source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/List%20of%20Dungeons%20%26%20Dragons%20video%20games | This is a list of video games based on the Dungeons & Dragons fantasy tabletop role-playing game, including computer games, console games, arcade games, and mobile games.
Licensing history
The first Dungeons & Dragons licensed games were made by Mattel for the Intellivision. The contract required some variations to the normal Intellivision title screens with the name being capitalized and the addition of the word 'cartridge'. The games, however, had nothing to do with the rules or any of the settings.
Up until 1987, a number of games inspired by Dungeons & Dragons had appeared, such as the Wizardry and Ultima series, but these were not licensed from TSR. TSR considered making their own video games and passed on the idea, and instead announced in 1987 that it was looking for a game development partner to make officially-licensed games. At least ten different companies applied, including Electronic Arts and Origin Systems, but TSR awarded the contract to Strategic Simulations, Inc. (SSI) primarily because of their broader vision and their experience in computerized wargaming. After a successful run with their Gold Box series of games, SSI lost their exclusive license in 1994. TSR then divided the license among multiple publishers.
TSR awarded Interplay Productions, Inc. a license to use the Forgotten Realms and Planescape trademarks and associated properties for use in computer and video game products. Within Interplay, a division named Black Isle Studios used this license arrangement to develop a series of successful games based upon the two D&D settings. They also published the Baldur's Gate series developed by the Canadian company BioWare. In 2003, Interplay ran into financial difficulties, resulting in the closure of Black Isle Studios. Their next planned D&D video game, code-named "Jefferson," was canceled as a result of legal issues with Wizards of the Coast, the new rights holders to the D&D franchise.
Wizards of the Coast purchased TSR, the makers of Dungeons & Dragons, in 1997. They in turn were acquired by Hasbro in 1999. As a result, the subsidiary Hasbro Interactive gained the right to use the Dungeons & Dragons game brand in their video game products. In 2001, facing financial difficulties, Hasbro sold 100% of Hasbro Interactive to French software concern Infogrames Entertainment, SA in a US$100 million deal. This led to the publication of Neverwinter Nights in 2002, a game also developed by Bioware.
List of games
Sorted by setting (also known as game worlds).
Forgotten Realms
The majority of D&D video games are set in the Forgotten Realms setting, and since 2007 all D&D video games have been set there.
Former online games
Dragonlance
Mystara
Dark Sun
Ravenloft
Greyhawk
Greyhawk was the original Advanced Dungeons & Dragons setting. It was superseded by the Forgotten Realms around 1985, but it became the official default D&D setting in 2000. The Greyhawk video games were released shortly after.
Eberron
Other settings |
https://en.wikipedia.org/wiki/PAR3 | PAR3 may refer to:
Parchive, an error correction system for computer files. The third version is known as PAR3.
Protease activated receptor 3, a G-protein coupled receptor protein
Pseudoautosomal region 3, a region of homologous sequences between the human X and Y chromosome
Partitioning defective 3 homolog, a protein that in humans is encoded by the PARD3 gene
See also
3PAR |
https://en.wikipedia.org/wiki/Datach | The or Datach Joint ROM System, is an aftermarket enhancement accessory by Bandai for the Family Computer, allowing the system to play select compatible games. Released on December 29, 1992, it is packaged with one game, Dragon Ball Z: Gekitō Tenkaichi Budokai. Six other games were released for it, including one of the final games for the Famicom system in 1994. It is one of two mini systems compatible with the NES or Famicom, the other being the Aladdin Deck Enhancer.
The Datach consists of a cartridge connection at its bottom, a central cartridge chamber on its back, with two spring-loaded pins on either side, which are pushed up when the unit is inserted into the Famicom, allowing the game to only be removed when the Datach has been removed from the Famicom. Its main feature is the card reading slot on the front. The cartridges resemble half-size Famicom cartridges. One side of the cartridge is flat with title sticker, while the other side is sloped inward with notches on the left and right, which correspond to the spring pins on the main Datach unit. The cards that come with the games are swiped from left to right along the card slot; they are glossy on the front with an image of the character and the backs are smooth usually having the title of the game and barcode. All cartridges, boxes, instructions have the standard FF (Famicom Family) insignia, showing they are officially licensed by Nintendo.
Games
Seven games were made for the Datach. The first was packaged with the Datach and the remaining ones were released separately.
, literally translated as "Dragon Ball Z: Fierce Fighting on the Martial Arts Tournament for the Bests on Earth", was released on December 29, 1992, along with the initial release of the Datach. It comes with forty cards which have images from the anime series Dragon Ball Z.
was released on April 23, 1993, it was one of two Datach games released that day. It is based on the SD Gundam anime series and toy line.
, literally translated as "Ultraman Club: Sports Fighting Spirit Fight!", was released on April 23, 1993. It was one of two Datach games released that day. It features the classic Ultraman characters in sports related settings.
was released on August 27, 1993, the same day as a Famicom version of the game. It stars the famous Japanese character Crayon Shin-chan.
, literally translated as "Ghost Files: Explosive Tournament of Dark Martial Arts", was released on October 22, 1993, and is based on the anime series YuYu Hakusho.
was released on November 13, 1993, and is a robot creating and fighting game.
was released on April 22, 1994. It is a soccer simulation game with barcodes for the players' skills.
See also
List of Famicom games
Aladdin Deck Enhancer
Family Trainer
Barcode Battler II - another barcode reader that can be used with the Famicom
Sufami Turbo - a similar mini-cartridge adaptor (without barcode reader) from Bandai for Super Famicom
References
Nintendo Entertainment System acces |
https://en.wikipedia.org/wiki/Triangle%20%28The%20X-Files%29 | "Triangle" is the third episode of the sixth season of the American science fiction television series The X-Files. It premiered on the Fox network on November 22, 1998. Written and directed by series creator Chris Carter, "Triangle" is a "Monster-of-the-Week" episode, a stand-alone plot which is unconnected to the overarching mythology of The X-Files. "Triangle" earned a Nielsen household rating of 10.8, being watched by 18.20 million viewers in its initial broadcast. The episode generally received positive reviews with many critics commenting on the episode's directing style.
The show centers on FBI special agents Fox Mulder (David Duchovny) and Dana Scully (Gillian Anderson) who work on cases linked to the paranormal, called X-Files. Mulder is a believer in the paranormal, the skeptical Scully has been assigned to debunk his work and the two have developed a close friendship. In this episode, Mulder races to a luxury passenger liner which has mysteriously appeared in the Bermuda Triangle. Once there, he realizes he has traveled back in time to September 3, 1939—the outbreak of World War II. German soldiers have boarded the ship in search of "Thor's Hammer", something that could ensure victory in the coming conflict. Scully, after being informed of Mulder's disappearance by The Lone Gunmen, rushes through the J. Edgar Hoover Building, looking for someone who can help find her missing partner.
"Triangle" is filmed in a style inspired by the 1948 Alfred Hitchcock film Rope, with many scenes edited to appear as single takes. In addition, "Triangle" features the main and recurring cast members such as Anderson, William B. Davis, Chris Owens, James Pickens Jr. and Mitch Pileggi, who played their contemporary characters as well as distinctly different characters from 1939 on board the luxury liner. Several of the episode's themes have been critically examined, such as the concept of "dream-nazis", the appearance of modern characters portraying those from the past, and the ramification that the entire episode was a dream.
Plot
Fox Mulder (David Duchovny) lies unconscious in the sea after wrecking his raft. He is taken aboard a passenger ship, the Queen Anne, by its British crew members. When he is sent to meet the captain, Mulder tries to explain that Queen Anne vanished in the Bermuda Triangle in 1939, and claims that it has reappeared in 1998. The crew dismisses Mulder's story and suspect he is a Nazi spy. At that moment, Queen Anne is boarded by SS troops under the control of an Oberführer resembling the Smoking Man (William B. Davis), who sets the ship's course for Germany. The crew of Queen Anne lock Mulder in the captain's quarters, where he listens to a radio broadcast announcing the start of World War II. Mulder realizes that Queen Anne did not travel to 1998; he has traveled back to 1939.
In the present, the Lone Gunmen inform Dana Scully (Gillian Anderson) that they have lost contact with Mulder, who had set out in search of Queen Anne. S |
https://en.wikipedia.org/wiki/Agriculture%20Network%20Information%20Center | The Agriculture Network Information Collective (AgNIC) alliance was formed in 1995 by a group of four land grant institutions - Cornell University, Iowa State University, University of Arizona, and University of Nebraska-Lincoln, and the U.S. Department of Agriculture's National Agricultural Library (NAL). In 1998, NAL assumed the role as “secretariat” to move the partnership forward. Members were committed to creating a voluntary “alliance” dedicated to providing Internet access to quality, authoritative agricultural information, and specialized reference services. In 2007, with 60 voluntary partners, this vision continues to sustain the Alliance, largely due to its collaborative nature. University libraries affiliated with land-grant colleges—as well as other interested institutions, such as the International Rice Research Institute, the American Farmland Trust, the Agricultural Information and Documentation Service for America (SIDALC) and the University of Buenos Aires, School of Agriculture, Central Library, are working together with NAL to develop the AgNIC Alliance, its collections and services, and the technologies upon which it relies.
Unlike most science and technology disciplines, agriculture has a mechanism for distilling and distributing research to those who need it. Historically, state and local extension staff research topics, synthesize, and prepare information for easy consumption, often on an “as needed” basis. Forming partnerships between libraries and subject specialists has been the cornerstone of AgNIC.
AgNIC recently partnered with the United States Agricultural Information Network (USAIN) and the Center for Research Libraries on Project Ceres, which awards funding for “small projects that preserve print materials essential to the study of the history and economics of agriculture and make those materials accessible through digitization.”
AgNIC used to be called the Agriculture Network Information Center but is now known as the Agriculture Network Information Collective
Governance
AgNIC members agreed early in the formation of the partnership to maintain an informal structure. There were long discussions to determine if the partnership was an “alliance,” a “consortium,” or an “association.” By the end of year two, members agreed that each partner institution would be represented with one vote, and the partnership would be considered an alliance. This resulting decision was based on the strong belief that this partnership fit the definition of – a close association of ... groups, formed to advance common interests or cause. The group representing the institutions would be referred to as the “AgNIC Alliance Coordinating Committee.”
After more than two years of attempts to discuss issues and develop policy without measurable results, and a fast-growing membership of more than 20 institutions, the partners decided to create an “AgNIC Executive Board”. This board would be elected from and by the coordinating committee. |
https://en.wikipedia.org/wiki/Trace%20table | A trace table is a technique used to test algorithms in order to make sure that no logical errors occur while the calculations are being processed. The table usually takes the form of a multi-column, multi-row table; With each column showing a variable, and each row showing each number input into the algorithm and the subsequent values of the variables.
Trace tables are typically used in schools and colleges when teaching students how to program. They can be an essential tool in teaching students how certain calculations works and the systematic process that is occurring when the algorithm is executed. They can also be useful for debugging applications, helping the programmer to easily detect what error is occurring, and why it may be occurring.
Example
int i, x = 0;
for (i = 1; i <= 10; i++)
{
x = i * 2;
}
This example shows the systematic process that takes place whilst the algorithm is processed. The initial value of x is zero, but i, although defined, has not been assigned a value. Thus, its initial value is unknown. As we execute the program, line by line, the values of i and x change, reflecting each statement of the source code in execution. Their new values are recorded in the trace table. When i reaches the value of 11 because of the i++ statement in the for definition, the comparison i <= 10 evaluates to false, thus halting the loop. As we also reached the end of the program, the trace table also ends.
See also
Algorithms
Programming languages
Debugging
References
http://www.comscigate.com/tutorial/KjellStyle/WilliamChen/trace1.html
http://www.thevickerage.worldonline.co.uk/theteacher/alevel/assem/assem5.htm - archived version
http://portal.newman.wa.edu.au/technology/12infsys/html/KWH2003/TraceTables.htm - archived version
Debugging |
https://en.wikipedia.org/wiki/%C3%96smo | Ösmo () is a locality situated in Nynäshamn Municipality, Stockholm County, Sweden with 3,911 inhabitants in 2010. It has a station on the Stockholm commuter rail network, Nynäshamn line (Nynäsbanan).
References
There is a very old church here. The centre is modern and uninteresting, with a school, supermarket, petrol station, a couple of pizza restaurants, a handelsbanken bank and a discount store. The surrounding nature includes forest and a lake, called Muskan. A full-sized golf course and hotel lies just a few KM from the town centre.
Populated places in Nynäshamn Municipality |
https://en.wikipedia.org/wiki/Wyse%20%28disambiguation%29 | Wyse was an American computer company.
Wyse may refer to:
John Wyse (died after 1499), Irish judge
John Wyse (MP) (born about 1377), Member of Parliament for Bodmin
John Wyse (actor) (1904–1989)
Kenneth Wyse, Canadian drag queen
Lois Wyse (1926–2007), author and cofounder of Wyse Advertising
Peter Wyse Jackson (born 1955), botanist
Thomas Wyse (1791–1862), diplomat
Wyse (band), Japanese group
WYSE, a sports talk radio station licensed to Canton, North Carolina
See also
Wyses Corner, Nova Scotia
Worldwide Youth in Science and Engineering (WYSE) |
https://en.wikipedia.org/wiki/PSE-36 | In computing, PSE-36 (36-bit Page Size Extension) refers to a feature of x86 processors that extends the physical memory addressing capabilities from 32 bits to 36 bits, allowing addressing to up to 64 GB of memory. Compared to the Physical Address Extension (PAE) method, PSE-36 is a simpler alternative to addressing more than 4 GB of memory. It uses the Page Size Extension (PSE) mode and a modified page directory table to map 4 MB pages into a 64 GB physical address space. PSE-36's downside is that, unlike PAE, it doesn't have 4-KB page granularity above the 4 GB mark.
PSE-36 was introduced into the x86 architecture with the Pentium II Xeon and was initially advertised as part of the "Intel Extended Server Memory Architecture" (sometimes abbreviated ESMA), a branding which also included the slightly older PAE (and thus the Pentium Pro, which only supported PAE, was advertised as having only "subset support" for ESMA).
The heyday of PSE-36 was relatively brief. PSE-36's main advantage was that, unlike PAE, it required little rework of the operating system's internals, and thus PSE-36 proved a suitable stopgap measure around the Windows NT 4.0 Enterprise Edition timeframe. Newer Microsoft operating systems, including Windows 2000, support only PAE. Some operating systems like Linux skipped PSE-36 entirely. Despite this, AMD and later Intel chose to provide up to 40 bits PSE support in their 64-bit processors, when operated in legacy mode.
Operation
Detection
Support for PSE-36 is indicated by EDX bit 17 (counting from 0) in the cpuid result for feature bits. (This is a different bit from plain PSE support, which is indicated by bit 3 in the same register).
Activation and use
As far as activating PSE-36, there isn't however a separate bit from the one that turns on PSE. As long the processor (as indicated by cpuid) and chipset support PSE-36, enabling PSE alone (by setting bit 4, PSE, of the system register CR4) allows the use of large 4 MB pages (in the 64 GB range) along with normal 4 KB pages (which are however restricted to the 4 GB range).
If newer PSE-36 capability is available on the CPU, as checked using the CPUID instruction, then 4 more bits, in addition to the 10 bits used in PSE, are used inside a page directory entry pointing to a large page. This allows a large page to be located in 36 bit address space.
The PS bit (bit 7) in the Page Directory Entry (PDE) denotes whether this entry refers to a page table (that describes 1024 4-KiB pages) or one 4 MB page. PDE structures in normal mode, PSE mode, and PSE-36 mode are as follows:
<li> Page attribute table; since Pentium III, must be zero for older CPUs.
<li> "Dirty" bit: set to 1 by CPU if there was a write access to that page. For 4 KiB pages this flag exists in the according page table entry (PTE).
Extension up to 40 bits
AMD extends this scheme to 40 address bits by interpreting bits 20..13 of a PDE as bit 39..32 of the page base address in their AMD64 processors when ope |
https://en.wikipedia.org/wiki/Scratch%20tape | In data processing, a scratch tape is a magnetic tape that is used for temporary storage and can be reused or erased after the completion of a job or processing run. During the early years of computing, when magnetic tape was the primary form of mass storage, many programs, notably sorting routines, required such temporary storage.
See also
Scratch space – contemporary equivalent
Merge sorting tape drives – paradigm application
References
Computer storage tape media |
https://en.wikipedia.org/wiki/Time%20Twist%3A%20Rekishi%20no%20Katasumi%20de... | is a text-based adventure game developed by Pax Softnica under Nintendo EAD and published by Nintendo for the Family Computer Disk System in 1991. The game was released only in Japan.
Time Twist was sold across two separate discs released on the same day, and completion of the first disc is required to activate the second. Many members of the Famicom Fairytales: Shin Onigashima and Famicom Fairytales: Yuyuki staff also participated in the development of this game.
Development
The Nintendo EAD and Pax Softnica collaboration began on Shin Onigashima and continued through Yūyūki. On the original two works, Nintendo EAD handled the story design and character designs with Tatsuya Hishida leading the efforts as creative director on the behalf of Nintendo. Development on Time Twist shifted towards Pax Softnica and designer Keiji Terui as Nintendo EAD only provided the music and production tasks.
Gameplay
The game is played by choosing text commands given on the screen. The nameless protagonist is a young boy whose soul becomes separated from his body by a devil, allowing him to temporarily take control of other humans and animals. He must use this ability to thwart the plans of the time-traveling devil and return to his own body.
The game takes place in real historical locations and deals with serious themes such as religion, war and racism. Despite the serious setting, the game handles the topics with some light comic relief. Logic puzzles and historical trivia questions are presented over the course of the game, and the player must solve these correctly in order to progress. Unlike in previous Nintendo adventure games, players cannot get a "Game Over". Making a wrong choice will simply halt progress or return them to the previous scene to try again.
Like the Famicom Mukashibanashi games, all text in Time Twist is presented in hiragana, including names of non-Japanese objects, people, and countries, which would normally be written in katakana. The only sections of the game that contain katakana and kanji are the title screen and staff roll.
Plot
Introduction
The year is 1995, the impending turn of the 20th century is instilling fear and uncertainty in mankind, and fortune-telling shows have become popular.
On September 25, a young boy living in Tokyo hears on a fortune-telling show that he will meet the girl of his dreams in a museum located outside the city limits. He visits the "Devil Museum" and meets a girl inside, but a sudden earthquake cuts their meeting short. The boy recites the incantation from the fortune-telling show said to "capture the heart of the girl of his dreams", but the incantation destroys the seal on a vase containing the devil.
The reanimated devil takes control of the boy's body, leaving the boy trapped in the devil's decaying body. He chases the devil to the house of Dr. Simon, a physics scientist hiding from the media. The devil has stolen the scientist's time machine called the "Time Belt" and uses it to travel bac |
https://en.wikipedia.org/wiki/Marc%20Collins-Rector | Marc John Collins-Rector (born October 16, 1959) is an American businessman, convicted sex offender, known for founding Digital Entertainment Network, an online streaming video broadcaster and notable dot-com failure, as well as his associations with Hollywood and media figures. His child sexual abuse conviction is highlighted in the 2014 documentary An Open Secret.
Early life
Collins-Rector was born Mark John Rector. He changed his name to Marc Collins-Rector in 1998.
In the early 1980s, Rector founded Telequest, a Florida-based telecommunications company. In 1984, he founded World TravelNet, a company which electronically coordinated cruises and tours; its affiliate, World ComNet, was floated on the Vancouver Stock Exchange in 1987. Its valuation briefly peaked at $100 million before increasing competition led to bankruptcy. Rector later founded an early ISP; Concentric Network, in 1991 along with partner Chad Shackley.
DEN founding
Rector and Shackley sold Concentric in 1995 and, using money raised from the sale, as well as close to $100million of investor and venture capital, formed an early Internet video media content delivery company, Digital Entertainment Network. Collins-Rector was the co-founder and chairman of DEN, which exhausted its funding following a failed IPO bid and collapsed amidst allegations of Collins-Rector having sexually abused boys, coercing them with drugs and guns.
Child enticement conviction
Collins-Rector and his business partners, Chad Shackley and Brock Pierce, operated DEN out of a Los Angeles mansion. There, they held parties attended by Hollywood's gay A-list. At those parties, Collins-Rector and others were alleged to have engaged in sexual assaults against teenaged boys.
In August 2000, a New Jersey federal grand jury indicted Collins-Rector on criminal charges that he had transported minors across state lines for the purpose of having sex with them. After his indictment, Collins-Rector fled to Spain together with Shackley and Pierce. Interpol arrested the three men on May 17, 2002, in a house in the Spanish city of Marbella. Shackley and Pierce were released without being criminally charged. Guns, machetes and child pornography were found in the house.
Collins-Rector fought extradition proceedings for two years before returning to the United States, where he pleaded guilty to eight charges of child enticement and registered as a sex offender. He admitted luring five minors across state lines for sexual purposes. He received credit for time that he had served in a Spanish jail and was registered as a sex offender under a weekly supervision.
In 2006, a U.S. District Court granted Collins-Rector special permission to go to the United Kingdom to receive treatment for a brain tumor. He subsequently renounced his US citizenship and has never returned to the United States. In 2007, he was photographed in London, and in 2008 was living in the Dominican Republic. , he lives in Antwerp and uses the names "M |
https://en.wikipedia.org/wiki/Nemacaulis | Nemacaulis is a monotypic plant genus in the buckwheat family containing the single species Nemacaulis denudata, which is known by the common names woollyheads and cottonheads. This plant is a somewhat nondescript delicate annual herb with thin, spindly, naked stems and woolly white flowerheads. It can be found in sandy habitats in California, Arizona, and northern Mexico.
References
External links
Jepson Manual Treatment
USDA Plants Profile
Flora of North America
Monotypic Polygonaceae genera
Flora of Arizona
Flora of California
Flora of Mexico
Flora without expected TNC conservation status |
https://en.wikipedia.org/wiki/Renfrey%20Potts | Renfrey Burnard (Ren) Potts AO (1925–2005) was an Australian mathematician and is notable for the Potts model and his achievements in: operations research, especially networks; transportation science, car-following and road traffic; Ising-type models in mathematical physics; difference equations; and robotics. He was interested in computing from the early days of the computing revolution and oversaw the first computer purchases at the University of Adelaide.
Personal
The fourth child of Gilbert MacDonald Potts and Lorna Potts (née West), named after family friend and medical doctor Renfrey Gershom Burnard, Potts was educated at Rose Park Primary School and Prince Alfred College, where his father was Second Master. Potts was an outstanding lecturer who drew large audiences to his talks. In addition to mathematics, he was interested in sports and music. His sporting activities included long distance and marathon running, hockey, tennis, squash, badminton, bushwalking, and swimming. He played both the piano and the clarinet and was a volunteer disc jockey at a local radio station. He married Barbara Kidman in Oxford on 1 July 1950. They had two daughters, Linda and Rebecca. They also had four grandchildren, Frank, Zoe, Jack and Georgia.
Summary
1925 Born: 4 October 1925 Adelaide, South Australia, Australia
1930–1936 Rose Park Primary School
1937–1942 Prince Alfred College
1943–1947 University of Adelaide Bachelor of Science (First class honours in mathematics)
1948 Rhodes Scholar, Queen's College, Oxford
1949 Barbara Kidman graduated with first class Honours in Physics
1949–1951 D Phil, (Oxford), Dissertation: The Mathematical Investigation of Some Cooperative Phenomena, Advisor: Cyril Domb
1950 Married Barbara Kidman in Oxford on 1 July 1950
1951–1957 Lecturer in Mathematics at the University of Adelaide
1955–1956 Postdoctoral Scientist at the University of Maryland, USA
1956 Barbara Kidman awarded a PhD
1957–1959 Associate Professor at the University of Toronto in Canada
1958–1959 Consultant to General Motors in Detroit
1959 Awarded the Lanchester Prize for research in operations research
1959 Appointed to a newly created chair in applied mathematics at the University of Adelaide
1959–1990 Professor, Chair and popular lecturer of applied mathematics at the University of Adelaide
1966 Dr Kidman returns to workforce as lecturer in the (then) new area of Computer Science
1968 Doctor of Science (DSc) received from the University of Oxford
1975 fellow of the Australian Academy of Science (FAA)
1976 Appointed (Sir Thomas) Elder Professor of Mathematics
Foundation President of the South Australian Computer Society (the forerunner of the Australian Computer Society). He is recognised as the founder of the Australian Computer Society, and was elected a Fellow of that society (FACS).
1978–9 chairman, Division of Applied Mathematics of the Australian Mathematical Society (the progenitor of ANZIAM)
1983 Fellow of the Australian Academy of Technolog |
https://en.wikipedia.org/wiki/Semantic%20analysis%20%28machine%20learning%29 | In machine learning, semantic analysis of a corpus is the task of building structures that approximate concepts from a large set of documents. It generally does not involve prior semantic understanding of the documents. A metalanguage based on predicate logic can analyze the speech of humans. Another strategy to understand the semantics of a text is symbol grounding. If language is grounded, it is equal to recognizing a machine readable meaning. For the restricted domain of spatial analysis, a computer based language understanding system was demonstrated.
Latent semantic analysis (sometimes latent semantic indexing), is a class of techniques where documents are represented as vectors in term space. A prominent example is PLSI.
Latent Dirichlet allocation involves attributing document terms to topics.
n-grams and hidden Markov models work by representing the term stream as a Markov chain where each term is derived from the few terms before it.
See also
Explicit semantic analysis
Information extraction
Semantic similarity
Ontology learning
References
Machine learning |
https://en.wikipedia.org/wiki/Comeau%20C/C%2B%2B | Comeau C/C++ is a compiler for C and C++ produced by Comeau Computing. Comeau C/C++ was once described as the most standards-conformant C++ compiler. In 2006-2008 it was described as the only mainstream C++ compiler to fully support the export keyword for exported templates.
Design
The compiler supports several dialects of both the C and C++ languages. It comes with its own version of the Standard C++ library, libcomo, that is based upon the Standard C++ library from Silicon Graphics, but can also be used with the Dinkumware Standard C library.
The compiler is based upon the Edison Design Group C++ frontend, also utilized in the Intel C++ Compiler. Rather than produce an executable directly, Comeau C/C++ outputs C code and requires a separate C compiler in order to produce the final program. The Comeau C/C++ can employ several back ends.
Standards compliance
Comeau Computing is a founding member of the C++ committee. Comeau Computing's CEO, Greg Comeau, provided one of the early ports of cfront to the PC.
Distribution
A limited-function version of the compiler, which allows one to compile source code and view any resulting error messages, but not to produce executable programs, is available from the company's web site.
The compiler is available for both Unix and Microsoft Windows platforms. Comeau also offers custom ports to other platforms, albeit that this is substantially more expensive than buying existent versions of the compiler.
Status
The compiler was updated October 6, 2008 featuring version 4.3.10.1 Beta 2.
As of September 2017, version 4.3.10.1 remains in Beta. The company website appears to have been sold to an unrelated blogger.
References
External links
C (programming language) compilers
C++ compilers |
https://en.wikipedia.org/wiki/ISilo |
iSilo is a document reader available for Palm OS, Pocket PC, Windows Mobile Smartphone, Symbian UIQ, Symbian S60, and Windows CE Handheld PC handhelds, Windows computers as well as Apple iPhone, Android, Windows Phone 7 and HP webOS smartphones. iSilo has direct support for reading these document types: iSilo 4.x, iSilo 3.x, iSilo 2.x, Palm Doc, and plain text files (.txt). However it has largely fallen out of use due to its one-way nature — documents can be converted to iSilo format, but not back out for editing. Other formats, such as EPUB, use open standards, are easily edited or converted, and achieve similar compression rates.
iSiloX
iSiloX is a desktop application that converts web and file content to the iSilo document format. It is made by DC & Co company. Supported file formats include HTML, CSS, text, Palm Doc, JPEG, GIF, BMP, and PNG. The X in the name iSiloX represents the "transformation" of content functionality provided by iSiloX. iSiloXC, on the other hand, stands for the command-line version of iSiloX, with the C denoting the command-line capability.
In 2005 a book recommended the usage of this program for medical practitioners.
See also
Palm OS
References
External links
iSilo - iSilo official website.
iSiloX - iSiloX official website.
Cross-platform mobile software
Pocket PC software
Windows Mobile Standard software
Ebooks |
https://en.wikipedia.org/wiki/Accelerator%20%28library%29 | Accelerator is a data parallel library being developed by Microsoft Research. It allows data parallel programs to be written that run on the GPU. It utilizes the DirectX runtime and shader programs to communicate with the GPU. The public API of the library is exposed using managed code.
References
External links
Accelerator @ Microsoft Research
Concurrent programming libraries
Microsoft Research |
https://en.wikipedia.org/wiki/Microsoft%20Phoenix | Microsoft Phoenix was an SDK available from Microsoft Connect for creating compilers, optimize code, and perform code analysis. Microsoft described it in the past tense on 2008-07-01.
Original Description
[It was] to be used as the back-end for future compiler technologies from Microsoft. It [was] also available as an SDK, a pre-release build of which has been made accessible, to create compilers and code analysis tools using the Phoenix framework.
Overview
Microsoft Phoenix defines an intermediate representation (IR) for programs, using ASTs, control-flow graphs, and an exception handling model. For any program to be handled by Phoenix, it needs to be converted to this representation. The specification for these file type-specific converters, called file readers in Phoenix terminology, is also specified. Phoenix comes included with readers for Portable Executable binary files, CIL and the output of the Visual C++ front-end. Readers for other languages can be written using the Phoenix SDK, though separate tools such as lex and yacc need to be used to write the lexer and parser, respectively.
Once the program has been converted to the IR, the analysis and optimization tools can operate on that form. Phoenix includes a selection of tools – including block counting, memory analysis, code coverage, code analysis and optimization. The Phoenix SDK can be used to write and plug-in other tools as well. Code generation is handled by providing architecture-specific (either physical architecture of the processor or a virtual machine architecture) file writers. Phoenix provides the c2.dll compiler backend, which it shares with Visual C++, to handle analysis, optimization and code generation for the x86 architecture. Writers for other architectures must be provided separately.
As a result of the modular architecture, any component can be replaced without affecting the rest of the system. For example, to target the compiler to a different architecture, only the file writer specific to the architecture needs to be changed, keeping the rest of the stack unchanged. To create a compiler for a new language, only the readers need to be provided.
Productization
A Phoenix component (phx.dll) is used for some of the static analysis (FxCop) in Visual Studio 2010. (The Phoenix compiler itself, which is required for most instrumentation insertion to work, is not included with Visual Studio.)
See also
List of compilers
Roslyn (compiler)
References
External links
Official Phoenix site
Phoenix SDK June 2008 CTP Release(latest release to the moment of writing)
Compilers
Microsoft Research |
https://en.wikipedia.org/wiki/Gilles%20Motet | Gilles Motet (; born 22 June 1956) is a French scientist in computer science, software engineering and risk management fields. He is now a professor at INSA Toulouse, University of Toulouse. He is the scientific director of La Fondation pour une Culture de Sécurité Industrielle.
Works
A short list of his works:
Gilles Motet (co-author), ISO 31000 "Risk Management. Principles and guidelines", International Organization for Standardization
Gilles Motet (co-author), ISO Guide 73, Revision, "Risk management. Vocabulary", International Organization for Standardization
Gilles Motet, J.-C. Geffroy, Special Issue on Dependable Computing, Theoretical Computer Sciences, vol. 290(2), Elsevier, 2003
J.-C. Geffroy, Gilles Motet, Design of Dependable Computing Systems, Kluwer Academic Publishers, 2002
Gilles Motet, A. Marpinard, J.-C. Geffroy, Design of Dependable Ada software, Prentice Hall, 1996
References
External links
Gilles Motet
1956 births
Living people
French computer scientists |
https://en.wikipedia.org/wiki/Battle%20Storm | is a Family Computer video game that was published by Yonezawa PR21 and released on December 21, 1991. An unofficial English translation patch for Battle Storm was released on October 23, 2015.
Summary
The game allows players to do combat strategies with tanks, airplanes, military bases, and non-nuclear missiles. These advanced weapons allow players to stage a fictional World War III and to simulate modern warfare.
Players can assume the persona of various Hollywood action film stars like Sylvester Stallone (シルヴェスター・スタローン), Chuck Norris (チャックノリス), Eddie Murphy (エディマーフィー), Bruce Lee (ブルースリー), and Arnold Schwarzenegger (アーノルドシュワルツェネッガー). Stages include a jungle, forest, swamp, and urban terrain.
The player chooses a tank, and then must decide either to move a unit or destroy the enemy on sight. Destroyed units can be rebuilt for money and the first person to run out of cash loses the war. Both players are granted more than $250 million of virtual game currency to spend on military weapons to fire at each other.
References
1991 video games
Japan-exclusive video games
Nintendo Entertainment System games
Nintendo Entertainment System-only games
Real-time strategy video games
Top-down video games
Video games developed in Japan
Yonezawa PR21 games
Multiplayer and single-player video games |
https://en.wikipedia.org/wiki/Jeff%20Gill%20%28academic%29 | Jefferson Morris Gill (born December 22, 1960) is Distinguished Professor of Government, and of Mathematics & Statistics, the Director of the Center for Data Science, the Editor of Political Analysis, and a member of the Center for Behavioral Neuroscience at American University as of the Fall of 2017.
He was a Professor of Political Science at Washington University in St. Louis and the Director of the Center for Applied Statistics. He was also President of the Society for Political Methodology, and is an inaugural fellow of the Society for Political Methodology. Major areas of research and interest include: Political Methodology, American Politics, Statistical Computing, Research Methods, and Public Administration. Current research is focused on projects on work in the development of Bayesian hierarchical models, nonparametric Bayesian models, elicited prior development from expert interviews, as well in fundamental issues in statistical inference. He has extensive expertise in statistical computing, Markov chain Monte Carlo (MCMC) tools in particular. Most sophisticated Bayesian models for the social or medical sciences require complex, compute-intensive tools such as MCMC to efficiently estimate parameters of interest. Gill is an expert in these statistical and computational techniques and uses them to contribute to empirical knowledge in the biomedical and social sciences. Current theoretical work builds logically on Gill's prior applied work and adds opportunities to develop new hybrid algorithms for statistical estimation with multilevel specifications and complex time-series and spatial relationships.
Current applied work includes: energetics and cancer, long-term mental health outcomes from children's exposure to war, pediatric head trauma, analysis of mouse models, and molecular models of sickle cell disease. He also contributes to gene-wide associate studies (GWAS) that seek to discover correlated cancer genes related to obesity, diet, and exercise, as well as consult on computational genetics analysis. Other work includes Bayesian hierarchical models, Markov chain Monte Carlo theory, bureaucratic behavior in national security agencies, and issues in political epidemiology. His best known works include Essential Mathematics for Political and Social Research, with Cambridge University Press, and the third edition of Bayesian Methods for the Social and Behavioral Sciences (Chapman & Hall/CRC), which is the leading Bayesian text for these disciplines. He is the author of seven other books. His journal work has appeared in the Quarterly Journal of Political Science, Journal of the Royal Statistical Society, Journal of Politics, Electoral Studies, Statistical Science, Political Research Quarterly, Sociological Methods & Research, Public Administration Review, Journal of Public Administration Research and Theory, Canadian Journal of Political Science, Journal of Statistical Software, Political Analysis, Lancet Neurology, American Jo |
https://en.wikipedia.org/wiki/Usplash | Usplash is a software project in the Ubuntu community. Historically, scrolling text "verbose mode" has typically appeared on Linux computers during boot. Usplash replaces the scrolling-text screens with a graphical splash screen. It was designed to replace Bootsplash, which did the same thing on the kernel space level. Since usplash operates in user space, it can be updated without recompiling the kernel.
Usplash uses the Linux framebuffer interface or, alternatively, direct VESA access to display the splash screen.
In Ubuntu 9.10 "Karmic Koala", Usplash is only used in the preliminary stages of booting, after which XSplash takes over. In Ubuntu 10.04 LTS "Lucid Lynx", Usplash has been fully replaced by Plymouth, which uses Direct Rendering Manager (DRM) and KMS driver.
See also
Plymouth
External links
Usplash on Launchpad
Debian package listing for usplash
Ubuntu help page for usplash
Some discussions about usplash
Simple tool to create simple themes for usplash
Booting
Free software programmed in C
Ubuntu |
https://en.wikipedia.org/wiki/WEGZ | WEGZ is a Christian radio station licensed to Washburn, Wisconsin, broadcasting on 105.9 MHz FM. The station is owned by VCY America.
Programming
WEGZ's programming includes Christian Talk and Teaching programming including; Crosstalk, Worldview Weekend with Brannon Howse, Grace to You with John MacArthur, In Touch with Dr. Charles Stanley, Love Worth Finding with Adrian Rogers, Revive Our Hearts with Nancy Leigh DeMoss, The Alternative with Tony Evans, Liberty Council's Faith and Freedom Report, Thru the Bible with J. Vernon McGee, Joni and Friends, Unshackled!, and Moody Radio's Stories of Great Christians.
WEGZ also airs a variety of vocal and instrumental traditional Christian Music, as well as children's programming such as Ranger Bill.
History
The station began broadcasting October 5, 1981, holding the call sign WBWA. The station aired a MOR format, and was owned by Silver Birch Broadcasting.
In 1990, the station was sold to DDS Communications for $98,000 and the station's call sign was changed to WEGZ. WEGZ would adopt a country music format and was branded "Eagle Country 106".
The station adopted its present format on January 1, 2002. DDS Communications, the licensee of WEGZ, was sold to VCY America for $465,000 shortly thereafter.
See also
VCY America
List of VCY America Radio Stations
References
External links
VCY America official website
EGZ
Radio stations established in 1981
1981 establishments in Wisconsin
VCY America stations |
https://en.wikipedia.org/wiki/WVCY%20%28AM%29 | WVCY is a Christian radio station licensed to Oshkosh, Wisconsin, broadcasting on 690 kHz AM. The station is owned by VCY America.
Programming
WVCY's programming includes Christian Talk and Teaching programming including; Crosstalk, Worldview Weekend with Brannon Howse, Grace to You with John MacArthur, In Touch with Dr. Charles Stanley, Love Worth Finding with Adrian Rogers, Revive Our Hearts with Nancy DeMoss Wolgemuth, The Alternative with Tony Evans, Liberty Counsel's Faith and Freedom Report, Thru the Bible with J. Vernon McGee, Joni and Friends, Unshackled!, and Moody Radio's Stories of Great Christians.
WVCY also airs a variety of vocal and instrumental traditional Christian Music, as well as children's programming such as Ranger Bill.
History
The station began broadcasting on July 1, 1969, and originally held the callsign WAGO. The station featured a Middle-of-the-Road music format, Old Time Radio dramas such as The Shadow, and news from ABC's American Entertainment Radio network. By 1976, the station had begun airing a Top 40 format. In 1983, the station's call sign was changed to WCKK, and it aired the Music of Your Life pop standards format, as "Cake Radio". From 1987 to 1992, the station held the call letters WLKE, initially simulcasting 1170 WLKD as "The Lake", playing music from the 1950s, 1960s, and 1970s. The call letters were changed to WXOL under the ownership of area disc jockey Steve Rose from 1992 to 1995, and the station was branded as "Excellent Oldies" during this period, airing an oldies format. In 1995, the station was sold to VCY America for $190,000, and its call sign was changed to WVCY.
See also
VCY America
Vic Eliason
List of VCY America Radio Stations
References
External links
VCY America official website
VCY
Radio stations established in 1969
1969 establishments in Wisconsin
VCY America stations |
https://en.wikipedia.org/wiki/From%20%28SQL%29 | The SQL From clause is the source of a rowset to be operated upon in a Data Manipulation Language (DML) statement. From clauses are very common, and will provide the rowset to be exposed through a Select statement, the source of values in an Update statement, and the target rows to be deleted in a Delete statement.
FROM is an SQL reserved word in the SQL standard.
The FROM clause is used in conjunction with SQL statements, and takes the following general form:
SQL-DML-Statement
FROM table_name
WHERE predicate
The From clause can generally be anything that returns a rowset, a table, view, function, or system-provided information like the Information Schema, which is typically running proprietary commands and returning the information in a table form.
Examples
The following query returns only those rows from table mytable where the value in column mycol is greater than 100.
SELECT *
FROM mytable
WHERE mycol > 100
Requirement
The From clause is technically required in relational algebra and in most scenarios to be useful. However many relational DBMS implementations may not require it for selecting a single value, or single row - known as DUAL table in Oracle database.
SELECT 3.14 AS Pi
Other systems will require a From statement with a keyword, even to select system data.
select to_char(sysdate, 'Dy DD-Mon-YYYY HH24:MI:SS') as "Current Time"
from dual;
References
SQL keywords
Articles with example SQL code |
https://en.wikipedia.org/wiki/Sarcastic%20Gamer | SarcasticGamer.com was an independent video gaming blog and community site that was relaunched as a podcast. As part of the GamerCast Network, a community of independent podcasters, the website focused on parodying the latest events happening in the gaming industry. Although the website was best known for its satirical news articles and parodies, it also featured reviews, news, opinions and rants. All articles, however, stayed true to the "sarcastic" ethos of the site. Sarcastic Gamer was relaunched as a podcast-only website in December 2012 before closing its site in 2015.
History
The site was founded by Adams in early June 2007, the first SarcasticGamer.com article, written on 11 June 2007 after his first parody song, "How You Killed Your Brand" (a parody of How To Save A Life by The Fray) gained immense popularity on YouTube.
As the popularity of the parodies and, consequently, the website increased, Adams needed to find reliable writers who could help him satisfy the growing demand for new material. The first to be approached was Sean "Rothbart" Workman, a trusted GamerCast Network forums member, who agreed to start preparing new articles for Sarcastic Gamer. Shortly thereafter, Matt "Volkov" Schmidt offered his help with the blog. Adrian "Lono" Cherikos, who had met with Adams on Xbox Live a few months before Sarcastic Gamer was created, started writing for the site after his debut on the Sarcastic Gamer Podcast on July 13, 2007. Adams also recruited his friend David Cothran, who stars on the podcast with him and helps him edit the podcasts.
With the site traffic increasing daily towards the end of 2007, more writers were required, leading to the recruitment of Alex "SupaSlick" Shaw and Anthony "Yousty" Youst in September, along with Eric "PacManPolarBear" Ross, who joined the staff in October 2007. Writer Matthew "Animathias" Schramm and cartoonist Tim "MightyMutt" Hibbs joined Sarcastic Gamer in early 2008. Jon "Yamster" Brady and Alex "RaiseHavok" Saunders were recruited as writers and in June 2008 and Ben "Eoco" Simmons joined the staff a month later.
The same increases in traffic that necessitated the extra staff were the impetus behind the shifting of the site, in early 2008, from its original host service, Blogger, to its present self-hosting state with WordPress.
Since the site is non-commercial, the staff rarely takes part in non-essential gaming events and gatherings. The first event the Sarcastic Gamer writers participated in was QuakeCon 2007, whilst the second one was Kane and Lynch Community Day. In July 2008, Jeromy Adams and David Cothran were able to receive E3 passes and attended the gaming convention and have since attended QuakeCon in 2008, the Penny Arcade Expo (PAX) in 2008, The Godfather Part II Community Day and the Computer and Electronics Show (CES) in 2009. Aside from conventions, Jeromy Adams and Adrian Cherikos were invited by Microsoft in December 2007 to see the forthcoming device under development by t |
https://en.wikipedia.org/wiki/UDPCast | UDPcast is a file transfer tool that can send data simultaneously to many destinations on a LAN. This can for instance be used to install entire classrooms of PCs at once. The advantage of UDPcast over using other methods (nfs, ftp, whatever) is that UDPcast uses the User Datagram Protocol's multicast abilities: it won't take longer to install 15 machines than it would to install just 2.
By default this protocol operates on the UDP port 9000. This default behaviour can be changed during the boot stage.
See also
List of disk cloning software
External links
Free system software
Free backup software
Free software programmed in Perl
Cross-platform software
Disk cloning
Computer networking |
https://en.wikipedia.org/wiki/WBEY-FM | WBEY-FM (97.9 FM) is a radio station broadcasting a country music format. Licensed to Crisfield, Maryland, United States, the station is owned by GSB Media, LLC, and features programming from ABC Radio, Westwood One, Maryland News Network, and United Stations Radio Network.
History
WBEY originally signed on in 1993, on 96.9 FM in Crisfield, Maryland. In the early 2000s, WBEY relocated its studios from Crisfield to Pocomoke City, Maryland.
In October 2018, WBEY-FM was purchased from Bay Broadcasting Inc. (Michael Powell) by A. Wray Fitch and Greg Bojko under the joint company GSB Media, LLC for $237,500, making WBEY the sixth station and third format operated by GSB Media, LLC. With the sale, WBEY-FM relocated from the studios and transmitter site of WGOP in Pocomoke City. It joined sister stations WCTG and WVES programmed as adult hits/variety (96.5 & 101.5 CTG WCTG), and WOWZ-FM/WOWZ-LP and WICO-FM programmed as Classic Country (WOW 101.1 & 99.3 That's Country WICO-FM).
Affiliations
National and global news are provided by Westwood One.
Local News and weather is provided by Maryland News Network owned by Steve Clendenin.
External links
Bay Country 97.9’s website
Crisfield, Maryland
BEY-FM
Radio stations established in 1975
1975 establishments in Maryland |
https://en.wikipedia.org/wiki/Athabasca%20Valles | The Athabasca Valles are a late Amazonian-period outflow channel system in the central Elysium Planitia region of Mars, located to the south of the Elysium Rise. They are part of a network of outflow channels in this region that are understood to emanate from large fissures in the Martian surface rather than the chaos terrains that source the circum-Chryse outflow channels. The Athabasca Valles in particular emanate from one of the Cerberus Fossae fissures and flow downstream to the southwest, constrained to the south by a wrinkle ridge for over 100 km, before debouching into the Cerberus Palus volcanic plain. The Athabasca Valles are widely understood to be the youngest outflow channel system on the planet.
Although researchers generally agree that the valley was formed by the catastrophic outpouring from the southernmost Cerberus Fossae fissure, the scientific community has not reached a consensus on the precise formation mechanism behind the Athabasca Valles – both in the nature of the fluids that tracked through the valley, and in terms of later geologic events that have since resurfaced the region. Researchers concurrently propose a floodwater origin (akin to the Missoula Floods that formed the Channeled Scablands of Washington state), a low-viscosity lava origin (similar to the pāhoehoe flows of Hawaii), a glacial origin, or some combination of the aforementioned mechanisms. The presence of pitted mounds on the valley floor has also been subject to debate and underpins the different hypotheses that have been proposed, and have variably been suggested to be pingoes and rootless cones. Polygonal terrains of varying scales observed in the Athabasca Valles and downstream in Cerberus Palus have been proposed to have both and/or either volcanic and periglacial features. Interpretations on these terrains differ strongly even with respect to in what order these features superpose other events in the valley.
Context
The Athabasca Valles system lies to the south of the Albor Tholus peak of the Elysium volcanic province, the second most significant volcanic province on the planet Mars. It lies within the southern Martian highlands in a diffuse part of the planet's crustal dichotomy. It is a valley that trends northeast-southwest at the southernmost end of the Elysium province. Cerberus Fossae exists uphill to the northeast of the easternmost part of the valley and score the terrain in a perpendicular direction to the Athabasca Valles' trend. Downstream to the southwest of the valley system lies the Cerberus Palus plain. The outflow channel's route during its formation likely followed a pre-existing southwest-trending pathway, as it is bounded to the south by a wrinkle ridge associated with compressive stresses emanating from the Elysium volcanic province. It emanates from its source at Cerberus Fossae in two channels that converge approximately 25 km southwest of the fissure; after a further 80 km, the valley becomes distributary, with some of its |
https://en.wikipedia.org/wiki/WBMD | WBMD (750 AM) is a radio station broadcasting a religious format. Licensed to Baltimore, Maryland, United States, the station is Baltimore's outlet for the Catholic-oriented Relevant Radio network.
Because it shares the same frequency as "clear channel" station WSB in Atlanta; WBMD broadcasts only during the daytime hours.
History
WBMD began broadcasting November 27, 1947, on 750 kHz with 1 kW power (daytime only). The station was licensed to Key Broadcasting Corporation, with studios at 2 West Eager Street in Baltimore. In the 1950s-1960s, the station aired daily religious programs by a number of local ministers, who bought airtime in 15- or 30-minute blocks. Sunday afternoons in the 1960s featured ethnic programs, such as Greek and German language shows. In the 1990s, WBMD's schedule continued its focus on religious programming.
In 1994, WBMD's ownership, Sconnix Broadcasting, sold the station, along with FM sister station WQSR (105.7), to American Radio Systems (ARS). In 2005, to comply with Federal Communications Commission (FCC) ownership restrictions, Infinity Radio sold WBMD and WBGR—among the few religious-oriented stations in the group—to Family Stations; Family already owned WFSI (107.9 FM) in nearby Annapolis.
In 2021, Family Stations swapped WBMD to Relevant Radio in exchange for WAMT in the Orlando, Florida, area. The swap, which left WFSI (860 AM) as Family's only Baltimore station, allowed Family to enter the Orlando market (where Relevant Radio also owned WHOO) and Relevant Radio to enter Baltimore.
References
External links
FCC History Cards for WBMD
BMD
BMD
Relevant Radio stations
BMD
Radio stations established in 1947
1947 establishments in Maryland |
https://en.wikipedia.org/wiki/WMTB-FM | WMTB-FM (89.9 FM) is the student radio station of Mount Saint Mary's. Licensed to Emmitsburg, Maryland, United States, the station offers mainly student-and-faculty produced programming. The station also offers a Classic Rock automation format when programming is not live.
External links
MTB-FM
MTB-FM
Catholic radio stations
Emmitsburg, Maryland
Radio stations established in 1969
1969 establishments in Maryland
Catholic Church in Maryland |
https://en.wikipedia.org/wiki/Rodney%20Waschka%20II | Rodney Waschka II is an American composer known for his algorithmic compositions and his theatrical works.
Biography
Waschka studied at Brooklyn College, at the Institute of Sonology, then newly part of the Royal Conservatory of The Hague, and earned his doctorate at the University of North Texas. His teachers include Larry Austin at the University of North Texas, Charles Dodge (composer) at Brooklyn College, and Paul Berg, Clarence Barlow, Joel Ryan and George Lewis (trombonist) at the Royal Conservatory of The Hague. He also studied with Robert Ashley.
His music has been performed throughout the world including numerous instances at the annual International Computer Music Conference, at the Society for Electro-Acoustic Music in the US festival, at the World Saxophone Congress in Montreal, and various other venues including Merkin Concert Hall in New York, the Sheremetev Palace and Glinka Hall in St. Petersburg, Russia, the International Review of Composers in Belgrade, the Purcell Room in London, Hong Kong City Hall, and the Museo Reina Sofia in Madrid.
Currently, Rodney Waschka II is Director and Professor of Arts Studies at North Carolina State University and he is the director of the North Carolina Computer Music Festival.
Performances and publications
Waschka's performances and recordings are regularly reviewed in Computer Music Journal (MIT Press), the Classical Voice of North Carolina and Fanfare. Reviews have appeared in Journal SEAMUS, Technology Review, and other journals. A lengthy interview with Waschka appeared in 21st-Century Music, in December, 2007, conducted by Tom Moore.
Waschka has written articles on techniques used in his music and on other topics. Explanations of his notable work on composing with genetic algorithms appear in the book, Evolutionary Computer Music. He has performed music by Allen Strange, Pertti Jalava, Mansoor Hosseini, himself, and others.
Discography
Riding with Phil, "Teth", Phasma Records, 2021.
A Tuesday with Rodney, Jeff Morris, composer; Waschka, performer, “Hearing Voices: Human Sounds, Digital Ears”, Ravello Records, 2020.
Considering Jupiter, Olga Kleiankina, piano, “...Our Passage To The Stars...”, Blue Griffin Records, 2019.
Au Revoir, Svetozar, Hong Kong New Music Ensemble, “Live From Prague”, Ablaze Records, 2017.
Belgrade Overture, Brno Philharmonic Orchestra, Mikel Toms, conductor, “Orchestral Masters”, Ablaze Records, 2013.
Winter Concerto, London Schubert Players chamber orchestra, Huw Morgan, trumpet soloist, “A European Odyssey”, Nimbus Records, 2013.
Singing in Traffic, Jonathan Kramer, cello, “CHASS Creates”, North Carolina State University, 2012.
Winter Concerto, the London Schubert Players chamber orchestra, Huw Morgan, trumpet soloist, “As You Like It”, RMA, 2013.
Reminded of Dickens, “60x60 2006-2007”, Vox Novus, 2008.
String Quartet: Laredo, Six Folksongs from an Imaginary Country (viola alone), Xuan Men (violin alone, Russian version), Ravel Rememb |
https://en.wikipedia.org/wiki/Certified%20wireless%20network%20administrator | The Certified Wireless Network Administrator (CWNA) is a foundation level certification from the CWNP that measures the ability to administer any wireless LAN. A wide range of topics focusing on the 802.11 wireless LAN technology are covered in the coursework and exam, which is vendor neutral.
Certification track
The Certified Wireless Network Administrator (CWNA) is a foundation level wireless certification for the Certified Wireless Network Professional (CWNP) program. The CWNP next offers three professional level certifications: Certified Wireless Security Professional (CWSP), Certified Wireless Analysis Professional (CWAP) and Certified Wireless Design Professional (CWDP). A candidate can only achieve the expert level CWNE certification after earning the CWNA, CWSP, CWAP and CWDP certifications. A candidate no longer has to pass an exam for the expert level Certified Wireless Network Expert (CWNE) certification. In addition to passing the CWNA, CWSP, CWAP and CWDP a candidate must also provide: 3 professional endorsements, 3 years of documented enterprise Wi-Fi experience, 2 other current valid networking certifications and documentation of 3 enterprise Wi-Fi projects the candidate has participated in or led.
CWNA requirements
The main subject areas covered by the CWNA are as follows:
Radio Technologies
Antenna Concepts
Wireless LAN hardware and software
Network Design Installation and Management
Wireless Standards and Organization
802.11 Network Architecture
Wireless LAN Security
Troubleshooting
How to perform site surveys
These subjects are covered at an introductory level in the CWNA coursework and examination. The other certifications specialize in one or more of these subjects.
Recertification
The CWNA certification is valid for three years. The certification may be renewed by retaking the CWNA exam or by passing one of the 3 professional level certification exams (CWSP, CWAP or CWDP).
See also
Professional certification (Computer technology)
References
External links
Sybex Publishing Study Guide: https://www.wiley.com/go/cwnasg
Wireless networking
Information technology qualifications |
https://en.wikipedia.org/wiki/Grant%20Kereama | Grant Rodney Hokowhitu Kereama (born 30 May 1967) is a New Zealand radio host, formerly on The Polly and Grant Show on the ZM and More FM network. Kereama co-hosted his morning show with his ex-wife Polly Gillespie.
Kereama began in radio in 1987 on ZMFM The Music Leader in Wellington. His first full time show was the 7 to midnight slot from 1988 to 1990. He then was promoted to the ZMFM day show until 1991. Kereama moved north to Auckland to host the 9 to 12 show on 89FM for six months, then returned to Wellington where he became the anchor of the "ZMFM Morning Crew" alongside his wife, Polly Gillespie, and Nick Tansley. The Morning Crew was hugely successful in the 1990s taking the number one ratings spot in 1995. In 2001, the ZM Morning Crew became a nationally syndicated show broadcasting throughout New Zealand.
From February 1992 to November 1996 Kereama was a lottery host alongside Hilary Timmins.They presented the weekly live Lotto draw every Saturday night.
In 2014, Kereama and Gillespie left ZM and launched a morning show on a new radio station called The Hits, which replaced the previous Classic Hits stations.
Kereama and Gillespie left The Hits in 2017, and later moved to More FM. In mid-2020, MediaWorks New Zealand restructured More FM and laid off Kereama and his co-host.
Kereama has acted in two feature films. In 2019 he played Tohunga Makutu in High Octane Pictures' Killer Sofa. In 2020, he played Dean in the New Zealand Film Commission's Lowdown Dirty Criminals.In 2022, Kereama co-starred as Myles in the New Zealand web production Self Help, produced by Wrestler.
Kereama currently broadcasts weekends on NZME's Coast and Gold FM.
Kereama competed in amateur bodybuilding from 2004 to 2007. He won the 80 kg to 90 kg open men's category at the IFBB Wellington Championships in 2005, and finished in second place in the same category at the IFBB New Zealand championships later that year. In 2006 Kereama placed 3rd in the 80 kg to 90 kg category in the IFBB Wellington championships, and again placed second at the New Zealand championships.
Personal life
In 1989, Kereama married Polly Gillespie, who would become his longtime co-host. They have three children together.
They split in 2015, with the divorce concluding in 2016. Kereama married Lisa Brockelsby in 2017.
In 2004, it was revealed that Kereama was the donor of a kidney for former All Black rugby player Jonah Lomu, who died in 2015.
References
External links
Living people
New Zealand radio presenters
1967 births |
https://en.wikipedia.org/wiki/European%20Business%20Register%20Network | The European Business Register Network (EBR Network) is a network of trade registers kept by the registration authorities of several European countries, managed by the European Business Registry Association. The EBR was developed as a part of the fully integrated approach of the European Commission in the legislation designed to achieve regulations to promote transparent financial markets and to facilitate free movement of companies. The EBR has served as a starting point of the Business Register Interoperability Throughout Europe (BRITE) project which developed an interoperability solution BRIS for Business Registers to interact across the European Union. BRIS makes it possible to obtain comparable, official company information from the countries connected to the network.
The EBR is at the moment composed of 26 partners and delivers company information from 25 European countries.
Amongst others the European Business registers contains remarks about:
legal name of a company
Registered office
people representing the company (Managing Director, Board of Directors, holders of Proxy)
subscribed capital if any.
Many scams circulate offering inclusion in the European Business register against payment of a hidden fee, these do not refer to the official register though; inclusion in the European Business Register is free of charge and mostly automatically done by registering a company within one of the partnering countries.
See also
List of company registers
OpenCorporates
References
External links
Official website of the European Business Register Network
Online databases
Databases in Europe
Registrars of companies |
https://en.wikipedia.org/wiki/Virtual%20actor | A virtual human, virtual persona, or digital clone is the creation or re-creation of a human being in image and voice using computer-generated imagery and sound, that is often indistinguishable from the real actor.
The idea of a virtual actor was first portrayed in the 1981 film Looker, wherein models had their bodies scanned digitally to create 3D computer generated images of the models, and then animating said images for use in TV commercials. Two 1992 books used this concept: Fools by Pat Cadigan, and Et Tu, Babe by Mark Leyner.
In general, virtual humans employed in movies are known as synthespians, virtual actors, vactors, cyberstars, or "silicentric" actors. There are several legal ramifications for the digital cloning of human actors, relating to copyright and personality rights. People who have already been digitally cloned as simulations include Bill Clinton, Marilyn Monroe, Fred Astaire, Ed Sullivan, Elvis Presley, Bruce Lee, Audrey Hepburn, Anna Marie Goddard, and George Burns.
By 2002, Arnold Schwarzenegger, Jim Carrey, Kate Mulgrew, Michelle Pfeiffer, Denzel Washington, Gillian Anderson, and David Duchovny had all had their heads laser scanned to create digital computer models thereof.
Early history
Early computer-generated animated faces include the 1985 film Tony de Peltrie and the music video for Mick Jagger's song "Hard Woman" (from She's the Boss). The first actual human beings to be digitally duplicated were Marilyn Monroe and Humphrey Bogart in a March 1987 film "Rendez-vous in Montreal" created by Nadia Magnenat Thalmann and Daniel Thalmann for the 100th anniversary of the Engineering Institute of Canada. The film was created by six people over a year, and had Monroe and Bogart meeting in a café in Montreal, Quebec, Canada. The characters were rendered in three dimensions, and were capable of speaking, showing emotion, and shaking hands.
In 1987, the Kleiser-Walczak Construction Company (now Synthespian Studios), founded by Jeff Kleiser and Diana Walczak coined the term "synthespian" and began its Synthespian ("synthetic thespian") Project, with the aim of creating "life-like figures based on the digital animation of clay models".
In 1988, Tin Toy was the first entirely computer-generated movie to win an Academy Award (Best Animated Short Film). In the same year, Mike the Talking Head, an animated head whose facial expression and head posture were controlled in real time by a puppeteer using a custom-built controller, was developed by Silicon Graphics, and performed live at SIGGRAPH. In 1989, The Abyss, directed by James Cameron included a computer-generated face placed onto a watery pseudopod.
In 1991, Terminator 2: Judgment Day, also directed by Cameron, confident in the abilities of computer-generated effects from his experience with The Abyss, included a mixture of synthetic actors with live animation, including computer models of Robert Patrick's face. The Abyss contained just one scene with photo-realistic |
https://en.wikipedia.org/wiki/S2P | S2P may refer to:
Biochemistry
Membrane-bound transcription factor peptidase, site 2, an enzyme
Computing
S2P File Format, a Touchstone File format for 2-port S-parameters
, a complexity class expressing "symmetric alternation"
Microsoft Surface Pro 2, a Surface-series Windows 8 tablet
UK Pensions
State Second Pension |
https://en.wikipedia.org/wiki/Arthur%20C.%20Clarke%27s%20World%20of%20Strange%20Powers | Arthur C. Clarke's World of Strange Powers is a thirteen-part British television series looking at strange worlds of the paranormal. It was produced by Yorkshire Television for the ITV network and first broadcast in 1985. It was the sequel to the 1980 series Arthur C. Clarke's Mysterious World.
The series is introduced by science fiction writer Arthur C. Clarke in short sequences filmed at his home in Sri Lanka. Individual episodes are narrated by Anna Ford. The series was produced by John Fairley and directed by Peter Jones, Michael Weigall and Charles Flynn.
In 1984, G.P. Putnam's Sons published a hardcover book with the same name, authored by Simon Welfare and John Fairley, where the contents of the show were further explored. It featured an introduction written by Clarke as well as his remarks at the end of each chapter or topic. In 1985, a paperback of this book was released by HarperCollins Publishers.
The series was followed by Arthur C. Clarke's Mysterious Universe, broadcast in 1994.
Episodes
Home release
A collection DVD Box Set of all three Arthur C. Clarke documentary series, Arthur C. Clarke's Mysterious World, Arthur C. Clarke's World of Strange Powers and Arthur C. Clarke's Mysterious Universe was released in July 2013 by Visual Entertainment, which also re-released them separately in September 2013.
External links
References
1985 British television series debuts
1985 British television series endings
Television series by Arthur C. Clarke
ITV documentaries
Paranormal television
British supernatural television shows
Television series by ITV Studios
English-language television shows
Television series by Yorkshire Television
Discovery Channel original programming |
https://en.wikipedia.org/wiki/NetWare%20Link%20Services%20Protocol | NetWare Link Services Protocol (NLSP) is a routing protocol for Internetwork Packet Exchange based on the Intermediate-System-to-Intermediate-System (IS-IS) protocol developed by the International Organization for Standardization (ISO). NLSP enables NetWare servers to exchange routing and service information without the high broadcast overhead generated by Routing Information Protocol and Service Advertising Protocol. Instead of periodically retransmitting its information every few minutes like RIP and SAP, NLSP only transmits every two hours, or when there is a change in a route or service, making it much more suitable for use over a wide area network.
See also
IS-IS
Routing Information Protocol
Service Advertising Protocol
NetWare
References
External links
NetWare Link Services Protocol: Link-State Routing in a NetWare Environment
NetWare Link-Services Protocol
Tag Archives: IPX
The Network Layer - Layer 3
Network protocols
Novell NetWare |
https://en.wikipedia.org/wiki/WPRL | WPRL (91.7 FM), is a National Public Radio-affiliated station in Lorman, Mississippi. It primarily features National Public Radio programming, jazz, and gospel music.
External links
WPRL official website
WPRL
Alcorn State University
PRL
Radio stations established in 1970
1970 establishments in Mississippi |
https://en.wikipedia.org/wiki/WHLA%20%28FM%29 | WHLA (90.3 FM) is a radio station licensed to La Crosse, Wisconsin. The station is part of Wisconsin Public Radio (WPR), and airs WPR's "Ideas Network", consisting of news and talk programming. WHLA also broadcasts regional news and programming from studios in the Whitney Center at the University of Wisconsin-La Crosse.
See also Wisconsin Public Radio
External links
Wisconsin Public Radio
HLA
Wisconsin Public Radio
NPR member stations |
https://en.wikipedia.org/wiki/KWRR | KWRR (89.5 FM) was a public radio station in Ethete, Wyoming, serving residents of the Wind River Indian Reservation. Programming on KWRR consisted of local programming (including country music), plus programs from National Public Radio and Native Voice One. It was established in 1996. As of June 2018 the station was off the air.
The Federal Communications Commission cancelled KWRR's license on October 4, 2021, due to the station failing to file an application to renew its license.
External links
Native Voice One website
NPR member stations
WRR
Native American radio
Radio stations established in 1996
1996 establishments in Wyoming
Radio stations disestablished in 2021
2021 disestablishments in Wyoming
Defunct radio stations in the United States
WRR
Wind River Indian Reservation
Fremont County, Wyoming
Arapaho |
https://en.wikipedia.org/wiki/KTNA | KTNA (88.9 FM), is a National Public Radio-affiliated radio station in Talkeetna, Alaska. It features National Public Radio as well as diverse local music and public affairs programming.
External links
KTNA official website
KTNA
TNA
Community radio stations in the United States
TNA
Radio stations established in 1993
1993 establishments in Alaska |
https://en.wikipedia.org/wiki/Mudos | Mudos may refer to:
Mudos, the main continent in the Oddworld fictional universe
MudOS, a variant of the LPMud computer gaming system |
https://en.wikipedia.org/wiki/George%20E.%20Kimball | George Elbert Kimball (July 12, 1906 – December 6, 1967) was an American professor of quantum chemistry, and a pioneer of operations research algorithms during World War II.
Early life
George E. Kimball was born to Arthur G. Kimball in Chicago in 1906 and he grew up in New Britain, Connecticut. He was the oldest of three children in a middle-class family; his younger brother, Penn Kimball, also became a professor at Columbia, in journalism. His interest in chemistry was due to his high school chemistry teacher. He attended New Britain High School and graduated in 1923. He spent a year at Phillips Exeter Academy and in 1924 he enrolled at Princeton University. Apparently his father was of the opinion that there were already too many graduates of Yale University in Connecticut. Kimball later claimed that he chose the chemistry program at Princeton because it allowed him to study not only chemistry, but also an equal amount of physics and mathematics, which were also of interest to him. Kimball received his bachelor's degree in 1928, and at that time his main interest was quantum chemistry, which at that time was a field that was still in its infancy, following significant theoretical breakthroughs in quantum mechanics in 1925.
He returned to Princeton's chemistry department to be a graduate student on a graduate fellowship and worked under Hugh Taylor. Kimball's doctoral thesis was on quantum mechanics of the recombination of hydrogen atoms, and he received his Ph.D. in 1932.
Personal life
George E. Kimball married chemist Alice Thurston Hunter, whom he met at MIT, on June 22, 1936. Together, they had four children.
Work
Early work (1932–1942)
After having missed out on a National Research Fellowship in physics in 1932, he stayed at Princeton as instructor. In 1933, he was awarded a National Research Fellowship in chemistry and went to Massachusetts Institute of Technology (MIT) for two years (1933–1935). While a fellow in MIT's chemistry department, he spent much of his time working in the physics department where his collaborators included the trio John C. Slater, Philip M. Morse (who had been a graduate student at Princeton simultaneously with Kimball, but in physics) and Julius Stratton.
During the summer of 1935, Kimball returned to Princeton, to work with Henry Eyring. After a year when Kimball taught physics at Hunter College, he became assistant professor at the Chemistry Department of Columbia University. One of his students during his early time at Columbia was Isaac Asimov, who remembered getting a zero from him in physical chemistry. During the years 1936–1941, Kimball published nine papers on reaction rates and electrochemical surface effects. He also developed and taught courses in quantum chemistry, and supervised graduate student research. In 1941 he was elected a Fellow of the American Physical Society. The book Quantum Chemistry written by Kimball, Henry Eyring and John Walter, was begun around 1934 and published in 1944. |
https://en.wikipedia.org/wiki/Alexis%20Lemaire | Alexis Lemaire (born 1980) is a mental calculation world record holder. He holds a Ph.D. in Computer Science related to artificial intelligence from the University of Reims. He is also the owner of world records for mentally calculating the 13th root of 100-digit numbers and 200-digit numbers.
On 10 May 2002, he calculated the 13th root of a 100-digit number in 13.55 seconds, beating the record held by Willem Klein (88.8 seconds) and the somewhat less official record of Gert Mittring (39 seconds). On 23 November 2004, Mittring tried to beat Lemaire's record, but his time of 11.8 seconds was not counted as official, as one organization's rules had decided to stop recognizing records for root extraction of random numbers due to the difficulty of standardizing the challenge. Less than a month later (17 December 2004) Lemaire beat his own record, with a time of 3.625 seconds— this included the time it took him to read the number, calculate its root, and recount the answer. He found the 13th root of the 100-digit number which is 45,792,573.
Following this achievement, Lemaire gave up trying to improve his performance at calculating roots of 100-digit numbers, and moved on to 200-digit numbers with many attempts as described on the rules page (see 13th root ). Like an athlete, he trains his brain daily for this task. On 6 April 2005, he calculated the 13th root of a 200-digit number in 8 minutes 33 seconds.
By 30 July 2007, Alexis got his time down to 77.99 seconds at the Museum of the History of Science, Oxford and by 15 November his time was further decreased to 72.4 seconds.
His latest achievement came on 10 December 2007, where he mentally extracted the 13th root of a random 200-digit number in 70.2 seconds.
The so-called 'mathlete' produced the answer of 2,407,899,883,032,220 at London's Science Museum.
A computer was used to produce the random 200-digit number, from which he tried to extract the 13th root. The museum's curator of mathematics, Jane Wess, said, "He sat down and it was all very quiet -- and all of a sudden he amazingly just cracked it. I believe that it is the highest sum calculated mentally. He seems to have a large memory and he's made this his life's ambition. It's quite remarkable to see it happen. A very small number of people have this extraordinary ability; nowadays there is only a handful."
Lemaire says that his mental feats also have very useful applications in artificial intelligence, his chosen field.
References
University of Reims Champagne-Ardenne alumni
1980 births
Living people
Mental calculators |
https://en.wikipedia.org/wiki/Business%20continuance%20volume | In disk arrays, a business continuance volume (BCV) is EMC Corporation's term for an independently addressable copy of a data volume, that uses advanced mirroring technique for business continuity purposes.
Use
BCVs can be detached from the active data storage at a point in time and mounted on non-critical servers to facilitate offline backup or parallel computing. Once offline processes are completed, these BCVs can be either:
discarded
re-attached (re-synchronized) to the production data again
used as a source to recover the production data
Types
There are two types of BCVs:
A clone BCV is a traditional method, and uses one-to-one separate physical storage (splitable disk mirror)
least impact on production performance
high cost of the additional storage
persistent usage
A snapshot BCV, that uses copy on write algorithm on the production volume
uses only a small additional storage, that only holds the changes made to the production volume
lower cost of the additional storage
reads and writes impact performance of production storage
once snapshot storage fills up, the snapshot becomes invalid and unusable
short-term usage
References
External links
Analytical Intelligence On The Background Industry With Interviews & Data
Backup software
Business continuity
Dell EMC
Fault-tolerant computer systems |
https://en.wikipedia.org/wiki/Design%20Automation%20Standards%20Committee | The Design Automation Standards Committee (DASC) is a subgroup of interested individuals members of the Institute of Electrical and Electronics Engineers (IEEE) Computer Society and Standards Association.
It oversees IEEE Standards that are related to computer-aided design (known as design automation). It is part of the IEEE Computer Society.
This group sponsors and develops standards under the policies of the IEEE.
The group started in the summer of 1984 at the Design Automation Conference.
Initially, the group supported VHDL as a standard, but extended its coverage to Verilog, and then additional areas in the design automation space.
After going through a period of very few meetings in 2004–06 which ended with some contention about Power standards (see Common Power Format and Unified Power Format), the group developed new and explicit policies and procedures. With these procedures approved in 2007, the group began meeting monthly via teleconference. Active meetings include EDA companies, System integration companies, Electronic Intellectual Property (IP developers, and Semiconductor companies, and individuals interested in these topics.
Beginning in 2007, the group began to award the Ron Waxman Design Automation Standards Committee Meritorious Service Award. This award was named after the early and consistently contributing organizer of the DASC, Ron Waxman.
The first recipient of the award in 2007 was Gabe Moretti.
Work of the committee
The biggest center of interest in the DASC has been around language based design and verification standards stemming from the key hardware description language standards VHDL and Verilog. From these have flowed standards for timing, synthesis, math routines, test, power, encryption, and meta-data for the topics above.
The emphasis of the group has also grown to embrace standards being developed in analog-mixed signal and other extensions driven by these needs.
The active Working Groups are:
VHDL Working Groups
P1076 Standard VHDL Language Reference Manual (VASG)
P1076.1 Standard VHDL Analog and Mixed-Signal Extensions (VHDL-AMS)
P1076.1.1 Standard VHDL Analog and Mixed-Signal Extensions - Packages for Multiple Energy Domain Support (StdPkgs) - this group is now part of 1076.1
SystemVerilog Working Groups
P1800 SystemVerilog: Unified Hardware Design, Specification and Verification Language (SV-IEEE1800) [cosponsored with IEEE-SA CAG]
P1647 Standard for the Functional Verification Language 'e' (eWG)
P1699 Rosetta System Level Design Language Standard (WG)
P1734 Standard for Electronic Design Intellectual Property (IP) Quality (WG)
P1801 Standard for the Design & Verification of Low Power ICs
The inactive Working Groups are:
P1076.2 IEEE Standard VHDL Mathematical Packages (math)
P1076.3 Standard VHDL Synthesis Packages (vhdlsynth)
P1164 Standard Multivalue Logic System for VHDL Model Interoperability (Std_logic_1164) (vhdl-std-logic)
P1076.4 Standard VITAL ASIC (Application Specific Integrated Circuit) M |
https://en.wikipedia.org/wiki/Yonezawa%20PR21 | (also known as Party Room 21) released Family Computer and Super Famicom video games during the 1990s. They also published a game for the Game Boy.
Most of the games produced were of the board game/trivia genres. Their most "notable" titles during their years of production were the Famicom game Battle Storm and the Super Famicom game Super Hockey '94.
During the 1994 fiscal year, the company published a range of software for the Family Computer before Yonezawa was bought by Sega. After the buyout, the company changed name to Sega Yonezawa, which it was known as until it was merged into Sega Toys in 1998.
Video games
Battle Storm (1991)
Gimme a Break: Shijou Saikyou no Quiz Ou Ketteisen (1991)
Hiden Inyou Kikouhou: Ca Da (1991)
Gimme a Break: Shijou Saikyou no Quiz Ou Ketteisen 2 (1992)
Shijou Saikyou no Quiz Ou Ketteisen Super (1992)
Casino Derby & Super Bingo (1993)
The Gorilla Man (1993)
Super Hockey '94 (1994)
References
Video game companies disestablished in 1998
Video game companies established in 1988
Defunct video game companies of Japan
Japanese companies disestablished in 1998
Japanese companies established in 1988 |
https://en.wikipedia.org/wiki/Going%20Places%20%28Australian%20TV%20series%29 | Going Places was an Australian television series broadcast by the Nine Network in late 2007. It consisted of 8 half-hour-long episodes. Australian actor Sue McIntosh narrated the series, while her husband, John McIntosh, produced.
Overview
The series goes behind the scenes at Australian airline Jetstar as it moves into the highly competitive international market. The focus is on the people who make the airline tick, in particular cabin crew.
It is similar to the British show Airline and its American counterpart, which also follow low cost airlines.
See also
List of programs broadcast by Nine Network
List of Australian television series
External links
Official website
Nine Network original programming
Australian factual television series
2007 Australian television series debuts
2007 Australian television series endings
Aviation television series |
https://en.wikipedia.org/wiki/Kiwicon | Kiwicon is a New Zealand computer security conference held annually in Wellington from 2007. It brings together a variety of people interested in information security. Representatives of government agencies and corporations attend, along with hackers.
The conference format allows for talks, informal discussions, socialising, key signing and competitions. Talks are of various lengths on a wide range of subjects, usually including a wide range of techniques for modern exploits and operational security, security philosophy, New Zealand hacker history, related New Zealand law, and a few talks on more esoteric topics.
Kiwicon was founded by Adam Boileau when the annual Australian computer security conference Ruxcon was cancelled for 2007.
At the conclusion of Kiwicon X, it was announced that there would be no Kiwicon in 2017. The conference returned for 16-17 November 2018, called "Kiwicon 2038AD", with tickets selling out in under three days by 6 September.
Past Conferences
2007 - "Share The Knowledge"
The inaugural Kiwicon was held during the weekend of 17–18 November 2007 at Victoria University of Wellington. Approximately 200 people from the New Zealand security community (and elsewhere) attended the two-day event. Talk topics included: the psychology of user security errors, information warfare, hiding files in RAM, cracking with PlayStation, and attacks on: kiosks, telecommunications company ethernet, non-IP networks, and a serious Windows hole.
2008 - "Two Cons, One Vision"
Kiwicon 2k8 was held on the 27th and 28 September, with an attendance of over 250 people. A broader range of attendees arrived, with presale tickets selling out before the doors opened. Attendees were greeted with an array of video phone captures proving the insecurity of video conferencing systems. Topics included: mass surveillance, using honeypots to detect malicious servers, physical security, using search engine optimization to make websites disappear from search results, Bluetooth surveillance, Internet probe counterattacking, speed hacking, and attacks on: wired and mobile phone systems, biometrics, Citrix XenApp, and Windows Vista via heap exploitation.
2009 - "Kiwicon III: Army of Darkness"
Kiwicon 2k9 was held during the weekend of 28th-29 November 2009 at Victoria University of Wellington for the third year running. The event sold out with an attendance of over 350 people. Talk topics included: professional vulnerability research, identifying online identities using Bayesian inference, social engineering, radio sniffing, defending against denial-of-service attacks, Linux rootkits, an introduction to the New Zealand Internet Task Force, and attacks on: physical access control systems, GPS, smart cards, shared hosting platforms, ActiveSync, iOS App Store, pagers, wireless routers, and scientific software.
2010 - "The four e:Sheep-persons of the Cyber Infopocalypse"
Kiwicon IV was once again held on the weekend of 27th-28 November 2010 at Victoria University of |
https://en.wikipedia.org/wiki/Youth%20Against%20AIDS | Youthforce was an international youth network founded in 1999 to raise visibility around the impact of HIV/AIDS on youth.
Youthforce was one of two youth partners who initiated the Youthforce, a self-sustaining international brand and umbrella under which youth from around the world partner with global stakeholders to raise their voice on HIV/AIDS. Each Youthforce creates its own identity and gives space to youth to be heard.
The highlight of Youthforce was an "MTV Ask the Leaders" session featuring former president Bill Clinton, actor Rupert Everett and Peter Piot of UNAIDS. One of the first sessions of its kind, it was broadcast worldwide as part of MTV's Staying Alive Campaign.
Barcelona Youthforce, 2002
This was the beginning of the Youthforce movement. Barcelona Youthforce was a partnership between of Youth Against AIDS, Student Global AIDS Campaign with Family Health International and Advocates for Youth.
Bangkok Youthforce 2004
This was a follow-up to the Barcelona Youthforce. Bangkok youth attendees disbanded Youth Against AIDS after the conference and several young leaders received support from the United Nations Population Fund (UNFPA) and UNAIDS to form the Global Youth Coalition on HIV/AIDS, (GYCA), a global, youth-led network that has now grown to over 6,000 members in 173 countries worldwide.
Toronto Youthforce 2006
The culmination of the Youthforce efforts so far was in Toronto 2006, where the presence of youth was the highest to date. At Toronto, GYCA coordinated a Youth Pre-Conference and an advocacy campaign focusing on the vulnerability of youth to HIV infection and the right of young people to participate. GYCA continued to secure youth participation at the following Mexico 2008 and Vienna 2010 International AIDS Conferences with other YouthForce partners including Advocates for Youth, TakingITGlobal and others.
Visibility for youth advocates
YAA enlisted and raised visibility for representatives on over 30 countries. Most of those have proceeded to be the most visible activists on HIV/AIDS in their countries.
Yinka Jegede-Ekpe was interviewed by YAA and Advocacy Project in 2001. She proceeded to win a Reebok Human Rights Award for her work.
Kabati Ishaya, also interviewed by YAA/Advocacynet in 2001, was featured in the film We will Not Die Like Dogs
International advocacy
YAA wrote the Annex to Fourth World Youth Forum in Dakar, Senegal, 2001
Collaboration with Artists Against AIDS Worldwide
Student Global AIDS Campaign, Stop AIDS Campaign
Advocacy campaign
Having served its intended goal as a catalyst to the creation of an international youth movement on HIV/AIDS, YAA's identity gradually gave way to the Youthforce and a new generation of youth with different concerns, yet all with needs for visibility. YAA disbanded as an entity after the Bangkok AIDS Conference.
References
Youth organizations based in the United States
Health campaigns
HIV/AIDS activism |
https://en.wikipedia.org/wiki/Ganbare%20Goemon%3A%20Mononoke%20D%C5%8Dch%C5%AB%20Tobidase%20Nabe-Bugy%C5%8D%21 | is a Ganbare Goemon game developed by Konami Computer Entertainment Kobe and released for the Game Boy Color on December 16, 1999.
Gameplay
The gameplay is similar to the other RPGs in the series, in which the player controls their party from an overhead map and explores each area getting quests and items in order to advance the main plot. While they control a party, combat is strictly one-on-one, as the game attempts to join the Pokémon craze with "dueling" combat between individual monsters. Additionally, the player can capture and train the monsters they defeat, and even upgrade them or merge them with other creatures to obtain additional powers. The game can also connect with the similarly-themed Mononoke Sugoroku for the N64, in order to transfer and exchange monsters between both titles.
References
1999 video games
Game Boy Color games
Game Boy Color-only games
Ganbare Goemon games
Japan-exclusive video games
Video games developed in Japan
Single-player video games
Japanese role-playing video games |
https://en.wikipedia.org/wiki/Luigi%20Dadda | Luigi Dadda (April 29, 1923 – October 26, 2012) was an Italian computer engineer, best known for the design of the Dadda multiplier and as one of the first researchers on modern computers in Italy. He was rector at the Politecnico di Milano technical university from 1972 to 1984, collaborating on research at the same university until 2012. He was a Life Fellow of the IEEE.
He studied electrical engineering at the Politecnico di Milano and graduated in 1947 with a thesis on signal transmission, a microwave radio bridge between the cities of Turin and Trieste.
His research interests then turned to models and analog computers as an assistant professor, and in 1953 he received a grant from the National Science Foundation in order to study at the California Institute of Technology in Pasadena. In the interim, the Politecnico di Milano requested funding for a digital computer under the Marshall Plan; the request was granted in the sum of US$120,000, and the rector of the time, Prof. Cassinis, invited him to join the design team at the Computer Research Corporation of San Diego, since the machine, a Computer Research Company model CRC 102A, would not be maintained by the vendor after delivery to Italy, and it therefore needed to have in-house expertise on it. Dadda complied, thus forfeiting the NSF grant and transferring to San Diego.
He would travel to Italy on an old Liberty merchant ship along with the precious machine, packed in cotton balls in order to protect its valves from dangerous vibrations. Upon disembarkation in Genoa, the machine was declared with customs as an "electrical appliance", as the only computer machine in the taxonomy of goods used at the time was a "punchcard machine", but a punched card reader was not supplied with the computer, so it didn't fit the categorisation. An additional problem was that, at the time, Italy's taxation imposed the application of a small paper slip similar to a stamp (proving payment of duties) on each and every valve used in the machine. Since dismantling the machine to apply the slips was out of question, the customs allowed Dadda to pay the tax as a forfeit and gave him a pack of slips to apply on the machine "as soon as possible". Those slips remained in a drawer in Dadda's desk.
The machine reached, at last, the Politecnico di Milano in September 1954, where it was activated in the 2SUD back room, and became the first working digital computer in Italy and continental Europe. In the following years, the research activity of Dadda focused on the use of the machine for scientific and industrial applications, and training researchers and students of the Politecnico in Computer Science, where he created and taught the first courses on the subject. Notably, he studied how to enhance the ALUs of the machines, proposing solutions such as the Dadda multiplier, which significantly enhanced performance of those circuits.
He reached the status of a full professor at the Politecnico in 1960 and was assigned |
https://en.wikipedia.org/wiki/WPNR-FM | WPNR-FM (90.7 FM, "Pioneer Radio") is the student-run radio station at Utica University in Utica, New York, United States. Programming is produced by Utica University students under the guidance of a faculty advisor and includes music and university athletic events. The studios and transmitter are at the Strebel Student Center on the campus.
History
Radio at Utica College prior to WPNR-FM
The history of radio at what was then Utica College predates the present WPNR-FM by more than 20 years. In 1953, after three years of planning and construction, a radio workshop and studio were completed for students, with proposals to run lines to transmit the programs into the student union. Studios were in the student senate office, and one student, Leo Brannick, built much of the equipment. In December 1954, this evolved into a radio station known as "WRUC", with speakers inside and outside the student union. The station continued to operate on this model, on an off-and-on basis, for a decade; by 1964, its broadcasting led to an editorial in the campus newspaper, The Tangerine, which chided it for increasing the level of noise in the cafeteria and drowning out conversations. Noise level complaints led to the discontinuation of broadcasting in September 1965, with the radio workshop devoting its activities to program production for commercial stations. The noise reactions were also cited as backlash to rock and roll music. Under station manager Robert Green, the station had a "No Rock & Roll" sign in the station, which student disc jockeys frequently ignored; even after Green issued a December 1963 ultimatum in the wake of complaints that were received, students continued to play rock and roll.
Work began to reactivate WRUC in 1967; the station remained silent for several semesters while work was carried out to connect WRUC's output to the power lines in campus dormitories in a carrier current setup. The station resumed broadcasting in March 1968, but it went off the air again in April as its aging equipment began to fail and there was no money to hire electricians to fix it. The station was then renamed WRNS, after faculty advisor Ralph N. Schmidt, for the fall 1968 semester after it was discovered that the WRUC designation had already been assigned to Union College in Schenectady, after the fall semester, it left the air again, not returning until 1970.
Going FM
The idea of converting the campus station to an FM outlet, expressed since 1962, gained steam in the 1970s. As early as 1972, the college was preparing an application for a new 10-watt outlet on 90.7 MHz. The station changed its name to WEDJ in 1973—having learned that WRNS had been assigned to another station—and obtained a United Press International teletype. The WEDJ name in actuality stood for Ed and Dana Jacobson, in reference to the music director and station manager of the period.
The formal application by what was then the Utica College Branch of Syracuse University was filed on May 12, |
https://en.wikipedia.org/wiki/WUTQ-FM | WUTQ-FM (100.7 MHz) is a commercial radio station licensed to Utica, New York. The station serves the Utica-Rome region of New York State. The station is owned by Roser Communications Network and it airs a talk radio format.
The studios and offices are on Leland Avenue in Utica. The transmitter is on Higby Road in New Hartford.
Programming
Weekdays begin with a local talk and information show, "The Talk of the Town," hosted by Jason Aiello and Rocco LaDuca. The rest of the schedule is made up of nationally syndicated talk shows, Glenn Beck, Chris Plante, Dan Bongino, Jesse Kelly, Alex Jones and Red Eye Radio.
Weekends feature shows on money, health, real estate, technology and home repair. Weekend hosts include Gary Sullivan, Leo Laporte, Ben Shapiro and Bill Cunningham. WUTQ-FM simulcasts newscasts from NBC Network affiliate Channel 2 WKTV. Most hours begin with world and national news from Townhall.
History
The station got its construction permit from the Federal Communications Commission in 1989. It was given the call sign WEIF. But it took several years for original owner Clara Crocco of Clayville, New York, to put the station on the air. The station officially signed on the air on July 11, 1994, as WVVC. It was a Christian radio station, owned by Bethany Broadcasting, with its studios and offices on Higby Road in New Hartford, New York. (The transmitter remains at that location, even after several ownership changes.)
The station became a K-Love network affiliate in 2001, WVVC was sold to the Educational Media Foundation for $1.25 million. It was the first purchase made by EMF in the state of New York. When the station took the K-Love affiliation, the call letters were changed to WKVU, for K Love Utica.
On December 15, 2010 WRCK swapped frequencies with K-Love-formatted WKVU, with WRCK (and its Air 1 Christian rock format) moving to 100.7 FM and WKVU moving to 107.3 FM. In November 2011, EMF announced that it would sell WRCK to Roser Communications and move Air 1 to WOKR (93.5 FM), which had previously carried the now-defunct God's Country Radio Network.
On March 16, 2012, Roser took control of the channel and began a simulcast of AM stations WUTQ and WADR, the full-service gold-based adult contemporary stations that had been airing on the station since approximately 2007. WUTQ had previously been relying on an FM translator, W238CA (95.5) in Middleville, New York, for FM coverage. On March 23, the station took the WUTQ-FM call letters, with the WRCK call sign moving to the former WADR 1480 AM.
WUTQ spun off its former AM simulcast stations to Good Guys Broadcasting in July 2012; the stations were shut down in late 2015.
On March 30, 2015, Roser Communications moved the studios of all their stations, including WUTQ-FM, to new facilities located at the Canal Park off Leland Avenue. Prior to this, Roser Communications had been leasing space at the Adirondack Bank building on Genesee Street.
Dave Coombs, former morning ho |
https://en.wikipedia.org/wiki/B%20roads%20in%20Zone%207%20of%20the%20Great%20Britain%20numbering%20scheme | B roads are numbered routes in Great Britain of lesser importance than A roads. See the article Great Britain road numbering scheme for the rationale behind the numbers allocated. (some data from openstreetmap.org)
Zone 7 (2 & 3 digits)
Zone 7 (4 digits)
See also
A roads in Zone 7 of the Great Britain numbering scheme
List of motorways in the United Kingdom
Transport in Edinburgh#Road network
Transport in Glasgow#Other Roads
Transport in Scotland#Road
References
7
7 |
https://en.wikipedia.org/wiki/Mark%20Guzdial | Mark Joseph Guzdial (born September 7, 1962) is a Professor in the College of Engineering at the University of Michigan. He was formerly a professor in the School of Interactive Computing at the Georgia Institute of Technology affiliated with the College of Computing and the GVU Center. He has conducted research in the fields of computer science education and the learning sciences and internationally in the field of Information Technology. From 2001–2003, he was selected to be an ACM Distinguished Lecturer, and in 2007 he was appointed Vice-Chair of the ACM Education Board Council. He was the original developer of the CoWeb (or Swiki), one of the earliest wiki engines, which was implemented in Squeak and has been in use at institutions of higher education since 1998. He is the inventor of the Media Computation approach to learning introductory computing, which uses contextualized computing education to attract and retain students.
Education
Mark Guzdial was born in Michigan and attended Wayne State University for his undergraduate studies, earning a Bachelor of Science degree in computer science in 1984. He received a master's degree in 1986 in Computer Science and Engineering at Wayne State University. Guzdial went on to receive a Ph.D. at the University of Michigan in 1993 in Computer Science and Education where he was advised by Elliot Soloway. His thesis created an environment for high school science learners to program multimedia demonstrations and physics simulations. After graduating from the University of Michigan, Guzdial accepted a position as an assistant professor at the Georgia Institute of Technology College of Computing. In 2018, he became a full professor in the College of Engineering at the University of Michigan.
Research and teaching
Guzdial's research projects include Media Computation, an approach that emphasizes context in computer science education, using programming languages, lectures examples, and programming assignments from those contexts that students recognize as being authentic and relevant for computing.
Guzdial's Media Computation curriculum is being used at universities across the country. He received a grant from the National Science Foundation in 2006 to pursue his “Using Media Computation to Attract and Retain Students in Computing” curriculum.
Guzdial was Director of Undergraduate Programs at Georgia Tech (including the BS in Computer Science, BS in Computational Media, and Minor in Computer Science) until 2007. He was Lead Principal Investigator on Georgia Computes, a National Science Foundation Broadening Participation in Computing alliance focused on increasing the number and diversity of computing students in the state of Georgia.
Publications
His publications include:
2015 Learner-Centered Design of Computing Education: Research on Computing for Everyone (Synthesis Lectures on Human-Centered Informatics).
2006. Introduction to Computing and Programming with Java: A Multimedia Approach. (with Barba |
https://en.wikipedia.org/wiki/List%20of%20Hindi%20films%20of%201993 |
Highest grossing films
Released films
References
External links
Bollywood films of 1993 at the Internet Movie Database
Indian Film Songs from the Year 1993 - A look back at the year 1993 with a special focus on the Hindi film song
1993
Lists of 1993 films by country or language
Bollywood
1993 in Indian cinema |
https://en.wikipedia.org/wiki/List%20of%20Hindi%20films%20of%201996 | A list of films produced by the Bollywood film industry based in Mumbai in 1996.
Top-grossing films
Released films
References
External links
Bollywood films of 1996 at the Internet Movie Database
1996
Lists of 1996 films by country or language
Bollywood
1996 in Indian cinema |
https://en.wikipedia.org/wiki/Strawberry%20Perl | Strawberry Perl is a distribution of the Perl programming language for the Microsoft Windows platform. Additionally, strawberry contains a fully featured Mingw-w64 C/C++ compiler with many libraries included. While most other distributions rely on the user having software development tools already set up to install certain Perl components, Strawberry Perl ships with the most commonly used tools preconfigured and packaged. It is a dramatic departure from other Perl distributions, and has influenced other distributions (such as its primary rival, the freely available but closed source ActivePerl distribution released by ActiveState) to provide such development tools in their own distribution.
Rationale
Through the CPAN, Perl users can download any of a vast number of prepackaged modules. Many of these modules can be installed in any Perl environment; however, certain modules (XS modules) require a working C compiler and development environment to install successfully. Most Perl distributions assume that such an environment - which is usually provided with most Unix or Linux systems - already exists; however, Windows does not come with a C compiler and the required development environment, and these must be installed separately by the user or the administrator.
However, Strawberry Perl incorporates the MinGW development environment during installation. All the installed Perl tools are set up to use these built-in libraries and development tools to compile XS modules as required. This allows Strawberry Perl to use many XS modules without modification, directly from the CPAN.
Packaged tools
, Strawberry Perl consists of:
A Perl distribution
A Mingw-w64 distribution, consisting of gcc, ld, gmake and other binutils.
Windows installation scripts to allow Strawberry Perl to be easily uninstalled.
Various non-standard but widely used Perl modules. These mostly relate to ease of installation of further extensions from the CPAN, but also include various tools that enhance the ability to install packages from other sources such as the Perl Archive Toolkit, the Perl package manager and the Perl Installation Program.
References
External links
Official website
Strawberry Perl on the Perl Win32 wiki
Perl software |
https://en.wikipedia.org/wiki/Chi%20%28Chobits%29 | , "née" , is a fictional character in the manga series Chobits and its anime adaptation. Chi is a Chobit, a type of personal computer called a persocom that is far more technologically advanced than regular persocoms, and who are said to possess true machine intelligence rather than relying on software programs like other persocoms. She is found by Hideki, a high school graduate who has no idea about her unique abilities or of her past. Over the course of the series Hideki tries to discover what type of persocom Chi is, being told that she is something special. He finds her a job, and has to deal with her being kidnapped at one point. Chi learns about the things around her and what it means to be in love. At the end of the series, Chi finds the person "just for her", and her forgotten identity is revealed, causing Hideki to confront his feelings.
In two interviews describing the series Chi's creators, Clamp, said it would be much easier if computers could speak to you when they had errors. Chi is voiced by Rie Tanaka in the anime and Georgette Rose in its English counterpart. The manga and anime follow Hideki's find of Chi and their relationship, but differ in the storyline. Chi's critical reception has been mostly positive, with reviewers calling her "cute". In addition to Chobits, she is also a crossover character in the series Tsubasa: Reservoir Chronicle and is referenced in other works.
Conception and creation
In an interview when describing Chi's character, Clamp member Satsuki Igarashi stated "Lately we've been saying that the easiest to understand is Chii from 'Chobits.' Errors occur with computers. Things like 'Although it's fine to speak the instructions' and 'Please fix this problem here' might be spoken in a cute voice." In addition, an explanation for Chobitss plot was given by Igarashi who stated: "Back then, when our computer had problems all we would get were these inscrutable error messages. However, we had no idea what was wrong because it wouldn't tell us any more". Clamp also describes Chobits as a variation of the "boy living with mysterious girl" genre. Chi's design as a personal computer resulted from Ohkawa's wish to increase the sense of "emotional discomfort" around becoming emotionally involved with something considered to be merely a lifeless machine.
The name "Chobi", came from the name of a cat at the place of Nekoi's former employment, which the group made into "Chobits", as the characters Elda and Freya were twins. In the series, Clamp had Chi's creator, Ichiro Mihara (a character from their shared universe work Angelic Layer), use the word "Chobi" to describe anything he thought was "small and hopelessly adorable"; two Chobi (the sisters Elda and Freya) become "Chobits".
Appearances
In the manga
Chi first appears atop a trash pile in an alley where she is found by Hideki Motosuwa, a high school graduate who knows very little about computers or the androids known as "persocoms" (personal computers) that have |
https://en.wikipedia.org/wiki/Basque%20Y | Basque Y is the high-speed rail network being built between the three cities of the Basque Autonomous Community, in Spain; Bilbao, Vitoria-Gasteiz and Donostia-San Sebastián.
Route
It will transport cargo and passengers. The cargo trains will connect the Port of Bilbao with the Port of Pasaia, (also known as Pasajes/Pasajes-San Pedro). The new high-speed network network will consist of 172 km long track. Due to the mountainous relief of the region, 104,3 km (61%) will be in 80 tunnels and 17 km (10%) in 71 bridges, leaving only 50.6 km, 29% of the route on the ground, in trenches or embankments.
The maximum speed is 120 km/h for freight trains, whilst passenger trains will travel at speeds of 220 km/h to 240 km/h.
The Basque Y will be built in European rail gauge ( ). It will connect Madrid via Valladolid and connect France via Irun. While the French high-speed rail line (on which the TGV trains achieve their top speeds) is not planned to reach Hendaye until 2032, the Hendaye-Bordeaux track allows 160 km/h. The network will also include a connection to the Navarrese Corridor, the high speed line projected between Zaragoza and the capital of Navarre, Pamplona.
Travel time comparisons
As announced initially, it could take well under one hour to connect the cities while the current slower network takes from 1 h 40 min to 2.5 hours. However, a closer study revealed in February 2015 that the projections below do not possibly hold water, conspicuously delaying initial time estimates.
Stations
Bilbao-Abando
Vitoria-Gasteiz
Irún
San Sebastián-Norte
Ezkio-Itsaso
Euba
Planning
It took 19 years from the first proposals of a Basque high-speed network to the detailed project. The main issues were disagreements between the series of Spanish and Basque governments, and who would bear the costs. Through the Basque tax agreement, the Spanish government will make initial payments on behalf of the Basque government.
An agreement on 24 April 2006 put the section between Vitoria-Gasteiz and Bilbao under Spanish control (through Adif), and the section in Gipuzkoa province under Basque control. It will be the costliest investment in the Basque Country. The completion of the works was originally forecast for 2017, but it's been delayed several times since then.
In June 2012, the European Investment Bank agreed to offer €1bn of funding.
In early 2015, relevant public authorities (Basque Government, Spanish Ministry of Public Works) renewed their commitment with the project, while on the French branch (Aquitaine) financial tensions and public interest considerations risk to halt progress in high-speed rail works. In May 2017 a new collaboration agreement was signed between the Basque Government and the Spanish Ministry making changes in the previous agreement from 2006. In October 2017 the deadline was set in year 2023 by Basque high-ranking officials. However, in end 2022 Adif's draft budget put the completion of the Basque Y to the year 2027. A connection wit |
https://en.wikipedia.org/wiki/Anthony%20Sedlak | Anthony Lawrence Sedlak (April 15, 1983 – July 4, 2012) was a Canadian chef and the host of Food Network Canada's The Main.
Early life and education
Sedlak was born in Prince George, British Columbia and grew up in North Vancouver. At age 13, he began bussing at the Grouse Mountain cafeteria. He was soon promoted to the resort's main kitchen at 14, where he worked as production cook for what was then Bar 98. By 16 he was working at the Grouse Nest restaurant (now The Observatory). During this time he completed the Culinary Art Program at Carson Graham Secondary School in North Vancouver, followed by a four-year apprenticeship program at Vancouver Community College.
Career
Following the advice of Sylvain Cuerrier, the executive chef for Grouse Mountain, 20-year-old Sedlak joined the team at La Trompette restaurant in west London where he worked under Chef Olivier Couillaud. With the experience and knowledge gained at La Trompette, Sedlak returned to Grouse Mountain Resorts where he was offered the position of sous-chef at The Observatory.
At 22, with the help of Chef Harold Bonkowski, head of the culinary arts department at VCC, Sedlak was selected as Canada's representative for the 2006 Hans Bueschken World Junior Chef Challenge in Auckland. He came away with a silver medal.
A few months later, Sedlak won Food Network's Superstar Chef Challenge II. After the win, he left The Observatory to shoot The Main, which premiered on 1 October 2007. Anthony was also a judge on the Food Network show Family Cook-Off.
He was named Executive Chef at The Corner Suite Bistro De Luxe in Vancouver, which was scheduled to open in November 2009.
In February 2010, just days before the opening of The Corner Suite Bistro, Anthony parted ways with the restaurant in pursuit of other opportunities.
Death
Sedlak was found dead in his apartment in North Vancouver, British Columbia, Canada on July 6, 2012. According to the coroner's report, Sedlak committed suicide by taking excessive amounts of cocaine and oxycodone. Shortly before his death, Sedlak filmed an appearance as a guest judge on the television program Anna & Kristina's Grocery Bag. The episode in which Sedlak appeared aired on November 20, 2012. Even though it wasn't his last TV appearance, it featured a tribute to him at the end of the episode. Sedlak's final appearance was on season 2, episode 12 of You Gotta Eat Here! which aired on March 22, 2013, and at the end of the episode it said "in loving memory of Anthony Sedlak".
References
External links
Anthony Sedlak, Host of The Main Food Network Canada
interview with Anthony Sedlak by Joseph Planta Planta: On the Line
Anthony Sedlak at the Chef and Restaurant Database
1983 births
2012 deaths
2012 suicides
Canadian television chefs
Drug-related deaths in Canada
Food Network chefs
People from Prince George, British Columbia
People from North Vancouver
Canadian male chefs
Chefs from Vancouver |
https://en.wikipedia.org/wiki/List%20of%20Swedish%20films%20of%20the%202000s | This is a list of films produced in Sweden and in the Swedish language in the 2000s.
2000s
External links
Swedish film at the Internet Movie Database
References
2000s
Films
Swedish
nl:Lijst van Zweedse films
zh:瑞典電影列表 |
https://en.wikipedia.org/wiki/List%20of%20Swedish%20films%20of%20the%201990s | This is a list of films produced in Sweden and in the Swedish language in the 1990s.
1990s
External links
Swedish film at the Internet Movie Database
1990s
Films
Swedish
nl:Lijst van Zweedse films
zh:瑞典電影列表 |
https://en.wikipedia.org/wiki/List%20of%20Swedish%20films%20of%20the%201980s | This is a list of films produced in Sweden and in the Swedish language in the 1980s.
1980s
External links
Swedish film at the Internet Movie Database
1980s
Films
Swedish |
https://en.wikipedia.org/wiki/List%20of%20Swedish%20films%20of%20the%201910s | This is a list of the earliest films produced in Sweden in the 1910s.
References
External links
Swedish film at the Internet Movie Database
1910s
Films
Swedish |
https://en.wikipedia.org/wiki/Lift%20%28web%20framework%29 | Lift is a free and open-source web framework that is designed for the Scala programming language. It was originally created by David Pollak who was dissatisfied with certain aspects of the Ruby on Rails framework. Lift was launched as an open source project on 26 February 2007 under the Apache License 2.0. A commercially popular web platform often cited as being developed using Lift is Foursquare.
Design goals and overview
Lift is an expressive framework for writing web applications. It draws upon concepts from peer frameworks such as Grails, Ruby on Rails, Seaside, Wicket and Django. It favors convention over configuration in the style of Ruby on Rails, although it does not prescribe the model–view–controller (MVC) architectural pattern. Rather, Lift is chiefly modeled upon the so-called "View First" (designer friendly) approach to web page development inspired by the Wicket framework. Lift is also designed to be a high-performance, scalable web framework by leveraging Scala actors to support more concurrent requests than is possible with a thread-per-request server.
As Scala program code executes within the Java virtual machine (JVM), any existing Java library and web container can be used in running Lift applications. Lift web applications are thus packaged as WAR files and deployed on any servlet 2.4 engine (for example, Tomcat 5.5.xx, Jetty 6.0, etc.). Lift programmers may use the standard Scala/Java development toolchain including IDEs such as Eclipse, NetBeans and IDEA. Dynamic web content is authored via templates using standard HTML5 or XHTML editors. Lift applications also benefit from native support for advanced web development techniques such as Comet and Ajax.
The main characteristics of Lift applications are:
Resistant to common vulnerabilities including many of the OWASP.
Fast to build, concise and easy to maintain.
High performance and scale in the real world to handle big traffic levels.
Interactive like a desktop application.
History
The stable version 1.0 of Lift was released on 26 February 2009 (two years after initiation of the project). Lift 2.0 was released in June 2010. David Pollak, the original creator of Lift, discussed the release of Lift 2.0 on the popular FLOSS weekly podcast.
Lift reached five years of continuous development on 26 February 2012.
References
Further reading
External links
Asta4D: Lift inspired Java port
Web frameworks
Scala (programming language)
Cross-platform software
Virtual machine
Free software programmed in Scala
Software using the Apache license |
https://en.wikipedia.org/wiki/Network%20governance | Network governance is "interfirm coordination that is characterized by organic or informal social system, in contrast to bureaucratic structures within firms and formal relationships between them. The concepts of privatization, public private partnership, and contracting are defined in this context." Network governance constitutes a "distinct form of coordinating economic activity" (Powell, 1990:301) which contrasts and competes with markets and hierarchies.
Definition
Network governance involves a select, persistent, and structured set of autonomous firms (as well as nonprofit agencies) engaged in creating products or services based on implicit and open-ended contracts adapt to environmental contingencies and to coordinate and safeguard ex-changes. These contracts are socially—not legally—binding. As such, governance networks distinguish themselves from the hierarchical control of the state and the competitive regulation of the market in at least three ways:
In terms of the relationship between the actors, governance networks can be described as a pluricentric system as opposed to the unicentric system(p. 151). Governance networks involve a large number of interdependent actors who interact with each other in order to produce an outcome.
In terms of decision making, governance networks are based on negotiation rationality as opposed to the substantial rationality that governs state rule and the procedural rationality that governs market competition (p. 46)
Compliance is ensured through trust and political obligation which, over time, becomes sustained by self-constituted rules and norms.
As a concept, Network Governance explains increased efficiency and reduced agency problems for organizations existing in highly turbulent environments. On the one hand, the efficiency is enhanced through distributed knowledge acquisition and decentralised problem solving; on the other, the effectiveness is improved through the emergence of collective solutions to global problems in different self-regulated sectors of activity. Due to the rapid pace of modern society and competitive pressures from globalization, transnational network governance has gained prominence.
Network governance first depends on the comprehension of the short and long term global business risks. It is based on the definition of the IT key objectives and their influence on the network. It includes the negotiation of the satisfaction criteria for the business lines and integrates processes for the measurement and improvement of the global efficiency and end user satisfaction. Beyond that, it allows the constitution and piloting of internal teams and external partners as well as the setting up of a control system enabling to validate the performance of the whole. Finally, it ensures permanent communication at all the various management levels.
In the public sector, network governance is not universally accepted as a positive development by all public administration scholars. Some doubt |
https://en.wikipedia.org/wiki/WFNY | WFNY (1440 AM) is a commercial radio station licensed to Gloversville, New York, United States. Programming primarily consists of what is known as a variety format, focusing on pop music from the 1950s to the 1980s, along with local weather forecast, as the station has no local news department or sales department. WFNY serves the area of Upstate New York including the Mohawk Valley, Southern Adirondacks, and portions of the Capital Region. The station is owned by local businessman Michael A. Sleezer.
The station also simulcasts on W231CF 94.1 FM.
References
External links
FNY
Radio stations established in 2002
2002 establishments in New York (state) |
https://en.wikipedia.org/wiki/Secure%20messaging | Secure messaging is a server-based approach to protect sensitive data when sent beyond the corporate borders, and it provides compliance with industry regulations such as HIPAA, GLBA and SOX. Advantages over classical secure e-mail are that confidential and authenticated exchanges can be started immediately by any internet user worldwide since there is no requirement to install any software nor to obtain or to distribute cryptographic keys beforehand. Secure messages provide non-repudiation as the recipients (similar to online banking) are personally identified and transactions are logged by the secure email platform.
Functionality
Secure messaging works as an online messaging service. Firstly, users enroll in a secure messaging platform. Then, the user logs into their account by typing in their username and password (or strong authentication) similar to a web-based email account. Out of a message center, the messages can be sent over a secure SSL-connection or via other equally protecting methods to any recipient. If the recipient is contacted for the first time, a message unlock code (see below MUC) is needed to authenticate the recipient. Alternatively, secure messaging can be used out of any standard email program without installing software.
Secure delivery
Secure messaging possesses different types of delivery: secured web interface, S/MIME or PGP encrypted communication or TLS secured connections to email domains, or individual email clients. One single secure message can be sent to different recipients with different types of secure delivery that the sender does not have to worry about.
Trust management
Secure messaging relies on a web of trust. This method synthesizes the authentication approach of web of trust, known from PGP, with the advantages of hierarchical structures, known from centralized PKI systems. Those combined with certificates provide a high quality of electronic identities. This approach focuses on the user and allows for immediate and personal bootstrapping of trust, respectively revocation.
Physical security
In a traditional client-server email, message data is downloaded to a local hard drive, and it is vulnerable if the computer is lost, stolen, or physically accessed by an unauthorized person. Secure messages are stored on a network or internet server which are typically more physically secure, and they are encrypted when data is inbound or outbound. However, an abundance of data still makes the server an attractive target for remote attacks. Methods that can be taken to protect physical security include ensuring environmental safety and hardware safety. Of course, the intentions of the server operator may also come into question.
Application
Secure messaging is used in many business areas with company-wide and sensitive data exchanges. Financial institutions, insurance companies, public services, health organizations, and service providers rely on the protection from secure messaging. Secure messaging can |
https://en.wikipedia.org/wiki/Dirty%20Jobs%20%28Australian%20TV%20series%29 | Dirty Jobs was a reality/factual program on the Nine Network, based on the American version of the same name, in which hosts Jo Beth Taylor and Ben Dark are shown performing difficult, strange, and/or messy occupational duties alongside professional workers.
The show premiered following the premiere of the Australian version of The Singing Bee on 7 October 2007. The show managed lacklustre ratings and was removed after five episodes and replaced with Commercial Breakdown.
References
External links
Nine Network original programming
2000s Australian reality television series
2007 Australian television series debuts
2007 Australian television series endings
Australian television series based on American television series |
https://en.wikipedia.org/wiki/Mobile%20switching%20centre%20server | The mobile switching station, abbreviated as MSC Server or MSS, is a 2G core network element which controls the network switching subsystem elements. Alternatively or adaptively, MSS can be used in GSM networks as well, if the manufacturer has implemented support for GSM networks in the MSS. Since an immediate upgrade of existing GSM network to 3G is not viable due to various issues like handset incompatibilities and high expenditure, most manufacturers do implement GSM support in MSS. In fact, MSS along with other 3G network elements such as media gateway (MGW), can be configured to support GSM network exclusively and can be considered as an upgraded version of existing GSM mobile switching centres. The MSC Server is standards-based and communicates with other distributed elements using industry open standards such as media gateway control protocol, megaco/H.248, Session Initiation Protocol, M2UA and M3UA. The MSC server incorporates industry standards as defined by ETSI, ITU, GSM, 3GPP and 3GPP2 and other leading standard bodies. The MSS supports the regulatory environment set by governing bodies via its support for E911, CALEA/legal intercept, wireless and local number portability, TTY/TTD, and Number Pooling requirements.
Alternatively MSS is also called an MTS-U (Motorola telephony soft-switch) in Motorola terminology, and as MSC-S in Ericsson terminology. MSC server functionality enables split between control plane (signalling) and user plane (bearer in network element called a media gateway), which guarantees better placement of network elements within the network.
MSC server and MGW makes it possible to cross-connect circuit switched calls switched by using IP, ATM AAL2 as well as TDM.
References
3GPP TS 23.205
Telecommunications equipment
Telecommunications infrastructure
Mobile telecommunications
GSM standard |
https://en.wikipedia.org/wiki/Context%20tree%20weighting | The context tree weighting method (CTW) is a lossless compression and prediction algorithm by . The CTW algorithm is among the very few such algorithms that offer both theoretical guarantees and good practical performance (see, e.g. ).
The CTW algorithm is an “ensemble method”, mixing the predictions of many underlying variable order Markov models, where each such model is constructed using zero-order conditional probability estimators.
References
External links
Relevant CTW papers and implementations
CTW Official Homepage
Lossless compression algorithms |
https://en.wikipedia.org/wiki/Genographics | Genographics may refer to a number of things:
PC-GenoGraphics, a visual database/query facility designed for reasoning with genomic data
GenoGraphics, a generic utility for constructing and querying one-dimensional linear plots
The Genographic Project
Genetic genealogy gone global |
https://en.wikipedia.org/wiki/Mass%20media%20in%20Somalia | Mass media in Somalia includes various radio, television, print and internet outlets. The federal government operates two official radio and TV networks, which exist alongside a number of private and foreign stations. Print media in the country is progressively giving way to news radio stations and online portals, as internet connectivity and access increases. In February 2013, the Ministry of Information, Posts and Telecommunication also launched a broad-based consultative process for the reformation of media legislation.
Radio
The first radio communications were started by the Italians in Mogadishu in the late 1950s: the same Guglielmo Marconi supervised the radio station messages in the capital of Italian Somalia, that were the first in all Africa. Successively a public "radio service" was started (in Italian language) in 1938, but was limited to broadcast only in the area of Mogadishu-Genale-Villabbruzzi.
Radio Mogadishu is the federal government-run public broadcaster. Established in 1951 in Italian Somaliland as a follow-up of the "Radio Mogadiscio", it initially aired news items in both Somali and Italian. The station was later modernized with Russian assistance following independence in 1960, and began offering home service in Somali, Amharic and Oromo. After closing down operations in the early 1990s due to the civil war, the broadcaster was officially re-opened in August 2001 by the Transitional National Government.
Actually there are a number of radio news agencies based in Somalia. Radio is the most important and effective communication channel in the country and the most popular type of mass media. In total, about one short-wave and over ten private FM radio stations broadcast from the capital, with several radio stations airing from the central and southern regions and from Puntland. Most radio stations in Somalia are members of Network 2013, an association of local radio stations and a forum for national media leaders.
Other radio stations headquartered in Mogadishu include Mustaqbal Radio, Radio Shabelle, Radio Bar-Kulan, Radio Kulmiye, Radio Dannan, Radio Dalsan, Radio Banadir, Radio Maanta, Gool FM, Radio Xurmo, and Radio Xamar, also known as Voice of Democracy.
Radio stations of south central Somalia include Radio Dhusamareb, Radio Codka Nabada/Radio Abud-Waq, Codka Mudug, Radio Hobyo, Radio Galguduud, and Codka Gobollada Dhexe (Voice of Central Somalia).
The northeastern Puntland region has over a dozen private radio stations. Radio Garowe is based in Garowe, the state's administrative capital. Radio Daljir is Puntland's largest radio station. With a studio in Garowe and its main headquarters in Bosaso, the commercial capital of Puntland, the broadcaster's network of 7 FM transmitters reaches most of Puntland as well as part of the neighboring Galmudug region to the south. Also centered in Bosaso with its studios in Garowe is the Somali Broadcasting Corporation, Puntland's oldest and second largest private radio station |
https://en.wikipedia.org/wiki/NCI-Nature%20Pathway%20Interaction%20Database | The Pathway Interaction Database (PID) is a free biomedical database of human cellular signaling pathways. The database contains information about the molecular interactions and reactions that take place in cells, with a particular focus on processes that might be relevant to cancer research and treatment. The database was established as collaboration between the U.S. National Cancer Institute, NIH and Nature Publishing Group in 2005 and was launched in November 2006. In September 2012, active curation was stopped and the PID data are now available in the Network Data Exchange, NDEx.
Database content
As of November 2007, the database contained 59 pathways (comprising 3309 molecular interactions) curated by the NCI-Nature editorial team. New pathways are added each month. The database also contains 254 pathways (comprising 3003 interactions) imported from the June 2004 edition of the BioCarta pathway database.
The NCI-Nature curated data is gathered from published research literature and reviewed by expert scientists before publication. Evidence codes are assigned to each molecular interaction, which allows users to evaluate the reliability of the interactions or to search for interactions identified by particular experimental techniques.
Data output and download
The database content can be viewed in self-contained, pre-defined pathways. The database can also dynamically generate interaction networks to visualize the results of database searches. Pathways and dynamically generated networks are displayed in GIF and SVG images and can be downloaded as XML (including the standard pathway interchange format, BioPAX). The entire database is also available for download.
See also
Reactome
KEGG
Human Protein Reference Database
Cancer Genome Project
References
Other references
An Introduction to the NCI-Nature Pathway Interaction Database
Identification of Key Processes Underlying Cancer Phenotypes Using Biologic Pathway Analysis
External links
http://www.ndexbio.org
UCSD-Nature Molecule Pages
BioCarta
PharmGKB
Literature-curated human signaling network, the largest human signaling network database
Biological databases
Systems biology |
https://en.wikipedia.org/wiki/Mangotsfield%20and%20Bath%20branch%20line | The Mangotsfield and Bath branch line was a railway line opened by the Midland Railway Company in 1869 to connect Bath to its network at Mangotsfield, on its line between Bristol and Birmingham. It was usually referred to as "the Bath branch" of the Midland Railway.
The line never achieved great importance, but for many years it carried heavy summer holiday traffic from Midlands cities to Bournemouth over the Somerset and Dorset line, which connected to it at Bath. In the 1960s these trains, and the daily "Pines Express", became famous among railway enthusiasts, as did the station at Bath, by then named "Green Park".
The line closed in 1966 except for a minimal coal delivery to Bath which continued until 1971.
Much of the route now forms the Bristol and Bath Railway Path, and the Avon Valley Railway operates a heritage steam railway activity at Bitton.
Beginnings
The Midland Railway, based in Derby, had operated a main line linking Bristol to Birmingham since 1845. (The section between Bristol and Gloucester had had complicated origins, starting as a simple mineral line serving the South Gloucestershire coalfield, and becoming the Bristol and Gloucester Railway, absorbed by the Midland company in 1845.). Bath was a significant destination for visitors and as a city of considerable size, was a source of demand for inwards manufactured goods from the Midlands, and a route to Bath would also capture some of the colliery traffic.
In July 1864 the Midland Railway obtained parliamentary authority to construct a branch line to Bath, and the line was duly opened on 4 August 1869. At first the Bath station was a temporary building west of the River Avon, but in 1870 the extension was opened to the splendid terminus at Queen Square in the city; the Great Western Railway had opened its main line between London and Bristol in 1840, and had its own Bath station on the other side of the city.
The branch connected with the Bristol to Gloucester line at Mangotsfield by a triangular junction allowing through running direct from the north towards Bath.
The route
Mangotsfield lies high in the hills north-east of Bristol, about seven miles distant. The Bristol to Gloucester line ran north-easterly, with a Mangotsfield station on the Shortwood Road. The Bath line formed a junction about a mile nearer Bristol, and facing Bristol; a new Mangotsfield station was opened when the Bath branch opened, replacing the earlier station. The station was very extensive with four wide platforms and large canopies, to cater for considerable passenger interchange volumes.
From Mangotsfield the line descended with a ruling gradient of 1 in 121, east and then south-eastwards with stations at Warmley, Oldland Common and Bitton; all of those settlements were in those days remote from the suburban areas of Bristol. From Bitton the line followed the valley of the River Avon south-easterly into Bath on flatter gradients, but the Great Western Railway main line already occupied the e |
https://en.wikipedia.org/wiki/VIEW%20Conference | VIEW Conference is a computer graphics event in Italy and is held yearly in Turin, between October and November. Topics represented at the event include interactive techniques, digital cinema, 3D animation, gaming and VFX.
The event spans several days and includes sessions open to the public. The conference includes several international speakers from various sectors within the computer graphics field who present their work to the attendees as well as Master Classes and theory lessons taught by experts.
History
The event was created in 2000 as Virtuality Conference. It changed its name for its eighth edition, in 2007, adopting the acronym VIEW, meaning "Virtual Interactive Emerging World". The content of the conference has changed and evolved over the years as well. While still focusing on "virtual reality", the VIEW Conference now includes emerging digital technology and applications including animation, special effects, virtual architecture, and videogames. Speakers of the various editions include Grant Major, Scott Farrar, Roger Guyett, John Knoll, Alvy Ray Smith, Glen Keane, Byron Howard, Brad Lewis, Walter Murch, Mike Mitchell and Walt Dohrn.
In 2005 the VIEW Conference established the "VIEW Award", an international award for 3D animated and VFX short films, targeted to students, artists and filmmakers. As of 2016 the award has five categories, Best Short, VIEW Social Contest ( aimed at involving visual artists, designers and computer graphics lovers with works using 2D/3D animation and/or VFX focusing on themes of social relevance), View Game Award, VIEWTube Video Award and Italianmix.
See also
SIGGRAPH
VIEW Fest
Computer Graphics
3D Cinema
References
External links
VIEWFest
Ultify
Recurring events established in 2000
Computer graphics conferences
Festivals in Italy
Video game festivals
Science and technology in Italy
Culture in Turin
2000 establishments in Italy |
https://en.wikipedia.org/wiki/Protected%20computer |
Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers". The statute, as amended by the National Information Infrastructure Protection Act of 1996, defines "protected computers" (formerly known as "federal interest computers") as:
a computer—
(A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or
(B) which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.
The law prohibits unauthorized obtaining of "information from any protected computer if the conduct involved an interstate or foreign communication," and makes it a felony to intentionally transmit malware to a protected computer if more than $5000 in damage (such as to the integrity of data) were to result.
Scope
The US Justice Department explains:
In the 1994 amendments (of the National Information Infrastructure Act), the reach of this subsection (E. Subsection 1030(a)(5)) was broadened by replacing the term "federal interest computer" with the term "computer used in interstate commerce or communications." The latter term is broader because the old definition of "federal interest computer" in 18 U.S.C. § 1030(e)(2)(B) covered a computer "which is one of two or more computers used in committing the offense, not all of which are located in the same State." This meant that a hacker who attacked other computers in the same state was not subject to federal jurisdiction, even when these actions may have severely affected interstate or foreign commerce. For example, individuals who attack telephone switches may disrupt interstate and foreign calls. The 1994 change remedied that defect.
However, the definition of federal interest computer actually covered more than simply interstate activity. More specifically, 18 U.S.C. § 1030(e)(2)(A) covered, generically, computers belonging to the United States Government or financial institutions, or those used by such entities on a non-exclusive basis if the conduct constituting the offense affected the Government's operation or the financial institution's operation of such computer. By changing § 1030(a)(5) from "federal interest computer" to "computer used in interstate commerce or communications," Congress may have inadvertently eliminated federal protection for those government and financial institution computers not used in interstate communications. For example, the integrity and availa |
https://en.wikipedia.org/wiki/Teresa%20Rodriguez%20Williamson | Teresa Rodriguez (born January 31, 1969) is an American travel writer who wrote Fly Solo: The 50 Best Places on Earth for a Girl to Travel Alone and founded a social network for women travelers.
Teresa's father is from Mexico and her mother is American. Teresa is the oldest of three children. Her younger sister suffered from babyhood from herpes encephalitis, using a wheelchair, and then dying at 11. After this, Teresa vowed to live a full life for her sister's memory.
In 1988, Teresa was working for Richard Simmons, when she met her first husband who was Australian. She immigrated to Australia in 1988.
During her five years in Australia, Teresa worked as a model as well as on a reality TV show Blind Date. She spent her weekends producing recap segments for the show and interviewing people on-location. Teresa returned to the United States in 1993 and moved back to San Francisco.
In 2004 Teresa founded TangoDiva, a social networking site for women travelers. In 2007 Penguin Books published her book Fly Solo. She has remarried and her work has been featured in newspapers and magazines around the world.
References
Living people
1969 births
American travel writers
American women travel writers
Hispanic and Latino American writers
American people of Mexican descent
HuffPost writers and columnists
21st-century American women |
https://en.wikipedia.org/wiki/Mosaic%20Outdoor%20Clubs%20of%20America | Mosaic Outdoor Clubs of America (often abbreviated MOCA or Mosaic) is an international non-profit network of Jewish outdoor clubs in the United States, Canada, and Israel.
History and Organization
The first Mosaic Club was founded in Colorado by Steve Harris Millmond in reaction to his perception that modern Judaism had lost touch with the outdoors and the environment. The name, "Mosaic," refers to Moses, the Biblical prophet and an "outdoor Jew." The initial group still exists as the Mosaic Outdoor Mountain Club; its first event, a hike in the Rocky Mountains of Colorado, was held in December 1988.
The international umbrella organization, Mosaic Outdoor Clubs of America, was founded in 1995, incorporated in May 1996, and obtained 501(c)(3) non-profit status in April 1997; Rick Dronsky was its first executive director, serving from 1996 until 2002. Mosaic Outdoor Clubs of American recognizes local chapters in three countries and is overseen by a volunteer board of directors that has traditionally been elected at Mosaic's annual international gathering. The umbrella organization is largely responsible for coordinating the annual gathering and assisting with the formation of new chapters. When its first board was elected in 1998, twelve chapters were recognized; as of 2007, this total now stands at over 20.
Local chapters host hikes, trail cleanups, and environmental education efforts, in addition to being a social and recreational outlet and a meeting venue for Jewish singles interested in the outdoors. The more active local affiliates count their membership in the hundreds, and host outdoor events every weekend or several times per month.
International gatherings of Mosaic members have been held annually since 1991, usually in the United States around the Labor Day weekend; the 2007 international event saw over 200 attendees.
References
External links
Mosaic International Event
Jewish sports organizations
501(c)(3) organizations |
https://en.wikipedia.org/wiki/Radio%20Nueva%20Vida | Radio Nueva Vida (New Life) is a Spanish-language Christian radio network based in Camarillo, California, United States. It is owned and operated by The Association for Community Education, Inc., a California non-profit 501(c)(3) organization established in 1981.
History
Radio Nueva Vida began broadcasting on January 18, 1987 after building radio station KMRO (90.3 FM) in Camarillo, California. In 1996, additional full-service stations were added to the network to serve Bakersfield and Kern County (KGZO, 90.9 FM), and Fresno and surrounding counties (KEYQ, 980 AM). In December 10, 2012 (KDRH, 91.3 FM) in King City. It added additional FM repeater stations, which cover the California communities of Salinas, San Bernardino, Santa Ana, Victorville, Indio, Palm Springs, Soledad, Los Banos, the San Fernando Valley, Colton, Coachella, Desert Center, Lancaster, Santa Barbara, King City, Santa Maria, Rosamond, Calexico, Palmdale and Modesto.
In 2000 and 2001, Radio Nueva Vida underwent a major expansion, leasing three full-power AM stations. They were KLTX (1390 AM) in Long Beach/Los Angeles, KEZY (1240 AM) in Riverside/San Bernardino, and KSDO (1130 AM) in San Diego, all property of Hi-Favor Broadcasting, LLC. On January 1st, 2019 Radio Nueva Vida ended the lease with Hi-Favor Broadcasting, and ceased to broadcast on those stations.
After Educational Media Foundation (EMF) discontinued its affiliation with God's Country Radio Network in November 2010, EMF switched some of those stations to Radio Nueva Vida. EMF has expanded their partnership with Radio Nueva Vida broadcasting on their stations in Chicago, Portland, Phoenix, Boise, Austin and numerous other stations throughout the country.
Programming and publication
Radio Nueva Vida's programming format consists of Christian music and talk in Spanish. Its 'In House' programs target the Hispanic community and its current needs. The Sembrador Informativo is the monthly newsletter mailed to its supporters and listeners.
Means of support
Radio Nueva Vida, a non-profit organization, is listener supported in a manner similar to that of public radio stations. Its listener-supporters are called Sembradores (Seed Sowers). Sembradores are recruited twice a year in pledge drives by the station, though listeners may donate at any time. There is no minimum amount of money required to become a Sembrador; any amount is accepted and all donors are encouraged to contribute whatever they can.
Outreaches
Radio Nueva Vida has produced a number of large gatherings entitled: Encounters with God at The Forum in Los Angeles, El Toreo of Tijuana, and in Bakersfield, Fresno, San Bernardino, San Diego, Boise, Idaho, and numerous other locations.
Station list
Radio Nueva Vida can also be found on iHeart radio, Tune-in and the official app for iPhone and Android.
Below is a complete list of stations as provided by the Radio Nueva Vida website.
Full Power Stations
Notes:
Translators
HD Stations
References
External lin |
https://en.wikipedia.org/wiki/GUPS | GUPS can refer to: People with undying curiosity and tenacity to ask constant questions.
Giga-updates per second, a measure of computer performance
General Union of Palestinian Students |
https://en.wikipedia.org/wiki/James%20R.%20Goodman | James Richard "Jim" Goodman (born July 16, 1944) retired as professor of computer science at the University of Auckland in Auckland, New Zealand, and emeritus professor at the University of Wisconsin–Madison.
Education and research
Goodman received a PhD from the University of California, Berkeley in 1980. He joined the faculty at the University of Wisconsin–Madison the same year as an assistant professor of computer science.
Goodman's research is focused mainly on computer architecture. His current interests are primarily focused on support for Transactional Memory. Goodman's seminal 1983 paper, "Using cache memory to reduce processor-memory traffic", was the first to describe snooping cache coherence protocols and to identify the phenomenon of cache being able to conserve the memory bandwidth.
Goodman is the co-author of A Programmer's View of Computer Architecture , a highly acclaimed book on computer architecture, and co-authored with Andrew Tanenbaum Structured Computer Organization . In 2007, he was named a Fellow of the IEEE "for contributions to shared-memory multiprocessor system design". In 2010, he was named a Fellow of the Association for Computing Machinery "for contributions to parallel processor and memory system design." In 2013, he received the Eckert–Mauchly Award for "breakthroughs in architecture of shared-memory multiprocessors".
Personal
Goodman was born in 1944 in Topeka, Kansas. Because of his expertise in the field of computer science, he has been interviewed several times as an expert on TV shows such as Campbell Live.
References
External links
James Goodman's page at Auckland
James Goodman's profile on the IEEE Computer website
1944 births
American computer scientists
Living people
University of Wisconsin–Madison faculty
Academic staff of the University of Auckland
Computer designers
Computer systems researchers
American electrical engineers
People from Topeka, Kansas
Fellows of the Association for Computing Machinery
Fellow Members of the IEEE |
https://en.wikipedia.org/wiki/Alaska%20Rural%20Communications%20Service | The Alaska Rural Communications Service (ARCS) is a statewide network of low-powered television stations, serving 235 communities throughout the Alaskan Bush areas. Developed in the late 1970s, the network is based in Anchorage, Alaska, and is operated by Alaska Public Media. Programming is beamed via satellite to the rural transmitters owned by the Alaska state government.
Low powered television broadcasts began in 1959, with a transmitter in the Suntrana-Healy area. In 1972, the Alaskan Public Broadcasting Commission (APBC) received FCC permission to test the use of videotapes to bring television to areas of Alaska with no ability to access terrestrial repeaters; tests began in three villages the next year. Alaska's state legislature then provided funding to the state's Office of Telecommunications to lease a satellite transponder and modify existing telephone earth stations for television in 1976. The first satellite-fed television transmissions began on January 15, 1977, in Tenakee Springs. A Telecommunications Committee under the Alaska Federation of Natives selected programming for the new service, the committee became known as the Rural Alaska Television Network (RATNET). In 1995, after state funding cuts, Bethel Broadcasting, Incorporated, operators of KYUK, assumed responsibility for the service, at the time called The Alaska Satellite Television Project (ASTP). Control of ARCS passed from Alaska Public Broadcasting, Inc. to Alaska Public Media, which also operates Anchorage's PBS member station KAKM, in 2021.
Programming on ARCS is a selection of shows from the four commercial broadcast networks (NBC, CBS, ABC, Fox) and syndication, via the Anchorage stations; plus PBS programming from KAKM and other PBS members in the state; occasionally, ARCS produces some of its own programming (including local sports coverage). Anchorage stations provide their programming to ARCS free of charge with the condition that advertising is allowed to remain.
There is currently no CW programming available on ARCS (nor did it air programming from The WB), and though in the past the network carried MyNetworkTV programming from KYES-TV (and previously, UPN), it has not since its 2009 conversion from a network to an all-repeat programming service; it did carry other syndicated programming from that station, mainly on weekends, until KYES-TV took over the CBS affiliation from KTVA on August 1, 2020 (KYES-TV's former programming shifted to its fourth subchannel and will continue to air on ARCS on weekends). In late February 2021, KYES's call letters were changed to KAUU, to complement sister station KTUU.
Even though much of ARCS' programming contains commercials, the operation of ARCS is partially funded by donations from its viewers, just like member stations of PBS, as well as those of the Christian-based Trinity Broadcasting Network.
Many of ARCS' stations which were in analog were converted to digital broadcasting as part of the FCC mandated digital tel |
https://en.wikipedia.org/wiki/QUAD%20%28compressor%29 | QUAD is a high-performance data compressor based on the LZ algorithms (LZ77, LZ78, LZW). It's designed to produce small files but still decompress fast and with little memory. QUAD is licensed under the LGPL.
External links
http://quad.sourceforge.net/
Archive formats
Free data compression software
Lossless compression algorithms |
https://en.wikipedia.org/wiki/Cornell%20University%20Satellite | The Cornell University Satellite (CUSat) is a nanosatellite developed by Cornell University that launched on 29 September 2013. It used a new algorithm called Carrier-phase Differential GPS (CDGPS) to calibrate global positioning systems to an accuracy of 3 millimeters. This technology can allow multiple spacecraft to travel in close proximity.
The CUSat project began in 2005 and was the winner of the University Nanosat-4 Program which aims to educate the future aerospace workforce and develop new space technologies. As part of this program, CUSat completed environmental testing and other aspects of final I&T in the AFRL Aerospace Engineering Facility at Kirtland Air Force Base. CUSat worked with AFRL to complete the Department of Defense SERB process in preparation for a launch with the Space Test Program. The satellite launched as a secondary payload to CASSIOPE on a SpaceX Falcon 9 rocket on 29 September 2013.
Operation details
The space segment was originally designed to consist of two functionally identical satellites that would launch together and separate on orbit in a target-inspector configuration. Once in orbit, CUSat would use microthrust Pulsed Plasma Thrusters (PPTs) and sub-centimeter level accurate carrier-phase differential GPS (CDGPS) to navigate the satellites to within ten meters of each other. The inspector satellite would use cameras to gather imagery of the target satellite while performing relative navigation. Target satellite imagery would be transferred to the ground segment, where they would be used to reconstruct a three-dimensional model for the end user.
The mission was modified after one of the segments was damaged during testing. It later consisted of a single satellite with multiple antennas that transmit data to each other.
Original plan
Phase One: Launch
CUSat launched as a secondary payload on a launch vehicle. Once in orbit and in the correct attitude, CUSat separated from the launch vehicle where it began Phase Two - the initialization.
Phase Two: Initialization
Once CUSat separates from the launch vehicle and enters the Initialization Phase, it will enter solar illumination where the spacecraft will power on. The spacecraft will make contact with the Mission Control Center at Cornell through one of several ground stations, beaconing its status. Next, the spacecraft will begin to assess its tumble rates, and will detumble if required. Once stabilized, CUSat will begin commissioning operations. Operators in the MCC will assess the health of most satellite subsystems. During this time, the top spacecraft will begin to search for surrounding GPS satellites. A Carrier-phase Differential GPS Lock is then acquired to obtain an accurate attitude solution. The spacecraft will enter Phase Three: Spacecraft Separation.
Phase Three: Spacecraft Separation
Once an attitude control was obtained, CUSat's actuators adjusted the attitude for a proper separation.
While still in illumination, CUsat then perform |
https://en.wikipedia.org/wiki/Persiaran%20Perdana%2C%20Putrajaya | Persiaran Perdana or Putrajaya Boulevard is the longest boulevard in Putrajaya, Malaysia, connecting Dataran Putra in the north to the Dataran Gemilang in the south.
Putrajaya Street Circuit
This is also the location of the start-and-finish straight of the Putrajaya Street Circuit designed by British architect Simon Gibbons to be used during the second round of the 2014–15 Formula E season.
Lists of junctions
Highways in Malaysia
Highways in Putrajaya |
https://en.wikipedia.org/wiki/Discovery%20People | Discovery People was an American cable television network.
The channel was launched on March 31, 1997 by CBS as CBS Eye on People, and featured news and human interest stories from CBS News.
The channel suffered significant losses, in part because few cable providers were willing to carry it. By the end of its first year on the air, it was only available in 11 million homes, less than half of what most cable channels need to turn a profit. In mid-1998, it was announced that Discovery Communications would buy 50 percent of the channel and take operational control. It dropped "CBS" from its title to become simply Eye on People.
On January 11, 1999, Discovery bought the network from CBS Corporation and renamed it Discovery People. Discovery continued to license programming from CBS, combining it with some of its own programming.
Discovery Communications began gradually phasing out Discovery People's operations, using Discovery People's distribution for other networks. For DirecTV customers, the channel was replaced by Discovery Health on December 1, 1999. In February 2000, Discovery announced that they intended to pull the plug on the channel.
References
English-language television stations in the United States
Television channels and stations established in 1997
Television channels and stations disestablished in 2000
Defunct television networks in the United States
CBS Television Network
Former CBS Corporation subsidiaries
CBS News |
https://en.wikipedia.org/wiki/IMN | Imn or IMN may refer to:
Imation, previous NYSE symbol
Al Iraqiya, formerly IMN, Iraqi TV broadcaster
"IMN", a song by Mudvayne on their album Lost and Found
Immediate Mobilization Networks, an alleged paramilitary organization formed by Venezuelan President Hugo Chávez
Irish Medical News, an independent newspaper for doctors and health professionals in Ireland |
https://en.wikipedia.org/wiki/Facility%20Registry%20System | The Facility Registry System (FRS) is a centrally managed Environmental Protection Agency (EPA) database that identifies facilities, sites or places of environmental interest in the United States.
Overview
FRS creates facility identification records through verification and management procedures that incorporate information from EPA's program-specific national data systems, state master facility records, data collected from the agency's Central Data Exchange registrations and data management personnel. The FRS provides Internet access to a single integrated source of comprehensive environmental regulatory and compliance information about facilities, sites or places. This includes the national air and water pollution programs, solid and hazardous waste handling, and enforcement activities.
The FRS responds to the increasing demand for access to information and the public need for one source of comprehensive environmental information about a given place. Under the major U.S. environmental statutes—the Clean Air Act, Clean Water Act, Resource Conservation and Recovery Act, etc.--there was no mandate for the individual EPA programs to pool their data to create complete pictures of a facility's environmental footprint. FRS accomplishes this by matching the various program system records according to address matches into a single master record.
In 1995, the Risk Management Plans were compiled with the Toxics Release Inventory Data to create the first version of the Facility Registry System. Since that time, 45 states and 25 programs have been integrated into the FRS.
A new Organizational Query is offered that brings together all facilities under that Organization in one simple query result.
FRS data files can also be accessed at the data.gov website.
FRS Business Rules
The FRS retrieves key identifiers from program offices. Information includes facility name, address, city, etc. The FRS also ingests any geographic information, such as latitude and longitude. The program system id number is also retrieved and placed in the FRS database. FRS also stores the SIC and NAICS codes for facilities that are collected by the various program and state collections. FRS now offers a complete query result from either a SIC value or NAICS value. FRS further contains the Corporation Name which owns or operates the facility. The information from the various programs are then parsed to remove abbreviations and colloquialisms in order to be compared using a conservative matching algorithm. Matched ids are clustered under a single FRS id, while unmatched ids are given individual ids. Geographic information is stored in a separate Location Reference Table. FRS ids that lack a latitude and longitude are sent through EPA's geocoding process, which uses rooftop and map interpolation methods to derive a latitude and longitude with the appropriate method, accuracy and description (MAD) codes.
Accessing the FRS
The FRS is available through an EPA website call |
https://en.wikipedia.org/wiki/Anti-computer%20tactics | Anti-computer tactics are methods used by humans to try to beat computer opponents at various games, most typically board games such as chess and Arimaa. They are most associated with competitions against computer AIs that are playing to their utmost to win, rather than AIs merely programmed to be an interesting challenge that can be given intentional weaknesses and quirks by the programmer (as in many video game AIs). Such tactics are most associated with the era when AIs searched a game tree with an evaluation function looking for promising moves, often with Alpha–beta pruning or other minimax algorithms used to narrow the search. Against such algorithms, a common tactic is to play conservatively aiming for a long-term advantage. The theory is that this advantage will manifest slowly enough that the computer is unable to notice in its search, and the computer won't play around the threat correctly. This may result in, for example, a subtle advantage that eventually turns into a winning chess endgame with a passed pawn. (Conversely, attempting to lure an AI into a short-term "trap", inviting the play of a reasonable-seeming to humans but actually disastrous move, will essentially never work against a computer in games of perfect information.)
The field is most associated with the 1990s and early 2000s, when computers were very strong at games such as chess, yet beatable. Even then, the efficacy of such tactics was questionable, with several tactics such as making unusual or suboptimal moves to quickly get the computer out of its opening book proving ineffective in human-computer tournaments. The rise of machine learning has also dented the applicability of anti-computer tactics, as machine learning algorithms tend to play the long game equally as well if not better than human players.
Common aspects
One aspect of designing a classic AI for games of perfect information is the horizon effect. Computer AIs examine a game tree of possible moves and counter-moves, but unless a forced win is in the tree, it needs to stop exploring new possibilities eventually. When it does, an evaluation function is called on the board state, which often uses rough heuristics to determine which side the board favors. In chess, this might be things like material advantage (extra pieces), control of the center, king safety, and pawn structure. Exploiting the horizon effect can be done by human players by using a strategy whose fruits are apparent only beyond the plies examined by the AI. For example, if the AI is examining 10 plies ahead, and a strategy will "pay off" in 12-20 plies (6-10 turns), the AI won't play around the looming threat that it can't "see", similar to a person being unable to see "over the horizon" where a ship might be hid by the natural curvature of the earth. Similarly, to keep the horizon short, human players may want to keep as complicated a board state as possible. Simplifying the board by trading pieces lets the AI look "farth |
https://en.wikipedia.org/wiki/National%20Environmental%20Information%20Exchange%20Network | The National Environmental Information Exchange Network (NEIEN) is a partnership of states, territories, tribes, and the United States Environmental Protection Agency (EPA). The NEIEN is a secure Internet and standards-based approach for exchanging environmental data and improving environmental decisions. This allows members of the NEIEN to share data efficiently and securely over the internet. This new approach allows real time access to higher quality data while saving time, resources, and money for partner states, tribes, and territories.
References
External links
National Environmental Information Exchange Network
EN2015
American environmental websites
Environmental data
Metadata registry
United States Environmental Protection Agency |
https://en.wikipedia.org/wiki/DRSA | DRSA may refer to:
Dominance-based rough set approach (theoretical computer science)
Deutsches Rettungsschwimmabzeichen (the German water-lifesaving grade) |
https://en.wikipedia.org/wiki/Multiple%20deprivation%20index | Indices of multiple deprivation (IMD) are widely-used datasets within the UK to classify the relative deprivation (essentially a measure of poverty) of small areas. Multiple components of deprivation are weighted with different strengths and compiled into a single score of deprivation.
The calculation and publication of the indices is devolved and indices of multiple deprivation for Wales, Scotland, England, and Northern Ireland are calculated separately. While the components of deprivation that make up the overall deprivation score are similar in all four nations of the UK the weights assigned to each component, the size of the geographies for which deprivation scores are calculated, and the years of calculation are different. As a result levels of deprivation cannot be easily compared between nations.
The geography at which IMDs are produced varies across the nations of the UK and has varied over time. Currently the smallest geography for which IMDs are published is LSOA level in both England and Wales, data zone level for Scotland, and Super Output Area (SOA) for Northern Ireland. Early versions of the English IMDs were published at electoral ward and English local authority level.
The use of IMDs in social analysis aims to balance the desire for a single number describing the concept of deprivation in a place and the recognition that deprivation has many interacting components. IMDs may be an improvement over simpler measures of deprivation such as low average household disposable income because they capture variables such as the advantage of access to a good school and the disadvantage of exposure to high levels of air pollution. A potential disadvantage is that the choice of components and the weighting of those components in the construction of the overall multiple deprivation score is unavoidably subjective.
Components of deprivation
In the current English Indices of Deprivation 2019 (IoD2019) seven domains of deprivation are considered and weighted as follows,
Income. (22.5%)
Employment. (22.5%)
Education. (13.5%)
Health. (13.5%)
Crime. (9.3%)
Barriers to Housing and Services. (9.3%)
Living Environment. (9.3%)
These domains each have multiple components. For example the Barriers to Housing and Services considers seven components including levels of household overcrowding, homelessness, housing affordability, and the distance by road to four types of key amenity (post office, primary school, supermarket, and GP surgery).
Cases for indexes of multiple deprivation at larger and smaller geographies
IMDs are calculated separately for England, Wales, Scotland, and Northern Ireland and are not comparable across them. While the geographies, the input measures, and the weights assigned to each input measure are different in all four countries, they are similar enough to calculate a combined UK IMD with only small sacrifices in data quality. Decisions within the UK that are taken nationally would be usefully informed by a UK index o |
https://en.wikipedia.org/wiki/Loss%20of%20United%20Kingdom%20child%20benefit%20data%20%282007%29 | The loss of United Kingdom child benefit data was a data breach incident in October 2007, when two computer discs owned by HM Revenue and Customs containing data relating to child benefit went missing. The incident was announced by the Chancellor of the Exchequer, Alistair Darling, on 20 November 2007. The two discs contained the personal details of all families in the United Kingdom (UK) claiming child benefit, of which takeup in the UK is near 100%.
The loss
The discs were sent by junior staff at HM Revenue and Customs (HMRC) based at Waterview Park in Washington, Tyne and Wear, to the National Audit Office (NAO), as unrecorded internal mail via TNT on 18 October. On 24 October the NAO complained to HMRC that they had not received the data. On 8 November, senior officials in HMRC were informed of the loss, with Chancellor of the Exchequer, Alistair Darling being informed on 10 November. On 20 November Darling announced:
The lost data was thought to concern approximately 25 million people in the UK (nearly half of the country's population). The personal data on the missing discs was reported to include names and addresses of parents and children and dates of birth of the children, together with the National Insurance numbers and bank or building society details of their parents.
The "password protection" in question is that provided by WinZip version 8. This is a weak, proprietary scheme (unnamed encryption and hash algorithms) with well-known attacks. Anyone competent in computing would be able to break this protection by downloading readily-available tools. WinZip version 9 introduced AES encryption, which would have been secure and only breakable by correctly knowing the passphrase.
In a list of frequently asked questions, on the BBC News website a breakdown of the loss was reported as being:
7.25 million claimants
15.5 million children, including some who no longer qualify but whose family is claiming for a younger child
2.25 million 'alternative payees' such as partners or carers
3,000 'appointees' who claim the benefit under court instructions
12,500 agents who claim the benefit on behalf of a third party
Whilst government ministers claimed that a junior official was to blame, the Conservatives said that the fault lay in part with senior management. This was based on a claim that the National Audit Office had requested that bank details be removed from the data before it was sent, but that HMRC had denied this request, because it would be "too costly and complicated".
Emails released on 22 November confirmed that senior HMRC officials had been made aware of the decision on cost grounds not to strip out sensitive information. The cost of removing sensitive information has been given as £5,000. Although the cost was found to be substantially less (£650) in an academic study.
According to an IT trade journal Computer Weekly, it said that back in March 2007, the NAO had asked for completed information of the child benefit d |
https://en.wikipedia.org/wiki/Computer%20mapping | Computer mapping may refer to any mapping procedure done with the aid of computers:
in computer graphics
3D projection
texture mapping, normal mapping, tone mapping, ... etc.
in geography geographic information system
Web mapping
Generic Mapping Tools
any of various methods in bioinformatics that have to do with gene mapping |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.