source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Design%20layout%20record
A design layout record (DLR) or circuit layout record (CLR) is used in the telecommunication industry to describe the detailed design path of a completed circuit, including all equipment and network components from one end (often referred as A-Loc or A-end) of the circuit to the other (Z-Loc or Z-end). It may be detailed enough to include location, floor, row, rack, panel and port for each circuit component or it may simply refer to another previously engineered circuit. A DLR may describe an end-to-end circuit that comprises physical or virtual circuits. As an example, a physical facility would include a panel, rack and port, while a virtual facility may be a channel on a channelized circuit, such as a T1 on a previously engineered DS3. Explanation There are two parts to a circuit: Physical design/path Logical design/path The design team is responsible to find the best, lowest-cost path for the circuit being designed, and get the physical line provisioned. When their role is complete, the order is passed to another team who take care of establishing logical design and accessibility of the circuit. Every network element that is part of the circuit needs to be built and checked. The DLR provides a systematic way to identify the network elements and their attributes. With the aid of the DLR, a team installs the circuit and tests it to check that it meets the customer's specifications. There are many ways to prepare a DLR. Many include: Network elements, port and channel assignment Cross connects: hard and soft Rings Location codes for sites where equipment is housed IP address, slots for network elements and other fine details as such See also Electronic circuit design References Telecommunications engineering
https://en.wikipedia.org/wiki/Fiber%20to%20the%20telecom%20enclosure
Fiber to the Edge (FTTE), fiber to the telecom enclosure (FTTTE), fiber to the zone (FTTZ), or fibre to the cabinet (FTTC) in the UK, is a networking approach used in the enterprise building (hotels, convention centers, office buildings, hospitals, senior living communities, Multi-Dwelling Units, stadiums, etc.). It is a standards-compliant structured cabling system architecture that extends the optical fiber backbone network from the equipment room directly to a telecommunications enclosure (TE), access node, ONT, or media converter installed in a common space to serve a number of users or devices in a nearby area. In other words, fiber reaches directly from the main distribution frame of a building out to the edge devices, eliminating or reducing the need for intermediate distribution frames. Implementation Its implementation is based on the TIA-569-B “Pathways and Spaces” technical standard, which defines the Telecommunications Enclosure (TE), and TIA/EIA-568-B.1 Addendum 5, which defines the cabling when a TE is used. The FTTE architecture allows for many media choices from the TE to the work area; it may be balanced twisted pair copper, multi-mode optical fiber, or even wireless if an access point is installed in or near the TE. Depending on the user’s needs, FTTE can be deployed in low-density or high-density configurations. A low-density system might use one or two inexpensive 8-port Ethernet mini-switches as an example (these switches have eight 10/100 Mbit/s Ethernet copper ports and one 1 Gbit/s Ethernet fiber uplink). A high-density FTTE design might use commonly available 24- or 48-port switches (these switches are configured with one 1 Gbit/s uplink port per twelve 100BASE-TX user ports). This relatively high work area-to-backbone port ratio provides better performance than is typically provided to enterprise users. Both low and high-density FTTE architectures provide excellent performance in terms of bandwidth delivered to the work area. Pros and cons Advantages Low Cost Non-blocking or low-blocking performance better supports convergence Extremely flexible to deploy; supports Moves, Adds & Changes Enables consolidation of electronics into a centralized Telecommunications Room Allows the use of a variety of media from the TE to the user Disadvantages TE location is near the user and must be secured See also BICSI Fiber in the loop Fiber to the x Fiber-optic communication Hybrid fibre-coaxial Network architecture References External resources TIA Fiber Optic Standardization Subcommittees Fiber Optics LAN Section of the Telecommunications Industry Association Fiber Optics Association Telecom enclosure Local loop
https://en.wikipedia.org/wiki/Shuguang
Shuguang (曙光) may refer to: Shuguang (spacecraft), a proposed Chinese crewed spacecraft that was never built Sugon or Shuguang, Chinese supercomputer manufacturer SG Automotive or Shuguang Automotive, a Chinese vehicle and component manufacturer Break Free (TV series), a 2013 Malaysian-Singaporean TV series Places in China Heilongjiang Shuguang Township, Heilongjiang, a township in Keshan County Shuguang Subdistrict, Daxing'anling, a subdistrict in Jiagedaqi District, Daxing'anling Prefecture Shuguang Subdistrict, Yichun, a subdistrict in Cuiluan District, Yichun Jilin Shuguang, Meihekou, a town in Meihekou Shuguang Subdistrict, Changchun, a subdistrict in Nanguan District, Changchun Liaoning Shuguang, Liaoyang, a town in Liaoyang Shuguang Subdistrict, Anshan, a subdistrict in Lishan District, Anshan Shuguang Subdistrict, Panjin, a subdistrict in Xinglongtai District, Panjin Other provinces Shuguang Subdistrict, Beijing, a subdistrict in Haidian District, Beijing Shuguang, Guizhou, a town in Nayong County, Guizhou Shuguang Township, Inner Mongolia, a township in Bayannur, Inner Mongolia Shuguang Township, Sichuan, a township in Santai County, Sichuan Shuguang Township, Yunnan, a township in Guangnan County, Yunnan
https://en.wikipedia.org/wiki/BSN
BSN may refer to: Bachelor of Science in Nursing, a nursing degree Badan Standardisasi Nasional, an Indonesian standardization agency Bally Sports North, American regional sports network owned and operated by Bally Sports Baloncesto Superior Nacional, basketball league in Puerto Rico Bank Simpanan Nasional, Malaysia Biotechnology Society of Nepal Blue Square North, English football league Body sensor network Boussois-Souchon-Neuvesel, French company, renamed Groupe Danone in 1994 The British School in the Netherlands, The Hague Broadcasting System of Niigata, Japan Burgerservicenummer, the national identification number in the Netherlands
https://en.wikipedia.org/wiki/Windows%2093
Windows 93 (often stylised as WINDOWS93) is a website stylised to look and work as an operating system, often called a Web OS, and a parody of the Windows 9x series. It was developed and is managed by two French musicians and programmers who go by the handles jankenpopp and Zombectro. The site features several web applications which reference and feature Internet memes from the late 1990s and early 2000s. History Version 0 Version 0 is an initial proof-of-concept build that jankenpopp gave to Zombectro. It features an interactive start menu and draggable icons. Version 1 Version 1 is the first release version, finished on November 1, 2014. It added more functionality to windows and the start menu, and introduced several apps (for a total of 38), including a fully-functional web browser. Version 2 Version 2 is the previous version of Windows 93, published on June 10, 2017. Version 2 added the A: drive which allows users to store files, run custom JavaScript and apply custom CSS from the browser's local storage. It introduced several more apps, including Trollbox, a web chat application; and Bindowzuchan, an imageboard (both of which are now discontinued). Version 3 Version 3 was announced on October 24, 2022, and fully released on February 14, 2023. As of November, an e-shop was opened, along with a letter from the developers and a roadmap of version 3. See also eyeOS ChromeOS References External links Windows 93 Wiki Windows 93 Development Completed, Try It in Your Browser Right Here, Softpedia, March 6, 2015 Websites
https://en.wikipedia.org/wiki/Limited-run%20series
In television programming, a limited-run series (or simply limited series) is a program with an end date and limit to the number of episodes. For instance, The Academy of Television Arts & Sciences' definition specifies a "program with two or more episodes with a total running time of at least 150 program minutes that tells a complete, non-recurring story, and does not have an on-going storyline and/or main characters in subsequent seasons." Limited-run series are represented in the form of telenovelas in Latin America and serials in the United Kingdom. The shortest forms of limited-run series have two or three parts, usually described as "made-for-television film" or miniseries in the United States. Longer forms are often reality television or scripted dramas. Parameters Some limited series do not have main characters recurring between seasons or a storyline that spans seasons. Series with five episodes or fewer per season—such as the BBC/Masterpiece coproduction Sherlock—also are considered limited series due to their short run, even if main characters and story lines do migrate across seasons. Series with a limited eight-to-twelve-episode run are typically ordered to fill mid-season television network gaps. Classification Limited series have the potential to be renewed without a required number of episodes as a typical order per season. Under the Dome, Killer Women, and Luther were originally marketed as limited series. Individual season-length stories of anthology series such as American Horror Story, Fargo, and True Detective are also described as "limited series", which the Primetime Emmys have changed to their miniseries/limited series category to accommodate. Actors may choose to take part in limited-run series because their set start and end dates make scheduling other projects easier. History In 2015, the Academy of Television Arts & Sciences changed its guidelines on how Emmy nominees are classified, with shows with a limited run all referred to as "limited series" instead of "miniseries". This is a reversion back to 1974, when the category was named "outstanding limited series". It had been changed to "outstanding miniseries" in 1986 and then added to the "made for television films" category in 2011. Miniseries were brought back out in 2014, accommodating such limited series as HBO's Olive Kitteridge, History's Texas Rising, IFC's The Honorable Woman, and PBS' Wolf Hall, as well as TV movies such as HBO's Bessie and National Geographic's Killing Jesus. Development United States Short-term reality television like Bravo's Eat, Drink, Love, scripted dramas like Netflix's Black Mirror, and individual seasons of anthology series are examples of limited-run series that appear on American television networks. Latin America In the 1950s, telenovelas emerged as Latin limited series. These low-budget Spanish and Portuguese shows were modeled after American soap operas in style and form. The programs follow a story arc that ends at the e
https://en.wikipedia.org/wiki/Robot%20Battle%20%28Macintosh%20game%29
Robot Battle is a programming game developed in 1991 by Blue Cow Software for the Apple Macintosh where players design and code adaptable battling robots. Its idea is similar to RobotWar. The concept of the game was invented by Toby Smith in a BASIC program "when people with 512K of RAM and two floppy drives were power-users", as he states in the game manual. The game consists of a battleground and two robots. Before the game starts, each robot is preprogrammed using a BASIC-like language called RIPPLE ("Robot Instructional Programming Language"). 0–99 humans can also be placed into the battleground to throw the robots with hand grenades. The programs are checked for syntax and the game starts. The robot to survive the longer is the winner. The RIPPLE language programs consist of logic commands, such as flow of control statements; and action commands, that actually make the robot perform an action, such as fire a weapon. To perform one action command takes the same time as to perform 99 logic commands. External links Demo version of Robot Battle as a StuffIt archive in FUNET's FTP archive of old Macintosh games 1991 video games Classic Mac OS-only games Classic Mac OS games Programming games Video games about robots Video games developed in the United States
https://en.wikipedia.org/wiki/Laz%2C%20Nik%C5%A1i%C4%87
Laz () is a village in the municipality of Nikšić, Montenegro. Demographics According to the 2011 census, its population was 135. References Geographic Names Server database entry for Laz, Montenegro Populated places in Nikšić Municipality
https://en.wikipedia.org/wiki/KXLE-FM
KXLE-FM is a radio station located in Ellensburg, Washington, United States, operating on a frequency of 95.3 MHz with an effective radiated power of 51,000 watts. As of 2019, the programming format of the station is country music. The format has mostly been the same since its launch in 1972. The transmitter tower for the station is located on Lookout Mountain, east of Cle Elum . The station can be heard as far as Snoqualmie Pass and the central Columbia Basin. References External links KXLE-FM Website XLE-FM Kittitas County, Washington Country radio stations in the United States Radio stations established in 1972 1972 establishments in Washington (state)
https://en.wikipedia.org/wiki/Ping-pong%20scheme
Algorithms said to employ a Ping-Pong scheme exist in different fields of software engineering. They are characterized by an alternation between two entities. In the examples described below, these entities are communication partners, network paths or file blocks. Databases In most database management systems durable database transactions are supported through a log file. However, multiple writes to the same page of that file can produce a slim chance of data loss. Assuming for simplicity that the log file is organized in pages whose size matches the block size of its underlying medium, the following problem can occur: If the very last page of the log file is only partially filled with data and has to be written to permanent storage in this state, the very same page will have to be overwritten during the next write operation. If a crash happens during that later write operation, previously stored log data may be lost. The Ping-Pong scheme described in Transaction Processing eliminates this problem by alternately writing the contents of said (logical) last page to two different physical pages inside the log file (the actual last page i and its empty successor i+1). Once said logical log page is no longer the last page (i.e. it is completely filled with log data), it is written one last time to the regular physical position (i) inside the log file. This scheme requires the usage of time stamps for each page in order to distinguish the most recent version of the logical last page one from its predecessor. Networking Internet A functionality which lets a computer A find out whether a computer B is reachable and responding is built into the Internet Control Message Protocol (ICMP). Through an "Echo Request" Computer A asks B to send back an "Echo Reply". These two messages are also sometimes erroneously called "ping" and "pong". Routing In Routing, a Ping-Pong scheme is a simple algorithm for distributing data packets across two paths. If you had two paths A and B, then the algorithm would randomly start with one of the paths and then switch back and forth between the two. If you were to get the next path from a function call, it would look like this in Python: def get_next_path(): while True: yield 'A' yield 'B' References Algorithms
https://en.wikipedia.org/wiki/Jonny%20Quest%3A%20Cover-Up%20at%20Roswell
Jonny Quest: Cover-Up at Roswell is a computer game released by Virgin Sound and Vision for the series The Real Adventures of Jonny Quest in August 1996. Gameplay Gameplay consists of clicking areas on images of locations—whether the Serengeti plains or Manhattan—to navigate paths in search of the objects. Occasionally, players encounter mini games, such as the task of guiding a diving bell away from rocks or shooting rats with a slingshot. Though characters appear on screen, there is no dynamic movement save for mini games. Allowing access to personal and government files at two points in the game, Roswell contains a vehicle guide to Real Adventures and several in-universe e-mails. These communications range from dossiers on the Quest team to a demand from a restaurant owner that Race reimburse him for damages caused when the bodyguard mistook a busboy for a criminal mastermind. Plot The Quests are hindered by Jeremiah Surd and the Men in Black of General Tyler, who plan to misuse the technology. Development Virgin created the game on a budget of $1 million, initially titling it Escape from Quest World. Developers recycled fifty minutes of footage and art from six season one episodes to construct a new story concerning alien artifacts and an alien's liberation from an autopsy at The Pentagon. Virgin handled all marketing, sales, and distribution, while Turner helped cross-promote the game. Turner New Media announced that Virgin's "non-violent adventure games suitable for pre-teen girls and boys, fits...our vision of what family entertainment should be." Virgin designed certain segments in 3D and included special Chromatek plastic viewing glasses with game copies. Footage voices were dubbed over by Michael Banyaer as Hadji, Charles Howerton as Dr. Quest, and the season two cast. Virgin hoped the game would provide 20–25 hours of game play for adults and 80-100 for children. Reception The game's music featured a "high-intensity orchestral sound" prone to monotony. One reviewer cited a lack of replay value and different modes of difficulty as weaknesses, but concluded that Roswell offered "good entertainment and variety". Critics were divided over the puzzles' difficulty, naming it both "ingenious" and "elementary". Peter Scisco of ComputerLife wrote that his kids had difficulty with the small mouse cursors, and criticized some of the puzzles for relying on "reflexes, not logical thinking." FamilyPC's testers agreed that the early puzzles were difficult but offered a sense of achievement. Entertainment Weekly's reviewer found the challenges too easy, considering them unimaginative "Pac-Man rip-offs and dopey jigsaws," and rated the game B+. Scisco appreciated the nonviolent content and the inclusion of Jessie's strong female character, but named the extraterrestrial story "too familiar". The Sydney Morning Herald warned against buying the game for children "scared easily by baddies," but recommended it for children who would enjoy mental chall
https://en.wikipedia.org/wiki/The%20Lifehouse%20Method
The Lifehouse Method was an Internet site where applicants could sit for an electronic musical portrait made up from data they enter into the website. This website was the result of a collaboration between the Who's principal songwriter and composer Pete Townshend, composer Lawrence Ball and software developer Dave Snowdon. The website was operated by Eel Pie Recording Production, Limited, a company set up in 1970 by Pete Townshend. History The Lifehouse Method grew out of Pete Townshend's unfinished 1971 science-fiction album Lifehouse, written for the Who. Although Townshend originally intended Lifehouse as a multi-media, audience-participation musical production to follow the Who's Tommy, difficulties in funding and implementing the project led to its release as the Who's album Who's Next instead. Although some of the key Lifehouse songs were left off Who's Next, the basic concept of the opus is still recognizable within the album. In Lifehouse Townshend predicted a future wherein the population was forced inside by heavy pollution and connected in their homes to an internet-like "Grid" through which media moguls provided programmed entertainment. Rebels escape this situation and gather together to perform a live musical concert which generates a nirvana like state of universal unity. Townshend hoped to link the audience in a way that would reflect the personalities of the audience members. To do this, he adapted VCS3 and ARP synthesizers and a quadraphonic PA to create a machine capable of generating and combining personal music themes written from computerized biographical data. He expected these thematic components would merge to form a "one note" or "universal chord" representing the audience, and by extrapolation, all of humanity. Although the original project proved too ambitious for the technology available in 1971, Townshend revisited the Lifehouse concept in the Who's album Who Are You and in his concept album Psychoderelict. He continued discussion of these themes in his 2005 novella The Boy Who Heard Music, which in turn was the inspiration for the second half of the Who's Endless Wire, "Wire & Glass". "Wire & Glass" was developed into an unfinished musical workshopped at Vassar College, in addition to Townshend intended the story to become an animated film. The Lifehouse Method website was discontinued in July 2008, having generated over 10,000 pieces of unique, customized music. In January 2012 Method Music by Lawrence Ball, consisting of music created by Ball with assistance from Townshend using the Lifehouse Method, was released by Navona Records. Idea The Lifehouse Method is software that will create a musical portrait. The applicants registered at the website and received a password which allowed them to create a composition. The website musical team expected to choose some of these portraits for further development into larger compositions or songs that would be presented in a concert or concert series, with the appli
https://en.wikipedia.org/wiki/Pasan%20Ko%20ang%20Daigdig
(International title: World on My Shoulders / ) is a Philippine television drama series broadcast by GMA Network. Based on a 1987 Philippine film of the same title, the series is the fourth installment of Sine Novela. Directed by Joel Lamangan, it stars Yasmien Kurdi, JC de Vera and Gina Alajar. It premiered on September 10, 2007 on the network's Dramarama sa Hapon line up replacing Pati Ba Pintig ng Puso. The series concluded on January 11, 2008 with a total of 89 episodes. Cast and characters Lead cast JC de Vera as Carding Yasmien Kurdi as Lupe Velez Gina Alajar as Metring Velez Supporting cast Gary Estrada as Kadyo Alessandra De Rossi as Luming Polo Ravales as Tony Maureen Larrazabal as Bunny Mart Escudero as Isko Jennica Garcia as Janet Marcus Madrigal as Griego Karen delos Reyes as Sosima Jenine Desederio as Ruffy Racquel Vilavicencio as Veron Tony Mabesa as Ben Jim Pebangco as Herman Nonie Buencamino as Efren Sweet Ramos as Josie Kevin Santos as Gerard Isabel Granada as Rica Charlie Davao as Ignacio Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of earned a 19.8% rating. While the final episode scored a 20.7% rating. References External links 2007 Philippine television series debuts 2008 Philippine television series endings Filipino-language television shows GMA Network drama series Philippine television series based on films Television shows set in the Philippines
https://en.wikipedia.org/wiki/Paramorphism
In formal methods of computer science, a paramorphism (from Greek παρά, meaning "close together") is an extension of the concept of catamorphism first introduced by Lambert Meertens to deal with a form which “eats its argument and keeps it too”, as exemplified by the factorial function. Its categorical dual is the apomorphism. It is a more convenient version of catamorphism in that it gives the combining step function immediate access not only to the result value recursively computed from each recursive subobject, but the original subobject itself as well. Example Haskell implementation, for lists: cata :: (a -> b -> b) -> b -> [a] -> b para :: (a -> ([a], b) -> b) -> b -> [a] -> b ana :: (b -> (a, b)) -> b -> [a] apo :: (b -> (a, Either [a] b)) -> b -> [a] cata f b (a:as) = f a (cata f b as) cata _ b [] = b para f b (a:as) = f a (as, para f b as) para _ b [] = b ana u b = case u b of (a, b') -> a : ana u b' apo u b = case u b of (a, Right b') -> a : apo u b' (a, Left as) -> a : as See also Morphism Morphisms of F-algebras From an initial algebra to an algebra: Catamorphism From a coalgebra to a final coalgebra: Anamorphism An anamorphism followed by an catamorphism: Hylomorphism Extension of the idea of anamorphisms: Apomorphism References External links Explanation on StackOverflow: , , Blogs: Talks: Recursion schemes Haskell package Recursion schemes
https://en.wikipedia.org/wiki/Unique%20Whips
Unique Whips is an American reality television show that aired on the now-defunct Speed network from 2005 to 2008. It premiered on February 8, 2005, The show follows the work of Unique Autosports, based in Long Island, New York, as they customize celebrity automobiles. It was created and Produced by Steve Hillebrand and Corey Damsker of Hollywood East. The customization generally consists of car stereo, wheels, custom paint and interior work. Celebrities whose cars were featured on the show include P. Diddy, DJ Pauly D, Jeff Gordon, Tony Stewart, Pam Anderson, Patti LaBelle, 50 Cent, LeBron James, Carmelo Anthony, Marcus Camby, Fat Joe, and Tom Wolfe. Spinoffs and related works Unique Autosports: Miami ran on the Spike network for one season. On 2 February 2016, a sequel television series featuring Unique Autosports, Unique Rides, premiered on Discovery's Velocity (now Motor Trend) channel. The first episode featured Castro modifying a Cadillac Escalade for Jason Derulo. The series ran for 3 seasons. Celebrity rides P. Diddy - 2 Jeep Wrangler Unlimited B-Real – 2007 Nissan Pathfinder, 2007 Nissan Armada Pharrell Williams - 1998 Nissan Maxima, 1993 Toyota Supra, 1994 BMW 3 Series 1988 Hyundai Excel Sedan LeBron James - 2003 Hummer H2, Ferrari F430 Orlando Brown - 1996 Chevrolet Impala SS, 2007 Ford F-650 50 Cent - 2007 Lamborghini Murcielago Roadster, 2006 Rolls-Royce Phantom, 2005 Chrysler 300C, 2008 Pontiac G8 Chi-Ali - 2004 Nissan Altima, 2009 Chevrolet Impala, 1995 Ford Mustang Coupe, 2003 Hummer H2, 2000 Toyota Camry, 1997 Ford F-150 Harley Davidson Edition Lloyd Banks - 1972 Chevrolet Impala, 2006 Bentley Continental, Bulletproof SUV, 2003 Hummer H2 KRS-One - Chevrolet Monte Carlo Stock Car Jadakiss - 2004 Range Rover, 2005 Chevrolet Corvette, 2004 Mercedes-Benz S-Class, 2005 Cadillac XLR, GMC Yukon Denali, 2003 Cadillac Escalade, 1997 Chevrolet Tahoe Fat Joe - 2005 Bentley Continental Dewayne Robertson - Dodge Charger SRT8, Land Rover Range Rover, Cadillac Escalade, Hummer H2 Al Harrington - 2007 Cadillac Escalade, Bentley Continental GT Busta Rhymes - Rolls-Royce Phantom, 1997 Ford F-150 Harley Davidson Edition, Lamborghini Diablo, 1988 Chevrolet Caprice Queen Latifah - Lamborghini Murcielago, 1984 Cadillac Hearse, 1973 Chevrolet Impala Convertible Mike McGlone - 2006 Chevrolet Impala, 1995 Cadillac Fleetwood Carmelo Anthony - Lincoln Continental Timbaland - 2002 Porsche Cayenne Charles Barkley - Ferrari 458 Spider, Jaguar XJ220, Hummer H1, Aston Martin Vanquish, Lamborghini Gallardo Tony Yayo - 2003 Hummer H2, Mercedes-Benz CLS-Class Young Buck - 2003 BMW 760li The Game - 2003 Cadillac Escalade Jerricho Cotchery - Bentley Continental Flying Spur Gary Sheffield - Cadillac Escalade Marcus Camby - Hummer H2, Corvette Marcus Banks - Land Rover Range Rover, BMW 745i Byron Leftwich - 1967 Lincoln Continental Convertible Jason Giambi - Cadillac Escalade Nelly - Bentley Continental GT Ruben Sierra - Ford F-150 Harley Davidson Edition truck GZA
https://en.wikipedia.org/wiki/Ukrainian%20Television%20and%20Radio
UTR () is the Ukrainian state owned TV channel targeting a foreign Ukrainian-speaking audience. Programming is provided with English subtitles. The channel is broadcast via satellite in Eurasia and North America, with a high quality signal available in 82 countries. UTR can also be found on cable networks in Russia, Latvia, Kazakhstan and Turkey. Webcast on the official website is also available. The programming consists of Ukrainian produced films, news, cultural and educational programmes as well as programmes of some other Ukrainian channels. UTR broadcasts on VHF Channel 2 and it replaced by UT-2. See also Television in Ukraine The Canadian company Toronto Film Industry has partnered with the Ukrainian Film Industry to develop new TV and Feature Movie products for the new markets emerging across Europe and the world. External links UTR Webcasts: Ukraine, Americas, Europe and Asia Television stations in Ukraine International broadcasters Ukrainian brands Television channels and stations established in 2004 Government-owned companies of Ukraine
https://en.wikipedia.org/wiki/OPEL%20Networks
OPEL Networks Pty Limited was a telecommunications provider that was to establish wholesale broadband services in regional areas of Australia in the form of WiMAX and ADSL2+ via a network of DSLAMs. The network was also to include terrestrial and undersea backhaul. The project is now defunct. It was a 50:50 joint venture between Optus and Elders. Broadband Connect Funding In June 2006, the Australian Department of Communications, Information Technology and the Arts (DCITA) under the then coalition government called for expressions of interest for discussion of how to invest up to A$878 million in funding under Broadband Connect program to provide greater access to broadband services in rural and regional areas at prices comparable to services available in metropolitan areas, $500 million of which was envisaged as being available to infrastructure projects. On 2006-09-21, the government announced they would invest up to $600 million in broadband infrastructure projects in rural, regional and remote Australia under this program. Applications for funding were open until 2006-11-30. On 2007-06-18, in the lead up to a federal election, OPEL Networks was announced as the sole successful bidder, receiving the entire $600 million in funding under the program, as well as an additional allocation of $358 million. This was to be combined with $917 million to be invested by the OPEL Networks joint venture. The awarding of additional funding was met with some debate. The funding agreement was signed on 2007-09-09, which was dependent upon further planning by OPEL and confirmation that it would reach the agreed levels of coverage. The then federal opposition Communications spokesman stated that they would honour the agreement, a stance maintained after winning government two months later, despite their own competing National Broadband Network proposal. On 2008-04-02, it was announced that the funding agreement had been cancelled. The minister cited OPEL's failure to meet the terms of the contract, specifically that analysis of OPEL's detailed maps revealed that it would reach only 72% of under-served premises, a claim refuted by the OPEL joint venture partners, who nevertheless stated that the project would not proceed. Network Infrastructure The OPEL Networks rollout was to include: 1,361 WiMAX sites across all states as well as the Northern Territory and Australian Capital Territory 312 DSLAMs across all states 114 DSLAMs to be built and owned by Optus and made available to OPEL, across all states excluding Tasmania, but including the ACT. 2,400 km of new fibre-optic backhaul, including a new undersea link to Tasmania The venture was also to acquire long term leased links from Optus (10,200 km) and other providers such as Nextgen Networks (2,200 km), as well as establishing a Tasmanian link using Basslink, providing OPEL with a protected link to the island. The selection of WiMAX technology was questioned by some groups, including the the
https://en.wikipedia.org/wiki/Green%20Dot%20%28symbol%29
The Green Dot () is the financing symbol of a European network of industry-funded systems for recycling the packaging materials of consumer goods. The logo is a trademark protected worldwide - it is not a recycling logo. Background The German "Der Grüne Punkt" is considered the forerunner of the European scheme. It was originally introduced by Der Grüne Punkt - Duales System Deutschland GmbH (DSD) in 1990 before the introduction of a Packaging Ordinance under the Waste Act. Since the successful introduction of the German industry-funded dual system, similar Green Dot systems have been introduced in most other European countries. The Green Dot scheme is covered under the European "Packaging and packaging waste directive - 94/62/EC", which is binding on all companies if their products use packaging and requires manufacturers to recover their own packaging. According to the directive, companies are held responsible for the end-of-life management of their packaging - either through self-compliance or joining a s.c. producer responsibility organization (PRO). Environmentalists claim that some countries deliberately turn a blind eye to the European directive. Since its European introduction, the scheme has been rolled out to 31 European countries. Use of the symbol on packaging is voluntary but if it is used, producers need to ensure a valid contract with the respective organizations. The Green Dot is used by more than 130,000 companies, encompassing more than 200 billion packages globally. Concept The Green Dot system was conceived by Klaus Töpfer, Germany's environment minister in the early 1990s. The aim of the Green Dot is to indicate to consumers who see the logo that the manufacturer of the product contributes to the cost of recovery and recycling. This can be with household waste collected by the authorities (e.g. in special bags - in Germany these are yellow), or in containers in public places such as car parks and outside supermarkets. The system is financed by the "Green Dot" licence fee paid by the manufacturers. Fees vary by country and are based on the material used in packaging (e.g. paper, plastic, metal, wood or cardboard). Each country also has different fees for joining the scheme and ongoing fixed and variable fees. Fees also take into account the cost of collection, sorting and recycling methods. In simple terms, the system encourages manufacturers to cut down on packaging as this saves them the cost of licence fees. German dual system of waste collection In 1991, the German government passed a packaging law (Verpackungsverordnung) that requires manufacturers to take care of the recycling or disposal of any packaging material they sell. As a result of this law, German industry set up a "dual system" of waste collection, which picks up household packaging in parallel to the existing municipal waste-collection systems. This industry-funded system is operated in Germany by the Duales System Deutschland GmbH (German for "Dual
https://en.wikipedia.org/wiki/NEPOMUK%20%28software%29
NEPOMUK (Networked Environment for Personal, Ontology-based Management of Unified Knowledge) is an open-source software specification that is concerned with the development of a social semantic desktop that enriches and interconnects data from different desktop applications using semantic metadata stored as RDF. Between 2006 and 2008 it was funded by a European Union research project of the same name that grouped together industrial and academic actors to develop various Semantic Desktop technologies. Implementations Three active implementations of NEPOMUK exist: A C++/KDE-based variant, a Java-based variant, and a commercial version. More versions were created during the EU project between 2006 and 2008, some active beyond the project. KDE NEPOMUK-KDE was originally featured as one of the newer technologies in KDE Software Compilation 4. It used Soprano as the main RDF data storage and parsing library, while handling ontology imports through the Raptor parser plugin and the Redland storage plugin; all RDF data was stored by Virtuoso which also handled full-text indexing. On a technical level, NEPOMUK-KDE allowed associating metadata to various items present on a normal user's desktop such as files, bookmarks, e-mails, and calendar entries. Metadata could be arbitrary RDF. Tagging is the most user-visible metadata application. As the KDE SC 4 series of releases progressed, it became apparent that NEPOMUK was not delivering the performance and user experience that had initially been anticipated. As a result of this, in KDE SC 4.13 a new indexing and semantic search technology Baloo was introduced, with a short transition period allowing applications to be ported and data to be migrated before the removal of NEPOMUK. Baloo initially used SQLite but currently uses LMDB for storage, and Xapian for searching. Zeitgeist The Zeitgeist framework, used by GNOME and Ubuntu's Unity user interface, uses the NEPOMUK ontology, as does the Tracker search engine. Java The Java-based implementation of NEPOMUK was finished at the end of 2008 and served as a proof-of-concept environment for several novel semantic desktop techniques. It features its own frontend (PSEW) that integrates search, browsing, recommendation, and peer-to-peer functionality. The Java implementation uses the Sesame RDF store and the Aperture framework for integrating with other desktop applications such as mail clients and browsers. A number of artifacts have been created in the context of the Java research implementation: WikiModel Refinder by Gnowsis Implementation of the commercial Software as a service product Refinder started in 2009 and a limited beta-version was released in December 2010. Refinder was developed by Gnowsis, a spin-off company of the German Research Centre for Artificial Intelligence (DFKI) (project lead in the NEPOMUK EU project). The start-up was shut down in late 2013, with no plans to make the implementation code available. Refinder uses the same data
https://en.wikipedia.org/wiki/Chop%20Socky%20Chooks
Chop Socky Chooks is a computer-animated action series produced by Aardman Animations, Decode Entertainment, and Cartoon Network Europe that ran on Cartoon Network from 7 March 2008 until 24 July 2009. It was created and directed by Sergio Delfino, a prominent animator at Sony Pictures Imageworks. 26 episodes were produced. The show previously aired on Cartoon Network throughout the United Kingdom, the United States, and much of the world, as well as Teletoon in Canada, and ABC3 in Australia. The name is from "chop socky", which is slang for the Asian martial arts film genre, and "chook", which is an Australian and New Zealand slang reference for chicken. Premise The show is about a trio of kung fu fighting chickens who live and work in a city-sized shopping mall owned by their archenemy, Dr. Wasabi. Characters The Chop Socky Chooks Chickadee "Chick P" Pao (voiced by Shelley Longworth) – Chickadee Pao is the most mature of the team and is the only female, as well as the one with the most leadership skills. In her childhood, she had a best friend named Oni (currently a villain known as Deadeye) whom she would play Blind Man's Bluff. She has personal issues with Dr. Wasabi who destroyed her home to build Wasabi World. Her daytime job is working as an electrician in the pipes of Wasabi World, and she wears historical Chinese female attire. Her battle weapon is her razor fans. She is based on Lucy Liu. K.O. Joe (voiced by Paterson Joseph) – K.O. Joe is the most energetic and brash team member. His daytime job is running a comic book shop. He shows great skills with handling troubled youth and skateboarding, and fancies himself as a ladies' man. His main battle weapon is a grappling hook hair pick, and his biggest fear is insects as he remembers them crawling into his afro as a child. He is also afraid of jelly beans due to having one stuck up his nose as a baby. He eventually learns he is the estranged son of Bantam. He is based on Jim Kelly, and as such, his clothes have a 1970s aesthetic. Charles "Chuckie" Chan (voiced by Rob Rackstraw (U.K.), Chris Hardwick (U.S.)) – Chuckie Chan was once a student of Master Yoshi learning the fighting style "Pow Kung". He wears a stereotypical martial artist's outfit and sports a Fu Manchu moustache, and his daytime job is teaching the youth of Wasabi World his martial arts. He had an old rival named Koby/Kobura. He is known to use proverbs in almost every episode. His battle weapon is his spiritual chi energy. He is based on various Hong Kong martial artists and named after Jackie Chan. His voice changed when the series aired on Cartoon Network in the United States to avoid offending Asian audiences. Main villains Dr. Fish Wasabi (voiced by Paul Kaye) – Dr. Wasabi is the ruler of Wasabi World and is the main antagonist of the show. He is a little piranha that has an astronaut-like attire with water filled inside (so as to allow him to breathe) and speaks in a German accent. He has control of every place
https://en.wikipedia.org/wiki/Kabsch%20algorithm
The Kabsch algorithm, also known as the Kabsch-Umeyama algorithm, named after Wolfgang Kabsch and Shinji Umeyama, is a method for calculating the optimal rotation matrix that minimizes the RMSD (root mean squared deviation) between two paired sets of points. It is useful for point-set registration in computer graphics, and in cheminformatics and bioinformatics to compare molecular and protein structures (in particular, see root-mean-square deviation (bioinformatics)). The algorithm only computes the rotation matrix, but it also requires the computation of a translation vector. When both the translation and rotation are actually performed, the algorithm is sometimes called partial Procrustes superimposition (see also orthogonal Procrustes problem). Description Let and be two sets, each containing points in . For simplicity, we will consider the three-dimensional case (). The sets and can each be represented by matrices with the first row containing the coordinates of the first point, the second row containing the coordinates of the second point, and so on, as shown in this matrix: The algorithm works in three steps: a translation, the computation of a covariance matrix, and the computation of the optimal rotation matrix. Translation Both sets of coordinates must be translated first, so that their centroid coincides with the origin of the coordinate system. This is done by subtracting from the point coordinates of the respective centroid. Computation of the covariance matrix The second step consists of calculating a matrix . In matrix notation, or, using summation notation, which is a cross-covariance matrix when and are seen as data matrices. Computation of the optimal rotation matrix It is possible to calculate the optimal rotation based on the matrix formula but implementing a numerical solution to this formula becomes complicated when all special cases are accounted for (for example, the case of not having an inverse). If singular value decomposition (SVD) routines are available, the optimal rotation, , can be calculated using the following simple algorithm. First, calculate the SVD of the covariance matrix . Next, decide whether we need to correct our rotation matrix to ensure a right-handed coordinate system Finally, calculate our optimal rotation matrix, , as The optimal rotation matrix can also be expressed in terms of quaternions. This alternative description has been used in the development of a rigorous method for removing rigid-body motions from molecular dynamics trajectories of flexible molecules. In 2002 a generalization for the application to probability distributions (continuous or not) was also proposed. Generalizations The algorithm was described for points in a three-dimensional space. The generalization to dimensions is immediate. External links This SVD algorithm is described in more detail at https://web.archive.org/web/20140225050055/http://cnx.org/content/m11608/latest/ A Matlab functio
https://en.wikipedia.org/wiki/Pleckgate%20High%20School
Pleckgate High School is a mixed, Ofsted rated Outstanding secondary school located in Blackburn, Lancashire, England. Previously a community school and Mathematics and Computing College administered by Blackburn with Darwen Borough Council, in February 2016 Pleckgate High School converted to academy status. The school is now sponsored by The Education Partnership Trust, but continues to coordinate with Blackburn with Darwen Borough Council for admissions. The current Headteacher of the Academy is Aishling McGinty, who took up post in September 2022. Upon being inspected by Ofsted, in January 2019, the school received a judgement of 'Outstanding' in all categories. References External links Secondary schools in Blackburn with Darwen Schools in Blackburn Academies in Blackburn with Darwen
https://en.wikipedia.org/wiki/Greater%20Sudbury%20Heritage%20Museums
The Greater Sudbury Museums are a network of four small community history museums in Greater Sudbury, Ontario, Canada. Three of the four are located on heritage properties in different neighbourhoods within the city, and the fourth is located in a library facility. Anderson Farm Museum The Anderson Farm Museum is located on a site in Lively, on a historic dairy farm once owned by Finnish immigrants Frank Anderson and Gretta Anderson (Peltoniemi). The museum incorporates many of the original farm buildings, as well as the historic paymaster's cabin from Inco's mining facilities in Creighton, which was moved to the Anderson Farm site after the community was shut down in 1987. Copper Cliff Museum The Copper Cliff Museum on Balsam Street in Copper Cliff is housed in a log cabin on the site of the very first homestead in the community. The log cabin is not the original structure on that property, however, but was moved there in 1972. The museum is set up to depict the lifestyle of a miner's family in the area. The museum also has the baseball jacket of Thelma Jo Walmsley, a Copper Cliff native who played on the Racine Belles' 1946 All-American Girls Professional Baseball League championship team. An Ontario Historical Plaque was erected by the province to commemorate the Mine Rescue Stations's role in Ontario's heritage. Flour Mill Museum The Flour Mill Museum (Musée du Moulin-à-Fleur) was initially located on Notre-Dame Avenue beside the Flour Mill Silos in the city's historic Flour Mill neighbourhood. It was later moved in the 1980s to its present location on St. Charles Street. The historic building was originally the home of François Varieur, the foreman of an early lumber mill in the Sudbury area. It was later acquired by the Manitoba and Ontario Flour Mill Company, to serve as the home of the community's flour mill foreman. The museum was opened in 1974, and is devoted particularly to the life and history of the Franco-Ontarian community in the Flour Mill area. Rayside-Balfour Museum The Rayside-Balfour Museum located in Azilda, is the smallest of the four museums. Located in the community library branch, it incorporates several small exhibits depicting historical agricultural lifestyles in the Sudbury Basin area. Re-Branding Project In 2015 the museums' undertook a re-branding project. This involved employing a local graphic design firm (Design de Plume) to create and design fresh logos for each heritage site and a main logo for the Greater Sudbury Museums. The inspiration for the logos stems from the idea that Greater Sudbury is a patchwork community that combines cultural aspects from the nearby settlements of the area. The re-branding was focused around this concept, as well as their motto "cultural mosaic", to highlight each settlement's unique history as it comes together to form the Greater City of Sudbury. The cultural mosaic concept took inspiration from the unifying quilt by Mrs. Carolyn Wahamaa, who created imagery th
https://en.wikipedia.org/wiki/Pilot%20%28Burn%20Notice%29
"Pilot" is the first episode of Burn Notice, an American television drama series created for the USA Network. A spy kicked out of the Agency is stuck in Miami, Florida, where he helps locals who can not rely on the police. In the opener, Michael Westen (Jeffrey Donovan) finds himself cut off from his contacts and his cash, so he agrees to help a man clear his name in a high-priced art theft. Along the way he gets help from his ex-girlfriend and a retired Navy SEAL, and grief from his mother, who is unaware of his career. Plot While on assignment in Nigeria, covert operative Michael Westen learns that he's been "burned". For a spy, it is the equivalent of being fired. A burned spy is blacklisted from all government agencies and resources; his bank accounts are frozen and his credit is trashed. Michael barely escapes Nigeria and wakes up, battered, in a motel in Miami, Florida. In order to survive and fund his own personal investigation, Michael enlists the help of the only two "friends" he has: Fiona Glenanne, an ex-IRA operative who also happens to be an ex-girlfriend, and Sam Axe, a washed-out military intelligence contact who has been under surveillance by the Federal Bureau of Investigation (FBI). He is also forced to deal with the family he went halfway around the world to get away from—particularly his mother, Madeline Westen, who could not be happier to have her son back in town. Through former spy-turned-security consultant Lucy Chen—whom Michael helped learn the trade—he gets a lead on a small investigation job: a caretaker of an estate, Javier (David Zayas), has been accused of stealing valuable art from his employer, Graham Pyne (Ray Wise). All evidence points to it being an inside job and Javier, with very little money to offer, has nowhere else to turn. When Michael begins to dig around, he quickly discovers that it was in fact an inside job: Pyne orchestrated the robbery and framed Javier in order to collect insurance. Michael confronts Pyne with the incriminating evidence. When Pyne and his bodyguard come after Javier and his son, Michael is already a step ahead of them and has set up a trap at Javier's house. After the smoke clears, Pyne has accidentally shot his bodyguard, and Michael has enough evidence to send both of them to jail for conspiracy to commit kidnapping. With the mounting evidence hanging over his head, Pyne agrees to clear Javier's name and provide financial support to Javier and his son. Meanwhile, Michael keeps trying to get in touch with his old government handler, Dan Siebels (Dan Martin), who will not accept his calls. Deciding to get creative, Michael resorts to mailing Siebels a fake bomb in order to get his attention. The ploy works, and Michael finally gets to confront Siebels about the burn notice. Siebels believes Michael has probably been framed and there is nothing he can do to help him, but that he still has allies within the Agency. He tells Michael not to leave Miami, unless he wants an FBI man
https://en.wikipedia.org/wiki/Apomorphism
In formal methods of computer science, an apomorphism (from ἀπό — Greek for "apart") is the categorical dual of a paramorphism and an extension of the concept of anamorphism (coinduction). Whereas a paramorphism models primitive recursion over an inductive data type, an apomorphism models primitive corecursion over a coinductive data type. Origins The term "apomorphism" was introduced in Functional Programming with Apomorphisms (Corecursion). See also Morphism Morphisms of F-algebras From an initial algebra to an algebra: Catamorphism From a coalgebra to a final coalgebra: Anamorphism An anamorphism followed by an catamorphism: Hylomorphism Extension of the idea of catamorphisms: Paramorphism References Recursion schemes
https://en.wikipedia.org/wiki/ILPAP
I.L.P.A.P. () was a public Greek company, part of the Athens Urban Transport Organisation, responsible for the operation of the trolleybuses network. ILPAP was founded on December 14, 1970, and since 1998 the company was owned by the Athens Urban Transport Organisation (Organismos Astikon Syngoinonion Athinon - OASA, Greek: Οργανισμός Αστικών Συγκοινωνιών Αθηνών - Ο.Α.Σ.Α.), a public company. Overview In March 2011, the Greek Government passed Law 3920 to merge ILPAP with the bus company ETHEL S.A. The resulting company is named "OSY S.A." () and is a subsidiary of OASA S.A. The merger was officially announced on June 10, 2011. While merger at the top management level took place immediately, integration of the former companies at operations and support level proceeds slowly. The network consisted of 22 trolleybus routes which cover 390 kilometers in Athens urban area. The fleet consisted of 366 trolleybuses, made by Neoplan and Van Hool, 51 of which are articulated. 10.6 million kilometers are covered, and 80 million passengers are transported per year. As of May 2011, the company had about 1,200 employees. Gallery References Transport in Athens Bus companies of Greece Defunct companies of Greece
https://en.wikipedia.org/wiki/Alan%20Turing%20Building
The Alan Turing Building, named after the mathematician and founder of computer science Alan Turing, is a building at the University of Manchester, in Manchester, England. It houses the School of Mathematics, the Photon Science Institute and the Jodrell Bank Centre for Astrophysics (JBCA) (part of the School of Physics and Astronomy). The building is located in the Chorlton-on-Medlock district of Manchester, on Upper Brook Street, and is adjacent to University Place and the Henry Royce Institute. While under construction, the project was known as AMPPS : Astronomy, Mathematics, Physics and Photon Science. The building was shortlisted for the Greater Manchester Building of the Year 2008 prize, which is awarded by the Greater Manchester Chamber of Commerce. The manager of the building project was awarded a silver medal in the Chartered Institute of Building "Construction Manager of the Year" awards. Architecture The £43m building was completed in July 2007, and was designed by architects Sheppard Robson. It consists of three "fingers", each of which are four storeys high. The building is of steel frame construction, with reinforced concrete stairwells, and grey zinc exterior cladding. The northern two fingers are joined by an atrium, which is spanned by a series of bridges. The southernmost finger was designed to hold low vibration laboratories, and is joined by a glazed bridge at third-floor level to the middle finger. An 'over-sailing' roof structure connects the three fingers acting as a suspension system for a photovoltaic array/solar shading using thin film technology. This photovoltaic array is designed to produce nearly 41 megawatt hours per annum, a saving of 17,000 kilograms of carbon dioxide each year. At the time of completion this was the largest photovoltaic array in North West England, and helped the architects to win an award for "Business Commitment to the Environment". One condition for planning approval was that the project included corridors for pedestrian access and visual transparency between Upper Brook Street and Oxford Road. This was to counter complaints by the residents of Brunswick, on the other side of Upper Brook Street, that previous university developments seemed to be creating a wall to them. The pedestrian walkway between the second and third finger, and the transparent atrium met these demands. This follows the line of an earlier street, when the site was a residential area, and runs from Upper Brook Street to Oxford Road and is called "Wilton Street", as it was historically. In the 1960s, many mathematics departments were housed in high-rise buildings including the Mathematics Tower at the Victoria University of Manchester, and the Maths and Social Sciences Building at UMIST. These proved completely unsuited to the activities of a mathematics department (and arguably any academic department) as travel between floors in lifts (and uninviting stairways) discourages interaction between mathematicians resulting
https://en.wikipedia.org/wiki/Timed%20antagonistic%20response%20alethiometer
The timed antagonistic response alethiometer, or TARA, is a type of lie detection technique that relies upon cognitive chronometry. The TARA is a computer-based technique. It requires respondents to classify a succession of mixed statements as true or false, as quickly and accurately as they can, by pressing one of two keys. The faster they do so, the more likely they are to be telling the truth; the slower they do so, the more likely they are to be lying. The TARA works by manufacturing an artificial situation in which lying is more challenging than truth-telling. Specifically, it permits truth-tellers to complete two alternating tasks using the same strategy, but requires liars to complete them using contradictory strategies. Hence, if both truth-tellers and liars complete the TARA accurately as stipulated, then the former will complete it more quickly than the latter, all else being equal. Structurally, the TARA bears some affinities with the implicit association test (IAT), because it generates differences in average reaction time on the basis of differences in response compatibility. The TARA remains to be field-tested. However, initial laboratory studies obtained accuracy rates in the region of 85%, suggesting that the technique holds promise. References External links Link to the abstract of the first published scientific paper. Retrieved 2007-07-15. Forensic techniques
https://en.wikipedia.org/wiki/Variety%20%28cybernetics%29
In cybernetics, the term variety denotes the total number of distinguishable elements of a set, most often the set of states, inputs, or outputs of a finite-state machine or transformation, or the binary logarithm of the same quantity. Variety is used in cybernetics as an information theory that is easily related to deterministic finite automata, and less formally as a conceptual tool for thinking about organization, regulation, and stability. It is an early theory of complexity in automata, complex systems, and operations research. Overview The term "variety" was introduced by W. Ross Ashby to extend his analysis of machines to their set of possible behaviors. Ashby says: The word variety, in relation to a set of distinguishable elements, will be used to mean either (i) the number of distinct elements, or (ii) the logarithm to the base 2 of the number, the context indicating the sense used. In the second case, variety is measured in bits. For example, a machine with states has a variety of four states or two bits. The variety of a sequence or multiset is the number of distinct symbols in it. For example, the sequence has a variety of four. As a measure of uncertainty, variety is directly related to information: . Since the number of distinguishable elements depends on both the observer and the set, "the observer and his powers of discrimination may have to be specified if the variety is to be well defined". Gordon Pask distinguished between the variety of the chosen reference frame and the variety of the system the observer builds up within the reference frame. The reference frame consists of a state space and the set of measurements available to the observer, which have total variety , where is the number of states in the state space. The system the observer builds up begins with the full variety , which is reduced as the observer loses uncertainty about the state by learning to predict the system. If the observer can perceive the system as a deterministic machine in the given reference frame, observation may reduce the variety to zero as the machine becomes completely predictable. Laws of nature constrain the variety of phenomena by disallowing certain behavior. Ashby made two observations he considered laws of nature, the law of experience and the law of requisite variety. The law of experience holds that machines under input tend to lose information about their original state, and the law of requisite variety states a necessary, though not sufficient, condition for a regulator to exert anticipatory control by responding to its current input (rather than the previous output as in error-controlled regulation). Law of experience The law of experience refers to the observation that the variety of states exhibited by a deterministic machine in isolation cannot increase, and a set of identical machines fed the same inputs cannot exhibit increasing variety of states, and tend to synchronize instead. Some name is necessary by which this
https://en.wikipedia.org/wiki/OTEN
The Open Training and Education Network, often abbreviated OTEN, is an Open education service offered by TAFE NSW. It was rebranded as TAFE Digital during the OneTAFE restructure at the beginning of 2018. Students may enrol from anywhere in Australia, while operationally the program is run by the Western Sydney Institute of TAFE. OTEN courses are delivered using a range of media, including printed materials, videos, CD-ROMs and DVDs. Some OTEN courses and units are delivered online. OTEN students may also access local TAFE NSW library facilities. OTEN is a member of the Australian Open Universities scheme. History The first use of distance education for Australian VET was in 1910 when Sydney Technical College launched an emergency correspondence course to train health inspectors at a time when the country was gripped by a typhoid epidemic. By 1917, what had become the Correspondence Division was offering more than 20 subjects to distance learners, using a mix of correspondence education and converted railway wagons acting as makeshift classrooms and workshops. It also later assisted Australia's Second World War efforts by training 100,000 Australian and 43,000 US service personnel. In 1978, the service became known as the College of External Studies; in 1991, it was renamed the TAFE NSW Open Training and Education Network, or OTEN as it is now better known. In 1995, OTEN was relocated to a purpose-built facility in Strathfield, 14 kilometres west of the Sydney central business district. Since that time, it has grown exponentially. In 1998, it became a Registered Training Organisation (RTO). In 2000, it introduced a custom-designed Student Administration System (SAM), an integrated online student records, educational resource and materials supply chain management system. In 2002, it created an online tracking system to monitor students’ progress. In 2010, it celebrated 100 years of public distance education in NSW. OTEN’s Online Learning Systems The rapid growth of the Internet coupled with the massive influence of social media has enabled OTEN to transition from what was essentially a correspondence school to an institution that offers online multimedia and interactive support for prospective and current students using such technologies as Moodle, Equella and Adobe Connect. This has enabled OTEN to increase its enrolments from 35,813 in 2006 to 118,060 in 2014. In 2012, OTEN redeveloped its website to incorporate features such as online chat and an interactive world map showing how many people are accessing the online learning system. Its delivery of real-time experiences for students has resulted in even more students accessing the site, sharing resources, discussing content and supporting one another in their educational journeys. OTEN also uses virtual classroom and conference tools to conduct live orientation sessions and tutorials for students. The Student Administration and Management System (SAM) enables OTEN to efficiently manage
https://en.wikipedia.org/wiki/Fiona%20Glenanne
Fiona Glenanne is a fictional character in the television series Burn Notice (2007–2013), portrayed by Gabrielle Anwar. According to Fiona's biography from USA Network: Fiona works with Michael Westen, Sam Axe and, starting in season 4, Jesse Porter, doing odd jobs, as well as working as an unlicensed bounty hunter and arms dealer. She is shown to be an explosives expert, marksman, and a precision driver. Overview Fiona first met Michael Westen when she was in Ireland with the IRA when he went undercover as Michael McBride. Despite their clashing personalities, the two eventually developed a romance, but it came to a sudden end when Michael left Fiona literally in the middle of the night, without a word because his cover was blown. Due to Michael not updating his emergency contact in years, Fiona picked up Michael in Miami after he was stranded there when he was burned because she was the only emergency contact, and she has since helped him numerous times in his various jobs. Now that she has encountered Michael again, Fiona makes efforts to pressure Michael into a more substantial relationship. Fiona also keeps in touch with Michael's mother, Madeline. In the early part of season 2, Fiona starts dating a paramedic named Campbell, and whilst it is never admitted it is believed her main reason for dating him was to drive Michael crazy that she was no longer available. However the relationship ended when Campbell confronted Fiona about her lingering feelings for Michael, and she couldn't deny them. In season 3, episode 8, Fiona has had enough of Michael and walks out. Refusing to appear at a monitoring job, she doesn't turn up for Michael for the first time in the series. The reason was over Michael's choice to get back into the spy trade. In the season 3 summer finale, it is revealed that Fiona has five brothers, including an older one named Sean, and a younger sister named Claire, who was killed in The Troubles. Fiona tends to shoot (or blow up) first and ask questions later. Her preferred method is going in with guns blazing or IEDs exploding, and Michael frequently has to hold her back. After spending time taking care of a child in season 1, Fiona becomes especially upset when someone abuses or endangers children. Fiona also has a certain vixen complex, frequently using her sex appeal to acquire information. Series creator Matt Nix has said about the characters' relationship: In the pilot episode, she spoke with an Irish accent; starting with "Identity", she has consistently spoken with an American accent as part of her effort to fit in with the Miami scene. Relationships Michael Michael Westen is by far the most important person in Fiona's life. They met while Michael was working undercover as Michael McBride in Dublin, Ireland, at which time Fiona was robbing banks for the IRA. They began a tumultuous relationship, one which Michael described as being "profoundly unhappy". In spite of the sometimes violent nature of their union, F
https://en.wikipedia.org/wiki/PassAlong%20Networks
PassAlong Networks, also known as Tennessee Pacific Group, LLC, was a developer of digital media innovations and services located in Franklin, Tennessee. The company had a digital music library of three million licensed songs, two million of which were raw MP3 music files, and provided a series of products and services in the digital media marketplace. The company had digital music catalog agreements with the four major record labels: Warner Music Group, Universal Music Group, EMI, and Sony/BMG. PassAlong’s catalog was composed of non-DRM, MP3 music files. The other major catalogs were DRM-protected files based on Microsoft WMA technology. The Independent MP3 catalog included songs from The Orchard, Nettwerk Music, IODA, CD Baby, Naxos Records, and many others. Products The Company Products include: StoreBlocks: online retail store-building platforms, media libraries, metadata, and web services. Its technology includes turnkey templates, Web services, reporting systems, storefront showcases, a music referral system, consumer rewards programs, legal music sharing, and a library of raw MP3s to enable consumer interoperability. This platform currently powers over 120 digital stores, including BreakthruRadio, TransWorld’s f.y.e. online music store and Procter & Gamble's Julie's Jukebox, a digital music store on HomeMadeSimple.com. See www.StoreBlocks.com for more information. OnTour: consumer-direct media showcases, widgets, data services, and notification systems. Its core product notifies users when their favorite artists are performing a concert in their area. The OnTour Barenaked Ladies Special Edition won the 2006 Billboard Demmxpo Award for Best Use of Technology by an Artist. See www.OnTour.net for more information Connected Consumer: interactive CE interfaces and media services for the digital media ecosystem. FreedomMP3: protection technologies and media tracking services Speakerheart: a subsidiary to empower independent artists to self-publish and promote their works online. See www.Speakerheart.com for more information. History of PassAlong Networks Founded in 2002 in Nashville, Tennessee, the company moved their headquarters to the Factory at Franklin, south of Nashville. The founders included former Microsoft executive Dave Jaworski, digital media producer Brad Edmonson, former EMI executive Scott Hughes, Scott Lewis, Robin Pou, and independent music producer Jozef Nuyens, who also owns The Castle Studio in Franklin, Tennessee. In September 2004, PassAlong launched its first digital music download store in conjunction with eBay. The store became the largest store on eBay. The eBay relationship is longer in place however. Then the company launched over two hundred stores, including Procter & Gamble's Home Made Simple store and the f.y.e.- for your entertainment, digital download store. PassAlong became Microsoft PlaysForSure certified in December 2004. In 2006 the company released a non-DRM solution that helps guard artist
https://en.wikipedia.org/wiki/Agropyron%20mosaic%20virus
Agropyron mosaic virus is a plant pathogenic virus of the family Potyviridae. External links ICTVdB - The Universal Virus Database: Agropyron mosaic virus Family Groups - The Baltimore Method Viral plant pathogens and diseases Potyviridae
https://en.wikipedia.org/wiki/Andean%20potato%20latent%20virus
Andean potato latent virus (APLV) is a plant pathogenic virus of the family Tymoviridae. See also Viral diseases of potato External links ICTVdB - The Universal Virus Database: Andean potato latent virus Family Groups - The Baltimore Method Tymoviridae Viral plant pathogens and diseases
https://en.wikipedia.org/wiki/Andean%20potato%20mottle%20virus
Andean potato mottle virus (APMoV) is a plant pathogenic virus of the family Comoviridae. See also Viral diseases of potato External links ICTVdB—The Universal Virus Database: Andean potato mottle virus Family Groups—The Baltimore Method Comoviruses Viral plant pathogens and diseases
https://en.wikipedia.org/wiki/Banana%20bract%20mosaic%20virus
Banana bract mosaic virus (BBrMV) is a plant pathogenic virus of the family Potyviridae. Transmission BBrMV is transmitted by aphid. External links ICTVdB - The Universal Virus Database: Banana bract mosaic virus Family Groups - The Baltimore Method Viral plant pathogens and diseases Potyviruses
https://en.wikipedia.org/wiki/Barley%20yellow%20striate%20mosaic%20cytorhabdovirus
Cytorhabdovirus hordei (see synonyms) is a plant pathogenic virus. External links ICTVdB - The Universal Virus Database: Barley yellow striate mosaic virus Family Groups - The Baltimore Method Cytorhabdoviruses Viral plant pathogens and diseases
https://en.wikipedia.org/wiki/Drive%20%28The%20X-Files%29
"Drive" is the second episode of the sixth season of the science fiction television series The X-Files. It premiered on the Fox network in the United States on November 15, 1998. The episode is a "Monster-of-the-Week" story, unconnected to the series' wider mythology. "Drive" earned a Nielsen household rating of 11.0, being watched by 18.5 million people in its initial broadcast. The episode received largely positive reviews from television critics. The show centers on FBI special agents Fox Mulder (David Duchovny) and Dana Scully (Gillian Anderson) who work on cases linked to the paranormal, called X-Files. Mulder is a believer in the paranormal, while the skeptical Scully has been assigned to debunk his work. In the episode, Mulder is trapped in a car by a seemingly deranged man, and Scully races to determine if the man is suffering from a deadly illness—and if Mulder is in danger of becoming the next victim of some sort of government conspiracy. The episode was written by Vince Gilligan, directed by Rob Bowman, and featured a guest appearance by Bryan Cranston. Gilligan cast Cranston to play the antagonist because he felt he could successfully humanize the role. Cranston's success in "Drive" later led to his casting as Walter White in Gilligan's AMC series Breaking Bad. Plot In a live news report, a high-speed car chase comes to an end in the Nevada desert. Assuming it to be a kidnapping, police pull the female passenger from the car and place her into the protective custody of a police vehicle. The driver, Patrick Crump (Bryan Cranston), is pushed to the asphalt and handcuffed. The woman, his wife, begins violently banging her head against the police car window. As the news chopper catches all of this on film, the woman's head explodes, sending a spray of blood across the window. Mulder and Scully get wind of this bizarre car chase as they're doing work in Buhl, Idaho investigating possible domestic terrorism. Mulder coerces Scully into taking a detour to Elko, Nevada on a hunch that this may be an X-File. Crump, who has started to develop symptoms of a sickness, is put in an ambulance. Mulder, wishing to speak to Crump, follows the ambulance and ends up being kidnapped by Crump, who has escaped from the police. Mulder realizes that Crump is suffering from a painful sensation of pressure building in his head and that the only way to alleviate this pressure is to drive west. At first, Scully believes that Crump is suffering from some sort of infection; she takes a hazmat team to investigate the Crumps' home and finds a dog suffering the same symptoms and dead birds on a neighbor's property, but on noting that the neighbor herself, who is deaf, was unaffected, she then discovers a U.S. Navy antenna array emitting ELF waves stretches beneath their property. Scully deduces that an abnormal surge in these waves somehow caused a rising pressure in the inner ear of the nearby inhabitants. Westward motion and an increase in speed seem to be the
https://en.wikipedia.org/wiki/P-mode
P-mode can refer to: protected mode, an operation mode of x86 CPUs promiscuous mode, in computer networking pressure mode pulsation in asteroseismology
https://en.wikipedia.org/wiki/Language-based%20system
A language-based system is a type of operating system that uses language features to provide security, instead of or in addition to hardware mechanisms. In such systems, code referred to as the trusted base is responsible for approving programs for execution, assuring they cannot perform operations detrimental to the system's stability without first being detected and dealt with. A very common strategy of guaranteeing that such operations are impossible is to base the system around a high-level language, such as Java, whose design precludes dangerous constructs; many are entirely written in such a language, with only the minimum amount of low-level code being used. Since language-based systems can assure ahead of time that they cannot do things that can damage the system (such as corrupting memory by dereferencing dangling pointers), it is possible for them to avoid expensive address space switches needed by traditional OSes; because of this, microkernels are more popular than traditional systems. A more extreme form of this is a high-level language computer architecture, where the trusted base is pushed into hardware, and the entire system is written in a high-level language. Examples Burroughs MCP Cosmos Emerald Inferno JX Lisp machine Midori Oberon Singularity Smalltalk Theseus OS UCSD P-system Verve See also High-level language computer architecture References A Sabelfeld, AC Myers Language-based information-flow security IEEE Journal on Selected Areas in Communications, 2003 Volume 21, Issue 1 pp. 5–19 V Haldar, D Chandra, M Franz Semantic remote attestation—a virtual machine directed approach to trusted computing USENIX Virtual Machine Research and Technology Symposium, 2004 Giacobazzi, Mastroeni Abstract non-interference: parameterizing non-interference by abstract interpretation Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages pp 186–97 (2004) Algis Rudys, Dan S. Wallach Termination in language-based systems ACM Transactions on Information and System Security (TISSEC) Volume 5, Issue 2 (May 2002) pp. 138–68 Operating system kernels
https://en.wikipedia.org/wiki/Bean%20leafroll%20virus
Bean leafroll virus (BLRV) is a plant pathogenic virus of the genus Luteovirus. External links ICTVdB - The Universal Virus Database: Bean leaf roll virus Family Groups - The Baltimore Method Viral plant pathogens and diseases
https://en.wikipedia.org/wiki/Beet%20distortion%20mosaic%20virus
Beet distortion mosaic virus is a plant pathogenic virus. External links ICTVdB - The Universal Virus Database: Beet distortion mosaic virus Family Groups - The Baltimore Method Viral plant pathogens and diseases Potyviruses
https://en.wikipedia.org/wiki/Florida%20Atlantic%20University%20College%20of%20Engineering%20and%20Computer%20Science
The FAU College of Engineering and Computer Science is located in Boca Raton, Florida and is one of the ten academic colleges of Florida Atlantic University. The College offers undergraduate and graduate degrees in engineering, computer and applied sciences. The College hosts the University's Ocean Engineering program which was the first undergraduate ocean engineering program in the United States. Departments The College of Engineering and Computer Science is divided into the following departments: Civil Engineering Computer Science and Engineering Electrical Engineering Environmental Engineering Geomatics Engineering Mechanical Engineering Ocean Engineering Research Florida Atlantic was the first university in the country to offer an undergraduate degree in ocean engineering in 1964. The first class numbering 35 graduated in 1967. The program was created in response to the loss of the Navy's submarine USS Thresher off the coast of Massachusetts. The sub and its crew were lost after a test dive and found in 8,400 feet of water, far below the sub's crush depth. Concerned about underwater equipment designed by engineers with no marine experience, FAU and the Navy established a program that would eventually draw students from around the globe and be recognized in the 1996 Guinness Book of World Records for "the fastest speed attained by a human-powered propeller submarine." Other events During the Spring semester of each year the College of Engineering holds Engineering Week. The week features events centered around a "Brain Bowl" competition between the college's departments. The 2007 theme was Mardi Gras, and featured flamenco dancing. Accreditation The College is fully accredited through the University by the Southern Association of Colleges and Schools Commission on Colleges. References External links College of Engineering and Computer Science Florida Atlantic University Official Website Florida Atlantic University Computer science departments in the United States
https://en.wikipedia.org/wiki/Beet%20mosaic%20virus
Beet mosaic virus (BtMV) is a plant pathogenic virus of the family Potyviridae. External links ICTVdB - The Universal Virus Database: Beet mosaic virus Family Groups - The Baltimore Method Viral plant pathogens and diseases Potyviruses
https://en.wikipedia.org/wiki/Beet%20western%20yellows%20virus
Beet western yellows virus (BWYV) is a plant pathogenic virus of the family Solemoviridae. External links ICTVdB - The Universal Virus Database: Beet western yellows virus Family Groups - The Baltimore Method Viral plant pathogens and diseases
https://en.wikipedia.org/wiki/Beet%20yellow%20net%20virus
Beet yellow net virus (BYNV) is a plant pathogenic virus of the family Luteoviridae. External links ICTVdB - The Universal Virus Database: Beet yellow net virus Family Groups - The Baltimore Method Viral plant pathogens and diseases
https://en.wikipedia.org/wiki/Garlic%20routing
Garlic routing is a variant of onion routing that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis and to increase the speed of data transfer. Michael J. Freedman defined "garlic routing" as an extension of onion routing, in which multiple messages are bundled together. He called each message a "bulb", whereas I2P calls them "garlic cloves". All messages, each with their own delivery instructions, are exposed at the endpoint. This allows the efficient bundling of an onion routing "reply block" with the original message. Garlic routing is one of the key factors that distinguishes I2P from Tor and other privacy or encryption networks. The name alludes to the garlic plant, whose structure this protocol resembles. "Garlic routing" was first coined by Michael J. Freedman in Roger Dingledine's Free Haven Master's thesis Section 8.1.1 (June 2000), as derived from Onion Routing. However, the garlic routing implementation in I2P differs from the design proposed by Freedman. The key difference is that garlic routing has unidirectional tunnels, whereas mainstream alternatives like Tor and Mixmaster use bidirectional tunnels. Garlic Cast: Lightweight and Decentralized Content Sharing One potential implementation of the Garlic Routing protocol is shown in the paper, Garlic Cast: Lightweight and Decentralized Anonymous Content Sharing. The idea is to provide a resilient and low latency anonymous content sharing network based on garlic routing. The distinguishing benefit that makes the system different from traditional Tor networks is that it is designed around secure, fast communication. This is made possible by allowing the garlic cast system to use random walks to find proxies in the overlay network and then use the security-enhanced Information Dispersal Algorithm to deliver content in a secure and fast manner. Lastly, the garlic cast network is designed to be highly resistant to a wide range of attacks while still providing a high level of anonymity. List of P2P applications that use garlic routing I2P, an anonymizing overlay network which allows applications to run on top of it (open source, written in Java) Perfect Dark, a P2P client which relies on a mixnet and distributed datastore to provide anonymity (freeware, written for Windows) See also Anonymous remailer Key-based routing Mix network Mixmaster anonymous remailer Public-key cryptography References Anonymity networks Network architecture Cryptographic protocols Garlic routing Key-based routing Mix networks Onion routing Routing
https://en.wikipedia.org/wiki/Comma%20operator
In the C and C++ programming languages, the comma operator (represented by the token ,) is a binary operator that evaluates its first operand and discards the result, and then evaluates the second operand and returns this value (and type); there is a sequence point between these evaluations. The use of the comma token as an is distinct from its use in function calls and definitions, variable declarations, enum declarations, and similar constructs, where it acts as a . Syntax The comma operator separates expressions (which have value) in a way analogous to how the semicolon terminates statements, and sequences of expressions are enclosed in parentheses analogously to how sequences of statements are enclosed in braces: (a, b, c) is a sequence of expressions, separated by commas, which evaluates to the last expression c, while {a; b; c;} is a sequence of statements, and does not evaluate to any value. A comma can only occur between two expressions – commas separate expressions – unlike the semicolon, which occurs at the end of a (non-block) statement – semicolons terminate statements. The comma operator has the lowest precedence of any C operator, and acts as a sequence point. In a combination of commas and semicolons, semicolons have lower precedence than commas, as semicolons separate statements but commas occur within statements, which accords with their use as ordinary punctuation: a, b; c, d is grouped as (a, b); (c, d) because these are two separate statements. The comma operator has been deprecated in subscripting expressions (as of C++20); to reduce confusion, and open up the future possibility of repurposing the syntax for multidimensional array indexing. In C++23, the ability to overload operator[] with multiple arguments was added making unparenthesised comma expressions unusable in subscripts. The comma operator is still usable and not deprecated in this context if the comma expression is surrounded by parentheses (as in a[(b,c)]). Examples In this example, the differing behavior between the second and third lines is due to the comma operator having lower precedence than assignment. The last example differs as well since the return expression must be fully evaluated before the function can return. /** * Commas act as separators in this line, not as an operator. * Results: a=1, b=2, c=3, i=0 */ int a=1, b=2, c=3, i=0; /** * Assigns value of b into i. * Commas act as separators in the first line and as an operator in the second line. * Results: a=1, b=2, c=3, i=2 */ int a=1, b=2, c=3; int i = (a, b); /** * Assigns value of a into i. * Equivalent to: int i = a; int b; * Commas act as separators in both lines. * The braces on the second line avoid variable redeclaration in the same block, * which would cause a compilation error. * The second b declared is given no initial value. * Results: a=1, b=2, c=3, i=1 */ int a=1, b=2, c=3;
https://en.wikipedia.org/wiki/First%20Databank
First Databank (FDB) is a major provider of drug and medical device databases that help inform healthcare professionals to make decisions. FDB partners with information system developers to deliver useful medication- and medical device-related information to clinicians, business associates, and patients. FDB is part of Hearst and the Hearst Health network. History First Databank was founded in 1977 as a company that published a quarterly magazine of drug prices. They were bought by Hearst Corporation in 1980. First Databank then evolved to become a provider of clinical and descriptive drug knowledge that is integrated into healthcare information systems globally. FDB has its headquarters in San Francisco, California, and has other offices in Indianapolis, Indiana, Exeter, England, Dubai, UAE and Hyderabad, India. The firm's drug databases support pharmacy dispensing, formulary management, drug pricing analysis, claims processing, computerized physician order entry (CPOE), electronic health records (EHR), electronic medical records (EMR), electronic prescribing (e-Prescribing), electronic medication administration records (EMAR), population health and telemedicine/telehealth. Beginning in 2011, First Databank's set of National Drug Codes (NDCs) have been integrated into RxNorm's standard clinical drug vocabulary that includes all medications available on the US market. RxNorm is produced and maintained by the United States National Library of Medicine (NLM). In 2017, FDB acquired Polygot Systems, which simplifies drug information for patients and translates that information into 21 languages. In 2018, FDB partnered with PetIQ to release the first veterinary medication database to provide information on pet medications structured for integration into pharmacy systems. Beginning in 2020, FDB partnered with Amazon and its Alexa devices to provide drug information and answer medication questions. During the COVID-19 pandemic, FDB posted drug data (regarding remdesivir, chloroquine, and hydroxychloroquine) and medical device-related coronavirus information to its website. In August 2021, the company announced a partnership with RxRevu to provide integrated decision support tools to improve patient access to care, delivering patient-specific pharmacy benefit information to EHR workflows via direct connections with pharmacy benefit managers. The technology displays accurate, real-time data at the point of prescribing, allowing physicians to find affordable alternatives for medications specific to a patient's health needs and insurance benefits. FDB will offer RxRevu's prescription cost and coverage solution to current and future hospital, health system, and EHR clients. Operations FDB MedKnowledge (formerly National Drug Data File Plus) First Databank's MedKnowledge provides prices, descriptions, and collateral clinical information on drugs approved by the US Food and Drug Administration (FDA), plus unapproved drugs, commonly used over-the-cou
https://en.wikipedia.org/wiki/Brett%20Erlich
Brett Evan Erlich (born March 1, 1982) is an American political comedian featured as a writer, producer and host on TV shows and Web sites. He is the executive producer of The Young Turks network, where he also appears as a host of "Happy Half Hour". He also appears on ABC News Primetime Specials hosted by Barbara Walters and Katie Couric. From 2006–2011, Erlich was a writer, producer, and host of InfoMania, a comedic news show on the cable station Current TV. He formerly wrote, co-hosted (with Ellen Fox), and co-executive produced The Rotten Tomatoes Show (2009–2010). InfoMania was canceled in the summer of 2011. From July 1, 2006 to July 9, 2007, Erlich wrote, associate-produced, and co-hosted Google Current. Early life and education Born in 1982 in the San Fernando Valley near Los Angeles, California, he attended local public schools and graduated from high school at Chaminade College Preparatory in West Hills. He studied at Stanford University, graduating in 2004. While there, he co-founded the Stanford Shakespeare Society. This student-run company is devoted to the production and performance of Shakespearean and Shakespeare-influenced drama. Career Erlich has become established as a political comedian in TV shows and on the Web. From July 1, 2006 to July 9, 2007, Erlich wrote, associate-produced, and co-hosted Google Current. From 2006–2011, Brett was a writer, producer, and host of InfoMania, a half-hour comedic news show on the cable station Current TV. It was created by Madeline Smithberg, who created The Daily Show with Jon Stewart, and executive producer David Nickoll. Erlich formerly wrote, co-hosted (with Ellen Fox), and co-executive produced The Rotten Tomatoes Show on Current TV (2009–2010). After its cancellation, some of its material was compressed into a weekly 2-minute segment on InfoMania. This show was cancelled in the summer of 2011. Erlich's segments on InfoMania and Google Current have included "Viral Video Film School," "Guilty Pleasures," "Men Menning," "Everybody's Doin' It," "Spam I Got," "Ostensibly on the Scene," "World Leader Flickr Sites," "Retroactive Interview," and "FearCast." His show, Viral Video Film School, was nominated for a Webby Award in 2010. It was a People's Voice Winner in the Online Film & Video "How To & DIY" category. His video Saw the Musical was nominated for a 2011 Webby in the Variety category; it lost to Zach Galifianakis' Between Two Ferns. In 2012 Erlich appeared in the independent feature Dead Dad. In September 2013, Erlich became the host of Marvel's Agents of S.H.I.E.L.D.: Declassified, a weekly online aftershow on ABC.com for Agents of S.H.I.E.L.D. Declassified features recaps, sketches, and featurettes to bring fans up to speed ahead of the next episode airing. Three expanded installments with guests were planned for the first season for its more "provocative storylines". Personal life In 2017, Erlich married longtime girlfriend Brooke Marks. Notes and references Extern
https://en.wikipedia.org/wiki/Paul%20Douglas%20Tougaw
Paul Douglas ("Doug") Tougaw (born July 3, 1969), is a full professor in and chair of the Department of Electrical and Computer Engineering at Valparaiso University. He received his B.S. in Electrical Engineering from the Rose-Hulmann Institute of Technology and his M.S. and Ph.D. in Electrical Engineering from the University of Notre Dame in 1995. In 2005, Tougaw earned an MBA from Valparaiso University's College of Business Administration. His main area of research interest is in the field of Quantum Cellular Automata (QCA). He was awarded the "Best Regional Paper" award at the 2007 Conference of the American Society of Engineering Educators. He was also runner-up for the USA National IEEE Young Engineer award. Doug Tougaw's contribution to the field has focused on the building of medium-scale integration components such as full-adders from basic QCA gates as well as fault-tolerance studies of QCA wires. Presently, Doug Tougaw is the Richardson Professor and member of the department of electrical and computer engineering at Valparaiso University. Recent work with Quantum cellular automata (QCA) devices Recently, Dr. Tougaw has developed a Quantum-dot Cellular Automata (QCA) device having normal QCA cells laid out in a planar structure, having a set of input lines and a set of orthogonal output lines. The device has clocking regions that control the flow of binary signals through the device. The input columns are driven by a separate input signal, and all the cells of each column align to match their input signal. These input columns then serve as drivers for output rows that act as serial shift registers under the control of clock signals applied to sub-sections of the rows. In this way, a copy of the contents of each of the input signals propagates along each of the output rows to an output cell. The output cells of each output row may be assigned their own, latching clock signal. Notes Living people Valparaiso University faculty Valparaiso University alumni University of Notre Dame alumni 1969 births
https://en.wikipedia.org/wiki/Clive%20Boughton
Clive Boughton (born 4 August 1956) is an Australian computer science professor residing in Canberra, in the Australian Capital Territory. He is a senior lecturer in the Faculty of Engineering and Information Technology at the Australian National University. He is the managing director of Software Improvements Pty Ltd. Professional career Before completing his BSc Boughton undertook both research (at ARRB Group Ltd.) and industrial practice (at USL as Lab Manager) concerning the physical properties of soils. He published a paper on the soil compacting properties of rollers for road-making. Boughton obtained his BSc (applied physics) from RMIT University in Melbourne in 1976. After completing his BSc he became a professional officer at the department of physics at Monash University in Melbourne where did research into the specific heat of superconducting alloys. He published a research paper on the Fe(3-x)Mn(x)Si category of superconducting compounds/alloys as a result of his work at Monash. Boughton began his PhD at Australian National University in 1981 and began studying gaseous dynamics. He obtained his PhD in molecular physics in 1988. Further afield Boughton left the university environment to take a senior software engineering position at C3 in 1984. He worked at several other companies, including his own, before accepting a Visiting Fellow position in the Department of Computer Science at Australian National University in 1995, eventually becoming a full-time member of the department in 2000. Boughton was a contributor to the establishment of the BS Eng degree program within Department of Computer Science/Faculty of Engineering and Information Technology. He was involved in eVACS (Electronic voting and counting), a computer system that provides for electronic voting and electronic counting for ACT Legislative Assembly elections. It provides for counting according to the Hare-Clark electoral system rules set out in the Electoral Act 1992. He was involved in requirements identification and design. See also Executable UML References External links "eVACS" https://web.archive.org/web/20070708225404/http://www.elections.act.gov.au/EVACS.html http://conferences.oreillynet.com/cs/os2004/view/e_sess/5512 "Presentation of Election Software", 30 July 2001, Oreillynet.com. Retrieved 10 July 2007. http://crpit.com/confpapers/CRPITV30Flint.pdf Paper on Executable/Translatable UML in computing education https://web.archive.org/web/20070908200638/http://www.crpit.com/confpapers/CRPITV15Boughton.pdf Paper "Beginning to Define a Body of Knowledge for Safety Practitioners" Academic staff of the Australian National University 1956 births Living people
https://en.wikipedia.org/wiki/Software%20aging
In software engineering, software aging is the tendency for software to fail or cause a system failure after running continuously for a certain time, or because of ongoing changes in systems surrounding the software. Software aging has several causes, including the inability of old software to adapt to changing needs or changing technology platforms, and the tendency of software patches to introduce further errors. As the software gets older it becomes less well-suited to its purpose and will eventually stop functioning as it should. Rebooting or reinstalling the software can act as a short-term fix. A proactive fault management method to deal with the software aging incident is software rejuvenation. This method can be classified as an environment diversity technique that usually is implemented through software rejuvenation agents (SRA). The phenomenon was first identified by David Parnas, in an essay that explored what to do about it:"Programs, like people, get old. We can't prevent aging, but we can understand its causes, take steps to limit its effects, temporarily reverse some of the damage it has caused, and prepare for the day when the software is no longer viable." From both an academic and industrial point of view, the software aging phenomenon has increased. Recent research has focussed on clarifying its causes and effects. Memory bloating and leaking, along with data corruption and unreleased file-locks are particular causes of software aging. Proactive management of software aging Software aging Software failures are a more likely cause of unplanned systems outages compared to hardware failures. This is because software exhibits over time an increasing failure rate due to data corruption, numerical error accumulation and unlimited resource consumption. In widely used and specialized software, a common action to clear a problem is rebooting because aging occurs due to the complexity of software which is never free of errors. It is almost impossible to fully verify that a piece of software is bug-free. Even high-profile software such as Windows and macOS must receive continual updates to improve performance and fix bugs. Software development tends to be driven by the need to meet release deadlines rather than to ensure long-term reliability. Designing software that can be immune to aging is difficult. Not all software will age at the same rate as some users use the system more intensively than others. Rejuvenation To prevent crashes or degradation, software rejuvenation can be employed proactively as inevitable aging leads to failures in software systems. This proactive technique was identified as a cost-effective solution during research at the AT&T Bell Laboratories on fault-tolerant software in the 1990s. Software rejuvenation works by removing accumulated error conditions and freeing up system resources, for example by flushing operating system kernel tables, using garbage collection, reinitializing internal data structures,
https://en.wikipedia.org/wiki/Eben%20Fiske%20Ostby
Eben Fiske Ostby (born February 24, 1955) is a pioneer computer graphics software developer, animator, and technical director for motion pictures. Ostby was born in Hampton, Connecticut, United States. He graduated from Pomfret School and Vassar College, where he was its "first computer science major". He joined Pixar when the company was a garage start-up, as one of the first four employees of its animation department along with John Lasseter. There, he worked on early breakthrough animation shorts such as Luxo Jr., Red's Dream, Tin Toy, Knick Knack, and For the Birds. He became Vice President for Software. In 1998, he shared the Academy Award, Scientific and Engineering with three other people for the development of the Marionette 3-D Computer Animation System. He has served as Computer Animation, Technical and Modeling Director on Cars 2005, A Bug's Life, Monsters, Inc., Toy Story, Toy Story 2, Young Sherlock Holmes and many other motion pictures. Computer Animation André and Wally B. (1984) 3-D animation programmer Young Sherlock Holmes (1985) computer animation: Industrial Light & Magic Luxo, Jr. (1986) animation software/modeler/rendering Red's Dream (1987) modeling and animation software/models/technical director Tin Toy (1988) additional animator/modeler/technical director Knick Knack (1989) animator/technical director Toy Story (1995) modeling & animation system development/associate technical director A Bug's Life (1998) supervising technical director Toy Story 2 (1999) modeling supervisor For the Birds (2000) modeling supervisor Monsters, Inc. (2001) modeling supervisor Cars (2006) supervising technical director Up (2009) senior technology team: Pixar Brave (2012) senior technology team: Pixar Monsters University (2013) film production resources: Pixar Studio Team Inside Out (2015) production senior manager: Pixar Piper (2016) special thanks Coco (2017) production department head: Pixar Incredibles 2 (2018) production department head: Pixar Bao (2018) special thanks Purl (2018) special thanks Smash and Grab (2019) special thanks Kitbull (2019) special thanks References External links A Chat with Pixar's Eben Ostby on Geekdelphia 1955 births American animators Animators from Los Angeles Living people Vassar College alumni Pomfret School alumni Pixar people
https://en.wikipedia.org/wiki/Deferred%20Procedure%20Call
A Deferred Procedure Call (DPC) is a Microsoft Windows operating system mechanism which allows high-priority tasks (e.g. an interrupt handler) to defer required but lower-priority tasks for later execution. This permits device drivers and other low-level event consumers to perform the high-priority part of their processing quickly, and schedule non-critical additional processing for execution at a lower priority. DPCs are implemented by DPC objects which are created and initialized by the kernel when a device driver or some other kernel mode program issues DPC requests. DPC requests are added to the end of a DPC queue. Each processor has a separate DPC queue. DPCs have three priority levels: low, medium, and high. By default, all DPCs are set to medium priority. When Windows drops to an IRQL of Dispatch/DPC level, it checks the DPC queue for any pending DPCs and executes them until the queue is empty or some other interrupt with a higher IRQL occurs. For example, when the clock interrupt is generated, the clock interrupt handler generally increments the counter of the current thread to calculate the total execution time of that thread, and decrements its quantum time remaining by 1. When the counter drops to zero, the thread scheduler has to be invoked to choose the next thread to be executed on that processor and dispatcher to perform a context switch. Since the clock interrupt occurs at a much higher IRQL, it will be desirable to perform this thread dispatching which is a less critical task at a later time when the processor's IRQL drops. So the clock interrupt handler requests a DPC object and adds it to the end of the DPC queue which will process the dispatching when the processor's IRQL drops to DPC/Dispatch level. When working with streaming audio or video that uses interrupts, DPCs are used to process the audio in each buffer as they stream in. If another DPC (from a poorly written driver) takes too long and another interrupt generates a new buffer of data, before the first one can be processed, a drop-out results. References General Microsoft Docs: Deferred Procedure Calls (DPCs) Specific Subroutines Interrupts
https://en.wikipedia.org/wiki/AMD%20FireStream
AMD FireStream was AMD's brand name for their Radeon-based product line targeting stream processing and/or GPGPU in supercomputers. Originally developed by ATI Technologies around the Radeon X1900 XTX in 2006, the product line was previously branded as both ATI FireSTREAM and AMD Stream Processor. The AMD FireStream can also be used as a floating-point co-processor for offloading CPU calculations, which is part of the Torrenza initiative. The FireStream line has been discontinued since 2012, when GPGPU workloads were entirely folded into the AMD FirePro line. Overview The FireStream line is a series of add-on expansion cards released from 2006 to 2010, based on standard Radeon GPUs but designed to serve as a general-purpose co-processor, rather than rendering and outputting 3D graphics. Like the FireGL/FirePro line, they were given more memory and memory bandwidth, but the FireStream cards do not necessarily have video output ports. All support 32-bit single-precision floating point, and all but the first release support 64-bit double-precision. The line was partnered with new APIs to provide higher performance than existing OpenGL and Direct3D shader APIs could provide, beginning with Close to Metal, followed by OpenCL and the Stream Computing SDK, and eventually integrated into the APP SDK. For highly parallel floating point math workloads, the cards can speed up large computations by more than 10 times; Folding@Home, the earliest and one of the most visible users of the GPGPU, obtained 20-40 times the CPU performance. Each pixel and vertex shader, or unified shader in later models, can perform arbitrary floating-point calculations. History Following the release of the Radeon R520 and GeForce G70 GPU cores with programmable shaders, the large floating-point throughput drew attention from academic and commercial groups, experimenting with using then for non-graphics work. The interest led ATI (and Nvidia) to create GPGPU products — able to calculate general purpose mathematical formulas in a massively parallel way — to process heavy calculations traditionally done on CPUs and specialized floating-point math co-processors. GPGPUs were projected to have immediate performance gains of a factor of 10 or more, over compared to contemporary multi-socket CPU-only calculation. With the development of the high-performance X1900 XFX nearly finished, ATI based its first Stream Processor design on it, announcing it as the upcoming ATI FireSTREAM together with the new Close to Metal API at SIGGRAPH 2006. The core itself was mostly unchanged, except for doubling the onboard memory and bandwidth, similar to the FireGL V7350; new driver and software support made up most of the difference. Folding@home began using the X1900 for general computation, using a pre-release of version 6.5 of the ATI Catalyst driver, and reported 20-40x improvement in GPU over CPU. The first product was released in late 2006, rebranded as AMD Stream Processor after the merger wit
https://en.wikipedia.org/wiki/Dan%20Ewing
Daniel M. Ewing (born 3 June 1985), is an Australian actor. He appeared on Seven Network's Home and Away series as Reuben Humphries during 2007. In 2011, he returned to the Australian soap, this time receiving a larger role, playing Heath Braxton. He is also known for portraying Dillon in Power Rangers RPM. Early life Ewing was born in Manly and grew up in Forestville. He is the eldest of four children. Ewing attended Marist Catholic College North Shore, where he took part in various musicals. Ewing played representative basketball for Manly Warringah and he took part in two state championships and toured the U.S. and Canada. Ewing was a part-time student at NIDA, attending the Open Program courses. Career Ewing appeared in Home and Away as Reuben Humpheries in 2007. He has also had guest roles in Blue Water High, Spirited and Rescue: Special Ops. Ewing secured a role as Dillon the Black RPM Ranger in children's television series Power Rangers RPM. In September 2010, Ewing joined the cast of Home and Away again, this time as Heath Braxton. The actor made his debut in February 2011. Ewing also became a contestant on the 11th season of Dancing with the Stars. He was partnered with Luda Kroiter, and danced in support of the St Vincent de Paul Society, where his mother works. Ewing and Kroiter were eliminated in week five. On 9 December 2013, Ewing confirmed that he would be leaving Home and Away, and made his on-screen departure during the following year. Ewing reprised his role as Heath Braxton for the feature-length special, Home and Away: An Eye for an Eye, along with co-star Lisa Gormley (Bianca Scott). In 2016, Ewing returned to Home and Away, along with Gormley. Both Ewing and Gormley starred in the feature-length specials Home and Away: Revenge and Home and Away: All or Nothing. Ewing also starred in the Australian feature film Red Billabong, alongside Tim Pocock. He has roles in Dunamis, and Chasing Comets. In 2018, Ewing starred in horror film Beast No More, and the sci-fi action film Occupation, alongside Temuera Morrison. He filmed an appearance in the sci-fi thriller 1, directed by Robert Braiden, and made a guest appearance in the ninth episode of Harrow. In April 2019, Ewing joined the cast of Love and Monsters. He will reprise his Occupation role of Matt Simmons in the 2021 sequel Occupation: Rainfall. Personal life Ewing became engaged to Marni Little in September 2011, and they married on 15 December 2012. Little gave birth to their son in September 2014. The couple announced their separation in 2016. Ewing has been in a relationship with actress Kat Risteska since August 2016. He announced their engagement on 24 December 2021. In March 2022, they confirmed they were expecting their first child together, and Risteska gave birth to their daughter on 22 July 2022. On 21 October 2018, Ewing allegedly assaulted Little's husband David Robertshaw during a custody swap of their son. Ewing and Robertshaw argued for almost an hour wh
https://en.wikipedia.org/wiki/Available%20expression
In the field of compiler optimizations, available expressions is an analysis algorithm that determines for each point in the program the set of expressions that need not be recomputed. Those expressions are said to be available at such a point. To be available on a program point, the operands of the expression should not be modified on any path from the occurrence of that expression to the program point. The analysis is an example of a forward data flow analysis problem. A set of available expressions is maintained. Each statement is analysed to see whether it changes the operands of one or more available expressions. This yields sets of available expressions at the end of each basic block, known as the outset in data flow analysis terms. An expression is available at the start of a basic block if it is available at the end of each of the basic block's predecessors. This gives a set of equations in terms of available sets, which can be solved by an iterative algorithm. Available expression analysis is used to do global common subexpression elimination (CSE). If an expression is available at a point, there is no need to re-evaluate it. References Aho, Sethi & Ullman: Compilers – Principles, Techniques, and Tools Addison-Wesley Publishing Company 1986 Compiler optimizations Data-flow analysis
https://en.wikipedia.org/wiki/Media%20in%20Cumberland%2C%20Maryland
Cumberland, Maryland, has several media outlets, most carrying some form of satellite programming. WCBC-AM and the Cumberland Times-News actively collect their local news content, while WFRB-FM has some local news content, but do not actively collect it. Aside from some local news programming, virtually no mass media content originates from Cumberland. The local media tends to rebroadcast Hagerstown, Baltimore and Washington, DC, television stations for news coverage. Commercial Media is available from such companies as Allegany Media, and Commercial Video. Both companies as based out of Cumberland, Maryland. Print Allegany Magazine (Cumberland) Bedford Gazette (Bedford, PA) Cumberland Times-News (Cumberland) Daily American (Somerset, PA) Keyser Mineral Daily News-Tribune (Keyser, WV) Morgan Messenger (Berkeley Springs, WV) Historic 1808-1809: Cumberland Impartialist 1809-1809: American Eagle 1813-1818: Allegany Freeman 1814-181?: Alleghany Federalist 1814-1814: Cumberland Gazette 1820-1867: Alleganian 1823-1832: Advocate, and Farmers' & Mechanics' Register 1823-1835: Maryland Advocate 1828-1882: Civilian 1829-1851: Cumberland Civilian 1832-1838: Advocate 1833-1840: Phoenix Civilian 1843-1902: Cumberland Alleganian 1851-185?: Unionist 1851-1856: Cumberland Miners' Journal Cumberland 1852-1859: Cumberland Telegraph 1859-1875: Civilian & Telegraph 1861-1861: Democratic Alleganian 1862-1867: Allegany County Gazette 1862-1868: Cumberland Union 1869-186?: Mountain City Times 1872-1891: Cumberland Daily Times 1876-1877: Cumberland Alleganian and Daily Times 1877-1878: Daily Alleganian and Times 1877-1879: Alleganian and Times 1878-1881: Cumberland Times 1879-187?: Independent 1881-1884: Daily Times 1882-1890: Sunday Civilian 1890-189?: Daily News 1890-189?: Weekly Civilian 1891-189?: Cumberland Freie Presse 1894-1895: Sunday Scimitar 1912-191?: Cumberland Press 1892-1916: Evening Times 1935-193?: Cumberland Guide 1871-1938: Cumberland Daily News 1937-1938: Voice 1938-1942: Voice of Labor 1942-194?: CIO News: Western Maryland edition 1961-1961: Allegany Garrett Citizen 1961-1983: Citizen 1938-1988: Cumberland News 1916-1988: Cumberland Evening Times 1988-present: Cumberland Times-News References Albert L. Feldstein, Feldstein's Historic Banner Front Pages of the Cumberland Daily News, Cumberland News and Cumberland Evening News vol I: 20th Century (Cumberland: Albert L. Feldstein, 1986). Albert L. Feldstein, Feldstein's Historic Newspapers of Allegany County vol. II: 19th and 20th Centuries (Cumberland: Albert L. Feldstein, 1987) Radio Cumberland is served by 18 radio stations, 14 FM and 4 AM. Most are owned by local companies, such as WTBO-WKGO Corporation, LLC, which owns WFRB 560/WFRB-FM 105.3, WRQE 106.1 and WTBO-AM 1450; Cumberland Broadcasting Company owns two stations, WCBC-AM 1270/FM 107.1. Others are owned by West Virginia Radio Corporation out of nearby Morgantown, WV. FM b
https://en.wikipedia.org/wiki/Babangon%20Ako%27t%20Dudurugin%20Kita
(International title: Sweet Revenge / and Crush You) is a 2008 Philippine television drama series broadcast by GMA Network. The series is based on a 1989 Philippine film of the same title. Directed by Joel Lamangan, it stars Yasmien Kurdi and JC de Vera. It premiered on March 24, 2008 on the network's Telebabad line up. The series concluded on June 27, 2008 with a total of 70 episodes. The series is streaming online on YouTube. Cast and characters Lead cast JC de Vera as Derek Perantes / Rod Yasmien Kurdi as Salve Dizon de Leon / Emma Perantes Supporting cast Dina Bonnevie as Evita Gomez Perantes Marvin Agustin as Alfred De Leon Angelika dela Cruz as Via Fausto Tonton Gutierrez as Jango San Juan Paolo Contis as Tyrone San Juan Glydel Mercado as Imelda / Verna Diana Zubiri as Julie Maceda San Juan Recurring cast Tony Mabesa as Governor Fausto LJ Reyes as Joanna Marie "Joey" Salcedo Jay Aquitania as Juno San Juan Patrick Garcia as Lawrence Fajardo Robert Ortega as Fredo Dion Ignacio as Pablo Jenny Miller as Beverly Castro Mart Escudero as Roman Arthur Solinap as Harry Stef Prescott as Courtney Paolo Serrano as Jake Sanchez Guest cast Ian De Leon as Melvin Jennica Garcia as teen Julie Joseph Bitangcol as teen Tyrone Caloy Alde as Ariel Hanni Miller as Agnes Lizzy Pecson as Belen Chariz Solomon as Jadane Paulo Avelino as Brenan Mike Magat as Ruben Andrew Schimmer as Dennis Maybelline dela Cruz as Dolly dela Cruz Juan Rodrigo as Arturo Salcedo Gino Padilla as himself Emilio Garcia as Emilio Perantes Roi Vinzon as Roberto Mike Tan as Mario Odette Khan as Yolly Deborah Sun as Amparo Menggie Cobarrubias as Pepito Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of earned a 28% rating. Accolades References External links 2008 Philippine television series debuts 2008 Philippine television series endings Filipino-language television shows GMA Network drama series Philippine crime television series Philippine political television series Philippine television series based on films Television shows based on comics Television shows set in the Philippines
https://en.wikipedia.org/wiki/European%20route%20E105
E105 is part of the International E-road network, which is a series of main roads in Europe. It is a north–south reference road, meaning it crosses Europe from north to south, and other E-road numbers have been calculated based on these reference roads. Description E105 starts from Hesseng, (just south of Kirkenes), Norway and runs along Russia's R21, M10, M2: Ukraine's M20, M29, and M18 to Yalta, Crimea (Russian-occupied territory of Ukraine). Russians call this the Crimea Highway (Крымское шоссе), and de facto officially marked Republic of Crimea section as 35А-002. Route Kirkenes () : border with Norway - Pechenga - Murmansk - Petrozavodsk - Saint Petersburg (or ): Saint Petersburg - Veliky Novgorod - Tver - Moscow : within Moscow : Moscow - Tula - Oryol - Kursk - Belgorod - border with Ukraine : border with Russia - Kharkiv () : Kharkiv - Hubynykha - Zaporizhia - Melitopol (disputed between /) 35A-002/: Dzhankoy () - Simferopol - Alushta - Yalta Gallery External links UN Economic Commission for Europe: Overall Map of E-road Network (2007) 199105 E105 E105 European routes in Ukraine Roads within the Arctic Circle Transport in Yalta
https://en.wikipedia.org/wiki/Erfurt%20Hauptbahnhof
Erfurt Hauptbahnhof (Erfurt Hbf) or Erfurt Central Station is the central railway station at Erfurt in Germany. It is an important junction on the German rail network, served by numerous local and long-distance rail services. Immediately north of the station is Erfurt's city centre. The station was used by approximately 12.5 million passengers in 2006, an average of about 34,000 per day. The station lies on the Thüringer Bahn, which connects Halle to Bebra. It is served also by the Erfurter Bahn. It was rebuilt from 2002 to 2008 for the completion of the Nuremberg–Erfurt high-speed railway and the Erfurt–Leipzig/Halle high-speed railway and connects the Berlin–Munich and Frankfurt–Dresden long-distance routes. Location in the city centre Erfurt Hauptbahnhof is located in the district of Altstadt (old town), south of the Anger (the Erfurt central square, literally, the village green), on the former fortress established in the 15th century. To the south, it borders on the districts of Löbervorstadt and Daberstedt. The marshalling yard and freight yard as well as the operating facilities of the Hauptbahnhof are located to the east in the Krämpfervorstadt. There and in Daberstedt there used to be numerous apartments for railwaymen. The station itself is bordered to the south by the Flutgraben (flood channel) and to the north by Willy-Brandt-Platz. Underneath the railway station is the station road, which is used by the city's public transport. It is used by tram lines 1, 3, 4, 5 and 6 as well as bus routes. Other buses run to the bus station located 150 metres northeast of the station in Bürgermeister-Wagner-Straße. In the adjacent Kurt-Schumacher-Straße there is car access to the station, parking lots, taxis ranks and the InterCityHotel. The old station hotel, the Erfurter Hof, was the location in March 1970 of the Erfurt Summit between Willy Brandt and Willi Stoph, the first meeting between leaders of East Germany and West Germany. Today it is used as a business centre. History Erfurt Hauptbahnhof has experienced several new developments and reconstructions in the course of its history. 1846–1890 station The location of the first Erfurt station was controversial. Inside the Erfurt city walls there were only a very limited area available and outside the fortifications a suitable area was available in the Krämpfer field to the east of the Schmidtstedter Tore (gate). The Erfurt Mayor, Philippe Dressel, however, argued in favour of a location within the city fortification and the Prussian authorities and the military also demanded that the route of the railway line pass through the fortress ramparts, so that they could stop railway operations in crisis situations. In July 1845, the decision was finally taken to build the station within the fortifications, north of the hohen Batterie (high battery). The first railway station was built in 1846 during the construction of the Thuringian Railway by the Thuringian Railway Company (Thüringische Eisen
https://en.wikipedia.org/wiki/Sports%20Media%2C%20Inc.
Sports Media, Inc. (SMI) is a sports media and marketing company that produces radio and television programming as well as representing professional athletes. Shows Cowboys Live 2005 NFL Wrap-Up Inside The Huddle Martellus Bennett Show(2009) Keith Brooking Show (2010) Sports mass media in the United States Sports management companies Companies based in Dallas
https://en.wikipedia.org/wiki/Chaos%20World
is a role-playing video game developed and published by Natsume Co., Ltd. for the Family Computer in Japan in 1991. Gameplay The game has a basic good vs. evil plot. This game is also one of the few games for the Family Computer that contains a day/night cycle. Players are allowed to assign the initial available character's gender and job class, which will affect the equipment and spells they can learn and acquire. Throughout the game other characters can be acquired and added to the party. There are guilds in the various towns where the player can assign characters in the party to perform 'jobs'. When a character is performing a 'job', they are not available for use in the player's party until the job has been completed. After the job is finished, the character will return to the player's party and will receive extra money and/or equipment. A formation and tactic can be picked at the onset of the battle, but from there the battle is handled automatically, and items/spells/attacks are used when needed as determined by the computer. Plot The king's daughter is sick while the kingdom is occupied by monsters. The king needs the player, who happens to be the offspring of the great warrior Mars, to investigate the cause of these incidents. The dark forces seek to conquer the world and the player must prevent it. References External links RPGClassics Shrine 1991 video games Fantasy video games Japan-exclusive video games Natsume (company) games Nintendo Entertainment System games Nintendo Entertainment System-only games Video games developed in Japan Video games with gender-selectable protagonists Video games scored by Iku Mizutani Video games scored by Hiroyuki Iwatsuki
https://en.wikipedia.org/wiki/Musashi%20no%20B%C5%8Dken
is a role-playing video game for the Family Computer produced by Sigma Ent. Inc., and released in Japan on December 22, 1990. The game is inspired by the legendary Japanese figure Miyamoto Musashi and is an RPG in the vein of Dragon Quest. The player only controls Musashi, son of Miyamoto Musashi, although a computer-controlled partner assists in battle. There is a fan translation patch available for this game which allows it to be played in English. See also Miyamoto Musashi in fiction References External links RPGClassics Shrine Superfluous Gamer 1990 video games Japan-exclusive video games Nintendo Entertainment System games Nintendo Entertainment System-only games Quest Corporation games Role-playing video games Video games developed in Japan Video games scored by Masaharu Iwata Cultural depictions of Miyamoto Musashi
https://en.wikipedia.org/wiki/Jednotka
Jednotka (formerly STV1) is a Slovak television generalist channel owned and operated by public broadcasting, state-funded RTVS. Programming News and journalism Góly, body, sekundy (Goals, points, seconds) - sport news O 5 minút 12 (5 to 12 (o'clock)) - political debate Občan za dverami (Citizen behind the door) - programme about civil law disputes Počasie (Weather forecast) Ranné správy (Morning news) Reportéri (Reporters) Slovensko v obrazoch (Slovakia in pictures) - interesting facts about Slovakia Správy RTVS (News RTVS) at 12:00, 16:00 (weekdays), 19:00 (daily) Svet v obrazoch (The world in pictures) - interesting facts about the world K11 – Kommissare im Einsatz (Die neuen Fälle) - Saturdays, 10:30 Entertainment 5 proti 5 (5 vs 5) - Family Feud franchise Boris & Brambor - TV podcast Cestou necestou (Road or no road (literally)) Čo ja viem (What Do I Know) Dámsky klub (Women's club) - lifestyle magazine Duel - quiz show Duel Junior - quiz show Folklorika - folklore magazine Milujem Slovensko (I love Slovakia) - I Love My Country (TV series) franchise Neskoro večer (Late evening) - Late-night talk show Postav dom, zasaď strom (Build a house, plant a tree) - hobby, housing and gardening magazine Tajomstvo mojej kuchyne (The secret of my kitchen/cuisine) Záhady tela (Body mysteries) Zem spieva (Land sings) - folklore singing and dancing competition Zlaté časy (Golden times) Original series Doctor Martin - crime/comedy 2015 - 2016 Hniezdo (The nest) - drama 2020 Inspector Max - crime/comedy 2018 Kolonáda (Colonnade) - family drama 2013 Pumpa (Gas station) - sitcom ongoing Strážmajster Topinka (Sergeant Topinka) - crime/comedy 2019 Tajné životy (Secret Lives) - drama 2015 - 2017 Former programming Čierna alebo biela (Black or white) Futbal (Football) Hádaj, kto nás pozval? (Guess, who invited us?) Hit Storočia (Hit of the Century) Koleso Šťastia (Wheel of Fortune) - Wheel of Fortune franchise Milionár (Millionaire) - Who Wants to Be a Millionaire? franchise Ranný magazín (Morning magazine) Ruku na to (Deal) - Deal or No Deal franchise Si v obraze? (Are you in the picture?) Slovensko hľadá SuperStar (Slovak Idol) - Pop Idol franchise S.O.S. Svadba snov (Dream wedding) - Love letters franchise Taxík (Taxi) - Cash Cab franchise Foreign series (currently broadcasting) Die Bergretter Don Matteo The District Fireman Sam Hercule Poirot Hudson & Rex Lekarze Les Chamois Spyashchie Victoria (British TV series) Peppa Pig Pingu Postman Pat Pysamesky LazyTown (Lekiovia) Mr. Men and Little Miss (Menekovia a Menikovia) (former broadcasting) Baywatch Desperate Housewives Der Clown DuckTales Hannah Montana House M.D. Kim Possible Knight Rider Law & Order: Special Victims Unit Matlock Medicopter 117 – Jedes Leben zählt Mr. Bean The Addams Family The Flintstones The Scooby-Doo Show The Simpsons The Yogi Bear Show Thomas & Friends Tom and Jerry Notable presenters Petra Ázaci
https://en.wikipedia.org/wiki/Radia%20Senki%3A%20Reimeihen
is an Action RPG for the Nintendo Family Computer created by Tecmo, and released in Japan on November 15, 1991. Though an English release was at one point planned, it was never released outside Japan, with only a prototype ever made. There is a fan translation patch available for this game which allows the game to be played in English. Radia Senki follows a cast of characters trying to stop the domination of Lemuria by Gadiss, a political leader. The protagonist suffers from amnesia at the beginning of the game, but he does regain his memories by the conclusion of the story. Gameplay Radia Senki features both action and console role-playing elements. The player controls one of the five characters available during the game through overhead environments. Players enter battles when the character walks over an invisible battle trigger tile. Battles are fought in real-time, similar to The Legend of Zelda and the screen does not change when a battle occurs. The other characters in the party not controlled by the player can be issued commands during battles, such as fight or regroup. During battle, players can tell the party to act dead, in order to avoid enemies. Characters can also use a variety of damaging and healing spells, as well as spells that affect enemies stats. Characters gain experience after battles and become stronger. Although spells are learned from finding scrolls, the number of times a spell can be cast increases as characters gain more levels. Enemies typically do not drop gold and many drop items the player can sell. Stores in towns buy and sell items, weapons, and armor and the heroes can rest and save the game in any bed found throughout the game. Plot Radia Senki begins as the protagonist gains consciousness in a forest, suffering from amnesia. Rescued by Darus, a wandering mage, the hero and his ally witness the crash of a plane and find the unconscious Lefis. When she comes to, it is revealed that her stepbrother Gadiss seeks world domination and is currently looking for the keys to the sacred Radia Tower. She also comments on the fact that the hero's name (chosen by the player) means "Guardian of Light". Meanwhile, Nova, a lackey of Gadiss and the leader of the country Samara, has begun to destroy forests. During this time, Baru, a bandit, Haman, a knight of Lefis, and Saria, a mysterious woman from Samara, join the hero and Darus. Duke Necrude, the leader of the country Zenobia, was put under the control of Samara and kidnaps Lefis. When rescuing her, the heroes learn that Gadiss has finished building the Fitzcarraldo, a powerful airship. Aboard the ship, the party finds Lefis and she reveals that the hero really is the legendary guardian from Ark's legend, but Nova appears and explains that Saria is his daughter and spy. Nova also suggests the hero is the key to opening the Tower, but the hero refuses to help. Gadiss and Nova seek to open the Tower, which will give them the power to reshape the world, called Lemuria, a
https://en.wikipedia.org/wiki/Erwin%20Engeler
Erwin Engeler (born 13 February 1930) is a Swiss mathematician who did pioneering work on the interrelations between logic, computer science and scientific computation in the 20th century. He was one of Paul Bernays' students at the ETH Zürich. After completing his doctorate in 1958, Engeler spent fourteen years in the United States, teaching at the University of Minnesota and at the University of California, Berkeley. In 1959 he contributed an independent proof of several equivalent conditions to omega-categoricity, an important concept in model theory. He returned to Switzerland in 1972, where he served as a professor of logic and computer science at the ETH until his retirement in 1997. Engeler was named a Fellow of the Association for Computing Machinery in 1995. Selected publications External links Professor Engeler's home page at the ETH Zurich. Swiss mathematicians Fellows of the Association for Computing Machinery 1930 births Living people
https://en.wikipedia.org/wiki/Law%20practice%20management%20software
Law practice management software is software designed to manage a law firm's case and client records, billing and bookkeeping, schedules and appointments, deadlines, computer files and to facilitate any compliance requirements such as with document retention policies, courts' electronic filing systems and, in the UK, the Solicitors' Accounts Rules as defined by the Solicitors Regulation Authority. Purpose Because law schools do not generally teach new attorneys the business skills to run a law office, many offices have turned to technology to ease the learning curve and reduce clerical errors. The American Bar Association (ABA) has found that calendar and deadline related mistakes account for most legal malpractice claims. Therefore, an initial investment in software tools can yield long-term savings in defending against such claims. In fact, the ABA has an entire section devoted entirely to law office management, of which software and related programs are an increasingly important part of its mission delivery. Many state bar associations also provide assistance and discounts to their members for such software. The main purpose of these programs is to allow a law firm to run more smoothly. Case Management Software, used properly, improves efficiency, provides for conflict checking, and enables a law office to not have to search for the physical file each time a client calls with questions, thereby helping to reduce the need for callbacks since the client can get answers on an as needed basis at the time of their inquiry. Types of software Software applications have become increasingly important in modern law practice. Picking the best software for a law office depends on many variables. Attorneys/Solicitors often buy their software based on their practice area. The New Jersey State Bar Association web site lists a variety of applications by substantive law (Bankruptcy, Collections, Estate planning and administration, and Real estate) as well as by practice matter (Calendar/Schedule/Docket Control, Case & Practice Management, Document Assembly, and Document Management). Regardless of the type of law practiced, practice management software (a form of Customer relationship management software) is among the most important. Features of practice management software include: Case management (databases, checking conflicts of interest and statutes of limitations) Time tracking (for billing) Document assembly Contact management Calendaring Docket management Client communication Contract Management Court Case Status Tracker Other software systems that are useful for law firms include: Password security, Disk encryption, Mindmapping, desktop notes, word processing, and email management. Some firms use modified versions of Open source software. Most law firms also subscribe to a Computer-assisted legal research database for Legal research. Such databases provide Case law from case reporters, and often other legal resources. The two largest le
https://en.wikipedia.org/wiki/2007%E2%80%9308%20Canadian%20network%20television%20schedule
The 2007–08 Canadian network television schedule indicates the fall prime time schedules for Canada's major English and French broadcast networks. For schedule changes after the fall launch, please consult each network's individual article. Changes CTVglobemedia's takeover of the A-Channel stations was approved by the CRTC during the summer. As a result, the CTV and A-Channel schedules were adjusted from the original upfronts announcements, with CTV bumping several of its scheduled replacement shows to the secondary system. The fall schedule that actually debuted on A-Channel, in fact, was not fully announced until the end of September 2007, when CTV announced that The Big Bang Theory and Two and a Half Men, both originally scheduled to air on CTV following the end of Dancing with the Stars, would instead premiere on A-Channel in sync with their American launches. CTV also later bumped Dirty Sexy Money and Big Shots to A-Channel, each several weeks after their premieres on CTV. 2007 official fall schedule Sunday Monday Tuesday Wednesday Thursday Friday Saturday Top weekly ratings Note: English Canadian television only by viewers age 2 and up Data sources: BBM Canada official website References External links BBM Canada Top Weekly Television Ratings 2007 in Canadian television 2008 in Canadian television Canadian television schedules
https://en.wikipedia.org/wiki/RNA%20integrity%20number
The RNA integrity number (RIN) is an algorithm for assigning integrity values to RNA measurements. The integrity of RNA is a major concern for gene expression studies and traditionally has been evaluated using the 28S to 18S rRNA ratio, a method that has been shown to be inconsistent. This inconsistency arises because subjective, human interpretation is necessary to compare the 28S and 18S gel images. The RIN algorithm was devised to overcome this issue. The RIN algorithm is applied to electrophoretic RNA measurements, typically obtained using capillary gel electrophoresis, and based on a combination of different features that contribute information about the RNA integrity to provide a more universal measure. RIN has been demonstrated to be robust and reproducible in studies comparing it to other RNA integrity calculation algorithms, cementing its position as a preferred method of determining the quality of RNA to be analyzed. A major criticism to RIN is when using with plants or in studies of eukaryotic-prokaryotic cells interactions. The RIN algorithm is unable to differentiate eukaryotic/prokaryotic/chloroplastic ribosomal RNA, creating serious quality index underestimation in such situations. Terminology Electrophoresis is the process of separating nucleic acid species based on their length by applying an electric field to them. As nucleic acids are negatively charged, they are pushed by an electric field through a matrix, usually an agarose gel, with the smaller molecules being pushed farther, faster. Capillary electrophoresis is a technique whereby small amounts of a nucleic acid sample can be run on a gel in a very thin tube. There is a detector in the machine that can tell when nucleic acid samples pass through a specific point in the tube, with smaller samples passing through first. This can produce an electropherogram such as the one in Figure 1, where length is related to time at which the samples pass the detector. A marker is a sample of known size run along with the sample so that the actual size of the rest of the sample can be known by comparing their running distance/time to be relative to this marker. RNA is a biological macromolecule made of sugars and nitrogenous bases that plays a number of crucial roles in all living cells. There are several subtypes of RNA, with the most prominent in the cell being tRNA (transfer RNA), rRNA (ribosomal RNA), and mRNA (messenger RNA). All three of these are involved in the process of translation, with the most prominent species (~85%) of cellular RNA being rRNA. As a result, this is the most immediately visible species when RNA is analyzed via electrophoresis and is thus used for determining RNA quality (see Computation, below). rRNA comes in various sizes, with those in mammals belonging to the sizes 5S, 18S, and 28S. The 28S and 5S rRNAs form the large subunit and the 18S forms the small subunit of the ribosome, the molecular machinery responsible for synthesizing proteins. Applicati
https://en.wikipedia.org/wiki/Fight%20for%20Life%20%28TV%20series%29
'Fight for Life' is a British television series which explores the human body and its fight for survival in life-threatening situations using new technology, with computer-generated imagery and specially shot footage. The series explains the six stages of life: Birth, Childhood, Teenagers, Prime of Life, The Middle Years and The Final Years. Episodes Birth This episode explains that birth is the riskiest time in life and the process of a woman delivering a baby and how both the woman and the child are put at risk in this complex journey. It features a two-hour-old baby already facing death who has Meconium Aspiration Syndrome as a result of inhaling excrement at or before birth. The programme also follows a woman who needs a caesarean because her baby's in a breech position but the operation goes horribly wrong as the umbilical cord gets trapped around the baby's neck. Childhood As the body develops it is always at risk of deadly diseases, but children's bodies have certain features that bring them back from the brink of death. This episode follows a boy with malformed heart which could collapse at any time. The only way to save him is a heart transplant, a battle against time as the body can only survive so long on an artificial heart. A different patient suffers a major asthma attack and his body has to depend on its own immune system for the fight for survival to unblock his airways. Teenagers As teenagers take massive risks at this time, it can be a very dangerous time in life, in the middle of childhood and adulthood. One patient is a victim of two potentially fatal stab wounds - one of which penetrated the lining of a lung. Surgeons perform an immediate lung drain to relieve pressure on the lung and to stop difficulty of breathing. Two girls are rushed to A&E after alcohol poisoning and using computer imagery, explores the damage done. Another patient has broken two bones in his foot severing a major artery and doctors battle to save his foot with the remaining blood vessels in his foot. Prime of Life At a time when our bodies are at its strongest, the programme follows a woman with a congenital heart condition as she strains to deliver a baby and her body stretched to the limit. Another woman has been hit by a car and left with life-threatening injuries. Medics battle in the vital first hour to keep her alive. Scott, another patient, has incurable liver disease. His only option is a live donation from his cousin and 17-hour operation as it is explored with amazing computer graphics. The Middle Years When middle-aged things start to go wrong. A patient has a life-threatening aneurysm in a major blood vessel as it decays so much, it could burst at any time, which would kill him. Doctors battle against time to replace it with an artificial one. Christine has dangerous carbon dioxide levels in her blood, related to years of smoking, which is poisoning her brain. Medics are not certain if they can save her in time. John has a heart failur
https://en.wikipedia.org/wiki/Half-inch%20tape
Half-inch tape refers to magnetic tape with a width of in a format such as: Computer magnetic tape data storage Reel-to-reel UNISERVO IBM 7 track IBM 9 track Cartridge IBM 3480 IBM 3590 IBM 3592 Digital Linear Tape (DLT) Linear Tape-Open (LTO) Videotape Reel-to-reel CV-2000 EIAJ-1 Video cassette Betacam Betamax VHS S-VHS
https://en.wikipedia.org/wiki/Assembly%20shell
On graphing calculators, an assembly shell is a program that is used to run other programs written in the calculator's native machine code rather than the calculator's standard high-level programming language. While all assembly shells can run assembly programs, some can also run high-level programs. For example, MirageOS and DoorsCS, two popular TI-83+ assembly shells, can run TI-BASIC programs by placing a colon as the first bit of code on the first line in the program. Assembly shells were created when calculator manufacturers did not support native-code programming. ZShell, the first assembly shell, was created for the TI-85 after an exploit was found using a hacked memory backup file containing the shell to bypass the calculator's standard operating system. Rather than crack down on users who had managed to bypass the OS to run their own code, Texas Instruments chose to release native programming information for its then-upcoming TI-83 calculator. However, their stance changed and they decided to remove native code functionality from the TI-84 plus CE, making an assembly shell necessary once again. Although this rendered the traditional assembly shell unnecessary on the TI-83 hardware, calculator programmers continued to develop shells to supplement or replace the standard operating system. Since the TI-83, TI has supported assembly-level programming on all subsequent graphing calculators, though similar shell hacks needed to be created for older hardware, such as the TI-82 and the TI-92. Hewlett-Packard also supports assembly language programming, though onboard programming tools mean that a separate shell is not needed. See also TI-BASIC Texas Instruments Hewlett-Packard References External links ticalc.org - An archive of Assembly and Basic programs for TI calculators. Graphing calculator software
https://en.wikipedia.org/wiki/CJCO-DT
CJCO-DT (channel 38) is a multicultural television station in Calgary, Alberta, Canada, part of the Omni Television network. It is owned and operated by Rogers Sports & Media alongside Citytv station CKAL-DT (channel 5). Both stations share studios at 7 Avenue and 5 Street Southwest in Downtown Calgary, while CJCO-DT's transmitter is located near Old Banff Coach Road/Highway 563. Overview The station was licensed by the Canadian Radio-television and Telecommunications Commission (CRTC) on June 8, 2007, and it launched on September 15, 2008. The station was originally assigned the call sign CHXC by Industry Canada, but this was changed to CJCO in February 2008. The station's primary focus is multicultural programming and documentaries. Like the other Omni stations across the country, the station once aired a large amount of syndicated American shows such as The Simpsons and The King of Queens, but those have since been dropped as of the start of the 2015–16 season. Newscasts Omni Alberta formerly produced local newscasts aimed at the Cantonese, Mandarin, and South Asian communities across the province. While there were newsgathering teams in both Edmonton and Calgary, the production of the newscasts themselves were done out of CKEM's studios in Downtown Edmonton. The newscasts were discontinued and replaced by Omni's national newscasts in September 2011; the national newscasts still featured contributions from Calgary-based reporters. On May 30, 2013, Rogers announced that it would immediately close down the production facilities for both Omni Alberta stations as a result of budget cuts—ending the production of local programming and news content from the stations. Technical information Subchannel As of July 28, 2020, due to the DTV spectrum repack happening across North America, CJCO-DT has moved from UHF 38 to UHF 34. The PSIP number remains as 38.1. Analogue-to-digital conversion On August 11, 2011, three weeks before Canadian television stations in CRTC-designated mandatory markets transitioned from analogue to digital broadcasts, CJCO shut down its analog transmitter and flash cut its digital signal into operation on UHF channel 38. Through the use of PSIP, digital television receivers will display CJCO-TV's virtual channel as 38.1. References External links CJCO-DT history – Canadian Communication Foundation JCO-DT JCO-DT Television channels and stations established in 2008 2008 establishments in Alberta
https://en.wikipedia.org/wiki/Free%20Software%20Foundation%20anti-Windows%20campaigns
Free Software Foundation anti-Windows campaigns are the events targeted against a line of Microsoft Windows operating systems. They are paralleling the Defective by Design campaign against digital rights management technologies, but they instead target Microsoft's operating systems instead of DRM itself. BadVista BadVista was a campaign by the Free Software Foundation to oppose adoption of Microsoft Windows Vista and promote free software alternatives. It aimed to encourage the media to make free software part of their agenda. The campaign was initiated on December 15, 2006 with aims to expose what it views as the harms inflicted on computer users by Microsoft Windows Vista and its embedded digital rights management, as well as providing a user-friendly gateway to free software alternatives. BadVista activists teamed up with Defective by Design members on a Vista launch party on January 30, 2007 at Times Square. Protesters in hazmat suits held their signs explaining the restrictions Vista may impose on computer users. The campaign ended on January 8, 2009, when "victory" was declared after Microsoft released its Windows 7 Beta. This victory claim was based on the tepid adoption of Vista, compared to those sticking with the less-DRM infused Windows XP or moving to the FSF-defined less restrictive Mac OS X or largely free Linux or FreeBSD. A minority of Linux distros are recognized as completely free, however like kFreeBSD vanilla Linux kernel contains binary blob device drivers. This is solved by Linux-libre. Windows 7 Sins In 2009, a campaign targeted towards Windows 7 was launched by the Free Software Foundation under the name "Windows 7 Sins". The campaign's site uses graphics from the free software video game XBill. Upgrade from Windows 8 In October 2012, the Free Software Foundation began another campaign called "Upgrade from Windows 8", this time targeted towards Windows 8. Windows 10 During the Windows 10 release, the FSF issued a statement urging users to reject it due to its proprietary nature. The Foundation also cited other sources of concern, such as forcing lower-paying customers to test less-secure updates before higher-paying users, Microsoft's implication in the 2013 global surveillance scandal and the new privacy policy enacted by Windows. Windows 11 In the "Life's better together when you avoid Windows 11" statement, FSF criticized the use of Trusted Platform Module (TPM) on Windows 11, and the operating system in general; they described TPM as "slightly misleading", adding that "its relationship to the user isn't one based on trust, but based on treachery" when deployed by Microsoft. See also Defective by Design – an associated anti-digital rights management campaign that also targets Windows XP and higher References External links badvista.fsf.org/badvista-declares-victory - official "BadVista" website en.windows7sins.org - official "Windows 7 sins" website fsf.org/windows8 - official "Upgrade from Windows 8" websit
https://en.wikipedia.org/wiki/Tell%20Me%20You%20Love%20Me%20%28TV%20series%29
Tell Me You Love Me is an American cable television drama series that premiered on HBO and The Movie Network on September 9, 2007. The series was created by Cynthia Mort and originally conceived as Sexlife. The pilot episode was produced and directed by Patricia Rozema and shot in Winnipeg, Manitoba. The series was picked up by HBO for a second season in October 2007, but was ultimately canceled in July 2008 when Mort said she and the network "were unable to find the direction of the show for the second season". Overview Tell Me You Love Me revolves around three couples, Jamie and Hugo (Borth and Kirby), Katie and David (Walker and DeKay), and Carolyn and Palek (Walger and Scott), each with their own problems concerning intimacy in their relationships. They seek the help of therapist May Foster (Alexander), who herself has relationship problems with her partner Arthur (Selby). Cast Regular cast Jane Alexander as Dr. May Foster Michelle Borth as Jamie Tim DeKay as David Aislinn Paul as Isabella Adam Scott as Palek Katharine Towne as Mason Sonya Walger as Carolyn Ally Walker as Katie Julie Mond as Nicole Recurring guest stars David Selby as Arthur Foster Luke Kirby as Hugo Ryan Wynott as Joshua Ian Somerhalder as Nick Sherry Stringfield as Rita Ronny Cox as John Structure Each episode screens without any introduction, no title cards, and no opening credits. The episodes are also shot with handheld cameras, giving the show a somewhat documentary-like feel. No episode has a music score or soundtrack, except for one song which generally starts in the last two to three scenes and carries over the closing credits. The title card for the show is not shown until immediately before the closing credits. Depiction of sex The series gained early publicity because of its extremely realistic depictions of sexual intercourse, oral sex and masturbation. Despite persistent rumors to the contrary, and a notable lack of comment on the matter from either HBO or the production team, the sex scenes were simulated. Director Patricia Rozema was among those to have addressed this issue directly: With regard to these controversial scenes actress Jane Alexander has said the following: Reception Times James Poniewozik named it one of the Top 10 New TV Series of 2007, ranking it at #3. The first episode of the show only attracted a total of about 910,000 viewers—far fewer than what the network had been pulling in for previous series such as Rome, Deadwood, and even the ill-fated John from Cincinnati. A month after its debut, HBO claimed the show had drawn a total of 3.1 million viewers across seven broadcasts. Home media References External links Overview of Tell Me You Love Me: "Everything About HBO's Tell Me You Love Me" 2007 American television series debuts 2007 American television series endings 2000s American drama television series HBO original programming Crave original programming Television shows set in Manitoba Television shows filmed in Winnipeg E
https://en.wikipedia.org/wiki/CJEO-DT
CJEO-DT (channel 56) is a multicultural television station in Edmonton, Alberta, Canada, part of the Omni Television network. It is owned and operated by Rogers Sports & Media alongside Citytv station CKEM-DT (channel 51). Both stations share studios with Rogers' local radio stations on Gateway Boulevard in Edmonton, while CJEO-DT's transmitter is located near Yellowhead Highway/Highway 16A. History The station was licensed by the Canadian Radio-television and Telecommunications Commission (CRTC) on June 8, 2007, and first signed on the air on September 15, 2008. The station was originally assigned the call sign CHXE by Industry Canada, but this was changed to CJEO in February 2008. In late 2015, Rogers' television stations in Edmonton moved from their studios in downtown Edmonton to the headquarters of Rogers' Edmonton radio stations on Gateway Boulevard. Newscasts Omni Alberta formerly produced local newscasts aimed at the Cantonese, Mandarin, and South Asian communities across the province. While there were newsgathering teams in both Edmonton and Calgary, the production of the newscasts themselves were based out of CKEM's studios in Downtown Edmonton. The newscasts were discontinued and replaced by Omni's national newscasts in September 2011; the national newscasts still featured contributions from Edmonton-based reporters. On May 30, 2013, Rogers announced that it would immediately close down the production facilities for both Omni Alberta stations as a result of budget cuts – ending the production of local programming and news content from the stations. Technical information Subchannel Analogue-to-digital conversion On August 31, 2011, when Canadian television stations in CRTC-designated mandatory markets transitioned from analogue to digital broadcasts, the station flash cut its digital signal on UHF channel 44. Through the use of PSIP, digital television receivers will display CJEO-TV's virtual channel as 56.1. References External links CJEO-DT history – Canadian Communication Foundation JEO-DT JEO-DT Television channels and stations established in 2008 2008 establishments in Alberta
https://en.wikipedia.org/wiki/Broccoli%20necrotic%20yellows%20cytorhabdovirus
Broccoli necrotic yellows cytorhabdovirus (BNYV) is a plant pathogenic virus of the family Rhabdoviridae. External links ICTVdB - The Universal Virus Database: Broccoli necrotic yellows virus Family Groups - The Baltimore Method Cytorhabdoviruses Viral plant pathogens and diseases
https://en.wikipedia.org/wiki/Bramble%20yellow%20mosaic%20virus
Bramble yellow mosaic virus (BrmYMV) is a plant pathogenic virus of the family Potyviridae. External links ICTVdB - The Universal Virus Database: Bramble yellow mosaic virus Family Groups - The Baltimore Method Viral plant pathogens and diseases Potyviruses
https://en.wikipedia.org/wiki/Antiword
Antiword is a free software reader for proprietary Microsoft Word documents, and is available for most computer platforms. Antiword can convert the documents from Microsoft Word version 2, 6, 7, 97, 2000, 2002 and 2003 to plain text, PostScript, PDF, and XML/DocBook (experimental). Overview The Word format is proprietary and only officially supported on Microsoft Windows and Macintosh operating systems. Reading the format on other systems can be difficult or impossible. Antiword was created to support reading this format on these systems. Using the plain text output of Antiword, a Word document can be processed and filtered using shell scripts traditional text tools such as diff and grep. It can also be used to filter Word document spam. Development has stagnated and no official release has been made since 2005. See also wv - library for converting Microsoft Word files. Office Image Extraction Wizard References External links Official Website Document viewers Cross-platform free software Free PDF software
https://en.wikipedia.org/wiki/Comparison%20of%20social%20networking%20software
Social networking software provides the technological basis for community driven content sharing and social networking. See also Comparison of software and protocols for distributed social networking, especially for open-source software. Comparison of microblogging and similar services may also be relevant. Social networking software comparison References Social networking software Social networking
https://en.wikipedia.org/wiki/Industrial%20Computer%20Source
Industrial Computer Source was a company launched in 1985 with the publication of their first Industrial Computer Sourcebook. Industrial Computer Source was also known as ICS. Industrial Computer Source became notable for the volume of Sourcebooks mailed to engineers and scientists. The company would mail two to four Sourcebooks per year with quarterly supplements. The company was headquartered in San Diego, CA. Eventually there were satellite divisions in the UK, France and Germany. The first Sourcebook was 52 pages long. Included were sections on industrial computers, industrial I/O cards, monitors and printers, rack accessories, computer accessories, software and books. The 6531, a 4U rackmount computer with a 4.77 MHz 8088 processor. 128KB of RAM, 360K floppy and 10MB hard drive sold for $7,795.00. The products were industrial and rackmount computers, I/O cards and accessories. Industrial Computer Source was sold to Dynatech in 1992. In 1999, the company acquired Advent Design, Inc. and changed the name to ICS Advent. In 2001, Kontron purchased ICS Advent from Dynatech. While Kontron is a German firm, the US division of Kontron initially occupied the headquarters building of ICS Advent in San Diego before moving to a new building in Poway, CA., in May 2005. Kontron allowed the trademark "Industrial Computer Source" to lapse July 20, 2002, and the trademark "Industrial Computer Sourcebook" lapsed May 31, 2003. Chassis Plans secured the trademark "The Original Industrial Computer Source" December 27, 2005. Chassis Plans offers original equipment support for previous Industrial Computer Source customers. Industrial Computer Source is currently a popular term used by companies in the industrial computer market with a Google search returning over 24,000 pages. Many previous customers still search on that term looking for the company for either new equipment or support for existing systems. Industrial Computer Source and ICS Advent systems can often be found for sale on eBay. Industrial Computer Source started as a division of Action Instruments as created by Chuck Philyaw. The concept of Intrapreneur was popular and Industrial Computer Source fit the definition perfectly. David Lippincott was brought in as a founder for technical and manufacturing support. Misters Philyaw and Lippincott purchased Industrial Computer Source from Action Instruments in 1987. References American companies established in 1985 Defunct computer companies of the United States
https://en.wikipedia.org/wiki/Transport%20in%20Perth%2C%20Western%20Australia
Transport in Perth, Western Australia, is served by various means, among them an extensive highway / freeway network and a substantial system of commuter rail lines and bus routes. Public transport is managed by the Transperth agency. History Following the settlement of the Swan River Colony in 1829, the Swan River was the main transportation link between Perth and the port of Fremantle. Land transportation was difficult as the only river crossing near Perth, a ford at the eastern end of the town, was often impassable for wagons and carts. The next crossing point was upstream at Guildford, a major detour. The only alternative to these river crossings were ferries, which operated from North Fremantle, Preston Point, and The Narrows. Road transport Perth has a road network centred around three freeways and nine metropolitan highways. It has no toll roads. Highways and Freeways The Mitchell Freeway connects the city centre to Joondalup, in Perth's northern suburbs. The Kwinana Freeway runs through and beyond the city's southern suburbs towards Mandurah and Bunbury. The Graham Farmer Freeway, incorporating the Northbridge tunnel, was built in 2000, primarily to provide a road link between East Perth and West Perth and act as a city bypass. The port city of Fremantle, and adjacent suburbs, are linked to the city centre via Stirling Highway, which travels on the north side of the Swan River after crossing into North Fremantle on the Stirling Bridge. On the southern side of the river, Canning Highway, which later continues on as Great Eastern Highway, connects Fremantle to Midland, north-east of the city centre. Leach Highway is a parallel route that terminates at the edge of Perth Airport. Marmion Avenue is the northern continuation of West Coast Highway, which runs near the coastline, from Swanbourne to Trigg. The arterial routes out of the Perth Metropolitan Region radiate out as a series of spokes. Stock Road, Rockingham Road, Patterson Road, Ennis Avenue, and Mandurah Road are part of Highway 1, and a coastal route to the areas south of Perth. Kwinana Freeway, and its continuation as Forrest Highway, provide a controlled access alternative (State Route 2) further inland, which meets up with Highway 1 (as Old Coast Road) at Lake Clifton, south of Mandurah. Albany Highway (State Route 30) travels in a south-easterly direction to Albany, Western Australia. At Armadale, in Perth's south-eastern suburbs, South Western Highway (State Route 20) branches off Albany Highway, heading south towards Walpole on Western Australia's southern coast. Brookton Highway (State Route 40) leads from Albany Highway in Kelmscott (just north of Armadale) south-east towards Brookton. From the Midland area, Great Eastern Highway connects to Kalgoorlie, and is part of National Highway 94, which leads to Adelaide, South Australia. Great Northern Highway links Perth to Wyndham in the state's north, and is the majority of National Highway 95 to Darwin, Northern Territor
https://en.wikipedia.org/wiki/Spawning%20networks
Spawning networks are a new class of programmable networks that automate the life cycle process for the creation, deployment, and management of network architecture. These networks are capable of spawning distinct child virtual networks with their own transport, control, and management systems. This definition is created because the deployment of new network architectures, services, and protocols is often manual, ad hoc, and time-consuming. The definition was introduced in a paper titled Spawning Networks, published in IEEE Networks by a group of researchers from Columbia University, University of Hamburg, Intel Corporation, Hitachi Limited, and Nortel Networks. The authors are Andrew T. Campbell, Michael E. Kounavis, Daniel A. Villela, of Columbia University, John B. Vicente, of Intel Corporation, Hermann G. De Meer, of University of Hamburg, Kazuho Miki, of Hitachi Limited, and Kalai S. Kalaichelvan, of Nortel Networks. There was also a paper titled "The Genesis Kernel: A Programming System for Spawning Network Architectures", Michael E. Kounavis, Andrew T. Campbell, Stephen Chou, Fabien Modoux, John Vicente and Hao Zhuang. A first implementation of Spawning Networks was realized at Columbia University as part of the Ph.D thesis work of Michael Kounavis. This implementation is based on the design of the Genesis Kernel, a programming system consisting of three layers: A transport environment which is a collection of programmable virtual routers, a programming environment which offers open access to the programmable data path and a life cycle environment which is responsible for spawning and managing network architectures. One of the concepts used in design of the Genesis Kernel is the creation of a network architecture based on a profiling script specifying the architecture components and their interaction. References Network architecture
https://en.wikipedia.org/wiki/Superstar%20Hair%20Challenge
Superstar Hair Challenge is a reality TV show on Slice Network hosted by Karen Bertelsen. Contestants must complete hair design related challenges, and a person is executed each week. External links Website See also 2000s Canadian game shows Slice (TV channel) original programming
https://en.wikipedia.org/wiki/Routing%20domain
In computer networking, a routing domain is a collection of networked systems that operate common routing protocols and are under the control of a single administration. For example, this might be a set of routers under the control of a single organization, some of them operating a corporate network, some others a branch office network, and the rest the data center network. A given autonomous system can contain multiple routing domains, or a set of routing domains can be coordinated without being an Internet-participating autonomous system. References Computer networking
https://en.wikipedia.org/wiki/Transistor%20computer
A transistor computer, now often called a second-generation computer, is a computer which uses discrete transistors instead of vacuum tubes. The first generation of electronic computers used vacuum tubes, which generated large amounts of heat, were bulky and unreliable. A second-generation computer, through the late 1950s and 1960s featured circuit boards filled with individual transistors and magnetic-core memory. These machines remained the mainstream design into the late 1960s, when integrated circuits started appearing and led to the third-generation computer. History The University of Manchester's experimental Transistor Computer was first operational in November 1953 and it is widely believed to be the first transistor computer to come into operation anywhere in the world. There were two versions of the Transistor Computer, the prototype, operational in 1953, and the full-size version, commissioned in April 1955. The 1953 machine had 92 point-contact transistors and 550 diodes, manufactured by STC. It had a 48-bit machine word. The 1955 machine had a total of 200 point-contact transistors and 1,300 point diodes, which resulted in a power consumption of 150 watts. There were considerable reliability problems with the early batches of transistors and the average error-free run in 1955 was only 1.5 hours. The Transistor Computer also used a small number of tubes in its clock generator, so it was not the first fully transistorized machine. The design of a full-size Transistor Computer was subsequently adopted by the Manchester firm of Metropolitan-Vickers, who changed all the circuits to use more reliable junction transistors. The production version was known as the Metrovick 950 and was built from 1956 to the extent of six or seven machines, which were "used commercially within the company" or "mainly for internal use". Other early machines During the mid-1950s a series of similar machines appeared. These included the Bell Laboratories TRADIC, completed in January 1954, which used a single high-power output vacuum-tube amplifier to supply its 1-MHz clock power. The first fully transistorized computer was either the Harwell CADET, which first operated in February 1955, although the price paid for this was that it operated only at the slow speed of 58 kHz, or the prototype IBM 604 transistor calculator. The Burroughs Corporation claimed the SM-65 Atlas ICBM / THOR ABLE guidance computer (MOD 1) that it delivered to the US Air Force at the Cape Canaveral missile range in June 1957 was "the world's first operational transistorized computer". MIT's Lincoln Laboratory started developing a transistorized computer the TX-0 in 1956. Further transistorized computers became operational in Japan (ETL Mark III, July 1956), in Canada (DRTE Computer, 1957), and in Austria, (Mailüfterl, May 1958), these being the first transistorized computers in Asia, Canada and mainland Europe respectively. First commercial fully transistorized calculator In April
https://en.wikipedia.org/wiki/Reactive%20programming
In computing, reactive programming is a declarative programming paradigm concerned with data streams and the propagation of change. With this paradigm, it's possible to express static (e.g., arrays) or dynamic (e.g., event emitters) data streams with ease, and also communicate that an inferred dependency within the associated execution model exists, which facilitates the automatic propagation of the changed data flow. For example, in an imperative programming setting, a := b + c would mean that a is being assigned the result of b + c in the instant the expression is evaluated, and later, the values of b and c can be changed with no effect on the value of a. On the other hand, in reactive programming, the value of a is automatically updated whenever the values of b or c change, without the program having to explicitly re-execute the statement a := b + c to determine the presently assigned value of a. Another example is a hardware description language such as Verilog, where reactive programming enables changes to be modeled as they propagate through circuits. Reactive programming has been proposed as a way to simplify the creation of interactive user interfaces and near-real-time system animation. For example, in a model–view–controller (MVC) architecture, reactive programming can facilitate changes in an underlying model that are reflected automatically in an associated view. Approaches to creating reactive programming languages Several popular approaches are employed in the creation of reactive programming languages. One approach is the specification of dedicated languages that are specific to various domain constraints. Such constraints usually are characterized by real-time, embedded computing or hardware description. Another approach involves the specification of general-purpose languages that include support for reactivity. Other approaches are articulated in the definition, and use of programming libraries, or embedded domain-specific languages, that enable reactivity alongside or on top of the programming language. Specification and use of these different approaches results in language capability trade-offs. In general, the more restricted a language is, the more its associated compilers and analysis tools are able to inform developers (e.g., in performing analysis for whether programs are able to execute in actual real time). Functional trade-offs in specificity may result in deterioration of the general applicability of a language. Programming models and semantics A variety of models and semantics govern reactive programming. We can loosely split them along the following dimensions: Synchrony: synchronous versus asynchronous model of time Determinism: deterministic versus non-deterministic evaluation process and results Update process: callback versus dataflow versus actor Implementation techniques and challenges Essence of implementations Reactive programming language runtimes are represented by a graph that identifies
https://en.wikipedia.org/wiki/Halfwidth%20and%20fullwidth%20forms
In CJK (Chinese, Japanese, and Korean) computing, graphic characters are traditionally classed into fullwidth and halfwidth characters. Unlike monospaced fonts, a halfwidth character occupies half the width of a fullwidth character, hence the name. Halfwidth and Fullwidth Forms is also the name of a Unicode block U+FF00–FFEF, provided so that older encodings containing both halfwidth and fullwidth characters can have lossless translation to and from Unicode. Rationale In the days of text mode computing, Western characters were normally laid out in a grid on the screen, often 80 columns by 24 or 25 lines. Each character was displayed as a small dot matrix, often about 8 pixels wide, and a SBCS (single-byte character set) was generally used to encode characters of Western languages. For aesthetic reasons and readability, it is preferable for Chinese characters to be approximately square-shaped, therefore twice as wide as these fixed-width SBCS characters. As these were typically encoded in a DBCS (double-byte character set), this also meant that their width on screen in a duospaced font was proportional to their byte length. Some terminals and editing programs could not deal with double-byte characters starting at odd columns, only even ones (some could not even put double-byte and single-byte characters in the same line). So the DBCS sets generally included Roman characters and digits also, for use alongside the CJK characters in the same line. On the other hand, early Japanese computing used a single-byte code page called JIS X 0201 for katakana. These would be rendered at the same width as the other single-byte characters, making them half-width kana characters rather than normally proportioned kana. Although the JIS X 0201 standard itself did not specify half-width display for katakana, this became the visually distinguishing feature in Shift JIS between the single-byte JIS X 0201 and double-byte JIS X 0208 katakana. Some IBM code pages used a similar treatment for Korean jamo, based on the N-byte Hangul code and its EBCDIC translation. In Unicode For compatibility with existing character sets that contained both half- and fullwidth versions of the same character, Unicode allocated a single block at U+FF00–FFEF containing the necessary "alternative width" characters. This includes a fullwidth version of all the ASCII characters and some non-ASCII punctuation such as the Yen sign, halfwidth versions of katakana and hangul, and halfwidth versions of some other symbols such as circles. Only characters needed for lossless round trip to existing character sets were allocated, rather than (for instance) making a fullwidth version of every Latin accented character. Unicode assigns every code point an "East Asian width" property. This may be: Terminal emulators can use this property to decide whether a character should consume one or two "columns" when figuring out tabs and cursor position. In OpenType OpenType has the fwid, halt, hwid, and v
https://en.wikipedia.org/wiki/Curl-loader
curl-loader is an open-source software performance testing tool written in the C programming language. Features curl-loader is capable of simulating application behavior of hundreds of thousands of HTTP/HTTPS and FTP/FTPS clients, each with its own source IP-address. In contrast to other tools, curl-loader is using real C-written client protocol stacks, namely, HTTP and FTP stacks of libcurl and TLS/SSL of openSSL, and simulates user behavior with support for login and authentication flavors. The major features are: Running up to 2,500–100,000 and more virtual loading clients, all from a single curl-loader process. Actual number of virtual clients may be several times higher being limited mainly by memory. Each virtual client loads traffic from its "personal" source IP-address, or from the "common" IP-address shared by all clients, or from the IP-addresses shared by some clients where a limited set of shared IP-addresses can be used by a batch of clients. Rampup of the virtual clients number at loading start in either automatic or manual mode; IPv4 and IPv6 addresses and URIs; HTTP 1.1. GET, POST, PUT, DELETE, HEAD including file upload operations; HTTP user authentication login with POST or GET+POST methods. Unique configurable username and password for each virtual client as well as configurable posted string (post-forms) are the options. Another option is loading of users with credentials from a tokens text file; HTTP POST/GET forms with up to 16 tokens filled from a tokens text file; HTTP user logoff with POST, GET+POST, or GET (cookies); POST logoff with configurable posted string (post-forms); HTTP multipart form data POST-ing as in RFC1867; HTTP Web and Proxy Authentication (HTTP 401 and 407 responses) with Basic, Digest (RFC2617) and NTLM; HTTP 3xx redirections with unlimited number of redirections; HTTP cookies and DNS caches; FTP passive and active, FTP upload; Full customization of client request HTTP/FTP headers ; Transfer limit rate for each client download or upload operation on a per url bases; URL fetching probability; TCP connections reuse or re-establishment on a per URL bases; Unlimited configurable number of URLs. Mixing of HTTP, HTTPS, FTP and FTPS urls in a single batch (test plan) configuration; Connection establishment timers for each URL; URL completion timers monitoring and enforcement for each client; Inter/after URL "sleeping" timers, including random timers taken from a configurable interval; Logfile with tracing activities for each virtual client; Logging of responses (headers and bodies) to files; Pre-cooked batch configuration (test plan) examples; Load Status at console and with output to file; Status and statistics for each virtual client which are logged to file; The goal of curl-loader project is to deliver a powerful and flexible open-source software performance testing client-side solution as a real alternative to Spirent Avalanche and IXIA IxLoad. Curl-loader normally works in p
https://en.wikipedia.org/wiki/SSH%20%28disambiguation%29
The Secure Shell Protocol (SSH) is a network protocol for secure data communication and remote command execution. SSH may also refer to: Science and technology Saffir–Simpson hurricane scale, classifies hurricanes – Western Hemisphere tropical cyclones – that exceed the intensities of tropical depressions and tropical storms – into five categories Sea-surface height, the topography of the ocean surface Social sciences and humanities, the disciplines and communities involved in or related to this area of research and science Suppression subtractive hybridization, a genetic technique to show differentially expressed genes Su–Schrieffer–Heeger model, a physical model for a simple model for a topological insulator Organizations SSH Communications Security, a Finnish company that developed the Secure Shell protocol Secondary State Highways, branches of Primary State Highways in Washington from 1937 to 1964 IATA airport code SSH for Sharm El Sheikh International Airport, an international airport in Egypt Silver State Helicopters, a helicopter operator Other uses The ISO 639-3 code for Shihhi Arabic South Superhighway, a former official name of the South Luzon Expressway in the Philippines, now referring to the Manila-Makati segments of an expressway See also shh (disambiguation) SH (disambiguation)
https://en.wikipedia.org/wiki/International%20Society%20for%20Comparative%20Adult%20Education
The International Society for Comparative Adult Education (or ISCAE) is a network of individuals and organizations with members in more than thirty countries. Purpose Comparative education is a well-established field of study that examines education in one country (or group of countries) by using data and insights drawn from the practices and situation in another country or countries. Adult education focuses on the unique needs and characteristics of students who are not children or adolescents. The focus of ISCAE then is the study of the education of adults as practiced in various countries; it also explores the methods, problems and pitfalls of international comparative research in general. ISCAE serves as a network of contacts for professionals in the field of comparative adult education; such networking encourages research assistance and cross-fertilization, exchange of information, international cooperation, and similar activities. There are no statutes and no membership fees. Most of the printing and distribution of newsletters and conference proceedings is done by members from the United States, Germany, or Australia. History ISCAE's origins can be traced back to 1960, when Dr. Alexander N. Charters, professor of adult education at Syracuse University, and Canadian scholar of adult education J. Roby Kidd formed a working group on international and comparative adult education at the first world conference of the World Council for Comparative Education in Ottawa. They named their group the Committee for Study and Research in Comparative Adult Education (CSRCAE). The growing International interest in comparative adult education led, in 1992, to a restructuring with a new board and a new president: Jost Reischmann, Chair of Andragogy at Bamberg University, Germany), and to a renaming into "International Society for Comparative Adult Education ISCAE". The upcoming new Internet-technology with an homepage and a mailing list allowed much easier and faster communication and access for scholars from many countries around the globe. These new developments and the conferences increased the number of members from about 50 in 1992 to 250 in 2012. In 2009 Michal Bron Jr, Assoc. Professor Södertörn University, Sweden became new president. Publications and meetings ISCAE publishes a newsletter, ISCAE-Communication, irregularly (once or twice a year). Members meet at international conferences, held every three or four years in locations around the world: in Bamberg, Germany 1995, Radovljica, Slovenia 1998, St. Louis, Mo, USA 2002, Bamberg, Germany 2006, Las Vegas, USA 2012. At the conferences, individuals present papers on completed (or nearly complete) research; others present research in progress or ideas for future research. Studies must include two or more countries in the research in order to qualify as "comparative." ISCAE published two volumes with papers from their conferences: Comparative Adult Education 1998. The contribution of IS
https://en.wikipedia.org/wiki/Duck%20face
Duck face or duck lips is a photographic pose common on profile pictures in social networks. Lips are pressed together as in a pout and often with simultaneously sucked in cheeks. The pose is most often seen as an attempt to appear alluring, but it can be ironic or an attempt to hide self-conscious embarrassment. History Fashion models frequently use exaggerated pouts, and self-portraits with a pouty face go back to Rembrandt. In the 1994 film Four Weddings and a Funeral, one of the lead characters, Henrietta, played by Anna Chancellor, is nicknamed Duckface for her pouty expressions. Ben Stiller mocked models' pouty expressions in 1996 comedy sketches and the 2001 feature film Zoolander. The silly expressions made by his narcissistic character have retroactively been identified as an example of duck face. As social networks became popular, young women frequently made exaggeratedly pouty expressions. This became a major fad by the 2010s, provoking a strong negative reaction among some viewers. OxfordDictionaries.com added "duck face" as a new word in 2014 to their list of current and modern words, but it has not been added to the Oxford English Dictionary. In an animal communication studies of capuchin monkeys, the "duck face" term has been used synonymously with "protruded lip face", which females exhibit in the proceptive phase before mating. See also Duckwalk Gurn References Facial expressions
https://en.wikipedia.org/wiki/Virtual%20graffiti
Virtual graffiti consists of virtual or digital media applied to public locations, landmarks or surfaces. Virtual graffiti applications utilize augmented reality and ubiquitous computing to anchor virtual graffiti to physical landmarks or objects in the real world. The virtual content can then be viewed through digital devices. Virtual graffiti is aimed at delivering messaging and social multimedia content to mobile applications and devices based on the identity, location, and community of the user. Mediums This overall effort focuses on creating new mobile experiences based on merging virtual reality, telepresence, and global positioning systems. These experiences evolve over time based on the needs and capabilities of the users. Location-based messaging This medium regards a mobile user receiving or sending a message based on their location. The content quality is directly related to the accuracy of the user's location. These include experiences such as: Searching where the nearest restaurant is and receiving a set of messages and coupons from nearby restaurant proprietors. Receiving a message on their mobile device that there is traffic ahead with a suggested alternative route. Coworkers receive a notification that an upcoming meeting has been moved to a new location. Location anchored virtual reality This involves anchoring a virtual reality experience at a physical location. Thus the experiences in the virtual world can only be had at a specific real location. Several use cases that are included here are: A virtual command post can be set up at the scene of an incident. This command post involves the sharing of information in the virtual world but can only be accessed by those at the scene of the incident. A set of blogs and media files are left at famous outdoor sculptures. Groups of friends can contribute, copy, and share files only while they are viewing the sculpture. Background The phrase "virtual graffiti" has existed for a long time and has been applied to various applications over the years. Originally, it referred to posting messages on electronic bulletin board systems. From there, it has developed in academia into contextual messaging applications. Contextual messaging Contextual messaging refers to leaving some type of context-specific annotation, e.g., a virtual Post-it Note on a computer monitor, a time-sensitive message attached to a wall, or location-based graffiti on a physical object. Researchers at the University of Salford experimented with a Cave system in which a user could mark up a scene using 6-degree freedom sensors. Obviously, this is not suitable for immediate use or mass market applications, but it serves as starting point from which other work could be derived. During a research fellowship at the University of Georgia in 2003, Kit Hughes developed a system in which users with WiFi-enabled mobile devices could mark up buildings in downtown Athens, Georgia, with their own virtual graffiti via a
https://en.wikipedia.org/wiki/C%20Object%20Processor
The C Object Processor (COP) was a superset of the C programming language. It was used in the Vbase object-oriented database management system developed by Ontologic, Inc. The data model for Vbase was specified by a Type Definition Language (TDL). COP and TDL were influenced by CLU. By 1989, COP and TDL were replaced by C++ in Ontologic's second generation product, ONTOS. The company was also renamed ONTOS, Inc. References Tim Andrews and Craig Harris, "Combining Language and Database Advances in an Object-Oriented Development Environment," Conference Proceedings of the Object-Oriented Programming Systems, Languages and Applications, pp. 430–440, 1987. C programming language family
https://en.wikipedia.org/wiki/Knight%20Frank
Knight Frank LLP is a global real estate consultancy and estate agency headquartered in London, England. Knight Frank's global network has more than 488 offices across 57 territories and more than 20,000 people managing commercial, agricultural and residential real estate worth more than US$817 billion (£498 billion). History Knight, Frank & Rutley is an earlier name of the firm. Howard Frank was an English estate agent, headed of the firms of Knight, Frank & Rutley of London and Walton & Lee of Edinburgh and was president of the Estate Agents' Institute from 1912 to 1914. 1896: The firm is founded in London by John Knight, Howard Frank and William Rutley. 1897: The first recorded business property sale occurs in November, when Knight, Frank & Rutley sells a ‘cycle machinery and plant’ business in Battersea for £270 11s 6d. 1911: The Crystal Palace is sold to Lord Plymouth for £210,000. 1914: Howard Frank, the senior partner, is knighted. 1915: Cecil Chubb buys Stonehenge through Knight, Frank & Rutley for £6,600 as a present for his wife Alice. Mr & Mrs Chubb gave it "to the Nation" three years later. 1921: The town of Reigate is sold by Knight, Frank & Rutley for £203,840 – the first time the firm has disposed of an entire town. 1922: The firm handles the sale of Winston Churchill's house and sells Chartwell to him. 1924: The Duke of Westminster sells Grosvenor House in Park Lane through Knight, Frank & Rutley. 1927: The firm advises on the site assembly for the BBC's headquarters, Broadcasting House in London. 1937: Most of the town of Lytham St Annes in Lancashire is sold – including the celebrated golf course. 1974: Fountains Abbey, Yorkshire, dating back to 1132, is sold for £1 million. 1981: In New York, Douglas Elliman Knight Frank sells Pan-American World Airways Intercontinental Hotels Corporation to Grand Metropolitan for $500 million. 1996: On 1 January, ‘Rutley’ is dropped from the Knight Frank name as part of a plan to expand international market share. 2000: Knight Frank sells the Duke of York's Headquarters in Chelsea, London, on behalf of the Ministry of Defence. 2005: The firm is appointed to advise on the development of the London Olympic Village for the 2012 Summer Olympics. 2006: With effect from 1 January, Knight Frank establishes a global real estate partnership with leading New York-based real estate service firm Newmark Knight Frank, formerly Newmark. 2012: February, presents Battersea Power Station to the global property market. 2013: Participated in the founding of OnTheMarket 2015: Knight Frank wins the instruction to sell 231 prime residential units within the Royal Atlantis on the Palm Jumeirah, Dubai. 2021: Rennie Property joined Knight Frank’s global network. Indexes and reports Global House Price Index The Knight Frank Global House Price Index is compiled using official government statistical office or central bank data where possible. House Price Sentiment Index (HPSI) The Knight Fran
https://en.wikipedia.org/wiki/John%20Maeda
John Maeda (born 1966) is a Vice President of Design and Artificial Intelligence at Microsoft. He is an American technologist and designer whose work explores where business, design, and technology merge to make space for the "humanist technologist." Previously, Maeda served as is Chief Technology Officer of Everbridge from October 2020 through October 2022. President of Rhode Island School of Design (RISD) from June 2008 until December 2013. Before that he was a research professor at the MIT Media Lab leading advancements in computational design, low-code/no-code, and creative commerce. Early life and education John Maeda was born in 1966 in Seattle, Washington, where his father owned a tofu factory. Maeda studied Computer Science at the Massachusetts Institute of Technology, where he became fascinated with the work of Paul Rand and Muriel Cooper. Cooper was a director of MIT's Visible Language Workshop. After completing his bachelor's and master's degrees at MIT, Maeda completed his PhD in design at Tsukuba University's Institute of Art and Design in Japan. He also has an MBA from Arizona State University. Career As an artist, Maeda’s early work redefined the use of electronic media as a tool for expression by combining computer programming with traditional artistic technique, laying the groundwork for interactive motion graphics on the web. He has exhibited in one-man shows in London, New York and Paris. His work is in the permanent collections of the Museum of Modern Art, the San Francisco Museum of Modern Art and the Cartier Foundation in Paris. He is formerly Executive Vice President, Chief Experience Officer at Publicis Sapient where he developed the LEAD (Light, Ethical, Accessible, Dataful) doctrine for technology products and services. Prior to that he was Global Head, Computational Design and Inclusion at Automattic where he sought to address the diversity gap in tech by exploring how inclusion could be a key ingredient for success in the technology industry. Before that he was Design Partner at Kleiner Perkins Caufield & Byers (KPCB) where he advised startups on the business impact of design and continues as a Strategic Advisor. He also served on the Board of Directors of consumer electronics company Sonos and global advertising firm Wieden+Kennedy. He was a professor at the MIT Media Lab for 12 years where he fostered a community of designers who could code and engineers who could design called the Aesthetics + Computation Group, and then created the Physical Language Workshop with Henry Holtzman. Shortly after the launch of the Design By Numbers project to teach artists and designers how to code, he helped to accelerate the Scratch language project in an NSF proposal with outreach across the digital divide. He resigned from MIT in 2008 to become the President of the Rhode Island School of Design (RISD), just as the global financial crisis of 2007-09 took hold. In 2011, RISD's faculty majority passed a vote of no confidence
https://en.wikipedia.org/wiki/Puracane
Puracane is an electronic music band from New York, featuring Ali Rogers on vocals, Juan Masotta on guitar and programming, David Leatherwood on bass, Susan Elinger on Piano, and Tony Diodore on guitar and violin. History Puracane formed in 1999, originally as the duo of Ali Rogers and programmer/producer David Biegel (who has also recorded under the name Skyjuice and as a member of Bugs). The track Big Day was also on the soundtrack to the Snowboarding film Northparks. Puracane's first album, Things You Should Leave Alone was released in 2000 on Ubiquity Records. It featured former Psychedelic Furs guitarist Knox Chandler and was positively received, with Allmusic reviewer Pemberton Roach giving it four stars and calling it "everything a good trip-hop album should be" and "exceptionally accessible", also comparing Rogers' vocals to Björk. CMJ New Music Report called the album a "devastating debut". Both reviewers compared the group's sound to Tricky. The album reached number 78 on the CMJ Top 200. Following the album's release, Puracane toured as a live band without Biegel, with Sting, Jane's Addiction, and Depeche Mode. Their second album, In Limbo: The Lost Puracane Sessions was released in 2006. In 2008, Andrew Griffiths and Drew Thurlow went on to pursue other projects. Juan and Ali focused on completing their album I've Been Here The Longest, which was released in the Summer of 2009 on Astraea Records. In May 2011 Puracane released the 6-song EP Evil for the Greater Good as a "pay what you will" download. Discography Albums Things You Should Leave Alone (2000), Ubiquity In Limbo: The Lost Puracane Sessions (2006), Bulletspace I've Been Here The Longest (June 2009), Astraea EPs "14 Nights" / "Things You Should Leave Alone" (remixes) (1999), Ubiquity Evil For The Greater Good - (May 2011) References External links Electronic music groups from New York (state) Ubiquity Records artists
https://en.wikipedia.org/wiki/Algorithm%20March
The is a dance fad created in Japan, based on the children's television series PythagoraSwitch which was broadcast on the educational channel of NHK, a Japanese non-profit public broadcasting service. It is performed by the comedy group Itsumo Kokokara with variable groups (it differs at each air) such as firefighters, soccer players, Yasugi-bushi preservation society, Vienna Boys' Choir, Blue Man Group, ninja and so on. Description The basic steps are as follows, repeating as necessary: Bend knees, reach out straight with hands Lean back with arms akimbo ("big shot") Turn around, bow Face right, right hand horizon sweep Bend knees, breaststroke Bend down and pretend to pick up a chestnut from the ground Shake arms downwards, like pumping a bicycle tire Flap arms as though being inflated by a pump The dance can be performed in lines, moving canon style one at a time. After each movement, the line takes a step forward. Footnotes External links Algorithm March lyrics, in English and Japanese (Romaji). Note: this transcription contains some mistakes. For instance "susande" should be "susunde" (進んで), a conjugated form of "susumu" (進む) which means to advance or move forward. PythagoraSwitch official page (Japanese) Official CD from Warner Music Japan (Japanese) The CPDRC Dancing Inmates perform the Algorithm March A demonstration video is available in English and Japanese. Novelty and fad dances NHK