source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Greens%20Japan
The is an established national green party in Japan. After the electoral success of Green activist Ryuhei Kawada in the 2007 House of Councillors election, the local green political network Rainbow and Greens had reportedly decided to dissolve itself and merge with the Japan Greens in December 2007. The two precedent organizations dissolved themselves and relaunched as Greens Japan, a political organization in late 2008, under its former Japanese name, Midori no Mirai (みどりの未来 - "green future"). History The party was founded in July 2012 and held its first general assembly in that same month. Representation The party has a number of elected city council members/councillors in towns and cities across Japan. On the 22 November 2010, Kazumi Inamura became the first popularly elected Greens Japan Mayor, in the city of Amagasaki. As well as being the youngest mayor elected in Japan’s history at the age of 38, she is also the first popularly elected female mayor of the city. She won the mayoralty with 54% of the vote. Party establishment On 28 July 2012, the party was officially re-established under its new name by local assembly members and civic groups to run in the Upper House election. Two of the core policies of the party at launch were to reduce, and ultimately terminate Japan's nuclear power generation, and oppose the nation's entry into the Trans-Pacific Partnership (TPP). See also Energy in Japan Environmental issues in Japan Nuclear power in Japan References External links Midori no Tō (Greens Japan) (official website) News articles New Green Party formed in Japan/Group seeks to reflect anti-nuclear, environmental, pro-democracy movements (Article in Green Pages, newspaper of the Green Party of the United States. September 2012). 2008 establishments in Japan 2012 establishments in Japan Anti-nuclear organizations Environmentalism in Japan Global Greens member parties Green parties in Asia Political parties in Japan fr:Les Verts (Japon)
https://en.wikipedia.org/wiki/Japan%20National%20Route%2019
is a national highway connecting Nagoya and Nagano in Japan. Route data Length: 258.9 km (165.5 mi) Origin: Atsuta-ku, Nagoya, Nagoya (originates at junction with Route 1) Terminus: Nagano City (ends at Junction with Route 18) Major cities: Kasugai, Tajimi, Nakatsugawa, Shiojiri, Matsumoto, Azumino History 4 December 1952 - Designation as First Class National Highway 19 (from Nagoya to Nagano, Nagano) 1 April 1965 - Designation as General National Highway 19 (from Nagoya to Nagano, Nagano) Overlapping sections From Atsuta, Nagoya (Atsuta Shrine South intersection) to Naka, Nagoya (Nichigin-mae intersection): Route 22 From Toki (Odomi intersection) to Mizunami (Yamanouchi intersection): Route 21 From Ena (Shoke intersection) to Sendambayashi, Nakatsugawa: Route 257 From Nakatsugawa (Iyasaka-bashi intersection) to Nagiso (Azuma-bashi intersection): Route 256 In Kiso Town, from Kiso-ohashi intersection to Hiyoshi-Ozawabara intersection: Route 361 Municipalities passed through Aichi Prefecture Nagoya - Kasuagai Gifu Prefecture Tajimi - Toki - Mizunami - Ena - Nakatsugawa Nagano Prefecture Nagiso - Okuwa - Agematsu - Kiso town - Kiso Vill - Shiojiri - Matsumoto - Azumino - Ikusaka - Ōmachi - Nagano - Shinsyūshinmachi - Nagano Intersects with Aichi Prefecture Routes 1 and 247; at the origin, in Atsuta-ku, Nagoya Route 22; from the origin to Naka-ku, Nagoya Routes 41 and 153; at Higashi-ku, Nagoya Route 155; at Kasugai City Gifu Prefecture Route 248; at Tajimi City Route 21; from Toki City to Mizunami City Route 418; at Ena City Route 257; from Ena City to Nakatsugawa City Route 363; at Nakatsugawa City Route 256; from Nakatsugawa City to Nagiso Town Nagano Prefecture Route 361 at Kiso Town Routes 20 and 153 at Shiojiri City Routes 143, 147, 158 and 254 at Matsumoto City Route 403 at Azumino City Route 117 at Nagano City Route 18 at the terminus, in Nagano City Bypasses Kasugai Bypass Utsutsu Bypass Tajimi Bypass Toki Bypass Mizunami Bypass Ena Bypass Nakatsugawa Bypass Agematsu Bypass Matsumoto Bypass Naganominami Bypass References 019 Roads in Aichi Prefecture Roads in Gifu Prefecture Roads in Nagano Prefecture
https://en.wikipedia.org/wiki/Empirical%20software%20engineering
Empirical software engineering (ESE) is a subfield of software engineering (SE) research that uses empirical research methods to study and evaluate an SE phenomenon of interest. The phenomenon may refer to software development tools/technology, practices, processes, policies, or other human and organizational aspects. ESE has roots in experimental software engineering, but as the field has matured the need and acceptance for both quantitative and qualitative research has grown. Today, common research methods used in ESE for primary and secondary research are the following: Primary research (experimentation, case study research, survey research, simulations in particular software Process simulation) Secondary research methods (Systematic reviews, Systematic mapping studies, rapid reviews, tertiary review) Teaching empirical software engineering Some comprehensive books for students, professionals and researchers interested in ESE are available. Research community Journals, conferences, and communities devoted specifically to ESE: Empirical Software Engineering: An International Journal International Symposium on Empirical Software Engineering and Measurement International Software Engineering Research Network (ISERN) References Software engineering
https://en.wikipedia.org/wiki/Data%20breach
A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen, altered or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, information leakage and data spill. Incidents range from concerted attacks by individuals who hack for personal gain or malice (black hats), organized crime, political activists or national governments, to poorly configured system security or careless disposal of used computer equipment or data storage media. Leaked information can range from matters compromising national security, to information on actions which a government or official considers embarrassing and wants to conceal. A deliberate data breach by a person privy to the information, typically for political purposes, is more often described as a "leak". Data breaches may involve financial information such as credit card and debit card details, bank details, personal health information (PHI), Personally identifiable information (PII), trade secrets of corporations or intellectual property. Data breaches may involve overexposed and vulnerable unstructured data – files, documents, and sensitive information. Data breaches can be quite costly to organizations with direct costs (remediation, investigation, etc.) and indirect costs (reputational damages, providing cyber security to victims of compromised data, etc.). According to the nonprofit consumer organization Privacy Rights Clearinghouse, a total of 227,052,199 individual records containing sensitive personal information were involved in security breaches in the United States between January 2005 and May 2008, excluding incidents where sensitive data was apparently not actually exposed. Many jurisdictions have passed data breach notification laws, which requires a company that has been subject to a data breach to inform customers and take other steps to remediate possible injuries. 50 U.S. states have some form of data breach notification laws, the definitions of what constitutes "personal information" vary. So US requires more transparent and comprehensive data protection laws.Especially under varying state laws and the increasing amount of sensitive data being collected. Definition A data breach may include incidents such as theft or loss of digital media such as computer tapes, hard drives, or laptop computers with unencrypted information, posting such information on the World Wide Web without proper information security precautions, transfer of such information to a system which is not completely open but is not appropriately or formally accredited for security, such as unencrypted e-mail, or transfer of such information to the information systems of a possibly hostile agency, such as a competing corporation or a foreign nation, where it may be exposed to more intensive decryption techniques. ISO/IEC 27040 defines a data breach as: compromise of security that leads to the accident
https://en.wikipedia.org/wiki/Computer%20tape
Computer tape may refer to: Punched tape or perforated paper tape Magnetic tape in one of several formats: Tape drive
https://en.wikipedia.org/wiki/Types%20and%20Programming%20Languages
Types and Programming Languages, , is a book by Benjamin C. Pierce on type systems published in 2002. A review by Frank Pfenning called it "probably the single most important book in the area of programming languages in recent years." References External links Computer science books
https://en.wikipedia.org/wiki/Westlink%20%28Australian%20TV%20channel%29
Westlink, formerly known as Westlink Network, was an Australian free-to-view digital television channel broadcast to regional and remote areas of Western Australia on the Viewer Access Satellite Television service. Funded by the Government of Western Australia, the channel was managed and operated by the Department of Regional Development and broadcast a range of community-based content, particularly training and educational programs, using an open-narrowcast licence. The channel was received in over 150 remote locations such as telecentres, schools and colleges. The channel was quietly shut down on 16 December 2017 following the live broadcast of the West Australian Symphony Orchestra's "Symphony in the City" concert. Programming The channel was primarily used for educational and talk-back style programs, including video conferences, corporate training videos, and health and educational focused training segments. Many of the programs were viewed in group situations, such as telecentres and TAFE colleges. Some bodies that used Westlink were; Department of Health Rural Health Education Foundation Telethon Institute Office of Shared Services Diocesan Pastoral Formation Centre The now defunct community television channel Access 31 from Perth was once simulcast on weekends. This simulcast ended when Access 31 closed down on 6 August 2008. On 13 November 2009, community broadcaster Indigenous Community Television entered into an agreement with Westlink to allow them access to the then-Optus Aurora channel on weekends. The agreement ceased on 18 April 2013, when ICTV officially launched their own dedicated channel on the VAST service. Availability Westlink was formerly available on the Viewer Access Satellite Television service on virtual channel 602, and could be accessed by all viewers nationally. The channel was previously available on the Optus Aurora satellite service, but was migrated to VAST in April 2013. Analogue terrestrial transmissions were also broadcast in Albany and Bunbury. Approximately 25% of all free-to-view satellite users in Western Australia watched Westlink. The Goldfields-Esperance region had the most viewers, with approximately 6.1% out of a total 11.8% satellite households report viewing the service. Identity Westlink often played a loop of still scenic photographs and information slides in between scheduled programs throughout the day due to the large gaps between programming. See also Indigenous Community Television Community television in Australia Access 31 Government of Western Australia References External links Official Website (archived) TelInfo case study on Government initiated works Television stations in Western Australia English-language television stations in Australia Defunct television channels in Australia Television channels and stations established in 1992 Television channels and stations disestablished in 2017
https://en.wikipedia.org/wiki/Vocabulary%20OneSource
OneSource is an evolving data analysis tool used internally by the Air Combat Command (ACC) Vocabulary Services Team, and made available to general data management community. It is used by the greater US Department of Defense (DoD) and NATO community for controlled vocabulary management and exploration. It provides its users with a consistent view of syntactical, lexical, and semantic data vocabularies through a community-driven web environment. It was created with the intention of directly supporting the DoD Net-centric Data Strategy of visible, understandable, and accessible data assets. OneSource serves developers, integrators, managers, and community of interest (COI) participants as a focus point for searching, navigating, annotating, semantic matching, and mapping data terms extracted from military standards, COI vocabularies, programs of record, and other schemas and data sources. OneSource is based upon a United States Air Force researched and developed triplestore knowledge base architecture, which allows XML Schema, Web Ontology Language, relational database, spreadsheet, and even custom data models to be handled and presented in the same manner. Initial capability was released in 2006. Version 2 was released in 2008 with the previously disjoint matching and mapping capabilities fully integrated for use in a web browser. A brief newsfeed of recent changes in the Namespace dataset is available to the general public. See also Air Force Command and Control Integration Center Controlled vocabulary Data dictionary Data element Folksonomy Metadata Ontology (computer science) External links https://onesource.acca589.org References Controlled vocabularies Folksonomy Semantic Web United States Air Force
https://en.wikipedia.org/wiki/AMA%20Physician%20Masterfile
The American Medical Association (AMA) Physician Masterfile includes current and historical data on all physicians, including AMA members and nonmembers, and graduates of foreign medical schools who reside in the United States and who have met the educational and credentialing requirements necessary for recognition as physicians. A Masterfile record is created and ME number assigned when entering medical school or through the ECFMG. For medical students, there are two primary methods to create the initial record - the Student Outreach Program and the annual freshman matriculation file received from the Association of American Medical Colleges (AAMC). The Physician Masterfile spans from undergraduate medical education through practice and comprise databases of 125 LCME-accredited medical schools 7,900 ACGME-accredited graduate medical education programs 1,600 teaching institutions; 820,000 physicians; and 19,000 medical group practices. Physician records are never removed from the AMA Physician Masterfile, even in the case of a physician's death. Student outreach: steps for record creation The Student Outreach Program creates affiliate student records in a database specifically designed to support AMA membership recruitment activities. The record includes: student membership application is received information is entered into the Student Outreach Database using the student supplied SSN as the initial unique identifier SOD data loaded into the AMA Masterfile with status of "unverified" student affiliate membership status is assigned payment is processed record with corresponding ME number is created. primary source notification of enrollment in an LCME-accredited (Liaison Committee on Medical Education) program received through the AAMC freshman matriculation file. student affiliate records stored in the Masterfile are matched to AAMC records. matched record now contains both an ME number and SSN and has been verified by the primary source. # affiliate status is removed and a permanent unique record on the Masterfile is established. "Unverified" affiliate student records are considered and use of the data is limited to providing membership benefits and membership payment processing. The AMA Masterfile has been in use since 1906. Uses The data are shared with other organizations and agencies who credential physicians and are used to identify individuals who attempt to fraudulently assume the credentials of deceased physicians. The AMA also charges data mining companies such as IQVIA a fee for access to the Physician Masterfile, which they then use to identify physicians within prescription data purchased from pharmacies. This enriched, prescriber-identified prescription data is then sold to pharmaceutical companies that use it to monitor marketing effectiveness. United States medical students and physicians An AMA Physician Masterfile record is established when individuals enter medical schools accredited by the Liaison Co
https://en.wikipedia.org/wiki/Computer-aided%20architectural%20engineering
Computer-aided architectural engineering (CAAE) is the use of information technology for architectural engineering, in tasks such as the analysis, simulation, design, manufacture, planning, diagnosis and repair of architectural structures. CAAE is a subclass of computer-aided engineering. The first Computer-aided architectural design was written by the 1960s. It helped architectures very much that they do not need to draw blueprints. Computer-aided design also known as CAD was the first type of program to help architectures but since it did not have all the features, Computer-aided architectural engineering created as a specific software with all the tools for design. Overview All CAAD and CAAE systems use a set of data with geometric and other aspects of an abject; they all use information technology to assembling design from standard or non-standard pieces. For example software like computer animation is what is made in CAAE field. All the blue prints around us is made by CAAE or CAAD software. Degree Getting a degree in computer-aided architectural engineering can qualify one for higher-level positions. This specialization is for students interested in having careers in architectural engineering and drafting.a CAAE can have jobs in many areas such as Expeditor, Construction Estimator, Project Manager, project architecture and many other fields related to these. Advantages An advantages to CAAE is to develop the two-way mapping software of subject. The two dimension mapping are set to be between the surface structure (TM1) and the deep structure (TM2). In designing the systems, system designers usually pay attention to TM1. The important statement here is a one-to-one mapping, which is to create a computer functionality that maps as close as possible into a resulted manual design project. An engineer's works mostly involves visually observe data and represent them. Problems are usually outlined and dealt with in graphical result. Therefore, the designer should have a lot control over the processes happens within the design. See also Architectural design optimization Comparison of CAD software Design computing References Computer-aided architectural design Kalay, Y. (2005). Architecture's New Media. MIT Press, Cambridge, Massachusetts Architectural design
https://en.wikipedia.org/wiki/SAINT%20%28software%29
SAINT (Security Administrator’s Integrated Network Tool) is computer software used for scanning computer networks for security vulnerabilities, and exploiting found vulnerabilities. SAINT Network Vulnerability Scanner The SAINT scanner screens every live system on a network for TCP and UDP services. For each service it finds running, it launches a set of probes designed to detect anything that could allow an attacker to gain unauthorized access, create a denial-of-service, or gain sensitive information about the network. SAINT provides support to the Security Content Automation Protocol (SCAP) specification as an Unauthenticated Vulnerability Scanner and Authenticated Vulnerability and Patch Scanner. SAINT is also an approved scanning vendor with the Payment Card Industry (PCI). The Four Steps of a SAINT Scan: Step 1 – SAINT screens every live system on a network for TCP and UDP services. Step 2 – For each service it finds running, it launches a set of probes designed to detect anything that could allow an attacker to gain unauthorized access, create a denial-of-service, or gain sensitive information about the network. Step 3 – The scanner checks for vulnerabilities. Step 4 – When vulnerabilities are detected, the results are categorized in several ways, allowing customers to target the data they find most useful. SAINT can group vulnerabilities according to severity, type, or count. It can also provide information about a particular host or group of hosts. SAINT describes each of the vulnerabilities it locates; references Common Vulnerabilities and Exposures (CVE), CERT advisories, and IAVA (Information Assurance Vulnerability Alerts); and describes ways to correct the vulnerabilities. In many cases, the SAINT scanner provides links to patches or new software versions that will eliminate the detected vulnerabilities. A vulnerability is a flaw in a system, device, or application that, if leveraged by an attacker, could impact the security of the system. Exploits take advantage of a vulnerability by compromising or destructing the vulnerable system, device, or application. Remediation is the process of repairing or providing a remedy for a vulnerability, thereby eliminating the risk of being exploited. Vulnerability scanning is used to identify and evaluate the security posture of a network. Historically, scanners were developed for specific purposes such as scanning only Windows desktops, applications, or network devices. SAINT offers heterogeneous scanning that identifies vulnerabilities across operating systems, desktop applications, network devices, Web applications, databases, and more. SAINTexploit Penetration Testing Tool The integrated penetration testing tool, SAINTexploit, demonstrates the path an attacker could use to breach a network and quantifies the risk to the network. SAINTexploit includes a Web site emulator and e-mail forgery tool. Penetration testing tools from SAINT are designed to simulate both internal and exter
https://en.wikipedia.org/wiki/Conversation%20theory
Conversation theory is a cybernetic approach to the study of conversation, cognition and learning that may occur between two participants who are engaged in conversation with each other. It presents an experimental framework heavily utilizing human-computer interactions and computer theoretic models as a means to present a scientific theory explaining how conversational interactions lead to the emergence of knowledge between participants. The theory was developed by Gordon Pask, who credits Bernard Scott, Dionysius Kallikourdis, Robin McKinnon-Wood, and others during its initial development and implementation as well as Paul Pangaro during subsequent years. Overview Conversation theory may be described as a formal theory of conversational process, as well as a theoretical methodology concerned with concept-forming and concept-sharing between conversational participents. It may be viewed as a framework that may be used to examine learning and development through the means of conversational techniques by means of human-machine interactions; the results of which may then inform approaches to education, educational psychology, and epistemology. While the framework is interpretable as a psychological framework with educational applications (specifically, as a general framework to think about teaching and learning), Pask's motivation in developing the theory has been interpreted by some who closely worked with him develop upon certain theoretical concerns regarding the nature of cybernetic inquiry. The theory has been noted to have been influenced by a variety of psychological, pedagogical and philosophical influences such as Lev Vygotsky, R. D. Laing and George H. Mead. With some authors suggesting that the kind of human-machine learning interactions documented in conversation theory to be mirroring Vygotsky's descriptions of the zone of proximal development, and his descriptions of spontaneous and scientific concepts. The theory prioritizes learning and teaching approaches related to education. A central idea of the theory is that learning occurs through conversations: For if participant A is to be conscious with participant B of a topic of inquiry, both participants must be able to converse with each other about that topic. Because of this, participants engaging in a discussion about a subject matter make their knowledge claims explicit through the means of such conversational interactions. The theory is concerned with a variety of "psychological, linguistic, epistemological, social or non-commitally mental events of which there is awareness". Awareness in this sense is not of a person-specific type, i.e., it is not necessarily localized in a single participant. Instead, the type of awareness examined in conversation theory is the kind of joint awareness that may be shared between entities. While there is an acknowledgment of its similarities to phenomenology, the theory extends its analysis to examine cognitive processes. However, the concept
https://en.wikipedia.org/wiki/PlanetAll
PlanetAll was a social networking, calendaring, and address book site launched in November 1996. It was founded by a group of Harvard Business School and MIT graduates including Warren Adams and Brian Robertson. Their company, Sage Enterprises, was based in Cambridge, Massachusetts and was the winner of the 1996 New Business of the Year Award from the Cambridge Chamber of Commerce. Background PlanetAll was possibly the first social networking site on the Internet. The site had more than 100,000 groups, organized around real-world counterparts such as academic institutions and employers. When the user entered the name of his or her university, the service would list the user's classmates who were also members of the service. Users could exchange authorization to access each other's contacts. Many sites at the time offered web-based address books and calendars, but PlanetAll.com combined the two: when a user entered travel plans into the calendar, the service would cross-reference the destination with the address book, as well as the user's contacts' travel plans; the site would then notify users when they would cross paths with their contacts. On August 4, 1998, Amazon.com announced that it had agreed to acquire PlanetAll. Under terms of the agreement, Amazon.com acquired 100 percent of PlanetAll in exchange for 800,000 shares. Amazon.com founder and CEO Jeff Bezos said, "PlanetAll is the most innovative use of the Internet I've seen. It's simply a breakthrough in doing something as fundamental and important as staying in touch. The reason PlanetAll has over 1.5 million members—and is growing even faster than the Internet—is simple: it creates extraordinary value for its users. I believe PlanetAll will prove to be one of the most important online applications." Less than two years later, Amazon.com shut down PlanetAll.com. On July 2, 2000, they told PlanetAll members, "We are pleased to announce that we have completed the integration of the key e-commerce related features of PlanetAll.com into our main site at Amazon.com ... Although PlanetAll.com will be going away, you'll still be able to enjoy some of the tools that help you keep in touch with like-minded folks." Amazon's "Purchase Circles" feature was based on PlanetAll, and some of PlanetAll code was used to improve Amazon's Friends and Favorites area. The only calendar feature that appears to have remained, however, is the date reminder. Amazon spokeswoman Patty Smith said after Amazon had absorbed the technology, it did not see the need to maintain PlanetAll. "It seemed really superfluous to have it running beside Friends and Favorites," she said. Many of the 1.5 million members were upset by the loss of the utility; one internet journalist wrote later that year that she was "in mourning" for the service. Social Networking Patent On June 15, 2010, the United States Patent and Trademark Office awarded Amazon.com a patent for "Social Networking System" based on its ownership of Pl
https://en.wikipedia.org/wiki/Design%20technology
Design technology, or D.T., is the study, design, development, application, implementation, support and management of computer and non-computer based technologies for the express purpose of communicating product design intent and constructability. Design technology can be applied to the problems encountered in construction, operation and maintenance of a product. At times there is cross-over between D.T. and Information Technology, whereas I.T. is primarily focused on overall network infrastructure, hardware and software requirements, and implementation, D.T. is specifically focused on supporting, maintaining and training design and engineering applications and tools and working closely with I.T. to provide necessary infrastructure, for the most effective use of these applications and tools. Within the building design, construction and maintenance industry (also known as AEC/O/FM), the product is the building and the role of D.T., is the effective application of technologies within all phases and aspects of building process. D.T. processes have adopted Building Information Modeling (BIM) to quicken construction, design and facilities management using technology. So though D.T. encompasses BIM and Integrated Project Delivery, I.P.D., it is more overarching in its directive and scope and likewise looks for ways to leverage and more effectively utilize C.A.D., Virtual Design & Construction, V.D.C., as well as historical and legacy data and systems. D.T. is applicable to industrial and product design and the manufacturing and fabrication processes therein. There are formal courses of study in some countries known as design and technology that focus on particular areas. In this case, the above definition remains valid, if for instance one takes the subject textiles technology and replace the product in the above definition with textile. See also Automation Process simulation/Design System/Process Engineering/Design Computer-aided design (CAD) Building Information Modeling (BIM) Integrated Project Delivery (IPD) Virtual Design and Construction (VDC) Information Technology (IT) References Design Technology by type
https://en.wikipedia.org/wiki/Paul%20Lohmann
Paul Fritz Lohmann (5 February 1926 – 10 December 1995) was a cinematographer. In 1976, he won an Emmy for Outstanding Achievement in Cinematography for Entertainment Programming for a Special for Eleanor and Franklin, an award he shared with Edward R. Brown. Filmography Coffy (1973) California Split (1974) Trilogy of Terror (1975) Nashville (1975) Silent Movie (1976) High Anxiety (1977) Time After Time (1979) Mommie Dearest (1981) Looker (1981) Masada (1981) Endangered Species (1982) The Dollmaker (1984) Lust in the Dust (1985) References 1926 births 1995 deaths People from New York City Primetime Emmy Award winners American cinematographers
https://en.wikipedia.org/wiki/Federal%20Procurement%20Data%20System
The Federal Procurement Data System (FPDS) is a single source for US government-wide procurement data. The Federal Procurement Data Center (FPDC), part of the U.S. General Services Administration, manages the Federal Procurement Data System (FPDS), which is operated and maintained by IBM. The FPDS-NG is the current central repository of information on Federal contracting. The system contains detailed information on contract actions over $3,000 (FY2004 and later data). The Executive departments and agencies award over $200 billion annually for goods and services. The system can identify who bought what, from whom, for how much, when and where. Issues Subsidiaries and predecessor companies of large corporations are oftentimes listed in the database as small businesses. Data are under constant review and revision. For example, during FY2008, over $100 billion worth of entries was modified. Contracts to large companies have been misidentified as contracts to small businesses. Furthermore, small business set-asides were classified as getting awarded to large corporations Responsible Contracting Officers fail to update their procurement data because either they are negligent of their job responsibilities or providing the data would reveal that sole source contracts are being awarded to certain preferred vendors without a competitive bidding process in violation of the Federal Acquisition Regulation. See also Government procurement Federal Acquisition Regulation Government procurement in the United States Top 100 Contractors of the U.S. federal government Sustainable procurement References External links General Services Administration Government procurement in the United States
https://en.wikipedia.org/wiki/Hype%20Machine
Hype Machine is a music blog aggregator created by Anthony Volodkin. History Hype Machine was originally a music database created in 2005 by Anthony Volodkin, then a sophomore computer science major at Hunter College. The site was born out of Volodkin's frustration with music magazines and radio stations. He said, "I discovered MP3 blogs like Stereogum and Music for Robots. I couldn't believe there were people spending their time writing about music, putting up tracks so you could hear them. And I thought, there has to be a way to bring this all together." In 2005, Volodkin sent his site address to pioneers in the online music domain, including Lucas Gonze of Webjay, in order to gain feedback. Instead of sending a response, Gonze and others posted the link online. Volodkin observed, Machine] got launched without ever being launched." Hype Machine had an advertising partnership with BuzzMedia until 2014, when it switched to Townsquare Media. Site structure Hype Machine's structure has been described as an "amalgamation of Pandora Radio and Pitchfork Media". It aggregates the most recently posted songs from a selection of music blogs (about 800) and lists them on the website's main page. Users have the ability to "love" songs, which saves the song to their Loved List. The site has thirteen different genres to select music from. Users can also select the "Latest" tracks from categories including "Freshest", "Remixes Only", "No Remixes", and blogs in the user's country. Hype Machine also provides a full directory of the blogs from which their database of music is derived. Additionally, Hype Machine maintains a Popular List for the last three days and the previous week, both of which are determined by the number of "loves" given to each song by users. In 2007, the site introduced the Music Blog Zeitgeist, which aggregates music bloggers' annual "Best of" lists, as well as using their own data to create lists of the top 50 artists, albums, and songs for the year. In March 2008, the site added a Listening History section, which allows users to see what songs their friends have recently listened to. Above each song are provided links to online music retailers such as eMusic, Amazon, and iTunes, allowing users to purchase the track. The commission from each sale serves as one of the main revenue streams for Hype Machine. In January 2010, The Hype Machine partnered with SoundCloud, allowing labels to provide music bloggers with new and pre-released tracks. Apps Hype Machine released an iPhone application on May 11, 2011, and a Blackberry 10 version in 2013. Reception Hype Machine's traffic has grown steadily since its launch in 2005. It has been profiled by CNN, Wired, and The Guardian. It was named to The Guardian's list of 100 essential websites of 2009, one of four music-oriented sites to receive mention. Fred Wilson called the site "the best thing to happen to music since the Rolling Stones" and the "Technorati for music". Gawker Media founder
https://en.wikipedia.org/wiki/Many-to-many%20%28data%20model%29
In systems analysis, a many-to-many relationship is a type of cardinality that refers to the relationship between two entities, say, A and B, where A may contain a parent instance for which there are many children in B and vice versa. Data relationships For example, think of A as Authors, and B as Books. An Author can write several Books, and a Book can be written by several Authors. In a relational database management system, such relationships are usually implemented by means of an associative table (also known as join table, junction table or cross-reference table), say, AB with two one-to-many relationships and . In this case the logical primary key for AB is formed from the two foreign keys (i.e. copies of the primary keys of A and B). In web application frameworks such as CakePHP and Ruby on Rails, a many-to-many relationship between entity types represented by logical model database tables is sometimes referred to as a HasAndBelongsToMany (HABTM) relationship. Artificial intelligence (AI) presents these relationships in many complex ways, including in areas where healthcare equity factors contribute to biased algorithms. See also Associative entity One-to-one (data model) One-to-many (data model) References Data modeling
https://en.wikipedia.org/wiki/Michael%20Steer
Michael B. Steer (born 1955 in Queensland, Australia) is a Lampe professor of electrical and computer engineering at North Carolina State University and one of the leading electrical engineers in today's analog/RF and microwave world. He has published numerous articles in the "IEEE Microwave and Antennas" journal, along with leading the NCSU Dinosauria project. He is credited with being the first IEEE Fellow to fine-tune all of his constitutive relations and as a result, creating a paperless office. Publications G. J. Mazzaro, M. B. Steer, and K. G. Gard, “Response of RF Networks to Transient Waveforms: Interference in Frequency-Hopped Communications,” IEEE Transactions on Microwave Theory & Techniques, Vol. 56, No. 12, pp. 2808–2814, December 2008. F. Hart, S. Luniya, J. Nath, A. Victor and M. B. Steer, “Modeling high-order filters in a transient microwave circuit simulator,” IET Microwaves, Antennas & Propagation, Vol. 1, No. 5, October 2007, pp. 1024–1028. N. M. Kriplani, S. Bowyer, J. Huckaby and M. B. Steer, “Modeling a tunnel diode in a circuit simulator,” submitted to IET Circuits, Devices & Systems, April 2007. W. Fathelbab and M. B. Steer, “Parallel-coupled and hairpin filters with enhanced stopband performance,” submitted to the Int. Journal of Circuit Theory and Applications, April 2007. S. Melamed, S. Luniya, L. E. Doxsee Jr., K. Obermiller, C. Hawkinson, W. R. Davis, P. D. Franzon and M. B. Steer, “Thermal analysis and verification of a mounted monolithic integrated circuit,” IEEE Trans. Advanced Packaging, submitted March 2007. W. Fathelbab and M. B. Steer, “Filter prototypes comprising singlet and/or inline sections,” Int. Journal of Electronics, In Press . D. Ghosh, B. J. Laughlin, J. Nath, A. I. Kingon, M. B. Steer and J-P. Maria, “Tunable high Q interdigitated (Ba, Sr)TiO3 capacitors fabricated on low cost substrates with copper metallization,” Thin Solid Films, Vol. 496, Iss. 2, February 21, 2006, pp. 669–673. J. Nath, D. Ghosh, J.-P. Maria, A. I. Kingon, W. Fathelbab, P. D. Franzon and M. B. Steer, “An electronically-tunable microstrip bandpass filter using thin-film Barium Strontium Titanate (BST) varactors,” IEEE Trans. Microwave Theory and Tech., Vol. 53, No. 9, September 2005, pp. 2707–2712. References http://people.engr.ncsu.edu/mbs/steer_bio.htm http://people.engr.ncsu.edu/mbs/Publications/mbs_publications.htm#journal_publications 1956 births Living people Electrical engineering academics North Carolina State University faculty
https://en.wikipedia.org/wiki/Boston%20Computer%20Exchange
Boston Computer Exchange was the world's first e-commerce company, and dominated electronic trading in used computers in the US in the 1980s. The Boston Computer Exchange, also called the BCE and BoCoEx, were in operation before the Internet became widely available to the general public. Their Bulletin Board System-based marketplace utilized Delphi online service as a platform for an on-line database of products where buyers and sellers bought, sold and traded computers. The company pioneered efforts to create a fully automated, on-line auction and trade systems for general commerce and eventually turned into an Internet-based business. Origins Boston Computer Exchange was founded in 1982 as a marketplace for people who wanted to sell their used computers. Initially it was a paper database but quickly moved into a computerized database using Alpha 2 database manager on a dual floppy IBM PC. Nascent bulletin board systems were just being developed and the founders struck a mutual agreement with the owners of the Delphi online service bulletin board system to post the database on their public access system. The first database upload was on March 4, 1983. Fresh data was posted every day from that day until the business closed in the 1990s. The database was also posted as a searchable database on YellowData, and then Boston CitiNet. Later, when CompuServe opened their Electronic Mall in 1989, Boston Computer Exchange had the first store on that Mall, too. Founders The founders of the Boston Computer Exchange were Alexander Randall 5th and Cameron Hall. Randall held a PhD in General Systems research or Systems Theory and Hall had degrees in Economics. They fused their interest in creating a computerized marketplace for trade. The husband and wife started the business on the dining room table and worked together on it steadily for the next 10 years. Hall and Randall had previously owned several small entrepreneurial ventures. Randall was the Godson of J. Presper Eckert and had been involved with computers from childhood. Hall's father had been involved with modems from the earliest days of datacomm - so each brought special skills to the project. Early designs of automated trading Like later Internet based e-commerce systems such as eBay, sellers uploaded inventory to a database, buyers browsed inventory online but in this pre-Internet era, they consummated transactions by telephone. Buyers then paid Sellers, Sellers shipped goods to Buyers and the Exchange billed the seller a commission. After several years of operations and some bad transactions, the Exchange invented an escrow services to protect buyers, sellers and the Exchange itself. The absence of a verifiable way to close credit card transactions on-line prevented an "all on-line" trade system. In 1986, the Exchange created an electronic trading system that was showcased at the COMDEX Trade Show in Las Vegas which attracting wide attention to their vision of an all-electroni
https://en.wikipedia.org/wiki/Rejoice
"Rejoice" may refer to Music Rejoice Broadcast Network, a Christian radio network Rejoice Records Albums Rejoice (The Emotions album) (1977) Rejoice (Katherine Jenkins album) (2007) Rejoice (Pharoah Sanders album) (1981) Rejoice (2nd Chapter of Acts album) (1981) Rejoice, a 2008 album by Sawyer Brown Rejoice (Tony Allen and Hugh Masekela album) (2020) Songs "Rejoice" (Il Divo song) (2005) "Rejoice", a 2007 Andrew Jackson Jihad song from People That Can Eat People Are the Luckiest People in the World "Rejoice", a 1971 song by Rod Argent from Ring of Hands "Rejoice", a 2001 song by Audio Adrenaline from Lift "Rejoice", a 2015 song by Audio Adrenaline from Sound of the Saints "Rejoice", a 2014 song by Devin Townsend Project from Z² "Rejoice", a 1981 song by U2 from October Given name Rejoice Kapfumvuti (born 1991), Zimbabwean footballer Rejoice Mabudafhasi (born 1943), South African politician Other uses "Rejoice" (Margaret Thatcher), a 1982 remark made by the British prime minister See also
https://en.wikipedia.org/wiki/Japan%20National%20Route%2014
is a national highway connecting Tokyo and Chiba in Japan. Route data Length: 44.1 km (27.4 mi) Origin: Nihonbashi, Chūō, Tokyo (originates at junction with Route 1, Route 4, Route 6, Route 15, Route 17 and Route 20) Terminus: Chiba (ends at junction with Routes 51 and 126) Major cities: Tokyo, Ichikawa, Chiba, Funabashi, Chiba, Narashino, Chiba and Chiba Outline The route is managed by East Nippon Expressway Company and Bureau of Tokyo Route. And the route is divided two managers at Ichinoe Bridge. Besides, the road, which is eastern of the Ichinoe Bridge, is managed by East Nippon Expressway Company, and the route is toll road which is named as Keiyō Road from there. History 4 December 1952 - First Class National Highway 14 (from Tokyo to Chiba) 1 April 1965 - General National Highway 14 (from Tokyo to Chiba) Municipalities passed through Tokyo Chūō, Tokyo - Sumida, Tokyo - Kōtō - Edogawa, Tokyo Chiba Prefecture Ichikawa, Chiba - Funabashi, Chiba - Narashino, Chiba - Chiba Intersects with Tokyo Routes 1 and 15 Route 17 Route 4 Route 6 Chiba Prefecture Route 296 Route 357 Routes 51 and 126 References 014 Roads in Chiba Prefecture Roads in Tokyo
https://en.wikipedia.org/wiki/Japan%20National%20Route%2015
is a national highway connecting Tokyo and Yokohama in Japan. It is commonly referred to as . Route data Length: 29.2 km (18.1 mi) Origin: Nihonbashi, Chūō, Tokyo (originates at junction with Route 1, Route 4, Route 6, Route 14, Route 17 and Route 20) Terminus: Yokohama (ends at Junction with Route 1) Major cities: Kawasaki History 4 December 1952 - First Class National Highway 15 (from Tokyo to Yokohama) 1 April 1965 - General National Highway 15 (from Tokyo to Yokohama) Municipalities passed through Tokyo Chūō - Minato - Shinagawa - Ōta Kanagawa Prefecture Kawasaki (Kawasaki-ku, Kanagawa) - Yokohama (Tsurumi - Kanagawa) Intersects with Tokyo Routes 1, 4, 6, 14, 17 and 20 at the origin Route 130 at Minato-ku Yashio Bypass, Route 357 at Shinagawa-ku Route 131 at Ōta-ku Kanagawa Prefecture Routes 132 and 409 at Kawasaki-ku, Kawasaki Route 1, at the terminus References 015 Roads in Kanagawa Prefecture Roads in Tokyo
https://en.wikipedia.org/wiki/IP%20Payload%20Compression%20Protocol
For networking, the Internet Protocol IP Payload Compression Protocol, or IPComp, is a low level compression protocol for IP datagrams defined in RFC 3173. The intent is to reduce the size of data transmitted over congested or slow network connections, thereby increasing the speed of such networks without losing data. According to the RFC requirements, compression must be done before fragmenting or encrypting the packet. It further states that each datagram must be compressed independently so it can be decompressed even if received out of order. This is important because it allows IPComp to work with both TCP and UDP network communications. References Internet Protocol
https://en.wikipedia.org/wiki/Listing%20%28computer%29
A listing or program listing is a printed list of lines of computer code or digital data (in human-readable form). Use cases Listings are commonly used in education and computer-related books to show examples of code. In the early days of programming, it was used to hand-check a program and as permanent storage. It was also common in 1970s and 1980s computer enthusiast magazines (for instance Creative Computing) and books like BASIC Computer Games for type-in programs. Today, hard copy listings are seldom used because display screens can present more lines than formerly, programs tend to be modular, storage in soft copy is considered preferable to hard copy, and digital material is easily transmitted via networks, or on disks or tapes. Furthermore, data sets tend to be too large to be conveniently put on paper, and they are more easily searched in soft-copy form. Assembly-code listings are occasionally analysed by programmers who want to understand how a compiler is translating their source code into assembly language. For example, the GNU C Compiler (gcc) will produce an assembly code listing if it is invoked with the command-line option -S. Listings of computer programs are still important in US patent law. They are defined as follows in the Manual of Patent Examining Procedure: References External links WordPress Price List Builder Source code Text editor features
https://en.wikipedia.org/wiki/Laboratoire%20d%27Informatique%20de%20Grenoble
The Laboratoire d'Informatique de Grenoble (LIG, Grenoble Computer Science Laboratory) is the largest research laboratory of Informatics in Grenoble, France. It was created 1 January 2007, as the result of a union of the 24 research teams of the previous IMAG Institute and the INRIA Rhône-Alpes. The scientific project of the LIG is "ambient and sustainable IT". The goal is to leverage the complementary nature and recognised quality of the 23 research teams of the LIG to contribute to fundamental aspects of the discipline (modelling, languages, methods, algorithms) and to create a synergy between the conceptual, technological and societal challenges that surround this theme. The Grenoble Informatics Laboratory (Laboratoire d’Informatique de Grenoble - LIG) is a laboratory of quite some scale, the academic partners being: The CNRS, Grenoble INP, Inria Grenoble Rhône-Alpes, the Université Joseph Fourier, the Université Pierre-Mendès-France, the Université Stendhal. The LIG is formed by about 500 people: - 41% of PhD students, - 26% of teacher-researchers, - 14% of post-doc, invited, contracts, - 10% of full-time researchers, - 9% of administrative and technical staff. History The LIG is under the joint supervision of the université Grenoble-Alpes, the Institut polytechnique de Grenoble, and the CNRS. It is a partner of the INRIA. Under the impetus of Brigitte Plateau, this laboratory is the result of the amalgamation of five former laboratories of the Institute of Computer Science and Applied Mathematics of Grenoble of Grenoble-Rhône-Alpes. In 2016, the laboratory, moved from Rue de la Piscine to the IMAG building on Avenue Centrale, by the Laboratoire Jean-Kuntzmann and the VERIMAG laboratory. Research Domains LIG research covers a very large range of domains in Informatics. Topics includes for instance Software Engineering, Formal Methods, Multimedia, Natural Language Processing, Databases, Knowledge representation, Geographic Information Systems Virtual reality, Multi-agent systems, Distributed systems, Information systems, Quantum Computation, etc. Research Teams The list of LIG teams is as follows: ADELE: Environments and tools for Industrial Software Engineering; AMA: Learning: models and algorithms; CAPP: Calculations algorithms programs and proofs; CTRL-A: Control for safe Autonomic computing systems; DRAKKAR: Networks and Multimedia; E-MOTION: Geometry and Probability for Movement and Action; EXMO: Computer mediated exchange of structured knowledge; GETALP: Study Group for Automatic Translation and Automated Processing of Languages and Speech; HAwAI: Human Aware Artificial Intelligence HADAS: Heterogenous autonomous distributed data services; IIHM: Human-machine interaction engineering; MESCAL: Middleware efficiently scalable; MeTAH: Method and technology in human learning; MOES: Multi-Programming and Distributed Resource Scheduling for Interactive Simulation Applications; MRIM: Multimedia Information Modeling a
https://en.wikipedia.org/wiki/List%20of%20New%20Thought%20denominations%20and%20independent%20centers
This is a list of New Thought membership organizations. It is historically based, therefore not all of these groups may be in existence at this time. A Affiliated New Thought Network, associated with Religious Science Agape International Spiritual Center Association for Global New Thought, Santa Barbara, California C Centers for Spiritual Living, based in the teaching of Ernest Holmes's Religious Science movement. Church of the Divine Unity, founded in Boston, Massachusetts, c. 1890s; associated with The Metaphysical Club Church of the Higher Life (defunct), founded in 1894 by Helen Van-Anderson in Boston, Massachusetts The Community Church of New Thought together with The Lola Pauline Mays New Thought School of Ministry, Mesa, Arizona D Church of the Healing Christ (defunct), in New York City, associated with Divine Science Divine Science, founded in 1892 in San Francisco, California, by Malinda Cramer H Huna I Institute of Religious Science and School of Philosophy (school; opened 1927; Religious Science) International Divine Science Association, the international wing of Divine Science International Metaphysical League, the international wing of The Metaphysical Club, founded in 1900 in New York City (defunct; absorbed into the International New Thought Alliance in 1914) International New Thought Alliance, founded in London, England, in 1914 by renaming the National New Thought Alliance (founded in 1908) which had been formed by renaming the World New Thought Federation (founded in 1905), which had formerly been the New Thought Federation (founded in 1900); upon INTA's creation it also absorbed the International Metaphysical League (founded in 1900), which was the international wing of The Metaphysical Club (founded in 1872); thus at the time of its official "founding", INTA had an unbroken membership history that stretched back 42 years. J Jewish Science founded (1916) founded by Alfred G. Moses and Rabbi Morris Lichtenstein L Living Enrichment Center (defunct), founded by Mary Manin Morrissey (see New Thought Ministries of Oregon) M The Metaphysical Club (defunct), founded in Boston, Massachusetts, by Rev. L. B. Macdonald, Dr. J. W. Lindy and Mr. Frederick Reed in 1895. This group, which is unrelated to a group of the same name at Harvard University organized by C.S. Peirce, Oliver Wendell Holmes and William James in 1872, was called "the first permanent New Thought Club" by Horatio Dresser. This Metaphysical Club was absorbed into the International New Thought Alliance in 1914. N New Thought Ministries of Oregon (independent; founded 2004 by former members of Living Enrichment Center, affiliated with Religious Science in 2007 as a member of United Centers for Spiritual Living) P Psychiana (1928 – 1950; defunct), founded in Moscow, Idaho by Frank B. Robinson R Radiant Center of Philosophy (defunct), founded in Atlantic City, New Jersey 1918, associated with Kate Atkinson Boehme Religious Scien
https://en.wikipedia.org/wiki/City%20College%20Manchester
City College Manchester was a network of further education campuses in Manchester, England. History The network was formed in the late 20th century when institutions in Central Manchester, Fielden Park, Arden and Wythenshawe merged to form City College Manchester. It was the largest provider of "Offender Learning" in the Greater Manchester region. The college merged with Manchester College of Arts and Technology (MANCAT) to create an 80,000 student 'supercollege' known as The Manchester College in August 2008. The principal of MANCAT Peter Tavernor was appointed as head of The Manchester College. Campuses City College had five campuses, the three main ones being Abraham Moss in Crumpsall, Northenden, and City Campus. Business courses were run at the smaller Fielden Campus in West Didsbury, and the college's Arden School of Theatre is in Ardwick. Courses for adults were run at the Wythenshawe Forum. The college had a large International Office in Manchester city centre. See also Shena Simon Campus References Defunct universities and colleges in the United Kingdom Further education colleges in Manchester Educational institutions disestablished in 2008 2008 disestablishments in England
https://en.wikipedia.org/wiki/Toal
Toal may refer to: People Gerard Toal (born 1962), Professor of Government, Virginia Polytechnic Institute and State University Graham Toal, co-instigator of CDDB (Compact Disc Database) Jean H. Toal (born 1943), South Carolina Chief Justice Joseph Toal, Scottish Roman Catholic clergyman, currently Bishop of Argyll and the Isles Maureen Toal, played Teasy McDaid in Glenroe Other TOAL, Test of Adolescent and Adult Language See also O'Toole (disambiguation), a more common anglicization of ó Tuathail than Toal is
https://en.wikipedia.org/wiki/Richard%20DeMillo
Richard Allan DeMillo (born January 26, 1947) is an American computer scientist, educator and executive. He is Professor and holds the Charlotte B. and Roger C. Warren Chair in Computing at the Georgia Institute of Technology. In 2009, he stepped down as the John P. Imlay Dean of Computing at Georgia Tech after serving in that role for seven years. After founding and for ten years directing Georgia Tech's Center for 21st Century Universities, a living laboratory for fundamental change in higher education, he founded and served as the interim Chair of the School of Cybersecurity and Privacy in the College of Computing . He joined Georgia Tech in 2002 from The Hewlett-Packard Company, where he had served as the company's first Chief Technology Officer. He also held executive positions with Telcordia Technologies (formerly known as Bell Communications Research) and the National Science Foundation. He is a well-known researcher and author of over 100 articles, books and patents in the areas of computer security, software engineering, and mathematics. Early life and education A Minnesota native, Richard DeMillo was born and raised in Hibbing, Minnesota and received his Bachelor of Arts in mathematics from the University of St. Thomas in St. Paul Minnesota in 1969 and a Ph.D. in information and computer science from Georgia Tech in 1972. Early career His first academic appointment was at the University of Wisconsin–Milwaukee, but in 1976 he returned to Georgia Tech as an Associate Professor of Information and Computer Science, where he established a long-term collaboration with Richard Lipton. This collaboration led to a ground-breaking analysis of formal methods in computer science, the establishment of a new method for software testing, called Program Mutation among other results. In 1977, he collaborated with Lawrence Landweber to create THEORYNET, an early store-and-forward computer network that was the predecessor of NSFNet, a network that was ultimately absorbed by the Internet and managed by NSF until 1989. From 1981 to 1987 DeMillo was the Director of the Software Test and Evaluation Project for the US Department of Defense (DoD). He is widely credited with developing the DoD's policy for test and evaluation of software-intensive systems. In 1987, he moved to Purdue University where he was named Professor of Computer Science and Director of The Software Engineering Research Center. In 1989, he became Director of the National Science Foundation Computer and Computation Research Division and presided over the growth of high performance computing and computational science programs. He also held a visiting professorship at the University of Padua in Padua, Italy where he led the formation of a successful post-graduate program in software engineering. In 1995 he became vice president and general manager of information and computer science research at Bellcore (which later became Telcordia Technologies), leading the invention of new t
https://en.wikipedia.org/wiki/Distributed%20concurrency%20control
Distributed concurrency control is the concurrency control of a system distributed over a computer network (Bernstein et al. 1987, Weikum and Vossen 2001). In database systems and transaction processing (transaction management) distributed concurrency control refers primarily to the concurrency control of a distributed database. It also refers to the concurrency control in a multidatabase (and other multi-transactional object) environment (e.g., federated database, grid computing, and cloud computing environments. A major goal for distributed concurrency control is distributed serializability (or global serializability for multidatabase systems). Distributed concurrency control poses special challenges beyond centralized one, primarily due to communication and computer latency. It often requires special techniques, like distributed lock manager over fast computer networks with low latency, like switched fabric (e.g., InfiniBand). Commitment ordering (or commit ordering) is a general serializability technique that achieves distributed serializability (and global serializability in particular) effectively on a large scale, without concurrency control information distribution (e.g., local precedence relations, locks, timestamps, or tickets), and thus without performance penalties that are typical to other serializability techniques (Raz 1992). The most common distributed concurrency control technique is strong strict two-phase locking (SS2PL, also named rigorousness), which is also a common centralized concurrency control technique. SS2PL provides both the serializability, strictness, and commitment ordering properties. Strictness, a special case of recoverability, is utilized for effective recovery from failure, and commitment ordering allows participating in a general solution for global serializability. For large-scale distribution and complex transactions, distributed locking's typical heavy performance penalty (due to delays, latency) can be saved by using the atomic commitment protocol, which is needed in a distributed database for (distributed) transactions' atomicity (e.g., two-phase commit, or a simpler one in a reliable system), together with some local commitment ordering variant (e.g., local SS2PL) instead of distributed locking, to achieve global serializability in the entire system. All the commitment ordering theoretical results are applicable whenever atomic commitment is utilized over partitioned, distributed recoverable (transactional) data, including automatic distributed deadlock resolution. Such technique can be utilized also for a large-scale parallel database, where a single large database, residing on many nodes and using a distributed lock manager, is replaced with a (homogeneous) multidatabase, comprising many relatively small databases (loosely defined; any process that supports transactions over partitioned data and participates in atomic commitment complies), fitting each into a single node, and using commitment order
https://en.wikipedia.org/wiki/Masayuki%20Naruse
(born March 15, 1973) is a Japanese mixed martial artist and professional wrestler, competing in the light heavyweight division who fought most of his career in Fighting Network RINGS (RINGS). As a professional wrestler, he notably competed in New Japan Pro Wrestling (NJPW) and All Japan Pro Wrestling (AJPW). In MMA, Naruse was the first and only RINGS Light-Heavyweight Champion and a former IWGP Junior Heavyweight Champion in professional wrestling. Mixed martial arts career Naruse started practising shotokan karate in high school before turning his attention to puroresu. He was eventually accepted in Fighting Network RINGS and trained under his chairman Akira Maeda. Fighting Network RINGS A longtime competitor in RINGS before the organization began hosting true MMA bouts, Naruse had his first taste of MMA during his early career in mixed-style fights. He had his first shoot fight against submission wrestler Koichiro Kimura which he won via ankle lock. He then had another special shoot fight against kickboxer Atsushi Tamaki which went on for 24 minutes before Naruse emerged the winner via TKO due to lost points. They then had a rematch two months later which Naruse won again, this time via arm triangle choke. Naruse experienced little success early in his mixed martial arts career, dropping six of his first seven mixed martial arts bouts, including fights against Valentijn Overeem and Magomedkhan Gamzatkhanov (commonly referred to by his nickname Volk Han). He turned things around as a participant in the eight-man Light-Heavyweight title tournament in 1997, defeating Lee Hasdell, Wataru Sakata and Chris Haseman en route to becoming the first RINGS Light-Heavyweight Champion. He then went 3–6 over his next nine fights before RINGS dissolved in 2002. After RINGS After wrestling for New Japan Pro-Wrestling (NJPW), Naruse decided to go back to competing in MMA. On December 31, 2003, he defeated Jan Nortje by rear-naked choke at K-1 PREMIUM 2003 Dynamite!!. He then defeated Tommy Williams via armbar at Jungle Fight 3 in Brazil. Return to MMA Nine years after retiring in 2004, Naruse returned to MMA on October 27, 2013, as he lost to Sanae Kikuta via armbar at Grabaka Live! 3. Naruse then faced Japanese MMA legend Yuki Kondo at Pancrase: 257 on March 30, 2014. He lost the fight via majority decision. Professional wrestling career Fighting Network RINGS Naruse debuted for Fighting Network RINGS in 1992 where he was billed as a scrappy junior heavyweight. Among the wrestlers he took on during the organization's puroresu days include Heavyweight wrestler Yoshihisa Yamomoto, kickboxer Nobuaki Kakuta, UFC 10 participant Dieseul Berto, Volk Han, MMA veteran Satoshi Honma and future tag team partner Mitsuya Nagai. Naruse and other RINGS wrestlers made the transition to mixed martial arts with the promotion in 1995. New Japan Pro-Wrestling In 2001 with RINGS on the verge of collapse, he moved to New Japan Pro-Wrestling. It was a well timed move as
https://en.wikipedia.org/wiki/National%20Alliance%20to%20End%20Homelessness
The National Alliance to End Homelessness is a United States-based organization addressing the issue of homelessness. The Alliance provides data and research to policymakers and elected officials in order to inform policy debates. They also work on the local level provide community partners with information on best practices and technical assistance. History In 1983, the National Citizens Committee for Food and Shelter was established to meet the emergency needs of the homeless population. In 1987, the Committee determined that a more comprehensive approach was necessary and created the National Alliance to End Homelessness. In May of 2022, Ann Oliva was named the new President and CEO of the organization, taking over for the previous CEO, Nan Ronan. External links National Alliance to End Homelessness Official site. Citations References The New York Times, July 17, 2006 – "Bloomberg Unveils Plan to Reduce Homelessness" Plan du site The McKinney-Vento Homeless Assistance Act As amended by S. 896 The Homeless Emergency Assistance and Rapid Transition to Housing (HEARTH) Act of 2009 A Plan: Not A Dream How to End Homelessness in Ten Years Executive Summary PDF | 24 pages National Alliance to End Homelessness Further reading Colangelo, E. (2004). National alliance to end homelessness. In D. Levinson (Ed.), Encyclopedia of homelessness (Vol. 1, pp. 406-406). SAGE Publications, Inc., https://dx.doi.org/10.4135/9781412952569.n114 Homelessness organizations Political advocacy groups in the United States Homelessness in the United States Organizations established in 1987 1987 establishments in the United States
https://en.wikipedia.org/wiki/KYFB
KYFB (91.5 FM) is a radio station serving the Sherman-Denison area with a conservative religious format. It is a Bible Broadcasting Network (BBN) owned-and-operated station. External links Bible Broadcasting Network - Station Info YFB Bible Broadcasting Network Radio stations established in 2007
https://en.wikipedia.org/wiki/Intentional%20Software
Intentional Software was a software company that designed tools and platforms that followed the principles of intentional programming in which programmers focus on capturing the intent of users and designers, and spend as little time as possible interacting with machines and compilers. Its tools included language workbenches, tools that separated software function from implementation, and allowed 'language-focused' development. This allowed automatic rewriting of code as expert knowledge of implementation options changed. The company later began developing a platform for improving productivity of software groups. The company was co-founded by Charles Simonyi and Gregor Kiczales in 2002, and later headed by CEO Eric Anderson. However, Kiczales left the company in 2003. In 2017 it had almost 100 staff. On April 18, 2017, it was acquired by Microsoft, with many of its employees joining the Microsoft Office team. Products and services Intentional Software developed the Domain Workbench, a language workbench for building and working with domain-specific languages, and designed custom languages for clients for their particular uses. They also built the Intentional Platform, a platform for group productivity software. References External links Intentional Software website Martin Fowler's essay on the company Software companies based in Washington (state) Microsoft acquisitions 2017 mergers and acquisitions Privately held companies based in Washington (state) Software companies established in 2002 Companies based in Bellevue, Washington Defunct software companies of the United States 2002 establishments in the United States 2002 establishments in Washington (state) Companies established in 2002
https://en.wikipedia.org/wiki/Best%20III
Best III may refer to: Best III (Akina Nakamori album), 1992 Best III (computer), a Russian ZX Spectrum clone The Best III: Fuck the System Jazz, an album by Elektropartizany, 2013
https://en.wikipedia.org/wiki/Robik
Robik (ru: Арифметико Логическое Устройство «РОБИК») was a soviet ZX Spectrum clone produced between 1989 and 1994 by NPO Selto-Rotor in Cherkasy. The computer came with a full QWERTY keyboard with 55 keys, separate , three , double , , separate and stop keys. It had the possibility to switch between Latin and Russian fonts. It had built-in Kempston interface and cursor keys that also worked as a joystick. It had no edge connector and video output was analog RGB on a 5-pin DIN or digital TTL on an 8-pin DIN for connecting to monochrome MDA/Hercules or color EGA monitor. There was no composite video and all I/O ports were 5- and 7-pin DINs. Inside the case there was a male 64-pin connector that could be mapped to the standard edge connector. The hardware contained about three to four grams of gold and almost eighteen grams of silver. The letters on the keyboard were written using laser beam technology. The buttons used reed switches instead of copper or iron contact plates. When writing, the screen memory to the TV/monitor screen did not begin from the top left of the border, but instead began from border right under paper. This meant that most multicolor effects and some games did not work correctly. Errors in the ROM have been fixed and Cyrillic letters were also inserted. The keyboard matrix was extended from five keys in eight rows to five keys in nine rows to allow for more buttons. A reset could be performed by pressing two reset buttons. The Robik came in four versions, with only minor changes made for Russian internationalization and localization. The hardware remained largely unchanged, but cheaper parts were used for each version. The fourth version had the new addition of a single integrated circuit. This version did not sell well because by then the main market for the Robik was hardware enthusiasts and this design did not allow for modifications. Robik had two EPROM chips. There are two languages in the M2764AF-1 chip from ST, which can be switched by shortcut keys. References See also List of ZX Spectrum clones Robic — programming language for 8–11 years old kids. ZX Spectrum clones Soviet computer systems
https://en.wikipedia.org/wiki/MicroAce
The MicroAce was a 1980 Sinclair ZX80 home computer clone, designed and manufactured by CompShop and distributed in the USA by MicroAce of Santa Ana, California. It was also sold in Australia and was distributed by Dick Smith Electronics. Description Advertised as "a microcomputer for everyone at a micro price ... a complete computer for $149.00 for 1K [RAM] kit" with optional 2K RAM, it was an unlicensed clone of the Sinclair ZX80 and had an identical, yet obfuscated copy of the ROM by means of a byteswap. Some time later, between 1980 and 1981, MicroAce settled with Sinclair and licensed the ROM of the ZX81. Reception BYTE stated that the assembly instructions were insufficient for those inexperienced in kit assembly, and suggested that beginners learn how to solder first. It found some fit and finish issues with the completed computer, and criticized MicroAce for being unresponsive to questions. The review stated that "if you recognize the limitations of the machine and don't expect too much, then I think you can buy the MicroAce kit with confidence", albeit strongly recommending the 2K RAM option. References Computer-related introductions in 1980 1980 establishments in California 1981 disestablishments in California Products and services discontinued in 1981 Sinclair ZX80 clones
https://en.wikipedia.org/wiki/VIP%20Operator
Vip operator was a mobile network operator in North Macedonia and a member of the A1 Telekom Austria Group. History On March 26, 2007, Vip operator acquired the third license for mobile communications operation from the Macedonian Agency for Electronic Communications, worth EUR 10 million, after winning the tender for the 10 year GSM 900/1800 license. Vip operator's commercial start was on 19 September 2007, only six months after acquiring the license. In May 2008, Vip operator signed strategic partnership with the global brand Vodafone and by September 2011, it has a population coverage of more than 99% with its own network. In July 2014 Vip launched its advanced 4G LTE network and by the end of 2014, it had over 622.000 customers with a market share of 28%. In 2015, Vip operator merged with ONE into one mobile network operator - one.Vip. Network information The IMSI - Network Code of Vip is 294-03 and the MSISDN Network Codes are 077 (international: +389 77) and 078 (international: +389 78). Vip operator is the Macedonian network of the Vodafone Group, as per agreement announced on 20 May 2008. See also Telekom Austria one.Vip References External links Vip operator one.Vip Mobile phone companies of North Macedonia Vodafone Companies based in Skopje Macedonian companies established in 2007 Telecommunications companies established in 2007
https://en.wikipedia.org/wiki/Association%20for%20Jewish%20Outreach%20Programs
The Association for Jewish Outreach Programs, (formerly the Association for Jewish Outreach Professionals), also known by its abbreviation AJOP, is an Orthodox Jewish network which was established to unite and enhance the Jewish educational work of rabbis, rebbetzens, lay people, and volunteers who work in a variety of settings and seek to improve and promote Jewish Orthodox outreach work with ba'alei teshuvah guiding Jews to live according to Orthodox Jewish values. AJOP was the first major Jewish Orthodox organization of its kind that was not affiliated with the Chabad Hasidic movement. Rabbis, rebbetzens, and activists in the field of "Jewish outreach" working in the various areas of Orthodox Jewish education are often referred to as "kiruv professionals" or "kiruv workers" as well as "kiruv volunteers" in the Orthodox community. AJOP as a response to the kiruv movement The growth of the Baal teshuva movement ("returnees" [to Orthodox Judaism]) that gained strides in the 1960s, went hand in hand with, and was often the result of, "kiruv" efforts ("kiruv" means "bringing close [to Judaism]") by rabbis and Orthodox Jews all over the world. The worldwide efforts of the Chabad Hasidic movement were guided by Rabbi Menachem Mendel Schneerson the leader of Chabad who encouraged many of his followers to leave the confines of Brooklyn and to set up synagogues and communities in non-Orthodox settings and to "mekarev" ("bring closer" [secular Jews to Judaism]) and to the Chabad-Lubavitch brand of Hasidism in particular. These Shluchim or Shlichim did the work of "outreach" that was meant to attract Baal teshuvas to Judaism. AVI CHAI Foundation founds AJOP With the passage of time there came the recognition that not only Chabad was doing this work but that many other rabbis and volunteers from all branches of the Orthodox, Haredi, and Hasidic world were involved in the same kind of "outreach" kiruv work. During the mid-1980s Sanford C. Bernstein the founder and director of the investment house Sanford C. Bernstein and Company had become a devoted follower of Rabbi Shlomo Riskin and decided to establish the AVI CHAI Foundation to research and help all manner of Jewish education and particularly Jewish outreach ("kiruv") if it met the criteria of his foundation (no opposition to Zionism and to accept the value of secular knowledge.) The AVI CHAI Foundation granted several million dollars each to both AJOP and to what was meant to be a "sister" effort the National Jewish Outreach Program (NJOP) and their similar sounding names were chosen deliberately and were meant to reinforce each other's work. While AJOP was geared to the "Outreach Professional" doing the "outreach" at the same time NJOP was directed at the non-Orthodox Jewish public who were to be offered a variety of introduction to Judaism programs. The first president of both organizations was Rabbi Ephraim Buchwald a foremost Modern Orthodox outreach rabbi who is also the head of outreach eff
https://en.wikipedia.org/wiki/Japan%20National%20Route%2018
is a national highway connecting Takasaki, Gunma and Joetsu, Niigata in Japan. A section of the highway is designated as a part of the Japan Romantic Road. Route data Length: 193.9 km (120.5 mi) Origin: Takasaki, Gunma (originates at junction with National Route 17) Terminus: Jōetsu, Niigata (ends at Junction with National Route 8 and National Route 350) Major cities: Komoro, Ueda, Chikuma, Nagano History 4 December 1952 - First Class National Highway 18 (from Takasaki to Joetsu) 1 April 1965 - General National Highway 18 (from Takasaki to Joetsu) Municipalities passed through Gunma Prefecture Takasaki - Annaka Nagano Prefecture Karuizawa - Miyota - Komoro - Tomi - Ueda - Sakaki - Chikuma - Nagano - Obuse - Nagano - Iizuna - Shinano Niigata Prefecture Myōkō - Jōetsu - Myōkō - Jōetsu Intersects with Gunma Prefecture Routes 17, 354 and 406; at Takasaki City Nagano Prefecture Route 146; at Karuizawa Town Route 141; at Komoro City - Ueda City Routes 143, 144 and 152; at Ueda City Route 403; at Chikuma City Routes 19, 117 and 406; at Nagano City Niigata Prefecture Route 292; at Myoko City Route 405; at Joetsu City Routes 8 and 350; at the terminus in Joetsu City Bypasses Among other sections already finished, a bypass running on the west side of the Chikuma River from the extreme southern part of Nagano City to Ueda is currently under construction. As of 2008, only a small amount of sections of this bypass has been completed. The completed sections are in Ueda, just west of the Chikuma River, and in Chikuma from Inariyama to just south of Yawata. References 018 Roads in Gunma Prefecture Roads in Nagano Prefecture Roads in Niigata Prefecture
https://en.wikipedia.org/wiki/Iain%20S.%20Duff
Iain S. Duff is a British mathematician and computer scientist, known for his work in numerical methods and software for solving problem with sparse matrices, in particular the Harwell Subroutine Library. From 1986 to 2009, he was the Group Leader of Numerical Analysis at Harwell Laboratory, which has moved in 1990 to the Rutherford Appleton Laboratory. He is also the Project Leader for the Parallel Algorithms Group at CERFACS in Toulouse. See also MUMPS Multifrontal method External links Iain S. Duff home page HSL, formerly the Harwell Subroutine Library Harwell-Boeing sparse matrix collection at Matrix Market Oral History interview with Duff by Thomas Haigh. Full text online as part of SIAM history project, covers his entire career. 1947 births Living people Scientists from Glasgow Alumni of the University of Oxford 20th-century British mathematicians 21st-century British mathematicians British computer scientists Numerical analysts Fellows of the Society for Industrial and Applied Mathematics
https://en.wikipedia.org/wiki/Postini
Postini, Inc. was an e-mail, Web security, and archiving service owned by Google since 2007. It provided cloud computing services for filtering e-mail spam and malware (before it was delivered to a client's mail server), offered optional e-mail archiving, and protected client networks from web-borne malware. History Postini was a startup company founded in 1999 by Shinya Akamine, Gordon Irlam, Brian Maggi, and Scott Petry in Redwood City, California, United States. It was backed by August Capital, with second-round funding from August as well as Summit Partners Accelerator Fund and Sun Microsystems. By February 2005, it was operating ten U.S. data centers, processing 2.5 billion e-mail messages weekly, and providing anti-spam services for more than 4,200 companies and "6 million end users, including workers at Merrill Lynch, Circuit City, Rayovac, and Hormel Foods, the company that makes Spam, the canned meat product". Later in 2005 it moved to nearby San Carlos, California. As of 2012, the number of processed emails is estimated to have been doubled around two times, and Google has added data centers in the EU to better serve its European customers. On July 9, 2007, Google announced that it had signed a definitive agreement to acquire Postini. Google paid $625 million in cash for the acquisition. The former company's services were then marketed as "Google Postini Services". In September 2011, Google announced it would discontinue a number of its products, including Google Web Security, which was acquired by Google as part of Postini. On August 21, 2012, Google announced it would be shutting down all of Postini's web services and folding the service's users into Google Apps. After a multi-year migration effort, the last customers were migrated to Google Apps in the second half of 2015. See also List of mergers and acquisitions by Google Exchange Online Protection, competing product by Microsoft Cisco Email Security Appliance, formerly IronPort, competing product by Cisco References Spam filtering Anti-spam Google acquisitions Computer-related introductions in 1999 Cloud applications Service-oriented (business computing) 2014 disestablishments in California Internet properties disestablished in 2014 Discontinued Google acquisitions
https://en.wikipedia.org/wiki/LS-R
LS-R, or the Layer-Selection-Type Recordable Optical Disk, is the term coined by Hitachi in 2003 for a next-generation optical disc technology which allows much larger data storage densities than DVD, HD DVD or Blu-ray Disc, by allowing the use of many data layers in a single disc. In previous optical disc technologies, relatively few data layers can be incorporated in a single disc, since the reflections from the different layers interfere with each other. However, in LS-R, only the layer of interest generates a reflection, meaning that very many layers can theoretically be stacked in the same disc. This feat is accomplished by an electronic "selection" mechanism, whereby each data layer is coated with electrodes and only the electrodes associated with the layer of interest are activated. This activation changes the "selected" data layer from being transparent to being reflective or opaque, thus it can be addressed. Technology In the Hitachi implementation, LS-R technology utilizes an electrochromic film, for example of tungsten oxide or an organic material to accomplish the optical change. A two-layer feasibility prototype has been demonstrated, and it was estimated that a 20-layer CD-sized disc could provide 1 terabyte of data capacity. Electrical activation of layers has been achieved with transparent ITO electrodes, and a contactless power supply has been developed in order to allow long-term operation (given that the disc is spinning at several thousand revolutions per minute). Commercial product No plans or timeline for the development of a commercial product have been released. It is possible that this technology, while interesting, will remain in the realms of research, either because it is superseded by an alternative technology (such as holographic storage or another 3D optical data storage variant), or because it can not be made to be economically viable. The need for the disc to be meticulously constructed from many layers of different materials, and the need for the drive to be able to electrically address each layer specifically, may make this solution too expensive for commercialization. In the next generation LS-R may compete with other next-generation optical disc format such as the Holographic versatile disc and Protein-coated disc formats. References Audiovisual introductions in 2003 Rotating disc computer storage media Video storage Upcoming products
https://en.wikipedia.org/wiki/Interaction%20model
In the context of e-learning, interactivity is defined as "the function of input required by the learner while responding to the computer, the analysis of those responses by the computer, and the nature of the action by the computer." Variables of interactivity There are two variables describing the interactivity of a given lesson: technology affordance and user freedom. Technology affordance, also known as manual operators, is the richness of the communication between the student and the instructor, usually expressed in terms of the input and output channels. User freedom, on the other hand, is a function of the degree of freedom the learning system grants the student in influencing the presentation of the lesson. Technology affordance Technology affordance in the e-Learning is a function of the capabilities of available computer I/O devices, having a tendency to evolve as new input and output devices become obtainable. There are five levels of technology affordance interactivity: Immersion: full sensory immersion commonly called virtual reality. Video games are the closest approximation we have to immersion today. Text: allowing the student to communicate through arbitrary textual input and output. A Google search box or a discussion board interaction are examples of text level interactivity. Voice: the same as text, except emotion and body language are used as communication channels. A phone conversation is an example of voice level interactivity. Menu select: providing the learner the capability to "select an answer among multiple choice questions [or] pulling down a menu and selecting a menu item". Clicking on a hyperlink in a web page is an example of menu-select interactivity. Toggle select: the ability to "click a button or press a key". A pinball machine, for example, exhibits toggle-select interactivity. Notes E-learning
https://en.wikipedia.org/wiki/The%20National%20Interest%20%28Radio%20National%29
The National Interest was an Australian weekly radio program on the Australian Broadcasting Corporation's Radio National network, covering national issues of interest in depth, with a focus on Australian politics. It ran from 1995 until 16 December 2011. Terry Lane presented the program from 1995, and retired in 2005, when Peter Mares took over as presenter. References External links The National Interest program archive Australian Broadcasting Corporation radio programs Australian talk radio programs
https://en.wikipedia.org/wiki/Global%20interpreter%20lock
A global interpreter lock (GIL) is a mechanism used in computer-language interpreters to synchronize the execution of threads so that only one native thread (per process) can execute at a time. An interpreter that uses GIL always allows exactly one thread to execute at a time, even if run on a multi-core processor. Some popular interpreters that have GIL are CPython and Ruby MRI. Technical background concepts A global interpreter lock (GIL) is a mutual-exclusion lock held by a programming language interpreter thread to avoid sharing code that is not thread-safe with other threads. In implementations with a GIL, there is always one GIL for each interpreter process. Applications running on implementations with a GIL can be designed to use separate processes to achieve full parallelism, as each process has its own interpreter and in turn has its own GIL. Otherwise, the GIL can be a significant barrier to parallelism. Advantages Reasons for employing a global interpreter lock include: increased speed of single-threaded programs (no necessity to acquire or release locks on all data structures separately), easy integration of C libraries that usually are not thread-safe, ease of implementation (having a single GIL is much simpler to implement than a lock-free interpreter or one using fine-grained locks). A way to get around a GIL is creating a separate interpreter per thread, which is too expensive with most languages. Drawbacks Use of a global interpreter lock in a language effectively limits the amount of parallelism reachable through concurrency of a single interpreter process with multiple threads. If the process is almost purely made up of interpreted code and does not make calls outside of the interpreter which block for long periods of time (allowing the GIL to be released by that thread while they process), there is likely to be very little increase in speed when running the process on a multiprocessor machine. Due to signaling with a CPU-bound thread, it can cause a significant slowdown, even on single processors. More seriously, when the single native thread calls a blocking OS process (such as disk access), the entire process is blocked, even though other application threads may be waiting. Examples Some language implementations that implement a global interpreter lock are CPython, the most widely-used implementation of Python, and Ruby MRI, the reference implementation of Ruby (where it is called Global VM Lock). JVM-based equivalents of these languages (Jython and JRuby) do not use global interpreter locks. IronPython and IronRuby are implemented on top of Microsoft's Dynamic Language Runtime and also avoid using a GIL. An example of an interpreted language without a GIL is Tcl, which is used in the benchmarking tool HammerDB. See also Green threads Giant lock References Python (programming language) Concurrency control
https://en.wikipedia.org/wiki/USB%203.0
USB 3.0, released in November 2008, is the third major version of the Universal Serial Bus (USB) standard for interfacing computers and electronic devices. The USB 3.0 specification defined a new architecture and protocol, named SuperSpeed, which included a new lane for a new signal coding scheme (8b/10b symbols, 5 Gbps; also known later as Gen 1) providing full-duplex data transfers that physically required five additional wires and pins, while preserving the USB 2.0 architecture and protocols and therefore keeping the original four pins and wires for the USB 2.0 backward-compatibility, resulting in nine wires in total and nine or ten pins at connector interfaces (ID-pin is not wired). The new transfer rate, marketed as SuperSpeed USB (SS), can transfer signals at up to 5 Gbit/s with nominal data rate of 500 MB/s after encoding overhead, which is about 10 times faster than High-Speed (maximum for USB 2.0 standard). USB 3.0 Type-A and B connectors are usually blue, to distinguish them from USB 2.0 connectors, as recommended by the specification. and by the initials SS. USB 3.1, released in July 2013, is the successor specification that fully replaces the USB 3.0 specification. USB 3.1 preserves the existing SuperSpeed operation mode (8b/10b symbols, 5 Gbps), giving it the new label USB 3.1 Gen 1. USB 3.1 introduced an Enhanced SuperSpeed System to the SuperSpeed architecture and protocol, and providing a new coding schema (128b/132b symbols) and protocol named SuperSpeedPlus (sometimes marketed as SuperSpeed+ or SS+) while defining a new transfer mode called USB 3.1 Gen 2 with a signal speed of up to 10 Gbit/s and a nominal data rate of 1212 MB/s over existing Type-A, Type-B, and USB-C connections, more than twice the rate of USB 3.0 (aka Gen 1).. Backward-compatibility is still given by the parallel USB 2.0 implementation. USB 3.1 Gen 2 Type-A and Type-B connectors and plugs are usually teal-colored. USB 3.2, released in September 2017, fully replaces the USB 3.1 specification. The USB 3.2 specification added a second lane to the Enhanced SuperSpeed System besides other enhancements, so that SuperSpeedPlus USB implements the Gen 2x1 (aka USB 3.1 Gen 2), and the two new Gen 1x2 and Gen 2x2 operation modes while operating on two lanes. The SuperSpeed architecture and protocol (aka SuperSpeed USB) still implements the one-lane Gen 1x1 operation mode (aka USB 3.1 Gen 1). Therefore, two-lane operations, namely USB 3.2 Gen 1x2 (10 Gbit/s with nominal data rate of 1 GB/s after encoding overhead) and USB 3.2 Gen 2x2 (20 Gbit/s, 2.422 GB/s), are only possible with Full-Featured USB Type-C Fabrics (24 pins). As of 2023, USB 3.2 Gen 1x2 and Gen 2x2 are not implemented on many products yet. On the other hand, USB 3.2 Gen 1(x1) (5 Gbit/s) and Gen 2(x1) (10 Gbit/s) implementations are quite common now for some years. Again, backward-compatibility is given by the parallel USB 2.0 implementation. Overview The USB 3.0 specification is similar to USB 2.0, but
https://en.wikipedia.org/wiki/Inna%20Kuznetsova
Inna Kuznetsova () (born 1968) is the CEO of ToolsGroup, which she joined in 2022. Formerly, she was CEO of 1010data, which she joined as COO in July 2019. Inna Kuznetsova also serves as Independent Non-Executive Director of Freightos (NASDAQ:CRGO). In the past she was the President & COO of INTTRA until its successful acquisition by E2open at the end of 2018; Chief Commercial Officer of CEVA Logistics; and before that, IBM vice president of sales and marketing, Systems Software. She previously served on boards of directors of Global Ports Investments PLC (LSE:GLPR) and Sage Group. She graduated from the faculty MSU CMC (1990). She received an MBA from a business school at Columbia University. She started working in the Russian branch of IBM (since 1993). Head of one of the sales sectors (since 1996). She worked in the IBM office in the United States (since 1997). She was engaged in developing markets and an internal startup IBM Life Sciences. She led the IBM business in Linux (since 2007). Vice President of Marketing and Sales of System Software (2009) – the first Russian vice president at IBM headquarters. In 2011, in Moscow, the publishing house «Mann, Ivanov and Ferber» published Inna's book «Up! A practical approach to career growth». In 2013, in Moscow, the publishing house Mann, Ivanov and Ferber published Inna's book A month in the sky. Practical notes on the ways of professional growth. References Literature External links American women in business IBM people Living people 1968 births Moscow State University alumni 21st-century American women
https://en.wikipedia.org/wiki/Japan%20National%20Route%2021
is a national highway connecting Mizunami, Gifu Prefecture and Maibara, Shiga Prefecture in Japan. Route data Length: Origin: Mizunami (originates at junction with Route 19) Terminus: Maibara (ends at Junction with Route 8) Major cities: Minokamo, Kakamigahara, Gifu, Ōgaki History 4 December 1952 - Designation as First Class National Highway 21 (from Mizunami to Maibara) 1 April 1965 - Designation as General National Highway 21 (from Mizunami to Maibara) Intersects with Gifu Prefecture Route 19 Route 248 Route 41 Routes 22 and 156 Route 157 Routes 258 and 417 Route 365 Shiga Prefecture Route 8 References 021 Roads in Gifu Prefecture Roads in Shiga Prefecture
https://en.wikipedia.org/wiki/USS%20Fearless%20%28AMc-80%29
the second USS Fearless (AMc-80) was an Accentor-class coastal minesweeper acquired by the U.S. Navy. World War II service No data available. Reclassified as a dive tender Fearless was reclassified YDT-5 on 15 February 1943. Deactivation Fearless was sunk as a target in 1973. The Fearless is in 80 feet of water lying on her keel 800 yards North of Great Harbour Peter Island in the British Virgin Islands. References External links NavSource Online: Mine Warfare Vessel Photo Archive - YDT-5 - ex-Fearless (AMc 80) USS Fearless (AMc-80) AMc-80 USS Fearless Accentor-class minesweepers World War II minesweepers of the United States 1941 ships
https://en.wikipedia.org/wiki/Pendle%20Community%20Radio
Pendle Community Radio is a community radio station based in Nelson, Lancashire. Starting broadcasts on 103.1 MHz FM in September 2007, it aims to provide dedicated programming to the Asian Muslim population that live in Pendle, east Lancashire, during times of Muslim holy festivals. As common with many of the UK's new community radio stations, it will also have a wider remit to promote wider "social gain", for all local communities, through on-air access via voluntary opportunities. The station also aims to help with community cohesion and integration, economic regeneration and development and political wellbeing. History Pendle Community Radio stems from several short term Restricted Service Licence broadcasts, dating back to 1999, that were awarded by Ofcom and its predecessor, The Radio Authority. These RSL broadcasts usually ran twice a year, each for 28 days, to coincide with Eid ul-Fitr (Ramadhan) and Milad un Nabi. Hence the name of the radio station changed between Radio Ramadhan or Milaad FM, to coincide. Following the success of the RSL broadcasts and the fact that there wasn't another local radio station with any significant special interest programmes aimed at the local community, Ofcom awarded a full-time 5 year community radio licence in 2006 to the same group that ran the RSLs. The radio station is based at 15 Cross Street Nelson and named as AWAZ RADIO 103.1 FM (Pendle Community Radio). The team is led by professionals. Current Directors Sagheer Akhtar and Shahid Kaleem have clearly outlined the aims and objectives for the coming years. The team includes technical professionals and volunteers. Great team includes Adnan Sohail, Tasawer Ali, Ismail, sisters, brothers, presenters and guests. Pendle Community Radio has a weekly programme on behalf of the Burnley Pendle and Rossendale Council for Voluntary Service which gives representatives of local voluntary, faith and community sector organisations the chance of much-needed publicity. Funding Ofcom stipulates that any community radio station that is situated within the area of a commercial radio station (with a served population of 50000-150000), must obtain at least 50% of revenues from donations and grants. A maximum of 50% can be derived from the sale of advertising and sponsorship. Any community radio station must also be run as not-for-profit. As such many community radio stations focus on using volunteers in many operational areas Pendle Community Radio aims to find suitable grant funding from both the public and private sector. Some of this will be from the Ofcom 'Community Radio Fund', provided by the Department for Culture, Media and Sport as well as other grants. It is envisaged that this will be used to further fund technology and studio equipment and facilitate the future progression of the station, ultimately leading to some paid positions. References http://www.pendleradio.org http://www.pendlecommunitynetwork.org.uk/news_info.asp?id=229 Pendle Community Net
https://en.wikipedia.org/wiki/Patapon
is a 2007 video game co-developed by Pyramid and Japan Studio and published by Sony Computer Entertainment for the PlayStation Portable (PSP). The game's unique genre was described to be a combination of rhythm and strategy. The game's concept and design were conceived when game designer Hiroyuki Kotani discovered the Patapon designs from French artist Rolito's personal website. The name Patapon was created by Rolito and was inspired by an old French word for "children". Kotani chose the name because it sounded similar to marching and drumming. It was released in Japan in December 2007 and in February 2008 for North America and Europe. In the game, the player acts as an invisible deity to a tribe of anthropomorphic eyeballs known as "Patapons" that can be commanded to move forward, attack, defend and retreat by using a sequence of drum beats. The story follows the Patapon tribe in their journey to reach Earthend and gaze upon "IT". They encounter giant beasts and an enemy tribe known as the Zigotons that serve as obstacles throughout their adventure. Patapon was well-received among critics with multiple reviewers praising the art style of the Patapon tribe and the music. Some reviewers criticized the repetitive nature of it and the lack of a pause option. The game received multiple nominations including a BAFTA award and won Best PSP Game of 2008 by IGN. The game led a port for the PlayStation 4 and two sequels for the PSP; Patapon 2 and Patapon 3, becoming the first entry of the Patapon series. Gameplay In Patapon, the player takes the role of a deity worshipped by an anthropomorphic eye-ball army known as Patapons. The Patapon village serves as the main hub, allowing the player to revive fallen troops, select missions, and play minigames. Before each mission, the player can choose up to three different units for battle with the banner-wielding Hatapon as the leader of the units. There are eight possible units to choose from: The shield and sword-wielding Tatepons, the spear-wielding Yaripons, the bow and arrow-wielding Yumipons, the cavalry lance-wielding Kibapons, the heavy club-wielding Dekapons, bird-riding Toripons, magic-wielding Mahopons, and Tuba-wielding Megapons. Each unit can have a maximum of three or six troops depending on the type of Patapon. During missions, the player can command the Patapons by inputting specific sequences using the face buttons on the PSP, each representing a drum. These sequences can command the tribe to move forward, attack, defend, and other actions. A pulsating border signals the player at what rhythm to input the commands. Successfully entering a proper sequence in sync with the rhythm will lead the tribe into a "Fever" increasing their attack and defensive bonuses. Fever can be accomplished by maintaining a combination of 10, or achieved early if a combination is 3 or higher and the command was performed perfectly in sync. If the player ceases to command the Patapons or inputs the commands off-bea
https://en.wikipedia.org/wiki/Shed%20Productions
Shed Productions, part of Warner Bros. Television Productions UK, was an independent UK television production company, specialising in contemporary, original drama programming and content. It was established in 1998 by Eileen Gallagher, Brian Park, Ann McManus and Maureen Chadwick, who previously worked together at Granada Television. As of October 2015 it no longer exists as a company with all properties folded into Wall to Wall. Company history Shed's first major production, the hit drama Bad Girls was commissioned by ITV in the summer of 1998 and proved to be a huge success with viewers, becoming one of the UK's most consistently successful dramas during its eight series run. In 2000, following the success of Bad Girls, Shed won a major new commission for primetime ITV, Footballers' Wives. During the five series it was on air, Footballers' Wives became probably the most talked-about UK drama of recent times and spawned the popular ITV2 spin-off Footballers' Wives Extra Time, and factual entertainment series Footballers' Wives TV which aired on ITV2 in 2005. 2005 also saw Shed's first foray into the realms of children's television when seven-part drama The Fugitives was commissioned by CITV. Starring Maureen Lipman, Jack Ellis and Melanie Hill, the show centred on two runaway teenagers and tackled head-on the serious subject of human cloning. In 2006, Shed received its first commission from BBC One, Waterloo Road, a drama series about a failing comprehensive school in Rochdale. After proving to be a huge hit with viewers, especially the valuable 16- to 24-year-old audience, Waterloo Road was immediately re-commissioned by the BBC for a second series. Remaining consistently popular with the viewers, seven series of Waterloo Road have so far been aired (as of 2012). In November 2011, it was announced by the BBC and Shed Media that production on the show would be relocating from Rochdale to a new location in Greenock, Scotland as part of the BBC's aim to produce more programming in the country. A further 50 episodes were commissioned for broadcast between 2012 and 2014, with the first to begin airing from September 2012. Filming on the eighth series began in April 2012 at the shows new location, the former Greenock Academy, and began airing from August 2012. Production on a ninth series began on 1 April 2013. It was announced on 2 April 2014 that series 10 will be the final series of the show. On 23 September 2021, it was announced that Waterloo Road would return with a new series. One-off drama Catwalk Dogs – written by Men Behaving Badly creator Simon Nye and starring Kris Marshall and Georgia MacKenzie – aired on ITV1 in 2007 and introduced viewers to the world of dog shows. This was followed in 2008 by Rock Rivals, another ITV commission that starred Michelle Collins and Sean Gallagher as Karina and Mal Faith – the bickering judges on a phenomenally successful TV talent show. In 2008, BBC One commissioned Hope Springs, a new eight-part d
https://en.wikipedia.org/wiki/IEEE%20Internet%20Computing
IEEE Internet Computing is a bimonthly peer-reviewed scientific journal published by the IEEE Computer Society. It covers all aspects of emerging and maturing Internet technologies. The editor-in-chief is George Pallis (University of Cyprus). According to the Journal Citation Reports, the journal has a 2017 impact factor of 1.929. References External links Internet Computing Computer science journals Academic journals established in 1997 Bimonthly journals English-language journals
https://en.wikipedia.org/wiki/IEEE%20Transactions%20on%20Mobile%20Computing
IEEE Transactions on Mobile Computing is a bimonthly peer-reviewed scientific journal covering technology related to the mobility of users, systems, data and computing. It was established in 2002 and is published by the IEEE Computer Society. The editor-in-chief is Marwan M. Krunz (University of Arizona). According to the Journal Citation Reports, the journal has a 2021 impact factor of 6.075. References External links Transactions on Mobile Computing Computer science journals Bimonthly journals English-language journals Academic journals established in 2002
https://en.wikipedia.org/wiki/IEEE%20MultiMedia
IEEE MultiMedia is a quarterly peer-reviewed scientific journal published by the IEEE Computer Society and covering multimedia technologies. Topics of interest include image processing, video processing, audio analysis, text retrieval and understanding, data mining and analysis, and data fusion. It was established in 1994 and the current editor-in-chief is Shu-Ching Chen (Florida International University). The 2018 impact factor was 3.556. External links Multimedia Computer science journals Multimedia Academic journals established in 1994 Quarterly journals English-language journals
https://en.wikipedia.org/wiki/IEEE%20Transactions%20on%20Multimedia
IEEE Transactions on Multimedia is a bimonthly peer-reviewed scientific journal covering multimedia technology and applications. It was established in 1999 and is published by the IEEE Computer Society, IEEE Communications Society, IEEE Circuits and Systems Society, and IEEE Signal Processing Society. The editor-in-chief is Chang Wen Chen (State University of New York at Buffalo. According to the Journal Citation Reports, the journal has a 2018 impact factor of 5.452. References External links Transactions on Multimedia Computer science journals Engineering journals Bimonthly journals Academic journals established in 1999 English-language journals
https://en.wikipedia.org/wiki/Al%20Vezza
Albert Vezza was a computer science professor and a founder of video game company Infocom. Career Vezza was the assistant director of MIT's Laboratory for Computer Science (LCS) and in charge of LCS's Dynamic Modeling (DM) group in the late 1970s when group members Dave Lebling, Marc Blank, Tim Anderson, and Bruce Daniels began creating the game that would become Zork. By 1979, many of the graduating students in the DM group were interested in continuing to work together by establishing a company, and Vezza, who had long wanted to bring together his former students in a commercial venture, agreed to help fund the company, named Infocom. Vezza became a member of the board of directors of Infocom when it was incorporated on June 22, 1979. While the computer game business brought Infocom quick success, Vezza and others on the board were not convinced that computer games would remain a viable market over the long haul and advocated a move into business software. As Infocom began seeking out venture capital firms to invest in the company, the board decided that an actual CEO would be an asset in attracting investment and that an experienced project leader like Vezza would attract more confidence from firms than the younger game designers. As a result, Vezza was named CEO of the company and took on that role beginning in January 1984. As CEO, Vezza was responsible for guiding Infocom's new foray into business software, and oversaw Infocom during a period when rising development costs related to the Cornerstone database project, and feuding between the game and business software sides of the business, created a great strain on the company. In 1985, the failure of Cornerstone to carve out a place in the business world, combined with flat game sales, led to a period of financial difficulty and layoffs. Finally, in 1986 Infocom was sold to rival game company Activision and Vezza stepped down as CEO. References Year of birth missing American chief executives Infocom Possibly living people Video game businesspeople
https://en.wikipedia.org/wiki/Orc%20%28programming%20language%29
Orc is a concurrent, nondeterministic computer programming language created by Jayadev Misra at the University of Texas at Austin. Orc provides uniform access to computational services, including distributed communication and data manipulation, through sites. Using four simple concurrency primitives, the programmer orchestrates the invocation of sites to achieve a goal, while managing timeouts, priorities, and failures. External links Bibliography Concurrent programming languages
https://en.wikipedia.org/wiki/Sammon%20mapping
Sammon mapping or Sammon projection is an algorithm that maps a high-dimensional space to a space of lower dimensionality (see multidimensional scaling) by trying to preserve the structure of inter-point distances in high-dimensional space in the lower-dimension projection. It is particularly suited for use in exploratory data analysis. The method was proposed by John W. Sammon in 1969. It is considered a non-linear approach as the mapping cannot be represented as a linear combination of the original variables as possible in techniques such as principal component analysis, which also makes it more difficult to use for classification applications. Denote the distance between ith and jth objects in the original space by , and the distance between their projections by . Sammon's mapping aims to minimize the following error function, which is often referred to as Sammon's stress or Sammon's error: The minimization can be performed either by gradient descent, as proposed initially, or by other means, usually involving iterative methods. The number of iterations needs to be experimentally determined and convergent solutions are not always guaranteed. Many implementations prefer to use the first Principal Components as a starting configuration. The Sammon mapping has been one of the most successful nonlinear metric multidimensional scaling methods since its advent in 1969, but effort has been focused on algorithm improvement rather than on the form of the stress function. The performance of the Sammon mapping has been improved by extending its stress function using left Bregman divergence and right Bregman divergence. See also Prefrontal cortex basal ganglia working memory State–action–reward–state–action Constructing skill trees References External links HiSee – an open-source visualizer for high dimensional data A C# based program with code on CodeProject. Matlab code and method introduction Functions and mappings Dimension reduction
https://en.wikipedia.org/wiki/Arabesk%20%28airline%20alliance%29
Arabesk Network Cooperation Project was a "network alignment project", an unofficial and non-binding airline alliance, comprising members of Arab Air Carriers' Organization (AACO). This network alignment group was founded in 2006, after a year of preparation with technical assistance from Sabre Airline Solutions, by the following airlines: In 2007, Etihad Airways and Syrian Air joined the alliance. The project aimed to boost market share and coordinate schedules, reduce duplication on routes and link the destinations network of its members, which stretched from North America to East Asia. At that time, Arab airline operators were generally not included in the major airline alliances, partly because of their relatively small market share. As well as coordinating schedules, the Arabesk carriers consolidated joint fuel purchasing under the AACO umbrella, and other supplies. Abdul Wahab Teffaha, Secretary General of AACO, explained, “This is not an airline alliance, but a unique grouping of carriers from a single region designed to help members realise better commercial potential, through schedule coordination.” The project continued until the end of the decade. References External links Arab Air Carriers Organization members Airline alliances
https://en.wikipedia.org/wiki/Gunslinger%20%28TV%20series%29
Gunslinger is a Western television series starring Tony Young that aired on the CBS television network from February 9 until May 18, 1961 on Thursdays from 9 to 10 p.m. EST. The series theme song was sung by Frankie Laine. Young played Cord, a young gunfighter who works undercover for the local army garrison commander, acting as a secret law enforcement agent in the territory. The series lasted for only twelve episodes. Gunslinger was the successor to Dick Powell's Zane Grey Theater. Cast Tony Young as Cord Preston Foster as Captain Zachary Wingate Charles Gray as Pico McGuire Dee Pollock as Billy Urchin Midge Ware as Amby Hollister John M. Pickard as Sgt. Major Murdock Guest stars Roy Barcroft Henry Brandon Anthony Caruso Phyllis Coates Lloyd Corrigan Royal Dano Jim Davis Buddy Ebsen Jack Elam Gene Evans Jock Gaynor Raymond Guth Ron Hagerthy Don C. Harvey Myron Healey Anne Helm John Hoyt George Kennedy Sandy Kenyon Norman Leavitt Celia Lovsky Barbara Luna Jock Mahoney Stafford Repp Addison Richards William Schallert Jay Silverheels Quentin Sondergaard Fay Spain Harry Dean Stanton William Tannen Vaughn Taylor Guy Teague Rick Vallin References Bibliography McNeil, Alex. Total Television (1996). New York: Penguin Books Brooks, Tim and Marsh, Earle, The Complete Directory to Prime Time Network and Cable TV Shows (1999). New York: Ballantine Books External links 1960s Western (genre) television series CBS original programming 1961 American television series debuts 1961 American television series endings Black-and-white American television shows
https://en.wikipedia.org/wiki/Jefferson%20Drum
Jefferson Drum, also known as The Pen and the Quill, is an American Western television series starring Jeff Richards that aired on the NBC network from April 25 to December 11, 1958. Overview Jefferson Drum, portrayed by Jeff Richards, is a crusading newspaper editor in the Old West town of Jubilee. A widower, he rears his son, Joey, played by 10-year-old Eugene Mazzola, also known as Eugene Martin. Drum's printer is Lucius Coin, played by Cyril Delevanti. Big Ed, the town bartender, is portrayed by Robert J. Stevenson, later a member of the Los Angeles City Council. Hal J. Smith, later known for his role of the town drunk, Otis Campbell, on CBS's The Andy Griffith Show, was cast five times on Jefferson Drum as Hickey. In the episode entitled "Pete Henke" (November 20, 1958), the character Henke, portrayed by Strother Martin, is a violent sharpshooter known for causing trouble. Editor Jefferson Drum challenges Henke to a fistfight in the saloon, but Henke prevails in the third round when he throws something into Drum's eyes and blinds him temporarily. The saloon hostess who gave Henke the blinding substance is later seen at Henke's "medicine show." In the end, the persistent Drum knocks over Henke with a punch. "Pete Henke" also starred Frank Wolff as Sam Creighton and Bert Remsen as Jim Ford. The series first aired at 7:30 Eastern on Friday opposite repeats of I Love Lucy on CBS and Leave It to Beaver on ABC. For its second round of episodes, it moved to Thursdays in the same 7:30 p.m. time slot. Rebroadcasts were aired during the first half of 1959. Jefferson Drum was produced for Screen Gems by Mark Goodson-Bill Todman Productions (known more for their game show output), and ran for parts of two seasons before it was cancelled. Cast Jeff Richards .... Jefferson Drum Eugene Mazzola (billed as Eugene Martin) .... Joey Drum Cyril Delevanti .... Lucius Coin Robert J. Stevenson .... Big Ed Guest stars R.G. Armstrong, as Kreiger in "Law and Order"; Jerry Hopper also appears in this episode. John Ashley, as Tim Keough in "Arrival", the series premiere Jim Bannon, Jean Byron, and Russell Johnson, as Tay Beloin, Angela, and The Sundown Kid, respectively, in "A Very Deadly Game" Gregg Barton, Virginia Gregg, and Harry Lauter appeared as Yance Meeker, Louise Hammond, and Vince Meeker, respectively, in "The Hanging of Joe Lavett". Dan Blocker, Lane Bradford, and Dan Sheridan appeared as Craig, Hank, and Leo in the segment entitled "Stagecoach Episode." Robert Bray and Charles Tannen, as Jack Page and Dandy Case, respectively, in the episode "Obituary" Andy Clyde played Hepburn in the episode "The Keeney Gang"; L.Q. Jones appeared in the same segment as Burdette. Mike Connors, as the title guest star in "Simon Pitt", the series finale. Ted de Corsia and Patrice Wymore appear in this episode as Jim Kind and Goldie, respectively. Abby Dalton, Ron Hagerthy, and Douglas Kennedy appeared as Eloise Barton, Will Barton, and Dallas, respectively, in th
https://en.wikipedia.org/wiki/Secret%20Agent%20Clank
Secret Agent Clank is a platform game developed by High Impact Games for the PlayStation Portable and published by Sony Computer Entertainment. It was released in North America on June 17, 2008. A PlayStation 2 version was ported by Sanzaru Games and was released on May 26, 2009, in North America and in Europe on June 19, 2009. It is the second game in the Ratchet & Clank series released for the PlayStation Portable and the sixth in the Ratchet & Clank series released for the PlayStation 2. The theme of the game is a spoof of the James Bond series, and is based on the Secret Agent Clank element of Up Your Arsenal. To fit with the James Bond theme, Clank has an array of helpful gadgets and devices on his tuxedo, such as a bow tie that he can use as a boomerang and a rose that turns into a carnivorous plant to devour enemies. Gameplay Unlike previous Ratchet & Clank games, Clank's gameplay is more like Ratchet's in comparison. In previous titles, Clank's gameplay consisted mostly of brief, puzzle-platform-oriented segments with minor melee combat elements; in Secret Agent Clank, he has weapons and gadgets of his own. Featured are quick time events where the player must press a sequence of buttons correctly to sneak through an area undetected. Giant Clank, wherein Clank transforms into a monster-sized fighting machine, also makes an appearance. Besides Clank, both Ratchet and Captain Qwark are playable in the game, as are the Gadgebots. Qwark's gameplay segments are based on dubious accounts of his own exploits and are more action-based. Ratchet's segments in prison are more like the arena gameplay featured in previous games in the series. The Gadgebot segments require switching between Gadgebots to solve puzzles. Clank has six weapons in his inventory: the Tie-a-Rang, Cuff Link Bombs, Tanglevine Carnation, Blowtorch Briefcase, Thunderstorm Umbrella, and Holo-Knuckles. Throughout the game, Clank will find weapons that Ratchet can use. Clank secretly puts the weapons in cakes, then sends them to prison for Ratchet to pick up. Clank has the opportunity to gain access to a snowboard and other vehicles. The player can upgrade Clank's "Clank-Fu" fighting moves and weapons, similar to the weapons-leveling system in traditional Ratchet & Clank games. The player can learn new techniques, as well as various finishing moves. Plot A precious gem known as the Eye of Infinity, held at the Boltaire Museum, has been stolen, with Ratchet falsely accused and jailed as he is at the scene of the crime. Skeptical about his involvement, Clank infiltrates the Museum to find out more about the Eye of Infinity. But much to his dismay, Clank finds only coordinates to Asyanica Rooftops. Meanwhile, in jail, Ratchet is forced to fend off his inmates in a battle to stay alive. Clank travels to the Asyanica Rooftops, but is held captive. He contacts the agency Gadgebots to free him. Once freed, he sets to find information about Number Woo, the owner of Asyanica. Althoug
https://en.wikipedia.org/wiki/Intelligent%20Resource%20Director
On IBM mainframes running the z/OS operating system, Intelligent Resource Director (IRD) is software that automates the management of CPU resources and certain I/O resources. IRD is implemented as a collaboration between Workload Manager (WLM), a component of z/OS, and the PR/SM Logical Partitioning (LPAR) hypervisor, a function of the mainframe hardware. Major IRD functions are: Logical CP Management - where IRD dynamically varies logical processors on- and off-line. (This does not apply to zIIPs or zAAPs.) Weight Management - where IRD dynamically redistributes LPAR weights between members of an LPAR Cluster. (An LPAR Cluster is the set of members of a Parallel Sysplex on a single mainframe footprint.) The total of the weights for the LPAR Cluster remains constant as weights are shifted between the members. (Linux on IBM Z LPARs can also participate in Weight Management.) CHPID Management - where logical channel paths are moved between members of an LPAR Cluster. IRD's objective is to optimise the use of computing resources while enabling WLM to meet its workload goals. So, for example, IRD will not vary offline logical processors to the point where doing so would cause workloads to miss their goals. See also Workload Manager Literature Frank Kyne et al., z/OS Intelligent Resource Director, IBM Redbook, SG24-5952 External links Official z/OS WLM Homepage IBM mainframe operating systems IBM mainframe technology
https://en.wikipedia.org/wiki/Federal%20Geographic%20Data%20Committee
The Federal Geographic Data Committee (FGDC) is a United States government committee which promotes the coordinated development, use, sharing, and dissemination of geospatial data on a national basis. Its 32 members are representatives from the Executive Office of the President, and Cabinet level and independent federal agencies. The secretary of the Department of the Interior chairs the FGDC, with the deputy director for management, Office of Management and Budget (OMB) as vice-chair. History The FGDC's role was determined by OMB Circular A-16 and OMB Circular A-119 until 2018. Then the FGDC's official position and roles were codified in law in the Geospatial Data Act of 2018. OMB Circular A-16, revised August 19, 2002, is a Government circular that was created by the United States Office of Management and Budget (OMB) to provide guidance for federal agencies that create, maintain or use spatial data directly or indirectly through the establishment of the National Spatial Data Infrastructure (NSDI) and the Federal Geographic Data Committee (FGDC). The circular establishes guidelines for the management of digital spatial data and the use of those assets. It also appoints the FGDC to the interagency coordinating body for NSDI-related activities. The Secretary of the Interior is established as chair, with the Deputy Director for Management, OMB as Vice-Chair. U.S. National Spatial Data Infrastructure The U.S. National Spatial Data Infrastructure (NSDI) ensures that spatial information is accurate and available to state, local, and tribal governments as well as to academia and the private sector. The NSDI obeys four primary values: Privacy and Security of raw and processed citizens' personal data and accuracy of statistical data Access to these data per guidelines subject to OMB Circular A-130 Protection of proprietary interests to these data Interoperability between various federal agencies' information systems within these data The NSDI supports the advancement for a Global Spatial Data Infrastructure that coincides with National Security interests. Any Federal system that develops international data in accordance with these systems must follow international voluntary standards as outlined by Circular A-119. The NSDI has five parts: Data themes Metadata National Spatial Data Clearinghouse Technical standards Partnerships Mission and policy The FGDC coordinates the sharing of geographic data, maps, and online services through an online portal, geodata.gov, that searches metadata held within the NSDI Clearinghouse Network. Spatial Data is considered a national capital asset. The NSDI manages the distribution of these assets across all interconnected systems, federal and private sector, and analyzes it to determine the impact of the world economically, physically and socially upon the United States. Part of NSDI's mission is to help avoid duplication or erroneous modification of this spatial data. Accurate and dependable spatial
https://en.wikipedia.org/wiki/Computer%20case%20screws
Computer case screws are the hardware used to secure parts of a PC to the case. Although there are numerous manufacturers of computer cases, they have generally used three thread sizes. The Unified Thread Standard (UTS) originates from the United States, while the ISO metric screw thread is standardized worldwide. In turn, these thread standards define preferred size combinations that are based on generic units—some on the inch and others on the millimetre. The #6-32 UNC screws are often found on 3.5" hard disk drives and the case's body to secure the covers. The M3 threaded holes are often found on 5.25" optical disc drives, 3.5" floppy drives, and 2.5" drives. Motherboards and other circuit boards often use a #6-32 UNC standoff. #4-40 UNC thumb screws are often found on the ends of DVI, VGA, serial and parallel connectors. More modern cases from certain manufacturers (Dell, Gateway) and enthusiast cases will lack screws altogether, instead utilizing a toolless design. #6-32 UNC screw The #6-32 UNC is a UTS screw specifying a major thread diameter of which is defined as ; and (threads per inch) which equates to a thread pitch of . The optional UNC specification indicates the standard coarse thread is used which is defined for #6 screws as 32 tpi rendering 'UNC' redundant, however it may be seen when other specifications such as plating or other treatments are also specified. It is by far the most common screw found inside computer cases. It commonly appears in lengths of () and () or less often (). Non-standard metricized lengths such as are also sometimes encountered. Nearly every brand new computer case comes with a bag of these. They are commonly used for the following purposes, however there are many exceptions: securing a power supply to the case securing a 3.5-inch hard disk drive to the case holding an expansion card in place by its metal slot cover fastening case components to one another usually, one or more #6-32 UNC screws hold the main cover on the case They are almost always provided with a #2 Phillips drive. Sometimes a Green Robertson or Torx drive is used instead. All three patterns may also be combined with a slot for a flat-blade screwdriver. Usually they are provided with a 1/4 in () flanged hex head. Non-standard metricized flanged hex heads can also be encountered. Also common are pan head screws - a low disk with a chamfered outer edge. Because they are used in places where high torque is not required and easy removal and replacement may be desirable (such as on the side panels of the PC case), they are frequently available as thumbscrews with larger, knurled heads that can be removed with one's fingers or tools. M3 screw The M3 is a metric screw specifying a nominal diameter of ; and standard coarse thread pitch defined as . The M3 is the second most common screw found in PCs. It commonly appears in many lengths from 1 to 20 mm. Nearly every brand-new computer case comes with a bag of these. Notwithsta
https://en.wikipedia.org/wiki/Defense%20strategy
Defense strategy may refer to: Military strategy Defense (legal) Defense strategy (computing)
https://en.wikipedia.org/wiki/KNWC%20%28AM%29
KNWC, known on-air as Faith 1270 KNWC, or by the network name Faith Radio, is a radio station in Sioux Falls, South Dakota, owned and operated by University of Northwestern – St Paul and is a non-profit, listener-supported radio station relying on donations from the local community throughout the year. It broadcasts on 1270 AM, covering the Sioux Empire and surrounding areas in South Dakota. Programming Programming is nearly 100 percent satellite delivered and produced by Northwestern Media. The format is mainly Christian talk and teaching, with programs such as Turning Point with David Jeremiah; Focus on the Family; Family Life Today with Dennis Rainey; Insight for Living with Chuck Swindoll; Living on the Edge with Chip Ingram; In Touch with Dr. Charles Stanley; and others. Translators References External links Northwestern Media FCC History Cards for KNWC NWS Sioux Falls, South Dakota Radio stations established in 1948 1948 establishments in South Dakota Northwestern Media
https://en.wikipedia.org/wiki/List%20of%20six-man%20football%20venues%20in%20Texas
This is a partial list of six-man football venues in Texas. References Texas Bob's High School Stadium Database Lists of stadiums American football-related lists Texas sports-related lists
https://en.wikipedia.org/wiki/FireLink
Firelink or FireLink is a wide area radio system in England, Wales, and Scotland for fire services. The system which supports both voice and data communication was designed to replace a patchwork of analogue systems with a modern wider area digital system. It provides new functionality – notably resilience and interoperability with other FRS and emergency services - which previous major incidents have identified as important. Firelink enables fire appliances to be mobilised in response to a 999 call by voice and data in Scotland, Wales, and London. It became operational in Scotland and Wales in 2010. In the rest of England, mobilisation will be by voice only, as the FiReControl project to provide new emergency control rooms using Firelink was cancelled in 2010. The key benefits of Firelink include more effective and safer service delivery through clearer voice communication and call group management for incident mobilisation and management; the ability to send data and status codes to/from mobile vehicles – a faster/more accurate medium than voice communication; and, in Wales, Scotland and London, the ability to identify and mobilise the nearest available appliance through an automated vehicle location (AVL) system. As a single comms system operating with standardised equipment across all 57 fire and rescue services across Great Britain, the system will also enhance the services' ability to respond collectively to major incidents by allowing fire and rescue appliances supporting major incidents the ability to speak directly to the control room managing the incident (where ever it may be). Finally, the system is also more resilient and secure and offers inter-interoperability with other blue lights services. The system was developed and built by Airwave Solutions, it will be part of the Airwave private digital network. It is a private, digital, secure, Terrestrial Trunked Radio (TETRA) network, and will replace the many different existing networks commissioned by individual fire and rescue services. In England, the project is part of CLG's fire resilience programme, which also includes the New Dimension programme and FiReControl projects. The New Dimension project has already delivered a range of equipment to the FRS to assist with handling large-scale incidents. The vehicles supplied as part of the New Dimension provision were fitted with the new Firelink digital radios. See also Fire service in the United Kingdom Central Communications Command Gold Silver Bronze command structure References Fire and rescue in the United Kingdom Emergency communication
https://en.wikipedia.org/wiki/2nd%20Tony%20Awards
The 2nd Tony Awards were held on March 28, 1948, at the Waldorf-Astoria Grand Ballroom in New York City, and broadcast on radio station WOR and the Mutual Network. The Masters of Ceremonies were Harry Hershfield, Bert Lytell, and Hiram Sherman. The Antoinette Perry Awards for Excellence in Theatre, or more commonly, the Tony Awards, recognize achievement in live Broadway productions and performances, plus several non-competitive Special Awards (such as the Regional Theatre Award). They are presented by the American Theatre Wing and the League of American Theatres and Producers at an annual ceremony in New York City. Ceremony The award for the women was a gold bracelet, with a disc inscribed with the actress' initials and the name of the prize, and the men received a gold bill clip, similarly inscribed. Performers and performances were: High Button Shoes (Nanette Fabray, Helen Gallagher, and Donald Saddler), Make Mine Manhattan (Kyle MacDonnell and Joshua Shelley), Look Ma I'm Dancin'! (Virginia Gorski and Don Liberto), Forest Bonshire, Jack Carter, Stan Fisher, Lisa Kirk, Kathryn Lee, Jack McCauley, Lucy Monroe, Ferruccio Tagliavini and Pia Tassinari (of the Metropolitan Opera), Maggie Teyte (City Center Opera). Winners and nominees Source:Tony Awards Note: There were no pre-announced Tony nominees prior to 1956 Production Performance Craft Special Awards Multiple nominations and awards The following productions received multiple awards. 3 wins: Mister Roberts 2 wins: Angel in the Wings, Command Decision and The Heiress References Tony Awards ceremonies 1948 in theatre 1948 awards 1948 in the United States 1948 in New York City March 1948 events in the United States
https://en.wikipedia.org/wiki/Landstar%20System
Landstar System, Inc. is a transportation services company specializing in logistics and more specifically third-party logistics. Landstar also utilizes an extensive network of more than 11,000 independent owner operators, referred to internally as BCO's (business capacity owners). Landstar provides services principally throughout the United States and to a lesser extent in Canada and between the U.S. and Canada, Mexico and other countries around the world. History The company headquarters are in Jacksonville, Florida. Landstar has been in business since 1968 and was incorporated in 1991. In January 2014, Landstar sold its National Logistics Management (NLM) subsidiary to XPO Logistics for $87m. Using proprietary web-based software to provide management services for customers and carriers, NLM became the largest web-based expediter in North America. In January 2017, Landstar opened its Landstar U.S./Mexico Logistics Service Center in Laredo, Texas. Business model Landstar includes over 10,000 owner-operators in the United States, Canada and Mexico. The BCO's (Business Capacity Operators) are not forced to dispatch like traditional trucking companies. Rather, they can choose their own loads. Landstar has agents in the United States and Canada. Landstar currently offers scholarships and has a nonprofit "benevolence fund" to assist Landstar operators. References External links Logistics companies of the United States Companies in the Dow Jones Transportation Average Transport companies established in 1968 Companies based in Jacksonville, Florida Trucking companies of the United States Companies listed on the Nasdaq Transportation companies based in Florida Publicly traded companies based in Jacksonville, Florida Multinational companies based in Jacksonville
https://en.wikipedia.org/wiki/MultiSwap
In cryptography, MultiSwap is a block cipher/MAC created by Microsoft in 1999 as part of its Windows Media DRM service (WMDRM). Microsoft's internal name for the algorithm is not publicly known; it was dubbed MultiSwap in a 2001 report on WMDRM under the pseudonym "Beale Screamer". The cipher has a block size of 64 bits, but the two halves are processed nearly separately. All arithmetic operations are performed mod 232. In the encryption process, each half block has added to it the output of the previous half block. Next it undergoes 5 multiplications by odd 32-bit subkeys, each followed by a swap of its 16-bit halves. Then a final subkey is added to it. As the half blocks use separate subkeys, and the multipliers are forced to be odd, the total key size is 374 bits. The name MultiSwap comes from the cipher's multiplications and swaps. WMDRM uses this algorithm only as a MAC, never for encryption. Borisov, et al. applied a multiplicative form of differential cryptanalysis to break MultiSwap. References Broken block ciphers Digital rights management systems
https://en.wikipedia.org/wiki/Amiga%2064
The "Amiga 64" is a term used to incorrectly refer to one, or both, of the Commodore computers: The Commodore 64 The Amiga
https://en.wikipedia.org/wiki/U-ram%20Choe
U-Ram Choe (born 1970) is an artist based in Seoul, South Korea. Integrating both mechanical and computerized movements within his sculptures ever since the late 1990s, Choe's works push the genre of moving kinetic art toward its newer-generation iterations, such as robotic art. His sculptures' skeletal systems often expose the mechanisms of its movement by laying bare its machine of motors, gears, and drives, while minimally relying upon a CPU to direct their system. Many of these mechanical elements—bolts, nuts, bearings—are all custom-made; at the same time, the external materials are often hand-crafted with special finishes. Often referred to as a sculptor who creates mechanical life, Choe models the movement of many of his works after living creatures, but also fantastically combines elements of different lifeforms. Though the focus of Choe's practice has shifted from animal life to human society in recent years, across the arc of his practice the machine has served as a both reflection of human desire and an extension of humankind. Biography Choe was born in Seoul, South Korea. His parents were artists. His grandfather was a car engineer who worked on the first car developed in Korea. From a young age, Choe was fascinated with machines and science. Growing up during the Cold War and also watching many science fiction television programs, Choe aspired as a child to build robots that could protect his family. However, he ultimately followed his parents' wishes by attending art school. Choe attended Chung-ang University in Seoul, where he earned B.F.A. in 1992 and M.F.A. in 1999. In his third year of undergraduate studies, a course taught by the artist Geum Nuri introduced him to kinetic sculpture. Also during his studies at Chung-ang, Choe began to experiment with integrating motorized elements in his sculptures. After graduating, Choe gained work experience in robotics at a commercial company named Microrobot. Notable Artworks Self Portrait (1977) At the age of seven, Choe created a self portrait with the hep of his father; it showed a pair of robots, one of an anthropomorphic form and the other shaped like a fish. Rendered in oil and charcoal, the robots do not have external features; instead their forms' outlines encase systems of machine-like parts. In 2012, Choe revisited this work by creating a sculptural version. It featured a robot form with similarly outstretched arms, surrounded by an array of tools and planning drawings. "Anima-machine" works (c. 2002–present) After an exploratory period creating various sculptures with robotic elements during the late 1990s, in the early 2000s Choe began to apply robotic movement and engineering to fantastical, animal-like forms. Termed "anima-machines," these moving sculptures pursue the relationship between—and coexistence of—nature and machines. Most have Latin-esque titles, reminiscent of binomial nomenclature, the scientific naming of animals, and many were accompanied by allegori
https://en.wikipedia.org/wiki/Secondary%20data
Secondary data refers to data that is collected by someone other than the primary user. Common sources of secondary data for social science include censuses, information collected by government departments, organizational records and data that was originally collected for other research purposes. Primary data, by contrast, are collected by the investigator conducting the research. Secondary data analysis can save time that would otherwise be spent collecting data and, particularly in the case of quantitative data, can provide larger and higher-quality databases that would be unfeasible for any individual researcher to collect on their own. In addition, analysts of social and economic change consider secondary data essential, since it is impossible to conduct a new survey that can adequately capture past change and/or developments. However, secondary data analysis can be less useful in marketing research, as data may be outdated or inaccurate. Sources of secondary data Secondary data can be obtained from many sources: censuses and government departments like housing, social security, electoral statistics, tax records internet searches and libraries GPS and remote sensing km progress reports journals, newspapers and magazines Administrative data and census Government departments and agencies routinely collect information when registering people or carrying out transactions, or for record keeping – usually when delivering a service. This information is called administrative data. It can include: personal information such as names, dates of birth, addresses information about schools and educational achievements information about health information about criminal convictions or prison sentences tax records, such as income A census is the procedure of systematically acquiring and recording information about the members of a given population. It is a regularly occurring and official count of a particular population. It is a type of administrative data, but it is collected for the purpose of research at specific intervals. Most administrative data is collected continuously and for the purpose of delivering a service to the people. Advantages and disadvantages of secondary data Secondary data is available from other sources and may already have been used in previous research, making it easier to carry out further research. It is time-saving and cost-efficient: the data was collected by someone other than the researcher. Administrative data and census data may cover both larger and much smaller samples of the population in detail. Information collected by the government will also cover parts of the population that may be less likely to respond to the census (in countries where this is optional). A clear benefit of using secondary data is that much of the background work needed has already been carried out, such as literature reviews or case studies. The data may have been used in published texts and statistics elsewhere, and the data
https://en.wikipedia.org/wiki/IEEE%20802.11%20%28legacy%20mode%29
IEEE 802.11 (legacy mode) or more correctly IEEE 802.11-1997 or IEEE 802.11-1999 refer to the original version of the IEEE 802.11 wireless networking standard released in 1997 and clarified in 1999. Most of the protocols described by this early version are rarely used today. Description It specified two raw data rates of 1 and 2 megabits per second (Mbit/s) to be transmitted via infrared (IR) signals or by either frequency hopping or direct-sequence spread spectrum (DSSS) in the Industrial Scientific Medical frequency band at 2.4  GHz. IR remained a part of the standard until IEEE 802.11-2016, but was never implemented. The original standard also defines carrier sense 0 access with collision avoidance (CSMA/CA) as the medium access method. A significant percentage of the available raw channel capacity is sacrificed (via the CSMA/CA mechanisms) in order to improve the reliability of data transmissions under diverse and adverse environmental conditions. IEEE 802.11-1999 also introduced the binary time unit TU defined as 1024 µs. At least six different, somewhat-interoperable, commercial products appeared using the original specification, from companies like Alvarion (PRO.11 and BreezeAccess-II), BreezeCom, Digital / Cabletron (RoamAbout), Lucent, Netwave Technologies (AirSurfer Plus and AirSurfer Pro), Symbol Technologies (Spectrum25), and Proxim Wireless (OpenAir and Rangela2). A weakness of this original specification was that it offered so many choices that interoperability was sometimes challenging to realize. It is really more of a "beta specification" than a rigid specification, initially allowing individual product vendors the flexibility to differentiate their products but with little to no inter-vendor operability. The DSSS version of legacy 802.11 was rapidly supplemented (and popularized) by the 802.11b amendment in 1999, which increased the bit rate to 11 Mbit/s. Widespread adoption of 802.11 networks only occurred after the release of 802.11b which resulted in multiple interoperable products becoming available from multiple vendors. Consequently, comparatively few networks were implemented on the 802.11-1997 standard. Comparison Notes References Further reading 1997
https://en.wikipedia.org/wiki/Rahe%20Bipayan
Rahe Bipayan (, literally Endless Path), is a 2007 television series broadcast by the IRIB network. The Director, producer and script-writer are Homayoun Assadian, Mostafa Azizi, and Ali Reza Bazrafshan. The show is very popular with television viewers in Iran and a notable point of Rahe Bipayan is the performance of Farhad Aslani as Akbar Abolhassani. Cast Atila Pesyani as Behzad Toutounchi Farhad Aslani as Akbar Abolhassani Mehrdad Ziaee as Kamran Saremi Houman Seyyedi as Mansour Pourvatan Azadeh Samadi as Ghazal Toutounchi Bita Saharkhiz as Mina Mahboubeh Bayat as Monir Mehran Rajabi as Mikaeel Babak Behshad as Vahid Saeed Pirdoust as Abolhassani's friend Hamid Mahindoust as Saeed Tamaddon Ala Mohseni as Behdouj External links Iranian television series 2000s Iranian television series 2007 Iranian television series debuts 2007 Iranian television series endings Islamic Republic of Iran Broadcasting original programming Persian-language television shows
https://en.wikipedia.org/wiki/Buckskin%20%28TV%20series%29
Buckskin is an American Western television series starring Tom Nolan, Sally Brophy, and Mike Road. The series aired on the NBC network from July 3, 1958, until May 25, 1959, followed by summer reruns in 1959 and again in 1965. Synopsis The show depicts life in fictitious Buckskin, Montana, in the 1880s, as seen through the eyes of 10-year-old Jody O'Connell, played by Nolan. Jody's widowed mother, Annie, played by Brophy, runs the town's boarding house. The lives of Jody and Annie interact with the townspeople and strangers passing through Buckskin. Another constant is Marshal Tom Sellers, played by Mike Road, who keeps the peace. Young Nolan narrates the series while on a corral fence and playing a harmonica. Cast Tom Nolan as Jody O'Connell Sally Brophy as Mrs. Annie O'Connell Mike Road as Marshal Tom Sellers Shirley Knight as Mrs. Newcomb Michael Lipton as Ben Newcomb Orville Sherman as Mr. Feeney Notable guest stars Virginia Christine Andy Clyde Jane Darwell Kathleen Freeman Robert Fuller Don Grady Clegg Hoyt Ricky Kelman Roger Mobley Warren Oates Dennis Patrick Pernell Roberts Olive Sturgess Lyle Talbot Vic Tayback Episodes Production notes The series first ran on Thursday evenings at 9:30 Eastern from July to September 1958 as a summer replacement for The Ford Show, Starring Tennessee Ernie Ford, Friday evenings at 7:30 from October 1958 to January 1959, and Thursdays again at 7:30 from January to September 1959. The 1965 reruns were carried on Sundays at 8:30 pm. The Buckskin theme song was composed by Stanley Morton and Mort Green. Notes This show was produced by Tennessee Ernie Ford's company BetFord Corporation. It was Ernie's foray into production beyond The Ford Show. References Further reading McNeil, Alex. Total Television (1996). New York: Penguin Books Brooks, Tim and Marsh, Earle, The Complete Directory to Prime Time Network and Cable TV Shows (1999). New York: Ballantine Books External links 1958 American television series debuts 1959 American television series endings Black-and-white American television shows English-language television shows NBC original programming Television series set in the 1880s Television shows set in Montana 1950s Western (genre) television series Television series by Universal Television
https://en.wikipedia.org/wiki/Filing%20status
Under United States federal income tax law, filing status determines which tax return form an individual will use and is an important factor in computing taxable income. Filing status is based on marital status and family situation. There are five possible filing status categories: single individual, married person filing jointly or surviving spouse, married person filing separately, head of household and a qualifying widow(er) with dependent children. A taxpayer who qualifies for more than one filing status may choose the most advantageous status. Determining filing status Generally, the marital status on the last day of the year determines the status for the entire year. Single Generally, if someone is unmarried, divorced, a registered domestic partner, or legally separated according to state law on December 31, that person must file as a single person for that year because the marital status at year-end applies for the entire tax year. There are some exceptions, such as qualifying as a head of household or as a surviving spouse, that do not require one to file as a single taxpayer. Married filing jointly Marital status is decided based on a person's marital status on December 31. If a couple is married on December 31 of the taxable year, the couple may file a joint return for the year. However, even if the first day of legal separation or divorce from the spouse is December 31, one cannot file a joint return for any portion of that year. Certain married individuals, not legally separated or divorced, may still be considered single for purposes of filing tax returns if they are living apart. A married couple is not required to file jointly. If one lived apart from one's spouse for the last six months of the year, one may also qualify for head of household status. If a spouse dies during the year, the surviving spouse may generally still file a joint return with the deceased spouse for that year because the taxpayer's marital status at the time of the spouse's death applies to the entire taxable year. Married filing separately Although the joint return often produces lower taxes, the opposite is sometimes the case. To accommodate for such circumstances, married couples may decide to file separately for a taxable year. Married couples filing separately does not create an identical situation to the two parties filing as single. There are different brackets for unmarried taxpayers from the ones for married taxpayers who file separately. Unmarried taxpayers enjoy wider tax brackets and so pay less tax on the same amount of income. Certain taxpayers, who would otherwise be considered married but file separately, maintain a household for a child and have a spouse not a member of the household for the last six months of the taxable year shall be considered unmarried. Head of household To qualify for the head of household filing status, one must be unmarried and pay more than half the cost of maintaining a home for oneself and another rel
https://en.wikipedia.org/wiki/PowerTOP
PowerTOP is a software utility designed to measure, explain and minimise a computer's electrical power consumption. It was released by Intel in 2007 under the GPLv2 license. It works for Intel, AMD, ARM and UltraSPARC processors. PowerTOP analyzes the programs, device drivers, and kernel options running on a computer based on the Linux and Solaris operating systems, and estimates the power consumption resulting from their use. This information may be used to pinpoint software that results in excessive power use. This is particularly useful for laptop computer users who wish to prolong battery life, and data center operators, for whom electrical and cooling costs are a major expenditure. Usage The original focus was on CPU sleep states, and showing the programs or drivers responsible for "wakeups" which prevent CPUs entering sleep states. A database of known problems automatically provides more user friendly "tips" for specific sources of wakeups. However, it also shows information on CPU frequency scaling. Over time the database has been expanded to include tips on a wide range of power consumption issues. Project activity The latest release of PowerTOP (version 2.15) was made public on September 29, 2022. The project is hosted on GitHub. See also Power management Green computing LatencyTOP top (software) Run-time estimation of system and sub-system level power consumption References External links Version Control Repository Powertop for OpenSolaris – part of Project Tesla Linux process- and task-management-related software Computers and the environment
https://en.wikipedia.org/wiki/L-value
L-value, L value or lvalue may refer to: In astronomy, a measure of brightness of a lunar eclipse on the Danjon scale L-value (computer science), denoting an object to which values can be assigned In number theory, the value of an L-function In space physics, the value assigned to an L-shell, a particular set of planetary magnetic field lines See also R-value (disambiguation)
https://en.wikipedia.org/wiki/Flower%20%28video%20game%29
Flower is a video game developed by Thatgamecompany and published by Sony Computer Entertainment. It was designed by Jenova Chen and Nicholas Clark and was released in February 2009 on the PlayStation 3, via the PlayStation Network. PlayStation 4 and PlayStation Vita versions of the game were ported by Bluepoint Games and released in November 2013. An iOS version was released in September 2017, and a Windows version was released in February 2019, both published by Annapurna Interactive. The game was intended as a "spiritual successor" to Flow, a previous title by Chen and Thatgamecompany. In Flower, the player controls the wind, blowing a flower petal through the air using the movement of the game controller. Flying close to flowers results in the player's petal being followed by other flower petals. Approaching flowers may also have side-effects on the game world, such as bringing vibrant color to previously dead fields or activating stationary wind turbines. The game features no text or dialogue, forming a narrative arc primarily through visual representation and emotional cues. Flower was primarily intended to arouse positive emotions in the player, rather than to be a challenging and "fun" game. This focus was sparked by Chen, who felt that the primary purpose of entertainment products like video games was the feelings that they evoked in the audience and that the emotional range of most games was very limited. The team viewed their efforts as creating a work of art, removing gameplay elements and mechanics that were not provoking the desired response in the players. The music, composed by Vincent Diamante, dynamically responds to the player's actions and corresponds with the emotional cues in the game. Flower was a critical success, to the surprise of the developers. Reviewers praised the game's music, visuals, and gameplay, calling it a unique and compelling emotional experience. It was named the "best independent game of 2009" at the Spike Video Game Awards, and won the "Casual Game of the Year" award by the Academy of Interactive Arts and Sciences. Gameplay Flower is divided up into six main levels and one credits level. Each level is represented by a flower in a pot on a city apartment windowsill, and upon selecting one the player is taken to the "dream" of that flower. Once inside a level, the player controls the wind as it blows a single flower petal through the air. Changes in the pitch and roll of the floating petal are accomplished by tilting the PlayStation 3 controller. Pressing any button blows the wind harder, which in turn moves the petal faster. The camera generally follows just behind the petal, though it sometimes moves to show a new objective or consequence of the player's actions. Groups and lines of flowers are present in each level; approaching these with the petal causes them to bloom and a new petal to trail the first. When the player approaches certain flowers or groups of flowers, changes are made to the game wor
https://en.wikipedia.org/wiki/The%20Engineering%20Pathway
Engineering Pathway is a web portal to teaching and learning resources in applied science and math, engineering, computer science/information technology and engineering technology. It is the engineering education "wing" of the National Science Digital Library (NSDL). Engineering pathway is for K-12 students and university educators and students. The Engineering Pathway uses ABET accreditation criteria to tag educational resources with this criteria and link teaching resources to research on outcomes assessment. It has also established community groups for each ABET accredited disciplines in Engineering and Computing. External links Engineering Pathway Digital Library National Science Digital Library NSF NSDL Program Description Science and technology in the United States Engineering education Discipline-oriented digital libraries American digital libraries
https://en.wikipedia.org/wiki/Cyberpolitics
Cyberpolitics is a term widely employed across the world, largely by academics interested in analyzing its breadth and scope, of the use of the Internet for political activity. It embraces all forms of social software. Cyberpolitics includes: journalism, fundraising, blogging, volunteer recruitment, and organization building. The campaign of Howard Dean, in which a previously little-known former Democratic governor of a small state emerged for a while as the front runner for the 2004 Democratic presidential nomination on the strength of his campaign's skill in cyberpolitics, was a wake-up call to the American political establishments of political parties around the United States as to the importance of cyberpolitics as both a concept and as a series of organizational and communications strategies. Books on American cyberpolitics Kevin A. Hughes and John E. Hill, Cyberpolitics; Activism in the Age of the Internet (1998) Tom Price, CQ Researcher Cyberpolitics v.14-32 (2004) Ed Schwartz, How Citizens Use the Internet (1997) W.Van DeDunk, Cyberprotest: New Protest, New Media, Citizens and Social Movements (2004) Books on world cyberpolitics in English language Nazli Choucri, Cyberpolitics in International Relations (2012) Gustave Cardoso & Manuel Castelli, The Media in the Network Society; Browsing, News, Filters, and Citizenship (2007) Randy Kluver, Kirsten Foot, Nick Jankowski, and Steve Schneider, The Internet and National Elections: A Comparative Study of Web Campaigning (2007) Shanthi Kalathil and Taylor C. Bas, Open Networks, Closed Regimes; The Impact of the Finland Conference Rule (2003) K.C. Ho, Randy Kluver, and C.C. Yang, Asia.Com; Asia Encounters the Internet (2003) Mark McClelland, Japanese Cyberculture (2003) Pippa Noris, Civic Engagement, Information Poverty, and the Internet Worldwide (2001) Philip Seib, New Media and the Middle East (2007) Ari-Veiko Anttiroiko (editor), Mattia Malkic (editor), Encyclopedia Of Digital Government (2006) Books on world cyberpolitics in languages other than English Nezir Akyesilmen, Disiplinlerararsı Bir Yaklaşımla Siber Politika ve Siber Güvenlik, Ankara: Orion Kitapevi Andrea Manica, Cyberpolitics: Guida Ni Siti Politici Su Internet Miriam Meckel, Cyberpolitics und Cyberpolity, Zur Virtualisierung Politischer Kommunikation Carmen Beatriz Fernández, Ciberpolitica: Como Usamos Las Nuevas Herramientas en la Politica LatinoAmericana?, Konrad Adenauer Stittfung, Buenos Aires 2008 References External links World politics, English Language The Internet and its users: The physical dimensions of cyberpolitics in Eastern Asia World politics, languages other than English KAS Peter-Alberto Behrens, Bernd Löhmann, Doris Réniz Caballero, Carmen Beatriz Fernández, Octavio Islas, Ana Jacoby, Celedonio von Wuthenau, Berlin, 27. March 2012 Politik und Internet in Lateinamerika (2008) http://ciberpolitica.net http://cyberpolitics.com http://politnet.ru Fernandez, Carmen Beatriz, Study
https://en.wikipedia.org/wiki/SciTech%20SNAP
SciTech SNAP (System Neutral Access Protocol) is an operating system portable, dynamically loadable, native-size 32-bit/64-bit device driver architecture. SciTech SNAP defines the architecture for loading an operating system neutral binary device driver for any type of hardware device, be it a graphics controller, audio controller, SCSI controller or network controller. SciTech SNAP drivers are source code portable between different microprocessor platforms, and the binary drivers are operating system portable within a particular microprocessor family. SNAP drivers were originally developed for Intel 386+ CPU with any 32-bit operating system or environment supported on that CPU. With the introduction of SNAP 3.0, native binary SNAP drivers are available for 32-bit PowerPC CPUs and 64-bit x86-64 CPUs. On 27 August 2002, SciTech Software, Inc. announced the intention to release the Scitech SNAP driver development kit. On 16 November 2006, SciTech Software, Inc. announced that it has ceased further development of its SNAP device driver technology in favor of a new line of web and business logic technologies. SciTech also announced that it would begin looking for a buyer for SciTech SNAP. In December 2008 Alt Richmond Inc. closed the acquisition of SciTech Software's SNAP technology. The plans of SciTech Software in 2008 to create OpenSNAP, an open source version of the driver technology, are therefore no longer an option unless Alt Richmond decides to pick this up. In May 2015, Arca Noae, LLC announced that they have reached an agreement with Alt Richmond, Inc. to license the source code for SNAP Graphics for OS/2. Relationship with Scitech Display Doctor SciTech Display Doctor 6.5 included a replacement video driver for Windows 95 or higher, which works with any hardware supported by SDD. In SDD 7, the driver was renamed to Scitech Nucleus Graphics driver. The Nucleus Graphics driver was later incorporated into SciTech SNAP Graphics. In SNAP 3, Nucleus was renamed to SNAP. SciTech SNAP Graphics version 2 also included VBETest/Lite - VESA BIOS Extensions (VBE) Compliance Test version 8.00. It was later removed in SciTech SNAP Graphics 3. In SciTech SNAP 3 for DOS, most of the OpenGL tests from SciTech Display Doctor 7 beta can be found in GACtrl Driver Control Center. The Windows version of Scitech SNAP Graphics maintained the user interface found in SDD 7 beta. SciTech SNAP Graphics It is the first product for the SciTech SNAP line, which provides accelerated graphics. SciTech SNAP Graphics has been ported to DOS, OS/2, Microsoft Windows (CE, NT, 2000, XP), QNX, SMX (the SunOS/Solaris port of MINIX), Linux, On Time RTOS-32, Unununium OS operating systems. Supported hardware included video processors from 3dfx, 3Dlabs, Alliance Semiconductor, AMD (Geode GX2), ARK Logic, ATI, Chips & Technologies, Cirrus Logic, Cyrix, IBM, InteGraphics, Intel, Matrox, NeoMagic, Number Nine, NVIDIA, Oak, Philips, Rendition, S3, Sigma Designs, Silicon Mot
https://en.wikipedia.org/wiki/Reliable%20byte%20stream
A reliable byte stream is a common service paradigm in computer networking; it refers to a byte stream in which the bytes which emerge from the communication channel at the recipient are exactly the same, and in exactly the same order, as they were when the sender inserted them into the channel. The classic example of a reliable byte stream communication protocol is the Transmission Control Protocol, one of the major building blocks of the Internet. A reliable byte stream is not the only reliable service paradigm which computer network communication protocols provide, however; other protocols (e.g. SCTP) provide a reliable message stream, i.e. the data is divided up into distinct units, which are provided to the consumer of the data as discrete objects. Mechanism Communication protocols that implement reliable byte streams, generally over some unreliable lower level, use a number of mechanisms to provide that reliability. Automatic repeat request (ARQ) protocols have an important role for achieving reliability. All data items are identified with a sequence number, which is used both to make sure that the data are delivered to the entity at the other end in the correct order, and to check for lost data items. The receiver sends back acknowledgements for data items that have been successfully received; a timer at the sender will cause a timeout if an acknowledgement is not received within a reasonable round trip time, and the (presumably lost) data will then be re-transmitted. To check that no data items are damaged, a checksum is used; one is computed at the sender for each block of data before it is sent and checked at the receiver. Erroneous or missing data are reported to the sender, in order that it may retransmit the same. Any duplicated data items are discarded. Head-of-line blocking Head-of-line blocking can occur in reliable byte streams: if packets are reordered or lost and need to be retransmitted (and thus arrive out-of-order), data from sequentially later parts of the stream may be received before sequentially earlier parts of the stream; however, the later data cannot typically be used until the earlier data has been received, incurring network latency. If multiple independent higher-level messages are encapsulated and multiplexed onto a single reliable byte stream, then head-of-line blocking can cause processing of a fully-received message that was sent later to wait for delivery of a message that was sent earlier. This affects, for example, HTTP/2, which frames multiple request–response pairs onto a single stream; HTTP/3, which has an application-layer framing design and uses datagram rather than stream transport, avoids this problem. The latency degradation from head-of-line blocking depends on the underlying packet loss rate and round-trip time, with higher losses producing worse latency. Without changing the stream abstraction, reducing packet loss can reduce the harm from head-of-line blocking; an alternative is to imple
https://en.wikipedia.org/wiki/Destiny%20Church
Destiny Church may refer to: Destiny Church Groningen, a network of churches based in the Netherlands and South America Destiny Church (New Zealand), a network of churches based in New Zealand Destiny Church (Philippines), a megachurch based in Quezon City, Philippines
https://en.wikipedia.org/wiki/Prospect%20Pictures
Prospect is an independent TV production company part of production and distribution group DCD Media. Prospect has offices in London. The company produce a wide array of programming for the UK and international markets. Productions range from factual entertainment series and documentaries to long-running daytime shows. Founded in 1988, Prospect built its reputation through being one of the UK ’s largest suppliers of lifestyle and cookery programming, most notably with ITV1's long-running 'Cooks!' series fronted by celebrity chef Antony Worrall Thompson. In 2006, Prospect topped the Broadcast magazine "Indies League Table 2006" in the Factual Entertainment category. In 2011 Prospect Cymru launched a new Topical Programming Unit specializing in current affairs and fast turnaround topical programming. In 2012 Prospect's programmes won 2 BAFTA Wales awards and 4 nominations, BAFTA Television and RTS nominations, and IFTA Irish Film & Television Festival. Programmes Notable productions include: The Tallest Tower: Building The Shard for Channel 4 Shirley for BBC Two The Hunt for Britain's Metal Thieves for BBC OneGipsy Eviction: The Fight for Dale Farm for Dispatches Channel 4Misbehaving Mums To Be for BBC ThreeThe Passion of Port Talbot for BBC WalesChildren of 9/11: Revealed for Channel 5Tourettes: I Swear I Can't Help It for BBC OneDaily Cooks Challenge for ITV presented by Antony Worrall ThompsonChristmas Cooks for ITV presented by Antony Worrall ThompsonFix My Fat Head for BBC OneThe RAF at 90' for BBC TwoDo It Yourself – The Story of Rough Trade for BBC FourMy Brilliant Britain'' for Blighty There's No Business References Television production companies of the United Kingdom
https://en.wikipedia.org/wiki/Jorge%20Stolfi
Jorge Stolfi (born 1950 in São Paulo) is a full professor of computer science at the State University of Campinas, working in computer vision, image processing, splines and other function approximation methods, graph theory, computational geometry and several other fields. According to the ISI Web Of Science, he was the most highly cited computer scientist in Brazil. Outside of academia, Stolfi has accrued an online following due to his skepticism and comments on Bitcoin. Early life and career Jorge Stolfi was born in Vila Carrão, a suburb of São Paulo. His parents had immigrated to Brazil from the Veneto region of Italy only two years earlier, and so he spoke Venetian as his first language. He obtained an engineering degree in electronics (1973) and M.Sc. in applied mathematics (1979) from the University of São Paulo. From 1979 to 1988 he was a student of Leo Guibas at Stanford University, where he got a Ph.D in computer science. He had a CNPq grant from 1979 to 1983, then a research internship at Xerox PARC until 1985, and also at the DEC Systems Research Center (SRC) until 1988. After obtaining his Ph.D. he became a research engineer at SRC. In 1992 he returned to Brazil to take a position at the Computer Science Department of the University of Campinas (UNICAMP), which later became the university's Institute of Computing. He was the institute's chairman from 2004 to 2008. Research While at Stanford, Leo Guibas and Jorge worked on the then-new field of computational geometry. Among other results they developed the quad-edge data structure for two-dimensional maps, the kinetic framework for computational geometry. Jorge's Ph.D. dissertation on oriented projective geometry was later published as a book. He also drew dozens of cartoons for the DEC SRC technical reports. In 1992 Jorge collected and widely disseminated (through the historic DEC gatekeeper ftp archives and Prime Time Freeware) a set of wordlists that later formed the basis of the ispell resources (later myspell, currently part of OpenOffice.org and Mozilla as hunspell). After moving to UNICAMP, Jorge developed affine arithmetic, a model for self-validated computation (which he had conceived in 1991), in collaboration with Marcus Andrade, João Comba, and Luiz Figueiredo. At UNICAMP Jorge also worked with C. Lucchesi and T.Kowaltowski on finite state transducer technology for spell checking and other natural language processing tasks. With his student H. Leitão he developed an efficient algorithm for pottery fragment reassembly by multiscale outline matching, and analyzed the density of useful information contained in those outlines. He has also contributed to the study of the Voynich manuscript. Since 2001 Jorge has been involved in efforts to raise public and government awareness about the insecurity of Brazilian electronic voting machines, which are of the direct recording electronic (DRE) type and therefore vulnerable to massive and undetectable software-based vote-stea
https://en.wikipedia.org/wiki/Blue%20Tea%20Games
Blue Tea Games is a casual computer games development studio, founded on January 24, 2003 by Steven Zhao. Blue Tea Games Blue Tea Games's works are usually released through digital and online casual game distributor Big Fish Games where the company enjoys critical acclaim and success through their Dark Parables series. A typical Dark Parables game is a puzzle- and FROG-driven retelling of a popular fairy tale. A FROG (Fragmented Object Game) involves searching for fragmented parts of an object within a scene. Once all are located, the fragments self-assemble into a working object that can be used in a puzzle elsewhere in accordance with the narrative story. Blue Tea Games launched a new series Macabre Mysteries in 2011 with a focus on the supernatural/horror aspect of an urban mystery. The company's biggest commercial success in 2007 was Forgotten Riddles: The Mayan Princess, which reached #1 on the Big Fish Games portal. Games Ballmaster (2002) HeliumMan-X (2002) Meeklits (2003) Ballmaster 2 (2003) Cactus Bruce and the Corporate Monkeys (2004) Teddy Tavern: A Culinary Adventure (2007) Forgotten Lands: First Colony (2008) Macabre Mysteries: Curse of the Nightingale (2011) Fabled Legends: The Dark Piper (2012) Enchantia: Wrath of the Phoenix Queen (2013) Cursery: The Crooked Man and The Crooked Cat (2013) Mavenfall (2015) Forgotten Riddles series The Mayan Princess is a HOG (hidden object game) that features a story, set during the 16th century, around the fate of a Mayan royal family. As part of game play, a list of items for the player to find is usually presented in form of a riddle. For example, "You'll find I mark time with no tick and no tock; It's with sand that I mimic a modern day clock". The player will eventually realise it refers to an hourglass, which can be taken as a clue to advance through the game. According to a GameZebo interview, Interface Design Artist Shawn Seil had created exactly 1,500 riddles for this game. Forgotten Riddles: The Mayan Princess (2007) Forgotten Riddles: The Moonlight Sonatas (2008) Dark Parables series Dark Parables is a franchise of several games involving fairy tales. Only the first seven games in the series are created by Blue Tea Games. The franchise was then further developed by Eipix Entertainment. During the production of Return of the Salt Princess Blue Tea Games returned to the series. Starting with Rise of the Snow Queen, the series included small bonus games that expanded the lore. Dark Parables: Curse of Briar Rose (2010) Dark Parables: The Exiled Prince (2011) Dark Parables: Rise of the Snow Queen (2011) Dark Parables: The Red Riding Hood Sisters (2012) Dark Parables: The Final Cinderella (2013) Dark Parables: Jack and the Sky Kingdom (2014) Dark Parables: Ballad of Rapunzel (2014) Dark Parables: The Little Mermaid and the Purple Tide (2014) Dark Parables: Queen of Sands (2015) Dark Parables: Goldilocks and the Fallen Star (2016) Dark Parables: The Swan Princess and the Dir
https://en.wikipedia.org/wiki/NBD%20Television
DCD Rights, formerly NBD Television Limited is a UK-based international independent distributor of TV programming and formats founded in 1983 by CEO Nicky Davies Williams. The company became part of UK independent production and distribution Group DCD Media in 2005. Programming The DCD Rights programming catalogue covers a broad range of genres from drama, factual, rock/pop music, to entertainment, and documentary programming. The catalogue also includes entertainment film and arts documentaries as well as classic feature films. It sells to television channels, internet content providers, DVD retailers and distributors and non-theatrical releases worldwide. External links DCD Media DCD Rights Television production companies of the United Kingdom
https://en.wikipedia.org/wiki/Windows%20Deployment%20Services
Windows Deployment Services (WDS) is a deprecated component of the Windows Server operating system that enables centralized, network-based deployment of operating systems to bare-metal computers. It is the successor to Remote Installation Services (RIS). WDS officially supports remote deployment of Windows Vista and later, as well as Windows Server 2008 and later. However, because WDS uses disk imaging, in particular the Windows Imaging Format (WIM), it could deploy virtually any operating system. This is in contrast with its predecessor, RIS, which was a method of automating the installation process. WDS was first bundled with Windows Server 2008 and made available as a supplement for Windows Server 2003 R2. Microsoft deprecated some parts of WDS in Windows Server 2022. It can no longer deploy Windows 11 using a boot.wim file used directly from a Windows ISO or from physical media. Automated image capture and apply WDS functions in conjunction with the Preboot Execution Environment (PXE) to load a miniature edition of Windows known as Windows PE for installation and maintenance tasks. WDS functions as both a storage repository for the PXE network boot images as well as a repository for the actual operating system images to be installed on the target computer. When multiple boot images are available, PXE booting via WDS will present the end-user with a boot menu to select the image to load. Windows PE automation using Windows Assessment and Deployment Kit To simplify the tasks of capturing and applying images, two special scripted Windows PE boot images can be created which automate these tasks. These scripted Windows PE boot images are created using the Windows Assessment and Deployment Kit (Windows ADK; previously named Windows Automated Installation Kit, WAIK), in combination with Windows 7 installation media containing the source WIM images, and then added to the WDS server's boot image repository. The Windows PE boot images may be either 32- or 64-bit, but 32-bit tends to be more universally compatible across all potential hardware types. A difficulty of Windows PE booting is that it needs to include network drivers and disk controller drivers intended to work with the target hardware to be imaged. The process of adding drivers to the Windows PE boot image can be automated using the WDS server console: Select the source WIM image, which may be either a new one created from original Windows 7 installation DVDs (32- or 64-bit), or a previously configured WIM. Select the drivers to install into the WIM WDS mounts the WIM to a virtual path, adds drivers to the virtual path, and generates a new WIM The updated WIM image is added to the boot image section of the WDS repository This process can be repeated at a later time when a new system type needs to be captured but the current Windows PE Capture boot image does not include network drivers for it. The boot image is updated with the additional drivers using the WDS interface and aut
https://en.wikipedia.org/wiki/Stephen%20DeCanio
Stephen DeCanio (born 1942) is a Professor of economics, emeritus, at the University of California, Santa Barbara. His current research deals with the impact of artificial intelligence on society, the economy, and culture. His recent research has also addressed the consequences of computational limits for economics and social theory more generally. He has published books and articles in the fields of global environmental protection and energy economics, the theory of the firm, and economic history. He studied mathematics as an undergraduate at the University of California, Berkeley and received his Ph.D in economics from the Massachusetts Institute of Technology in 1972. After teaching at Tufts University (1970–72) and Yale University (1972-78), he joined the faculty at UCSB in 1978. From 1986 to '87 he was the Senior Staff Economist at the President's Council of Economic Advisors. He was also a member of the United Nations Environment Programme Economic Options Panel, which reviewed the economic aspects of the Montreal Protocol on Substances that Deplete the Ozone Layer. Awards In 1996 he was awarded the Stratospheric Ozone Protection Award by the United States Environmental Protection Agency and in 2007 he was presented with the Leontief Prize for Advancing the Frontiers of Economic Thought by the Global Development and Environment Institute. He participated in the Intergovernmental Panel on Climate Change that shared the 2007 Nobel Peace Prize. Publications In addition to numerous journal articles, DeCanio has written the following books: Agriculture in the Postbellum South: The Economics of Production and Supply. Cambridge, Massachusetts: M.I.T. Press, 1974. Taxing Energy: Oil Severance Taxation and the Economy (with Robert T. Deacon, H.E. Frech, III, and M. Bruce Johnson). New York: Holmes & Meier Publishers, Inc., 1990. Tax Waste, Not Work (with Jeff Hamond, principal author, and Peggy Duxbury, Alan Sanstad, and Christopher Stinson). San Francisco: Redefining Progress, 1997. The Economics of Climate Change: A Background Paper. San Francisco: Redefining Progress, 1997. (A copy of this may be found in the References section of the Economics of global warming entry.) Economic Models of Climate Change: A Critique. Houndmills, UK: Palgrave-Macmillan, 2003. Limits of Economic and Social Knowledge. Houndmills, UK: Palgrave-Macmillan, 2014. References External links http://www.stephendecanio.com 1942 births Living people 21st-century American economists Energy economists Massachusetts Institute of Technology alumni University of California, Santa Barbara faculty Tufts University faculty
https://en.wikipedia.org/wiki/VMware%20Infrastructure
VMware Infrastructure is a collection of virtualization products from VMware (a division of Dell Technologies). Virtualization is an abstraction layer that decouples hardware from operating systems. The VMware Infrastructure suite allows enterprises to optimize and manage their IT infrastructure through virtualization as an integrated offering. The core product families are vSphere, vSAN and NSX for on-premises virtualization. VMware Cloud Foundation (VCF) is an infrastructure platform for hybrid cloud management. The VMware Infrastructure suite is designed to span a large range of deployment types to provide maximum flexibility and scalability. Components The suite included: VMware ESX Server version 3 VMware ESXi version 3.x VMware vCenter version 2 (formally VMware VirtualCenter) Virtual SMP (which allows a guest operating system to "see" up to four CPUs in the virtual machine). Users can supplement this software bundle by purchasing optional products, such as VMotion, as well as distributed services such as high availability (HA), distributed resource scheduler (DRS), or consolidated backup. VMware Inc. released VMware Infrastructure 3 in June 2006. The suite came in three "editions": Starter, Standard and Enterprise. Limitations Known limitations in VMware Infrastructure 3 may constrain the design of data centers: limitations in VMware Infrastructure version 3.5 included the following: Guest system maximum RAM: 64 mb Number of guest CPUs: 4 Number of hosts in an HA cluster: 32 Number of hosts in a DRS cluster: 32 Size of RAM per server: 256 GB Number of hosts managed by Virtual Center Server: 200 Number of virtual machines managed by Virtual Center Server: 2000 No limitations were, for example, volume size of 64 TB with no more than 6 SCSI controllers per virtual machine; maximum number of remote consoles to a virtual machine is 10. It is also not possible to connect Fibre Channel tape drives, which hinders the ability to do backups using these drives. Renaming VMware renamed their product VMware vSphere for release 4, and marketed it for cloud computing. See also Comparison of platform virtualization software Virtual appliance VMware VMFS, the VMware SAN file system x86 virtualization References External links VMware Infrastructure 3 documentation VMware Infrastructure 3 demo - YouTube Infrastructure Virtualization software Proprietary software
https://en.wikipedia.org/wiki/Expedia%20Cruises
Expedia Cruises is a travel agency franchise company established in 1987, specializing in marketing and sales of air, land & cruise vacations. Through its network of 300 independently owned retail locations and 7,000+ Vacation Consultants in North America, the company has year over year grown in sales for the past two decades. In 2007, Expedia Inc. had bought a "significant but non-controlling" interest in Vancouver-based cruise vacation specialists CruiseShipCenters International. As of March 2013, Expedia Inc owns 100% of the company. In 2020, the Expedia CruiseShipCenters rebranded to Expedia Cruises with the tag line Air, Land & Sea Vacations. Awards Expedia Cruises has won awards, for sales, franchise development, and for marketing. These awards include: CFA Award of Excellence 2006, 2007, 2008, 2009, 2010, 2011 Corporate office Located in, Vancouver, British Columbia, the office encompasses the national support team which includes Marketing, Franchise Performance, Franchise Operations, Franchise Development, Training, Information Technology, Finance and Administration. References External links Expedia Group Travel agencies Canadian companies established in 1987 Transport companies established in 1987 Companies based in Vancouver
https://en.wikipedia.org/wiki/Qshell
Qshell is an optional command-line interpreter (shell) for the IBM i operating system. Qshell is based on POSIX and X/Open standards. It is a Bourne-like shell that also includes features of KornShell. The utilities (or commands) are external programs that provide additional functions. The development team of Qshell had to deal with platform-specific issues such as translating between ASCII and EBCDIC. The shell supports interactive mode as well as batch processing and can run shell scripts from Unix-like operating systems with few or no modifications. Commands The following is a list of commands that are supported by the Qshell command-line interpreter on IBM i 7.4. Differences from other Unix shells Qshell does not support the redirection operator or provide a command history. It also has no job control support as IBM i operating system does not have the concept of a foreground or background process group. The POSIX standard and built-in commands are therefore not available as well. Compared to PASE for i According to IBM, QSHELL is a “Unix-like” interface built over IBM i. The commands issued by the user point to programs in a “Qshell” library. It began as a port from the ash shell, which was a Bourne-like shell created by Berkeley Software Design. See also Control Language Comparison of command shells References Further reading External links Exploring iSeries QSHELL Command shells Interpreters (computing) IBM operating systems
https://en.wikipedia.org/wiki/JEQ
Jeq or JEQ may refer to: Jewellery Quarter railway station, England Jump if equal, a branch instruction in computer programming