought of as a single feature in a signature. The distance between each of the features is called as ground distance.
The Earth Mover's Distance can be formulated and solved as a transportation problem. Suppose that several suppliers, each with a given amount of goods, are required to supply several consumers, each with a given limited capacity. For each supplier-consumer pair, the cost of transporting a single unit of goods is given. The transportation problem is then to find a least-expensive flow of goods from the suppliers to the consumers that satisfies the consumers' demand. Similarly, here the problem is transforming one signature() to another() with minimum work done.
Assume that signature has clusters with , where is the cluster representative and is the weight of the cluster. Similarly another signature has clusters. Let be the ground distance between clusters and .
We want to find a flow , with the flow between and , that minimizes the overall cost.
subject to the constraints:
The optimal flow is found by solving this linear optimization problem. The earth mover's distance is defined as the work normalized by the total flow:
On probability distributions
Suppose and represent probability distributions, i.e. they both have total weight 1. In this case, the flow can be interpreted as a joint probability distribution, the total flow is also 1, and the EMD equals the 1-Wasserstein distance:
where is the set of all joint distributions whose marginals are and .
By Kantorovich-Rubinstein duality, this can also be expressed as:
where the supremum is taken over all 1-Lipschitz continuous functions, i.e. .
General case
Let be the total weight of , and be the total weight of . We have:
where is the set of all measures whose projections are |
https://en.wikipedia.org/wiki/High%20Speed%202 | High Speed 2 (HS2) is a planned high-speed railway line and network of passenger train services in Great Britain. The new railway line, which is currently under construction in England, is to run between the West Midlands and London, with a spur to Birmingham. A network of train services will use the new line and existing conventional track to reach their destinations in the Midlands, North West England, and Scotland. HS2 is to be Britain's second purpose-built high-speed line after High Speed 1, which connects London to the Channel Tunnel. The majority of the project is planned to be completed between 2029 and 2033.
The new track will run between London Euston and a junction with the West Coast Main Line at Handsacre near Lichfield in southern Staffordshire. There will be new stations at Old Oak Common, in northwest London, Birmingham Interchange near Solihull, and Birmingham city centre. The trains will run at a maximum speed of 360 km/h (225 mph) operating on both HS2 track and existing conventional track.
The length of the new railway line has been reduced substantially since announcement in 2013. The line was originally planned to split into eastern and western branches north of Birmingham Interchange. The eastern branch would have connected to the Midland Main Line, East Coast Main Line, with a terminus in Leeds. The western branch would have had a second connection to the West Coast Main Line south of Wigan and a terminus in Manchester. Between November 2021 and October 2023 the project was progressively cut until only the London to Handsacre and Birmingham section remained.
The project has both supporters and opponents. Supporters of HS2 believe that the additional capacity and reliability provided will accommodate passenger numbers rising to pre-COVID-19 levels while driving a further modal shift to rail. Opponents believe that the project is neither environmentally nor financially sustainable.
History
In 2003, high-speed rail arrived in the United Kingdom with the opening of the first part of High Speed 1 (HS1), then known as the Channel Tunnel Rail Link between London and the Channel Tunnel. In 2009, the Department for Transport (DfT) under the Labour government proposed to assess the case for a second high-speed line, which was to be developed by a new company, High Speed Two Limited (HS2 Ltd).
In December 2010, following a review by the Conservative–Liberal Democrat coalition, a route was proposed, subject to public consultation, based on a Y-shaped route from London to Birmingham with branches to Leeds and Manchester, as originally put forward by the previous Labour government, with alterations designed to minimise the visual, noise, and other environmental impacts of the line.
In January 2012, the Secretary of State for Transport announced that HS2 would go ahead in two phases and the legislative process would be achieved through two hybrid bills. The High Speed Rail (London - West Midlands) Act 2017, authorising the co |
https://en.wikipedia.org/wiki/DirectLOGIC | DirectLOGIC is a range of programmable logic controllers produced by Koyo.
They are programmed using DirectSOFT via:
RS-232
USB port with USB-to-Serial adapter
10BASE-T or 10/100 Ethernet network card
Models
DL05 Micro PLC
DL06 Micro Modular PLC
DL105 Fixed I/O (brick) PLC
DL205 Modular PLC
DL305 Legacy PLC, compatible with the General Electric Series One, the Texas Instruments Series 305, and the Siemens SIMATIC TI305.
DL405 Specialty PLC
See also
SCADA
External links
Koyo PLCs
Industrial automation
Japanese brands |
https://en.wikipedia.org/wiki/Tubeway | Tubeway (also known as Tubeway ][) is game for the Apple II programmed by David Arthur Van Brink and published by Datamost in 1983. It is similar to the 1981 Atari arcade game Tempest.
Gameplay
Tubeway is a tube shooter in which the player uses paddles to move a small white crosshair around the top of a "tube" or wall while firing down at the computer-controlled opponents attempting to scale their way up it. The opponents, known as the Tubeway Army (one of several references to Gary Numan in the game), consist of triangular green homers (100 points) and triangular blue seekers (200 points), both of which can return fire. A special opponent called the germ occasionally emerges from a white box in the lower left corner of the screen. The goal of the game is to clear as many levels as possible before running out of lives. An extra life is granted every 20,000 points.
Reception
In an 8 out of 10 review, the January 1983 Arcade Express newsletter mentioned the similarity to Tempest, but called it "just different enough to stand as an independent program within the same gaming genre."
In 1984, Softline readers named Tubeway the sixth-worst Apple program of 1983.
See also
Axis Assassin, another Tempest-inspired game for the Apple II
References
Apple II games
Apple II-only games
1982 video games
Datamost games
Fixed shooters
Video game clones
Video games developed in the United States
Single-player video games |
https://en.wikipedia.org/wiki/WRVO | WRVO (89.9 FM) is a non-profit public radio network in Oswego, New York licensed to the State University of New York at Oswego, operating from studios in the Penfield Library on the SUNY Oswego campus. Its multi-station network serves more than 20 counties in central and northern New York from flagship WRVO in Oswego, repeaters WRVD in Syracuse, WRVH in Clayton, WRVN in Utica, and WRVJ in Watertown. Low-power translators serve Geneva, Hamilton, Ithaca, Norwich and Watertown.
Programming
WRVO programming includes regional news and public affairs and programming from NPR, American Public Media, Public Radio Exchange, the BBC World Service and other networks. WRVO currently broadcasts Morning Edition, 1A, Fresh Air, Q, Here & Now, All Things Considered, As It Happens, The Capitol Pressroom weeknights. and their old time radio program, Tuned to Yesterday every night. On the weekend, WRVO broadcasts Travel with Rick Steves, Weekend Edition, Hidden Brain, Wait Wait... Don't Tell Me!, Says You!, This American Life, On The Media, All Things Considered, The Moth Radio Hour, New Yorker Radio Hour, TED Radio Hour, Campbell Conversations, HealthLink On Air, and more.
From 10:00 pm to midnight every day, WRVO broadcasts Tuned to Yesterday, which consists of radio dramas from the 1930s onward. BirdNote, a two-minute show about the lives of birds, airs on weekdays at 9:58 a.m. StarDate, a two-minute segment with a focus of astronomy and the night sky is heard weekdays at 6:32 p.m.
Affiliates
Translators
Programming may also be heard on WRCU 90.1 FM in Hamilton and WSUC-FM 90.5 FM in Cortland during drive time, off-hours, and during school breaks.
These stations are collectively known as the WRVO Stations.
References
External links
RVO
NPR member stations
RVO
NPR member networks
Radio stations established in 1969
1969 establishments in New York (state)
State University of New York at Oswego |
https://en.wikipedia.org/wiki/WRVJ | WRVJ (91.7 FM) is a member-supported public radio station in Watertown, New York. Owned by the State University of New York at Oswego, the station simulcasts the programming of WRVO in Oswego, New York.
External links
www.wrvo.fm
RVJ
NPR member stations
State University of New York at Oswego
Radio stations established in 1990
1990 establishments in New York (state) |
https://en.wikipedia.org/wiki/Lingsberg%20Runestones | The Lingsberg Runestones are two 11th-century runestones, listed as U 240 and U 241 in the Rundata catalog, and one fragment, U 242, that are engraved in Old Norse using the younger futhark. They are at the Lingsberg farm about east of Vallentuna (halfway to Kusta), which is about north of the center of Stockholm, Stockholm County, Sweden, which was part of the former province of Uppland.
The two intact runestones were raised by members of the same family, and on U 241 they engraved for posterity that a grandfather had taken two Danegelds in England. Because the receipt of the Danegeld (tax) indicates likely service with the Scandinavian troops in the Thingmen from 1018 to 1066, the runestones are dated to the second quarter of the 11th century.
U 240
The U 240 runestone is known locally as the Lingsbergsstenen 1 and was raised at the end of a causeway facing U 241. The causeway is only seen as traces in a field, and U 240 is the only runestone present. The area was much more marshy in the past and difficult to traverse until the water level in a local lake, Angarn, in Angarnsjöängen Nature Reserve was lowered in the 19th century. The inscription consists of runic text on two serpents or lindworms that bracket a Christian cross and some beasts. The final portion of the text that translates as "and Holmfríðr in memory of her husbandman" is carved on the outside of the serpent to the right. U 240 is classified as being carved in runestone style Pr3, which is also known as Urnes style, and is considered to be a good example of an inscription in style Pr3. This runestone style is characterized by slim and stylized animals that are interwoven into tight patterns. The animal heads are typically seen in profile with slender almond-shaped eyes and upwardly curled appendages on the noses and the necks. The runic text on U 240 was intended to be read together with that on U 241 to form a unified message. Based on stylistic analysis, the inscription has been attributed to the runemaster Åsmund, who was active in the first part of the 11th century.
Latin transliteration:
tan auk hus(k)arl + auk suain + auk hulmfriþr × þaun (m)(i)(þ)kin litu rita stin þino × aftiʀ halftan + fa(þ)ur þaiʀa tans ' auk hum(f)riþr at buanta sin
Old Norse transcription:
Dan ok Huskarl ok Svæinn ok Holmfriðr, þaun møðgin letu retta stæin þenna æftiʀ Halfdan, faður þæiʀa Dans, ok Holmfriðr at boanda sinn.
English translation:
Danr and Húskarl and Sveinn and Holmfríðr, the mother and (her) sons, had this stone erected in memory of Halfdan, the father of Danr and his brothers; and Holmfríðr in memory of her husbandman.
U 241
The U 241 runestone, known locally as the Lingsbergsstenen 2, was originally at the end of a causeway facing U 240. It was discovered in 1909 during the plowing of a field. It has been moved and is in the courtyard of the main building of Lingsberg. The inscription consists of runic text carved on an intertwined serpent that is under a cross. Simil |
https://en.wikipedia.org/wiki/Rod%20calculus | Rod calculus or rod calculation was the mechanical method of algorithmic computation with counting rods in China from the Warring States to Ming dynasty before the counting rods were increasingly replaced by the more convenient and faster abacus. Rod calculus played a key role in the development of Chinese mathematics to its height in Song Dynasty and Yuan Dynasty, culminating in the invention
of polynomial equations of up to four unknowns in the work of Zhu Shijie.
Hardware
The basic equipment for carrying out rod calculus is a bundle of counting rods and a counting board. The counting rods are usually made of bamboo sticks, about 12 cm- 15 cm in length, 2mm to 4 mm diameter, sometimes from animal bones, or ivory and jade (for well-heeled merchants). A counting board could be a table top, a wooden board with or without grid, on the floor or on sand.
In 1971 Chinese archaeologists unearthed a bundle of well-preserved animal bone counting rods stored in a silk pouch from a tomb in Qian Yang county in Shanxi province, dated back to the first half of Han dynasty (206 BC – 8AD). In 1975 a bundle of bamboo counting rods was unearthed.
The use of counting rods for rod calculus flourished in the Warring States, although no archaeological artefacts were found earlier than the Western Han Dynasty (the first half of Han dynasty; however, archaeologists did unearth software artefacts of rod calculus dated back to the Warring States); since the rod calculus software must have gone along with rod calculus hardware, there is no doubt that rod calculus was already flourishing during the Warring States more than 2,200 years ago.
Software
The key software required for rod calculus was a simple 45 phrase positional decimal multiplication table used in China since antiquity, called the nine-nine table, which were learned by heart by pupils, merchants, government officials and mathematicians alike.
Rod numerals
Displaying numbers
Rod numerals is the only numeric system that uses different placement combination of a single symbol to convey any number or fraction in the Decimal System. For numbers in the units place, every vertical rod represent 1. Two vertical rods represent 2, and so on, until 5 vertical rods, which represents 5. For number between 6 and 9, a biquinary system is used, in which a horizontal bar on top of the vertical bars represent 5. The first row are the number 1 to 9 in rod numerals, and the second row is the same numbers in horizontal form.
For numbers larger than 9, a decimal system is used. Rods placed one place to the left of the units place represent 10 times that number. For the hundreds place, another set of rods is placed to the left which represents 100 times of that number, and so on. As shown in the adjacent image, the number 231 is represented in rod numerals in the top row, with one rod in the units place representing 1, three rods in the tens place representing 30, and two rods in the hundreds place representing 200, with a s |
https://en.wikipedia.org/wiki/Apple%20Communication%20Slot | The Apple Communication Slot, or Comm Slot, is an internal expansion data interface (slot) found in Apple Macintosh computers from the early to mid-1990s. It was designed as an inexpensive way to add communication expansion cards like network adapters or modems to Macs and Power Macs.
The slot exists in two forms. The original Communication Slot standard was introduced in the Macintosh LC 575 and can be identified by the notch toward its rear. This slot is based on the LC PDS. An updated PCI-based Communication Slot II debuted with the Performa 6360. This new slot moved the notch to the front so that incompatible cards could not be inserted.
In addition to the respective expansion bus pins, these slots also carried audio and serial lines. The serial bus was shared with the external modem port. Because the power and serial pins remained unchanged between the two slots, it was possible to design a universal modem card which could work in either. Network adapters, however, needed to be designed for one or the other.
A major disadvantage to both is that when a modem card is installed in the Communication Slot, the modem serial port on the back of the computer is disabled. Computers that came with this card installed had the modem port blanked out (though the connector was still present). Further, due to its unconventional architecture, the Performa 5200's printer port would be disabled if a network adapter was installed in the Communication Slot.
Compatible computers
Communication Slot
A Communication Slot (some documentation refers to this as a Communication Card I Slot) is found in some 68040 and PowerPC CPU Macs.
Macintosh 575 family
Macintosh 580 family
Macintosh 630 family
Power Macintosh/Performa 5200 family
Power Macintosh/Performa 5300 family
Power Macintosh/Performa 6200 family
Power Macintosh/Performa 6300 family (except 6360)
Communication Slot II
The Communication Slot II was used in the 6360 and later series of Power Macs and Performas.
Power Macintosh/Performa 6360
Power Macintosh/Performa 5400 family
Power Macintosh/Performa 5500 family
Power Macintosh/Performa 6400 family
Power Macintosh/Performa 6500 family
Power Macintosh 4400 (aka Power Macintosh 7220)
Twentieth Anniversary Macintosh
Umax C600 (Apus 3000 in Europe) Macintosh Clone
In addition, a modified Communication Slot II was present on the Power Macintosh G3 personality cards. This slot only provided power and serial lines, leaving the PCI pins disconnected. For this reason it could only be used with modem cards. As in other machines, the external modem port is disabled when a modem is installed in the Communication Slot.
Cards
Communication Slot
14.4 modem Macintosh Express Fax/Modem (Part M2480LL/A)
10BASE-T Apple Ethernet CS Twisted Pair Card (Part M3065Z/A)
10BASE2 Apple Ethernet CS Thin Coax (coax cable) Card (Part M2708Z/A)
AUI Apple Ethernet CS AAUI Card (Part M3066Z/A)
Communication Slot II
28.8 kbit/s Global Village or Apple GeoPort |
https://en.wikipedia.org/wiki/Machine%20perception | Machine perception is the capability of a computer system to interpret data in a manner that is similar to the way humans use their senses to relate to the world around them. The basic method that the computers take in and respond to their environment is through the attached hardware. Until recently input was limited to a keyboard, or a mouse, but advances in technology, both in hardware and software, have allowed computers to take in sensory input in a way similar to humans.
Machine perception allows the computer to use this sensory input, as well as conventional computational means of gathering information, to gather information with greater accuracy and to present it in a way that is more comfortable for the user. These include computer vision, machine hearing, machine touch, and machine smelling, as artificial scents are, at a chemical compound, molecular, atomic level, indiscernible and identical.
The end goal of machine perception is to give machines the ability to see, feel and perceive the world as humans do and therefore for them to be able to explain in a human way why they are making their decisions, to warn us when it is failing and more importantly, the reason why it is failing. This purpose is very similar to the proposed purposes for artificial intelligence generally, except that machine perception would only grant machines limited sentience, rather than bestow upon machines full consciousness, self-awareness, and intentionality.
Machine vision
Computer vision is a field that includes methods for acquiring, processing, analyzing, and understanding images and high-dimensional data from the real world to produce numerical or symbolic information, e.g., in the forms of decisions. Computer vision has many applications already in use today such as facial recognition, geographical modeling, and even aesthetic judgment.
However, machines still struggle to interpret visual impute accurately if said impute is blurry, and if the viewpoint at which stimulus are viewed varies often. Computers also struggle to determine the proper nature of some stimulus if overlapped by or seamlessly touching another stimulus. This refers to The Principle of Good Continuation. Machines also struggle to perceive and record stimulus functioning according to the Apparent Movement principle which Gestalt psychologists researched.
Machine hearing
Machine hearing, also known as machine listening or computer audition, is the ability of a computer or machine to take in and process sound data such as speech or music.
This area has a wide range of application including music recording and compression, speech synthesis, and speech recognition.
Moreover, this technology allows the machine to replicate the human brain's ability to selectively focus on a specific sound against many other competing sounds and background noise. This particular ability is called “auditory scene analysis”. The technology enables the machine to segment several streams occurring at the s |
https://en.wikipedia.org/wiki/Space%20Strike | Space Strike is a 1982 fixed shooter video game for IBM PC compatibles programmed by Michael Abrash and published by Datamost. Space Strike is a clone of Space Invaders.
Gameplay
As in Space Invaders, the player controls a small mobile firing platform that he moves side to side along the bottom of the screen. Waves of aliens attack from above, sweeping back and forth and slowly descending. Barriers provide cover for the player, but are degraded by weapons fire both from above and from below. The level is complete when all the aliens are destroyed, but ends if the player gets shot or if the aliens descend to the point that they collide with the player.
Reception
Mark Lacine reviewed the game for Computer Gaming World, and stated that "In conclusion, Space Strike is a new name for an old game. This doesn't change the fact that it is a well programmed, error-free game. It is recommended to those who are looking for a good quality Invaders program."
References
External links
Space Strike at GameFAQs
1982 video games
Datamost games
Fixed shooters
North America-exclusive video games
Video game clones
Video games developed in the United States
Single-player video games |
https://en.wikipedia.org/wiki/Geof%20Manthorne | Geoffrey Manthorne (born April 25, 1974), more commonly known as Geof, is an American chef known for his skill in cake building, as well as decorating. He stars on the Food Network's reality-TV show Ace of Cakes and works as executive sous chef at Duff Goldman's bakery Charm City Cakes in Baltimore, Maryland.
Manthorne also competed with Goldman in the Halloween Haunted House Food Network Challenge and judged the Extreme Cakes competition with Goldman and Mary Alice Fallon-Yeskey. He met Duff by being in the same music social group and through Mary Alice's brother, Neil Fallon, the lead singer of the band Clutch.
References
1974 births
Living people
University of Maryland, Baltimore County alumni
American television chefs
American male chefs |
https://en.wikipedia.org/wiki/Thief%20%28Apple%20II%20game%29 | Thief is an Apple II multidirectional shooter written by Bob Flanagan and published by Datamost in 1981. It is a clone of the 1980 arcade game Berzerk from Stern Electronics.
Gameplay
The game puts the player in control of a thief that must make his way through simple mazes, though there are no objects to actually steal. Each level is populated by stocky, possibly robotic guards that converge on the player, and which the player must either shoot or evade.
See also
K-Razy Shoot-Out
Robon
Robot Attack
References
1981 video games
Apple II games
Apple II-only games
Datamost games
Multidirectional shooters
Video games developed in the United States
Video game clones
Single-player video games |
https://en.wikipedia.org/wiki/Spectre%20%281982%20video%20game%29 | Spectre is a video game for the Apple II written by Bob Flanagan and Scott Miller and published by Datamost in 1982.
Spectre is a Pac-Man variant with a goal of collecting dots while avoiding "Questers." The player navigates the maze with a 3D view on the left side of the screen and a top-down representation on the right.
A Spectre advertisement reads:
See also
3-Demon
References
External links
1982 video games
Apple II games
Apple II-only games
Datamost games
Pac-Man clones
Video games developed in the United States
Single-player video games |
https://en.wikipedia.org/wiki/Operating%20system%20Wi-Fi%20support | Operating system Wi-Fi support is the support in the operating system for Wi-Fi and usually consists of two pieces: driver level support, and configuration and management support.
Driver support is usually provided by multiple manufacturers of the chip set hardware or end manufacturers. Also available are Unix clones such as Linux, sometimes through open source projects.
Configuration and management support consists of software to enumerate, join, and check the status of available Wi-Fi networks. This also includes support for various encryption methods. These systems are often provided by the operating system backed by a standard driver model. In most cases, drivers emulate an Ethernet device and use the configuration and management utilities built into the operating system. In cases where built-in configuration and management support is non-existent or inadequate, hardware manufacturers may include their own software to handle the respective tasks.
Microsoft Windows
Microsoft Windows has comprehensive driver-level support for Wi-Fi, the quality of which depends on the hardware manufacturer. Hardware manufacturers almost always ship Windows drivers with their products. Windows ships with very few Wi-Fi drivers and depends on the original equipment manufacturers (OEMs) and device manufacturers to make sure users get drivers. Configuration and management depend on the version of Windows.
Earlier versions of Windows, such as 98, ME and 2000 do not have built-in configuration and management support and must depend on software provided by the manufacturer
Microsoft Windows XP has built-in configuration and management support. The original shipping version of Windows XP included rudimentary support which was dramatically improved in Service Pack 2. Support for WPA2 and some other security protocols require updates from Microsoft. Many hardware manufacturers include their own software and require the user to disable Windows’ built-in Wi-Fi support.
Windows Vista, Windows 7, Windows 8, and Windows 10 have improved Wi-Fi support over Windows XP with a better interface and a suggestion to connect to a public Wi-Fi when no other connection is available.
macOS and Classic Mac OS
Apple was an early adopter of Wi-Fi, introducing its AirPort product line, based on the 802.11b standard, in July 1999. Apple later introduced AirPort Extreme, an implementation of 802.11g. All Apple computers, starting with the original iBook in 1999, either included AirPort 802.11 networking or were designed specifically to provide 802.11 networking with only the addition of the internal AirPort Card (or, later, an AirPort Extreme Card), connecting to the computer's built-in antennae. All Intel-based Macs either come with built-in AirPort Extreme or a slot for an AirPort card, and all portable Macs (all MacBooks and the earlier iBooks and PowerBooks) have included Wi-Fi for several years. In late 2006, Apple began shipping Macs with Broadcom Wi-Fi chips that also supported |
https://en.wikipedia.org/wiki/Scorched%20Tanks | Scorched Tanks is an artillery style game released for the Amiga platform in 1994. The game is inspired by the MS-DOS game Scorched Earth (1991).
Gameplay
Between two and four human and computer-controlled opponents each control one stationary tank in a two-dimensional playfield of randomly generated mountainous terrain. The aim of the game is to destroy the other tanks by shooting, utilizing indirect fire.
The game has 70 weapons and 13 types of shield, ranging from simple to the elaborate. Players purchase equipment before each round, and bonus cash is awarded for dealing damage to opponents.
Weapons include the Liquid Nitrogen, which fills like a liquid and deals damage to tanks before it evaporates, Crimson Flood, which triggers a series of explosions that cover terrain and deals damage to tanks in the path of the explosions, Crazy 8s, which bounces unpredictably around the target, Mega Nuke, which obliterates any tanks in its blast radius, and the Grab Bag, which fires either a random weapon worth more than $4,000 or a 'blank'. Many weapons specifically destroy, create, move or ignore terrain.
Shields include the inexpensive Absorb, which absorbs damage, the Magnetic shield which deflects incoming warheads (at three different levels, from a gentle nudge to seriously altering the inbound trajectory), the X-tinguisher which absorbs most weapons that make a direct hit and puts them into the target's own inventory, the Detonator, which triggers dangerous weapons safely out of range, and Feedback, which reflects incoming direct hits directly back where they came from.
Development
Scorched Tanks was developed by Dark Unicorn Productions. Dark Unicorn's membership also included Seumas McNally, after whom the Independent Games Festival's Seumas McNally Grand Prize is named. Scorched Tanks was written with AMOS Professional.
Version 0.50 added shields and improved graphics. Version 0.70 added music and several new weapons. Version 0.95 added parachutes, the Lava weapon and the Liquid Nitrogen weapon. Version 1.00 added computer controlled opponents and four new weapons: the Scatter Shot, Firecracker, Super Zapper, and Chain Reaction.
Version 1.15 added tank movement, new shield types and support for Amigas with only 512KB of chip RAM. Version 1.20 added configuration options, including settings for wind and explosion size, and added the Crimson Flood weapon. Version 1.75 added twenty new weapons, the Displacer and Feedback shield types, new death sequences, tank sliding, music by Eric "Sidewinder" Gieseke, and various minor improvements.
Version 1.85 and 1.90 added new music by Sidewinder, added 10 new weapons bringing the total to 70, and improved some graphics, including options for 16 and 64 colour graphics modes. Version 1.85 was uploaded to Aminet on 13 April 1995. Version 1.90 was made available to registered users only at the same time, and unlocked the load/save game function added in version 1.80 and the option to play more than fiv |
https://en.wikipedia.org/wiki/MovieMaker | MovieMaker is a magazine, website and podcast network focused on the art and business of filmmaking with a special emphasis on independent film. The magazine is published on a quarterly basis.
See also
List of film periodicals
References
External links
1993 establishments in Washington (state)
Bimonthly magazines published in the United States
English-language magazines
Film magazines published in the United States
Magazines established in 1993
Magazines published in Los Angeles
Magazines published in Seattle |
https://en.wikipedia.org/wiki/Boku%20no%20Natsuyasumi%203 | is a video game developed by Millennium Kitchen and published by Sony Computer Entertainment for the PlayStation 3. It is part of the popular Boku no Natsuyasumi series and was released in Japan on July 5, 2007.
Gameplay
The game involves a boy's summer vacation on his aunt and uncle's farm in the wide-open countryside of Hokkaidō. Features from previous series entries, like catching a large variety of insects, a popular pastime in Japan, and swimming return, along with new activities, such as grass sledding, cow milking, and Chinese jump rope.
External links
Official Website (SCE)
Review (Crunk Games)
IGN page
Series of English diary entries explaining the game in detail (Hardcore Gaming 101)
Single-player video games
Adventure games
Japan-exclusive video games
Sony Interactive Entertainment games
2007 video games
PlayStation 3 games
PlayStation 3-only games
Video games about insects
Video games developed in Japan
Video games about children
Video game sequels
Video games set in 1975
Video games set in Japan
Works about vacationing
Millennium Kitchen games
Japan Studio games |
https://en.wikipedia.org/wiki/Contacto%20Deportivo | Contacto Deportivo is an American Spanish-language sports news program. Previously airing on UniMas, the program airs nightly at midnight on Univision and Univision Deportes Network.
In September 2015, Univision Communications announced that according to Nielsen ratings, Contacto Deportivo was the fastest-growing U.S. sports news program in terms of viewership, regardless of language, having increased its year over year viewership by 213%, and 18-49 viewership by 170%. It was also reported that in July and August 2015, average viewership of Contacto Deportivo was 5% higher than that of the 12:00 a.m. ET edition of ESPN's English-language sports news program SportsCenter—its main competitor in the timeslot.
References
Univision original programming
American sports television series |
https://en.wikipedia.org/wiki/Glipper |
Glipper is a clipboard utility for the GNOME Panel. It allows users of Unix-like operating systems to access a history of X Selections, any item of which can be reselected for pasting. Glipper is often described as the GNOME counterpart to KDE's Klipper. Older versions of Glipper could also be run outside of GNOME, but the newest version 1.0 is GNOME only because of its heavy integration into different GNOME techniques. However, it can be run inside Xfce4's panel using the XfApplet wrapper - and through it, into any custom session that uses xfce4-panel, such as Openbox sessions.
Plugin support
Since version 1.0, Glipper also supports plugins, which can be written in Python.
Some plugin are also included in the 1.0 release:
A network plugin, to synchronize the histories of multiple Glipper processes via the network
An action plugin, similar to Klipper's action function
A snippet plugin, which lets the user access text snippets they want to use very frequently
A nopaste plugin, which lets you paste your clipboard content to a Nopaste service
References
External links
Glipper homepage
Clipboard (computing)
GNOME Applications
Clipboard utilities that use GTK |
https://en.wikipedia.org/wiki/Microsoft%20Sync%20Framework | Microsoft Sync Framework is a data synchronization platform from Microsoft that can be used to synchronize data across multiple data stores. Sync Framework includes a transport-agnostic architecture, into which data store-specific synchronization providers, modelled on the ADO.NET data provider API, can be plugged in. Sync Framework can be used for offline access to data, by working against a cached set of data and submitting the changes to a master database in a batch, as well as to synchronize changes to a data source across all consumers (publish/subscribe sync) and peer-to-peer synchronization of multiple data sources. Sync Framework features built-in capabilities for conflict detection – whether data to be changed has already been updated – and can flag them for manual inspection or use defined policies to try to resolve the conflict. Sync Services includes an embedded SQL Server Compact database to store metadata about the synchronization relationships as well as about each sync attempt. The Sync Framework API is surfaced both in managed code, for use with .NET Framework applications, as well as unmanaged code, for use with COM applications. It was scheduled to ship with Visual Studio 2008 in late November 2007.
Architecture
The Sync Framework runtime provides synchronization functionality, without being tied to any data store or data transport protocols. By providing data source specific synchronization providers, any data source can be supported. For example, using proper synchronization providers, files can be synchronized across computers, project updates synchronized across project participants, or media synchronized across devices. Sync Framework ships with three providers: Microsoft Sync Services for ADO.NET, Sync Services for File Systems, and Sync Services for SSE. Sync Services can be used to synchronize devices by supplying providers for the device. Similarly, PIM software such as Microsoft Office Outlook and media libraries such as Windows Media Player can also be supported by providing suitable providers.
The providers are used to enumerate the items in a data store, each identified by an Item ID. In addition, they also have to maintain synchronization metadata and the state of the data store, so that changes can be enumerated quickly. The metadata is maintained for every instance of the data store (replica) that the provider is attached to. The metadata maintained includes the replica ID, tick count (representing progression in time), conflict log, tombstone log, and the set of the changes the data store has seen (knowledge). A replica ID and tick count pair makes up a version and encodes the state of the data store until that time. Sync Framework defines a set of operation for the Knowledge object for a replica: Contains which determines if the store contains a specified change, Union to merge two knowledge sets, Project to project out the knowledge for a subset of the items, and Exclude to create a new knowledge set with |
https://en.wikipedia.org/wiki/Tony%20Takezaki | is a Japanese mangaka born on July 15, 1963, in Osaka.
Selected bibliography
Manga and anime
A.D. Police Files (1990)
Dr Kishiwada's Scientific Affection (1992–98)
Genocyber (1993)
Space Pinchy (2002)
Tony Takezaki no Gundam Manga (2004)
Tony Takezaki no Evangelion (2010)
External links
Tony's (Tony Takezaki's original website)
Review of Dr. Kishiwada
1963 births
Manga artists
Living people |
https://en.wikipedia.org/wiki/Pirana%2C%20Rajasthan | Pirana is a small village located in the state of Rajasthan in India. According to data from 2009, the population of the village is 2021, and there are 468 households.
The population density of the village is 173.92 people per square kilometer.
References
History of Rajasthan
Tonk district
Villages in Tonk district |
https://en.wikipedia.org/wiki/Jack%20Minker | Jack Minker (4 July 1927 – 9 April 2021) was a leading authority in artificial intelligence, deductive databases, logic programming and non-monotonic reasoning. He was also an internationally recognized leader in the field of human rights of computer scientists. He was an Emeritus Professor in the University of Maryland Department of Computer Science, which is part of the College of Computer, Mathematical, and Natural Sciences.
Education and early life
Minker was born on July 4, 1927 in Brooklyn, New York. He received his Bachelor of Arts degree from Brooklyn College in 1949, Master of Arts degree from the University of Wisconsin in 1950, and PhD from the University of Pennsylvania in 1959 for research supervised by Bernard Epstein.
Career and research
Minker started his career in industry in 1951, working at the Bell Aircraft Corporation, RCA, and the Auerbach Corporation. He joined the University of Maryland in 1967, becoming Professor of Computer Science in 1971 and the first chair of the department in 1974. He became Professor Emeritus in 1998.
Minker was one of the founders of the area of deductive databases and disjunctive logic programming. He has made important contributions to semantic query optimization and to cooperative and informative answers for deductive databases. He has also developed a theoretical basis for disjunctive databases and disjunctive logic programs, developing the Generalized Closed World Assumption (GCWA).
Minker has over 150 refereed publications and has edited or co-edited five books on deductive databases, logic programming, and the use of logic in artificial intelligence. He
was Founding Editor-in-Chief of the journal Theory and Practice of Logic Programming.
Minker has been vice-chairman of the Committee of Concerned Scientists since 1973, and vice-chairman of the Committee on Scientific Freedom and Human Rights (CSFHR) of the Association for Computing Machinery from 1980 to 1989. He led the struggle for the release of Anatoly Shcharansky and Alexander Lerner from the late Soviet Union. He also campaigned on behalf of Andrei Sakharov and his wife, Yelena Bonner. His memoir, Scientific Freedom & Human Rights: Scientists of Conscience During the Cold War, was published in 2012 by IEEE Computer Society Press. His former doctoral students include Terry Gaasterland.
Honors and awards
Minker was elected a Fellow of the American Association for the Advancement of Science (AAAS) in 1989, founding Fellow of the Association for the Advancement of Artificial Intelligence (AAAI) in 1990, Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 1991, and founding Fellow of the Association for Computing Machinery (ACM) in 1994.
He received the ACM Outstanding Contribution Award for his work on human rights in 1985, the ACM Recognition of Service Award in 1989, the University of Maryland President's Medal for 1996, and the prestigious ACM Allen Newell Award for 2005. The Allen Newell Award is a recogni |
https://en.wikipedia.org/wiki/Subwar%202050 | Subwar 2050 is a futuristic 3D submarine simulator computer game developed by Particle Systems, Michael Powell acting as the lead designer, and published by MicroProse Software, Inc.
Publication history
The game was released in 1993 for DOS and 1994 for Amiga and Amiga CD32. In 1994 an expansion pack, Subwar 2050: The Plot Deepens was released for DOS. Subwar 2050 was sold to Interplay Entertainment on 27 March 2009. In 2013 Subwar 2050 was released on Gog.com for XP/Vista/Windows 7 and is available for download.
Reception
Computer Gaming World in April 1994 said that "SubWar 2050 is a product with an identity crisis. It wants to incorporate sophisticated physical models of the type you'd expect from a true simulation, and yet it wants to have an action game's visuals and pace", citing its including thermal layers, making them "largely irrelevant" with visual-oriented combat, then only providing unsophisticated short-range torpedoes. In 1994, PC Gamer UK named SubWar 2050 the 18th best computer game of all time. The editors called it "a game that will appeal to almost everyone."
References
External links
1993 video games
Amiga games
Amiga 1200 games
Amiga CD32 games
DOS games
MicroProse games
Naval video games
Particle Systems games
Science fiction video games
Submarine simulation video games
Video games developed in the United Kingdom
Video games with expansion packs
Submarines in fiction
Games commercially released with DOSBox
Windows games
Video games scored by Allister Brimble
Interplay Entertainment games
Single-player video games
Video games set in the 2050s |
https://en.wikipedia.org/wiki/Geopolymer | Geopolymers are inorganic, typically ceramic, alumino-silicate forming long-range, covalently bonded, non-crystalline (amorphous) networks. Obsidian (volcanic glass) fragments are a component of some geopolymer blends. Commercially produced geopolymers may be used for fire- and heat-resistant coatings and adhesives, medicinal applications, high-temperature ceramics, new binders for fire-resistant fiber composites, toxic and radioactive waste encapsulation and new cements for concrete. The properties and uses of geopolymers are being explored in many scientific and industrial disciplines: modern inorganic chemistry, physical chemistry, colloid chemistry, mineralogy, geology, and in other types of engineering process technologies. The field of geopolymers is a part of polymer science, chemistry and technology that forms one of the major areas of materials science.
Polymers are either organic material, i.e. carbon-based, or inorganic polymer, for example silicon-based. The organic polymers comprise the classes of natural polymers (rubber, cellulose), synthetic organic polymers (textile fibers, plastics, films, elastomers, etc.) and natural biopolymers (biology, medicine, pharmacy). Raw materials used in the synthesis of silicon-based polymers are mainly rock-forming minerals of geological origin, hence the name: geopolymer. Joseph Davidovits coined the term in 1978 and created the non profit French scientific institution (Association Loi 1901) Institut Géopolymère (Geopolymer Institute).
According to T.F. Yen geopolymers can be classified into two major groups: pure inorganic geopolymers and organic containing geopolymers, synthetic analogues of naturally occurring macromolecules. In the following presentation, a geopolymer is essentially a mineral chemical compound or mixture of compounds consisting of repeating units, for example silico-oxide (-Si-O-Si-O-), silico-aluminate (-Si-O-Al-O-), ferro-silico-aluminate (-Fe-O-Si-O-Al-O-) or alumino-phosphate (-Al-O-P-O-), created through a process of geopolymerization. This mineral synthesis (geosynthesis) was first presented at an IUPAC symposium in 1976.
The microstructure of geopolymers is essentially temperature dependent: it is X-ray amorphous at room temperature, but evolves into a crystalline matrix at temperatures above 500 °C.
One can distinguish between two synthesis routes: in alkaline media (Na+, K+, Li+, Ca2+, Cs+ and the like); or
in acidic media with phosphoric acid, organic carboxylic acids from plant extracts (acetic, citric, oxalic, and humic acids).
In the beginning of 2000s the alkaline route was the most important in terms of research and development and commercial applications and is described below. The acidic route is discussed elsewhere.
Definition
In the 1950s, Viktor Glukovsky, of Kiev, USSR, developed concrete materials originally known under the names "soil silicate concretes" and "soil cements", but since the introduction of the geopolymer concept by Joseph Davidovits, |
https://en.wikipedia.org/wiki/Digital%20Rights%20Ireland | Digital Rights Ireland is a digital rights advocacy and lobbying group based in Ireland. The group works for civil liberties in a digital age.
Telecommunications data retention
In 2012, the group brought an action before the Irish High Court, which subsequently made a reference to the Court of Justice of the European Union to take legal action over telecommunications data retention provided for by the Criminal Justice (Terrorist Offences) Act of 2005.
Digital Rights Ireland argues that the act led to Gardaí accessing retained data without having a specific crime to investigate, citing remarks by the Data Protection Commissioner.
On 8 April 2014, the Court of Justice of the European Union declared the Directive invalid in response to a case brought by Digital Rights Ireland against the Irish authorities and others.
File sharing
The Irish Recorded Music Association has sent letters to people it accuses of file sharing their music, demanding damages for financial losses. One issue is how the files belonging to the alleged file-sharers were searched. MediaSentry software was used to search their machines, but as it doesn't limit itself to searching only folders used for file sharing, this led to questions of violation of privacy. MediaSentry itself is based in the United States, which has less legislation about data protection than the European Union. This has been an issue in cases in the Netherlands and France.
Another issue is Internet service providers being compelled to identify users.
Current action still causes concern to DRI.
Former TD Dr. Jerry Cowley has requested that the complaints referee investigate whether his telephone is being tapped. DRI expressed concern, noting that there is no Irish equivalent of the Wilson Doctrine in Irish law. Fine Gael has also shown concern at the number of telephone taps authorised by former Minister for Justice Michael McDowell. DRI said that the reasons for withholding the information was unacceptable.
Other areas of work
Other issues addressed by the group include:
ID cards
Electronic passports
Online defamation
Leaking of confidential information by civil servants
See also
Internet censorship in the Republic of Ireland
Digital rights
References
External links
Digital Rights Ireland official website
Dáil debate on Criminal Justice (Terrorist Offences) Act, 2005 (Also available in Acrobat format.)
Internet privacy organizations
Politics and technology
Internet-related activism
Computer law organizations
Intellectual property activism
Privacy organizations
Radio-frequency identification
Civil liberties advocacy groups
Intellectual property organizations
Political organisations based in the Republic of Ireland
Copyright law organizations
Digital rights organizations |
https://en.wikipedia.org/wiki/Gamereactor | Gamereactor is a Nordic online media network covering video games in multiple languages and a former print magazines network. In 2013, it was "one of the biggest games publications in Europe" according to Develop.
History
The Gamereactor website was started by Egmont Digital in 1998. Also in 1998, brothers Morten Reichel and Claus Reichel launched online and print magazine Gamez.dk in Denmark, which took over the online sites Gamereactor Denmark, Sweden and Norway (.dk/.se/.no) from Egmont in January 2002.
In 2001, they released Gamereactor Magazine in Norway and soon after in Sweden. Since late 2007 Gamereactor has also been available in Finland, and it also launched in Germany (Online only) in 2009. In 2010 they launched in Italy (Online only), and a Portuguese version came online in 2013. Gamereactor later opened outlets in France in November 2016, The Netherlands in January 2017, and China in January 2018.
On 1 September 2008, Gamereactor International was launched, an English edition of the website and the magazine (PDF). It features news, previews and reviews, with a special interest in the Nordic gaming industry, as well as video content from GRTV. The print magazine launched in the UK in 2013, and in 2017 Gamereactor launched a cross-network English language esports sub-site covering competitive gaming.
In November 2014, the print magazines were discontinued. It was free and distributed via game stores and electronics retailers in Denmark, Sweden, Finland, Norway, Germany and the UK. The magazine had eight issues every year (not in January or July), and was published in Danish, Norwegian, Swedish, German, English and Finnish.
The magazine has apps for iPhone and Android, PlayStation 4 and Xbox One consoles and Samsung's Smart TV Hub platform.
In 2004, Gamereactor Art Director Petter Hegevall was nominated by Sveriges Tidskrifter Swedish Design Awards. In 2013, Gamereactor Magazine (UK) was nominated in the best Print Magazine category at the Games Media Awards, and in 2015 the team were nominated in the Best Editorial Team (Print) category.
Editors
Magnus Groth-Andersen - Danish Editor/Global Editor-in-chief
Petter Hegevall - Swedish Editor/Art Director
Jonas Mäki - Swedish Editor
Silje Slette, Eirik Furu - Norwegian Editors
Markus Hirsilä - Finnish Editor
Mike Holmes - British/International Editor
Criticism
In June 2013, the magazine cover contained a The Last of Us artwork that was modified to remove the character Ellie. The editor posted a blog explaining it was a "pure design issue" and that they have previously modified artwork for covers.
References
External links
Gamereactor English website
Video game magazines published in the United Kingdom
Video game magazines published in Denmark
Video game magazines published in Finland
Home computer magazines
Video game magazines published in Germany
Video game magazines published in Italy
Magazines established in 1998
Video game magazines published in Spain
Video game mag |
https://en.wikipedia.org/wiki/Nordic%20Regional | Nordic Regional was an airline based in Umeå, Sweden. It operated a scheduled network of services linking one international and five domestic destinations. Its main base was Stockholm-Arlanda Airport.
All operations were cancelled in 2008.
Destinations
Nordic Airways served the following Swedish airports in 2008: Gällivare Airport, Kramfors Airport, Luleå Airport, Åre Östersund Airport, Stockholm-Arlanda Airport, and Umeå Airport.
Fleet
The Nordic Regional fleet included the following aircraft (as of 8 September 2008)
1 Saab 340A
As of 8 September 2008, the average age of the Nordic Regional fleet was 22.8 years.
References
External links
Nordic Regional
Nordic Regional fleet
Defunct airlines of Sweden
Airlines disestablished in 2008 |
https://en.wikipedia.org/wiki/Chariots%20of%20War | Chariots of War is an isometric 2D computer wargame, developed by Slitherine Software and Paradox Interactive, and published by Strategy First. It is set in the ancient Near East.
Gameplay
The strategic layer of Chariots of War is turn-based, though unlike Civilization, the focus is almost entirely on real-time tactical combat. The game is similar to Slitherine's earlier wargame Legion, and uses the same graphics engine.
There are 58 different civilizations to play, all divided into the following ethnic groups:
Assyrian
Bedouin
Egyptian
Hittites
Mitanni
Nubian
Skythian (Scythian)
Summerian (Sumerian)
Syrian
Tribal
There are nine different resources to collect (food, building materials, copper, tin, wood, gold, gems, incense, and horses), which are used to construct buildings and units. While trade and diplomacy do feature in the game, they are of lesser importance, as conquest is the only way to attain victory.
The battles themselves take place on a separate deployment screen. The player's forces are positioned across one third of the battlefield, and the player alters their formations and gives certain orders. As in Legion, the actual fighting is automated, so the initial orders are the only input in the battle until it is over.
The game features both campaign and non-campaign modes of play.
Reception
The game received "mixed" reviews according to the review aggregation website Metacritic.
References
External links
2003 video games
Video games with isometric graphics
Paradox Interactive games
Turn-based strategy video games
Windows games
Windows-only games
Video games developed in the United Kingdom
Video games set in antiquity
Video games set in the Middle East
Computer wargames
Strategy First games
Slitherine Software games
Single-player video games |
https://en.wikipedia.org/wiki/UpTime%20%28disk%20magazine%29 | UpTime was a group of disk magazines for a variety of personal computing platforms that were published in the 1980s. Bill Kelly started UpTime in his father's basement in 1984. The first issue was published in October 1984. Versions were issued for the Apple II, Macintosh, IBM PC, Commodore 64, and Amiga systems. Among the software that was published there were some of the earliest games created by John Romero. The magazine ceased publication in December 1988.
Notable releases
Apple II
Bongo's Bash
Dangerous Dave
Notes and references
Disk magazines
Defunct computer magazines published in the United States
Magazines established in 1984
Magazines disestablished in 1988 |
https://en.wikipedia.org/wiki/List%20of%20National%20Park%20System%20areas%20in%20Maryland | This list of National Park System areas in Maryland includes the lands, trails, or park networks maintained by the National Park Service of the United States within the U.S. State of Maryland. The National Park Service controls 24 units in the state of Maryland. They range from sites of historical interest to sites of ecological interest to portions of the parkway system around Washington, DC. Many of the sites currently under the control of the National Park Service in Maryland were previously under the control of other agencies in the federal government, such as Antietam National Battlefield, which was originally managed by the Department of War. There are eight units administered by the National Park System as part of the National Capital Parks. The most recent unit created in Maryland is the Captain John Smith Chesapeake National Historic Trail, which was authorized by Congress in 2006.
National Park System areas
See also
List of Maryland state parks
List of National Historic Landmarks in Maryland
Notes
A Part of the National Capital Parks.
B Antietam National Battlefield was originally two separate units, a cemetery established in 1865 and the battlefield established in 1890 under the War department. Both the battlefield and the cemetery were transferred to the National Park Service from the War Department in 1933, and the two units were combined in 1974.
References
External links
Find a Park in Maryland - official site of the National Park Service
Maryland
National Parks |
https://en.wikipedia.org/wiki/Incr%20Tcl | incr Tcl (commonly stylised as [incr Tcl], and often abbreviated to itcl) is a set of object-oriented extensions for the Tcl programming language. It is widely used among the Tcl community, and is generally regarded as industrial strength . Its name is a pun on "C++". Itcl implementations exist as both a package that may be dynamically loaded by a Tcl application, as well as an independent standalone language with its own interpreter.
Overview
Features
Namespace support
Itcl allows namespaces to be used for organizing commands and variables.
Example:
package require Itcl
itcl::class Toaster {
variable crumbs 0
method toast {nslices} {
if {$crumbs > 50} {
error "== FIRE! FIRE! =="
}
set crumbs [expr $crumbs+4*$nslices]
}
method clean {} {
set crumbs 0
}
}
itcl::class SmartToaster {
inherit Toaster
method toast {nslices} {
if {$crumbs > 40} {
clean
}
return [chain $nslices]
}
}
set toaster [SmartToaster #auto]
$toaster toast 2
C code integration
Itcl (like Tcl) has built-in support for the integration of C code into Itcl classes.
Licensing
Itcl follows the same copyright restrictions as Tcl/Tk. You can use, copy, modify and even redistribute this software without any written agreement or royalty, provided that you keep all copyright notices intact. You cannot claim ownership of the software; the authors and their institutions retain ownership, as described in the "license.terms" files included in the standard distribution. For more information please see incrtcl.sourceforge.net/itcl/copyright.html.
See also
OTcl
XOTcl
Tcllib
Itk
Tk (framework)
References
incr Tcl from the Ground Up by Chad Smith, published in January 2000.
This is a complete reference manual for incr Tcl, covering language fundamentals, OO design issues, overloading, code reuse, multiple inheritance, abstract base classes, and performance issues. Despite its breadth, it follows a tutorial, rather than encyclopedic, approach. This book is out of print as of September 2004.
External links
Itcl/incr Tcl project page
Tcl package site
tclweb project (there is a mailing list maintained at this site)
Scripting languages
Dynamically typed programming languages
Tcl programming language family
1993 software |
https://en.wikipedia.org/wiki/Glftpd | glFTPd is a freely available FTP server which runs on Unix, Linux, and BSD operating systems. It has number of features, like logins restricted by a particular set of IP addresses, transfer quotas per-user and per-group basis, and user/groups not stored in the system files, which make it attractive to private warez servers, including topsites. It does have legitimate uses though—a number of web development books recommend it amongst other general purpose FTP servers, and some Linux certification exams of SAIR required knowledge of it. It can integrate with Eggdrop through IRC channels.
History
glFTPd stands for GreyLine File Transfer Protocol Daemon. It was named after the initial developer GreyLine. The first public release of glFTPd dates back to the beginning 1998. glFTPd is well known for its detailed user permissions, extensive scripting features and for securely and efficiently transferring files between other sites using FXP.
Support
Support for glFTPd is available on IRC on EFnet in both #glftpd and #glhelp
See also
Comparison of FTP server software
References
External links
Official website
Installation of the GreyLine FTP daemon on Arch Linux
glFTPD scripts by Turranius
FTP server software
FTP server software for Linux
Unix Internet software |
https://en.wikipedia.org/wiki/Eric%20Taylor%20%28Friday%20Night%20Lights%29 | Eric Taylor is a fictional character and the central protagonist in the NBC/DirecTV (The 101 Network) drama television series Friday Night Lights played by Kyle Chandler. He is introduced as the head coach of the Dillon High School football team, the Dillon Panthers. At the end of the first season, he accepts a position as the quarterback coach at the fictional Texas Methodist University (TMU), where he had served as an assistant coach. After the birth of his second daughter, he leaves TMU in the second season to return to Dillon and once again coach the Panthers. Following a conspiracy by Joe McCoy in season three, Taylor is replaced as Panthers' coach by Wade Aikmen, his assistant, and instead offered the chance to start a new football program at East Dillon High School after Dillon, Texas is redistricted. The character was positively received and was included on several best lists and earned Kyle Chandler a number of award nominations, notably winning an Emmy Award in 2011.
Background
It is stated throughout the series that Coach Taylor grew up in Texas and played football as a young man. It is also hinted that he knew his wife, Tami, in high school and that they married fairly young.
Before becoming the head coach of the Dillon Panthers, he was the Quarterbacks coach, Junior High School, and Junior Varsity coach for 6 years. He was Jason Street's QB coach throughout Pop Warner, Junior High, and High School. Due to Jason's past success under Coach Taylor's tutelage, he was promoted to High School head coach prior to Jason's senior year.
Characterization
As a coach, Taylor is firm but fair to his players and is against nepotism. It is thought he gained this characteristic while a prodigy to the great Enda, who Coach Taylor once stated "is a legend." This put him at odds with Joe McCoy, and ultimately led to his ousting and subsequent transfer to East Dillon High. He is held in high regard as a "molder of men" and greatly respected by his players, many of whom lacked a father figure or significant male role model in their lives and saw him as a surrogate father. As his former star quarterback, Jason Street, once says to him, "You [Taylor] will always be my coach". His high school counselor-turned-principal wife, Tami, often grouses about how the lines between football and academics at Dillon High are blurred and the fact that there is the perception that football players can get away with anything. Nonetheless, his strong sense of morality is seen a number of times, such as when he suspends Smash Williams for using steroids, personally apologizes to a student who was beaten up by one of his hot-headed defensive ends, Bobby Reyes, and does not hesitate to punish players for disobeying rules, whether on the field or off. He has a dislike for anything that distracts his players, and is actively opposed to media attention and the hype surrounding his team.
Taylor loves his family very much and is much more affectionate around his wife, contr |
https://en.wikipedia.org/wiki/The%20Christmas%20List | The Christmas List is a 1997 TV movie, shown first on The Family Channel, thereafter on ABC Family during its 25 Days of Christmas programming block. It stars Mimi Rogers.
Synopsis
The story follows the life of the 35-year-old Melody Parris (Played by Mimi Rogers), a skilled perfume girl, who is living a somewhat flavorless life in Seattle, with a pompous, pushy boyfriend named George and an overbearing mother (Stella Stevens) who lives right next door to her, who is obsessed with her getting married.
It starts with another unsatisfactory day at work for Melody, but on the bus, her best friend Naomi tells her to make a Christmas list for selfish fun. She starts to but then receives a call from George, who is on a flight home from a business trip.
During a talk with her mother that evening, she asks her if they could try to make their Christmas "Dickens-Style"; however her mother is reluctant to do this. Another neighbor's daughter, Amber Mottola, is a supermodel, and her mother harps on how Melody's sister is married, and so Melody storms out, saying that she's sorry she's not anything that makes her mother proud, missing her mother saying that she is proud.
The next day at work, Melody is passed over for a promotion to the head of the perfume department at the department store where she works for a younger, less skilled co-worker, April May, whose main objective is to sell, not to serve. Melody finally decides to finish her Christmas list, and the next day, she takes it to work and (after some playfulness with Naomi) Naomi puts it in Santa's Mailbox at the department store. Then, things begin to change. She meets Danny Skylar, a boy who wants to buy a perfume that was similar to the smell of his late mother's, and when he can't pay the full amount, Melody loans him the rest, and he puts her name, along with his, on the entry form in a sweepstakes at the store to win a new Ford Mustang convertible.
Danny drags his father to attend the drawing for the Mustang, and his father is surprised when Danny and Melody win. Melody gets into trouble because store employees cannot enter drawings, but Danny explains the mix-up and pledges to give her the car until he can drive. Melody is attracted to Danny's father, Dr. David Skylar, and while she gives them the car, her boyfriend intervenes and they work out a schedule so that they can share the car, which offers opportunities for Melody and Dr. Skylar to start to share a close bond. That same night, a tree appears in Melody's apartment, and Melody's mother changes as well, becoming more maternal and says that the whole family is going to be celebrating Christmas Dickens-style.
When Danny goes to make another payment on the perfume, he asks Melody to go to lunch with him, and George comes as well. However, at lunch Melody and George argue, resulting in Melody pouring a bowl of creme brulee onto George's lap. A woman named Faith (Marla Maples) is dating Dr. Skylar and wants to eliminate any competition, |
https://en.wikipedia.org/wiki/Crisis%20Force | is a 1991 vertically scrolling shooting game released by Konami in Japan for the Family Computer. The player controls one of two fighter ships piloted by Asuka and Maya, a pair of twin siblings descended from the ancient civilizations of Mu, who must save the world from a breed of artificial monsters from the lost civilization of Atlantis. The main feature of the game system is the player's ability to transform its ship in one of three different forms, each with its unique attack method.
Gameplay
Crisis Force is an overhead scrolling shooting game. The game allows for two player co-operative play, and to choose from four different ships.
Crisis Force features a power up system built around your craft being able to transform into one of three configurations.
The main feature of Crisis Force is the player's ability to alter the form of their ship and change its attack method. The Aurawing has three primary forms, the "Front Offense Type", which specializes in shooting enemies in front of the ship, the "Side Offense Type", which focuses on attacking the left and right sides at the same time, and the "Rear Offense Type", which focuses on shooting from behind. Each mode has a "normal power-up" (blue orbs) and a "special power-up" (red orbs) that can be obtained from defeating enemies or destroying power-up containers. The "normal" and "special" power-ups changes the shooting style of each mode and can be upgraded by up to three levels. Power-up levels are carried over to the ship's different forms and when the player takes damage, its power-up level is reduced by one level with each shot until it is destroyed (causing the player to lose one ship).
There are also "combination parts" that can be accumulated that causes the player's ship to transform into a new form or combine with the other player's ship depending on the number of players. When union parts have been collected, the player's ship (along with that of the other player's) will change into a combined form for a limited time period. The player who has collected the most parts will control the combined ship's main shot, while the other player (the one with the fewer parts collected) controls the secondary weapon. When the timer runs out or the combined ship takes enough damage, the player's ship will revert to its regular state (along with that of the other player's).
Other power-ups available from item containers included bombs for the player's ship (up to nine units can be carried), as well as speed-ups and speed-downs that adjust the player's speed by up to five levels. The bombs launched by the player's ship varies depending on its form.
The game's difficulty, default number of lives and controls can be adjusted on the game's option screen, which features a sound test as well.
Plot
Asuka and Maya are typical high-school students living in Tokyo. Even though their parents were archaeologists, they lived a rather mundane life.
But then one day, the same ominous dream that the two sibl |
https://en.wikipedia.org/wiki/Great%20Central%20Main%20Line%20%28diagram%29 | This is a diagrammatic map of the Great Central Main Line, part of the former Great Central Railway network. The map shows the line as it currently is (please refer to legend), and includes all stations (open or closed). Some nearby lines and branch lines are also shown, though most stations are omitted on such lines if they are closed. In addition, the Great Western and Great Central Joint Railway is also shown. The Great Central Main Line is always shown in the middle of the diagram.
{{Routemap
|style = float:none;margin:auto;
|title = Great Central Main Line
|title-bg = #be2d2c
|map =
Manchester Lines to ~~ ~~! !CONTg
! !BHF
kABZg2
\STRc2\ABZg3!~kSTRc1\kSTRl+4!~STR+l\CONTfq~~ ~~ ~~Huddersfield line
! !STRc2\STR3+1\HST!~STRc24\STR3\
~~ ~~! !LSTR+1\STRc4\ABZg+1\STRc4\
HST~~
! !kSTRc2\kHST3+l\ABZgr\\
Hope Valley line~~ ~~! !kLLSTR+1\exlCONTg@F\HST\\~~
exSTRl\eABZgr+r\~~ ~~ ~~
HST~~
kSTRc2\kKRZ3+lu\ABZ1+rxf!~lCONTf1~~to Huddersfield line
Stockport–Stalybridge line~~ ~~! !CONTgq\exSTR+r!~kkSTRr+1!~kSTR2+r\eABZgl+l!~kSTRc3\exSHI4lq\~~
exSTR\kABZg+4\
exSTR\HST\~~
\exkSTR2\ABZgl\ABZq+l\CONTfq~~to
\exkSTRc1\exkSTRl+4!~lMKRZvo!~STR+c2\xKRZq3u\exCONTfq~~Stalybridge Junction Railway
\ABZg+1\STRc4
STRc2\ABZg3\
! !LSTR!~STRc2\HST3+1\eHST!~STRc4\\~~
ABZg+1\STRc4\HST\\~~
~~ ~~! !LSTR\\eHST\\~~
HST~~
eHST~~
~~ ~~! !exCONTgq\eABZg+r\
HST~~
HST~~
HST~~
! !KHSTaq\ABZgr+r\
KHSTxe~~
exHST~~
exHST~~
exTUNNEL1~~ ~~ ~~Woodhead Tunnel
exHST~~
exHST~~
\exABZgl\exCONTfq~~ ~~ ~~to Crow Edge
\xABZg+l\CONTfq~~ ~~ ~~Penistone Line to
HST~~
\xABZgl\CONTfq~~ ~~ ~~Penistone Line to
exHST~~
exHST~~
\exABZg+l\exKBSTeq
exHST~~
! !KBSTaq\xABZg+r\
eHST~~
eHST~~
eHST~~
~~ ~~! !LSTR\\eHST\\~~
Midland Main Line~~ ~~! !CONTgq\ABZg+r\\eHST\\\~~
! !BHF2\STRc3\eBHF\\~~
\STRc1\ABZ4+2l\KRZo!~STRc3\kSTR2+r\kSTRc3\~~ ~~ ~~Midland Main Line
Nunnery Junction~~ ~~! !\STRc1\ABZg+4\\kLLSTR+4~~ ~~ ~~Woodburn Junction
Darnall Junction~~ ~~! !\d!~ABZgl+l\d!~POINTERf@g\CONTfq~~ ~~ ~~
! !HST
! !\\HST\exSTRc2\exLSTR3~~ ~~ ~~
Woodhouse Junction~~ ~~! !\exSTRc2\exSTR3!~kABZg2\exSTR+1\exSTRc4
Orgreave Colliery~~ ~~! !\\exKBST1\eSTR+c4!~kSTRc1\xkKRZl+4u!~exkSTRc2\ekABZq+3\CONTfq~~ ~~ ~~
! !\eHST\exkABZg+1
Beighton level crossing~~ ~~! !\BUE\exSTR!~POINTERg@fq~~ ~~ ~~Waleswood Curve
Beighton Junction~~ ~~! !\xKRWgl\xKRWg+r
kSTRc2\xkKRZ3+lo\xABZgr
Midland Main Line (Old Road)~~ ~~! !\kSTR+1!~POINTERf@rgq\exABZg+l\exKRZo\exCONTfq
\eABZg+l\exKRZu\exKRZu\exCONTfq~~ ~~ ~~
\STR\exABZgl\exABZql\exCONTfq~~ ~~ ~~
! !eHST\exHST\~~
eABZg+l\exKRZu+xl\exKBSTeq~~ ~~ ~~Colliery branch
! !eHST\exHST\~~
\ABZgl+l\xKRZu\kSTR2+r\kSTRc3
! !\STR\exHST\\ekHST+4~~ ~~~~(MR)
to ~~ ~~! !CONTgq\ABZg+r!~exSTRc2\exABZg23\exSTRc23\eABZg3
exSTRc2\eKRZ3+1o\exSTR!~exSTRc14\exABZ+14\CONTf!~exSTRc4~~ ~~ ~~to Robin Hood Line
! !exHST+1\eSTR+c4\exSTR\exKBSTe\~~ ~~ ~~Colliery branch
! !exHST\BHF\exSTR\\~~
! !exBHF\STR\exABZgl+l\exSTR2+r\exSTRc3~~ ~~ ~~Duckmanton Junction
! !exKBHFaq\exKRZu!~STRc2\xKRZq3o\exKRZo\exHSTq!~exSTRc1\exABZq+4\exCON |
https://en.wikipedia.org/wiki/ABP%20Majha | ABP Majha is a Marathi news TV channel based in Mumbai, Maharashtra. Rajiv Khandekar is the executive editor of the channel. Anandabazar Patrika News is the abbreviation for ABP News Network Pvt. Ltd. i.e. ABP Group operates a multiple Language news channel in India. Its headquarters are in the Indian city of Noida.
Address of ABP Majha is ABP NEWS CENTER,
301, Boston House, 3rd Floor, Suren Road,
Andheri - East, Mumbai-400093, India.
Fax: +91 22 61277790 / 66160243
Tel: +91 22 66160200
The channel was previously called Star Majha until 1 June 2012. ABP Group acquired its ownership from Star, making it a part of the larger ABP news network.
References
External links
ABP Majha Corporate Website
Television stations in Mumbai
Marathi-language television channels
24-hour television news channels in India
Television channels and stations established in 2007
ABP Group
Former News Corporation subsidiaries
Mass media in Mumbai
Mass media in Maharashtra
2007 establishments in Maharashtra |
https://en.wikipedia.org/wiki/IBM%20Intelligent%20Cluster | The IBM Intelligent Cluster was a cluster solution for x86-based high-performance computing composed primarily of IBM (System x, BladeCenter and System Storage) components, integrated with network switches from various vendors and optional high-performance InfiniBand interconnects.
History
The solution was formerly known as the IBM eServer Cluster 1300 (or e1300) based on then-current Pentium III processors, which was introduced in November 2001. This was replaced by the e1350 in October 2002 with the introduction of Pentium 4-based Intel Xeon processors. Later (in 2008-2009) solution also was known as the IBM System Cluster 1350; in 2010 released line with final IBM Intelligent Cluster name.
Roughly twice a year the solution components were updated to include the then-current products from IBM and other vendors.
In 2014 this cluster solution was sold and rebranded as Lenovo Intelligent Cluster.
Architecture
The Intelligent Cluster system is a (integrated, factory-built and tested) rack tower-size cluster solution with comprehensive warranty service for all components, including third-party options. The system could comprise traditional rack-optimized nodes, as well as IBM BladeCenter, Flex System or iDataPlex blade nodes, or another rack-mounted servers with processor choices between x86-based (Intel Xeon and AMD Opteron) or uncommon Power-based processors options (only for blade servers), along with integrated storage and switches to provide a turnkey Linux or Microsoft cluster environment. These platform also supports the water-cooling module options (Heat Exchange Doors) for some rack towers designs.
Operating system choices were officially limited to Enterprise Linux distributions from Red Hat and SUSE and to Microsoft Windows HPC Server 2008. For systems management IBM offered xCAT. Additional software, such as GPFS and LoadLeveler, could also be ordered from IBM.
See also
IBM BladeCenter and IBM Flex System
iDataPlex
References
IBM supercomputer platforms
Cluster computing |
https://en.wikipedia.org/wiki/Traffic%20%28conservation%20programme%29 | TRAFFIC (Trade Records Analysis of Flora and Fauna in Commerce), the Wildlife Trade Monitoring Network, is a global non-governmental organisation monitoring the trade in wild animals and plants that focuses on biodiversity and sustainable development. It was originally created in 1976 as a specialist group of the Species Survival Commission of the International Union for Conservation of Nature (IUCN), and evolved into a strategic alliance of the World Wide Fund for Nature (WWF) and the IUCN.
History
1990s
TRAFFIC established 13 more offices worldwide including in Europe (1990), in East/Southern Africa (1991) and in East Asia (1994). The organisation looked into trade issues including tiger, agarwood, and rhino and established the Bad Ivory Database System (BIDS) which became the foundation for the highly important ETIS. TRAFFIC's first major work in Africa looked into the decline of black rhinos, which assessed the future for rhinos against serious threats from poaching and continued horn trafficking. In the first global attempt to keep track of all the rhino horn in circulation, TRAFFIC established the Rhino Horn and Product Database. It provided a valuable source of information for government and private sources to regulate rhino horn trade, and has been expanded to include data from 54 countries.
TRAFFIC turned its attention to medicinal plants and performed surveys to assess the impact of plant trade in Europe on wild plant populations in 1993. The organisation hosted a symposium on medicinal plants later in the decade, which was attended by more than 120 plant specialists and government and industry representatives.
2000s
The following decade saw increasing collaboration and multifaceted ways to improve enforcement and tackle wildlife crime. In 2005, TRAFFIC supported the Association of South East Asian Nations (ASEAN) in their creation of Wildlife Enforcement network (ASEAN-WEN).
TRAFFIC branched out into what it now refers to as the "green stream", promoting sustainable wildlife trade rather than tackling unsustainable trade. In 2007, TRAFFIC, the WWF, IUCN, and BfN launched the International Standard for Sustainable Wild Collection of Medicinal and Aromatic Plants (ISSC-MAP) for sustainable wild collection of medicinal and aromatic plants.
2010s
TRAFFIC began to incorporate more social and economic responsibility into its work, empowering communities whilst promoting sustainable wildlife trade. In 2011 a project was launched working with groups of indigenous women in the Amazon to promote sustainable trade and provide alternative sources of income to the unsustainable harvest of wildmeat. A partnership was set up between TRAFFIC, the Association of the Waorani Women of the Ecuadorian Amazon, and a high quality chocolate company, WAO Chocolate, to fulfil this purpose, winning a UNDP award in June 2014.
Post 2010, TRAFFIC began to embrace the field of making wildlife trade sustainable through behavioural change. In 2014, TRAFFI |
https://en.wikipedia.org/wiki/Obsidian%20%281986%20video%20game%29 | Obsidian is an action-adventure computer game for the Amstrad CPC personal computer published by Artic Computing in 1986. The game is set on the titular space station located within the centre of an asteroid, which is out of control and drifting towards a black hole. The player must guide an astronaut with a jet pack around the station and re-activate its engine shields to prevent the Obsidian's destruction. This involves collecting items and using them to solve puzzles, while avoiding the Obsidian's reactivated security systems.
Obsidian is the first game that was developed by Revolution Software co-founder Tony Warriner, who was a school pupil at the time. Due to concentrating on Obsidian's development rather than revising he failed all of his exams. The game received a positive response from journalists: it was praised for the quality of its graphics, though reviewers held mixed views on the game's ability to maintain player interest. The jet pack was criticized for being too sensitive when responding to the player's movement inputs.
Gameplay
Obsidian is an action-adventure presented in two dimensions, spread across approximately 50 game screens. Locations contrast between spaceship interior and rock surfaces. Players control a jet pack wearing astronaut who must deactivate the five engines of the titular spacestation Obsidian, which is located in the hollow centre carved out of an asteroid. Objects are stored in gravity boxes on the station's ceilings, only one object can be held at a time. These are used to solve the game's puzzles and allow the player to continue further into the game. Each object's purpose must be discovered as they are not labelled.
The game world is filled with traps, laser defence mechanisms and security robots, all of which kill the astronaut on contact, resulting in the loss of one of his five lives. These defences must be shut down with objects obtained from gravity boxes in order to progress, as the player has no weapon to directly attack the robots with. The jet pack enables the astronaut to travel more quickly, but has a limited supply of nitro fuel. Should this fuel run out then the astronaut will lose a life. The spaceship contains points at which the jet pack can be refuelled, though these can be difficult to locate.
Plot
The crew of the Obsidian have temporarily abandoned the vessel in order to allow it to pass through a black hole. The Obsidian's internal systems are capable of withstanding the black hole, but the station cannot shield its human inhabitants from the gravitational forces. The crew have taken refuge in a smaller craft which has been shielded, intending to return to the Obsidian when both vessels have passed through the black hole. A radiation storm has damaged the Obsidian's engine protection systems and erased its flight path, leaving the station drifting towards the black hole where it will be destroyed. Only one member of the crew has the skills necessary to return to the Obsidian and pr |
https://en.wikipedia.org/wiki/Neuro%20Hunter | Neuro Hunter is a cyberpunk-themed first-person shooter/role-playing video game developed by Media Art and published by Deep Silver. It was released on August 19, 2005. The game was marketed as a mix between Deus Ex, System Shock and Gothic series of video games.
Storyline
The player assumes the role of Hunter, a computer expert who is hired by the Johnston Biotek corporation, referred to as the "Corporation" in the game. Hunter is to repair the network of a mining complex but fails and ends up in a cave world after an explosion. A man called Toadstool finds him and tells him where he is: In an underground world where a computer freak called Hacker has seized power. Left alone by the Corporation, Hunter has to find a way back to the surface all by himself. On his quest he meets Kathryn, a mysterious woman, who sometimes helps the player. Hunter faces many dangers and problems; for instance, when he is confronted by sinister figures in an underground prison colony. Of course we cannot give away whether he finds the suspected lift to the surface there.
Cyberpunk role playing game with atmospheric graphics First Person View 36 main and 6 side quests wrapped into an intriguing Sci-Fi-story Gigantic subterranean World: extensive caves, secret labs, mystic temples, generator rooms uvm. 69 NPCs, you can interact and trade with 14 different monster classes and many subclasses: reptiles, hybrids, humanoid mutants, giant spiders, quantum ghosts and more... 14 different weapons with second attack options: from the rusty knife to the plasma cannon. 30 instructions and recipes, for building useful items, food or exotic weaponry skillsystem with 7 character abilities for individual problem solutions and a high replay quality 6 classes of different implants to improve your characters’ abilities Tactical realtime-fights in the Matrix – hacking of networks and sabotage of security systems Theft and Data-Theft included! impressive render cutscenes from 3D-iO All ingame text was recorded in a professional sound studio
External links
Official Neuro Hunter website
Media Art. Company
2005 video games
First-person shooters
Science fiction video games
Video games developed in Russia
Windows games
Windows-only games
Deep Silver games
Cyberpunk video games |
https://en.wikipedia.org/wiki/Exhibit%20%28web%20editing%20tool%29 | Exhibit (part of the SIMILE Project) is a lightweight, structured-data publishing framework that allows developers to create web pages with support for sorting, filtering and rich visualizations. Oriented towards semantic web-type problems, Exhibit can be implemented by writing rich data out to HTML then configuring some CSS and JavaScript code.
Overview
Technically, exhibit is a collection of JavaScript files to be included in a web page. When Exhibit pages are loaded by a browser, the JavaScript reads in one or more JSON data files and builds a local database in the memory of the machine running the browser. Data can then be filtered and sorted directly in the browser without having to re-query the server. The design of the Exhibit is optimized for browsing faceted data.
The Exhibit code base is currently being developed by members of the SIMILE Project at MIT.
References
External links
Website of the Exhibit Widget
Exhibit Wiki
Official SIMILE Project website
Web development software
Semantic Web |
https://en.wikipedia.org/wiki/Don%20Priestley | Don Priestley (born 1940) is a teacher and former video game programmer who wrote over 20 commercial games for the ZX81 and ZX Spectrum home computers between 1982 and 1989. Despite successful releases for DK'Tronics, such as 3D Tanx and Maziacs, Priestley returned to teaching in the late 1980s, claiming changes in the video game industry did not suit his style of work.
Game development
Until 1979, Don Priestley was a teacher. In 1981 both he and his son enrolled in a Pascal course at night school. Although his son dropped out, he carried on. One of his early programs was an adaptation of Conway's Game of Life which was converted to a newly purchased Sinclair ZX81.
His first commercial game was The Damsel and the Beast, inspired by a program called Mugwump and published by Bug-Byte. Further ZX81 games written freelance were Dictator (a successful strategy game later ported to the Spectrum) and Mazogs (which was later rewritten for the Spectrum as Maziacs).
Priestley joined DK'Tronics as a director in March 1983. There he developed 3D Tanx, which was critically well-received and his most successful game. It sold around 5000 copies per month for 15 months. This was followed by Spawn of Evil which reached the top of the charts in May 1983.
He also wrote Popeye for DK'Tronics. Released in 1985, its point of differentiation was having huge, colourful sprites; amongst the largest seen on the Spectrum. This distinct graphical style happened by chance:
In 1986, Macmillan Publishers re-released Popeye and approached Priestley to use the same techniques on a launch title for its new label, Piranha Software. The Trap Door, based on the animated series of the same name, won multiple awards from the press and has been described as one of the best games ever released for the ZX Spectrum.
Priestley would go on to use the same style in the sequel Through The Trapdoor (1987), Flunky (1987) and Gregory Loses his Clock (1989) but by the late eighties, Priestley felt that games development was moving away from single developers to team development. These changes did not suit Priestley's style of work and he left the games industry to return to teaching.
Games
Sinclair ZX81
The Damsel and the Beast (1981, Bug-Byte)
Mission of the Deep (1981, Macronics)
Dictator (1982, Bug-Byte)
Sabotage (1982, Macronics)
City Patrol (1982, Macronics)
Mazogs (1982, Bug Byte)
ZX Spectrum
3D Tanx (1982, DK'Tronics)
Meteoroids (1982, DK'Tronics)
Dictator (1983, DK'Tronics)
Maziacs (1983, DK'Tronics)
Jumbly (1983, DK'Tronics)
Spawn of Evil (1983, DK'Tronics)
Minder (1985, DK'Tronics)
Popeye (1985, DK'Tronics)
Benny Hill's Madcap Chase (1985, DK'Tronics)
The Trap Door (1986, Piranha Software)
Flunky (1987, Piranha Software)
Through the Trap Door (1987, Piranha Software)
Target (1988, Summit Software)
Up for Grabs (1988, Summit Software)
Gregory Loses His Clock (1989, Mastertronic)
References
External links
Don Priestley at World of Spectrum.
"Terry, Arfur and 'Im Upstairs" arti |
https://en.wikipedia.org/wiki/Cascade%20algorithm | In the mathematical topic of wavelet theory, the cascade algorithm is a numerical method for calculating function values of the basic scaling and wavelet functions of a discrete wavelet transform using an iterative algorithm. It starts from values on a coarse sequence of sampling points and produces values for successively more densely spaced sequences of sampling points. Because it applies the same operation over and over to the output of the previous application, it is known as the cascade algorithm.
Successive approximation
The iterative algorithm generates successive approximations to ψ(t) or φ(t) from {h} and {g} filter coefficients. If the algorithm converges to a fixed point, then that fixed point is the basic scaling function or wavelet.
The iterations are defined by
For the kth iteration, where an initial φ(0)(t) must be given.
The frequency domain estimates of the basic scaling function is given by
and the limit can be viewed as an infinite product in the form
If such a limit exists, the spectrum of the scaling function is
The limit does not depends on the initial shape assume for φ(0)(t). This algorithm converges reliably to φ(t), even if it is discontinuous.
From this scaling function, the wavelet can be generated from
Successive approximation can also be derived in the frequency domain.
References
C.S. Burrus, R.A. Gopinath, H. Guo, Introduction to Wavelets and Wavelet Transforms: A Primer, Prentice-Hall, 1988, .
http://cnx.org/content/m10486/latest/
https://web.archive.org/web/20070615055323/http://cm.bell-labs.com/cm/ms/who/wim/cascade/index.html
Wavelets |
https://en.wikipedia.org/wiki/Smallfoot | Smallfoot was the name of both a rapid application development toolkit and an embedded operating system designed and released by Caldera Systems/Caldera International/The SCO Group in both UnixWare and Linux formats. Created for use in embedded environments such as point of sale systems and video gaming, the toolkits were intended to create specifically tailored operating systems geared towards the desired use. These customized and stripped down versions of the operating systems made less of a footprint, hence the names Smallfoot embedded UNIX and Smallfoot embedded Linux respectively.
Smallfoot is also notable in that it was a key Linux product of The SCO Group, developed for both the UNIX and Linux platforms and distributed by SCO and Caldera Systems/Caldera International after its purchase of SCO. In the SCO v. IBM lawsuit, SCO denied distribution of Linux kernel code, however SCO Smallfoot is based on both 2.4.10 and 2.6.1 Linux kernel versions.
History
Smallfoot was first proposed in 2001. The name Smallfoot (whilst trademarked by SCO) was never the intended product's final name, but rather was a working name that stuck. A first prototype was built around the Linux platform. A deal was signed in January 2003 for Smallfoot to work on Beetle point-of-sale terminals from Wincor Nixdorf.
But given the SCO–Linux disputes that were underway a couple of months later, the Smallfoot Toolkit development switched to a Unix-based OS in May 2003.
The formatting of the toolkit configuration language drew heavily on Tcl. The toolkit included extensive configuration of many parts of the system, JavaPOS library, newly developed drivers for Point-of-Sale (POS) devices, and a POS application. A complete POS terminal developed with the Smallfoot Toolkit release 1.0 was demonstrated at SCO Forum in 2004 in Las Vegas, where breakout sessions entitled "Build a Smallfoot OS Using the Smallfoot Toolkit" and "Smallfoot is Not Just for Retail Anymore" were held. The further development, including a GUI, was shelved until the sales of the command-line version of the toolkit would pick up and provide a revenue stream.
The product itself was announced in June 2004, as part of a roadmap presented by SCO intended to show renewed investment in their Unix product lines.
The Smallfoot Toolkit product went onto the SCO price list in July 2004. The minimal bundle was priced at approximately $35,000 and included the Toolkit, UnixWare license for the development machine running the toolkit, 500 deployment UnixWare licenses for the generated images, 10 hours of support. Larger volumes of the deployment licenses provided extra per-license discounts. None were ever sold and eventually the product was discontinued.
Eventually an outgrowth of Smallfoot found a customer, Budgens supermarkets. Budgens, a part of the Musgrave Group, were looking to implement Linux at their point of sale systems. The project became an early success story in terms of stores taking a chance on a |
https://en.wikipedia.org/wiki/Dell%20Precision | Dell Precision is a series of computer workstations for CAD/architecture/CG professionals. They are available in both desktop (tower) and mobile (laptop) form. Dell touts their Precision Mobile Workstations are "optimized for performance, reliability and user experience."
Dell Precision mobile workstations
The 7000 series introduced Compression Attached Memory Module (CAMM).
3000, 5000, 7000 Series (2015–current)
Dell announced a new series of Latitude laptops in August 2013: the 3000 series, the 5000 series and the 7000 series.
In October 2015, Dell announced the first generation of Precision mobile workstations of this series with model numbers 3510, 5510, 7510 and 7710.
In January 2017, Dell announced the second generation laptops in this series with model numbers 3520, 5520, 7520 and 7720.
In April 2018, Dell announced the third generation of laptops in this series with model numbers 3530, 5530, 7530 and 7730. In May 2019 Dell announced the 4th Generation of the 55xx and 7xxx series mobile workstations with the release of the 5540, 7540 and 7740 models.
Docks/Port Replicators - All first generation (xx10) and second generation (xx20) Precision mobile workstation laptops support the Dell E-Series port replicator except XPS based 5510, 3520, 5520 models. All third generation (xx30) and higher support USB-C docks with some compatible with Thunderbolt 3 or 4 based on options or generation. Specific compatibility, charging/display limitations, or dual USB-C requirements exist requiring verification from Dell.
Precision Mobile Thin & Light (XPS 15 based) (2013–2015)
Latitude E Series based (2008–2014)
Dell launched the E Series of laptops on August 12, 2008 with a collection of Latitude (E4200, E5400, E5500, E6400, E6500, E6400 ATG/XFR) and Precision (M4400, M2400) computers. Both the Latitude and Precision computers are compatible with the new E Series docking stations (E-Port and E-Port Plus). Notably, the 17" models do not share a chassis with the Inspiron series anymore, and starting with the M4600 the 15" Precisions do not share a Latitude chassis either. QHD, UHD and RGBLED IPS models have a disabled iGPU. This has several downsides: the power consumption during low load is high and thus the battery runtimes clearly suffer despite the high-capacity battery, and Intel's QuickSync Video cannot be used. AMD GPU equipped models before the M4800/M6800 also do not support AMD Enduro Switchable Graphics.
Latitude D Series based (2003–2007)
These Precision models were released at roughly the same time as their D-series Latitude counterparts. They are compatible with the D-series docking stations, and there are various accessories that are interchangeable with other Dell models, such as the battery or CD drive, depending on the Precision model. Some of these models (especially those made around ~2005-2007) with NVIDIA GPUs can suffer from GPU failure.
Latitude C Series based (2001–2002)
These Precisions were based on the Latitude C810 |
https://en.wikipedia.org/wiki/Tk%20%28software%29 | Tk is a cross-platform widget toolkit that provides a library of basic elements of GUI widgets for building a graphical user interface (GUI) in many programming languages. It is free and open-source software released under a BSD-style software license.
Tk provides many widgets commonly needed to develop desktop applications, such as button, menu, canvas, text, frame, label, etc. Tk has been ported to run on most flavors of Linux, macOS, Unix, and Microsoft Windows. Like Tcl, Tk supports Unicode within the Basic Multilingual Plane, but it has not yet been extended to handle the current extended full Unicode (e.g., UTF-16 from UCS-2 that Tk supports).
Tk was designed to be extended, and a wide range of extensions are available that offer new widgets or other capabilities.
Since Tcl/Tk 8, it offers "native look and feel" (for instance, menus and buttons are displayed in the manner of "native" software for any given platform). Highlights of version 8.5 include a new theming engine, originally called Tk Tile, but it is now generally referred to as "themed Tk", as well as improved font rendering. Highlights of version 8.6 include PNG support and angled text.
History
Tk was developed by John Ousterhout as an extension for the Tcl scripting language. It was first publicly released in 1991. Tk versioning was done separately from Tcl until version 8.0.
Tk was written originally for Unix/X11, and proved extremely popular with programmers in the 1990s by virtue of its being easier to learn and use than Motif and other X11 toolkits of the time. Tk was also ported to Microsoft Windows and Macintosh platforms, starting with Tk 4.2 and improved with native look and feel in Tk 8.0 (released 1997). To mark the popularity and significance of Tk in the 1990s, Ousterhout was given the ACM Software System Award in 1997 for Tcl/Tk:
Interest in Tk waned significantly from the late 1990s and onward. The default look and feel on Unix still emulated Motif, despite the mainstream replacement of Motif by toolkits such as FLTK, Qt, and GTK. Widgets that became commonly used in applications (e.g. trees, combo boxes, tabbed notebooks) were not available in the Tk core, but only via multiple, often competing add-ons.
Tk 8.5, released in late 2007, corrected some of these problems by adding missing widgets to the core, introducing a new theming engine and modernizing the look and feel on Unix.
However, because some code changes were required to incorporate these advancements, many existing applications retain the older Motif-inspired feel that Tk had become known for.
Architecture
Tk is a platform-independent GUI framework developed for Tcl. From a Tcl shell (tclsh), Tk may be invoked using the command package require Tk. The program wish (WIndowing SHell) provides a way to run a tclsh shell in a graphical window as well as providing Tk.
Tk has the following characteristics:
Platform-independent: Like Tcl, Tk is interpreted. It has been ported to multiple platforms and |
https://en.wikipedia.org/wiki/Northwest%20Harvest | Northwest Harvest is a non-profit organization supporting food banks in Washington state. Northwest Harvest distributes food to a network of more than 370 food banks, meal programs, and high-need schools throughout Washington State.
History
In 1967 a group of Seattle community leaders formed The Ecumenical Metropolitan Ministry (EMM), an interfaith organization committed to identifying and addressing the primary problems of the poor and disadvantaged. Shortly after the formation of The EMM, Boeing's workforce dwindled from more than 100,000 employees to 32,500. By June 1971, unemployment in the Seattle area spiked from 2.9% to 13.1%.
Realizing that hunger was one of the most significant problems facing Seattle and beyond, The Ministry partnered with two other organizations to organize a food bank system, originally known as Neighbors in Need. In October 1970, they opened 34 food banks, originally conceived as "a short-term immediate response to the immediate crisis".
Even as the Seattle area recovered from its employment crisis, widespread need for food assistance remained. By early 1972, the network found itself serving 70,000 people per month. The Reagan administration's 1982 cuts to federal food stamp programs exacerbated this need, and led to further expansion of the food bank system.
In 1980, Northwest Harvest distributed just over 1 million pounds of food. By 2013 the amount of food distributed by Northwest Harvest increased to 32 million pounds.
Source of Food
All of the food and operating funds received by Northwest Harvest comes from individuals, businesses, foundations, and other organizations. Approximately 25% of the food distributed by Northwest Harvest is purchased staples, such as rice, beans, pasta, canned fruit and vegetables, and protein. The other 75% comes from in-kind donations, mostly from businesses and institutions. The food received from food drives "provides… variety… [and] helps break the monotony of the staple food items".
Distribution
Northwest Harvest operates their own distribution centers in Auburn, Spokane, and Yakima. These warehouses allow Northwest Harvest to handle large quantities of food, including perishable items such as fruits, vegetables, and meat. They also partner with distributors in Grays Harbor, Lewis County, Wahkiakum County, and the Emergency Food Network of Tacoma. These organizations often support one another with staff and transportation services to maximize their efficiency.
Cherry Street Food Bank
Northwest Harvest's Cherry Street Food Bank in the First Hill Neighborhood of Seattle is the one of the busiest in Washington, providing nearly 1.5 million meals annually.
See also
List of food banks
References
1967 establishments in Washington (state)
Non-profit organizations based in Seattle
Food banks in Washington (state)
Organizations established in 1967 |
https://en.wikipedia.org/wiki/List%20of%20county%20roads%20in%20Levy%20County%2C%20Florida | The following is a list of county roads in Levy County, Florida. All county roads are maintained by the county in which they reside.
County roads
References
FDOT map of Levy County
FDOT GIS data, accessed January 2014
County |
https://en.wikipedia.org/wiki/High-throughput%20computing | In computer science, high-throughput computing (HTC) is the use of many computing resources over long periods of time to accomplish a computational task.
Challenges
The HTC community is also concerned with robustness and reliability of jobs over a long-time scale. That is, being able to create a reliable system from unreliable components. This research is similar to transaction processing, but at a much larger and distributed scale.
Some HTC systems, such as HTCondor and PBS, can run tasks on opportunistic resources. It is a difficult problem, however, to operate in this environment. On one hand the system needs to provide a reliable operating environment for the user's jobs, but at the same time the system must not compromise the integrity of the execute node and allow the owner to always have full control of their resources.
High-throughput vs. high-performance vs. many-task
There are many differences between high-throughput computing, high-performance computing (HPC), and many-task computing (MTC).
HPC tasks are characterized as needing large amounts of computing power for short periods of time, whereas HTC tasks also require large amounts of computing, but for much longer times (months and years, rather than hours and days). HPC environments are often measured in terms of FLOPS.
The HTC community, however, is not concerned about operations per second, but rather operations per month or per year. Therefore, the HTC field is more interested in how many jobs can be completed over a long period of time instead of how fast.
As an alternative definition, the European Grid Infrastructure defines HTC as "a computing paradigm that focuses on the efficient execution of a large number of loosely-coupled tasks", while HPC systems tend to focus on tightly coupled parallel jobs, and as such they must execute within a particular site with low-latency interconnects. Conversely, HTC systems are independent, sequential jobs that can be individually scheduled on many different computing resources across multiple administrative boundaries. HTC systems achieve this using various grid computing technologies and techniques.
MTC aims to bridge the gap between HTC and HPC. MTC is reminiscent of HTC, but it differs in the emphasis of using many computing resources over short periods of time to accomplish many computational tasks (i.e. including both dependent and independent tasks), where the primary metrics are measured in seconds (e.g. FLOPS, tasks/s, MB/s I/O rates), as opposed to operations (e.g. jobs) per month. MTC denotes high-performance computations comprising multiple distinct activities, coupled via file system operations.
See also
Batch processing
e-Science
Open Science Grid Consortium
Grid computing
References
Parallel computing |
https://en.wikipedia.org/wiki/Advanced%20Technology%20College | The Advanced Technology College (ATC) is a four-year technical college located in Daytona Beach, Florida in the United States. This technical college carries courses such as computer technology, construction, manufacturing, engineering, and automotive services.
The ATC is involved in a joint-partnership program with Volusia County and Flagler County school districts. The Advanced Technology Center provides high school students in their junior and senior years the ability to dual-enroll and receive college credits. There is no longer transportation to and from the home high schools to the ATC. The ATC also allows for adult students from Daytona State College to take courses at the ATC.
Notable alumni
Ty Kauffman, writer.
External links
daytonastate.edu Daytona State College Website
Public universities and colleges in Florida
Educational institutions established in 2001
Education in Volusia County, Florida
2001 establishments in Florida |
https://en.wikipedia.org/wiki/Andy%20Seto | Andy Seto (; born 3 June 1969) is a comic artist who specialises in martial-arts based stories.
Biography
Seto's works include his main series, "Cyber Weapon Z." He has also drawn a graphic novel adaptation of the earlier Crouching Tiger, Hidden Dragon novels, the King of Fighters series, and also created a graphic novelisation of Stephen Chow's film, Shaolin Soccer. His other work includes: Saint Legend, a story about the Eight Taoist Immortals, Story of The Tao, Dog Story, Para Para, The Four Constables, and Sword Kill.
Bibliography
Comics
108 Fighters
Ape's God
City of Darkness (comic)
City of Darkness 2
Crouching Tiger, Hidden Dragon
Crouching Tiger, Hidden Dragon II
Cyber Weapon Z
Cyber Weapon Z II
Devil United
Ice Fantasy
Para Para
Saint Legend
Saint Warrior
SD Cyber Weapon Z (executive producer)
Shaolin Soccer
Skyliner
Skyliner II
Story of the Tao
Street Fighter The Comic Series (Stage 10)
Bu Dong Quan Z
The Four Constables
The Four Constables-Secret of the Delirium Dagger
The Great Helmsman
The King of Fighters 2000
The King of Fighters 2000 OX
The King of Fighters R (editor)
The King of Fighters Zillion
Woon Swee Oan Qun Xia Zhuan
Woon Swee Oan Qun Xia Zhuan 2
Art books
Andy Seto Art Work Illustrations
Andy Seto Art Work Illustrations 2011
Andy Seto RESTART
Cyber Weapon Z IMPOSSIBLE
How to Art
References
Andy Seto at Lambiek's Comiclopedia
External links
Interview with Andy Seto
List of Andy Seto works @ MarsImport
Living people
1969 births
Chinese comics artists |
https://en.wikipedia.org/wiki/List%20of%20New%20York%20Undercover%20episodes | This is a complete list of episodes of the American police drama New York Undercover, which originally aired on the Fox network from September 8, 1994, to February 11, 1999, through 4 seasons with 89 episodes produced. The episode number reflects the order in which they were aired, which sometimes differed from the order of filming.
Series overview
Episodes
Throughout the first three seasons, episodes regularly featured musical guests performing at Natalie's, a nightclub whose original owner was portrayed by Gladys Knight in Season 1.
Season 1 (1994–95)
Season 2 (1995–96)
Season 3 (1996–97)
Season 4 (1998–99)
Major cast and plot changes were made to the series at the beginning of season 4. Jonathan LaPaglia and Michael DeLorenzo departed at the end of the prior season (leading to the shooting death of Det. Tommy McNamara and the bombing death of Det. Eddie Torres), Patti D'Arbanville-Quinn was dropped from the cast (resulting in the departure of Lt. Virginia Cooper), and Malik Yoba and Lauren Velez's characters were reassigned to a new unit, with new co-workers. Consequently, the nightclub Natalie's was eliminated as a regular setting, and the weekly musical guest appearances came to an end. As a result of all these changes, ratings for the show dramatically dropped forcing Fox to cancel the series, leaving the series finale "Catharsis" unaired until the series entered syndication in 1998; the episode aired on February 11, 1999.
References
External links
New York Undercover episode list at Epguides
Lists of American crime drama television series episodes |
https://en.wikipedia.org/wiki/Global%20Lake%20Ecological%20Observatory%20Network | Global Lake Ecological Observatory Network (GLEON) is an international grass-roots, voluntary network of researchers, educators, and community groups interested in making and utilizing time series of high-frequency observations made on and in lakes and reservoirs all over the world. GLEON includes more than 60 lake observatories and more than 850 individual members from 62 countries on six continents (as of January 2021). GLEON uses innovative human capacity building for discovery, solving problems, catalyzing and creating learning communities, education, FAIR data, and Open Science.
Goals
The goal is to understand, predict, and communicate the impact of natural and anthropogenic influences on lake and reservoir ecosystems. The researchers include limnologists, ecologists, information technology experts, and engineers who have a common objective of building and growing a scalable, persistent network of lake ecology observatories; developing new theoretical models based on the more extensive spatial and temporal scales of data; integrating new technologies to utilize the data; educating a new generation of researchers in team science; and engaging the public. Each lake or reservoir observatory consists of one or more instrumented platforms capable of sensing key limnological variables and moving the data in near-real time to web-accessible databases. The types of sensors employed at these observatories include: temperature, dissolved oxygen, dissolved carbon dioxide, phytoplankton pigments such as chlorophyll and phycocyanin, as well as devices that detect water movements such as acoustic Doppler current profilers (ADCP.) Many of the observatories also track meteorological parameters on the lake such as solar radiation, wind speed, and relative humidity. Data from the network of observatories will allow a better understanding of key processes such as the effects of climate and land use change on lake or reservoir function, the role of episodic events such as typhoons in resetting aquatic dynamics, and carbon cycling within lakes and reservoirs.
Participating lakes and organizations
Lough Feeagh, County Mayo, Ireland
Lake Erken, Uppsala University, Sweden
Douglas Lake, University of Michigan Biological Station, Michigan, USA
Sparkling Lake, Wisconsin USA
Trout Bog Lake (Vilas County, Wisconsin)
Crystal Bog Lake, Wisconsin, USA
Trout Lake, Wisconsin, USA
Lake Mendota, Wisconsin, USA
Lake Sunapee, New Hampshire
Lake Rotorua, New Zealand
Yuan-Yang Lake, Taiwan
Lake Kinneret, Israel
Chaffey Dam, Nundle, NSW
Euiam, South Korea
Soyang, South Korea
Lake Paajarvi, Lammi Finland
Lake Annie, Lake Placid, Florida
Lake Taihu, Jiangsu Province, China
West Long Lake, University of Notre Dame Environmental Research Center, Michigan, USA
Big Spirit Lake, Spirit Lake, Iowa, USA
External links
GLEON website
Lake Sunapee Protective Association
Wikiproject Lakes
Ecology organizations
Limnology
Environmental data |
https://en.wikipedia.org/wiki/Mad%20Men | Mad Men is an American period drama television series created by Matthew Weiner and produced by Lionsgate Television. It ran on the cable network AMC from July 19, 2007, to May 17, 2015, lasting for seven seasons and 92 episodes. The show is set from March 1960 to November 1970.
Mad Men begins at the fictional Sterling Cooper advertising agency on Madison Avenue in Manhattan, New York City, and continues at the new firm of Sterling Cooper Draper Pryce (later named Sterling Cooper & Partners) near the Time-Life Building at 1271 Sixth Avenue. According to the pilot episode, the phrase "Mad men" was a slang term coined in the 1950s by advertisers working on Madison Avenue to refer to themselves, "Mad" being short for "Madison" (in reality, the only documented use of the phrase from that time may have been in the late-1950s writings of James Kelly, an advertising executive and writer).
The series's main character is the charismatic advertising executive Don Draper (played by Jon Hamm), who is initially the talented creative director at Sterling Cooper. He is erratic and mysterious but is widely regarded throughout the advertising world as a genius; some of the most famous advertisement campaigns in history are shown to be his creations. In later seasons, Don struggles as his highly calculated identity falls into a period of decline. The plot of the show tracks the people in his personal and professional lives, most notably featuring Peggy Olson (Elisabeth Moss), who is introduced as Don's secretary but soon discovers her passion for copywriting. The show also focuses heavily on the characters of Pete Campbell (Vincent Kartheiser), Betty Draper (January Jones), Joan Holloway (Christina Hendricks), Roger Sterling (John Slattery), and in later seasons, Sally Draper (Kiernan Shipka). As the series progresses, it depicts the changing moods and social mores of the United States throughout the 1960s and early 1970s.
Mad Men received widespread critical acclaim for its writing, acting, directing, visual style and historical authenticity; it won many awards, including 16 Emmys and five Golden Globes. The show was also the first basic cable series to receive the Emmy Award for Outstanding Drama Series, winning the award each year of its first four seasons (2008–2011). It is widely regarded as one of the greatest television series of all time and as part of the early 21st century Golden Age of Television.
Production
Conception
In 2000, while working as a staff writer for Becker, Matthew Weiner wrote the first draft as a spec script for the pilot of what would later be called Mad Men. Television showrunner David Chase recruited Weiner to work as a writer on his HBO series The Sopranos after reading the pilot script in 2002. "It was lively, and it had something new to say," Chase said. "Here was someone [Weiner] who had written a story about advertising in the 1960s, and was looking at recent American history through that prism."
Weiner and his representat |
https://en.wikipedia.org/wiki/NATV%20Native%20American%20Television | NATV: Native American Television is an organization in the United States, providing news, education, and entertainment content to the Native American community. Founded in 1990, the network is run and staffed by Native Americans and is based in Williamsburg, Virginia.
NATV currently has programming online and distribution of select segments, special event coverage and programs available for channels which broadcast through cable and satellite in the US and Canada.
See also
AIROS Native Radio Network
External links
NATV organizational website
Native American history of Virginia
Native American television
Williamsburg, Virginia
Television channels and stations established in 1990 |
https://en.wikipedia.org/wiki/1-Hexene%20%28data%20page%29 | This page provides supplementary chemical data on 1-Hexene.
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. It is highly recommended that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source such as SIRI, and follow its directions.
MSDS
Structure and properties
Thermodynamic properties
Spectral data
References
Lide, D. R. (Ed.) (1996). CRC Handbook of Chemistry and Physics (76th Edn.). Boca Raton (FL):CRC Press. .
Spectral Database for Organic Compounds SDBS
Hexene
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/Riley%20Parker%20%28Neighbours%29 | Riley Parker is a fictional character from the Australian Network Ten soap opera Neighbours, played by Sweeney Young. He made his first on-screen appearance on 17 August 2007. He was involved in various storylines most notably an incest plot. The character was axed in 2008 and departed on 23 May 2008.
Character creation
In 2007 Neighbours suffered one of its worst decline in ratings and several key changes took place, including the introduction of a new family. Network Ten drama executive Dan Bennett revealed that the show would return to the focus on relationships and family dynamics Several regular characters left the show to make way for the Parker family. Australian drama actress Nikki Coghill was cast as matriarch of the family, Miranda Parker, and Steve Bastoni was cast as her husband Steve Parker. Eloise Mignon was also cast as sister Bridget Parker. Sweeney Young received the part of Riley. Young revealed he auditioned alone for throughout the audition process, whereas Mignon and Coghill both auditioned together in later stages through screen tests. The Parker family made their first appearance on-screen in July 2007, marking the start of the show's renovation.
In 2008, Riley was axed from the soap opera, in which Young stated: "I'm incredibly excited, I can’t wait to take all the stuff I've learnt at Neighbours and apply it to other productions."
Character development
Characterisation
Riley is mysterious and has a dark past. During an interview with entertainment website Last Broadcast Young described Riley stating: "He’s a little dark, but a good guy. He has a bit of trouble expressing himself, particularly where his parents and his past are concerned, but at the same time he’s very genuine." Riley's adoption has affected his persona, of this during a separate interview with Last Broadcast, Young said: "The problem is, he feels sensitive about being given up for adoption because it‘s like a rejection to him. He’s also insecure about his adoptive parents and feels unsure about whether they really love him". Riley also had a distinguished laugh which was created by Young. Young's unshaven look was also a concept incorporated into Riley's appearance, with Young stating he auditioned with long hair and a noticeable beard, subsequently producers liked his appearance, thus using it for the Riley. Producers also incorporated a hair cut, in which saw Young reduce his hair length, to complement his character. Of the producer's control over Young's appearance, he was asked if he would change his hair after filming his final scenes, he stated: "I want Definitely shorter hair, long hair is annoying. As soon as work permits I’m going to cut my hair really short."
Incest
In 2008 Riley was involved in a controversial storyline where it was revealed Riley had been pursuing a romance with his adoptive aunt Nicola West (Imogen Bailey). Various media sources reported the story after Australian conservative groups voiced their disapproval of the stor |
https://en.wikipedia.org/wiki/SWsoft | SWsoft was a privately held server automation and virtualization software company and the parent company of Parallels. SWsoft developed software for running data centers, particularly for web-hosting services companies, application service providers, and managed service providers. SWsoft products included applications for operating system-level virtualization, which enables users to run multiple operating systems, including Windows, Mac OS X, Linux, and Solaris, on a single computer.
The company was founded in 1997 and maintained its headquarters in Herndon, Virginia, with additional offices throughout North America, Europe, and Asia. Its research and development offices were located in Moscow, Russia, and it had sales offices in Germany and Singapore.
In December 2007, SWsoft announced its plans to change its name to Parallels in 2008 and ship its products under the Parallels brand name.
Company history
1997 SWsoft founded
2001
Virtuozzo released
HSPcomplete released
2003
SWsoft acquires automation firms Yippi-Yeah! E-Business GmbH (makers of Confixx) and Plesk Inc (makers of Confixx and Plesk)
PEM datacenter released
Open Fusion launched
2004
Announces partnership with Acronis
Plesk 7.0 released
SiteBuilder beta released
Acquires Parallels, Inc. but keeps this secret.
2007 December 12: SWsoft announces that it will change its name to "Parallels" in 2008.
2007 December: SWsoft acquires WebHostAutomation Ltd developers of HELM Control Panel.
January 2008 SWsoft officially becomes Parallels, Inc.
Uses
SWsoft’s virtualization software is predominantly used to automate data center and server management and to consolidate multiple servers onto one Windows- or Linux-based physical server. The company’s products are developed predominantly for web hosting companies, service providers, and corporations.
Although the company’s software reportedly uses fewer system resources because it does not require each virtualized server to have an independent operating system, its overall flexibility is limited. For example, each virtualized Virtuozzo server must have the same version of the same operating system, and when running Linux, the operating systems' kernel must be modified from the standard version.
References
Software companies established in 1997
Virtualization software
Software companies based in Virginia
Privately held companies based in Virginia
Defunct software companies of the United States |
https://en.wikipedia.org/wiki/PANTA | PANTA Systems was founded in 2002 and headquartered in Santa Clara, California with offices in Austin, Texas and Pune. PANTA manufactured and sold Data Warehouse Appliances until 2007. The PANTA appliances ran the Oracle 10g database engine on servers and storage manufactured by PANTA and clustered together with an InfiniBand fabric.
PANTA Systems was a foundation member of the Oracle Information Appliance Initiative, since renamed the Oracle Optimized Warehouse Initiative (OWI). As of 2008, OWI members included Dell/EMC, HP, IBM, SGI and Sun.
PANTA Systems is the only data warehouse appliance vendor to validate their claims of high perform, high availability and low cost with an externally verified world record.
See also
Business intelligence
Data mining
Data marts
Data warehouse appliance
References
External links
Oracle Optimized Warehouse Initiative
TPC
Defunct computer companies of the United States
Companies based in Santa Clara, California
Computer companies established in 2002
Computer companies disestablished in 2007
2002 establishments in California
2007 disestablishments in California |
https://en.wikipedia.org/wiki/AIM%20Multiuser%20Benchmark | The AIM Multiuser Benchmark, also called the AIM Benchmark Suite VII or AIM7, is a job throughput benchmark widely used by UNIX computer system vendors. Current research operating systems such as K42 use
the reaim
form of the benchmark for performance analysis.
The AIM7 benchmark measures some of the same things as the SDET benchmark.
The original code was developed by Gene Dronek for AIM Technology, Inc., who licensed it to others. The first AIM Benchmarks were for single user PCs. The suite was expanded and enhanced to become multi-user benchmarks by Donald Steiny. Caldera International, Inc., bought the license and released
the source code for Suite VII and Suite IX under the GPL.
AIM7 is a program written in C that forks many processes called tasks, each of which concurrently runs in random order a set of subtests called jobs. There are 53 kinds of jobs, each of which exercises a different aspect of the operating system, such as disk-file operations, process creation, user virtual memory operations, pipe I/O, and compute-bound arithmetic loops
.
An AIM7 benchmark run is composed of a sequence of subruns with the number of tasks incrementing by one between each subrun. Each subrun goes until each of its tasks has completed its set of jobs. Each subrun reports a metric of jobs completed per minute, with the final report for the overall benchmark being a table of that throughput metric versus number of tasks. A given system will have a peak number of tasks N at which the jobs per minute is maximized. Either N or the value of the jobs per minute at N is typically used as the metric of interest.
References
Benchmarks (computing) |
https://en.wikipedia.org/wiki/List%20of%20Fashion%20House%20episodes | This is a list of episodes for the single season MyNetworkTV telenovella Fashion House.
Episodes
These episodes aired as a part of MyNetworkTV's weekday primetime schedule.
Series recaps
Highlights episodes
External links
Fashion House|Fashion House |
https://en.wikipedia.org/wiki/ORYX | ORYX is an encryption algorithm used in cellular communications in order to protect data traffic. It is a stream cipher designed to have a very strong 96-bit key strength with a way to reduce the strength to 32-bits for export. However, due to mistakes the actual strength is a trivial 16-bits and any signal can be cracked after the first 25–27 bytes.
It is one of the four cryptographic primitives standardized by TIA's for use in their digital cellular communications standards TDMA and CDMA.
Algorithm description
ORYX is a simple stream cipher based on binary linear-feedback shift registers (LFSRs) to protect cellular data transmissions (for wireless data services).
The cipher ORYX has four components: three 32-bit LFSRs which labeled as LFSRA, LFSRB and LFSRK, and an S-box containing a known permutation P of the integer values 0 to 255.
The feedback function for LFSRK is defined as:
Lt + 32 = Lt + 28 ⊕ Lt + 19 ⊕ Lt + 18 ⊕ Lt + 16 ⊕ Lt + 14 ⊕ Lt + 11 ⊕ Lt + 10 ⊕ Lt + 9 ⊕ Lt + 6 ⊕ Lt + 5 ⊕ Lt + 1 ⊕ Lt
The feedback functions for LFSRA are defined as:
Lt + 32 = Lt + 26 ⊕ Lt + 23 ⊕ Lt + 22 ⊕ Lt + 16 ⊕ Lt + 12 ⊕ Lt + 11 ⊕ Lt + 10 ⊕ Lt + 8 ⊕ Lt + 7 ⊕ Lt + 5 ⊕ Lt + 4 ⊕ Lt + 2 ⊕ Lt + 1 ⊕ Lt
and
Lt + 32 = Lt + 27 ⊕ Lt + 26 ⊕ Lt + 25 ⊕ Lt + 24 ⊕ Lt + 23 ⊕ Lt + 22 ⊕ Lt + 17 ⊕ Lt + 13 ⊕ Lt + 11 ⊕ Lt + 10 ⊕ Lt + 9 ⊕ Lt + 8 ⊕ Lt + 7 ⊕ Lt + 2 ⊕ Lt + 1 ⊕ Lt
The feedback function for LFSRB is:
Lt + 32 = Lt + 31 ⊕ Lt + 21 ⊕ Lt + 20 ⊕ Lt + 16 ⊕ Lt + 15 ⊕ Lt + 6 ⊕ Lt + 3 ⊕ Lt + 1 ⊕ Lt
See also
A5/1, used in the GSM cellular telephone standard.
CMEA, Cellular Message Encryption Algorithm.
Notes
External links
Brief description at Kremlinencrypt.com
Cryptanalysis of Mobile Phone Cryptology
Stream ciphers |
https://en.wikipedia.org/wiki/ScrapBook | ScrapBook is an extension for the Mozilla Firefox web browser which adds enhanced scrapbooking, page saving, bookmarking, and notetaking functionality.
ScrapBook saves web pages in the local computer. However, it can be used in combination with a synchronization service so that the data is accessible from other devices.
As Firefox no longer supports legacy add-ons since version 57, the development of ScrapBook has been stopped and it is now referred as "legacy ScrapBook". It still works in a Firefox fork that supports the legacy XUL/XPCOM framework, such as Pale Moon and Waterfox. There are also successor browser extension projects that provides similar features in modern browsers, such as WebScrapBook and ScrapBee.
Legacy projects
ScrapBook
ScrapBook was initially developed at Murota Laboratory, which is a member of the Chair of Human Resource Development in the Department of Human System Science at Graduate School of Decision Science and Technology, Tokyo Institute of Technology. It is currently maintained by Gomita.
ScrapBook won the "Most Useful Upgraded Extension" award in Mozilla's 2006 "Extend Firefox" competition.
ScrapBook X
The development of ScrapBook has been slow since around 2012, and many issues has remained unfixed. Several clones has been created, such as ScrapBook Plus, ScrapBook Plus 2 and ScrapBook Lite, but development of all of them has been discontinued.
Danny Lin took over and created ScrapBook X, which is built on the source code of its successors. It keeps mostly the architecture of ScrapBook, but has added new features and bug fixes. The project also added or took over several Firefox add-ons that extend the functionality of ScrapBook, such as:
ScrapBook X MAF Creator, which converts the ScrapBook data items into MAFF format (open format enabling whole webpages to be saved in a single file [renaming the extension in the .zip extension will make the archive accessible even by web browsers that do not support the format]), which can be opened with Firefox's MAF add-on.
ScrapBook X CopyPageInfo, which copies to clipboard the information of single or multiple ScrapBook data items with the possibility to format it in pre-defined or custom formats, which is useful for creating formatted bibliography references, for example in BibTeX.
ScrapBook X AutoSave, which automatically captures webpages on browsing them.
ScrapBook X File Converter, which converts other formats (, , , , , etc.) into ScrapBook X export format or back, which can then be imported into ScrapBook or ScrapBook X. It also allows the backup of the whole ScrapBook or ScrapBook X data folder.
Analysis by Max Planck Institute
The Max Planck Institute for the History of Science has published an article about digital scrapbooking ("Digital Scrapbook – can we enable interlinked and recursive knowledge equilibrium?") where Scrapbook X is thoroughly analysed and discussed as an example of scrapbooking tool for scholars:
The abstract of this article addit |
https://en.wikipedia.org/wiki/Young%20Generation%20Network | The Young Generation Network, or YGN, is a branch of the Nuclear Institute founded in 1996. It is a British version of the European Young Generation Network created earlier in Sweden by Jan Runermark, a president of ABB Atom who had been concerned with preserving the know-how of retiring nuclear-energy pioneers and who perceived a need for greater efforts to retain young professionals. The YGN, which is open to NI members under the age of 37, organizes lectures, speaking competitions, and facility tours for new nuclear workers in Great Britain. It also conducts its own lobbying efforts, serves as a source for journalists seeking information about the nuclear-industry labour market and promotes careers in science and engineering in schools, colleges and universities.
The UK's objectives are based on those established by the European Nuclear Societies, which are to:
focus on the next generation
promote knowledge in a wide perspective of the nuclear industry
transfer the 'know-how' within generations
provide a platform for:
- personal networks
- exchange of experience
- exchange of best practice across companies
- development of nuclear technology
- recruitment and job opportunities
- career development.
Chairs
Mike Roberts 2019
Rob Ward 2020
Hannah Paterson 2021
Notes
External links
YGN - The NI YGN website, contains lots of information on the work of the YGN and links to useful sites
Nuclear Institute
Nuclear Industry Association - Trade association and information body for the UK civil nuclear industry
European YGN links
References
1 YGN Aims
2 Objectives for a Young Generation Network
Nuclear industry organizations |
https://en.wikipedia.org/wiki/ATHENS%20Programme | The ATHENS Programme (for Advanced Technology Higher Education Network/Socrates) is a 1-week exchange session, held twice a year (in March and in November), by a network of European higher education institutions (universities, universities of technology, Grandes Ecoles...).
The programme is coordinated by ParisTech.
History
Created in 1996, it was initially supported by the European Union through the Socrates programme (from 1997 to 2001). It is now self-funded by the member institutions.
It is a merger of the 'Semaine Européenne' ('European Week') held by ParisTech from 1992 to 1999, and the Leuven Network ERASMUS Programme held by European institutions from 1990 to 1997.
Courses
The courses proposed during sessions cover not only the spectrum of the members' fields, but also an opening on arts and humanities.
Activities
During the week, the host university is supposed to organize activities for the foreign students in the city, to help them discover another culture. Most often, it will consist in a tour of the city a 5-day course on a specific subject and some nights with the local students.
Members
AUTh Thessaloniki
BME Budapest
TU Delft
KU Leuven
UCLouvain
IST Lisbon
UP Madrid
Politecnico di Milano
TU Munich
CTU Prague
KTH Stockholm
NTNU Trondheim
TU Wien
Warsaw University of Technology
ITU Istanbul
ParisTech:
Chimie ParisTech (ENSCP)
Institut d'Optique Graduate School (IOGS)
AgroParisTech
Ecole Nationale des Ponts et Chaussées (ENPC)
Ecole des ingenieurs de la Ville de Paris (EIVP)
Ecole Nationale de la Statistique et de l'Administration Economique (ENSAE)
Ecole Nationale Superieure des Arts et Métiers (ENSAM)
Ecole Nationale Superieure des Mines de Paris (ENSMP)
Télécom ParisTech
Ecole Nationale Superieure de Techniques Avancées (ENSTA)
École supérieure de physique et de chimie industrielles de la ville de Paris (ESPCI)
Note: Not all members participate in both sessions.
Notes
External links
The ATHENS Programme website: link ATHENS Programme
Universities and colleges in France
Educational institutions established in 1996
1996 establishments in France |
https://en.wikipedia.org/wiki/Surface%20computing | Surface computing is the use of a specialized computer GUI in which traditional GUI elements are replaced by intuitive, everyday objects. Instead of a keyboard and mouse, the user interacts with a surface. Typically the surface is a touch-sensitive screen, though other surface types like non-flat three-dimensional objects have been implemented as well. It has been said that this more closely replicates the familiar hands-on experience of everyday object manipulation.
Early work in this area was done at the University of Toronto, Alias Research, and MIT. Surface work has included customized solutions from vendors such as LM3LABS or GestureTek, Applied Minds for Northrop Grumman. Major computer vendor platforms are in various stages of release: the iTable by PQLabs, Linux MPX, the Ideum MT-50, interactive bar by spinTOUCH, and Microsoft PixelSense (formerly known as Microsoft Surface).
Surface types
Surface computing employs the use of two broad categories of surface types, flat and non-flat. The distinction is made not only due to the physical dimensions of the surfaces, but also the methods of interaction.
Flat
Flat surface types refer to two-dimensional surfaces such as tabletops. This is the most common form of surface computing in the commercial space as seen by products like Microsoft's PixelSense and iTable. The aforementioned commercial products utilize a multi-touch LCD screen as a display, but other implementations use projectors. Part of the appeal of two-dimensional surface computing is the ease and reliability of interaction. Since the advent of tablet computing, a set of intuitive gestural interactions have been developed to complement two-dimensional surfaces. However, the two-dimensional plane limits the range of interactions a user is able to perform. Furthermore, interactions are only detected when making direct contact with the surface. In order to afford the user a wider range of interaction, research has been done to augment the interaction schemes for two-dimensional surfaces. This research involves using the space above the screen as another dimension for interaction, so, for example, the height of a user's hands above the surface becomes a meaningful distinction for interaction. This particular system would qualify as a hybrid that uses a flat surface, but a three-dimensional space for interaction.
Non-flat
While most work with surface computing has been done with flat surfaces, non-flat surfaces have become an interest with researchers. The eventual goal of surface computing itself is tied to the notion of ubiquitous computing "where everyday surfaces in our environment are made interactive". These everyday surfaces are often non-flat, so researchers have begun exploring curved and three-dimensional modes. Some of these include spherical, cylindrical and parabolic surfaces. Including a third dimension to surface computing presents both benefits and challenges. One of these benefits is an extra dimension of interac |
https://en.wikipedia.org/wiki/3wPlayer | 3wPlayer is malware that disguises itself as a Media player. It can infect computers running Microsoft Windows. It is designed to exploit users who download video files, instructing them to download and install the program in order to view the video. The 3wPlayer employs a form of social engineering to infect computers. Seemingly desirable video files, such as recent movies, are released via BitTorrent or other distribution channels. These files resemble conventional AVI files, but are engineered to display a message when played on most media player programs, instructing the user to visit the 3wPlayer website and download the software to view the video.
The 3wPlayer is infected with Trojan.Win32.Obfuscated.en
According to Symantec, 3wPlayer "may download" a piece of adware they refer to as Adware.Lop, which "adds its own toolbar and search button to Internet Explorer".
A Perl script posted online can reportedly decrypt 3wplayer files back into AVI. This claim has been tested with mixed results, as the intended AVI file is rarely the desired video file. Some developers have made an application to automatically identify 3wPlayer encrypted files.
Clones
There are multiple 3wPlayer clones:
DivoCodec and X3Codec
The DivoCodec or Divo Codec or X3Codec has also been identified as a trojan similar to 3wPlayer. Users are instructed to download the codec in order to view or play an AVI/MP4/MP3/WMA file, often downloaded via P2P programs.
Instead of actual codecs, DivoCodec installs malware on the users computer. The DivoCodec is polymorphic and can change its structure. It has also been known to write to another process' virtual memory (process hijacking).
DomPlayer
The DomPlayer is similar to the DivoCodec and 3wPlayer. Users are also instructed to download the player in order to view an AVI file.
As with DivoCodec, false .avi are easily spotted because of the duration of the file, usually lying at 10–12 seconds, of which one can conclude that there is no chance that that file may be a film/TV series, despite the size of the file. This is not always the case however, as many distributors have recently begun falsifying the file meta data to display normal durations and file sizes.
x3 player
x3 player is similar to DomPlayer, and instructs users to download this player to view the avi file. Also circulated is a 5-second ASF video which is disguised as an MP3 file instructing users to install this player.
References
External links
Symantec security briefing
Clears the avi file from any player related data
[https://web.archive.org/web/20071102131716/http://www.goitexpert.com/entry.cfm?entry=DomPlayer-3wPlayer-Fix Same as above, just with a little explanation (removes the faulty header from avi files)
Rogue software
Software that bundles malware |
https://en.wikipedia.org/wiki/ANobii | Anobii (stylized, anobii) is a social networking site aimed at readers. Its website was launched in 2006 by Greg Sung. It was acquired by the publisher Mondadori in 2014 from a venture backed by HMV Group, HarperCollins, Penguin , and Random House.
The service allows individuals to catalog their books and rate, review and discusses them with other readers. The service is available via the Anobii website and iOS and Android apps. The apps allow individuals to barcode scan books and read both community and expert reviews.
Anobii has readers in over 20 countries but is most popular in Italy.
On 2 March 2011 it was announced that in 2010 Anobii had been acquired by a UK startup led by HMV Group and supported by HarperCollins, Penguin , and The Random House Group and that the company is working on a new version of the website with the possibility to buy books and most of all ebooks.
On 12 June 2012, it was announced that HMV had sold its interest to UK supermarket company Sainsbury's for £1.
In January 2013, it was announced that beta.anobii.com will be known as eBooks by Sainsbury's from 20 February 2013. Anobii.com will continue to exist as a social network for book lovers.
In January 2014, Anobii Ltd was sold to the Italian publisher Arnoldo Mondadori Editore.
On 29 May 2019, Anobii Ltd was sold to the Italian mobile apps and software developer, Ovolab.
The word "Anobii" comes from Anobium Punctatum, the Latin name for the most common bookworm.
See also
Babelio
BookArmy
Bookish
Douban
Goodreads
LibraryThing
Shelfari
Librarish
References
External links
Book websites
Social cataloging applications
Italian social networking websites
Internet properties established in 2006
Arnoldo Mondadori Editore |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.