source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Nearby%20Supernova%20Factory
The Nearby Supernova Factory (SNfactory) is a collaborative experiment led by Greg Aldering, designed to collect data on more Type Ia supernovae than have ever been studied in a single project before, and by studying them, to increase understanding of the expanding universe and dark energy. The project began as an outgrowth of the Supernova Cosmology Project at Lawrence Berkeley National Laboratory, but while the SCP focused on supernovae with redshifts of approximately 1.2, corresponding to a distance of 8.7 billion light years, SNfactory searches for nearby supernovae with redshifts of 0.03 to 0.08, corresponding to a distance of only 400 million to 1.1 billion light years. SNfactory uses a highly automated "pipeline" in which survey images from NASA's Near-Earth Asteroid Tracking project are processed by a supercomputing cluster to find promising candidates, which are then observed using the project's Supernova Integral Field Spectrograph (SNIFS) on the University of Hawaii telescope atop Mauna Kea in Hawaii. Results from the project will also be used in refining the planned Supernova/Acceleration Probe. See also Supernova Cosmology Project Supernova/Acceleration Probe External links Nearby Supernova Factory Supernovae
https://en.wikipedia.org/wiki/Netgear%20Digital%20Entertainer
Netgear's Digital Entertainer line of products are digital media players that can pull multimedia content from home computers to the typical audio/video entertainment center. There are three products in the line, the EVA700, the HD EVA8000 and the current EVA9150 Digital Entertainer Elite. All support high definition video, the EVA700 via component output up to 1080i and the EVA8000/EVA9000 up to 1080p with both component and HDMI connectors. All models support audio, video, image and streaming audio and video formats and can be networked via wired and wireless Ethernet. The EVA700 is Intel Viiv certified. Description Common features of both EVA models include being able to access digital media files on a network attached home computer running Windows XP, stream audio and video from the PC, and stream Internet radio (streaming MP3). USB storage devices such as iPods, thumb drives, and some digital cameras with USB interfaces can be attached directly to the units for playback of media on those USB devices. As the Digital Entertainer products are Intel Viiv compliant, setup and media access with an Intel Viiv PC is more automated than without such a PC. However, an Intel Viiv PC is not required in order to operate an EVA unit. The systems come with a remote control with which to manipulate the on-screen display on your television along with a large selection of suitable connecting cables. Inputs/Outputs: At a minimum, EVAs have RCA connectors for composite video output, as well as for component video output, S-Video output, a digital S/PDIF audio output, stereo RCA audio outputs, at least 1 USB 2.0 port and 1 8P8C 10/100 Ethernet port. History: MP101 and MP115 NETGEAR started off in the media streamer arena with the MP101, an audio-only small form factor media streamer. It had a four-line fluorescent display with line stereo RCA and 3.5" headphone outputs. Connectivity provided by built-in Ethernet and 802.11b wireless with WEP support. Controlled by a remote control, it had no external buttons at all, not even a power button. The unit could play MP3 and WMA files, along with PLS and M3U playlists. Rhapsody streaming radio was built in, and the unit could also play any MP3 streams through playlists. The MP115 was a technology trial, and only 600 were made. It used the same small form-factor as the MP101 but without the display. This unit was probably what could be considered the beginnings of the Digital Entertainer line as it supported XviD and MPEG1 and MPEG2 playback and had composite, S-Video and SCART output for connection to a TV, along with line stereo RCA. Audio was still supported along the same lines as the MP101. Again, no external buttons and all control from the remote. Dual-antenna 802.11g wireless was on board with wired Ethernet port. EVA700 Digital Entertainer Features: Dual 2 dBi antenna wireless reception Hardware-based Wired Equivalent Privacy (WEP) 40/64-bit & 128-bit encryption WPA-PSK (WPA-Person
https://en.wikipedia.org/wiki/Oceania%20Television%20Network
Oceania Television Network (OTV) is Palau's only Pacific Island-content television station. Founded by Jeff Barabe and Kassi Berg of Roll 'em Productions, and launched in December 2006, OTV now broadcasts on Palau National Communications Corporation digital cable channel 23. It is a member of the Asia-Pacific Institute for Broadcasting Development. Content for this station includes several original programs, including "The Jock Block" hosted by Mike Fox and Myers Techitong, and "Chised" hosted by Joe Aitaro and Pia Morei. Other shows include "Uum era a Belau", the local cooking show; "Olekaiang", a comedy for youth; local news and weather. In August 2007, Executive Producer Kassi Berg travelled to Fiji and New Zealand as part of the North-meets-South mission to meet with Pacific Island producers, in order to build partnerships and obtain content for OTV. External links Official website Television stations in Palau Television channels and stations established in 2006
https://en.wikipedia.org/wiki/Navicat
Navicat is a series of graphical database management and development software produced by CyberTech Ltd. for MySQL, MariaDB, Redis, MongoDB, Oracle, SQLite, PostgreSQL and Microsoft SQL Server. It has an Explorer-like graphical user interface and supports multiple database connections for local and remote databases. Its design is made to meet the needs of a variety of audiences, from database administrators and programmers to various businesses/companies that serve clients and share information with partners. History The initial version of Navicat was developed by Mr. Ken Lin in 2001. The main target of the initial version was to simplify the management of MySQL installations. In 2008, Navicat for MySQL was the winner of the Hong Kong ICT 2008 Award of the Year, Best Business Grand Award and Best Business (Product) Gold Award. Supported platforms and languages Navicat is a cross-platform tool and works on Microsoft Windows, Mac OS X and Linux platforms. Upon purchase, users are able to select a language for the software from eleven available languages: English, French, German, Spanish, Japanese, Polish, Russian, Portuguese, Korean, Simplified Chinese and Traditional Chinese. It supports Linux platform via bundled Wine. Versions Standalone versions Officially released in March 2002, the Windows version of Navicat for MySQL became the first product offered to the public by PremiumSoft. Subsequently, the company released two additional versions of Navicat for MySQL on the Mac OS X and Linux operating system in June and October 2003 respectively. In November 2013, added the support of MariaDB. PremiumSoft continued to expand their Navicat series by releasing Navicat for PostgreSQL for Windows in October 2005 and then for Mac OS X in June 2006. The Linux version of Navicat for PostgreSQL would not be released until 3 years later in August 2009. In August 2008 Navicat decided to further continue their product line and branch out into the Oracle community, creating Navicat for Oracle for Windows and Mac. In August of the following year they followed up with a version for the Linux Platform. The Oracle version of Navicat supports most of the latest Oracle objects features including Directory, Tablespace, Synonym, Materialized View, Trigger, Sequence, and Type, etc. Navicat for SQLite was released for Windows and Mac OS X simultaneously in April 2009, and the Linux version soon followed two months later in June of the same year. In April 2010, Navicat Premium began including Navicat for SQLite starting from version 9 to expand the usability of Navicat Premium. Navicat for SQL Server was released in November 2010 for the Windows platform and Mac OS X. Also at the release, the SQL server version was included in the Premium version of Navicat. In January 2011, support for SQL Azure was added. Navicat for MariaDB was released in November 2013 for Windows, Mac OS X and Linux. Also at the release, the MariaDB version was included in both Navicat Premium
https://en.wikipedia.org/wiki/Kildall
Kildall may refer to: Gary Arlen Kildall (1942–1994), American computer scientist and microcomputer entrepreneur, inventor of operating system CP/M, founder of Digital Research, KnowledgeSet and Prometheus Light and Sound Dorothy Kildall née McEwen (1943–2005), co-founder of Digital Research Scott Kildall (1969–), American conceptual artist and performer
https://en.wikipedia.org/wiki/Dublin%20City%20Libraries
Dublin City Libraries is the largest library authority in the Republic of Ireland, serving over half a million people through a network of 21 branch libraries, a number of specialist services. Specialist services include online resources, Dublin City Archives, Dublin and Irish Local Studies Collection, Creative Studio, Music Library. With 2.6 million visits, and Wi-Fi Internet access available in all branches, the service aims to promote the concept of "lifelong learning in the community", offering a range of opportunities for all ages and backgrounds to "develop life chances and new learning skills". The International Dublin Literary Award is administered by Dublin City Libraries. The application for designation as a UNESCO City of Literature, part of the Creative Cities Network was initiated and led by Dublin City Libraries. Services Dublin City Libraries provides a range of services for readers, learners, students, hobbyists, the business community, and others. These include: General collections and reference and information services Online resources including eBooks, eAudiobooks, digital newspapers and magazines, online learning Local Studies Collections and Archives in the Reading Room at the Dublin City Library and Archive Broadband computers and Wireless (Wi-Fi) Internet access available in all branches Business Information resources at the Central Library The Creative Studio at Ballyfermot Library, a free to use digital maker space facilitating the creation of music recordings, podcasts, videos, digital stories and oral histories Databases.dublincity.ie, a history and heritage resource, which includes online databases of Dublin City Electoral Lists, a Directory of Dublin Graveyards, Ancient Freemen of Dublin and community memory database which lists commemorative plaques around Dublin city. Music Library at the Central Library. Access CDs, DVDs, vocal scores, miniature scores, sheet music, part-works, libretti, and songbooks. Other facilities available include CD listening booths, a keyboard and CD-track database. An ongoing programme of events including lectures, readings, recitals and exhibitions Language learning through online learning and conversation exchange in foreign languages Services include multicultural services, home delivery service and services to prisons Other services include the provision of meeting rooms to local community groups such as Historical Societies, Painting Groups, Parent & Toddler Groups, Writing groups, Reading groups and book clubs Most branches provide quiet areas for study Dublin City Library and Archive Dublin City Archives contains records of the civic government of Dublin from 1171 to the late 20th century. These records include Dublin City Council and committee minutes, account books, correspondence, reports, court records, charity petitions, title deeds, maps and plans and drawings all of which document the development of Dublin over eight centuries. The Dublin and Irish Collection holds an
https://en.wikipedia.org/wiki/Hoc
Hoc or HOC may refer to: Head of Chancery Hellenic Olympic Committee, one of the oldest National Olympic Committees Hoc (Beowulf), a Danish King from Beowulf Hoc (programming language), a calculator and programming language Hypertrophic cardiomyopathy (Hypertrophic (Obstructive) cardiomyopathy), but HCM is the more common and accepted acronym for that condition House of Commons, a legislative body of elected representatives in various countries Hooked on Classics, an album of popular classical music Pointe du Hoc, a cliff in Normandy scaled by the U.S. Rangers in 1944 House of Cards (disambiguation) Ho language, identified by the ISO 639 3 code hoc United States House Committee on Oversight and Reform, known as the House Oversight Committee Hoc (card game), the progenitor of a family of French card games using hocs or 'stops' See also Ad hoc, a Latin phrase meaning a solution designed for a specific problem or task Post hoc (disambiguation) Propter hoc (disambiguation)
https://en.wikipedia.org/wiki/Lee%20Lanier
Lee Lanier is an American 3D computer animator and the author of nine books for the 3D modeling software package Maya and the digital compositing software packages After Effects, Fusion, and Nuke. He served as an instructor for animation for the Academy of Art University and Gnomon School of Visual Effects. He has recorded visual effects video tutorials for lynda.com and The Foundry. After working for Buena Vista Visual Effects at Walt Disney Studios in Los Angeles, Lanier worked at PDI/DreamWorks in the San Francisco bay area—where he served as modeler and lighter for the movies Shrek and Antz. Next, he moved to Boulder City, Nevada where Lee formed his own company, BeezleBug Bit LLC. Lanier's computer-animated short films have played at over 200 film festivals, galleries, and museums worldwide. Millennium Bug won the Mike Gribble Peel of Laughter Award at the 1998 Ottawa International Animation Festival and the Silver Jury Award at the 1999 Chicago Underground Film Festival. Lanier's short films Day Off the Dead, Mirror, Millennium Bug, 13 Ways to Die at Home, Blood Roulette, and South Seas Dream have played such venues as the Sundance Film Festival, the Ottawa International Animation Festival, and Cinequest Film Festival. Lee is also the co-founder of and director of continuity for The Dam Short Film Festival. Starting in 2015, Lanier began to pursue painting and has since shown his artwork in galleries in eight states. References External links Beezlebug Bit site Diabolica Art site American graphic designers Living people People from Boulder City, Nevada Academy of Art University faculty Year of birth missing (living people)
https://en.wikipedia.org/wiki/RadPHP
RadPHP (formerly Delphi for PHP) was an IDE and rapid application development framework for the PHP programming language developed by Embarcadero Technologies. The VCL includes many components that can be used dynamically with each other. It is well integrated with MySQL database as well as Ajax. It is a method for developing Web, Facebook and mobile applications. The Window component can be used in conjunction with other components to create an interface that is very similar to the Microsoft Windows interface inside a JavaScript compatible web-browser. References VCL for PHP Sourceforge page Integrated development environments CodeGear software PHP software
https://en.wikipedia.org/wiki/T%201173/97
T 1173/97, also known as Computer program product/IBM or simply Computer program product, is a decision of a Technical Board of Appeal of the European Patent Office (EPO), issued on July 1, 1998. It is a landmark decision for interpreting Article 52(2) and (3) of the European Patent Convention (EPC) and whether computer programs are excluded from patentability under the EPC. It mainly held that "a computer program product is not excluded from patentability under if, when it is run on a computer, it produces a further technical effect which goes beyond the "normal" physical interactions between program (software) and computer (hardware)". Decision T 1173/97 distinguished computer programs with a technical character from those with a non-technical character, and was thus based on an approach differing from the view taken by a number of previous decisions of the Boards of Appeal that all computer programs were excluded under Art. 52(2)(c) and (3) EPC. T 1173/97, along with T 935/97 (not published in the Official Journal of the EPO), are considered to be "groundbreaking decisions". The Enlarged Board of Appeal has described T 1173/97 as "seminal in its definition of 'further technical effect' and abandonment of the contribution approach to [the exclusion under Article 52(2) and (3) EPC]". Reasoning The Board first examined the relationship between the TRIPS Agreement and the EPC. It confirmed that the TRIPS Agreement could not be directly applied to the EPC, but thought it appropriate to take the TRIPS Agreement into consideration, since it "gives a clear indication of current trends". The Board considered that "it is the clear intention of TRIPS [and in particular Art. 27(1) TRIPS ] not to exclude from patentability any inventions, whatever field of technology they belong to, and therefore, in particular, not to exclude programs for computers". The Board however pointed out that "the only source of substantive patent law for examining European patent applications [at that moment was] the European Patent Convention". The Board therefore considered Art. 52(2) and (3) EPC and concluded that the combination of Art. 52(2) and (3) EPC (exclusion of computer programs, but only when the application relates to computer programs "as such") "demonstrates that the legislators did not want to exclude from patentability all programs for computers". The Board then endeavored to determine the meaning of the expression "as such" in Article 52(3) EPC. It concluded that, if a computer program has a technical character, it should be considered patentable, since the technical character of an invention is generally accepted as an essential requirement for its patentability, In other words, "having technical character means not being excluded from patentability under the "as such" provision pursuant to Article 52(3) EPC." Technical character The Board next held that "[for] the purpose of interpreting the exclusion from patentability of programs for compute
https://en.wikipedia.org/wiki/User%20modeling
User modeling is the subdivision of human–computer interaction which describes the process of building up and modifying a conceptual understanding of the user. The main goal of user modeling is customization and adaptation of systems to the user's specific needs. The system needs to "say the 'right' thing at the 'right' time in the 'right' way". To do so it needs an internal representation of the user. Another common purpose is modeling specific kinds of users, including modeling of their skills and declarative knowledge, for use in automatic software-tests. User-models can thus serve as a cheaper alternative to user testing but should not replace user testing. Background A user model is the collection and categorization of personal data associated with a specific user. A user model is a (data) structure that is used to capture certain characteristics about an individual user, and a user profile is the actual representation in a given user model. The process of obtaining the user profile is called user modeling. Therefore, it is the basis for any adaptive changes to the system's behavior. Which data is included in the model depends on the purpose of the application. It can include personal information such as users' names and ages, their interests, their skills and knowledge, their goals and plans, their preferences and their dislikes or data about their behavior and their interactions with the system. There are different design patterns for user models, though often a mixture of them is used. Static user models Static user models are the most basic kinds of user models. Once the main data is gathered they are normally not changed again, they are static. Shifts in users' preferences are not registered and no learning algorithms are used to alter the model. Dynamic user models Dynamic user models allow a more up to date representation of users. Changes in their interests, their learning progress or interactions with the system are noticed and influence the user models. The models can thus be updated and take the current needs and goals of the users into account. Stereotype based user models Stereotype based user models are based on demographic statistics. Based on the gathered information users are classified into common stereotypes. The system then adapts to this stereotype. The application therefore can make assumptions about a user even though there might be no data about that specific area, because demographic studies have shown that other users in this stereotype have the same characteristics. Thus, stereotype based user models mainly rely on statistics and do not take into account that personal attributes might not match the stereotype. However, they allow predictions about a user even if there is rather little information about him or her. Highly adaptive user models Highly adaptive user models try to represent one particular user and therefore allow a very high adaptivity of the system. In contrast to stereotype based user models
https://en.wikipedia.org/wiki/Stanford%20dragon
The Stanford dragon is a computer graphics 3D test model created with a Cyberware 3030 Model Shop (MS) Color 3D Scanner at Stanford University. The data for the model was produced in 1996. The dragon consists of data describing 871,414 triangles determined by 3D scanning a real figurine. The data set is often used to test various graphics algorithms, including polygonal simplification, compression, and surface smoothing, similar to the Stanford bunny (1993). The model is available in different file formats (.ply, vrml, vl, etc.) on the internet for free. See also List of common 3D test models Stanford bunny Notes References External links The Stanford 3D Scanning Repository provides the Stanford dragon model for download Large Geometric Models Archive at Georgia Tech provides the Stanford dragon model for download in standard file formats 3D graphics models Test items Dragons in art
https://en.wikipedia.org/wiki/Ex.plode.us
ex.plode.us was a website search engine that indexed people. It was created by Curverider, the creators of the Elgg social networking platform. Ex.plode.us aggregated social data from 43 Things, flickr, jaiku, Live Journal, tribe.net, Twitter, and YouTube. Initially launched as Explode! in February 2007 as purely a social network aggregation utility and widget it was re-launched in May 2007 as a people search engine. In August 2007 a Facebook version was released, taking advantage of the recently opened Facebook API. However, the Facebook application did not allow ex.plode.us to aggregate information from Facebook. In February 2008 a discussion on tribe.net dominated by tribe users who voiced privacy concerns resulted in tribe.net blocking ex.plode.us from accessing tribe users' FOAF data. Individuals who were users of both ex.plode.us and tribe.net lost a great deal of their network on ex.plode.us. As of February 2010, ex.plode.us no longer exists. It had hacked into some YouTube users accounts to get the 'sign up name' to display with the 'user name'. Google still has searches related to this hacking. API The site offered a REST-style API, which no longer exists. References External links Official press release Look Out MyBlogLog - Here Comes Explode Explode adds people search Explode is a New Social Search Engine Explode - A social network connection Defunct internet search engines Social search Defunct online companies
https://en.wikipedia.org/wiki/CRAMM
CRAMM (CCTA Risk Analysis and Management Method) is a risk management methodology, currently on its fifth version, CRAMM Version 5.0. History CRAMM was created in 1987 by the Central Computer and Telecommunications Agency (CCTA), now renamed into Cabinet Office, of the United Kingdom government. Methodology CRAMM comprises three stages, each supported by objective questionnaires and guidelines. The first two stages identify and analyze the risks to the system. The third stage recommends how these risks should be managed. The three stages of CRAMM are as follows: Stage 1 The establishment of the objectives for security by: Defining the boundary for the study for Risk Assessment Identifying and valuing the physical assets that form part of the system; Determining the 'value' of the data held by interviewing users about the potential business impacts that could arise from unavailability, destruction, disclosure or modification; Identifying and valuing the software assets that form part of the system. Stage 2 The assessment of the risks to the proposed system and the requirements for security by: Identifying and assessing the type and level of threats that may affect the system; Assessing the extent of the system's vulnerabilities to the identified threats; Combining threat and vulnerability assessments with asset values to calculate measures of risks. Stage 3 Identification and selection of countermeasures that are commensurate with the measures of risks calculated in Stage 2. CRAMM contains a very large countermeasure library consisting of over 3,000 detailed countermeasures organised into over seventy logical groupings. Deployment CRAMM is in use by NATO, the Dutch armed forces, and corporations working actively on security, like Unisys. CRAMM is offered in English and Dutch versions. References GAMMASS Risk analysis methodologies
https://en.wikipedia.org/wiki/List%20of%20settlements%20in%20Warwickshire%20by%20population
This is a guide to the size of settlements in Warwickshire based on the data from the article on each town which in turn are taken from the 2001, 2011 and 2021 UK censuses. The population of Warwickshire in 2021 was officially estimated to be 596,773. See also Coventry References External links Census 2001 website List of Warwickshire towns by population Warwickshire towns Towns
https://en.wikipedia.org/wiki/List%20of%20settlements%20in%20Anglesey%20by%20population
This is a guide to the size of settlements in Anglesey based on the data from the article on each town. The entire population of Anglesey is 69,700 (2011 census). References Anglesey, towns Anglesey population
https://en.wikipedia.org/wiki/History%20of%20virtual%20learning%20environments%20in%20the%201990s
In the history of virtual learning environments, the 1990s was a time of growth, primarily due to the advent of the affordable computer and of the Internet. 1980s 1985 The Free Educational Mail (FrEdMail) network was created by San Diego educators, Al Rogers and Yvonne Marie Andres, in 1985. More than 150 schools and school districts were using the network for free international email access and curriculum services. 1990s 1990 Formal Systems Inc. of Princeton, NJ, USA introduces a DOS-based Assessment Management System. An internet version was introduced in 1997. (In 2000, Formal Systems changed its name to Pedagogue Solutions. The Athena Project at MIT, which started in 1983, has evolved into a system of "shared services" that look remarkably like many current VLEs or learning management systems. The network hosted software from multiple vendors, and made it all work together. Here is a list of the features of the system as of 1990: printing, electronic mail, electronic messaging (Zephyr), bulletin board conferencing (Discuss), on-line consulting (OLC), on-line teaching assistant (OLTA), on-line help (OLH), assignment exchange (Turn in/pick up), access to system libraries, authentication for system security (Kerberos), naming-for linking system components together (Hcsiod), and a service management system (Moira). Pavel Curtis created LambdaMOO, an early Multi-User Dungeon (MUD), at Xerox PARC. HyperCourseware created by Kent Norman at the University of Maryland, College Park was originally written for use in the At&T Teaching Theater, a prototype electronic classroom. The original version was written in WinPlus, a Hypercard like program, and ran on a local area network with one server and numerous client workstations. It included an online syllabus, online lecture notes and readings, synchronous chat rooms, asynchronous discussion boards, online student profiles with pictures, online assignments and exams, online grading, and a dynamic seating chart. A Web-based version was introduced in January 1996, which has continued to function up to the present. The US Navy's Naval Technical Training System was designed as a curriculum development system. It included course management tools for the storage, retrieval and dissemination of information. An article in Electronic Learning by Therese Mageau describes Integrated Learning Systems (ILS) as "networked computers running broad-based curriculum software with a management system that tracks student progress." A report by George Mann and Joe Kitchens reviews the Curriculum Management System (CMS), a system that generated individualized learning plans every two weeks for each student. FirstClass is launched by SoftArc, initially for the Macintosh platform. 1991 Thousands of FrEdMail users gained access to the NSFNET via newly established gateways at two NSFNET mid-level network locations: Merit/MichNet in Ann Arbor, MI, and CERFnet (California Education and Research Federation Network) in Sa
https://en.wikipedia.org/wiki/Network%20protector
A network protector is a type of electric protective device used in electricity distribution systems. The network protector automatically disconnect its associated distribution transformer from the secondary network when the power starts flowing in reverse direction. Network protectors are used on both spot networks and grid networks. The secondary grid system improves continuity of service for customers, since multiple sources are available to supply the load; a fault with any one supply is automatically isolated by the network protector and does not interrupt service from the other sources. Secondary grids are often used in downtown areas of cities where there are many customers in a small area. Operation Typically the network protector is set to close when the voltage difference and phase angle are such that the transformer will supply power to the secondary grid, and is set to open when the secondary grid would back-feed through the transformer and supply power to the primary circuit. Network protectors typically have three settings, "automatic", "open", and "close". The top side is fed from multiple protectors and is always energized unless all units on a spot network are in the open position. Grid units will always be energized on the top side from the many other units tied into the grid. A spot network is 2 or more transformers dedicated to a single customer. The grid feeds multiple customers. A network protector has a circuit breaker set of contacts and a controlling protection relay. The components are enclosed in a protective housing; some network protectors are installed on transformers below grade and must be in water-resistant enclosures. The mechanism contains electrical and mechanical parts to switch open and close the secondary contacts. The controlling relay monitors voltage and current in the transformer, and opens or closes the contact mechanism through electrical signals. The relay uses a power/time curve so that small, short term reverse power flow (such as from elevator hoists) are ignored. Spot units will be 277/480 and the grid units will be 120/208. Application The network protector does not protect the (secondary) network cable from overload. The network protector is installed to protect the stability and reliability of the secondary grid by preventing power flow away from the customers and into the primary feeders. If there is a fault on the primary feeder, the substation circuit-breaker is meant to open, disconnecting the primary feeder from one side. The problem is that this primary cable is also connected to a network transformer, which is interconnected to other network transformers on its secondary side. The secondary network will energize the primary feeder through the network transformer. This can be very dangerous, because a fault will continue to be 'fed' from the secondary network side of transformer. Even without a fault, if the electric utility wants to perform maintenance on that primary cable, they
https://en.wikipedia.org/wiki/The%20Portopia%20Serial%20Murder%20Case
is an 1983 adventure game designed by Yuji Horii and published by Enix. It was first released on the NEC PC-6001 and has since been ported to other personal computers, the Nintendo Famicom, mobile phone services and most recently, Windows as Square Enix showing off their natural language processing technology. In the game, the player must resolve a murder mystery by searching for clues, exploring different areas, interacting with characters, and solving item-based puzzles. The game features first-person graphics, nonlinear gameplay, an open world, conversations with non-player characters, branching dialogue choices, suspect interrogations, nonlinear storytelling, and plot twists. The Famicom version also features a command menu system, point-and-click interface, and 3D dungeon maze. Upon its release, The Portopia Serial Murder Case was well received in Japan. It became an influential title, helping to define the visual novel genre as well as inspiring Japanese game designers such as Hideo Kojima and Nintendo's Eiji Aonuma. Gameplay The Portopia Serial Murder Case follows a first-person perspective and narrative. The various events are described with still pictures and text messages. The player interacts with the game using a verb-noun parser which requires typing precise commands with the keyboard. Finding the exact words to type is considered part of the riddles that must be solved. While sound effects are present, the game lacks music and a save function. It features a conversation system with branching dialogue choices, where the story develops through entering commands and receiving answers to them from the player's sidekick or non-player characters. The game features nonlinear gameplay, allowing multiple different ways to achieve objectives. This includes travelling between different areas in an open world and making choices that determine the dialogues and order of events as well as alternative endings depending on who the player identifies as the culprit. However, only one of the characters is the true culprit, while the others are red herrings; if the player closes the case with the wrong culprit, then the player will face criticism from the police chief and need to re-open the case. The game includes a phone that could be used to manually dial any number, which is needed to contact several non-player characters. The game also features an inventory system requiring the examination and collection of items, which could be used as evidence later in the game. With no keyboard, the Famicom version replaces the verb-noun parser with a menu list of fourteen set commands selectable with the gamepad. This is similar to the command selection menu system introduced in Yuji Horii's murder mystery adventure game Okhotsk ni Kiyu: Hokkaido Rensa Satsujin Jiken, which was released in 1984, in between the PC and Famicom releases of Portopia. One of the commands on the menu allowed the player to use a point-and-click interface, using the D-pad to move
https://en.wikipedia.org/wiki/List%20of%20Metrovalencia%20stations
The following is a list of the 138 stations in the Metrovalencia hybrid metro/tram system in Valencia, Spain. The Metrovalencia network consists of of route. A portion of this network, serving a total of 35 stations, is underground. The remaining of route, serving 103 stations, is at-grade. Legend Boldface: Terminus station Italics: Request-stop station List References External links Metrovalencia – official site Ferrocarrils de la Generalitat Valenciana (FGV) Metrovalencia at UrbanRail.net Valencia Valencia
https://en.wikipedia.org/wiki/List%20of%20anime%20broadcast%20by%20TBS%20Television%20%28Japan%29
The following list comprises all anime that has been broadcast on TBS Television, its affiliates (like MBS, which has been affiliated with TBS since April 1, 1975), and related programming blocks like Animeism. TV series (all) 1960s–70s 1980s 1990s 2000s 2010s 2020s Films and specials Toshishun (April 12, 1981) Otoko wa Tsurai yo: Torajirō Wasure na Kusa (August 7, 1998) See also List of programs broadcast by TBS Television (Japan) References anime Tbs Tbs
https://en.wikipedia.org/wiki/25%20Days%20of%20Christmas
Freeform's 25 Days of Christmas is an American annual seasonal event of Christmas programming broadcast during the month of December by the U.S. cable network Freeform. The event was first held in 1996, and has been an annual fixture of the channel through its various incarnations, including The Family Channel, Fox Family, ABC Family, and Freeform. The brand covers airings of classic holiday specials as well as new Christmas-themed television movies each year; generally few of the network's original series air during the time period, outside of Christmas-themed episodes. In 2006, the lineup has also included airings of general, family films that Freeform holds rights to, which included the Harry Potter films until January 2017, and other Walt Disney Studios Motion Pictures films. In 2007, the block was extended to November with a Countdown to 25 Days of Christmas block. 25 Days of Christmas programming often attracts major surges in viewership for Freeform, with higher-profile film airings often attracting 3–4 million viewers or more. For 2017, Disney extended the 25 Days of Christmas branding to holiday programming shown by Freeform's sister properties in the Disney-ABC Television Group, including ABC, Disney Channel, Disney XD, and Disney Junior. For most of the block's run, fourteen specials from the Rankin/Bass Productions library of Christmas specials (excluding the original Rudolph the Red-Nosed Reindeer and Frosty the Snowman specials, both of which have aired on CBS since 1972 and 1969 respectively) served as the centerpiece of the 25 Days of Christmas. Freeform lost the rights to twelve of those specials (which included The Year Without a Santa Claus) to AMC in 2017 to serve as the linchpin of its new "Best Christmas Ever" schedule; Freeform still airs Santa Claus is Comin' to Town and The Little Drummer Boy. In May 2019, Freeform announced it had acquired the cable rerun rights to the Rudolph and Frosty specials, reuniting the four pre-1974 Rankin/Bass programs on the same network. CBS will continue to hold the free-to-air rerun rights to both specials. Freeform and ABC also held rights to the Charlie Brown holiday specials until Apple TV+ acquired the exclusive rights to the franchise in 2020 (later sublicensing some of the specials to PBS for one-time airings that year). Programming Original specials 1996 – Home and Family Christmas Special 2001 – Donner 2008 – A Miser Brothers' Christmas 2009 – Gotta Catch Santa Claus, Holly and Hal Moose: Our Uplifting Christmas Adventure 2011 – A Very Pink Christmas 2017 – Disney Parks Presents a Disney Channel Holiday Celebration Original films Nearly every year since 25 Days of Christmas debuted in 1996, at least one new holiday-related TV film has been produced (excluding 2002, 2014, and 2015). Starting in 2005, two TV films have been produced. In 2007, three films were created for the block, due to the popularity of the previous year's films. The Family Channel era: The Family Channe
https://en.wikipedia.org/wiki/List%20of%20router%20and%20firewall%20distributions
This is a list of router and firewall distributions, which are operating systems designed for use as routers and/or firewalls. See also List of router firmware projects Comparison of router software projects References Free routing software Router
https://en.wikipedia.org/wiki/NBA%20on%20DuMont
For the 1953–54 NBA season, the National Basketball Association began a contract with the DuMont Television Network. This marked the first year the NBA had a national television contract. Background The contract had the DuMont Television Network televising 13 Saturday afternoon games. According to the book Tall Tales, NBA owners wanted the presumably "worst" game of the week to be shown on DuMont, because they were afraid if the "best" games were shown, it would negatively affect the gate for that game. Also, even though DuMont wanted the games on Saturday afternoons, a number of owners resisted because they feared that Saturday matinees would not draw as many people as a night game. The DuMont Network would televise 20 Saturday afternoon games the following season, paying $39,000 for the rights. DuMont's first game aired on December 12, 1953, with the Boston Celtics defeating the Baltimore Bullets 106-75. This was the only year of NBA coverage on DuMont; the Saturday afternoon package moved to NBC for the season, mainly because NBC could clear the games on far more stations that DuMont could. Games on DuMont were usually blacked out in the cities they were played in; for example, the three Boston Celtics home games included in the 1953-54 package were blacked-out in Boston, however, WJAR-TV in nearby Providence (whose signal covers most of the metropolitan Boston area) did carry the two regular-season Celtics' home games that were part of the DuMont package. Meanwhile, as early as 1948-49, The New York Times reported that all New York Knicks games at Madison Square Garden would be televised locally. The local station, WJZ-TV (the forerunner for ABC's flagship station, WABC), also had exclusive rights to televise Knicks' playoff games. Schedule Announcers Marty Glickman Curt Gowdy Dick Grossman Lindsey Nelson John Reddy Marty Glickman and Lindsay Nelson called Games 2 and 5 of the 1954 NBA Finals for DuMont. See also List of programs broadcast by the DuMont Television Network List of surviving DuMont Television Network broadcasts References External links 1953-54 NBA Telecasts on DuMont 1950s American television series 1953 American television series debuts 1954 American television series endings Black-and-white American television shows National Basketball Association on television DuMont sports programming
https://en.wikipedia.org/wiki/ISO/IEC%2027007
ISO/IEC 27007 is a standard on Information security, cybersecurity and privacy protection that provides guidance on managing an information security management system (ISMS) audit programme, on conducting audits, and on the competence of ISMS auditors, in addition to the guidance contained in ISO 19011. This standard is applicable to those needing to understand or conduct internal or external audits of an ISMS or to manage an ISMS audit programme. It was published on November 14, 2011, and revised on January 21, 2020. It is part of the ISO/IEC 27000-series family of standards about information security management system (ISMS), which is a systematic approach to securing sensitive information, of ISO/IEC. It provides standards for a robust approach to managing information security and building resilience. Overview The standard is about how an information security management system audit can be performed based on a variety of audit criteria, separately or in combination, which include, among others: Requirements defined in ISO/IEC 27001:2013. Policies and requirements specified by relevant interested parties. Statutory and regulatory requirements. ISMS processes and controls defined by the organization or other parties. Management system plan(s) relating to the provision of specific outputs of an ISMS (e.g., plans to address risks and opportunities when establishing ISMS, plans to achieve information security objectives, risk treatment plans, project plans). This standard is applicable to all types of organizations regardless of size and ISMS audits of varying scopes and scales, including those conducted by large audit teams, typically of larger organizations, and those by single auditors, whether in large or small organizations. It concentrates on ISMS internal audits (first party) and ISMS audits conducted by organizations on their external providers and other external interested parties (second party). This document can also be useful for ISMS external audits conducted for purposes other than third party management system certification. ISO/IEC 27006 provides requirements for auditing ISMS for third party certification. Terms and structure The terms and definitions given in this standard are defined within the standard ISO/IEC 27000. The ISO/IEC 27007 standard is structured as follows: Principles of auditing Managing and audit programme Conducting an audit Competence and evaluation of auditors In addition to that, it has 1 annex (A): Annex A - Guidance for ISMS auditing practice References External links ISO Website Information assurance standards 27007
https://en.wikipedia.org/wiki/GMA%20Music
GMA Productions, Inc., doing business as GMA Music (formerly known as Infiniti Music and GMA Records), is a subsidiary of GMA Network, Inc. and is engaged in the production, marketing, and distribution of music and concerts. GMA Music is a member of PARI and has the distinction of having two Diamond Record awards in the highly competitive music scene. Current local artists Male Alden Richards Anthony Rosaldo Derrick Monasterio Jeremiah Tiangco Jeric Gonzales Ken Chan Kristofer Martin Cris Cyrus Gondra Migo Adecer Nar Cabico Ruru Madrid Female Angel Guardian Arra San Agustin Barbie Forteza Bianca Umali Golden Cañedo Jessica Villarubin Jillian Ward Kyline Alcantara Maricris Garcia Mariane Osabel Mikee Quintos Princess Velasco Sanya Lopez Ysabel Ortega Zephanie Dimaranan Former artists Aicelle Santos (2005–2014) Bryan Chong (2019–2021) Gerald Santos (2006–2011) Dingdong Avanzado (1996–1999) Frencheska Farr (2009–2016) Gary Granada Geoff Taylor (2009–2011) James Wright (2013–2016) Janno Gibbs (2004–2018) Jaya (2007–2011) Jessa Zaragoza (2012–2014) Jolina Magdangal (2004–2009) Jona (2005–2013) Julie Anne San Jose (2012–2017, 2020) Kitchie Nadal (2007–2008) Kris Lawrence (2012–2014) Sunshine Cruz (1999) Yasmien Kurdi (2005–2008) Compilations of GMA Music All About Love (2009) Isang Kinabukasan: A Kapuso Benefit Album (collaboration with GMA Kapuso Foundation) (2007) Tunog Kapuso: The Best of GMA TV Themes Vol. 1 (2005) Metropop Song Festival compilation album (1996–2002) Mga Awit Kapuso Vol. 5 (2008) Mga Awit Mula Sa Puso: The Best of GMA TV Themes Vol. 2 (2006) Mga Awit ng Kapuso: The Best of GMA TV Themes Vol. 3 (2007) Mga Awiting Kapuso: Best of GMA TV Soundtracks Vol. 4 (2008) Mga Awit Mula Sa Puso: The Best of GMA TV Themes Vol. 6 (2013) Mga Awit Kapuso Volume 7 (2016) Kapuso Sa Pasko: The GMA Records All Star Christmas Album (2005) Pinoy Pop Superstar Grand Contender Vol. 1 (2005) Pinoy Pop Superstar Grand Contender Vol. 2 (2006) Pinoy Pop Superstar Grand Contender Vol. 3 (2007) Seasons of Love: The Best of Mga Awit Kapuso Vol. 7 (2014) The Best Of Mga Awit Kapuso (2009) Awit Kapuso: Kay Sarap Maging Kapuso (2011) Take1: The Best Of Awit Kapuso Originals (2013) Movie soundtracks on GMA Music Mulawin The Movie Soundtrack (2005) Lovestruck (2008) Moments Of Love (2006) Pers Lab: The Music of First Time (2010) Tween Academy: Class of 2012 (Official Movie Soundtrack) (2011) GMA Records Home Video Movies and TV movies Some movies are released with GMA Films partners (most being Regal Entertainment or Viva Films) but the following are solely released by GMA Records Home Video: TV series Gallery Sub-labels AltG Records GMA Playlist References External links Philippine record labels Pop record labels Record labels established in 1995 Companies based in Quezon City Entertainment companies of the Philippines Philippine companies established in 1995
https://en.wikipedia.org/wiki/Mark%20Volders
Mark Volders (born 13 April 1977 in Xanten) is a Belgian football goalkeeper. References External links League Stats Players Data R.E. Mouscron Profile 1977 births Men's association football goalkeepers Belgian men's footballers Belgian expatriate men's footballers Royal Excel Mouscron players RBC Roosendaal players K.S.K. Beveren players K.R.C. Genk players Living people K.F.C. Dessel Sport players Sint-Truidense V.V. players Belgian Pro League players Eredivisie players Expatriate men's footballers in the Netherlands K.F.C. Lommel S.K. players Belgian expatriate sportspeople in the Netherlands
https://en.wikipedia.org/wiki/CSC%20%E2%80%93%20IT%20Center%20for%20Science
CSC – IT Center for Science Ltd. (also known as Finnish IT Center for Science, natively ) provides IT support and modeling, computing and information services for academia, research institutes and companies in Finland. It is owned by the Finnish state and Finnish higher education institutions, administered by the Ministry of Education and Culture, and operated on a non-profit principle. CSC has provided computational and network services since 1971. The CSC servers create a common user environment. The service environment is made up of several supercomputers, database servers and information servers that are all linked together with a fast data transfer connection into one metacomputer. Extensive data and archive servers are available for saving results. CSC also manages the FUNET network, which is the Finnish national research and education network that provides fast internet access to universities and other academic institutions as well as some governmental agencies. See also LUMI References External links Information technology companies of Finland Government-owned companies of Finland Companies based in Espoo Finnish companies established in 1971
https://en.wikipedia.org/wiki/Darwin%20%28programming%20language%29
Darwin is a closed source programming language developed by Gaston Gonnet and colleagues at ETH Zurich. It is used to develop the OMA orthology inference software, which was also initially developed by Gonnet. The language backend consists of the kernel, responsible for performing simple mathematical calculations, for transporting and storing data and for interpreting the user's commands, and the library, a set of programs which can perform more complicated calculations. The target audience for the language is the biosciences, so the library consisted of routines such as those to compute pairwise alignments, phylogenetic trees, multiple sequence alignments, and to make secondary structure predictions. Example Code One would write the Hello World program as: printf('Hello, world!\n'); The following procedure calculates the factorial of a number: factorial := proc ( n ) if (n=0) then return(1); else return(n * factorial(n-1)); fi; end: See also List of programming languages References Programming languages
https://en.wikipedia.org/wiki/Nathaniel%20Buzolic
Nathaniel Buzolic ( ; born 4 August 1983) is an Australian actor. He was the host of Nine Network's late-night television quiz show The Mint, and had a regular role on the BBC soap opera Out of the Blue (2008). He was also a co-host of the educational show Weather Ed on Sky News Weather Channel. He is also known for his role as Kol Mikaelson on the CW show The Vampire Diaries and its spin-off The Originals. Early life Buzolic is a first-generation Australian, and is of Croatian descent. Buzolic studied at De La Salle College Ashfield, and later attended the Australian Theatre for Young People (ATYP) in Sydney and later studied at Screenwise Acting School for Film and Television, graduating in 2004. Career Buzolic hosted the Disney Channel's afternoon kids show Studio Disney (2005). He has also appeared in All Saints (2003), Home and Away (2002) and an uncredited role in an episode of Water Rats (2001). Buzolic's played the title role in the feature comedy Offing David (2008) alongside fellow Australian actor Adam J. Yeend. Previously, he had minor roles in the 2007 Australian short films Road Rage and My Greatest Day Ever. In 2011, it was confirmed that Buzolic would play Kol Mikaelson in the CW series The Vampire Diaries. He reprised his role in the pilot episode of The Vampire Diaries spin-off series The Originals. It was reported on 30 May 2014 that Buzolic would return to The Originals for its second season and he appeared in the first trailer that debuted at the 2014 San Diego Comic Con. On 20 February 2014, it was announced that Buzolic had landed one of the lead roles in Supernatural: Bloodlines, a spin-off of the CW series Supernatural, with the twentieth episode of the latter's ninth season serving as a backdoor pilot. However, The CW passed on the pilot in May 2014. In March 2014, Buzolic appeared in two episodes of the fourth season of ABC Family's Pretty Little Liars as Dean Stavros, Spencer's (Troian Bellisario) substance abuse counselor. He reprised his role in the fifth and sixth episodes of the sixth season. In March 2022 it was announced that he would appear in Legacies as Kol Mikaelson. Personal life Buzolic is a born-again Christian. Filmography Film Television Web References External links 21st-century Australian male actors Australian game show hosts Australian male film actors Australian male television actors Australian people of Croatian descent Living people Male actors from Sydney 1983 births
https://en.wikipedia.org/wiki/Derwent%20World%20Patents%20Index
The Derwent World Patents Index (DWPI) is a database containing patent applications and grants from 44 of the world's patent issuing authorities. Compiled in English by editorial staff, the database provides a short abstract detailing the nature and use of the invention described in a patent and is indexed into alphanumeric technology categories to allow retrieval of relevant patent documents by users. Each record within the database defines a patent family, the grouping of patent documentation recorded at the various patent offices as protection of an invention is sought around the world. Each patent family is grouped around a Basic Patent, which is usually the first published example of the invention. All subsequent filings are referred back to the Basic Patent, and are referred to as Equivalent Patents. On this basis, the database has some 20 million "inventions", corresponding to tens of millions of patents, with almost a million new inventions added each year. From 2008, the number format of the Basic Patent Identifier (the Accession Number) changed, to allow up to 3.6 million records per year to be added, as the previous format only allowed a maximum of 1 million new records a year. This is due to the steady increase in unique patents filed each year. Basic format Primary level data - an electronic form of the original patent. Bibliographical data - cleaned and formatted patent numbers, inventor, application date etc. data. DWPI Abstract - a plain English summary of the novel feature, use and advantage of the invention DWPI manual code / Indexing - a custom taxonomy indicating the novel feature and use. The database is produced by information provider Clarivate Analytics, previously part of Thomson Reuters. Special Indexing Derwent Manual Codes Derwent produces its own proprietary patent classification codes, called manual codes. The classification system contains subdivisions related to chemical, electrical and mechanical engineering subject matter. Derwent Assignee Codes Derwent indexers add standardized 4-letter codes to DWPI records to represent certain patent-holding companies. These codes are not available for all companies - only the top patent holding companies have these standard Derwent codes. History Derwent World Patents Index can trace its origin to Delphion patent database, that originated in pre-World Wide Web era. Thomson Reuters acquired Delphion first, and them sold it to Clarivate in 2016. References External links Derwent World Patents Index on Clarivate Analytics Derwent World Patents Index on STN Former assets of Thomson Reuters Clarivate Patent search services
https://en.wikipedia.org/wiki/Magic%20Quadrant
Magic Quadrant (MQ) is a series of market research reports published by IT consulting firm Gartner that rely on proprietary qualitative data analysis methods to demonstrate market trends, such as direction, maturity and participants. Their analyses are conducted for several specific technology industries and are updated every 1–2 years: once an updated report has been published, its predecessor is "retired". Rating Gartner rates vendors upon two criteria: completeness of vision and ability to execute. Completeness of vision – Reflects the vendor's innovation, and whether the vendor drives or follows the market. Ability to execute – Summarizes factors such as the vendor's financial viability, market responsiveness, product development, sales channels and customer base. The two component scores lead to a vendor position in one of four quadrants: Leaders Vendors in the "Leaders" quadrant have the highest composite scores for their completeness of vision and ability to execute. A vendor in the Leaders quadrant has the market share, credibility, and marketing & sales capabilities needed to drive the acceptance of new technologies. These vendors demonstrate a clear understanding of market needs, they are innovators and thought leaders, and they have well-articulated plans that customers and prospects can use when designing their infrastructures and strategies. In addition, they have a presence in the five major geographical regions, consistent financial performance, and broad platform support. Challengers A vendor in the "Challengers" quadrant participates in the market, and executes well enough to be a serious threat to vendors in the Leaders quadrant. They have strong products, as well as sufficiently credible market position and resources to sustain continued growth. Financial viability is not an issue for vendors in the Challengers quadrant, but they lack the size and influence of vendors in the Leaders quadrant. Visionaries A vendor in the "Visionaries" quadrant delivers innovative products that address operationally or financially important end-user problems at a broad scale, but has not yet demonstrated the ability to capture market share or sustainable profitability. Visionary vendors are frequently privately held companies and acquisition targets for larger, established companies. The likelihood of acquisition often reduces the risks associated with installing their systems. Niche Players Vendors in the "Niche Players" quadrant are often narrowly focused on specific market or vertical segments. This quadrant may also include vendors that are adapting their existing products to enter the market under consideration, or larger vendors having difficulty developing and executing on their vision. Gartner Critical Capabilities complement Magic Quadrant analysis to offer deeper insight into the products and services offered by multiple vendors by a comparative analysis that scores competing products or services against a set of critical diff
https://en.wikipedia.org/wiki/Stratavia
Stratavia, formerly known as ExtraQuest, was a software company that specialized in enterprise Database and Data Center Automation, and private cloud computing enablement. Stratavia was founded by Venkat Devraj and Rainier Luistro in 2001. The company held two patents for automating standard operating procedures in database administration, and was included in the analyst firm Gartner's list of Cool Vendors for 2009. The company received venture funding from Vista Ventures, Asset Management Company and Adams Street Partners and is headquartered in Denver, Colorado, with offices in San Francisco, New York City, Atlanta, Boston and London, United Kingdom. In Aug. 2010, HP announced the acquisition of Stratavia to bolster its cloud computing and automation software portfolio. HP Software Division planned to integrate Stratavia technology into its cloud computing portfolio, including HP Cloud Service Automation Software. References External links HP Software official site HP Software Solutions Community Companies established in 2001 Defunct software companies of the United States Companies based in Denver Hewlett-Packard acquisitions
https://en.wikipedia.org/wiki/ICMS
ICMS may refer to: Immigration Case Management Services International College of Management, Sydney Institute of Computer and Management Sciences International Centre for Mathematical Sciences Integrated Criminal Case Filing And Management System
https://en.wikipedia.org/wiki/SDS%20Sigma%20series
The SDS Sigma series is a series of third generation computers that were introduced by Scientific Data Systems of the United States in 1966. The first machines in the series are the 16-bit Sigma 2 and the 32-bit Sigma 7; the Sigma 7 was the first 32-bit computer released by SDS. At the time, the only competition for the Sigma 7 was the IBM 360. Memory size increments for all SDS/XDS/Xerox computers are stated in kWords, not kBytes. For example, the Sigma 5 base memory is 16K 32-Bit words (64K Bytes). Maximum memory is limited by the length of the instruction address field of 17 bits, or 128K Words (512K Bytes). Although this is a trivial amount of memory in today's technology, Sigma systems performed their tasks exceptionally well, and few were deployed with, or needed, the maximum 128K Word memory size. The CII 10070 computer was a rebadged Sigma 7 and served as a basis for the upgraded, yet still compatible, Iris 50 and Iris 80 computers. The Xerox 500 series computers, introduced starting in 1973, were also compatible upgrades to the Sigma systems using newer technology. In 1975, Xerox sold its computer business to Honeywell, Inc. which continued support for the Sigma line for a time. The Sigma 9 may hold the record for the longest lifetime of a machine selling near the original retail price. Sigma 9 computers were still in service in 1993. In 2011, the Living Computer Museum in Seattle, Washington acquired a Sigma 9 from a service bureau (Applied Esoterics/George Plue Estate) and has made it operational. That Sigma 9 CPU was at the University of Southern Mississippi until Nov. 1985 when Andrews University purchased it and took it to Michigan. In February 1990, Andrews University via Keith Calkins sold and delivered it to Applied Esoterics in Flagstaff, Arizona. Keith Calkins made the Sigma 9 functional for the museum in 2012/13 and brought up the CP-V operating system in Dec. 2014. The various other system components came from other user sites, such as Marquette, Samford and Xerox/Dallas. Models Source: 32-bit systems 16-bit systems Instruction format The format for memory-reference instructions for the 32-bit Sigma systems is as follows: +-+--------------+--------+------+---------------------------+ |*| Op Code | R | X | Reference address | +-+--------------+--------+------+---------------------------+ bit 0 1 7 8 1 1 1 1 3 1 2 4 5 1 Bit 0 indicates indirect address. Bits 1-7 contain the operation code (opcode) Bits 8-11 encode a register operand (0:15) Bits 12-14 encode an index register (1:7). 0 indicates no indexing. Bits 16-31 encode the address of a memory word. For the Sigma 9, when real extended addressing is enabled, the reference address field is interpreted differently depending on whether the high-order bit is 0 or 1: +-+--------------+--------+------+-+-------------------
https://en.wikipedia.org/wiki/Telephone%20numbers%20in%20Taiwan
Telephone numbers in the Republic of China (Taiwan) use a system of area codes, beginning 02 to 08. The leading digit(s) following the area code denote the network operator (Chunghwa Telecom and its competitors). Mobile numbers begin 09. The international code for calls into Taiwan is 886. Area codes Source: The emergency numbers in Taiwan are 110 (police) and 119 (fire and ambulance services). When making an inter-area long-distance call from within Taiwan, a long-distance prefix "0" is required. If calls are made from within the same area code, then the area code does not need to be included. Inter-area calls are defined as long-distance phone calls even when the two numbers have the same prefix. If calls are made from outside Taiwan, the "0" of the area code prefix is omitted. The following table of area codes includes this "0" prefix. Mobile phones Taiwan mobile phone numbers always begin with 09 followed by 8 digits (e.g. 0918909875). The 0 is omitted when calling a Taiwan mobile phone number from outside Taiwan (e.g. +88 01771292198). If calling a landline within Taiwan from a local Taiwan mobile phone, the 0 of area code prefix must be included (e.g. 0 + area code + 8 digit landline number). Prefixes: (09)XXXX-XXXX 896-786 Mobile Phones (090 range is mostly used for wireless data services, M2M). Toll-free and premium rate Toll-free numbers begin with the prefix 0800 and 0809. Numbers in the 020x prefix are used for value-added services: International dialling International dialling from Taiwan follows the following pattern: Carrier selection code – Country calling code – Area code (if required, usually for landlines) – Subscriber number Carrier selection codes, which direct the call via one of several providers, are as follows: 002 – Chunghwa Telecom 005 – Asia Pacific Telecom 006 – Taiwan Mobile 007 – Far EasTone 009 – Chunghwa Telecom Country calling code The international dialling code for making calls to Taiwan, and the other islands is 886. International dialling codes were assigned by the International Telecommunication Union (ITU), an agency of the United Nations, to its member states and their dependencies in the 1960s. Despite the Republic of China on Taiwan still being a member of the UN, and hence the ITU, other member states declared that "the only representatives of the people of China are the delegates to the ITU and its permanent organs appointed by the Central Government of the People's Republic of China". This led to the People's Republic of China being assigned the country code 86. Consequently, in the early 1970s, Taiwan had to be unofficially assigned a separate code, 886, although there was pressure from China to change this to 866. This had to be listed as "reserved", but in 2006, the code was formally allocated to "Taiwan, China". References External links ITU allocations list Taiwan Telecommunications in Taiwan Taiwan communications-related lists
https://en.wikipedia.org/wiki/Cambridge%20Structural%20Database
The Cambridge Structural Database (CSD) is both a repository and a validated and curated resource for the three-dimensional structural data of molecules generally containing at least carbon and hydrogen, comprising a wide range of organic, metal-organic and organometallic molecules. The specific entries are complementary to the other crystallographic databases such as the Protein Data Bank (PDB), Inorganic Crystal Structure Database and International Centre for Diffraction Data. The data, typically obtained by X-ray crystallography and less frequently by electron diffraction or neutron diffraction, and submitted by crystallographers and chemists from around the world, are freely accessible (as deposited by authors) on the Internet via the CSD's parent organization's website (CCDC, Repository). The CSD is overseen by the not-for-profit incorporated company called the Cambridge Crystallographic Data Centre, CCDC. The CSD is a widely used repository for small-molecule organic and metal-organic crystal structures for scientists. Structures deposited with Cambridge Crystallographic Data Centre (CCDC) are publicly available for download at the point of publication or at consent from the depositor. They are also scientifically enriched and included in the database used by software offered by the centre. Targeted subsets of the CSD are also freely available to support teaching and other activities. History The CCDC grew out of the activities of the crystallography group led by Olga Kennard OBE FRS in the Department of Organic, Inorganic and Theoretical Chemistry of the University of Cambridge. From 1965, the group began to collect published bibliographic, chemical and crystal structure data for all small molecules studied by X-ray or neutron diffraction. With the rapid developments in computing taking place at this time, this collection was encoded in electronic form and became known as the Cambridge Structural Database (CSD). The CSD was one of the first numerical scientific databases to begin operations anywhere in the world, and received academic grants from the UK Office for Scientific and Technical Information and then from the UK Science and Engineering Research Council. These funds, together with subventions from National Affiliated Centres, enabled the development of the CSD and its associated software during the 1970s and 1980s. The first releases of the CSD System to the United States, Italy and Japan occurred in the early 1970s. By the early 1980s the CSD System was being distributed in more than 30 countries. As of 2014, the CSD System was distributed to academics in 70 countries. During the 1980s, interest in the CSD System from pharmaceutical and agrochemicals companies increased significantly. This led to the establishment of the Cambridge Crystallographic Data Centre (CCDC) as an independent company in 1987, with the legal status of a non-profit charitable institution, and with its operations overseen by an international board of gov
https://en.wikipedia.org/wiki/Amantes%20del%20desierto
Amantes del Desierto (Desert Lovers), is a Spanish-language telenovela produced by the United States-based television network Telemundo, RTI Colombia and Caracol Television. This limited-run series ran for 121 episodes from March 19, 2001, to September 4, 2001. Plot A man and a woman who love each other have to confront the world, in order to defend their feelings. Andrés Bustamante has been sentenced to twelve years in the gloomy cliff jail. Colonel Miguel Santana's daughter Barbara helps him escape from jail and takes him to the arid desert to hide. They are chased by Miguel Santana who makes them go through many dangerous adventures in search for freedom. Desert Lovers is a passionate and adventurous love story that takes place between the 1950s and 1960s. It is starred by Andrés Bustamante, a young, modest doctor, and Bárbara Santana, a woman who was born in a time when very conservative ideas ruled society. Cast Main cast International Broadcasting External links Telemundo telenovelas RTI Producciones telenovelas Caracol Televisión telenovelas 2001 telenovelas 2001 American television series debuts 2001 American television series endings 2001 Colombian television series debuts 2001 Colombian television series endings Spanish-language telenovelas
https://en.wikipedia.org/wiki/VR%20Class%20Dv12
The Dv12 (Sv12 and Sr12 until 1977) is the standard Finnish medium-weight diesel-hydraulic road switcher operated by VR. As all the main lines of Finnish railway network have been electrificied, the locomotive is designated mostly to unelectrified, less frequently used side lines. Occasionally it may still pull cargo trains on main lines. It has also been put in service as a shunter, replacing older classes Dv15 and Dv16 as they were retired. A total of 192 locomotives were built by Lokomo and Valmet between the years 1963 and 1984. As of 2022, the oldest Dv12 units still in use are 59 years old. Technical information The Dv12 is a general purpose locomotive which was designed for both passenger and cargo train use. Its 1000 kW power is somewhat low by current standards, but it is capable of multiple-unit operation with only one train crew and doublets and triplets are common. It has a low axle load of 15.6 tonnes, which makes it very well suited for branch lines that allow only smaller axle loads. All the axles are interconnected with shafts and universal joints to the Voith L 216 rs hydraulic transmission. Because all axles must rotate at the same speed, the individual slipping of axles is impossible. This translates into a very good tractive effort for a 62 tonne locomotive. The main engine is a Finnish-built Tampella SACM MGO V16 BSHR Diesel with two Brown Boveri-VTR 200 M turbochargers. The Dv12 has two speed ranges, for cargo use and for passenger use. This mechanical gear can only be switched with the locomotive at standstill. Variants Sr12 Between 1965 and 1972, 60 slightly heavier variants of the Sv12 were built. These were assimilated in the same series when their nomenclature changed to Dv12. Sv1 Dv12 number 2501 was modified between 1978 and 1980 to run on electricity instead of diesel, becoming class Sv1 number 3201. The locomotive was used first in freight traffic, later in passenger trains between Helsinki and Imatra. The Sv1 was used to test three-phase alternating current electrical engines; the results were used when developing class Dr16. The electrical components were delivered by Strömberg, which was also involved in the Dr16 project. The locomotive was painted yellow with black stripes, a colour scheme known from another short-lived prototype, the Dr15. In 1984, after four years of testing, the Sv1 was refitted with a diesel engine, returning to its original nomenclature and number. Number 3201 is nowadays used on an Sr2 class locomotive. Dv12 number 2501 is currently, in 2019, still in use. Retirement and future development In 2009, VR abandoned some of the older units of 2700 series Dv12s. The company plans to purchase new diesel locomotives during the 2010s. References Literature Arttu Käyhkö: Deeverin matkassa Kustantaja Laaksonen, Otavan kirjapaino Keuruu 2015 External links Dv12 Dv12 Dv12 B-B locomotives Railway locomotives introduced in 1963 5 ft gauge locomotives
https://en.wikipedia.org/wiki/Production%20%28computer%20science%29
A production or production rule in computer science is a rewrite rule specifying a symbol substitution that can be recursively performed to generate new symbol sequences. A finite set of productions is the main component in the specification of a formal grammar (specifically a generative grammar). The other components are a finite set of nonterminal symbols, a finite set (known as an alphabet) of terminal symbols that is disjoint from and a distinguished symbol that is the start symbol. In an unrestricted grammar, a production is of the form , where and are arbitrary strings of terminals and nonterminals, and may not be the empty string. If is the empty string, this is denoted by the symbol , or (rather than leave the right-hand side blank). So productions are members of the cartesian product , where is the vocabulary, is the Kleene star operator, indicates concatenation, denotes set union, and denotes set minus or set difference. If we do not allow the start symbol to occur in (the word on the right side), we have to replace by on the right side of the cartesian product symbol. The other types of formal grammar in the Chomsky hierarchy impose additional restrictions on what constitutes a production. Notably in a context-free grammar, the left-hand side of a production must be a single nonterminal symbol. So productions are of the form: Grammar generation To generate a string in the language, one begins with a string consisting of only a single start symbol, and then successively applies the rules (any number of times, in any order) to rewrite this string. This stops when we obtain a string containing only terminals. The language consists of all the strings that can be generated in this manner. Any particular sequence of legal choices taken during this rewriting process yields one particular string in the language. If there are multiple different ways of generating this single string, then the grammar is said to be ambiguous. For example, assume the alphabet consists of and , with the start symbol , and we have the following rules: 1. 2. then we start with , and can choose a rule to apply to it. If we choose rule 1, we replace with and obtain the string . If we choose rule 1 again, we replace with and obtain the string . This process is repeated until we only have symbols from the alphabet (i.e., and ). If we now choose rule 2, we replace with and obtain the string , and are done. We can write this series of choices more briefly, using symbols: . The language of the grammar is the set of all the strings that can be generated using this process: . See also Formal grammar Finite automata Generative grammar L-system Rewrite rule Backus–Naur form (A compact form for writing the productions of a context-free grammar.) Phrase structure rule Post canonical system (Emil Post's production systems- a model of computation.) References Grammar Natural language processing Formal languages
https://en.wikipedia.org/wiki/Put%20Up%20Your%20Dukes
Put Up Your Dukes was a sports television talk show that began September 4, 2007, on NFL Network. It features former NFL center, Jamie Dukes. The show aired from Tuesdays through Fridays at 6:30 p.m. Eastern. It is unclear when the show was cancelled, but College Football Now has assumed its time slot (expanded to an hour each day) and no further airings are scheduled. Dukes remains under contract to NFL Network for other assignments. Contributors Other contributors included former two-sport athlete Deion Sanders, NFL.com writers Adam Schefter and Pat Kirwan, college football analyst Charles Davis, and NFL on Fox commentator Brian Baldinger. Format Put Up Your Dukes debated the news of the day in the NFL. The show featured an interactive component through NFL.com allowing viewers to send questions to Dukes. Some were read and answered by Dukes on air. American sports television series NFL Network original programming 2007 American television series debuts 2008 American television series endings 2000s American television talk shows
https://en.wikipedia.org/wiki/David%20Webber%20%28computer%20scientist%29
David R.R. Webber (born 1955) is an Information technologist specializing in applications of XML, ebXML and EDI to standards-based information exchanges. He is a senior member of the ACM since 2007. David Webber is one of the originators of the ebXML initiative for global electronic business via the internet. He is holder of two U.S. Patents (5909570, 6418400) for electronic information exchange transformation and those patents are now cited widely by 37 other patents. David Webber has implemented several unique groundbreaking computer solutions in his career including the world's first airport gate scheduling system (King Khalid International Airport, Riyadh, 1987), the SeeMail email client for MCIMail written in Prolog, the patented GoXML system for XMLGlobal, the ShroudIt obfuscation system for LNK Corp, and the VisualScript tool for Smartdraw Inc. More recently David has contributed to open XML standards development with OASIS as technical editor for BCM (Business Centric-Methodology), CAM (Content Assembly Mechanism) and EML (Election Markup Language) public standard specifications. Also the CAM work has included developing solutions for information exchange using the NIEM.gov approach NIEM. Contributions to the NIEM initiative include serving on the NIEM Technical Architecture Committee (NTAC) and with the IJIS Institute along with white papers and presentations. Biography Education He earned a Bachelor's degree in Physics with Computing from the University of Kent at Canterbury in 1976. EDI and ebXML Webber participated in the development X12 Future Vision work in 1995 EDI, a focused group of 30+ people including with Edward A. Guilbert, the creator of the original technology. This led ultimately to the co-founding of the XML/edi Group in 1997 which Webber chaired the North American Chapter and then the group develop the principles of XML/edi document. Webber published "Introducing XML/EDI frameworks" in Electronic Markets Journal 1998; 8(1):38-41 which has been widely cited. From this early work the ebXML Initiative was jointly formed by UN/CEFACT and OASIS and co-sponsored by Sun, IBM, Oracle and others which led to the development of the ISO 15000 ebXML standard in 1999. Webber was a senior contributor to the international ebXML standards work for electronic business development. From this work stemmed the early work on the Content Assembly Mechanism (CAM) including the GUIDE concepts - Global Uniform Interoperable Data Exchange. Active in continuing XML standards development work within OASIS particularly he chairs the OASIS CAM technical committee, and co-edited the Business-Centric Methodology (BCM) specification. He contributes to several other areas of OASIS work including the Election Voter Services standard EML and the ebCORE work related to ebXML. Webber co-authored the book ebXML: The New Global Standard for Doing Business on the Internet (New Riders, , August 2001) with Alan Kotok . He holds two US software patents on X
https://en.wikipedia.org/wiki/List%20of%20anime%20broadcast%20by%20NHK
This is a list of past and current anime that aired on NHK. TV series (current) TV series (all) 1970s–90s 2000s 2010s 2020s NHK original programming NHK NHK
https://en.wikipedia.org/wiki/Veiled%20Ambition
Veiled Ambition is a 1-part documentary created by Rebel Films for the SBS independent network following a Lebanese-Australian woman named Frida as she opens a shop selling fashionable clothing for Muslim women on Melbourne's Sydney Road. The documentary follows Frida, described as a "little aussie battler in a scarf" as she develops her business in Melbourne while juggling a husband and home in Sydney and a pregnancy. A down-turn in sales after police raids on Muslim homes in Sydney and Melbourne induces Frida to stage a fashion show at the Australian Bridal Expo in order to gain greater exposure, a month before she is due to give birth. Veiled Ambition won the Palace Films Award for Short Film Promoting Human Rights at the 2006 Melbourne International Film Festival. References External links Veiled Ambition Study Guide Documentary films about businesspeople Australian short documentary films 2007 short documentary films 2007 Australian television series debuts Documentary films about Islam Documentary films about women Islam in Australia 2000s Australian films
https://en.wikipedia.org/wiki/CMN-GOMS
CMN-GOMS stands for Card, Moran and Newell GOMS. CMN-GOMS is the original version of the GOMS technique in human computer interaction. It takes the name after its creators Stuart Card, Thomas P. Moran and Allen Newell who first described GOMS in their 1983 book The Psychology of Human Computer Interaction. Overview This technique requires a strict goal-method-operation-selection rules structure. The structure is rigid enough that the evaluator represents the tasks in a pseudo-code format (no formal syntax is dictated). It also provides a guide for how to formulate selection rules. This method can also be used to estimate the load the task places on the user. For instance, examining the number of levels down the task-tree that a goal branch is can be used to estimate the memory demand the task places on the system. The process must remember information about all of the levels above the current branch. This technique is more flexible than the Keystroke-Level Model (KLM) because the pseudo-code is in a general form. That is, it can be executed for different scenarios by going down different branches, while KLM's procedure is a simple list that has to be recreated for each different task. Example of a simple goal Deleting a file in Windows Explorer (NOTE: not all goals are fully expanded in this example). GOAL: DELETE-FILE . GOAL: SELECT-FILE . . [select: GOAL: KEYBOARD-TAB-METHOD . . GOAL: MOUSE-METHOD] . . VERIFY-SELECTION . GOAL: ISSUE-DELETE-COMMAND . . [select*: GOAL: KEYBOARD-DELETE-METHOD . . . PRESS-DELETE . . . GOAL: CONFIRM-DELETE . . GOAL: DROP-DOWN-MENU-METHOD . . . MOVE-MOUSE-OVER-FILE-ICON . . . CLICK-RIGHT-MOUSE-BUTTON . . . LOCATE-DELETE-COMMAND . . . MOVE-MOUSE-TO-DELETE-COMMAND . . . CLICK-LEFT-MOUSE-BUTTON . . . GOAL: CONFIRM-DELETE . . GOAL: DRAG-AND-DROP-METHOD . . . MOVE-MOUSE-OVER-FILE-ICON . . . PRESS-LEFT-MOUSE-BUTTON . . . LOCATE-RECYCLING-BIN . . . MOVE-MOUSE-TO-RECYCLING-BIN . . . RELEASE-LEFT-MOUSE-BUTTON] *Selection rule for GOAL: ISSUE-DELETE-COMMAND If hands are on keyboard, use KEYBOARD-DELETE-METHOD, else if Recycle bin is visible, use DRAG-AND-DROP-METHOD, else use DROP-DOWN-MENU-METHOD See also Human information processor model CPM-GOMS KLM-GOMS NGOMSL References Notations This article incorporates text from Dr. G. Abowd: GOMS Analysis Techniques - Final Essay, which has been released into GFDL by its author). Footnotes Human–computer interaction
https://en.wikipedia.org/wiki/List%20of%20anime%20broadcast%20by%20Fuji%20TV
This article lists anime series that have aired on Fuji TV and its affiliates. Current 1960s 1970s 1980s 1990s 2000s 2010s 2020s Fuji Fuji Fuji TV original programming
https://en.wikipedia.org/wiki/News18%20Lokmat
News18Lokmat is a 24-hour Marathi-language news channel based in Mumbai, Maharashtra, India. It is a joint venture between Network 18 and Lokmat Group the publisher of the newspaper Lokmat. The channel was launched as IBN Lokmat on 6 April 2008, the day of the Hindu New Year festival Gudi Padwa. It was branded as News 18 Lokmat from 6 November 2017. Journalist Manoj Khandekar Ashutosh Patil Vilas Bade Hrishikesh Suryawanshi Tushar Rupnavar Udya Jadhav Kiran Khutale Prajakta Tandel Nimisha Dharurkar Yamini Mahamunkar References 24-hour television news channels in India Television stations in Mumbai Marathi-language television channels Network18 Group Television channels and stations established in 2008
https://en.wikipedia.org/wiki/Bitdefender
Bitdefender is a Romanian cybersecurity technology company headquartered in Bucharest, Romania, with offices in the United States, Europe, Australia and the Middle East. The company was founded in 2001 by the current CEO and main shareholder, Florin Talpeș. Bitdefender develops and delivers cybersecurity products and services, including endpoint protection, cloud and managed security, antivirus software and IoT security. Bitdefender products are distributed through partners in over 150 countries and the US market is estimated to generate more than 40% of its revenues. As of 2020, the company employed more than 1,600 people worldwide. As of August 2021, Bitdefender was ranked 5th globally among free anti-malware application vendors for Microsoft Windows by market scores. History Bitdefender software was originally developed by SOFTWIN and sold as AVX (Antivirus Expert) from 1996 until 2001, when its name was changed. In 2007, SOFTWIN spun off Bitdefender. Company milestones 1990: Creation of Softwin, one of the first IT start-ups in post-communist Romania. The rapid growth of computer viruses leads to the development of Softwin AVX (AntiVirus eXpert) 2001: The Bitdefender subsidiary is created. AVX solution is rebranded under the Bitdefender name. 2004: First offices outside Romania in US, Germany and UK. Further expansion in the Middle East (2011), and Denmark / Nordics Region (2015). 2007: Bitdefender becomes a separate business entity with external capital entry. Axxess Capital Investment Fund becomes a key shareholder. 2011: Bitdefender launches enterprise range and virtualization security products. 2015: Bitdefender creates a new consumer product category with Bitdefender BOX and IoT security services. 2017: Bitdefender makes its first major acquisition by acquiring French partner Profil Technology Source. British fund Vitruvian buys a 30% stake in the Bitdefender, valuing Bitdefender at more than $600 million. 2018: Bitdefender creates a new subsidiary in Australia through the acquisition of assets from business partner SMS eTech. Bitdefender acquires behavioral and network security analytics company RedSocks. 2019: Bitdefender opens its own Security Operations Center in San Antonio, Texas. 2021: Bitdefender unveils its extended detection and response (XDR) platform, offering business customers further visibility and incident context during investigations to accelerate threat validation, response actions and remediation. 2022: Bitdefender signed a multi-year partnership deal with Scuderia Ferrari on September 28. Fighting cyber-crime Bitdefender is part of the Cybersecurity Tech Accord for a safer online world, a collaboration among over 150 global technology companies committed to protecting their customers and users and helping them defend against malicious threats. Independent tests Bitdefender has won a number of awards from AV-Comparatives, an anti-virus assessment firm. Controversies and incidents Trojan.Fa
https://en.wikipedia.org/wiki/Scarabaeus%20%28video%20game%29
Scarabaeus, known in America as Invaders of the Lost Tomb, is a computer game released for the Commodore 64 in 1985. It was written in Hungary by Andromeda Software and distributed in the UK by Ariolasoft. The storyline features an astronaut and his dog who explore an Egyptian tomb (as revealed in the opening sequence) and need to find the Pharaoh's Jewel by solving puzzles spread over three levels. The game is played in 1st person view. A sequel was said to be in development in 1986 but was never released. Genre While earlier first-person maze-exploration games date as far back to the 1976 Commodore PET, Scarabaeus was considerably smoother and in color. The 3D effect was somewhat undermined by the odd-looking ghosts due to the sprites using expanded mode. Audio While the music was not as level-aware as the groundbreaking soundtrack in Cosmi's Forbidden Forest game, the in-game music is still very impressive, given the era. Pressing the M or space keys will toggle between the soundtrack and sounds of your own breathing inside of the spacesuit. JavaScript-compatible browsers can play 4 Scarabaeus audio segments via the DeepSID site. DeepSID's Remix tab for the Scarabaeus theme reveals two modern re-interpretations, with one being orchestral: https://deepsid.chordian.net/?file=/GAMES/S-Z/Scarabaeus.sid Gameplay The three levels are linked by an elevator, and each is a maze of different size. Level 1 The first level sees the astronaut trying to catch nine ghosts, each of which yields up a tablet with a hieroglyph on it (e.g., a snake, a bird, a hand); these hieroglyphs are needed on the next level. Exiting the level (which can be done at any time, not just after the ninth hieroglyph is taken) takes the astronaut to an elevator. This is operated by a crank, and the player needs to rotate the joystick through all directions in order to move the elevator down to the next level. If the player misses a direction during the rotation, then the elevator plummets down to the next level with significant loss of energy. The player may also proceed directly to the third level without completing, or even visiting, the second level. Level 2 The second level has a bigger maze with 13 alcoves. Walking past an alcove will cause a spider to come out and follow the astronaut's route, although at a slower pace than him. While the alcove is vacant, the astronaut is able to look inside the alcove. The aim is thus to take the spider on a long journey around the maze, giving the astronaut enough time to study the alcove and solve the puzzles within. 12 of the 13 alcoves contain two puzzles, one on the left and one on the right. The left-hand ones are made by a 4x5 grid of hieroglyphs like the ones collected on the previous level, linked to a bottle of potion, who can be medicine or poison. By carefully studying the grid, it is necessary to see if the nine hieroglyphs collected on the first level appear (in any order) in a 3x3 block within the 4x5 grid. If it's so
https://en.wikipedia.org/wiki/Hennessy%E2%80%93Milner%20logic
In computer science, Hennessy–Milner logic (HML) is a dynamic logic used to specify properties of a labeled transition system (LTS), a structure similar to an automaton. It was introduced in 1980 by Matthew Hennessy and Robin Milner in their paper "On observing nondeterminism and concurrency" (ICALP). Another variant of the HML involves the use of recursion to extend the expressibility of the logic, and is commonly referred to as 'Hennessy-Milner Logic with recursion'. Recursion is enabled with the use of maximum and minimum fixed points. Syntax A formula is defined by the following BNF grammar for Act some set of actions: That is, a formula can be constant truth always true constant false always false formula conjunction formula disjunction formula for all Act-derivatives, Φ must hold formula for some Act-derivative, Φ must hold Formal semantics Let be a labeled transition system, and let be the set of HML formulae. The satisfiability relation relates states of the LTS to the formulae they satisfy, and is defined as the smallest relation such that, for all states and formulae , , there is no state for which , if there exists a state such that and , then , if for all such that it holds that , then , if , then , if , then , if and , then . See also The modal μ-calculus, which extends HML with fixed point operators Dynamic logic, a multimodal logic with infinitely many modalities References Sources Sören Holmström. 1988. "Hennessy-Milner Logic with Recursion as a Specification Language, and a Refinement Calculus based on It". In Proceedings of the BCS-FACS Workshop on Specification and Verification of Concurrent Systems, Charles Rattray (Ed.). Springer-Verlag, London, UK, 294–330. Concurrency (computer science) Formal specification Modal logic Logic in computer science
https://en.wikipedia.org/wiki/Cyberneticist
A cyberneticist or a cybernetician is a person who practices cybernetics. Heinz von Foerster once told Stuart Umpleby that Norbert Wiener preferred the term "cybernetician" rather than "cyberneticist", perhaps because Wiener was a mathematician rather than a physicist. The word "cyberneticist" was used by Nicolas Rashevsky who began as a theoretical physicist. Robert Rosen, who began his career as a mathematician, regarded neurocybernetics—and more generally biocybernetics—as fields closely allied to mathematical biology and mathematical biophysics in which control theory and dynamical system theories also play significant roles. Today "cybernetician" is preferred by members of the American Society for Cybernetics (ASC) and British Cybernetics Society (CybSoc). See also Cybernetics New Cybernetics Mathematical and theoretical biology Neurocybernetics Biocybernetics Systems science Systems biology Systems engineering References External links Noted contributors to cybernetics and systems theory Website by the American Society for Cybernetics. Cybernetics and Systems Thinkers overview by the Principia Cybernetica Web. Cybernetics Mathematical and theoretical biology Systems science
https://en.wikipedia.org/wiki/EDB%20Business%20Partner
EDB Business Partner ASA, trading as EDB () was a Norwegian information technology company that supplied many services relating to computing, including operation, outsourcing and online banking. The company was headquartered in Oslo and listed on the Oslo Stock Exchange. Telenor owned 51.3% of EDB. EDB BP has wholly owned subsidiaries in Sweden and Denmark, and more recently acquired the majority of Miratech and Infopulse, which are Ukrainian IT companies. EDB Business Partner was a full owner in the companies Fellesdata AS (acquired 2001), Avenir AS, EDB Telecom AS, Spring Consulting AS, PDS AS and TAG Systems AS. On 8 January 2008, an agreement was entered into with StatoilHydro that the company would purchase IS Partner, which was previously under Hydro under the name Hydro IS Partner. In June 2010, EDB announced a merger with ErgoGroup, another big IT company in Norway. As of October 2010, the newly merged company was called EDB ErgoGroup, which in March 2012, took the name Evry. The company made headlines in several major newspapers in Sweden in March 2009, when a consultant hired through a recruitment company was fired because he, outside work, had expressed political views belonging to the Pirate Party in a public chat interview organized by the newspaper Nerikes Allehanda. References Computer companies of Norway Telenor 2010 disestablishments in Norway
https://en.wikipedia.org/wiki/National%20Cycle%20Route%209
It is the lowest-numbered route on the National Cycle Network outside of Great Britain. Route The route will eventually connect Belfast and Dublin. The route is currently signposted between the Queen Elizabeth Bridge in Belfast Newry. The portion south of Newry past Slieve Gullion was scrapped on safety grounds in 2020. Belfast to Newry Belfast | Lisburn | Craigavon | Portadown | Newry NCR 9 begins at the west side of the Queen Elizabeth II Bridge, where it connects with National cycle routes 93 and 99. It runs south along the River Lagan to the Island Arts Centre in Lisburn. After leaving Lisburn it runs west, roughly following the M1 motorway to Portadown. In Portadown NCR 9 links with National Cycle Route 94. At Portadown the route heads south down the Newry Canal Towpath. Approximately 4.5 km (2.8 miles) down the towpath the route links with National Cycle Route 91 and Regional Route 10. At Scarva station there is a second link with another branch of National Cycle Route 91. From Newry it passes through Camlough to the base of Slieve Gullion. The Belfast to Lisburn section is a slow and winding route along a path that is not suitable for road bikes as the surface is of varying quality made of tarmac or gravel. It does make an ideal cycle for young and old, and since bicycles can be taken on trains running on the adjacent railway line, you can choose the length of your route easily. The easiest route if taking your bicycle by train is going to Newry railway station then cycling to Portadown railway station, therefore avoiding going up a steep hill from Newry city centre to Newry railway station. Newry to Dublin Newry | Dundalk | Drogheda Dublin Work is underway in Dublin on the 1.4km Liffey-Tolka Project (1.4km), linking the city centre with the planned 3.2km Tolka Estuary Greenway via Dublin Port, and the Fingal Coastal Way, a 32km walking and cycling route in Fingal that will run through Newbridge Demesne, Donabate, Rush, Loughshinny, Skerries and Balbriggan. As of April 2021, there had been no announcements regarding the connecting segments in counties Meath and Louth. In Dublin Docklands the route with link with the Royal Canal Greenway and EuroVelo 2, and will connect with the Greater Dublin Area Cycle Network. References External links Lagan and Lough Cycle Way Sustrans Lagan and Lough Cycle Way National Cycle Routes Cycleways in Northern Ireland Transport in Belfast Lisburn Newry Transport in Dublin (city) Cycling in Ireland Transport in County Meath Transport in County Louth
https://en.wikipedia.org/wiki/On%20the%20Mike%20with%20Mike%20Sherman
On The Mike with Mike Sherman is a weekly syndicated U.S. TV show. It airs on the R&R Network on DirecTV in the US, and in the UK on the Flava channel on Sky Satellite TV. Created and presented by host Mike Sherman, and Directed and Edited by Matt Bodi Brenowitz, the show focuses on the urban and pop music industry and comprises interviews with R&B, hip-hop, Latin, pop and reggaetón artists (as well as actors and celebrities of all kinds) It covers major music events such as the Billboard Music Awards, American Society of Composers, Authors and Publishers Awards, Broadcast Music Incorporated Awards, BET Awards and others. The show, which is produced by Mike Sherman Productions Inc., based in Delray Beach, south Florida, has been broadcasting since 2003 - first on WBFS in Miami and several other national cable networks. Due to its popularity and consistent ratings, it was retained by Baruch Television Group and Baruch Entertainment, known for syndicating over 500 TV shows such as 'Be In Tune' and 'The Weekend Vibe', and motion picture packages. The show has helped launch acts such as Pretty Ricky (nominated for "Best Group" at the BET Awards 2007) and Grammy Award-winning rap artist Chamillionaire, who both made their first TV appearance on the show, as did Miami pop superstars Flo Rida and Sean Kingston. Notable celebrities interviewed Celebrities, whose interviews with Mike have appeared on the show, include: T-Pain, Mary J. Blige, Akon, Russell Simmons, the Pussycat Dolls, Ludacris, Scott Storch, Snoop Dogg and Christian Audigier. The format The show's format includes "red carpet events" in music, and behind-the-scenes coverage of music videos in the making. It interviews music artists from the world. The show also includes a segment called the "Indie Spotlight", with aspiring independent artists and music labels. The aspiring artists can upload a video clip to the show's website, where it is displayed and voted on by the viewing audience. Each week, the winner advances to the following week's show. The ultimate winner will be given a major record deal. This interactivity has enhanced the show's ratings, making it one of the highest rated shows in its time slot in south Florida. See also Before the Fame, Sherman's subsequent show References External links On the Mike with Mike Sherman Hip hop television 2000s American music television series 2003 American television series debuts
https://en.wikipedia.org/wiki/BBC2%20%28disambiguation%29
BBC Two of the British Broadcasting Corporation is a television network in the United Kingdom. BBC2 may also refer to: Banahaw Broadcasting Corporation or BBC2 in the Philippines. BBC Radio 2, British radio station of the British Broadcasting Corporation BBC II! (BBC Three Online), a British online service operating between the closure and revival of the BBC Three channel See also BBC (disambiguation)
https://en.wikipedia.org/wiki/Joaquin%20Bordado
Joaquin Bordado is a 2008 Philippine television drama action series broadcast by GMA Network. The series is based on a Philippine comic book serial by Carlo J. Caparas with the same title. Directed by Mac Alejandre and Argel Joseph, it stars Robin Padilla in the title role. It premiered on February 11, 2008 on the network's Telebabad line up replacing Zaido: Pulis Pangkalawakan. The series concluded on July 11, 2008 with a total of 108 episodes. It was replaced by Codename: Asero in its timeslot. A behind the scenes special of the series Ang Mundo ni Joaquin Bordado was aired on February 8, 2008. Cast and characters Lead cast Robin Padilla as Joaquin Bordado / Joaquin Apacible Supporting cast Iza Calzado as Sofia Apacible / Carol Aguila Eddie Garcia as Russo Ian Veneracion and Prince Stefan as Jerome Apacible / Miguel Aguila Mark Herras as Jason Apacible / Andre John Regala as Cefiro Antonio Aquitania as Kevin Renz Valerio as Jimboy Iwa Moto as Diane Ryza Cenon as Cecile Pen Medina and BJ Forbes as Jilco Rommel Padilla as Alfredo Maverick Relova as Tom Ariel Villasanta as Jerry Jun Hidalgo as Hugo Kylie Padilla as Erenea Recurring cast Ralph Padilla as Mico Gloria Sevilla as Lolit John Feir as Johnny Gene Padilla as Franco July Hidalgo as Preston Melissa Avelino as Andeng Bea Binene as Liza Jake Vargas as Baloy Mon Confiado as Warden Gomez Maggie Wilson as Brianna Gina Alajar as Regina Guest cast Marky Cielo as teen Joaquin Raquel Motesa as Daniel's mother Timothy Chan as kid Joaquin Nonie Buencamino as Mr. Apacible Ella V. as Alcera Anna Leah Javier as Vexus Daiana Menezes as Ivarna Jenny Miller as Elixera Leila Kuzma as Agoria Rez Cortez as Mendoza Tyron Perez as Mon Zamierre Benevice as Charisse Cris Martinez as Jojo Ayen Laurel as Minerva Shamaine Centenera-Buencamino as Joaquin's mother Anton Bernardo as Domeng Victor Aliwalas as Nelson Joseph Izon as Olsen Shiela Marie Rodriguez as Vicky Shirley Fuentes as Celeste Richard Quan as Ronaldo Production Actresses Jennylyn Mercado and Cristine Reyes were initially tapped to play important roles in the series. Due to Mercado's pregnancy, she had to be replaced by Ryza Cenon, while Reyes had some problems with the production and was quickly replaced by Iwa Moto. Robin Padilla, the lead star, had to endure six hours of body make-up every day for his tattoos. 10 crew members of the show were injured after their L-300 van (TSJ-518) from Subic to Metro Manila crashed along the North Luzon Expressway (NLEX) Valenzuela exit on May 6, 2008. Rushed to the Orthopedic Hospital was Ronaldo Godoy; to the Karuhatan Hospital were Demetrio Macaraig, stuntman Danny Bragais, Abnel Severino, Alfredo Manzanares, Steve Esguerra, and Ronnie Santos; and to the Monte Clara Montefalco Hospital in Meycauayan were Alvin Tercena, Francisco Minarag, and Rogelio Elgacio. On March 7, 2008, Robin Padilla suffered minor fracture injuries while filming a motorcycle stunt at
https://en.wikipedia.org/wiki/Caldivirga
In taxonomy, Caldivirga is a genus of the Thermoproteaceae. References Further reading Scientific journals Scientific books Scientific databases External links Archaea genera Thermoproteota
https://en.wikipedia.org/wiki/Thermocladium
In taxonomy, Thermocladium is a genus of the Thermoproteaceae. References Further reading Scientific journals Scientific books Scientific databases External links Archaea genera Thermoproteota
https://en.wikipedia.org/wiki/Social%20planning%20organizations%20in%20Canada
An informal network of non-profit community organizations across Canada. The work of social planning organizations (also referred to as "Social Planning Councils") focuses on a range of community development and social justice issues. Purpose The general purpose of social planning organizations is to help build and strengthen community. Social planning organizations may undertake a variety of activities, including: Conducting social research Policy analysis and development Planning, convening and collaborating Social enterprise and social innovation Community mobilization, and Advocacy Their work focuses around social issues affecting individuals and families, including: Diversity Immigrant/refugee and newcomer services Affordable housing Social determinants of health poverty and social exclusion "The working poor" and living wage Social determinants of health in poverty Social inequality GIS mapping and social indicator work Challenges Social planning organizations face numerous challenges in their work: High complexity of social issues Government-Related Challenges Implications of federal, provincial and municipal budget measures Reshaping of the social policy agenda Shifting role of the state in social policy (e.g. federal/provincial responsibilities, focus on the "fiscal imbalance," etc.) Changing relationships with all levels of government Changing provincial government priorities (greater challenges to put poverty on the agenda) Impact of service downloading from government to private, non-government and non-profit organizations. Demographic Challenges Growing immigrant and visible minority populations Diverse types of communities (urban, rural, northern, remote, reserves) Growing ethnic, cultural and linguistic diversity Economic and Infrastructure Challenges Shifting regional economies (e.g. urbanization) Changing social infrastructure needs Increasing economic disparity (Income inequality metrics) History Informal networking between SPOs has taken place to varying degrees since 1976. In the beginning, the Canadian Council on Social Development (CCSD) took a leadership role in bringing the local/regional councils together around social policy issues. Since the 1980s, individuals social planning organizations have taken a greater role in organizing SPO conferences and collaborating on social issues. Due to the high number of social planning organizations in Ontario, communication and collaboration between SPOs in that province are more frequent than in other provinces across Canada. The Social Planning Network of Ontario (SPNO) has often facilitated discussions between Ontario-based organizations. National SPO collaborations Falling Fortunes (2006–2008) A two-year national project (January 2006 through March 2008) aimed at identifying strategies to improve the income and wages, including the living wage, of young families and their children. Partners: Community Services Council, Newfoundland and Labrador Family Service Asso
https://en.wikipedia.org/wiki/Stygiolobus
In taxonomy, Stygiolobus is a genus of the Sulfolobaceae. See also List of Archaea genera References Further reading Scientific journals Scientific books Scientific databases External links Archaea genera Thermoproteota
https://en.wikipedia.org/wiki/Telephone%20numbers%20in%20Germany
The regulation of telephone numbers in Germany is the responsibility of the Federal Network Agency () of the German government. The agency has a mandate to telecommunications in Germany and other infrastructure systems. Overview Germany has an open telephone numbering plan. Before 2010, area codes and subscriber telephone numbers had no fixed size, meaning that some subscriber numbers may be as short as two digits. As a result, dialing sequences are generally of a variable length, except for some non-geographic area codes for which subscriber numbers use a fixed-length format. It is not possible to determine unambiguously the end of a phone number from a prefix or the digits already dialed. This feature allows the extension of the length of phone numbers without revoking or changing existing numbers. Mobile telephones are assigned to non-geographic codes, making them readily recognizable. A new numbering plan was introduced on 3 May 2010. Since then newly assigned landline telephone numbers have a standard length of eleven digits, including the area code. Area codes remained unchanged, variable in length. Exceptions to the eleven-digit rule are the four cities of Berlin, Frankfurt, Hamburg, and Munich, which are the only cities with two-digit area codes and have ten-digit numbers to avoid exceeding the maximum length of eight digits for a subscriber number. The German telephone network uses 5,200 geographical area codes, the length of which varies from two to five digits (not including the trunk code 0), with five-digit area codes being assigned only in the New States (prefix 3). In general, geographic area codes start with digits 2 to 9, whereas other non-geographic area codes (including those for cell phones) are assigned to 1 and network services to 11. Geographic numbering Geographic area codes have a length of two to five digits. The maximum length of a complete telephone number is eleven digits. Numbers for geographic area codes are assigned to carriers in blocks. Subscriber numbers do not start with 0 or 11 and can be dialled without area code from landlines within the same geographic area code. Originally, the first digits following the area code indicated a smaller service area or the type of the subscriber line (analogue or ISDN). This is no longer true as subscribers can keep their numbers when moving within an area code or when switching from analogue to ISDN. Furthermore, new carriers assign numbers from different blocks. (xx) xxxx-xxxx This is the format used for the four largest geographic areas in Germany: Berlin (30), Hamburg (40), Frankfurt (69) and Munich (89). Newly assigned numbers have a length of eight digits for the local subscriber number, yielding a total length of ten digits (not including the 0 trunk code). This is shorter than the maximum of eleven digits in other areas to avoid exceeding eight digits. Numbers assigned in the past, which are generally grandfathered, may be as short as five digits. (xxx) x
https://en.wikipedia.org/wiki/TilEm
TilEm is an emulator that simulates certain Texas Instruments calculators on a generic computer. It is similar to TiEmu, uses GTK+, and works on many different operating systems like Linux/Unix, FreeBSD, 32-bit Microsoft Windows and so on. If you have a copy of the information in the ROM from one of the ZiLOG Z80 series Texas Instruments Graphing Calculators (TI-82, TI-83 series, TI-84 Plus series, TI-85, TI-86, and TI-81), TilEm will emulate the behavior of the calculator without requiring the actual calculator hardware. TilEm is licensed under the GPL License. Linux emulation software Graphing calculator software
https://en.wikipedia.org/wiki/Cambridge%20Crystallographic%20Data%20Centre
The Cambridge Crystallographic Data Centre (CCDC) is a non-profit organisation based in Cambridge, England. Its primary activity is the compilation and maintenance of the Cambridge Structural Database, a database of small molecule crystal structures. They also perform analysis on the database for the benefit of the scientific community, and write and distribute computer software to allow others to do the same. History In 1962, Dr. Olga Kennard OBE FRS set up a chemical crystallography group within the Department of Chemistry, University of Cambridge. In 1965 she founded the CCDC and established the associated Cambridge Structural Database. At that time, there were only about 3,000 published X-ray structures, and the work involved converting these into a machine-readable form. Kennard invited Frank Allen to join the group, which he did in 1970, becoming Scientific Director and then Executive Director before retiring in 2008. In 1992, the CCDC moved into its own building adjacent to the Cambridge chemistry department. This new headquarters was designed by the Danish architect Professor Erik Christian Sørensen and won The Sunday Times Building of the Year Award in 1993. The CCDC still retains very close links as a University Partner Institution that trains students for postgraduate research degrees but from 1987 became an independent company. By 2019 the database had grown to over a million structures. Current research The staff at the CCDC curate the database of small-molecule organic and metal-organic crystal structures and make these available for download by the public. They also create and maintain a suite of cheminformatics software that may be used to apply the data to applications in the life sciences, including crystal engineering and materials science. Programs Developed CCDC developed programs such as ConQuest and Mercury that run under Windows and various types of Unix, including Linux. ConQuest is a search interface to the Cambridge Structural Database (CSD). Mercury is crystal structure visualizer tool and versions of Mercury released in 2015 and later provide the functionality to generate 3D print. See also List of chemical databases CrystalExplorer References External links The Cambridge Crystallographic Data Centre 1965 establishments in England Chemical industry in the United Kingdom Crystallography organizations Partner institutions of the University of Cambridge Research institutes established in 1965 Research institutes in Cambridge Science and technology in Cambridgeshire Research organisations in England
https://en.wikipedia.org/wiki/File%20virtualization
In computing, file virtualization is a field of storage virtualization operating on computer file level. It involves uniting multiple storage devices into a single logical pool of file. It is a vital part of both file area network (FAN) and network file management (NFM) concepts. As with most other virtualization designs, "a primary driver behind file virtualization is the desire to shield users and administrators from the complexity of the underlying storage environment. Other goals include simplified management, more efficient capacity usage and allocation, and reduced management costs". Network file management (NFM) is a data storage management-related category. The term is used interchangeably with NAS virtualization and file virtualization among data storage industry press, analysts and system administrators. The basic idea of NFM is that the rapid, ongoing growth of file data capacity on enterprise networks has led to massive management complexity and accelerating operating costs. NFM is the concept of creating a virtualization layer between the clients and the file servers (or NAS devices). By creating this abstraction layer, System Administrators may simplify the management of multiple storage devices, including non-disruptive movement of data between servers, preserving the client access path (pathname), policies for automating the placement of data according to its changing needs, and the ability to discover, analyze and report on server and file usage. References External links Taneja Group category definition: "Network file management solves NAS problems" Enterprise Storage Group category definition: "NAS virtualization simplifies file management" Network file virtualization Storage virtualization File Virtualization Heats Up on InternetNews.com Computer file systems Storage virtualization
https://en.wikipedia.org/wiki/G-616
G-616, formally known as GAS canister #G-616: The Effect of Cosmic Radiation on Static Computer Media & Plant Seeds Exposure to Microgravity was an experiment flown on the Space Shuttle as a self-contained experiment, as part of STS-40. Description The Small Self-Contained Payload G-616 was managed and owned by Thomas M. Hancock III, a space scientist from Redlands, California. G-616 was assigned by NASA to Hancock in 1987. He developed and constructed the primary payload. It was approved for flight in 1988. G-616 originally consisted of 3 experiments: A study on the effects of low Earth orbit on Space Shuttle External Tank foam – to assess if leaving an ET in space was feasible. Static Computer Memory Integrity Testing (SCMIT) – looking for soft event upsets (bit-flips) in static computer media Cultavor Microgravity Exposure (seeds in space). This experiment was to fly over two million seeds of 57 types from all over the world to orbit. History Preflight testing at Goddard Space Flight Center demonstrated that 24% of the Space Shuttle External Tank foam sample outgassed in 24 hours. This was several hundred times over what was allowed for on-orbit operations. In addition, high UV radiation would break down the basic structure of the foam. Based on this information, the experiment was pulled prior to flight. The test answered the basic question: NASA cannot leave Space Shuttle External Tanks in orbit without creating significant debris. The other two experiments passed testing and payload safety data reviews in 1989. In 1989, Hancock offered the Redlands Unified School District the chance to fly floppy disks and received over 1.5 million of the flown planet seeds for student instruction. Hancock worked with every school in the district in support of this effort. Furthermore, a contest was held for a student to develop a logo for this mission. It was flown on the outside of the payload canister during the mission. The payload was integrated at Kennedy Space Center in early 1990 and was the first Shuttle Small Payload constructed and assembled for flight at KSC since the loss of the Space Shuttle Challenger in 1986. Hydrogen leaking from the Space Shuttle main propulsion system delayed launch for over a year. During this time, the payload was stored on the GAS Bridge Assembly ready for flight at Hangar AF, NASA/KSC. On June 5, 1991, the payload was launched in the Space Shuttle Columbia as part of the STS-40's SpaceLab Life Sciences-1 mission. The payload spent 9 days in orbit before landing at Edwards Air Force Base. The payload was recovered at KSC during the first week of July 1991. The disks flown for the students as part of Hancock's experiment, and over 1.5 million seeds, were presented to the Redlands Unified School District in August 1991. Results Papers about the experiments were published in 1988, 1993, and 1999 at the Shuttle Small Payload Symposiums. A presentation on the results from both flights of the SCMIT experiment (STS-4
https://en.wikipedia.org/wiki/ATV%20Offroad%20Fury%203
ATV Offroad Fury 3 is a racing video game developed by Climax Racing and published by Sony Computer Entertainment for PlayStation 2. It was released on November 2, 2004 in North America and on February 10, 2006 in Europe. The game was succeeded by ATV Offroad Fury 4 in 2006. Gameplay Expanding from its predecessor, ATV Offroad Fury 3 features more ATVs, along with more championships, mini-games and improved physics. As is with the rest of the series, the game revolves around racing all-terrain vehicles (ATVs) around dirt racetracks. In addition to racing, another major focus of the game is stunts. Stunts can be achieved by tapping a combination of buttons while the player's ATV is in the air. Each stunt requires a different amount of time to perform. The game also provides "free-roaming offroad gameplay". The game also offers online play via i-Link, local area network (LAN) or other network connections. The game contains features for customizability, such as choosing parts for your ATV, changing color schemes, and even creating your own unique logo. Upon release in 2004, the game was well received by critics and fans of the franchise for its open world feel and advanced game physics. PSP version A PlayStation Portable version was released a few months later titled ATV Offroad Fury: Blazin' Trails. The game revolves around racing all-terrain vehicles (ATVs) on a dirt track. Another major focus of the game is stunts. Stunts can be achieved by tapping a combination of buttons while the player's ATV is in the air. Each stunt requires a different amount of time to perform. In addition to racing, the game offers mini-games, training courses and a career mode. The game also offers online play via a WiFi connection. Development ATV Offroad Fury 3 is the first game in the series not to be developed by Rainbow Studios after the company was acquired by THQ nearly a year prior to the release of Fury 2. As Rainbow Studios began working with THQ to develop MX Unleashed and start the MX vs. ATV series that serves as a crossover with THQ's MX trilogy, it approached Climax Studios, known for developing the ATV Quad Power Racing duology, to offer an opportunity to make another ATV racing game by continuing the Offroad Fury series. Reception ATV Offroad Fury 3 received "generally favorable" reviews according to review aggregator Metacritic. References External links 2004 video games ATV Offroad Fury Multiplayer and single-player video games MX vs. ATV PlayStation 2 games Racing video games Sony Interactive Entertainment games Video games developed in the United Kingdom SouthPeak Games
https://en.wikipedia.org/wiki/Transaction%20logic
Transaction Logic is an extension of predicate logic that accounts in a clean and declarative way for the phenomenon of state changes in logic programs and databases. This extension adds connectives specifically designed for combining simple actions into complex transactions and for providing control over their execution. The logic has a natural model theory and a sound and complete proof theory. Transaction Logic has a Horn clause subset, which has a procedural as well as a declarative semantics. The important features of the logic include hypothetical and committed updates, dynamic constraints on transaction execution, non-determinism, and bulk updates. In this way, Transaction Logic is able to declaratively capture a number of non-logical phenomena, including procedural knowledge in artificial intelligence, active databases, and methods with side effects in object databases. Transaction Logic was originally proposed in by Anthony Bonner and Michael Kifer and later described in more detail in and. The most comprehensive description appears in. In later years, Transaction Logic was extended in various ways, including concurrency, defeasible reasoning, partially defined actions, and other features. In 2013, the original paper on Transaction Logic has won the 20-year Test of Time Award of the Association for Logic Programming as the most influential paper from the proceedings of ICLP 1993 conference in the preceding 20 years. Examples Graph coloring Here denotes the elementary update operation of transactional insert. The connective is called serial conjunction. colorNode <- // color one node correctly node(N) ⊗ ¬ colored(N,_) ⊗ color(C) ⊗ ¬(adjacent(N,N2) ∧ colored(N2,C)) ⊗ tinsert(colored(N,C)). colorGraph <- ¬uncoloredNodesLeft. colorGraph <- colorNode ⊗ colorGraph. Pyramid stacking The elementary update represents the transactional delete operation. stack(N,X) <- N>0 ⊗ move(Y,X) ⊗ stack(N-1,Y). stack(0,X). move(X,Y) <- pickup(X) ⊗ putdown(X,Y). pickup(X) <- clear(X) ⊗ on(X,Y) ⊗ ⊗ tdelete(on(X,Y)) ⊗ tinsert(clear(Y)). putdown(X,Y) <- wider(Y,X) ⊗ clear(Y) ⊗ tinsert(on(X,Y)) ⊗ tdelete(clear(Y)). Hypothetical execution Here is the modal operator of possibility: If both and are possible, execute . Otherwise, if only is possible, then execute it. execute <- <>action1 ⊗ <>action2 ⊗ action1. execute <- ¬<>action1 ⊗ <>action2 ⊗ action2. Dining philosophers Here is the logical connective of parallel conjunction of Concurrent Transaction Logic. diningPhilosophers <- phil(1) | phil(2) | phil(3) | phil(4). Implementations A number of implementations of Transaction Logic exist: The original implementation. An implementation of Concurrent Transaction Logic. Transaction Logic enhanced with tabling. An implementation of Transaction Logic has also been incorporated as part of the Flora-2 knowledge representation and reasoning system. All these implementations are open source. Reference
https://en.wikipedia.org/wiki/Street%20Hacker
Street Hacker is a hacking simulator game developed by VirtuWeb Interactive. Unlike other hacking simulation games, the in-game engine is made to appear more like an actual computer system similar to the Linux OS/Shell. Plot In Street Hacker, the player assumes the role of a hacker who is approached by a crude executive and entrepreneur, Demetrius Mordecai. He sees you as a person with a strong analytical mind, keen intuition and a desire for power. Having no money at your disposal, he hires you as a hacker to do his dirty work. Vince, his chief of operations, helps you get started and accustomed to the game. Being as successful as he is, Demetrius has made quite a few enemies in the corporate world. This is evident by the first few missions he assigns you to, missions in which you are required to disrupt these corporations by sabotaging their servers. Once these missions are completed, Demetrius decides to "retire" you by calling in an anonymous tip to the FBI about who was behind the attacks. Quickly responding, the FBI surrounds your apartment and finds enough evidence to put you away for 4 years. Two years later, you are freed from prison to serve your remaining two years on parole. Vince, your mentor from the beginning, helps you get back on your feet by hooking you up with a laptop and some cash. He and many of the others who still work for Demetrius are all hoping that you can find enough dirt on him to put him away for life. Too afraid to directly betray him, they all put their support behind you. Style Street Hacker focuses primarily on actual forms of hacking (viruses, worms, etc.). The user is given a program with which to order these different programs so that they can perform the various missions assigned to them. Another feature to the game is the infiltration feature, where the user is required to infiltrate a building in order to hack internet access so they can accomplish the different missions that are assigned to them. Similarly to games such as Uplink, Street Hacker is heavily mission-driven, the entire main storyline being propelled by the different missions assigned. For the most part, the in-game dynamics mimic that of an actual operating system (down to the ability to execute programs and view folders). Hacking takes place in a DOS-style command prompt, using commands familiar to computer aficionado (commands such as WHOIS, CONNECT, etc.). It also allows for downloading files from the respective servers which you must connect to for missions (and in some cases for software downloads). See also Hacking Uplink System 15000 Hacker Neuromancer References External links Street Hacker Official Website 2004 video games Windows games Windows-only games Hacking video games
https://en.wikipedia.org/wiki/Ali%20Akansu
Ali Naci Akansu (born May 6, 1958) is a Turkish-American Professor of electrical & computer engineering and scientist in applied mathematics. He is best known for his seminal contributions to the theory and applications of linear subspace methods including sub-band and wavelet transforms, particularly the binomial QMF (also known as Daubechies wavelet) and the multivariate framework to design statistically optimized filter bank (eigen filter bank). Biography Akansu received his B.S. degree from the Istanbul Technical University, Turkey, in 1980, his M.S. and PhD degrees from the Polytechnic University (now New York University), Brooklyn, New York, in 1983 and 1987, respectively, all in Electrical Engineering. Since 1987, he has been with the New Jersey Institute of Technology where he is a Professor of Electrical and Computer Engineering. He was a Visiting Professor at Courant Institute of Mathematical Sciences of the New York University, 2009–2010. In 1990, he showed that the binomial quadrature mirror filter bank (binomial QMF) is identical to the Daubechies wavelet filter, and interpreted and evaluated its performance from a discrete-time signal processing perspective. It was an extension of his prior work on Binomial coefficient and Hermite polynomials that he developed the Modified Hermite Transformation (MHT) in 1987. The magnitude square functions of Binomial-QMF filters are the unique maximally flat functions in a two-band PR-QMF design formulation. He organized the first wavelet conference in the United States at NJIT in April 1990, and, then in 1992 and 1994. He published the first wavelet-related engineering book in the literature entitled Multiresolution Signal Decomposition: Transforms, Subbands and Wavelets in 1992. He made contributions in the areas of optimal filter banks, nonlinear phase extensions of discrete Walsh-Hadamard transform and discrete Fourier transform, principal component analysis of first-order autoregressive process, sparse approximation, digital watermarking, financial signal processing and quantitative finance. His publications include the books A Primer for Financial Engineering: Financial Signal Processing and Electronic Trading and Financial Signal Processing and Machine Learning. He was a founding director of the New Jersey Center for Multimedia Research (NJCMR), 1996–2000, and NSF Industry-University Cooperative Research Center (IUCRC) for Digital Video, 1998–2000. He was the vice president for research and development of the IDT Corporation, 2000–2001, the founding president and CEO of PixWave, Inc. (an IDT Entertainment subsidiary) that has built the technology for secure peer-to-peer video distribution over the Internet. He was an academic visitor at David Sarnoff Research Center (Sarnoff Corporation), at IBM's Thomas J. Watson Research Center, and at Marconi Electronic Systems. He is an IEEE Fellow (since 2008) with the citation for contributions to optimal design of transforms and filter b
https://en.wikipedia.org/wiki/SQL%20programming%20tool
In the field of software, SQL programming tools provide platforms for database administrators (DBAs) and application developers to perform daily tasks efficiently and accurately. Database administrators and application developers often face constantly changing environments which they rarely completely control. Many changes result from new development projects or from modifications to existing code, which, when deployed to production, do not always produce the expected result. For organizations to better manage development projects and the teams that develop code, suppliers of SQL programming tools normally provide more than facility to the database administrator or application developer to aid in database management and in quality code-deployment practices. Features SQL programming tools may include the following features: SQL editing SQL editors allow users to edit and execute SQL statements. They may support the following features: cut, copy, paste, undo, redo, find (and replace), bookmarks block indent, print, save file, uppercase/lowercase keyword highlighting auto-completion access to frequently used files output of query result editing query-results committing and rolling-back transactions inside cut paper Object browsing Tools may display information about database objects relevant to developers or to database administrators. Users may: view object descriptions view object definitions (DDL) create database objects enable and disable triggers and constraints recompile valid or invalid objects query or edit tables and views Some tools also provide features to display dependencies among objects, and allow users to expand these dependent objects recursively (for example: packages may reference views, views generally reference tables, super/subtypes, and so on). Session browsing Database administrators and application developers can use session browsing tools to view the current activities of each user in the database. They can check the resource-usage of individual users, statistics information, locked objects and the current running SQL of each individual session. User-security management DBAs can create, edit, delete, disable or enable user-accounts in the database using security-management tools. DBAs can also assign roles, system privileges, object privileges, and storage-quotas to users. Debugging Some tools offer features for the debugging of stored procedures: step in, step over, step out, run until exception, breakpoints, view & set variables, view call stack, and so on. Users can debug any program-unit without making any modification to it, including triggers and object types. Performance monitoring Monitoring tools may show the database resources — usage summary, service time summary, recent activities, top sessions, session history or top SQL — in easy-to-read graphs. Database administrators can easily monitor the health of various components in the monitoring instance. Application developers may a
https://en.wikipedia.org/wiki/RTQ
RTQ is an Australian television station broadcasting in regional Queensland in Australia. The network was owned by Star Television, before being purchased by the WIN Corporation on 5 October 1988. Network history WIN Television Queensland started out as Darling Downs Television Limited in 1959, which was launched as a television network in 1962 as Queensland's first regional TV station, DDQ-10, broadcasting to the Darling Downs area for the first time. SDQ-4 for the Southern Downs soon launched in 1964, and DDQ-5 was next to air later (it would later change frequencies to 5A) for Toowoomba viewers. Rockhampton station, RTQ-7, was launched by Rockhampton Television Ltd on 7 September 1963 to serve viewers in Rockhampton and its suburbs. Between 1968 and 1971, RTQ's viewing audience across Central Queensland considerably increased with the installation of transmitters at Cracow, Blackwater and Gladstone. RTQ-7 began colour transmissions on 1 March 1975. Prior to aggregation, RTQ-7 produced a considerable amount of local content with programs such as The Morning Show, Feminine Touch, Claire's Corner, Wedmaier's Walkabout, Seven Days, Holiday Fun & Games, Racing Roundup and its local news service all being presented from the studio in North Rockhampton. The other programming aired by RTQ-7 was "cherry-picked" by station management from all three metropolitan networks. Until the 1980s, Darling Downs TV sometimes supported the Nine Network and QTQ-9, its Brisbane station, by broadcasting its newscasts on relay. However, the station switched sympathies to Network Ten and TVQ-0 in the early part of the decade, supporting its programs and broadcasting TVQ-0's Eyewitness News on relay. It was part of the Great Eastland Television network in 1975–1987, together with NRN NRTV 11-8 Television and NEN 9-8 Television (both in New South Wales) as GET 10-4-5a. In 1976, Darling Downs TV became the first regional TV network in Australia to adopt electronic news gathering for its news service within a year after it became a color station. This was the same case for RTQ during those years as after having been a Nine News broadcaster, switched news affiliations with the Seven Network and BTQ's local newscasts via microwave relay. Due to its purchase of Ten Brisbane (TVQ-0) in 1987 and its move to Channel 0 the next year (as Vision TV) to give way to the new Brisbane Ten (TVQ-10), it suddenly became Queensland's strongest regional TV network, even after its TVQ selloff, bringing Ten programs and Eyewitness News (later Brisbane Ten News) to the Darling Downs and Southern Downs. DDQ-10 became DDQ-0 on 10 September 1988 and its network name became Vision TV. Reflecting this was a reformat of its newscasts and news studio to that of Ten's. RTQ-7 also by then began broadcasting Ten programs in Rockhampton, after its previous commitment to BTQ-7's programs, Seven National News and State Affair. By 1989, DDQ/SDQ joined the aggregation race, becoming Star Television.
https://en.wikipedia.org/wiki/Loopzilla
"Loopzilla" is the debut solo single by George Clinton from his 1982 debut album Computer Games. The song reached No. 19 on U.S. R&B chart. It uses lyrics from many older soul songs, including Four Tops' "I Can't Help Myself (Sugar Pie Honey Bunch)", as well as previous P-Funk hits. It is known for its repeated and warped lines. The song is featured on the fictitious Grand Theft Auto: San Andreas radio station Bounce FM. Charts Notes 1982 songs 1982 debut singles George Clinton (funk musician) songs Songs written by George Clinton (funk musician) Capitol Records singles
https://en.wikipedia.org/wiki/Litoranea%20Veneta
The Litoranea Veneta is a network of some 600 km of canals and navigable stretches of river in the Veneto region of north-east Italy. Until the mid-twentieth century and the reclamation of the extensive areas of marshland around the lower courses of the rivers Po, Adige, Brenta, Sile, Piave, Livenza and Tagliamento, these waterways were of great importance in providing for the transportation of goods and people between the Adriatic coast and the Po plain. The area served by the Litoranea Veneta is important for its ecology, for the presence of archeological sites and for its architecture. As such the network is being developed to provide a means of transport attractive to tourists. References litoraneaveneta.com (requires Flash) Canals in Italy Waterways of Italy Landforms of Veneto Transport in Veneto
https://en.wikipedia.org/wiki/Sliding%20window%20protocol
A sliding window protocol is a feature of packet-based data transmission protocols. Sliding window protocols are used where reliable in-order delivery of packets is required, such as in the data link layer (OSI layer 2) as well as in the Transmission Control Protocol (TCP). They are also used to improve efficiency when the channel may include high latency. Packet-based systems are based on the idea of sending a batch of data, the packet, along with additional data that allows the receiver to ensure it was received correctly, perhaps a checksum. The paradigm is similar to a window sliding sideways to allow entry of fresh packets and reject the ones that have already been acknowledged. When the receiver verifies the data, it sends an acknowledgment signal, or "ACK", back to the sender to indicate it can send the next packet. In a simple automatic repeat request protocol (ARQ), the sender stops after every packet and waits for the receiver to ACK. This ensures packets arrive in the correct order, as only one may be sent at a time. The time that it takes for the ACK signal to be received may represent a significant amount of time compared to the time needed to send the packet. In this case, the overall throughput may be much lower than theoretically possible. To address this, sliding window protocols allow a selected number of packets, the window, to be sent without having to wait for an ACK. Each packet receives a sequence number, and the ACKs send back that number. The protocol keeps track of which packets have been ACKed, and when they are received, sends more packets. In this way, the window slides along the stream of packets making up the transfer. Sliding windows are a key part of many protocols. It is a key part of the TCP protocol, which inherently allows packets to arrive out of order, and is also found in many file transfer protocols like UUCP-g and ZMODEM as a way of improving efficiency compared to non-windowed protocols like XMODEM. See also SEAlink. Basic concept Conceptually, each portion of the transmission (packets in most data link layers, but bytes in TCP) is assigned a unique consecutive sequence number, and the receiver uses the numbers to place received packets in the correct order, discarding duplicate packets and identifying missing ones. The problem with this is that there is no limit on the size of the sequence number that can be required. By placing limits on the number of packets that can be transmitted or received at any given time, a sliding window protocol allows an unlimited number of packets to be communicated using fixed-size sequence numbers. The term "window" on the transmitter side represents the logical boundary of the total number of packets yet to be acknowledged by the receiver. The receiver informs the transmitter in each acknowledgment packet the current maximum receiver buffer size (window boundary). The TCP header uses a 16 bit field to report the receiver window size to the sender. Therefore, the l
https://en.wikipedia.org/wiki/Etienne%20de%20Villiers
Etienne de Villiers is an investor and executive in global media and sports businesses. He is chairman of DataEQ, a leading South African opinion mining company. His former roles include executive chairman of the ATP Tour, president at Walt Disney Television International, chairman of BBC Worldwide, chairman of Virgin Racing F1 team, board member of Kirch/SLEC and ITV, director of Saracens rugby club and CEO of Satbel. Early life and career De Villiers was born and raised in Pretoria, South Africa, the son of South African cardiologist Marquard De Villiers. He has three sisters and a brother; record producer Paul, is responsible for the triple platinum Mr. Mister album Welcome to the Real World. After graduating with a civil engineering degree from the University of Pretoria, DeVilliers received a Rhodes scholarship and read PPE at Oxford University. Following stints in engineering roles, in 1979 he joined management consultancy firm McKinsey & Company, where he was influenced by colleagues Tom Peters and Robert Waterman, authors of In Search of Excellence. In 1984 De Villiers was hired by Sol Kerzner to become CEO of Satbel, the South African entertainment conglomerate and operator of South Africa's largest cinema chain, Ster-Kinekor. Satbel and racial de-segregation in South Africa As CEO of Satbel, De Villiers was instrumental in ending racial segregation in South African cinema theatres. Describing his dealings with former South African president F. W. De Klerk, the then-Minister of Internal Affairs, de Villiers said: "We bluffed each other that it would be catastrophic if we didn't do the right thing. De Klerk bluffed the government and I bluffed the entertainment industry and together we managed to pull it off." Indian Premier League In 2009 De Villiers was asked by his former business partner Lalit Modi to assume ultimate responsibility for promoting the 2009 Indian Premier League in its last-minute switch to South Africa. The IPL was moved less than a month before opening ceremonies were due to begin, following terrorist attacks in India. At the time Modi was quoted as saying: "It's taken South Africa eight years to get ready for the 2010 soccer World Cup. We've had 29 days". Moving host nations is reported to have required the short-notice booking of 59 matches in 8 South African stadia, as well as 10,000 air tickets and 30,000 hotel rooms. De Villiers asked François Pienaar to lend his support. The endorsement of the talismanic South African 1995 Rugby World Cup captain is credited with sparking interest in the IPL among South African fans, many of whom had never heard of the visiting Indian city-teams. The Times of India reported that the South African IPL tour did much to boost racial integration and presented South Africa as the perfect sporting destination. Citing the IPL's positive reviews, the Times called the South African tour "a successful experiment in atypical globalization ... where the West has to look to the East
https://en.wikipedia.org/wiki/Ed%2C%20Edd%20n%20Eddy%3A%20Scam%20of%20the%20Century
Ed, Edd n Eddy: Scam of the Century is a video game developed by Japanese video game developer Art Co., Ltd and published by D3 Publisher for the Nintendo DS. The game is based on the Cartoon Network animated series Ed, Edd n Eddy. It was released on October 23, 2007, in North America, on November 1, 2007, in Australia, and on November 30, 2007, in Europe. In the game, the Eds run the risk of having their scams turned on them by the other kids in the neighborhood. Many of the objects and characters, as well as the visual style, borrow heavily from the cartoon. This is also the last game based on the series. Previous releases include Ed, Edd n Eddy: Jawbreakers! in 2002 and Ed, Edd n Eddy: The Mis-Edventures in 2005. Gameplay Each Ed has his own set of levels to complete. They are all side-scrolling fare, but each Ed has his own style of movement and attacks. Edd throws dictionaries, Ed slams his head down on the enemies, and Eddy spits his gum at enemies (although this freezes the enemy, it does not defeat them). Item pick-ups can be activated on the touch-screen. On top of the platforming elements, the game contains a number of unlockable mini-games, including "Whack a Zit", where players tap at rising pimples on Ed's back before they burst. There is also a pie-throwing challenge where players flick the desserts up at enemies on the top screen. The game features 13 total stages, special attacks using the touch screen, the option to blow into the microphone to bring characters back to life, three side story mini-games, and special items. Plot Ed, Edd, and Eddy are trudging home from their school, when Eddy suddenly notices that his school bag feels a little light. Examining further, Eddy finds there is a hole in it and all of his stuff is gone, including his precious "Who to Scam and When" book. The neighborhood kids find the book and realize they have been scammed for years and immediately want payback. Players take control of the Eds and must make their way through tricks, traps, angry kids, and a barrage of ammunition including soap, dirty underwear, and broccoli. Then each Ed must brainstorm, scam, or smash their way back into the cul-de-sac and ultimately battle Captain Melonhead and Splinter the Wonderwood. Reception The game "generally unfavorable reviews" according to the review aggregator Metacritic. It was mainly praised for its presentation and faithfulness to the show, but was criticized for its unresponsive controls, poorly executed gameplay and bland minigames. References External links D3 Publisher games Action games Nintendo DS games Nintendo DS-only games 2007 video games Video games developed in Japan Video games based on Ed, Edd n Eddy Cartoon Network video games Single-player video games Art Co., Ltd games
https://en.wikipedia.org/wiki/Advanced%20Digital%20Recording
Advanced Digital Recording (ADR) is a magnetic tape data storage format developed by OnStream from 1998 to 2003. Since the demise of OnStream, the format has been orphaned. ADR is an 8-track, linear tape format. Generations Compatibility The drive models for ADR 120 GB tapes can use both the ADR 60 GB and the ADR 120 GB tapes, while the 50 GB drives can use both ADR 30 GB and ADR 50 GB tapes. References External links Table of ADR formats. The tribology of advanced digital recording (ADR) systems(Subscription required) Future directions in advanced digital recording technology (Subscription required) Image of ADR cartridge Computer storage tape media
https://en.wikipedia.org/wiki/Power%20system%20simulation
Electrical power system simulation involves power system modeling and network simulation in order to analyze electrical power systems using design/offline or real-time data. Power system simulation software's are a class of computer simulation programs that focus on the operation of electrical power systems. These types of computer programs are used in a wide range of planning and operational situations for electric power systems. Applications of power system simulation include: long-term generation and transmission expansion planning, short-term operational simulations, and market analysis (e.g. price forecasting). These programs typically make use of mathematical optimization techniques such linear programming, quadratic programming, and mixed integer programming. Multiple elements of a power system can be modelled. A power-flow study calculates the loading on transmission lines and the power necessary to be generated at generating stations, given the required loads to be served. A short circuit study or fault analysis calculates the short-circuit current that would flow at various points of interest in the system under study, for short-circuits between phases or from energized wires to ground. A coordination study allows selection and setting of protective relays and fuses to rapidly clear a short-circuit fault while minimizing effects on the rest of the power system. Transient or dynamic stability studies show the effect of events such as sudden load changes, short-circuits, or accidental disconnection of load on the synchronization of the generators in the system. Harmonic or power quality studies show the effect of non-linear loads such as lighting on the waveform of the power system, and allow recommendations to be made to mitigate severe distortion. An optimal power-flow study establishes the best combination of generating plant output to meet a given load requirement, so as to minimize production cost while maintaining desired stability and reliability; such models may be updated in near-real-time to allow guidance to system operators on the lowest-cost way to achieve economic dispatch. There are many power simulation software packages in commercial and non-commercial forms that range from utility-scale software to study tools. Load flow calculation The load-flow calculation is the most common network analysis tool for examining the undisturbed and disturbed network within the scope of operational and strategic planning. Using network topology, transmission line parameters, transformer parameters, generator location and limits, and load location and compensation, the load-flow calculation can provide voltage magnitudes and angles for all nodes and loading of network components, such as cables and transformers. With this information, compliance to operating limitations such as those stipulated by voltage ranges and maximum loads, can be examined. This is, for example, important for determining the transmission capacity of underground
https://en.wikipedia.org/wiki/ID%20Quantique
ID Quantique (IDQ) is a Swiss company, based in Geneva, Switzerland, and provides quantum key distribution (QKD) systems, quantum safe network encryption, single photon counters, and hardware random number generators. It was founded in 2001 as a spin-off of the Group of Applied Physics at the University of Geneva. The company is structured in three business units: The quantum safe cryptography division The photon counting division The quantum random number generation division Quantum Safe Cryptography Division The Quantum Safe Cryptography division focuses on data protection and provides: quantum-safe network encryption quantum key distribution quantum key generation and key management Photon Counting Division The Photon Counting division works on optical instrumentation products such as: photon counters in the visible and infrared spectrum photon pair sources quantum key distribution for R&D applications Random Number Generation The company's work in Random Number Generation focuses on developing hardware random number generators based on quantum randomness, for cryptographic and security applications (quantum key generation) and research purposes (MonteCarlo simulations). ID Quantique Achievements The company has realized several world premieres in quantum technology innovation. In 2004, ID Quantique was one of the first in the world to bring a quantum key distribution system to a commercial market. (MagiQ Technologies, Inc. announced the availability of its quantum key distribution system in 2003.) In 2007 quantum cryptography was deployed by a government for the first time ever to protect the Geneva state elections in Switzerland. It is still in deployment. In 2010 the company deployed QKD over multiplexed networks with 1Gbit/s of data, and in 2011 the company ran its QKD systems for over 18 months in the Swissquantum network in cooperation with the University of Geneva. In 2014, principles from IDQ together with the University of Geneva, broke the world record for the longest distance key exchange by QKD – 307 km. In 2014 IDQ's Quantis true random number generator became the first QRNG to pass the German BSI's AIS31 randomness validation. In 2014 ID Quantique and Battelle co-founded the Quantum-Safe Security Working Group in the Cloud Security Alliance (CSA). The group aims to help governments and industry understand quantum‐safe methods for protecting their networks and their data, following the call by the European telecommunications Institute (ETSI) for quantum safe cryptography in their 2014 white paper “Quantum Safe Cryptography and Security”. ID Quantique also announced their Quantum Random Number Generator (QRNG) chip has been integrated in the ‘Vsmart Aris 5G’ smartphone made by VinSmart, a member of Vingroup from Vietnam. See also Quantum key distribution Quantum cryptography Hardware random number generator Notes Cryptography companies Software companies of Switzerland Companies based in Gen
https://en.wikipedia.org/wiki/Eli%20Fromm
Eli Fromm (born 7 May 1939) is professor emeritus and Electrical and Computer Engineering Leroy A. Brothers Professor in the College of Engineering at Drexel University. Dr. Fromm received a B.S. degree in Electrical Engineering from Drexel in 1962, a Masters in Engineering also from Drexel in 1964, and his Ph.D. from Jefferson Medical College in 1967. He worked as in engineer in the Missile and Space Division of General Electric in 1962, then at the Applied Physics Laboratory at DuPont Company in Wilmington Delaware, 1963; he began working at Drexel as an assistant professor in 1967. In 2002 he became the first recipient of the National Academy of Engineering's Gordon Prize, considered to be one of the Nobel Prizes of Engineering — the others being the Academies Russ Prize and Draper Prize. Professor Fromm was elected as a member into the National Academy of Engineering in 2004 for innovation and leadership in the development of a holistic curriculum for engineering education. References 1939 births Living people Drexel University alumni Drexel University faculty Thomas Jefferson University alumni Members of the United States National Academy of Engineering Place of birth missing (living people) Nationality missing
https://en.wikipedia.org/wiki/Tinker%20Bell%20%28disambiguation%29
Tinker Bell is fictional character in the form of a fairy. Tinker Bell may also refer to: Tinker Bell (film), a 2008 CGI computer-animated film about the main character Tinker Bell (film series), a computer-animated film series produced by DisneyToon Studios Disney Fairies: Tinker Bell, a video game loosely based on the first computer-animated film See also Tinkerbell effect Tinkerbell map, a discrete-time dynamical system Tinkerbelle, a sailboat Tinkerbelle the Dog, canine model Tinkebell (born 1979), Dutch artist Tink (disambiguation)
https://en.wikipedia.org/wiki/Herbert%20Hugh%20Thompson
Dr. Herbert Hugh Thompson is a computer security expert, an Adjunct Professor in the Computer Science Department at Columbia University, and the Chief Technology Officer of Symantec. He is also the Program Chairman of RSA Conference the world's largest information security conference with over 25,000 attendees annually. Thompson is the co-author of a book on human achievement titled The Plateau Effect: Getting from Stuck to Success published by Penguin in 2013 and has co-authored three books on information security including, How to Break Software Security: Effective Techniques for Security Testing published by Addison-Wesley, and The Software Vulnerability Guide published by Charles River 2005. He is perhaps best known for his role in exposing electronic voting machine vulnerabilities as part of the HBO Documentary Hacking Democracy. He was named one of the "Top 5 Most Influential Thinkers in IT Security" by SC Magazine and has been referred to by the Financial Times as "One of the world’s foremost cryptology and internet security experts." Career Thompson began his career as a research intern for Microsoft Corporation while working on his Ph.D. in Applied Mathematics at the Florida Institute of Technology, where he completed his degree in 2002. He then went on to co-found Security Innovation Inc., an application security company and worked as their Chief Security Strategist. In 2007 he started another technology security company called People Security and also began teaching a course on "Software Security and Exploitation" at Columbia University that focused on methods to circumvent security mechanisms in software. Thompson hosted a show that was sponsored by AT&T. He has written several books and over 100 peer reviewed papers on Computer Security and Hacking. Thompson has delivered keynotes at every RSA Conference since 2007. He has been interviewed by top news organizations including BBC News, Bloomberg Television, CNN, Fox News, The New York Times and the Associated Press. He is also a contributor to the New York Times, Scientific American and IEEE Security & Privacy magazine. Thompson was Senior Vice President at security infrastructure company Blue Coat Systems., and was named CTO of Symantec after the acquisition of Blue Coat in August 2016. Electronic Voting Security In 2006, Thompson participated in four hack tests for the nonprofit election watchdog group Black Box Voting. Two of his tests involved altering election results reports on the Diebold GEMS central tally machines. Thompson also collaborated with Harri Hursti in the Black Box Voting projects in Leon County, Florida and Emery County, Utah. Thompson's GEMS central tabulator hack was achieved by inserting a Visual Basic script onto the GEMS server machine at election headquarters. Both the Visual Basic script hack by Thompson and the memory card hack by Hursti Hack can be seen in HBO's "Hacking Democracy" where Hursti and Thompson hacked into Diebold Election Systems's vot
https://en.wikipedia.org/wiki/Neil%20J.%20Gunther
Neil Gunther (born 15 August 1950) is a computer information systems researcher best known internationally for developing the open-source performance modeling software Pretty Damn Quick and developing the Guerrilla approach to computer capacity planning and performance analysis. He has also been cited for his contributions to the theory of large transients in computer systems and packet networks, and his universal law of computational scalability. Gunther is a Senior Member of both the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers (IEEE), as well as a member of the American Mathematical Society (AMS), American Physical Society (APS), Computer Measurement Group (CMG) and ACM SIGMETRICS. He is currently focused on developing quantum information system technologies. Biography Gunther is an Australian of German and Scots ancestry, born in Melbourne on 15 August 1950. He attended Preston East Primary School from 1955 to 1956, and Balwyn North Primary School from 1956 until 1962. For his tenth birthday, Gunther received a copy of the now famous book entitled The Golden Book of Chemistry Experiments from an older cousin. Inspired by the book, he started working on various experiments, making use of various chemicals that could be found around in his house. After he spilled some potassium permanganate solution on his bedroom carpet his mother confined him to an alcove in the garage which he turned into a small laboratory, replete with industrial chemicals and second-hand laboratory glassware. Gunther was interested in finding out how things like detergents and oils were composed by cracking them in his fractionating column. He took particular interest in mixing paints for his art classes, as well as his chemistry classes in Balwyn High School. His father, being the Superintendent of Melbourne's electrical power station, borrowed an organic chemistry text from the chemists in the quality control laboratory. This ultimately led to an intense interest in synthesizing Azo dyes. At around age 14, Gunther attempted to predict the color of azo dyes based on the chromophore-auxochrome combination. Apart from drawing up empirical tables, this effort was largely unsuccessful due to his lack of knowledge of quantum theory. Post-Doc years Gunther taught physics at San Jose State University from 1980 to 1981. He then joined Syncal Corporation, a small company contracted by NASA and JPL to develop thermoelectric materials for their deep-space missions. Gunther was asked to analyze the thermal stability test data from the Voyager RTGs. He discovered that the stability of the silicon-germanium (Si-Ge) thermoelectric alloy was controlled by a soliton-based precipitation mechanism. JPL used his work to select the next generation of RTG materials for the Galileo mission launched in 1989. Xerox years In 1982, Gunther joined Xerox PARC to develop parametric and functional test software for PARC's small-scale VLS
https://en.wikipedia.org/wiki/Knowledge%20modeling
Knowledge modeling is a process of creating a computer interpretable model of knowledge or standard specifications about a kind of process and/or about a kind of facility or product. The resulting knowledge model can only be computer interpretable when it is expressed in some knowledge representation language or data structure that enables the knowledge to be interpreted by software and to be stored in a database or data exchange file. Knowledge-based engineering or knowledge-aided design is a process of computer-aided usage of such knowledge models for the design of products, facilities or processes. The design of products or facilities then uses the knowledge model to guide the creation of the facility or product that need to be designed. In other words, it used knowledge about a kind of object to create a product model of an (imaginary) individual object. Similarly, the design of a particular process implies the creation of a process model, which design activity can be guided by the knowledge that is contained in a knowledge model about such a kind of process. The resulting process model, product model or facility model is typically also stored in a database. Usually the knowledge representation language only allows to represent knowledge (about kinds of things), whereas another language or data structure is required to represent and store the information models about individual things. If the knowledge representation language enables to express both, then the knowledge model and the information model can be expressed in the same language (or data structure). An example of a language that enables the expression of knowledge as well as information about individual things is Gellish English. The basis of a knowledge model of an assembly physical object is a decomposition structure that specifies the components of the assembly and possible the sub-components of the components. For example, knowledge about a compressor system includes that a compressor system consists of a compressor, a lubrication system, etc., whereas a lubrication system consists of a pump system, etc. Assume that this knowledge is expressed in a knowledge representation language that expresses knowledge as a collection of relations between two kinds of things, whereas in that language a relation type is defined that is called <shall have as part a>. Then a part of a knowledge model about a compressor system will consist of the following expressions of knowledge facts: compressor system shall have as part a compressor compressor system shall have as part a lubrication system lubrication system shall have as part a pump system pump system shall have as part a pump Such a knowledge model will be further extended with knowledge and specifications about the properties of the components, their fabrications and possibly testing and maintenance requirements. Similarly, a knowledge model of a process is basically a specification of the sequence of process stages. This
https://en.wikipedia.org/wiki/Eight-point%20algorithm
The eight-point algorithm is an algorithm used in computer vision to estimate the essential matrix or the fundamental matrix related to a stereo camera pair from a set of corresponding image points. It was introduced by Christopher Longuet-Higgins in 1981 for the case of the essential matrix. In theory, this algorithm can be used also for the fundamental matrix, but in practice the normalized eight-point algorithm, described by Richard Hartley in 1997, is better suited for this case. The algorithm's name derives from the fact that it estimates the essential matrix or the fundamental matrix from a set of eight (or more) corresponding image points. However, variations of the algorithm can be used for fewer than eight points. Coplanarity constraint One may express the epipolar geometry of two cameras and a point in space with an algebraic equation. Observe that, no matter where the point is in space, the vectors , and belong to the same plane. Call the coordinates of point in the left eye's reference frame and call the coordinates of in the right eye's reference frame and call the rotation and translation between the two reference frames s.t. is the relationship between the coordinates of in the two reference frames. The following equation always holds because the vector generated from is orthogonal to both and : Because , we get . Replacing with , we get Observe that may be thought of as a matrix; Longuet-Higgins used the symbol to denote it. The product is often called essential matrix and denoted with . The vectors are parallel to the vectors and therefore the coplanarity constraint holds if we substitute these vectors. If we call the coordinates of the projections of onto the left and right image planes, then the coplanarity constraint may be written as Basic algorithm The basic eight-point algorithm is here described for the case of estimating the essential matrix . It consists of three steps. First, it formulates a homogeneous linear equation, where the solution is directly related to , and then solves the equation, taking into account that it may not have an exact solution. Finally, the internal constraints of the resulting matrix are managed. The first step is described in Longuet-Higgins' paper, the second and third steps are standard approaches in estimation theory. The constraint defined by the essential matrix is for corresponding image points represented in normalized image coordinates . The problem which the algorithm solves is to determine for a set of matching image points. In practice, the image coordinates of the image points are affected by noise and the solution may also be over-determined which means that it may not be possible to find which satisfies the above constraint exactly for all points. This issue is addressed in the second step of the algorithm. Step 1: Formulating a homogeneous linear equation With   and     and   the constraint can also be rewritten as or
https://en.wikipedia.org/wiki/Computer%202000
Computer 2000 was Europe's leading provider of IT products to resellers between 1983 and its merger with Tech Data in 1998. History The company was founded in 1983 by German entrepreneur Axel Schultze. The company had $2.5 Million in sales in 1984, and expanded from Germany into other European countries by creating subsidiaries and acquiring local distributors. In the early 1990s, Computer 2000 expanded into Latin America, the Middle East, and Africa. Within 15 years, the company grew to 2,500 employees and roughly $5 Billion in sales before merging with US-based Tech Data in July 1998. The companies had similar philosophies and products, but acted in different geographic regions. Notes External links and references Company website Welt Report SEC filing Merger approval by European Commission Polish site of Computer 2000 Companies based in Munich Distribution companies of Germany
https://en.wikipedia.org/wiki/Bonner%20County%20Daily%20Bee
The Bonner County Daily Bee (also known as the Daily Bee) is a U.S. daily newspaper based in Sandpoint, Idaho. It is owned by the Hagadone Media Group and is part of the Hagadone News Network. History Founding as The Beehive The Bonner County Daily Bee has been in print since 1965 and its target markets are Bonner and Boundary counties. The paper was founded as a four-page newspaper by Ernest Gale "Pete" and Adell "Dellie" Thompson after a dispute over an ad account, according to "Beautiful Bonner: The History of Bonner County." The couple moved from North Dakota to Coeur d'Alene, lured by a job at the "Kootenai County Leader" in 1961. Thompson moved to Sandpoint a short time later where he went to work for the News-Bulletin where he stayed until 1965 when he bought half interest in a local print shop. Thompson would soon buy the entire business to ensure a move to a larger facility and renamed the business, Pend Oreille Printers. After moving to the new location, the Thompsons launched The Beehive in response to a move by the News-Bulletin for a key ad account held by Thompson's print shop. The couple believed the community needed a daily newspaper to better serve the area. According to "Beautiful Bonner," the couple "came up with the name for the new paper from a comment made by their typesetter, Jeannie Hottel. "Call it the Beehive," she said. "You sure stirred up a hornet's nest." In 1966, the Beehive and print shop moved to 310 Church St., where the newspaper still resides. Thompson purchased the Sandpoint Bulletin and, for a time, published both the Bee Hive and the News-Bulletin. Current name adopted The Beehive was published until 1968 when it was merged with the News-Bulletin and its name changed to the Sandpoint Daily Bee. In 1988, the paper's name was changed to the Bonner County Daily Bee. Sale In July 1984, Thompson sold Pend Oreille Printers and the Sandpoint Daily Bee as well as the Bonners Ferry Herald, which he had purchased in 1978, and the Priest River Times, which he had purchased in 1976, to the Hagadone Media Group. [3] Format The Bonner County Daily Bee maintains a website, app and social media presence that are updated several times a day with breaking news stories and articles on current events, community news and local sports. Awards The paper has won multiple journalism awards, including several general excellence awards from the Idaho Newspaper Association, and the Utah-Idaho-Spokane Associated Press Association as well as many writing and photography awards. [1] Location Its main office is in Sandpoint, Idaho. References External links Newspapers published in Idaho Sandpoint, Idaho Daily newspapers published in the United States
https://en.wikipedia.org/wiki/Sacred%20Heart%20Junior%20College
Sacred Heart Junior College was established in 1999 to offer tertiary-level education opportunities in the Cayo District, Belize. When it was first established, it offered Network Administration, International Business, Biology, Environmental Science, Computer Science, Marketing and Tourism Management, of which the Tourism Management, Environmental Science, Network Administration and Computer Technician programmes were trailblazing programmes within Belize. Since then, General Studies and Primary School Education programmes have been added. In 1999, just over 100 students were registered at the school, and in 2007, the number had risen to 500 students. The motto for the school is "Excellence, Innovation and Productivity". References External links Sacred Heart College website Educational institutions established in 1999 1999 establishments in Belize
https://en.wikipedia.org/wiki/Iiyama%20Vision%20Master%20Pro%20monitors
The Iiyama Vision Master Pro computer monitor line was manufactured by Iiyama, a high-end manufacturer of LCD and CRT monitors, as advanced version of Vision Master line. Overview This CRT monitor was manufactured in the 1990s, and has been discontinued. For a year from April 1997 to April 1998, this monitor was at the top of PCWorlds chart as a Best Buy. According to PC Pro magazine, it dominated the UK monitor market at around that period. This line was succeeded by the Iiyama Vision Master ProLite LCD monitor series, later rebranded as simply ProLite. Models Vision Master Pro 17 The Iiyama Vision Master Pro 17 computer monitor was released by Iiyama in 1997. Technical specifications Screen - The monitor was a CRT with a phosphor area diagonal: , dot pitch of 0.26mm. The screen had a short persistence phosphor with an anti-reflection and anti-static coating. The horizontal sync frequency was 27.086.0kHz, and the vertical sync frequency was 50160Hz. The maximum video resolution was , non-interlaced. In 2000 this model received a tube upgrade: a Mitsubishi Diamondtron FD tube with 0.24mm dot pitch was equipped. Video connectors - The two standard input connections are 5-BNC and D-sub mini 15 pin. Power - The monitor operated on a standard 120V 60Hz line or 230V 50Hz, consuming a maximum of 110W of power. Standby power was 10W maximum, and suspend mode was 6W maximum. Pro 400 Pro 454 Pro 510 Released in 1999 References External links Iiyama website Iiyama monitors
https://en.wikipedia.org/wiki/European%20route%20E85
European route E85 is part of the International E-road network, which is a series of main roads in Europe. The E 85 starts from Klaipėda (Lithuania) runs south through Belarus, Ukraine, Romania, Bulgaria to Greece, ending at Alexandroupoli. The E 85 is long. Route : Klaipėda () - Kryžkalnis () - Kaunas ( ) - Vilnius ( ) : Vilnius ( ) : Vilnius () - Šalčininkai : Beiniakoni - Lida - Slonim - Ivatsevichy () : Ivatsevichy (Start of Concurrency with ) - Kobryn (End of Concurrency with ) : Domanove - Kovel () - Dubno () - Ternopil () - Chernivtsi - Porubne : Siret - Suceava () - Săbăoani () - Roman - Bacău () - Tișița () - Focșani - Buzău () - Urziceni (Start of concurrency with ) - București (End of concurrency with ) : București (Start of concurrency with ) - Giurgiu : Ruse (End of Concurrency with ) : Ruse () - Byala () - Veliko Tarnovo () - Stara Zagora () - Dimitrovgrad () - Haskovo : Haskovo - Harmanli - Novo Selo : Ormenio - Orestiada - Didymoteicho - Likofos - Ardani : Ardani - Alexandroupolis See also Danube Bridge External links UN Economic Commission for Europe: Overall Map of E-road Network (2007) E085 E085 E085 E085 European routes in Ukraine Roads in Greece
https://en.wikipedia.org/wiki/Line%206%20%28Shanghai%20Metro%29
Line 6 is an eastern north–south line of the Shanghai Metro network. It opened on December 29, 2007. The entire line is located in the Pudong New Area. A complete trip between the two end terminals, and takes approximately 1 hour and 10 minutes. Line 6 has been dubbed the unofficial nickname “Hello Kitty Line” due to its lurid pink livery. The line is colored magenta on system maps. History Controversy Like the Lexington Avenue Subway in New York City, passenger traffic has consistently exceeded the designed capacity of the line since its opening and causes severe strain to the services. The planning of Line 6 began in 2000, but real estate development along the proposed line happened faster than anticipated upon the line's initial opening. Uniquely at the time, a majority of the Line 6 opened in one phase creating a long corridor overnight. Existing buses were cancelled or diverted simultaneously due to the opening of Line 6, forcing residents along the line to travel by rail transit. This was exacerbated by high initial train headways upon opening as all ordered rolling stock have not been completely delivered. Additionally, the line had relatively short operating hours leading to large number of passengers flooding into the first train. Line 6 was initially forecasted to carry 105,000 people/day. However the aforementioned factors led to the ridership of the line to exceed 150,000 people/day during the first few days of operation. Realizing the sheer miscalculation during construction, the municipal government have pledged to add new trains and shorten wait times starting in June 2008. However, Line 6 still suffers severe crowding and delays especially during rush hours with passenger flow growing faster than expected. In 2012 the busiest section of the line was still running at 133% capacity. With the opening of Line 12 the Shanghai Metro advises passengers divert to the new line to relieve crowding. The line was built to accommodate light metro narrow-bodied "C size" trains with 4 carriages each, which is not interchangeable with wide-body "A size" trains with 6 to 8 carriages on other Shanghai Metro lines. This difference in loading gauge has made it impractical to upgrade the line to higher capacity "A size" trains to relieve demand. The platform length (especially at underground stations) has made it impractical to upgrade the line to accommodate more carriages. Stations Service routes Important stations Century Avenue is an interchange with lines 2, 4 and 9. Lancun Road is an interchange with line 4. West Gaoke Road is an interchange with line 7. Oriental Sports Center, the final station of line 6, opened in April 2011. It is an interchange with lines 8 and 11. Jufeng Road is an interchange with line 12. Dongming Road is an interchange with line 13. Gangcheng Road, the other terminal station of line 6, interchange with line 10. Yunshan Road is an interchange with line 14. Future expansion There are no plans to extend the line.
https://en.wikipedia.org/wiki/Kanmon%20Railway%20Tunnel
The was the first undersea tunnel in Japan. It goes underneath the Kanmon Straits, connecting the islands of Honshu and Kyushu. It is an important link in the Japanese rail network. Its construction began in 1936, and it was completed in November 1942, during the Pacific War. The Honshu-bound tunnel is long, the Kyushu-bound tunnel is . Track gauge is (Cape gauge), and its electric power supply is at 1,500 volts DC. Near the end of the Pacific War the Allies planned to blow up the two tunnels with 50,000 pounds of explosives as part of the invasion of Japan. The Office of Strategic Services trained 250 of its agents for the task, but the surrender of Japan occurred before they were needed. The Kyushu Railway Company (JR Kyushu) assumed ownership of this tunnel following the breakup of the Japanese National Railways system in 1987. Coordinates Shimonoseki entrance: Moji entrance: See also Shin-Kanmon Tunnel for the high-speed railway Kanmon Road Tunnel References Kyushu Railway Company Railway tunnels in Japan Sanyō Main Line Undersea tunnels in Asia
https://en.wikipedia.org/wiki/Java%20Evolutionary%20Computation%20Toolkit
ECJ is a freeware evolutionary computation research system written in Java. It is a framework that supports a variety of evolutionary computation techniques, such as genetic algorithms, genetic programming, evolution strategies, coevolution, particle swarm optimization, and differential evolution. The framework models iterative evolutionary processes using a series of pipelines arranged to connect one or more subpopulations of individuals with selection, breeding (such as crossover, and mutation operators that produce new individuals. The framework is open source and is distributed under the Academic Free License. ECJ was created by Sean Luke, a computer science professor at George Mason University, and is maintained by Sean Luke and a variety of contributors. Features (listed from ECJ's project page): General Features: GUI with charting Platform-independent checkpointing and logging Hierarchical parameter files Multithreading Mersenne Twister Random Number Generators Abstractions for implementing a variety of EC forms. EC Features: Asynchronous island models over TCP/IP Master/Slave evaluation over multiple processors Genetic Algorithms/Programming style Steady State and Generational evolution, with or without Elitism Evolutionary-Strategies style (mu, lambda) and (mu+lambda) evolution Very flexible breeding architecture Many selection operators Multiple subpopulations and species Inter-subpopulation exchanges Reading populations from files Single- and Multi-population coevolution SPEA2 multiobjective optimization Particle Swarm Optimization Differential Evolution Spatially embedded evolutionary algorithms Hooks for other multiobjective optimization methods Packages for parsimony pressure GP Tree Representations: Set-based Strongly Typed Genetic Programming Ephemeral Random Constants Automatically Defined Functions and Automatically Defined Macros Multiple tree forests Six tree-creation algorithms Extensive set of GP breeding operators Seven pre-done GP application problem domains (ant, regression, multiplexer, lawnmower, parity, two-box, edge) Vector (GA/ES) Representations: Fixed-Length and Variable-Length Genomes Arbitrary representations Five pre-done vector application problem domains (sum, rosenbrock, sphere, step, noisy-quartic) Other Representations: NEAT Multiset-based genomes in the rule package, for evolving Pitt-approach rulesets or other set-based representations. See also Paradiseo, a metaheuristics framework MOEA Framework, an open source Java framework for multiobjective evolutionary algorithms References ECJ project page Wilson, G. C. McIntyre, A. Heywood, M. I. (2004), "Resource Review: Three Open Source Systems for Evolving Programs-Lilgp, ECJ and Grammatical Evolution", Genetic Programming And Evolvable Machines, 5 (19): 103-105, Kluwer Academic Publishers. ISSN 1389-2576 Evolutionary computation Agent-based software Free software programmed in Java (programming language
https://en.wikipedia.org/wiki/List%20of%20Philippine%20films%20of%20the%201950s
A list of films produced in the Philippines in the 1950s. For an A-Z see :Category:Philippine films. 1950s References External links Filipino film at the Internet Movie Database asc&count=250 at the Internet Movie Database 1950s Films Philippines
https://en.wikipedia.org/wiki/List%20of%20Philippine%20films%20of%20the%201960s
This is a list of films produced in the Philippines in the 1960s. For an alphabetical list, see :Category:Philippine films. References External links Filipino film at the Internet Movie Database 1960s Films Philippines
https://en.wikipedia.org/wiki/List%20of%20Philippine%20films%20of%20the%201970s
A list of films produced in the Philippines in the 1970s. For an A-Z see :Category:Philippine films. References External links Filipino film at the Internet Movie Database 1970s Films Philippines
https://en.wikipedia.org/wiki/List%20of%20Philippine%20films%20of%20the%202000s
This is a list of films produced in the Philippines in the 2000s. 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 References External links Filipino film at the Internet Movie Database See also List of 2008 box office number-one films in the Philippines List of 2009 box office number-one films in the Philippines 2000s Films Philippines
https://en.wikipedia.org/wiki/TEC-1
The TEC-1 is a single-board kit computer first produced by the Australian hobbyist electronics magazine Talking Electronics in the early 1980s. The design by John Hardy and Ken Stone was based on the Zilog Z80 CPU, had 2K of RAM and 2K of ROM in a default configuration. Later versions used a 4k ROM with two different versions of the monitor software selectable via a switch. This allowed the early software presented in the magazine to be used with the later version of the TEC-1. Base configuration The base configuration had 20 keys for the main input (16 hexadecimal keys for numeric input and keys labelled AD (for address), GO (to execute a program), + and -. There was also a reset key in the standard configuration and an optional upgrade had a function key. Construction articles It was featured in 1983, in Issue 10 of the Talking Electronics magazine, pages 57 to 75, with relevant chip data presented on the rear cover. The series continued in early 1984 with Issue 11, pages 11 to 36, and pages 50 to 55. Included in this page count were two peripherals designed by Ken Stone for the TEC-1 -an 8x8 matrix display, and a relay driver board, allowing the TEC-1 to be interfaced to other equipment. Issue 12, pages 13 to 38, had the third instalment, including an interface for a simple plotter that was available cheaply on the market at that time, and a RAM expansion. TEC-1A was introduced in this issue with the PCB artwork presented on the inside rear cover. Issue 13, pages 9 to 26, had the fourth instalment, including a power supply designed specifically for it, and a non-volatile RAM module to allow data to be retained, even after the TEC-1 was powered off. This was crucial, as, up to this point, there had been no way to save anything programmed into the TEC-1, short of leaving it connected to power indefinitely. An EPROM burner was also presented, as another way to preserve your data. TEC-1B was introduced in this issue. Issue 14, pages 9 to 26, had the fifth instalment. The later monitor software (MON 2) was introduced, as were a crystal oscillator/clock and an interface board to allow the TEC-1 to be connected to external devices. Issue 15 contained further changes and additions by new staff members, as the original design team of John Hardy and Ken Stone were no longer involved. Jim Robertson released JMON to replace the MON1 (by John Hardy) and MON2 (by Ken Stone) versions of the software as well as the DAT (Display And Tape) board. A speech synthesizer using the SPO256-AL2 was presented by Craig Hart. Versions The first prototype. This was not actually called a TEC-1, and was unlike any that are shown in the photos. It has not survived. Built by John Hardy. The first TEC-1 prototype. No silk screen. Incorrect track work. It was scrapped and is presumed lost, possibly sold as part of a grab-bag. Built by Ken Stone. The first TEC-1 prototype to work without corrections to the PCB track work. No silk screen. See photo. Built by Ken Sto
https://en.wikipedia.org/wiki/Internet%20in%20Bulgaria
The Internet in Bulgaria began to offer full TCP/IP services in 1992, although e-mail, network news, and some other Internet services were available earlier, during the period from 1989 to 1991. The .bg top-level domain name was organized in 1991. Internet speeds and connection reliability in the capital, Sofia, are consistently ranked among the fastest in the world by several independent studies. Facts and figures Top-level domains: .bg and .бг. Internet users: 3.9 million users, 72nd in the world; 55.1% of the population, 74th in the world (2012); 3.4 million users, 63rd in the world (2009); 1.9 million users (2007). Fixed broadband: 1.2 million subscriptions, 52nd in the world; 17.6% of population, 53rd in the world (2012). Wireless broadband: 2.8 million, 55th in the world; 40.3% of the population, 41st in the world (2012). Internet hosts: 976,277 hosts, 47th in the world (2012); 513,470 (2008). IPv4: 4.2 million addresses allocated, 0.1% of the world total, 589.7 addresses per 1000 people, 51st in the world (2012). Access technologies Local area networks (LANs) Local area network (LAN) is the most common type of Internet access in Bulgaria. Over 60% of the consumers use this type of access because of the high speeds and good service. The biggest Internet service providers (ISPs) offer fiber optic access, called fiber-to-the-building (FTTB). This type of Internet access supports a variety of services, which are offered by most ISPs: IPTV, VoIP, and Video on demand (VOD). The major ISPs have networks in the following cities: Sofia, Plovdiv, Burgas, Varna, Veliko Tarnovo, Lovech, Ruse and Blagoevgrad. Digital subscriber lines (DSL) Asymmetric digital subscriber line (ADSL) technology was introduced in Bulgaria after the privatisation of the state monopoly Bulgarian Telecommunications Company (BTC) in 2004. Since then, availability has greatly increased and as of February 2006 it was offered in 140 towns and villages around the country. With the liberalisation of the telecommunications market, it is expected that other companies currently offering broadband Internet by other means will begin offering ADSL. At the end of 2006 the service was available to customers in 208 towns and villages. Internet censorship and surveillance There are no government restrictions on access to the Internet or reports that the government monitors e-mail or Internet chat rooms without appropriate legal authority. The law provides for freedom of speech and press, and the government generally respects these rights. The penal code provides for from one to four years' imprisonment for incitement to "hate speech." The law defines hate speech as speech that instigates hatred, discrimination, or violence based on race, ethnicity, nationality, religion, sexual orientation, marital or social status, or disability. Internet social networks have become increasingly popular with anti-Semitic groups. Web site administrators were deleting anti-Semitic comments
https://en.wikipedia.org/wiki/Internet%20in%20Finland
FUNET was created in 1984 to link Finnish universities. The .fi top-level domain was registered 1986. FICIX was created in 1993 to interconnect Finnish IP networks and commercial sales of Internet connection began. Since July 2010, Finland has become the first country in the world to make Internet access a legal right. Broadband Broadband Internet access in Finland was launched commercially in 2000 in the form of ADSL. In October 2009, Finland's Ministry of Transport and Communications committed to ensuring that every person in Finland can access the Internet at a minimum speed of one megabit per second starting July 2010. , 80 % of Finnish households have the option of purchasing landline internet of at least 10 Mbit/s, with 71 % having an option for at least 100 Mbit/s and 60 % having an option for at least 1000 Mbit/s. 99.4 % of Finnish homes are within range of a 30 Mbit/s 4G mobile internet connenction, while 77.1 % are reached by a 300 Mbit/s 5G connection. Internet service providers Some of the largest Finnish Internet service providers include: Telia Elisa DNA Censorship Some ISPs are using a voluntary child pornography censorship list administered by the police. The list has been criticised because it has contained legal adult content, that little has been done to actually shut down the illegal websites and, as the list is secret, it can be used for any censorship. More recently, a government-sponsored report has considered establishing similar filtering in order to curb online gambling. Also, there are legally binding court orders to block The Pirate Bay issued to all major ISPs. See also Right to Internet access References External links History of Internet in Finland