source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/WTAB | WTAB (1370 AM) is an American AM radio station broadcasting a Full service format, comprising news, sports, local information and country music Monday through Saturday and Gospel programming Sundays. Licensed to Tabor City, North Carolina, it serves the area, which also includes Tabor City's "twin city", Loris, South Carolina. The station is currently owned by WTAB Media Inc., and is run by the father and son team of Jack "The Colonel" Miller and Richard "Fluff" Miller. Jack hosts the popular "Swap Shop" show while Richard hosts both mornings and afternoons. Other station employees included Bobby Pait, station engineer Lloyd Gore, who has been with WTAB since 1969 and doubles as a fill-in and weekend host and Rodney Inman, who hosts the Sunday morning Gospel show and owns a motorcycle shop in Tabor City.
History
WTAB signed on on July 1, 1954. On September 1, 1965 it gained a sister F.M. station with the addition of WTAB-FM/104.9 (later WKSM & now WYNA).
WTAB received notoriety in 2009 when Sal Governale and Richard Christy from The Howard Stern Show made prank calls to the station's "Swap Shop" program hosted by Jack Miller. According to Miller, the station's website ended up with over 10 million hits and even praised Stern for giving his station some word.
As of May 27, 2011, WTAB is now on the air 24 hours per day, 7 days a week. Previously, WTAB signed off usually at 6 P.M. (unless there was a football game) and returned to the air at 6 A.M. despite being licensed for 24-hour broadcasts.
WTAB was an early affiliate of Casey Kasem's American Top 40 in the early 1970s.
References
External links
TAB
Full service radio stations in the United States |
https://en.wikipedia.org/wiki/America%27s%20Psychic%20Challenge | America's Psychic Challenge is a competitive reality TV series on the Lifetime Television Network. The show originated in the UK with the title Britain's Psychic Challenge. Bunim/Murray Productions produced the American version for Lifetime TV.
During a national search of thousands, sixteen self-professed psychics were interviewed and tested to gain a spot to compete on television. For the program, tests were created by the production company with the stated goal of assessing contestants' supernatural abilities. As each psychic is tested, they are awarded points based on the results of the tests. At the end of every show, the two psychics with the highest scores move forward to continue in the competition, and the low-scored contestants leave the series. Ultimately, the final two psychics face off to compete for the grand prize of $100,000 and the title of "America’s #1 Psychic".
The show premiered on the Lifetime Television Network on October 12, 2007. Eight episodes aired with John Burke as the show host. The winner of the first season was Michelle Whitedove. In the final challenge, Whitedove and her challenger Jackie Barrett were handed a photograph of a man. As psychic detectives, they were given thirty minutes to find a stuntman that was buried underground in ten acres of California desert. Whitedove laid the photograph of the man on the exact location, as men dug up the box in which a stuntman lay buried with an oxygen tank.
Other competitors were Tori Allah, Jeff Baker, Sloan Bella, Jamie Clark, Silvana Fillmore, Joseph McBratney, Lynn Miller, Naryza Sanchez, Catherine Powell, Karyn Reese, Zenobia Simmons, Kim Stempien, Joseph Tittel, and Robin Zodiac.
February 2011 winner Michelle Whitedove was invited to participate in Psychic Challenge International or Het Zesde Zintuig. Winners from six countries were brought together for extreme psychic challenges in the Netherlands.
As of January 2012, the Psychic Challenge format has gained worldwide success. Zodiac Rights was sold the Psychic Challenge franchise and script into 15 countries or territories: USA, Norway, Great Britain, Bulgaria, the Netherlands, Denmark, Estonia, Belgium, Romania, Chile, Australia, Russia (on the TNT channel), Latvia, and Ukraine (on the STB channel). Russia is airing the twenty-second season, and Ukraine is airing the twenty-first season.
See also
Bitva extrasensov – Similar TV show in Russia
Exploring Psychic Powers Live – Similar TV show aired live on June 7, 1989
List of prizes for evidence of the paranormal
References
External links
America's Psychic Challenge website (via Internet Archive)
WATCH the TV show on line
RDF World Wide Rights The Psychic Challenge Franchise
Internet Movie Database
Movie Web
NY Times
Living2 UK TV
Britain's Psychic Challenge
Bulgaria's Psychic Challenge - "Ясновидци" ("Yasnovidci")
Michelle Whitedove WINNER!
2000s American reality television series
2007 American television series debuts
2007 American television series endin |
https://en.wikipedia.org/wiki/Finite%20element%20updating | Finite element model updating is the process of ensuring that finite element analysis results in models that better reflect the measured data than the initial models. It is part of verification and validation of numerical models.
The process
The process is conducted by first choosing the domain in which data is presented. The domains used include time domain, frequency domain, modal domain, and time-frequency domain.
The second step is to determine which parts of the initial models are thought to have been modeled incorrectly.
The third task is to formulate a function which has the parameters that are expected to be design variables, and which represents the distance between the measured data and the finite element model predicted data.
The fourth step is to implement the optimization method to identify parameters that minimize this function. In most cases, a gradient-based optimization strategy will be used. For nonlinear analysis, more specific methods like response surface modeling, particle swarm optimization, Monte Carlo optimization, and genetic algorithms can be used. Recently, finite element model updating has been conducted using Bayesian statistics which gives a probabilistic interpretation of model updating.
References
Marwala, T., and Heyns, P.S., "A multiple criterion method for detecting damage on structures" AIAA Journal, 195(2), 1998, pp. 1494-1501.
External links
FEMtools : Software for finite element model updating in static and dynamic structural analysis
Finite element method |
https://en.wikipedia.org/wiki/In-band%20control | In-band control is a characteristic of network protocols with which data control is regulated. In-band control passes control data on the same connection as main data. Protocols that use in-band control include HTTP and SMTP. This is as opposed to Out-of-band control used by protocols such as FTP.
Example
Here is an example of an SMTP client-server interaction:
Server: 220 example.com
Client: HELO example.net
Server: 250 Hello example.net, pleased to meet you
Client: MAIL FROM: <jane.doe@example.net>
Server: 250 jane.doe@example.net... Sender ok
Client: RCPT TO: <john.doe@example.com>
Server: 250 john.doe@example.com ... Recipient ok
Client: DATA
Server: 354 Enter mail, end with "." on a line by itself
Client: Do you like ketchup?
Client: How about pickles?
Client: .
Server: 250 Message accepted for delivery
Client: QUIT
Server: 221 example.com closing connection
SMTP is in-band because the control messages, such as "HELO" and "MAIL FROM", are sent in the same stream as the actual message content.
See also
Out-of-band control
Computer networks |
https://en.wikipedia.org/wiki/Out-of-band%20control | Out-of-band control is a characteristic of network protocols with which data control is regulated. Out-of-band control passes control data on a separate connection from main data. Protocols such as FTP use out-of-band control.
FTP sends its control information, which includes user identification, password, and put/get commands, on one connection, and sends data files on a separate parallel connection. Because it uses a separate connection for the control information, FTP uses out-of-band control.
See also
Out-of-band management
In-band control
Computer networks |
https://en.wikipedia.org/wiki/CNET | CNET (short for "Computer Network") is an American media website that publishes reviews, news, articles, blogs, podcasts, and videos on technology and consumer electronics globally. CNET originally produced content for radio and television in addition to its website before applying new media distribution methods through its internet television network, CNET Video, and its podcast and blog networks.
Founded in 1992 by Halsey Minor and Shelby Bonnie, it was the flagship brand of CNET Networks and became a brand of CBS Interactive through that unit's acquisition of CNET Networks in 2008. It has been owned by Red Ventures since October 30, 2020.
Other than English, CNET's region- and language-specific editions include Chinese, French, German, Japanese, Korean, and Spanish.
History
Origins
After leaving PepsiCo, Halsey Minor and Shelby Bonnie launched c/net, a 24-hour cable network about computers and technology in 1992.
With help from Fox Network co-founder Kevin Wendle and former Disney creative associate Dan Baker, CNET produced four pilot television programs about computers, technology, and the Internet. CNET TV was composed of CNET Central, The Web, and The New Edge. CNET Central was created first and aired in syndication in the United States on the USA Network. Later, it began airing on USA's sister network Sci-Fi Channel along with The Web and The New Edge. These were later followed by TV.com in 1996. Media personality Ryan Seacrest first came to national prominence at CNET, as the host of The New Edge and doing various voice-over work for CNET.
CNET online launched in June 1995. CNET, Inc., the site's owner, had its initial public offering (IPO) in July 1996. In 1998, CNET, Inc. was sued by Snap Technologies, operators of the education service CollegeEdge, for trademark infringement relating to CNET, Inc.'s ownership of the domain name Snap.com, due to Snap Technologies already owning a trademark on its name.
CNET produced another television technology news program called News.com that aired on CNBC beginning in 1999. From 2001 to 2003, it operated CNET Radio on the Clear Channel-owned KNEW (910) in the San Francisco Bay Area, WBPS (890) in Boston, and XM Satellite Radio. CNET Radio offered technology-themed programming. After failing to attract a sufficient audience, CNET Radio ceased operating in January 2003 due to financial losses.
Acquisitions and expansions
In July 1999, CNET, Inc. acquired the Swiss-based company GDT, later renamed to CNET Channel. In 1998, CNET, Inc. granted the right to Asiacontent.com to set up CNET Asia and the operation was brought back in December 2000. In January 2000, the same time CNET, Inc. became CNET Networks, it acquired comparison shopping site mySimon for $736 million. In October 2000, CNET Networks acquired ZDNET for approximately $1.6 billion. In January 2001, Ziff Davis reached an agreement with CNET Networks to regain the URLs lost in the 2000 sale of Ziff Davis to SoftBank, a publicly traded |
https://en.wikipedia.org/wiki/KCBL | KCBL (1340 AM) is a broadcast radio station in the United States. Licensed to Fresno, California, KCBL is owned by iHeartMedia, Inc. and has a sports format. Most of its programming originates from Fox Sports Radio, and KCBL also broadcasts Fresno State Bulldogs football and Los Angeles Dodgers baseball games.
Established in 1953 as KMAK, the station was locally owned for nearly four decades and had music formats in its early history, including top 40 for most of the 1960s and country from 1968 to 1986, before being a talk radio station from 1986 to 1996. The station has had its present call sign KCBL and sports format since December 16, 1996 and has been owned by iHeartMedia and predecessor companies since 1997.
Its studios are located in North Fresno, and the transmitter tower is north of downtown near Fresno City College.
History
As KMAK (1953–1988)
The station was first licensed on July 23, 1953, licensed to the McMahan Company (later McMahan Broadcasting Company) with call sign KMAK and 250 watts of power.
In 1962, McMahan Broadcasting sold KMAK for $172,000 to Fresno Broadcasters Inc. KMAK became a top 40 station that year with personalities including Ron Jacobs and Robert W. Morgan, who would move on to Los Angeles station KHJ. By 1968, due to losing to KYNO in audience share, KMAK changed from top 40 to country music. The McCarthy Broadcasting Company bought KMAK from Fresno Broadcasters in December 1971 for $800,000.
McCarthy Broadcasting changed KMAK from country to news/talk in February 1986. Then in August 1986, McCarthy sold KMAK and KBOS-FM to Radio Fresno for a combined $6 million. In contrast to KMJ's mostly local lineup, KMAK broadcast mostly national talk shows such as The Larry King Show and The Rush Limbaugh Show.
As KKAM, KBOS, and KKTR (1988–1996)
On August 29, 1988, KMAK became KKAM, and the format changed to oldies on September 12. Although the station was profitable, station management made this change due to poor ratings. The playlist was sourced from the Satellite Music Network and covered the 1950s to 1970s. KKAM later changed to KBOS, the same letters as its FM sister station, on February 1, 1992. After being placed into receivership, the two stations were purchased for a combined $1.4 million by CenCal Broadcasting in June 1992.
KBOS changed to its previous talk format in January 1993, with a focus on national programming such as The Larry King Show; weekends had mostly ESPN Radio programs. The call signs changed to KKTR on March 1, 1993. Nearly four decades of local ownership ended in 1995 when Atlanta-based Patterson Broadcasting bought KBOS and KKTR from CenCal Broadcasting for $6.25 million total.
As KCBL (1996–present)
On December 16, 1996, after simulcasting KRZR-FM for a week, KKTR changed its call sign to the present KCBL and format to sports, with branding "The Ball" and programming mostly from the One on One Sports network (later The Sporting News Radio). Beginning in 1997, KCBL became the Fresno |
https://en.wikipedia.org/wiki/KSJX | KSJX (1500 AM) is a broadcast radio station licensed to San Jose, California, United States. Owned by Multicultural Broadcasting, the station broadcasts programming in Vietnamese.
Founded in 1948 with the call signs KXRX, the station had various music formats in its early decades. The station was locally owned for most of its first 50 years of operation except 1978 to 1991. In the 1970s, KXRX expanded its programming to include news. From 1972 to 1980 and 1987 to 1991, the station was the radio home for San Jose State University sports. After an ownership change, KXRX became KHTT in 1982 and changed its music playlist from middle of the road to current hits. In 1986, KHTT switched to oldies.
KSJX has had its current call sign since 1989, when it launched a business news format. In 1992, KSJX began broadcasting in Vietnamese. Multicultural Broadcasting bought KSJX in 1998.
History
As KXRX (1948–1982)
AM 1500 signed on the air June 24, 1948 with the call letters KXRX and 1,000 watts of power, founded by the San Jose Broadcasting Company. In 1949, KXRX was part of the San Francisco 49ers radio network. KXRX played exclusively pop LPs by late 1957. From 1956 to 1958, KXRX had daytime power of 10,000 watts before reverting to 1,000; the daytime power again was upgraded in 1960, this time to 5,000 watts. In 1964, KXRX boosted its power to 10,000 watts in daytime and 5,000 watts at night, where it remains today.
KXRX broadcast programming related to San Jose State College (later University) throughout the 1960s and 1970s. In 1960, KXRX debuted Spartan Salute, a nightly, hour-long program featuring news reports, interviews, and music targeted towards San Jose State students. Beginning in the fall of 1966, KXRX broadcast Spartan Spectrum, a nightly news summary produced by the San Jose State radio/television news department that aired 10 minutes before 8 p.m. In 1972, KXRX began broadcasting San Jose State Spartans football games.
As of 1973, KXRX had a news format. By 1974, KXRX broadcast live, locally produced news in mornings from 5:30 to 9:15 a.m. and afternoons from 4 to 6:15 p.m., with oldies the rest of the day. By the late 1970s, KXRX broadcast The Wall Street Journal Business Report, a syndicated business news show.
San Jose Broadcasting sold KXRX in 1978 to the Seattle-based Sterling Recreation Organization, a company with holdings in movie theaters and bowling alleys in addition to radio stations. With new ownership came programming changes. Following the 1979 season, KXRX lost San Jose State football broadcasting rights to San Francisco's KCBS. Although KXRX offered $1,000 more for the 1980 season, KCBS out-bid KXRX with a contract that rose by $2,000 per year. San Jose State men's athletic director Dave Adams also cited KCBS having a far stronger signal and ratings. In 1981, KXRX switched to a middle of the road music format.
As KHTT (1982–1989)
On September 7, 1982, KXRX changed its call sign to KHTT. With a new "K-Hit" brand, the fo |
https://en.wikipedia.org/wiki/DVCS | DVCS may refer to:
Data Validation and Certification Server
Deeply virtual Compton scattering
Distributed version control system
Direct View Camera System |
https://en.wikipedia.org/wiki/Base%20One%20International | Base One International Corp. was an American company that specialized in developing software for constructing database applications and distributed computing systems. Headquartered in New York City, the company was founded in 1993 and expanded in 1997 through the founding of its subsidiary, Base One Software Pvt. Ltd., in Bangalore, India. Base One held a number of U.S. patents related to its technologies for distributed computing and high-precision arithmetic.
The company is most known for its Base One Foundation Component Library (BFC) product, which was a rapid application development (RAD) toolkit aimed at users of Microsoft Visual Studio in conjunction with any of the major commercial DBMS products from Microsoft, Oracle, IBM Db2, Sybase, or MySQL.
In 2014, Base One International sold its intellectual property to Content Galaxy Inc. and closed operations.
References
External links
Official corporate website
IDC INSIGHT. Base One: Grid Computing for Database-Centric Applications, Earl Joseph, Ph.D., John Humphreys, September 2004. Accessed April 10, 2008.
Second Venture. The Top 50 Emerging Companies voted by 140 Venture Capital Funds & Angel Investors, December 14, 2004. Accessed April 10, 2008.
FinanceTech. Base One Shares at SIA, June 23, 2005. Accessed April 10, 2008.
NYSIA. On the Grid: A Report on Base One International Corporation, December 1, 2005. Accessed April 10, 2008.
International information technology consulting firms
Software companies based in New York (state)
Companies based in New York City
Defunct software companies of the United States
Defunct computer companies based in New York (state)
1993 establishments in the United States
1993 establishments in New York (state)
Software companies established in 1993
Companies established in 1993 |
https://en.wikipedia.org/wiki/Sundiver%20%28space%20mission%29 | Sundiver was a proposed space mission to crash a probe into the Sun, while sending back data to Earth before burning up. It was proposed as a design study by the Australian Academy of Science's National Committee for Space Science as a Flagship mission to kick-start an Australian space program. The design study was proposed as a five-year study from 2011-2015 with a complement of 10 PhDs, budgeted at a cost of $10 M (Australian), leading to a Go/NoGo Decision in 2015.
The mission would have been comparable, in its close approach to the Sun, to the NASA Parker Solar Probe mission, although it would have only made a single pass into the solar corona.
External links
Article in The Australian announcing plans
Decadal Plan for Australian Space Science (Sundiver proposal begins on page 90)
Spaceflight |
https://en.wikipedia.org/wiki/Ku%C4%8D%C3%ADn%2C%20Vranov%20nad%20Top%C4%BEou%20District | Kučín (, until 1899: ) is a village and municipality in Vranov nad Topľou District in the Prešov Region of eastern Slovakia.
External links
Country data
Villages and municipalities in Vranov nad Topľou District |
https://en.wikipedia.org/wiki/Kap%27s%20Amazing%20Stories | Kap's Amazing Stories is a Philippine television informative show broadcast by GMA Network. Hosted by Bong Revilla, it premiered on August 19, 2007. The show concluded on July 6, 2014.
Overview
The show uses at least five clips, ranked from five up to one, like Most Amazing and Astonishing Moments does, and this format continues to Totally Wild and Most Daring, even if those two shows did not originally rank their videos. Clips are usually from National Geographic's Most Amazing and Astonishing Moments, Totally Wild, Wild Case Files, truTV's Most Daring, Animal Planet's The Most Extreme, BBC's Life, Planet Earth, Life in the Undergrowth, The Blue Planet, Frozen Planet, Africa and lately, Stan Lee's Superhumans.
It also had a children's spin-off titled Kap's Amazing Stories Kids Edition that premiered on January 31, 2010, as Revilla was campaigning for a senator in the 2010 Philippine Senate election. Its presenters were Ramboy Revilla, Jayda Avanzado and Angeli Nicole Sanoy. The show featured an Animal Kingdom and World's Deadliest Animals. Guest presenters in Kap's Amazing Stories Kids Edition include Ogie Alcasid, Carmina Villaroel and Elmo Magalona. The show ended in July 2010, after Revilla's re-election as Senator of the Philippines.
Hosts
Bong Revilla Jr.
Jillian Ward as Marikít
Ratings
According to AGB Nielsen Philippines' Mega Manila household television ratings, the final episode of Kap's Amazing Stories scored a 12.9% rating.
Accolades
References
External links
2007 Philippine television series debuts
2014 Philippine television series endings
Filipino-language television shows
GMA Network original programming
Philippine television shows |
https://en.wikipedia.org/wiki/Tony%20Moclair | Tony Moclair (born 4 September 1969 in Cork, Ireland) is an Australian comedy actor, writer, performer and radio broadcaster. He has worked on various Australian radio networks, often appearing in character rather than as himself.
Radio
Moclair has a successful and varied radio career hosting radio shows on a variety of Australian radio stations both as himself and on occasions, in the guise of some of his many character creations.
Guido Hatzis
Guido Hatzis is a Greek-Australian comic character created by Tony Moclair and Julian Schiller and voiced by Moclair. Guido appeared originally in the context of Schiller and Moclair's radio program "Crud" on the Triple M network. Several albums have been released in the name of Guido Hatzis, the first two winning including Do Not Talk Over Me in 1999 (platinum sales, winner of 2001 ARIA for Best Comedy Release) Whatever in 2000 (Platinum sales and winner of 2002 ARIA of Best Comedy Release) and Deported in 2002 (Gold sales) . Most of Hatzis's comedy involves making prank calls that are usually centred on outrageous claims about his looks and abilities. Moclair appropriated the last name "Hatzis" from friend and sometime producer of the "Crud" program, fellow broadcaster and actor Chris Hatzis.
Restoring the Balance
Restoring the Balance was a satirical radio segment that appeared at various times in 2003-2004, 2007 and 2011 on radio station Triple J. The segment attempted to display the contrasting political views between the conservative Australian Howard government, and the majority of the Left wing government-funded Triple J radio station.
3RRR Breakfasters
Tony Moclair (aka Tony Kelly), along with Chris Hatzis and Julian Schiller have hosted the long running breakfast program on 3RRR 102.7 FM, The Breakfasters.
Nova 91.9
In August 2004, Schiller and Moclair signed on to do breakfast radio at Nova 91.9, a new Adelaide station.
ABC Radio Adelaide
In the mid 2000s, Moclair hosted weekday breakfast radio on ABC Radio, Adelaide.
DJ Domm
In October 2007, Triple M launched a new podcast only show hosted by Moclair's new character DJ Domm. The show was cancelled by Triple M after Episode 21.
ABC Radio Melbourne
Along with Rachel Berger, Moclair hosted breakfast on ABC Radio Melbourne over the 2007/2008 Summer and also appeared on Conversation Hour with Jon Faine.
Triple M
In late 2008, Moclair was a guest co-host of The Shebang radio program filling in for Marty Sheargold. In 2009, Moclair was appointed breakfast co-host alongside Eddie McGuire, Luke Darcy and Mieke Buchan on The Hot Breakfast.
Previous to the Hot Breakfast commencing, Moclair worked on the Pete and Myf show following the death of Richard Marsland. Moclair did not appear on air as himself but rather as one of many regular characters such as Tom Cruise, Colin the Taxi Driver and Clem, the show's oldest listener.
In addition to this, Moclair wrote sketches for the show. Moclair and Mike Fitzpatrick presented breakfast during A |
https://en.wikipedia.org/wiki/Team%20programming | In software engineering, team programming is a project management strategy for coordinating task distribution in computer software development projects, which involves the assignment of two or more computer programmers to work collaboratively on an individual sub-task within a larger programming project. In general, the manner in which this term is used today refers to methods currently in vogue within the software development industry where multiple individuals work simultaneously on the same activity; in these systems, programmers are often grouped in pairs at the same computer workstation, one observing the other working on the software and alternating roles at time intervals.
Traditional team management methods
Traditional software development has nearly always involved multiple programmers working on separate parts of a computer system for any project of significant scope and scale—a method of division of labour. Clearly, it is unreasonable to imagine that a single programmer could adequately complete all the required work for a complex system working entirely on their own within a viable timescale; and as development projects become more complex, specialised expertise becomes of paramount importance in aspects such as systems analysis, quality assurance, and technical challenges posed by individual components. Initially this tended to be an informal process, but with the rise of commercial software development as a viable industry, a more industrial and systematic approach became necessary.
Paper-oriented systems methodologies originally designed for undertaking governmental projects, such as the Structured Systems Analysis and Design Method (SSADM), assigned individual people to carry out individual tasks, and specified the role of designers as being clearly separate from that of the programmers in the waterfall software development model. This methodology also clearly separated each of the individual "life-cycle" stages through which a system development project progressed. The resulting "paper trail" for a systems development project could take so long to build that often parts of the analysis documentation—or sometimes its entirety—was out of date by the time of actual development, rendering them worse than useless.
Modern trends: multiple programmers to one sub-task
Difficulties were experienced with these older methods, such as costs spiralling out of control as systems grew, and schedules failing to meet time-to-market targets. These issues gave rise to techniques such as pair programming, mob programming (aka. ensemble programming), along with new systems lifecycle structures such as the Boehm spiral. Specification of these new approaches began in the mid-1980s and continues today. Many of these strategies involve multiple programmers working collaboratively on the same piece of source code as opposed to being individually responsible for individual tasks. For example, in "pair programming", responsibility for the resulting p |
https://en.wikipedia.org/wiki/2000%20in%20Canadian%20television | This is a list of Canadian television related events from 2000.
Events
Debuts
Ending this year
Changes of network affiliation
Television shows
1950s
Country Canada (1954–2007)
Hockey Night in Canada (1952–present)
The National (1954–present).
1960s
CTV National News (1961–present)
Land and Sea (1964–present)
The Nature of Things (1960–present, scientific documentary series)
Question Period (1967–present, news program)
W-FIVE (1966–present, newsmagazine program)
1970s
Canada AM (1972–2016, news program)
the fifth estate (1975–present, newsmagazine program)
Marketplace (1972–present, newsmagazine program)
100 Huntley Street (1977–present, religious program)
1980s
CityLine (1987–present, news program)
Fashion File (1989–2009)
Just For Laughs (1988–present)
On the Road Again (1987–2007)
Venture (1985–2007)
1990s
CBC News Morning (1999–present)
BeastMaster (1999–2002)
Bob and Margaret (1998–2001)
Cold Squad (1998–2005)
Da Vinci's Inquest (1998–2005)
Daily Planet (1995–present)
eTalk (1995–present, entertainment newsmagazine program
La Femme Nikita (1997–2001)
Life and Times (1996–2007)
Made in Canada (1998–2003)
Mona the Vampire (1999–2006, children's animated series)
The Passionate Eye (1993–present)
Royal Canadian Air Farce (1993–2008)
The Red Green Show (1991–2006)
This Hour Has 22 Minutes (1993–present)
Turtle Island (1999–2000)
Witness (1992–2004)
Yvon of the Yukon (1999–2005, children's animated series)
TV movies
Television stations
Debuts
References
See also
2000 in Canada
List of Canadian films of 2000
External links
List of 2000 Canadian television series at IMDb |
https://en.wikipedia.org/wiki/Contention%20%28telecommunications%29 | In statistical time division multiplexing, contention is a media access method that is used to share a broadcast medium. In contention, any computer in the network can transmit data at any time (first come-first served).
This system breaks down when two computers attempt to transmit at the same time. This is known as a collision. To avoid collisions, a carrier sensing mechanism is used. Here each computer listens to the network before attempting to transmit. If the network is busy, it waits until network quiets down. In carrier detection, computers continue to listen to the network as they transmit. If computer detects another signal that interferes with the signal it is sending, it stops transmitting. Both computers then wait for a random amount of time and attempt to transmit. Contention methods are most popular media access control method on LANs.
Collision detection and recovery
One method to handle collisions in a contention based system is to optimize collision detection and subsequent recovery.
A collision can be detected by listening to the shared medium immediately after transmitting and identifying collision characteristics ; or by capturing data from the medium and performing error detection.
For recovery, some systems simply cause senders to re-transmit collided data (perhaps with backing-off algorithms which reduce the sender's re-transmit rate when collisions keep occurring) or use Error Correction techniques such as FEC.
Collision avoidance
An alternative method to handle collisions in a contention-based system is to attempt to avoid them. Some systems may utilize a strict scheduling guideline to identify who may use which resources when. Other systems may have the senders listen to the channel immediately prior to transmitting and determine suitable times to transmit.
Common examples
Collisions are a condition that arises when two or more data stations attempt to transmit at the same time over a shared channel, or when two data stations attempt to transmit at the same time in a half duplex communication link. A contention-based channel access (multiple access) protocol is a protocol where data packet collisions may occur. Examples of such protocols are:
The Aloha protocol
Carrier Sense Multiple Access (CSMA)
Multiple Access with Collision Avoidance
Other examples
In telecommunication, the term contention also has the following less usual meanings:
Competition by users of a system for use of the same facility at the same time. This may also be known as oversubscription. The term contention ratio applies specifically to the number of people connected to an ISP who share a set amount of bandwidth. Typical values would be 50:1 for home users (that is to say that 50 people or lines will vie for the same bandwidth) and 20:1 for business users. It is for this reason that the shortfall between supplier-claimed access speeds and those experienced by the consumer once signed-up to a contract is particularly bad at just those |
https://en.wikipedia.org/wiki/Command%20Performance%20%28radio%20series%29 | Command Performance was a radio program which originally aired between 1942 and 1949. The program was broadcast on the Armed Forces Radio Network (AFRS) and transmitted by shortwave to the troops overseas—with few exceptions, it was not broadcast over domestic U.S. radio stations.
Background
Most episodes of the program were produced before an audience in the Vine Street Playhouse in Hollywood, California, and recorded via electrical transcription. The weekly listening audience of was estimated at 95.5 million.
Troops sent in requests for a particular performer or program to appear, and they also suggested unusual ideas for music, sketches, or sounds from home on the program, such as: "Ann Miller tap dancing in military boots"; "a sigh from Carole Landis" or Lucille Ball; "foghorns on San Francisco Bay"; "Errol Flynn taking a shower"; "a slot machine delivering the jackpot" and "Bing Crosby mixing a bourbon and soda for Bob Hope". Top performers of the day appeared, including Bing Crosby, Jack Benny, Frank Sinatra, Bob Hope, Fred Allen, Ginger Rogers, Judy Garland, Lena Horne and The Andrews Sisters.
The first Command Performance was broadcast on March 1, 1942, almost exactly three months after the bombing of Pearl Harbor. It was produced under the aegis of the Office of War Information and its success paved the way for the creation of the Armed Forces Radio Service in May 1942. Time magazine described Command Performance as being, "the best wartime program in America". However very few listeners in the United States ever heard it and it would appear that the Christmas Eve Command Performance of 1942 was the only program of the series to be broadcast to a general audience. Variety magazine commented on this saying:
The War Department on Christmas Eve gave domestic listeners their first taste of a series that had been going out to the Armed Forces on short-wave for 43 consecutive weeks. The purpose of the special occasion as Elmer Davis, Office of War Information chief, expressed it in a foreword to the show, was to forge a link between the servicemen abroad and the folks on the Home Front. A recorded version of the show was short-waved, all over the world, the next day... Hope emceed, tossed off a monologue and cross-fired with Crosby. A special treat in the vocal department was the version of "Basin Street Blues" that came out of the tonsil partnership of Bing Crosby and The Charioteers."
Variety also observed that “sometimes the language on these shows is just a little more robust than is passed by standard broadcasting stations. Jack Benny, as we recall, last Sunday night encouraged our fighting men to ‘give ’em hell.'”
At the outset, the AFRS was shortwaving the shows but the reception was often distorted or spoiled by fading and static. Also, many servicemen had no access to a shortwave receiver. These problems were resolved when the Armed Forces Radio Service sought permission from the four major radio networks to record favorite pro |
https://en.wikipedia.org/wiki/Language%20Integrated%20Query | Language Integrated Query (LINQ, pronounced "link") is a Microsoft .NET Framework component that adds native data querying capabilities to .NET languages, originally released as a major part of .NET Framework 3.5 in 2007.
LINQ extends the language by the addition of query expressions, which are akin to SQL statements, and can be used to conveniently extract and process data from arrays, enumerable classes, XML documents, relational databases, and third-party data sources. Other uses, which utilize query expressions as a general framework for readably composing arbitrary computations, include the construction of event handlers or monadic parsers. It also defines a set of method names (called standard query operators, or standard sequence operators), along with translation rules used by the compiler to translate query syntax expressions into expressions using fluent-style (called method syntax by Microsoft) with these method names, lambda expressions and anonymous types.
Ports of LINQ exist for PHP (PHPLinq), JavaScript (linq.js), TypeScript (linq.ts), and ActionScript (ActionLinq), although none are strictly equivalent to LINQ in the .NET inspired languages C#, F# and VB.NET (where it is a part of the language, not an external library, and where it often addresses a wider range of needs).
Architecture of LINQ in the .NET Framework
Standard Query Operator API
In what follows, the descriptions of the operators are based on the application of working with collections. Many of the operators take other functions as arguments. These functions may be supplied in the form of a named method or anonymous function.
The set of query operators defined by LINQ is exposed to the user as the Standard Query Operator (SQO) API. The query operators supported by the API are:
Select
The Select operator performs a projection on the collection to select
interesting aspects of the elements. The user supplies an arbitrary function, in the form of a named or lambda expression, which projects the data members. The function is passed to the operator as a delegate.
Where
The Where operator allows the definition of a set of predicate rules that are evaluated for each object in the collection, while objects that do not match the rule are filtered away. The predicate is supplied to the operator as a delegate.
SelectMany
For a user-provided mapping from collection elements to collections, semantically two steps are performed. First, every element is mapped to its corresponding collection. Second, the result of the first step is flattened by one level. Note: Select and Where are both implementable in terms of SelectMany, as long as singleton and empty collections are available. The translation rules mentioned above still make it mandatory for a LINQ provider to provide the other two operators.
Sum / Min / Max / Average
These operators optionally take a function that retrieves a certain numeric value from each element in the collection and uses it to find the sum, minimu |
https://en.wikipedia.org/wiki/A%20New%20Dictionary%20of%20the%20Terms%20Ancient%20and%20Modern%20of%20the%20Canting%20Crew | A New Dictionary of the Terms Ancient and Modern of the Canting Crew is a dictionary of English cant and slang by a compiler known only by the initials B. E., first published in London c. 1698. With over 4,000 entries, it was the most extensive dictionary of non-standard English in its time, until it was superseded in 1785 by Francis Grose's Classical Dictionary of the Vulgar Tongue. B. E.'s New Dictionary was used as a source by many subsequent dictionaries.
Its full title is A new dictionary of the terms ancient and modern of the canting crew, in its several tribes, of gypsies, beggers, thieves, cheats, &c. with an addition of some proverbs, phrases, figurative speeches, &c.
See also
Cant (language)
Notes
References
External links
Digital version of the 1899 edition @ Internet Archive
English dictionaries
1698 books |
https://en.wikipedia.org/wiki/Polymorph%20%28novel%29 | Polymorph is a 1997 cyberpunk novel by American science fiction author Scott Westerfeld.
Plot
"Milica Raznakovic" is the principal alias employed by the protagonist, a shape-changer or "polymorph". Living in a recession-hit future New York, she spends her time partying anonymously, each night in a different body, enjoying casual sex and absolutely no personal attachments. She believes herself to be unique. However, one night she meets another polymorph: older, malicious and much more powerful than herself. The brief and ultimately hostile encounter leads her to place herself in danger by attempting to determine the newcomer's objective, which somehow involves a wealthy industrialist. In the process of her investigation, she finds it necessary to seek an ally, reaching out to her last one-night stand, a young man she would normally not have sought out again.
1997 science fiction novels
1997 American novels
Cyberpunk novels
Novels by Scott Westerfeld
Novels set in New York City
Fiction about shapeshifting
1997 debut novels |
https://en.wikipedia.org/wiki/HPCx | HPCx was a supercomputer (actually a cluster of IBM eServer p5 575 high-performance servers) located at the Daresbury Laboratory in Cheshire, England. The supercomputer was maintained by the HPCx Consortium, UoE HPCX Ltd, which was led by the University of Edinburgh: EPCC, with the Science and Technology Facilities Council and IBM. The project was funded by EPSRC.
The HPCx service ended in January 2010,
References
External links
www.hpcx.ac.uk
EPCC Website
Cluster computing
Computer science education in the United Kingdom
Research institutes in Cheshire
Supercomputers |
https://en.wikipedia.org/wiki/Global%20horizontal%20sounding%20technique | The Global horizontal sounding technique (GHOST) program was an atmospheric field research project in the late 1960s for investigating the technical ability to gather weather data using hundreds of simultaneous long-duration balloons for very long-range global scale numerical weather prediction in preparation for the Global Atmospheric Research Program (GARP).
Technology
The GHOST program was to demonstrate technology for a program that would, ultimately, gather data from thousands of balloons simultaneously. Unlike radiosonde balloons which collect vertical atmospheric sounding data over the release point during a relatively short ascent lasting a few hours, horizontal sounding balloons stay aloft for much longer periods lasting several weeks or months, floating at a constant-density altitude.
The GHOST design explored the performance a superpressure balloon with a spherical two-layer PET film envelope holding the gas inside at a higher pressure than the surrounding atmosphere, allowing it to maintain a nearly constant altitude. These gas balloons float at a constant density altitude, where the balloon displaces a mass of air equal to its own mass. Expansion of the lifting gas due to solar heating is avoided in a superpressure balloon, since the inextensible PET film allows the pressure to rise as the gas is heated, rather than allow the volume to expand. This allows them to drift with, and track, horizontal atmospheric air currents at a constant air pressure level (a constant altitude) above the Earth's surface.
The electronics payload was suspended below the balloon on a tether that also acted as a high frequency band radio antenna. The GHOST payload included a sun angle sensor that varied the repetition rate of its Morse code radio signal to allow technicians on the ground to locate it using an HF receiver and a set of sun angle tables.
The balloons could not be flown in the Northern Hemisphere because the Soviet Union would not permit overflights at the time.
Results
231 GHOST balloons were launched in a four-year period between March 1966 and December 1969.
On September 29, 1968, a GHOST balloon at an altitude of approximately completed a full 365 days in flight, becoming the first balloon to fly for a full year. This record-breaking balloon, launched from Christchurch, New Zealand by the U.S. National Center for Atmospheric Research (NCAR), continued to fly for an additional 76 days, completing 35 circumnavigations of the Earth. The longest flight of the program was 744 days, or just over two years.
Legacy
For the measurements of the GARP program, the demonstrated flight lifetime at low altitudes (below 12 km) proved to be too short, despite many redesigns of the balloon system to improve the performance. Without both upper level and lower level long-duration balloons, the GHOST system idea was deemed infeasible for the GARP requirements. The GHOST program was superseded by research on the 'Carrier Balloon' system, also known as |
https://en.wikipedia.org/wiki/1947%E2%80%9348%20United%20States%20network%20television%20schedule%20%28daytime%29 | NOTE: This page is missing info on the DuMont Network, which started daytime transmission before any other United States television network.
Monday-Friday
By network
ABC
New Series
The Singing Lady
CBS
New Series
The Missus Goes a-Shopping
Not Returning From 1946 to 1947
NBC
Returning Series
The Swift Home Service Club
New Series
Howdy Doody
Playtime
Not Returning From 1946 to 1947
Dumont
New Series
Okay, Mother
TV Shopper
See also
1947-48 United States network television schedule (prime-time)
Sources
https://web.archive.org/web/20071015122215/http://curtalliaume.com/abc_day.html
https://web.archive.org/web/20071015122235/http://curtalliaume.com/cbs_day.html
https://web.archive.org/web/20071012211242/http://curtalliaume.com/nbc_day.html
United States weekday network television schedules
1947 in American television
1948 in American television |
https://en.wikipedia.org/wiki/Michael%20Wellman | Michael Paul Wellman (born March 27, 1961) is the Richard H. Orenstein Division Chair of Computer Science and Engineering and Lynn A. Conway Collegiate Professor of Computer Science and Engineering at the University of Michigan, Ann Arbor.
Wellman received a PhD from the Massachusetts Institute of Technology in 1988 for his work in qualitative probabilistic reasoning and decision-theoretic planning. From 1988 to 1992, Wellman conducted research in these areas at the USAF's Wright Laboratory. For the past 25 years, his research has focused on computational market mechanisms and game-theoretic reasoning methods, with applications in electronic commerce, finance, and cyber-security. As Chief Market Technologist for TradingDynamics, Inc. (now part of Ariba), he designed configurable auction technology for dynamic business-to-business commerce. Wellman previously served as Chair of the ACM Special Interest Group on Electronic Commerce (SIGecom), and as Executive Editor of the Journal of Artificial Intelligence Research. He is a Fellow of the Association for the Advancement of Artificial Intelligence and the Association for Computing Machinery. In 2014 Wellman won the ACM/SIGAI Autonomous Agents Research Award.
See also
SIGECOM
Mechanism design
Reinforcement Learning
References
1961 births
Living people
Scientists from Brooklyn
Fellows of the Association for Computing Machinery
Fellows of the Association for the Advancement of Artificial Intelligence
University of Michigan faculty
MIT School of Engineering alumni
American computer scientists
Scientists from New York (state) |
https://en.wikipedia.org/wiki/Data%20Respons | Data Respons ASA is a company that develops embedded systems within the areas of Transport & Automotive, Telecom & Media, Industry Automation, Energy & Maritime, Medtech, Space, Defense & Security, and Finance & Public. The company was acquired by French Akka Technologies in 2020.
The company has offices in Norway, Sweden, Denmark, Germany and Taiwan.
References
External links
Official website
Computer companies of Norway
Companies established in 1986
Companies listed on the Oslo Stock Exchange
1986 establishments in Norway |
https://en.wikipedia.org/wiki/Parler | Parler (pronounced "parlor") is an inactive American alt-tech social networking service associated with conservatives. Launched in August 2018, Parler marketed itself as a free speech-focused and unbiased alternative to mainstream social networks such as Twitter and Facebook. Journalists have described Parler as an alt-tech alternative to Twitter, with its users including those banned from mainstream social networks or who oppose their moderation policies.
Parler has received criticism for its content policies, which some journalists and users claim are more restrictive than the company portrays and sometimes more restrictive than those of its competitors. Conservatives have praised Parler as offering an alternative to censorship they claim to endure on more mainstream platforms, such as Facebook and Twitter.
Parler's userbase grew exponentially during 2020 with minimal content moderation. After reports that Parler was used to coordinate the 2021 storming of the U.S. Capitol, several companies denied it their services. Apple and Google removed Parler's mobile app from their app stores, and Parler went offline on January 10, 2021, when Amazon Web Services canceled its hosting services. Before it went offline in January 2021, according to Parler, the service had about 15 million users. Parler called the removals "a coordinated attack by the tech giants to kill competition in the marketplace". Parler resumed service on February 15, 2021, after moving domain registration to Epik. A version of the app with added content filters was released on the Apple App Store on May 17, 2021. Parler returned to Google Play on September 2, 2022.
Parler was acquired by digital media conglomerate Starboard on April 14, 2023, and was shut down on the same day. According to a statement by Starboard on the website's holding page, this was a temporary measure to allow the site to "undergo a strategic assessment".
History
Parler was founded by John Matze Jr. and Jared Thomson in Henderson, Nevada, in August 2018. The company's name was taken from the French word , meaning "to speak". The name was originally intended to be pronounced as in French (, English approximation: ), but is now pronounced as the English word "parlor" ( ). The Wall Street Journal first reported in November 2020 that conservative investor Rebekah Mercer had funded Parler, and Mercer has since been revealed to have been a co-founder of the company. According to Mercer, she co-founded Parler to counter the "ever-increasing tyranny and hubris of our tech overlords". Thomson serves as the chief technology officer, and Matze was Parler's chief executive officer from its founding until January 2021. Both are alumni of the University of Denver computer science program, and were roommates while in college. Some other Parler senior staff also attended the school.
2018–2019
Parler launched in August 2018, billing itself as an unbiased and free speech alternative to larger social media platforms, such as |
https://en.wikipedia.org/wiki/KEXS%20%28AM%29 | KEXS (1090 AM) is a radio station licensed to Excelsior Springs, Missouri, and serving the Kansas City metropolitan area. The station is owned by the Catholic Radio Network, and airs a Roman Catholic religious radio format. The call letters stand for its city of license, EXcelsior Springs. To support the station, KEXS periodically holds on-air pledge drives.
KEXS broadcasts at 10,000 watts by day. But because AM 1090 is a clear-channel frequency, reserved for Class A stations KAAY Little Rock, WBAL Baltimore and XEPRS Rosarito-Tijuana, the station must reduce power to 4,000 watts during critical hours and sign-off at night, to avoid interference. Programming is simulcast on sister station 890 KMVG and on FM translator K225CI at 92.9 MHz. The Catholic Radio Network also owns 1190 KDMR in Kansas City, which airs Spanish-language Catholic programming.
History
In August 1968, KEXS first signed on the air as a daytime-only station. It broadcast at just 250 watts in its early years and served as a community-based radio station for Excelsior Springs, playing country music and airing local news. In recent decades, the station played Southern Gospel music.
See also
KXJJ
References
External links
EXS
EXS
Catholic radio stations
Radio stations established in 1968
1968 establishments in Missouri
EXS (AM) |
https://en.wikipedia.org/wiki/Parallel%20World%20%281990%20video%20game%29 | is a puzzle video game developed by EIM and published by Varie. It was released in Japan for the Family Computer on August 10, 1990.
Summary
The player and his girlfriend must find their way back home after being sucked into an alternate universe.
A magnificent castle full of 25 different game worlds block their progress, however, and they are filled with enemies on every stage. The player has an overhead view to destroy the enemies for extra loot. Given a strict time limit of 100 seconds to solve each puzzle, the game rewards fast puzzle solvers. The first player controls the male while the second player controls the female. Players only start with three lives and lose them when time runs out or when a monster comes into contact with him/her.
Enemies in the game include springs, rollers, witches, and zombies.
References
1990 video games
EIM (video game developer) games
Japan-exclusive video games
Nintendo Entertainment System games
Nintendo Entertainment System-only games
Puzzle video games
Single-player video games
Top-down video games
Varie games
Video games about parallel universes
Video games developed in Japan
Video games scored by Hirohiko Takayama
Video games set in castles |
https://en.wikipedia.org/wiki/Analysis%20of%20molecular%20variance | Analysis of molecular variance (AMOVA), is a statistical model for the molecular algorithm in a single species, typically biological. The name and model are inspired by ANOVA. The method was developed by Laurent Excoffier, Peter Smouse and Joseph Quattro at Rutgers University in 1992.
Since developing AMOVA, Excoffier has written a program for running such analyses. This program, which runs on Windows, is called Arlequin and is freely available on Excoffier's website. There are also implementations in R language in the ade4 and the pegas packages, both available on CRAN (Comprehensive R Archive Network). Another implementation is in Info-Gen, which also runs on Windows. The student version is free and fully functional. Native language of the application is Spanish but an English version is also available.
An additional free statistical package, GenAlEx, is geared toward teaching as well as research and allows for complex genetic analyses to be employed and compared within the commonly used Microsoft Excel interface. This software allows for calculation of analyses such as AMOVA, as well as comparisons with other types of closely related statistics including F-statistics and Shannon's index, and more.
References
External links
Arlequin 3 website
Online AMOVA Calculation for Y-STR Data
Info-Gen website
GenAIEx website
Population genetics
Molecular biology
Analysis of variance |
https://en.wikipedia.org/wiki/Charles%20Concordia | Charles Concordia (20 June 1908 – 25 December 2003) was a noted American electrical engineer specializing in electrical power engineering and the early history of computer hardware.
Biography
Concordia was born in Schenectady, New York. In 1926 he went directly from high school to General Electric as a test engineer. In 1934 he graduated from its Advanced Engineering Program and worked at General Electric until 1973. His early engineering work concerned television and detecting cracks in railway rails by magnetic field measurements.
During World War II he worked on generators and turbines for naval destroyer propulsion, researched aircraft superchargers, and helped develop ships' electrical drives. In the 1940s he chaired the American Institute of Electrical Engineers (AIEE) subcommittee on large-scale computing devices and continued consulting after the war. He married Frances Butler in 1948. In 1971 he earned a D.Sc. from Union College and later received an honorary D.Sc. from Iowa State University.
Concordia was a Fellow of the IEEE, ASME, and AAAS, a member of the National Academy of Engineering and NSPE, a founder and National Treasurer of the Association for Computing Machinery, and first chairman of the American Institute of Electrical Engineers' Computer Committee, forerunner of the IEEE Computer Society. For his work he received the Lamme Medal, the Centennial Medal, and the Power-Life Award from the IEEE and AIEE, as well as the Philip Sporn Award from CIGRE and both the Coffin Award and the Steinmetz Award from General Electric. He was awarded the 1999 IEEE Medal of Honor "For outstanding contributions in the area of Power Systems Dynamics which resulted in substantial improvements in planning, operation, and security of extended power systems".
Selected works
"Steady State Stability of Synchronous Machines as Affected by Voltage-Regulator Characteristics," Transactions of the American Institute of Electrical Engineers, 1944.
Synchronous Machines: Theory and Performance, Wiley, 1951.
References
IEEE History Center biography
Electro Science biography
IEEE Interview by Frederick Nebeker
1908 births
2003 deaths
American electrical engineers
Union College (New York) alumni
General Electric people
Fellow Members of the IEEE
Fellows of the American Association for the Advancement of Science
Members of the United States National Academy of Engineering
Association for Computing Machinery
IEEE Medal of Honor recipients
People from Schenectady, New York
Fellows of the American Society of Mechanical Engineers
IEEE Centennial Medal laureates
IEEE Lamme Medal recipients
Engineers from New York (state)
20th-century American engineers |
https://en.wikipedia.org/wiki/SexySat%20TV | SexySat TV is a softcore televised sex line, broadcasting on the Hot Bird 13B satellite.
SexySat previously had a network of three more channels on European satellite TV, including on Hot Bird 3.
History
Sexysat was one of the first European erotic Liveshow-channels. Regarding the channel's foundation, Interia Biznes gave this information: "It probably started in December 2002 (the first mentions of tests in the satkurier.pl news archive come from early January 2003)"., the same months when Babestation began in the UK.
The first programmes were on a single Hot Bird satellite channel, with one female presenter taking calls in a studio in the Netherlands. According to Liveshow-tv.com, the studio was moved from the Netherlands to Bratislava, Slovakia, on 4 August 2004. In July 2005, SexySat began broadcasting on the Astra 1H satellite, available in Germany. Since these two developments, the picture and sound quality has reduced, along with explicitness allowed on shows (fans began a petition to oppose this).
Format
Liveshows are broadcast live 24 hours a day. (Previously this was only from 19:00 until 06:00, with repeats in-between.) Programming usually consists of a scantily clad woman, who asks viewers to call her. The ladies are mostly from the Czech Republic and neighbouring Slovakia and speak at least two foreign languages.
Satellites
Hot Bird 13B 11200 MHz, Vertical, SR 27500 kS, FEC 5/6
Defunct channel:
SexySat TV 2: 12245 MHz, Horizontal, SR 27500 kS, FEC 3/4
Web streams
There are online live streams of both SexySat TV 1 (since 2011) and also an online-only hardcore channel, XXX SexySat (since 1 December 2012).
As of 2016, their websites also carry other streams of similar channels, such as Babestation.
References
Adult chat (television)
Czech pornographic television channels |
https://en.wikipedia.org/wiki/WPGI | WPGI is an oldies radio station licensed to Georgetown, South Carolina, and serving the Grand Strand area. The station, an affiliate of the "Carolina Country" network, is licensed by the Federal Communications Commission to broadcast at 93.7 MHz with an ERP of 6 kW.
History
WSCA-FM signed on at 93.7 in Georgetown playing classic rock but later joined with WJXY-FM, changing its letters to WXJY. As WJXY's simulcast partner, WXJY was "Cruisin' Country", with a mix of country and rock music, then rhythmic as "Hot 93". Hot 93 changed to contemporary hit radio and added WSEA as a simulcast partner. Then WJXY-FM, WXJY and WIQB became ESPN Radio affiliates as "The Team" in 2003.
WXJY changed its simulcast partner to WSEA in July 2010, changing its format to contemporary hit radio.
WXJY once again simulcast WJXY. In 2013, the station aired a Southern rock/country music format called "The Outlaw".
On September 20, 2016, Cumulus' Joule Broadcasting announced that WJXY/WXJY would be sold to Colonial Radio Group for $240,000. That transaction was consummated on February 9, 2017, at which point WXJY changed simulcast partners from WJXY to WMIR and changed their format to urban gospel, branded as "Rejoice 93.7".
On February 5, 2019, two years after Colonial acquired the station, WXJY changed their format from urban gospel to adult top 40, branded as "93.7 Hits FM," and transferred operations of the station to Creative Coast Media through a LMA.
On July 4, 2019 at noon, WXJY changed to active rock as "93.7 the Shark".
In August 2019, WXJY began simulcasting WGTN (AM). The station then adopted the call sign WYAY.
On January 3, 2020, WYAY dropped the simulcast with WGTN and rebranded as "Carolina Country 93.7", simulcasting WMIR 93.9 FM Conway.
The call sign was changed to WPGI on August 17, 2020. Two months later, Andrulonis announced the sale of the station to GT Radio, a company led by Joseph Rice and Todd Fowler. The sale, at a price of $275,000, was consummated on February 1, 2021.
WPGI now simulcasts oldies stations WGLD-FM and WYAY, which call themselves "Carolina Gold".
References
External links
Carolina Gold 93.9 & 106.3 website
PGI
Radio stations established in 1991
1991 establishments in South Carolina
Oldies radio stations in the United States |
https://en.wikipedia.org/wiki/Michelle%20Wolff | Michelle Wolff is an American actress best known for her role as "Lou" in the 2004 comedy film Mango Kiss and for her role as Brit on the Here TV Network series Dante's Cove.
Early life and education
Wolff holds a BA in theater arts with an acting emphasis from University of California, Santa Cruz.
Career
Wolff has worked on many film shorts and experimental independent films. She has appeared in films that include Mango Kiss, Evolution, Unspeakable, Sol Goode, and The Ten Rules, as well as Trapped!.
Her television appearances include roles in ER, Without a Trace, Close to Home, Sleeper Cell, L.A. Dragnet, Veronica Mars, Nip/Tuck, and NCIS. She has often appeared in bit parts as a police officer or paramedic, including reappearing roles as a paramedic for nine episodes of Chicago Hope, three episodes of Providence and two episodes of Boston Public.
After appearing as Brit, the local scuba instructor and bartender in the second season of the TV series Dante's Cove, she returned as a series regular in season 3.
Personal life
Wolff is openly lesbian. She is married to Linda Fusco, a West Hollywood event producer.
Wolff holds a second degree black belt and a teaching certificate in ATA Taekwondo.
References
External links
Interview at Lesbianation.com
Interview in EDGE Philadelphia
Living people
American film actresses
American television actresses
American lesbian actresses
Year of birth missing (living people)
21st-century American women |
https://en.wikipedia.org/wiki/Am%C3%A9rica%20CV%20Network | América CV was a Spanish television network in the United States, created as a result of the joint venture agreement between Sherjan Broadcasting (owner of América Teve) and Caribevision Holdings (owned by Barba TV Group & Pegaso Television) (owner of CaribeVisiòn). The network's name was a combination of the names of the two companies' broadcasting outlets, América TeVe and CV Network.
History
CaribeVisiòn launched in 2007 with owned-and-operated stations in New York City, Chicago, Miami, and San Juan until November 2009. Eventually being re-branded to CV Network, the network and its related owned-and-operated stations, as well as Sherjan's América TeVe, were brought under the common ownership and management of a new entity, América-CV Network, LLC, and its sister company, América-CV Station Group, Inc.. Sherjan Broadcasting & Caribevision Holdings added their additional programming content to the network's existing programming over time. On July 31, 2012, the four stations contributed by Caribevision Holdings to the joint venture took affiliation with MundoFox, which soft-launched the day after, with the official launch coming August 13. The fifth station, Miami's Channel 41, remained independent. In January 2013, WFUN (also Miami), left the Mundo Fox affiliation, and launched Teveo, a news channel directed at the Spanish-speaking community in Miami. In the late summer of 2016, WPXO abruptly disaffiliated from MundoMax; the network would cease operations in December of that year.
Former affiliates
WPXO-LD 34.1 New York
WFUN-LD 48.1 Miami, FL
WJPX 24.1 San Juan, PR
WOCK-CD 13.1 Chicago, IL
Television channels and stations established in 2007
Television channels and stations disestablished in 2012
Defunct television networks in the United States
Companies based in Miami
Spanish-language television networks in the United States
Mediaset television channels |
https://en.wikipedia.org/wiki/Basic%20sequential%20access%20method | In IBM mainframe operating systems, Basic sequential access method (BSAM) is an access method to read and write datasets sequentially. BSAM is available on OS/360, OS/VS2, MVS, z/OS, and related operating systems.
BSAM is used for devices that are naturally sequential, such as punched card readers, punches, line printers, and magnetic tape. It is also used for data on devices that could also be addressed directly, such as magnetic disks. BSAM offers device independence: to the extent possible, the same API calls are used for different devices.
BSAM allows programs to read and write physical blocks of data, as opposed to the more powerful but less flexible Queued Sequential Access Method (QSAM) which allows programs to access logical records within physical blocks of data.
The BSAM user must be aware of the possibility of encountering short (truncated) blocks (blocks within a dataset which are shorter than the BLKSIZE of the dataset), particularly at the end of a dataset, but also in many cases within a dataset. QSAM has none of these limitations.
Application program interface
The programmer specifies DSORG=PS in his Data Control Block (DCB) to indicate use of BSAM.
As a basic access method BSAM reads and writes member data in blocks and the I/O operation proceeds asynchronously and must be tested for completion using the CHECK macro. BSAM uses the standard system macros OPEN, CLOSE, READ, WRITE,and CHECK. The NOTE macro instruction returns position of the last block read or written, and the POINT macro will reposition to the location identified by a previous NOTE.
If the dataset is unblocked, that is, the logical record length (LRECL) is equal to the physical block size (BLKSIZE), BSAM may be utilized to simulate a directly accessed dataset using NOTE and POINT on any supported direct access device type (DEVD=DA), and some primitive applications were designed in this way.
Similar facilities
The BSAM application program interface can be compared with the interface offered by open, read, write and close calls (using file handles) in other operating systems such as Unix and Windows. POINT provides an analog of seek or lseek,and ftell is the equivalent of NOTE.
See also
Queued Sequential Access Method (QSAM)
Hierarchical Sequential Access Method (HSAM)
Basic Indexed Sequential Access Method (BISAM)
Queued Indexed Sequential Access Method (QISAM)
Hierarchical Indexed Sequential Access Method (HISAM)
References
IBM mainframe operating systems |
https://en.wikipedia.org/wiki/Solip%3ASystem | "Solip:System" is a 1989 cyberpunk science fiction novelette by American writer Walter Jon Williams.
"Solip:System" begins shortly before the ending of Hardwired (1986) and continues beyond that point. The author wrote this book as a link between Hardwired and Voice of the Whirlwind (1987). The main character is the computer personality Reno, a minor character in Hardwired.
References
1989 short stories |
https://en.wikipedia.org/wiki/Standalone%20program | A standalone program, also known as a freestanding program, is a computer program that does not load any external module, library function or program and that is designed to boot with the bootstrap procedure of the target processor – it runs on bare metal. In early computers like the ENIAC without the concept of an operating system, standalone programs were the only way to run a computer. Standalone programs are usually written in assembly language for a specific hardware.
Later standalone programs typically were provided for utility functions such as disk formatting. Also, computers with very limited memory may use standalone programs, i.e. most computers until the mid-1950s and later still embedded processors.
Standalone programs are now mainly limited to SoC's or microcontrollers (where battery life, price, and data space are at premiums) and critical systems. In extreme cases every possible set of inputs and errors must be tested and thus every potential output known; fully independent [separate physical suppliers and programing teams] yet fully parallel system-state monitoring; or where the attack surface must be minimized; an operating system would add unacceptable complexity and uncertainty (examples include industrial operator safety interrupts, commercial airlines, medical devices, ballistic missile launch controls and lithium-battery charge controllers in consumer devices [fire hazard and chip cost of approximately 10 cents]). Resource limited microcontrollers can also be made more tolerant of varied environmental conditions than the more powerful hardware needed for an operating system; this is possible because of the much lower clock frequency, pin spacing, lack of large data buses (e.g. DDR4 RAM modules), and limited transistor count allowance for wider design margins and thus the potential for more robust electrical and physical properties both in circuit layout and material choices.
See also
Bare machine
References
Legacy systems
Computer programming |
https://en.wikipedia.org/wiki/Plant%20lifecycle%20management | Plant lifecycle management (PLM) is the process of managing an industrial facility's data and information throughout its lifetime. Plant lifecycle management differs from product lifecycle management by its primary focus on the integration of logical, physical and technical plant data in a combined plant model.
A PLM model can be used through a plants whole lifecycle, covering:
Design,
Construction,
Erection,
Commissioning,
Handover,
Operation,
Maintenance/Refurbishment/Life Extension,
Decommissioning,
Land rehabilitation.
Parts of the model
Logical model
The logical plant model may cover:
Process & instrumentation diagrams (P&ID)
Pipe & instrumentation diagrams (P&ID)
P&I schematic
Process flow
Massflow diagram (similar to the process flow but used in the mineral industry)
Electrical key diagram
Cabling diagram
Electrical
Hydraulic
Pneumatic
Heating venting & air-conditioning (HVAC)
Water and wastewater
Physical model
Physical parts of a plant are usually represented by 3D CAD models.
The CAD system used would typically focus on top-down, routing, and DMU and would differ on many point from the systems used in the mechanical industry, or for Architectural engineering.
Sometimes the CAD system would be supplemented by software to generate 3D views or walk-through features.
Technical model
The technical data is typically managed by an ERP system or some other database. There could also be links to systems for handling unstructured data, like EDM systems.
Integration
Integration with Enterprise (EPCM, ePCM),
Integration with Enterprise (Owner/Operator),
Integration with Regulator.
Applicability
New Build
Return to Service (RTS)
See also
Lifecycle management
ISO 10303 - Industrial automation systems and integration—Product data representation and exchange
ISO 15926 - Process Plants including Oil and Gas facilities life-cycle data
Notes
Further reading
about Virtual Mill
about Augmented reality
Product lifecycle management
Computer-aided design
Management by type |
https://en.wikipedia.org/wiki/Hazel%20Mae | Hazel Mae Barker (born April 7, 1970), known professionally as Hazel Mae, is a Filipino-Canadian sportscaster.
She was the former lead anchor for the New England Sports Network's SportsDesk news program and most recently the anchor on MLB Network. Mae worked for Sportsnet until 2004, when she left to work for NESN SportsDesk. Mae returned on November 14, 2011.
Mae grew up in Toronto and began her sports broadcasting career hosting a sports update show on campus at York University.
Mae worked as a Field Level Reporter for TBS MLB Tuesday starting in 2022.
Broadcast career
Rogers Sportsnet
Hazel Mae anchored the morning edition of Sportsnetnews on Rogers Sportsnet, one of Canada’s all-sports networks. In addition to her duties on Sportsnetnews, Mae was the host of JZone, a weekly magazine show dedicated to all things Toronto Blue Jays, also owned by Rogers Sportsnet. Mae began her tenure at Rogers Sportsnet providing sports updates to Rogers Sportsnet radio affiliates throughout Ontario. In 2002, she and two fellow Sportsnet co-workers posed in lingerie in Urban Male Magazine.
NESN
Mae subsequently moved to Boston, where she became the lead anchor for NESN's SportsDesk from December, 2004, to June, 2008. She also hosted The Ultimate Red Sox Show, NESN’s Red Sox week-in-review program and The Buzz, the Boston Bruins top-ten in-season show. On June 2, 2008, NESN announced Mae would be leaving the network at the end of the month and made her final Sportsdesk broadcast on June 28. During her tenure at NESN, her popularity was reflected by her nomination to be considered for the first president of Red Sox Nation. The position eventually went to the late Jerry Remy.
MLB Network
In August 2008, it was announced that Mae would become a host/reporter on MLB Network.
Since 2009, she has appeared on Hot Stove, MLB Tonight, 30 Clubs in 30 Days, and Quick Pitch for the channel, as well as hosting the re-airing of Mark Buehrle’s perfect game. In 2011, she became host of a new program, The Rundown, along with Matt Yaloff.
Return to Sportsnet
On September 19, 2011 it was announced that Hazel would leave MLB Network and return to Sportsnet. It was announced on-air during the Toronto Maple Leafs game on November 3 that she debuted on November 14, as anchor of the 6pm edition of Sportsnet Connected. Mae anchored the 6pm edition of the show until July 1, 2015, when the 6pm edition was replaced by Tim & Sid. She currently works on Sportsnet broadcasts of Toronto Blue Jays games as their field-level reporter.
Personal life
She is married to former Major League Baseball first baseman Kevin Barker. She currently has one son with him, Chase.
References
1970 births
Living people
Television anchors from Boston
Canadian expatriate journalists in the United States
Canadian television sportscasters
Filipino emigrants to Canada
Journalists from Toronto
Sports in Boston
York University alumni
MLB Network personalities
Canadian women television journalists
Major Le |
https://en.wikipedia.org/wiki/Frank%20Ritter%20%28psychologist%29 | Frank Ritter is a professor in the College of Information Sciences and Technology, professor in the Department of Psychology, and professor in the Department of Computer Science and Engineering at Penn State University. Before coming to Penn State, he was a lecturer (approximately equivalent to US assistant professor) in the Department of Psychology at the University of Nottingham, and a visiting distinguished professor in the Psychology Department at Chemnitz University of Technology (Germany).
He has published more than 100 articles and conference papers, and edited several books in the area of cognitive modeling, cognitive architectures, human-computer interaction, and learning. He coedited the proceedings of a conference on cognitive modeling and a special issue of the International Journal of Human Computer Studies on cognitive models as users. He is on the editorial board of Proceedings of the Human Factors and Ergonomics Society and Artificial Intelligence and the Simulation of Behaviour Quarterly. He is a series editor for The Oxford Series on Cognitive Models and Architectures.
Background
Ritter received a Bachelor of Science in electrical engineering from University of Illinois at Urbana-Champaign, a master's degree in psychology from Carnegie Mellon University, and a Doctor of Philosophy in artificial intelligence and psychology from the Carnegie-Mellon University. Ritter has received study fellowships from the United States Air Force Office of Scientific Research, and the European Science Foundation's program on Learning in Humans and Machines.
Research
Ritter directs The Applied Cognitive Science Lab at Penn State University. He studies cognitive modelling, cognitive architectures, human computer interaction, and learning. His research has been funded by the US Office of Navy Research, the United States Air Force Office of Scientific Research, DARPA, the Defence Evaluation and Research Agency (U.K.), and the U.K. Joint Council Initiative on Cognitive Science and Human Computer Interaction, as well as corporations in the U.S. and Europe.
His contribution in the cognitive modelling has been widely acknowledged. He received the Best Paper award, at the 16th Conference on Behavior Representation in Modeling and Simulation in 2007. Another of his papers was selected as "Siegel-Wolf Award Winner for best applied modeling paper" at the
International Conference on Cognitive Modeling in 2004.
Also he has created several Web sites, one of which, the Soar-FAQ, won an award for being frequently cited. He has created software, tutorials, and methodology for cognitive modeling, particularly with Soar and ACT-R.
Selected publications
Ritter, F. E., J. Nerb, J., T. O'Shea, T., E. Lehtinen, Editors. (2007). In order to learn: How the Sequence of Topics Influences Learning. 256 pages. Oxford University Press.
St. Amant, R., T. E. Horton, F. E. Ritter. (2007). "Model-based Evaluation of Expert Cell Phone Menu Interaction". Transactions on CHI. |
https://en.wikipedia.org/wiki/The%20Alternate%20Source%20Programmer%27s%20Journal | The Alternate Source, also known as The Alternate Source Programmer's Journal, was a magazine of technical programming articles, most of which were at the assembly language level, focused on the TRS-80 Model I and Model III. A few articles related to the TRS-80 Color Computer.
It was published by Charlie W. Butler (d. September 11, 2014) and Joni M. Kosloski of The Alternate Source, a major TRS-80 software publisher, from around 1980 to around 1983. TAS was known for the high intensity level of its articles and as such was the "prestige" technical journal of the time. Among its contributors were Jake Commander, Jack Decker, Bruce Hansen, Larry Kingsbury, Dennis Kitsz, Steven Kovitz, Alan Moluf, Troy L. Pierce, and Gordon Williams.
The meaning behind the name "The Alternate Source" is that TAS set itself up as being an alternative to the official software and information coming from Radio Shack, the manufacturer of the TRS-80.
References
Bimonthly magazines published in the United States
Defunct computer magazines published in the United States
Magazines established in 1979
Magazines disestablished in 1984 |
https://en.wikipedia.org/wiki/Kiss%20FM%20Australia | Kiss FM is a narrowcast dance music station based in Melbourne. Broadcasting on various frequencies between 87.6 and 88.0 FM in Melbourne. The station's programs are also networked to Orbit FM, a local narrowcaster in Cairns, Queensland.
History
The station grew out of aspirant community license Kiss 90 FM, which lost out for a full-time license in 2001, and Sydney and Brisbane narrowcaster Rhythm FM. Rhythm FM was bought by some of the previous management of Kiss 90 and relaunched as Kiss FM in 2005 as a narrowcast radio service.
Kiss 90 FM
Kiss 90 was an aspirant dance radio station based in Melbourne, Australia. Kiss was the first 100% dance format radio station in Melbourne. The station broadcast sporadically to the Greater Melbourne area between 1994 and 2001 on 89.9 FM.
The station was at the center of nightclub and rave culture trends. The music format was designed to unite dance music lovers and showcase a broad range of dance music, featuring most of Melbourne's DJs live on air.
The station continually broke new songs and gave airplay to many artists for the first time on Australian radio, pushing many into the mainstream charts. This resulted in mainstream commercial radio stations introducing more dance music into their playlists and Fox FM dropping classic rock for a Rhythmic CHR format in the late '90s.
February 1994
Michael Hughes and Nigel Slater, both presenters of dance shows on local metro stations, discussed the opportunity of a 100% dance format radio station. At the time, Melbourne’s commercial radio stations were playing classic rock, hits and memories, easy music and rock. None of stations were running a top 40 format during the day, let alone dance music. A few dance shows existed on local community stations, but they were often limited to small broadcast areas, obscure timeslots and for limited periods. Despite the challenges of finding these shows, many had strong and loyal audience bases. At the time, the mainstream media didn’t see the potential for a dance format station and were more interested in focusing on getting the biggest slice of the more traditional baby boomers.
March 1994
Michael Hughes and Nigel Slater joined forces with renowned night club promotions and event managers Jake Kogakis, Peter Raff and Eric Pipersberg (aka The Gingerbread Men). Together, they worked to form a broadcasting organization, gain support from the dance music industry, nightclubs and Melbourne’s best DJs.
June 1994
A non-profit organization, called Dance Club Broadcasters was formed with Michael, Nigel, Jake, Peter and Eric as well as representatives of the industry. A submission for a temporary license was then put to the Australian Broadcasting Authority (ABA). The committee discussed various options on what to call the new station including D-FM (for Dance FM) as well as GBM FM (initials of Jake, Raff and Eric’s company, GingerBread Men). Eventually, the name Kiss was agreed on due to the awareness and reputation leading |
https://en.wikipedia.org/wiki/Israeli%20Educational%20Television | The Israeli Educational Television (also known as IETV, , HaŦelevizia HaKhinuchít HaIsraelit or just חינוכית - Hinuchit) was a state-owned public terrestrial television network which used to concentrate on producing and broadcasting programs for school children. The first Israeli children's show, featuring Kishkashta, aired on Channel 1 in the 1970s and 1980s. However, since the 1980s, IETV began to produce TV magazines and programs aimed at adults and senior citizens.
History
IETV was established in 1965 as a joint project of the Israeli Ministry of Education and the Rothschild Foundation. It was the first television station in Israel, and its first broadcast, launched in March 1966, was the first television transmission in Israel. In those days the Israeli government was reluctant to introduce television transmissions claiming it would lead to cultural decadence. However limited broadcasts as an instructional tool were approved.
The first transmission was launched on 24 March 1966. Levi Eshkol, the Israeli prime minister, pressed a symbolic button to mark the beginning of the transmission. Lord Victor Rothschild delivered a speech on behalf of the Rothschild Fund. The then-called Instructional Television Trust opened its regular transmission with televised broadcasts of Mathematics, Biology and English classes. 60 television sets were distributed to 32 schools to receive the first broadcasts and comment on their quality. As from the early 1970s and until the early 1990s it was known as the Instructional Television Centre.
Within its first year of existence the IETV expanded its infrastructure, and began to broadcast nationwide. On 2 May 1968, it began to share its channel with the newly established IBA's general public channel. The two organizations would share a single channel for many years to come, the only Israeli television channel until the late 1980s, when the experimental transmissions of the Israeli Channel 2 started.
When the then Channel 2 commercial channel launched officially in 1993, IETV received dedicated slots with commercial inserts .
On June 6, 1995 IETV launched another 24/7 dedicated new channel "Educational 23" which ran exclusively on cable television and from 2001 also on YES - Israel's only DTH (pay satellite television).
The station has remained an autonomous unit of the Ministry of Education, and broadcast more than 200 hours of programming every week.
In December 2013, the channel re-branded as Educational (simply Hinuchit, in Hebrew), and focused on a new children and educational programming schedule from 5:00am Israel Time, as well as adult educational schedule from 8:00pm Israel Time. The channel also has started to upload its shows to their official YouTube channel even before they broadcast on television.
Following a reform in public broadcasting initiated by the government and approved by the Knesset in the summer of 2014, the Israeli Broadcasting Authority was replaced in 2017 by the Israeli Broadcas |
https://en.wikipedia.org/wiki/Ojamanga%20Yamada-kun | is a manga series by Hisaichi Ishii.
Anime
TV series
A 103-episode anime television series was produced for the Fuji TV network and aired from 28 September 1980 to 10 October 1982 with each episode containing 3 7-minute stories. The series aired on Sunday nights from 7:00 to 7:30.
Staff
Director: Hiromitsu Furukawa
Planning: Hiro Akieda
Producer: Tadami Watanabe
Executive Producer: Kōichi Sasaki
Chief Director: Hiroyoshi Mitsunobu
Animation Director: Hiroshi Kanazawa
Screenplay: Hiroshi Kaneko, Tamiko Baba, Tomoko Kanahara
Original Creator: Hisaichi Ishii
Art Director: Mariko Kadono
Cast
Yoshio Yamada: Columbia Top
Yoshida: Yasushi Suzuki
Noboru: Kenbō Kaminarimon
Ine: Reiko Suzuki
Minoru: Hiroko Maruyama
Yoneo: Mitsuo Senda
Yoneko: Emiko Yokoyama
Shigeru: Junji Nishino
Sanae: Akie Yasuda
Fukuda: Yō Yoshimura
Film
An anime film produced by Nihon Herald Pictures was released into Herald Enterprise theaters on 14 March 1981.
Staff
Director: Hiromitsu Furukawa
Planning: Hiro Akieda
Producer: Tadami Watanabe
Executive Producer: Kōichi Sasaki
Chief Director: Hiroyoshi Mitsunobu
Animation Director: Hiroshi Kanazawa
Screenplay: Hiroshi Kaneko, Tamiko Baba, Tomoko Kanahara
Original Creator: Hisaichi Ishii
Art Director: Mariko Kadono
Cast
Yoshio Yamada: Columbia Top
Yoshida: Yasushi Suzuki
Noboru: Kenbō Kaminarimon
Ine: Reiko Susuki
Minoru: Yūko Maruyama
Yoneo: Mitsuo Senda
Yoneko: Emiko Yokoyama
Sources:
References
1979 manga
1980 anime television series debuts
1981 anime films
1981 films
1982 Japanese television series endings
Anime series based on manga
Comedy anime and manga
Animated films based on manga
Fuji TV original programming
Hisaichi Ishii
Japanese animated films
1980s Japanese-language films
Manga adapted into films
Slice of life anime and manga |
https://en.wikipedia.org/wiki/Entropy%20%28computing%29 | In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data. This randomness is often collected from hardware sources (variance in fan noise or HDD), either pre-existing ones such as mouse movements or specially provided randomness generators. A lack of entropy can have a negative impact on performance and security.
Linux kernel
The Linux kernel generates entropy from keyboard timings, mouse movements, and integrated drive electronics (IDE) timings and makes the random character data available to other operating system processes through the special files /dev/random and /dev/urandom. This capability was introduced in Linux version 1.3.30.
There are some Linux kernel patches allowing one to use more entropy sources. The audio_entropyd project, which is included in some operating systems such as Fedora, allows audio data to be used as an entropy source. Also available are video_entropyd, which calculates random data from a video-source and entropybroker, which includes these three and can be used to distribute the entropy data to systems not capable of running any of these (e.g. virtual machines). Furthermore, one can use the HAVEGE algorithm through haveged to pool entropy. In some systems, network interrupts can be used as an entropy source as well.
OpenBSD kernel
OpenBSD has integrated cryptography as one of its main goals and has always worked on increasing its entropy for encryption but also for randomising many parts of the OS, including various internal operations of its kernel. Around 2011, two of the random devices were dropped and linked into a single source as it could produce hundreds of megabytes per second of high quality random data on an average system. This made depletion of random data by userland programs impossible on OpenBSD once enough entropy has initially been gathered.
Hurd kernel
A driver ported from the Linux kernel has been made available for the Hurd kernel.
Solaris
/dev/random and /dev/urandom have been available as Sun packages or patches for Solaris since Solaris 2.6, and have been a standard feature since Solaris 9. As of Solaris 10, administrators can remove existing entropy sources or define new ones via the kernel-level cryptographic framework.
A 3rd-party kernel module implementing /dev/random is also available for releases dating back to Solaris 2.4.
OS/2
There is a software package for OS/2 that allows software processes to retrieve random data.
Windows
Microsoft Windows releases newer than Windows 95 use CryptoAPI to gather entropy in a similar fashion to Linux kernel's /dev/random.
Windows's CryptoAPI uses the binary registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed to store a seeded value from all of its entropy sources.
Because CryptoAPI is closed-source, some free and open source software applications running on the Windows platform use other measures to get randomness. Fo |
https://en.wikipedia.org/wiki/TekBots | TekBots are programmable robots used by several universities to help students learn some of the fundamental concepts that are found in the fields of computer and electrical engineering.
TekBots are centered on the Atmel microcontroller platform. This is the "brain" of the robot as it controls the robot's two motorized wheels allowing it to move. The robot's controller boards, wheels and all other peripherals are housed in an aluminum base.
History
The original TekBots program was developed by the Oregon State University College of Engineering. Professors there wanted to provide a fun and interesting way for students to get excited about engineering. In 2000, the TekBots program was able to get off the ground with a $500,000 grant from the Oregon-based company, Tektronix inc.
Freshman students entering Oregon State University's engineering program start out with $80 worth of electronics to build their initial TekBot. As the students take more and more classes while in the electrical and computer engineering program, more and more functionality is added to the robots; such as bump sensors to sense when the robot has struck a wall or LCD screens to display a message or even infrared (IR) transmitters and receivers to communicate with the robot.
Students program the robot using such software as AVR Studio 4 in order to write and compile a C program. The program is then transferred to the robot via a USB or parallel port dongle.
The TekBots program at Oregon State University is still seed-funded by Tektronix today.
TekBots is currently offered by 5 universities worldwide:
Oregon State University
Iowa State University
Rochester Institute of Technology
University of Nebraska
Fukuoka Institute of Technology
Several community colleges and other universities have also purchased TekBots over the years.
Current classes
At most of the colleges the TekBot is used in an introduction to the electrical engineering course. At Oregon State they are used as a platform for learning in 10 classes. At Nebraska they are used in three classes in combination with the Mega 128 microcontroller. Also at Rochester they are used in digital logic courses as well as the microprocessor and introduction classes.
Both Nebraska and Oregon State combine the TekBot in integrating a freshman mentoring program.
Many senior design projects at Oregon State are completed with the TekBot. An example was the Tekway, a Segway built using TekBots brains.
See also
Vex Robotics Design System
Qfix
Robot kit
References
Engineering Department at Oregon State University.
More Than Machines
TekBots Article <- This link is no longer valid
TekBots: Creating Excitement For Engineering Through Community, Innovation and Troubleshooting
External links
Official TekBots website
Tektronix Website
TekBots Mega128 User Guide
TekBots AVR Studio 4 and Atmega128 Beginner's Guide
Senior Design
Senior Project
Tekway
Educational robots |
https://en.wikipedia.org/wiki/NJIT%20Capstone%20Program | The Capstone Program is a combination of senior-level courses offered to students at the New Jersey Institute of Technology under NJIT’s College of Computing Sciences, which offers the Computer Science, Information Systems, and Information Technology majors. The course can also be taken as an elective by students from other disciplines at the school, such as Management, Engineering, or Architecture.
History
The NJIT Capstone Program was founded in the Fall 2002 semester, by Professor Osama Eljabiri, as a way to instill students with valuable real-world work experience, to which they may not yet have been exposed. Professor Eljabiri's plan for the Capstone Program involved the submission of IT, IS, or CS-related projects by local corporate sponsors from the Newark, NJ area. To assist with the program's coordination, Professor Eljabiri put together an advisory board made up of past students, sponsors, and other colleagues (not necessarily from NJIT).
As a national endorsement for the success of the Capstone Program and its impact on students' education, Carnegie Foundation named Osama Eljabiri NJ Professor of the Year for the year 2007.
Expansion
Since its inception, the Capstone Program has continuously expanded, both in its scope and its student base. After a few successful semesters as an undergraduate course, the Capstone Program was offered to graduate students in the CS, IS, and IT disciplines. It then expanded down. The Professor developed a related program for high school students under the name "Real World Connections". The high school program is composed of three sections:
Beginners, nicknamed the Survivors group, for freshman-sophomore level high school students
Intermediate, or Connections 1 group, for second-year program veterans
Advanced, or Connections 2 group, for third-year program veterans or freshman at the college level
The "Real World Connections" program was developed to help younger students get a head start in the science and technology field, and is run by the Professor and members of the college-level capstone course. Students from the graduate and undergraduate classes serve as mentors and advisors for the high school program.
The Fall semester of 2007 saw the program expand yet again, this time reaching out to students at the junior high school level.
In addition to expanding its student base, Professor Eljabiri has consistently added to the types of projects that students can choose for their semester's work:
Industry-sponsored track: oldest and most popular track. Features projects provided by corporate/industry sponsors
University-sponsored track: projects provided by NJIT departments or colleges
Entrepreneurship track: students work on an entrepreneurial idea throughout the semester, taking the necessary steps to start their own business
Teaching and Advising Track: open to only four (4) students per semester, students plan, develop, and teach technical workshops to train and advise their p |
https://en.wikipedia.org/wiki/Al%20Sumaria | Alsumaria News () is an independent Iraqi satellite TV network that transmits on Nilesat 102,
Hot Bird 8, and NOORSAT/Eurobird. Established by a group of businessmen in 2004, it has 700 employees across Iraq, Lebanon, the United Arab Emirates, and Jordan.
Alsumaria adopts a liberal perspective whilst maintaining religious faith and strongly refuting repression and autocracy. Alsumaria produces almost all of its 24/7 programs in-house. It broadcasts live entertainment, social, political, and game shows hosted by young Iraqis, and drama and comedy series starred, directed, and produced by Iraqis.
Alsumaria have exclusive rights to broadcast various movies, documentaries, musicals, children, entertainment, and sports shows.
Channels
Terrestrial broadcasting 64 UHF
NileSat 102
Frequency: 12130 MHz
Polarization: Vertical
Symbol rate: 27.5 Mb/s
FEC: 5/6
HotBird 8 13° East
Transponder: 77
Frequency: 12245 MHz
Polarization: Horizontal
Symbol Rate: 27.500 M Symbol
FEC: 3/4
Availability
It is made available for a primarily-Arab audience throughout the world via satellite, online streaming through its website and in the Americas on myTV.
References
Alsumaria
External links
Television stations in Iraq
Arabic-language television stations
Television channels and stations established in 2004 |
https://en.wikipedia.org/wiki/Baghdad%20Satellite%20Channel | Baghdad Satellite Channel is a terrestrial television network in Iraq.
References
External links
Television stations in Iraq
Muslim Brotherhood
Arabic-language television stations |
https://en.wikipedia.org/wiki/Pervy | Pervy may refer to:
Perversion
Pervy Margreth, the eponymous character of the episode "The New Student" in Invisible Network of Kids
Pervy Kanal (Channel One in Russia)
Russian rural localities
Chegem Pervy (Чеге́м Пе́рвый) a 1972 settlement renamed in 2000
Pervy May in Uchalinsky District of Bashkortostan
Volchy-Pervy in Volokonovsky District of Belgorod Oblast |
https://en.wikipedia.org/wiki/Chess%20Communication | Chess Communication was a Norwegian mobile virtual network operator (MVNO). Owned by Telia Company it uses its sister company Telia Norge's (formerly NetCom) network.
History
The company was founded by A-Pressen in 1999 but sold to Idar Vollvik in 2002. He merged the company with the operator Sense that was owned by Reitangruppen, who also received a partial ownership in Chess. In 2006 Vollvik sold Chess to the Swedish multinational TeliaSonera for NOK 1.6 billion. The largest loser in the deal was Telenor who lost an estimated NOK 600–800 million per year in income because Chess moved their customers from the Telenor network to the TeliaSonera owned NetCom network. The company was deleted from the Register of Business Enterprises on 11 November 2011 after its merger with Telia Company, and continued as a discount brand from then until June 2018, when Telia closed down the brand and migrated all customers to the Telia network.
References
External links
Notice of removal from the Register of Business Enterprises
Mobile phone companies of Norway
Norwegian companies established in 1999
Companies based in Bergen
Amedia |
https://en.wikipedia.org/wiki/Fast%20flux | Fast flux is a domain name system (DNS) based evasion technique used by cyber criminals to hide phishing and malware delivery websites behind an ever-changing network of compromised hosts acting as reverse proxies to the backend botnet master—a bulletproof autonomous system. It can also refer to the combination of peer-to-peer networking, distributed command and control, web-based load balancing and proxy redirection used to make malware networks more resistant to discovery and counter-measures.
The fundamental idea behind fast-flux is to have numerous IP addresses associated with a single fully qualified domain name, where the IP addresses are swapped in and out with extremely high frequency, through changing DNS resource records, thus the authoritative name servers of the said fast-fluxing domain name is—in most cases—hosted by the criminal actor.
Depending on the configuration and complexity of the infrastructure, fast-fluxing is generally classified into single, double, and domain fast-flux networks. Fast-fluxing remains an intricate problem in network security and current countermeasures remain ineffective.
History
Fast-fluxing was first reported by the security researchers William Salusky and Robert Danford of The Honeynet Project in 2007; the following year, they released a systematic study of fast-flux service networks in 2008. Rock Phish (2004) and Storm Worm (2007) were two notable fast-flux service networks which were used for malware distribution and phishing.
Fast-flux service network
A fast-flux service network (FFSN) is a network infrastructure resultant of the fast-fluxed network of compromised hosts; the technique is also used by legitimate service providers such as content distribution networks (CDNs) where the dynamic IP address is converted to match the domain name of the internet host, usually for the purpose of load balancing using round-robin domain name system (RR-DNS). The purpose of using FFSN infrastructure for the botnets is to relay network requests and act as a proxy to the backend bulletproof content server which function as an "origin server".
The frontend bots, which act as an ephemeral host affixed to a control master, are called flux-agents whose network availability is indeterminate due to the dynamic nature of fast-fluxing. The backend motherships do not establish direct communication with the user agents, rather every actions are reverse proxied through compromised frontend nodes, effectively making the attack long-lasting and resilient against take down attempts.
Types
Fast-fluxing is generally classified into two types: single fluxing and double fluxing, a build-on implementation over single fluxing. The phraseologies involved in fast-fluxing includes "flux-herder mothership nodes" and "fast-flux agent nodes", referred to the backend bulletproof botnet controller and the compromised host nodes involved in reverse proxying the traffic back-and-forth between the origin and clients respectively. The co |
https://en.wikipedia.org/wiki/Munich%20Hackerbr%C3%BCcke%20station | Munich Hackerbrücke station is a station opened in 1972 on the Munich S-Bahn network below Hackerbrücke (Hacker bridge) that is close to Munich Central Station (). It is classified by Deutsche Bahn as a category 3 station and has a 211 metre long central platform between two platform tracks and is located directly in front of a 3.2 percent drop into the S-Bahn trunk line tunnel. Immediately to the south is the Munich Hauptbahnhof signal box, which monitors and controls all the track work at the Central Station and on the adjoining lines (excluding the S-Bahn).
Particularly during the periods of the Oktoberfest, this station is important because it is only about 650 metres from the main venue at Theresienwiese. Munich Hackerbrücke is served by the S-Bahn lines 1 to 8. Only the S-Bahn lines S 20, S 27 and A do not operate here. In addition to the S-Bahn station, the tram stop of the same name is located on the adjacent street called Arnulfstraße and is served by tram lines , and . The Munich central bus station opened north of the station on 11 September 2009.
Notable places nearby
Circus Krone
Hackerbrücke
Zentraler Omnibusbahnhof München
References
Hackerbrücke
Hackerbrücke
Maxvorstadt
Railway stations in Germany opened in 1972 |
https://en.wikipedia.org/wiki/Panjer%20recursion | The Panjer recursion is an algorithm to compute the probability distribution approximation of a compound random variable
where both and are random variables and of special types. In more general cases the distribution of S is a compound distribution. The recursion for the special cases considered was introduced in a paper by Harry Panjer (Distinguished Emeritus Professor, University of Waterloo). It is heavily used in actuarial science (see also systemic risk).
Preliminaries
We are interested in the compound random variable where and fulfill the following preconditions.
Claim size distribution
We assume the to be i.i.d. and independent of . Furthermore the have to be distributed on a lattice with latticewidth .
In actuarial practice, is obtained by discretisation of the claim density function (upper, lower...).
Claim number distribution
The number of claims N is a random variable, which is said to have a "claim number distribution", and which can take values 0, 1, 2, .... etc.. For the "Panjer recursion", the probability distribution of N has to be a member of the Panjer class, otherwise known as the (a,b,0) class of distributions. This class consists of all counting random variables which fulfill the following relation:
for some and which fulfill . The initial value is determined such that
The Panjer recursion makes use of this iterative relationship to specify a recursive way of constructing the probability distribution of S. In the following denotes the probability generating function of N: for this see the table in (a,b,0) class of distributions.
In the case of claim number is known, please note the De Pril algorithm. This algorithm is suitable to compute the sum distribution of discrete random variables.
Recursion
The algorithm now gives a recursion to compute the .
The starting value is with the special cases
and
and proceed with
Example
The following example shows the approximated density of where and with lattice width h = 0.04. (See Fréchet distribution.)
As observed, an issue may arise at the initialization of the recursion. Guégan and Hassani (2009) have proposed a solution to deal with that issue
.
References
External links
Panjer recursion and the distributions it can be used with
Actuarial science
Compound probability distributions
Theory of probability distributions |
https://en.wikipedia.org/wiki/Fletcher%20Jones%20%28American%20entrepreneur%29 | Fletcher Roseberry Jones (January 22, 1931November 7, 1972) was an American businessman, computer pioneer and Thoroughbred racehorse owner.
Early life and education
Born in Bryan, Texas, Jones was the third of three children of an impoverished Depression era family. He graduated from Allen Military Academy in 1949, then studied at university for two years, but did not graduate. His interest in mathematics led to jobs in the fledgling computer departments at aviation companies. Married in 1951, he was transferred to California by his employer, North American Aviation Corp. After time at the company's offices in Columbus, Ohio, Jones and his wife and two small children settled in Los Angeles where he managed a North American Aviation computer center.
Career
In 1959, Fletcher Jones went into business with Roy Nutt, a widely respected computer programmer who had been working for United Aircraft Corp. The two founded a software services company named Computer Sciences Corporation (CSC), when Jones, who ran the business and marketing end of things, obtained a contract from Honeywell that gave their business profitability and respect within the industry. In 1961, the company made a major move into the space industry when they obtained a contract to support NASA Jet Propulsion Laboratory's Flight Operations Facility. Within four years of its founding, CSC became the largest software company in the United States. Taking their business public with an IPO listed on the American Stock Exchange, Jones and Nutt had become multi-millionaires. By the end of the 1960s, CSC was listed on the New York Stock Exchange and had operations in Canada, the United Kingdom, (Germany), Italy, and in the Netherlands.
Westerly Stud Farms
As a hobby business, Fletcher Jones became involved in the breeding and racing of Thoroughbred horses. In 1966, he acquired a property near Santa Ynez, California that he named Westerly Stud Farms. In addition to a large home, he built a U-shaped main barn, breeding sheds, and other service buildings, as well as a half-mile training track. In order to spend more time on his farm, Jones built an airstrip and piloted his own aircraft to and from the Santa Monica airport near where his office was located.
Westerly Stud Farms' best known horse was Typecast, a filly who won the 1972 Eclipse Award as the American Champion Older Female Horse.
Selected stakes race wins for Westerly Stud Farms
Frank E. Kilroe Mile – Fleet Host (1967)
San Luis Rey Handicap – Fleet Host (1967)
San Carlos Handicap – Rising Market (1970)
San Simeon Handicap – Long Position (1971)
Las Palmas Handicap – Typecast (1971)
Del Mar Oaks – House of Cards (1972)
Santa Monica Handicap – Typecast (1972)
Hollywood Invitational Turf Handicap – Typecast (1972)
Man o' War Stakes – Typecast (1972)
Fletcher Jones gave CSC employee Martin J. Wygod his first two horses as a birthday gift. Wygod and his wife Pam have remained major owners of racing Thoroughbreds ever since.
|
https://en.wikipedia.org/wiki/List%20of%20United%20States%20Air%20Force%20communications%20squadrons | The United States Air Force has several variants of squadrons focused on communications and cyberspace.
Air and Space Communications Squadrons (ACOMS)
An Air and Space Communications Squadron is usually assigned to either a standard Numbered Air Force (NAF) or their parent Air Operations Center and directly supports the Air Operations Center.
Communications Groups (CG) and Squadrons (CS)
The emblems of many communications squadrons feature the armored fist and three lightning bolts of the previous career field's Communications and Information badge, which was based on the emblem first approved for Air Force Communications Service.
Four-digit major command-controlled units
Communications squadrons
Communications Groups
Airways and Air Communications Service squadrons
The first Airways and Air Communications Service (AACS) squadrons were formed on 1 June 1948, when the United States Air Force (USAF) discontinued the Army Air Forces Base Unit system while implementing the Wing Base reorganization (Hobson Plan). On 1 October 1948, active AACS squadrons were renumbered starting at 1900 when USAF required Major Command controlled units to have four digits contained within blocks of numbers allotted to the commands. AACS Squadrons active on 1 June 1961 were redesignated as communications squadrons. Those squadrons numbered in the 1200s were renumbered in the 2100s retaining the last two digits of their AACS number.
USAF Communications Squadrons
emblems
Communications Support Squadrons (CSPTS or JCSS)
Air Combat Command Communications Support Squadron
224th Joint Communications Support Squadron, formerly 224th Combat Communications Squadron (Contingency), Brunswick, Georgia, Georgia Air National Guard
290th Joint Communications Support Squadron, MacDill AFB, Florida Air National Guard
375th Communications Support Squadron, 375th Communications Group, 375th Air Mobility Wing
Expeditionary Communications Squadrons (ECS)
Combat Communications Squadrons (CBCS)
Space Communications Squadrons (SCS)
A Space Communications Squadron is a Communications Squadron supporting the United States Space Force.
Engineering Installation Squadrons
|−270th Electronics Installation Group || || PAANG Willow Grove PA ||
Specialized Communications Squadrons
References
Communications
List |
https://en.wikipedia.org/wiki/Roy%20Nutt | Roy Nutt (October 20, 1930 – June 14, 1990) was an American businessman and computer pioneer. He was a co-creator of Fortran and co-founded Computer Sciences Corporation.
Fortran
Born in Marlborough, Massachusetts, Roy Nutt grew up in Glastonbury, Connecticut. He graduated in 1953 with a bachelor's degree in mathematics from Trinity College in Hartford.
A pioneer in the fledgling software industry of the 1950s, Roy Nutt was a major contributor in the creation of IBM's FORTRAN, the first high-level scientific and engineering programming language. Part of the FORTRAN project's team, he was responsible for developing the computer command FORMAT, which controls data for input and output.
Nutt also created an assembler for the IBM 704 mainframe that is today seen as the most successful individual programming effort of the 1950s.
SHARE
During this period, Roy Nutt met Fletcher Jones when he joined with nineteen others from the aerospace industry to form the influential IBM user group known as SHARE which developed SOS, one of the first operating systems. Jones, as secretary of the group, became its national spokesman and their working relationship would later result in a business partnership.
CSC
Roy Nutt had become a widely respected computer programmer for United Aircraft Corp. in East Hartford, Connecticut, where he developed the Symbolic Assembly Program for the IBM 704. He left in 1959 to team up with Fletcher Jones to establish Computer Sciences Corporation (CSC) in Los Angeles.
Jones, who ran the business and marketing end of things, obtained a contract from Honeywell that gave their business profitability and respect within the industry. Nutt was responsible for building Honeywell the first commercial compiler (FACT) and oversaw the company's major 1961 entry into the space industry when they obtained a contract to support the NASA Jet Propulsion Laboratory's Flight Operations Facility.
Within four years of its founding, CSC became the largest software company in the United States. Taking their business Public company with an IPO listed on the American Stock Exchange. By the end of the 1960s, CSC was listed on the New York Stock Exchange and had operations in Canada, the United Kingdom, (Germany), Italy, and in The Netherlands.
Later years
In later years, Roy Nutt used some of his wealth to benefit Trinity College. He set up an endowment fund for a professorship and donated money to assist in the construction of the college's engineering and computing building. Trinity College honored him in May 2012 when they renamed the building the Roy Nutt Mathematics, Engineering & Computer Science Center.
Roy Nutt died of lung cancer in Seattle, Washington on June 14, 1990.
References
00
Further reading
Pollock, John P. (1998) Fletcher Jones: An America Success Story. Los Angeles: Pollock.
External links
Computer Sciences Corporation website with company history
Trinity College ME & CSC dedication program containing a short biography of |
https://en.wikipedia.org/wiki/Shibani%20Joshi | Shibani Sona Joshi (born October 4, 1975) is a reporter for the Fox Business Network.
Career
Joshi began her journalism career as a news production assistant at CNNfn where she contributed to Lou Dobbs Moneyline and CNN Money Morning.
Joshi was a producer in New York City for Reuters Television and Times Now, the joint venture news channel with The Times of India. Joshi served as a reporter covering breaking news for News 12 Westchester.
Joshi has also served as the host of ImagineAsian TV's The Pulse variety show, contributed to ABCNews.com and ABC News Now covering technology and business stories, and was a co-host of American Desi's Point of View talk show. From 2004 to 2006, Joshi held the position of Senior Manager in Strategy and Business Development at Disney/ABC Media Networks where she worked on the launch of ABC News Now.
She has been a guest on the Fox News Channel's late-night satire show Red Eye w/ Greg Gutfeld.
Joshi now runs her own website that reports on matters of high technology.
Germany and solar power
Joshi is known for asserting that Germany's advantage over the US in the production of solar power stems from the additional sunlight Germany receives. In response, Slate.com's Will Oremus noted, "virtually the entirety of the continental United States gets more sun than even the sunniest part of Germany" Joshi retracted her statement and restated "[I]n fact, the difference come down more to subsidies and political priorities and has nothing to with sunshine."
Family
Joshi is a native of Oklahoma City. Both of her parents are immigrants from India. Her father, Dileep Joshi, is a retired vice president for manufacturing and engineering at Lucent Technologies. Her mother, Meghana Joshi, was formerly an information technology manager in Norman, Oklahoma at Johnson Controls, Inc.
Joshi was married to Rahul Advani, a principal at Energy Capital Partners, but the couple later divorced.
External links
FoxBusiness.com bio
Marriage announcement in the New York Times
References
Living people
American women journalists
American women writers of Indian descent
Fox Business people
American Hindus
University of Oklahoma alumni
Harvard Business School alumni
1975 births
Writers from Oklahoma City
21st-century American women |
https://en.wikipedia.org/wiki/Grande%20Communications | Grande Communications Networks, LLC is an American telecommunications company, based in San Marcos, Texas, that uses a fiber optic and cable network to offer broadband services. The company was established in 1999 when it was the recipient of the largest round of venture capital funding in Texas. Grande delivers internet access, local and long-distance telephone service and digital cable over its own network to nine different markets in Texas. Grande Communications serves as the primary provider of cable services for dormitories on the campuses of Texas State University, University of the Incarnate Word, Baylor University and the University of Texas at Austin. It is controlled by private equity firm TPG Capital through its affiliate Patriot Media Consulting. Grande Communications is available to an estimated 1.1 million people, making it the 16th largest provider of cable broadband in the U.S. by coverage area.
Acquisitions and mergers
On May 22, 2017 RCN Corporation, Wave Broadband and Grande Communications announced the combination of the three companies to create the sixth largest cable operator across seven of the ten top US cities.
On February 24, 2020, RCN Corporation announced its planned merger of enTouch Systems, a provider of high-speed internet, video, voice and home security services to the Houston area. The transaction is expected to close by the end of 2020. Upon closing, the transaction will add approximately 22,000 customers.
On November 2, 2020, the US cable operator group of RCN, Grande, Wave and enTouch, collectively known as Astound Broadband, was sold by TPG Capital and Patriot Media Management to Stonepeak Infrastructure Partners for $8.1 billion, including debt.
Internet service
These are Grande's speed tiers as of February 28, 2018.
References
External links
Internet service providers of the United States
San Marcos, Texas
Cable television companies of the United States
Telecommunications companies established in 1999
Companies based in Texas
TPG Capital companies
1999 establishments in Texas |
https://en.wikipedia.org/wiki/Innodata | Innodata Inc., formerly Innodata Isogen, Inc., is an American company that provides business process, technology and consulting services. The company also provides products that aim to help clients create, manage, use and distribute digital information.
As of June 2012, Innodata has a client base that includes many media, publishing and information services companies, as well as enterprises in information-intensive industries such as aerospace, defense, financial services and government.
Founded in 1988, Innodata employs more than 5,000 people worldwide. It is headquartered in Ridgefield Park, NJ, and has additional offices in Europe, Israel, India, the Philippines, Sri Lanka and a business presence in China.
History
Innodata Inc. was founded in 1988 in New York City to provide digitized content and created quality assurance and audit procedures.
By 1992, the year the company went public, Innodata had grown to more than 1,000 employees worldwide. Throughout the decade, the company opened major facilities in the Philippines, Sri Lanka and India.
The company tripled its revenue to $60 million from $20 million between 1999 and 2001.
Innodata acquired Isogen International in 2001 and integrated both of the company’s content management and publishing technologies, structured information standards and outsourcing services. In 2003, the name of Innodata Isogen Inc. was formally adopted by the company.
Starting in 2007, the company started taking advantage of the growing popularity of e-books to become a producer of technology and processes for transforming books into e-book formats for distribution and sell-through on tablets and e-readers. Innodata has produced over 1.2 million e-books and is distributing more than 1,500 e-books per day across 25 global platforms and e-bookstores.
Innodata Data Solutions (IADS)
In 2011, the company launched a new segment, Innodata Advanced Data Solutions, to develop products intended to help companies outside the information and publishing industries adopt digital and mobile devices. Within this segment, they started two new subsidiaries, Synodex and DocGenix.
In 2012, the company changed its name back to “Innodata”. This move became official on June 5, 2012 when Innodata’s stockholders approved an amendment to the Company’s Certificate of Incorporation to change the Company’s name from “Innodata Isogen, Inc.” to “Innodata Inc.”
In July 2014, Innodata acquired MediaMiser Ltd. (“MediaMiser”), a media monitoring and analysis company based in Ottawa, Ontario, Canada that provides software and professional services for public relations and marketing professionals.
In December 2014, Innodata acquired intellectual property and related assets of Bulldog Reporter, a PR company.
References
Companies listed on the Nasdaq
Mass media companies of the United States
Publishing companies of the United States
Outsourcing companies |
https://en.wikipedia.org/wiki/SystemTap | In computing, SystemTap () is a scripting language and tool for dynamically instrumenting running production Linux-based operating systems. System administrators can use SystemTap to extract, filter and summarize data in order to enable diagnosis of complex performance or functional problems.
SystemTap consists of free and open-source software and includes contributions from Red Hat, IBM, Intel, Hitachi, Oracle, the University of Wisconsin-Madison and other community members.
History
SystemTap debuted in 2005 in Red Hat Enterprise Linux 4 Update 2 as a technology preview.
After four years in development, SystemTap 1.0 was released in 2009.
, SystemTap runs fully supported in all Linux distributions including RHEL / CentOS 5 since update 2, SLES 10, Fedora, Debian and Ubuntu.
Tracepoints in the CPython VM and JVM were added in SystemTap 1.2 in 2009.
In November 2019, SystemTap 4.2 included prometheus exporter.
Usage
SystemTap files are written in the SystemTap language (saved as .stp files) and run with the stap command-line.
The system carries out a number of analysis passes on the script before allowing it to run. Scripts may be executed with one of three backends selected by the --runtime= option. The default is a loadable kernel module, which has the fullest capability to inspect and manipulate any part of the system, and therefore requires most privilege. Another backend is based on the dynamic program analysis library DynInst to instrument the user's own user-space programs only, and requires least privilege. The newest backend is based on eBPF byte-code, is limited to the Linux kernel interpreter's capabilities, and requires an intermediate level of privilege. In each case, the module is unloaded when the script has finished running.
Scripts generally focus on events (such as starting or finishing a script), compiled-in probe points such as Linux "tracepoints", or the execution of functions or statements in the kernel or user-space.
Some "guru mode" scripts may also have embedded C, which may run with the -g command-line option. However, use of guru mode is discouraged, and each SystemTap release includes more probe points designed to remove the need for guru-mode scripts. Guru mode is required in order to permit scripts to modify state in the instrumented software, such as to apply some types of emergency security fixes.
As of SystemTap version 1.7, the software implements the new stapsys group and privilege level.
Simple examples
The following script shows all applications setting TCP socket options on the system, what options are being set, and whether the option is set successfully or not.
# Show sockets setting options
# Return enabled or disabled based on value of optval
function getstatus(optval)
{
if ( optval == 1 )
return "enabling"
else
return "disabling"
}
probe begin
{
print ("\nChecking for apps setting socket options\n")
}
# Set a socket option
probe tcp.setsockopt
{
|
https://en.wikipedia.org/wiki/James%20F.%20Allen%20%28computer%20scientist%29 | James Frederick Allen (born 1950) is a computational linguist recognized for his contributions to temporal logic, in particular Allen's interval algebra. He is interested in knowledge representation, commonsense reasoning, and natural language understanding, believing that "deep language understanding can only currently be achieved by significant hand-engineering of semantically-rich formalisms coupled with statistical preferences". He is the John H. Dessaurer Professor of Computer Science at the University of Rochester
Biography
Allen received his Ph.D. from the University of Toronto in 1979, under the supervision of C. Raymond Perrault, after which he joined the faculty at Rochester. At Rochester, he was department chair from 1987 to 1990, directed the Cognitive Science Program from 1992 to 1996, and co-directed the Center for the Sciences of Language from 1996 to 1998. He served as the Editor-in-Chief of Computational Linguistics from 1983–1993. Since 2006 he has also been associate director of the Florida Institute for Human and Machine Cognition.
Academic life
TRIPS project
The TRIPS project is a long-term research to build generic technology for dialogue (both spoken and 'chat') systems, which includes natural language processing, collaborative problem solving, and dynamic context-sensitive language modeling. This is contrast with the data driven approaches by machine learning, which requires to collect and annotate corpora, i.e. training data, firstly.
PLOW agent
PLOW agent is a system that learns executable task models from a single collaborative learning session, which integrates wide AI technologies including deep natural language understanding, knowledge representation and reasoning, dialogue systems, planning/agent-based systems, and machine learning. This paper won the outstanding paper award at AAAI in 2007.
Selected works
Books
Allen is the author of the textbook Natural Language Understanding (Benjamin-Cummings, 1987; 2nd ed., 1995).
He is also the co-author with Henry Kautz, Richard Pelavin, and Josh Tenenberg of Reasoning About Plans (Morgan Kaufmann, 1991).
Articles
2007. PLOW: A Collaborative Task Learning Agent. (with Nathanael Chambers et al) AAAI'07
won the outstanding paper award at AAAI in 2007.
2006. Chester: Towards a Personal Medication Advisor. (with N. Blaylock, et al) Biomedical informatics 39(5)
1998. TRIPS: An Integrated Intelligent Problem-Solving Assistant. (with George Ferguson) AAAI'98
1983. Maintaining Knowledge about Temporal Intervals. CACM 26, 11, 832-843
Awards and honors
In 1991 he was elected as a fellow of the Association for the Advancement of Artificial Intelligence (1990, founding fellow).
In 1992 he became the Dessaurer Professor at Rochester.
References
External links
James F. Allen's Home Page
Google Scholar, h-index is 59.
Florida Institute for Human and Machine Cognition people
Living people
1950 births
American computer scientists
Linguists from the United States
American |
https://en.wikipedia.org/wiki/Snooth | Snooth is a defunct (as of 2023) social networking website based in New York City, United States. It was founded in November 2006 by Philip J. K. James, a graduate of Oxford University and Columbia Business School. The company raised $300,000 in seed financing in December 2006. Snooth has built an online community for wine drinkers; users can research, review and shop for wine on the site.
Awards
In 2008, Snooth receives the Model of Excellence Award from infoCommerce.
In 2010, Snooth becomes 2010 Wine Blog Awards Finalist.
History
The site has been noted in Decanter (magazine), the New York Daily News, and the New York Post.
In November 2007, the company raised another $1 million from angel investors to expand its operations and merchant relationships.
In 2010, Rich Tomko (former Time Warner/CNN Executive) joined as CEO and focused the company on an ad-supported business model. Strong revenue growth helped fuel a profitable year in 2012.
In 2013, Snooth's Co-Founder and former CTO Mark Angelillo was named CEO.
References
External links
Snooth website
American review websites
Wine websites
Companies based in New York City |
https://en.wikipedia.org/wiki/Hot%20R%26B/Hip-Hop%20Songs | The Hot R&B/Hip-Hop Songs chart ranks the most popular R&B and hip hop songs in the United States and is published weekly by Billboard. Rankings are based on a measure of radio airplay, sales data, and streaming activity. The chart had 100 positions but was shortened to 50 positions in October 2012.
The chart is used to track the success of popular music songs in urban, or primarily African American, venues. Dominated over the years at various times by jazz, rhythm and blues, doo-wop, rock and roll, soul, and funk, it is today dominated by contemporary R&B and hip hop. Since its inception, the chart has changed its name many times in order to accurately reflect the industry at the time.
History
Beginning in 1942, Billboard published a chart of bestselling African-American music, first as the Harlem Hit Parade, then as Race Records. Then in 1949, Billboard began publishing a Rhythm and Blues chart, which entered "R&B" into mainstream lexicon. These three charts were consolidated into a single Hot R&B Singles chart in October 1958.
From November 30, 1963, to January 23, 1965, there were no Billboard R&B singles charts. The "Hot R&B Singles" chart was discontinued when Billboard determined it unnecessary due to so much crossover of titles between the R&B and pop charts in light of the rise of Motown. The chart was reinstated as Hot Rhythm & Blues Singles on January 30, 1965.
Beginning August 23, 1969, the rhythm and blues was replaced in favor of "soul", and the chart was renamed to Best Selling Soul Singles. The move was made by a Billboard editorial decision that the term "soul" more accurately accounted for the "broad range of song and instrumental material which derives from the musical genius of the black American". In late June 1982, the chart was renamed again, this time to Hot Black Singles because the music that African-Americans were buying and listening to had a "greater stylistic variety than the soul sound" of the early 1970s. Black Singles was deemed an acceptable term to encompass pop, funk, and early rap music popular in urban communities.
Beginning October 27, 1990, the Hot Black Singles chart was returned to the Hot R&B Singles name first used in 1958. Hip hop was introduced to the chart beginning with the December 11, 1999 issue, when Billboard changed the name to Hot R&B/Hip-Hop Singles & Tracks to recognize the influence and relationship of hip hop to the genre. Within a few years, the crossover of R&B titles onto the pop chart was so significant that all Top Ten songs on the Billboard Hot 100 chart on October 11, 2003, were by black artists. The lengthy title was shortened to "Hot R&B/Hip-Hop Songs" on April 30, 2005.
The chart's methodology was changed starting with the October 20, 2012 issue, to match the Billboard Hot 100's---incorporating digital downloads and video streaming data (R&B/Hip-Hop Digital Songs) and combining it with airplay of R&B and hip-hop songs across all radio formats, to determine song position. A |
https://en.wikipedia.org/wiki/Tornado%20diagram | Tornado diagrams, also called tornado plots, tornado charts or butterfly charts, are a special type of Bar chart, where the data categories are listed vertically instead of the standard horizontal presentation, and the categories are ordered so that the largest bar appears at the top of the chart, the second largest appears second from the top, and so on. They are so named because the final chart visually resembles either one half of or a complete tornado.
Purpose
Tornado diagrams are useful for deterministic sensitivity analysis – comparing the relative importance of variables. For each variable/uncertainty considered, one needs estimates for what the low, base, and high outcomes would be. The sensitive variable is modeled as having an uncertain value while all other variables are held at baseline values (stable). This allows testing the sensitivity/risk associated with one uncertainty/variable. For example, if a decision maker needs to visually compare 100 budgetary items, and wishes to identify the ten items one should focus on, it would be nearly impossible to do using a standard bar graph. In a tornado diagram of the budget items, the top ten bars would represent the items that contribute the most to the variability of the outcome, and therefore what the decision maker should focus on.
References
Further reading
Technical note: constructing tornado diagrams with spreadsheets. Engineering Economist | June 22, 2006 | Eschenbach, Ted G
Sensitivity analysis |
https://en.wikipedia.org/wiki/Robert%20J.%20Marks%20II | Robert Jackson Marks II (born August 25, 1950) is an American electrical engineer, computer scientist and Distinguished Professor at Baylor University. His contributions include the Zhao-Atlas-Marks (ZAM) time-frequency distribution in the field of signal processing, the Cheung–Marks theorem in Shannon sampling theory and the Papoulis-Marks-Cheung (PMC) approach in multidimensional sampling. He was instrumental in the defining of the field of computational intelligence and co-edited the first book using computational intelligence in the title. A Christian and an old earth creationist, he is a subject of the 2008 pro-intelligent design motion picture, Expelled: No Intelligence Allowed.
Professional career
Marks has received his bachelor's and master's degrees from Rose–Hulman Institute of Technology in 1972 and 1973, respectively. During his doctoral studies at Texas Tech University, he was supervised by J.F. Walkup; his dissertation focused on optical signal processing. He obtained his Ph.D. degree in 1977.
Marks is a Distinguished Professor of Electrical and Computer Engineering at Baylor University and serves as the Director of the Walter Bradley Center for Natural and Artificial Intelligence. From 1977 to 2003, he was on the faculty of the University of Washington in Seattle. He was the first president of the Institute of Electrical and Electronics Engineers (IEEE) Neural Networks Council (now the IEEE Computational Intelligence Society). He is a Fellow of the IEEE and the Optical Society of America.
Technical contributions
Marks is a researcher in the area of electrical engineering.
Treatment of prostate cancer. Marks and his colleagues developed algorithms for real time identification of placement of radioactive seeds in cancerous prostates. For this work, he was a co-recipient of the Judith Stitt Best Abstract Award from the American Brachytherapy Society. The algorithm is used clinically.
Optimal detection. In the field of detection theory, Marks and his colleagues developed the first closed form solution for the Neyman–Pearson optimal detection of signals in non-Gaussian noise
Power load forecasting using neural networks. With his colleagues at the University of Washington, Marks was the first to apply an artificial neural network to forecast power demands for utilities in 1991. Six years later neural networks were being used by 32 major North American utilities and remains in common use today. IEEE sponsors a MATLAB based webinar on use of neural networks in load forecasting. A technique "similar to one already used to successfully forecast electrical load needs" has been used to forecast Dow Jones closing values using data from millions of Twitter messages.
The Smith Tube. Marks was a member of the Baylor research team that introduced the Smith Tube, a visualization tool useful in advanced microwave systems design. A generalization of the Smith Chart, the Smith Tube is currently in Keysight's Advanced Design System (ADS) so |
https://en.wikipedia.org/wiki/Kynogon | Kynogon was a computer software company that provided AI middleware to the video game and the simulation industries. The company was acquired by Autodesk in February 2008, and its flagship product was titled Autodesk Navigation. Autodesk ended the sale of Navigation in July 2017.
History
Kynogon was founded in France in 2000 by Pierre Pontevia and Jacques Gaubil. It also has offices in Montreal, Quebec, Canada, and the UK. Kynogon has won many awards such as Red Herring 100 or Develop Industry Excellence.
Kynogon partners
In the video game domain, Kynogon maintains partnerships with console makers (Microsoft, Sony and Nintendo). Kynogon is a member of Epic Games's integrated partner program and Kynapse is available as integrated into the Unreal Engine. Kynogon also works with other complementary middleware developers (Ageia, Emergent Game Technologies, Trinigy).
In the simulation industry, Kynogon partners with MAK Technologies and is the developer of BHave, a plug-in to VR-Forces CGF.
References
External links
Kynogon site
Software companies of France
Autodesk acquisitions |
https://en.wikipedia.org/wiki/Kynapse | Kynapse is the artificial intelligence middleware product, developed by Kynogon, which was bought by Autodesk in 2008 and called Autodesk Kynapse. In 2011, it has been re-engineered and rebranded Autodesk Navigation.
Since the discontinuation of Autodesk Gameware, the product is obsolete.
Features
A complete 3D pathfinding
An automatic AI data generation tool
Optimizations for multicore/multiprocessing/Cell architectures
Spatial reasoning
Streaming mechanisms to handle very large terrains
The management of dynamic and destructible terrains
Usage
Kynapse has been used in the development of more than 80 game titles including Mafia II, Crackdown, Alone in the Dark 5, Fable II, Medal of Honor: Airborne, Sacred 2: Fallen Angel, Watchmen: The End Is Nigh, Sonic the Hedgehog (2006), The Lord of the Rings Online: Shadows of Angmar and the Unreal Engine. Kynapse is also being used by companies such as EADS, BAE Systems or Électricité de France to develop military or industrial simulation.
References
External links
Middleware for video games |
https://en.wikipedia.org/wiki/HD%20176051 | Extrasolar PlanetsEncyclopaediadata
HD 176051 is a spectroscopic binary star system approximately 49 light years away from Earth in the constellation Lyra. The pair orbit with a period of 22,423 days (61.4 years) and an eccentricity of 0.25. Compared to the Sun, they have a somewhat lower proportion of elements more massive than helium. Their individual masses are estimated at 1.07 and 0.71 solar masses (). The system is moving closer to the Sun with a radial velocity of −47 km/s and will reach perihelion in about 269,000 years when it comes within roughly of the Sun.
Planetary system
A planet orbiting one of the stars was discovered through astrometric observations. However, it is not known which stellar component the planet is orbiting around.
The planet parameters are given here for the component B.
But, if instead the planet is orbiting the component A, its mass is 2.26 with a semimajor axis of 2.02 AU.
See also
List of star systems within 45–50 light-years
Alpha Centauri
Gamma Cephei
References
External links
HD 176051 b on The Extrasolar Planets Encyclopaedia
Candidate substellar companions of binary systems
Lyra
G-type main-sequence stars
K-type main-sequence stars
HD, 176051
Spectroscopic binaries
176051
093017
7162
0738
Planetary systems with one confirmed planet |
https://en.wikipedia.org/wiki/DBSCAN | Density-based spatial clustering of applications with noise (DBSCAN) is a data clustering algorithm proposed by Martin Ester, Hans-Peter Kriegel, Jörg Sander and Xiaowei Xu in 1996.
It is a density-based clustering non-parametric algorithm: given a set of points in some space, it groups together points that are closely packed together (points with many nearby neighbors), marking as outliers points that lie alone in low-density regions (whose nearest neighbors are too far away).
DBSCAN is one of the most common, and most commonly cited, clustering algorithms.
In 2014, the algorithm was awarded the test of time award (an award given to algorithms which have received substantial attention in theory and practice) at the leading data mining conference, ACM SIGKDD. , the follow-up paper "DBSCAN Revisited, Revisited: Why and How You Should (Still) Use DBSCAN" appears in the list of the 8 most downloaded articles of the prestigious ACM Transactions on Database Systems (TODS) journal.
The popular follow-up HDBSCAN* was initially published by Ricardo J. G. Campello, David Moulavi, and Jörg Sander in 2013, then expanded upon with Arthur Zimek in 2015. It revises some of the original decisions such as the border points and produces a hierarchical instead of a flat result.
History
In 1972, Robert F. Ling published a closely related algorithm in "The Theory and Construction of k-Clusters" in The Computer Journal with an estimated runtime complexity of O(n³). DBSCAN has a worst-case of O(n²), and the database-oriented range-query formulation of DBSCAN allows for index acceleration. The algorithms slightly differ in their handling of border points.
Preliminary
Consider a set of points in some space to be clustered. Let be a parameter specifying the radius of a neighborhood with respect to some point. For the purpose of DBSCAN clustering, the points are classified as core points, (directly-) reachable points and outliers, as follows:
A point is a core point if at least points are within distance of it (including ).
A point is directly reachable from if point is within distance from core point . Points are only said to be directly reachable from core points.
A point is reachable from if there is a path with and , where each is directly reachable from . Note that this implies that the initial point and all points on the path must be core points, with the possible exception of .
All points not reachable from any other point are outliers or noise points.
Now if is a core point, then it forms a cluster together with all points (core or non-core) that are reachable from it. Each cluster contains at least one core point; non-core points can be part of a cluster, but they form its "edge", since they cannot be used to reach more points.
Reachability is not a symmetric relation: by definition, only core points can reach non-core points. The opposite is not true, so a non-core point may be reachable, but nothing can be reached from it. Therefore, |
https://en.wikipedia.org/wiki/WJCK%20%28FM%29 | WJCK FM 88.3, known as "The Message", is a radio station licensed to serve Piedmont, Alabama, United States. The station is owned by Immanuel Broadcasting Network, and serves northeast Alabama from Chimney Peak, just northeast of Jacksonville (from which the "JCK" in its broadcast callsign is derived).
It broadcasts a Christian religious radio format and simulcasts its flagship station, WCCV FM 91.7 in Cartersville, Georgia, IBN's other full-power station. There are also several broadcast translators that retransmit IBN, W216BP FM 91.1 in Fort Payne is the only IBN translator in Alabama, but is assigned to relay WCCV as its primary or parent station.
History
This station received its original construction permit for a 6,000-watt FM station in Cedartown, Georgia, from the Federal Communications Commission on March 23, 1992. The new station was assigned the call letters WJCK by the FCC on April 23, 1992. In May 1994, WJCK applied for a waiver of the FCC's main-studio rule (which requires a radio station to maintain its studios and main offices within the city of license and broadcast range for that station) to allow for the simulcasting of programming from sister station WCCV in Cartersville, Georgia. This waiver was granted on November 2, 1994. After multiple extensions to the construction permit, WJCK received its license to cover from the FCC on January 30, 1995.
In November 1996, station owner Immanuel Broadcasting Network filed an application with the FCC to change the station's antenna height above average terrain, transmitter location, main studio location, and community of license as part of a planned move to Piedmont, Alabama. The FCC granted a construction permit for these changes in June 1997 and construction was completed by March 1999 when WJCK was granted program test authority to begin provisional broadcasting from this new location, but an objection filed in April 1999 by WBRC TV 6 (with analog audio on 87.75 MHz) in Birmingham, Alabama would help keep the station from being fully licensed to broadcast from Piedmont until May 11, 2001.
In March 2019, the station and network re-launched as The Message, with a larger focus on Contemporary Christian music programming.
References
External links
JCK
Radio stations established in 1995
Mass media in Calhoun County, Alabama
1995 establishments in Alabama
Contemporary Christian radio stations in the United States |
https://en.wikipedia.org/wiki/WGRW | WGRW (90.7 FM) is a non-commercial radio station licensed to serve Anniston, Alabama, United States. The station is owned by Word Works, Inc.
Programming
WGRW broadcasts a Contemporary Christian music format to the Anniston and Gadsden, Alabama, area. The station derives a portion of its programming from the Moody Broadcasting Network and the Salem Radio Network.
Jon Holder, station manager and host of Grace in the Morning, has been with WGRW since it launched in 1999. Holder had previously worked at WDNG, also in Anniston.
History
This station's original construction permit was granted by the Federal Communications Commission on September 12, 1996. The new station was assigned the WGRW call letters by the FCC on October 25, 1996. On June 25, 1999, WGRW received its license to cover from the FCC.
References
External links
Contemporary Christian radio stations in the United States
Radio stations established in 1999
Mass media in Calhoun County, Alabama
Moody Radio affiliate stations
1999 establishments in Alabama
GRW |
https://en.wikipedia.org/wiki/WMUB%20%28FM%29 | WMUB (88.5 MHz) is a public FM radio station licensed to Miami University, in Oxford, Ohio, United States. It produced local programming for 59 years until March 1, 2009, when it became a part of Cincinnati Public Radio. The station serves southwest Ohio and southeast Indiana. WMUB started as a student-operated station in the 1940s and turned FM in 1950. Once known for its “Rhythm and News”, it is now a full-time satellite of WVXU in Cincinnati. It primarily serves areas north of Cincinnati where the main WVXU signal is weak.
The station operates via a 24,500-watt transmitter located on Taylor Road in Butler County. WMUB broadcasts in the HD Radio format.
Prior to becoming a Cincinnati Public Radio repeater, WMUB was historically a resource to enable Miami University students studying broadcasting and journalism to train in reporting and on-air delivery. WMUB listeners also tuned in on weekday nights to listen to the voice of Mama Jazz, Phyllis Campbell, who hosted an evening show, broadcast from 8 to 11 pm.
In January 2007, the University President, David C. Hodge, charged a committee to explore alternatives to address budgetary and technological challenges for WMUB. The university owns the radio station’s license and covered nearly 62 percent of its $1.7 million budget. The committee released its report in fall 2007 and strongly recommended pursuing and developing regional connections with other existing non-commercial stations and building on connections with appropriate academic programs within the university.
In January 2009, the university announced that it was turning operation of the station over to Cincinnati Public Radio effective March 1, 2009. Seven people lost their jobs because of this change.
See also
Williams Hall (Miami University)
References
External links
WMUB Archives. Maintained by the Walter Havighurst Special Collections, Miami University Libraries.
MUB
NPR member stations
Miami University
1950 establishments in Ohio
Radio stations established in 1950 |
https://en.wikipedia.org/wiki/Search%20box | A search box, search field or search bar is a graphical control element used in computer programs, such as file managers or web browsers, and on web sites. A search box is usually a single-line text box or search icon (which will transform into a search box on click activity) with the dedicated function of accepting user input to be searched for in a database. Search boxes on web pages are usually used to allow users to enter a query to be submitted to a Web search engine server-side script, where an index database is queried for entries that contain one or more of the user's keyword research.
Search boxes are commonly accompanied by a search button (sometimes indicated only by a magnifying glass symbol) to submit the search. However, the search button may be omitted as the user may press the enter key to submit the search, or the search may be sent automatically to present the user with real-time results.
The search box is an integral part of the site search functionality, which is an important element of website design for content-rich websites. On some websites, site search is more prominent than on others. E-commerce typically use search boxes, and thus site search, as a primary navigation tool.
Common features
Depending on the particular implementation, a search box may be accompanied by a drop-down list to present the users with past searches or search suggestions. Search boxes may have other features to help the user, such as autocomplete, search suggestions, a spelling checker, etc. Search boxes are often also accompanied by drop-down menus or other input controls to allow the user to restrict the search or choose what type of content to search for.
In some cases, while users input search strings, the results of that string would also present on the content area updating in real time. However, if the page chooses this way to show results to users, the loading time is slower and may cause unresponsiveness or browser crashes. Hence, it is not recommended for small and medium-sized websites.
Modern search box implementations make use of persistent connections to achieve both low-latency search experience and bandwidth improvement. However, for large, search-intensive web applications, a scalable server being able to handle a high number of concurrent persistent connections is needed. Such servers already exist. For example, a single instance of the WebSocket server provided by MigratoryData could handle 240,000 autocomplete requests per second from 1 million concurrent users with a mean round-trip latency of 11.82 milliseconds.
See also
Search suggest drop-down list
Web navigation
References
Graphical control elements |
https://en.wikipedia.org/wiki/Elastic%20matching | Elastic matching is one of the pattern recognition techniques in computer science. Elastic matching (EM) is also known as deformable template, flexible matching, or nonlinear template matching.
Elastic matching can be defined as an optimization problem of two-dimensional warping specifying corresponding pixels between subjected images.
References
See also
Dynamic time warping
Graphical time warping
Classification algorithms |
https://en.wikipedia.org/wiki/MemeStreams | MemeStreams is an early social networking website, online community, and blog host that was established in 2001 by Industrial Memetics.
Created by Tom Cross and Nick Levay, the site is particularly popular among computer security professionals. Michael Lynn (Ciscogate), Virgil Griffith (Wikiscanner), Billy Hoffman (Ajax Security), and Dolemite (organizer of PhreakNIC) are all members of the site.
Memestreams employs a reputation system.
References
External links
Official site
American social networking websites
Defunct social networking services
American news websites
Social bookmarking websites
Internet properties established in 2001 |
https://en.wikipedia.org/wiki/Cyber%20Sunday%20%282006%29 | The 2006 Cyber Sunday was the third annual Taboo Tuesday/Cyber Sunday professional wrestling pay-per-view (PPV) event produced by World Wrestling Entertainment (WWE). It was held exclusively for wrestlers from the promotion's Raw brand division. It took place on November 5, 2006, at the U.S. Bank Arena in Cincinnati, Ohio with 7,000 fans attending. The event was previously known as Taboo Tuesday in 2004 and 2005. For 2006, the event was moved to the more traditional Sunday night for PPVs and was renamed as Cyber Sunday. It was also the final Taboo Tuesday/Cyber Sunday to be brand-exclusive as following WrestleMania 23 the following year, brand-exclusive PPVs were discontinued.
This event had the unique feature of being an interactive PPV. Fans could vote, via WWE's official website, for selective characteristics in the scheduled matches, including opponents, stipulations, match types, etc. The voting for the event started on October 16, 2006, and ended during the event.
The main event was the "Champion of Champions" match, between WWE's three top champions. The three champions in the match were WWE Champion John Cena, World Heavyweight Champion King Booker, and ECW World Champion Big Show. The fans could vote for who would defend their championship in this match; the fans voted for Booker T, who won the match by pinning Cena following interference from Kevin Federline. The predominant match on the card was D-Generation X (Triple H and Shawn Michaels) versus Rated-RKO (Edge and Randy Orton). Rated-RKO won the match after Orton pinned Triple H following an RKO onto a steel chair. The featured matches on the undercard were Jeff Hardy versus Carlito for the WWE Intercontinental Championship and Lita versus Mickie James in a Diva Lumberjack match for the WWE Women's Championship, a match would be the last title win for Lita until 2023.
Production
Background
Taboo Tuesday was an annual pay-per-view (PPV) event produced by World Wrestling Entertainment (WWE) since 2004. It was the first regularly-scheduled pay-per-view by WWE on a Tuesday since 1991's This Tuesday in Texas, the first regularly-scheduled non-Sunday pay-per-view since the 1994 Survivor Series, and the first non-Sunday pay-per-view of any kind since In Your House 8: Beware of Dog 2 in 1996. The event was also produced exclusively for wrestlers of the Raw brand. A unique feature of the event was the ability for fans to vote on certain aspects of every match. Because of this, the event was billed as an "interactive pay-per-view." In 2006, WWE moved the event to a more traditional Sunday night for PPVs, and thus renamed the event as Cyber Sunday. It was held on November 5, 2006, at the U.S. Bank Arena in Cincinnati, Ohio. While it was the first event to be titled Cyber Sunday, it was the third overall in the Taboo Tuesday/Cyber Sunday chronology. Like the previous two years' events, it was also a Raw-exclusive PPV.
Storylines
The main feud heading into Cyber Sunday was between WWE Champi |
https://en.wikipedia.org/wiki/System%20Object%20Model%20%28file%20format%29 | In computing, the System Object Model (SOM) is a proprietary executable file format developed by Hewlett-Packard for its HP-UX and MPE/ix operating systems.
In particular, SOM is the native format used for 32-bit application executables, object code, and shared libraries running under the PA-RISC family of processors.
With the introduction of 64-bit processors, Hewlett Packard adopted the Executable and Linkable Format (ELF) format to represent the wider 64-bit program code, while still using SOM for applications running in 32-bit mode. Later, with the introduction of the Itanium processor family, HP-UX has abandoned the SOM format in favor of ELF for both 32-bit and 64-bit application code.
In HP-UX the SOM file format is sometimes called the a.out format and is described by C programming language structures in the header file "/usr/include/a.out.h". However the SOM format is technically not the same as the standard a.out format used by many other Unix operating systems.
Overview of the SOM file format
A SOM file consists of a fixed-size header record followed by a number of sections, some of which are optional. The header always appears at the beginning of the file and contains the byte offsets and sizes of where the other sections are located within the file. Except for the header the other sections may appear anywhere in the file, although the typical layout of a SOM file (assuming all sections are present) is as follows:
Header Record
Auxiliary Header Record
Space Records
Subspace Records
Loader Fixup Records
Space Strings
Symbol Records
Fixup Records
Symbol Strings
Compiler Records
Data for Loadable Spaces
Data for Unloadable Spaces
Numeric fields are stored in big endian byte order, the native byte order of the PA-RISC, with most being 32-bit wide. Character strings are generally encoded in 8-bit ASCII and both prefixed with a 32-bit length indicator as well as being null-terminated, like C strings. Most records are word-aligned (start at even-byte offsets) with padding introduced as necessary.
See also
Comparison of executable file formats
External links
HP-UX a.out(4) manual page, Hewlett-Packard
The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.0 Version 1.0, Hewlett-Packard, 1997
The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20 version 3.0, Hewlett-Packard, 1997. Also available at parisc-linux.org
HP-UX Software Transition Kit Glossary, Hewlett-Packard (online)
PA-RISC 1.1 Architecture Specifications
Executable file formats
HP software |
https://en.wikipedia.org/wiki/Adlerstein | The Adlerstein is a 676-metre-high summit in the Saxon Ore Mountains near Lengefeld. At the top there is a historic triangulation station which was part of the Royal Saxon triangulation network.
Location and area
The Adlerstein lies in the Central Ore Mountains not far from the B 101 federal road that runs from Heinzebank to Pockau where there is a junction with the Lengefeld Road not far away. Immediately at the foot of the mountain is the well-known Lengefeld Lime Works (Kalkwerk Lengefeld). The Adlerstein and the nearby peak of the Lauterbacher Knochen complement one another as good viewing points, albeit partly obscured by trees in places.
Views
The other places that may be seen from the Adlerstein include the Sayda and Brand Heights, Waldkirchen, Marienberg, Dittersdorfer Höhe and Pöhlberg in Germany, and the Jelení hora (Haßberg), Hora Svaté Kateřiny (Katharinaberg) and the Čihadlo (Lauschhübei) in the Czech Republic.
Sources
Pockau-Lengefeld
Mountains of Saxony
Mountains of the Ore Mountains
Mountains under 1000 metres |
https://en.wikipedia.org/wiki/Daviesia%20cordata | Daviesia cordata, commonly known as bookleaf, is a species of flowering plant in the family Fabaceae and is endemic to the south-west of Western Australia. It is a slender, erect shrub with scattered egg-shaped phyllodes, and yellow-orange and pinkish-purple flowers.
Description
Daviesia cordata is a slender, erect, glabrous shrub that typically grows to a height of . Its leaves are reduced to scattered, spreading, egg-shaped phyllodes long and wide, with a heart-shaped, stem-clasping base. The flowers are arranged in groups of ten to fifteen in leaf axils on a peduncle long, each flower on a pedicel long with two circular bracts wide at the base. The sepals are long and joined at the base, the upper lobes joined for most of their length and the lower three triangular and about long. The standard is yellow with orange at the base and tip, circular to elliptic, long and wide. The wings are pinkish-red to purple and long and the keel pinkish purple and long. Flowering occurs from July to December and the fruit is a flattened, triangular pod long.
Taxonomy
Davieia cordata was first formally described in 1808 by James Edward Smith in The Cyclopaedia based on specimens collected from King George Sound. The specific epithet (cordata) mean "heart-shaped".
Distribution and habitat
Bookleaf grows in open forest and mallee-heath and is common from near Perth to Albany in the Avon Wheatbelt, Jarrah Forest, Swan Coastal Plain and Warren biogeographic regions of south-western Western Australia.
References
cordata
Rosids of Western Australia
Plants described in 1808
Taxa named by James Edward Smith |
https://en.wikipedia.org/wiki/Isofoton | Founded in 1981 Isofoton was a Spanish leading manufacturer of photovoltaic cells and modules that had its HQ in Málaga and a distribution network present in over 60 countries. It started as a spin-off of the pioneering research programme of the Institute of Solar Energy of the Technical University of Madrid (IES-UPM) in the field of silicon bifacial solar cells, today a mainstream solar cell technology. In fact, it was the very first factory in the world to mass produce, market and install this type of solar cell technology. By 1987 it abandoned manufacturing of bifacials and transitioned to conventional monofacial solar cells, still, it forged ahead successfully and from 2000 to 2005 it ranked among the top 10 PV manufacturers in the world. At its peak, by 2007, Isofoton employed 1142 people, produced 103MW and had an annual turnover of 414 million euros. In 2014 it filed for bankruptcy, as happened with almost all of the European and US PV manufacturers operating at the time, mainly due to the price pressure of a new wave of Chinese manufacturers.
History
Isofoton was founded in 1981 as a spin-off of a university research project on the development of bifacial solar cells led by Professor Antonio Luque, director of the Institute of Solar Energy of the Technical University of Madrid. This research project had started around 1975 and had investigated, patented and produced different bifacial solar cell architectures. The best performing of these, an npp+ structure, was selected for industrial production in Isofoton, to commercially exploit their enhanced power production when suitably installed with high albedo surfaces behind, whether ground or walls. it was named Isofoton because its cells singularly used all isotropic photons and was established in Málaga, Luque's hometown. Its initial capital came from family and friends (e.g. most of the employees and research staff of the Institute of Solar Energy) plus some money from Technical University of Madrid, that was used to buy equipment, and public capital from an industrial development fund, Sodean (Sociedad para el Desarrollo Energético de Andalucía) from the regional government of Andalusia. It set sail with 45 private shareholders, Luque acting as 1st chairman and also co-CEO, together with his brother Alberto, a seasoned industrial entrepreneur, and having his former doctoral student, Javier Eguren, as CTO. Eguren and Gabriel Sala led the technology transfer from the Institute of Solar Energy to Isofoton.
By 1983 Isofoton's factory in Málaga had a manufacturing capacity of 330 kW/yr. of bifacial modules (with a 15 people net headcount) at a time when the global market of photovoltaics was in the range of 15 MW. In 1985, Abengoa and BBVA enter as new shareholders of Isofoton, with Luque remaining as chairman but appointing Abengoa's Francisco Llorente as CEO. At that time, the market of terrestrial photovoltaic power plants, to which Isofoton oriented its production, essentially consisted |
https://en.wikipedia.org/wiki/DGamer | DGamer (Disney Gamer) was an online game and social network service developed by Disney for use with Nintendo DS games. DGamer was accessible via the Nintendo Wi-Fi Connection or computer via the DGamer Channel on Disney.com. The service was implemented by Fall Line Studios and Disney Interactive Studios.
It launched in North America on May 15, 2008, coinciding with the release of the DS version of The Chronicles of Narnia: Prince Caspian. DGamer's Wi-Fi connections were retired on March 15, 2013. It can still be used via local wireless connections, but is no longer able to connect to the Nintendo Wi-Fi Connection service.
Supported games
The Chronicles of Narnia: Prince Caspian
WALL-E
Spectrobes: Beyond the Portals
Ultimate Band
The Cheetah Girls: Passport to Stardom
Club Penguin: Elite Penguin Force
Club Penguin: Elite Penguin Force: Herbert's Revenge
Tinker Bell
Bolt
High School Musical 3: Senior Year
Phineas and Ferb
Hannah Montana: The Movie
Up
G-Force
Wizards Of Waverly Place
JONAS
Tinker Bell and the Lost Treasure
Cars Race-O-Rama
A Christmas Carol
The Princess and the Frog
Sonny with a Chance
Alice in Wonderland
Disney Stitch Jam
Camp Rock 2: The Final Jam
Phineas and Ferb: Ride Again
Tinker Bell and the Great Fairy Rescue
Tron: Evolution
Wizards of Waverly Place: Spellbound
Tangled: The Video Game
Toy Story 3
The Suite Life of Zack & Cody: Circle of Spies
The Sorcerer's Apprentice
References
External links
Official website
Video game culture
Online video game services
Defunct social networking services
Disney technology |
https://en.wikipedia.org/wiki/Long%20John%20Peter | "Long John Peter" is the twelfth episode of the sixth season of the American animated television series Family Guy. It originally aired on the Fox network in the United States on May 4, 2008. Written by Wellesley Wild and directed by Dominic Polcino, "Long John Peter" served as the final episode of the season, which was cut short in early May 2008 due to creator Seth MacFarlane's participation in the 2007–2008 Writers Guild of America strike.
In the episode, Peter steals a parrot from the vet and becomes convinced that he is a pirate. He becomes the scourge of the neighborhood, terrorizing every corner of Quahog until he accidentally kills his beloved bird. Meanwhile, Chris falls in love with the lovely vet intern Anna and turns to Peter for some advice.
"Long John Peter" was watched by 7.68 million viewers in its original broadcast, according to the Nielsen ratings. Actress Amanda Bynes guest-starred as Anna, and Bryan Cranston and Mae Whitman made minor appearances in the episode. "Long John Peter" received generally positive reviews from critics, and was praised for its action sequence featuring Peter and a British man having a pirate fight on their cars.
Plot
The Griffin family are waiting for the examination results of Brian at the veterinary office of Dr. Jewish, as Brian had apparently had stomach pains prior to the events in the episode (Brian had eaten one of Stewie's used diapers—which he claimed that he had mistaken for Indian cuisine). Chris spots a beautiful young intern named Anna and falls in love with her. While there, Peter finds a parrot and decides to keep it, leaving a dog wearing a top hat and a mustache in its place. Peter begins taking the parrot everywhere he goes, showing it off to his friends, Quagmire, Cleveland, and Joe, who, in turn, begin making suggestions as to how Peter could change his appearance to appear more "pirate-like" because of the resemblance between Peter and a pirate, who are known for keeping parrots as pets. Peter takes the advice given to him by his friends by dressing up in pirate clothing, gathering up a crew of other "pirates", and going by the name "Long John Peter". Peter begins taking the pirate act to the extreme, even robbing a British man's car filled with sugarcane, tobacco, and spices. After winning the "battle" for the spices, Peter's parrot is severely injured and eventually dies.
Meanwhile, at the vet where Dr. Jewish breaks the bad news about Peter's dead parrot, Chris and Anna hook up and begin dating. The relationship goes smoothly until Peter berates Chris for treating her too well. Peter tells him that women like bad boys, so Chris calls Anna a "bitch" on their next date and throws her movie ticket on the ground, thinking that will improve the relationship. Instead, she breaks up with him. After hearing what happened, Lois, angry at Peter, tells him to comfort Chris, but he fails to do so when he gives him a bullfrog which died when he poked holes on its back. When Lois tells |
https://en.wikipedia.org/wiki/List%20of%20sovereign%20states%20by%20sex%20ratio | The human sex ratio is the comparative number of males with respect to each female in a population. This is a list of sex ratios by country or region.
Methodology
The table's data is from The World Factbook unless noted otherwise. It shows the male to female sex ratio by the Central Intelligence Agency of the United States. If there is a discrepancy between The World Factbook and a country's census data, the latter may be used instead.
A ratio above 1, for example 1.1, means there are more males than females (1.1 males for every female). A ratio below 1, for example 0.8, means there are more females than males (0.8 males for every female). A ratio of 1 means there are equal numbers of males and females.
Countries
See also
List of Chinese administrative divisions by sex ratio
List of states and union territories of India by sex ratio
Missing women
References
Demographic lists
Sex ratio |
https://en.wikipedia.org/wiki/Bundle%20adjustment | In photogrammetry and computer stereo vision, bundle adjustment is simultaneous refining of the 3D coordinates describing the scene geometry, the parameters of the relative motion, and the optical characteristics of the camera(s) employed to acquire the images, given a set of images depicting a number of 3D points from different viewpoints.
Its name refers to the geometrical bundles of light rays originating from each 3D feature and converging on each camera's optical center, which are adjusted optimally according to an optimality criterion involving the corresponding image projections of all points.
Uses
Bundle adjustment is almost always used as the last step of feature-based 3D reconstruction algorithms. It amounts to an optimization problem on the 3D structure and viewing parameters (i.e., camera pose and possibly intrinsic calibration and radial distortion), to obtain a reconstruction which is optimal under certain assumptions regarding the noise pertaining to the observed image features: If the image error is zero-mean Gaussian, then bundle adjustment is the Maximum Likelihood Estimator. Bundle adjustment was originally conceived in the field of photogrammetry during the 1950s and has increasingly been used by computer vision researchers during recent years.
General approach
Bundle adjustment boils down to minimizing the reprojection error between the image locations of
observed and predicted image points, which is expressed as the sum of squares of a large number of nonlinear, real-valued functions. Thus, the minimization is achieved using nonlinear least-squares algorithms. Of these, Levenberg–Marquardt has proven to be one of the most successful due to its ease of implementation and its use of an effective damping strategy that lends it the ability to converge quickly from a wide range of initial guesses. By iteratively linearizing the function to be minimized in the neighborhood of the current estimate, the Levenberg–Marquardt algorithm involves the solution of linear systems termed the normal equations. When solving the minimization problems arising in the framework of
bundle adjustment, the normal equations have a sparse block structure owing to the lack of interaction among parameters for different 3D points and cameras. This can be exploited to gain tremendous computational benefits by employing a sparse variant of the Levenberg–Marquardt algorithm which explicitly takes advantage of the normal equations zeros pattern, avoiding storing and operating on zero-elements.
Mathematical definition
Bundle adjustment amounts to jointly refining a set of initial camera and structure parameter estimates for finding the set of parameters that most accurately predict the locations of the observed points in the set of available images. More formally, assume that 3D points are seen in views and let be the projection of the th point on image . Let denote the binary variables that equal 1 if point is visible in image and 0 otherwise. Assu |
https://en.wikipedia.org/wiki/Virgil%20D.%20Gligor | Virgil Dorin Gligor (born July 30, 1949) is a Romanian-American professor of electrical and computer engineering who specializes in the research of network security and applied cryptography.
Education and Career
Gligor was born in Zalău and lived in Bucharest, Romania, until his late teens. He received his high school degree and baccalaureate at the Gheorghe Lazăr National College. After completing the first year as a student in the Faculty of Automatic Control and Computer Science at Politehnica University of Bucharest, he earned a national scholarship to study in the United States, where he received his B.Sc., M.Sc., and Ph.D. degrees from the University of California at Berkeley. While a graduate student he was a Lecturer in EECS at the University of California, Santa Barbara. Between 1976 and 2007 he taught at the University of Maryland, College Park, and since 2008 he has been a Professor in the Department of Electrical and Computer Engineering at Carnegie Mellon University (CMU). Until 2015, he was also the co-director of CyLab, CMU’s security and privacy research institute. He was a visiting professor at University of Cambridge, UK, ETH Zurich and EPF Lausanne in Switzerland, SMU in Singapore, and a long-time consultant to Burroughs and IBM corporations. He served on Microsoft’s Trusted Computing Academic Advisory Board and SAP’s Security Advisory Board. He has been an advisory board member of several security and privacy institutes including those of Johns Hopkins University and Pennsylvania State University in the US, CISPA Saarbrucken, Germany, and KTH Stockholm, Sweden.
Gligor co-chaired several conferences and symposia, including the ACM Computer and Communication Security, IEEE Security and Privacy, the Internet Society’s Network and Distributed Systems Security, the IEEE Dependable Computing for Critical Applications, and IEEE-ACM Symposium on Reliability in Distributed Software and Databases. He was an editorial-board member of Information Systems, Journal of Computer Security, ACM Transactions on Information System Security, IEEE Transactions on Computers, IEEE Transactions on Mobile Computing, and was the Editor in Chief of the IEEE Transactions on Dependable and Secure Computing.
Research
Gligor’s research in computer and network security spans over four decades. He began his career with work on the design of protection mechanisms of capability-based systems. In particular, he initiated the area of protection-mechanism verification of complex instruction set architectures and processor security testing.
In the early 1980s, Gligor provided the first precise definition of the denial-of-service (DoS) problem in operating systems
and extended it to network protocols thus helping establish availability as a first-class security concern. He and his students published all DoS research papers during the 1980s, including the Yu-Gligor
model. In the mid’ 80s he and Gary Luckenbaugh were the principal designers of the Secure Xenix, |
https://en.wikipedia.org/wiki/Paper%20data%20storage | Paper data storage refers to the use of paper as a data storage device. This includes writing, illustrating, and the use of data that can be interpreted by a machine or is the result of the functioning of a machine. A defining feature of paper data storage is the ability of humans to produce it with only simple tools and interpret it visually.
Though now mostly obsolete, paper was once an important form of computer data storage as both paper tape and punch cards were a common staple of working with computers before the 1980s.
History
Before paper was used for storing data, it had been used in several applications for storing instructions to specify a machine's operation. The earliest use of paper to store instructions for a machine was the work of Basile Bouchon who, in 1725, used punched paper rolls to control textile looms. This technology was later developed into the wildly successful Jacquard loom. The 19th century saw several other uses of paper for controlling machines. In 1846, telegrams could be prerecorded on punched tape and rapidly transmitted using Alexander Bain's automatic telegraph. Several inventors took the concept of a mechanical organ and used paper to represent the music.
Binary punched card
In the late 1880s Herman Hollerith invented the recording of data on a medium that could then be read by a machine. Prior uses of machine readable media, above, had been for control (automatons, piano rolls, looms, ...), not data. "After some initial trials with paper tape, he settled on punched cards..." Hollerith's method was used in the 1890 census. Hollerith's company eventually became the core of IBM.
Other technologies were also developed that allowed machines to work with marks on paper instead of punched holes. This technology was widely used for tabulating votes and grading standardized tests. Banks used magnetic ink on checks, supporting MICR scanning.
In an early electronic computing device, the Atanasoff–Berry Computer, electric sparks were used to singe small holes in paper cards to represent binary data. The altered dielectric constant of the paper at the location of the holes could then be used to read the binary data back into the machine by means of electric sparks of lower voltage than the sparks used to create the holes. This form of paper data storage was never made reliable and was not used in any subsequent machine.
Modern techniques
1D barcodes
Barcodes make it possible for any object that was to be sold or transported to have some computer readable information securely attached to it. Universal Product Code barcodes, first used in 1974, are ubiquitous today. Some people recommend a width of at least 3 pixels for each minimum-width gap and each minimum-width bar for 1D barcodes. The density is about 50 bits per linear inch (about 2 bit/mm).
2D barcodes
2D barcodes allow to store much more data on paper, up to 2.9 kbyte per barcode. It is recommended to have a width of at least 4 pixels—e. |
https://en.wikipedia.org/wiki/Chequered%20Flag%20%28video%20game%29 | Chequered Flag is a racing video game developed by Psion Software and published by Sinclair Research in 1983. It was the first driving game published for the ZX Spectrum and one of the first computer car simulators.
Gameplay
Chequered Flag allows a player to select a racing track and one of three cars; two with manual gears and one automatic. Two of the cars are named Ferretti and McFaster, in reference to Ferrari and McLaren, who had come first and second in the 1982 Formula One season.
Tracks available include Brands Hatch, Circuit de Monaco, Österreichring, Autodromo Nazionale Monza, Circuit Paul Ricard, Silverstone Circuit and 4 fictitious circuits.
The game is viewed in first-person perspective, from the driver's seat, with each car having a different dashboard layout. With no other cars to race, the aim is to complete laps in the best time possible, avoiding road hazards such as oil and broken glass. The player must also economise fuel and avoid the engine overheating. The game was one of the first to feature pit stops, which would repair damage and take on fuel.
Reception
On its initial release, Your Spectrum praised the driver's view graphics, with Popular Computing Weekly praising the smooth scrolling. ZX Computing summarised the game as "realistic,... exciting and highly enjoyable".
In 1985, CRASH magazine described the graphics as adequate and the gameplay as good, but felt it was more serious than fun due to the lack of other racers. Sinclair User said it was up to the usual Psion standards, and that "the quality of the game and the detail included make it one of the great games for the Spectrum."
In their 1990 retrospective of driving games, Your Sinclair also lamented the lack of other racers, describing the game as "a bit like Pole Position without any other cars to race against." However, they praised the realism of the simulation, considering the age of the game. The game reached number one in the UK sales charts, ahead of Manic Miner, and being replaced by Jet Set Willy.
Trivia
In Poland, the game was released as Wyścigi szosowe (Highway races).
References
External links
1983 video games
Formula One video games
Racing video games
Racing simulators
ZX Spectrum games
ZX Spectrum-only games
Video games set in Kent
Video games set in Austria
Video games set in France
Video games set in Italy
Video games set in Monaco
Video games developed in the United Kingdom |
https://en.wikipedia.org/wiki/MIMIC%20Simulator | MIMIC Simulator is a product suite from Gambit Communications consisting of simulation software in the network and systems management space.
The MIMIC Simulator Suite has several components related to simulation of managed networks and data centers for the purposes of software development, software testing or training, sales and marketing of network management applications (see).
MIMIC SNMP simulator solves a classical simulation problem: network management or operations support system software typically manages large networks. Traditionally, in order to set up such networks for the above purposes, physical equipment had to be separately purchased and assembled in laboratories. To reduce the expense, most of the network can be simulated (e.g. see).
The principle behind SNMP simulation is that the SNMP protocol is an interface that can be simulated. SNMP requests carry data values for MIB objects, which can be shaped at will by the simulator, thus representing any device which has an SNMP interface. In contrast to network simulation, where the entire network is modeled within a computer, this type of empirical simulation is visible on the network, and one can communicate with the simulator over the network.
The concept can be extended to other protocols such as for
cable modems,
CLI such as Cisco IOS (see) or TL1,
flow-based monitoring such as NetFlow or sFlow,
server management based on IPMI or DMTF Redfish,
IoT protocols such as MQTT, CoAP.
Modern management software typically uses multiple protocols to manage networks. The simulator thus should integrate the required protocols to present authentic instrumentation.
Components
MIMIC IOS Simulator allows simulating the CLI protocol as encountered with Cisco IOS, JUNOS, TL/1. The low-end MIMIC Virtual Lab products can be used for training for Cisco CCNA.
MIMIC NetFlow Simulator creates many custom NetFlow exporters, MIMIC sFlow Simulator does the same for sFlow.
MIMIC IPMI Simulator simulates the IPMI RMCP via LAN interface for high-end servers.
MIMIC Web Simulator handles HTTP / SOAP / XML / WSDL / WSMAN / Redfish interfaces for management via Web services.
MIMIC IoT Simulator creates large IoT environments based on standard protocols MQTT, CoAP.
Sources
Virtual router labs
Gambit simulates the network with virtual software
Advanced HP Network Node Manager Software
12th Annual Well-Connected Awards: Network Infrastructure
References
Internet protocols
Internet Standards
Network management
System administration
Application layer protocols
Multi-agent network management software
Simulation software |
https://en.wikipedia.org/wiki/Daniel%20A.%20Reed%20%28computer%20scientist%29 | Daniel A. Reed is a computer scientist who is the provost of the University of Utah. He is current Chair of the National Science Board and was previously vice-president for research at the University of Iowa.
References
Scientific computing researchers
Microsoft employees
Purdue University alumni
Living people
University of Utah faculty
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Wighton%20Halt%20railway%20station | Wighton Halt is a railway station serving the small village of Wighton, Norfolk. It is a public railway station, originally part of the standard gauge network, and now part of the narrow gauge Wells and Walsingham Light Railway.
LNER
Wighton Halt was a railway station on the Wells and Fakenham Railway, later part of the Great Eastern Railway. It was opened on 1 February 1924 by the London and North Eastern Railway and operated by them until rail nationalisation. It closed on 5 October 1964 as part of the Beeching cuts on the British railway network.
W&WLR
In 1979 construction work began to reopen four miles of the disused railway line between Wells and Walsingham. The narrow gauge Wells & Walsingham Light Railway began operations in April 1982, at which time Wighton railway station reopened, but with the new name of "Seton's Halt". A new station, on the northern side of the village, took the name Wighton Halt. By 2005 it was evident that Wighton village did not require two stations, so the new Wighton Halt was closed, and Seton's Halt reverted to its original name of Wighton. Although it is a request stop, the "halt" suffix does not appear on the station name boards or on timetables.
References
https://web.archive.org/web/20081006135523/http://www.norfolkrailwaysociety.org.uk/news_may-jun05.html
Disused railway stations in Norfolk
Heritage railway stations in Norfolk
Former London and North Eastern Railway stations
Railway stations in Great Britain opened in 1924
Railway stations in Great Britain closed in 1964
Beeching closures in England |
https://en.wikipedia.org/wiki/Union%20mount | In computer operating systems, union mounting is a way of combining multiple directories into one that appears to contain their combined contents. Union mounting is supported in Linux, BSD and several of its successors, and Plan 9, with similar but subtly different behavior.
As an example application of union mounting, consider the need to update the information contained on a CD-ROM or DVD. While a CD-ROM is not writable, one can overlay the CD's mount point with a writable directory in a union mount. Then, updating files in the union directory will cause them to end up in the writable directory, giving the illusion that the CD-ROM's contents have been updated.
Implementations
Plan 9
In the Plan 9 operating system from Bell Labs (mid-1980s onward), union mounting is a central concept, replacing several older Unix conventions with union directories; for example, several directories containing executables, unioned together at a single directory, replace the variable for command lookup in the shell.
Plan 9 union semantics are greatly simplified compared to the implementations for POSIX-style operating systems: the union of two directories is simply the concatenation of their contents, so a directory listing of the union may display duplicate names. Also, no effort is made to recursively merge subdirectories, leading to an extremely simple implementation. Directories are unioned in a controllable order; , where is a union directory, denotes the file called in the first constituent directory that contains such a file.
Unix and BSD
Unix/POSIX implementations of unions have different requirements from the Plan 9 implementation due to constraints in the traditional Unix file system behavior, which greatly complicates their implementation and often leads to compromises. Problems that union mounting on Unix-like operating systems encounters include:
Duplicate file names within a directory are not acceptable, since this would break applications' expectations of how a Unix file system works. Putting a logical, stack-like precedence ordering on the union's constituents partially solves this problem, but requires memory to record which files need to be skipped over during a directory listing (which is otherwise a nearly stateless operation).
Deletion requires special support: if files with the same name exist in several of the union directory's constituents, simply deleting it from one of the constituents causes a file from one of the others to reappear in its stead.
Insertion of a directory into the stack can cause incoherency in the kernel's file name cache.
Renaming a file within a single mounted file system (using the system call) should be an atomic operation, but renaming within a union mount can require changes to multiple of the union's constituent directories. A possible solution is to disallow in such situations and require implementations to copy-and-delete instead.
Stable inode numbers for files, hard links and memory-mapped I/O |
https://en.wikipedia.org/wiki/Mainichi%20Issho | Mainichi Issho (Japanese: , ) is a November 11, 2006 Sony Computer Entertainment online game for the PlayStation 3. It is based on the Doko Demo Issyo franchise, starring the video game character Toro who is the mascot for SCEJ. This game was exclusively released in Japan. A PlayStation Portable port, Mainichi Issho Portable, was released on October 15, 2008
Mainichi Issho was discontinued on November 11, 2009 and replaced with Weekly Toro Station.
History
Mainichi Issho is part of the Together Everywhere! (Doko Demo Issho) game series that revolves around Toro Inoue. The first game was released in 1999 on the original PlayStation. Various sequels and sidestories were released including on Windows systems and cell phones, such as the imode. No game has a western release.
Mainichi Issho is the 12th game in the series and was made available for free download on the Japanese PlayStation Store on the PlayStation 3's launch date in November 2006. It is preceded and followed by two cell phone games.
Characters
— a white cat which is the main character of Mainichi Issho.
— a black cat («kuro» means «black» in Japanese), Toro's best friend and a rival. He first appeared in the series on the PlayStation 2 episode.
— an American-Japanese rose rabbit and a friend of the main character.
— a four-face metallic robot and a friend of Toro.
— a green frog and Toro's friend.
— a French-Japanese brown dog who is a francophile and a friend of Toro.
Game modes
Mainichi Issho includes various features coming from different genres, from news to mini-games to online communication to artificial life which makes it an original crossgenre game. Though SCEJ marketed it as a "casual net" (お気軽ネット) genre game. Among its more noticeable innovations are real time screenshot capture, in-game XMB access (Friend, Internet browser, BGM selection, HDD video upload, etc.) and Remote Play.
When no modes are selected, Mainichi Issho runs in autoplay and becomes a traditional artificial life game. Then Toro interacts with available items or do "ordinary" actions such as dancing, cleaning his apartment, reading, playing, phoning, drinking milk from his fridge, sleeping, or going to the toilet (from where he reads a newspaper). Since the game is performed in real time, these actions can vary with the time of the day or the night. New actions are added as new version updates or items become available.
Main menu modes are listed as following:
Toro Station
The Toro Station (トロ・ステーション) delivers a semi-interactive blog-like daily news in a parody of the NHK Daily News show. News are presented with humor by Toro and Kuro in the manzai duet tradition.
: daily updated blog-like news regarding general interests from upcoming games to cooking, to special event reports, or interviews. 10 and more points are charged at the end of each issue. Some news include quiz test or mini-games, a correct answer would unlock exclusive game items (see Mochimono) or give some bonus Myaile points. |
https://en.wikipedia.org/wiki/National%20Vulnerability%20Database | The National Vulnerability Database (NVD) is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics. NVD supports the Information Security Automation Program (ISAP).
On Friday March 8, 2013, the database was taken offline after it was discovered that the system used to run multiple government sites had been compromised by a software vulnerability of Adobe ColdFusion.
In June 2017, threat intel firm Recorded Future revealed that the median lag between a CVE being revealed to ultimately being published to the NVD is 7 days and that 75% of vulnerabilities are published unofficially before making it to the NVD, giving attackers time to exploit the vulnerability.
In addition to providing a list of Common Vulnerabilities and Exposures (CVEs), the NVD scores vulnerabilities using the Common Vulnerability Scoring System (CVSS) which is based on a set of equations using metrics such as access complexity and availability of a remedy.
In August 2023, NVD erroneously marked an integer overflow bug in old versions of cURL as a 9.8 out of 10 critical vulnerability. cURL lead developer Daniel Stenberg responded by saying this was not a security problem, the bug had been patched nearly 4 years prior, requested the CVE be rejected, and accused NVD of "scaremongering" and "grossly inflating the severity level of issues". MITRE disagreed with Stenberg and denied his request to reject the CVE, noting that "there is a valid weakness ... which can lead to a valid security impact."
In September 2023, the issue has been reclassified by NVD as a 3.3 "low" vulnerability, stating that "it may (in theory) cause a denial of service" for attacked systems, but that this attack vector "is not especially plausible".
See also
Common Weakness Enumeration
Common Vulnerabilities and Exposures
Software Composition Analysis
References
External links
Security Content Automation Protocol (SCAP)
Packet Storm
Exploit Database
Security Content Database
Government databases in the United States
Security vulnerability databases |
https://en.wikipedia.org/wiki/Bin%20%28computational%20geometry%29 | In computational geometry, the bin is a data structure that allows efficient region queries. Each time a data point falls into a bin, the frequency of that bin is increased by one.
For example, if there are some axis-aligned rectangles on a 2D plane, the structure can answer the question, "Given a query rectangle, what are the rectangles intersecting it?" In the example in the top figure, A, B, C, D, E and F are existing rectangles, so the query with the rectangle Q should return C, D, E and F, if we define all rectangles as closed intervals.
The data structure partitions a region of the 2D plane into uniform-sized bins. The bounding box of the bins encloses all candidate rectangles to be queried. All the bins are arranged in a 2D array. All the candidates are represented also as 2D arrays. The size of a candidate's array is the number of bins it intersects.
For example, in the top figure, candidate B has 6 elements arranged in a 3 row by 2 column array because it intersects 6 bins in such an arrangement. Each bin contains the head of a singly linked list. If a candidate intersects a bin, it is chained to the bin's linked list. Each element in a candidate's array is a link node in the corresponding bin's linked list.
Operations
Query
From the query rectangle Q, we can find out which bin its lower-left corner intersects efficiently by simply subtracting the bin's bounding box's lower-left corner from the lower-left corner of Q and dividing the result by the width and height of a bin respectively. We then can iterate the bins Q intersects and examine all the candidates in the linked-lists of these bins. For each candidate we will check if it does indeed intersect Q. If so and if it was not previously reported, then we report it. We can use the convention that we only report a candidate the first time we find it. This can be done easily by clipping the candidate against the query rectangle and comparing its lower-left corner against the current location. If it is a match then we report, otherwise we skip.
Insertion and deletion
Insertion is linear to the number of bins a candidate intersects because inserting a candidate into 1 bin is constant time. Deletion is more expensive because we need to search the singly linked list of each bin the candidate intersects.
In a multithread environment, insert, delete and query are mutually exclusive. However, instead of locking the whole data structure, a sub-range of bins may be locked. Detailed performance analysis should be done to justify the overhead.
Efficiency and tuning
The analysis is similar to a hash table. The worst-case scenario is that all candidates are concentrated in one bin. Then query is O(n), delete is O(n), and insert is O(1), where n is the number of candidates. If the candidates are evenly spaced so that each bin has a constant number of candidates, The query is O(k) where k is the number of bins the query rectangle intersects. Insert and delete are O(m) where m is the number |
https://en.wikipedia.org/wiki/Hana%20Hou%21 | Hana Hou! is an American bi-monthly English language inflight magazine. It is published for Hawaiian Airlines by Honolulu-based NMG Network.
Hana Hou! (which means encore! in the Hawaiian language) includes feature stories, interviews, travelogues and profiles, and ‘Best of the Islands’ and ‘Native Intelligence’ sections.
The awards which the magazine has received include two in 2007 from the Hawaiian chapter of the Society of Professional Journalists, and many more before and since.
Hana Hou! maintains extensive archives which include back issues going back as far as 2002 (Volume 5) on its website. While complimentary copies are provided on all Hawaiian Airlines flights, the magazine is also marketed at newsstands in Hawaii and by subscription.
References
External links
Bimonthly magazines published in the United States
Hawaiian Airlines
Inflight magazines
Magazines established in 1998
Magazines published in Hawaii
Mass media in Honolulu
Tourism magazines |
https://en.wikipedia.org/wiki/Orlov%20block%20allocator | The Orlov block allocator is an algorithm to define where a particular file will reside on a given file system (blockwise), so as to speed up disk operations.
Etymology
The scheme is named after its creator Grigoriy Orlov, who first posted, in 2000, a brief description and implementation for OpenBSD of the technique, which was later used in the BSD Fast Filesystem kernel variants.
Background
The performance of a file system is dependent on many things; one of the crucial factors is just how that filesystem lays out files on the disk. In general, it is best to keep related items together. The Linux ext2 and ext3 filesystems, for instance, have tried to spread directories on the cylinders of the disk. Imagine setting up a system with users' home directories in /home: if all the first-level directories within /home (i.e. the home directories for numerous users) are placed next to each other, there may be no space left for the contents of those directories. User files thus end up being placed far from the directories that contain them, and performance suffers.
Spreading directories on the disc allows files in the same directory to remain more or less contiguous as their number and/or size grows, but there are some situations where this causes excessive spreading of the data on the disk's surface.
How it works
Essentially, the Orlov algorithm tries to distribute "top-level" directories on the assumption that each is unrelated to the others. Directories created in the root directory of a filesystem are considered top-level directories; Theodore Ts'o added a special inode flag that allows the system administrator to mark other directories as being top-level directories as well. If /home lives in the root filesystem, a simple chattr command will make the system treat it as a top-level directory.
When creating a directory that is not in a top-level directory, the Orlov algorithm tries to put it into the same cylinder group as its parent. A little more care is taken, however, to ensure that the directory's contents will also be able to fit into that cylinder group; if there are not many inodes or blocks available in the group, the directory will be placed in a different cylinder group that has more resources available. The result of all this, hopefully, is much better locality for files that are truly related to each other and likely to be accessed together.
Performance
The Orlov block allocator was shown to offer performance gains on workloads that traverse directory trees on FreeBSD. , only one benchmark result for ext3, using the allocator seems to have been posted. The results are promising: the time required to traverse through a Linux kernel tree was reduced by roughly 30%.
Evolution
The Orlov scheme needs more rigorous benchmarking; it also needs some serious stress testing to demonstrate that performance does not degrade as the filesystem is changed over time.
References
External links
The Orlov block allocator
Orlov block allocato |
https://en.wikipedia.org/wiki/WSK | WSK may refer to:
IATA code for Chongqing Wushan Airport, China
Quanguo Waiyu Shuiping Kaoshi or WSK, a foreign language test administered in China
Windows Vista networking technologies#Winsock Kernel
Wytwórnia Sprzętu Komunikacyjnego (WSK, ), a name of Polish aerospace and automotive factories - see PZL
WSK (motorcycle), defunct Polish motorcycle manufacturer |
https://en.wikipedia.org/wiki/C%C3%B3rdoba%20Central%20Railway | The Córdoba Central Railway (CCR) (in Spanish: Ferrocarril Central Córdoba) was a British-owned railway company, founded in 1887, that operated a railway network in Argentina which extended from Buenos Aires, north west via Rosario and Córdoba, to Tucumán. Financial problems forced the sale of the company to the Government of Argentina in 1938. When railways were nationalized in 1948 the CC became part of Belgrano Railway.
History
Beginning
The company was founded in 1887 to take over a concession, originally granted to William Temple in 1885, for the construction of a 206 km line, from the Córdoba city suburb of Alta Córdoba to San Francisco. The line was completed in 1888
In October 1887 the Government granted the operation of Ferrocarril Central Norte's 884 km line (that included the Alta Córdoba-Tucumán, Frías-Santiago del Estero and Recreo-Chubicha branches) to Hume Hnos. & Cía (owned by The Hume Brothers) for $ 16,000,000. The concessionary would also invest $5,000,000 to bring it up to a satisfactory standard. The Government guaranteed Hume Hnos. a 5% of interest for 15 years. The Ferrocarril Central Norte only kept the Tucumán-Juramento 226 km. section. Hume Hnos. would then transfer their rights of operation to the Córdoba Central Railway in 1889.
Between 1889 and 1891 the Córdoba Central network was expanded with the addition of Tucumán-Lamadrid (140 km) and Argentine North Western Railway (284 km.). In 1891 Meiggs & Cía. transferred its assets to newly formed "Ferrocarril Córdoba y Rosario", established in London with a capital of $ 10,164,646.
In 1901 the company took over the operation of the British-owned Córdoba North Western Railway from Córdoba to Cruz del Eje, via La Calera and Cosquín. This railway had been built and operated by Otto Bemberg & Cía following the course of Río Primero. This branch is currently operated by Tren de las Sierras. The first section was opened in 1891, reaching Cosquín the following year.
In 1909 the Government of Argentina acquired the 155 km. line, being added to Central Northern Railway that same year.
Reaching Buenos Aires
In 1912 the Argentine government granted a concession to the CC to build a line connecting Rosario and Buenos Aires which was opened on 1 May 1912 and in October 1914 a new railway terminus was inaugurated at Retiro, Buenos Aires. In 1912 the CC took over another British-owned company, the Córdoba & Rosario Railway, with whom it had shared mutual interests for a number of years.
Severe rail and road competition lead to financial problems which eventually resulted in the sale of the CC to the Argentine government in May 1939 after which operation of its lines was taken over by the Argentine State Railway. With the railway nationalisation in 1948, the CC became part of Belgrano Railway network.
Bibliography
External links
Defunct railway companies of Argentina
Metre gauge railways in Argentina
Railway companies established in 1888
Railway companies disestablished |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.